Module 2 WAN Technologies.

Slides:



Advertisements
Similar presentations
There are many types of WAN technologies that can be used to solve the problems of users who need network access from remote locations. We will go through.
Advertisements

M A Wajid Tanveer Infrastructure M A Wajid Tanveer
OSI Model Discuss the major influences of user requirements on network evolution Identify at least 3 reasons why the industry uses a layered network.
CP Networking1 WAN and Internet Access. CP Networking2 Introduction What is Wide Area Networking? What is Wide Area Networking? How Internet.
Cisco Semester 4 Chapter 2 WANS. Technologies Not Covered in Semester 4 DSL Cable Modem ATM SONET SMDS.
Circuit Switching Blocking occurs when the network is unable to connect to stations because all possible paths between them are already in use. Non-blocking.
Connecting to Remote Networks © 2004 Cisco Systems, Inc. All rights reserved. Understanding WAN Technologies INTRO v2.0—7-1.
WANs.
1 © 2004, Cisco Systems, Inc. All rights reserved. WAN Technologies Based on CCNA 4 v3.1 Slides Compiled & modified by C. Pham.
Semester 4 - Chapter 5 – ISDN Overview There are many types of WAN technologies that can be used to solve the problems of users who need network access.
Institute of Technology, Sligo Dept of Computing WANs Semester 4 Chapter 2.
LAN Risanuri Hidayat. LAN-Local Area Network A LAN is a high-speed data network that covers a relatively small geographic area. It typically connects.
Semester 4 - Chapter 3 – WAN Design Routers within WANs are connection points of a network. Routers determine the most appropriate route or path through.
WAN Technologies. Objectives WAN Technologies Overview WAN Technologies WAN Design.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 4 v3.1 Module 2 WAN Technologies.
Data Communications and Networks Chapter 2 - Network Technologies - Circuit and Packet Switching Data Communications and Network.
Table Of Contents Introduction What is WAN? Point to Point Links Circuit Switching Packet Switching WAN Virtual Circuits WAN Dialup Services WAN Devices.
CHABOT COLLEGE CISCO NETWORKING ACADEMY Semester 4 Chapter 2 WANs.
1 Wide Area Network. 2 What is a WAN? A wide area network (WAN ) is a data communications network that covers a relatively broad geographic area and that.
Networking Technologies
Module 1 WANs and Routers.
Ch.1 – WANs and Routers CCNA 2 version 3.0 Rick Graziani Cabrillo College.
CISCO NETWORKING ACADEMY Chabot College ELEC Wide Area Network Introduction.
Chapter 7 WANs and Remote Connectivity. WAN Essentials A WAN traverses a large geographic area A WAN link is a connection from one site to another and.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Services in a Converged WAN Accessing the WAN – Chapter 1.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 4 v3.0 Module 2 WAN Technologies Cisco Networking Academy.
Sem 2v2 Chapter 2 Routers. Computers have four basic components: a CPU, memory, interfaces, and a bus. A router also has these components, therefore it.
Introduction to WAN Technologies
Robert E. Meyers CCNA, CCAI Youngstown State University Cisco Regional Academy Instructor Cisco Networking Academy Program Semester 4, v Chapter.
Intro to WAN VCC Semester 4, Chapter 2. Service providers Central Office (CO): Each telephone connects to a single point called a CO. Local Loop.
Networks and Protocols CE Week 5b. WAN’s, Frame Relay, DSL, Cable.
Ch.1 – WANs and Routers CCNA 2 version 3.0 Rick Graziani Cabrillo College.
Huda AL-Omair_ networks61 Wide Area Network. Huda AL-Omair_ networks62 What is a WAN? Wide area network or WAN is a computer network covering a wide geographical.
© Agilent Technologies Copyright 2000 H7211A+212, Rev. 2.0 Review of WAN Protocol Basics.
William Stallings Data and Computer Communications 7 th Edition Chapter 1 Data Communications and Networks Overview.
1 Version 3.1 Module 1 WANs and Routers. 2 Version 3.1 WANS WAN operates at the physical layer and the data link layer of the OSI reference model. Provide.
S4-Chapter 3 WAN Design Requirements. WAN Technologies Leased Line –PPP networks –Hub and Spoke Topologies –Backup for other links ISDN –Cost-effective.
WAN Technologies. 2 Overview Note: Most of this will be described in more detail in later chapters. Differentiate between a LAN and WAN Identify the devices.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Services in a Converged WAN Accessing the WAN – Chapter 1.
Networks and Protocols CE Week 5a. WAN’s and ISDN.
William Stallings Data and Computer Communications
Communication Networks - Overview CSE 3213 – Fall November 2015.
CSI-09 COMMUNICATION TECHNOLOGY WIDE AREA NETWORK (WAN) AUTHOR - V. V. SUBRAHMANYAM.
CCNA 4 v3.1 Module 2 WAN Technologies
Wide Area Networks (WAN) Terms that are commonly used by service providers: Customer premises equipment (CPE) Equipment that’s owned by the subscriber.
. Large internetworks can consist of the following three distinct components:  Campus networks, which consist of locally connected users in a building.
WAN TECHNOLOGY CONCEPTS 1 st semester nalhareqi©2015.
CSCI-235 Micro-Computer Applications The Network.
WAN Overview Honolulu Community College Cisco Academy Training Center Semester 2 Version 2.1.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Introduction to WANs Source: CCNA Exploration Accessing the WAN – Chapter.
Lecture 1: Introduction to WAN
 Introduction to Wide Area Networks 2 nd semester
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 4 v3.1 Module 2 WAN Technologies.
Data Link Protocols Relates to Lab 2.
Lecture # 2 WAN Technologies. Objectives  Define LAN and WAN and tell how they are used.  WAN Technologies Overview  WAN Technologies L.Rania Ahmed.
 Introduction to Wide Area Networks 2 nd semester
© 2007 – 2010, Cisco Systems, Inc. All rights reserved. Cisco Public ITE PC v4.1 Chapter 4 1 Chapter 3: Point-to- Point Connections Connecting Networks.
Virtual Circuit Networks: Frame Relay And ATM UNIT 5 Chapter 18 Forouzan.
Instructor Materials Chapter 1: WAN Concepts
Semester 4 Chapter 2 WANs By: Nisreen Otaky.
© 2002, Cisco Systems, Inc. All rights reserved.
Network planning and deployment
Introduction to Wide Area Networks
Semester 4 - Chapter 3 – WAN Design
Wide Area Network.
Introduction to Wide Area Networks
Chapter 1: WAN Concepts Connecting Networks
Lecture 1: Introduction to WAN
Sem 2v2 Chapter 2 Routers.
Presentation transcript:

Module 2 WAN Technologies

WAN Technology A Wide Area Network (WAN) is used to interconnect Local Area Networks (LANs) that are separated by a large geographical distance. A Wide Area Network predominately operates at the OSI physical and data link layers. The WAN provides a data path between routers and the LANs that each router supports.

MAJOR CHARACTERISTICS OF WANS The network operates beyond the local LAN’s geographic scope. It uses the services of carriers such as Regional Bell Operating Companies (RBOCs). WANs use serial connections of various types to access bandwidth over wide-area geographies. By definition, the WAN connects devices separated by wide areas.

WAN DEVICES INCLUDE: Routers that offer many services including internetworking and WAN interface ports. Switches that connect to WAN bandwidth for voice, data, and video communication. Modems that interface voice-grade services; Include channel service units/digital service units (CSU/DSU) that interface T1/E1 services; Terminal Adapters/Network Termination 1 (TA/NT1) that interface Integrated Services Digital Network (ISDN) services. Communication servers that concentrate dial-in and dial-out user communication. WANS use the OSI layered approach for encapsulation just like LAN's but are mainly focused on the physical and data link layers.

WAN Physical Layer WAN physical layer protocols describe how to provide electrical, mechanical, operational, and functional connections for wide-area networking services. These services are most often obtained from WAN service providers such as Regional Bell Operating Companies (RBOCs), alternate carriers, and Post, Telephone, and Telegraph (PTT) agencies.

WAN Data Link Protocols WAN data link protocols describe how frames are carried between systems on a single data path. They include protocols designed to operate over dedicated point-to-point, multipoint, and multi-access switched services such as Frame Relay.

WAN Standards WAN standards typically describe both physical layer delivery methods and data link layer requirements including addressing and flow control encapsulation

describes the interface between the data terminal equipment (DTE) and the data circuit- terminating equipment (DCE).

DTE & DCE DTE - data terminal equipment. Device at the user end of a user-network interface that serves as a data source, destination, or both. DTE connects to a data network through a DCE device (for example, a modem) and typically uses clocking signals generated by the DCE. DTE includes such devices as computers, routers, and multiplexers. DCE - Data communications equipment (EIA) or data circuit-terminating equipment (ITU-T). The devices and connections of a communications network that comprise the network end of the user-to-network interface. The DCE provides a physical connection to the network, forwards traffic, and provides a clocking signal used to synchronize data transmission between DCE and DTE devices. Ex: Modems and interface cards

The WAN data-link protocols describe how frames are carried between systems on a single path

The Data Link Layer: WAN Protocols High-Level Data Link Control (HDLC)—HDLC is an IEEE standard. It might not be compatible between different vendors because of the way each vendor has chosen to implement it. HDLC supports both point-to-point and multipoint configurations with minimal overhead Frame Relay - Frame Relay uses high-quality digital facilities. By using a simplified framing with no error correction mechanisms, Frame Relay can send Layer 2 information much more rapidly than these other WAN protocols. Point-to-Point Protocol - Described by RFC 1661. PPP contains a protocol field to identify the network-layer protocol. Integrated Services Digital Network (ISDN) - ISDN is a set of digital services that transmits voice and data over existing phone lines.

Wide Area Networking

The WAN Cloud An overview of the WAN cloud organizes WAN provider services into: Call setup service—Sets up and clears calls between telephone users. Also called signaling, call setup uses a separate telephone channel not used for other traffic. The most commonly used call setup is Signaling System number 7 (SS7). SS7 is an out-of-band signaling system for the exchange of call control information between network switching offices, in support of voice and nonvoice services

Time-division multiplexing (TDM) Information from many sources has bandwidth allocation on a single media. Circuit switching uses signaling to determine the call route, which is a dedicated path between the sender and the receiver. By multiplexing traffic into fixed time slots, TDM avoids congested facilities and variable delays. Basic telephone service and ISDN services use TDM circuits.

Time-division multiplexing (TDM) Transmits multiple signals simultaneously over a single transmission path. Each lower-speed signal is time sliced into one high-speed transmission. Example: Three incoming 1,000 bps signals (A, B and C) can be interleaved into one 3,000 bps signal (AABBCCAABBCCAABBCC). The receiving end divides the single stream back into its original signals.

When your organization subscribes to an outside WAN provider for network connections, the provider assigns your organization the rules for connecting WAN calls. Your organization makes connections to destinations as point-to-point calls.

Demarcation (or demarc)— The point at which the CPE ends and the local loop portion of the service begins. Often occurs at the Point of Presence (POP) of a building. Local loop (or “last-mile”) Cabling (usually copper wiring) that extends from the demarc into the WAN service provider’s central office.

Central office (CO) switch A switching facility that provides the nearest point of presence for the provider’s WAN service.

Toll network The collective switches and facilities (called trunks) inside the WAN provider’s cloud. The caller’s traffic may cross a trunk to a primary center, then go to a sectional center, and then to a regional- or international-carrier center as the call goes the long distance to its destination. Switches operate in provider offices with toll charges based on tariffs or authorized rates.

A key interface in the customer site occurs between the data terminal equipment (DTE) and the data circuit- terminating equipment (DCE). Typically, DTE is the router.

DCE is the device used to convert the user data from the DTE into a form acceptable to the WAN service’s facility. In the graphic, the DCE is the attached modem, channel service unit/data service unit (CSU/DSU) or Terminal Adapter/Network Termination 1 (TA/NT1).

Data communication over WANs interconnects DTEs so they can share resources over a wide area. The WAN path between the DTEs is called the link, circuit, channel, or line. The DCE primarily provides an interface for the DTE into the communication link in the WAN cloud. The DTE/DCE interface acts as a boundary where responsibility for the traffic passes between the WAN subscriber and the WAN provider.

DSU/CSU A pair of communicating devices that connect an in-house line to an external digital circuit (T1). It is similar to a modem, but connects a digital circuit rather than an analog one.

CSU Terminates the external line at the customer premises. Provides diagnostics and allows for remote testing. If the customer's communications devices are T1 ready and have the proper interface, then the CSU is not required, only the DSU.

DSU Does the actual transmission and receiving of the signal and provides buffering and flow control. DSU and CSU can be in the same unit. DSU may also be built into the multiplexor, (combines digital signals for high-speed lines).

Forms of WAN services with routers. The most common are: Switched or relayed services. Frame Relay ISDN (Integrated Services Digital Network) ATM (Asynchronous Transfer Mode) X.25 Peer Devices HDLC (High-level Data Link Control) PPP (Point-to-Point Protocol) DDR (Dial on Demand Routing) LAPB - point to point and X.25

Both Frame Rely and X.25 use the concept of virtual circuits

X.25 The first packet switched networks X.25 provides a connection-oriented technology for transmission over highly-error prone facilities. Error checking is performed at each node, which can slow overall throughput and and therefore would not make X.25 a choice for voice and video X.25 can be very cost effective because tariffs are based on the amount of data delivered rather than connection time or distance

Asynchronous Transfer Mode (ATM) Lower latency at higher bandwidths Data rates beyond 155 Mbps Cell-based rather than frame-based Cell are a fixed length of 53 bytes Also uses PVCs Less efficient because of the small size

Digital Subscriber Line (DSL) Uses existing telephone lines Uses multiple frequencies within the same physical medium to transmit data Bandwidth can vary Distance of the local loop is a factor – must be less than 3.5 miles

Cable Modem Two-way, high-speed data transmissions using the same coaxial lines that transmit cable television. Always on

WAN Frame Encapsulation Formats

Layer 2 Encapsulation Each WAN connection type uses a Layer 2 protocol to encapsulate traffic while it is crossing the WAN link. To ensure that the correct encapsulation protocol is used, you will need to configure the Layer 2 encapsulation type to use. The choice of encapsulation protocol depends on the WAN technology and the communicating equipment.

PPP Common for dialup single-user-to-LAN (dialup and ISDN) or LAN-to-LAN (router-to-router) access. PPP is standardized, so it supports vendor interoperability. It also supports the encapsulation of multiple upper-layer protocols including IP and IPX.

HDLC The Cisco default encapsulation type on point-to-point links. It is used typically when communicating with another Cisco device. If communicating with a non-Cisco device, synchronous PPP is a viable option. HDLC is normally proprietary between vendors.

LAPB (layer 2 of the X.25 protocol stack) For packet-switched networks, the LAPB protocol is used to encapsulate X.25 packets. It can also be used over point-to-point links, if the link is unreliable or there is an inherent delay associated with the link, such as in a satellite link. LAPB provides reliability and flow control on a point-to-point basis.

HDLC HDLC is Cisco’s default encapsulation for serial lines. This implementation is very streamlined. There is no windowing or flow control and only point-to-point connections are allowed (no multipoint). 2-byte proprietary type code is inserted after the control field, which means that HDLC framing is not interoperable with other vendors’ equipment.

WAN Design Basics

When leased line connections are made: a router port is required for each connection, along with a CSU/DSU and the actual circuit from the service provider. The cost of dedicated line solutions can become significant when deployed to connect many sites

Dedicated connectivity, also referred to as leased lines, provides full- time synchronous connections. Dedicated, full- time connectivity is provided by point-to-point serial links.

Network designs tend to follow one of two general design strategies: mesh hierarchical

Mesh structure Net topology is flat All routers perform essentially the same functions Usually no clear definition of where specific functions are performed. Expansion of the network tends to proceed in a haphazard, arbitrary manner.

Benefits to using a hierarchical model include the following: Hierarchical structure the network is organized in layers that each have one or more specific functions. Benefits to using a hierarchical model include the following: Scalability Ease of implementation Ease of troubleshooting Predictability Protocol support Manageability

The three-layer model consists of: core distribution access layers

Core layer - Provides fast wide-area connections between geographically remote sites, tying a number of “campus” networks together in a corporate or enterprise WAN. Core links are usually point-to-point, and there are rarely any hosts in the core layer. Core services are typically leased from a telecom service provider (for example, T1/T3, Frame Relay, SMDS, and so on).

Distribution layer - Refers to the distribution of network services to multiple LANs within a campus network environment. This layer is where the “campus backbone” network is found, typically based on Fast Ethernet. This layer is implemented on sites that are large and is used to interconnect buildings.

Access layer - Usually a LAN or a group of LANs, typically Ethernet or Token Ring, that provide users with frontline access to network services. The access layer is where almost all hosts are attached to the network, including servers of all kinds and user workstations.

The three layers are bounded by Layer 3 devices or other devices that provide separation into broadcast domains. Note: A three-layer model can usually meet the needs of most enterprise networks. However, not all environments require a full three-layer hierarchy—a one- or two-layer design may be adequate. Even in these cases, however, a hierarchical structure should be maintained.

The distribution layer would include the campus backbone with all its connecting routers. Because policy is typically implemented at this level, we can say that the distribution layer provides policy-based connectivity. Policy-based connectivity means that the layer 3 routers are programmed to only allow traffic on the campus backbone that the network manager has determined acceptable.

The access layer connects users into LANs, and LANs into campus backbones or WAN links. This approach enables designers to distribute services across the CPU’s of devices operating at this layer. The access layer allows logical segmentation of the network and the grouping of users based on a function.

The one-layer design is typically implemented where: Only a few remote locations in the company access to applications are mainly done via the local LAN to the site file server. Each site is its own broadcast domain.

In a two-layer design, a WAN link is used to interconnect separate sites. VLANs may be implemented to create separate logical networks without requiring additional routers. Inside the site multiple LANs may be implemented with each LAN segment being its own broadcast domain. Router becomes a concentration point for WAN links.

Remote sites can access the WAN core network using WAN technologies other than dedicated links. Frame Relay or ISDN are two such alternatives. If a remote site is small and has low demand for access to services in the corporate network, ISDN would be a logical choice for this implementation. Perhaps another remote site cannot get access to dedicate WAN links from their service provider but has access to Frame Relay. In either case an entry point needs to be established for these types of WAN connections in to the WAN core.

One of the advantages of hierarchical WAN design is it provides a method for controlling data traffic patterns by putting Layer 3 routing points throughout the network. Since routers have the ability to determine paths from the source host to destination hosts based on Layer 3 addressing, data traffic will flow up the hierarchy only as far as it needs to to find the destination host.

If Host A were to establish a connection to Host B, the traffic from this connection would travel to Router 1 and be forwarded back down to Host B. Notice that this connection did not require any traffic be placed on the link between Router 1 and Router 2, thus conserving the bandwidth on that link.

In a two-layer WAN hierarchy, the traffic patterns are still governed by host source and destination addresses and path determinations of the router. In this model again the traffic will only travel up the hierarchy as far as needed to get to the destination thus conserving bandwidth on other WAN links.

Module 2 WAN Technologies