SlideShare une entreprise Scribd logo
1  sur  102
Veille technologique en TIC Aspects stratégiques des réseaux Eric Vyncke [email_address] Dernière mise à jour: 7 novembre 2007
References & Misc ,[object Object],[object Object],[object Object],[object Object],[object Object]
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Introduction to Network
Why a Section on Networks? ,[object Object],[object Object],[object Object],[object Object]
The Acronyms Soup Or a small touch of technology
Importance de la standardisation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Généralités ,[object Object],[object Object],[object Object],[object Object],[object Object]
Modèle d’une couche couche n couche n couche n +1 couche n-1 protocole de couche n services de la couche n services de la couche n-1
Rôles des 7 couches ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
0: medium de transmission ,[object Object],[object Object],[object Object],[object Object]
1: couche physique ,[object Object],[object Object],[object Object],1 0 0 1 0 0
2: couche liaison de données ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
...AN Based on the Span ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Local Area Network: LAN ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Ethernet Topologies How to connect more than 2 hosts? ,[object Object],[object Object],[object Object]
Ethernet Hub ,[object Object],[object Object],A    C A B C D A    C A    C A    C
Ethernet Switch ,[object Object],[object Object],[object Object],[object Object],[object Object],A    C A B C D A    C Enterprises always  use switches
Virtual LAN: VLAN ,[object Object],[object Object],[object Object],[object Object],A B C D
Power over Ethernet ,[object Object],[object Object],[object Object],[object Object]
Wide Area Network:  As Layer 1 or 2 Services ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
3: couche réseau ,[object Object],[object Object],[object Object],[object Object],[object Object],A b Z f e
Network Layer: IP at Home ,[object Object],[object Object],Access Point ADSL Router Your ISP Internet = All other ISP 1st data link: wifi 2nd data link: Ethernet 3rd data link: ADSL or Cable Nth data link: Ethernet or ...
What is an IP address? ,[object Object],[object Object]
Basic Addressing ,[object Object],[object Object],[object Object],64.100.24.1 Dots separate the sections Each section contains a number between 0 and 255
IP Addressing at Home ,[object Object],Access Point ADSL Router Your ISP Internet = All other ISP I’m 192.168.100.2 I’m 192.168.100.1 And  192.168.1.2 I’m 192.168.1.1 And 80.123.34.89 Network Printer I’m 192.168.1.3
IP Address Hierarchy For Mr. Postman ,[object Object],[object Object],[object Object],Tasman Dr. 250  Tasman Dr. 102 Main St. 260  Tasman Dr. Main St. 100  Main St. 101  Main St. ? ?
Can we Automate Addressing? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Most enterprises use DHCP except for servers keeping the log to see who is using which address
Caractéristiques d’IP ,[object Object],[object Object],[object Object],[object Object]
What is IPv6? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],IPv6 will rule in 2010 at the latest  ALL NEW NETWORKS/APPLICATION  MUST BE DESIGNED FOR IPV6
TCP/IP ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Les routes dans un réseau IP ,[object Object],[object Object],[object Object],[object Object],[object Object]
IP Routing at Home Access Point ADSL Router Your ISP Internet = All other ISP 192.168.100.2 Default route => 192.168.100.1 I’m 192.168.100.1 & 192.168.1.2 Route to 192.168.100.0/24 via WiFi Default route to 192.168.1.1 I’m 192.168.1.1 and 80.123.34.89 Route to 192.168.100.0/24 via 192.168.1.2 Default route via ADSL Network Printer I’m 192.168.1.3 Route to 192.168.100.0/24 via 192.168.1.2 Default route to 192.168.1.1
Can we Automate the Route? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Wide Area Network As a Layer 3 Service ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],SP Layer 3 Services
Wide Area Network Layer 3 Service or In House Network? SP Layer 3 Services
Layer 3 Service Pros and Cons ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What about Congestion? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],ADSL Router 100 Mbps = 100.000 pps 1 Mbps = 1.000 pps
Quality of Service: QoS ,[object Object],[object Object],[object Object],[object Object]
Delay Variation—“Jitter” t t Sender Transmits B Receives C B A C B A d1 d2 D1 = d1 D2 = d2 Jitter
How to Guarantee QoS? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
QoS in Action Campus Backbone Multimedia Training Servers Order Entry, Finance, Manufacturing Finance Manager Remote Campus Classification Classification Enforcement
Service Level Agreement: SLA ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Never forget to put SLA  in any service
The Security Impact
The Security Dilemma Security  Risks Internet Business Value Explosion in  E-Business!! Internet Access Corporate Intranet Internet Presence Customer Care E-Learning Supply Chain Management E-Commerce Workforce Optimization
100% Security The only system which is truly secure is one which is switched off and unplugged, locked in a titanium lined safe, buried in a concrete bunker, and  is surrounded by nerve gas and very highly paid armed guards. Even then,  I wouldn’t stake my life on it…. Gene Spafford—Director, Computer Operations, Audit, and Security Technology (COAST), Purdue University “ ”
Threat Capabilities: More Dangerous & Easier To Use Sophistication of Hacker Tools Packet Forging/ Spoofing 1990 1980 Password Guessing Self Replicating Code Password Cracking Exploiting Known Vulnerabilities Disabling Audits Back Doors Sweepers Sniffers Stealth Diagnostics High Low 2000 DDOS Internet  Worms Source: Carnegie Mellon University, 2002 Technical Knowledge Required
Risk Assessment   in 2002 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Risk Assessment  in 2006 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Insiders… Over 75% of hacking is done by insiders and it’s easy to see why. The person on the inside is on the right side of the firewall—they know the computer systems and they have access to the passwords Neil Barrett, Bull Information Systems, ‘ Computer Crime Fighter’—Personal Computer World, Feb 1999 “ ”
The Principles of Security: C I A Confidentiality - Ability to ensure secrecy ,[object Object],[object Object],[object Object],Integrity - Ability to ensure asset/data  in not modified security I C A
Attack against Confidentiality telnet foo.bar.org username: dan password: m-y-p-a-s-s-w-o-r-d  d-a-n
Attack on  Integrity Bank Customer Deposit $1000  in Bob’s Account Deposit $900 in Mallet’s Account and $100 in Bob’s Account
Attacks of Integrity: Web Defacing
Denial of Service (DoS) ,[object Object]
What is Security Management? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Risk Management ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],The most tricky… Risk analysis
Purpose of Risk Analysis ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Asset Evaluation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Handling Risk… ,[object Object],[object Object],[object Object],[object Object],[object Object]
Controls ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Technical Control: Access Control ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Access Control Id, Authen, Author, Account ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Technical Control: Cryptography ,[object Object],Plaintext: Hello Plaintext: Hello Encryption Decryption Ciphertext: %z$*@ Encryption  keys
Some Words on Cryptography ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Technical Controls More Words on Crypto ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Crypto on Networks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Cryptography alone is  NEVER ENOUGH  to guarantee security!
Technical Controls Perimeter Security and Firewalls ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Technical Controls Security Perimeter Trusted Zone Untrusted Zone firewall
Technical Controls Usual Firewall Locations Internet intranet Partner X Partner Y HR Network Source: Cisco Systems
Technical Controls: Firewalls Deep Packet Inspection ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Impact of Voice
Why Voice over IP? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Voice in an IP Packet ,[object Object],[object Object],[object Object],Voice Payload Voice Payload RTP Voice Payload RTP UDP Voice Payload RTP UDP IP
IP Telephony in a Nutshell ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],3) Registration 4) Call Signaling 5) Media Stream
What Is a CODEC? Analog to Digital Conversion Analog Audio Source = 0101 G.711 Pulse Code Modulation (PCM) is the DS0 Everything Is Bits Sample Compand Quantize Encode Frame 4000 Hz Analog Signal = Sample 8,000/sec Nyquist Frequency Quantize 256 Steps Using 8 Bits DS0 64 Kbps
IP Telephony vs. Voice over IP ,[object Object],[object Object],[object Object],[object Object],[object Object]
Network Requirements for Voice ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Skype Service ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],A typical Skype user interface
Skype Architecture ,[object Object],Skype Architecture: Normal peers, super nodes, and centralized Skype server
Should You Use Skype? ,[object Object],[object Object],[object Object],[object Object],[object Object]
Wireless Network
Basics of Radio ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
WiFi ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
GSM Architecture OMC Home Location Register AuC Equipment ID Network Management Center BTS BTS BTS ME ME ME Subscriber Identity Module Subscriber Identity Module Subscriber Identity Module BSC PSTN Mobile switching center Data communication network BTS = Base Transceiver Station BSC = Base Station Controller AuC = Authentication Center OMC = Operation and Maintenance Center PSTN = Public Switched Telephone Network ME = Mobile Equipment Source: Stallings, 313 Source: Mehrotra, 27 Visitor Location Register BTS
GSM and data ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Universal Mobile Telecom Systems UMTS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
WiMax Worldwide Interoperability for Microwave Access ,[object Object],[object Object],[object Object],[object Object],[object Object]
WiFi GSM UMTS WiMAX 120 Mbps 2 – 14 Mbps 9.6 kbps -> 384 kbps 11 Mbps -> 54 Mbps Bandwidth Licensed Licensed Licensed Unlicensed Spectrum 30 km WiMAX Mostly worldwide UMTS Worldwide (except Japan) GSM 100 m WiFi Range
Mobile Systems 802.11n 4G 3G HSDPA Zigbee 802.15.4 BT UWB NFC RFID Proximity Personal Local Wide Data Rate (bps) 1G 1M 10K 10M 100M 2G 3G 802.16 802.16e 802.11g 802.11b 802.11a
Impact on Network Adding GSM/UMTS to Laptop ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Impact on Network Smart Phones ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
How to Deploy a Network? Or the right questions to be asked?
Basic Networking ,[object Object],[object Object],[object Object],[object Object],[object Object]
Levels of Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
QoS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
High Availability ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Open Standards ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Future Proof... ,[object Object],[object Object],[object Object]
Operation Cost ,[object Object]
Outsourcing Network ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
End ,[object Object]

Contenu connexe

Tendances

Ethernet frame format
Ethernet frame formatEthernet frame format
Ethernet frame format
myrajendra
 

Tendances (20)

Advanced TCP/IP-based Industrial Networking for Engineers & Technicians
Advanced TCP/IP-based Industrial Networking for Engineers & TechniciansAdvanced TCP/IP-based Industrial Networking for Engineers & Technicians
Advanced TCP/IP-based Industrial Networking for Engineers & Technicians
 
Ethernet frame format
Ethernet frame formatEthernet frame format
Ethernet frame format
 
LAN TECHNOLOGLES
 LAN TECHNOLOGLES LAN TECHNOLOGLES
LAN TECHNOLOGLES
 
Glimpse of carrier ethernet
Glimpse of carrier ethernetGlimpse of carrier ethernet
Glimpse of carrier ethernet
 
ccna summer training ppt ( Cisco certified network analysis) ppt. by Traun k...
ccna summer training ppt ( Cisco certified network analysis) ppt.  by Traun k...ccna summer training ppt ( Cisco certified network analysis) ppt.  by Traun k...
ccna summer training ppt ( Cisco certified network analysis) ppt. by Traun k...
 
CCNA IP Addressing
CCNA IP AddressingCCNA IP Addressing
CCNA IP Addressing
 
Network Engineer Interview Questions with Answers
Network Engineer Interview Questions with Answers Network Engineer Interview Questions with Answers
Network Engineer Interview Questions with Answers
 
Ethernet technology
Ethernet technologyEthernet technology
Ethernet technology
 
class30.ppt
class30.pptclass30.ppt
class30.ppt
 
Wireless lecture1
Wireless lecture1Wireless lecture1
Wireless lecture1
 
class28.ppt
class28.pptclass28.ppt
class28.ppt
 
The ethernet frame a walkthrough
The ethernet frame a walkthroughThe ethernet frame a walkthrough
The ethernet frame a walkthrough
 
C C N A Day1
C C N A  Day1C C N A  Day1
C C N A Day1
 
Ethernet
EthernetEthernet
Ethernet
 
IP Addressing and Subnetting
IP Addressing and SubnettingIP Addressing and Subnetting
IP Addressing and Subnetting
 
Fragmentation
FragmentationFragmentation
Fragmentation
 
CCNA PPT
CCNA PPTCCNA PPT
CCNA PPT
 
A427 nic card
A427 nic cardA427 nic card
A427 nic card
 
Ccna day 1
Ccna day 1Ccna day 1
Ccna day 1
 
Ccna notes
Ccna notesCcna notes
Ccna notes
 

Similaire à Aspects Stratégiques des Réseaux

Aspects Strategiques Des Réseaux 2008 2009
Aspects Strategiques Des Réseaux 2008 2009Aspects Strategiques Des Réseaux 2008 2009
Aspects Strategiques Des Réseaux 2008 2009
Eric Vyncke
 
Networks (Distributed computing)
Networks (Distributed computing)Networks (Distributed computing)
Networks (Distributed computing)
Sri Prasanna
 
Fundamentals of Networking
Fundamentals of NetworkingFundamentals of Networking
Fundamentals of Networking
Israel Marcus
 

Similaire à Aspects Stratégiques des Réseaux (20)

Introduction to networking
Introduction to networkingIntroduction to networking
Introduction to networking
 
Chapter_3_Networking.ppt
Chapter_3_Networking.pptChapter_3_Networking.ppt
Chapter_3_Networking.ppt
 
Chapter_3_Networking.ppt
Chapter_3_Networking.pptChapter_3_Networking.ppt
Chapter_3_Networking.ppt
 
Ccna pres
Ccna presCcna pres
Ccna pres
 
Mcse notes
Mcse notesMcse notes
Mcse notes
 
CCNA ppt Day 1
CCNA ppt Day 1CCNA ppt Day 1
CCNA ppt Day 1
 
LAN
LANLAN
LAN
 
Networks A2
Networks  A2Networks  A2
Networks A2
 
Aspects Strategiques Des Réseaux 2008 2009
Aspects Strategiques Des Réseaux 2008 2009Aspects Strategiques Des Réseaux 2008 2009
Aspects Strategiques Des Réseaux 2008 2009
 
Summary networking
Summary networkingSummary networking
Summary networking
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Networks (Distributed computing)
Networks (Distributed computing)Networks (Distributed computing)
Networks (Distributed computing)
 
Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) ppt
 
networking devices -161021181705452555
networking   devices -161021181705452555networking   devices -161021181705452555
networking devices -161021181705452555
 
Basic networking in power point by suprabha
Basic networking in power point by suprabhaBasic networking in power point by suprabha
Basic networking in power point by suprabha
 
16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)
 
The Basics of Industrial Ethernet Communications
The Basics of Industrial Ethernet CommunicationsThe Basics of Industrial Ethernet Communications
The Basics of Industrial Ethernet Communications
 
Networking basics
Networking basicsNetworking basics
Networking basics
 
Local Area Network – Wired LAN
Local Area Network – Wired LANLocal Area Network – Wired LAN
Local Area Network – Wired LAN
 
Fundamentals of Networking
Fundamentals of NetworkingFundamentals of Networking
Fundamentals of Networking
 

Dernier

Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
amitlee9823
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
dlhescort
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
lizamodels9
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
daisycvs
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
lizamodels9
 

Dernier (20)

VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLBAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperity
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)-  A new venture conceptBusiness Model Canvas (BMC)-  A new venture concept
Business Model Canvas (BMC)- A new venture concept
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
Falcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in indiaFalcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in india
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
 

Aspects Stratégiques des Réseaux

  • 1. Veille technologique en TIC Aspects stratégiques des réseaux Eric Vyncke [email_address] Dernière mise à jour: 7 novembre 2007
  • 2.
  • 3.
  • 5.
  • 6. The Acronyms Soup Or a small touch of technology
  • 7.
  • 8.
  • 9. Modèle d’une couche couche n couche n couche n +1 couche n-1 protocole de couche n services de la couche n services de la couche n-1
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33. IP Routing at Home Access Point ADSL Router Your ISP Internet = All other ISP 192.168.100.2 Default route => 192.168.100.1 I’m 192.168.100.1 & 192.168.1.2 Route to 192.168.100.0/24 via WiFi Default route to 192.168.1.1 I’m 192.168.1.1 and 80.123.34.89 Route to 192.168.100.0/24 via 192.168.1.2 Default route via ADSL Network Printer I’m 192.168.1.3 Route to 192.168.100.0/24 via 192.168.1.2 Default route to 192.168.1.1
  • 34.
  • 35.
  • 36. Wide Area Network Layer 3 Service or In House Network? SP Layer 3 Services
  • 37.
  • 38.
  • 39.
  • 40. Delay Variation—“Jitter” t t Sender Transmits B Receives C B A C B A d1 d2 D1 = d1 D2 = d2 Jitter
  • 41.
  • 42. QoS in Action Campus Backbone Multimedia Training Servers Order Entry, Finance, Manufacturing Finance Manager Remote Campus Classification Classification Enforcement
  • 43.
  • 45. The Security Dilemma Security Risks Internet Business Value Explosion in E-Business!! Internet Access Corporate Intranet Internet Presence Customer Care E-Learning Supply Chain Management E-Commerce Workforce Optimization
  • 46. 100% Security The only system which is truly secure is one which is switched off and unplugged, locked in a titanium lined safe, buried in a concrete bunker, and is surrounded by nerve gas and very highly paid armed guards. Even then, I wouldn’t stake my life on it…. Gene Spafford—Director, Computer Operations, Audit, and Security Technology (COAST), Purdue University “ ”
  • 47. Threat Capabilities: More Dangerous & Easier To Use Sophistication of Hacker Tools Packet Forging/ Spoofing 1990 1980 Password Guessing Self Replicating Code Password Cracking Exploiting Known Vulnerabilities Disabling Audits Back Doors Sweepers Sniffers Stealth Diagnostics High Low 2000 DDOS Internet Worms Source: Carnegie Mellon University, 2002 Technical Knowledge Required
  • 48.
  • 49.
  • 50. Insiders… Over 75% of hacking is done by insiders and it’s easy to see why. The person on the inside is on the right side of the firewall—they know the computer systems and they have access to the passwords Neil Barrett, Bull Information Systems, ‘ Computer Crime Fighter’—Personal Computer World, Feb 1999 “ ”
  • 51.
  • 52. Attack against Confidentiality telnet foo.bar.org username: dan password: m-y-p-a-s-s-w-o-r-d d-a-n
  • 53. Attack on Integrity Bank Customer Deposit $1000 in Bob’s Account Deposit $900 in Mallet’s Account and $100 in Bob’s Account
  • 54. Attacks of Integrity: Web Defacing
  • 55.
  • 56.
  • 57.
  • 58.
  • 59.
  • 60.
  • 61.
  • 62.
  • 63.
  • 64.
  • 65.
  • 66.
  • 67.
  • 68.
  • 69. Technical Controls Security Perimeter Trusted Zone Untrusted Zone firewall
  • 70. Technical Controls Usual Firewall Locations Internet intranet Partner X Partner Y HR Network Source: Cisco Systems
  • 71.
  • 73.
  • 74.
  • 75.
  • 76. What Is a CODEC? Analog to Digital Conversion Analog Audio Source = 0101 G.711 Pulse Code Modulation (PCM) is the DS0 Everything Is Bits Sample Compand Quantize Encode Frame 4000 Hz Analog Signal = Sample 8,000/sec Nyquist Frequency Quantize 256 Steps Using 8 Bits DS0 64 Kbps
  • 77.
  • 78.
  • 79.
  • 80.
  • 81.
  • 83.
  • 84.
  • 85. GSM Architecture OMC Home Location Register AuC Equipment ID Network Management Center BTS BTS BTS ME ME ME Subscriber Identity Module Subscriber Identity Module Subscriber Identity Module BSC PSTN Mobile switching center Data communication network BTS = Base Transceiver Station BSC = Base Station Controller AuC = Authentication Center OMC = Operation and Maintenance Center PSTN = Public Switched Telephone Network ME = Mobile Equipment Source: Stallings, 313 Source: Mehrotra, 27 Visitor Location Register BTS
  • 86.
  • 87.
  • 88.
  • 89. WiFi GSM UMTS WiMAX 120 Mbps 2 – 14 Mbps 9.6 kbps -> 384 kbps 11 Mbps -> 54 Mbps Bandwidth Licensed Licensed Licensed Unlicensed Spectrum 30 km WiMAX Mostly worldwide UMTS Worldwide (except Japan) GSM 100 m WiFi Range
  • 90. Mobile Systems 802.11n 4G 3G HSDPA Zigbee 802.15.4 BT UWB NFC RFID Proximity Personal Local Wide Data Rate (bps) 1G 1M 10K 10M 100M 2G 3G 802.16 802.16e 802.11g 802.11b 802.11a
  • 91.
  • 92.
  • 93. How to Deploy a Network? Or the right questions to be asked?
  • 94.
  • 95.
  • 96.
  • 97.
  • 98.
  • 99.
  • 100.
  • 101.
  • 102.