From circuit to packet switching

Slides:



Advertisements
Similar presentations
Wide Area Networks (WANs)
Advertisements

M A Wajid Tanveer Infrastructure M A Wajid Tanveer
Virtual Private Networks COSC541 Project Jie Qin & Sihua Xu October 11, 2014.
Wide Area Networks (WANs) Chapter 7 Updated Dec XU Zhengchuan Fudan University.
Wide Area Networks (WANs) Chapter 7 Updated January 2007 Panko’s Business Data Networks and Telecommunications, 6th edition Copyright 2007 Prentice-Hall.
Broadband and Wide Area Network Services Carrier Gigabit Ethernet Multi Protocol Label Switching Vs. IP VPNs T-1 & T-3 SIP Trunks Security Network Topology.
CP Networking1 WAN and Internet Access. CP Networking2 Introduction What is Wide Area Networking? What is Wide Area Networking? How Internet.
Virtual Private Networks. Why VPN Fast, secure and reliable communication between remote locations –Use leased lines to maintain a WAN. –Disadvantages.
WAN Technologies Dial-up modem connections Cheap Slow
Chapter 8 Wide Area Networks. Announcements and Outline Announcements Outline 8.1 Introduction 8.2 Services 8.21 Circuit-Switched Networks 8.22 Dedicated-Circuit.
COS 338 Day DAY 12 Agenda Capstone Proposal Overdue 3 accepted, 2 in mediation, 1 MIA Assignment 4 Due Lab 4 is Today & Oct 24 (After exam) OpNet.
Wide Area Networks (WANs) Chapter 7 Copyright 2003 Prentice-Hall Panko’s Business Data Networks and Telecommunications, 4 th edition.
Backbone Networks, MAN, WAN
Copyright © 2015 John, Wiley & Sons, Inc. All rights reserved. 9-1 FitzGerald ● Dennis ● Durcikova Prepared by Taylor M. Wells: College of Business Administration,
1 Configuring Virtual Private Networks for Remote Clients and Networks.
© 2009 Pearson Education, Inc. Publishing as Prentice Hall 7-1 Wide Area Networks (WANs) Chapter 7 Updated January 2009 Raymond Panko’s Business Data Networks.
Wide Area Networks (WANs)
Metropolitan and Wide Area Networks Under construction…
Technology Focus: Network and Communications Technology.
© 2009 Pearson Education, Inc. Publishing as Prentice Hall 7-1 Wide Area Networks (WANs) Chapter 7 Updated January 2009 Raymond Panko’s Business Data Networks.
1 Wide Area Networking. 2 Outline Topics Wide Area Networks –Link sites together –Carriers and regulation –Leased Line Networks –Public Switched Data.
© 2009 Pearson Education, Inc. Publishing as Prentice Hall Wide Area Networks (WANs) Chapter 7 Panko’s Business Data Networks and Telecommunications, 7th.
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Wide Area Networks. 2 Wide Area Networks (WANs) u WAN Technologies u Ordinary telephone line and telephone modem. u Point-to-Point Leased lines u Public.
333: DISCUSS THE FUNDAMENTALS OF NETWORKING.  1. Discuss networking concepts (20 hrs)  2. Discuss hardware & software requirement to setup a Local Area.
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
Selecting a WAN Technology Lecture 4: WAN Devices &Technology.
Wide Area Networks (WANs) Chapter 7 Updated January 2009 XU Zhengchuan Fudan University.
Leased Line. Introduction A leased line is a service contract between a provider and a customer, whereby the provider agrees to deliver a symmetric telecommunications.
Table Of Contents Introduction What is WAN? Point to Point Links Circuit Switching Packet Switching WAN Virtual Circuits WAN Dialup Services WAN Devices.
1 Wide Area Network. 2 What is a WAN? A wide area network (WAN ) is a data communications network that covers a relatively broad geographic area and that.
WAN Technology.
Frame Relay, ATM and VPN Metropolitan Area Ethernet Overview.
Wide Area Networks (WANs) Chapter 7 (Modified April 2003) Copyright 2003 Prentice-Hall Panko’s Business Data Networks and Telecommunications, 4 th edition.
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
WAN Technologies Dial-up modem connections
Frame Relay Most Popular PSDN Today –Offers speeds of 64 kbps to about 40 Mbps; This covers the range of greatest corporate demand –Most demand is at the.
VPN Protocol What is a VPN? A VPN is A network that uses Internet or other network service to transmit data. A VPN includes authentication and.
Communication Services Communication Services: –Problem: This chapter expands on topics introduced in earlier chapters related to long-distance communication.
Introduction to WAN Technologies
Robert E. Meyers CCNA, CCAI Youngstown State University Cisco Regional Academy Instructor Cisco Networking Academy Program Semester 4, v Chapter.
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
Intro to WAN VCC Semester 4, Chapter 2. Service providers Central Office (CO): Each telephone connects to a single point called a CO. Local Loop.
Wide Area Networks (WANs) Chapter 7 Panko’s Business Data Networks and Telecommunications, 6th edition Copyright 2007 Prentice-Hall May only be used by.
Networks and Protocols CE Week 5b. WAN’s, Frame Relay, DSL, Cable.
COS 338 Day DAY 11 Agenda Questions? Capstone Proposal Overdue 3 accepted, 2 in mediation, 1 MIA Assignment 3 Due 1 B, 2 C’s, 1 F and 2 MIA Assignment.
Wide Area Networks. 2 Types of Traditional Telephone Circuits u Dial-Up Service (Any-to-Any) u Leased Lines u Point-to-point only u Cheaper for high volumes.
Emerging Technologies. Emerging Technology Overview  Emerging technologies are those which are just beginning to be adopted or are at the initial acceptance.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Virtual Private Network (VPN) Topics Discussion What is a VPN? What is a VPN?  Types of VPN  Why we use VPN?  Disadvantage of VPN  Types of.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
Wide Area Network Chapter 15 powered by DJ 1. Chapter Objectives At the end of this Chapter you will be able to:  Describe different methods for connecting.
VPN. What is VPN An arrangement that provides connections between: An arrangement that provides connections between: –Offices –remote workers and –the.
WHAT IS NETWORKING?. Networking is … How computers talk to each other.
GUIDED BY – MR. L. K. VARMA SIR PRESENTED BY- AJAY KUMAR SONI MARTIN XESS ASHISH NIRMALKAR PUSHKAR BHARTIYA GYAN PRAKASH PRESENTED BY- AJAY KUMAR SONI.
Wide Area Networks (WAN) Terms that are commonly used by service providers: Customer premises equipment (CPE) Equipment that’s owned by the subscriber.
. Large internetworks can consist of the following three distinct components:  Campus networks, which consist of locally connected users in a building.
WAN TECHNOLOGY CONCEPTS 1 st semester nalhareqi©2015.
Chapter 10 Panko and Panko Business Data Networks and Security, 10 th Edition, Global Edition Copyright © 2015 Pearson Education, Ltd. Panko and Panko.
Presented By: Gavin Worden Leased Lines vs. Internet Based VPNs.
Lecture 1: Introduction to WAN
Building Corporate Data Networks – A Case Study
Remote Access and Long-Distance Communications. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Typical Telephone.
Chapter 8 Wide Area Networks. Announcements and Outline Announcements Outline 8.1 Introduction 8.2 Services 8.21 Circuit-Switched Networks 8.22 Dedicated-Circuit.
Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 1 – Data Communications, Data Networks, and.
COMPUTER NETWORKS CS610 Lecture-20 Hammad Khalid Khan.
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
Data Communications Chapter 1 – Data Communications, Data Networks, and the Internet.
Wide Area Networks (WANs)
Virtual Private Network
Presentation transcript:

From circuit to packet switching PSDN and VPN From circuit to packet switching 1 1

Packet-Switched Services Offered by Carriers X.25 Old, slow, and not sufficiently cheaper than frame relay Frame Relay Speeds in main range of user demand Dominated the market in the 1990s ATM High speeds and costs, requiring equipment changes Carrier Internet and MPLS services Dominant services today 2

X.25 Packet-Switched Data Networks Oldest packet switched network service (1970s) Low speed (maximum around 64 kbps) Mature: easy to implement Uses PVCs Reliable service, so latency in transmission Mostly replaced by Frame Relay 3

Frame Relay Packet-Switched Data Networks Software upgrade to X.25 switches Uses PVCs Unreliable, so much faster on same switches Good speed range: 56 kbps - 40 Mbps: Meets most corporate needs (most under 2 Mbps) Grew rapidly in the 90s, to equal leased line WANs in terms of market share (about 40%) See more here. 4

Pricing of Packet Switching Speed of the Access Line from Site to Network Determines maximum transmission rate to the network Often called the Port Speed Often the most important price determinant Must be fast enough for needs See Frame Relay vs. DSL -- a price issue 5

ATM (Asynchronous Transfer Mode) Offers very high speeds: 622 Mbps, 2.5 Gbps to 40 Gbps. Speeds are beyond most corporate needs today and high costs. Connection-oriented (PVCs), unreliable Quality of Service (QOS) guarantees critical traffic Minimize latency (delays) Inherent reliability (low loss rate) Seen as the next generation before Ethernet surge But Frame Relay kept increasing in speed in low Mbps range where market demand was highest 6

Pricing/Performance of Packet Switched Services Pricing of Frame Relay and ATM Customer Premises Equipment Access Line to Point of Presence Port Speed Per PVC Price Distance and Traffic Volume The demise of Frame Relay and ATM Transition from Frame Relay and ATM to Carrier Ethernet stimulated by Verizon, AT&T, etc. The move to Ethernet and IP based services a win-win situation. 7

Customer Premises Equipment Access Device Has link to internal system (often a LAN) Has CSU/DSU to put internal traffic into format for Packet switching transmission In Frame Relay, called Frame Relay Access Device (FRADS) Access Device Access Line to Network LAN 8

Router Switching Circuitry Modular Routers CSU/DSUs are removable expansion boards Modular Router Router Switching Circuitry Port 1 CSU/DSU (T1) Port 2 CSU/DSU (56 kbps) Port 3 CSU/DSU (T3) Port 4 CSU/DSU (56 kbps) T1 Line 56 kbps Line T3 Line 56 kbps Line 9

Elements of a Packet Switched Network Customer Premises A You need a leased access line to the network’s POP. Sometimes the packet switched network vendor pays the cost of the access line for you and bundles it into your service charges. Leased Access Line to POP LEC Switching Office Leased Access Line to POP POP at LEC Office 10 10

Elements of a Packet Switched Network Data Network Trunk Line Network Switching Office POP Customer Premises B Leased Access Line 11 11

Calculations Situation Questions You have four sites You want any one to be able to reach any other Questions How many PVCs do you need? How many access lines do you need? 12

Calculations PVCs Access Lines If you have N sites, there are N(N-1)/2 possible connections In this case, you would have 4(3)/2 or 6 possible connections Some vendors count this as 6 PVCs, others as 12 PVCs Access Lines You would need four access lines (one for each site) Each will multiplex 3 PVCs Must be fast enough for the needs of communication with the three other sites 13

Leased Lines vs. Packet-Switched Data Networks Point-to-point, inexpensive for thick routes Inflexible: must be established ahead of time Packet Switched Networks Also must be established ahead of time for PVCs Competitor for leased line networks Priced aggressively Carrier does all the management Killing the leased line business 14

Virtual Private Network 1. Site-to-Site VPN Server Tunnel Internet VPN Server Corporate Site B Corporate Site A 3. Remote Corporate PC 2. Remote Customer PC (or site) Remote Access for Intranet Extranet 15

VPN advantage Virtual Private Network (VPN) Why VPNs? Transmission over the Internet with added security Some analysts include transmission over a PSDN with added security Why VPNs? PSDNs are not interconnected Only good for internal corporate communication But Internet reaches almost all sites in all firms Low transmission cost per bit transmitted 16

VPN issues VPN Problems Latency and Sound Quality Internet can be congested Creates latency, reduces sound quality Use a single ISP as for VoIP (voice over IP) Security PPTP for remote access is popular IPsec for site-to-site transmission is popular 17

ISP-Based PPTP Remote Access VPN Remote Access VPNs User dials into a remote access server (RAS) RAS often checks with RADIUS server for user identification information. Allows or rejects connection Unsecure TCP Control Channel Local Access RADIUS Server PPTP RAS Secure Tunnel Internet ISP PPTP Access Concentrator Corporate Site A 18

VPN and PPTP Point-to-Point Tunneling Protocol Available in Windows since Windows 95 No need for added software on clients Provided by many ISPs PPTP access concentrator at ISP access point Some security limitations No security between user site and ISP No message-by-message authentication of user Uses unprotected TCP control channel 19

Hosts Need No Extra Software IPsec in Tunnel Mode Tunnel Mode IPsec Server IPsec Server Local Network Local Network Secure Tunnel Tunnel Only Between Sites Hosts Need No Extra Software No Security In Site Network No Security In Site Network 20

IPsec in Transfer Mode 21 Transfer Mode IPsec Server IPsec Server Local Network Local Network Secure Tunnel Security In Site Network Security In Site Network End-to-End (Host-to-Host) Tunnel Hosts Need IPsec Software 21

IPsec alternatives IP Security (IPsec) Tunnel mode: sets up a secure tunnel between IPsec servers at two sites No security within sites No need to install IPsec software on stations Transfer mode: set up secure connection between two end hosts Protected even on internal networks Must install IPsec software on stations, but default in current OSs (Windows, Linux, UNIX). 22

Security at the internet layer IP Security (IPsec) At internet layer, so protects information at higher layers Transparent: upper layer processes do not have to be modified HTTP SMTP FTP SNMP TCP UDP Protected Internet Layer with IPsec Protection 23

Common IPsec configuration IP Security (IPsec) Security associations: Governed by corporate policies Party A Party B List of Allowable Security Associations List of Allowable Security Associations 24 IPsec Policy Server

SSL/TLS for Browser–Webserver Communication 25

Metropolitan Area Ethernet Metropolitan Area Network (MAN) A carrier network limited to a large urban area and its suburbs Metropolitan area Ethernet (metro Ethernet) is available for this niche Metro Ethernet is relatively new, but is growing very rapidly 802.3ad standard Ethernet in the first mile Standard for transmitting Ethernet signals over PSTN access lines 1-pair voice-grade UTP, 2-pair data-grade UTP, optical fiber 26

Metropolitan Area Ethernet Attractions of Metropolitan Area Ethernet Low prices per bit transmitted High speeds Familiar technology for networking staff Rapid provisioning Rapid capacity increases for special events Carrier Class Service Basic metro Ethernet standards are insufficient for large wide area networks Quality of service and management tools must be developed The goal: To provide carrier class services that are sufficient for customers 27

Carrier Ethernet and MPLS services 28

Carrier Ethernet and MPLS services The two most popular WAN options today are: MPLS and Carrier Ethernet. Carrier Ethernet services include virtual private LAN service (VPLS), Gigabit and metro Ethernet. E-LINE service -- site-to-site service, competes directly with leased lines. E-LAN -- extends the LAN to the wide area, as if the PSDN service was only trunk lines between switches. MPLS (Multiprotocol Label Switching) services typically refer to Layer 3 MPLS VPN services a MPLS network determines the best path for packets between two hosts -- the label switched path. Routers will send all packets along this path that receive a label path number. 29

Overview of MPLS services A MPLS primer at https://www.youtube.com/watch?v=U1w-b9GIt0k 30

More in the MPLS service The label switched path 31

Carrier Ethernet and MPLS services A historic view of Carrier Ethernet in Wikipedia An example of carrier services: AT&T Keeping up with news about Carrier Ethernet: http://www.carrierethernetnews.com/ Carrier Ethernet vs MPLS services. Software-Defined Networks (SDN) Overview in Wikipedia. Pros and cons of SDN. 32