SlideShare a Scribd company logo
1 of 16
WANs
Chapter 5
Networking Essentials – Eric Vanderburg © 2005
DSL
DSL is layer 1
 ATM can be used on top of DSL
 PPPoE


CHAP authentication
 IP address assignment




DSLAM (DSL Access Multiplexer)

Connection at ISP for DSL. Separates
voice from data.
 Data is sent over the ISP’s data network
rather than the PSTN.

Cable Modem
Datalink protocol is MCNS (Multimedia
Cable Network Systems) – Identifies
each modem so shared data is only
processed by the designated modem.
 Different channels are used for upstream
& downstream data.

Cable Modem


Downstream data


QAM (Quadrature Amplitude Modulation)
 QAM



64 & QAM 256

Upstream data
QPSK (Quaternary Phase Shift Keying)
 QAM 16
 Same frequency range as other uses (can
collide)

DCE & DTE
CSU/DSU is considered DCE (Data
Communications Equipment) because it
does clocking
 Router is considered DTE (Data
Terminal Equipment)
 Connecting 2 routers directly


Use DTE to DCE cable
 One router must have clocking configured

HDLC (High level Data Link
Control)
Cisco uses a proprietary version with a
type field in the header.
 Default for Serial ports
 FCS in trailer. Error frames are
discarded
 Synchronous, sends receiver ready
frames when there is no data to synch
the line (keep timing for 1’s & 0’s)

PPP (Point to Point Protocol)
FCS in trailer
 Type field
 LCP (Link Control Protocol) - used with
dialed links to bring the connection up
 IPCP (IP Control Protocol) allows IP
addresses to be assigned over PPP
 PPP Callback - incoming connections
are disconnected & called back to verify
number and stop roaming or
unauthorized access

PPP (Point to Point Protocol)
Magic Number looped link detection
 Supports multilink
 PAP & CHAP support
 Synchronous or Asynchronous (used
mainly for dial-up)
 LQM (Link Quality Monitoring) – takes
down links with too many errors
 Supports compression but tasks router
processor

ISDN
B & D channels
 LAPD (Link Access Procedure D
channel)


used to set up and bring down circuits.
 Q.931 specifies the setup & teardown
messages


Circuit switching. Can connect to many
sites but circuits are set up by dialing.
 SPID (Service Profile Identifier) –
provided by the ISP for authenticating B
channels.

ISDN





B channels are digital so an analog line is
used for the DTMF (Dual Tone Multifrequency) tones
BRI for residential use (2B+D), D channel 16k
PRI for business use, D channel 64k




T1 (23B+D), uses AMI (Alternate Mark Inversion)
or B8ZS (Binary 8 with Zero Substitution) encoding
E1 (30B+D), uses HDB3 (High Density Bipolar 3)
encoding
ISDN DDR


DDR (Dial on Demand Routing) dials a
link if traffic is waiting to go to a site that
is not currently connected
Interesting & boring traffic (interesting traffic
“triggers the dial”)
 Dial mapping - DDR needs to be configured
with the networks on each link (static route)
& their phone numbers
 Idle timeouts allow unused connections to
be taken down.

Frame Relay
Frame switching service
 Leased lines from router to FR switch
 Layer 2 address – DLCI (Datalink
connection Identifier), only a place for
one DLCI number in FR frames.
Changed by switches at destination.
 Encapsulation type must be same
between routers (Cisco & IETF). Use
IETF if both routers are not Cisco.

Frame Relay
PVC (Permanent Virtual Circuit) – link
between 2 devices on a FR network.
PVCs are set up between the devices
you own on the FR network. (Set up by
provider)
 CIR (Committed Information Rate) –
minimum bandwidth specified

Frame Relay


LMI (Local Management Interface) – used for
messages sent between router & switch.
Encoding type must be same








Sends keepalive messages
Status messages can be used to find DLCI
numbers of other routers
Cisco LMI uses DLCI 1023
ANSI T1.617-D & ITU Q.933-A LMI’s use DLCI 0
LMI autosense
Inverse ARP maps IP addresses to DLCI numbers.
Routers send their IP address
ATM
Layer 2 protocol using fixed length cells
 Usually runs on top of SONET,
sometimes DSL
 VPI (Virtual Path Identifier) & VCI (Virtual
Channel Identifier) – used to switch cells

X.25
Operates on layers 2 & 3
 Reliable with high overhead
 Used in many foreign countries


More Related Content

What's hot

For spreading factor & channels
For spreading factor & channelsFor spreading factor & channels
For spreading factor & channels
Shivendra Verma
 

What's hot (20)

Dynamic routing protocols (CCNA)
Dynamic routing protocols (CCNA)Dynamic routing protocols (CCNA)
Dynamic routing protocols (CCNA)
 
Bts3900 b qos feature description
Bts3900 b qos feature descriptionBts3900 b qos feature description
Bts3900 b qos feature description
 
Digital network lecturer4
Digital network  lecturer4Digital network  lecturer4
Digital network lecturer4
 
For spreading factor & channels
For spreading factor & channelsFor spreading factor & channels
For spreading factor & channels
 
Thesis of sdh
Thesis of sdhThesis of sdh
Thesis of sdh
 
SIGTRAN - An Introduction
SIGTRAN - An IntroductionSIGTRAN - An Introduction
SIGTRAN - An Introduction
 
Cs8601 3
Cs8601 3Cs8601 3
Cs8601 3
 
SDH BASICS
SDH BASICSSDH BASICS
SDH BASICS
 
Internet Routing Protocols: Fundamental Concepts of Distance-Vector and Link-...
Internet Routing Protocols: Fundamental Concepts of Distance-Vector and Link-...Internet Routing Protocols: Fundamental Concepts of Distance-Vector and Link-...
Internet Routing Protocols: Fundamental Concepts of Distance-Vector and Link-...
 
Virtual Local Area Network
Virtual Local Area NetworkVirtual Local Area Network
Virtual Local Area Network
 
Wcdma physical layer
Wcdma physical layerWcdma physical layer
Wcdma physical layer
 
SS7 Network Technology
SS7 Network TechnologySS7 Network Technology
SS7 Network Technology
 
Packet Guide SONET/SDH
Packet Guide SONET/SDHPacket Guide SONET/SDH
Packet Guide SONET/SDH
 
Sdh total final
Sdh total finalSdh total final
Sdh total final
 
Sdh
SdhSdh
Sdh
 
Fast detection of number of antenna ports in lte system
Fast detection of number of antenna ports in lte systemFast detection of number of antenna ports in lte system
Fast detection of number of antenna ports in lte system
 
CCNA Based routing protocols
CCNA Based routing protocolsCCNA Based routing protocols
CCNA Based routing protocols
 
Irat handover basics
Irat handover basicsIrat handover basics
Irat handover basics
 
Presentation1
Presentation1Presentation1
Presentation1
 
Pdhsdh
PdhsdhPdhsdh
Pdhsdh
 

Similar to CCNA Routing and Switching Lesson 05 - WANs - Eric Vanderburg

Some important networking questions
Some important networking questionsSome important networking questions
Some important networking questions
Srikanth
 
Chapter 02 - Wan Router
Chapter 02 - Wan RouterChapter 02 - Wan Router
Chapter 02 - Wan Router
phanleson
 

Similar to CCNA Routing and Switching Lesson 05 - WANs - Eric Vanderburg (20)

Some important networking questions
Some important networking questionsSome important networking questions
Some important networking questions
 
Networking basics
Networking basicsNetworking basics
Networking basics
 
Ccna day5
Ccna day5Ccna day5
Ccna day5
 
Ccna day5-140715152501-phpapp01
Ccna day5-140715152501-phpapp01Ccna day5-140715152501-phpapp01
Ccna day5-140715152501-phpapp01
 
Ccna day5
Ccna day5Ccna day5
Ccna day5
 
WAN (wide area network)
WAN (wide area network)WAN (wide area network)
WAN (wide area network)
 
Normas y Estándares
Normas y EstándaresNormas y Estándares
Normas y Estándares
 
Batch 25(a)
Batch 25(a)Batch 25(a)
Batch 25(a)
 
Chapter 02 - Wan Router
Chapter 02 - Wan RouterChapter 02 - Wan Router
Chapter 02 - Wan Router
 
FTN Architecture
FTN ArchitectureFTN Architecture
FTN Architecture
 
redes
redesredes
redes
 
REDES INFORMATICAS
REDES INFORMATICASREDES INFORMATICAS
REDES INFORMATICAS
 
Training Day Slides
Training Day SlidesTraining Day Slides
Training Day Slides
 
Wan notes
Wan notesWan notes
Wan notes
 
networking devices -161021181705452555
networking   devices -161021181705452555networking   devices -161021181705452555
networking devices -161021181705452555
 
Physical layer interface & standards
Physical layer interface & standardsPhysical layer interface & standards
Physical layer interface & standards
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
C C N A Day5
C C N A  Day5C C N A  Day5
C C N A Day5
 
WIRELESS NETWORKS EC6802 BABU unit 1 & 2 PPT
WIRELESS NETWORKS EC6802 BABU unit 1 & 2 PPTWIRELESS NETWORKS EC6802 BABU unit 1 & 2 PPT
WIRELESS NETWORKS EC6802 BABU unit 1 & 2 PPT
 
CAN- controlled area network
CAN- controlled area networkCAN- controlled area network
CAN- controlled area network
 

More from Eric Vanderburg

Correct the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric VanderburgCorrect the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric Vanderburg
Eric Vanderburg
 

More from Eric Vanderburg (20)

GDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT SymposiumGDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT Symposium
 
Modern Security the way Equifax Should Have
Modern Security the way Equifax Should HaveModern Security the way Equifax Should Have
Modern Security the way Equifax Should Have
 
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric VanderburgCybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
 
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
 
Mobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityMobile Forensics and Cybersecurity
Mobile Forensics and Cybersecurity
 
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
 
Ransomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware ThreatRansomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware Threat
 
Emerging Technologies: Japan’s Position
Emerging Technologies: Japan’s PositionEmerging Technologies: Japan’s Position
Emerging Technologies: Japan’s Position
 
Principles of technology management
Principles of technology managementPrinciples of technology management
Principles of technology management
 
Japanese railway technology
Japanese railway technologyJapanese railway technology
Japanese railway technology
 
Evaluating japanese technological competitiveness
Evaluating japanese technological competitivenessEvaluating japanese technological competitiveness
Evaluating japanese technological competitiveness
 
Japanese current and future technology management challenges
Japanese current and future technology management challengesJapanese current and future technology management challenges
Japanese current and future technology management challenges
 
Technology management in Japan: Robotics
Technology management in Japan: RoboticsTechnology management in Japan: Robotics
Technology management in Japan: Robotics
 
Incident response table top exercises
Incident response table top exercisesIncident response table top exercises
Incident response table top exercises
 
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware ProblemThe Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
 
Cloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance ChallengesCloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance Challenges
 
Hacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and ThreatsHacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and Threats
 
Correct the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric VanderburgCorrect the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric Vanderburg
 
Deconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric VanderburgDeconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric Vanderburg
 
Countering malware threats - Eric Vanderburg
Countering malware threats - Eric VanderburgCountering malware threats - Eric Vanderburg
Countering malware threats - Eric Vanderburg
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Recently uploaded (20)

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

CCNA Routing and Switching Lesson 05 - WANs - Eric Vanderburg

  • 1. WANs Chapter 5 Networking Essentials – Eric Vanderburg © 2005
  • 2. DSL DSL is layer 1  ATM can be used on top of DSL  PPPoE  CHAP authentication  IP address assignment   DSLAM (DSL Access Multiplexer) Connection at ISP for DSL. Separates voice from data.  Data is sent over the ISP’s data network rather than the PSTN. 
  • 3. Cable Modem Datalink protocol is MCNS (Multimedia Cable Network Systems) – Identifies each modem so shared data is only processed by the designated modem.  Different channels are used for upstream & downstream data. 
  • 4. Cable Modem  Downstream data  QAM (Quadrature Amplitude Modulation)  QAM  64 & QAM 256 Upstream data QPSK (Quaternary Phase Shift Keying)  QAM 16  Same frequency range as other uses (can collide) 
  • 5. DCE & DTE CSU/DSU is considered DCE (Data Communications Equipment) because it does clocking  Router is considered DTE (Data Terminal Equipment)  Connecting 2 routers directly  Use DTE to DCE cable  One router must have clocking configured 
  • 6. HDLC (High level Data Link Control) Cisco uses a proprietary version with a type field in the header.  Default for Serial ports  FCS in trailer. Error frames are discarded  Synchronous, sends receiver ready frames when there is no data to synch the line (keep timing for 1’s & 0’s) 
  • 7. PPP (Point to Point Protocol) FCS in trailer  Type field  LCP (Link Control Protocol) - used with dialed links to bring the connection up  IPCP (IP Control Protocol) allows IP addresses to be assigned over PPP  PPP Callback - incoming connections are disconnected & called back to verify number and stop roaming or unauthorized access 
  • 8. PPP (Point to Point Protocol) Magic Number looped link detection  Supports multilink  PAP & CHAP support  Synchronous or Asynchronous (used mainly for dial-up)  LQM (Link Quality Monitoring) – takes down links with too many errors  Supports compression but tasks router processor 
  • 9. ISDN B & D channels  LAPD (Link Access Procedure D channel)  used to set up and bring down circuits.  Q.931 specifies the setup & teardown messages  Circuit switching. Can connect to many sites but circuits are set up by dialing.  SPID (Service Profile Identifier) – provided by the ISP for authenticating B channels. 
  • 10. ISDN    B channels are digital so an analog line is used for the DTMF (Dual Tone Multifrequency) tones BRI for residential use (2B+D), D channel 16k PRI for business use, D channel 64k   T1 (23B+D), uses AMI (Alternate Mark Inversion) or B8ZS (Binary 8 with Zero Substitution) encoding E1 (30B+D), uses HDB3 (High Density Bipolar 3) encoding
  • 11. ISDN DDR  DDR (Dial on Demand Routing) dials a link if traffic is waiting to go to a site that is not currently connected Interesting & boring traffic (interesting traffic “triggers the dial”)  Dial mapping - DDR needs to be configured with the networks on each link (static route) & their phone numbers  Idle timeouts allow unused connections to be taken down. 
  • 12. Frame Relay Frame switching service  Leased lines from router to FR switch  Layer 2 address – DLCI (Datalink connection Identifier), only a place for one DLCI number in FR frames. Changed by switches at destination.  Encapsulation type must be same between routers (Cisco & IETF). Use IETF if both routers are not Cisco. 
  • 13. Frame Relay PVC (Permanent Virtual Circuit) – link between 2 devices on a FR network. PVCs are set up between the devices you own on the FR network. (Set up by provider)  CIR (Committed Information Rate) – minimum bandwidth specified 
  • 14. Frame Relay  LMI (Local Management Interface) – used for messages sent between router & switch. Encoding type must be same       Sends keepalive messages Status messages can be used to find DLCI numbers of other routers Cisco LMI uses DLCI 1023 ANSI T1.617-D & ITU Q.933-A LMI’s use DLCI 0 LMI autosense Inverse ARP maps IP addresses to DLCI numbers. Routers send their IP address
  • 15. ATM Layer 2 protocol using fixed length cells  Usually runs on top of SONET, sometimes DSL  VPI (Virtual Path Identifier) & VCI (Virtual Channel Identifier) – used to switch cells 
  • 16. X.25 Operates on layers 2 & 3  Reliable with high overhead  Used in many foreign countries 