MikroTik Value Added Distributor, MikroTik Training Centre, MikroTik Toronto, MikroTik Canada

MikroTik Value Added Distributor, MikroTik Training Centre, MikroTik Toronto, MikroTik Canada

MikroTik Training Centre, Toronto, Canada MikroTik Value Added Distributor

T (647) 477-0163
Email: support@wirelessnetware.ca

Wireless Netware Technology LTD.
550 Alden Road, Unti# 210A, Markham, Ontario L3R6A8

Open in Google Maps
  • Home
  • Solutions
  • Services
  • Become a Canadian ISP
    • Business Internet
  • Partners
  • Hardware
  • Training
  • Blog
  • About
  • Contacts
MikroTikSupport
  • Home
  • Blog
  • Blog
  • Are you a Canadian ISP looking to grow your business?
Sunday, 12 March 2017 / Published in Blog, Training

Are you a Canadian ISP looking to grow your business?

Here’s what you need to know if you’re considering Bell or Rogers.

Rogers Wholesale Service

TPIA- Aggregated POI Design

Bell Wholesale Service

Gateway Access Service (GAS)

High-Speed Access (HSA)


Service Overview

TPIA is a service offered to Internet Service Providers (ISP’s) by Rogers Cable. The service allows ISPs to provide their End- Users with high-speed Retail Internet Service via DOCSIS compliant cable modems attached to Rogers cable plant. To use the service, the ISP must connect to the aggregated Point Of Interconnect (POI) operated by Rogers. The aggregated POI is located at York Mills. Once connected at the POI, the ISP can offer service to End-Users served by the aggregated POI.

Service component

The components which, collectively, make up a third party ISP’s Third Party Residential Internet Service offering are depicted in the conceptual diagram below. It is important to note that the Cable Modem, End-User PC, RBS Transport Network and the ISP Network are not part of the Rogers’ TPIA service.

Routing

The Aggregated TPIA model is based on one MPLS VPN (vrf) per Phub for each ISP to segregate the traffic between PHUBs. The aggregated POI router will have a default route inside each VPN pointing to the ISP router, and propagate it to the same VPN on all CMTSes through MP-BGP. The default route will be configured to use the directly connected ISP router from the POI router, as the next hop. End-users’ traffic will follow the default route to reach their upstream ISPs respectively. The ISP router must be configured with static routes pointing to CPE IPv4 blocks for the specific PHUBs on the assigned VLANs. These VLANs will be provided by ISP to Rogers. The CPE IPv4 blocks must be provided by ISP.

VLAN Assignment The 1xGigE or 10xGigE links facing the ISP router will be configured as the trunk in Dot1Q mode to allow the traffic on VLANs coming from different PHUBs. A unique VLAN will be assigned to each physical link for each PHUB and these VLANs will be provided by ISP. These VLANs will be configured on the aggregated POI router on the backhaul links and will be mapped to the ISP network via the Dot1Q trunk. The VLANs must be unique on each physical link for each PHUB.

High-Level Network Diagram for aggregated TPIA

The following diagram shows the network interconnections on the aggregated POI. The diagram shows the scenario when an ISP has chosen RBS as a backhaul provider. Rogers will utilize its Transport Network to provision the backhaul from aggregated POI location at York Mills and terminate at 151 Front Street. Rogers will then handoff the fibre at the demarcation patch panel located in Meet Me Room

Gateway Access Service (GAS)

The Gateway Access Service (GAS) from Bell provides you with a low-cost solution for Internet access over Point-to-Point Protocol over Ethernet (PPPoE).

With this service, your business and residential customers can access the high-speed Internet using existing telephone lines. Based on ADSL (asymmetric digital subscriber line) technology, applications include high-speed Internet access and remote LAN connectivity.

GAS is offered on two different platforms to meet the dynamic needs of your customers, including:

Copper-based network for users with legacy requirements Fibre network for users with higher speed requirements.

Our Gateway Access Service offers you:

Service delivered over shared permanent-virtual-circuit (PVC)

Dynamic IP addressing

Remote LAN connectivity

Simple and secure login

Password authentication with access to multiple destination networks

High-speed Access (HSA)

The High-Speed Access (HSA) service from Bell delivers an end-to-end Ethernet LAN-based solution and is designed for business customers with demanding network needs.

The HSA service features:

A single, dedicated permanent-virtual-circuit (PVC)

Static IP addressing

HSA is offered on two different platforms to meet the dynamic needs of your customers, including:

Copper-based network for customers with standard legacy requirements

Fibre network for customers with higher speed requirements

This service offers:

High-speed Internet access for medium to large customers with complex network requirements

LAN/WAN service to customers via existing primary exchange service (PES) lines

A dedicated loop to ensure quality performance with high traffic usage

Simultaneous use of Internet service and the telephone line

Internet Connect – Dedicated Internet Access (IC-DIA)

Using dedicated network point-to-point Ethernet, Internet Connect – Dedicated Internet Access (IC-DIA) from Bell bundles access and transit to provide a complete solution with the speed and performance your business customers can rely on.

Delivered over Canada’s largest fibre optic network, IC-DIA offers flexible, secure, dedicated Internet connectivity.

Our service provides:

Scalable bandwidth speeds from 1 Mbps to 200 Mbps

Dedicated network point-to-point access speeds of 10BT,100BT or GigE Ethernet

IPv4 static IP addresses included and also supports IPv6

Web-based usage monitoring and reporting


How fast can your company afford to grow?

Everyone knows that starting a business requires money, and growing a business requires even more. But few people understand that a profitable company that tries to grow too fast can run out of money even if its products are great successes. So a big challenge for managers of any growing concern is to strike the proper balance between consuming money and generating it.

What your capital costs will be:

  • Rogers/Bell Wholesale deposit and installation fee

 

  • Building Core Network, including Routers, Switches and Servers

 

  • Consultant fee and installation fee

 

  • License for services like Radius server, Router license “Only for some Routers”

What your recurring expenses will be:

  • Cost of Rogers/Bell bandwidth

 

  • Cost of Datacenter “Power, Rack, Internet Bandwidth, IPv4/IPv6”

 

  • Employee “Customer Service”

 

  • Service contract “Monthly”

 

  • License per number of users

Your data center solution

  • It is not a good idea to split your core in multiple datacenters but it is important to find a reliable one.

 

  • Make sure the data center has enough bandwidth for your future grows.

 

  • Ask for redundant service.

 

  • Buy your own IPv4/IPv6

Your core hardware: Routers

Cisco ASA1000 Serie


  • Router Price starting at ~$60,000 (one-time)

 

  • License fee: $8,000 (one-time)

 

  • License per number of users: $8,000

 

  • Service charge: ~$1,500 (monthly)

 

  • Installation/Configuration: ~$8,000

 

  • Cisco direct phone: Available

 

  • Response time: 1~4 hours

 

  • Hardware replacement: 1~4 days

 

  • Backup solution: NOT AVAILABLE

 

  • Maximum number of users: up to 6,000 CX

 

  • Reliability: %99.999

 

  • Demo: not-available

MikroTik CCR1000 Serie


  • Router Price starting at ~$1,500

 

  • License fee: $0.00

 

  • License per number of users: $0.00

 

  • Service charge: $0.00

 

  • Installation/Configuration: ~$4,000

 

  • MikroTik direct phone: Not Available

 

  • Request by email: support@mikrotik.com

 

  • Response time: Maximum 12 hours

 

  • Hardware replacement: Under 30 minutes.

 

  • Backup solution: Always AVAILABLE

 

  • Maximum number of users: up to 6,000 CX

 

  • Reliability: %99.999

 

  • Demo: available

Why we think Mikrotik makes sense for Canadian ISPs on the grow.

 

Ask us!

We prefer you to ask

Our Customers

HUBSMART CORP.
Business SMart High Speed

Carrytel Communication INC.

GlobalVU INC.


Enginet INC.

Tremor Technology Group.

Exoon Enterprises INC.

What you can read next

MikroTik training support from Wireless Netware
We can help you build your MikroTik career
Choose how and where to access your business
You have been invited to attend MikroTik User Meeting “Toronto, Canada, 2019” MUM 2019

Recent Posts

  • Load-balance using PCC in MikroTik RouterOS v 6.xx

    Introduction PCC “Per Connection Classifi...
  • Audience – a router for those who value both beauty and functionality

    Audience is a tri-band (2.4 GHz & high + lo...
  • DO NOT let the cables limit you, More Throughput over Power!

    PWR-LINE PRO PWR-LINE PRO (PL7510Gi) is a smart...
  • The First MikroTik product with 10G RJ45 Ethernet ports, CRS312-4C+8XG-RM

    CRS312-4C+8XG-RM Switch of the future: the firs...
  • Netflix has identified vulnerabilities in RouterOS.

    Netflix has identified several TCP networking v...

RSS MikroTik Blog

  • CVE-2024-54772
    Issue Summary A vulnerability has been identified in the WinBox service, where a discrepancy in response size between connection attempts with valid and invalid usernames allows attackers to confirm if user accounts exists via brute forcing the login process. In other words, when attacker tries to log into the device, by examining the response, the […]
  • CVE-2023-30799
    A new CVE has been published, which describes a policy elevation issue, where a logged in administrator with “policy” permissions (able to grant additional permissions to any user on the router), is also able to send crafted configuration commands, that are exchanged internally by the router software components and normally are rejected when sent by […]
  • CVE-2023-32154
    On 10/05/2023 (May 10th, 2023) MikroTik received information about a new vulnerability, which is assigned the ID CVE-2023-32154. The report stated, that vendor (MikroTik) was contacted in December, but we did not find record of such communication. The original report also says, that vendor was informed in person in an event in Toronto, where MikroTik […]
  • Mēris botnet
    In early September 2021 QRATOR labs published an article about a new wave of DDoS attacks, which are originating from a botnet involving MikroTik devices. As far as we have seen, these attacks use the same routers that were compromised in 2018, when MikroTik RouterOS had a vulnerability, that was quickly patched. There is no […]
  • Fragattacks
    In beginning of May 2021, a security research group from Belgium published a set of vulnerabilities they call “Frag Attacks” (from Fragmentation Attack), which affect all modern security protocols of Wi-Fi. Not all the published issues affect MikroTik products, but those that were found to be potentially affecting RouterOS, have been fixed in all currently released […]
  • Upgraded package signatures
    The RouterOS package signing procedure has been upgraded, to use new algorithms and utilize state of the art security hardware. It will also add a possibility to verify the integrity of existing installations. The new updated package signing procedure provides additional security to prevent installation of malicious software. Best security practices: Keep RouterOS updated to the […]
  • CVE-2019-3981
    Summary Tenable has published a potential vulnerability in older RouterOS versions where an attacker can retrieve the password hash of a RouterOS username via a complex man-in-the-middle attack over port 8291. The attacker must be able to intercept a valid RouterOS user login attempt, so he must be located in the same network as the […]
  • DNS cache poisoning vulnerability
    Tenable has identified a vulnerability in RouterOS DNS implementation. RouterOS 6.45.6 and below is vulnerable to unauthenticated remote DNS cache poisoning via Winbox. The router is impacted even when DNS is not enabled. One possible attack vector is via Winbox on port 8291 if this port is open to untrusted networks. The resolver can be […]
  • Package validation and upgrade vulnerability
    Tenable has identified a couple of issues with RouterOS packaging and upgrade systems. The upgrade system used by RouterOS 6.45.5 and below is vulnerable to man in the middle attacks and insufficient package validation. An attacker can abuse these vulnerabilities to downgrade a router’s installed RouterOS version, possibly lock the user out of the system, […]
  • CVE-2019-11477, CVE-2019-11478, CVE-2019-11479
    Summary Netflix has identified several TCP networking vulnerabilities in the Linux kernel that is used in RouterOS. The vulnerabilities can trigger denial of service if the RouterOS system is attacked from an insufficiently protected network interface (port). Firewall can protect against the issue. MikroTik has already applied the necessary patches: fix included in RouterOS 6.45.1 and […]

General information

MikroTik Training Schedules
My Certificate Validation
Who is my local MikroTik Consultant
How to become a MikroTik Consultant
How to become a MikroTik Certified Trainer

Useful URLs

MikroTik Distributor
MikroTik WiKi "Documentation"
MikroTik useful Articles and Examples
The Dude "Monitoring, Notification, Syslog"
User Manager "Free Radius Server"

Legal

  • Privacy Policy
  • General Term
  • Training terms
  • Managed Services Terms
  • Partner term
  • GET SOCIAL
MikroTik Value Added Distributor, MikroTik Training Centre, MikroTik Toronto, MikroTik Canada

Copyright © 2015 WirelessNetware. All rights reserved.

TOP