Unit 4 Section 1 - Computer Technology Training

advertisement
Unit 4:
WANs and Wireless Networks
Section 1: Wide Area Network Technologies
In this section you will learn about configuring TCP/IP addresses and
subnet masks.
At the end of this section you should be able to:
1. Identify and describe common Wide Area Network
Technologies used to connect to the Internet
2. Identify and describe common Wide Area Network
Technologies used on public networks
3. Identify Remote Access methods and Virtual Private
Network (VPN) types
Objective 1: Identify and Describe common WAN
Technologies used to connect to the Internet
The main technologies used by most individuals and businesses to connect to the Internet have been
the telephone network, cable systems, or wireless technologies such as satellite and WiMax. In this
section we will look at the wired network options including the telephone and cable networks. In section
2 we will look at Wireless solutions including satellite and WiMax.
Public Switched Telephone Network (PSTN)
Network of lines, carrier equipment providing telephone service often referred to as POTS (plain old
telephone service). In a PSTN system, the customers are connected to a Central Office (CO) in what is
called the Local Loop. The COs are interconnected using common network topologies including Ring,
Bus, Star, and Mesh.
Originally the POTS network carried only analog voice traffic. Today the system has been updated to
carry digital data, and uses computer controlled switching. Dial-up connections were one of the first
ways the public accessed the Internet. While dial up networking is very slow, it is still used today in
remote locations.
– Modem connects computer to distant network
– Works from almost anywhere
The PSTN can support a variety of WAN technologies including DSL, ISDN, and T1 connections. Of these
WAN technologies, DSL is the most rapidly growing technology for Internet connections both for
individuals and businesses as it provides high speed, continuous Internet connect where available.
DSL (digital subscriber line)
DSL operates over PSTN at the physical layer and shares voice and data over same telephone line by
using inaudible high range frequencies (voice uses only 300 – 3000 Hz). In addition, DSL uses advanced
data modulation techniques including amplitude and phase modulation providing for higher data rates.
Today, DSL competes with other PSTN services such as ISDN and T1. In many cases, high speed DSL
combined with Virtual Private Networks (VPNs) is replacing T1 lines.
DSL divides communications into downstream and upstream. In Downstream, the data travels from
carrier’s switching facility to customer. More speed is needed to day to stream audio and video contents
from Web sites such as YouTube. In Upstream, data travels from customer to carrier’s switching facility.
Upstream speed is becoming more important as customers wish to upload information and pictures to
social media sites. There are two major categories of DSL:
Asymmetrical - different upstream and downstream speeds
Symmetrical – Same upstream and downstream speeds
DSL services can be classified into several types based on the category and speed, generally referred to
as xDSL. The types of xDSL include; ADSL, G.Lite, HDSL, SDSL, VDSL, SHDSL. Read pages 318 though 320
to learn about these types of DSL services shown below. The Network + objectives expect you to know
the differences between ADSL, HDSL, and VDSL.
Broadband Cable
Cable companies connectivity option that is based on TV signals coaxial cable wiring. As in the case of
DSL, the cable system Operates at Physical and Data Link layer. Because of the cable bandwidth, the
theoretical transmission speeds are very fast compared to DSL running over standard twisted pair. Cable
may off theoretical transmission speeds of 150 Mbps downstream and up to 10 Mbps upstream.
However, because of overhead, thransmission speed throttling, and multiple customers sharing cable
segments, real transmission speeds are often 10 Mbps downstream and 2 Mbps upstream.
Requires cable modem that may be built into a Wireless Access Point or switch as shown in
Figure 7-18 of the book. The Cable modem modulates, demodulates transmission, reception
signals via cable wiring.
Objective 2: Identify and Describe common WAN
Technologies used on public networks
Another major use of WAN technologies is providing high bandwidth connections between data centers.
Prior to the Internet, these technologies were leased by IT departments to allow connections between
there corporate or organizational networks. In this objective we will look at several of these
technologies.
X.25 ITU standard
As described on page 309, X.25 is an analog, packet-switching technology from 1970s. Initially it was
used to connect terminals located in remote locations to mainframe computers and limited to 64 Kbps
throughput. While 64 Kbps was sufficient for simple terminal connections, by 1992 the X.25 system was
updated to support 2.048 Mbps throughput to support more intensive client server server WAN
requirements.
X.25 pperates at Physical, Data Link, and Network layers, and verifies transmission at every node. As a
result X.25 has excellent flow control and ensures data reliability. However, it is it is too slow for timesensitive or large data transmission applications, and because it operates at the Network layer, it is not
compatible with TCP/IP. Today X.25 is a dead technlogy that has been replaced by Frame Relay.
Frame relay
Frame Relay is an updated version of X.25 packet-switching network that is digital and operates at the
Data Link layer making it compatible with other procols such as TCP/IP.
Unlike X.25, Frame relay is a connectionless system that offers no data delivery guarantee. It has the
following characteristics as described on pages 309 – 310.


Customer chooses data speed
Uses Virtual Circuits that are connections between network nodes that while based on
potentially disparate physical links, appear to be a direct dedicated link.
o PVC – Permanent Virtual Circuit –
 Connection remains between sessions
 Used to connect sites that have large and frequent transmissions.
o SVC – Switched Virtual Circuit
 Connection established with session and disconnected at end of session.
 Used with more infrequent and smaller transmissions.
ISDN
Integrated Service Digital Network (ISDN) is an internation standard established by the ITU in
the mid-1980s for transmitting data over the PSTN using either dial-up or dedicated
connections. While very popular in Europe, due to telephone switch company incompatibilities,
ISDN never took off well in North America.
Read pages 311-312 to learn more about ISDN. Some facts are listed below:
ISDN is an ITU standard for digital data transmitted over PSTN
Relies on PSTN for transmission medium
Exchanges data, voice signals
Dial-up or dedicated connections using exclusively on digital transmission
ISDN protocols at Physical, Data Link, Transport layers making it independent of TCP/IP
Gained popularity in the 1990s to connect WAN locations. Most commonly used in
Europe. ISDN has two channel types:
B channel: “Bearer”
Circuit switching for voice, video, audio: 64 Kbps
D channel: “data”
Packet-switching information: 16 or 64 Kbps
BRI (Basic Rate Interface) connection
–
–
2 B channels that may be bonded to create 128 Kbps circuit
1 D channel for network control information
PRI (Primary Rate Interface) connection
–
–
23 B channels that may be bonded to create one or more circuits with up to 1.544 Mbps
1 D channel for network control information
In the above diagrams, the NT (Network Termination) devices connect the twisted pair wiring at the
customer’s building with the ISDN switch using RJ-11 (standard phone connector) or RJ-45 (Ethernet)
data jack. The TE (terminal equipment) may include cards or stand-alone devices used to connect to
ISDN. The TA (Terminal Adapter) convets digital signals into analog signals for use with ISDN phones and
other analog devices. In this example, the workstation is using an analog modem to connect to the ISDN
system.
ATM (Asynchronous Transfer Mode)
ATM is an updated version of Frame Relay that functions in the Data Link layer and is designed to be
used with different physical and network layer protocols. In this way, ATM is similar to Ethernet except
that is uses a small 53-byte fixed length packet called a Cell. The Cell carries 48 data bytes along with a
5-byte header. For a better explanation of ATM and its use, read pages 324 – 325 in the text book.
Following are some points of interest you should know for the Network + objectives:
ATM Functions in Data Link layer and may be used to carry different network layer protocols
over a variety of physical network systems including SONet.
ATM uses an asynchronous communications method.
– Nodes do not conform to predetermined schemes specifying data transmissions timing
– Each character transmitted with start and stop bits
Specifies Data Link layer framing techniques using fixed packets (cell)
– 48 data bytes plus 5-byte header = 53 bytes
Smaller packet size requires more overhead
– Decrease potential throughput
– Cell efficiency compensates for loss
ATM relies on virtual circuits
– ATM considered packet-switching technology
– Virtual circuits provide circuit switching advantage
• Circuit path setup by switches in advance
– Reliable connection
Allows specific QoS (quality of service) guarantee
– Important for time-sensitive applications such as VOIP and video
Often used on SONET rings
T-Carriers
The previous WAN technologies have all included the Data Link layer in their protocol. However,
T-Carriers and SONET work at the physical layer to transmit bits, and can work with different
Data Link protocols.
T-Carriers are designed to transmit digital data at high speeds over the PSTN. A T-Carrier uses
Time Division Multiplexing (TDM) over 2-wire pairs to divide a single channel into multiple
channels of 64-Kbps. T-Carrier includes T1, fractional T1s, and T3s. A T1 is 24 64-Kbps channels
for a total of 1.544 Mbps. T-carrier signaling can be used on ordinary telephone wire, fiber-optic
cable, or wireless links.
Read pages 313 – 317 in the text book for a good description of T-carriers. Following are some
notes from the textbook and presentation.
T-Carriers operate at the Physical layer and consist of T1s, fractional T1s, T3s
Single channel divided into multiple channels
– Using TDM (time division multiplexing) over two wire pairs. One pair for
transmiting and the other for receiving.
– Telephone wire, fiber-optic cable, wireless links
Smart Jacks along with CSU/DSU are used to terminate T-carrier wire pairs at the customer’s
demarc (demarcation point) which may be inside or outside building. The demarc also acts
as a connection monitoring point.
SONET (Synchronous Optical Network)
Read pages SONETs operate at the Physical layer and offer the following four key strenght when
compared to other WAN technologies:
– WAN technology integration
– Fast data transfer rates
– Simple link additions, removals
– High degree of fault tolerance due to the dual-ring system. If a cable or site is down, the
dual ring allows the data to be transferred to all other devices. This process is referred
to as “self healing”.
SONET is a synchronous network system that where nodes conform to a central timing scheme. SONET
uses a double-ring topology over fiber cable to provide fault tolerance or self-healing. In the SONET ring,
a connection begins and ends at the telecommunication carrier’s facility as shown below:
As shown in the diagram below, SONET rings terminate at a multiplexer and provide easy ring additions,
and removals.
SONET can carry data from a variety of WAN technologies including ISDN, T1, and ATM. The data rat ofa
particular SONET ring is indicated by its OC (Optical Carrier) level. You will be asked about some of these
OC levels in the Network + certification.
Because of its high cost and bandwidth, SONETs are usually used only by large corporations and
telecommunication companies. Read pages 325 – 327 for a complete description of the SONET
technology.
Objective 3: Identify Remote Access methods and Virtual
Private Network (VPN) types
Remote access provides the ability for a user to connect to another computer or network from a remote
location. In the past this was done primarily by using the dial-up PSTN to connect to a remote access
server. The remote access server would then verify the user’s name and password and allow the remote
computer to become a part of the local network as shown below.
Remote Access Protocols
There are two major types of remote access protocols used to support dial-up connections – SLIP and
PPP. When using these protocols, workstations connect using serial connection and encapsulate higherlayer networking protocols, in lower-layer data frames as shown below.
Read pages 328-333 for a description of dial-up networking and the SLIP and PPP remote access
protocols. Some differences are noted below:
SLIP is an earlier protocol designed to cary IP packets only
Harder to set up
Supports only asynchronous data
PPP carries many different Network layer packets
Automatic set up
Performs error correction, data compression, supports encryption
Supports asynchronous and synchronous transmission
Today, PPP is used when connecting to the Internet through a dial-up connection. A variation of
PPP called PPPoE (PPP over Ethernet), is used when connecting to the Internet using DSL or
cable modems.
Remote Desktop Infrastructure
As described in Unit 3, Remote Desktop is a remote access protocol that allows a user to open a
window to the desktop of another computer and then operation that system the same as if they
were at the remote computer’s console. Following is some notes from pages 333-334 of the
textbook.
Windows client and server operating systems
Relies on RDP (Remote Desktop Protocol)
Application layer protocol
Uses TCP/IP to transmit graphics, text quickly
Carries session, licensing, encryption information
Exists for other operating systems
Not included in Windows home editions
Uses Port 3389 by default
Today, the remote desktop infrastructure allows a server computer to run multiple systems
called virtual computers. Each virtual computer is a Windows desktop environment that can be
accessed from systems called “thin clients”. A thin-client is a device that acts like a terminal to
the virtual computer running on the server. From the thin-client a user can run programs and
access data just as if they were sitting at the actual computer. BYOD systems can also run the
thin-client software, making it possible for a user to access their desktop computer from a table
or notebook system.
VPNs (Virtual Private Networks)
A VPN replaces the older dial-up network system by using the Internet to connect to a remote access
server rather than a dial-up connection. A VPN creates a secure “tunnel” which acts like a phone
connection to transfer all data packets from the remote computer to the remote access server as shown
below.
Read pages 336 – 338 for an explanation of VPNs. Following are notes based on the presentation and
texbook materials:
Types of VPN tunnels
PPTP (Point-to-Point Tunneling Protocol)
Microsoft
Authentication and minimal encryption
L2TP (Layer 2 Tunneling Protocol)
Developed by Cisco
Uses IPSec encryption at Network Layer to provide strong security
SSL VPN
Uses SSL encryption at Presentation level
• Establishes connection at Browser level
An SSL VPN (Secure Sockets Layer virtual private network) is a form of VPN that can be used with
a standard Web browser.
In contrast to the traditional Internet Protocol Security (IPsec) VPN, an SSL VPN does not require
the installation of specialized client software on the end user's computer.
Used to give remote users with access to Web applications, client/server applications and
internal network connections.
OpenVPN Tunnel
OpenVPN is an SSL VPN and as such is not compatible with IPSec, L2TP, or PPTP.
–
The IPSec protocol is designed to be implemented as a modification to the IP stack in
kernel space, and therefore each operating system requires its own independent
implementation of IPSec.
–
By contrast, OpenVPN's user-space implementation allows portability across operating
systems and processor architectures, firewall and NAT-friendly operation, dynamic
address support, and multiple protocol support including protocol bridging.
–
There are advantages and disadvantages to both approaches. The principal advantages
of OpenVPN's approach are portability, ease of configuration, and compatibility with
NAT and dynamic addresses. The learning curve for installing and using OpenVPN is on
par with that of other security-related daemon software such as SSH.
Chapter 7 Review Questions
1. Which of the following WAN topologies comes with the highest availability and the
greatest cost?
Page 304
2. Which of the following elements of the PSTN is most likely capable of transmitting only
analog signals?
Page 307
3. A customer calls your ISP’s technical support line, complaining that his connection to the
Internet usually goes as fast as 128 Kbps, but today it is only reaching 64 Kbps. He adds
that he has tried dialing up three different times with the same result. What type of
connection does this customer have?
Page 311
4. What is the purpose of ISDN’s D channel?
Page 311
5. Suppose you work for a bank and are leasing a frame relay connection to link an
automatic teller machine located in a rural grocery store with your bank’s headquarters.
Which of the following circuits would be the best option, given the type of use this
automatic teller machine will experience?
Page 309
6. On an ISDN connection, what device separates the voice signal from the data signals at
the customer premises?
Page 312
7. Which of the following WAN technologies operates at Layer 3 of the OSI model?
Page 322
8. What technique enables DSL to achieve high throughput over PSTN lines?
Page 318
9. Suppose you establish a home network and you want all three of your computers to share
one broadband cable connection to the Internet. You decide to buy a router to make this
sharing possible. Where on your network should you install the router?
Page 322
10. How does ATM differ from every other WAN technology described in this chapter?
Page 324
11. You work for an Internet service provider that wants to lease a T3 over a SONET ring.
What is the minimum Optical Carrier level that the SONET ring must have to support the
bandwidth of a T3?
Page 327
12. Which two of the following are asymmetrical versions of DSL?
Page 318
13. What technique does T1 technology use to transmit multiple signals over a single
telephone line?
Page 313
14. Where on the PSTN would you most likely find a DSLAM?
Page 321
15. The science museum where you work determines that it needs an Internet connection
capable of transmitting and receiving data at 12 Mbps at any time. Which of the
following T-carrier solutions would you advise?
Page 313
16. A local bookstore that belongs to a nationwide chain needs a continuously available
Internet connection so that staff can search for the availability of customer requests in the
database stored at the bookstore’s headquarters. The maximum throughput the store needs
is 768 Kbps. Which of the following options would best suit the store?
Page 319
17. What part of a SONET network allows it to be self-healing?
Page 325
18. Which of the following may limit a DSL connection’s capacity?
Page 319
19. You work for a consulting company that wants to allow telecommuting employees to
connect with the company’s billing system, which has been in place for 10 years. What
do you suggest as the most secure and practical means of providing remote LAN access
for this application?
Page 32920. Why is broadband cable less commonly used by businesses than DSL or T-carrier
services?
Page 32121. You’re troubleshooting a problem with poor performance over a WAN connection at your
office. Looking at the smart jack, you see the Tx light is blinking green and the Rx light
is not illuminated. What can you conclude about the problem?
Page 315
22. Your company has decided to order ADSL from its local telecommunications carrier. You
call the carrier and find out that your office is located 17,000 feet from the nearest CO.
Given ADSL’s potential throughput and your distance from the CO, what is the maximum
downstream throughput you can realistically expect to achieve through this connection?
Page 319 (Note: This applies to “Full Rate” ADSL, whose maximum potential
downstream throughput is 8 Mbps.)
23. In which of the following situations would you use RDP?
Page 33324. You have decided to set up a VPN between your home and your friend’s home so that
you can run a private digital telephone line over your DSL connections. Each of you has
purchased a small Cisco router for terminating the VPN endpoints. Which of the
following protocols could you use to create a tunnel between these two routers?
Page 337
25. Skip
Download