2. WAN:
• A Wide Area Network (WAN) is a type of computer network that spans a large geographic area,
typically covering cities, states, countries, or even continents. WANs are designed to connect
multiple Local Area Networks (LANs) or individual devices across a wide and often disparate
geographical area. They serve as the backbone for global and long-distance communications,
enabling data and information exchange over extended distances.
• Here are some key characteristics and components of WANs:
1.Large Geographic Coverage: WANs can cover vast geographical areas, often relying on long-
distance transmission technologies such as optical fibers, satellite links, and undersea cables.
2.Public and Private Infrastructure: WANs can utilize both public and private infrastructure. Public
WANs, like the internet, are accessible to anyone with connectivity, while private WANs are
typically used by organizations to connect their branch offices, data centers, and remote locations.
3. 1.High Data Transfer Speeds: WANs are designed to provide high data transfer speeds, although
the actual speed can vary based on the technology and infrastructure used.
2.Wide Variety of Connection Types: WANs can use a wide variety of connection types, including
dedicated leased lines, broadband connections, Virtual Private Networks (VPNs), and more. The
choice of connection type depends on factors like cost, bandwidth requirements, and reliability.
3.Reliability and Redundancy: Due to their extensive coverage, WANs often incorporate redundancy
and failover mechanisms to ensure uninterrupted connectivity even if a portion of the network
experiences issues.
4.Data Routing and Switching: WANs rely on routers and switches to manage data traffic and route
it between different LANs or devices across the network.
5.Internet Backbone: The global internet is the most prominent example of a WAN. It connects
millions of networks and devices worldwide, allowing for the exchange of data, emails, web
browsing, and various online services.
6.Virtual Private Networks (VPNs): Organizations use VPNs over WANs to create secure and
private communication channels within the public internet. VPNs provide encryption and
authentication to protect data during transmission.
4. APPLICATIONS:
1.Business Connectivity: WANs are essential for connecting branch offices, data centers, and
remote employees in a corporate environment. They facilitate collaboration, data sharing, and
access to centralized resources.
2.Internet Access: WANs provide the backbone for global internet access, allowing users to browse
websites, send emails, and access online services from anywhere in the world.
3.Cloud Computing: WANs play a crucial role in accessing cloud-based applications and services,
enabling businesses to utilize cloud resources for storage, computing, and software.
4.Video Conferencing: WANs support real-time video conferencing and collaboration tools, allowing
geographically dispersed teams to communicate effectively.
5.E-commerce and Online Transactions: WANs enable e-commerce platforms and online banking
services to function securely, handling transactions and financial data over the internet.
6.Voice over IP (VoIP): WANs support VoIP services, allowing for voice and video calls over the
internet, which can be more cost-effective than traditional phone services.
5. • Setting up a Wide Area Network (WAN) involves connecting multiple Local Area Networks (LANs) or devices across a
wide geographical area. The process of establishing a WAN can vary in complexity depending on the specific
requirements and technologies involved. Here is a general procedure for setting up a WAN:
• 1. Define WAN Requirements:
• Determine the purpose of the WAN and its scope, including the geographic area it will cover, the number of remote
sites or locations, and the expected data transfer requirements.
• 2. Choose WAN Technologies:
• Select the appropriate WAN technologies and connection types based on your requirements. Common WAN
technologies include leased lines, broadband, MPLS (Multiprotocol Label Switching), and VPNs (Virtual Private
Networks).
• 3. Network Design and Topology:
• Design the network topology based on the chosen WAN technology. Common WAN topologies include point-to-point,
hub-and-spoke, and mesh topologies. Consider redundancy and failover options for increased reliability.
• 4. Procure Network Hardware:
• Acquire the necessary network hardware, including routers, switches, modems, and WAN interfaces. Ensure
compatibility with the chosen WAN technology.
6. • 5. Obtain Internet Connectivity:
• If your WAN requires internet connectivity, arrange for an internet connection with an
Internet Service Provider (ISP) or a telecommunications provider. This may involve
selecting a dedicated internet circuit or a business-class connection.
• 6. Configure Network Devices:
• Configure routers, switches, and other network devices with the appropriate settings,
including IP addresses, routing protocols, and security features. Set up Quality of
Service (QoS) if necessary to prioritize traffic.
• 7. Implement Security Measures:
• Implement security measures to protect data during transmission over the WAN. This
may include encryption, VPNs, firewall rules, and intrusion detection systems.
• 8. Address IP Allocation:
• Assign IP addresses to devices within the WAN. IP address allocation can be static or
dynamic, depending on your network design.
7. • 9. Establish Site-to-Site Connections:
• Set up connections between remote sites or locations using the chosen WAN technology. This may
involve configuring VPN tunnels, point-to-point leased lines, or other dedicated connections.
• 10. Test Connectivity: - Verify that devices at different locations can communicate with each other
across the WAN. Conduct tests to check data transfer speeds, latency, and reliability.
• 11. Implement Monitoring and Management: - Implement network monitoring tools to track WAN
performance, detect issues, and troubleshoot problems. Establish remote management capabilities
to maintain and update network devices.
• 12. Backup and Redundancy (Optional): - Consider implementing backup connections and
redundancy options to ensure network availability in case of failures or outages.
• 13. Documentation: - Maintain detailed documentation of the WAN configuration, including network
diagrams, IP addressing schemes, device configurations, and contact information for network
administrators.
• 14. User Training: - Train network administrators and end-users on WAN usage, security practices,
and how to report and troubleshoot network issues.