Presented By: Gavin Worden Leased Lines vs. Internet Based VPNs.

Slides:



Advertisements
Similar presentations
M A Wajid Tanveer Infrastructure M A Wajid Tanveer
Advertisements

Virtual Private Networks COSC541 Project Jie Qin & Sihua Xu October 11, 2014.
CP Networking1 WAN and Internet Access. CP Networking2 Introduction What is Wide Area Networking? What is Wide Area Networking? How Internet.
Connecting to Remote Networks © 2004 Cisco Systems, Inc. All rights reserved. Using Packet Switching in WANs INTRO v2.0—7-1.
Information Technology Foundations-BIT 112 TECHNOLOGY GUIDE FOUR Basics of Telecommunications and Networks.
WAN Technologies Dial-up modem connections Cheap Slow
Chapter 8 Wide Area Networks. Announcements and Outline Announcements Outline 8.1 Introduction 8.2 Services 8.21 Circuit-Switched Networks 8.22 Dedicated-Circuit.
Chapter 10 Wide Area Networks. Contents The need for Wide area networks (WANs) Point-to-point approaches Statistical multiplexing, TDM, FDM approaches.
Telecommunications systems (Part 1) School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 12, Tuesday 3/27/2007)
Thought For The Week No Question Is A Bad Question!
Copyright © 2015 John, Wiley & Sons, Inc. All rights reserved. 9-1 FitzGerald ● Dennis ● Durcikova Prepared by Taylor M. Wells: College of Business Administration,
Connecting to Remote Networks © 2004 Cisco Systems, Inc. All rights reserved. Understanding WAN Technologies INTRO v2.0—7-1.
Metropolitan and Wide Area Networks Under construction…
1 © 2004, Cisco Systems, Inc. All rights reserved. WAN Technologies Based on CCNA 4 v3.1 Slides Compiled & modified by C. Pham.
Technology Focus: Network and Communications Technology.
TDC 461: Wide Area Network Services DePaul University 22 May, 2001.
WANs and Remote Connectivity
NETWORKING Mahesh & Naveen.
Virtual Private Network
333: DISCUSS THE FUNDAMENTALS OF NETWORKING.  1. Discuss networking concepts (20 hrs)  2. Discuss hardware & software requirement to setup a Local Area.
Selecting a WAN Technology Lecture 4: WAN Devices &Technology.
Leased Line. Introduction A leased line is a service contract between a provider and a customer, whereby the provider agrees to deliver a symmetric telecommunications.
1 Wide Area Network. 2 What is a WAN? A wide area network (WAN ) is a data communications network that covers a relatively broad geographic area and that.
In The Name Of Allah Whose Blessings Are Uncountable.
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
Chapter 5 Networks Communicating and Sharing Resources
VIRTUAL PRIVATE NETWORKS (VPN) BY: Sajal Soni Abhishek sahu Deepti Singh Deeksha sahu Yashika chourasia Subhash dewangan.
Chapter 7 WANs and Remote Connectivity. WAN Essentials A WAN traverses a large geographic area A WAN link is a connection from one site to another and.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
WAN Technologies Dial-up modem connections
WANs and Remote Connectivity
Communication Services Communication Services: –Problem: This chapter expands on topics introduced in earlier chapters related to long-distance communication.
Introduction to WAN Technologies
NETWORKS.
1 Pertemuan 16 WAN Technologies Overview. Discussion Topics WAN technology WAN devices WAN standards WAN encapsulation Packet and circuit switching WAN.
WANs and Remote Connectivity
Intro to WAN VCC Semester 4, Chapter 2. Service providers Central Office (CO): Each telephone connects to a single point called a CO. Local Loop.
Chapter 6 Wide Area Networking Concepts, Architectures, & Services.
Chapter 7 Ben Bielskis WAN Wide Area Network Connects LANs over a large geographical area. WAN Link – A connection from one site to another.
Computer Networks Digital Access Technologies. Spring 2006Computer Networks2 How Computer Networks are Built?  LANs (Local Area Networks) are relatively.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Virtual Private Networks Warren Toomey. Available WAN Links.
HIGH SPEED WIDE AREA NETWORKS BYWANJAU. Introduction  WANs – Group of LANs linked together by communication service providers over large geographically.
Introduction to Information Systems Lecture 06 Telecommunications and Networks Business Value of Networks Jaeki Song.
Wide Area Network Chapter 15 powered by DJ 1. Chapter Objectives At the end of this Chapter you will be able to:  Describe different methods for connecting.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Services in a Converged WAN Accessing the WAN – Chapter 1.
Summary - Part 2 - Objectives The purpose of this basic IP technology training is to explain video over IP network. This training describes how video can.
1 Backup Options & Sample WAN Designs. 2 Chapter Topics  WAN Backup Design Options  Sample WAN Designs.
CCNA 4 v3.1 Module 2 WAN Technologies
Oz – Foundations of Electronic Commerce © 2002 Prentice Hall Essentials of Telecommunications.
. Large internetworks can consist of the following three distinct components:  Campus networks, which consist of locally connected users in a building.
Higher Computing Networking. Networking – Local Area Networks.
WAN TECHNOLOGY CONCEPTS 1 st semester nalhareqi©2015.
Building Corporate Data Networks – A Case Study
Remote Access and Long-Distance Communications. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Typical Telephone.
Chapter 8 Wide Area Networks. Announcements and Outline Announcements Outline 8.1 Introduction 8.2 Services 8.21 Circuit-Switched Networks 8.22 Dedicated-Circuit.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 4 v3.1 Module 2 WAN Technologies.
Computer Networks and Internet. 2 Objectives Computer Networks Computer Networks Internet Internet.
Chapter 10 Copyright © 2015 Pearson Education, Inc.
 Introduction to Wide Area Networks 2 nd semester
Virtual Private Network
Instructor Materials Chapter 1: WAN Concepts
Virtual Private Networks (VPN)
Understand Wide Area Networks (WANs)
Wide Area Network.
Ken Gunnells, Ph.D. - Networking Paul Crigler - Programming
Chapter 1: WAN Concepts Connecting Networks
Need for VPN As a business grows, it might expand to multiple shops or offices across the country and around the world. the people working in those locations.
Connectivity methods. Connectivity methods Exam Answer WAN/LAN  Each office will have its own Local Area Network or LAN.  But the company also wants.
Basics of Telecommunications and Networks
Presentation transcript:

Presented By: Gavin Worden Leased Lines vs. Internet Based VPNs

Evolution of WAN Technologies (1) 1837 – Telegraph (2) 1876 – Telephone (3) 1960’s - T-carrier system developed by AT&T for internal use. (4) ARAPNET (later becomes Internet) - first packet switching network (5) 1970’s - Dataphone Digital Service (DDS) started deployment in 1974, bringing digital transmission facilities to the customer's premise. (6) 1980’s – T-1 services become commercially popular (7) 1990’s – Frame Relay began Deployment

Leased Lines T-Carrier System & Synchronous Optical Network Leased Line Implementations: Private Point-to-Point Frame Relay

T-Carrier System Originally developed by AT&T in the 1960’s for internal use. Initially used for voice, T1 and T3 lines are widely used to create point-to-point private data networks. T-carrier lines use four wire cables. One pair is used to transmit and the other to receive

T-Carrier System

SONET In contrast to the copper transmission lines used for T-carrier systems, the synchronous optical network, or SONET, uses fiber-optic transmission technology. Employed by telephone companies and common carriers, speeds range from 51 Mbps to 40 Gbps. SONET backbones are widely used to aggregate T1 and T3 lines”

SONET

Private Point-to-Point A permanent telephone connection between two points set up by a telecommunications common carrier. Typically, leased lines are used by businesses to connect geographically distant offices. AT&T offers private digital transmission at speeds ranging from 9.6 kbps, 56 Kbps, T1, Channelized DS1, E1, DS3, OC3c, OC12c, OC48c, OC192c, Ethernet and STM-1/STM-4. This the most expensive option. A prime component of cost is geographic distance of the line.

Frame Relay Frame relay is a telecommunication service designed for cost-efficient data transmission for intermittent traffic between local area networks (LANs) and between end-points in a wide area network (WAN). Frame Relay networks in the U.S. support data transfer rates at T-1 (1.544 Mbps) and T-3 (45 Mbps) speeds. Frame Relay is a way of utilizing existing T-1 and T-3 lines owned by a service provider. Most telephone companies now provide Frame Relay service for customers who want connections at 56 Kbps to T-1 speeds.

Virtual Private Networks To emulate a point-to-point link, data is encapsulated, or wrapped, with a header that provides routing information allowing it to traverse the shared or public transit internetwork to reach its endpoint. To emulate a private link, the data being sent is encrypted for confidentiality.

Network to Network VPN Rather than using an expensive long-haul dedicated circuit between the branch office and the corporate hub, both the branch office and the corporate hub routers can use a local dedicated circuit and local ISP to connect to the Internet. The VPN software uses the local ISP connections and the Internet to create a virtual private network between the branch office router and corporate hub router.

Client to Server VPN Client VPNs differ from network to network VPNs in that the connection for a client VPN is made directly from the client machine to the organization’s VPN concentrator/server instead of from the client’s local network to the organization’s primary network.

Evaluation of Alternatives In order to adequately evaluate the various WAN alternatives explored in this report, three different WAN scenarios will be examined. All three scenarios will be outlined from the perspective of a single organization that has ten offices around the world. The organization needs: secure internal files sharing intranet network management Internet access

Scenario 1 Private Point-to-Point to Each Site Provides stable & centrally managed WAN. Will provide control of bandwidth / performance Single interface to Internet Higher degree of network security All requirements will be met for this scenario This option is the most expensive

Scenario 2 Frame Relay to Each Site Provides stable & centrally managed WAN. Will provide control of bandwidth Single interface to Internet Good degree of network security All requirements will be met for this scenario This option is the next most expensive

Scenario 3 Internet based Network to Network VPN Enhanced transport security (encryption) Much lower connection costs More complex setup and maintenance Multiple interfaces with Internet increases security risks All requirements met with this scenario

Conclusion Major Determining Factors Include: Performance Requirements Security Requirements and Cost High Security / Performance requirements will typically require private point-to-point. Lower Security / Performance requirements will allow organizations to take advantage of the low costs and flexibility of VPNs.

Questions? ?

Presented By: Gavin Worden Leased Lines vs. Internet Based VPNs