Frame Relay, ATM and VPN Metropolitan Area Ethernet Overview.

Slides:



Advertisements
Similar presentations
Wide Area Networks (WANs)
Advertisements

M A Wajid Tanveer Infrastructure M A Wajid Tanveer
Virtual Private Networks COSC541 Project Jie Qin & Sihua Xu October 11, 2014.
Wide Area Networks (WANs) Chapter 7 Updated Dec XU Zhengchuan Fudan University.
Wide Area Networks (WANs) Chapter 7 Updated January 2007 Panko’s Business Data Networks and Telecommunications, 6th edition Copyright 2007 Prentice-Hall.
Virtual Private Networks. Why VPN Fast, secure and reliable communication between remote locations –Use leased lines to maintain a WAN. –Disadvantages.
WAN Technologies Dial-up modem connections Cheap Slow
Chapter 8 Wide Area Networks. Announcements and Outline Announcements Outline 8.1 Introduction 8.2 Services 8.21 Circuit-Switched Networks 8.22 Dedicated-Circuit.
COS 338 Day DAY 12 Agenda Capstone Proposal Overdue 3 accepted, 2 in mediation, 1 MIA Assignment 4 Due Lab 4 is Today & Oct 24 (After exam) OpNet.
Wide Area Networks (WANs) Chapter 7 Copyright 2003 Prentice-Hall Panko’s Business Data Networks and Telecommunications, 4 th edition.
1 Chapter Overview Using Remote Connections SLIP and PPP WAN Technologies.
Backbone Networks, MAN, WAN
1 Chapter 12 Remote Network Access Using Remote Connections SLIP and PPP WAN Technologies.
Copyright © 2015 John, Wiley & Sons, Inc. All rights reserved. 9-1 FitzGerald ● Dennis ● Durcikova Prepared by Taylor M. Wells: College of Business Administration,
1 Configuring Virtual Private Networks for Remote Clients and Networks.
© 2009 Pearson Education, Inc. Publishing as Prentice Hall 7-1 Wide Area Networks (WANs) Chapter 7 Updated January 2009 Raymond Panko’s Business Data Networks.
Wide Area Networks (WANs)
Metropolitan and Wide Area Networks Under construction…
Technology Focus: Network and Communications Technology.
© 2009 Pearson Education, Inc. Publishing as Prentice Hall 7-1 Wide Area Networks (WANs) Chapter 7 Updated January 2009 Raymond Panko’s Business Data Networks.
TDC 461: Wide Area Network Services DePaul University 22 May, 2001.
1 Wide Area Networking. 2 Outline Topics Wide Area Networks –Link sites together –Carriers and regulation –Leased Line Networks –Public Switched Data.
© 2009 Pearson Education, Inc. Publishing as Prentice Hall Wide Area Networks (WANs) Chapter 7 Panko’s Business Data Networks and Telecommunications, 7th.
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Wide Area Networks. 2 Wide Area Networks (WANs) u WAN Technologies u Ordinary telephone line and telephone modem. u Point-to-Point Leased lines u Public.
333: DISCUSS THE FUNDAMENTALS OF NETWORKING.  1. Discuss networking concepts (20 hrs)  2. Discuss hardware & software requirement to setup a Local Area.
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
Wide Area Networks (WANs) Chapter 7 Updated January 2009 XU Zhengchuan Fudan University.
Leased Line. Introduction A leased line is a service contract between a provider and a customer, whereby the provider agrees to deliver a symmetric telecommunications.
Table Of Contents Introduction What is WAN? Point to Point Links Circuit Switching Packet Switching WAN Virtual Circuits WAN Dialup Services WAN Devices.
1 Wide Area Network. 2 What is a WAN? A wide area network (WAN ) is a data communications network that covers a relatively broad geographic area and that.
1 L2TP OVERVIEW 18-May Agenda VPN Tunneling PPTP L2F LT2P.
From circuit to packet switching
Wide Area Networks (WANs) Chapter 7 (Modified April 2003) Copyright 2003 Prentice-Hall Panko’s Business Data Networks and Telecommunications, 4 th edition.
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
Wide Area and Large-Scale Networks
Virtual Private Network (VPN). ©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential “ If saving money is wrong, I don’t want.
WAN Technologies Dial-up modem connections
Frame Relay Most Popular PSDN Today –Offers speeds of 64 kbps to about 40 Mbps; This covers the range of greatest corporate demand –Most demand is at the.
Outlines Received due 13 March 24 %. Homework n Review for Midterm on 1 March 2000 n Research Paper n Readings [11] “ATM Systems: What’s Next?” [12] “Long.
VPN Protocol What is a VPN? A VPN is A network that uses Internet or other network service to transmit data. A VPN includes authentication and.
Introduction to WAN Technologies
Robert E. Meyers CCNA, CCAI Youngstown State University Cisco Regional Academy Instructor Cisco Networking Academy Program Semester 4, v Chapter.
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
Module 4: Designing Routing and Switching Requirements.
Intro to WAN VCC Semester 4, Chapter 2. Service providers Central Office (CO): Each telephone connects to a single point called a CO. Local Loop.
Wide Area Networks (WANs) Chapter 7 Panko’s Business Data Networks and Telecommunications, 6th edition Copyright 2007 Prentice-Hall May only be used by.
Chapter 7 Ben Bielskis WAN Wide Area Network Connects LANs over a large geographical area. WAN Link – A connection from one site to another.
Networks and Protocols CE Week 5b. WAN’s, Frame Relay, DSL, Cable.
COS 338 Day DAY 11 Agenda Questions? Capstone Proposal Overdue 3 accepted, 2 in mediation, 1 MIA Assignment 3 Due 1 B, 2 C’s, 1 F and 2 MIA Assignment.
Wide Area Networks. 2 Types of Traditional Telephone Circuits u Dial-Up Service (Any-to-Any) u Leased Lines u Point-to-point only u Cheaper for high volumes.
Emerging Technologies. Emerging Technology Overview  Emerging technologies are those which are just beginning to be adopted or are at the initial acceptance.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Virtual Private Network (VPN) Topics Discussion What is a VPN? What is a VPN?  Types of VPN  Why we use VPN?  Disadvantage of VPN  Types of.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
William Stallings Data and Computer Communications 7 th Edition Chapter 1 Data Communications and Networks Overview.
Wide Area Network Chapter 15 powered by DJ 1. Chapter Objectives At the end of this Chapter you will be able to:  Describe different methods for connecting.
PSDNs Public Switched Data Networks
WAN – Packet and Cell-switched Networks
Presented By: Gavin Worden Leased Lines vs. Internet Based VPNs.
Building Corporate Data Networks – A Case Study
Remote Access and Long-Distance Communications. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Typical Telephone.
Chapter 8 Wide Area Networks. Announcements and Outline Announcements Outline 8.1 Introduction 8.2 Services 8.21 Circuit-Switched Networks 8.22 Dedicated-Circuit.
Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 1 – Data Communications, Data Networks, and.
COMPUTER NETWORKS CS610 Lecture-20 Hammad Khalid Khan.
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
Data Communications Chapter 1 – Data Communications, Data Networks, and the Internet.
Wide Area Networks (WANs)
Virtual Private Network
Presentation transcript:

Frame Relay, ATM and VPN Metropolitan Area Ethernet Overview

2 Packet-Switched Services u Offered by Carriers u X.25 u Old, slow, and not sufficiently cheaper than frame relay u Frame Relay u Speeds in main range of user demand u Attractive prices u Dominates the market today u ATM u High speeds and costs

3 X.25 Packet-Switched Data Networks u Oldest packet switched network service (1970s) u Low speed (maximum around 64 kbps) u Mature: easy to implement u Uses PVCs u Reliable service, so latency in transmission u Mostly replaced by Frame RelayFrame Relay

4 Frame Relay Packet-Switched Data Networks u Software upgrade to X.25 switches u Uses PVCs u Unreliable, so much faster on same switches u Good speed range: 56 kbps - 40 Mbps: Meets most corporate needs (most under 2 Mbps) – Grew rapidly in the 90s, to equal leased line WANs in terms of market share (about 40%) u Best-selling packet switched network service See more here.here

5 ATM (Asynchronous Transfer Mode) u Offers very high speeds: 622 Mbps, 2.5 Gbps to 40 Gbps. Speeds are beyond most corporate needs today and high costs. u Connection-oriented (PVCs), unreliable u Quality of Service (QOS) guarantees critical traffic u Minimize latency (delays) u Inherent reliability (low loss rate) u Seen as the next generation u But Frame Relay keeps increasing in speed in low Mbps range where market demand is highest

6 Pricing Packet Switched Services u Customer Premises Equipment u Access Line to Point of Presence u Port Speed u Per PVC Price u Distance and Traffic Volume

7 Customer Premises Equipment u Access Device u Has link to internal system (often a LAN) u Has CSU/DSU to put internal traffic into format for Frame Relay transmission u In Frame Relay, called Frame Relay Access Device (FRADS) Access Device LAN Access Line to Network

8 Modular Routers u CSU/DSUs are removable expansion boards Router Switching Circuitry Port 1 CSU/DSU (T1) Port 1 CSU/DSU (T1) Port 2 CSU/DSU (56 kbps) Port 2 CSU/DSU (56 kbps) Port 3 CSU/DSU (T3) Port 3 CSU/DSU (T3) Port 4 CSU/DSU (56 kbps) Port 4 CSU/DSU (56 kbps) Modular Router T1 Line56 kbps LineT3 Line56 kbps Line

9 Elements of a Packet Switched Network Customer Premises A LEC Switching Office POP at LEC Office Leased Access Line to POP Leased Access Line to POP You need a leased access line to the network’s POP. Sometimes the packet switched network vendor pays the cost of the access line for you and bundles it into your service charges.

10 Elements of a Packet Switched Network Switched Data Network Trunk Line Network Switching Office POP Customer Premises B Leased Access Line

11 Pricing of Frame Relay u Speed of the Access Line from Site to Network u Determines maximum transmission rate to the network u Often called the Port Speed u Often the most important price determinant u Must be fast enough for needs See Frame Relay vs. DSL -- a price issueFrame Relay vs. DSL

12 Pricing of Frame Relay u In Some Frame Relay networks, two speeds u Committed Information Rate (pretty much guaranteed) u Available Bit Rate (like flying standby) for bursts. Not guaranteed. u Price depends both on CIR and ABR u Access line speed must be fast enough for ABR

13 Pricing of Frame Relay u Additional price per PVC u Usually small compared to the access line charge u One access line can multiplex all PVCs to/from site u PVCs share access line speed Site PVC1 PVC2

14 Calculations u Situation u You have four sites u You want any one to be able to reach any other u Questions u How many PVCs do you need? u How many access lines do you need?

15 Calculations u PVCs u If you have N sites, there are N(N-1)/2 possible connections u In this case, you would have 4(3)/2 or 6 possible connections u Some vendors count this as 6 PVCs, others as 12 PVCs u Access Lines u You would need four access lines (one for each site) u Each will multiplex 3 PVCs u Must be fast enough for the needs of communication with the three other sites

16 Pricing of Frame Relay u May Depend on Distance u But often a flat monthly rate throughout the carrier’s service area u May Depend on Traffic u But often a flat monthly rate based only on the speed of the access line

17 Leased Lines vs. Packet-Switched Data Networks Leased Lines vs. Packet-Switched Data Networks u Leased Lines u Point-to-point, inexpensive for thick routes u Inflexible: must be established ahead of time u Packet Switched Networks u Also must be established ahead of time for PVCs u Competitor for leased line networks u Priced aggressively u Carrier does all the management u Killing the leased line business

18 Virtual Private Network VPN Server Corporate Site A VPN Server Corporate Site B 2. Remote Customer PC (or site) 3. Remote Corporate PC Tunnel Internet Extranet Remote Access for Intranet 1. Site-to-Site

19 VPN advantage u Virtual Private Network (VPN) u Transmission over the Internet with added security u Some analysts include transmission over a PSDN with added security u Why VPNs? u PSDNs are not interconnected u Only good for internal corporate communication u But Internet reaches almost all sites in all firms u Low transmission cost per bit transmitted

20 VPN issues VPN issues u VPN Problems u Latency and Sound Quality u Internet can be congested u Creates latency, reduces sound quality u Use a single ISP as for VoIP (voice over IP) u Security u PPTP for remote access is popular u IPsec for site-to-site transmission is popular

21 ISP-Based PPTP Remote Access VPN u Remote Access VPNs u User dials into a remote access server (RAS) u RAS often checks with RADIUS server for user identification information. Allows or rejects connection RADIUS Server PPTP RAS Internet ISP PPTP Access Concentrator Local Access Corporate Site A Secure Tunnel Unsecure TCP Control Channel

22 VPN and PPTP VPN and PPTP u Point-to-Point Tunneling Protocol u Available in Windows since Windows 95 u No need for added software on clients u Provided by many ISPs u PPTP access concentrator at ISP access point u Some security limitations u No security between user site and ISP u No message-by-message authentication of user u Uses unprotected TCP control channel

23 IPsec in Tunnel Mode IPsec in Tunnel Mode Tunnel Only Between Sites Hosts Need No Extra Software Secure Tunnel Mode IPsec Server IPsec Server Local Network Local Network No Security In Site Network No Security In Site Network

24 IPsec in Transfer Mode IPsec in Transfer Mode End-to-End (Host-to-Host) Tunnel Hosts Need IPsec Software Secure Tunnel Transfer Mode IPsec Server IPsec Server Local Network Local Network Security In Site Network Security In Site Network

25 IPsec alternatives IPsec alternatives u IP Security (IPsec) u Tunnel mode: sets up a secure tunnel between IPsec servers at two sites u No security within sites u No need to install IPsec software on stations u Transfer mode: set up secure connection between two end hosts u Protected even on internal networks u Must install IPsec software on stations, but default in current OSs (Windows, Linux, UNIX).

26 Security at the internet layer Security at the internet layer u IP Security (IPsec) u At internet layer, so protects information at higher layers u Transparent: upper layer processes do not have to be modified Internet Layer with IPsec Protection TCPUDP HTTPSMTPFTPSNMP Protected

27 Common IPsec configuration Common IPsec configuration u IP Security (IPsec) u Security associations: u Governed by corporate policies List of Allowable Security Associations List of Allowable Security Associations Party B Party A IPsec Policy Server

28 SSL/TLS for Browser–Webserver Communication

29 Metropolitan Area Ethernet u Metropolitan Area Network (MAN) u A carrier network limited to a large urban area and its suburbs u Metropolitan area Ethernet (metro Ethernet) is available for this niche u Metro Ethernet is relatively new, but is growing very rapidly u 802.3ad standard u Ethernet in the first mile u Standard for transmitting Ethernet signals over PSTN access lines u 1-pair voice-grade UTP, 2-pair data-grade UTP, optical fiber

30 Metropolitan Area Ethernet u Attractions of Metropolitan Area Ethernet u Low prices per bit transmitted u High speeds u Familiar technology for networking staff u Rapid provisioning u Rapid capacity increases for special events u Carrier Class Service u Basic metro Ethernet standards are insufficient for large wide area networks u Quality of service and management tools must be developed u The goal: To provide carrier class services that are sufficient for customers