ProCurve Networking by HP Student guide Technical training. WAN Technologies Version 5.21
|
|
- Britney George
- 8 years ago
- Views:
Transcription
1 ProCurve Networking by HP Student guide Technical training WAN Technologies Version 5.21
2
3 Contents Overview Introduction... 1 Course Objectives... 1 Prerequisites... 2 Course Module Overviews... 2 Module 1: Overview of WAN Connections Objectives... 1 Introduction... 2 A WAN Connection Defined... 4 Basic Elements of a WAN Connection... 5 Physical Transmission Media and Infrastructure... 6 Types of WAN Circuits... 7 PSTN (United States and Canada)... 9 Public Telephone and Telegraph (PTT) Companies The Local Loop Local Loop Transmission Media Electrical Specifications and Related Technologies Digital Signal Zero (DS0) Pulse Code Modulation (PCM) Time Division Multiplexing (TDM) Digital Signal Hierarchies Digital Signal X (DSX) CEPT Digital Signal Hierarchy Japanese Digital Signal Hierarchy Encoding Schemes Data-Link Layer Protocols Module 1 Summary Module 2: Data-Link Layer Protocols Objectives... 1 Overview of the Data-Link Layer... 2 Data-Link Layer Protocols in the WAN... 3 High-Level Data Link Control... 5 Point-to-Point Protocol Suite... 7 Phases of a PPP Session... 9 Configuration Options Link Control Protocol Configuration Options Rev HP Restricted i
4 WAN Technologies Authentication Protocols PAP CHAP EAP NCP Compression Control Protocol Encryption Control Protocol Overview of Link-Aggregation Protocols Multilink PPP Bandwidth Allocation Protocol Bandwidth Allocation Protocol Frames BAP Configuration Options Bandwidth Allocation Control Protocol Tunneling Overview Generic Routing Encapsulation PPTP L2TP Module 2 Summary Module 3: Carrier Line WAN Connections Objectives... 1 Overview of Carrier Line WAN Connections... 2 Carrier Line WAN Connections... 4 Physical Infrastructure Common to Carrier Line Local Loops... 5 DSU... 7 CSU... 8 Capabilities of WAN Routers Characteristics of a T1 WAN Connection T1 CSU/DSU Connections Characteristics of an E1 WAN Connection E1 DSU Connections Characteristics of a J1 WAN Connection T1 WAN Connection over SONET (Japan) Characteristics of a T3 WAN Connection T3 CSU/DSU Connections Characteristics of an E3 WAN Connection E3 DSU Connections Characteristics of a DS3 WAN Connection (Japan) DS3 WAN Connection over SONET (Japan) Fiber Optic Carrier Networks SONET and SDH Digital Hierarchies Fiber Optic Media and Connectors Module 3 Summary ii HP Restricted Rev. 5.21
5 Contents Module 4: ISDN WAN Connections Objectives... 1 ISDN Overview... 2 ISDN WAN Connection... 4 Basic Rate Interface... 6 Primary Rate Interface... 8 Options for Higher Transmission Speeds ISDN Equipment at the Subscriber s Premises ISDN Interfaces Protocols for ISDN Standards Ordering ISDN Recording Information About the ISDN Service Module 4 Summary Module 5: DSL WAN Connections Objectives... 1 Overview of DSL WAN Connections... 2 Advantages and Disadvantages of xdsl... 4 xdsl Adoption: Number of xdsl Lines... 6 Broadband Density... 8 xdsl WAN Connection... 9 Two Groups of xdsl Symmetric xdsl Asymmetric xdsl ADSL Overview ADSL Modulation Techniques CAP Modulation DMT Modulation ADSL Components Physical Infrastructure of ADSL WAN Connection ADSL Internet Connection Protocols for ADSL ADSL Lite and RADSL ADSL ADSL ADSL Standards Module 5 Summary Rev HP Restricted iii
6 WAN Technologies Module 6: Frame Relay Objectives... 1 Overview of Frame Relay... 2 Frame Relay WAN Connection... 4 Frame Relay Physical Access Options... 6 Data Link Connection Identifier (DLCI)... 8 Committed Information Rate Excess Information Rate Congestion Management: DE Bit Congestion Management: FECN and BECN Frame Relay Standards Frame Relay Signaling Protocols Service Level Agreements Module 6 Summary Module 7: Virtual Private Networks Objectives... 1 Defining VPNs... 2 Types of VPNs... 3 IPSec Versus PPTP... 4 IPSec Standard... 5 IPSec Security Protocols... 6 Security Associations... 7 IPSec Modes... 8 Tunnel Mode... 9 Transport Mode IPSec Standard Key Management Process IPSec Standard Authentication Process Key Management and Authentication Digital Certificates Extended Authentication RADIUS Server Extended Authentication TACACS+ Server IPSec Standard Encryption Process Symmetric Key Encryption Asymmetric Key Encryption How IPSec Sends a Packet PPTP Module 7 Summary iv HP Restricted Rev. 5.21
7 Contents Module 8: Firewalls Objectives... 1 Defining Firewalls... 2 Firewall Architecture... 4 Dual-Homed Host Firewall Architecture... 5 Screened Host Firewall Architecture... 6 Screened Subnet Firewall Architecture... 7 Types of Firewalls... 8 Packet-Filtering Firewalls... 9 Circuit-Level Gateways Application-Level Gateways Stateful-Inspection Firewalls Network Address Translation (NAT) Single IP Address Translation Static and Dynamic NAT Port Address Translation (PAT) NAT Traversal (NAT T) What to Block Module 8 Summary Module 9: Quality of Service and Advanced WAN Routing Objectives... 1 Traffic Congestion Quality of Service... 2 Quality of Service Mechanisms... 3 DiffServ Packet Marking... 5 DiffServ Per Hop Behaviors... 7 Class-Based Queuing... 9 Weighted Random Early Discard (WRED) Committed Access Rate (CAR) Generic Traffic Shaping and Frame Relay Traffic Shaping Evaluating Traffic for QoS VLAN Support Virtual Router Redundancy Protocol (VRRP) Exterior Routing Protocols Exterior Gateway Protocol Border Gateway Protocol Module 9 Summary Rev HP Restricted v
8
9 Course Overview Introduction The ProCurve WAN Technologies course is designed to help support engineers and systems engineers understand the technologies used to create WAN connections. It outlines the basic elements required to create a WAN connection and provides an in-depth explanation of different types of WAN connections. In addition, this course describes Virtual Private Networks (VPNs), which create secure, private communication across an existing public network. Because VPNs connect a trusted network to an untrusted network primarily the Internet this course also explains the firewall technologies that companies can use to protect their network. Finally, this course discusses quality of service (QoS) mechanisms and advanced routing technologies such as exterior routing protocols. Course Objectives After completing this course, you should be able to: Describe the basic elements of a WAN connection Explain the role that public carrier networks play in creating WAN connections Define data-link layer protocols and explain the role they play in creating WAN connections Describe the specific characteristics and the physical infrastructure of carrier line WAN connections Describe the specific characteristics and the physical infrastructure of Integrated Services Digital Network (ISDN) WAN connections Describe the specific characteristics of Digital Subscriber Line (DSL) WAN connections Describe the physical infrastructure of Asymmetric DSL (ADSL) WAN connections and describe how data is transmitted from the customer s premises to the broadband network and the Internet Explain the relationship between Frame Relay and WAN connections Describe how data travels through a Frame Relay network Rev HP Restricted Overview - 1
10 WAN Technologies Prerequisites Define a VPN and explain how Internet Protocol Security (IPSec) is used to create VPNs Describe the firewall architectures that can be used to provide security for a company s internal network Explain what QoS means and describe methods of enforcing QoS: classifying traffic, policing traffic, shaping traffic, and managing congestion Explain the purpose of exterior routing protocols and describe the way they work Before taking this class, you should complete the HP ProCurve Adaptive Edge Fundamentals course and the HP ProCurve RSE course. For more information about HP ProCurve training, visit Course Module Overviews This course contains the following modules: Module 1 provides the foundation for understanding WAN connections. It introduces the three basic elements required for a WAN connection and describes the role each element plays in creating that connection. Module 2 describes the data-link layer protocols that control the transfer of data over a WAN connection. In particular, this module focuses on two generalpurpose, data-link layer protocols High-level Data Link Control (HDLC) and Point-to-Point Protocol (PPP). This module also describes a network-layer tunneling protocol called Generic Routing Encapsulation (GRE). Module 3 explains the specific characteristics and the physical infrastructure of carrier line WAN connections. This module also describes fiber optic carrier networks and the standards most commonly used to create them. Module 4 describes ISDN WAN connections. It explains the two types of ISDN services available and the equipment required at the subscriber s site. This module also outlines the information subscribers need to order an ISDN WAN connection. Module 5 provides an overview of the different types of DSL technologies used to create WAN connections. It then focuses on ADSL connections, explaining the physical infrastructure and the data flow from the customer s premises to the public carrier network and the Internet. This module also describes the ADSL2 and ADSL2+ enhancements. Module 6 explains the relationship between Frame Relay and WAN connections. It also describes the equipment necessary to create a Frame Relay network and the options offered by various Frame Relay carriers. Overview - 2 HP Restricted Rev. 5.21
11 Course Overview Module 7 introduces another method of connecting two sites VPNs. It explains how VPNs create secure, private communication across an existing public network and then describes how IPSec can be used to connect private networks or remote users to the corporate network. Module 8 explains how firewalls can be used to protect a trusted network from an untrusted network. It describes the firewall architectures that you can use to protect your network and explains how different types of firewalls work. Module 9 defines QoS and describes some QoS mechanisms that you can use to manage traffic across a WAN connection. It also explains why WAN routers should support features such as virtual LAN (VLAN) tagging and Virtual Redundancy Routing Protocol (VRRP). In addition, this module describes exterior routing protocols and CIDR. Rev HP Restricted Overview - 3
12
13 Overview of WAN Connections Module 1 Objectives This module introduces the basic elements of WAN connections and describes the role each element plays in creating that connection. After completing this module, you should be able to: Describe the three basic elements of a WAN connection Describe how public carrier networks are used to create a WAN connection Identify the three types of circuits used to create a WAN connection Describe how local loops connect the subscriber s premises to public carrier networks Identify the electrical signaling specifications and related technologies used in public carrier networks Explain the differences and similarities between T-, E-, and J-carrier WAN connections Rev HP Restricted 1 1
14 ProCurve WAN Technologies Introduction Companies that have multiple offices need a cost-effective, efficient means to exchange data between those offices. Many companies have created intranets or extranets, which enable users at different locations to view, upload, and download information. However, intranets and extranets are only a partial solution to the problem because the sharing of data is limited to what can be posted on the intranet or extranet. Each office must maintain its own database, and users cannot access data stored at other locations. For example, the accounting department at each office must have a separate database, which cannot be shared over an intranet. Security is also an issue because the intranet must be connected to the Internet, in order to serve multiple locations. The various offices connected through the intranet can be protected by firewalls, but firewalls are not impervious to attacks. For many companies, a Wide Area Network (WAN) is a better and more costeffective solution for connecting multiple branch offices to a main office. A WAN allows companies to exchange all types of information, including voice and data. Combining voice and data traffic can reduce operating expenses for many companies. 1 2 HP Restricted Rev. 5.21
15 Overview of WAN Connections This course focuses on WAN connections created using public carrier networks. Businesses, organizations, and government entities use public carrier networks to create WAN connections for three primary reasons: Using public carrier network infrastructure is almost always more cost effective than using privately owned infrastructure. Public carrier networks allow many subscribers to share the costs of installing, managing, and maintaining the infrastructure required to create WAN connections. Using privately owned infrastructure to create long-distance and international WAN connections is impractical, sometimes even impossible, and cost prohibitive. WAN connections that use privately owned infrastructure are generally limited to relatively short distances, and installing them is beyond the capacity of all but the largest organizations. WAN connections created through public carrier networks are substantially similar to WAN connections created using privately owned infrastructure in terms of security and performance. Public carrier networks also provide levels of reliability and redundancy that privately owned infrastructure typically cannot provide. WAN routers connect the LANs at each location, identify the traffic addressed to another LAN, and route the traffic to the next hop. As explained throughout this course, WAN routers support a variety of WAN connection types, including: Dedicated T-, E-, and J-carrier lines Integrated Services Digital Network (ISDN) Digital Subscriber Line (DSL) Rev HP Restricted 1 3
16 ProCurve WAN Technologies A WAN Connection Defined In the most general sense, a WAN is a geographically dispersed telecommunications network. For the purposes of this course, however, a WAN is defined as a network created to connect two or more LANs. WAN connections can connect LANs located in the same city or around the world. As the figure shows, a public carrier network is commonly used to create WAN connections between LANs in different parts of the world. Public carrier networks include the Public Switched Telephone Network (PSTN), which serves the United States and Canada, and Public Telephone and Telegraph (PTT) companies, which serve Mexico, Europe, Asia, South America, and other parts of the world. 1 4 HP Restricted Rev. 5.21
17 Overview of WAN Connections Basic Elements of a WAN Connection All WAN connections consist of three basic elements: The physical transmission media. Electrical signaling specifications for generating, transmitting, and receiving signals through various transmission media. Data-link layer protocols that provide logical flow control for moving data between peers in the WAN. (Peers are the devices at either end of a WAN connection.) As the figure shows, physical transmission media and electrical specifications are part of the physical layer (which is layer one) of the Open Systems Interconnection (OSI) model, and data-link layer protocols are part of the data-link layer (which is layer two). This module focuses on the physical transmission media, the electrical signaling specifications, and the related OSI layer-one technologies that are used to create WAN connections through public carrier networks. Data-link layer protocols are explained in detail in Module 2: Data-Link Layer Protocols. Rev HP Restricted 1 5
18 ProCurve WAN Technologies Physical Transmission Media and Infrastructure The first basic element of a WAN connection is the physical transmission medium. The most common physical transmission medium used in public carrier networks is twisted-pair copper wire, originally installed for Plain Old Telephone Service (POTS) connections. Twisted pair is currently used in the last mile of 90 percent of all WAN connections. Other physical transmission media include coaxial copper cable, fiber optic cable, and the Earth s atmosphere, which carries signals by such means as infrared and microwave transmissions. The physical transmission media are a large part of what is commonly called infrastructure. Infrastructure also includes telecommunications switching and routing equipment. WAN connections can be created using public carrier network infrastructure, privately owned infrastructure, or a combination of the two. 1 6 HP Restricted Rev. 5.21
19 Overview of WAN Connections Types of WAN Circuits As the figure shows, three types of circuits are used to create WAN connections through public carrier networks: Dedicated circuits Permanent virtual circuits (PVCs) Switched virtual circuits (SVCs) Dedicated Circuits Dedicated circuits are permanent circuits dedicated to a single subscriber. The connection is always active. The subscriber purchases dedicated time slots, or channels, that provide a specific amount of bandwidth that is always available for the subscriber to use. The channels in a dedicated circuit are created using time division multiplexing (TDM), which is discussed later in this module. In addition to providing guaranteed bandwidth at all times, dedicated circuits provide the most secure and reliable WAN connections available. Rev HP Restricted 1 7
20 ProCurve WAN Technologies Dedicated circuits are used to create the following point-to-point WAN connections: Carrier lines (which are explained later in this module and in Module 3: Carrier Line WAN Connections) DSL connections (which are explained in Module 5: DSL WAN Connections) Permanent Virtual Circuits (PVCs) PVCs are also permanent circuits dedicated to a single subscriber. The connection is always active. However, because multiple virtual circuits share a physical circuit, there is no guarantee that any specific amount of bandwidth will be available at any specific time. Sometimes there may not be any bandwidth available on the physical circuit because the physical circuit is saturated. When the physical circuit is saturated, the traffic is temporarily stored at a switching point until bandwidth becomes available. When bandwidth becomes available, the stored traffic is forwarded to its destination. This process is referred to as store-and-forward processing, or packet switching, which is the same processing method used on LANs. PVCs provide an average bandwidth guarantee through statistical multiplexing (STM), which underlies packet switching technology. Because PVCs are more cost effective for the public carrier, PVCs are usually less expensive for the subscriber than dedicated circuits. PVCs are commonly used for Frame Relay, which is explained in detail in Module 6: Frame Relay. Switched Virtual Circuits (SVCs) SVCs are identical to PVCs in all respects, except that they are temporary physical circuits. SVCs are activated when a subscriber initiates a connection to transmit data. When all data have been transmitted, the connection is deactivated, and the physical circuit resources are made available to other subscribers. SVCs are used to create dial-up WAN connections, including ISDN WAN connections, which are explained in Module 4: ISDN WAN Connections. 1 8 HP Restricted Rev. 5.21
21 Overview of WAN Connections PSTN (United States and Canada) In the United States and Canada, most WAN connections are created through the PSTN. As the figure shows, the PSTN consists of local exchange carriers (LECs) and interexchange carriers (IXCs). (LECs are also referred to as telcos.) Local Exchange Carriers LECs operate the infrastructure that provides access to the PSTN in a limited geographic area. The area served by a LEC is referred to as a local access and transport area (LATA). LECs include incumbent local exchange carriers (ILECs) and competitive local exchange carriers (CLECs). ILECs are the Regional Bell operating companies (RBOCs) that provide service in a specific LATA. For example, SBC is the current ILEC in California. ILECs were created in 1983 when the U.S. government deregulated the telecommunications industry and mandated the breakup of AT&T. Deregulation also led to the creation of CLECs, which provide the same services as ILECs and compete with ILECs in specific geographic areas. For example, Covad Communications is a CLEC that competes with SBC in California. Rev HP Restricted 1 9
22 ProCurve WAN Technologies Interexchange Carriers IXCs aggregate voice and data traffic from numerous LECs. They operate the infrastructure that connects LATAs to the interlatas that move traffic throughout the United States and Canada. AT&T, Sprint, and MCI are all IXCs based in the United States. IXCs are commonly referred to as long-distance carriers. IXCs also provide the infrastructure that enables PSTN subscribers to create WAN connections to PTT networks in Europe, Asia, South America, and other parts of the world HP Restricted Rev. 5.21
23 Overview of WAN Connections Public Telephone and Telegraph (PTT) Companies In most countries outside of the United States and Canada, the public telephone network is owned and operated by government-owned monopolies called PTTs. As the figure shows, a PTT operates the entire telecommunications infrastructure within a country s borders. For example, British Telecom (BT) provides border-toborder service in the United Kingdom, while Deutsche Telecom (DTAG) provides this service in Germany. PTTs provide both the local-access and long-distance transport infrastructure needed to create WAN connections through the public carrier network. As the figure shows, carrier interconnects link individual PTTs to provide an international public carrier system. Rev HP Restricted 1 11
24 ProCurve WAN Technologies The Local Loop The connection between a subscriber s premises and the public carrier s nearest central office (CO) is referred to as the local loop. The local loop includes the entire telecommunications infrastructure such as repeaters, switches, cable, and connectors required to connect a subscriber s premises to the CO. A line of demarcation (demarc) separates a subscriber s wiring and equipment from that of the public carrier. Each party owns, operates, and maintains the wiring and equipment on its side of the demarc. Public carrier networks were originally designed to carry analog voice calls. Therefore, copper wire is the most common physical transmission medium used on the local loop. Because of the limits in the signal-carrying capacity of copper wire, local loops that use copper wire are the slowest, least capable component of a WAN connection. Public carriers are beginning to install coaxial and fiber optic cable in local loops to meet ever-increasing bandwidth demands. Local loop connection types include carrier lines, which are described in Module 3: Carrier Line WAN Connections. Local loop connection types also include ISDN and DSL. ISDN and DSL are digital technologies designed to maximize the limited capabilities of existing local loop copper wiring. ISDN and DSL are discussed briefly in the next two sections HP Restricted Rev. 5.21
25 Overview of WAN Connections ISDN Local Loops ISDN provides integrated voice and data services by means of a fully digital local loop. An ISDN connection requires Category-3 (CAT-3) or higher twisted pair and is delivered by means of an SVC. ISDN is a local loop-only technology. When ISDN traffic reaches the public carrier s nearest CO, it is converted for transport through existing public carrier infrastructure. ISDN is available in two levels of service: Basic Rate Interface (BRI) and Primary Rate Interface (PRI). BRI service provides 128 Kbps of bandwidth. PRI service provides Mbps in total bandwidth in T-carrier systems and Mbps in total bandwidth in E-carrier systems. ISDN is discussed in-depth in Module 4: ISDN WAN Connections. DSL Local Loops DSL is a digital service that exists only in the local loop. DSL provides a digital connection between the subscriber and the public carrier s CO. Like ISDN, DSL requires CAT-3 or higher twisted pair wiring. Unlike ISDN, DSL uses PVCs (rather than SVCs), so DSL connections are always active. A DSL modem or WAN router connects the subscriber s premises to the public carrier network. Different types of DSL are available. Each public carrier determines the types of DSL that are available in a local service area. The following are some examples of the types of DSL: Asymmetric DSL (ADSL) High bit rate DSL (HDSL) Symmetric DSL (SDSL) Very high bit rate DSL (VDSL) DSL is discussed in-depth in Module 5: DSL WAN Connections. Rev HP Restricted 1 13
26 ProCurve WAN Technologies Local Loop Transmission Media CAT-3 and CAT-5 Unshielded Twisted Pair (UTP) are the most common types of copper wire used in the local loop. In some applications where signal interference is an issue, Shielded Twisted Pair (STP) is used. In some areas, including parts of the United Kingdom and the Netherlands, a pair of coaxial cables is used instead of twisted pair to complete local loop connections. Other transmission media can be used to complete local loops if transmission speed is a primary consideration. For example, fiber optic cable and coaxial cable are both used to create T3 and E3 WAN connections, as discussed in Module 3: Carrier Line WAN Connections HP Restricted Rev. 5.21
27 Overview of WAN Connections Electrical Specifications and Related Technologies An electrical specification defines a set of communication parameters, or rules, that determine the transmission speed through a WAN connection. When engineers create an electrical specification, their objective is to find the best way to reliably transport traffic, as rapidly as possible, through a given transmission media. The electrical specifications used for public carrier networks are based on cooperative standards developed by the American National Standards Institute (ANSI), the International Standards Organization (ISO), the Conference of European Postal and Telecommunications (CEPT), ITU-T, and ITU-T s predecessor, the Consultative Committee for International Telegraph and Telephone (CCITT). Electrical specifications enable both synchronous and asynchronous communications over a WAN connection. Synchronous communications use a clock signal to precisely coordinate signal transport through the transmission media. Asynchronous communications use start and stop bits, rather than a clock, to coordinate signals. The remainder of this module focuses on the synchronous electrical specifications and related technologies that define the basic unit of bandwidth (the DS0 channel) used in copper-based public carrier networks. Rev HP Restricted 1 15
28 ProCurve WAN Technologies Digital Signal Zero (DS0) DS0 is a digital channel operating at 64 Kbps, the amount of bandwidth required to transmit a single analog voice call through a digital telecommunications network. Based on the ANSI T1.107 specification, DS0 was originally created in the mid 1960s by Bell Laboratories to transport voice traffic over T-carrier systems. PTTs subsequently adopted a modified version of ANSI T1.107, the ITU-T G.703 specification, which is the basis of European and international E-carrier systems. J-carrier systems are also based on a modified version of T1.107 and are similar to T-carrier systems. DS0 is the fundamental unit of bandwidth the fundamental channel in all copper-based T-, E-, and J-carrier systems. In E-carrier systems, DS0 is called E0, and in J-carrier systems, DS0 is called J0. However, the basic signal is virtually identical in all three carrier systems. DS0, E0, and J0 channels all use a process called Pulse Code Modulation (PCM) to convert analog (voice) signals into digital signals HP Restricted Rev. 5.21
29 Overview of WAN Connections Pulse Code Modulation (PCM) PCM is the basis of a standard DS0, E0, and J0 channel. PCM converts a continuously variable analog signal, such as a voice telephone call, into a stream of digital bits. As the figure shows, the PCM sampling process creates a digital signal that represents the original analog waveform. The analog signal is converted (modulated) into a digital signal that is sent over the WAN connection. On the receiving side, the digital signal is demodulated (converted) back to an analog signal that closely approximates the original analog waveform. In the PCM sampling process, the analog signal is sampled 8,000 times per second. Each sample is converted into an 8-bit binary code that represents the voltage of the analog waveform at the time the sample was taken. Thus, the PCM process is the mathematical basis for the bandwidth required for a standard DS0, E0, or J0 channel: 8 bits per sample x 8,000 samples per second = 64 Kbps Rev HP Restricted 1 17
30 ProCurve WAN Technologies Time Division Multiplexing (TDM) As the figure shows, TDM creates a high-bandwidth channel by combining, or multiplexing, multiple DS0 signals into a larger, more complex signal. Each DS0 receives an equal time slice within the complex signal in a rotating, repeating sequence, and thus receives an equal amount of bandwidth. On the receiving end, TDM is used to recover the original DS0 signals through a reverse process called demultiplexing. T-carrier and J-carrier systems use TDM to provision 24 DS0 channels for a T1 or J1 WAN connection. E-carrier systems use TDM to provision 32 DS0 channels for an E1 WAN connection. TDM is also used to provision larger channels that use T1/J1/E1 channels as base multiples, as described in the next section HP Restricted Rev. 5.21
31 Overview of WAN Connections Digital Signal Hierarchies Digital signaling hierarchies define the signal multiplexing used in each type of physical carrier and determine the transmission speed for each carrier. Digital signaling hierarchies use small bandwidth channels as base multiples for creating larger bandwidth channels, or carrier signals, in a carrier system. DS0, E0, and J0 channels serve as the base multiples for creating T1, E1, and J1 carrier signals. T1, E1, and J1, in turn, serve as the base multiples for creating the more complex, higher-bandwidth carrier signals used in T2, E2, J2, and higher carrier systems. T-, E-, and J-carrier systems use similar, but not identical, digital signaling hierarchies. T-carrier systems use Digital Signal X (DSX), E-carrier systems use the CEPT digital signal hierarchy, and J-carrier systems use the Japanese signal hierarchy. These signaling hierarchies are described in the following sections. Rev HP Restricted 1 19
32 ProCurve WAN Technologies Digital Signal X (DSX) DSX is the digital signal hierarchy that defines the signal multiplexing used in T-carrier systems. As the figure shows, DSX specifies that 24 DS0s are multiplexed to create the DS1 carrier signal used in a T1 carrier. A T1 carrier provides a total transmission rate of Mbps (24 x 64 Kbps = 1,536 Kbps + 8 Kbps for framing bits and timing signal synchronization). Similarly, DSX specifies the following: Four DS1 signals are multiplexed to create the DS2 signal used in T2 carriers, which provide a transmission rate of Mbps. 28 DS1 signals are multiplexed to create the DS3 signal used in T3 carriers, which provide a transmission rate of Mbps. 168 DS1 signals are multiplexed to create the DS4 signal used in T4 carriers, which provide a transmission rate of Mbps. 336 DS1 signals are multiplexed together to create the DS5 signal used in T5 carriers, which provide a transmission rate of Mbps HP Restricted Rev. 5.21
33 Overview of WAN Connections As the figure shows, DSX specifies the physical carriers used at each level in the hierarchy. (DSX does not define the physical carrier; ANSI T1.107 defines the physical components of T-carrier systems.) When combined, the physical carrier and the DSX hierarchy specify a usable physical layer for each type of carrier in a T-carrier system. DSX defines Digital Signal Designators (DSDs), or signaling methods, used to create the carrier signals used at each level of the hierarchy. DSX also defines DSX interfaces, which describe the physical connections (pinouts) and signaling logic (send timing, receive timing, send data, and receive data) necessary for connected devices to communicate. Rev HP Restricted 1 21
34 ProCurve WAN Technologies CEPT Digital Signal Hierarchy Like the DSX digital signal hierarchy used in T-carrier systems, the CEPT digital signal hierarchy defines the signal multiplexing used to create the signals carried in each E carrier. Unlike DSX, CEPT DSDs are identical to the physical carrier designator. As the figure shows, the CEPT hierarchy multiplexes 32 E0 channels to create the signal that is carried within an E1 physical carrier. An E1 carrier provides a total transmission rate of Mbps. Similarly, the CEPT hierarchy specifies the following: Four E1 signals are multiplexed to create the E2 signal used in E2 carriers, which provide a transmission rate of Mbps. 16 E1 signals are multiplexed to create the E3 signal used in E3 carriers, which provide a transmission rate of Mbps. 64 E1 signals are multiplexed to create the E4 signal used in E4 carriers, which provide a transmission rate of Mbps. 256 E1 signals are multiplexed together to create the E5 signal used in E5 carriers, which provide a transmission rate of Mbps HP Restricted Rev. 5.21
35 Overview of WAN Connections Japanese Digital Signal Hierarchy The Japanese digital signal hierarchy defines the signal multiplexing used to create the signals carried in each J carrier. Unlike DSX, Japanese DSDs are identical to the physical carrier designator. As the figure shows, the Japanese hierarchy multiplexes 24 J0 channels to create the J1 carrier signal that is carried within a J1 physical carrier. A J1 carrier provides a total transmission rate of Mbps. Similarly, the Japanese hierarchy specifies the following: Four J1 signals are multiplexed to create the J2 signal used in J2 carriers, which provide a transmission rate of Mbps. 30 J1 signals are multiplexed to create the J3 signal used in J3 carriers, which provide a transmission rate of Mbps. 240 J1 signals are multiplexed to create the J4 signal used in J4 carriers, which provide a transmission rate of Mbps. In Japan, most PTTs in Japan use the T1 standard for data; the J1 standard is used for voice. The reasons for using the T1 standard will be discussed in Module 3: Carrier Line WAN Connections. Rev HP Restricted 1 23
36 ProCurve WAN Technologies Encoding Schemes Encoding schemes define how digital signals are configured for transport through a physical transmission medium. Encoding schemes use electrical signals to represent the logical 0 and 1 bits in a data stream. The public carrier that provides the local loop service determines the encoding scheme for the WAN connection. All of the subscriber s equipment must be configured to use the public carrier s encoding scheme. Three encoding schemes are widely used in T-, E-, and J-carrier systems. Alternate mark inversion (AMI) Bipolar 8-zero substitution (B8ZS) High-density bipolar of order 3 (HDB3) AMI AMI uses alternating positive and negative voltage (referred to as alternating polarity or bipolarity) to represent logical 1s, and zero voltage to represent logical 0s. Because AMI uses zero voltage for logical 0, it can cause synchronization loss between peers at each end of a WAN connection when a data stream contains a long string of logical 0s HP Restricted Rev. 5.21
37 Overview of WAN Connections B8ZS HDB3 B8ZS is a modified version of AMI. B8ZS prevents the synchronization loss associated with AMI by limiting the number of consecutive 0s in a data stream to eight. When eight zeros are detected, B8ZS replaces them with two successive logical 1s of the same polarity in a process referred to as a bipolar violation. B8ZS is the predominant encoding scheme used in T-carrier systems. HDB3 is based on AMI and prevents synchronization loss in a manner similar to B8ZS. HDB3 limits the number of consecutive zeros in a data stream to four, and it replaces them with three logical 0s and a violation bit with the same polarity as the last AMI logical 1 detected. HDB3 is the predominant encoding scheme used in E-carrier systems. Rev HP Restricted 1 25
38 ProCurve WAN Technologies Data-Link Layer Protocols Data-link layer protocols are the third and final element of a basic WAN connection. Data-link layer protocols are found at layer two of the OSI model. They enable flow control, synchronization, integrity checking, and validation for data streams passing between the physical layer and the network layer (layer three in the OSI model). Module 2: Data-Link Layer Protocols explains data-link layer protocols in detail HP Restricted Rev. 5.21
39 Overview of WAN Connections Module 1 Summary In this module, you learned about the following: Three basic elements of a WAN connection: Physical transmission media Electrical signaling specifications Data-link layer protocols Local loops and the public carrier networks that provide them Three types of circuits used to create a WAN connection: Dedicated circuit Permanent virtual circuit Switched virtual circuit Electrical specifications and related technologies: Digital signal hierarchies: DSX, CEPT Digital Signal Hierarchy, and the Japanese Digital Signal Hierarchy Pulse code modulation Time division multiplexing Rev HP Restricted 1 27
40 ProCurve WAN Technologies Learning Check Module HP Restricted Rev. 5.21
41 Overview of WAN Connections 1. What are the three basic elements of a WAN connection? 2. Which type of circuit is used to create T-, E-, and J-carrier lines? a. Switched virtual circuit b. Permanent circuit c. Permanent virtual circuit d. Switched circuit 3. Which digital signaling hierarchy forms the basis of E-carrier lines? a. DSX b. JSX c. CEPT d. EPT 4. How many DS0s are multiplexed into a T1-carrier line? a. 16 b. 24 c. 20 d How many E0s are multiplexed into an E1-carrier line? a. 16 b. 24 c. 20 d How many E1 signals are multiplexed to create the E3 signal used in E3-carrier lines? a. 16 b. 24 c. 20 d. 32 Rev HP Restricted 1 29
42
43 Data-Link Layer Protocols Module 2 Objectives This module discusses two general-purpose data-link layer protocols High-level Data Link Control (HDLC) and Point-to-Point Protocol (PPP). These protocols can be used to control the transfer of data over a WAN connection that is created using the physical media and electrical signaling specifications described in Module 1. This module also describes a network-layer tunneling protocol called Generic Routing Encapsulation (GRE). After completing this module, you should be able to: Describe HDLC and its configuration options Describe the PPP suite and the configuration options associated with specific protocols within the suite Identify the phases of a PPP session Describe the purpose of link-aggregation protocols and configuration options associated with Multilink Point-to-Point Protocol (MP) Describe GRE Rev HP Restricted 2 1
44 ProCurve WAN Technologies Overview of the Data-Link Layer Layer two of the Open Systems Interconnection (OSI) model is called the data-link layer. In simplest terms, the data-link layer describes the procedures (called protocols) that control data transfer across the physical infrastructure at layer one. To control data transfer, protocols at this layer perform two important functions: Establish a link between the sending peer and the receiving peer. (Peers are the devices at either end of a point-to-point link.) Reliably transfer data across that link. Data-link layer WAN protocols establish point-to-point links, while data-link layer LAN protocols provide multipoint connections. In other words, only the two endpoints of a WAN connection (usually two WAN routers) communicate with one another, while all nodes in a LAN can communicate with all other nodes. 2 2 HP Restricted Rev. 5.21
45 Data Link Layer Protocols Data-Link Layer Protocols in the WAN As mentioned in Module 1: Overview of WAN Connections, all WAN connections consist of three basic elements: 1. The physical transmission media 2. Electrical signaling specifications for generating, transmitting, and receiving signals through various transmission media 3. Data-link layer protocols that provide logical flow control for moving data between peers in the WAN This course focuses on three technologies that provide the physical-layer elements of a WAN connection: Dedicated carrier lines Integrated Services Digital Network (ISDN) Digital Subscriber Line (DSL) For each of these WAN connections, a subscriber can choose among several datalink layer protocols. Rev HP Restricted 2 3
46 ProCurve WAN Technologies Most WAN routers prompt you to choose a data-link layer protocol by asking for your method of encapsulation and providing a list of supported data-link layer protocols. Encapsulation, in this sense, is the process of wrapping a network-layer protocol s packet (such as an IP packet) within a data-link layer protocol s frame. Encapsulating network-layer protocols enables their transfer across a point-topoint link. This module discusses two general-purpose data-link layer protocols: High-level Data Link Control (HDLC) and Point-to-Point Protocol (PPP). PPP is the default encapsulation for many routers and is discussed in depth in this module. However, much of this discussion is informative. Unless you require changes to PPP s default operation, configuring PPP is mostly automatic. In addition to HDLC and PPP, a number of data-link layer protocols such as Link Access Procedure for D-Channel (LAPD), Frame Relay, and Asynchronous Transfer Mode (ATM) protocols can encapsulate WAN traffic. LAPD is discussed in Module 4: ISDN WAN Connections, and the Frame Relay protocols are discussed in Module 6: Frame Relay. ATM technology is discussed in Module 5: DSL WAN Connections. This module also describes two protocols that enable you to aggregate lines: Multilink PPP (MP) and Multilink Frame Relay (MFR). It then introduces the concept of tunneling and describes a tunneling protocol called Generic Routing Encapsulation (GRE). GRE is a network-layer protocol that is generally associated with security in a Virtual Private Network (VPN). VPNs establish secure communications over public networks such as the Internet and are discussed in depth in Module 7: Virtual Private Networks. However, GRE can also be used in private WANs and in conjunction with datalink layer protocols as a solution to the following problems: To provide connectivity for legacy network-layer protocols To route multicast traffic through routers that are not configured for multicasting To connect LANs that use incompatible IP addresses 2 4 HP Restricted Rev. 5.21
47 Data Link Layer Protocols High-Level Data Link Control HDLC is one of the oldest data-link layer protocols for the WAN. In fact, it predates the PC and was originally developed for mainframe environments. Because of this, HDLC was originally designed for use with primary and secondary devices, such as a mainframe with dumb terminals. Although HDLC has been updated for use in the PC environment, you may encounter the following terms, which originate from its early use: Normal Response Mode (NRM) A secondary device can transmit only when the primary device specifically instructs it to do so. Asynchronous Response Mode (ARM) A secondary device can initiate a transmission; however, the primary device controls the establishment and termination of the link. Asynchronous Balanced Mode (ABM) Devices at both ends of a connection are configured to be both primary and secondary devices and can establish a link, transmit data without permission, and terminate a link. Rev HP Restricted 2 5
48 ProCurve WAN Technologies HDLC uses three different types of frames: Unnumbered frames establish a link. Supervisory frames carry error and flow control information. Information frames carry the network-layer packets across the WAN link. 2 6 HP Restricted Rev. 5.21
49 Data Link Layer Protocols Point-to-Point Protocol Suite Although PPP is the name of a single protocol, most often PPP refers to an entire suite of protocols that are related to PPP. Most of the PPP suite is shown above. Specific protocols are briefly mentioned in this section to give you an overview of PPP; these protocols are then described in more depth in later sections. Every PPP connection requires the peers to exchange frames from at least three protocols and to exchange them in a particular order: 1. Link Control Protocol (LCP) 2. One type of Network Control Protocol (NCP) the one appropriate to the data being delivered 3. PPP Link Control Protocol Other than PPP itself, LCP is probably the most important protocol in the PPP suite. LCP frames are used to establish, configure, and maintain the link between peers. LCP frames must establish a link between peers before a PPP frame can be transferred across that link. Rev HP Restricted 2 7
50 ProCurve WAN Technologies Network Control Protocols After LCP establishes a link, peers must exchange NCP frames before PPP frames can carry information over the link. Basically, NCPs carry information about how to control or manage other protocols, primarily network-layer protocols. The network-layer protocol used by the information in the PPP frame determines which type of NCP frames must be exchanged. For example, if the PPP frames are carrying IP packets, then IP Control Protocol (IPCP) frames must be exchanged before the PPP frames can be sent. Point-to-Point Protocol PPP frames carry the actual information being transferred over the link from the upper layers of the OSI model. In PPP terminology, this information is called a datagram. Optional Protocols in the Suite The remaining protocols in the PPP suite are optional. Examples of these optional protocols include: Encryption Control Protocol (ECP) is an NCP that can configure options for encrypting PPP datagrams. Link Quality Reporting (LQR) is a link configuration protocol that monitors how many frames are being dropped on the link. All authentication protocols provide different ways to authenticate passwords on links configured to require passwords. 2 8 HP Restricted Rev. 5.21
51 Data Link Layer Protocols Phases of a PPP Session As the figure shows, a PPP session is divided into phases during which the various protocols may exchange frames. A PPP session proceeds in the following way: 1. During the link dead phase, the physical layer is unavailable, and there is no activity. If a peer wants to begin a session, it signals the physical layer and waits for the physical layer to indicate that it is now up. The session then enters the link establishment phase. 2. Peers exchange LCP frames during the link establishment phase. If the peers successfully establish a link, the session enters the authentication phase. 3. During the authentication phase, peers exchange authentication protocol frames. (Although authentication is optional, the session passes through this phase whether or not authentication was chosen.) If the sending peer authenticates successfully or if no authentication is necessary, the session then enters the network-layer protocol phase. Rev HP Restricted 2 9
52 ProCurve WAN Technologies 4. During the network-layer protocol phase, peers exchange NCP frames and PPP frames. More than one protocol per session can be used during this phase. For example, peers might exchange IPCP frames, then send PPP frames with IP datagrams, then exchange AppleTalk Control Protocol (ATCP) frames, then send PPP frames with AppleTalk datagrams, and so on. 5. During the link termination phase, peers exchange LCP link-termination frames. The session is then terminated and returns to the link dead phase HP Restricted Rev. 5.21
53 Data Link Layer Protocols Configuration Options You can configure WAN routers (or other devices) to use optional protocols in the PPP suite. In addition, many protocols in the PPP suite, such as LCP, allow you to manually configure options. To choose a setting for an option, you may need to know a value assigned to the setting. For example, one of the authentication protocols discussed later in this module, the Challenge Handshake Authentication Protocol, allows you to choose among several authentication algorithms. To use the algorithm called MS-CHAP, you may need to know it has been assigned the value of 128 (although it is more likely that the router s software developers will provide a text option from which to choose). All values associated with PPP are controlled by the Internet Assigned Numbers Authority (IANA) and are updated at this URL: When one of the peers in a PPP session has been configured to use protocols or options that are not used by default, the peers negotiate these options. They do so by exchanging configuration frames for the protocol in question. The figure shows a simplification of this frame-exchange process. Rev HP Restricted 2 11
Overview of WAN Connections Module 1
Overview of WAN Connections Module 1 Objectives This module introduces the basic elements of WAN connections and describes the role each element plays in creating that connection. After completing this
More informationNetwork+ Guide to Networks 6 th Edition. Chapter 7 Wide Area Networks
Network+ Guide to Networks 6 th Edition Chapter 7 Wide Area Networks Objectives Identify a variety of uses for WANs Explain different WAN topologies, including their advantages and disadvantages Compare
More informationPublic Network. 1. Relatively long physical distance 2. Requiring a service provider (carrier) Branch Office. Home. Private Network.
Introduction to LAN TDC 363 Week 4 Connecting LAN to WAN Book: Chapter 7 1 Outline Wide Area Network (WAN): definition WAN Topologies Choices of WAN technologies Dial-up ISDN T1 Frame Relay DSL Remote
More informationWAN Design Guide The Lower Layers August 2005
ProCurve Networking by HP WAN Design Guide The Lower Layers August 2005 Introduction... 5 Secure WAN Design Overview... 5 Understanding the Customer Requirement... 5 Overview of WAN Environments... 7 What
More informationCTS2134 Introduction to Networking. Module 07: Wide Area Networks
CTS2134 Introduction to Networking Module 07: Wide Area Networks WAN cloud Central Office (CO) Local loop WAN components Demarcation point (demarc) Consumer Premises Equipment (CPE) Channel Service Unit/Data
More informationWAN. Introduction. Services used by WAN. Circuit Switched Services. Architecture of Switch Services
WAN Introduction Wide area networks (WANs) Connect BNs and LANs across longer distances, often hundreds of miles or more Typically built by using leased circuits from common carriers such as AT&T Most
More informationT1 Networking Made Easy
T1 Networking Made Easy 1 THE T1 CARRIER 3 WHAT DOES A T1 LOOK LIKE? 3 T1 BANDWIDTH 3 T1 PHYSICAL CHARACTERISTICS 4 T1 FRAMING 5 LINE CODE 6 T1 NETWORKING 6 TELCOS 6 PSTN ACCESS WITH A T1 8 SUMMARY OF
More informationChapter 2 - The TCP/IP and OSI Networking Models
Chapter 2 - The TCP/IP and OSI Networking Models TCP/IP : Transmission Control Protocol/Internet Protocol OSI : Open System Interconnection RFC Request for Comments TCP/IP Architecture Layers Application
More informationWANs connect remote sites. Connection requirements vary depending on user requirements, cost, and availability.
WAN Review A WAN makes data connections across a broad geographic area so that information can be exchanged between distant sites. This topic defines the characteristics of a WAN. WAN Overview WANs connect
More informationChapter 5. Data Communication And Internet Technology
Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN
More informationConfiguring E1 and T1 Interfaces
4 Configuring E1 and T1 Interfaces Contents Overview of E1 and T1 WAN Connections.......................... 4-3 Elements of an E1- or T1-Carrier Line.......................... 4-3 Connecting Your Premises
More informationConfiguring E1 and T1 Interfaces
4 Configuring E1 and T1 Interfaces Contents Overview of E1 and T1 WAN Connections.......................... 4-3 Elements of an E1- or T1-Carrier Line.......................... 4-3 Connecting Your Premises
More informationLocal Area Networks (LANs) Blueprint (May 2012 Release)
Local Area Networks (LANs) The CCNT Local Area Networks (LANs) Course April 2012 release blueprint lists the following information. Courseware Availability Date identifies the availability date for the
More informationConfiguring Demand Routing for Primary ISDN Modules
8 Configuring Demand Routing for Primary ISDN Modules Contents Overview of ISDN Connections................................... 8-4 Elements of an ISDN Connection.............................. 8-5 The Local
More informationObjectives. Remote Connection Options. Teleworking. Connecting Teleworkers to the Corporate WAN. Providing Teleworker Services
ITE I Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Providing Teleworker Services Describe the enterprise requirements for providing teleworker services Explain how
More informationCisco CCNA Optional Semester 4 Labs Wide Area Networking LAB 1 T1 TSU WAN LINK OVERVIEW - Instructor Guide (Estimated time: 30 minutes)
CNAP @ VCC 1 of 8 LAB 1 T1 TSU WAN LINK OVERVIEW - Instructor Guide (Estimated time: 30 minutes) Objectives: Understand the function of a T1 Service Unit (TSU) in network telecommunications Connect routers
More informationData Link Protocols. TCP/IP Suite and OSI Reference Model
Data Link Protocols Relates to Lab. This module covers data link layer issues, such as local area networks (LANs) and point-to-point links, Ethernet, and the Point-to-Point Protocol (PPP). 1 TCP/IP Suite
More informationNotes Odom, Chapter 4 Flashcards Set: http://www.flashcardmachine.com/1162711/b41c
EDTECH 552 (SP11) Susan Ferdon Notes Odom, Chapter 4 Flashcards Set: http://www.flashcardmachine.com/1162711/b41c telco Leased Line CSU/DSU Local Telephone Company Owns the cables and has right of way
More informationWAN Technology. Heng Sovannarith heng_sovannarith@yahoo.com
WAN Technology Heng Sovannarith heng_sovannarith@yahoo.com Introduction A WAN is a data communications network that covers a relatively broad geographic area and often uses transmission facilities provided
More information(Refer Slide Time: 2:10)
Data Communications Prof. A. Pal Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture-12 Multiplexer Applications-1 Hello and welcome to today s lecture on multiplexer
More informationIntranet Security Solution
Intranet Security Solution 1. Introduction With the increase in information and economic exchange, there are more and more enterprises need to communicate with their partners, suppliers, customers or their
More informationAppendix D T1 Overview
Appendix D T Overview GENERAL T refers to the primary digital telephone carrier system used in North America. T is one line type of the PCM T-carrier hierarchy listed in Table D-. T describes the cabling,
More informationLong Distance Connection and WAN
Lecture 6 Long Distance Connection and WAN Digital Telephone, PCM and Nyquist Sampling Theorem DSU/CSU, T Line Series and OC line Series Local Loop DSL Technologies - ADSL, HDSL, SDSL, VDSL Cable Modem
More informationWAN Data Link Protocols
WAN Data Link Protocols In addition to Physical layer devices, WANs require Data Link layer protocols to establish the link across the communication line from the sending to the receiving device. 1 Data
More informationBROADBAND AND HIGH SPEED NETWORKS
BROADBAND AND HIGH SPEED NETWORKS INTRODUCTION TO MUTIPLEXING Multiplexing is the set of techniques that allows the simultaneous transmission of multiple signals across a single data link INTRODUCTION
More informationChapter 11: WAN. Abdullah Konak School of Information Sciences and Technology Penn State Berks. Wide Area Networks (WAN)
Chapter 11: WAN Abdullah Konak School of Information Sciences and Technology Penn State Berks Wide Area Networks (WAN) The scope of a WAN covers large geographic areas including national and international
More informationBy: Mohsen Aminifar Fall 2014
By: Mohsen Aminifar Fall 2014 Contact Information: E-Mail: m.aminifar@modares.ac.ir admin@parsenet.ir Phone : 021-22919726 09128442885 Website : http://parsenet.ir http://aminifar.ir SMS Center : 5000262175
More informationADSL or Asymmetric Digital Subscriber Line. Backbone. Bandwidth. Bit. Bits Per Second or bps
ADSL or Asymmetric Digital Subscriber Line Backbone Bandwidth Bit Commonly called DSL. Technology and equipment that allow high-speed communication across standard copper telephone wires. This can include
More informationADSL WAN Connections. Contents
7 ADSL WAN Connections Contents ADSL Overview................................................. 7-4 ADSL Technologies.......................................... 7-5 ADSL2 and ADSL2+: Enhancing Transmission
More informationHow To Understand The Technical Specifications Of Videoconferencing
Videoconferencing Glossary Algorithm A set of specifications that define methods and procedures for transmitting audio, video, and data. Analog Gateway A means of connecting dissimilar codecs. Incoming
More informationChapter 4 Connecting to the Internet through an ISP
Chapter 4 Connecting to the Internet through an ISP 1. According to Cisco what two things are essential to gaining access to the internet? a. ISPs are essential to gaining access to the Internet. b. No
More informationWAN Technologies and Components
C H A P T E R 1 WAN Technologies and Components Over the last several years, web-based applications, wireless devices, and virtual private networking (VPN) have changed our expectations about computer
More informationConnection Services. Hakim S. ADICHE, MSc
Connection Services Hakim S. ADICHE, MSc adiche@ccse.kfupm.edu.sa Department of Computer Engineering King Fahd University of Petroleum and Minerals Dhahran, Saudi Arabia Connection Services Different connectivity
More informationDedicated Access Solutions for Internet Service Providers
White Paper Dedicated Access Solutions for Internet Service Providers INTRODUCTION Revenue from business connections to the Internet represents, on average, almost 60 percent of the total revenue to Internet
More informationChapter 9A. Network Definition. The Uses of a Network. Network Basics
Chapter 9A Network Basics 1 Network Definition Set of technologies that connects computers Allows communication and collaboration between users 2 The Uses of a Network Simultaneous access to data Data
More information5.3.1.9 Digital Subscriber Line (DSL) Requirements
UCR 2008, Change 2, Modification #2 provides (DSL) requirements. Section 5.3.1 was modified to reflect this change. Corrections to UCR 2008, Change 2, made by Modification # 2 SECTION NEW Requirements
More informationThe Telephone Network
The Telephone Network 1 2 PSTN public switched telephone network (PSTN) is the largest and most widespread communications network in the world For computer communications used to link remote sites of organisation
More informationSSVP SIP School VoIP Professional Certification
SSVP SIP School VoIP Professional Certification Exam Objectives The SSVP exam is designed to test your skills and knowledge on the basics of Networking and Voice over IP. Everything that you need to cover
More informationWAN Technologies Based on CCNA 4 v3.1 Slides Compiled & modified by C. Pham
WAN Technologies Based on CCNA 4 v3.1 Slides Compiled & modified by C. Pham 1 Wide-area Networks (WANs) 2 Metropolitan-Area Network (MANs) 3 Path Determination 4 Internetworking Any internetwork must include
More informationXDSL and DSLAM Access Technologies
XDSL and DSLAM Access Technologies Abstract What are the differences between the different forms of xdsl technology, such as ADSL and HDSL? How are they implemented. What are the limitations? What are
More informationIntroduction to WANs. Objectives. Key Terms CHAPTER 1
CHAPTER 1 Introduction to WANs Objectives After completing this chapter, you should be able to answer the following questions: How does the Cisco enterprise architecture provide integrated services over
More information1. Public Switched Telephone Networks vs. Internet Protocol Networks
Internet Protocol (IP)/Intelligent Network (IN) Integration Tutorial Definition Internet telephony switches enable voice calls between the public switched telephone network (PSTN) and Internet protocol
More informationBroadband Service Architecture for Access to Legacy Data Networks over ADSL Issue 1
Technical Report TR-012 Broadband Service Architecture for Access to Legacy Data s over ADSL Issue 1 June 1998 Abstract: This Technical Report specifies an interoperable end-to-end architecture to support
More informationComputer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
More informationVPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu
VPN Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining
More informationMPLS and IPSec A Misunderstood Relationship
# 129 TECHNOLOGY WHITE PAPER Page: 1 of 5 MPLS and IPSec A Misunderstood Relationship Jon Ranger, Riverstone Networks ABSTRACT A large quantity of misinformation and misunderstanding exists about the place
More informationHigh-Level Data Link Control
High-Level Data Link Control This class of data link layer protocols includes High-level Data Link Control (HDLC), Link Access Procedure Balanced (LAPB) for X.25, Link Access Procedure for D-channel (LAPD)
More informationLECTURE 5: Wide Area Networks (WANs) CIS484. Communications Systems. Summer 2015 Instructor: Dr. Song Xing
LECTURE 5: Wide Area Networks (WANs) CIS484 Summer 2015 Instructor: Dr. Song Xing Department of Information Systems California State University, Los Angeles Outlines Introduction to WAN Point-to-point
More informationAccess to Data & Computer Networks Physical Level
Lecture 7 Access to Data & Computer Networks Physical Level Serial Interface RS232C, RS232D RS449, X21 Modem Traditional Modem Intelligent modem Wireless Modem Digital Telephony T1 & E1 Systems SONET/SDH
More informationEarthLink High Speed Business DSL User Guide
EarthLink High Speed Business DSL User Guide TABLE OF CONTENTS: Welcome..............................................................1 Features & Benefits of Business DSL........................................2
More informationIntroduction to WAN Technologies
CHAPTER 3 Chapter Goals Become familiar with WAN terminology. Learn about different types of WAN connections. Become familiar with different types of WAN equipment. This chapter introduces the various
More information:-------------------------------------------------------Instructor---------------------
Yarmouk University Hijjawi Faculty for Engineering Technology Computer Engineering Department CPE-462 Digital Data Communications Final Exam: A Date: 20/05/09 Student Name :-------------------------------------------------------Instructor---------------------
More informationVoice and Delivery Data Networks
Voice and Delivery Data Networks Chapter 11 Learning Objectives After reading this chapter, you should be able to: Identify the basic elements of a telephone system Describe the composition of the telephone
More informationTelecommunications systems (Part 1)
School of Business Eastern Illinois University Telecommunications systems (Part 1) (Week 11, Thursday 11/02/2006) Abdou Illia, Fall 2006 Learning Objectives 2 Describe and compare types of connection to
More informationTELECOMMUNICATIONS STANDARDS ADVISORY COMMITTEE TSAC WORKING GROUP ON NEW STANDARDS AND POLICY (NSP)
TELECOMMUNICATIONS STANDARDS ADVISORY COMMITTEE TSAC WORKING GROUP ON NEW STANDARDS AND POLICY (NSP) Introduction Development of Digital Subscriber Line (DSL) Technology This paper introduces the development
More information- T-Carrier Technologies -
1 T-Carrier Fundamentals - T-Carrier Technologies - T-Carrier systems provide digitized communication for voice or data traffic across a telephone provider s network. The T-Carrier specification defines
More informationTechnology Brief. Implementing DSL Service for ISPs with the SMS. The DSL Opportunity. DSL is Different from Dial
Technology Brief Implementing DSL Service for ISPs with the SMS The DSL Opportunity Digital Subscriber Line (DSL) services represent a major opportunity for dialup-based Internet Service Providers (ISPs)
More informationICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling
ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling Release: 1 ICTTEN6172A Design and configure an IP-MPLS network with virtual private network tunnelling Modification
More informationGlossary of Telco Terms
Glossary of Telco Terms Access Generally refers to the connection between your business and the public phone network, or between your business and another dedicated location. A large portion of your business
More informationCommunication Networks. MAP-TELE 2011/12 José Ruela
Communication Networks MAP-TELE 2011/12 José Ruela Network basic mechanisms Introduction to Communications Networks Communications networks Communications networks are used to transport information (data)
More informationSIP Trunking and Voice over IP
SIP Trunking and Voice over IP Agenda What is SIP Trunking? SIP Signaling How is Voice encoded and transported? What are the Voice over IP Impairments? How is Voice Quality measured? VoIP Technology Confidential
More informationThis course has been retired. View the schedule of current <a href=http://www.ptr.co.uk/networkingcourses.htm>networking
Introduction to Data Communications & Networking Course Description: This course has been retired. View the schedule of current networking Courses
More informationConfiguring Serial Interfaces for E1- and T1-Carrier Lines
5 Configuring Serial Interfaces for E1- and T1-Carrier Lines Contents Using the Serial Module for E1- or T1-Carrier Lines.................. 5-3 Elements of an E1- or T1-Carrier Line..........................
More informationAppendix A: Basic network architecture
Appendix A: Basic network architecture TELECOMMUNICATIONS LOCAL ACCESS NETWORKS Traditionally, telecommunications networks are classified as either fixed or mobile, based on the degree of mobility afforded
More informationTelecommunications, Networks, and Wireless Computing
Objectives Telecommunications, Networks, and Wireless Computing 1. What are the features of a contemporary corporate telecommunications system? On what major technology developments are they based? 2.
More informationConnecting Remote Users to Your Network with Windows Server 2003
Connecting Remote Users to Your Network with Windows Server 2003 Microsoft Corporation Published: March 2003 Abstract Business professionals today require access to information on their network from anywhere
More informationEECC694 - Shaaban. Transmission Channel
The Physical Layer: Data Transmission Basics Encode data as energy at the data (information) source and transmit the encoded energy using transmitter hardware: Possible Energy Forms: Electrical, light,
More informationComputer Networking Networks
Page 1 of 8 Computer Networking Networks 9.1 Local area network A local area network (LAN) is a network that connects computers and devices in a limited geographical area such as a home, school, office
More informationNetwork Neutrality Statement
Network Neutrality Statement CTC continues to comply with all applicable FCC requirements while providing the best possible customer experience for its Internet users. As such, CTC commits to the open
More informationExam questions. 1. Which of the following are true regarding xdsl? Choose three. It uses a portion of the existing phone line.
Nguyen Khac Quyet - Take Exam Exam questions Time remaining: 00: 08: 31 1. Which of the following are true regarding xdsl? Choose three. It uses a portion of the existing phone line It is symmetrical It
More informationDSL Variations. NEXTEP Broadband White Paper. Broadband Networks Group. Definitions and differences of Digital Subscriber Line variations.
NEXTEP Broadband White Paper DSL Variations Definitions and differences of Digital Subscriber Line variations. A NEXTEP Broadband White Paper May 2001 Broadband Networks Group DSL Variations EXECUTIVE
More informationNovember 2013. Defining the Value of MPLS VPNs
November 2013 S P E C I A L R E P O R T Defining the Value of MPLS VPNs Table of Contents Introduction... 3 What Are VPNs?... 4 What Are MPLS VPNs?... 5 What Are the Benefits of MPLS VPNs?... 8 How Do
More informationFirewalls and Virtual Private Networks
CHAPTER 9 Firewalls and Virtual Private Networks Introduction In Chapter 8, we discussed the issue of security in remote access networks. In this chapter we will consider how security is applied in remote
More information11/22/2013 1. komwut@siit
11/22/2013 1 Week3-4 Point-to-Point, LAN, WAN Review 11/22/2013 2 What will you learn? Representatives for Point-to-Point Network LAN Wired Ethernet Wireless Ethernet WAN ATM (Asynchronous Transfer Mode)
More informationConfiguring T1 and E1 WAN Interfaces
Configuration Guide 5991-3823 December 2005 Configuring T1 and E1 WAN Interfaces This configuration guide explains the processes for configuring your Secure Router Operating System (SROS) T1/E1 product
More informationCisco Which VPN Solution is Right for You?
Table of Contents Which VPN Solution is Right for You?...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 NAT...2 Generic Routing Encapsulation Tunneling...2
More informationT-carrier. Two Network Interface Units. On the left with a single card, the right with two
T-carrier From Wikipedia, the free encyclopedia Two Network Interface Units. On the left with a single card, the right with two In telecommunications, T-carrier, sometimes abbreviated as T-CXR, is the
More informationUnderstand Wide Area Networks (WANs)
Understand Wide Area Networks (WANs) Lesson Overview In this lesson, you will review: Dial-up Integrated services digital networks (ISDN) Leased lines Virtual private networks (VPN) Wide area networks
More informationComputers Are Your Future. 2006 Prentice-Hall, Inc.
Computers Are Your Future 2006 Prentice-Hall, Inc. Computers Are Your Future Chapter 3 Wired and Wireless Communication 2006 Prentice-Hall, Inc Slide 2 What You Will Learn... ü The definition of bandwidth
More informationWireless Links - Wireless communication relies on radio signals or infrared signals for transmitting data.
Uses of a network A network is a way to connect computers so that they can communicate, exchange information and share resources in real time. Networks enable multiple users to access shared data and programs
More informationThink! Think! Data communications. Long-Distance. Modems: to analog and back. Transmission Media. The last mile is the hardest for digital information
Data communications Think! Think!?? What makes it possible to communicate from point A to point B?? Long-Distance Transmission Media If you place a call outside the local transport area, an interchange
More informationComputer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks
Computer Networks Lecture 06 Connecting Networks Kuang-hua Chen Department of Library and Information Science National Taiwan University Local Area Networks (LAN) 5 kilometer IEEE 802.3 Ethernet IEEE 802.4
More informationCisco G.SHDSL High Speed WAN interface Card with IEEE 802.3ah EFM Support for Cisco Integrated Services Routers
Cisco G.SHDSL High Speed WAN interface Card with IEEE 802.3ah EFM Support for Cisco Integrated Services Routers Cisco Integrated Services Routers (ISRs) and Integrated Services Routers Generation 2 (ISR
More informationSSVVP SIP School VVoIP Professional Certification
SSVVP SIP School VVoIP Professional Certification Exam Objectives The SSVVP exam is designed to test your skills and knowledge on the basics of Networking, Voice over IP and Video over IP. Everything that
More informationCisco 8-Port Channelized T1/E1 Shared Port Adapter
Cisco 8-Port Channelized T1/E1 Shared Port Adapter The Cisco I-Flex approach combines shared port adapters (SPAs) and SPA interface processors (SIPs), providing an extensible design that helps prioritize
More information< Introduction > This technical note explains how to connect New SVR Series to DSL Modem or DSL Router. Samsung Techwin Co., Ltd.
< Introduction > This technical note explains how to connect New to DSL Modem or DSL Router. Samsung Techwin Co., Ltd. 1 Contents 1. General... 4 1.1. DSL (xdsl)... 4 1.2. Modem... 5 1.2.1. Modem... 5
More informationImplementing Secured Converged Wide Area Networks (ISCW) Version 1.0
COURSE OVERVIEW Implementing Secure Converged Wide Area Networks (ISCW) v1.0 is an advanced instructor-led course that introduces techniques and features that enable or enhance WAN and remote access solutions.
More informationEvaluating Bandwidth Optimization Technologies: Bonded Internet
Evaluating Bandwidth Optimization Technologies: Bonded Internet Contents Channel Bonding and MLPPP Load Balancing and BGP Configuring Tunnels Traditional Bonding MetTel s Bonded Internet Service 3 4 5
More informationCS 5516 Computer Architecture Networks
Lecture 11: ISDN & ATM CS 5516 Computer Architecture Networks VA Tech Prof. Roy M. Wnek History of ISDN Traditionally, local loop connectivity has been with an analog signal on copper Inefficient, prone
More informationAdvanced Higher Computing. Computer Networks. Homework Sheets
Advanced Higher Computing Computer Networks Homework Sheets Topic : Network Protocols and Standards. Name the organisation responsible for setting international standards and explain why network standards
More informationHow To. Configure E1 links. Introduction. What information will you find in this document?
How To Configure E1 links Introduction E1 is the European digital transmission format standard, traditionally used for inter-pbx traffic, where a large number of calls warrant a leased line between two
More informationIntroduction to WAN Technologies
CHAPTER 3 Introduction to WAN Technologies This chapter introduces the various protocols and technologies used in wide- area network (WAN) environments. Topics summarized here include point-to-point links,
More informationDigiPoints Volume 1. Student Workbook. Module 4 Bandwidth Management
Bandwidth Management Page 4.1 DigiPoints Volume 1 Module 4 Bandwidth Management Summary This module will cover Time Division Multiplexing (TDM). TDM technology allows many users to access a particular
More informationBuilding integrated services intranets
Building integrated services intranets A White Paper from Inalp Networks Inc Meriedweg 7 CH-3172 Niederwangen Switzerland http://www.inalp.com CONTENTS CONTENTS...2 1 EXECUTIVE SUMMARY...3 2 INTRODUCTION...4
More informationBlack Box Explains: DSL
Black Box Explains: DSL History It was realized as early as the late eighties, early nineties, that conventional data transmission systems did not meet the requirements of the growing internet community
More information"Charting the Course...
Description "Charting the Course... Course Summary Interconnecting Cisco Networking Devices: Accelerated (CCNAX), is a course consisting of ICND1 and ICND2 content in its entirety, but with the content
More informationPost-Class Quiz: Telecommunication & Network Security Domain
1. What type of network is more likely to include Frame Relay, Switched Multi-megabit Data Services (SMDS), and X.25? A. Local area network (LAN) B. Wide area network (WAN) C. Intranet D. Internet 2. Which
More informationWAN Routing Configuration Examples for the Secure Services Gateway Family
Application Note WAN Routing Configuration Examples for the Secure Services Gateway Family Chien-shun Chu SPG Technical Marketing November, 2006 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale,
More information! encor en etworks TM
! encor en etworks TM Version A, March 2010 2013 Encore Networks, Inc. All rights reserved. Configuring the BANDIT III s T1 E1 Card for a PCM Voice Network The T1 E1 card fits into the expansion slot on
More informationTelecommunications systems (Part 2)
School of Business Eastern Illinois University Telecommunications systems (Part 2) Abdou Illia, Spring 2007 (Week 12, Thursday 3/29/2007) T-1 Digital Subscriber Line (DSL) Cellular Telephone System Integrated
More information