ITEC 275 Computer Networks Switching Routing and WANs

  • Slides: 101
Download presentation
ITEC 275 Computer Networks – Switching, Routing, and WANs Week 10 Professor Robert D’Andrea

ITEC 275 Computer Networks – Switching, Routing, and WANs Week 10 Professor Robert D’Andrea Summer 2017

Agenda • The course is 2/3 completed • Learning Activities • SNMP – MIB

Agenda • The course is 2/3 completed • Learning Activities • SNMP – MIB • PPP • Cable Modems and DSL • Leased Lines, SONET, Frame Relay, Metro Ethernet, ATM • Selecting a WAN Service Provider • Metro Ethernet

Enterprise Technologies and Devices • Remote access networks • Wide area networks (WANs) •

Enterprise Technologies and Devices • Remote access networks • Wide area networks (WANs) • Devices – End user remote access devices – Central site remote access devices – VPN concentrators – Routers

Enterprise Selection Criteria • • Business requirements and constraints Cost Technical goals Bandwidth requirements

Enterprise Selection Criteria • • Business requirements and constraints Cost Technical goals Bandwidth requirements Quality of Service (Qo. S) requirements Network topology Traffic flow and load

Enterprise Selection Criteria SNMP (Simple Network Management Protocol) is one of the most commonly

Enterprise Selection Criteria SNMP (Simple Network Management Protocol) is one of the most commonly used technologies when it comes to network monitoring. SNMP components: • Managed devices, agents, and network-management systems (NMSs). A managed device is a node that has an SNMP agent and resides on a managed network. These devices can be routers and access servers, switches and bridges, hubs, computer hosts, or printers. • Agent is a software module residing within a device. This agent translates information into a compatible format with SNMP. • An NMS runs monitoring applications. They provide the bulk of processing and memory resources required for network management.

Enterprise Selection Criteria MIB (Management Information Base) and is the collection of information, which

Enterprise Selection Criteria MIB (Management Information Base) and is the collection of information, which is organized hierarchically. The pieces of information in the MIB are accessed by SNMP. There are two types of MIBs: • Scalar objects define a single object instance. • Tabular object define multiple related object instances grouped in MIB tables.

Enterprise Selection Criteria OIDs (Object Identifiers ) uniquely identify the managed objects in an

Enterprise Selection Criteria OIDs (Object Identifiers ) uniquely identify the managed objects in an MIB hierarchy. It can be depicted as a tree whose nodes are assigned by different organizations. Generally, the OID is a long sequence of numbers, coding the nodes, separated by dots. Top level MIB object IDs (OIDs) belong to different standard organizations. Vendors define private branches including managed objects for their own products.

Enterprise Selection Criteria 1 iso 1. 3 org 1. 3. 6 dod 1. 3.

Enterprise Selection Criteria 1 iso 1. 3 org 1. 3. 6 dod 1. 3. 6. 1 internet 1. 3. 6. 1. 1 directory 1. 3. 6. 1. 2 mgmt 1. 3. 6. 1. 2. 1 mib-2 1. 3. 6. 1. 2. 2. 1. 3 if. Type 1. 3. 6. 1. 2. 1. 10 transmission 1. 3. 6. 1. 2. 1. 10. 23 transmission ppp 1. 3. 6. 1. 27 application 1. 3. 6. 1. 28 mta 1. 3. 6. 1. 2. 2 pib 1. 3. 6. 1. 3 experimental 1. 3. 6. 1. 4 private

Enterprise Selection Criteria SNMP basically works from the principle that the network management systems

Enterprise Selection Criteria SNMP basically works from the principle that the network management systems send out a request and the managed devices return a response. The four operations are: Get, Get. Next, Set, and Trap. SNMP messages consist of a header and a PDU (Protocol Data Unit). The headers consist of the SNMP version number and the community name. The community name is used as a password to increase security in SNMP.

Enterprise Selection Criteria MIBs are collections of definitions which define the properties of the

Enterprise Selection Criteria MIBs are collections of definitions which define the properties of the managed object within the device to be managed. Examples: • Objects to monitor a printer - different cartridge states and the number of printed files • Objects to monitor a switch - incoming and outgoing traffic and rate of package loss or the number of packets addressed to a broadcast address.

Enterprise Selection Criteria Every managed device keeps a database of values for each of

Enterprise Selection Criteria Every managed device keeps a database of values for each of the definitions written in the MIB. So, the available data is actually not dependent on the database, but on the implementation. Each vendor of SNMP equipment has their proper section of the MIB tree structure at their disposition.

Enterprise Selection Criteria From an organizational point of view, all manageable features of all

Enterprise Selection Criteria From an organizational point of view, all manageable features of all products (from each vendor) are arranged in this MIB tree structure. Each 'branch' of this tree has a number and a name, and the complete path from the top of the tree down to the point of interest forms the name of that point. This complete path is the OID, the "identifier of an object" respectively.

Enterprise Selection Criteria In summary, nodes near the top of the tree structure are

Enterprise Selection Criteria In summary, nodes near the top of the tree structure are general in nature. As you traverse the tree, the names get more specific until you reach the bottom, where each node represents a particular feature on a specific device or agent.

Remote Access Technologies • • The Point-to-Point Protocol (PPP) Integrated Services Digital Network (ISDN)

Remote Access Technologies • • The Point-to-Point Protocol (PPP) Integrated Services Digital Network (ISDN) Cable modems Digital Subscriber Line (DSL)

Remote Access Technologies So, what is Point Protocol? PPP (Point-to-Point Protocol) is a protocol

Remote Access Technologies So, what is Point Protocol? PPP (Point-to-Point Protocol) is a protocol for communication between two computers using a serial interface, typically a personal computer connected by phone line to a server. For example, your Internet server provider may provide you with a PPP connection so that the provider's server can respond to your requests, pass them on to the Internet, and forward your requested Internet responses back to you. PPP uses the Internet protocol (IP) (and is designed to handle others). It is sometimes considered a member of the TCP/IP suite of protocols. Relative to the Open Systems Interconnection (OSI) reference model, PPP provides layer 2 (data-link layer) service. Essentially, it packages your computer's TCP/IP packets and forwards them to the server where they can actually be put on the Internet.

Point-to-Point Protocol (PPP) • PPP is used with synchronous, asynchronous, dial-up, and ISDN links

Point-to-Point Protocol (PPP) • PPP is used with synchronous, asynchronous, dial-up, and ISDN links • PPP defines an encapsulation scheme for transporting different network-layer protocols • PPP supports authentication: – Password Authentication Protocol (PAP) – Challenge Handshake Authentication Protocol (CHAP). CHAP more secure than PAP

Point-to-Point Protocol (PPP) • The Internet Engineering Task Force (IETF) developed PPP as a

Point-to-Point Protocol (PPP) • The Internet Engineering Task Force (IETF) developed PPP as a standard data link layer protocol for transporting various protocols across serial, point-to-point links. • PPP can be used to create point-to-point links between different vendor’s equipment. • PPP uses a Network Control Protocol field in the Data Link header to identify the Network layer protocol.

Point-to-Point Protocol (PPP) • PPP can be used to connect a single remote user

Point-to-Point Protocol (PPP) • PPP can be used to connect a single remote user to a central office, or to connect a remote office with many users to a central office. • PPP is a data-link protocol that can be used over either asynchronous serial (dial-up) or synchronous serial (ISDN) media with the use of LCP (Link Control Protocol) to build and maintain data-link connections.

PPP Layers Network Control Protocol (NCP) Link Control Protocol (LCP) Encapsulation based on High-Level

PPP Layers Network Control Protocol (NCP) Link Control Protocol (LCP) Encapsulation based on High-Level Data-Link Control Protocol (HDLC) Physical Layer

PPP Point-to-Point (PPP) is a data link protocol commonly used in establishing a direct

PPP Point-to-Point (PPP) is a data link protocol commonly used in establishing a direct connection between two networking nodes. It provides connection authentication, transmission authentication, and compression. PPP is used over many types of physical networks including serial cable, phone line, trunk line, cellular telephone, and fiber optic links such as SONET. PPP is also used over the Internet access connections (broadband).

PPP

PPP

PPP

PPP

PPP Leased lines: ISP is the service provider. PPP is the protocol. The user

PPP Leased lines: ISP is the service provider. PPP is the protocol. The user does not want to share the wire or the expense of leasing a wire with another user. Packet Switching: Telco is the service provider. Frame Relay protocol. The user shares the service with other users to save money. Frame Relay is an alternate technology to PPP. Circuit Switching: POTS or ISDN are the service providers. PPP is the protocol. Data is sent encapsulated over the public telephone network system.

PPP Metro Ethernet: Telco is the service provider. Ethernet protocol. The user wants the

PPP Metro Ethernet: Telco is the service provider. Ethernet protocol. The user wants the data sent at a very high speed. Broadband: Telco is the service provider. PPPo. E, PPPo. A, Ethernet protocols.

PPP encapsulation includes: 1. Line set up using LCP. The link is established during

PPP encapsulation includes: 1. Line set up using LCP. The link is established during this phase. 2. Authentication, encryption and compression (optional). 2. 1 Password Authentication Protocol (PAP) Avoid using PAP because it sends the password in ASCII format (clear text). 2. 2 Challenge Handshake Authentication Protocol (CHAP) never sends the password, but sends a challenged handshake processes.

PPP 3. PPP carries packets from many different protocol suites using NCP. The NCP

PPP 3. PPP carries packets from many different protocol suites using NCP. The NCP sends packets to negotiate the needed settings. Is all data encrypted? No Encryption is used to simply verify the passwords.

Multi Link PPP (MPPP) An ordinary dial-up modem connection to the Internet through an

Multi Link PPP (MPPP) An ordinary dial-up modem connection to the Internet through an Internet service provider (ISP) usually uses PPP as its wide area network (WAN) datalink protocol, but there are times when the 56 -Kbps speed provided by V. 90 modems is insufficient. MPPP allows multiple physical dial-up links to be inverse multiplexed together to form a single high-bandwidth logical PPP connection between the dial-up client and the ISP. MPPP works by ordering the data frames from the client across the multiple PPP channels and recombs them at the ISP’s termination point, and vice versa.

Multi Link PPP (MPPP) MPPP defines protocols for splitting the data stream into PPP

Multi Link PPP (MPPP) MPPP defines protocols for splitting the data stream into PPP packets, sequencing the packets, transmitting them over separate logical data links, and then recombining them at the receiving station.

Multi Link PPP (MPPP)

Multi Link PPP (MPPP)

Multilink MPPP Inverse multiplexing speeds up data transmission by dividing a data stream into

Multilink MPPP Inverse multiplexing speeds up data transmission by dividing a data stream into multiple concurrent streams that are transmitted at the same time across separate channels (such as a T-1 or E-1 lines) and are then reconstructed at the other end back into the original data stream. Just the reverse of ordinary multiplexing , which combines multiple signals into a single signal, inverse multiplexing is a technique commonly used where data in a high-speed local area network (LAN) flows back and forth into a wide area network (WAN) across the "bottleneck" of a slower line such as a T-1 (1. 544 Mbps).

Multilink MPPP Various multiplexing methods are possible in terms of the channel bandwidth and

Multilink MPPP Various multiplexing methods are possible in terms of the channel bandwidth and time, and the signal, in particular the frequency, phase or time. The two basic methods are: • Frequency Division Multiplexing (FDM) is derived from Amplitude Modulation (AM) technique in which the signals occupy the same physical ‘line’ but in different frequency bands. Each signal occupies its own specific band of frequencies all the time, i. e. the messages share the channel bandwidth.

AM vs FM

AM vs FM

FDM

FDM

Multi Link Point Protocol (MPPP)

Multi Link Point Protocol (MPPP)

Multi Link PPP • Adds support for channel aggregation of PPP. Channel aggregation can

Multi Link PPP • Adds support for channel aggregation of PPP. Channel aggregation can be used for load sharing and providing extra bandwidth. With channel aggregation, a device can automatically bring up additional channels as bandwidth requirements increase. • MPPP ensures that packets arrive in order at the receiving device.

Multi-chassis MPPP Cisco’s enhancement to PPP is MPPP allows WAN administrator to group multiple

Multi-chassis MPPP Cisco’s enhancement to PPP is MPPP allows WAN administrator to group multiple access servers into a single stack group. The user’s traffic can be split and reassembled across multiple access servers in the stack group.

Multi-chassis Multi Link PPP Stack group ISDN Analog Offload server

Multi-chassis Multi Link PPP Stack group ISDN Analog Offload server

CHAP Challenge-Handshake Authentication Protocol (CHAP) is a more secure procedure for connecting to a

CHAP Challenge-Handshake Authentication Protocol (CHAP) is a more secure procedure for connecting to a system than the Password Authentication Procedure (PAP). CHAP provides a three-way hand-shake. Provides protection by verifying a remote node with a three-way hand shake and a variable challenge value that is unique and unpredictable.

CHAP

CHAP

ISDN • Digital data-transport service offered by regional telephone carriers (Telcos). • Circuit-switched service

ISDN • Digital data-transport service offered by regional telephone carriers (Telcos). • Circuit-switched service that carries voice and data. • ISDN is a set of digital services that transmits voice and data over existing phone lines. • Cost-effective remote-access solution for telecommuters and remote offices – Cost of an ISDN circuit is usually based on a monthly fee plus usage time • Good choice as a backup link for another type of link, for example, Frame Relay. • Channel aggregation is popular with ISDN links.

ISDN Interfaces Basic Rate Interface (BRI) 2 B 64 Kbps D 16 Kbps }

ISDN Interfaces Basic Rate Interface (BRI) 2 B 64 Kbps D 16 Kbps } 144 Kbps Primary Rate Interface (PRI) 23 B or 30 B D 64 Kbps } 1. 544 Mbps in U. S. 2. 048 Mbps in Europe

ISDN Components Non-ISDN device (TE 2) R S/T NT 1 TA 4 -wire circuit

ISDN Components Non-ISDN device (TE 2) R S/T NT 1 TA 4 -wire circuit ISDN device (TE 1) U 2 -wire circuit S/T U NT 1 S T NT 2 U NT 1 U ISDN device (TE 1) with built-in NT 1 To ISDN service

Cable TV Service CATV (originally "community antenna television, " now often "community access television")

Cable TV Service CATV (originally "community antenna television, " now often "community access television") is more commonly known as "cable TV. " Television programs were brought to millions of people throughout the world who were connected to a community antenna, cable TV. Today, CATV has become an increasingly popular way to interact with the World Wide Web and other new forms of multimedia information and entertainment services.

Cable TV Service • Operates over the coax cable used by cable TV providers

Cable TV Service • Operates over the coax cable used by cable TV providers • Much faster than analog modems, and usually much faster than ISDN (depending on how many users share the cable) – 25 to 50 Mbps downstream from the head end – 2 to 3 Mbps upstream from end users • Standard = Data Over Cable Service Interface Specification (DOCSIS)

Cable TV Service • Coax Cable does not require dial-up. • Cable modem operates

Cable TV Service • Coax Cable does not require dial-up. • Cable modem operates more like a LAN. • Cable-network providers offer hybrid fiber/coax (HFC) systems that connect CATV networks to the service provider’s high-speed fiber-optic network. • HFC systems allow connections of home PCs and small LANs to high-speed access to the Internet or to a private network using VPN.

Cable TV Service • CATV (Cable Modem Termination System) provides high-speed connectivity for cable

Cable TV Service • CATV (Cable Modem Termination System) provides high-speed connectivity for cable modems. • Cable modem solution for remote users or remote offices is the sharing a single cable and the types of applications they use.

Digital Subscriber Line (DSL) • High-speed digital data traffic over ordinary telephone wires. •

Digital Subscriber Line (DSL) • High-speed digital data traffic over ordinary telephone wires. • Sophisticated modulation schemes mean higher speeds than ISDN. – Speeds range from 1. 544 to 9 Mbps • Actual bandwidth depends on type of DSL service, DSL modem, and many physical-layer factors. • Symmetric communication (SDSL) traffic flow travels at the same speed up to 1. 544 Mbps. • Asymmetric DSL (ADSL) very popular – Downstream faster than upstream

Digital Subscriber Line (DSL)

Digital Subscriber Line (DSL)

PPP and ADSL Asymmetric DSL (ADSL) uses two popular PPP implementations. 1. PPP and

PPP and ADSL Asymmetric DSL (ADSL) uses two popular PPP implementations. 1. PPP and ATM (PPPo. A) the CPE acts as an Ethernet-to-WAN router and the PPP session is established between the CPE and Layer 3 access concentrator in the service provider’s network. 2. PPP and Ethernet (PPPo. E) the CPE acts as an Ethernet-to-WAN bridge.

PPP and ADSL PPP and Ethernet (PPPo. E) the CPE acts as an Ethernet-to-WAN

PPP and ADSL PPP and Ethernet (PPPo. E) the CPE acts as an Ethernet-to-WAN bridge. The client initiates a PPP session by encapsulating PPP frames in MAC frames and then bridging the frames over ATM/DSL to a gateway router at the service provider. From that point, the PPP session can be established, authenticated, and achieved. The client receives its IP address from the service provider, using PPP negotiation.

Provisioning WAN Bandwidth • A critical network design is considering capacity requirements. Selecting the

Provisioning WAN Bandwidth • A critical network design is considering capacity requirements. Selecting the right amount of capacity for current and future needs. • Provisioning requires an analysis of traffic flows, and analysis of scalability goals.

WAN Technologies • • Leased lines Synchronous Optical Network (SONET) Frame Relay Asynchronous Transfer

WAN Technologies • • Leased lines Synchronous Optical Network (SONET) Frame Relay Asynchronous Transfer Mode (ATM)

Leased Lines • Dedicated digital, copper circuits that a customer leases from a carrier

Leased Lines • Dedicated digital, copper circuits that a customer leases from a carrier for a predetermined amount of time, usually for months or years. • Speeds range from 64 Kbps to 45 Mbps. • Enterprises use leased lines for both voice and data traffic.

Leased Lines • Dedicated connection or Point-to-Point connection. • Pre-established WAN communications path from

Leased Lines • Dedicated connection or Point-to-Point connection. • Pre-established WAN communications path from the Customer Premise Equipment (CPE) , through the Data Communications Equipment (DCE) switch, to the CPE of the remote site, then allowing Data Terminal Equipment (DTE) networks to communicate at anytime with no set up procedure before transmitting data.

DTE and DCE The end instrument is a piece of equipment connected to the

DTE and DCE The end instrument is a piece of equipment connected to the wires at the end of a telecommunication link. End instruments that relate to data terminal equipment (DTE) include printers, computers, barcode readers, automated teller machines (ATMs) and the console ports of routers.

DTE and DCE The data communication(s) equipment (DCE) is a device that sits between

DTE and DCE The data communication(s) equipment (DCE) is a device that sits between the DTE and a data transmission circuit. The DCE performs functions such as signal conversion, line clocking, and coding. The DTE/DCE classification was introduced by IBM.

DTE and DCE

DTE and DCE

DTE - DCE

DTE - DCE

Digital Signal (DS) A channel in the NADH (North American Digital Hierarchy) is called

Digital Signal (DS) A channel in the NADH (North American Digital Hierarchy) is called a digital signal (DS). Digital signals are multiplexed together to form high-speed WAN circuits. DS 1 and DS-3 are the most commonly used capacities.

The North American Digital Hierarchy

The North American Digital Hierarchy

Synchronous Optical Network (SONET) is the American National Standards Institute standard for synchronous data

Synchronous Optical Network (SONET) is the American National Standards Institute standard for synchronous data transmission on optical SDH (Synchronous Digital Hierarchy) is a standard technology for synchronous data transmission on optical media.

Synchronous Optical Network (SONET) • Physical-layer specification for high-speed synchronous transmission of packets or

Synchronous Optical Network (SONET) • Physical-layer specification for high-speed synchronous transmission of packets or cells over fiber-optic cabling. • Service providers and carriers make wide use of SONET in their internal networks. • Gaining popularity within private networks.

Synchronous Optical Network (SONET) Goals of SONET and SDH 1. Define higher speeds than

Synchronous Optical Network (SONET) Goals of SONET and SDH 1. Define higher speeds than the ones used by the NADH. 2. Support efficient multiplexing and de-multiplexing of individual signals. With SONET, it is easy to isolate one channel from a multiplexed circuit. In some instances where there are many different parts of the system are almost , but not quite, perfectly synchronised. Like the NADH and European E system, isolating one channel is more difficult.

Synchronous Optical Network (SONET) Terminating multiplexers (implemented in switches and routers) provide user access

Synchronous Optical Network (SONET) Terminating multiplexers (implemented in switches and routers) provide user access to the SONET network. Terminating multiplexers convert electrical interfaces into optical signals and multiplex multiple payloads into STS-N (Synchronous Transport Signal) signals required for optical transport.

SONET Optical Carrier (OC) Levels aka Synchronous Transport Signal (STS) Levels STS Rate OC

SONET Optical Carrier (OC) Levels aka Synchronous Transport Signal (STS) Levels STS Rate OC Level Speed STS-1 STS-3 STS-12 STS-24 STS-48 STS-96 STS-192 OC-1 OC-3 OC-12 OC-24 OC-48 OC-96 OC-192 51. 84 Mbps 155. 52 Mbps 622. 08 Mbps 1. 244 Gbps 2. 488 Gbps 4. 976 Gbps 9. 952 Gbps

Typical SONET Topology SONET Multiplexer Backup Pair Working Pair

Typical SONET Topology SONET Multiplexer Backup Pair Working Pair

SONET

SONET

Frame Relay Frame relay is a telecommunication service designed for cost-efficient data transmission for

Frame Relay Frame relay is a telecommunication service designed for cost-efficient data transmission for intermittent traffic between local area networks (LANs) and between end-points in a wide area network (WAN). Frame relay puts data in a variable-size unit called a frame and leaves any necessary error correction (retransmission of data) up to the end-points, which speeds up overall data transmission. For most services, the network provides a permanent virtual circuit (PVC), which means that the customer sees a continuous, dedicated connection without having to pay for a full-time leased line, while the service provider figures out the route each frame travels to its destination and can charge based on usage.

Frame Relay • Industry-standard data-link-layer protocol for transporting traffic across wide-area virtual circuits •

Frame Relay • Industry-standard data-link-layer protocol for transporting traffic across wide-area virtual circuits • Optimized for efficiency on circuits with low error rates • Attractively-priced in most parts of the world • Carriers agree to forward traffic at a Committed Information Rate (CIR)

Frame Relay

Frame Relay

Frame Relay To Router B: DLCI 100 To Router A: DLCI 200 Router A

Frame Relay To Router B: DLCI 100 To Router A: DLCI 200 Router A Virtual Circuit (VC) Router B

Frame Relay Hub-and-Spoke Uses Subinterfaces Central-Site Router DLCI 100 DLCI 200 hostname central site

Frame Relay Hub-and-Spoke Uses Subinterfaces Central-Site Router DLCI 100 DLCI 200 hostname central site interface serial 0 encapsulation frame-relay interface serial 0. 1 ip address 10. 0. 1. 1 255. 0 frame-relay interface-dlci 100 interface serial 0. 2 ip address 10. 0. 2. 1 255. 0 frame-relay interface-dlci 200

Virtual Circuit What is a virtual circuit? OSI model used in example. TCP takes

Virtual Circuit What is a virtual circuit? OSI model used in example. TCP takes large blocks of information from an application and breaks them into segments. It numbers and sequences each segment so that the destination TCP protocol can put the segments back into the order the application intended. After the segments are sent, TCP (trans host) waits for an acknowledgment of the receiving end’s TCP virtual circuit session, retransmitting those that aren’t acknowledged. Before a transmission occurs, a host sends segments down the OSI model, the sender’s TCP protocol contacts the destination’s TCP protocol to establish a connection. This type of connection is considered to be connection-oriented. UDP is connectionless connection.

 • • X. 25 was optimized for excellent reliability on physical circuits with

• • X. 25 was optimized for excellent reliability on physical circuits with high error rates. X. 25 was more complex to implement than Frame Relay. X. 25 works at the physical, data link, and network layers. X. 25 allows computers on different public networks (Compu. Serve, TCP/IP) to communicate through an intermediary computer at the network layer level.

X. 25

X. 25

Split Horizon A routing technique in which information about routes is prevented from exiting

Split Horizon A routing technique in which information about routes is prevented from exiting the router interface through which that information was received. Split horizon updates are useful in preventing routing loops. Use a sub-interface. This is a logical interface that is associated with a physical interface. The central site could have five PPP sub-interfaces defined, each communicating with one of the remotes sites. With this solution, the central site router applies the split horizon rule based on logical sub-interfaces, instead of the physical interface, and includes remote sites in the routing updates it sends out the WAN interface.

Split Horizon Split horizon can be eliminated using full mesh design with physical circuits

Split Horizon Split horizon can be eliminated using full mesh design with physical circuits between each site.

Split Horizon

Split Horizon

Asynchronous Transfer Mode (ATM) • Used in service provider internal networks • Gaining popularity

Asynchronous Transfer Mode (ATM) • Used in service provider internal networks • Gaining popularity within private networks, both WANs and sometimes LANs • Supports very high bandwidth requirements – Copper cabling: 45 Mbps (T 3) or more – Fiber-optic cabling: OC-192 (9. 952 Gbps) and beyond, especially if technologies such as wavelength-division multiplexing (WDM) are used

ATM • Provides efficient sharing of bandwidth among applications with various Quality of Service

ATM • Provides efficient sharing of bandwidth among applications with various Quality of Service (Qo. S) requirements – Cell-based system inherently better for Qo. S than frame-based system, because frame-based system, large frames can monopolize bandwidth • ATM is with a connection-oriented technology • Application can specify upon connection establishment the Qo. S it requires • Peak and minimum cell rates, cell-loss ratio, and cell-transfer delay

ATM

ATM

ATM Asynchronous transfer mode (ATM) is one of many network transmission protocols included in

ATM Asynchronous transfer mode (ATM) is one of many network transmission protocols included in Windows Server 2003. The most commonly used transmission protocol included in Windows Server 20003 is TCP/IP, which is a connectionless protocol. As such, TCP/IP cannot offer some of the advantages that a connection-oriented, virtual circuit, packet-switching technology, such as ATM, can. Unlike Mmost connectionless networking protocols, ATM is a deterministic networking system — it provides predictable, guaranteed quality of service. The ideal environment in which to use ATM is one that combines computer, voice, and video networking into a single network, and the combination of existing networks into a single infrastructure.

ATM • A disadvantages of ATM is that ATM interfaces for routers and switches

ATM • A disadvantages of ATM is that ATM interfaces for routers and switches are expensive. Video: https: //www. youtube. com/watch? v=0 d. U 1 am 2 u 1 Jw https: //www. youtube. com/watch? v=WToi. JS 8 x 1 CQ

Ethernet over ATM • ATM router interfaces are expensive • Some providers allow a

Ethernet over ATM • ATM router interfaces are expensive • Some providers allow a customer to use an Ethernet interface to access the provider’s ATM WAN • May require a converter • Expected to gain popularity because it has the advantages of both worlds – Easy-to-use LAN – Qo. S-aware WAN

Metro Ethernet What is Metro Ethernet? Metro Ethernet makes use of Carrier Ethernet technology

Metro Ethernet What is Metro Ethernet? Metro Ethernet makes use of Carrier Ethernet technology in metropolitan area networks (MANs). Carrier Ethernet is the use of highbandwidth Ethernet technology for Internet access and for communication among business, academic and government local area networks (LANs).

Metro Ethernet Widely available in larger cities, Metro Ethernet offers efficient and scalable network

Metro Ethernet Widely available in larger cities, Metro Ethernet offers efficient and scalable network services within a specific metropolitan region. These regions are frequently meshed in fiber optic networks, making Ethernet more widely available in the specified metropolitan area. Comcast Metro Ethernet offers a simple solution for users that have a complex network.

Metro Ethernet • A service offered by providers and carriers that traditionally only offered

Metro Ethernet • A service offered by providers and carriers that traditionally only offered WAN services • Carriers offer Metro Ethernet to customers who are looking for cost-effective method to interconnect campus networks and to access the Internet. • Metro Ethernet allow users to continue using 10/100 Mbps Ethernet interfaces. • Supports copper and fiber optics interfaces.

Metro Ethernet • Allows providers to offer bandwidth in 1 Mbps increments.

Metro Ethernet • Allows providers to offer bandwidth in 1 Mbps increments.

Metro Ethernet

Metro Ethernet

Selection Criteria for Remote Access Devices • • • Support for VPN features Support

Selection Criteria for Remote Access Devices • • • Support for VPN features Support for NAT Reliability Cost Ease of configuration and management Support for one or more high-speed Ethernet interfaces • If desired, wireless support

Selection Criteria for VPN Concentrators • Support for: – Tunneling protocols such as IPsec,

Selection Criteria for VPN Concentrators • Support for: – Tunneling protocols such as IPsec, PPTP, and L 2 TP – Encryption algorithms such as 168 -bit Triple DES, Microsoft Encryption (MPPE), RC 4, AES – Authentication algorithms, including MD 5, SHA-1, HMAC – Network system protocols, such as DNS, RADIUS, Kerberos, LDAP – Routing protocols – Certificate authorities – Network management using SSH or HTTP with SSL

Selection Criteria for VPN Concentrators

Selection Criteria for VPN Concentrators

Selection Criteria for Enterprise Routers • • • Number of ports Processing speed Media

Selection Criteria for Enterprise Routers • • • Number of ports Processing speed Media and technologies supported MTTR and MTBF Throughput Optimization features

Selection Criteria for a WAN Service Provider • Extent of services and technologies •

Selection Criteria for a WAN Service Provider • Extent of services and technologies • Geographical areas covered • Reliability and performance characteristics of the provider’s internal network • The level of security offered by the provider • The level of technical support offered by the provider • The likelihood that the provider will continue to stay in business

Selecting a Provider • The provider’s willingness to work with you to meet your

Selecting a Provider • The provider’s willingness to work with you to meet your needs • The physical routing of network links • Redundancy within the network • The extent to which the provider relies on other providers for redundancy • The level of oversubscription on the network • Qo. S support

Summary • A major task during the physical design phase is selecting technologies and

Summary • A major task during the physical design phase is selecting technologies and devices for enterprise networks – Remote access networks – WANs – Service providers – Devices • End user remote access devices • Central site remote access devices • VPN concentrators • Routers

Review Questions • Compare and contrast technologies for supporting remote users. • Compare and

Review Questions • Compare and contrast technologies for supporting remote users. • Compare and contrast WAN technologies. • What selection criteria can you use when purchasing internetworking devices for enterprise network customers? • What criteria can you use when selecting a WAN service provider?

This Week’s Outcomes PPP Frame Relay Cable Modems and DSL Leased Lines, SONET, Frame

This Week’s Outcomes PPP Frame Relay Cable Modems and DSL Leased Lines, SONET, Frame Relay, Metro Ethernet, ATM • Selecting a WAN Service Provider • •

Lab Assignment Due • Lab #3 August 5, 2017 Lab format Device configuration input

Lab Assignment Due • Lab #3 August 5, 2017 Lab format Device configuration input commands must precede the “show” command screen shot display. “show” screen shots of pings and device configurations. Output configuration messages.

Next week • Read Chapters 12 in Top-Down Network Design

Next week • Read Chapters 12 in Top-Down Network Design

Q&A • Questions, comments, concerns?

Q&A • Questions, comments, concerns?