Chapter Fourteen Working with Remote Access. Objectives Examines some protocols that allows a user to log onto the network from far away Examines some.

Slides:



Advertisements
Similar presentations
S4C4 PPP. Protocols Point to Point Protocol Link Control Protocol Network Control Program Password Authentication Protocol Challenge Handshake Authentication.
Advertisements

1 Data Link Protocols Relates to Lab 2. This module covers data link layer issues, such as local area networks (LANs) and point-to-point links, Ethernet,
Point-to-Point Protocol
WAN Technologies Dial-up modem connections Cheap Slow
1 Chapter Overview Using Remote Connections SLIP and PPP WAN Technologies.
1 Chapter 12 Remote Network Access Using Remote Connections SLIP and PPP WAN Technologies.
Circuit Switching Blocking occurs when the network is unable to connect to stations because all possible paths between them are already in use. Non-blocking.
Semester 4 - Chapter 4 – PPP WAN connections are controlled by protocols In a LAN environment, in order to move data between any two nodes or routers two.
1 © 2004, Cisco Systems, Inc. All rights reserved. WAN Technologies Based on CCNA 4 v3.1 Slides Compiled & modified by C. Pham.
Semester 4 - Chapter 5 – ISDN Overview There are many types of WAN technologies that can be used to solve the problems of users who need network access.
PPP (Point to Point protocol).  On WAN connection, the protocol depends on the WAN technology and communicating equipment:  Examples:  HDLC –  The.
Network+ Guide to Networks, Fourth Edition Chapter 7 WANs, Internet Access, and Remote Connectivity.
TDC 461: Wide Area Network Services DePaul University 22 May, 2001.
WANs and Remote Connectivity
Remote Networking Architectures
Understanding Wide Area Networks Lesson 7. Objectives Skills/ConceptsObjective Domain Description Objective Domain Number Understanding routingUnderstanding.
Module 11: Supporting Remote Users. Overview Establishing Remote Access Connections Connecting to Virtual Private Networks Configuring Authentication.
WAN Networking Protocols 1 WAN Connection Types Share bandwidth Frame Relay and X.25 56Kbps to 2.048Mps Point-to-Point connection No setup before transmission.
Selecting a WAN Technology Lecture 4: WAN Devices &Technology.
 It defines the format of the frame to be exchanged between devices.  It defines how two devices can negotiate the establishment of the link and the.
PPP (Point to Point Protocol)
Table Of Contents Introduction What is WAN? Point to Point Links Circuit Switching Packet Switching WAN Virtual Circuits WAN Dialup Services WAN Devices.
Chapter 13 WAN Technologies and Routing. LAN Limitations Local Area Network (LAN) spans a single building or campus. Bridged LAN is not considered a Wide.
1 Wide Area Network. 2 What is a WAN? A wide area network (WAN ) is a data communications network that covers a relatively broad geographic area and that.
Wide Area Networks (WANs)
Section 8.1 Explain the role of carriers in WAN transmissions Compare and contrast DUN and VPN connections Explain the benefits of circuit switching Describe.
Network+ Guide to Networks, Fourth Edition Chapter 7 WANs, Internet Access, and Remote Connectivity.
IT in Business Enterprise and Personal Communications Networks Lecture – 07.
Chapter 7 WANs, Internet Access, and Remote Connectivity Network+ Guide to Networks, Fourth Edition.
Network Access and Transmission Methods Chapter 10.
Wide Area and Large-Scale Networks
Chapter 7 WANs and Remote Connectivity. WAN Essentials A WAN traverses a large geographic area A WAN link is a connection from one site to another and.
WAN Technologies Dial-up modem connections
Chapter Objectives At the end of this chapter you will be able to: Describe standardisation in the data communications area Describe the following technologies:
CCNA Guide to Cisco Networking
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Implementing Enterprise WAN Links Introducing Routing and Switching in the Enterprise – Chapter.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 4 v3.0 Module 2 WAN Technologies Cisco Networking Academy.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Implementing Enterprise WAN Links Introducing Routing and Switching in the Enterprise.
Chapter Objectives At the end of this chapter you will be able to: Describe the following technologies: ISDN, PPP, Modem, XDSL and ATM.
Point to Point Protocol
Introduction to WAN Technologies
Chapter 7 Low-Level Protocols
Robert E. Meyers CCNA, CCAI Youngstown State University Cisco Regional Academy Instructor Cisco Networking Academy Program Semester 4, v Chapter.
1 Pertemuan 16 WAN Technologies Overview. Discussion Topics WAN technology WAN devices WAN standards WAN encapsulation Packet and circuit switching WAN.
WANs and Remote Connectivity
Chapter 7 Ben Bielskis WAN Wide Area Network Connects LANs over a large geographical area. WAN Link – A connection from one site to another.
Networks and Protocols CE Week 5b. WAN’s, Frame Relay, DSL, Cable.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
11.59 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
Hands-On Microsoft Windows Server Introduction to Remote Access Routing and Remote Access Services (RRAS) –Enable routing and remote access through.
Networks and Protocols CE Week 5a. WAN’s and ISDN.
William Stallings Data and Computer Communications
Wide Area Networks (WAN) Terms that are commonly used by service providers: Customer premises equipment (CPE) Equipment that’s owned by the subscriber.
Point to Point connections
Unit 10 WANs Chapters NT2640.U10.PS1
WAN Transmission Media
Lecture 1: Introduction to WAN
Chapter 8 Wide Area Networks. Announcements and Outline Announcements Outline 8.1 Introduction 8.2 Services 8.21 Circuit-Switched Networks 8.22 Dedicated-Circuit.
CIS 173 Networking Week #13 Objectives Grade Homework Chapter #10 Lecture Chapter #12.
Data Link Protocols Relates to Lab 2.
Computer Engineering and Networks, College of Engineering, Majmaah University Mohammed Saleem Bhat CEN-444 Networks Structure And Protocols.
Virtual Circuit Networks: Frame Relay And ATM UNIT 5 Chapter 18 Forouzan.
Point-Point Protocol (PPP) by William F. Widulski.
Top-Down Network Design Chapter Eleven Selecting Technologies and Devices for Enterprise Networks Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Chapter 7 Introducing Wide-Area Networks
PPP Protocol.
PPP Protocol.
Section 8.1 Explain the role of carriers in WAN transmissions
PPP PROTOCOL The First semester
PPP Protocol.
Presentation transcript:

Chapter Fourteen Working with Remote Access

Objectives Examines some protocols that allows a user to log onto the network from far away Examines some different options for connecting remotely Looks at some different carrier options Learns to configure a machine for RAS or DUN

Remote Access Protocols Making a remote connection is similar as any other network connection. You need proper protocol: – PPP – PPTP – RDP and ICA

The Point-to-Point Protocol An early protocol that supported dial-up networking or ISDN connections – Based on the Serial Line IP protocol of the dark ages of computing PPP is a layed protocol which is broken down into three layers – Link Control Protocol – Network Control Protocol – IP Control Protocol

The Point-to-Point Protocol LCP provides the end-to-end services. It handles the tasks of establishing the connection, exchanging configuration information, and monitoring the connection while it exists. NCP transports the data being sent by specific networking suites, such as TCP/IP or IPX/SPX. IPCP allows for IP packets to be transmitted over a PPP connection.

Services Provided by PPP There are several services provided by PPP – Address notification – Authentication – Link monitoring – Multiple protocol support

Services Provided by PPP Address notification allows a sever to dynamically provide a remote client with TCP/IP configuration that exists only for that specific connection. Once the connection is released, so is the IP configuration.

Authentication in PPP Authentication is provided through one of two authentication protocols: – The Password Authentication Protocol (PAP) Two-way handshake The machine attempting to log on will transmits user credentials in plain text. That information is compared to the security database on the machine being logged on to. PAP has a few weak points. The most significant weak is too easy to be hacked.

Authentication in PPP – Challenge Handshake Protocol (CHAP) Three-way handshake When CHAP is first configured on a client, the server provides it with a string of code, known as secret. The server keeps a database of the secrets it has assigned. The secret is used to verify the client during the authentication process and is linked to user ID and password. Administrator can limit the number of failed challenges. CHAP still sends its information in plain text.

Point-to-Point Tunneling Protocol Provides for encrypted authentication and data transfer Can encapsulate upper layer protocols such as IP or IPX for transmission. On the receiving end, the data is stripped from the packets, unencrypted, and reassembled. PPTP is used by virtual private network (VPN)

RDP and ICA Both are thin-client protocols. – All applications and data are processed on remote server. – Only screenshots of the results move across the wire. Remote Desktop Protocol (RDP) was developed by Microsoft for NT Terminal Server and Windows 2000 server editions. Independent Computing Architecture (ICA) is a Citrix protocol which is nearly identical to RDP.

Circuit Switching vs. Packet Switching In a LAN, you have control over the entire process. In a WAN, you have to use service provided by the third party.

Remote Connection Options The different services from the third party will come in one of two basic forms: Circuit switching: Make a true physical connection from sender to receiver. This is what happens in traditional telephone systems. Packet switching: (1) Split any data (i.e. message) into small packets, (2) route those packets separately from sender to receiver, and (3) assemble them again.

Circuit Switching Options Circuit switching is primarily the domain of voice communication. This is because in voice communication, having the packets arrive in sequence is critical to the quality of the connections. There are two telecommunication options: – PSTN Public Switched Telephone Network – Makes use of a modem – Limited to 53.3Kb/s – ISDN Integrated Services Digital Network

PSTN PSTN also known as POTS (plain old telephone service). – You need a modem to convert your computer signal from digital to analog. – This analog signal is converted back to the digital signal at the telecommunication switch center.

ISDN Options ISDN signal is digital from end to end. ISDN consists of at least two data channels (B channels) and one channel for control data (D channel). – Basic rate ISDN ( BRI ) is two 64K B channels and one 16K D channel. – Primary rate ISDN (PRI) gives you up to twenty-three 64K B channels and one 64K D channel.

ISDN Connection How you interconnect your system to the ISDN line will be determined by your location – In U.S., the U interface is used. The U interface only supports a single device, and that device is Network Termination-1 (NT1) – The NT1 will convert the incoming two-wire circuit to a four-wire S/T interface. The S/T interface provide up to seven devices to access. – In order to connect to the telephone line, you need a Terminal Adapter (TA), such as modem to connect your computer to ISDN network

Packet Switching Options The majority of the telecommunication network is done by way of packet-switching technologies. – Cellular Digital Packet Data (CDPD) – General Packet Radio Service (GPRS) – WCDMA/3G – Bluetooth – Frame Relay – ATM – Sonet/SDH

T-lines and E-lines Digital Trunk Line (T1) is used to solve two problems: – More calls can be made over a single twisted pair – Increase the transmission distance with several repeater T1 lines combine 24 64K digital channels and sends them over the a single carrier in frames. Each frame consists of one 8-bit voice sample for each of the 24 channels plus one single framing bit which makes a 193-bit frame. The throughput for T1 is 8000 x 193 = Mb/s

T-lines and E-lines Fractional T1 is any combination of multiple 64K channels that do not kill an entire T1 line. – The Europe had a different vision, called the E1 line

T-lines and E-lines In order to connect to T1 network, you need to install a channel service unit/data service unit (CSU/DSU) – CSU transmits and receives signals from the WAN interface – DSU takes those 193-bit frame and converts them into a frame your computer can recognize.

Frame Relay It is based on the HDLC protocol. Data is moves over the wire using HDLC frames Error correction is only done at end points. – Relay devices are not involved in error maintenance. Since error correction is done at the end points of the link, an intermediate device simply reads the frame deep enough to extract addressing information. As soon as it has that, the frame is on its way to the next stop. As a result, there is extremely low latency.

Frame Relay With Frame relay, you can choose either a Virtual Circuit (VC) or a Permanent Virtual Circuit (PVC) – With VC, when a session is first established, the service provider’s equipment will determine the best route and create a path from point A to point B – With PVC, a leased line is dedicated for you as long as you subscribe. With Frame Relay, if your bandwidth exceeds your committed information rate (CIR), the discharge eligibility (DE) is set to 1. If the network is congested, this frame will be discarded.

FDDI A data link protocol that provides up to 100Mb/s throughput Requires a dedicated line to be run Requires a long-term commitment

Asynchronous Transfer Mode (ATM) High-speed fiber backbone Protocol independent Transmits data in 53-byte packets – First 5 bytes are header information – 48 bytes are payload. Provides speeds up to 622Mb/s ATM is a connection-oriented service

Asynchronous Transfer Mode (ATM) ATM has 5 layers: – Application -  similar to OSI application layer – High-Level Protocols –>agreement on the protocol – Adaptation layer provides end-to-end service, sequencing of packets, error detection and correction, and synchronization – ATM layer sets up and maintains the connections – Physical layer  similar to OSI physical layer

Sonet/SDH Synchronous Optical Network (SONET) and Synchronous Digital Hierarchy (SDH) are very similar technologies. They are physical layer protocol. Provides speeds of 155Mb/s and 2.5Gb/s Mixes multiple protocols into a single carrier using time division multiplexing A protection ring acts as a backup in case the primary ring fails The core architecture of the Internet

Sonet/SDH SONET network will be divided into three separate regions: – Local collector ring provide access to the individual subscriber – Regional network provide service to single service provider – Broadband backbone moves data over the pipeline

Sonet/SDH Optical carrier level (OCx) is used to define throughput. OC1 represents the base rate of Mb/s

Making the Connection Dial-up networking – In My Computer in WIN9x – Network and dial-up connections in WIN2K and later – Dial-up uses PPP protocol Virtual private networks – PPTP provides higher security – Allows a user to access a remote network over the Internet Remote access services – Allows a network administrator to manage remote access on the server level