Wide Area Network Fundamentals

Slides:



Advertisements
Similar presentations
M A Wajid Tanveer Infrastructure M A Wajid Tanveer
Advertisements

Guide to Network Defense and Countermeasures Second Edition
VPN: Virtual Private Network Presented by: Germaine Bacon Lizzi Beduya Betty Huang Jun Mitsuoka Juliet Polintan.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets Chapter 4.
Introduction to Unitas Global Managed IT Infrastructure Service Provider February 2012 North America Los Angeles, USA
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Shalini Bhavanam. Key words: Basic Definitions Classification of Networks Types of networks Network Topologies Network Models.
Computer Networks IGCSE ICT Section 4.
Data Centers and IP PBXs LAN Structures Private Clouds IP PBX Architecture IP PBX Hosting.
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
1 Wide Area Network. 2 What is a WAN? A wide area network (WAN ) is a data communications network that covers a relatively broad geographic area and that.
Networking Components Christopher Biles LTEC Assignment 3.
VIRTUAL PRIVATE NETWORKS (VPN) BY: Sajal Soni Abhishek sahu Deepti Singh Deeksha sahu Yashika chourasia Subhash dewangan.
1 WHY NEED NETWORKING? - Access to remote information - Person-to-person communication - Cooperative work online - Resource sharing.
The Future of GovNeTT – Where are we Heading?. GovNeTT 2.0 Current State Obscure Governance Framework Design is Difficult to Evolve to Changing Needs.
Networked Information Systems 1 Advantages of and classified by their size & architecture or design.
SHAWN CROWE LTEC /026 ASSIGNMENT #3 Networking Components.
Chapter2 Networking Fundamentals
Summary - Part 2 - Objectives The purpose of this basic IP technology training is to explain video over IP network. This training describes how video can.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
Higher Computing Networking. Networking – Local Area Networks.
Presented By: Gavin Worden Leased Lines vs. Internet Based VPNs.
CHAPTER - 4 COMPUTER NETWORK Dr. BALAMURUGAN MUTHURAMAN
11 ROUTING IP Chapter 3. Chapter 3: ROUTING IP2 CHAPTER INTRODUCTION  Understand the function of a router.  Understand the structure of a routing table.
Introduction to Networks. When Personal Computers first appeared in business, software programs were designed for a single user. However as computers.
VPN Alex Carr. Overview  Introduction  3 Main Purposes of a VPN  Equipment  Remote-Access VPN  Site-to-Site VPN  Extranet Based  Intranet Based.
CAMPUS LAN DESIGN GUIDE Design Considerations for the High-Performance Campus LAN.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
SYMANTEC ENDPOINT SECURITY SERVICE PROVIDERS | ALLIANCE PRO IT HYDERABAD (CORPORATE OFFICE) ALLIANCE PRO IT PRIVATE LIMITED, 3A, HYNDAVA TECHNO PARK, TECHNO.
SYMANTEC ENDPOINT SECURITY SERVICE PROVIDERS | ALLIANCE PRO IT HYDERABAD (CORPORATE OFFICE) ALLIANCE PRO IT PRIVATE LIMITED, 3A, HYNDAVA TECHNO PARK, TECHNO.
Virtual Private Networks
Deliver cloud to the enterprise—simply,
Instructor Materials Chapter 1: WAN Concepts
Unit 3 Virtualization.
Chapter 7. Identifying Assets and Activities to Be Protected
Chapter 1 Introduction to Networking
Instructor Materials Chapter 1: Explore the Network
Chapter 1: Exploring the Network
Network Overview.
CT1503 Network Operating System
Virtual Private Networks (VPN)
Understand Wide Area Networks (WANs)
Computer Networking Devices
VPN: Virtual Private Network
Chapter 1: Explore the Network
Module 2: Configure Network Intrusion Detection and Prevention
Wide Area Network.
Virtual Private Networks (VPN)
TYPES OF NETWORK
Chapter 1: WAN Concepts Connecting Networks
Your Business Opportunity
IS4550 Security Policies and Implementation
VIRTUAL PRIVATE NETWORKS (VPN)
Need for VPN As a business grows, it might expand to multiple shops or offices across the country and around the world. the people working in those locations.
The Business Value of MPLS VPNs
Virtual Private Network
Firewalls Routers, Switches, Hubs VPNs
VPN: Virtual Private Network
Connectivity methods. Connectivity methods Exam Answer WAN/LAN  Each office will have its own Local Area Network or LAN.  But the company also wants.
Computer Networking A computer network, often simply referred to as a network, is a collection of computers and devices connected by communications channels.
WHAT IS MPLS?  MPLS is a type of data-carrying protocol that manages traffic between two locations. It is mainly used in high-performing networks. 
Introduction to Networking & TCP/IP
Lecture 1: Introduction to Network Operating Systems
Topic 12: Virtual Private Networks
Private Networks.
AT&T Firewall Battlecard
Principles of Information Technology
Chapter 8 – Data switching and routing
Presentation transcript:

Wide Area Network Fundamentals By Team A

Introduction WAN is a geographically distributed private telecommunications network that interconnects multiple LANs. A router or other multifunction device is typically used to connect a LAN to a WAN.  Enterprise WANs allow users to share access to applications, services and other centrally located resources.  A VPN facilitates connectivity between WAN sites. A wide area network (WAN) is a geographically distributed private telecommunications network that interconnects multiple local area networks (LANs). In an enterprise, a WAN may consist of connections to a company's headquarters, branch offices, colocation facilities, cloud services and other facilities. Typically, a router or other multifunction device is used to connect a LAN to a WAN. Enterprise WANs allow users to share access to applications, services and other centrally located resources. This eliminates the need to install the same application server, firewall or other resource in multiple locations, for example. A virtual private network (VPN) facilitates connectivity between WAN sites. An IPsec VPN is more commonly used in continuously open site-to-site connections, such as those between branch offices and headquarters locations.

Many Advantages Many MPLS VPNs offer much more flexibility at more cost-effective price-points than other WAN technologies such as T1 lines. They can reduce total telecom costs by as much as 70% by combining voice, data, and video on one network. Due to the labeling technology, the speed of performing lookups for destinations and routing is much faster than the standard IP table lookups non-MPLS routers have to perform ("What Is Mpls And Its Benefits?", 2017).

Quality of Service QoS Can support both IntServ and DiffServ Support for DiffServ can be standardized Enables traffic proritization MPLS is a combination of routing and switching technologies that can provide scalable VPNs with end-to-end quality of service. When an enterprise and service provider must be consistent in order to achieve end to end service levels.

Security An MPLS network doesn’t offer any permanent data protection. The lack of this protection and improper implementation that can leave a network prone to vulnerabilities. MPLS requires IT personnel to be vigilant in it’s usage. IT should work with their provider to ensure that all devices, interfaces, and other hardware are security is hardened. Doing so will secure that all vulnerabilities are minimized.

Price Compared to WAN over the internet a VPN based WAN can be expensive. The cost of MPLS can be based on carrier, certain discount levels, the volume commitments, and other factors that can affect pricing. Geography also plays a major role, if a the carrier cant provide service within a geographical area. When a specific carrier lacks coverage in a given geography, they’ll usually work with another provider to complete their quote, which can also affect their price to you significantly

Cons of Wide Area Network High costs to setup Security concerns Maintenance issues Why it may be true that Wide area networks have many advantages in it’s application, it’s also important to understand that they’re some disadvantages in using such a network. One of the listed cons of using WAN is it’s setup costs. WAN over internet can be very complex to deal with and the larger the WAN the costlier it becomes. The need to connect to far- flung remote stations is one of the reasons that the cost of WAN is so high. Security concerns is another cons of using WAN. A WAN can leave openings to certain security breaches such as, unauthorized usage, information or data theft, and malicious damage to files. When businesses have many locations this makes it more difficult to monitor and prevent security breaches. Maintenance issues are also another con of WAN’s over internet. because of the challenges that comes with WAN, it is very hard to manage a data center. Data center management is one of the biggest problem with WAN. These known issues make it harder for data center to detect problems before becoming a reality.

Conclusion Outsourced routing. With MPLS, the carrier handles WAN routing. ... Any-to-any connectivity. Applications, like voice and video, feature any-to- any traffic patterns. ... Built-in support for Quality of Service (QoS). ... Service-level agreements (SLAs) with delivery guarantees. With all of the cons against VPN based WAN the upside makes it worth it. Cost maybe an issue but that stake holder may have an issue with. With their being many providers, we could find a provider that’s affordable, and that provide a package to suit our needs.

Citations TechTarget (2017). WAN (wide area network). Retrieved from http://searchenterprisewan.techtarget.com/definition/WAN (Accessed April 13, 2007) What is MPLS and its Benefits?. (2017). Retrieved from http://www.etherspeak.com/blog/what-is-mpls-and-its-benefits/ What is the cost of MPLS?. (2015). Retrieved from https://www.mushroomnetworks.com/blog/2015/08/20/what-is-the-cost-of- mpls/ info.oxfordnetworks.com/blog/wide-area-networks-the-pros-and-cons

Picture Citations Page 3 (2017) https://image.slidesharecdn.com/comparisonbetweentraditionalvpnandmplsvpn- 130505070722-phpapp02/95/comparison-between-traditional-vpn-and-mpls-vpn- 20-638.jpg?cb=1367737679 Page 5 (2017) https://www.google.com/url?sa=i&rct=j&q=&esrc=s&source=images&cd=&cad=rja &uact=8&ved=0ahUKEwi8ir_g2qrTAhWBQiYKHdXqBfYQjRwIBw&url=http%3A%2F%2F www.brandonhall.com%2Fblogs%2Fsome-sense-of-security-about-learning- technologies%2F&psig=AFQjCNH5dY1YcwV7EgFmvDChUR5f8aU_fg&ust=1492491619 153439 Page 6 (2017) https://www.google.com/url?sa=i&rct=j&q=&esrc=s&source=images&cd=&cad=rja &uact=8&ved=0ahUKEwjJpML11qrTAhUGYyYKHeR4CPcQjRwIBw&url=https%3A%2F% 2Fwww.inddist.com%2Farticle%2F2016%2F03%2Fare-costs-poor-pricing-weighing- down-your-financial- results&bvm=bv.152479541,d.eWE&psig=AFQjCNGHafcpt4xC7q3Sp6mVTY5KkV0DTQ &ust=1492490583978757