Proposal of Networking Saudi Telecom Company

Download Report

Transcript Proposal of Networking Saudi Telecom Company

PROPOSAL OF NETWORKING
SAUDI TELECOM COMPANY
Done by:
Maytha AlMasoud
Sajedah AlMarzouq
OUTLINE
Introduction
 Problem statement
 Network transmission media
 Types of networks based on physical scope
 Network Classification
 Security Issue
 Basic hardware components

INTRODUCTION
 History
of Saudi Telecom Company (STC)
*Saudi Telecom Company was founded in 1998. STC
is a Saudi company that provides services for
landline, mobile, and the Internet.
*STC is the leading national provider of
telecommunication services in the Kingdom of Saudi
Arabia. The company is working continuously to
fulfill and satisfy the market requirements, keeping
pace with the emerging technologies in the
telecommunications sector and satisfying its
customer's needs.

Public networking
STC considered public network because it is a
company that offers service is known as a
service provider. Public refers to the general
availability of service, not to the data being
transferred.
PROBLEM STATEMENT
Interruption of service
 Network Coverage
 Network error connection
 Speeds

NETWORK TRANSMISSION MEDIA

1.
2.
Connection methods:
Optical fiber: An optical fiber is used for
communication in a single direction. STC uses
the optical fiber when transmitting telephone.
Wired: waves are guided along a solid
medium such as a transmission line. STC
offered wired services like the telephone
services.
3. Wireless: transmission and reception are
achieved by means of an antenna. STC offered
wireless services like broadband services and
internet.
4. Point-to-point laser: STC uses the point-to-point
laser in order to make sure if the data are sent
or received.
WIRED TECHNOLOGIES

Twisted pair: is the ordinary copper wire that
connects home and many business computers to
the telephone company.
 Coaxial cable: has a wire conductor in the centre,
a circumferential outer conductor, and an
insulating medium called the dielectric,
separating these two conductors.
 Optical
fiber: Telephone transmission method
uses fibre-optic cables. Optical fibres transmit
energy in the form of light pulses.
WIRELESS TECHNOLOGIES
 Terrestrial:
Communication uses equipment
such as radio or microwave transmitters that is
relatively close to the earth's surface. STC has a
lot of man made towers for telecommunication
services.
 Satellites: communications satellites provide a
microwave radio relay technology
complementary to that of communication
cables. STC use it for mobile applications such
as communications to ships.
 Wireless
LANs: STC serves many wireless LANs
services or Wi-Fi devices that are used for many
needs such as connecting laptop users who
travel from location to location, and mobile
networks that connect via satellite.
TYPES OF NETWORKS BASED ON
PHYSICAL SCOPE

Local area network
(VPLS) services
 Service Benefits
1. High Availability
VPLS through VPN provides “Any-to-Any”
connectivity over Ethernet.
2. High Flexibility
VPLS allows business to use any routing protocol.
3. High Efficiency
multicast applicatoin VPLS enables business
communications to be transported via non-IP
protocols..
PERSONAL AREA NETWORK
printers.
 fax machines
 scanners.

A wired PAN .~
is usually constructed with USB and Firewire
connections
 A wireless PAN.~
1. such as Bluetooth .
2.infrared communication.

HOME AREA NETWORK
DSL Sky Internet:~
Sky Internet Protocol
(IP) allows you to
leverage the coverage of
satellite to expand the
IP-VPN coverage, which
enables you to have IPVPN at all locations,
regardless of distance.
 Service Benefits
High Availability
High Scalability
Easy and Fast Setup

WIDE AREA NETWORK

Aamal Net Benefits:~
*High Flexibility
*Managed Services
*High Speed
Connectivity
Aamal Net Consists
Of:
*Internet access via DSL
*Firewall
*(IPS)
*(VPN)

CAMPUS NETWORK
STC link a variety of campus buildings including. for example,
head offices or any departments.
 Enterprise private network
STC ~built network
 Metropolitan area network
STC building used (MAN) to keep and control their information's.

VIRTUAL PRIVATE NETWORK

Quick NetConnected Drive:~
*STC provide the first
car in the Region
equipped with Quick
Net” service installed
on a BMW
*develop tomorrow’s
technology for today
cars.
Global area network
Internet Transit Service
(W3 Highway)
 Internet
International Internet
Connectivity
FREE Wi-Fi with STC
Broadband Invision
 Overlay
networkIntranets

and extranets
MPLS IP-VPN Service
(Future Today)
NETWORK CLASSIFICATION

1.
Network architecture:
Network architecture is the design of a communication networks.
Active networking: It consists of active hardware, capable of
routing or switching as well as executing code within active
packets.
2. Client-server: A network architecture in which each computer or
process on the network is either a client or a server.
3. Peer-to-peer: computers are dedicated to serving the others.STC
uses this kind of networking in sharing files without the need
central server.

NETWORK TOPOLOGY:


A topology refers to the manner in which the cable is
run to individual workstations on the network.
The STC long distance and junction networks are
primarily ring topology.
SECURITY ISSUE:
 Firewalls
It is a software-based that is used to help keep a
network secure. Its primary objective is to control
the incoming and outgoing network traffic by
analyzing the data packets and determining
whether it should be allowed through or not.
 Security technology
STC’s security is based on its firewalls. It uses the
firewalls technology to protect the users’ accounts,
so that only employees can access these accounts. In
addition, it uses the authentication technology in
order to protect the accounts from unauthorized
people.
 Encryption
Encryption is the conversion of data into a
form, called a cipher text, which cannot be
easily understood by unauthorized people.
 Authentication
In private and public networks authentication is
commonly done through the use of login passwords or
passphrases; knowledge of such is assumed to
guarantee that the user is authentic.
BASIC HARDWARE COMPONENTS


Network interface cards
Ethernet
STC provide VPLS.

Fiber Optics
FTTH service

Wireless Dongles
QUICK net‘s

Bridges:
Direct dialing allows companies to bridge the gap between customers and
their
” DID/DOD”
REFERENCES





(n.d.). Retrieved May 8, 2012, from computerhope:
http://www.computerhope.com/jargon/n/nic.htm
David D. Clark, "M.I.T. Campus Network
Implementation", CCNG-2, Campus Computer
Network Group, M.I.T., Cambridge, 1982; pp. 26.
Robert J. Kohlhepp (2000-10-02). "The 10 Most
Important Products of the Decade". Network
Computing. Retrieved 2008-02-25.
Rouse, M. (2006, July). Retrieved May 10, 2012, from
techtarget:
http://searchsecurity.techtarget.com/definition/encryp
tion
Vemuri, L. R. (2007, May). Retrieved May 8, 2012,
from theiia.org:
http://www.theiia.org/intAuditor/itaudit/archives/2007
/may/what-is-authentication/
THANK YOU FOR YOUR LISTENING

Do you have any questions???