SlideShare a Scribd company logo
S
Wide Area Networks
WAN
by Jamie Reece Moore
A Wide Area Network (WAN) is a telecommunication network that
spans a large geographic area. It usually connects two or more Local
Area Networks (LAN) by means of dedicated lines or packet/circuit
switching.
Characteristics of a WAN
The best example of a Wide Area Network is The
Internet!
S A WAN consists of a large numbers of nodes/hosts that
are interconnected by a subnet
S To be considered a WAN, the network must span 30+
miles
WAN Applications
S Wide Area Networks can be used in most any application
of transmitting voice, video, or data across long distances
S Voice: most phone service providers merge hundreds &
thousands of analog phone calls onto a single digital
medium for transmission across town or across the country
S Video: dedicated WAN systems, such as ATM (explained
later) allow for high-quality video stream with low latency
S Data: the creation of a direct connection between two nodes
on a private WAN is much more efficient & secure that
sending data across with general Internet traffic
WAN Connection Types
WAN
Private
Dedicated
Leased
Lines
T1, T3,
E3….etc.
Switched
Circuit-
Switched
PSTN
ISDN
Packet-
Switched
Frame Relay
ATM
Public
Internet
Broadband
VPN
DSL
Cable
Modem
WAN Technologies
S A WAN can use multiple types of telecommunication mediums…
S Copper Wire
S Fiber Optic Cabling
S Radio Links
S Satellite Links
S The Data Link Layer (OSI layer 2) uses various protocols along these
mediums to describe how frames are encapsulated & transmitted.
Some common ones are…
S Public Switched Telephone Network (PSTN)
S Integrated Service Digital Network (ISDN)
S Frame Relay
S Asynchronous Transfer Mode (ATM)
Leased Lines
S Dedicated connections that are usually leased through a
network carrier
S Available in various capacities depending upon distance
between sites & bandwidth required.
S While very reliable, cost is considerably more than other WAN
options that utilize shared (switch) connections
Circuit Switching Networks
S These networks establish a dedicated circuit (or channel)
between nodes for users to communicate
S This means that every switch along the network is set in
such a fashion that the data flows continuously from node
to node
Public Switched Telephone Network
S A Point-to-Point Protocol (PPP) network that may consist of more than
one leg between two hosts, however the source & destination are
connected by a direct connection
S Very popular option for using a dial-up telephone modems. This is an
example of a circuit-switched network
S Authentication is supported with Password Authentication Protocol
(PAP) & Challenge Handshake Authentication Protocol (CHAP)
Integrated Service Digital
Network
S International communication standard for sending voice,
video & data via telephone wires
S Works much like PSTN, but offers higher speeds closer
to DSL rather than 56Kbps analog dial-up service
Packet Switching Networks
S In contrast to circuit switching, packet switching splits
traffic into packets that are individually routed over a
shared network
S DO NOT require a dedicated circuit to be established;
allows many pairs of nodes to communicate over the
same channel
S Each switch in the network routes a packet based upon
the addressing information in the header frame
Packet Switching Networks
(cont.)
S Connectionless Systems carry full addressing information
requiring each switch to completely evaluate routing
S Connection-Oriented Systems predetermine the route for
each packet.
S Packets are only required to carry an identifier in the header
S Each switch has a table of predetermined routes that correspond
to different identifies stored in memory. The identifier on the
packet is checked with this listing & then assigned a route by the
router
Frame Relay
S Creates a private network connection through a carrier's network
S T1 Line (or other leased line) from network carrier along with a frame-
relay port. The network can be designed to include as many nodes as
needed, each connected via a Permanent Virtual Circuit (PVC). This is
an example of packet-switched network
S This option is fairly cheap because each connecting node only needs
a PVC & leased line to be connected with the WAN
S This technology is slowly
being replaced by faster services
Asynchronous Transfer
Mode
S ATM is a dedicated connection-oriented switching system that
organizes all data into 53-byte cells before digitally sending
them
S Each cell is processed asynchronously relative to other cells &
is queued before being multiplexed over the transmission path
S Low latency coupled with speeds up to 10Gbps, makes the
technology ideal with high intensity video data applications
WAN Connection Types
WAN
Private
Dedicated
Leased
Lines
T1, T3,
E3….etc.
Switched
Circuit-
Switched
PSTN
ISDN
Packet-
Switched
Frame Relay
ATM
Public
Internet
Broadband
VPN
DSL
Cable
Modem
Public WAN’s
The Internet
S In contrary to private WAN’s, public WAN’s have no isolation between
users/customers
S Cheaper, greater bandwidth (usually gigabit or higher)
S DSL, Cable Modem, Fiber Optic, etc.
S Companies can create virtual WAN’s by use of technologies such as
VPN that “tunnel” & encrypt traffic over the general-public Internet
Public WAN’s Threat
to Private WAN’s
S Virtual Private Networks (VPN) allows the creation a of
virtual point-to-point connection means of dedicated
connections, tunneling protocols, or traffic encryption.
These networks are much cheaper than WAN’s & allow
more flexibility as they only need an Internet connection
to operate.
S Cloud computing is more cheaper & simple to utilize in
most applications today.
In 2014, one survey of IT professionals indicated that nearly 50%
of those currently using WAN technologies were in the process of
implementing new Cloud technologies to replace them.
REVIEW: WAN Connection Types
WAN
Private
Dedicated
Leased
Lines
T1, T3,
E3….etc.
Switched
Circuit-
Switched
PSTN
ISDN
Packet-
Switched
Frame Relay
ATM
Public
Internet
Broadban
d
VPN
DSL
Cable
Modem

More Related Content

What's hot

Ethernet
EthernetEthernet
Ethernet
Mihika Shah
 
switching techniques in data communication and networking
switching techniques in data communication and networkingswitching techniques in data communication and networking
switching techniques in data communication and networking
Harshita Yadav
 
Computer network switching
Computer network switchingComputer network switching
Computer network switching
Shivani Godha
 
Computer network : models and topologies
Computer network : models and topologiesComputer network : models and topologies
Computer network : models and topologiesAnup Pandey
 
Network switch
Network switchNetwork switch
Network switch
Ravinder Kaur
 
Network Topology
Network TopologyNetwork Topology
Network Topology
Swapna Subhadarsini
 
Introduction to Computer Networks
 Introduction to Computer Networks Introduction to Computer Networks
Introduction to Computer NetworksGhaffar Khan
 
Switching
SwitchingSwitching
Switching
Shankar Gangaju
 
Wide area network (wan)
Wide area network (wan)Wide area network (wan)
Wide area network (wan)
Bhavesh Goswami
 
Introduction to switching & circuit switching
Introduction to switching & circuit switchingIntroduction to switching & circuit switching
Introduction to switching & circuit switching
Dr Rajiv Srivastava
 
Reference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IPReference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IP
Mukesh Chinta
 
Wide Area Network (WAN)
Wide Area Network (WAN)Wide Area Network (WAN)
Wide Area Network (WAN)
Claisse Martinez
 
Internetworking
InternetworkingInternetworking
InternetworkingRaghu nath
 
Twisted pair cable
Twisted pair cableTwisted pair cable
Twisted pair cableilakkiya
 
Data communication & telecommunication
Data communication & telecommunicationData communication & telecommunication
Data communication & telecommunication
Dhani Ahmad
 
Osi & ip presentation
Osi & ip presentationOsi & ip presentation
Osi & ip presentation
Monika Vijay
 
Network architecture
Network architectureNetwork architecture
Network architecture
Online
 
Overview of data communication and networking
Overview of data communication and networkingOverview of data communication and networking
Overview of data communication and networkingSisir Ghosh
 
Iso layers
Iso layersIso layers
Iso layers
Sathish kumar
 
Networking Standards And Protocols
Networking Standards And ProtocolsNetworking Standards And Protocols
Networking Standards And ProtocolsSteven Cahill
 

What's hot (20)

Ethernet
EthernetEthernet
Ethernet
 
switching techniques in data communication and networking
switching techniques in data communication and networkingswitching techniques in data communication and networking
switching techniques in data communication and networking
 
Computer network switching
Computer network switchingComputer network switching
Computer network switching
 
Computer network : models and topologies
Computer network : models and topologiesComputer network : models and topologies
Computer network : models and topologies
 
Network switch
Network switchNetwork switch
Network switch
 
Network Topology
Network TopologyNetwork Topology
Network Topology
 
Introduction to Computer Networks
 Introduction to Computer Networks Introduction to Computer Networks
Introduction to Computer Networks
 
Switching
SwitchingSwitching
Switching
 
Wide area network (wan)
Wide area network (wan)Wide area network (wan)
Wide area network (wan)
 
Introduction to switching & circuit switching
Introduction to switching & circuit switchingIntroduction to switching & circuit switching
Introduction to switching & circuit switching
 
Reference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IPReference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IP
 
Wide Area Network (WAN)
Wide Area Network (WAN)Wide Area Network (WAN)
Wide Area Network (WAN)
 
Internetworking
InternetworkingInternetworking
Internetworking
 
Twisted pair cable
Twisted pair cableTwisted pair cable
Twisted pair cable
 
Data communication & telecommunication
Data communication & telecommunicationData communication & telecommunication
Data communication & telecommunication
 
Osi & ip presentation
Osi & ip presentationOsi & ip presentation
Osi & ip presentation
 
Network architecture
Network architectureNetwork architecture
Network architecture
 
Overview of data communication and networking
Overview of data communication and networkingOverview of data communication and networking
Overview of data communication and networking
 
Iso layers
Iso layersIso layers
Iso layers
 
Networking Standards And Protocols
Networking Standards And ProtocolsNetworking Standards And Protocols
Networking Standards And Protocols
 

Similar to Wide Area Networks - Jamie Reece Moore

WAN technologies power point presentation
WAN technologies power point presentationWAN technologies power point presentation
WAN technologies power point presentation
trexylo8
 
Connection technology options
Connection technology optionsConnection technology options
Connection technology optionsmicailalouise
 
C C N A Day5
C C N A  Day5C C N A  Day5
C C N A Day5
darulquthni
 
Computer network introduction
Computer network introductionComputer network introduction
Computer network introduction
Sweta Kumari Barnwal
 
Lecture 7.pdf
Lecture 7.pdfLecture 7.pdf
Lecture 7.pdf
ssusercf79b32
 
Intro to-wan
Intro to-wanIntro to-wan
Intro to-wan
mjrshare
 
Intro to-wan
Intro to-wanIntro to-wan
Intro to-wan
mjrshare
 
Communication and Networking
Communication and NetworkingCommunication and Networking
Communication and Networking
Jay Nagar
 
COMPUTER NETWORK(Introduction, classification)NETWORK TOPOLOGY.pptx
COMPUTER NETWORK(Introduction, classification)NETWORK TOPOLOGY.pptxCOMPUTER NETWORK(Introduction, classification)NETWORK TOPOLOGY.pptx
COMPUTER NETWORK(Introduction, classification)NETWORK TOPOLOGY.pptx
HalimaTarin
 
Wmcn ch.3
Wmcn ch.3Wmcn ch.3
Wmcn ch.3Alaa2
 
Lecture 12
Lecture 12Lecture 12
Lecture 12
Anwal Mirza
 
Ccna day5-140715152501-phpapp01
Ccna day5-140715152501-phpapp01Ccna day5-140715152501-phpapp01
Ccna day5-140715152501-phpapp01
Sachin Morya
 
Frame relay
Frame relay Frame relay
Frame relay balub4
 
design of leased line network using vmux
 design of leased line network using vmux design of leased line network using vmux
design of leased line network using vmuxXhitesh Thakur
 

Similar to Wide Area Networks - Jamie Reece Moore (20)

WAN technologies power point presentation
WAN technologies power point presentationWAN technologies power point presentation
WAN technologies power point presentation
 
Connection technology options
Connection technology optionsConnection technology options
Connection technology options
 
Wireless
WirelessWireless
Wireless
 
WAN Technologies slide show
WAN Technologies slide showWAN Technologies slide show
WAN Technologies slide show
 
C C N A Day5
C C N A  Day5C C N A  Day5
C C N A Day5
 
Computer network introduction
Computer network introductionComputer network introduction
Computer network introduction
 
Lecture 7.pdf
Lecture 7.pdfLecture 7.pdf
Lecture 7.pdf
 
Intro to-wan
Intro to-wanIntro to-wan
Intro to-wan
 
Intro to-wan
Intro to-wanIntro to-wan
Intro to-wan
 
Communication and Networking
Communication and NetworkingCommunication and Networking
Communication and Networking
 
COMPUTER NETWORK(Introduction, classification)NETWORK TOPOLOGY.pptx
COMPUTER NETWORK(Introduction, classification)NETWORK TOPOLOGY.pptxCOMPUTER NETWORK(Introduction, classification)NETWORK TOPOLOGY.pptx
COMPUTER NETWORK(Introduction, classification)NETWORK TOPOLOGY.pptx
 
Wmcn ch.3
Wmcn ch.3Wmcn ch.3
Wmcn ch.3
 
Lecture 12
Lecture 12Lecture 12
Lecture 12
 
Ccna day5-140715152501-phpapp01
Ccna day5-140715152501-phpapp01Ccna day5-140715152501-phpapp01
Ccna day5-140715152501-phpapp01
 
Ccna day5
Ccna day5Ccna day5
Ccna day5
 
Ccna day5
Ccna day5Ccna day5
Ccna day5
 
Ccna day5
Ccna day5Ccna day5
Ccna day5
 
Ch08
Ch08Ch08
Ch08
 
Frame relay
Frame relay Frame relay
Frame relay
 
design of leased line network using vmux
 design of leased line network using vmux design of leased line network using vmux
design of leased line network using vmux
 

Recently uploaded

Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 

Recently uploaded (20)

Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 

Wide Area Networks - Jamie Reece Moore

  • 1. S Wide Area Networks WAN by Jamie Reece Moore
  • 2. A Wide Area Network (WAN) is a telecommunication network that spans a large geographic area. It usually connects two or more Local Area Networks (LAN) by means of dedicated lines or packet/circuit switching.
  • 3. Characteristics of a WAN The best example of a Wide Area Network is The Internet! S A WAN consists of a large numbers of nodes/hosts that are interconnected by a subnet S To be considered a WAN, the network must span 30+ miles
  • 4. WAN Applications S Wide Area Networks can be used in most any application of transmitting voice, video, or data across long distances S Voice: most phone service providers merge hundreds & thousands of analog phone calls onto a single digital medium for transmission across town or across the country S Video: dedicated WAN systems, such as ATM (explained later) allow for high-quality video stream with low latency S Data: the creation of a direct connection between two nodes on a private WAN is much more efficient & secure that sending data across with general Internet traffic
  • 5. WAN Connection Types WAN Private Dedicated Leased Lines T1, T3, E3….etc. Switched Circuit- Switched PSTN ISDN Packet- Switched Frame Relay ATM Public Internet Broadband VPN DSL Cable Modem
  • 6. WAN Technologies S A WAN can use multiple types of telecommunication mediums… S Copper Wire S Fiber Optic Cabling S Radio Links S Satellite Links S The Data Link Layer (OSI layer 2) uses various protocols along these mediums to describe how frames are encapsulated & transmitted. Some common ones are… S Public Switched Telephone Network (PSTN) S Integrated Service Digital Network (ISDN) S Frame Relay S Asynchronous Transfer Mode (ATM)
  • 7. Leased Lines S Dedicated connections that are usually leased through a network carrier S Available in various capacities depending upon distance between sites & bandwidth required. S While very reliable, cost is considerably more than other WAN options that utilize shared (switch) connections
  • 8. Circuit Switching Networks S These networks establish a dedicated circuit (or channel) between nodes for users to communicate S This means that every switch along the network is set in such a fashion that the data flows continuously from node to node
  • 9. Public Switched Telephone Network S A Point-to-Point Protocol (PPP) network that may consist of more than one leg between two hosts, however the source & destination are connected by a direct connection S Very popular option for using a dial-up telephone modems. This is an example of a circuit-switched network S Authentication is supported with Password Authentication Protocol (PAP) & Challenge Handshake Authentication Protocol (CHAP)
  • 10. Integrated Service Digital Network S International communication standard for sending voice, video & data via telephone wires S Works much like PSTN, but offers higher speeds closer to DSL rather than 56Kbps analog dial-up service
  • 11. Packet Switching Networks S In contrast to circuit switching, packet switching splits traffic into packets that are individually routed over a shared network S DO NOT require a dedicated circuit to be established; allows many pairs of nodes to communicate over the same channel S Each switch in the network routes a packet based upon the addressing information in the header frame
  • 12. Packet Switching Networks (cont.) S Connectionless Systems carry full addressing information requiring each switch to completely evaluate routing S Connection-Oriented Systems predetermine the route for each packet. S Packets are only required to carry an identifier in the header S Each switch has a table of predetermined routes that correspond to different identifies stored in memory. The identifier on the packet is checked with this listing & then assigned a route by the router
  • 13. Frame Relay S Creates a private network connection through a carrier's network S T1 Line (or other leased line) from network carrier along with a frame- relay port. The network can be designed to include as many nodes as needed, each connected via a Permanent Virtual Circuit (PVC). This is an example of packet-switched network S This option is fairly cheap because each connecting node only needs a PVC & leased line to be connected with the WAN S This technology is slowly being replaced by faster services
  • 14. Asynchronous Transfer Mode S ATM is a dedicated connection-oriented switching system that organizes all data into 53-byte cells before digitally sending them S Each cell is processed asynchronously relative to other cells & is queued before being multiplexed over the transmission path S Low latency coupled with speeds up to 10Gbps, makes the technology ideal with high intensity video data applications
  • 15. WAN Connection Types WAN Private Dedicated Leased Lines T1, T3, E3….etc. Switched Circuit- Switched PSTN ISDN Packet- Switched Frame Relay ATM Public Internet Broadband VPN DSL Cable Modem
  • 16. Public WAN’s The Internet S In contrary to private WAN’s, public WAN’s have no isolation between users/customers S Cheaper, greater bandwidth (usually gigabit or higher) S DSL, Cable Modem, Fiber Optic, etc. S Companies can create virtual WAN’s by use of technologies such as VPN that “tunnel” & encrypt traffic over the general-public Internet
  • 17. Public WAN’s Threat to Private WAN’s S Virtual Private Networks (VPN) allows the creation a of virtual point-to-point connection means of dedicated connections, tunneling protocols, or traffic encryption. These networks are much cheaper than WAN’s & allow more flexibility as they only need an Internet connection to operate. S Cloud computing is more cheaper & simple to utilize in most applications today. In 2014, one survey of IT professionals indicated that nearly 50% of those currently using WAN technologies were in the process of implementing new Cloud technologies to replace them.
  • 18.
  • 19. REVIEW: WAN Connection Types WAN Private Dedicated Leased Lines T1, T3, E3….etc. Switched Circuit- Switched PSTN ISDN Packet- Switched Frame Relay ATM Public Internet Broadban d VPN DSL Cable Modem

Editor's Notes

  1. LAN vs. CAN vs. MAN vs. WAN
  2. Circuit networks allow only one path, whereas Packet networks allow more than one path
  3. Taking bus to school (public) vs. driving car to school (private)
  4. Traditional private WAN networks are beginning to downsize as more cost-efficient options become available, such as VPN or Cloud computing. Many end users can now utilize the public WAN (The Internet) along with these technologies to conduct secure activities that once required private WAN’s.