Wide Area Network Chapter 15 powered by DJ 1. Chapter Objectives At the end of this Chapter you will be able to:  Describe different methods for connecting.

Slides:



Advertisements
Similar presentations
M A Wajid Tanveer Infrastructure M A Wajid Tanveer
Advertisements

CP Networking1 WAN and Internet Access. CP Networking2 Introduction What is Wide Area Networking? What is Wide Area Networking? How Internet.
Wide Area Networking. Overview Defining WAN Terms WAN Connection Types High-Level Data-Link Control Point-to-Point Protocol Frame Relay ISDN.
WAN Technologies Dial-up modem connections Cheap Slow
Cisco Semester 4 Chapter 2 WANS. Technologies Not Covered in Semester 4 DSL Cable Modem ATM SONET SMDS.
1 Chapter Overview Using Remote Connections SLIP and PPP WAN Technologies.
1 Chapter 12 Remote Network Access Using Remote Connections SLIP and PPP WAN Technologies.
Serial Connections Connections over a WAN rather than a LAN This chapter describes the Cisco proprietary HDLC protocol and the PPP protocol.
WANs.
1 © 2004, Cisco Systems, Inc. All rights reserved. WAN Technologies Based on CCNA 4 v3.1 Slides Compiled & modified by C. Pham.
Institute of Technology, Sligo Dept of Computing WANs Semester 4 Chapter 2.
Virtual Private Network
WAN Networking Protocols 1 WAN Connection Types Share bandwidth Frame Relay and X.25 56Kbps to 2.048Mps Point-to-Point connection No setup before transmission.
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
Data Communications and Networks Chapter 2 - Network Technologies - Circuit and Packet Switching Data Communications and Network.
Selecting a WAN Technology Lecture 4: WAN Devices &Technology.
Table Of Contents Introduction What is WAN? Point to Point Links Circuit Switching Packet Switching WAN Virtual Circuits WAN Dialup Services WAN Devices.
CHABOT COLLEGE CISCO NETWORKING ACADEMY Semester 4 Chapter 2 WANs.
1 Wide Area Network. 2 What is a WAN? A wide area network (WAN ) is a data communications network that covers a relatively broad geographic area and that.
IT in Business Enterprise and Personal Communications Networks Lecture – 07.
Network Access and Transmission Methods Chapter 10.
CISCO NETWORKING ACADEMY Chabot College ELEC Wide Area Network Introduction.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
WAN Technologies Dial-up modem connections
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Services in a Converged WAN Accessing the WAN – Chapter 1.
Copyright ©Universalinet.Com, LLC 2009 Implementing Secure Converged Wide Area Networks ( ISCW) Take-Aways Course 1: Cable (HFC) Technologies.
WAN Technologies Overview
CCNA Guide to Cisco Networking
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Implementing Enterprise WAN Links Introducing Routing and Switching in the Enterprise – Chapter.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 4 v3.0 Module 2 WAN Technologies Cisco Networking Academy.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Implementing Enterprise WAN Links Introducing Routing and Switching in the Enterprise.
Wide Area Networks(WANs) Lecture Week 2. Point-to-Point Protocol (PPP) Accessing the WAN.
Communication Services Communication Services: –Problem: This chapter expands on topics introduced in earlier chapters related to long-distance communication.
National Institute of Science & Technology Voice Over Digital Subscriber Line (VoDSL) Vinay TibrewalEE [1] VoDSL: Next Generation Voice Solution.
Introduction to WAN Technologies
Robert E. Meyers CCNA, CCAI Youngstown State University Cisco Regional Academy Instructor Cisco Networking Academy Program Semester 4, v Chapter.
1 Pertemuan 16 WAN Technologies Overview. Discussion Topics WAN technology WAN devices WAN standards WAN encapsulation Packet and circuit switching WAN.
WANs and Remote Connectivity
Intro to WAN VCC Semester 4, Chapter 2. Service providers Central Office (CO): Each telephone connects to a single point called a CO. Local Loop.
Chapter 6 Wide Area Networking Concepts, Architectures, & Services.
Networks and Protocols CE Week 5b. WAN’s, Frame Relay, DSL, Cable.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Hands-On Microsoft Windows Server Introduction to Remote Access Routing and Remote Access Services (RRAS) –Enable routing and remote access through.
WAN Technologies. 2 Overview Note: Most of this will be described in more detail in later chapters. Differentiate between a LAN and WAN Identify the devices.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Services in a Converged WAN Accessing the WAN – Chapter 1.
Networks and Protocols CE Week 5a. WAN’s and ISDN.
Wide Area Networks (WAN) Terms that are commonly used by service providers: Customer premises equipment (CPE) Equipment that’s owned by the subscriber.
Oz – Foundations of Electronic Commerce © 2002 Prentice Hall Essentials of Telecommunications.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Services in a Converged WAN Accessing the WAN – Chapter 1.
. Large internetworks can consist of the following three distinct components:  Campus networks, which consist of locally connected users in a building.
WAN TECHNOLOGY CONCEPTS 1 st semester nalhareqi©2015.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Introduction to WANs Source: CCNA Exploration Accessing the WAN – Chapter.
Presented By: Gavin Worden Leased Lines vs. Internet Based VPNs.
Lecture 1: Introduction to WAN
 Introduction to Wide Area Networks 2 nd semester
Remote Access and Long-Distance Communications. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Typical Telephone.
NT1210 Introduction to Networking Unit 7: Chapter 7, Wide Area Networks.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 2 v3.1 Module 1 WANs and Routers.
Lecture # 2 WAN Technologies. Objectives  Define LAN and WAN and tell how they are used.  WAN Technologies Overview  WAN Technologies L.Rania Ahmed.
 Introduction to Wide Area Networks 2 nd semester
Virtual Circuit Networks: Frame Relay And ATM UNIT 5 Chapter 18 Forouzan.
Chapter 7 Introducing Wide-Area Networks
Services in a Converged WAN
Instructor Materials Chapter 1: WAN Concepts
© 2002, Cisco Systems, Inc. All rights reserved.
Chapter 1: WAN Concepts Connecting Networks
Lecture 1: Introduction to WAN
Connectivity methods. Connectivity methods Exam Answer WAN/LAN  Each office will have its own Local Area Network or LAN.  But the company also wants.
Cisco networking CNET-448
Presentation transcript:

Wide Area Network Chapter 15 powered by DJ 1

Chapter Objectives At the end of this Chapter you will be able to:  Describe different methods for connecting to a WAN  Configure and verify a basic WAN serial connection  Describe VPN technology (including: importance, benefits, role, impact, components) powered by DJ 2

Introduction to Wide Area Networks  Typically, LAN connections are within a company and WAN connections allow you to connect to remote sites. Typically, you don’t own the infrastructure for WAN connections—another company, such as a telephone company, provides the infrastructure.  WAN connections are usually slower than LAN connections.  One of the major factors when choosing a WAN or MAN provider is cost. These connections are billed in multiple ways: flat monthly lease cost, per-packet cost, per-minute cost, and many other methods. powered by DJ 3

Equipment and Components Equipments and Components of a WAN powered by DJ 4

Defining WAN Terms  Customer premises equipment (CPE) Customer premises equipment (CPE) is equipment that’s owned by the subscriber and located on the subscriber’s premises.  Demarcation point  The demarcation point is the precise spot where the service provider’s responsibility ends and the CPE begins. It’s generally a device in a telecommunications closet owned and installed by the telecommunications company (telco). It’s your responsibility to cable (extended demarc) from this box to the CPE, which is usually a connection to a CSU/DSU or ISDN interface. powered by DJ 5

 Local loop The local loop connects the demarc to the closest switching office, which is called a central office.  Central office (CO) This point connects the customer’s network to the provider’s switching network. Good to know is that a central office (CO) is sometimes referred to as a point of presence (POP)  Toll network The toll network is a trunk line inside a WAN provider’s network. This network is a collection of switches and facilities owned by the ISP. powered by DJ 6

WAN Connection Types Different type of WAN Connections powered by DJ 7

 Leased Lines These are usually referred to as a point-to-point or dedicated connection. A leased line is a pre-established WAN communications path that goes from the CPE through the DCE switch, then over to the CPE of the remote site. The CPE enables DTE networks to communicate at any time with no cumbersome setup procedures to muddle through before transmitting data. When you’ve got plenty of cash, this is really the way to go because it uses synchronous serial lines up to 45Mbps. powered by DJ 8

 Circuit Switching When you hear the term circuit switching, think phone call. The big advantage is cost—you only pay for the time you actually use. No data can transfer before an end-to-end connection is established. Circuit switching uses dial-up modems or ISDN and is used for low-bandwidth data transfers.  Packet Switching This is a WAN switching method that allows you to share bandwidth with other companies to save money. powered by DJ 9

Introduction to WAN Protocols most prominently known WAN protocols used today: Frame Relay, ISDN, LAPB, LAPD, HDLC, PPP, PPPoE, Cable, DSL, MPLS, and ATM.  Frame Relay  A packet-switched technology that made its debut in the early 1990s, Frame Relay is a high-performance Data Link and Physical layer specification.  Another Frame Relay benefit is that it provides features for dynamic bandwidth allocation and congestion control. powered by DJ 10

 ISDN Integrated Services Digital Network (ISDN) is a set of digital services that transmit voice and data over existing phone lines. ISDN offers a cost effective solution for remote users  LAPB Link Access Procedure, Balanced (LAPB) was created to be a connection- oriented protocol at the Data Link layer for use with X.25, but it can also be used as a simple data link transport.  LAPD Link Access Procedure, D-Channel (LAPD) is used with ISDN at the Data Link layer (layer 2) as a protocol for the D (signaling) channel. powered by DJ 11

 HDLC High-Level Data-Link Control (HDLC) was derived from Synchronous Data Link Control (SDLC), which was created by IBM as a Data Link connection protocol. HDLC works at the Data Link layer and creates very little overhead compared to LAPB.  PPP Point-to-Point Protocol (PPP) uses a Network Control Protocol field in the Data Link header to identify the Network layer protocol and allows authentication and multilink connections to be run over asynchronous and synchronous links. powered by DJ 12

 PPPoE Point-to-Point Protocol over Ethernet encapsulates PPP frames in Ethernet frames and is usually used in conjunction with ADSL services. It gives you a lot of the familiar PPP features like authentication, encryption, and compression.  Cable  DSL Digital subscriber line is a technology used by traditional telephone companies to deliver advanced services (high-speed data and sometimes video) over twisted-pair copper telephone wires. powered by DJ 13

 MPLS MultiProtocol Label Switching (MPLS) is a data-carrying mechanism that emulates some properties of a circuit-switched network over a packet- switched network. MPLS is a switching mechanism that imposes labels (numbers) to packets and then uses those labels to forward packets.  ATM Asynchronous Transfer Mode (ATM) was created for time-sensitive traffic, providing simultaneous transmission of voice, video, and data. ATM uses cells that are a fixed 53 bytes long instead of packets. powered by DJ 14

Data Terminal Equipment and Data Communication Equipment  By default, router interfaces are data terminal equipment (DTE), and they connect into data communication equipment (DCE) like a channel service unit/data service unit (CSU/DSU).  The CSU/DSU then plugs into a demarcation location (demarc) and is the service provider’s last responsibility. Most of the time, the demarc is a jack that has an RJ-45 (8-pin modular) female connector located in a telecommunications closet.  Figure below shows a typical DTE-DCE-DTE connection and the devices used in the network powered by DJ 15

DTE-DCE-DTE WAN Connection powered by DJ 16

Virtual Private Networks  Introduction A virtual private network (VPN) allows the creation of private networks across the Internet, enabling privacy and tunneling of non-TCP/IP protocols. Types of VPNs are named based upon the role they play in a business. There are three different categories of VPNs:  Remote access VPNs Remote access VPNs allow remote users like telecommuters to securely access the corporate network wherever and whenever they need to.. powered by DJ 17

 Site-to-site VPNs Site-to-site VPNs, or intranet VPNs, allow a company to connect its remote sites to the corporate backbone securely over a public medium like the Internet instead of requiring more expensive WAN connections like Frame Relay.  Extranet VPNs Extranet VPNs allow an organization’s suppliers, partners, and customers to be connected to the corporate network in a limited way for business-to-business (B2B) communications powered by DJ 18

Configuring VPNs/IPSec Using the SDM I selected Create a Site to Site VPN and then clicked Launch the Selected Task to get the Site to Site VPN screen. powered by DJ 19

I clicked View Defaults and took a peek at what the router was going to configure: powered by DJ 20

After clicking Close, I clicked Next to receive the VPN Connection Information screen: powered by DJ 21

I added the static IP address of my peer router (R3), added a pre-shared key, chose my source address of the Corp router, and the destination address, which happens to be the same address as my peer router (R3). I then clicked Next. powered by DJ 22

I received a summary of the VPN configuration running IPSec powered by DJ 23

Test VPN confirmation powered by DJ 24

VPN Debugging in action powered by DJ 25

Congratulation Message powered by DJ 26

THANK YOU powered by DJ 27