0% found this document useful (0 votes)
7 views14 pages

Lecture 4 - WAN Devices - Standards - Commuication

The document provides an overview of WAN devices, user-end connections, and access technologies, detailing how different users connect to WANs through methods like dial-up, DSL, cable, and T1 lines. It explains the roles of various components such as modems, CSU/DSUs, routers, and WAN switches, as well as the physical layer standards and encapsulation processes involved in WAN communication. Additionally, it discusses WAN design steps and compares different WAN technologies like MPLS, VPN, and leased lines, highlighting their advantages and use cases.

Uploaded by

shoibbasil62
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views14 pages

Lecture 4 - WAN Devices - Standards - Commuication

The document provides an overview of WAN devices, user-end connections, and access technologies, detailing how different users connect to WANs through methods like dial-up, DSL, cable, and T1 lines. It explains the roles of various components such as modems, CSU/DSUs, routers, and WAN switches, as well as the physical layer standards and encapsulation processes involved in WAN communication. Additionally, it discusses WAN design steps and compares different WAN technologies like MPLS, VPN, and leased lines, highlighting their advantages and use cases.

Uploaded by

shoibbasil62
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 14

WAN Devices

WANs use numerous types of devices that are specific to WAN environments:
Figure 1-13 shows the location of each device.

PSTN

2. Key Components and Their Roles

A) User-End Devices

 Computers (PCs)
o Represent end-user devices that need network access.
o Connected to the WAN through different modems and access methods.

How Different End-Users Connect to the WAN

1. Dial-Up Users (PSTN - Public Switched Telephone Network)


o Use a Dial-Up Modem.(Old, Traditional)
o Connects through the PSTN Network.

1
o Connection Type: Circuit-Switched (Like a phone call)
o Data is sent to an Access Server, then a WAN switch.

2. DSL Users

Digital Subscriber Line (DSL) is a broadband internet technology that provides high-
speed internet access using existing telephone lines (copper wires).

o Use a DSL Modem.


o Connects through the PSTN Network.
o DSL uses the same PSTN phone lines but transmits data digitally over higher
frequencies than voice calls.
o Connection Type: Packet-Switched (Always-on connection)
o Data is aggregated and sent to the WAN switch.

3. Cable Internet Users


o Use a Cable Modem.
o Connects through the Cable Network.
o The cable modem connects to the coaxial cable network (same infrastructure as
cable TV).
o Data is transmitted over Radio Frequency (RF) signals instead of phone line
frequencies.
o The signal is sent to the Cable Headend, which is the ISP’s central location for
managing cable connections.

o The headend routes the data to the WAN (Internet) through high-speed fiber-
optic connections.
o Data is forwarded to the WAN switch.

4. T1 Business Users - Business Users

T1 stands for "Transmission System 1." It is a dedicated high-speed digital


communication line originally developed by Bell Labs in the United States. A T1 line
provides 1.544 Mbps bandwidth and is used for business internet and voice services.

 Data is sent from a computer to a network device like a Router.

2
 The data travels through a router and into a CSU/DSU (Channel Service Unit/Data
Service Unit).
 The CSU/DSU converts the data into a digital signal suitable for T1 transmission.
 The T1 line carries the data in digital format over copper or fiber optic cables.
Provides high-speed, dedicated connectivity.

 The data reaches the WAN switch at the service provider, where it is routed to its
destination.

B) . Access Technologies

 Dial-Up Modems
o Convert digital signals to analog and vice versa.
o Connected to an Access Server, which manages multiple dial-up connections.

 DSL Modem
o Connects to a PSTN (Public Switched Telephone Network) for internet access.
o Transmits data over telephone lines.
o DSL modems do not convert signals to analog. Instead, they modulate high-
frequency digital signals for transmission over copper telephone lines.

 Cable Modem
o Connects to a Cable Network, providing internet over coaxial cables.
o Cable modems do not convert analog signals but instead modulate digital
signals for transmission over a coaxial cable network.

 T1 Connection (Business or Enterprise Connection)

o A CSU/DSU (Channel Service Unit/Data Service Unit) converts data for the
high-speed T1 line.
o Connects to a router, which then forwards data to the WAN switch.

C. WAN Infrastructure
■Modem: Modulates an analog carrier signal to encode digital information, and also
demodulates the carrier signal to decode the transmitted information.
 A voiceband modem converts the digital signals produced by a computer into voice
frequencies(Analog) that can be transmitted over the analog lines of the public telephone
network.
 On the other side of the connection, another modem converts the sounds back into a
digital signal for input to a computer or network connection.

3
 Faster modems, such as cable modems and DSL modems, transmit using higher
broadband frequencies.
■ CSU/DSU: Digital lines, such as T1 and T3 carrier lines, require a channel service unit (CSU)
and a data service unit (DSU).
 The two are often combined into a single piece of equipment, called the CSU/DSU.
 The CSU provides termination for the digital signal and ensures connection integrity
through error correction and line monitoring.
 Converts digital signals into a format suitable for transmission over the WAN.
 The DSU converts the T-carrier line frames into frames that the LAN can interpret and
vice versa. Acts as an interface between a router and a leased digital line (e.g., T1 line).

■ Access server: The Access Server is a network device used to manage and control remote user
connections to a Wide Area Network (WAN). It acts as a gateway between dial-up users (using
modems) and the WAN.
Concentrates dial-in and dial-out user communications. An access server may have a mixture of
analog and digital interfaces and support hundreds of simultaneous users. Manages connections
from multiple dial-up modems. Sends data to the WAN Switch for further processing.
■ WAN switch: A multiport internetworking device used in carrier networks. These devices
typically switch and route traffic and operate at the data link layer of the OSI reference model.
■ Router: Provides internetworking and WAN access interface ports that are used to connect to
the service provider network. Directs traffic between LANs and the WAN. Uses routing
protocols to determine the best path for data.
■ Core router: A router that resides within the middle or backbone of the WAN rather than at
its periphery.
To fulfill this role, a router must be able to support multiple telecommunications interfaces of the
highest speed in use in the WAN core, and it must be able to forward IP packets at full speed on
all those interfaces.
The router must also support the routing protocols being used in the core. Directs data packets
between different networks.
D. WAN Connection Types

 T1 Connection
o A leased line providing a dedicated connection to the WAN.
o Requires a CSU/DSU before connecting to a router.

4
 PSTN Network: PSTN (Public Switched Telephone Network) is the traditional
telephone network used for voice communication worldwide. It is a circuit-switched
network that enables landline calls using a network of copper wires, fiber optics,
satellites, and telephone switches. Traditional telephone network used for dial-up and
DSL connections.
 Cable Network

Provides broadband internet via Cable Modems. A Cable Network is a telecommunications


system that delivers TV, internet, and phone services using coaxial cables or fiber-optic cables. It
is widely used for broadband internet, cable TV, and digital phone services.

WAN Physical Layer Standards

When we connect to the Wide Area Network (WAN), we need physical connections (cables,
connectors, and signals) to make communication possible. The WAN Physical Layer defines
how these connections work.

WAN physical-layer protocols describe how to provide electrical, mechanical, operational,


and functional connections for WAN services. The WAN physical layer also describes the
interface between the DTE (Data Terminal Equipment): and DCE (Data Circuit-Terminating
Equipment).

 Electrical Connections

 Specifies the voltage levels, signal speeds, and encoding methods used to transmit data.
 Example: A T1 line uses a specific electrical signal to transmit data at 1.544 Mbps.

 Mechanical Connections

 Defines the physical characteristics of connectors, cables, and ports used to link WAN
devices.
 Example: Different WAN connections use different connectors, like 25-pin (RS-232),
34-pin (V.35), or 60-pin (HSSI).

 Operational Connections

 Determines how devices communicate and synchronize data transmission.


 Example: A CSU/DSU (DCE device) generates a clock signal for synchronization.

 Functional Connections

 Describes the roles of WAN devices in transmitting and receiving data.

5
 Example: Routers (DTE) process data, while modems (DCE) send it across the
WAN.

What is the DTE/DCE Interface?

• DTE (Data Terminal Equipment): This is usually the end-user device, like a computer or
router, that wants to send data.

• DCE (Data Circuit-Terminating Equipment): This is the device that connects the DTE to
the WAN, like a modem or CSU/DSU.

To send data, the DTE and DCE must be physically connected using cables and connectors that
follow specific WAN physical-layer protocols.

Common WAN Physical-Layer Protocols

Each protocol describes how data should be sent, what types of cables are used, and how fast
the connection can be.

Protocol Speed Connector Type Used For


Up to 64 25-pin D- Short-distance connections
EIA/TIA-232 (RS-232)
Kbps connector (old serial ports)
EIA/TIA-449/530 (RS- Up to 2 36-pin D- Faster connections with longer
422/423) Mbps connector cables
EIA/TIA-612/613 (HSSI - Up to 52 60-pin D-
Very fast WAN connections
High-Speed Serial Interface) Mbps connector
Up to 2.048 34-pin rectangular Used for packet networks (old
V.35
Mbps connector routers/modems)
Various 15-pin D- Used in Europe for digital
X.21
speeds connector communication

1. Different cables and connectors are used to link computers, routers, and modems to a
WAN.
2. Older standards like RS-232 were used for slow, short-distance connections.
3. Newer standards like HSSI and V.35 allow much faster speeds.
4. Each protocol has a specific type of connector (shape and pin layout).
5. Choosing a protocol depends on what the service provider supports.

So, when you connect a router, modem, or network device to a WAN, it uses one of these
physical layer protocols to send data across long distances.

6
.
Figure 1-14 illustrates the types of cable connectors associated with each physical layer
protocol.

WAN Encapsulation
When data travels over a Wide Area Network (WAN), it must be packaged (encapsulated) in
a specific format so that network devices can understand and transmit it properly. This process
happens at Layer 2 (Data Link Layer) of the OSI Model.
Each WAN connection type (e.g., leased lines, DSL, Frame Relay) requires a specific type of
encapsulation to ensure data is transmitted correctly.

How Encapsulation Works in WANs

1. Data from the Network Layer (Layer 3, e.g., an IP packet) is passed down to the Data
Link Layer (Layer 2).
2. The Data Link Layer adds a frame (a wrapper) around the data.
3. This frame ensures error checking and proper delivery over a point-to-point WAN link.
4. The router must be configured with the correct encapsulation protocol to match the
WAN technology being used. Commonly used protocol is HDLC ( High-Level Data Link
Control) Protocol. HDLC is a Layer 2 (Data Link Layer) WAN protocol used for
synchronous communication between network devices. It is used to encapsulate data
before transmission over point-to-point links.

7
Figure 1-16 shows how WAN data link protocols encapsulate traffic. Examining the header
portion of an HDLC frame, shown in Figure 1-17, helps you identify common fields used by
many WAN encapsulation protocols.

The Address and Control fields, as illustrated in Figure 1-17, are called the frame header. The
encapsulated data follows the Control field(meta data like IP Address, Port Number). Then a

8
frame check sequence (FCS) uses the cyclic redundancy check (CRC) mechanism to establish a
2- or 4-byte field. Several types of WAN encapsulation formats exist, including subsets and
proprietary versions of HDLC. Both PPP and the Cisco version of HDLC have an extra field in
the header to identify the network layer protocol of the encapsulated data.
Summary
 Encapsulation is the process of wrapping network data inside a frame for transmission
over a WAN.
 The frame includes a header (control info), the actual data, and an error-checking
field (FCS).
 Different WAN protocols (HDLC, PPP, Frame Relay, MPLS) exist to handle different
types of WAN communication.
 Encapsulation ensures data is reliably delivered across the WAN—just like putting a
letter in an envelope before mailing it!

WAN Communication Process

WAN communication involves multiple steps to ensure reliable data transmission. The key steps
are:

Connection Establishment

 The WAN device (e.g., a router) establishes a connection using leased lines, packet-
switched, or circuit-switched technology.

Data Encapsulation

 The data is encapsulated using WAN encapsulation protocol such as HDLC.

Data Transmission

 Data is sent across the WAN using routing protocols.

Error Detection and Correction

 WAN protocols detect and correct errors using CRC (Cyclic Redundancy Check) and
retransmissions.

Packet Reassembly

 The receiving device reassembles packets and forwards them to the destination network.

9
Steps in WAN Design

Designing a WAN involves multiple steps to ensure efficiency, security, and scalability.

1. Requirements Analysis

 Determine business needs, such as bandwidth, security, and performance.

2. Selecting the WAN Technology

 Choose between MPLS, VPN, leased lines, etc., based on cost, performance, and
reliability.

Three common WAN technologies are MPLS (Multiprotocol Label Switching), VPN (Virtual
Private Network), and Leased Lines. Each of these technologies has different use cases, costs,
and performance characteristics.

1. MPLS (Multiprotocol Label Switching)

What is MPLS?

MPLS (Multiprotocol Label Switching) is a high-performance WAN technology that routes


data using labels instead of IP addresses. It provides fast, reliable, and efficient traffic
forwarding between remote locations by using a service provider’s private network.

How MPLS Works

 When data enters the MPLS network, the first router assigns a label.
 Each router in the MPLS network forwards packets based on the label, not the IP
address.
 The last router removes the label and sends the packet to its destination.

Advantages of MPLS

✅ Fast and efficient routing (uses labels instead of IP lookup).


✅ High reliability (traffic is rerouted quickly if a link fails).
✅ Supports Quality of Service (QoS) (prioritizes voice, video, and real-time traffic).
✅ More secure than VPN (uses a private network, not the public internet).

Disadvantages of MPLS

10
❌ Expensive compared to VPNs because it requires a dedicated service provider.
❌ Less flexible (requires provider setup and is slower to scale compared to VPNs).
❌ No encryption by default (data is private but not encrypted like a VPN).

Best Use Cases for MPLS

✔ Large enterprises with multiple locations needing reliable and fast WAN connectivity.
✔ Organizations running VoIP, video conferencing, and cloud applications.
✔ Banks, government agencies, and businesses that require low-latency and QoS support.

2. VPN (Virtual Private Network)

What is a VPN?

A VPN (Virtual Private Network) creates a secure, encrypted connection over the public internet.
It allows remote users and offices to securely access a private network. VPN (Virtual Private
Network) uses IP addresses to establish connections and route traffic securely over the internet.
However, it hides the user’s real IP address and assigns a new one for privacy and security.

How VPN Works

 A VPN client on a user’s device encrypts data.


 The encrypted data travels over the public internet.
 A VPN server at the destination decrypts the data and forwards it to the private network.

Advantages of VPN

✅ Low cost (uses the public internet instead of a private network).


✅ Highly scalable (easy to add new users and locations).
✅ Strong security (encrypts data to prevent hacking or interception).

Disadvantages of VPN

❌ Performance depends on the internet (latency and reliability vary).


❌ No guaranteed Quality of Service (QoS) (VoIP and video calls may suffer).
❌ Requires encryption and authentication management.

3. Leased Lines

What is a Leased Line?

11
A Leased Line is a dedicated, private connection between two locations, provided by an
internet service provider (ISP). Unlike VPN and MPLS, a leased line offers exclusive
bandwidth that is not shared with other customers.

How Leased Lines Work

 The company leases a dedicated circuit from an ISP.


 This connection is always active, providing a fixed bandwidth.
 Common leased line types include T1, E1, T3, Fiber Optic, and Ethernet Private
Lines.

Advantages of Leased Lines

✅ Guaranteed speed and performance (dedicated bandwidth, no congestion).


✅ Highly secure (private and not shared with other networks).
✅ Low latency (ideal for real-time applications like VoIP and cloud computing).

Disadvantages of Leased Lines

❌ Very expensive (higher costs compared to MPLS and VPN).


❌ Limited scalability (requires additional infrastructure for expansion).
❌ Longer setup time (requires physical installation of dedicated circuits).

Best Use Cases for Leased Lines

✔ Enterprises requiring high-speed, secure, and dedicated WAN connectivity.


✔ Organizations with high data transfer needs, such as financial institutions and media
companies.
✔ Businesses needing a stable connection for critical applications like cloud computing.

4. MPLS vs. VPN vs. Leased Lines: Key Differences

Feature MPLS VPN Leased Line


Moderate (more expensive
Low (uses the public High (dedicated
Cost 💲 than VPN but cheaper than
internet) infrastructure)
leased lines)
Security 🔐 Private but not encrypted Encrypted for security Fully private
Performance High performance with QoS Depends on internet Best performance
🚀 support speed (dedicated bandwidth)
Very reliable, with fast Less reliable (depends on Most reliable (dedicated
Reliability 🔄
failover ISP and internet) connection)

12
Feature MPLS VPN Leased Line
Higher latency (depends
Latency ⏳ Low latency Lowest latency
on ISP)
Large businesses, banks, Small businesses, remote Enterprises with
Best for ✅ telecoms, and government workers, general internet mission-critical
agencies users applications

5. Which WAN Technology Should You Choose?

✅ Choose MPLS if you need:

 High speed, reliability, and QoS for VoIP and video conferencing.
 A private network without relying on the public internet.
 A balance between cost and performance.

✅ Choose VPN if you need:

 A low-cost, encrypted connection over the internet.


 Remote access for employees working from different locations.
 An easy-to-scale solution.

✅ Choose Leased Lines if you need:

 A dedicated, private, and highly secure connection.


 The best possible speed and reliability.
 A guaranteed bandwidth for mission-critical applications.

3. Network Topology Design

 Decide on a topology:
o Point-to-Point (Direct connection)
o Hub-and-Spoke (Centralized communication)
o Full Mesh (Direct connection between all nodes)
o Hybrid (Combination of multiple topologies)

4.Choosing WAN Devices

 Select routers, switches, firewalls, and modems based on network needs.

5. Implementing Security Measures

13
 Use encryption, firewalls, and access control lists (ACLs).

6. Quality of Service (QoS) Implementation

 Prioritize critical applications using QoS mechanisms.

QoS Mechanism Function


Traffic Prioritization Gives higher priority to voice, video, and
real-time applications.
Bandwidth Management Allocates network resources to critical
applications.
Latency Control Reduces delays for time-sensitive traffic
like VoIP and video conferencing.
Packet Queuing Organizes data packets into priority queues
to prevent congestion.
Traffic Shaping Slows down non-essential traffic to ensure
smooth performance for high-priority tasks.

7. Redundancy and Failover Planning

 Implement backup links and load balancing for reliability.

8. Performance Testing

 Conduct testing using tools like network simulators or real-world traffic analysis.

9. Deployment and Monitoring

 Deploy the WAN and use network monitoring tools like SNMP, NetFlow, or SD-WAN
controllers.

14

You might also like