Lecture 4 - WAN Devices - Standards - Commuication
Lecture 4 - WAN Devices - Standards - Commuication
WANs use numerous types of devices that are specific to WAN environments:
Figure 1-13 shows the location of each device.
PSTN
A) User-End Devices
Computers (PCs)
o Represent end-user devices that need network access.
o Connected to the WAN through different modems and access methods.
1
o Connection Type: Circuit-Switched (Like a phone call)
o Data is sent to an Access Server, then a WAN switch.
2. DSL Users
Digital Subscriber Line (DSL) is a broadband internet technology that provides high-
speed internet access using existing telephone lines (copper wires).
o The headend routes the data to the WAN (Internet) through high-speed fiber-
optic connections.
o Data is forwarded to the WAN switch.
2
The data travels through a router and into a CSU/DSU (Channel Service Unit/Data
Service Unit).
The CSU/DSU converts the data into a digital signal suitable for T1 transmission.
The T1 line carries the data in digital format over copper or fiber optic cables.
Provides high-speed, dedicated connectivity.
The data reaches the WAN switch at the service provider, where it is routed to its
destination.
B) . Access Technologies
Dial-Up Modems
o Convert digital signals to analog and vice versa.
o Connected to an Access Server, which manages multiple dial-up connections.
DSL Modem
o Connects to a PSTN (Public Switched Telephone Network) for internet access.
o Transmits data over telephone lines.
o DSL modems do not convert signals to analog. Instead, they modulate high-
frequency digital signals for transmission over copper telephone lines.
Cable Modem
o Connects to a Cable Network, providing internet over coaxial cables.
o Cable modems do not convert analog signals but instead modulate digital
signals for transmission over a coaxial cable network.
o A CSU/DSU (Channel Service Unit/Data Service Unit) converts data for the
high-speed T1 line.
o Connects to a router, which then forwards data to the WAN switch.
C. WAN Infrastructure
■Modem: Modulates an analog carrier signal to encode digital information, and also
demodulates the carrier signal to decode the transmitted information.
A voiceband modem converts the digital signals produced by a computer into voice
frequencies(Analog) that can be transmitted over the analog lines of the public telephone
network.
On the other side of the connection, another modem converts the sounds back into a
digital signal for input to a computer or network connection.
3
Faster modems, such as cable modems and DSL modems, transmit using higher
broadband frequencies.
■ CSU/DSU: Digital lines, such as T1 and T3 carrier lines, require a channel service unit (CSU)
and a data service unit (DSU).
The two are often combined into a single piece of equipment, called the CSU/DSU.
The CSU provides termination for the digital signal and ensures connection integrity
through error correction and line monitoring.
Converts digital signals into a format suitable for transmission over the WAN.
The DSU converts the T-carrier line frames into frames that the LAN can interpret and
vice versa. Acts as an interface between a router and a leased digital line (e.g., T1 line).
■ Access server: The Access Server is a network device used to manage and control remote user
connections to a Wide Area Network (WAN). It acts as a gateway between dial-up users (using
modems) and the WAN.
Concentrates dial-in and dial-out user communications. An access server may have a mixture of
analog and digital interfaces and support hundreds of simultaneous users. Manages connections
from multiple dial-up modems. Sends data to the WAN Switch for further processing.
■ WAN switch: A multiport internetworking device used in carrier networks. These devices
typically switch and route traffic and operate at the data link layer of the OSI reference model.
■ Router: Provides internetworking and WAN access interface ports that are used to connect to
the service provider network. Directs traffic between LANs and the WAN. Uses routing
protocols to determine the best path for data.
■ Core router: A router that resides within the middle or backbone of the WAN rather than at
its periphery.
To fulfill this role, a router must be able to support multiple telecommunications interfaces of the
highest speed in use in the WAN core, and it must be able to forward IP packets at full speed on
all those interfaces.
The router must also support the routing protocols being used in the core. Directs data packets
between different networks.
D. WAN Connection Types
T1 Connection
o A leased line providing a dedicated connection to the WAN.
o Requires a CSU/DSU before connecting to a router.
4
PSTN Network: PSTN (Public Switched Telephone Network) is the traditional
telephone network used for voice communication worldwide. It is a circuit-switched
network that enables landline calls using a network of copper wires, fiber optics,
satellites, and telephone switches. Traditional telephone network used for dial-up and
DSL connections.
Cable Network
When we connect to the Wide Area Network (WAN), we need physical connections (cables,
connectors, and signals) to make communication possible. The WAN Physical Layer defines
how these connections work.
Electrical Connections
Specifies the voltage levels, signal speeds, and encoding methods used to transmit data.
Example: A T1 line uses a specific electrical signal to transmit data at 1.544 Mbps.
Mechanical Connections
Defines the physical characteristics of connectors, cables, and ports used to link WAN
devices.
Example: Different WAN connections use different connectors, like 25-pin (RS-232),
34-pin (V.35), or 60-pin (HSSI).
Operational Connections
Functional Connections
5
Example: Routers (DTE) process data, while modems (DCE) send it across the
WAN.
• DTE (Data Terminal Equipment): This is usually the end-user device, like a computer or
router, that wants to send data.
• DCE (Data Circuit-Terminating Equipment): This is the device that connects the DTE to
the WAN, like a modem or CSU/DSU.
To send data, the DTE and DCE must be physically connected using cables and connectors that
follow specific WAN physical-layer protocols.
Each protocol describes how data should be sent, what types of cables are used, and how fast
the connection can be.
1. Different cables and connectors are used to link computers, routers, and modems to a
WAN.
2. Older standards like RS-232 were used for slow, short-distance connections.
3. Newer standards like HSSI and V.35 allow much faster speeds.
4. Each protocol has a specific type of connector (shape and pin layout).
5. Choosing a protocol depends on what the service provider supports.
So, when you connect a router, modem, or network device to a WAN, it uses one of these
physical layer protocols to send data across long distances.
6
.
Figure 1-14 illustrates the types of cable connectors associated with each physical layer
protocol.
WAN Encapsulation
When data travels over a Wide Area Network (WAN), it must be packaged (encapsulated) in
a specific format so that network devices can understand and transmit it properly. This process
happens at Layer 2 (Data Link Layer) of the OSI Model.
Each WAN connection type (e.g., leased lines, DSL, Frame Relay) requires a specific type of
encapsulation to ensure data is transmitted correctly.
1. Data from the Network Layer (Layer 3, e.g., an IP packet) is passed down to the Data
Link Layer (Layer 2).
2. The Data Link Layer adds a frame (a wrapper) around the data.
3. This frame ensures error checking and proper delivery over a point-to-point WAN link.
4. The router must be configured with the correct encapsulation protocol to match the
WAN technology being used. Commonly used protocol is HDLC ( High-Level Data Link
Control) Protocol. HDLC is a Layer 2 (Data Link Layer) WAN protocol used for
synchronous communication between network devices. It is used to encapsulate data
before transmission over point-to-point links.
7
Figure 1-16 shows how WAN data link protocols encapsulate traffic. Examining the header
portion of an HDLC frame, shown in Figure 1-17, helps you identify common fields used by
many WAN encapsulation protocols.
The Address and Control fields, as illustrated in Figure 1-17, are called the frame header. The
encapsulated data follows the Control field(meta data like IP Address, Port Number). Then a
8
frame check sequence (FCS) uses the cyclic redundancy check (CRC) mechanism to establish a
2- or 4-byte field. Several types of WAN encapsulation formats exist, including subsets and
proprietary versions of HDLC. Both PPP and the Cisco version of HDLC have an extra field in
the header to identify the network layer protocol of the encapsulated data.
Summary
Encapsulation is the process of wrapping network data inside a frame for transmission
over a WAN.
The frame includes a header (control info), the actual data, and an error-checking
field (FCS).
Different WAN protocols (HDLC, PPP, Frame Relay, MPLS) exist to handle different
types of WAN communication.
Encapsulation ensures data is reliably delivered across the WAN—just like putting a
letter in an envelope before mailing it!
WAN communication involves multiple steps to ensure reliable data transmission. The key steps
are:
Connection Establishment
The WAN device (e.g., a router) establishes a connection using leased lines, packet-
switched, or circuit-switched technology.
Data Encapsulation
Data Transmission
WAN protocols detect and correct errors using CRC (Cyclic Redundancy Check) and
retransmissions.
Packet Reassembly
The receiving device reassembles packets and forwards them to the destination network.
9
Steps in WAN Design
Designing a WAN involves multiple steps to ensure efficiency, security, and scalability.
1. Requirements Analysis
Choose between MPLS, VPN, leased lines, etc., based on cost, performance, and
reliability.
Three common WAN technologies are MPLS (Multiprotocol Label Switching), VPN (Virtual
Private Network), and Leased Lines. Each of these technologies has different use cases, costs,
and performance characteristics.
What is MPLS?
When data enters the MPLS network, the first router assigns a label.
Each router in the MPLS network forwards packets based on the label, not the IP
address.
The last router removes the label and sends the packet to its destination.
Advantages of MPLS
Disadvantages of MPLS
10
❌ Expensive compared to VPNs because it requires a dedicated service provider.
❌ Less flexible (requires provider setup and is slower to scale compared to VPNs).
❌ No encryption by default (data is private but not encrypted like a VPN).
✔ Large enterprises with multiple locations needing reliable and fast WAN connectivity.
✔ Organizations running VoIP, video conferencing, and cloud applications.
✔ Banks, government agencies, and businesses that require low-latency and QoS support.
What is a VPN?
A VPN (Virtual Private Network) creates a secure, encrypted connection over the public internet.
It allows remote users and offices to securely access a private network. VPN (Virtual Private
Network) uses IP addresses to establish connections and route traffic securely over the internet.
However, it hides the user’s real IP address and assigns a new one for privacy and security.
Advantages of VPN
Disadvantages of VPN
3. Leased Lines
11
A Leased Line is a dedicated, private connection between two locations, provided by an
internet service provider (ISP). Unlike VPN and MPLS, a leased line offers exclusive
bandwidth that is not shared with other customers.
12
Feature MPLS VPN Leased Line
Higher latency (depends
Latency ⏳ Low latency Lowest latency
on ISP)
Large businesses, banks, Small businesses, remote Enterprises with
Best for ✅ telecoms, and government workers, general internet mission-critical
agencies users applications
High speed, reliability, and QoS for VoIP and video conferencing.
A private network without relying on the public internet.
A balance between cost and performance.
Decide on a topology:
o Point-to-Point (Direct connection)
o Hub-and-Spoke (Centralized communication)
o Full Mesh (Direct connection between all nodes)
o Hybrid (Combination of multiple topologies)
13
Use encryption, firewalls, and access control lists (ACLs).
8. Performance Testing
Conduct testing using tools like network simulators or real-world traffic analysis.
Deploy the WAN and use network monitoring tools like SNMP, NetFlow, or SD-WAN
controllers.
14