SlideShare a Scribd company logo
1 of 7
WAN (WIDE AREA NETWORKS)
KIT-CBE
-C.MYTHILI AP/ECE
WAN:
• A Wide Area Network (WAN) is a type of computer network that spans a large geographic area,
typically covering cities, states, countries, or even continents. WANs are designed to connect
multiple Local Area Networks (LANs) or individual devices across a wide and often disparate
geographical area. They serve as the backbone for global and long-distance communications,
enabling data and information exchange over extended distances.
• Here are some key characteristics and components of WANs:
1.Large Geographic Coverage: WANs can cover vast geographical areas, often relying on long-
distance transmission technologies such as optical fibers, satellite links, and undersea cables.
2.Public and Private Infrastructure: WANs can utilize both public and private infrastructure. Public
WANs, like the internet, are accessible to anyone with connectivity, while private WANs are
typically used by organizations to connect their branch offices, data centers, and remote locations.
1.High Data Transfer Speeds: WANs are designed to provide high data transfer speeds, although
the actual speed can vary based on the technology and infrastructure used.
2.Wide Variety of Connection Types: WANs can use a wide variety of connection types, including
dedicated leased lines, broadband connections, Virtual Private Networks (VPNs), and more. The
choice of connection type depends on factors like cost, bandwidth requirements, and reliability.
3.Reliability and Redundancy: Due to their extensive coverage, WANs often incorporate redundancy
and failover mechanisms to ensure uninterrupted connectivity even if a portion of the network
experiences issues.
4.Data Routing and Switching: WANs rely on routers and switches to manage data traffic and route
it between different LANs or devices across the network.
5.Internet Backbone: The global internet is the most prominent example of a WAN. It connects
millions of networks and devices worldwide, allowing for the exchange of data, emails, web
browsing, and various online services.
6.Virtual Private Networks (VPNs): Organizations use VPNs over WANs to create secure and
private communication channels within the public internet. VPNs provide encryption and
authentication to protect data during transmission.
APPLICATIONS:
1.Business Connectivity: WANs are essential for connecting branch offices, data centers, and
remote employees in a corporate environment. They facilitate collaboration, data sharing, and
access to centralized resources.
2.Internet Access: WANs provide the backbone for global internet access, allowing users to browse
websites, send emails, and access online services from anywhere in the world.
3.Cloud Computing: WANs play a crucial role in accessing cloud-based applications and services,
enabling businesses to utilize cloud resources for storage, computing, and software.
4.Video Conferencing: WANs support real-time video conferencing and collaboration tools, allowing
geographically dispersed teams to communicate effectively.
5.E-commerce and Online Transactions: WANs enable e-commerce platforms and online banking
services to function securely, handling transactions and financial data over the internet.
6.Voice over IP (VoIP): WANs support VoIP services, allowing for voice and video calls over the
internet, which can be more cost-effective than traditional phone services.
• Setting up a Wide Area Network (WAN) involves connecting multiple Local Area Networks (LANs) or devices across a
wide geographical area. The process of establishing a WAN can vary in complexity depending on the specific
requirements and technologies involved. Here is a general procedure for setting up a WAN:
• 1. Define WAN Requirements:
• Determine the purpose of the WAN and its scope, including the geographic area it will cover, the number of remote
sites or locations, and the expected data transfer requirements.
• 2. Choose WAN Technologies:
• Select the appropriate WAN technologies and connection types based on your requirements. Common WAN
technologies include leased lines, broadband, MPLS (Multiprotocol Label Switching), and VPNs (Virtual Private
Networks).
• 3. Network Design and Topology:
• Design the network topology based on the chosen WAN technology. Common WAN topologies include point-to-point,
hub-and-spoke, and mesh topologies. Consider redundancy and failover options for increased reliability.
• 4. Procure Network Hardware:
• Acquire the necessary network hardware, including routers, switches, modems, and WAN interfaces. Ensure
compatibility with the chosen WAN technology.
• 5. Obtain Internet Connectivity:
• If your WAN requires internet connectivity, arrange for an internet connection with an
Internet Service Provider (ISP) or a telecommunications provider. This may involve
selecting a dedicated internet circuit or a business-class connection.
• 6. Configure Network Devices:
• Configure routers, switches, and other network devices with the appropriate settings,
including IP addresses, routing protocols, and security features. Set up Quality of
Service (QoS) if necessary to prioritize traffic.
• 7. Implement Security Measures:
• Implement security measures to protect data during transmission over the WAN. This
may include encryption, VPNs, firewall rules, and intrusion detection systems.
• 8. Address IP Allocation:
• Assign IP addresses to devices within the WAN. IP address allocation can be static or
dynamic, depending on your network design.
• 9. Establish Site-to-Site Connections:
• Set up connections between remote sites or locations using the chosen WAN technology. This may
involve configuring VPN tunnels, point-to-point leased lines, or other dedicated connections.
• 10. Test Connectivity: - Verify that devices at different locations can communicate with each other
across the WAN. Conduct tests to check data transfer speeds, latency, and reliability.
• 11. Implement Monitoring and Management: - Implement network monitoring tools to track WAN
performance, detect issues, and troubleshoot problems. Establish remote management capabilities
to maintain and update network devices.
• 12. Backup and Redundancy (Optional): - Consider implementing backup connections and
redundancy options to ensure network availability in case of failures or outages.
• 13. Documentation: - Maintain detailed documentation of the WAN configuration, including network
diagrams, IP addressing schemes, device configurations, and contact information for network
administrators.
• 14. User Training: - Train network administrators and end-users on WAN usage, security practices,
and how to report and troubleshoot network issues.

More Related Content

Similar to WAN.pptx

cpct NetworkING BASICS AND NETWORK TOOL.ppt
cpct NetworkING BASICS AND NETWORK TOOL.pptcpct NetworkING BASICS AND NETWORK TOOL.ppt
cpct NetworkING BASICS AND NETWORK TOOL.ppt
rcbcrtm
 
Networking Today Chapter 1 Networking Today Chapter 1
Networking Today  Chapter 1 Networking Today  Chapter 1Networking Today  Chapter 1 Networking Today  Chapter 1
Networking Today Chapter 1 Networking Today Chapter 1
TnNguyn57021
 

Similar to WAN.pptx (20)

Computer networks.pptx
Computer networks.pptxComputer networks.pptx
Computer networks.pptx
 
final NEtworking.pptx
final  NEtworking.pptxfinal  NEtworking.pptx
final NEtworking.pptx
 
Net 02 03_lan
Net 02 03_lanNet 02 03_lan
Net 02 03_lan
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.ppt
 
Networking
NetworkingNetworking
Networking
 
OSI LAyer.ppt
OSI LAyer.pptOSI LAyer.ppt
OSI LAyer.ppt
 
Gunn 8th- Lily.pptx
Gunn 8th- Lily.pptxGunn 8th- Lily.pptx
Gunn 8th- Lily.pptx
 
cpct NetworkING BASICS AND NETWORK TOOL.ppt
cpct NetworkING BASICS AND NETWORK TOOL.pptcpct NetworkING BASICS AND NETWORK TOOL.ppt
cpct NetworkING BASICS AND NETWORK TOOL.ppt
 
introduction to computer Network-20210426203825 (1).ppt
introduction to computer Network-20210426203825 (1).pptintroduction to computer Network-20210426203825 (1).ppt
introduction to computer Network-20210426203825 (1).ppt
 
Concepts of Networking.ppt
Concepts of Networking.pptConcepts of Networking.ppt
Concepts of Networking.ppt
 
network class 4&5.pptx
network class 4&5.pptxnetwork class 4&5.pptx
network class 4&5.pptx
 
Computer networking
Computer networkingComputer networking
Computer networking
 
vnd.ms-powerpoint&rendition=1.ppt
vnd.ms-powerpoint&rendition=1.pptvnd.ms-powerpoint&rendition=1.ppt
vnd.ms-powerpoint&rendition=1.ppt
 
Adhoc & WSN-Unit-I-Ragavan
Adhoc & WSN-Unit-I-RagavanAdhoc & WSN-Unit-I-Ragavan
Adhoc & WSN-Unit-I-Ragavan
 
Distributed Systems - Information Technology
Distributed Systems - Information TechnologyDistributed Systems - Information Technology
Distributed Systems - Information Technology
 
Computer networks
Computer networksComputer networks
Computer networks
 
Networking Today Chapter 1 Networking Today Chapter 1
Networking Today  Chapter 1 Networking Today  Chapter 1Networking Today  Chapter 1 Networking Today  Chapter 1
Networking Today Chapter 1 Networking Today Chapter 1
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.ppt
 
Network protocol
Network protocolNetwork protocol
Network protocol
 
Network.ppt
Network.pptNetwork.ppt
Network.ppt
 

Recently uploaded

Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
drjose256
 
21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx
rahulmanepalli02
 
Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..
MaherOthman7
 

Recently uploaded (20)

Filters for Electromagnetic Compatibility Applications
Filters for Electromagnetic Compatibility ApplicationsFilters for Electromagnetic Compatibility Applications
Filters for Electromagnetic Compatibility Applications
 
21scheme vtu syllabus of visveraya technological university
21scheme vtu syllabus of visveraya technological university21scheme vtu syllabus of visveraya technological university
21scheme vtu syllabus of visveraya technological university
 
15-Minute City: A Completely New Horizon
15-Minute City: A Completely New Horizon15-Minute City: A Completely New Horizon
15-Minute City: A Completely New Horizon
 
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
 
Augmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxAugmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptx
 
Worksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptxWorksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptx
 
Artificial Intelligence in due diligence
Artificial Intelligence in due diligenceArtificial Intelligence in due diligence
Artificial Intelligence in due diligence
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
 
History of Indian Railways - the story of Growth & Modernization
History of Indian Railways - the story of Growth & ModernizationHistory of Indian Railways - the story of Growth & Modernization
History of Indian Railways - the story of Growth & Modernization
 
Adsorption (mass transfer operations 2) ppt
Adsorption (mass transfer operations 2) pptAdsorption (mass transfer operations 2) ppt
Adsorption (mass transfer operations 2) ppt
 
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdflitvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
 
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...
 
21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx
 
Intro to Design (for Engineers) at Sydney Uni
Intro to Design (for Engineers) at Sydney UniIntro to Design (for Engineers) at Sydney Uni
Intro to Design (for Engineers) at Sydney Uni
 
5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...
 
Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...
 
Diploma Engineering Drawing Qp-2024 Ece .pdf
Diploma Engineering Drawing Qp-2024 Ece .pdfDiploma Engineering Drawing Qp-2024 Ece .pdf
Diploma Engineering Drawing Qp-2024 Ece .pdf
 
Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1
 
Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..
 
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas SachpazisSeismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
 

WAN.pptx

  • 1. WAN (WIDE AREA NETWORKS) KIT-CBE -C.MYTHILI AP/ECE
  • 2. WAN: • A Wide Area Network (WAN) is a type of computer network that spans a large geographic area, typically covering cities, states, countries, or even continents. WANs are designed to connect multiple Local Area Networks (LANs) or individual devices across a wide and often disparate geographical area. They serve as the backbone for global and long-distance communications, enabling data and information exchange over extended distances. • Here are some key characteristics and components of WANs: 1.Large Geographic Coverage: WANs can cover vast geographical areas, often relying on long- distance transmission technologies such as optical fibers, satellite links, and undersea cables. 2.Public and Private Infrastructure: WANs can utilize both public and private infrastructure. Public WANs, like the internet, are accessible to anyone with connectivity, while private WANs are typically used by organizations to connect their branch offices, data centers, and remote locations.
  • 3. 1.High Data Transfer Speeds: WANs are designed to provide high data transfer speeds, although the actual speed can vary based on the technology and infrastructure used. 2.Wide Variety of Connection Types: WANs can use a wide variety of connection types, including dedicated leased lines, broadband connections, Virtual Private Networks (VPNs), and more. The choice of connection type depends on factors like cost, bandwidth requirements, and reliability. 3.Reliability and Redundancy: Due to their extensive coverage, WANs often incorporate redundancy and failover mechanisms to ensure uninterrupted connectivity even if a portion of the network experiences issues. 4.Data Routing and Switching: WANs rely on routers and switches to manage data traffic and route it between different LANs or devices across the network. 5.Internet Backbone: The global internet is the most prominent example of a WAN. It connects millions of networks and devices worldwide, allowing for the exchange of data, emails, web browsing, and various online services. 6.Virtual Private Networks (VPNs): Organizations use VPNs over WANs to create secure and private communication channels within the public internet. VPNs provide encryption and authentication to protect data during transmission.
  • 4. APPLICATIONS: 1.Business Connectivity: WANs are essential for connecting branch offices, data centers, and remote employees in a corporate environment. They facilitate collaboration, data sharing, and access to centralized resources. 2.Internet Access: WANs provide the backbone for global internet access, allowing users to browse websites, send emails, and access online services from anywhere in the world. 3.Cloud Computing: WANs play a crucial role in accessing cloud-based applications and services, enabling businesses to utilize cloud resources for storage, computing, and software. 4.Video Conferencing: WANs support real-time video conferencing and collaboration tools, allowing geographically dispersed teams to communicate effectively. 5.E-commerce and Online Transactions: WANs enable e-commerce platforms and online banking services to function securely, handling transactions and financial data over the internet. 6.Voice over IP (VoIP): WANs support VoIP services, allowing for voice and video calls over the internet, which can be more cost-effective than traditional phone services.
  • 5. • Setting up a Wide Area Network (WAN) involves connecting multiple Local Area Networks (LANs) or devices across a wide geographical area. The process of establishing a WAN can vary in complexity depending on the specific requirements and technologies involved. Here is a general procedure for setting up a WAN: • 1. Define WAN Requirements: • Determine the purpose of the WAN and its scope, including the geographic area it will cover, the number of remote sites or locations, and the expected data transfer requirements. • 2. Choose WAN Technologies: • Select the appropriate WAN technologies and connection types based on your requirements. Common WAN technologies include leased lines, broadband, MPLS (Multiprotocol Label Switching), and VPNs (Virtual Private Networks). • 3. Network Design and Topology: • Design the network topology based on the chosen WAN technology. Common WAN topologies include point-to-point, hub-and-spoke, and mesh topologies. Consider redundancy and failover options for increased reliability. • 4. Procure Network Hardware: • Acquire the necessary network hardware, including routers, switches, modems, and WAN interfaces. Ensure compatibility with the chosen WAN technology.
  • 6. • 5. Obtain Internet Connectivity: • If your WAN requires internet connectivity, arrange for an internet connection with an Internet Service Provider (ISP) or a telecommunications provider. This may involve selecting a dedicated internet circuit or a business-class connection. • 6. Configure Network Devices: • Configure routers, switches, and other network devices with the appropriate settings, including IP addresses, routing protocols, and security features. Set up Quality of Service (QoS) if necessary to prioritize traffic. • 7. Implement Security Measures: • Implement security measures to protect data during transmission over the WAN. This may include encryption, VPNs, firewall rules, and intrusion detection systems. • 8. Address IP Allocation: • Assign IP addresses to devices within the WAN. IP address allocation can be static or dynamic, depending on your network design.
  • 7. • 9. Establish Site-to-Site Connections: • Set up connections between remote sites or locations using the chosen WAN technology. This may involve configuring VPN tunnels, point-to-point leased lines, or other dedicated connections. • 10. Test Connectivity: - Verify that devices at different locations can communicate with each other across the WAN. Conduct tests to check data transfer speeds, latency, and reliability. • 11. Implement Monitoring and Management: - Implement network monitoring tools to track WAN performance, detect issues, and troubleshoot problems. Establish remote management capabilities to maintain and update network devices. • 12. Backup and Redundancy (Optional): - Consider implementing backup connections and redundancy options to ensure network availability in case of failures or outages. • 13. Documentation: - Maintain detailed documentation of the WAN configuration, including network diagrams, IP addressing schemes, device configurations, and contact information for network administrators. • 14. User Training: - Train network administrators and end-users on WAN usage, security practices, and how to report and troubleshoot network issues.