IAD Last Update 2010.01.17 1.2.0 Copyright 2000-2010 Kenneth M. Chipps Ph.D. www.chipps.com 1.

Slides:



Advertisements
Similar presentations
Presented by: Eng. Karam Al-sofy
Advertisements

Networking at Home the Office and Globe
Networking at Home and Abroad
Broadband and Wide Area Network Services Carrier Gigabit Ethernet Multi Protocol Label Switching Vs. IP VPNs T-1 & T-3 SIP Trunks Security Network Topology.
SAN Last Update Copyright Kenneth M. Chipps Ph.D. 1.
Demarc Last Update Copyright Kenneth M. Chipps Ph.D. 1.
Information Technology Foundations-BIT 112 TECHNOLOGY GUIDE FOUR Basics of Telecommunications and Networks.
ATM Frame Last Update Copyright 2011 Kenneth M. Chipps Ph.D. 1.
What is a Network Last Update Copyright Kenneth M. Chipps Ph.D.
Copyright Kenneth M. Chipps Ph.D. How to Use SNMP to Collect Network Data Last Update
Copyright Kenneth M. Chipps Ph.D. 1 VPN Last Update
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
SIP Trunking Last Update Copyright Kenneth M. Chipps Ph.D. 1.
How to Build a CAN Last Update Copyright Kenneth M. Chipps PhD 1.
Copyright 2013 Kenneth M. Chipps Ph.D. NETW-250 PBX Last Update
FTTP Last Update Copyright Kenneth M. Chipps Ph.D. 1.
Analog Modem Last Update Copyright Kenneth M. Chipps Ph.D. 1.
DSL Modem Last Update Copyright 2011 Kenneth M. Chipps Ph.D. 1.
EWAN Equipment Last Update Copyright 2010 Kenneth M. Chipps Ph.D. 1.
What is broadband Multiple broadband technologies Advantages DSL and DSLAM Types of DSL transmission Services through broadband Cable Modem Internet Access.
Chapter 9A Network Basics.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco PublicNew CCNA Jianxin Tang IT 1 V4.0 Ch8. Fundamental Networks.
Copyright 2014 Kenneth M. Chipps Ph.D. The Cloud Last Update
Modems Mostly used to connect PCs to the Internet Modulates and demodulates the signal Converts analog data into digital and vice versa V.90/V.92 56K standards.
Data Storage Methods Last Update Copyright Kenneth M. Chipps Ph.D. 1.
Powerline Distribution Last Update Copyright Kenneth M. Chipps Ph.D. 1.
NAS Last Update Copyright Kenneth N. Chipps Ph.D. 1.
Chapter 7 Ben Bielskis WAN Wide Area Network Connects LANs over a large geographical area. WAN Link – A connection from one site to another.
Integrated Services Digital Network (ISDN)
Hosted Virtualization Lab Last Update Copyright Kenneth M. Chipps Ph.D.
Packet Over SONET Interface Last Update Copyright 2011 Kenneth M. Chipps Ph.D. 1.
Copyright Kenneth M. Chipps Ph.D. ISDN Last Update
Voice Design Last Update Copyright 2011 Kenneth M. Chipps Ph.D. 1.
The Routing Table Last Update Copyright Kenneth M. Chipps Ph.D.
Wide Area Network Chapter 15 powered by DJ 1. Chapter Objectives At the end of this Chapter you will be able to:  Describe different methods for connecting.
 The devices which each intercorrect several computer or different to each other, each nones network devices.  There are various types of Network devices.
Carrier Ethernet Last Update Copyright Kenneth M. Chipps Ph.D. 1.
How to Build a MAN Last Update Copyright Kenenth M. Chipps PhD 1.
Disk Interfaces Last Update Copyright Kenneth M. Chipps Ph.D. 1.
Free Space Optics Equipment Last Update Copyright 2011 Kenneth M. Chipps Ph.D. 1.
WAN TECHNOLOGY CONCEPTS 1 st semester nalhareqi©2015.
Dark Fiber Last Update Copyright Kenneth M. Chipps Ph.D. 1.
SMDS Last Update Copyright Kenneth M. Chipps Ph.D. 1.
Copyright 2009 Kenneth M. Chipps Ph.D. Addressing in Networks Last Update
X.25 Last Update Copyright Kenneth M. Chipps Ph.D. 1.
Cable Last Update Copyright Kenneth M. Chipps Ph.D. 1.
FDDI Last Update Copyright Kenneth M. Chipps Ph.D. 1.
Oracle Virtualization Last Update Copyright 2012 Kenneth M. Chipps Ph.D.
DDS Last Update Copyright Kenneth M. Chipps Ph.D. 1.
By: Chasity, Jamon, Clifton.  Computer networks have lots of pathways that send information back and forth.  Networks can even send the information.
Packet Over SONET Last Update Copyright Kenneth M. Chipps Ph.D. 1.
 Introduction to Wide Area Networks 2 nd semester
Example of a LAN Last Update Copyright 2009 Kenneth M. Chipps Ph.D.
How to Build a LAN Last Update Copyright 2007 Kenneth M. Chipps PhD 1.
Copyright Kenneth M. Chipps Ph.D.
NETW-250 Key Systems Last Update
What is Virtualization Last Update
Copyright Kenneth M. Chipps Ph.D.
Hubs Bridges Switches Last Update
Copyright 2008 Kenneth M. Chipps Ph.D.
Copyright Kenneth M. Chipps Ph.D.
The Business Value of SIP Trunking
Which Method Should I Select To Connect Point A to Point B
Example of a MAN Last Update
Copyright Kenneth M. Chipps Ph.D.
Example of a CAN Last Update
White Papers Last Update
Connectivity methods. Connectivity methods Exam Answer WAN/LAN  Each office will have its own Local Area Network or LAN.  But the company also wants.
NETW-250 Avaya Voice Solutions Last Update
Principles of Information Technology
Presentation transcript:

IAD Last Update Copyright Kenneth M. Chipps Ph.D. 1

Objectives of This Section Learn –What an IAD is Copyright Kenneth M. Chipps Ph.D. 2

What is an IAD Another way to connect to a WAN is to use an IAD - Integrated Access Device This can be instead of or in addition to the router and CSU/DSU setup The IAD provides a way to mix and usually compress traffic from many sources and types onto a single data line This is used at the CAN, MAN, and WAN levels Copyright Kenneth M. Chipps Ph.D. 3

What is an IAD IADs are commonly used to mix data and voice on the same line Video is sometimes added as well The driver behind this is the desire to reduce the number of separate lines that must be maintained and paid for Why have copper for voice, fiber for data, and coax for video; when a single line can do all three Copyright Kenneth M. Chipps Ph.D. 4

What is an IAD Another way these units function is by dynamically reallocating unused bandwidth from one use to another The idea is to keep the pipe completely full at all times Copyright Kenneth M. Chipps Ph.D. 5

How Does the IAD Work This type of aggregation has typically been done at the phone company's central office In this approach the aggregation is done on the customer premises Devices like this are aimed primarily at small and medium size businesses Copyright Kenneth M. Chipps Ph.D. 6

How Does the IAD Work All traffic is combined by this device and then sent out of the building on a single line This line can be a T1, Fractional T1, DSL, or dark fiber for ATM cell traffic On the customer end the PBX, router, fax machine, video codec or like devices are plugged into the IAD Copyright Kenneth M. Chipps Ph.D. 7

How Does the IAD Work It then sends this traffic off to similar device operated by a service provider that breaks the traffic back out for distribution over the normal means Unless the IAD is being used in a CAN or MAN solely controlled by the user, a service provider is required at the other end Copyright Kenneth M. Chipps Ph.D. 8

How Does the IAD Work In fact most of these devices are being sold to service providers, who are then turning around and selling the equipment and the service to the end user At the CAN level these devices are used to reduce the number of fiber links required to connect buildings to each other Copyright Kenneth M. Chipps Ph.D. 9

How Does the IAD Work In this case the vendor performs a one time installation and setup of the devices at each end of the connection Many of these boxes are ATM devices This will help to keep ATM in the game for awhile In the CAN area they are connected to clear channel T1 lines Copyright Kenneth M. Chipps Ph.D. 10

Why Use an IAD The ability of these devices to squeeze more useable bandwidth out of an existing line or to reduce the number of lines is the driving factor in the purchase of these devices for most folks Copyright Kenneth M. Chipps Ph.D. 11

IAD Next are a set of photographs showing a small IAD It has a WAN and a LAN port as well as voice ports Copyright Kenneth M. Chipps Ph.D. 12

IAD Front Copyright Kenneth M. Chipps Ph.D. 13

IAD Back Copyright Kenneth M. Chipps Ph.D. 14

IAD Ports Copyright Kenneth M. Chipps Ph.D. 15

IAD Ports Copyright Kenneth M. Chipps Ph.D. 16