SlideShare a Scribd company logo
1 of 14
BEL 2 Spezial, Unterschleißheim, Germany
03.07.2014
Stephan Neidlinger
Security in Optical Networks –
Useless or Necessary?
© 2014 ADVA Optical Networking. All rights reserved. Confidential.22
Broadband Access Network Market Trends
• Service data rates keep on increasing
• NG video: 3D, UHDTV, on-line streaming services, …
• Several markets need to be addressed in order to decrease return of
investment time in FTTH infrastructure projects (according to the
FTTH business guide published by FTTH Council Europe)
• Residential
• Business
• Carrier
• Public sector
• These applications call for
• Equal down/upstream bandwidth (e g business, carrier services)
• Scalable architecture (e g user individual bandwidth upgrade)
• Simple systems for low cost potential (especially for residential market)
• Secure architecture (e g business services)
© 2014 ADVA Optical Networking. All rights reserved. Confidential.33
FTTH Business Guide
© 2014 ADVA Optical Networking. All rights reserved. Confidential.44
FTTH Business Guide
© 2014 ADVA Optical Networking. All rights reserved. Confidential.55
Example:
Data Center Environment & Security
APPS APPS
© 2014 ADVA Optical Networking. All rights reserved. Confidential.66
Data Center Environment & Security
Physical Access to the Data Center
APPS APPS
© 2014 ADVA Optical Networking. All rights reserved. Confidential.77
Data Center Environment & Security
Hardware Security
APPS APPS
© 2014 ADVA Optical Networking. All rights reserved. Confidential.88
Data Center Environment & Security
Software Security
APPS APPS
© 2014 ADVA Optical Networking. All rights reserved. Confidential.99
Data Center Environment & Security
…and what about the Fiber Connection?
APPS APPS
© 2014 ADVA Optical Networking. All rights reserved. Confidential.1010
Fiber Optic Networks
Tapping Possibilities
Y-Bridge for
service activities
Fiber Coupling device
Street cabinet
How
to get access?
Where
to get access?
Splice boxes / cassettes
(Outdoor / Inhouse)
There are multiple ways to access fiber
© 2014 ADVA Optical Networking. All rights reserved. Confidential.1111
Fiber Optic Networks
Optical Tapping Method
Cladding: 125 µm
Core: 9 µm
Lost Light
“For both public and private networks,
optical taps and analytic devices are
required and inexpensive maintenance
equipment in common use worldwide
today. Various types of optical taps
[…] are also used for corporate
espionage…”
„Clearly, physical protection of optical
transmission media and junction boxes
is essential; in addition, data
encryption plays a role in protecting
sensitive data.” [5]
[5] Security Strategies Alert, M.E. Kabay, March 2003
© 2014 ADVA Optical Networking. All rights reserved. Confidential.1212
Fiber Optical Networks Security Options
Encryption
Security-Hardened Software
Physical Layer Monitoring
Power Tracking
Intrusion Detection
Optical Time-Domain Reflectometer (OTDR)
RADIUS
Secure Shell
SNMPv3
AES-256
Authentication
Diffie-Hellman
Optical Networks Security Tools are necessary and available
122842636
© 2014 ADVA Optical Networking. All rights reserved. Confidential.1313
WAN
Ipsec /
MacSec
Encryption
WDM-transport WDM-transport
Site BSite A
WAN
Appliance
based
Encryption
WDM-transport
Site B
WDM-transport
Site A
Optical Transmission Security
Speed of Encryption
WAN
Router Site A Site B
xWDM based
Encryption
Speed,throughputandsimplicity
TDM TDM
FC Switch
Router
FC Switch
Router
FC Switch
Router
FC Switch
Router
FC Switch
Router
FC Switch
sneidlinger@advaoptical.com
Thank You
IMPORTANT NOTICE
The content of this presentation is strictly confidential. ADVA Optical Networking is the exclusive owner or licensee of the content, material, and information in this
presentation. Any reproduction, publication or reprint, in whole or in part, is strictly prohibited.
The information in this presentation may not be accurate, complete or up to date, and is provided without warranties or representations of any kind, either express or
implied. ADVA Optical Networking shall not be responsible for and disclaims any liability for any loss or damages, including without limitation, direct, indirect, incidental,
consequential and special damages,
alleged to have been caused by or in connection with using and/or relying on the information contained in this presentation.
Copyright © for the entire content of this presentation: ADVA Optical Networking.

More Related Content

What's hot

Application Note: Mobile Backhaul Evolution
Application Note: Mobile Backhaul EvolutionApplication Note: Mobile Backhaul Evolution
Application Note: Mobile Backhaul EvolutionADVA
 
What is a Network Hypervisor?
What is a Network Hypervisor?What is a Network Hypervisor?
What is a Network Hypervisor?ADVA
 
Phase Delivery Over PTP Unaware Networks
Phase Delivery Over PTP Unaware NetworksPhase Delivery Over PTP Unaware Networks
Phase Delivery Over PTP Unaware NetworksDaniel Sproats
 
AnyCell Connectivity - A New Era for Mobile Networks
AnyCell Connectivity - A New Era for Mobile NetworksAnyCell Connectivity - A New Era for Mobile Networks
AnyCell Connectivity - A New Era for Mobile NetworksADVA
 
ADVA Optical Networking Introduces New Data Center Interconnect Functionality
ADVA Optical Networking Introduces New Data Center Interconnect FunctionalityADVA Optical Networking Introduces New Data Center Interconnect Functionality
ADVA Optical Networking Introduces New Data Center Interconnect FunctionalityADVA
 
First Field Demonstration of Cloud Datacenter Workflow Automation Employing D...
First Field Demonstration of Cloud Datacenter Workflow Automation Employing D...First Field Demonstration of Cloud Datacenter Workflow Automation Employing D...
First Field Demonstration of Cloud Datacenter Workflow Automation Employing D...ADVA
 
Network Virtualization
Network VirtualizationNetwork Virtualization
Network VirtualizationADVA
 
Introducing the Future of Data Center Interconnect Networks
Introducing the Future of Data Center Interconnect NetworksIntroducing the Future of Data Center Interconnect Networks
Introducing the Future of Data Center Interconnect NetworksADVA
 
Tunable DWDM PON at WDM PON Forum Workshop
Tunable DWDM PON at WDM PON Forum WorkshopTunable DWDM PON at WDM PON Forum Workshop
Tunable DWDM PON at WDM PON Forum WorkshopADVA
 
Flexible and Secure Connectivity for Cloud Data Centers
Flexible and Secure Connectivity for Cloud Data CentersFlexible and Secure Connectivity for Cloud Data Centers
Flexible and Secure Connectivity for Cloud Data CentersADVA
 
Sharing is caring: Real-life shared infrastructure experience
Sharing is caring: Real-life shared infrastructure experienceSharing is caring: Real-life shared infrastructure experience
Sharing is caring: Real-life shared infrastructure experienceADVA
 
Introducing the ADVA FSP 150 ProVM – Assured Virtual Network Functions at the...
Introducing the ADVA FSP 150 ProVM – Assured Virtual Network Functions at the...Introducing the ADVA FSP 150 ProVM – Assured Virtual Network Functions at the...
Introducing the ADVA FSP 150 ProVM – Assured Virtual Network Functions at the...ADVA
 
Secure, High Performance Transport Networks Based on WDM Technology
Secure, High Performance Transport Networks Based on WDM TechnologySecure, High Performance Transport Networks Based on WDM Technology
Secure, High Performance Transport Networks Based on WDM TechnologyADVA
 
SAN and FICON Long Distance Connectivity
SAN and FICON Long Distance ConnectivitySAN and FICON Long Distance Connectivity
SAN and FICON Long Distance ConnectivityADVA
 
The New NFV Powerhouse
The New NFV Powerhouse The New NFV Powerhouse
The New NFV Powerhouse ADVA
 
High Performance Optically Pumped Cesium Beam Clock
High Performance Optically Pumped Cesium Beam ClockHigh Performance Optically Pumped Cesium Beam Clock
High Performance Optically Pumped Cesium Beam ClockADVA
 
WDM PON Forum Workshop
WDM PON Forum WorkshopWDM PON Forum Workshop
WDM PON Forum WorkshopADVA
 
Introducing Ethernet Services Suite
Introducing Ethernet Services SuiteIntroducing Ethernet Services Suite
Introducing Ethernet Services SuiteADVA
 
Connecting End Customer Devices Without Limits
Connecting End Customer Devices Without LimitsConnecting End Customer Devices Without Limits
Connecting End Customer Devices Without LimitsADVA
 
The Impact of Advanced Optical Technologies on Transport SDN
The Impact of Advanced Optical Technologies on Transport SDNThe Impact of Advanced Optical Technologies on Transport SDN
The Impact of Advanced Optical Technologies on Transport SDNADVA
 

What's hot (20)

Application Note: Mobile Backhaul Evolution
Application Note: Mobile Backhaul EvolutionApplication Note: Mobile Backhaul Evolution
Application Note: Mobile Backhaul Evolution
 
What is a Network Hypervisor?
What is a Network Hypervisor?What is a Network Hypervisor?
What is a Network Hypervisor?
 
Phase Delivery Over PTP Unaware Networks
Phase Delivery Over PTP Unaware NetworksPhase Delivery Over PTP Unaware Networks
Phase Delivery Over PTP Unaware Networks
 
AnyCell Connectivity - A New Era for Mobile Networks
AnyCell Connectivity - A New Era for Mobile NetworksAnyCell Connectivity - A New Era for Mobile Networks
AnyCell Connectivity - A New Era for Mobile Networks
 
ADVA Optical Networking Introduces New Data Center Interconnect Functionality
ADVA Optical Networking Introduces New Data Center Interconnect FunctionalityADVA Optical Networking Introduces New Data Center Interconnect Functionality
ADVA Optical Networking Introduces New Data Center Interconnect Functionality
 
First Field Demonstration of Cloud Datacenter Workflow Automation Employing D...
First Field Demonstration of Cloud Datacenter Workflow Automation Employing D...First Field Demonstration of Cloud Datacenter Workflow Automation Employing D...
First Field Demonstration of Cloud Datacenter Workflow Automation Employing D...
 
Network Virtualization
Network VirtualizationNetwork Virtualization
Network Virtualization
 
Introducing the Future of Data Center Interconnect Networks
Introducing the Future of Data Center Interconnect NetworksIntroducing the Future of Data Center Interconnect Networks
Introducing the Future of Data Center Interconnect Networks
 
Tunable DWDM PON at WDM PON Forum Workshop
Tunable DWDM PON at WDM PON Forum WorkshopTunable DWDM PON at WDM PON Forum Workshop
Tunable DWDM PON at WDM PON Forum Workshop
 
Flexible and Secure Connectivity for Cloud Data Centers
Flexible and Secure Connectivity for Cloud Data CentersFlexible and Secure Connectivity for Cloud Data Centers
Flexible and Secure Connectivity for Cloud Data Centers
 
Sharing is caring: Real-life shared infrastructure experience
Sharing is caring: Real-life shared infrastructure experienceSharing is caring: Real-life shared infrastructure experience
Sharing is caring: Real-life shared infrastructure experience
 
Introducing the ADVA FSP 150 ProVM – Assured Virtual Network Functions at the...
Introducing the ADVA FSP 150 ProVM – Assured Virtual Network Functions at the...Introducing the ADVA FSP 150 ProVM – Assured Virtual Network Functions at the...
Introducing the ADVA FSP 150 ProVM – Assured Virtual Network Functions at the...
 
Secure, High Performance Transport Networks Based on WDM Technology
Secure, High Performance Transport Networks Based on WDM TechnologySecure, High Performance Transport Networks Based on WDM Technology
Secure, High Performance Transport Networks Based on WDM Technology
 
SAN and FICON Long Distance Connectivity
SAN and FICON Long Distance ConnectivitySAN and FICON Long Distance Connectivity
SAN and FICON Long Distance Connectivity
 
The New NFV Powerhouse
The New NFV Powerhouse The New NFV Powerhouse
The New NFV Powerhouse
 
High Performance Optically Pumped Cesium Beam Clock
High Performance Optically Pumped Cesium Beam ClockHigh Performance Optically Pumped Cesium Beam Clock
High Performance Optically Pumped Cesium Beam Clock
 
WDM PON Forum Workshop
WDM PON Forum WorkshopWDM PON Forum Workshop
WDM PON Forum Workshop
 
Introducing Ethernet Services Suite
Introducing Ethernet Services SuiteIntroducing Ethernet Services Suite
Introducing Ethernet Services Suite
 
Connecting End Customer Devices Without Limits
Connecting End Customer Devices Without LimitsConnecting End Customer Devices Without Limits
Connecting End Customer Devices Without Limits
 
The Impact of Advanced Optical Technologies on Transport SDN
The Impact of Advanced Optical Technologies on Transport SDNThe Impact of Advanced Optical Technologies on Transport SDN
The Impact of Advanced Optical Technologies on Transport SDN
 

Viewers also liked

Why optical networks ?
Why optical networks ?Why optical networks ?
Why optical networks ?Gagan Randhawa
 
Nanorobot using in medical field
Nanorobot using in medical fieldNanorobot using in medical field
Nanorobot using in medical fieldAPEC
 
Bbm Guvenlik Semineri
Bbm Guvenlik SemineriBbm Guvenlik Semineri
Bbm Guvenlik Seminerieroglu
 
Bluetooth Guvenligi Sunum
Bluetooth Guvenligi SunumBluetooth Guvenligi Sunum
Bluetooth Guvenligi Sunumeroglu
 
Optik Aglarin Guvenligi
Optik Aglarin GuvenligiOptik Aglarin Guvenligi
Optik Aglarin Guvenligieroglu
 
Senetas fibre optic connections are secure - right
Senetas   fibre optic connections are secure - rightSenetas   fibre optic connections are secure - right
Senetas fibre optic connections are secure - rightresponsedatacomms
 
Network Security Chapter 7
Network Security Chapter 7Network Security Chapter 7
Network Security Chapter 7AfiqEfendy Zaen
 

Viewers also liked (10)

Why optical networks ?
Why optical networks ?Why optical networks ?
Why optical networks ?
 
Nanorobot using in medical field
Nanorobot using in medical fieldNanorobot using in medical field
Nanorobot using in medical field
 
Bbm Guvenlik Semineri
Bbm Guvenlik SemineriBbm Guvenlik Semineri
Bbm Guvenlik Semineri
 
PACE-IT: Troubleshooting Fiber Cable Networks
PACE-IT: Troubleshooting Fiber Cable NetworksPACE-IT: Troubleshooting Fiber Cable Networks
PACE-IT: Troubleshooting Fiber Cable Networks
 
Bluetooth Guvenligi Sunum
Bluetooth Guvenligi SunumBluetooth Guvenligi Sunum
Bluetooth Guvenligi Sunum
 
Optik Aglarin Guvenligi
Optik Aglarin GuvenligiOptik Aglarin Guvenligi
Optik Aglarin Guvenligi
 
Fiber Teori
Fiber TeoriFiber Teori
Fiber Teori
 
Senetas fibre optic connections are secure - right
Senetas   fibre optic connections are secure - rightSenetas   fibre optic connections are secure - right
Senetas fibre optic connections are secure - right
 
Network Security Chapter 7
Network Security Chapter 7Network Security Chapter 7
Network Security Chapter 7
 
Secure communication over fiber optic networks
Secure communication over fiber optic networksSecure communication over fiber optic networks
Secure communication over fiber optic networks
 

Similar to Security in Optical Networks - Useless or Necessary?

Scalable, Secure, Programmable – Cloud Connectivity for the Future
Scalable, Secure, Programmable – Cloud Connectivity for the FutureScalable, Secure, Programmable – Cloud Connectivity for the Future
Scalable, Secure, Programmable – Cloud Connectivity for the FutureADVA
 
Secure WDM Connectivity for High-Bandwidth Applications
Secure WDM Connectivity for High-Bandwidth ApplicationsSecure WDM Connectivity for High-Bandwidth Applications
Secure WDM Connectivity for High-Bandwidth ApplicationsADVA
 
Dynamic Software Defined Network Infrastructure Test Bed at Marist College
Dynamic Software Defined Network Infrastructure Test Bed at Marist CollegeDynamic Software Defined Network Infrastructure Test Bed at Marist College
Dynamic Software Defined Network Infrastructure Test Bed at Marist CollegeADVA
 
Next Generation Optical Networking: Software-Defined Optical Networking
Next Generation Optical Networking: Software-Defined Optical NetworkingNext Generation Optical Networking: Software-Defined Optical Networking
Next Generation Optical Networking: Software-Defined Optical NetworkingADVA
 
Layer 1 Encryption in WDM Transport Systems
Layer 1 Encryption in WDM Transport SystemsLayer 1 Encryption in WDM Transport Systems
Layer 1 Encryption in WDM Transport SystemsADVA
 
Polymorphic Attacks on Data-in-Motion Require a New Security Approach From Bo...
Polymorphic Attacks on Data-in-Motion Require a New Security Approach From Bo...Polymorphic Attacks on Data-in-Motion Require a New Security Approach From Bo...
Polymorphic Attacks on Data-in-Motion Require a New Security Approach From Bo...ADVA
 
Cisco-Security & Survelliance Ürünleri
Cisco-Security & Survelliance ÜrünleriCisco-Security & Survelliance Ürünleri
Cisco-Security & Survelliance Ürünlericem lale
 
Security and services drive data north
Security and services drive data northSecurity and services drive data north
Security and services drive data northADVA
 
Proxim 4G Public safety wireless solutions 2013
Proxim 4G Public safety wireless solutions 2013Proxim 4G Public safety wireless solutions 2013
Proxim 4G Public safety wireless solutions 2013Raja Gopal
 
THE US’s NATIONWIDE PUBLIC SAFETY LTE NETWORK THE GLOBAL ADOPTION OF LTE FOR ...
THE US’s NATIONWIDE PUBLIC SAFETY LTE NETWORK THE GLOBAL ADOPTION OF LTE FOR ...THE US’s NATIONWIDE PUBLIC SAFETY LTE NETWORK THE GLOBAL ADOPTION OF LTE FOR ...
THE US’s NATIONWIDE PUBLIC SAFETY LTE NETWORK THE GLOBAL ADOPTION OF LTE FOR ...JunSeok Seo
 
Transformation From Today To Tomorrow - Market and Product Strategy 2018
Transformation From Today To Tomorrow - Market and Product Strategy 2018Transformation From Today To Tomorrow - Market and Product Strategy 2018
Transformation From Today To Tomorrow - Market and Product Strategy 2018Jiunn-Jer Sun
 
Presentation - 5G Private & Dedicated Networks.pdf
Presentation - 5G Private & Dedicated Networks.pdfPresentation - 5G Private & Dedicated Networks.pdf
Presentation - 5G Private & Dedicated Networks.pdfAjay Gangakhedkar
 
Control on Remote Sensing Network using Cloud Computing Services
Control on Remote Sensing Network using Cloud Computing ServicesControl on Remote Sensing Network using Cloud Computing Services
Control on Remote Sensing Network using Cloud Computing ServicesIRJET Journal
 
Druid - Latest Case Studies & Use Cases_08.07.20
Druid - Latest Case Studies & Use Cases_08.07.20Druid - Latest Case Studies & Use Cases_08.07.20
Druid - Latest Case Studies & Use Cases_08.07.20Druid Software
 
Accelerating 5G enterprise networks with edge computing and latency assurance
Accelerating 5G enterprise networks with edge computing and latency assuranceAccelerating 5G enterprise networks with edge computing and latency assurance
Accelerating 5G enterprise networks with edge computing and latency assuranceADVA
 
Secure Connectivity on Every Network Layer
Secure Connectivity on Every Network LayerSecure Connectivity on Every Network Layer
Secure Connectivity on Every Network LayerADVA
 
5G: A 2020 Vision
5G: A 2020 Vision5G: A 2020 Vision
5G: A 2020 VisioneXplanoTech
 

Similar to Security in Optical Networks - Useless or Necessary? (20)

Scalable, Secure, Programmable – Cloud Connectivity for the Future
Scalable, Secure, Programmable – Cloud Connectivity for the FutureScalable, Secure, Programmable – Cloud Connectivity for the Future
Scalable, Secure, Programmable – Cloud Connectivity for the Future
 
CDE Marketplace: SQR Systems
CDE Marketplace: SQR SystemsCDE Marketplace: SQR Systems
CDE Marketplace: SQR Systems
 
Secure WDM Connectivity for High-Bandwidth Applications
Secure WDM Connectivity for High-Bandwidth ApplicationsSecure WDM Connectivity for High-Bandwidth Applications
Secure WDM Connectivity for High-Bandwidth Applications
 
Dynamic Software Defined Network Infrastructure Test Bed at Marist College
Dynamic Software Defined Network Infrastructure Test Bed at Marist CollegeDynamic Software Defined Network Infrastructure Test Bed at Marist College
Dynamic Software Defined Network Infrastructure Test Bed at Marist College
 
Next Generation Optical Networking: Software-Defined Optical Networking
Next Generation Optical Networking: Software-Defined Optical NetworkingNext Generation Optical Networking: Software-Defined Optical Networking
Next Generation Optical Networking: Software-Defined Optical Networking
 
Layer 1 Encryption in WDM Transport Systems
Layer 1 Encryption in WDM Transport SystemsLayer 1 Encryption in WDM Transport Systems
Layer 1 Encryption in WDM Transport Systems
 
Polymorphic Attacks on Data-in-Motion Require a New Security Approach From Bo...
Polymorphic Attacks on Data-in-Motion Require a New Security Approach From Bo...Polymorphic Attacks on Data-in-Motion Require a New Security Approach From Bo...
Polymorphic Attacks on Data-in-Motion Require a New Security Approach From Bo...
 
ICISS Newsletter Feb 14
ICISS Newsletter Feb 14ICISS Newsletter Feb 14
ICISS Newsletter Feb 14
 
Cisco-Security & Survelliance Ürünleri
Cisco-Security & Survelliance ÜrünleriCisco-Security & Survelliance Ürünleri
Cisco-Security & Survelliance Ürünleri
 
Security and services drive data north
Security and services drive data northSecurity and services drive data north
Security and services drive data north
 
Proxim 4G Public safety wireless solutions 2013
Proxim 4G Public safety wireless solutions 2013Proxim 4G Public safety wireless solutions 2013
Proxim 4G Public safety wireless solutions 2013
 
THE US’s NATIONWIDE PUBLIC SAFETY LTE NETWORK THE GLOBAL ADOPTION OF LTE FOR ...
THE US’s NATIONWIDE PUBLIC SAFETY LTE NETWORK THE GLOBAL ADOPTION OF LTE FOR ...THE US’s NATIONWIDE PUBLIC SAFETY LTE NETWORK THE GLOBAL ADOPTION OF LTE FOR ...
THE US’s NATIONWIDE PUBLIC SAFETY LTE NETWORK THE GLOBAL ADOPTION OF LTE FOR ...
 
Transformation From Today To Tomorrow - Market and Product Strategy 2018
Transformation From Today To Tomorrow - Market and Product Strategy 2018Transformation From Today To Tomorrow - Market and Product Strategy 2018
Transformation From Today To Tomorrow - Market and Product Strategy 2018
 
Mellanox's Technological Advantage
Mellanox's Technological AdvantageMellanox's Technological Advantage
Mellanox's Technological Advantage
 
Presentation - 5G Private & Dedicated Networks.pdf
Presentation - 5G Private & Dedicated Networks.pdfPresentation - 5G Private & Dedicated Networks.pdf
Presentation - 5G Private & Dedicated Networks.pdf
 
Control on Remote Sensing Network using Cloud Computing Services
Control on Remote Sensing Network using Cloud Computing ServicesControl on Remote Sensing Network using Cloud Computing Services
Control on Remote Sensing Network using Cloud Computing Services
 
Druid - Latest Case Studies & Use Cases_08.07.20
Druid - Latest Case Studies & Use Cases_08.07.20Druid - Latest Case Studies & Use Cases_08.07.20
Druid - Latest Case Studies & Use Cases_08.07.20
 
Accelerating 5G enterprise networks with edge computing and latency assurance
Accelerating 5G enterprise networks with edge computing and latency assuranceAccelerating 5G enterprise networks with edge computing and latency assurance
Accelerating 5G enterprise networks with edge computing and latency assurance
 
Secure Connectivity on Every Network Layer
Secure Connectivity on Every Network LayerSecure Connectivity on Every Network Layer
Secure Connectivity on Every Network Layer
 
5G: A 2020 Vision
5G: A 2020 Vision5G: A 2020 Vision
5G: A 2020 Vision
 

More from ADVA

Industrial optically pumped cesium beam clock
Industrial optically pumped cesium beam clockIndustrial optically pumped cesium beam clock
Industrial optically pumped cesium beam clockADVA
 
The need for GBaaS as GPS/GNSS is no longer a reliable source for critical PN...
The need for GBaaS as GPS/GNSS is no longer a reliable source for critical PN...The need for GBaaS as GPS/GNSS is no longer a reliable source for critical PN...
The need for GBaaS as GPS/GNSS is no longer a reliable source for critical PN...ADVA
 
Industry's longest holdover with the OSA 3350 SePRC™ optical cesium clock
Industry's longest holdover with the OSA 3350  SePRC™ optical cesium clockIndustry's longest holdover with the OSA 3350  SePRC™ optical cesium clock
Industry's longest holdover with the OSA 3350 SePRC™ optical cesium clockADVA
 
Addressing PNT threats in critical defense infrastructure
Addressing PNT threats in critical defense infrastructureAddressing PNT threats in critical defense infrastructure
Addressing PNT threats in critical defense infrastructureADVA
 
Precise and assured timing for enterprise networks
Precise and assured timing for enterprise networksPrecise and assured timing for enterprise networks
Precise and assured timing for enterprise networksADVA
 
Introducing Ensemble Cloudlet for on-premises cloud demand
Introducing Ensemble Cloudlet for on-premises cloud demandIntroducing Ensemble Cloudlet for on-premises cloud demand
Introducing Ensemble Cloudlet for on-premises cloud demandADVA
 
ePRTC in data centers - GNSS-backup-as-a-service (GBaaS)
ePRTC in data centers - GNSS-backup-as-a-service (GBaaS)ePRTC in data centers - GNSS-backup-as-a-service (GBaaS)
ePRTC in data centers - GNSS-backup-as-a-service (GBaaS)ADVA
 
Sync on TAP - Syncing infrastructure with software
Sync on TAP - Syncing infrastructure with softwareSync on TAP - Syncing infrastructure with software
Sync on TAP - Syncing infrastructure with softwareADVA
 
Meet stringent latency demands with time-sensitive networking
Meet stringent latency demands with time-sensitive networkingMeet stringent latency demands with time-sensitive networking
Meet stringent latency demands with time-sensitive networkingADVA
 
Making networks secure with multi-layer encryption
Making networks secure with multi-layer encryptionMaking networks secure with multi-layer encryption
Making networks secure with multi-layer encryptionADVA
 
Quantum threat: How to protect your optical network
Quantum threat: How to protect your optical networkQuantum threat: How to protect your optical network
Quantum threat: How to protect your optical networkADVA
 
Optical networks and the ecodesign tradeoff between climate change mitigation...
Optical networks and the ecodesign tradeoff between climate change mitigation...Optical networks and the ecodesign tradeoff between climate change mitigation...
Optical networks and the ecodesign tradeoff between climate change mitigation...ADVA
 
Trends in next-generation data center interconnects (DCI)
Trends in next-generation data center interconnects (DCI)Trends in next-generation data center interconnects (DCI)
Trends in next-generation data center interconnects (DCI)ADVA
 
Open optical edge connecting mobile access networks
Open optical edge connecting mobile access networksOpen optical edge connecting mobile access networks
Open optical edge connecting mobile access networksADVA
 
Introducing Adva Network Security – a trusted German anchor
Introducing Adva Network Security – a trusted German anchorIntroducing Adva Network Security – a trusted German anchor
Introducing Adva Network Security – a trusted German anchorADVA
 
Meet the industry's first pluggable 10G demarcation device
Meet the industry's first pluggable 10G demarcation deviceMeet the industry's first pluggable 10G demarcation device
Meet the industry's first pluggable 10G demarcation deviceADVA
 
Introducing ADVA AccessWave25™
Introducing ADVA AccessWave25™Introducing ADVA AccessWave25™
Introducing ADVA AccessWave25™ADVA
 
10G edge technology for outdoor environments
10G edge technology for outdoor environments10G edge technology for outdoor environments
10G edge technology for outdoor environmentsADVA
 
The quantum age - secure transport networks
The quantum age - secure transport networksThe quantum age - secure transport networks
The quantum age - secure transport networksADVA
 
From leased lines to optical spectrum services
From leased lines to optical spectrum servicesFrom leased lines to optical spectrum services
From leased lines to optical spectrum servicesADVA
 

More from ADVA (20)

Industrial optically pumped cesium beam clock
Industrial optically pumped cesium beam clockIndustrial optically pumped cesium beam clock
Industrial optically pumped cesium beam clock
 
The need for GBaaS as GPS/GNSS is no longer a reliable source for critical PN...
The need for GBaaS as GPS/GNSS is no longer a reliable source for critical PN...The need for GBaaS as GPS/GNSS is no longer a reliable source for critical PN...
The need for GBaaS as GPS/GNSS is no longer a reliable source for critical PN...
 
Industry's longest holdover with the OSA 3350 SePRC™ optical cesium clock
Industry's longest holdover with the OSA 3350  SePRC™ optical cesium clockIndustry's longest holdover with the OSA 3350  SePRC™ optical cesium clock
Industry's longest holdover with the OSA 3350 SePRC™ optical cesium clock
 
Addressing PNT threats in critical defense infrastructure
Addressing PNT threats in critical defense infrastructureAddressing PNT threats in critical defense infrastructure
Addressing PNT threats in critical defense infrastructure
 
Precise and assured timing for enterprise networks
Precise and assured timing for enterprise networksPrecise and assured timing for enterprise networks
Precise and assured timing for enterprise networks
 
Introducing Ensemble Cloudlet for on-premises cloud demand
Introducing Ensemble Cloudlet for on-premises cloud demandIntroducing Ensemble Cloudlet for on-premises cloud demand
Introducing Ensemble Cloudlet for on-premises cloud demand
 
ePRTC in data centers - GNSS-backup-as-a-service (GBaaS)
ePRTC in data centers - GNSS-backup-as-a-service (GBaaS)ePRTC in data centers - GNSS-backup-as-a-service (GBaaS)
ePRTC in data centers - GNSS-backup-as-a-service (GBaaS)
 
Sync on TAP - Syncing infrastructure with software
Sync on TAP - Syncing infrastructure with softwareSync on TAP - Syncing infrastructure with software
Sync on TAP - Syncing infrastructure with software
 
Meet stringent latency demands with time-sensitive networking
Meet stringent latency demands with time-sensitive networkingMeet stringent latency demands with time-sensitive networking
Meet stringent latency demands with time-sensitive networking
 
Making networks secure with multi-layer encryption
Making networks secure with multi-layer encryptionMaking networks secure with multi-layer encryption
Making networks secure with multi-layer encryption
 
Quantum threat: How to protect your optical network
Quantum threat: How to protect your optical networkQuantum threat: How to protect your optical network
Quantum threat: How to protect your optical network
 
Optical networks and the ecodesign tradeoff between climate change mitigation...
Optical networks and the ecodesign tradeoff between climate change mitigation...Optical networks and the ecodesign tradeoff between climate change mitigation...
Optical networks and the ecodesign tradeoff between climate change mitigation...
 
Trends in next-generation data center interconnects (DCI)
Trends in next-generation data center interconnects (DCI)Trends in next-generation data center interconnects (DCI)
Trends in next-generation data center interconnects (DCI)
 
Open optical edge connecting mobile access networks
Open optical edge connecting mobile access networksOpen optical edge connecting mobile access networks
Open optical edge connecting mobile access networks
 
Introducing Adva Network Security – a trusted German anchor
Introducing Adva Network Security – a trusted German anchorIntroducing Adva Network Security – a trusted German anchor
Introducing Adva Network Security – a trusted German anchor
 
Meet the industry's first pluggable 10G demarcation device
Meet the industry's first pluggable 10G demarcation deviceMeet the industry's first pluggable 10G demarcation device
Meet the industry's first pluggable 10G demarcation device
 
Introducing ADVA AccessWave25™
Introducing ADVA AccessWave25™Introducing ADVA AccessWave25™
Introducing ADVA AccessWave25™
 
10G edge technology for outdoor environments
10G edge technology for outdoor environments10G edge technology for outdoor environments
10G edge technology for outdoor environments
 
The quantum age - secure transport networks
The quantum age - secure transport networksThe quantum age - secure transport networks
The quantum age - secure transport networks
 
From leased lines to optical spectrum services
From leased lines to optical spectrum servicesFrom leased lines to optical spectrum services
From leased lines to optical spectrum services
 

Recently uploaded

"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 

Recently uploaded (20)

"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 

Security in Optical Networks - Useless or Necessary?

  • 1. BEL 2 Spezial, Unterschleißheim, Germany 03.07.2014 Stephan Neidlinger Security in Optical Networks – Useless or Necessary?
  • 2. © 2014 ADVA Optical Networking. All rights reserved. Confidential.22 Broadband Access Network Market Trends • Service data rates keep on increasing • NG video: 3D, UHDTV, on-line streaming services, … • Several markets need to be addressed in order to decrease return of investment time in FTTH infrastructure projects (according to the FTTH business guide published by FTTH Council Europe) • Residential • Business • Carrier • Public sector • These applications call for • Equal down/upstream bandwidth (e g business, carrier services) • Scalable architecture (e g user individual bandwidth upgrade) • Simple systems for low cost potential (especially for residential market) • Secure architecture (e g business services)
  • 3. © 2014 ADVA Optical Networking. All rights reserved. Confidential.33 FTTH Business Guide
  • 4. © 2014 ADVA Optical Networking. All rights reserved. Confidential.44 FTTH Business Guide
  • 5. © 2014 ADVA Optical Networking. All rights reserved. Confidential.55 Example: Data Center Environment & Security APPS APPS
  • 6. © 2014 ADVA Optical Networking. All rights reserved. Confidential.66 Data Center Environment & Security Physical Access to the Data Center APPS APPS
  • 7. © 2014 ADVA Optical Networking. All rights reserved. Confidential.77 Data Center Environment & Security Hardware Security APPS APPS
  • 8. © 2014 ADVA Optical Networking. All rights reserved. Confidential.88 Data Center Environment & Security Software Security APPS APPS
  • 9. © 2014 ADVA Optical Networking. All rights reserved. Confidential.99 Data Center Environment & Security …and what about the Fiber Connection? APPS APPS
  • 10. © 2014 ADVA Optical Networking. All rights reserved. Confidential.1010 Fiber Optic Networks Tapping Possibilities Y-Bridge for service activities Fiber Coupling device Street cabinet How to get access? Where to get access? Splice boxes / cassettes (Outdoor / Inhouse) There are multiple ways to access fiber
  • 11. © 2014 ADVA Optical Networking. All rights reserved. Confidential.1111 Fiber Optic Networks Optical Tapping Method Cladding: 125 µm Core: 9 µm Lost Light “For both public and private networks, optical taps and analytic devices are required and inexpensive maintenance equipment in common use worldwide today. Various types of optical taps […] are also used for corporate espionage…” „Clearly, physical protection of optical transmission media and junction boxes is essential; in addition, data encryption plays a role in protecting sensitive data.” [5] [5] Security Strategies Alert, M.E. Kabay, March 2003
  • 12. © 2014 ADVA Optical Networking. All rights reserved. Confidential.1212 Fiber Optical Networks Security Options Encryption Security-Hardened Software Physical Layer Monitoring Power Tracking Intrusion Detection Optical Time-Domain Reflectometer (OTDR) RADIUS Secure Shell SNMPv3 AES-256 Authentication Diffie-Hellman Optical Networks Security Tools are necessary and available 122842636
  • 13. © 2014 ADVA Optical Networking. All rights reserved. Confidential.1313 WAN Ipsec / MacSec Encryption WDM-transport WDM-transport Site BSite A WAN Appliance based Encryption WDM-transport Site B WDM-transport Site A Optical Transmission Security Speed of Encryption WAN Router Site A Site B xWDM based Encryption Speed,throughputandsimplicity TDM TDM FC Switch Router FC Switch Router FC Switch Router FC Switch Router FC Switch Router FC Switch
  • 14. sneidlinger@advaoptical.com Thank You IMPORTANT NOTICE The content of this presentation is strictly confidential. ADVA Optical Networking is the exclusive owner or licensee of the content, material, and information in this presentation. Any reproduction, publication or reprint, in whole or in part, is strictly prohibited. The information in this presentation may not be accurate, complete or up to date, and is provided without warranties or representations of any kind, either express or implied. ADVA Optical Networking shall not be responsible for and disclaims any liability for any loss or damages, including without limitation, direct, indirect, incidental, consequential and special damages, alleged to have been caused by or in connection with using and/or relying on the information contained in this presentation. Copyright © for the entire content of this presentation: ADVA Optical Networking.