Download packet switching

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Distributed firewall wikipedia , lookup

Net bias wikipedia , lookup

Network tap wikipedia , lookup

Wake-on-LAN wikipedia , lookup

Computer network wikipedia , lookup

Airborne Networking wikipedia , lookup

Deep packet inspection wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Packet switching wikipedia , lookup

Piggybacking (Internet access) wikipedia , lookup

Transcript
Information Technology in Theory
By Pelin Aksoy and Laura DeNardis
Chapter 12
Wide Area Networks
Objectives
• Understand the concept of a wide area network
• Identify the main technical components of a wide
area network
• Distinguish between packet switching and circuit
switching
• Understand virtual private networks (VPNs)
Information Technology in Theory
2
Objectives (continued)
• Gain familiarity with the most important
commercial WAN services
• Understand WAN access technologies, including
dedicated lines, xDSL, cable modem access, and
WiMAX
• Identify important network management functions
Information Technology in Theory
3
WAN Background
• Industry convention describes a WAN as a
network that spans a large geographical distance
• The largest example of a WAN is the public
Internet, but many other types of WANs exist
• Wide area networking is sometimes referred to as
enterprise networking
Information Technology in Theory
4
WAN Background (continued)
• Wide area networking developed from the way
businesses first used computer networks to exchange
information internally, beginning in the mid-1970s
• Several architectural features distinguished these
networks from modern WANs
• WANs now support voice, data, and multimedia
information; use open network protocols; and often
are offered over a public network such as the Internet
Information Technology in Theory
5
Packet Switching
• Information sent over the Internet is broken into
small segments called packets
• Each packet contains the actual information
content to be transmitted, as well as the order of
the packet, the sender’s binary address (called the
source address), and the binary address of the
packet’s destination (called the destination
address)
Information Technology in Theory
6
Packet Switching (continued)
• The path that one packet traverses over a network
from source to destination may be different from the
next packet’s path, depending on network congestion
or other conditions
• In this type of networking approach, known as
connectionless packet switching, no dedicated endto-end physical connection is established for the
duration of data transmission
Information Technology in Theory
7
Packet Switching (continued)
• Network devices called routers read the destination
address and determine how to expeditiously route
packets through the networks, based on routing
algorithms that are designed to minimize latency
• Routers are also designed to minimize hops, the
number of times a packet traverses various routers as
it is transmitted over a network
• Once all the packets from a given transmission reach
their destination, they are reassembled in correct
order
Information Technology in Theory
8
Packet Switching (continued)
• The packet-switching approach contrasts with the
circuit-switching approach of the traditional
telephone network
• The circuit-switching approach establishes a physical,
dedicated end-to-end path through the network
between a caller and receiver, and maintains the path
for the entirety of the call
Information Technology in Theory
9
Packet Switching (continued)
Information Technology in Theory
10
Network Protocols
• Network protocols are another important
technical enabler of WANs
• Unlike older types of networks, such as the SNA
and DECnet systems, modern wide area
networking has made the transition to more open
network protocols
• Earlier protocols, such as SNA and DECnet, were
proprietary protocols
Information Technology in Theory
11
Network Protocols (continued)
• The dominant family of network protocols in modern
architectures is TCP/IP
• It is not controlled by a single vendor; it is available
for any manufacturer to use, and it enables universal
access to the Internet
Information Technology in Theory
12
WAN Architectural Components
• A router is an intelligent switching device that
determines how to direct (or route) a packet across
a network, based on the packet’s destination
address and network conditions
• An enormous, interconnected web of thousands of
routers makes up the backbone of the Internet
Information Technology in Theory
13
WAN Architectural Components
(continued)
• The router “looks up” information in a routing table
• These routing tables are constantly changing and
automatically updated as routers probe their network
environments, exchange information with other
routers, and dynamically update their routing tables
Information Technology in Theory
14
WAN Architectural Components
(continued)
Information Technology in Theory
15
WAN Architectural Components
(continued)
• Customers who access the Internet or another type of
WAN are connected to an edge router
• A device called a CSU/DSU (Channel Service
Unit/Data Service Unit) is an important network
component between the edge router and the dedicated
transmission line
• The equipment at a customer location that serves as
the demarcation point between a local network and a
service provider’s WAN is often called customer
premises equipment (CPE)
Information Technology in Theory
16
WAN Architectural Components
(continued)
Information Technology in Theory
17
Private Networks
• If a company such as a bank wants a dedicated
transmission path between its branches for private
digital communication lines, the company has the
option of leasing dedicated private lines from a
network provider
• A private line is not shared with other customers,
so it can guarantee performance and availability to
some degree
Information Technology in Theory
18
Private Networks (continued)
• These dedicated lines may run terrestrially over
fiber-optic cables or high-grade twisted pair, via
undersea fiber-optic cables, or even via satellite
for international communications or remote areas
that do not have adequate terrestrial
telecommunications
• The primary disadvantage of a private network is
cost, because a single enterprise bears the entire
cost of the lines
Information Technology in Theory
19
Private Networks (continued)
Information Technology in Theory
20
Internet Services
• Many businesses use the infrastructure of the
public Internet to communicate internally and with
customers and suppliers
• Using the Internet and other shared public WANs
is much more cost effective than using dedicated
private networks
• Virtual private networks (VPNs) are a response
to the performance and security concerns of public
networks
Information Technology in Theory
21
Internet Services (continued)
Information Technology in Theory
22
Internet Services (continued)
• Privacy and security are achieved through the
application of security measures and a technique
called tunneling
• VPN services offer quality-of-service (QoS)
guarantees to their customers to cover such factors as
latency of packets, dropped packets that cannot be
routed to their destination, and network availability
• VPN customers usually obtain service level
agreements (SLAs) from the VPN provider
Information Technology in Theory
23
Frame Relay Service
• The frame relay network is owned and operated by
the service provider but is used by the customer
• This service uses packets, called frames, with a
variable number of bits that are switched
throughout the WAN until they reach their
destination
• The frame relay standard uses a different format
from other WAN standards
Information Technology in Theory
24
Frame Relay Service (continued)
• A software-defined (virtual) path is set between two
devices on the network, and the devices are expected
to exchange information
– Switched virtual circuits (SVCs)
– Permanent virtual circuits (PVCs)
• Historically, frame relay originated as an
improvement over an older WAN technology known
as X.25
Information Technology in Theory
25
Asynchronous Transfer Mode
• WAN service providers also offer Asynchronous
Transfer Mode (ATM), a network alternative that
formats information into fixed-length packets
• These packets are normally called cells in the
context of ATM
• ATM cells have a total length of 53 bytes
• ATM is a connection-oriented WAN approach
• ATM’s fixed transmission delays, virtual circuits,
and fixed cell size are beneficial for low latency
applications
Information Technology in Theory
26
Multiprotocol Label Switching
• A more practical type of WAN service, called
multiprotocol label switching (MPLS), is
designed to simultaneously support many types of
WAN traffic
• MPLS service can handle variable-length packets,
in contrast with ATM, which transmits fixedlength cells
• One major difference between MPLS and
traditional IP packet switching is that MPLS is
connection oriented
Information Technology in Theory
27
Multiprotocol Label Switching
(continued)
• Traditional packet switching is often connectionless,
meaning that a dedicated end-to-end connection is not
established for the duration of transmission
• Unlike this approach, MPLS routes packets along
preconfigured paths
Information Technology in Theory
28
WAN Access Alternatives
• The access mechanism selected depends on
several variables
– Bandwidth
– Mobility
– Security
– Availability
Information Technology in Theory
29
Leased Private Lines
• Businesses and other enterprises that have more
than a dozen employees and that need WAN
access usually lease a dedicated private line to a
commercial WAN service
Information Technology in Theory
30
Leased Private Lines (continued)
• The line is rented on a monthly basis from a
telecommunications service provider, and comes in
the following transmission speeds:
–
–
–
–
–
–
768 Kbps: Sub-T1 link (also called a fractional T1 line)
T-1 link: 1.544 Mbps (also called a dedicated T1 line)
T-3 link: 45 Mbps
OC-3: 155 Mbps
OC-12: 622 Mbps
OC-48: 2.488 Gbps
Information Technology in Theory
31
Leased Private Lines (continued)
Information Technology in Theory
32
Digital Subscriber Line
• DSL is a WAN access alternative that connects a
user’s DSL modem to the twisted pair cables installed
as part of the traditional telephone network
• Many types of DSL technology are available:
– Symmetric digital subscriber line (SDSL)
– Asymmetric digital subscriber line (ADSL)
– High data rate digital subscriber line (HDSL)
Information Technology in Theory
33
Digital Subscriber Line (continued)
• DSL quality depends on the distance between the user
site and the telephone company (the “central office”)
that houses the DSL termination equipment
• This equipment is known as the DSLAM, or DSL
access multiplexer
• DSL service can offer a transmission rate of up to 7.1
Mbps downstream and approximately 768 Kbps
upstream
Information Technology in Theory
34
Digital Subscriber Line (continued)
Information Technology in Theory
35
Digital Subscriber Line (continued)
Information Technology in Theory
36
Digital Subscriber Line (continued)
Information Technology in Theory
37
Cable Modem Access
• Internet access via cable offers transmission rates
in the megabit per second range—approximately
30 to 50 Mbps downstream and 5 Mbps upstream
in some areas
• Cable WAN access is geared primarily to
residential customers who already subscribe to
cable television service and is offered as part of a
package with cable television, high-speed Internet
access, and Voice over IP service
Information Technology in Theory
38
Cable Modem Access (continued)
Information Technology in Theory
39
WiMAX
• High-speed wireless broadband access to the
Internet is commonplace over small geographical
areas through technologies such as Wi-Fi
• A significant technological requirement is for
products and services to provide the same type of
wireless WAN access over greater distances, such
as across a city using a metropolitan area network
Information Technology in Theory
40
WiMAX (continued)
• WiMAX (Worldwide Interoperability for Microwave
Access)
• Another name for IEEE 802.16
• A formal set of networking standards for wireless
metropolitan area networks
• Developed by the Institute of Electrical and
Electronics Engineers (IEEE)
Information Technology in Theory
41
WiMAX (continued)
• WiMAX networks would consist of WiMAX
antennas transmitting to residences and businesses
with a WiMAX receiver, to laptops with WiMAX
cards, or to Wi-Fi hot spots.
• WiMAX provides a theoretical maximum uplink and
downlink speed of approximately 70 Mbps, although
this rate can be achieved only over short ranges
• Performance varies depending on distance, spectrum
allocated, and number of concurrent users sharing
bandwidth
Information Technology in Theory
42
WiMAX (continued)
Information Technology in Theory
43
Network Management Systems
• Businesses, universities, and even individual users
require local and wide area network services that are
always available and that perform reliably
• To achieve these requirements, users must provide or
outsource network management activities, which fall
into four categories:
– Configuration management
– Performance management
– Fault management
– Security management
Information Technology in Theory
44
Configuration Management
• The function of configuration management is to
track and manage all the hardware and software
associated with the computer network, and to
manage any changes that occur to these
architectural elements
Information Technology in Theory
45
Configuration Management
(continued)
Information Technology in Theory
46
Performance Management
• Another function that network managers must
provide is performance management, which
ensures that the network is performing adequately
for the applications and users it supports
Information Technology in Theory
47
Fault Management
• One of the most important functions of network
management is fault management—solving a
network outage or performance problem when it
occurs
Information Technology in Theory
48
Security Management
• Network security is a vital management function that
is often handled by a dedicated security team
• Some of these security management functions
include network access control, user authentication,
firewall management, and critical infrastructure
protection
• Some security threats to enterprise networks include
worms and viruses, spam, unauthorized access
attempts, and data interception
Information Technology in Theory
49
Summary
• A WAN is a network that spans a large geographical
distance and can transmit voice, data, and multimedia
information
• The Internet is the most prominent example of a WAN
• Most WAN services are run over a public network
rather than private lines due to cost concerns
• Most WANs, including the Internet, are based on a
network approach known as packet switching, which
breaks information into small segments called packets
prior to transmission
– These packets are sent over a network, possibly routed along
different paths, and reassembled at their destination
Information Technology in Theory
50
Summary (continued)
• A virtual private network (VPN) runs over a public
network like the Internet, but it emulates a private
network’s higher performance and security by applying
security measures like encryption and by offering quality
of service (QoS) guarantees
• WANs require network protocols, the standard rules that
allow information to be exchanged over the network
• Important types of WANs are Internet services, frame
relay, Asynchronous Transfer Mode, and multiprotocol
label switching
Information Technology in Theory
51
Summary (continued)
• Most businesses and large institutions access WANs via
leased lines, while smaller businesses and individual users
access WANs via wireless technologies, DSL, and cable
modems
• Ensuring adequate WAN performance and reliability
requires network management functions, including
configuration management, performance management,
fault management, and security management
Information Technology in Theory
52