Top Banner
Chapter 12 Wide Area Networks Information Technology in Theory By Pelin Aksoy and Laura DeNardis
52

Chapter 12 Wide Area Networks

Mar 09, 2016

Download

Documents

thaddeus-bryant

Chapter 12 Wide Area Networks. Information Technology in Theory By Pelin Aksoy and Laura DeNardis. Objectives. Understand the concept of a wide area network Identify the main technical components of a wide area network Distinguish between packet switching and circuit switching - PowerPoint PPT Presentation
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Chapter 12 Wide Area Networks

Chapter 12Wide Area Networks

Information Technology in TheoryBy Pelin Aksoy and Laura DeNardis

Page 2: Chapter 12 Wide Area Networks

2

Objectives

• Understand the concept of a wide area network• Identify the main technical components of a wide

area network• Distinguish between packet switching and circuit

switching• Understand virtual private networks (VPNs)

Information Technology in Theory

Page 3: Chapter 12 Wide Area Networks

3

Objectives (continued)

• Gain familiarity with the most important commercial WAN services

• Understand WAN access technologies, including dedicated lines, xDSL, cable modem access, and WiMAX

• Identify important network management functions

Information Technology in Theory

Page 4: Chapter 12 Wide Area Networks

4

WAN Background

• Industry convention describes a WAN as a network that spans a large geographical distance

• The largest example of a WAN is the public Internet, but many other types of WANs exist

• Wide area networking is sometimes referred to as enterprise networking

Information Technology in Theory

Page 5: Chapter 12 Wide Area Networks

5

WAN Background (continued)

• Wide area networking developed from the way businesses first used computer networks to exchange information internally, beginning in the mid-1970s

• Several architectural features distinguished these networks from modern WANs

• WANs now support voice, data, and multimedia information; use open network protocols; and often are offered over a public network such as the Internet

Information Technology in Theory

Page 6: Chapter 12 Wide Area Networks

6

Packet Switching

• Information sent over the Internet is broken into small segments called packets

• Each packet contains the actual information content to be transmitted, as well as the order of the packet, the sender’s binary address (called the source address), and the binary address of the packet’s destination (called the destination address)

Information Technology in Theory

Page 7: Chapter 12 Wide Area Networks

7

Packet Switching (continued)

• The path that one packet traverses over a network from source to destination may be different from the next packet’s path, depending on network congestion or other conditions

• In this type of networking approach, known as connectionless packet switching, no dedicated end-to-end physical connection is established for the duration of data transmission

Information Technology in Theory

Page 8: Chapter 12 Wide Area Networks

8

Packet Switching (continued)• Network devices called routers read the destination

address and determine how to expeditiously route packets through the networks, based on routing algorithms that are designed to minimize latency

• Routers are also designed to minimize hops, the number of times a packet traverses various routers as it is transmitted over a network

• Once all the packets from a given transmission reach their destination, they are reassembled in correct order

Information Technology in Theory

Page 9: Chapter 12 Wide Area Networks

9

Packet Switching (continued)

• The packet-switching approach contrasts with the circuit-switching approach of the traditional telephone network

• The circuit-switching approach establishes a physical, dedicated end-to-end path through the network between a caller and receiver, and maintains the path for the entirety of the call

Information Technology in Theory

Page 10: Chapter 12 Wide Area Networks

10

Packet Switching (continued)

Information Technology in Theory

Page 11: Chapter 12 Wide Area Networks

11

Network Protocols

• Network protocols are another important technical enabler of WANs

• Unlike older types of networks, such as the SNA and DECnet systems, modern wide area networking has made the transition to more open network protocols

• Earlier protocols, such as SNA and DECnet, were proprietary protocols

Information Technology in Theory

Page 12: Chapter 12 Wide Area Networks

12

Network Protocols (continued)

• The dominant family of network protocols in modern architectures is TCP/IP

• It is not controlled by a single vendor; it is available for any manufacturer to use, and it enables universal access to the Internet

Information Technology in Theory

Page 13: Chapter 12 Wide Area Networks

13

WAN Architectural Components

• A router is an intelligent switching device that determines how to direct (or route) a packet across a network, based on the packet’s destination address and network conditions

• An enormous, interconnected web of thousands of routers makes up the backbone of the Internet

Information Technology in Theory

Page 14: Chapter 12 Wide Area Networks

14

WAN Architectural Components (continued)

• The router “looks up” information in a routing table• These routing tables are constantly changing and

automatically updated as routers probe their network environments, exchange information with other routers, and dynamically update their routing tables

Information Technology in Theory

Page 15: Chapter 12 Wide Area Networks

15

WAN Architectural Components (continued)

Information Technology in Theory

Page 16: Chapter 12 Wide Area Networks

16

WAN Architectural Components (continued)

• Customers who access the Internet or another type of WAN are connected to an edge router

• A device called a CSU/DSU (Channel Service Unit/Data Service Unit) is an important network component between the edge router and the dedicated transmission line

• The equipment at a customer location that serves as the demarcation point between a local network and a service provider’s WAN is often called customer premises equipment (CPE)

Information Technology in Theory

Page 17: Chapter 12 Wide Area Networks

17

WAN Architectural Components (continued)

Information Technology in Theory

Page 18: Chapter 12 Wide Area Networks

18

Private Networks

• If a company such as a bank wants a dedicated transmission path between its branches for private digital communication lines, the company has the option of leasing dedicated private lines from a network provider

• A private line is not shared with other customers, so it can guarantee performance and availability to some degree

Information Technology in Theory

Page 19: Chapter 12 Wide Area Networks

19

Private Networks (continued)

• These dedicated lines may run terrestrially over fiber-optic cables or high-grade twisted pair, via undersea fiber-optic cables, or even via satellite for international communications or remote areas that do not have adequate terrestrial telecommunications

• The primary disadvantage of a private network is cost, because a single enterprise bears the entire cost of the lines

Information Technology in Theory

Page 20: Chapter 12 Wide Area Networks

20

Private Networks (continued)

Information Technology in Theory

Page 21: Chapter 12 Wide Area Networks

21

Internet Services

• Many businesses use the infrastructure of the public Internet to communicate internally and with customers and suppliers

• Using the Internet and other shared public WANs is much more cost effective than using dedicated private networks

• Virtual private networks (VPNs) are a response to the performance and security concerns of public networks

Information Technology in Theory

Page 22: Chapter 12 Wide Area Networks

22

Internet Services (continued)

Information Technology in Theory

Page 23: Chapter 12 Wide Area Networks

23

Internet Services (continued)• Privacy and security are achieved through the

application of security measures and a technique called tunneling

• VPN services offer quality-of-service (QoS) guarantees to their customers to cover such factors as latency of packets, dropped packets that cannot be routed to their destination, and network availability

• VPN customers usually obtain service level agreements (SLAs) from the VPN provider

Information Technology in Theory

Page 24: Chapter 12 Wide Area Networks

24

Frame Relay Service

• The frame relay network is owned and operated by the service provider but is used by the customer

• This service uses packets, called frames, with a variable number of bits that are switched throughout the WAN until they reach their destination

• The frame relay standard uses a different format from other WAN standards

Information Technology in Theory

Page 25: Chapter 12 Wide Area Networks

25

Frame Relay Service (continued)• A software-defined (virtual) path is set between two

devices on the network, and the devices are expected to exchange information– Switched virtual circuits (SVCs)– Permanent virtual circuits (PVCs)

• Historically, frame relay originated as an improvement over an older WAN technology known as X.25

Information Technology in Theory

Page 26: Chapter 12 Wide Area Networks

26

Asynchronous Transfer Mode

• WAN service providers also offer Asynchronous Transfer Mode (ATM), a network alternative that formats information into fixed-length packets

• These packets are normally called cells in the context of ATM

• ATM cells have a total length of 53 bytes• ATM is a connection-oriented WAN approach• ATM’s fixed transmission delays, virtual circuits,

and fixed cell size are beneficial for low latency applications

Information Technology in Theory

Page 27: Chapter 12 Wide Area Networks

27

Multiprotocol Label Switching

• A more practical type of WAN service, called multiprotocol label switching (MPLS), is designed to simultaneously support many types of WAN traffic

• MPLS service can handle variable-length packets, in contrast with ATM, which transmits fixed-length cells

• One major difference between MPLS and traditional IP packet switching is that MPLS is connection oriented

Information Technology in Theory

Page 28: Chapter 12 Wide Area Networks

28

Multiprotocol Label Switching (continued)

• Traditional packet switching is often connectionless, meaning that a dedicated end-to-end connection is not established for the duration of transmission

• Unlike this approach, MPLS routes packets along preconfigured paths

Information Technology in Theory

Page 29: Chapter 12 Wide Area Networks

29

WAN Access Alternatives

• The access mechanism selected depends on several variables– Bandwidth– Mobility– Security– Availability

Information Technology in Theory

Page 30: Chapter 12 Wide Area Networks

30

Leased Private Lines

• Businesses and other enterprises that have more than a dozen employees and that need WAN access usually lease a dedicated private line to a commercial WAN service

Information Technology in Theory

Page 31: Chapter 12 Wide Area Networks

31

Leased Private Lines (continued)

• The line is rented on a monthly basis from a telecommunications service provider, and comes in the following transmission speeds:– 768 Kbps: Sub-T1 link (also called a fractional T1 line)– T-1 link: 1.544 Mbps (also called a dedicated T1 line)– T-3 link: 45 Mbps– OC-3: 155 Mbps– OC-12: 622 Mbps– OC-48: 2.488 Gbps

Information Technology in Theory

Page 32: Chapter 12 Wide Area Networks

32

Leased Private Lines (continued)

Information Technology in Theory

Page 33: Chapter 12 Wide Area Networks

33

Digital Subscriber Line

• DSL is a WAN access alternative that connects a user’s DSL modem to the twisted pair cables installed as part of the traditional telephone network

• Many types of DSL technology are available:– Symmetric digital subscriber line (SDSL)– Asymmetric digital subscriber line (ADSL)– High data rate digital subscriber line (HDSL)

Information Technology in Theory

Page 34: Chapter 12 Wide Area Networks

34

Digital Subscriber Line (continued)

• DSL quality depends on the distance between the user site and the telephone company (the “central office”) that houses the DSL termination equipment

• This equipment is known as the DSLAM, or DSL access multiplexer

• DSL service can offer a transmission rate of up to 7.1 Mbps downstream and approximately 768 Kbps upstream

Information Technology in Theory

Page 35: Chapter 12 Wide Area Networks

35

Digital Subscriber Line (continued)

Information Technology in Theory

Page 36: Chapter 12 Wide Area Networks

36

Digital Subscriber Line (continued)

Information Technology in Theory

Page 37: Chapter 12 Wide Area Networks

37

Digital Subscriber Line (continued)

Information Technology in Theory

Page 38: Chapter 12 Wide Area Networks

38

Cable Modem Access

• Internet access via cable offers transmission rates in the megabit per second range—approximately 30 to 50 Mbps downstream and 5 Mbps upstream in some areas

• Cable WAN access is geared primarily to residential customers who already subscribe to cable television service and is offered as part of a package with cable television, high-speed Internet access, and Voice over IP service

Information Technology in Theory

Page 39: Chapter 12 Wide Area Networks

39

Cable Modem Access (continued)

Information Technology in Theory

Page 40: Chapter 12 Wide Area Networks

40

WiMAX

• High-speed wireless broadband access to the Internet is commonplace over small geographical areas through technologies such as Wi-Fi

• A significant technological requirement is for products and services to provide the same type of wireless WAN access over greater distances, such as across a city using a metropolitan area network

Information Technology in Theory

Page 41: Chapter 12 Wide Area Networks

41

WiMAX (continued)

• WiMAX (Worldwide Interoperability for Microwave Access)

• Another name for IEEE 802.16• A formal set of networking standards for wireless

metropolitan area networks• Developed by the Institute of Electrical and

Electronics Engineers (IEEE)

Information Technology in Theory

Page 42: Chapter 12 Wide Area Networks

42

WiMAX (continued)• WiMAX networks would consist of WiMAX

antennas transmitting to residences and businesses with a WiMAX receiver, to laptops with WiMAX cards, or to Wi-Fi hot spots.

• WiMAX provides a theoretical maximum uplink and downlink speed of approximately 70 Mbps, although this rate can be achieved only over short ranges

• Performance varies depending on distance, spectrum allocated, and number of concurrent users sharing bandwidth

Information Technology in Theory

Page 43: Chapter 12 Wide Area Networks

43

WiMAX (continued)

Information Technology in Theory

Page 44: Chapter 12 Wide Area Networks

44

Network Management Systems• Businesses, universities, and even individual users require

local and wide area network services that are always available and that perform reliably

• To achieve these requirements, users must provide or outsource network management activities, which fall into four categories:– Configuration management– Performance management– Fault management– Security management

Information Technology in Theory

Page 45: Chapter 12 Wide Area Networks

45

Configuration Management

• The function of configuration management is to track and manage all the hardware and software associated with the computer network, and to manage any changes that occur to these architectural elements

Information Technology in Theory

Page 46: Chapter 12 Wide Area Networks

46

Configuration Management (continued)

Information Technology in Theory

Page 47: Chapter 12 Wide Area Networks

47

Performance Management

• Another function that network managers must provide is performance management, which ensures that the network is performing adequately for the applications and users it supports

Information Technology in Theory

Page 48: Chapter 12 Wide Area Networks

48

Fault Management

• One of the most important functions of network management is fault management—solving a network outage or performance problem when it occurs

Information Technology in Theory

Page 49: Chapter 12 Wide Area Networks

49

Security Management

• Network security is a vital management function that is often handled by a dedicated security team

• Some of these security management functions include network access control, user authentication, firewall management, and critical infrastructure protection

• Some security threats to enterprise networks include worms and viruses, spam, unauthorized access attempts, and data interception

Information Technology in Theory

Page 50: Chapter 12 Wide Area Networks

50

Summary• A WAN is a network that spans a large geographical

distance and can transmit voice, data, and multimedia information

• The Internet is the most prominent example of a WAN• Most WAN services are run over a public network

rather than private lines due to cost concerns• Most WANs, including the Internet, are based on a

network approach known as packet switching, which breaks information into small segments called packets prior to transmission– These packets are sent over a network, possibly routed along

different paths, and reassembled at their destination

Information Technology in Theory

Page 51: Chapter 12 Wide Area Networks

51

Summary (continued)• A virtual private network (VPN) runs over a public

network like the Internet, but it emulates a private network’s higher performance and security by applying security measures like encryption and by offering quality of service (QoS) guarantees

• WANs require network protocols, the standard rules that allow information to be exchanged over the network

• Important types of WANs are Internet services, frame relay, Asynchronous Transfer Mode, and multiprotocol label switching

Information Technology in Theory

Page 52: Chapter 12 Wide Area Networks

52

Summary (continued)• Most businesses and large institutions access WANs via

leased lines, while smaller businesses and individual users access WANs via wireless technologies, DSL, and cable modems

• Ensuring adequate WAN performance and reliability requires network management functions, including configuration management, performance management, fault management, and security management

Information Technology in Theory