WAN Technologies

1908 days ago, 567 views
PowerPoint PPT Presentation

Presentation Transcript

Slide 1

WAN Technologies Dial-up modem associations Cheap Slow A telephone line, a modem at each end WAN & Remote Access

Slide 2

WAN Technologies Integrated Services Digital system (ISDN) Higher cost Faster An exceptional telephone line Interface gauges Basic Rate Interface (BRI) Uses three separate stations Two conveyor stations of 64Kbps conveying the voice/information A delta station of 16Kbps for flagging Primary Rate Interface (PRI) Uses 23 conveyor stations of 64kbps for information/voice Uses one 64kbps delta station for flagging WAN & Remote Access

Slide 3

WAN Technologies T-bearer lines High-speed lines Can be rented from phone organizations Are regularly used to make private systems Four sorts T1 Offers speed of 1.544Mbps Connects LANS T2 Offers speed of 6.312Mbps Uses 96 64Kbps B stations T3 Offers speed of 44.736Mbps Uses 672 64Kbps B stations T4 Offers speed of 274.176Mbps Uses 4,032 64Kbps B stations T5 Offers speed of 400.352 Mbps Uses 5,760 64Kbps B stations WAN & Remote Access

Slide 4

WAN Technologies Fiber Distributed Data Interface (FDDI) Uses fiber-optic link Resistance to EMI Can utilize copper link too Uses token-passing media get to Dual-ring for excess and adaptation to non-critical failure Reaches 100Mbps at separation of two kilometers Hard to execute and high cost WAN & Remote Access

Slide 5

WAN Technologies X.25 old Packet-exchanging Each bundle is probably going to take an alternate course to achieve its goal amid a solitary correspondence session. Just 56Kbps – was quick in 1970's WAN & Remote Access

Slide 6

WAN Technologies Asynchronous exchange Mode (ATM) For voice, information and video Packet-exchanging innovation Use settled length bundles of 53bytes ( 5+48) Provides speeds from 1.544Mbps to 622Mbps Circuit-based system innovation Switched virtual circuits (SVCs) Permanent virtual circuits (PVCs) Expensive equipment to disguise and gather cells High overhead (because of settled cell with cushioning) Still great to not all that fast association Ip Over ATM Atmarp server LAN Emulation with ATM Broadcast and multicast bolster machenism WAN & Remote Access

Slide 7

WAN Technologies Frame transfer Packet-exchanging innovation Uses variable-length parcels Offers speeds beginning at 56kbps Using PVC WAN & Remote Access

Slide 8

WAN Technologies SONET/OC-x levels Bell Communication Research created SONET (Synchronous Optical Network) Physical layer organize innovation to convey expansive volumes of activity over generally long separations on fiber optic cabling Internet spine Point-to-point rent lines Optical Carrier (OC) levels OC-1 51.84Mbps OC-3 155.52Mbps OC-12 622.08Mbps OC-24 1.244Gbps OC-48 2.488Gbps OC-192 9.953Gbps OC-768 40Gbps WAN & Remote Access

Slide 9

Security conventions - SSL Secure Sockets layer (SSL) Server confirmation Client validation Encrypted associations Above the system layer Only for applications that can utilize SSL Web programs WAN & Remote Access

Slide 10

Security conventions - IPSec IP Security (IPSec) Created by IETF Works on both IPv4 and IPv6 Provides three key security administrations Integrity hash calculation connected to scratch + IP datagram Confidentiality Standard symmetric encryption calculations Private exchanges, again refusal of administration assault Sliding window and grouping number WAN & Remote Access

Slide 11

Security conventions - IPSec Operates at the system layer Can secure for all intents and purposes all TCP/IP related interchanges Two modes: Transportation | IP | AH | TCP | DATA | Tunnel | New IP | AH | IP | TCP | DATA| Protocols Authentication Header (AH) Encapsulated Security Payload (ESP) Internet scratch trade (IKE) convention Authentication of the companions and the trading of the symmetric keys. WAN & Remote Access

Slide 12

Security conventions Point to point Tunneling convention (PPTP) Creates a protected transmission burrow between two focuses on a system Creates multi-convention Virtual Private Network(VPNs) Requires to build up a PPTP session utilizing port 1723 Layer 2 Forwarding (L2F) Developed by Cisco Allows burrowing to be used Layer 2 Tunneling Protocol (L2TP) Is a mix of PPTP and Cisco's L2F innovation Authenticates the customer in two-stage prepare Computer User Operates at the information interface layer WAN & Remote Access

Slide 13

Security conventions The upsides of PPTP and L2TP PPTP More interoperability Easier to arrange Less overhead L2TP more noteworthy security basic open key foundation innovation header pressure WAN & Remote Access

Slide 14

Security conventions Kerberos Network validation convention Ensure the confirmation information is scrambled Default verification strategy for Windows 2000 and Windows XP WAN & Remote Access

Slide 15

Configuring remote availability Physical associations Public exchanged phone organize (PSTN) A modem The plain old phone framework (POTS) Integrated Services Digital Network (ISDN) Digital signs Cable Broadband web access over TV link DSL Broadband offering from telecom organizations Satellite WAN & Remote Access

Slide 16

Remote get to conventions Remote Access Service (RAS) Is a Windows Solution Any customer with dial-in conventions can associate with RAS Uses SLIP and PPP as fundamental advancements SLIP PPP Point to point Tunneling convention (PPTP) WAN & Remote Access

Slide 17

Configuring remote availability Protocols Data connect layer PPP SLIP PPPoE Network-layer and transport-layer conventions TCP/IP IPX/SPX WAN & Remote Access

Slide 18

VPN What is a virtual private system (VPN)? Permits at least two private systems to be associated over an openly gotten to arrange. Can be work over ATM, outline transfer, X.25, IP-based system, and so on. Have spare security and encryption highlights as a private system. Encryption Authentication Network burrowing IPSec, PPTP, L2TP WAN & Remote Access

Slide 19

VPN How to pick a VPN? Rented line? Overseen VPN? Execute your own VPN? Outsource? Check the administration gave versus required? Benefit level assention can be dubious 99.999% availability No assurance once the parcel traverses to another ISP Encryption level Site to site VPN Performance, security and reasonability Remote client to LAN Easy of utilization WAN & Remote Access

Slide 20

VPN How a virtual private system functions Traffic achieve the system spine utilizing T1, outline hand-off, ISDN, ATM, dial-up Reach a passage starting gadget, which speak with a VPN eliminator to concede to an encryption conspire. The passage initiator then encode the bundle before transmitting to the eliminator Terminator decodes the parcel and conveys it to the proper goal on the system. WAN & Remote Access

Slide 21

VPN The upside of a VPN Cost investment funds No longer to buy costly rented lines Flexibility for development Reduce long-remove phone charges Call nearby number of server supplier's get to point Reduce bolster trouble Equipment costs – modem, remote get to server, wan hardware, and so on Switch to another supplier at a superior cost Secure Quick to execute WAN & Remote Access