WAN Technologies Dial-up modem connections

Slides:



Advertisements
Similar presentations
Networking at Home and Abroad
Advertisements

CP Networking1 WAN and Internet Access. CP Networking2 Introduction What is Wide Area Networking? What is Wide Area Networking? How Internet.
Securing Remote PC Access to UNIX/Linux Hosts with VPN or SSH Charles T. Moetului WRQ, Inc. (206)
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
SCSC 455 Computer Security Virtual Private Network (VPN)
WAN Technologies Dial-up modem connections Cheap Slow
1 Chapter Overview Using Remote Connections SLIP and PPP WAN Technologies.
1 Chapter 12 Remote Network Access Using Remote Connections SLIP and PPP WAN Technologies.
1 IP VPN Nikolay Scarbnik. 2 Agenda Introduction………………………………………………………….3 VPN concept definition……………………………………………..4 VPN advantages……………...…………………………………….5.
Network+ Guide to Networks, Fourth Edition Chapter 7 WANs, Internet Access, and Remote Connectivity.
Internet Protocol Security (IPSec)
WANs and Remote Connectivity
Network Address Translation, Remote Access and Virtual Private Networks BSAD 146 Dave Novak Sources: Network+ Guide to Networks, Dean 2013.
1 © J. Liebeherr, All rights reserved Virtual Private Networks.
VPN TUNNELING PROTOCOLS PPTP, L2TP, L2TP/IPsec Ashkan Yousefpour Amirkabir University of Technology.
Module 11: Supporting Remote Users. Overview Establishing Remote Access Connections Connecting to Virtual Private Networks Configuring Authentication.
Introduction to Computer Networks Introduction to Computer Networks.
Selecting a WAN Technology Lecture 4: WAN Devices &Technology.
Chapter 8 Wide Are Networking (WAN) Concepts –Packetizing –Multiplexing Switching Transmissions Services Selection.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 23 Virtual Private Networks (VPNs)
Windows Server 2008 Chapter 9 Last Update
Networking Technologies
Network+ Guide to Networks, Fourth Edition Chapter 7 WANs, Internet Access, and Remote Connectivity.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
Chapter 7 WANs, Internet Access, and Remote Connectivity Network+ Guide to Networks, Fourth Edition.
Wide Area and Large-Scale Networks
Chapter 7 WANs and Remote Connectivity. WAN Essentials A WAN traverses a large geographic area A WAN link is a connection from one site to another and.
1. Collision domains are unsecure 2. The employees often need to remote access to corporate network resources  The Internet traffic is much more vulnerable.
1/28/2010 Network Plus Unit 4 - Section 1 Wide Area Network Technologies.
Virtual Private Network (VPN). ©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential “ If saving money is wrong, I don’t want.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
WANs and Remote Connectivity
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 4 v3.0 Module 2 WAN Technologies Cisco Networking Academy.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
VPN Protocol What is a VPN? A VPN is A network that uses Internet or other network service to transmit data. A VPN includes authentication and.
Communication Services Communication Services: –Problem: This chapter expands on topics introduced in earlier chapters related to long-distance communication.
1 Pertemuan 16 WAN Technologies Overview. Discussion Topics WAN technology WAN devices WAN standards WAN encapsulation Packet and circuit switching WAN.
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
WANs and Remote Connectivity
Intro to WAN VCC Semester 4, Chapter 2. Service providers Central Office (CO): Each telephone connects to a single point called a CO. Local Loop.
Chapter 7 Ben Bielskis WAN Wide Area Network Connects LANs over a large geographical area. WAN Link – A connection from one site to another.
Networks and Protocols CE Week 5b. WAN’s, Frame Relay, DSL, Cable.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Virtual Private Network (VPN) Topics Discussion What is a VPN? What is a VPN?  Types of VPN  Why we use VPN?  Disadvantage of VPN  Types of.
Huda AL-Omair_ networks61 Wide Area Network. Huda AL-Omair_ networks62 What is a WAN? Wide area network or WAN is a computer network covering a wide geographical.
11.59 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
Examining Network Protocols. Overview Introduction to Protocols Protocols and Data Transmissions Common Protocols Other Communication Protocols Remote.
Hands-On Microsoft Windows Server Introduction to Remote Access Routing and Remote Access Services (RRAS) –Enable routing and remote access through.
Network access security methods Unit objective Explain the methods of ensuring network access security Explain methods of user authentication.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
Networks and Protocols CE Week 5a. WAN’s and ISDN.
WAN and Remote Access Technologies Chapter 7. Topics WAN Technologies: Internet Access Technologies Remote Access Protocols and services Connections to.
WAN and Remote Access Technologies
©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential outline What is a VPN? What is a VPN?  Types of VPN.
Presented By: Gavin Worden Leased Lines vs. Internet Based VPNs.
WAN Transmission Media
Network Access for Remote Users Dr John S. Graham ULCC
Remote Access and Long-Distance Communications. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Typical Telephone.
Chapter 8 Wide Area Networks. Announcements and Outline Announcements Outline 8.1 Introduction 8.2 Services 8.21 Circuit-Switched Networks 8.22 Dedicated-Circuit.
CIS 173 Networking Week #13 Objectives Grade Homework Chapter #10 Lecture Chapter #12.
Computer Engineering and Networks, College of Engineering, Majmaah University Mohammed Saleem Bhat CEN-444 Networks Structure And Protocols.
Virtual Private Networks
Virtual Private Networks
IPSec VPN Chapter 13 of Malik.
Ken Gunnells, Ph.D. - Networking Paul Crigler - Programming
Virtual Private Networks (VPN)
Topic 12: Virtual Private Networks
Presentation transcript:

WAN Technologies Dial-up modem connections Cheap Slow A phone line, a modem at each end Integrated Services Digital network (ISDN) Higher cost Faster A special phone line WAN & Remote Access

WAN Technologies T-carrier lines Interface standards High-speed lines Basic Rate Interface (BRI) Uses three separate channels Two bearer channels of 64Kbps carrying the voice/data A delta channel of 16Kbps for signaling Primary Rate Interface (PRI) Uses 23 bearer channels of 64kbps for data/voice Uses one 64kbps delta channel for singaling T-carrier lines High-speed lines Can be leased from telephone companies Are often used to create private networks WAN & Remote Access

WAN Technologies Four types T1 Offers speed of 1.544Mbps Connects LANS Uses 96 64Kbps B channels T3 Offers speed of 44.736Mbps Uses 672 64Kbps B channels T4 Offers speed of 274.176Mbps Uses 4,032 64Kbps B channels WAN & Remote Access

WAN Technologies Fiber Distributed Data Interface (FDDI) Uses fiber-optic cable Uses token-passing media access Dual-ring for redundancy and fault tolerance Reaches 100Mbps at distance of two kilometers Asynchronous transfer Mode (ATM) Packet-switching technology Use fixed-length packets of 53bytes Provides speeds from 1.544Mbps to 622Mbps Circuit-based network technology Switched virtual circuits (SVCs) Permanent virtual circuits (PVCs0 WAN & Remote Access

WAN Technologies X.25 Frame relay SONET/OC-x levels Packet-switching Only 56Kbps Frame relay Packet-switching technology Uses variable-length packets Offers speeds starting at 56kbps SONET/OC-x levels Bell Communication Research developed SONET Optical Carrier (OC) levels OC-1 51.84Mbps OC-3 155.52Mbps OC-12 622.08Mbps OC-24 1.244Gbps OC-48 2.488Gbps OC-192 9.953Gbps WAN & Remote Access

Security protocols Secure Sockets layer (SSL) SSH IP Security (IPSec) Server authentication Client authentication Encrypted connections SSH IP Security (IPSec) Created by IETF Works on both IPv4 and IPv6 Provides three key security services Integrity hash algorithm applied to key + IP datagram Confidentiality Standard symmetric encryption algorithms Private transactions, again denial of service attack Sliding window and sequence number WAN & Remote Access

Security protocols Operates at the network layer Two modes: Protocols Can secure practically all TCP/IP related communications Two modes: Transportation | IP | AH | TCP | DATA | Tunnel | New IP | AH | IP | TCP | DATA| Protocols Authentication Header (AH) Encapsulated Security Payload (ESP) Internet key exchange (IKE) protocol Authentication of the peers and the exchange of the symmetric keys. WAN & Remote Access

Security protocols Point to point Tunneling protocol (PPTP) Creates a secure transmission tunnel between two points on a network Creates multi-protocol Virtual Private Network(VPNs) Requires to establish a PPTP session using port 1723 Layer 2 Forwarding (L2F) Developed by Cisco Allows tunneling to be utilized Layer 2 Tunneling Protocol (L2TP) Is a combination of PPTP and Cisco’s L2F technology Authenticates the client in two-phase process Computer User Operates at the data-link layer WAN & Remote Access

Security protocols The advantages of PPTP and L2TP PPTP L2TP More interoperability Easier to configure Less overhead L2TP greater security common public key infrastructure technology header compression WAN & Remote Access

Security protocols Kerberos Network authentication protocol Ensure the authentication data is encrypted Default authentication method for Windows 2000 and Windows XP WAN & Remote Access

Configuring remote connectivity Physical connections Public switched telephone network (PSTN) A modem The plain old telephone system (POTS) Integrated Services Digital Network (ISDN) Digital signals Cable Broadband internet access over TV cable DSL Broadband offering from telecom companies Satellite WAN & Remote Access

Remote access protocols Remote Access Service (RAS) Is a Windows Solution Any client with dial-in protocols can connect to RAS Uses SLIP and PPP as underlying technologies SLIP PPP Point to point Tunneling protocol (PPTP) WAN & Remote Access

Configuring remote connectivity Protocols Data link layer PPP SLIP PPPoE Network-layer and transport-layer protocols TCP/IP IPX/SPX WAN & Remote Access

VPN (not a Network+ Objective) What is a virtual private network (VPN)? Allows two or more private networks to be connected over a publicly accessed network. Can be build over ATM, frame relay, X.25, IP-based network, etc. Have save security and encryption features as a private network. Encryption Authentication Network tunneling IPSec, PPTP, L2TP WAN & Remote Access

VPN How to choose a VPN? Leased line? Managed VPN? Implement your own VPN? Outsource? Check the service provided vs. required? Service level agreement can be tricky 99.999% connectivity No guarantee once the packet crosses over to another ISP Encryption level Site to site VPN Performance, security and manageability Remote user to LAN Easy of use WAN & Remote Access

VPN How a virtual private network works Traffic reach the network backbone using T1, frame relay, ISDN, ATM, dial-up Reach a tunnel initiating device, which communicate with a VPN terminator to agree on an encryption scheme. The tunnel initiator then encrypt the package before transmitting to the terminator Terminator decrypts the packet and delivers it to the appropriate destination on the network. WAN & Remote Access

VPN The advantage of a VPN Cost savings Secure Quick to implement No longer to purchase expensive leased lines Flexibility for growth Reduce long-distance telephone charges Call local number of server provider’s access point Reduce support burden Equipment costs – modem, remote access server, wan equipment, etc Switch to another provider for a better price Secure Quick to implement WAN & Remote Access