SlideShare a Scribd company logo
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1
Chapter 2: Connecting
to the WAN
Connecting Networks
Presentation_ID 2© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 2
2.0 Introduction
2.1 WAN Technologies Overview
2.2 Selecting a WAN Technology
2.3 Summary
Presentation_ID 3© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 2: Objectives
 Describe the purpose of a WAN.
 Describe WAN operations.
 Describe WAN services available.
 Compare various private WAN technologies.
 Compare various public WAN technologies.
 Select the appropriate WAN protocol and service for a specific
network requirement.
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 4
2.1 WAN Technologies
Overview
Presentation_ID 5© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Purpose of WANs
Why Choose a WAN?
 Operates beyond the
geographic scope of a
LAN
 Used to interconnect
the enterprise LAN to
remote LANs in branch
sites and telecommuter
sites
 Owned by a service
provider
 Organization must pay
a fee to use the
provider’s services to
connect sites
Presentation_ID 6© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Purpose of WANs
Are WANs Necessary?
Businesses require communication among geographically separated
sites. Examples include:
 Regional or branch offices must be able to communicate and share data.
 Organizations must share information with other customer organizations.
 Mobile workers must access information that resides on corporate
networks.
Home computer users must send and receive data across
increasingly larger distances. Examples include:
 Consumers communicate over the Internet with banks, stores, and a
variety of providers of goods and services.
 Students do research by accessing library indexes and publications
located in other parts of the country and in other parts of the world.
Presentation_ID 7© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Purpose of WANs
Evolving Networks
 Companies expect their networks to perform optimally and to be able
to deliver an ever increasing array of services and applications to
support productivity and profitability.
 SPAN Engineering – example used in the curriculum
Presentation_ID 8© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Purpose of WANs
Small Office
SPAN Engineering – Environmental Consulting Firm
 Been in business for four years, has grown to include 15 employees:
six engineers, four computer-aided drawing (CAD) designers, a
receptionist, two senior partners, and two office assistants
 Uses a single LAN to share information between computers, and to
share peripherals, such as a printer, a large-scale plotter, and fax
equipment
 Upgraded LAN to provide inexpensive VoIP service to save on the
costs of separate phone lines for their employees
 Connection to the Internet is through a common broadband service
called DSL
 Uses support services purchased from the DSL provider
 Uses a hosting service rather than purchasing and operating its own
FTP and email servers
Presentation_ID 9© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Purpose of WANs
Campus Network
SPAN Engineering – Environmental Consulting Firm
 Five years later has grown rapidly.
 Contracted to design and implement a full-sized waste conversion
facility.
 Won other projects in neighboring municipalities and in other parts of
the country.
 Hired more staff and leased more office space with several hundred
employees, organized itself into functional departments.
 Network now consists of several subnetworks, each devoted to a
different department.
 Multiple LANs are joined to create a company-wide network or
campus, which spans several floors of the building.
Presentation_ID 10© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Purpose of WANs
Small Office – Campus Network
Presentation_ID 11© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Purpose of WANs
Branch Networks
 Another six years later, SPAN Engineering demand for its services
has skyrocketed.
 To manage those projects, the company has opened small branch
offices closer to the project sites.
 SPAN Engineering now has a data center, which houses the various
databases and servers of the company. They must now implement a
WAN.
 For its branch offices that are in nearby cities, the company decides
to use private dedicated lines through their local service provider.
 For those offices that are located in other countries, the Internet is an
attractive WAN connection option.
 Although connecting offices through the Internet is economical, it
introduces security and privacy issues that the IT team must
address.
Presentation_ID 12© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Purpose of WANs
Branch Networks (cont.)
Presentation_ID 13© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Purpose of WANs
Distributed Networks
 SPAN Engineering has now been in business for 20 years and has
grown to thousands of employees distributed in offices worldwide.
 Cost of the network and its related services is a big expense.
 Looking to provide the best network services at the lowest cost.
 Encouraging teleworking and virtual teams, web-based applications
are being used to increase productivity and reduce costs.
 Site-to-site and remote access Virtual Private Networks (VPNs)
enable the company to use the Internet to connect easily and
securely with employees and facilities around the world.
Presentation_ID 14© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Purpose of WANs
Distributed Networks (cont.)
 Network requirements can change dramatically as the company
grows.
 Distributing employees saves costs in many ways, but it puts
increased demands on the network.
 Network must be able to adapt and grow as the company changes.
 Network designers and administrators meet these challenges by
carefully choosing network technologies, protocols, and service
providers, and by optimizing their networks.
Presentation_ID 15© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Purpose of WANs
Distributed Networks (cont.)
Presentation_ID 16© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
WAN Operations
WANs in the OSI Model
WAN access standards
typically describe both
physical layer delivery
methods and data link layer
requirements, including
physical addressing, flow
control, and encapsulation.
Presentation_ID 17© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
WAN Operations
WAN Devices
Presentation_ID 18© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
WAN Operations
Circuit Switching
The two most common types of circuit-switched WAN
technologies are the public switched telephone network (PSTN)
and the Integrated Services Digital Network (ISDN).
Presentation_ID 19© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
WAN Operations
Packet Switching
Splits traffic data into packets that are routed over a shared network.
Packet-switching allow many pairs of nodes to communicate over the
same channel.
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 20
2.2 Selecting a WAN
Technology
Presentation_ID 21© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
WAN Services
WAN Link Connection Options
Presentation_ID 22© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
WAN Services
Service-Provided Network Infrastructure
Presentation_ID 23© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Private WAN Infrastructures
Leased Lines
Advantages:
 Simplicity
 Quality
 Availability
Disadvantages:
 Cost
 Limited flexibility
Presentation_ID 24© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Private WAN Infrastructures
Dialup Advantages:
 Simplicity
 Availability
 Low implementation cost
Disadvantages:
 Low data rates
 Relatively long
connection time
Presentation_ID 25© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Private WAN Infrastructures
ISDN
ISDN BRI ISDN PRI
Sample ISDN Topology
Presentation_ID 26© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Private WAN Infrastructures
Frame Relay
 PVCs carry both voice
and data traffic.
 PVCs are uniquely
identified by a data-link
connection identifier
(DLCI).
 PVCs and DLCIs ensure
bidirectional
communication from one
DTE device to another.
 R1 uses DLCI 102 to
reach R2 while R2 uses
DLCI 201 to reach R1.
Presentation_ID 27© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Private WAN Infrastructures
ATM
Built on a cell-based architecture, rather than on a frame-based
architecture. ATM cells are always a fixed length of 53 bytes.
Presentation_ID 28© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Private WAN Infrastructures
Ethernet WAN
Features and Benefits of
Ethernet WAN include:
 Reduced expenses and
administration
 Easy integration with existing
networks
 Enhanced business
productivity
 Service providers now offer
Ethernet WAN service using
fiber-optic cabling.
 Known as Metropolitan
Ethernet (MetroE), Ethernet
over MPLS (EoMPLS), and
Virtual Private LAN Service
(VPLS).
Note: Commonly used to replace the
traditional Frame Relay and ATM WAN
links.
Presentation_ID 29© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Private WAN Infrastructures
MPLS
Multiprotocol Label Switching (MPLS) is a multiprotocol high-
performance WAN technology that directs data from one router
to the next, based on short path labels rather than IP network
addresses.
Presentation_ID 30© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Private WAN Infrastructures
VSAT
Very small aperture
terminal (VSAT) - a
solution that creates a
private WAN using
satellite
communications.
Presentation_ID 31© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Private WAN Infrastructures
DSL
 Always-on connection
technology that uses
existing twisted-pair
telephone lines to
transport high-
bandwidth data, and
provides IP services
to subscribers.
 A DSL modem
converts an Ethernet
signal from the user
device to a DSL
signal, which is
transmitted to the
central office.
Presentation_ID 32© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Private WAN Infrastructures
Cable
 Network access is
available from
some cable
television networks.
 Cable modems
provide an always-
on connection and
a simple
installation.
Presentation_ID 33© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Private WAN Infrastructures
Wireless
New developments in
broadband wireless
technology:
 Municipal Wi-Fi – Many
cities have begun setting
up municipal wireless
 WiMAX – Worldwide
Interoperability for
Microwave Access
(WiMAX) is a new
technology that is just
beginning to come into
use.
 Satellite Internet
Presentation_ID 34© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Private WAN Infrastructures
3G/4G Cellular
Common cellular industry terms include:
 3G/4G Wireless – Abbreviation for 3rd generation and 4th
generation cellular access. These technologies support wireless
Internet access.
 Long-Term Evolution (LTE) – A newer and faster technology,
considered to be part of the 4th generation (4G) technology.
Presentation_ID 35© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Private WAN Infrastructures
VPN Technology
VPN is an encrypted
connection between private
networks over a public
network.
Benefits:
 Cost savings
 Security
 Scalability
 Compatibility with
broadband technology
Two types of VPN:
 Site-to-site VPNs
 Remote-access VPNs
Presentation_ID 36© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Selecting WAN Services
Choosing a WAN Link Connection
Answer the following questions when choosing a WAN Connection:
 What is the purpose of the WAN?
 What is the geographic scope?
 What are the traffic requirements?
Presentation_ID 37© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Selecting WAN Services
Choosing a WAN Link Connection
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 38
2.3 Summary
Presentation_ID 39© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 2: Summary
 A business can use private lines or the public network infrastructure
for WAN connections.
 WAN access standards operate at layers 1 and 2 of the OSI model,
and are defined and managed by the TIA/EIA, ISO, and IEEE.
 A WAN may be circuit-switched or packet-switched.
 There is common terminology used to identify the physical
components of WAN connections and who, the service provider or
the customer, is responsible for which components.
 Service provider networks are complex and the service provider’s
backbone networks consist primarily of high-bandwidth fiber optic
media.
Presentation_ID 40© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 2: Summary (cont.)
 Permanent, dedicated point-to-point connections are provided by
using leased lines.
 Public infrastructure connections include DSL, cable, wireless, and
3G/4G cellular.
 Security over public infrastructure connections can be provided by
using remote-access or site-to-site VPNs.
Presentation_ID 41© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

More Related Content

PDF
CCNAv5 - S4: Chapter3 Point to-point Connections
PDF
CCNAv5 - S4: Chapter 4 Frame Relay
PDF
CCNAv5 - S4: Chapter 9 troubleshooting the network
PDF
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
PDF
CCMAv5 - S4: Chapter 6: Broadband Solutions
PDF
CCNAv5 - S4: Chapter8 monitoring the network
PDF
CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4
PDF
CCNAv5 - S4: Chapter 1 Hierarchical Network Design
CCNAv5 - S4: Chapter3 Point to-point Connections
CCNAv5 - S4: Chapter 4 Frame Relay
CCNAv5 - S4: Chapter 9 troubleshooting the network
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCMAv5 - S4: Chapter 6: Broadband Solutions
CCNAv5 - S4: Chapter8 monitoring the network
CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4
CCNAv5 - S4: Chapter 1 Hierarchical Network Design

What's hot (20)

PPTX
CCNA 2 Routing and Switching v5.0 Chapter 4
PDF
CCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
PPTX
CCNA 2 Routing and Switching v5.0 Chapter 5
PPTX
CCNA 1 Routing and Switching v5.0 Chapter 11
PDF
CCNAv5 - S2: Chapter1 Introsuction to switched networks
PPTX
CCNA 1 Routing and Switching v5.0 Chapter 10
PPTX
CCNA 1 Routing and Switching v5.0 Chapter 5
PPTX
CCNA 1 Routing and Switching v5.0 Chapter 4
PPTX
CCNA 2 Routing and Switching v5.0 Chapter 1
PDF
CCNAv5 - S2: Chapter10 DHCP
PPTX
CCNA 2 Routing and Switching v5.0 Chapter 9
PPTX
CCNA 1 Routing and Switching v5.0 Chapter 3
PPTX
CCNA 1 Routing and Switching v5.0 Chapter 6
PDF
CCNAv5 - S1: Chapter 3 - Network protocols and communications
PPTX
CCNA 1 Routing and Switching v5.0 Chapter 2
PPTX
CCNA 2 Routing and Switching v5.0 Chapter 7
PPTX
CCNA 2 Routing and Switching v5.0 Chapter 2
PPTX
CCNA 2 Routing and Switching v5.0 Chapter 3
PPTX
CCNA 2 Routing and Switching v5.0 Chapter 11
PDF
CCNAv5 - S2: Chapter 9 Access Control Lists
CCNA 2 Routing and Switching v5.0 Chapter 4
CCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
CCNA 2 Routing and Switching v5.0 Chapter 5
CCNA 1 Routing and Switching v5.0 Chapter 11
CCNAv5 - S2: Chapter1 Introsuction to switched networks
CCNA 1 Routing and Switching v5.0 Chapter 10
CCNA 1 Routing and Switching v5.0 Chapter 5
CCNA 1 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 1
CCNAv5 - S2: Chapter10 DHCP
CCNA 2 Routing and Switching v5.0 Chapter 9
CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 6
CCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNA 1 Routing and Switching v5.0 Chapter 2
CCNA 2 Routing and Switching v5.0 Chapter 7
CCNA 2 Routing and Switching v5.0 Chapter 2
CCNA 2 Routing and Switching v5.0 Chapter 3
CCNA 2 Routing and Switching v5.0 Chapter 11
CCNAv5 - S2: Chapter 9 Access Control Lists
Ad

Similar to CCNAv5 - S4: Chapter2 Connecting To The Wan (20)

PPTX
WAN Guide for CCNP Students_Chapter2_final.pptx
PPTX
CNv6_instructorPPT_Chapter1.pptx
PPTX
CNv6_Chapter1CNv6_Chapter1CNv6_Chapter1.pptx
PDF
WAN and WAN Concepts common WAN terminology
PPTX
ENSA_Module_7.pptx_wide_area_network_concepts
PPTX
CertifiedNv6_instructorPPT_Chapter1.pptx
PPTX
CCNA4 Verson6 Chapter1
PPTX
CCNA (R & S) Module 02 - Connecting Networks - Chapter 1
PPTX
AD-WAN-Tech-Chapter 1.pptx
PPTX
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 1
PPTX
Itn6 instructor materials_chapter1
PPTX
Ccna v5-S1-Chapter 1
PPTX
ITN_instructorPPT_Chapter1.pptx
PPTX
CCNA RS_ITN - Chapter 1
PPTX
ITN_instructorPPT_Chapter1.pptx
PPTX
Itn instructor ppt_chapter1 - exploring the network
PPTX
Chapter 1 Exploring the Network. Intoduction.pptx
PDF
CCNA Modulo 1 capitulo 1.pdf
PPTX
PDF
Introduction of Exploring the Network Part 1
WAN Guide for CCNP Students_Chapter2_final.pptx
CNv6_instructorPPT_Chapter1.pptx
CNv6_Chapter1CNv6_Chapter1CNv6_Chapter1.pptx
WAN and WAN Concepts common WAN terminology
ENSA_Module_7.pptx_wide_area_network_concepts
CertifiedNv6_instructorPPT_Chapter1.pptx
CCNA4 Verson6 Chapter1
CCNA (R & S) Module 02 - Connecting Networks - Chapter 1
AD-WAN-Tech-Chapter 1.pptx
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 1
Itn6 instructor materials_chapter1
Ccna v5-S1-Chapter 1
ITN_instructorPPT_Chapter1.pptx
CCNA RS_ITN - Chapter 1
ITN_instructorPPT_Chapter1.pptx
Itn instructor ppt_chapter1 - exploring the network
Chapter 1 Exploring the Network. Intoduction.pptx
CCNA Modulo 1 capitulo 1.pdf
Introduction of Exploring the Network Part 1
Ad

More from Vuz Dở Hơi (20)

PDF
Ceh v8 Labs - Module18: Buffer Overflow.
PDF
Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.
PDF
Cehv8 Labs - Module15: Hacking Wireless Networks.
PDF
Cehv8 Labs - Module14: SQL Injection
PDF
Cehv8 Labs - Module13: Hacking Web Applications.
PDF
Cehv8 Labs - Module12: Hacking Webservers.
PDF
Ceh v8 Labs - Module11: Session Hijacking.
PDF
Cehv8 Labs - Module10: Denial of Service.
PDF
Cehv8 Labs - Module09: Social Engineering.
PDF
Cehv8 Labs - Module08: Sniffers.
PDF
Cehv8 Labs - Module07: Viruses and Worms.
PDF
Cehv8 Labs - Module06: Trojans and Backdoors.
PDF
Cehv8 Labs - Module 05: System Hacking.
PDF
Cehv8 Labs - Module04: Enumeration
PDF
Cehv8 Labs - Module03: Scanning Networks.
PDF
Cehv8 Labs - Module02: Footprinting and Reconnaissance
PDF
Cehv8 - Labs Module 00
PDF
Cehv8 - Module18: Buffer overflow.
PDF
Cehv8 - references
PDF
Cehv8 - Module 20: penetration testing
Ceh v8 Labs - Module18: Buffer Overflow.
Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.
Cehv8 Labs - Module15: Hacking Wireless Networks.
Cehv8 Labs - Module14: SQL Injection
Cehv8 Labs - Module13: Hacking Web Applications.
Cehv8 Labs - Module12: Hacking Webservers.
Ceh v8 Labs - Module11: Session Hijacking.
Cehv8 Labs - Module10: Denial of Service.
Cehv8 Labs - Module09: Social Engineering.
Cehv8 Labs - Module08: Sniffers.
Cehv8 Labs - Module07: Viruses and Worms.
Cehv8 Labs - Module06: Trojans and Backdoors.
Cehv8 Labs - Module 05: System Hacking.
Cehv8 Labs - Module04: Enumeration
Cehv8 Labs - Module03: Scanning Networks.
Cehv8 Labs - Module02: Footprinting and Reconnaissance
Cehv8 - Labs Module 00
Cehv8 - Module18: Buffer overflow.
Cehv8 - references
Cehv8 - Module 20: penetration testing

Recently uploaded (20)

PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PPTX
Cell Types and Its function , kingdom of life
PDF
Anesthesia in Laparoscopic Surgery in India
PPTX
Cell Structure & Organelles in detailed.
PDF
RMMM.pdf make it easy to upload and study
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
Insiders guide to clinical Medicine.pdf
PDF
01-Introduction-to-Information-Management.pdf
PDF
Complications of Minimal Access Surgery at WLH
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PPTX
Lesson notes of climatology university.
PDF
Classroom Observation Tools for Teachers
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
O5-L3 Freight Transport Ops (International) V1.pdf
Microbial diseases, their pathogenesis and prophylaxis
Final Presentation General Medicine 03-08-2024.pptx
Module 4: Burden of Disease Tutorial Slides S2 2025
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Cell Types and Its function , kingdom of life
Anesthesia in Laparoscopic Surgery in India
Cell Structure & Organelles in detailed.
RMMM.pdf make it easy to upload and study
Microbial disease of the cardiovascular and lymphatic systems
Insiders guide to clinical Medicine.pdf
01-Introduction-to-Information-Management.pdf
Complications of Minimal Access Surgery at WLH
O7-L3 Supply Chain Operations - ICLT Program
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Lesson notes of climatology university.
Classroom Observation Tools for Teachers
STATICS OF THE RIGID BODIES Hibbelers.pdf

CCNAv5 - S4: Chapter2 Connecting To The Wan

  • 1. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1 Chapter 2: Connecting to the WAN Connecting Networks
  • 2. Presentation_ID 2© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 2 2.0 Introduction 2.1 WAN Technologies Overview 2.2 Selecting a WAN Technology 2.3 Summary
  • 3. Presentation_ID 3© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 2: Objectives  Describe the purpose of a WAN.  Describe WAN operations.  Describe WAN services available.  Compare various private WAN technologies.  Compare various public WAN technologies.  Select the appropriate WAN protocol and service for a specific network requirement.
  • 4. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 4 2.1 WAN Technologies Overview
  • 5. Presentation_ID 5© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Purpose of WANs Why Choose a WAN?  Operates beyond the geographic scope of a LAN  Used to interconnect the enterprise LAN to remote LANs in branch sites and telecommuter sites  Owned by a service provider  Organization must pay a fee to use the provider’s services to connect sites
  • 6. Presentation_ID 6© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Purpose of WANs Are WANs Necessary? Businesses require communication among geographically separated sites. Examples include:  Regional or branch offices must be able to communicate and share data.  Organizations must share information with other customer organizations.  Mobile workers must access information that resides on corporate networks. Home computer users must send and receive data across increasingly larger distances. Examples include:  Consumers communicate over the Internet with banks, stores, and a variety of providers of goods and services.  Students do research by accessing library indexes and publications located in other parts of the country and in other parts of the world.
  • 7. Presentation_ID 7© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Purpose of WANs Evolving Networks  Companies expect their networks to perform optimally and to be able to deliver an ever increasing array of services and applications to support productivity and profitability.  SPAN Engineering – example used in the curriculum
  • 8. Presentation_ID 8© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Purpose of WANs Small Office SPAN Engineering – Environmental Consulting Firm  Been in business for four years, has grown to include 15 employees: six engineers, four computer-aided drawing (CAD) designers, a receptionist, two senior partners, and two office assistants  Uses a single LAN to share information between computers, and to share peripherals, such as a printer, a large-scale plotter, and fax equipment  Upgraded LAN to provide inexpensive VoIP service to save on the costs of separate phone lines for their employees  Connection to the Internet is through a common broadband service called DSL  Uses support services purchased from the DSL provider  Uses a hosting service rather than purchasing and operating its own FTP and email servers
  • 9. Presentation_ID 9© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Purpose of WANs Campus Network SPAN Engineering – Environmental Consulting Firm  Five years later has grown rapidly.  Contracted to design and implement a full-sized waste conversion facility.  Won other projects in neighboring municipalities and in other parts of the country.  Hired more staff and leased more office space with several hundred employees, organized itself into functional departments.  Network now consists of several subnetworks, each devoted to a different department.  Multiple LANs are joined to create a company-wide network or campus, which spans several floors of the building.
  • 10. Presentation_ID 10© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Purpose of WANs Small Office – Campus Network
  • 11. Presentation_ID 11© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Purpose of WANs Branch Networks  Another six years later, SPAN Engineering demand for its services has skyrocketed.  To manage those projects, the company has opened small branch offices closer to the project sites.  SPAN Engineering now has a data center, which houses the various databases and servers of the company. They must now implement a WAN.  For its branch offices that are in nearby cities, the company decides to use private dedicated lines through their local service provider.  For those offices that are located in other countries, the Internet is an attractive WAN connection option.  Although connecting offices through the Internet is economical, it introduces security and privacy issues that the IT team must address.
  • 12. Presentation_ID 12© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Purpose of WANs Branch Networks (cont.)
  • 13. Presentation_ID 13© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Purpose of WANs Distributed Networks  SPAN Engineering has now been in business for 20 years and has grown to thousands of employees distributed in offices worldwide.  Cost of the network and its related services is a big expense.  Looking to provide the best network services at the lowest cost.  Encouraging teleworking and virtual teams, web-based applications are being used to increase productivity and reduce costs.  Site-to-site and remote access Virtual Private Networks (VPNs) enable the company to use the Internet to connect easily and securely with employees and facilities around the world.
  • 14. Presentation_ID 14© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Purpose of WANs Distributed Networks (cont.)  Network requirements can change dramatically as the company grows.  Distributing employees saves costs in many ways, but it puts increased demands on the network.  Network must be able to adapt and grow as the company changes.  Network designers and administrators meet these challenges by carefully choosing network technologies, protocols, and service providers, and by optimizing their networks.
  • 15. Presentation_ID 15© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Purpose of WANs Distributed Networks (cont.)
  • 16. Presentation_ID 16© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential WAN Operations WANs in the OSI Model WAN access standards typically describe both physical layer delivery methods and data link layer requirements, including physical addressing, flow control, and encapsulation.
  • 17. Presentation_ID 17© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential WAN Operations WAN Devices
  • 18. Presentation_ID 18© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential WAN Operations Circuit Switching The two most common types of circuit-switched WAN technologies are the public switched telephone network (PSTN) and the Integrated Services Digital Network (ISDN).
  • 19. Presentation_ID 19© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential WAN Operations Packet Switching Splits traffic data into packets that are routed over a shared network. Packet-switching allow many pairs of nodes to communicate over the same channel.
  • 20. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 20 2.2 Selecting a WAN Technology
  • 21. Presentation_ID 21© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential WAN Services WAN Link Connection Options
  • 22. Presentation_ID 22© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential WAN Services Service-Provided Network Infrastructure
  • 23. Presentation_ID 23© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Private WAN Infrastructures Leased Lines Advantages:  Simplicity  Quality  Availability Disadvantages:  Cost  Limited flexibility
  • 24. Presentation_ID 24© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Private WAN Infrastructures Dialup Advantages:  Simplicity  Availability  Low implementation cost Disadvantages:  Low data rates  Relatively long connection time
  • 25. Presentation_ID 25© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Private WAN Infrastructures ISDN ISDN BRI ISDN PRI Sample ISDN Topology
  • 26. Presentation_ID 26© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Private WAN Infrastructures Frame Relay  PVCs carry both voice and data traffic.  PVCs are uniquely identified by a data-link connection identifier (DLCI).  PVCs and DLCIs ensure bidirectional communication from one DTE device to another.  R1 uses DLCI 102 to reach R2 while R2 uses DLCI 201 to reach R1.
  • 27. Presentation_ID 27© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Private WAN Infrastructures ATM Built on a cell-based architecture, rather than on a frame-based architecture. ATM cells are always a fixed length of 53 bytes.
  • 28. Presentation_ID 28© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Private WAN Infrastructures Ethernet WAN Features and Benefits of Ethernet WAN include:  Reduced expenses and administration  Easy integration with existing networks  Enhanced business productivity  Service providers now offer Ethernet WAN service using fiber-optic cabling.  Known as Metropolitan Ethernet (MetroE), Ethernet over MPLS (EoMPLS), and Virtual Private LAN Service (VPLS). Note: Commonly used to replace the traditional Frame Relay and ATM WAN links.
  • 29. Presentation_ID 29© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Private WAN Infrastructures MPLS Multiprotocol Label Switching (MPLS) is a multiprotocol high- performance WAN technology that directs data from one router to the next, based on short path labels rather than IP network addresses.
  • 30. Presentation_ID 30© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Private WAN Infrastructures VSAT Very small aperture terminal (VSAT) - a solution that creates a private WAN using satellite communications.
  • 31. Presentation_ID 31© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Private WAN Infrastructures DSL  Always-on connection technology that uses existing twisted-pair telephone lines to transport high- bandwidth data, and provides IP services to subscribers.  A DSL modem converts an Ethernet signal from the user device to a DSL signal, which is transmitted to the central office.
  • 32. Presentation_ID 32© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Private WAN Infrastructures Cable  Network access is available from some cable television networks.  Cable modems provide an always- on connection and a simple installation.
  • 33. Presentation_ID 33© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Private WAN Infrastructures Wireless New developments in broadband wireless technology:  Municipal Wi-Fi – Many cities have begun setting up municipal wireless  WiMAX – Worldwide Interoperability for Microwave Access (WiMAX) is a new technology that is just beginning to come into use.  Satellite Internet
  • 34. Presentation_ID 34© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Private WAN Infrastructures 3G/4G Cellular Common cellular industry terms include:  3G/4G Wireless – Abbreviation for 3rd generation and 4th generation cellular access. These technologies support wireless Internet access.  Long-Term Evolution (LTE) – A newer and faster technology, considered to be part of the 4th generation (4G) technology.
  • 35. Presentation_ID 35© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Private WAN Infrastructures VPN Technology VPN is an encrypted connection between private networks over a public network. Benefits:  Cost savings  Security  Scalability  Compatibility with broadband technology Two types of VPN:  Site-to-site VPNs  Remote-access VPNs
  • 36. Presentation_ID 36© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Selecting WAN Services Choosing a WAN Link Connection Answer the following questions when choosing a WAN Connection:  What is the purpose of the WAN?  What is the geographic scope?  What are the traffic requirements?
  • 37. Presentation_ID 37© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Selecting WAN Services Choosing a WAN Link Connection
  • 38. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 38 2.3 Summary
  • 39. Presentation_ID 39© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 2: Summary  A business can use private lines or the public network infrastructure for WAN connections.  WAN access standards operate at layers 1 and 2 of the OSI model, and are defined and managed by the TIA/EIA, ISO, and IEEE.  A WAN may be circuit-switched or packet-switched.  There is common terminology used to identify the physical components of WAN connections and who, the service provider or the customer, is responsible for which components.  Service provider networks are complex and the service provider’s backbone networks consist primarily of high-bandwidth fiber optic media.
  • 40. Presentation_ID 40© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 2: Summary (cont.)  Permanent, dedicated point-to-point connections are provided by using leased lines.  Public infrastructure connections include DSL, cable, wireless, and 3G/4G cellular.  Security over public infrastructure connections can be provided by using remote-access or site-to-site VPNs.
  • 41. Presentation_ID 41© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential