SlideShare una empresa de Scribd logo
1 de 42
Guide to Networking Essentials,
6th
Edition
Chapter 12: Wide Area Network
Essentials
Copyright © 2012 Cengage Learning. All rights reserved. 2
Objectives
2
• Describe the fundamentals of WAN operation and
devices
• Discuss the methods used to connect to WANs
• Configure and describe remote access protocols
• Describe the three major areas of cloud computing
Copyright © 2012 Cengage Learning. All rights reserved. 3
Wide Area Network Fundamentals
• Internetworks and WANs can be described as two
or more LANs connected together
• Most obvious difference between internetworks and
WANs is the distance between the LANs being
connected.
• They also differ in two other areas:
– WANs use the services of carriers or service providers (phone
companies and ISPs) for network connection
– WANs use serial communication that can span miles compared
to LAN technologies that span distances measured in hundreds
of meters
Copyright © 2012 Cengage Learning. All rights reserved. 4
WAN Devices
• WANs operate at the Data Link and Physical layers
(Layers 2 and 1) of the OSI model
• Several types of devices are likely to be used in
WANS for media access, signal transmission, and
reception and to connect a WAN to a LAN:
– Modems
– Channel service units/data service units
– Routers
Copyright © 2012 Cengage Learning. All rights reserved. 5
Modems
• A modem is a device that allows a computer
(which works with digital signals) to communicate
over lines that analog signals
• A digital signal is a series of binary 1s and 0s
represented by some type of signal that has two
possible states (0v or 5v)
• An analog signal varies over time continually and
smoothly (transitions from 0v to 5v)
Copyright © 2012 Cengage Learning. All rights reserved. 6
CSU/DSUs
• A channel service unit/data service unit
(CSU/DSU) is a device that creates a digital
connection between a LAN device (router) and
the WAN link from the service provider
• The WAN link is usually a T-carrier technology,
such as a T1 or T3 (discussed later)
• Similar to a modem, only all signals are digital
– Converts one type of digital signal to another type of digital
signal
Routers
Copyright © 2012 Cengage Learning. All rights reserved. 7
• A router is responsible for getting packets from one
network to another
• In a WAN, it is usually the device connecting a LAN
to the WAN service provider via a modem or
CSU/DSU
Copyright © 2012 Cengage Learning. All rights reserved. 8
WAN Connection Methods
• Many WAN technologies are available and differ in
speed, level of security and reliability, and cost
• Four most common connection methods:
– Circuit-switched
– Leased line
– Packet-switched
– VPN over the Internet
Copyright © 2012 Cengage Learning. All rights reserved. 9
Circuit-Switched WANs
• A circuit-switched WAN creates a temporary
dedicated connection between sender and receiver
on demand
• Analog example: a phone line connection from the
PSTN, also known as plain old telephone service
(POTS)
• Digital example: Integrated Services Digital
Network (ISDN)
• Not as common today due to faster technologies
but still in use in some areas
Copyright © 2012 Cengage Learning. All rights reserved. 10
Circuit-Switched WANs
 Plain Old Telephone Service (POTS) – limited in
bandwidth due to the digital-to-analog conversion
that is performed, usually by modems
 The conversion process degrades signal quality and limits
data transfer speeds to about 56 Kbps
 The most common modem standard for connecting to the
Internet is V.92
 V.92 modems use a technique called pulse code modulation
(PCM) that digitizes analog signals and introduces less noise
into the signal
Circuit-Switched WANs
Modem communication using the V.92 standard
Copyright © 2012 Cengage Learning. All rights reserved. 11
Copyright © 2012 Cengage Learning. All rights reserved. 12
Circuit-Switched WANs
• Integrated Services Digital Network (ISDN) – a digital
communication technology developed in 1984 to
replace the analog phone system
– Was not as popular as expected but can still be found in many
US metropolitan areas and Western Europe
– Defines communication channels of 64 Kbps
– Two formats or rates:
• BRI – Basic Rate Interface: consists of two B-channels (64 Kbps)
and a D-channel (16 Kbps). B-channels are used for data transfer
so BRI can operate at up to 128 Kbps
• PRI – Primary Rate Interface (PRI): consists of 23 B-channels
and a D-channel. Can provide up to 1.544 Mbps
Copyright © 2012 Cengage Learning. All rights reserved. 13
Leased Lines
• A leased line provides a dedicated point-to-point
connection from the customer’s LAN through the
provider’s network and the destination network
– Provides permanent, secure, and dedicated bandwidth limited only by
the provider’s technology and how much the customer is willing to
spend
• Most expensive WAN connectivity because it is
dedicated
• Should be considered:
– When high quality, 24/7 access is needed
– For mission-critical applications
– When fast upstream as well as downstream communication is required
Copyright © 2012 Cengage Learning. All rights reserved. 14
Leased Lines
• Leased lines are based on one of two types of digital
technology: T-carriers and SONET
• T-carriers
– Typical lines are T1 and T3 that operate at 1.544 Mbps and
44 Mbps, respectively
– Derived from multiple 64 Kbps channels, making a T1
connection a grouping of 24 channels, and a T3 connection a
grouping of 672 channels
– Uses a signaling method called time division multiplexing
(TDM): Allocates a time slot for each channel
• If a portion of a T-carrier line is used for one purpose and a
different portion for another purpose, the line has been
fractionalized
Copyright © 2012 Cengage Learning. All rights reserved. 15
Leased Lines
• T-Carriers (cont.)
– Multiplexing:enables several communication streams to
travel simultaneously over the same cable segment
– Require a CSU/DSU at each end of the link to convert the
signals used by the T-carrier line into signals used by the
LAN
– T1 lines can use twisted-pair, coaxial or fiber-optic cabling
– T3 lines can use coaxial or fiber-optic cabling
– T1 lines are the most common WAN connection method in
the US
Leased Lines
Copyright © 2012 Cengage Learning. All rights reserved. 16
Copyright © 2012 Cengage Learning. All rights reserved. 17
Leased Lines
• Synchronous Optical Network (SONET) –
flexible, highly fault-tolerant technology that can
operate at different capacities over fiber cabling
• Typical SONET rates are OC-3 (155 Mbps), OC-12
(622 Mbps), OC-48 (almost 2.5 Gbps), OC-192,
and OC-768 (used by large ISPs)
• SONET networks can carry traffic from a variety of
other network types, such as T-carrier and ATM
• SONET uses a dual-ring topology (like FDDI),
making it very fault-tolerant
Copyright © 2012 Cengage Learning. All rights reserved. 18
Packet-Switched WANs
• A packet-switched WAN does not create a
dedicated connection between sender and receiver
– Each packet is transmitted through the provider’s network
independently (similar to LAN traffic)
– Data shares bandwidth with your provider’s other customers
– Most common packet-switched networks are:
• X.25
• Frame relay
• ATM
• MPLS
Copyright © 2012 Cengage Learning. All rights reserved. 19
Packet-Switched WANs
• Virtual Circuits – a logical connection created
between two devices in a shared network
– No single cable exists between the two endpoints
– Maps a path through the network of switches between two
points
– The pathway is created after sender and receiver agree on
bandwidth requirements and request a pathway
– Switched virtual circuit (SVCs): established when needed
and then terminated when the transmission is completed
– Permanent virtual circuit (PVCs): pathway between two
communication points is established as a permanent logical
connection (more expensive than SVCs)
Copyright © 2012 Cengage Learning. All rights reserved. 20
X.25 Networks
• Packet-switching technology developed in the
mid-1970s running over older copper phone lines
• Offer both SVCs and PVCs – although not all X.25
providers offer PVCs
• Earlier X.25 could only operate at 64 Kbps
– A 1992 specification revision improved the maximum
throughput of X.25 to 2 Mbps, but the new version was not
widely deployed
• Even though X.25 offers reliable and error-free
communications, this technology has been largely
replaced by other higher-speed technologies
Copyright © 2012 Cengage Learning. All rights reserved. 21
Frame Relay Networks
• A PVC packet-switching technology that offers
WAN communication over a fast, reliable digital
link
• Can maintain transmission rates from 64 Kbps to
44 Mbps (T3 speed)
• Allows customers to specify the bandwidth
needed
– Charges depend on the PVC’s bandwidth allocation
(known as Committed Information Rate [CIR])
– CIR is the guaranteed minimum transmission rate
• Connection is established by using a pair of
CSU/DSUs with a router or bridge at each end to
direct traffic on and off the WAN link
Frame Relay Networks
Copyright © 2012 Cengage Learning. All rights reserved. 22
ATM Networks
• Asynchronous Transfer Mode (ATM) – high-speed
network technology designed for both LAN and WAN
use
• ATM bandwidth can be as low as a few Mbps up to
622 Mbps, but the most common speed is 155 Mbps
• Cell-based packet switching technology
– Cells are of a fixed length rather than typical packet-based systems
that use variable length packets
– Fixed length cells can be switched more efficiently than variable length
packets
• ATM is used quite heavily for the backbone and
infrastructure in large communications companies
Copyright © 2012 Cengage Learning. All rights reserved. 23
Multiprotocol Label Switching (MPLS)
• MPLS runs over ATM, frame relay, SONET, and
even Ethernet
• Creates a connection-oriented virtual circuit using
labels assigned to each packet
– The label is used to make packet-forwarding decisions
within the MPLS network, making it unnecessary to view
the contents of the packet
• Capable of supporting different Layer 3 protocols, it
is currently used exclusively in IP networks
– Supports both IPv4 and IPv6
Copyright © 2012 Cengage Learning. All rights reserved. 24
WANs over the Internet
• Using VPN connections over inexpensive Internet
connections is becoming a popular WAN alternative
• VPNs offer the following advantages over other WAN
methods discussed:
– Inexpensive: Cost of Internet access is much lower than leased
lines or packet-switched WAN connections
– Convenience: A VPN can be configured as soon as Internet
access is established
– Security: Advanced authentication and encryption protocols
protect the integrity and privacy of VPN traffic
– Flexibility: After a corporate VPN infrastructure is in place, it is
available for WAN connections from branch offices as well as
mobile users and telecommuters
Copyright © 2012 Cengage Learning. All rights reserved. 25
WAN Connections Methods
Copyright © 2012 Cengage Learning. All rights reserved. 26
WAN Equipment
• Customer Equipment
– Customer Premises Equipment (CPE): The equipment at the
customer site that’s usually the responsibility of the customer
– Customer might own or lease the equipment from the provider
– Usually includes routers, modems and CSU/DSUs
– The demarcation point is the point at which the CPE ends and
the provider’s responsibility begins (where the WAN connection
is made)
Copyright © 2012 Cengage Learning. All rights reserved. 27
Copyright © 2012 Cengage Learning. All rights reserved. 28
WAN Equipment
• Provider Equipment
– The provider location nearest the customer site is usually
referred to as the central office (CO)
– Media (usually coax or fiber) runs from the customer site
demarcation point to the CO of the WAN service provider
– The connection between the demarcation point and the CO is
called the local loop or last mile
WAN Equipment
• Going the Last Mile
– The device that sends data to the local loop is called the data
circuit-terminating equipment (DCE): The CSU/DSU or
modem
– The device that passes data from the customer LAN to the
DCE is called the data terminal equipment (DTE): Router or
bridge that has one connection to the customer LAN and
another connection to the DCE that makes the WAN
connection
Copyright © 2012 Cengage Learning. All rights reserved. 29
WAN Equipment
A WAN connection showing the CPE, demarcation point, and
local loop
Copyright © 2012 Cengage Learning. All rights reserved. 30
Remote Access Networking
• Windows server OSs include the Routing and
Remote Access Service (RRAS) that supports both
dial-up remote access and VPN remote access
• Users can dial in over POTS or use a VPN from
any type of Internet connection
Copyright © 2012 Cengage Learning. All rights reserved. 31
Making a VPN Connection in Windows
• In Windows 7, you create a new connection from the
Network and Sharing Center by selecting “Set up a new
connection or network”
• This will start the “Set Up a Connection or Network
Wizard”
Copyright © 2012 Cengage Learning. All rights reserved. 32
Making a Dial-Up Connection
• All versions of Windows, starting with Windows 95,
include Dial-Up Networking (DUN) software to make an
RRAS connection
• The protocol used is Point-to-Point Protocol (PPP) and
is used to carry a variety of protocols over different
types of network connections
• Two protocols that are integral to PPP:
– Link Control Protocol (LCP): Sets up the PPP connection and defines
communications parameters and authentication protocols
– Network Control Protocol (NCP): Encapsulates higher layer protocols
such as IP and provides services such as dynamic IP addressing
Copyright © 2012 Cengage Learning. All rights reserved. 33
Remote Access Networking
via the Web
• Another remote access model is remote control of the
desktop of your office computer using a Web browser
• Several online services connect your Web browser to
your desktop, including LogMeIn and GoToMyPC
– A client component is installed on your computer and then log
on to the online service which connects you
– Uses authentication and encryption to maintain a secure
connection
• Third party software can also be used
– Microsoft’s Terminal Services Gateway (TSG) allows remote
connections by using SSL, the protocol that secures
communication between Web browsers and Web servers
Copyright © 2012 Cengage Learning. All rights reserved. 34
Cloud Computing
• Cloud computing is a computer networking model
in which data, applications, and processing power
are managed by servers on the Internet, and users
of resources pay for what they use rather than for
the equipment and software needed to provide the
resources
• Benefits:
– Reduced physical plant costs
– Reduced upfront costs
– Reduced personnel costs
Copyright © 2012 Cengage Learning. All rights reserved. 35
Cloud Computing
• There are three primary categories of cloud
computing:
– Hosted applications
– Hosted platforms
– Hosted infrastructure
Copyright © 2012 Cengage Learning. All rights reserved. 36
Hosted Applications
• Hosted applications are also referred to as on-demand
applications or software as a service (SaaS)
• Usually offered as a subscription based on the number
of users
• Customers can take advantage of new software
editions much faster
• Available anywhere the customer has a connection to
the Internet
• Most well-known example is Google Apps
Copyright © 2012 Cengage Learning. All rights reserved. 37
Hosted Platforms
• Hosted platform or platform as a service (PAAS)
– A customer develops applications using the service providers
development tools and infrastructure
– Once developed, the applications can be delivered to the
customer’s users from the provider’s servers
– Most common hosted platforms available are Force.com’s
Apex, Azure for Windows, Google’s AppEngine for Phython and
Java, WaveMaker for Ajax, and Engine Yard for Ruby on Rails
Copyright © 2012 Cengage Learning. All rights reserved. 38
Hosted Infrastructure
• Hosted infrastructure or infrastructure as a service
(IaaS) allows a company to use storage or entire
virtual servers
• If a customer needs another 100 GB of space, they
can pay for the space without worrying about how
that space is actually provided
• If a customer needs another server they pay for the
amount of processing and storage the additional
server actually requires
• Customers rent the resources they are using
Copyright © 2012 Cengage Learning. All rights reserved. 39
Copyright © 2012 Cengage Learning. All rights reserved. 40
Chapter Summary
• The most obvious difference between internetworks
and WANs is the distance between the LANs being
connected
• Several types of devices are likely to be used in WANs
for media access, signal transmission, and reception
and to connect a WAN to a LAN: Modems, CSU/DSU,
and Routers
• The methods used to make a WAN connection often
dictate the technologies that can be used and the
connection’s properties. The four most common are
circuit-switched, leased line, packet-switched, and VPN
over the Internet
Copyright © 2012 Cengage Learning. All rights reserved. 41
Chapter Summary
• WAN equipment can be categorized into customer
equipment, provider equipment, and the circuit that
makes the connections between the demarcation point
and the central office; called the last mile or local loop
• Large and small businesses alike are leveraging fast,
affordable remote access technologies that allow
employees to access their office desktops and
corporate resources from home and on the road
Chapter Summary
• Cloud computing is a computer networking model in
which data, applications, and processing power are
managed by servers on the Internet, and users pay for
what they use rather than for the equipment and
software needed to provide the resources
• There are three primary categories of cloud computing:
hosted applications, hosted platforms, and hosted
infrastructure
Copyright © 2012 Cengage Learning. All rights reserved. 42

Más contenido relacionado

La actualidad más candente

Net essentials6e ch9
Net essentials6e ch9Net essentials6e ch9
Net essentials6e ch9
APSU
 
Information system for you Chapter 15
Information system for you Chapter 15Information system for you Chapter 15
Information system for you Chapter 15
Chakamru Pak
 
Chapter 2 Networking
Chapter 2 NetworkingChapter 2 Networking
Chapter 2 Networking
mlrbrown
 

La actualidad más candente (20)

Net essentials6e ch13
Net essentials6e ch13Net essentials6e ch13
Net essentials6e ch13
 
Net essentials6e ch11
Net essentials6e ch11Net essentials6e ch11
Net essentials6e ch11
 
Net essentials6e ch1
Net essentials6e ch1Net essentials6e ch1
Net essentials6e ch1
 
Net essentials6e ch9
Net essentials6e ch9Net essentials6e ch9
Net essentials6e ch9
 
Net essentials6e ch10
Net essentials6e ch10Net essentials6e ch10
Net essentials6e ch10
 
Network protocol structure scope
Network protocol structure scopeNetwork protocol structure scope
Network protocol structure scope
 
IT8602 Mobile Communication - Unit V
IT8602 Mobile Communication - Unit V IT8602 Mobile Communication - Unit V
IT8602 Mobile Communication - Unit V
 
E-Management, Archival and Retrieval of documents/Office Networking System
E-Management, Archival and Retrieval of documents/Office Networking SystemE-Management, Archival and Retrieval of documents/Office Networking System
E-Management, Archival and Retrieval of documents/Office Networking System
 
Introduction to Computer Networks Lecture slides ppt
Introduction to Computer Networks Lecture slides pptIntroduction to Computer Networks Lecture slides ppt
Introduction to Computer Networks Lecture slides ppt
 
Networking
Networking Networking
Networking
 
Basics of Network Layer and Transport Layer
Basics of Network Layer and Transport LayerBasics of Network Layer and Transport Layer
Basics of Network Layer and Transport Layer
 
Cs8591 Computer Networks - UNIT V
Cs8591 Computer Networks - UNIT VCs8591 Computer Networks - UNIT V
Cs8591 Computer Networks - UNIT V
 
CS8591 Computer Networks - Unit I
CS8591 Computer Networks - Unit ICS8591 Computer Networks - Unit I
CS8591 Computer Networks - Unit I
 
Introduction to internet
Introduction to internetIntroduction to internet
Introduction to internet
 
Information system for you Chapter 15
Information system for you Chapter 15Information system for you Chapter 15
Information system for you Chapter 15
 
IPV4 addresses
IPV4 addressesIPV4 addresses
IPV4 addresses
 
Chapter10
Chapter10Chapter10
Chapter10
 
Chap1
Chap1Chap1
Chap1
 
Chapter 2 Networking
Chapter 2 NetworkingChapter 2 Networking
Chapter 2 Networking
 
MVA slides lesson 1
MVA slides lesson 1MVA slides lesson 1
MVA slides lesson 1
 

Destacado (9)

Chapter 6.investigations and information planning
Chapter 6.investigations and information planningChapter 6.investigations and information planning
Chapter 6.investigations and information planning
 
Chapter 3.agency discretion
Chapter 3.agency discretionChapter 3.agency discretion
Chapter 3.agency discretion
 
Chapter 5.agency rules and regulations(1)
Chapter 5.agency rules and regulations(1)Chapter 5.agency rules and regulations(1)
Chapter 5.agency rules and regulations(1)
 
Chapter 8.administrative agency hearings
Chapter 8.administrative agency hearingsChapter 8.administrative agency hearings
Chapter 8.administrative agency hearings
 
Chapter 7.informal proceedings
Chapter 7.informal proceedingsChapter 7.informal proceedings
Chapter 7.informal proceedings
 
Chapter 4 pp
Chapter 4 ppChapter 4 pp
Chapter 4 pp
 
Module 2 patient transfers
Module 2 patient transfersModule 2 patient transfers
Module 2 patient transfers
 
Burden of proof
Burden of proofBurden of proof
Burden of proof
 
Burden of proof
Burden of proofBurden of proof
Burden of proof
 

Similar a Net essentials6e ch12

Kenneth J. Sousa Effy OzMANAGEMENTINFORMATIONSYST.docx
Kenneth J. Sousa  Effy OzMANAGEMENTINFORMATIONSYST.docxKenneth J. Sousa  Effy OzMANAGEMENTINFORMATIONSYST.docx
Kenneth J. Sousa Effy OzMANAGEMENTINFORMATIONSYST.docx
LaticiaGrissomzz
 

Similar a Net essentials6e ch12 (20)

NETWORK COMPONENTS
NETWORK COMPONENTSNETWORK COMPONENTS
NETWORK COMPONENTS
 
Wan technologies
Wan technologiesWan technologies
Wan technologies
 
98 366 mva slides lesson 7
98 366 mva slides lesson 798 366 mva slides lesson 7
98 366 mva slides lesson 7
 
MVA slides lesson 7
MVA slides lesson 7MVA slides lesson 7
MVA slides lesson 7
 
Wide Area Network (WAN)
Wide Area Network (WAN)Wide Area Network (WAN)
Wide Area Network (WAN)
 
CISSP - Chapter 4 - Intranet and extranets
CISSP - Chapter 4 - Intranet and extranetsCISSP - Chapter 4 - Intranet and extranets
CISSP - Chapter 4 - Intranet and extranets
 
Unit06
Unit06Unit06
Unit06
 
Ccna day5
Ccna day5Ccna day5
Ccna day5
 
Ccna day5
Ccna day5Ccna day5
Ccna day5
 
Ccna day5-140715152501-phpapp01
Ccna day5-140715152501-phpapp01Ccna day5-140715152501-phpapp01
Ccna day5-140715152501-phpapp01
 
Ccna day5
Ccna day5Ccna day5
Ccna day5
 
Kenneth J. Sousa Effy OzMANAGEMENTINFORMATIONSYST.docx
Kenneth J. Sousa  Effy OzMANAGEMENTINFORMATIONSYST.docxKenneth J. Sousa  Effy OzMANAGEMENTINFORMATIONSYST.docx
Kenneth J. Sousa Effy OzMANAGEMENTINFORMATIONSYST.docx
 
Networking Concepts Lesson 12 - WANs - Eric Vanderburg
Networking Concepts Lesson 12 - WANs - Eric VanderburgNetworking Concepts Lesson 12 - WANs - Eric Vanderburg
Networking Concepts Lesson 12 - WANs - Eric Vanderburg
 
3 g training by luca
3 g training by luca3 g training by luca
3 g training by luca
 
9781111306366 ppt ch8
9781111306366 ppt ch89781111306366 ppt ch8
9781111306366 ppt ch8
 
Chap1 networking
Chap1 networkingChap1 networking
Chap1 networking
 
Wan asignment
Wan asignmentWan asignment
Wan asignment
 
Week 3
Week 3Week 3
Week 3
 
Computer network and email basic concepts
Computer network and email basic conceptsComputer network and email basic concepts
Computer network and email basic concepts
 
Remote Access
Remote AccessRemote Access
Remote Access
 

Más de APSU

Net essentials6e ch9
Net essentials6e ch9Net essentials6e ch9
Net essentials6e ch9
APSU
 
Chapter2.development of administrative law
Chapter2.development of administrative lawChapter2.development of administrative law
Chapter2.development of administrative law
APSU
 
Chapter1.admin law&adminagency
Chapter1.admin law&adminagencyChapter1.admin law&adminagency
Chapter1.admin law&adminagency
APSU
 
Chapter1
Chapter1Chapter1
Chapter1
APSU
 
Logi pp 1
Logi pp 1Logi pp 1
Logi pp 1
APSU
 
Unit 1
Unit 1Unit 1
Unit 1
APSU
 
Time management
Time managementTime management
Time management
APSU
 
Research
ResearchResearch
Research
APSU
 
21st century learner
21st century learner21st century learner
21st century learner
APSU
 
21st century learner
21st century learner21st century learner
21st century learner
APSU
 

Más de APSU (11)

Net essentials6e ch9
Net essentials6e ch9Net essentials6e ch9
Net essentials6e ch9
 
Chapter 9.access to judicial review
Chapter 9.access to judicial reviewChapter 9.access to judicial review
Chapter 9.access to judicial review
 
Chapter2.development of administrative law
Chapter2.development of administrative lawChapter2.development of administrative law
Chapter2.development of administrative law
 
Chapter1.admin law&adminagency
Chapter1.admin law&adminagencyChapter1.admin law&adminagency
Chapter1.admin law&adminagency
 
Chapter1
Chapter1Chapter1
Chapter1
 
Logi pp 1
Logi pp 1Logi pp 1
Logi pp 1
 
Unit 1
Unit 1Unit 1
Unit 1
 
Time management
Time managementTime management
Time management
 
Research
ResearchResearch
Research
 
21st century learner
21st century learner21st century learner
21st century learner
 
21st century learner
21st century learner21st century learner
21st century learner
 

Último

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Último (20)

Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

Net essentials6e ch12

  • 1. Guide to Networking Essentials, 6th Edition Chapter 12: Wide Area Network Essentials
  • 2. Copyright © 2012 Cengage Learning. All rights reserved. 2 Objectives 2 • Describe the fundamentals of WAN operation and devices • Discuss the methods used to connect to WANs • Configure and describe remote access protocols • Describe the three major areas of cloud computing
  • 3. Copyright © 2012 Cengage Learning. All rights reserved. 3 Wide Area Network Fundamentals • Internetworks and WANs can be described as two or more LANs connected together • Most obvious difference between internetworks and WANs is the distance between the LANs being connected. • They also differ in two other areas: – WANs use the services of carriers or service providers (phone companies and ISPs) for network connection – WANs use serial communication that can span miles compared to LAN technologies that span distances measured in hundreds of meters
  • 4. Copyright © 2012 Cengage Learning. All rights reserved. 4 WAN Devices • WANs operate at the Data Link and Physical layers (Layers 2 and 1) of the OSI model • Several types of devices are likely to be used in WANS for media access, signal transmission, and reception and to connect a WAN to a LAN: – Modems – Channel service units/data service units – Routers
  • 5. Copyright © 2012 Cengage Learning. All rights reserved. 5 Modems • A modem is a device that allows a computer (which works with digital signals) to communicate over lines that analog signals • A digital signal is a series of binary 1s and 0s represented by some type of signal that has two possible states (0v or 5v) • An analog signal varies over time continually and smoothly (transitions from 0v to 5v)
  • 6. Copyright © 2012 Cengage Learning. All rights reserved. 6 CSU/DSUs • A channel service unit/data service unit (CSU/DSU) is a device that creates a digital connection between a LAN device (router) and the WAN link from the service provider • The WAN link is usually a T-carrier technology, such as a T1 or T3 (discussed later) • Similar to a modem, only all signals are digital – Converts one type of digital signal to another type of digital signal
  • 7. Routers Copyright © 2012 Cengage Learning. All rights reserved. 7 • A router is responsible for getting packets from one network to another • In a WAN, it is usually the device connecting a LAN to the WAN service provider via a modem or CSU/DSU
  • 8. Copyright © 2012 Cengage Learning. All rights reserved. 8 WAN Connection Methods • Many WAN technologies are available and differ in speed, level of security and reliability, and cost • Four most common connection methods: – Circuit-switched – Leased line – Packet-switched – VPN over the Internet
  • 9. Copyright © 2012 Cengage Learning. All rights reserved. 9 Circuit-Switched WANs • A circuit-switched WAN creates a temporary dedicated connection between sender and receiver on demand • Analog example: a phone line connection from the PSTN, also known as plain old telephone service (POTS) • Digital example: Integrated Services Digital Network (ISDN) • Not as common today due to faster technologies but still in use in some areas
  • 10. Copyright © 2012 Cengage Learning. All rights reserved. 10 Circuit-Switched WANs  Plain Old Telephone Service (POTS) – limited in bandwidth due to the digital-to-analog conversion that is performed, usually by modems  The conversion process degrades signal quality and limits data transfer speeds to about 56 Kbps  The most common modem standard for connecting to the Internet is V.92  V.92 modems use a technique called pulse code modulation (PCM) that digitizes analog signals and introduces less noise into the signal
  • 11. Circuit-Switched WANs Modem communication using the V.92 standard Copyright © 2012 Cengage Learning. All rights reserved. 11
  • 12. Copyright © 2012 Cengage Learning. All rights reserved. 12 Circuit-Switched WANs • Integrated Services Digital Network (ISDN) – a digital communication technology developed in 1984 to replace the analog phone system – Was not as popular as expected but can still be found in many US metropolitan areas and Western Europe – Defines communication channels of 64 Kbps – Two formats or rates: • BRI – Basic Rate Interface: consists of two B-channels (64 Kbps) and a D-channel (16 Kbps). B-channels are used for data transfer so BRI can operate at up to 128 Kbps • PRI – Primary Rate Interface (PRI): consists of 23 B-channels and a D-channel. Can provide up to 1.544 Mbps
  • 13. Copyright © 2012 Cengage Learning. All rights reserved. 13 Leased Lines • A leased line provides a dedicated point-to-point connection from the customer’s LAN through the provider’s network and the destination network – Provides permanent, secure, and dedicated bandwidth limited only by the provider’s technology and how much the customer is willing to spend • Most expensive WAN connectivity because it is dedicated • Should be considered: – When high quality, 24/7 access is needed – For mission-critical applications – When fast upstream as well as downstream communication is required
  • 14. Copyright © 2012 Cengage Learning. All rights reserved. 14 Leased Lines • Leased lines are based on one of two types of digital technology: T-carriers and SONET • T-carriers – Typical lines are T1 and T3 that operate at 1.544 Mbps and 44 Mbps, respectively – Derived from multiple 64 Kbps channels, making a T1 connection a grouping of 24 channels, and a T3 connection a grouping of 672 channels – Uses a signaling method called time division multiplexing (TDM): Allocates a time slot for each channel • If a portion of a T-carrier line is used for one purpose and a different portion for another purpose, the line has been fractionalized
  • 15. Copyright © 2012 Cengage Learning. All rights reserved. 15 Leased Lines • T-Carriers (cont.) – Multiplexing:enables several communication streams to travel simultaneously over the same cable segment – Require a CSU/DSU at each end of the link to convert the signals used by the T-carrier line into signals used by the LAN – T1 lines can use twisted-pair, coaxial or fiber-optic cabling – T3 lines can use coaxial or fiber-optic cabling – T1 lines are the most common WAN connection method in the US
  • 16. Leased Lines Copyright © 2012 Cengage Learning. All rights reserved. 16
  • 17. Copyright © 2012 Cengage Learning. All rights reserved. 17 Leased Lines • Synchronous Optical Network (SONET) – flexible, highly fault-tolerant technology that can operate at different capacities over fiber cabling • Typical SONET rates are OC-3 (155 Mbps), OC-12 (622 Mbps), OC-48 (almost 2.5 Gbps), OC-192, and OC-768 (used by large ISPs) • SONET networks can carry traffic from a variety of other network types, such as T-carrier and ATM • SONET uses a dual-ring topology (like FDDI), making it very fault-tolerant
  • 18. Copyright © 2012 Cengage Learning. All rights reserved. 18 Packet-Switched WANs • A packet-switched WAN does not create a dedicated connection between sender and receiver – Each packet is transmitted through the provider’s network independently (similar to LAN traffic) – Data shares bandwidth with your provider’s other customers – Most common packet-switched networks are: • X.25 • Frame relay • ATM • MPLS
  • 19. Copyright © 2012 Cengage Learning. All rights reserved. 19 Packet-Switched WANs • Virtual Circuits – a logical connection created between two devices in a shared network – No single cable exists between the two endpoints – Maps a path through the network of switches between two points – The pathway is created after sender and receiver agree on bandwidth requirements and request a pathway – Switched virtual circuit (SVCs): established when needed and then terminated when the transmission is completed – Permanent virtual circuit (PVCs): pathway between two communication points is established as a permanent logical connection (more expensive than SVCs)
  • 20. Copyright © 2012 Cengage Learning. All rights reserved. 20 X.25 Networks • Packet-switching technology developed in the mid-1970s running over older copper phone lines • Offer both SVCs and PVCs – although not all X.25 providers offer PVCs • Earlier X.25 could only operate at 64 Kbps – A 1992 specification revision improved the maximum throughput of X.25 to 2 Mbps, but the new version was not widely deployed • Even though X.25 offers reliable and error-free communications, this technology has been largely replaced by other higher-speed technologies
  • 21. Copyright © 2012 Cengage Learning. All rights reserved. 21 Frame Relay Networks • A PVC packet-switching technology that offers WAN communication over a fast, reliable digital link • Can maintain transmission rates from 64 Kbps to 44 Mbps (T3 speed) • Allows customers to specify the bandwidth needed – Charges depend on the PVC’s bandwidth allocation (known as Committed Information Rate [CIR]) – CIR is the guaranteed minimum transmission rate • Connection is established by using a pair of CSU/DSUs with a router or bridge at each end to direct traffic on and off the WAN link
  • 22. Frame Relay Networks Copyright © 2012 Cengage Learning. All rights reserved. 22
  • 23. ATM Networks • Asynchronous Transfer Mode (ATM) – high-speed network technology designed for both LAN and WAN use • ATM bandwidth can be as low as a few Mbps up to 622 Mbps, but the most common speed is 155 Mbps • Cell-based packet switching technology – Cells are of a fixed length rather than typical packet-based systems that use variable length packets – Fixed length cells can be switched more efficiently than variable length packets • ATM is used quite heavily for the backbone and infrastructure in large communications companies Copyright © 2012 Cengage Learning. All rights reserved. 23
  • 24. Multiprotocol Label Switching (MPLS) • MPLS runs over ATM, frame relay, SONET, and even Ethernet • Creates a connection-oriented virtual circuit using labels assigned to each packet – The label is used to make packet-forwarding decisions within the MPLS network, making it unnecessary to view the contents of the packet • Capable of supporting different Layer 3 protocols, it is currently used exclusively in IP networks – Supports both IPv4 and IPv6 Copyright © 2012 Cengage Learning. All rights reserved. 24
  • 25. WANs over the Internet • Using VPN connections over inexpensive Internet connections is becoming a popular WAN alternative • VPNs offer the following advantages over other WAN methods discussed: – Inexpensive: Cost of Internet access is much lower than leased lines or packet-switched WAN connections – Convenience: A VPN can be configured as soon as Internet access is established – Security: Advanced authentication and encryption protocols protect the integrity and privacy of VPN traffic – Flexibility: After a corporate VPN infrastructure is in place, it is available for WAN connections from branch offices as well as mobile users and telecommuters Copyright © 2012 Cengage Learning. All rights reserved. 25
  • 26. WAN Connections Methods Copyright © 2012 Cengage Learning. All rights reserved. 26
  • 27. WAN Equipment • Customer Equipment – Customer Premises Equipment (CPE): The equipment at the customer site that’s usually the responsibility of the customer – Customer might own or lease the equipment from the provider – Usually includes routers, modems and CSU/DSUs – The demarcation point is the point at which the CPE ends and the provider’s responsibility begins (where the WAN connection is made) Copyright © 2012 Cengage Learning. All rights reserved. 27
  • 28. Copyright © 2012 Cengage Learning. All rights reserved. 28 WAN Equipment • Provider Equipment – The provider location nearest the customer site is usually referred to as the central office (CO) – Media (usually coax or fiber) runs from the customer site demarcation point to the CO of the WAN service provider – The connection between the demarcation point and the CO is called the local loop or last mile
  • 29. WAN Equipment • Going the Last Mile – The device that sends data to the local loop is called the data circuit-terminating equipment (DCE): The CSU/DSU or modem – The device that passes data from the customer LAN to the DCE is called the data terminal equipment (DTE): Router or bridge that has one connection to the customer LAN and another connection to the DCE that makes the WAN connection Copyright © 2012 Cengage Learning. All rights reserved. 29
  • 30. WAN Equipment A WAN connection showing the CPE, demarcation point, and local loop Copyright © 2012 Cengage Learning. All rights reserved. 30
  • 31. Remote Access Networking • Windows server OSs include the Routing and Remote Access Service (RRAS) that supports both dial-up remote access and VPN remote access • Users can dial in over POTS or use a VPN from any type of Internet connection Copyright © 2012 Cengage Learning. All rights reserved. 31
  • 32. Making a VPN Connection in Windows • In Windows 7, you create a new connection from the Network and Sharing Center by selecting “Set up a new connection or network” • This will start the “Set Up a Connection or Network Wizard” Copyright © 2012 Cengage Learning. All rights reserved. 32
  • 33. Making a Dial-Up Connection • All versions of Windows, starting with Windows 95, include Dial-Up Networking (DUN) software to make an RRAS connection • The protocol used is Point-to-Point Protocol (PPP) and is used to carry a variety of protocols over different types of network connections • Two protocols that are integral to PPP: – Link Control Protocol (LCP): Sets up the PPP connection and defines communications parameters and authentication protocols – Network Control Protocol (NCP): Encapsulates higher layer protocols such as IP and provides services such as dynamic IP addressing Copyright © 2012 Cengage Learning. All rights reserved. 33
  • 34. Remote Access Networking via the Web • Another remote access model is remote control of the desktop of your office computer using a Web browser • Several online services connect your Web browser to your desktop, including LogMeIn and GoToMyPC – A client component is installed on your computer and then log on to the online service which connects you – Uses authentication and encryption to maintain a secure connection • Third party software can also be used – Microsoft’s Terminal Services Gateway (TSG) allows remote connections by using SSL, the protocol that secures communication between Web browsers and Web servers Copyright © 2012 Cengage Learning. All rights reserved. 34
  • 35. Cloud Computing • Cloud computing is a computer networking model in which data, applications, and processing power are managed by servers on the Internet, and users of resources pay for what they use rather than for the equipment and software needed to provide the resources • Benefits: – Reduced physical plant costs – Reduced upfront costs – Reduced personnel costs Copyright © 2012 Cengage Learning. All rights reserved. 35
  • 36. Cloud Computing • There are three primary categories of cloud computing: – Hosted applications – Hosted platforms – Hosted infrastructure Copyright © 2012 Cengage Learning. All rights reserved. 36
  • 37. Hosted Applications • Hosted applications are also referred to as on-demand applications or software as a service (SaaS) • Usually offered as a subscription based on the number of users • Customers can take advantage of new software editions much faster • Available anywhere the customer has a connection to the Internet • Most well-known example is Google Apps Copyright © 2012 Cengage Learning. All rights reserved. 37
  • 38. Hosted Platforms • Hosted platform or platform as a service (PAAS) – A customer develops applications using the service providers development tools and infrastructure – Once developed, the applications can be delivered to the customer’s users from the provider’s servers – Most common hosted platforms available are Force.com’s Apex, Azure for Windows, Google’s AppEngine for Phython and Java, WaveMaker for Ajax, and Engine Yard for Ruby on Rails Copyright © 2012 Cengage Learning. All rights reserved. 38
  • 39. Hosted Infrastructure • Hosted infrastructure or infrastructure as a service (IaaS) allows a company to use storage or entire virtual servers • If a customer needs another 100 GB of space, they can pay for the space without worrying about how that space is actually provided • If a customer needs another server they pay for the amount of processing and storage the additional server actually requires • Customers rent the resources they are using Copyright © 2012 Cengage Learning. All rights reserved. 39
  • 40. Copyright © 2012 Cengage Learning. All rights reserved. 40 Chapter Summary • The most obvious difference between internetworks and WANs is the distance between the LANs being connected • Several types of devices are likely to be used in WANs for media access, signal transmission, and reception and to connect a WAN to a LAN: Modems, CSU/DSU, and Routers • The methods used to make a WAN connection often dictate the technologies that can be used and the connection’s properties. The four most common are circuit-switched, leased line, packet-switched, and VPN over the Internet
  • 41. Copyright © 2012 Cengage Learning. All rights reserved. 41 Chapter Summary • WAN equipment can be categorized into customer equipment, provider equipment, and the circuit that makes the connections between the demarcation point and the central office; called the last mile or local loop • Large and small businesses alike are leveraging fast, affordable remote access technologies that allow employees to access their office desktops and corporate resources from home and on the road
  • 42. Chapter Summary • Cloud computing is a computer networking model in which data, applications, and processing power are managed by servers on the Internet, and users pay for what they use rather than for the equipment and software needed to provide the resources • There are three primary categories of cloud computing: hosted applications, hosted platforms, and hosted infrastructure Copyright © 2012 Cengage Learning. All rights reserved. 42