Module 7: WAN Concepts
Enterprise Networking, Security,
and Automation v7.0 (ENSA)
2
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Module Objectives
Module Title: WAN Concepts
Module Objective: Explain how WAN access technologies can be used to satisfy business
requirements.
Topic Title Topic Objective
Purpose of WANs Explain the purpose of a WAN.
WAN Operations Explain how WANs operate.
Traditional WAN Connectivity Compare traditional WAN connectivity options.
Modern WAN Connectivity Compare modern WAN connectivity options.
Internet-Based Connectivity Compare internet-based connectivity options.
3
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
7.1 Purpose of WANs
4
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Purpose of WANs
LANs and WANs
A WAN is a telecommunications network that spans over a relatively large geographical
area and is required to connect beyond the boundary of the LAN.
Local Area Networks (LANs) Wide Area Networks (WANs)
LANs provide networking services
within a small geographic area.
WANs provide networking services
over large geographical areas.
LANs are used to interconnect local
computers, peripherals, and other
devices.
WANs are used to interconnect
remote users, networks, and sites.
A LAN is owned and managed by
an organization or home user.
WANs are owned and managed by
internet service, telephone, cable,
and satellite providers.
Other than the network
infrastructure costs, there is no fee
to use a LAN.
WAN services are provided for a
fee.
LANs provide high bandwidth
speeds using wired Ethernet and
Wi-Fi services.
WANs providers offer low to high
bandwidth speeds, over long
distances.
5
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Purpose of WANs
Private and Public WANs
A private WAN is a connection that is dedicated to a single customer.
Private WANs provide the following:
• Guaranteed service level
• Consistent bandwidth
• Security
A public WAN connection is typically provided by an ISP or telecommunications service
provider using the internet. In this case, the service levels and bandwidth may vary, and
the shared connections do not guarantee security.
6
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Purpose of WANs
WAN Topologies
WANs are implemented using the following logical topology designs:
• Point-to-Point Topology
• Hub-and-Spoke Topology
• Dual-homed Topology
• Fully Meshed Topology
• Partially Meshed Topology
Note: Large networks usually deploy a combination of these topologies.
7
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Purpose of WANs
WAN Topologies (Cont.)
Point-to-Point Topology
• Employs a point-to-point circuit between two endpoints.
• Involves a Layer 2 transport service through the service provider network.
• The point-to-point connection is transparent to the customer network.
Note: It can become expensive if many point-to-point connections are required.
8
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Purpose of WANs
WAN Topologies (Cont.)
Hub-and-Spoke Topology
• Enables a single interface on the hub router to be shared by all spoke circuits.
• Spoke routers can be interconnected through the hub router using virtual circuits and
routed subinterfaces.
• Spoke routers can only communicate with each other through the hub router.
Note: The hub router represents a
single point of failure. If it fails, inter-
spoke communication also fails.
9
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Purpose of WANs
WAN Topologies (Cont.)
Dual-homed Topology
• Offers enhanced network redundancy, load balancing, distributed computing and
processing, and the ability to implement backup service provider connections.
• More expensive to implement than single-homed topologies. This is because they
require additional networking hardware, such as additional routers and switches.
• More difficult to implement because they require additional, and more complex,
configurations.
10
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Purpose of WANs
WAN Topologies (Cont.)
Fully Meshed Topology
• Uses multiple virtual circuits to connect all
sites
• The most fault-tolerant topology
Partially Meshed Topology
• Connects many but not all sites
11
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Purpose of WANs
Carrier Connections
Another aspect of WAN design is how an organization connects to the internet. An
organization usually signs a service level agreement (SLA) with a service provider. The
SLA outlines the expected services relating to the reliability and availability of the
connection.
The service provider may or may not be the actual carrier. A carrier owns and maintains
the physical connection and equipment between the provider and the customer. Typically,
an organization will choose either a single-carrier or dual-carrier WAN connection.
12
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Purpose of WANs
Carrier Connections (Cont.)
A single-carrier connection is when an
organization connects to only one
service provider. An SLA is negotiated
between the organization and the
service provider.
A dual-carrier connection provides
redundancy and increases network
availability. The organization negotiates
separate SLAs with two different service
providers.
13
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Purpose of WANs
Evolving Networks
Network requirements of a company can change dramatically as the company grows
over time.
• A network must meet the day-to-day operational needs of business, and it must be
able to adapt and grow as a company changes.
• Network designers and administrators meet these challenges by carefully
choosing network technologies, protocols, and service providers.
• Networks can be optimized by using a variety of network design techniques and
architectures.
To illustrate differences between network size, we will use a fictitious company called
SPAN Engineering as it grows from a small, local, business into a global enterprise.
14
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Purpose of WANs
Evolving Networks (Cont.)
Small Network
SPAN, a small fictitious company,
started with a few employees in a
small office.
• Uses a single LAN connected to
a wireless router for sharing data
and peripherals.
• Connection to the internet is
through a common broadband
service called Digital Subscriber
Line (DSL)
• IT support is contracted from the
DSL provider.
15
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Purpose of WANs
Evolving Networks (Cont.)
Campus Network
Within a few years SPAN grew and
required several floors of a building.
The company now required a
Campus Area Network (CAN).
• A firewall secures internet
access to corporate users.
• In-house IT staff to support and
maintain the network.
16
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Purpose of WANs
Evolving Networks (Cont.)
Branch Network
• A few years later, the company
expanded and added a branch site
in the city, and remote and regional
sites in other cities.
• The company now required a
metropolitan area network (MAN)
to interconnect sites within the city.
• To connect to the central office,
branch offices in nearby cities used
private dedicated lines through
their local service provider.
17
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Purpose of WANs
Evolving Networks (Cont.)
Distributed Network
• SPAN Engineering has now
been in business for 20 years
and has grown to thousands of
employees distributed in offices
worldwide.
• Site-to-site and remote access
Virtual Private Networks (VPNs)
enable the company to use the
internet to connect easily and
securely with employees and
facilities around the world.
18
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
7.2 WAN Operation
19
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
WAN Operations
WAN Standards
Modern WAN standards are defined and managed by a number of
recognized authorities including the following:
• TIA/EIA - Telecommunications Industry Association and Electronic Industries
Alliance
• ISO - International Organization for Standardization
• IEEE - Institute of Electrical and Electronics Engineers
20
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
WAN Operations
WANs in the OSI Model
Most WAN standards focus on the physical layer
and the data link layer.
Layer 1 Protocols
• Synchronous Digital Hierarchy (SDH)
• Synchronous Optical Networking (SONET)
• Dense Wavelength Division Multiplexing (DWDM)
Layer 2 Protocols
• Broadband (i.e., DSL and Cable)
• Wireless
• Ethernet WAN (Metro Ethernet)
• Multiprotocol Label Switching (MPLS)
• Point-to-Point Protocol (PPP) (less used)
• High-Level Data Link Control (HDLC) (less used)
• Frame Relay (legacy)
• Asynchronous Transfer Mode (ATM) (legacy)
21
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
WAN Operations
Common WAN Terminology
There are specific terms used to describe WAN
connections between the subscriber (i.e., the
company / client) and the WAN service provider.
WAN Term Description
Data Terminal
Equipment (DTE)
Connects the subscriber LANs to the WAN
communication device
Data Communications
Equipment (DCE)
Device used to communicate with the
provider
Customer Premises
Equipment (CPE)
This is the DTE and DCE devices located on
the enterprise edge
Point-of-Presence
(POP)
The point where the subscriber connects to
the service provider network
Demarcation Point The physical location in a building or
complex that officially separates the CPE
from service provider equipment.
22
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
WAN Operations
Common WAN Terminology (Cont.)
WAN Term Description
Local Loop (last mile) The copper or fiber cable that connects the
CPE to the CO of the service provider
Central office (CO) The local service provider facility or building
that connects the CPE to the provider
network
Toll network Includes backhaul, long-haul, all-digital,
fiber-optic communications lines, switches,
routers, and other equipment inside the
WAN provider network
Backhaul network Connects multiple access nodes of the
service provider network
Backbone network Large, high-capacity networks used to
interconnect service provider networks and
to create a redundant network.
23
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
WAN Operations
WAN Devices
There are many types of devices that are specific to WAN environments.
WAN Device Description
Voiceband
Modem
Dial-up modem – uses telephone lines
Legacy device
DSL Modem /
Cable Modem
Collectively known as broadband modems, these
high-speed digital modems connect to the DTE
router using Ethernet.
CSU/DSU Digital-leased lines require a CSU and a DSU. It
connects a digital device to a digital line.
Optical Converter Connect fiber-optic media to copper media and
convert optical signals to electronic pulses.
Wireless Router /
Access Point
Devices are used to wirelessly connect to a WAN
provider.
WAN Core
devices
WAN backbone consists of multiple high-speed
routers and Layer 3 switches.
24
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
WAN Operations
Serial Communication
• Almost all network communications
occur using a serial communication
delivery. Serial communication transmits
bits sequentially over a single channel.
• In contrast, parallel communications
simultaneously transmit several bits
using multiple wires.
• As the cable length increases, the
synchronization timing between multiple
channels becomes more sensitive to
distance. For this reason, parallel
communication is limited to very short
distances
25
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
WAN Operations
Circuit-Switched Communication
A circuit-switched network establishes a
dedicated circuit (or channel) between
endpoints before the users can communicate.
• Establishes a dedicated virtual connection
through the service provider network
before communication can start.
• All communication uses the same path.
• The two most common types of circuit-
switched WAN technologies are the public
switched telephone network (PSTN) and
the legacy Integrated Services Digital
Network (ISDN).
26
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
WAN Operations
Packet-Switched Communication
Network communication is most commonly
implemented using packet-switched
communication.
• Segments traffic data into packets that are
routed over a shared network.
• Much less expensive and more flexible
than circuit switching.
• Common types of packet-switched WAN
technologies are:
• Ethernet WAN (Metro Ethernet),
• Multiprotocol Label Switching (MPLS)
• Frame Relay
• Asynchronous Transfer Mode (ATM).
27
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
WAN Operations
SDH, SONET, and DWDM
Service provider networks use fiber-optic infrastructures to transport user data between
destinations. Fiber-optic cable is far superior to copper cable for long distance transmissions due
to its much lower attenuation and interference.
There are two optical fiber OSI layer 1 standards available to service providers:
• SDH - Synchronous Digital Hierarchy (SDH) is a global standard for transporting data over
fiber-optic cable.
• SONET - Synchronous Optical Networking (SONET) is the North American standard that
provides the same services as SDH.
SDH/SONET define how to transfer multiple data, voice, and video communications over optical
fiber using lasers or light-emitting diodes (LEDs) over great distances.
Dense Wavelength Division Multiplexing (DWDM) is a newer technology that increases the
data-carrying capacity of SDH and SONET by simultaneously sending multiple streams of data
(multiplexing) using different wavelengths of light.
28
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
7.3 Traditional WAN
Connectivity
29
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Traditional WAN Connectivity
Traditional WAN Connectivity Options
To understand the WANs of today, it helps
to know where they started.
• When LANs appeared in the 1980s,
organizations began to see the need to
interconnect with other locations.
• To do so, they needed their networks to
connect to the local loop of a service
provider.
• This was accomplished by using
dedicated lines, or by using switched
services from a service provider.
30
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Traditional WAN Connectivity
Common WAN Terminology
Point-to-point lines could be leased from a service provider and were called “leased
lines”. The term refers to the fact that the organization pays a monthly lease fee to a
service provider to use the line.
• Leased lines are available in different fixed capacities and are generally priced
based on the bandwidth required and the distance between the two connected
points.
• There are two systems used to define the digital capacity of a copper media serial
link:
• T-carrier - Used in North America, T-carrier provides T1 links supporting bandwidth up to
1.544 Mbps and T3 links supporting bandwidth up to 43.7 Mbps.
• E-carrier – Used in Europe, E-carrier provides E1 links supporting bandwidth up to 2.048
Mbps and E3 links supporting bandwidth up to 34.368 Mbps.
31
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Traditional WAN Connectivity
Common WAN Terminology (Cont.)
The table summarizes the advantages and disadvantages of leased lines.
Advantages
Simplicity Point-to-point communication links require minimal expertise to install and maintain.
Quality Point-to-point communication links usually offer high quality service, if they have adequate
bandwidth.
Availability Constant availability is essential for some applications, such as e-commerce. Point-to-point
communication links provide permanent, dedicated capacity which is required for VoIP or Video
over IP.
Disadvantages
Cost Point-to-point links are generally the most expensive type of WAN access. The cost of leased line
solutions can become significant when they are used to connect many sites over increasing
distances.
Limited
flexibility
WAN traffic is often variable, and leased lines have a fixed capacity, so that the bandwidth of the
line seldom matches the need exactly.
32
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Traditional WAN Connectivity
Circuit-Switch Options
Circuit-switched connections are provided by Public Service Telephone Network
(PSTN) carriers. The local loop connecting the CPE to the CO is copper media.
There are two traditional circuit-switched options:
Public Service Telephone Network (PSTN)
• Dialup WAN access uses the PSTN as its WAN connection. Traditional local loops can
transport binary computer data through the voice telephone network using a voiceband
modem.
• The physical characteristics of the local loop and its connection to the PSTN limit the rate of the
signal to less than 56 kbps.
Integrated Services Digital Network (ISDN)
• ISDN is a circuit-switching technology that enables the PSTN local loop to carry digital signals.
This provided higher capacity switched connections than dialup access. ISDN provides for data
rates from 45 Kbps to 2.048 Mbps.
33
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Traditional WAN Connectivity
Packet-Switch Options
Packet switching segments data into packets that are routed over a shared network. It allows
many pairs of nodes to communicate over the same channel.
There are two traditional (legacy) circuit-switched options:
Frame Relay
• Frame Relay is a simple Layer 2 non-broadcast multi-access (NBMA) WAN technology that
is used to interconnect enterprise LANs.
• Frame Relay creates PVCs which are uniquely identified by a data-link connection identifier
(DLCI).
Asynchronous Transfer Mode (ATM)
• Asynchronous Transfer Mode (ATM) technology is capable of transferring voice, video, and
data through private and public networks.
• ATM is built on a cell-based architecture rather than on a frame-based architecture. ATM
cells are always a fixed length of 53 bytes.
Note: Frame relay and ATM networks have been largely replaced by faster Metro Ethernet and internet-based solutions.
34
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
7.4 Modern WAN
Connectivity
35
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Modern WAN Connectivity
Modern WANs
Modern WANS have more connectivity
options than traditional WANs.
• Enterprises now require faster and more
flexible WAN connectivity options.
• Traditional WAN connectivity options
have rapidly declined in use because
they are either no longer available, too
expensive, or have limited bandwidth.
The figure displays the local loop connections most
likely encountered today.
36
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Modern WAN Connectivity
Modern WAN Connectivity Options
New technologies are continually emerging. The
figure summarizes the modern WAN connectivity
options.
Dedicated broadband
• Fiber can be installed independently by an
organization to connect remote locations directly
together.
• Dark fiber can be leased or purchased from a
supplier.
Packet-switched
• Metro Ethernet – Replacing many traditional WAN
options.
• MPLS – Enables sites to connect to the provider
regardless of its access technologies.
Internet-based broadband
• Organizations are now commonly using the global
internet infrastructure for WAN connectivity.
37
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Modern WAN Connectivity
Ethernet WAN
Service providers now offer Ethernet WAN service
using fiber-optic cabling.
The Ethernet WAN service can go by many
names, including the following:
• Metropolitan Ethernet (Metro E)
• Ethernet over MPLS (EoMPLS)
• Virtual Private LAN Service (VPLS)
There are several benefits to an Ethernet WAN:
• Reduced expenses and administration
• Easy integration with existing networks
• Enhanced business productivity
Note: Ethernet WANs have gained in popularity and are now commonly being used to replace the
traditional serial point-to-point, Frame Relay and ATM WAN links.
38
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Modern WAN Connectivity
MPLS
Multiprotocol Label Switching (MPLS) is a high-performance service provider WAN routing
technology to interconnect clients without regard to access method or payload.
• MPLS supports a variety of client access methods (e.g., Ethernet, DSL, Cable, Frame Relay).
• MPLS can encapsulate all types of protocols including IPv4 and IPv6 traffic.
• An MPLS router can be a customer edge (CE) router, a provider edge (PE) router, or an
internal provider (P) router.
• MPLS routers are label switched routers (LSRs). They attach labels to packets that are then
used by other MPLS routers to forward traffic.
• MPLS also provides services for QoS support, traffic engineering, redundancy, and VPNs.
39
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
7.5 Internet-Based
Connectivity
40
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Internet-Based Connectivity
Internet-Based Connectivity Options
Internet-based broadband connectivity is an alternative to using
dedicated WAN options.
Internet-based connectivity can be divided into wired and
wireless options.
Wired Options
• Wired options use permanent cabling (e.g., copper or fiber)
to provide consistent bandwidth, and reduce error rates and
latency. Examples: DSL, cable connections, and optical
fiber networks.
Wireless Options
• Wireless options are less expensive to implement
compared to other WAN connectivity options because they
use radio waves instead of wired media to transmit data.
Examples: cellular 3G/4G/5G or satellite internet services.
• Wireless signals can be negatively affected by factors such
as distance from radio towers, interference from other
sources and weather.
41
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Internet-Based Connectivity
DSL Technology
Digital Subscriber Line (DSL) is a high-speed,
always-on, connection technology that uses
existing twisted-pair telephone lines to provide
IP services to users.
DSL are categorized as either Asymmetric
DSL (ADSL) or Symmetric DSL (SDSL).
• ADSL and ADSL2+ provide higher downstream
bandwidth to the user than upload bandwidth.
• SDSL provides the same capacity in both
directions.
DSL transfer rates are dependent on the
actual length of the local loop, and the type
and condition of the cabling.
42
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Internet-Based Connectivity
DSL Connections
Service providers deploy DSL connections in the local loop. The connection is set up
between the DSL modem and the DSL access multiplexer (DSLAM).
• The DSL modem converts the Ethernet signals from the teleworker device to a
DSL signal, which is transmitted to a DSL access multiplexer (DSLAM) at the
provider location.
• A DSLAM is located at the Central Office (CO) of the provider and concentrates
connections from multiple DSL subscribers.
• DSL is not a shared medium. Each user has a separate direct connection to the
DSLAM. Adding users does not impede performance.
43
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Internet-Based Connectivity
DSL and PPP
ISPs use PPP as the Layer 2 protocol for broadband DSL connections.
• PPP can be used to authenticate the subscriber.
• PPP can assign a public IPv4 address to the subscriber.
• PPP provides link-quality management features.
There are two ways PPP over Ethernet (PPPoE) can be deployed:
• Host with PPoE Client - The PPPoE client software communicates with the DSL modem
using PPPoE and the modem communicates with the ISP using PPP.
• Router PPPoE Client - The router is the PPPoE client and obtains its configuration from
the provider.
44
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Internet-Based Connectivity
Cable Technology
Cable technology is a high-speed always-on connection technology that uses a coaxial cable
from the cable company to provide IP services to users.
The Data over Cable Service Interface Specification (DOCSIS) is the international standard for
adding high-bandwidth data to an existing cable system.
• The optical node converts RF signals to light pulses over fiber-optic cable.
• The fiber media enables the signals to travel over long distances to the provider headend where a Cable
Modem Termination System (CMTS) is located.
• The headend contains the databases needed to provide internet access while the CMTS is responsible
for communicating with the cable modems.
Note: All the local subscribers share the same cable bandwidth. As more users join the service, available bandwidth may drop
below the expected rate.
45
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Internet-Based Connectivity
Optical Fiber
Many municipalities, cities, and providers install fiber-optic cable to the user
location. This is commonly referred to as Fiber to the x (FTTx) and includes
the following:
• Fiber to the Home (FTTH) - Fiber reaches the boundary of the residence.
• Fiber to the Building (FTTB) - Fiber reaches the boundary of the building with the
final connection to the individual living space being made via alternative means.
• Fiber to the Node/Neighborhood (FTTN) – Optical cabling reaches an optical
node that converts optical signals to a format acceptable for twisted pair or coaxial
cable to the premise.
Note: FTTx can deliver the highest bandwidth of all broadband options.
46
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Internet-Based Connectivity
Wireless Internet-Based Broadband
Wireless technology uses the unlicensed radio spectrum to send and receive data.
• Municipal Wi-Fi - Municipal wireless networks are available in many cities providing
high-speed internet access for free, or for substantially less than the price of other
broadband services.
• Cellular – Increasingly used to connect devices to the internet using radio waves to
communicate through a nearby mobile phone tower. 3G/4G/5G and Long-Term
Evolution (LTE) are cellular technologies.
• Satellite Internet - Typically used by rural users or in remote locations where cable and
DSL are not available. A router connects to a satellite dish which is pointed to a service
provider satellite in Geosynchronous orbit. Trees and heavy rains can impact the
satellite signal.
• WiMAX - Worldwide Interoperability for Microwave Access (WiMAX) is described in the
IEEE standard 802.16 Provides high-speed broadband service with wireless access
and provides broad coverage like a cell phone network rather than through small Wi-Fi
hotspots.
47
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Internet-Based Connectivity
VPN Technology
VPNs can be used to address security concerns incurred when a remote office worker uses broadband
services to access the corporate WAN over the internet.
A VPN is an encrypted connection between private networks over a public network. VPN tunnels are routed
through the internet from the private network of the company to the remote site or employee host.
There are several benefits to using VPN:
• Cost savings - Eliminates expensive, dedicated WAN links and modem banks.
• Security - Advanced encryption and authentication protocols protect data from unauthorized access.
• Scalability - Corporations can add large amounts of capacity without adding significant infrastructure.
• Compatibility with broadband technology - Supported by broadband service providers such as DSL and
cable.
VPNs are commonly implemented as the following:
• Site-to-site VPN - VPN settings are configured on routers. Clients are unaware that their data is being
encrypted.
• Remote Access - The user is aware and initiates remote access connection. For example, using HTTPS in
a browser to connect to your bank. Alternatively, the user can run VPN client software on their host to
connect to and authenticate with the destination device.
48
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Internet-Based Connectivity
ISP Connectivity Options
There are different ways an organization can connect to an ISP. The
choice depends on the needs and budget of the organization.
• Single-homed –Single connection to the ISP using one link.
Provides no redundancy and is the least expensive solution.
• Dual-homed - Connects to the same ISP using two links.
Provides both redundancy and load balancing. However, the
organization loses internet connectivity if the ISP experiences an
outage.
• Multihomed -The client connects to two different ISPs. This
design provides increased redundancy and enables load-
balancing, but it can be expensive.
• Dual-multihomed - Dual-multihomed is the most resilient
topology of the four shown. The client connects with redundant
links to multiple ISPs. This topology provides the most
redundancy possible. It is the most expensive option of the four.
49
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Internet-Based Connectivity
Broadband Solution Comparison
Each broadband solution has advantages and disadvantages. If there are multiple broadband
solutions available, a cost-versus-benefit analysis should be performed to determine the best
solution.
Some factors to consider include the following:
• Cable - Bandwidth is shared by many users. Therefore, upstream data rates are often slow
during high-usage hours in areas with over-subscription.
• DSL - Limited bandwidth that is distance sensitive (in relation to the ISP central office).
Upload rate is proportionally lower compared to download rate.
• Fiber-to-the-Home - This option requires fiber installation directly to the home.
• Cellular/Mobile - With this option, coverage is often an issue, even within a small office or
home office where bandwidth is relatively limited.
• Municipal Wi-Fi - Most municipalities do not have a mesh Wi-Fi network deployed. If is
available and in range, then it is a viable option.
• Satellite - This option is expensive and provides limited capacity per subscriber. Typically
used when no other option is available.
50
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Internet-Based Connectivity
Lab – Research Broadband Internet Access Options
In this lab, you will complete the following objectives:
• Investigate Broadband Distribution
• Research Broadband Access Options for Specific Scenarios
51
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
7.6 Module Practice and Quiz
52
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Module Practice and Quiz
Packet Tracer – WAN Concepts
In this lab, you will do the following:
• Describe different WAN connectivity options
53
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Module Practice and Quiz
What did I learn in this module?
• A Wide Area Network (WAN) is required to connect beyond the boundary of the LAN.
• A private WAN is a connection that is dedicated to a single customer.
• A public WAN connection is typically provided by an ISP or telecommunications service
provider using the internet.
• WANs are implemented using the following logical topologies: Point-to-Point, Hub-and-
Spoke, Dual-homed, Fully Meshed, and Partially Meshed.
• A dual-carrier connection provides redundancy and increases network availability. The
organization negotiates separate SLAs with two different service providers.
• Site-to-site and remote access Virtual Private Networks (VPNs) enable the company to use
the internet to securely connect with employees and facilities around the world.
• Modern WAN standards are defined and managed by a number of recognized authorities:
TIA/EIA, ISO, and IEEE.
• Layer 1 optical fiber protocol standards include SDH, SONET, and DWDM. Layer 2 protocols
define how data will be encapsulated into a frame.
• Layer 2 protocols include broadband, wireless, Ethernet WAN, MPLS, PPP, HDLC.
54
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Module Practice and Quiz
What did I learn in this module?
• Serial communication transmits bits sequentially over a single channel. In contrast, parallel
communications simultaneously transmit several bits using multiple wires.
• The two most common types of circuit-switched WAN technologies are PSTN and ISDN.
• Common types of packet-switched WAN technologies are Ethernet WAN and MPLS. There
are two optical fiber OSI layer 1 standards.
• SDH/SONET define how to transfer multiple data, voice, and video communications over
optical fiber using lasers or LEDs over great distances.
• Circuit-switched connections were provided by PSTN carriers.
• ISDN is a circuit-switching technology that enables the PSTN local loop to carry digital
signals.
• Packet switching segments data into packets that are routed over a shared network.
• Frame Relay is a simple Layer 2 NBMA WAN technology used to interconnect enterprise
LANs.
• ATM technology is capable of transferring voice, video, and data through private and public
networks. It is built on a cell-based architecture rather than on a frame-based architecture.
55
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Module Practice and Quiz
What did I learn in this module?
• Modern WAN connectivity options include dedicated broadband, Ethernet WAN and MPLS
(packet-switched), along with various wired and wireless version of internet-based
broadband.
• MPLS is a high-performance service provider WAN routing technology to interconnect clients.
MPLS supports a variety of client access methods (e.g., Ethernet, DSL, Cable, Frame Relay).
MPLS can encapsulate all types of protocols including IPv4 or IPv6 traffic.
• Internet-based broadband connectivity is an alternative to using dedicated WAN options.
• Examples of wired broadband connectivity are Digital Subscriber Line (DSL), cable
connections, and optical fiber networks.
• Examples of wireless broadband include cellular 3G/4G/5G or satellite internet services.
• DSL is a high-speed, always-on, connection technology that uses existing twisted-pair
telephone lines to provide IP services to users.
• Cable technology is a high-speed always-on connection technology that uses a cable
company coaxial cable to provide IP services to users.
56
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Module Practice and Quiz
What did I learn in this module?
• Newer developments in wireless technology include Municipal Wi-Fi, Cellular, Satellite
internet, and WiMAX.
• VPN tunnels are routed through the internet from the private network of the company to the
remote site or employee host.
• ISP connectivity options include single-homed, dual-homed, multihomed, and dual-
multihomed.
ENSA_Module_7.pptx_wide_area_network_concepts

More Related Content

PPTX
CNv6_instructorPPT_Chapter1.pptx
PDF
WAN and WAN Concepts common WAN terminology
PPTX
CNv6_Chapter1CNv6_Chapter1CNv6_Chapter1.pptx
PPTX
Introduction_To_Network_ITN_Module_1.pptx
PPTX
ITN_Module_1networkingmoduleonecisco.pptx
PPTX
CCNA Introduction to Networks Module 1
PPTX
ITN_Module_1.pptx
PDF
CCNA Module_1 AAAAAAAAAAAAAAAAAAAAAAAAA.pdf
CNv6_instructorPPT_Chapter1.pptx
WAN and WAN Concepts common WAN terminology
CNv6_Chapter1CNv6_Chapter1CNv6_Chapter1.pptx
Introduction_To_Network_ITN_Module_1.pptx
ITN_Module_1networkingmoduleonecisco.pptx
CCNA Introduction to Networks Module 1
ITN_Module_1.pptx
CCNA Module_1 AAAAAAAAAAAAAAAAAAAAAAAAA.pdf

Similar to ENSA_Module_7.pptx_wide_area_network_concepts (20)

PPTX
ITN_Module_1.pptx
PDF
Ccnp™ advanced cisco® router
PPTX
ITN_Module_1.pptx
PDF
Itn module 1
PPTX
ITN_Module_1.pptx
PPTX
ITN_Module_1-Networking Today.pptx
PDF
ITN_Module_1.pdf
PPTX
ITN_Module_1.pptx
PPTX
ITN_Module_1ppppppppppppppppppppppp.pptx
PPTX
--Networking Today_Module 1_ITNv7.pptx--
PPTX
ETN-LECTURE_1.pptx
PPTX
ITN_ModuleCCNA Course first Lecture_1.pptx
PPTX
network design chapter 4(1).pptx
PPTX
CertifiedNv6_instructorPPT_Chapter1.pptx
PPTX
Subject about CHAPTER 1 NETWORKING TODAY.pptx
PPTX
CCNA4 Verson6 Chapter1
PPTX
ITE7_Chp5.pptx
PPT
Chapter1 rev1.0
ITN_Module_1.pptx
Ccnp™ advanced cisco® router
ITN_Module_1.pptx
Itn module 1
ITN_Module_1.pptx
ITN_Module_1-Networking Today.pptx
ITN_Module_1.pdf
ITN_Module_1.pptx
ITN_Module_1ppppppppppppppppppppppp.pptx
--Networking Today_Module 1_ITNv7.pptx--
ETN-LECTURE_1.pptx
ITN_ModuleCCNA Course first Lecture_1.pptx
network design chapter 4(1).pptx
CertifiedNv6_instructorPPT_Chapter1.pptx
Subject about CHAPTER 1 NETWORKING TODAY.pptx
CCNA4 Verson6 Chapter1
ITE7_Chp5.pptx
Chapter1 rev1.0
Ad

Recently uploaded (20)

PPTX
Petroleum Refining & Petrochemicals.pptx
PDF
Design of Material Handling Equipment Lecture Note
PPTX
ASME PCC-02 TRAINING -DESKTOP-NLE5HNP.pptx
PPTX
Chapter 2 -Technology and Enginerring Materials + Composites.pptx
PDF
Unit1 - AIML Chapter 1 concept and ethics
PPTX
wireless networks, mobile computing.pptx
PPTX
Feature types and data preprocessing steps
PPTX
Principal presentation for NAAC (1).pptx
PDF
Applications of Equal_Area_Criterion.pdf
PPTX
mechattonicsand iotwith sensor and actuator
PPT
Chapter 1 - Introduction to Manufacturing Technology_2.ppt
DOC
T Pandian CV Madurai pandi kokkaf illaya
PPTX
ai_satellite_crop_management_20250815030350.pptx
PDF
Java Basics-Introduction and program control
PDF
distributed database system" (DDBS) is often used to refer to both the distri...
PPTX
PRASUNET_20240614003_231416_0000[1].pptx
PPTX
CyberSecurity Mobile and Wireless Devices
PDF
Prof. Dr. KAYIHURA A. SILAS MUNYANEZA, PhD..pdf
PPTX
Amdahl’s law is explained in the above power point presentations
PDF
UEFA_Embodied_Carbon_Emissions_Football_Infrastructure.pdf
Petroleum Refining & Petrochemicals.pptx
Design of Material Handling Equipment Lecture Note
ASME PCC-02 TRAINING -DESKTOP-NLE5HNP.pptx
Chapter 2 -Technology and Enginerring Materials + Composites.pptx
Unit1 - AIML Chapter 1 concept and ethics
wireless networks, mobile computing.pptx
Feature types and data preprocessing steps
Principal presentation for NAAC (1).pptx
Applications of Equal_Area_Criterion.pdf
mechattonicsand iotwith sensor and actuator
Chapter 1 - Introduction to Manufacturing Technology_2.ppt
T Pandian CV Madurai pandi kokkaf illaya
ai_satellite_crop_management_20250815030350.pptx
Java Basics-Introduction and program control
distributed database system" (DDBS) is often used to refer to both the distri...
PRASUNET_20240614003_231416_0000[1].pptx
CyberSecurity Mobile and Wireless Devices
Prof. Dr. KAYIHURA A. SILAS MUNYANEZA, PhD..pdf
Amdahl’s law is explained in the above power point presentations
UEFA_Embodied_Carbon_Emissions_Football_Infrastructure.pdf
Ad

ENSA_Module_7.pptx_wide_area_network_concepts

  • 1. Module 7: WAN Concepts Enterprise Networking, Security, and Automation v7.0 (ENSA)
  • 2. 2 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Module Objectives Module Title: WAN Concepts Module Objective: Explain how WAN access technologies can be used to satisfy business requirements. Topic Title Topic Objective Purpose of WANs Explain the purpose of a WAN. WAN Operations Explain how WANs operate. Traditional WAN Connectivity Compare traditional WAN connectivity options. Modern WAN Connectivity Compare modern WAN connectivity options. Internet-Based Connectivity Compare internet-based connectivity options.
  • 3. 3 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7.1 Purpose of WANs
  • 4. 4 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Purpose of WANs LANs and WANs A WAN is a telecommunications network that spans over a relatively large geographical area and is required to connect beyond the boundary of the LAN. Local Area Networks (LANs) Wide Area Networks (WANs) LANs provide networking services within a small geographic area. WANs provide networking services over large geographical areas. LANs are used to interconnect local computers, peripherals, and other devices. WANs are used to interconnect remote users, networks, and sites. A LAN is owned and managed by an organization or home user. WANs are owned and managed by internet service, telephone, cable, and satellite providers. Other than the network infrastructure costs, there is no fee to use a LAN. WAN services are provided for a fee. LANs provide high bandwidth speeds using wired Ethernet and Wi-Fi services. WANs providers offer low to high bandwidth speeds, over long distances.
  • 5. 5 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Purpose of WANs Private and Public WANs A private WAN is a connection that is dedicated to a single customer. Private WANs provide the following: • Guaranteed service level • Consistent bandwidth • Security A public WAN connection is typically provided by an ISP or telecommunications service provider using the internet. In this case, the service levels and bandwidth may vary, and the shared connections do not guarantee security.
  • 6. 6 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Purpose of WANs WAN Topologies WANs are implemented using the following logical topology designs: • Point-to-Point Topology • Hub-and-Spoke Topology • Dual-homed Topology • Fully Meshed Topology • Partially Meshed Topology Note: Large networks usually deploy a combination of these topologies.
  • 7. 7 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Purpose of WANs WAN Topologies (Cont.) Point-to-Point Topology • Employs a point-to-point circuit between two endpoints. • Involves a Layer 2 transport service through the service provider network. • The point-to-point connection is transparent to the customer network. Note: It can become expensive if many point-to-point connections are required.
  • 8. 8 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Purpose of WANs WAN Topologies (Cont.) Hub-and-Spoke Topology • Enables a single interface on the hub router to be shared by all spoke circuits. • Spoke routers can be interconnected through the hub router using virtual circuits and routed subinterfaces. • Spoke routers can only communicate with each other through the hub router. Note: The hub router represents a single point of failure. If it fails, inter- spoke communication also fails.
  • 9. 9 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Purpose of WANs WAN Topologies (Cont.) Dual-homed Topology • Offers enhanced network redundancy, load balancing, distributed computing and processing, and the ability to implement backup service provider connections. • More expensive to implement than single-homed topologies. This is because they require additional networking hardware, such as additional routers and switches. • More difficult to implement because they require additional, and more complex, configurations.
  • 10. 10 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Purpose of WANs WAN Topologies (Cont.) Fully Meshed Topology • Uses multiple virtual circuits to connect all sites • The most fault-tolerant topology Partially Meshed Topology • Connects many but not all sites
  • 11. 11 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Purpose of WANs Carrier Connections Another aspect of WAN design is how an organization connects to the internet. An organization usually signs a service level agreement (SLA) with a service provider. The SLA outlines the expected services relating to the reliability and availability of the connection. The service provider may or may not be the actual carrier. A carrier owns and maintains the physical connection and equipment between the provider and the customer. Typically, an organization will choose either a single-carrier or dual-carrier WAN connection.
  • 12. 12 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Purpose of WANs Carrier Connections (Cont.) A single-carrier connection is when an organization connects to only one service provider. An SLA is negotiated between the organization and the service provider. A dual-carrier connection provides redundancy and increases network availability. The organization negotiates separate SLAs with two different service providers.
  • 13. 13 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Purpose of WANs Evolving Networks Network requirements of a company can change dramatically as the company grows over time. • A network must meet the day-to-day operational needs of business, and it must be able to adapt and grow as a company changes. • Network designers and administrators meet these challenges by carefully choosing network technologies, protocols, and service providers. • Networks can be optimized by using a variety of network design techniques and architectures. To illustrate differences between network size, we will use a fictitious company called SPAN Engineering as it grows from a small, local, business into a global enterprise.
  • 14. 14 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Purpose of WANs Evolving Networks (Cont.) Small Network SPAN, a small fictitious company, started with a few employees in a small office. • Uses a single LAN connected to a wireless router for sharing data and peripherals. • Connection to the internet is through a common broadband service called Digital Subscriber Line (DSL) • IT support is contracted from the DSL provider.
  • 15. 15 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Purpose of WANs Evolving Networks (Cont.) Campus Network Within a few years SPAN grew and required several floors of a building. The company now required a Campus Area Network (CAN). • A firewall secures internet access to corporate users. • In-house IT staff to support and maintain the network.
  • 16. 16 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Purpose of WANs Evolving Networks (Cont.) Branch Network • A few years later, the company expanded and added a branch site in the city, and remote and regional sites in other cities. • The company now required a metropolitan area network (MAN) to interconnect sites within the city. • To connect to the central office, branch offices in nearby cities used private dedicated lines through their local service provider.
  • 17. 17 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Purpose of WANs Evolving Networks (Cont.) Distributed Network • SPAN Engineering has now been in business for 20 years and has grown to thousands of employees distributed in offices worldwide. • Site-to-site and remote access Virtual Private Networks (VPNs) enable the company to use the internet to connect easily and securely with employees and facilities around the world.
  • 18. 18 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7.2 WAN Operation
  • 19. 19 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential WAN Operations WAN Standards Modern WAN standards are defined and managed by a number of recognized authorities including the following: • TIA/EIA - Telecommunications Industry Association and Electronic Industries Alliance • ISO - International Organization for Standardization • IEEE - Institute of Electrical and Electronics Engineers
  • 20. 20 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential WAN Operations WANs in the OSI Model Most WAN standards focus on the physical layer and the data link layer. Layer 1 Protocols • Synchronous Digital Hierarchy (SDH) • Synchronous Optical Networking (SONET) • Dense Wavelength Division Multiplexing (DWDM) Layer 2 Protocols • Broadband (i.e., DSL and Cable) • Wireless • Ethernet WAN (Metro Ethernet) • Multiprotocol Label Switching (MPLS) • Point-to-Point Protocol (PPP) (less used) • High-Level Data Link Control (HDLC) (less used) • Frame Relay (legacy) • Asynchronous Transfer Mode (ATM) (legacy)
  • 21. 21 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential WAN Operations Common WAN Terminology There are specific terms used to describe WAN connections between the subscriber (i.e., the company / client) and the WAN service provider. WAN Term Description Data Terminal Equipment (DTE) Connects the subscriber LANs to the WAN communication device Data Communications Equipment (DCE) Device used to communicate with the provider Customer Premises Equipment (CPE) This is the DTE and DCE devices located on the enterprise edge Point-of-Presence (POP) The point where the subscriber connects to the service provider network Demarcation Point The physical location in a building or complex that officially separates the CPE from service provider equipment.
  • 22. 22 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential WAN Operations Common WAN Terminology (Cont.) WAN Term Description Local Loop (last mile) The copper or fiber cable that connects the CPE to the CO of the service provider Central office (CO) The local service provider facility or building that connects the CPE to the provider network Toll network Includes backhaul, long-haul, all-digital, fiber-optic communications lines, switches, routers, and other equipment inside the WAN provider network Backhaul network Connects multiple access nodes of the service provider network Backbone network Large, high-capacity networks used to interconnect service provider networks and to create a redundant network.
  • 23. 23 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential WAN Operations WAN Devices There are many types of devices that are specific to WAN environments. WAN Device Description Voiceband Modem Dial-up modem – uses telephone lines Legacy device DSL Modem / Cable Modem Collectively known as broadband modems, these high-speed digital modems connect to the DTE router using Ethernet. CSU/DSU Digital-leased lines require a CSU and a DSU. It connects a digital device to a digital line. Optical Converter Connect fiber-optic media to copper media and convert optical signals to electronic pulses. Wireless Router / Access Point Devices are used to wirelessly connect to a WAN provider. WAN Core devices WAN backbone consists of multiple high-speed routers and Layer 3 switches.
  • 24. 24 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential WAN Operations Serial Communication • Almost all network communications occur using a serial communication delivery. Serial communication transmits bits sequentially over a single channel. • In contrast, parallel communications simultaneously transmit several bits using multiple wires. • As the cable length increases, the synchronization timing between multiple channels becomes more sensitive to distance. For this reason, parallel communication is limited to very short distances
  • 25. 25 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential WAN Operations Circuit-Switched Communication A circuit-switched network establishes a dedicated circuit (or channel) between endpoints before the users can communicate. • Establishes a dedicated virtual connection through the service provider network before communication can start. • All communication uses the same path. • The two most common types of circuit- switched WAN technologies are the public switched telephone network (PSTN) and the legacy Integrated Services Digital Network (ISDN).
  • 26. 26 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential WAN Operations Packet-Switched Communication Network communication is most commonly implemented using packet-switched communication. • Segments traffic data into packets that are routed over a shared network. • Much less expensive and more flexible than circuit switching. • Common types of packet-switched WAN technologies are: • Ethernet WAN (Metro Ethernet), • Multiprotocol Label Switching (MPLS) • Frame Relay • Asynchronous Transfer Mode (ATM).
  • 27. 27 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential WAN Operations SDH, SONET, and DWDM Service provider networks use fiber-optic infrastructures to transport user data between destinations. Fiber-optic cable is far superior to copper cable for long distance transmissions due to its much lower attenuation and interference. There are two optical fiber OSI layer 1 standards available to service providers: • SDH - Synchronous Digital Hierarchy (SDH) is a global standard for transporting data over fiber-optic cable. • SONET - Synchronous Optical Networking (SONET) is the North American standard that provides the same services as SDH. SDH/SONET define how to transfer multiple data, voice, and video communications over optical fiber using lasers or light-emitting diodes (LEDs) over great distances. Dense Wavelength Division Multiplexing (DWDM) is a newer technology that increases the data-carrying capacity of SDH and SONET by simultaneously sending multiple streams of data (multiplexing) using different wavelengths of light.
  • 28. 28 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7.3 Traditional WAN Connectivity
  • 29. 29 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Traditional WAN Connectivity Traditional WAN Connectivity Options To understand the WANs of today, it helps to know where they started. • When LANs appeared in the 1980s, organizations began to see the need to interconnect with other locations. • To do so, they needed their networks to connect to the local loop of a service provider. • This was accomplished by using dedicated lines, or by using switched services from a service provider.
  • 30. 30 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Traditional WAN Connectivity Common WAN Terminology Point-to-point lines could be leased from a service provider and were called “leased lines”. The term refers to the fact that the organization pays a monthly lease fee to a service provider to use the line. • Leased lines are available in different fixed capacities and are generally priced based on the bandwidth required and the distance between the two connected points. • There are two systems used to define the digital capacity of a copper media serial link: • T-carrier - Used in North America, T-carrier provides T1 links supporting bandwidth up to 1.544 Mbps and T3 links supporting bandwidth up to 43.7 Mbps. • E-carrier – Used in Europe, E-carrier provides E1 links supporting bandwidth up to 2.048 Mbps and E3 links supporting bandwidth up to 34.368 Mbps.
  • 31. 31 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Traditional WAN Connectivity Common WAN Terminology (Cont.) The table summarizes the advantages and disadvantages of leased lines. Advantages Simplicity Point-to-point communication links require minimal expertise to install and maintain. Quality Point-to-point communication links usually offer high quality service, if they have adequate bandwidth. Availability Constant availability is essential for some applications, such as e-commerce. Point-to-point communication links provide permanent, dedicated capacity which is required for VoIP or Video over IP. Disadvantages Cost Point-to-point links are generally the most expensive type of WAN access. The cost of leased line solutions can become significant when they are used to connect many sites over increasing distances. Limited flexibility WAN traffic is often variable, and leased lines have a fixed capacity, so that the bandwidth of the line seldom matches the need exactly.
  • 32. 32 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Traditional WAN Connectivity Circuit-Switch Options Circuit-switched connections are provided by Public Service Telephone Network (PSTN) carriers. The local loop connecting the CPE to the CO is copper media. There are two traditional circuit-switched options: Public Service Telephone Network (PSTN) • Dialup WAN access uses the PSTN as its WAN connection. Traditional local loops can transport binary computer data through the voice telephone network using a voiceband modem. • The physical characteristics of the local loop and its connection to the PSTN limit the rate of the signal to less than 56 kbps. Integrated Services Digital Network (ISDN) • ISDN is a circuit-switching technology that enables the PSTN local loop to carry digital signals. This provided higher capacity switched connections than dialup access. ISDN provides for data rates from 45 Kbps to 2.048 Mbps.
  • 33. 33 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Traditional WAN Connectivity Packet-Switch Options Packet switching segments data into packets that are routed over a shared network. It allows many pairs of nodes to communicate over the same channel. There are two traditional (legacy) circuit-switched options: Frame Relay • Frame Relay is a simple Layer 2 non-broadcast multi-access (NBMA) WAN technology that is used to interconnect enterprise LANs. • Frame Relay creates PVCs which are uniquely identified by a data-link connection identifier (DLCI). Asynchronous Transfer Mode (ATM) • Asynchronous Transfer Mode (ATM) technology is capable of transferring voice, video, and data through private and public networks. • ATM is built on a cell-based architecture rather than on a frame-based architecture. ATM cells are always a fixed length of 53 bytes. Note: Frame relay and ATM networks have been largely replaced by faster Metro Ethernet and internet-based solutions.
  • 34. 34 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7.4 Modern WAN Connectivity
  • 35. 35 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Modern WAN Connectivity Modern WANs Modern WANS have more connectivity options than traditional WANs. • Enterprises now require faster and more flexible WAN connectivity options. • Traditional WAN connectivity options have rapidly declined in use because they are either no longer available, too expensive, or have limited bandwidth. The figure displays the local loop connections most likely encountered today.
  • 36. 36 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Modern WAN Connectivity Modern WAN Connectivity Options New technologies are continually emerging. The figure summarizes the modern WAN connectivity options. Dedicated broadband • Fiber can be installed independently by an organization to connect remote locations directly together. • Dark fiber can be leased or purchased from a supplier. Packet-switched • Metro Ethernet – Replacing many traditional WAN options. • MPLS – Enables sites to connect to the provider regardless of its access technologies. Internet-based broadband • Organizations are now commonly using the global internet infrastructure for WAN connectivity.
  • 37. 37 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Modern WAN Connectivity Ethernet WAN Service providers now offer Ethernet WAN service using fiber-optic cabling. The Ethernet WAN service can go by many names, including the following: • Metropolitan Ethernet (Metro E) • Ethernet over MPLS (EoMPLS) • Virtual Private LAN Service (VPLS) There are several benefits to an Ethernet WAN: • Reduced expenses and administration • Easy integration with existing networks • Enhanced business productivity Note: Ethernet WANs have gained in popularity and are now commonly being used to replace the traditional serial point-to-point, Frame Relay and ATM WAN links.
  • 38. 38 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Modern WAN Connectivity MPLS Multiprotocol Label Switching (MPLS) is a high-performance service provider WAN routing technology to interconnect clients without regard to access method or payload. • MPLS supports a variety of client access methods (e.g., Ethernet, DSL, Cable, Frame Relay). • MPLS can encapsulate all types of protocols including IPv4 and IPv6 traffic. • An MPLS router can be a customer edge (CE) router, a provider edge (PE) router, or an internal provider (P) router. • MPLS routers are label switched routers (LSRs). They attach labels to packets that are then used by other MPLS routers to forward traffic. • MPLS also provides services for QoS support, traffic engineering, redundancy, and VPNs.
  • 39. 39 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7.5 Internet-Based Connectivity
  • 40. 40 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Internet-Based Connectivity Internet-Based Connectivity Options Internet-based broadband connectivity is an alternative to using dedicated WAN options. Internet-based connectivity can be divided into wired and wireless options. Wired Options • Wired options use permanent cabling (e.g., copper or fiber) to provide consistent bandwidth, and reduce error rates and latency. Examples: DSL, cable connections, and optical fiber networks. Wireless Options • Wireless options are less expensive to implement compared to other WAN connectivity options because they use radio waves instead of wired media to transmit data. Examples: cellular 3G/4G/5G or satellite internet services. • Wireless signals can be negatively affected by factors such as distance from radio towers, interference from other sources and weather.
  • 41. 41 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Internet-Based Connectivity DSL Technology Digital Subscriber Line (DSL) is a high-speed, always-on, connection technology that uses existing twisted-pair telephone lines to provide IP services to users. DSL are categorized as either Asymmetric DSL (ADSL) or Symmetric DSL (SDSL). • ADSL and ADSL2+ provide higher downstream bandwidth to the user than upload bandwidth. • SDSL provides the same capacity in both directions. DSL transfer rates are dependent on the actual length of the local loop, and the type and condition of the cabling.
  • 42. 42 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Internet-Based Connectivity DSL Connections Service providers deploy DSL connections in the local loop. The connection is set up between the DSL modem and the DSL access multiplexer (DSLAM). • The DSL modem converts the Ethernet signals from the teleworker device to a DSL signal, which is transmitted to a DSL access multiplexer (DSLAM) at the provider location. • A DSLAM is located at the Central Office (CO) of the provider and concentrates connections from multiple DSL subscribers. • DSL is not a shared medium. Each user has a separate direct connection to the DSLAM. Adding users does not impede performance.
  • 43. 43 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Internet-Based Connectivity DSL and PPP ISPs use PPP as the Layer 2 protocol for broadband DSL connections. • PPP can be used to authenticate the subscriber. • PPP can assign a public IPv4 address to the subscriber. • PPP provides link-quality management features. There are two ways PPP over Ethernet (PPPoE) can be deployed: • Host with PPoE Client - The PPPoE client software communicates with the DSL modem using PPPoE and the modem communicates with the ISP using PPP. • Router PPPoE Client - The router is the PPPoE client and obtains its configuration from the provider.
  • 44. 44 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Internet-Based Connectivity Cable Technology Cable technology is a high-speed always-on connection technology that uses a coaxial cable from the cable company to provide IP services to users. The Data over Cable Service Interface Specification (DOCSIS) is the international standard for adding high-bandwidth data to an existing cable system. • The optical node converts RF signals to light pulses over fiber-optic cable. • The fiber media enables the signals to travel over long distances to the provider headend where a Cable Modem Termination System (CMTS) is located. • The headend contains the databases needed to provide internet access while the CMTS is responsible for communicating with the cable modems. Note: All the local subscribers share the same cable bandwidth. As more users join the service, available bandwidth may drop below the expected rate.
  • 45. 45 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Internet-Based Connectivity Optical Fiber Many municipalities, cities, and providers install fiber-optic cable to the user location. This is commonly referred to as Fiber to the x (FTTx) and includes the following: • Fiber to the Home (FTTH) - Fiber reaches the boundary of the residence. • Fiber to the Building (FTTB) - Fiber reaches the boundary of the building with the final connection to the individual living space being made via alternative means. • Fiber to the Node/Neighborhood (FTTN) – Optical cabling reaches an optical node that converts optical signals to a format acceptable for twisted pair or coaxial cable to the premise. Note: FTTx can deliver the highest bandwidth of all broadband options.
  • 46. 46 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Internet-Based Connectivity Wireless Internet-Based Broadband Wireless technology uses the unlicensed radio spectrum to send and receive data. • Municipal Wi-Fi - Municipal wireless networks are available in many cities providing high-speed internet access for free, or for substantially less than the price of other broadband services. • Cellular – Increasingly used to connect devices to the internet using radio waves to communicate through a nearby mobile phone tower. 3G/4G/5G and Long-Term Evolution (LTE) are cellular technologies. • Satellite Internet - Typically used by rural users or in remote locations where cable and DSL are not available. A router connects to a satellite dish which is pointed to a service provider satellite in Geosynchronous orbit. Trees and heavy rains can impact the satellite signal. • WiMAX - Worldwide Interoperability for Microwave Access (WiMAX) is described in the IEEE standard 802.16 Provides high-speed broadband service with wireless access and provides broad coverage like a cell phone network rather than through small Wi-Fi hotspots.
  • 47. 47 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Internet-Based Connectivity VPN Technology VPNs can be used to address security concerns incurred when a remote office worker uses broadband services to access the corporate WAN over the internet. A VPN is an encrypted connection between private networks over a public network. VPN tunnels are routed through the internet from the private network of the company to the remote site or employee host. There are several benefits to using VPN: • Cost savings - Eliminates expensive, dedicated WAN links and modem banks. • Security - Advanced encryption and authentication protocols protect data from unauthorized access. • Scalability - Corporations can add large amounts of capacity without adding significant infrastructure. • Compatibility with broadband technology - Supported by broadband service providers such as DSL and cable. VPNs are commonly implemented as the following: • Site-to-site VPN - VPN settings are configured on routers. Clients are unaware that their data is being encrypted. • Remote Access - The user is aware and initiates remote access connection. For example, using HTTPS in a browser to connect to your bank. Alternatively, the user can run VPN client software on their host to connect to and authenticate with the destination device.
  • 48. 48 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Internet-Based Connectivity ISP Connectivity Options There are different ways an organization can connect to an ISP. The choice depends on the needs and budget of the organization. • Single-homed –Single connection to the ISP using one link. Provides no redundancy and is the least expensive solution. • Dual-homed - Connects to the same ISP using two links. Provides both redundancy and load balancing. However, the organization loses internet connectivity if the ISP experiences an outage. • Multihomed -The client connects to two different ISPs. This design provides increased redundancy and enables load- balancing, but it can be expensive. • Dual-multihomed - Dual-multihomed is the most resilient topology of the four shown. The client connects with redundant links to multiple ISPs. This topology provides the most redundancy possible. It is the most expensive option of the four.
  • 49. 49 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Internet-Based Connectivity Broadband Solution Comparison Each broadband solution has advantages and disadvantages. If there are multiple broadband solutions available, a cost-versus-benefit analysis should be performed to determine the best solution. Some factors to consider include the following: • Cable - Bandwidth is shared by many users. Therefore, upstream data rates are often slow during high-usage hours in areas with over-subscription. • DSL - Limited bandwidth that is distance sensitive (in relation to the ISP central office). Upload rate is proportionally lower compared to download rate. • Fiber-to-the-Home - This option requires fiber installation directly to the home. • Cellular/Mobile - With this option, coverage is often an issue, even within a small office or home office where bandwidth is relatively limited. • Municipal Wi-Fi - Most municipalities do not have a mesh Wi-Fi network deployed. If is available and in range, then it is a viable option. • Satellite - This option is expensive and provides limited capacity per subscriber. Typically used when no other option is available.
  • 50. 50 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Internet-Based Connectivity Lab – Research Broadband Internet Access Options In this lab, you will complete the following objectives: • Investigate Broadband Distribution • Research Broadband Access Options for Specific Scenarios
  • 51. 51 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7.6 Module Practice and Quiz
  • 52. 52 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Module Practice and Quiz Packet Tracer – WAN Concepts In this lab, you will do the following: • Describe different WAN connectivity options
  • 53. 53 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Module Practice and Quiz What did I learn in this module? • A Wide Area Network (WAN) is required to connect beyond the boundary of the LAN. • A private WAN is a connection that is dedicated to a single customer. • A public WAN connection is typically provided by an ISP or telecommunications service provider using the internet. • WANs are implemented using the following logical topologies: Point-to-Point, Hub-and- Spoke, Dual-homed, Fully Meshed, and Partially Meshed. • A dual-carrier connection provides redundancy and increases network availability. The organization negotiates separate SLAs with two different service providers. • Site-to-site and remote access Virtual Private Networks (VPNs) enable the company to use the internet to securely connect with employees and facilities around the world. • Modern WAN standards are defined and managed by a number of recognized authorities: TIA/EIA, ISO, and IEEE. • Layer 1 optical fiber protocol standards include SDH, SONET, and DWDM. Layer 2 protocols define how data will be encapsulated into a frame. • Layer 2 protocols include broadband, wireless, Ethernet WAN, MPLS, PPP, HDLC.
  • 54. 54 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Module Practice and Quiz What did I learn in this module? • Serial communication transmits bits sequentially over a single channel. In contrast, parallel communications simultaneously transmit several bits using multiple wires. • The two most common types of circuit-switched WAN technologies are PSTN and ISDN. • Common types of packet-switched WAN technologies are Ethernet WAN and MPLS. There are two optical fiber OSI layer 1 standards. • SDH/SONET define how to transfer multiple data, voice, and video communications over optical fiber using lasers or LEDs over great distances. • Circuit-switched connections were provided by PSTN carriers. • ISDN is a circuit-switching technology that enables the PSTN local loop to carry digital signals. • Packet switching segments data into packets that are routed over a shared network. • Frame Relay is a simple Layer 2 NBMA WAN technology used to interconnect enterprise LANs. • ATM technology is capable of transferring voice, video, and data through private and public networks. It is built on a cell-based architecture rather than on a frame-based architecture.
  • 55. 55 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Module Practice and Quiz What did I learn in this module? • Modern WAN connectivity options include dedicated broadband, Ethernet WAN and MPLS (packet-switched), along with various wired and wireless version of internet-based broadband. • MPLS is a high-performance service provider WAN routing technology to interconnect clients. MPLS supports a variety of client access methods (e.g., Ethernet, DSL, Cable, Frame Relay). MPLS can encapsulate all types of protocols including IPv4 or IPv6 traffic. • Internet-based broadband connectivity is an alternative to using dedicated WAN options. • Examples of wired broadband connectivity are Digital Subscriber Line (DSL), cable connections, and optical fiber networks. • Examples of wireless broadband include cellular 3G/4G/5G or satellite internet services. • DSL is a high-speed, always-on, connection technology that uses existing twisted-pair telephone lines to provide IP services to users. • Cable technology is a high-speed always-on connection technology that uses a cable company coaxial cable to provide IP services to users.
  • 56. 56 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Module Practice and Quiz What did I learn in this module? • Newer developments in wireless technology include Municipal Wi-Fi, Cellular, Satellite internet, and WiMAX. • VPN tunnels are routed through the internet from the private network of the company to the remote site or employee host. • ISP connectivity options include single-homed, dual-homed, multihomed, and dual- multihomed.

Editor's Notes

  • #1: Cisco Networking Academy Program Enterprise Networking, Security, and Automation v7.0 (ENSA) Module 7: WAN Concepts
  • #2: 7 – WAN Concepts 7.0.2 - What will I learn to do in this Module?
  • #3: 7.0 - WAN Concepts 7.1 – Purpose of WANs
  • #4: 7.0 - WAN Concepts 7.1 – Purpose of WANs 7.1.1 – LANs and WANs
  • #5: 7.0 - WAN Concepts 7.1 – Purpose of WANs 7.1.2 – Private and Public WANs
  • #6: 7.0 - WAN Concepts 7.1 – Purpose of WANs 7.1.3 – WAN Topologies
  • #7: 7.0 - WAN Concepts 7.1 – Purpose of WANs 7.1.3 – WAN Topologies (Cont.)
  • #8: 7.0 - WAN Concepts 7.1 – Purpose of WANs 7.1.3 – WAN Topologies (Cont.)
  • #9: 7.0 - WAN Concepts 7.1 – Purpose of WANs 7.1.3 – WAN Topologies (Cont.)
  • #10: 7.0 - WAN Concepts 7.1 – Purpose of WANs 7.1.3 – WAN Topologies (Cont.)
  • #11: 7.0 - WAN Concepts 7.1 – Purpose of WANs 7.1.4 – Carrier Connections
  • #12: 7.0 - WAN Concepts 7.1 – Purpose of WANs 7.1.4 – Carrier Connections (Cont.)
  • #13: 7.0 - WAN Concepts 7.1 – Purpose of WANs 7.1.5 – Evolving Networks
  • #14: 7.0 - WAN Concepts 7.1 – Purpose of WANs 7.1.5 – Evolving Networks (Cont.)
  • #15: 7.0 - WAN Concepts 7.1 – Purpose of WANs 7.1.5 – Evolving Networks (Cont.)
  • #16: 7.0 - WAN Concepts 7.1 – Purpose of WANs 7.1.5 – Evolving Networks (Cont.)
  • #17: 7.0 - WAN Concepts 7.1 – Purpose of WANs 7.1.5 – Evolving Networks (Cont.) 7.1.6 – Check Your Understanding – Purpose of WANs
  • #18: 7.0 - WAN Concepts 7.2 – WAN Operations
  • #19: 7.0 - WAN Concepts 7.2 – WAN Operations 7.2.1 – WAN Standards
  • #20: 7.0 - WAN Concepts 7.2 – WAN Operations 7.2.2 – WANs in the OSI Model
  • #21: 7.0 - WAN Concepts 7.2 – WAN Operations 7.2.3 – Common WAN Terminology
  • #22: 7.0 - WAN Concepts 7.2 – WAN Operations 7.2.4 – Common WAN Terminology (Cont.)
  • #23: 7.0 - WAN Concepts 7.2 – WAN Operations 7.2.4 – WAN Devices
  • #24: 7.0 - WAN Concepts 7.2 – WAN Operations 7.2.5 – Serial Communication
  • #25: 7.0 - WAN Concepts 7.2 – WAN Operations 7.2.6 – Circuit-Switched Communication
  • #26: 7.0 - WAN Concepts 7.2 – WAN Operations 7.2.7 – Packet-Switched Communication
  • #27: 7.0 - WAN Concepts 7.2 – WAN Operations 7.2.8 – SDH, SONET, and DWDM 7.2.9 – Check Your Understanding – WAN Operations
  • #28: 7.0 - WAN Concepts 7.3 – Traditional WAN Connectivity
  • #29: 7.0 - WAN Concepts 7.3 – Traditional WAN Connectivity 7.3.1 – Traditional WAN Connectivity Options
  • #30: 7.0 - WAN Concepts 7.3 – Traditional WAN Connectivity 7.3.2– Common WAN Terminology
  • #31: 7.0 - WAN Concepts 7.3 – Traditional WAN Connectivity 7.3.2– Common WAN Terminology (Cont.)
  • #32: 7.0 - WAN Concepts 7.3 – Traditional WAN Connectivity 7.3.3– Circuit-Switched Options
  • #33: 7.0 - WAN Concepts 7.3 – Traditional WAN Connectivity 7.3.4 – Packet-Switched Options 7.3.5 – Check Your Understanding – Traditional WAN Connectivity
  • #34: 7.0 - WAN Concepts 7.4 – Modern WAN Connectivity
  • #35: 7.0 - WAN Concepts 7.4 – Modern WAN Connectivity 7.4.1 – Modern WANs
  • #36: 7.0 - WAN Concepts 7.4 – Modern WAN Connectivity 7.4.2 – Modern WAN Connectivity Options
  • #37: 7.0 - WAN Concepts 7.4 – Modern WAN Connectivity 7.4.3 – Ethernet WAN
  • #38: 7.0 - WAN Concepts 7.4 – Modern WAN Connectivity 7.4.4 – MPLS 7.4.5 – Check Your Understanding – Modern WAN Connectivity
  • #39: 7.0 - WAN Concepts 7.5 – Internet-Based Connectivity
  • #40: 7.0 - WAN Concepts 7.5 – Internet-Based Connectivity 7.5.1 – Internet-Based Connectivity Options
  • #41: 7.0 - WAN Concepts 7.5 – Internet-Based Connectivity 7.5.2 – DSL Technology
  • #42: 7.0 - WAN Concepts 7.5 – Internet-Based Connectivity 7.5.3 – DSL Connections
  • #43: 7.0 - WAN Concepts 7.5 – Internet-Based Connectivity 7.5.4 – DSL and PPP
  • #44: 7.0 - WAN Concepts 7.5 – Internet-Based Connectivity 7.5.5 – Cable Technology
  • #45: 7.0 - WAN Concepts 7.5 – Internet-Based Connectivity 7.5.6 – Optical Fiber
  • #46: 7.0 - WAN Concepts 7.5 – Internet-Based Connectivity 7.5.7 – Wireless Internet-Based Broadband
  • #47: 7.0 - WAN Concepts 7.5 – Internet-Based Connectivity 7.5.8 – VPN Technology
  • #48: 7.0 - WAN Concepts 7.5 – Internet-Based Connectivity 7.5.9 – ISP Connectivity Options
  • #49: 7.0 – WAN Concepts 7.5 – Internet-Based Connectivity 7.5.10 – Broadband Solution Comparison
  • #50: 7.0 – WAN Concepts 7.5 – Internet-Based Connectivity 7.5.11 – Lab – Research Broadband Internet Access Options
  • #51: 7.0 - ACLs for IPv4 Configuration 7.6 – Module Practice and Quiz
  • #52: 7.0 – WAN Concepts 7.6 – Module Practice and Quiz 7.6.1 – Packet Tracer – WAN Concepts
  • #53: 7.0 - WAN Concepts 7.6 – Module Practice and Quiz 7.6.2 – What did I learn in this module?
  • #54: 7.0 - WAN Concepts 7.6 – Module Practice and Quiz 7.6.2 – What did I learn in this module?
  • #55: 7.0 - WAN Concepts 7.6 – Module Practice and Quiz 7.6.2 – What did I learn in this module?
  • #56: 7.0 - WAN Concepts 7.6 – Module Practice and Quiz 7.6.2 – What did I learn in this module?