.... Unit 3 Kaplan University IT530 Professor Jeffrey Robinson August 20, 2013 Abstract In this discussion we look at some of the history around frame-relay. We then look at some of the equipment necessary to create the frame relay connections, as well as how the connections work both logically and physically. Some limiting factors are discussed as well as committed information rates, burst rates, an error handling. Some of the positive aspects of frame-relay are identified along with some options for the future of WAN technologies. Frame-Relay Operating at the physical and datalink layers of the OSI model, frame relay is a high-performing WAN protocol. It was originally designed for use with ISDN integrated services digital network interfacing. It has evolved into being used on multiple types of network interfaces. In 1984 the initial proposal for frame-relay standardization was presented to the CCITT Consultative Committee on international telephone and telegraph. Because interoperability standards were lacking, frame-relay did not fully take off until the 1990s. In 1990 StrataCom, Northern Telecom, Digital Equipment Corporation (DEC), and Cisco created a consortium that focused on the technical development of frame-relay technology. While the CCITT was already discussing frame-relay, the consortium established specifications that while still conforming to the frame-relay protocol, enhanced the protocol...
Words: 2574 - Pages: 11
...320 WAN Homework Unit 1 Vocabulary Exercise: Matching (Pg 3) Matching a) When referring to clocking, the CSU/DSU is this piece of equipment Data Circuit Terminating Equipment (DTE) b) The software used by a router Cisco IOS c) Dialup and ISDN are examples of these types of networks Circuit Switching d) Describes the timing between the router and the CSU/DSU Synchronous e) Lost when a device is powered down or rebooted Contents of RAM f) Wires or other media through which data is transmitted from one place to another Serial Link g) Connects LANs to WANs Interface h) The physical connection point on networking devices where signals enter and exit Router i) A smaller, more compact physical connection physical interface specification Smart serial interface j) A WAN link contracted for use by the customer Leased Line k) Frame relay and ATM are examples of these types of networks Packet Switching l) When referring to clocking the customer’s router , this piece of equipment is used Data Terminal Equipment (DTE) m) A communications link that is outside the normal IP network, like a console cable or a phone call between two modems and the aux port. Out of Band Management n) A network that spans a large geographic region WAN o) A telecommunications path that sends 1 bit at a time Serial Interface p) The router port that connects a WAN link Bus q) A WAN service...
Words: 1202 - Pages: 5
...NETWORKS 04/13/2016 CHAPTER 7 CASE PROJECT 7-1 DESCRIBE TWO SUITABLE WAN TECHNOLOGIES FOR EACH OF WILKE’S TWO CONNECTIVITY SOLUTIONS: OFFICE-TO-OFFICE AND HOME-TO-OFFICE. MY OPTIONS THAT I RECOMMEND AND WHY? THE FIRST SOLUTION WOULD BE A FULL MESH WAN FOR OFFICE-TO-OFFICE. A MESH TOPOLOGY INCORPORATES MANY DIRECTLY INTERCONNECTED SITES. BECAUSE EVERY SITE IS INTERCONNECTED, DATA CAN TRAVEL DIRECTLY FROM ITS ORIGIN TO ITS DESTINATION. IF ONE CONNECTION SUFFERS A PROBLEM ROUTERS CAN REDIRECT DATA EASILY AND QUICKLY. MESH WANs ARE THE MOST FAULT-TOLERANT TYPE OF WAN BECAUSE THEY PROVIDE MULTIPLE ROUTES FOR DATA TO FOLLOW BETWEEN ANY TWO POINTS. A NETWORK MIGHT CHOOSE TO IMPLEMENT A PARTIAL-MESH WAN IN WHICH ONLY CRITICAL WAN SITES ARE DIRECTLY INTERCONNECTED AND SECONDARY SITES ARE CONNECTED BY STAR OR RING TOPOLOGIES. SECOND SOLUTION: A LONG-DISTANCE DIAL-UP CONNECTION FROM HOME-TO-OFFICE (DIGITAL WAN-DIGITAL SIGNAL). A DIAL-UP CONNECTION IS ONE IN WHICH A USER CONNECTS HIS/HER COMPUTER VIA A MODEM TO A DISTANT NETWORK AND STAYS CONNECTED FOR A FINITE PERIOD OF TIME. UNLIKE OTHER TYPES OF WAN CONNECTIONS, DIAL-UP CONNECTIONS PROVIDE A FIXED PERIOD OF ACCESS TO THE NETWORK AND THE TERM DIAL-UP USUALLY REFERS TO A CONNECTION THAT USES A PSTN LINE. WHAT I RECOMMEND ABOVE ALL THAT WOULD BE STRONG FOR TWO SUITABLE WAN METHODS FOR EACH OF WILKE’S CONNECTIVITY SOLUTIONS ARE MESH AND DIAL-UP WANS FROM HOME-TO-OFFICE AND...
Words: 259 - Pages: 2
...CHAPTER 2 EXAM MARINAS, KEIZHA GRACE V. CISCO 4 1. Which WAN technology is cell-based and well suited to carry voice and video traffic? VSAT ISDN Frame Relay ATM* 2 Which WAN connectivity method would be used in a remote location where there are no service provider networks? VPN WiMAX cable VSAT* 3 Which network scenario will require the use of a WAN? Employees need to access web pages that are hosted on the corporate web servers in the DMZ within their building. Employees need to connect to the corporate email server through a VPN while traveling.* Employee workstations need to obtain dynamically assigned IP addresses. Employees in the branch office need to share files with the headquarters office that is located in a separate building on the same campus network. 4 Which two technologies use the PSTN network to provide an Internet connection? (Choose two.) ATM ISDN* Frame Relay MPLS dialup* 5 Which geographic scope requirement would be considered a distributed WAN scope? regional one-to-one global local one-to-many many-to-many* 6 What are two advantages of packet switching over circuit switching? (Choose two.) A connection through the service provider network is established quickly before communications start. There are fewer delays in the data communications processes. The communication costs are lower. Multiple pairs of nodes can communicate over the same network channel.* A dedicated secure circuit is established between each pair...
Words: 834 - Pages: 4
...Definition Movement of encoded data from one point to another by means of electrical or optical transmission systems. Transfer of information from one computer to another via direct cable connection, over telephone lines, or via air. History Smoke signals Sumerian clay tablets (3300 B.C.) Greek messengers/scrolls Telegraph system Telephone system Computers Networking Science and Technology Information Institute Department of Science and Technology Overview Introduction LAN Technologies Network Transports WAN Technologies Definition Through a combination of hardware and software, networks permit information and peripherals to be shared efficiently and economically. Definition An internetwork is a collection of individual networks, connected by intermediate networking devices, that functions as a single large network. Internetworking refers to the industry, products, and procedures that meet the challenge of creating and administering internetworks. Figure illustrates some different kinds of network technologies that can be interconnected by routers and other networking devices to create an internetwork. PC LAN with Host Connection Network cable plant Workstation Host computer Virtual connection to the host Workstation to file server File server Network Architecture The OSI Model Implement a layered data communications system Establish a common basis for standards development Qualify products as open by their use of these standards...
Words: 4600 - Pages: 19
...2Lesson 2: Wide Area Networks (WANs) Objectives By the end of this lesson, you will be able to: Describe the characteristics and functions of wide area networks (WANs). Define basic signaling and transmission terminology, including analog and digital signals, Digital Signal Level Zero (DS0), broadband, baseband, multiplexing, and Digital Signal Hierarchy (DSH). Distinguish between circuit switching and packet switching, and identify various circuit-switching and packet-switching technologies. Describe the characteristics and performance of dial-up connections, including POTS and Integrated Services Digital Network (ISDN). Describe the characteristics and performance of direct connections, including leased T-carrier and E-carrier lines, cable Internet, Digital Subscriber Line (DSL), LAN connections, and fiber to the x (FTTx). Describe the characteristics and functions of Synchronous Optical Network (SONET). Describe the characteristics and functions of Asynchronous Transfer Mode (ATM). 2-2 Local Area Networks (LANs) Pre-Assessment Questions 1. Which of the following is faster than T1? a. b. c. d. 2. E1 ISDN BRI DS0 DS1 Which type of transmission uses a single channel? a. b. c. d. Broadband Digital Subscriber Line (DSL) Baseband Cable modem 3. How are digital signals measured? © 2012 CertPRESS, a division of Certification Partners, LLC — All Rights Reserved. Version 7.0 Lesson 2: Wide Area Networks (WANs) 2-3 Introduction to...
Words: 9984 - Pages: 40
...tools in ensuring the security of a modern network is the implementation of a network firewall. A network firewall is designed to allow or deny packets entry or exit to the network based on user defined rules (Beal, n.d.). Traffic can be allowed or denied entry to the network based on a variety of criteria. Traffic can be inspected and allowed, based on IP, port number, application, or its entry or exit security level (Beal, n.d.). For these reasons the internal network will be guarded by the Cisco ASA 5512-X Firewall. The ASA 5512 firewall provides up to 1Gbps throughput with stateful packet inspection with is sufficient to support the maximum speed of the networks external network connection (Cisco, n.d.). Additionally, the device supports more than one hundred thousand simultaneous connections which is many times more than required for the network (Cisco, n.d.). The Cisco ASA 5512 Firewall also provides IPS services providing a proactive defense against network intrusion (Cisco, n.d.). When properly configured this device will provide the essential...
Words: 1253 - Pages: 6
...Copy Paste Link in Your Browser https://hwguiders.com/downloads/282-week-7-individua-personal-computers-internetl/ For More Courses and Exams use this form ( http://hwguiders.com/contact-us/ ) Feel Free to Search your Class through Our Product Categories or From Our Search Bar (http://hwguiders.com/ ) Personal Computers on the Internet A personal computer can be connected to LAN (Local Area Network) by using a router. This type of network is a private network that links computers at a single location, such as at a home or office building. A computer with the LAN connection is allowed to different network components like files, software and devices like printers and fax machines with in the private area. A computer can be connected to a router using Ethernet cable, or a router can communicate wirelessly using radio waves. The Internet is wider than the LAN, basically it is network of networks, and it connects the different networks (LANs and/or MANs) available worldwide and makes them public. The internet connection is called WAN (Wide Area Network) that connects millions of smaller networks with over a billion computers connected at any given time. The most basic difference between a LAN and the Internet then, is that a LAN is private and localized, while the Internet is public and worldwide. A LAN is connected to a router using Ethernet cable but the internet links millions of networks through T1 telephone lines, fiber optic cable and other technologies. TO...
Words: 3252 - Pages: 14
...below: Method 1 Change the WAN Connection Type to Dynamic IP. Before you install the TP-Link Router, if your computer (directly connected to your ADSL\Cable modem) is abl e to access the Internet automatically without running any additional program, please use Dynamic IP as the W AN connection type.TP-LINK Router use Dynamic IP mode by default, if you didn’t change this setting before, and please skip to next method. Step1 Open the web browser and type the LAN IP address of the router in the address bar, the default IP address of TP-LINK router is 192.168.1.1, and then press Enter. Note: if you cannot access 192.168.1.1, please check the IP address of your computer or reconfigure the IP addr ess of your computer. Step2 Type the username and password in the login page, the default username and password are both admin. Note: 1. If you got a server error -401, it means you entered a wrong username or password. If you forget the user name or password that you set, you need to reset the router to factory default settings. 2. If the login page cannot display, please refer to Why I can not log into the Web-based Utility/Management P age of TP-LINK wireless router to check the problem. Step 3 Click Network->WAN in the left menu , and change the WAN Connection Type to Dynamic IP Addres s then click the Save button. Step 4 Wait for a few minutes, if it shows that the WAN port had received the IP address (shown as below), tha t means the connection...
Words: 770 - Pages: 4
...identifiable icons are used to depict common network appliances e.g. Router, and the style of lines between them indicate the type of connection. Clouds are used to represent networks external to the one pictured for the purposes of depicting connections between internal and external devices, without indicating the specifics of the outside network. For example, in the hypothetical local area network pictured to the right, three personal computers and a server are connected to a switch; the server is further connected to a printer and a gateway router, which is connected via a WAN link to the Internet.[1] Depending on whether the diagram is intended for formal or informal use, certain details may be lacking and must be determined from context. For example, the sample diagram does not indicate the physical type of connection between the PCs and the switch, but since a modern LAN is depicted, Ethernet may be assumed. If the same style of line was used in a WAN (wide area network) diagram, however, it may indicate a different physical connection. At different scales diagrams may represent various levels of network granularity. At the LAN level, individual nodes may represent individual physical devices, such as hubs or file servers, while at the WAN level, individual nodes may represent entire cities. In addition, when the scope of a diagram crosses the common LAN/MAN/WAN boundaries, representative hypothetical devices may be depicted instead of showing all actually existing nodes. For...
Words: 288 - Pages: 2
...contains a single LAN, though sometimes one building will contain a few small LANs (perhaps one per room), and occasionally a LAN will span a group of nearby buildings. InTCP/IP networking, a LAN is often but not always implemented as a single IP subnet. In addition to operating in a limited space, LANs are also typically owned, controlled, and managed by a single person or organization. They also tend to use certain connectivity technologies, primarily Ethernet and Token Ring WAN - Wide Area Network As the term implies, a WAN spans a large physical distance. The Internet is the largest WAN, spanning the Earth. A WAN is a geographically-dispersed collection of LANs. A network device called a routerconnects LANs to a WAN. In IP networking, the router maintains both a LAN address and a WAN address. A WAN differs from a LAN in several important ways. Most WANs (like the Internet) are not owned by any one organization but rather exist under collective or distributed ownership and management. WANs tend to use technology like ATM, Frame Relay and X.25 for connectivity over the longer distances. A MAN is optimized for a larger geographical area than a LAN, ranging from several blocks of buildings to entire cities. MANs can also depend on communications channels of moderate-to-high data...
Words: 719 - Pages: 3
...can be classified, based on geographical location, in the following categories: wide area network(WANS), local area networks(LAN) and metropolitan area network(MANS). Chronologically, WANs were the first network to appear. They connect computers distributed over hundred miles. They often based upon existing low quality communication links resulting in low communication speeds compared to LAN, WANs provide a limited set of services mainly file transfer and email in background rather than in real time. LANs usually cover regions within a radius of no more than 1.5 miles. They are based on expensive high quality connection links that allow simple method of data transmission at a higher speeds of data exchange (about 100mbps) than allowed by WANS usually LANs provide a range of services implemented online. MANs are intended for serving large cities. Being characterized by rather long distances between network nodes (sometimes 10 miles) they also provide high quality communications links and support high speed of data exchange. MANs ensure economic and efficient connection of LANs providing them accesses to WANs. The most important stage in the evolution of computer network was the arrival of standard networking technologies. These include Ethernet. FDDI and Token ring these technologies allow different types of computers to connect quickly and efficiently. During 1980s LANs and WANs were characterized by significant...
Words: 626 - Pages: 3
...standards b. All cabling runs must be uninterrupted and without splices c. Where cabling is to be enclosed in a solid wall, the cables should be installed within a conduit for a additions or reconfigurations 3. General Specifications a. Data cable (CAT-6 UTP) i. Terminating method: CAT-6 socket 1. Green/White (1) 2. Green (2) 3. Orange/White (3) 4. Blue (4) 5. Blue/White (5) 6. Orange (6) 7. Brown/White (7) 8. Brown (8) ii. Each data point should have all 4pairs assigned and terminated as per ANSI/TIA/EIA-568-B standards b. Cables Labeling i. Data plates 1. On each face plate a unique number will be used to indicate the data’s location of cable termination on the patch panel 2. The data ports will be marked with orange labeling for each data connection ii. Wiring labels 1. Each cable will be sequentially numbered at each end to depict the cable number 2. Labeling should be completed with white on black colored labels 4. Data Cabling a. Unshielded Twisted Pair (10BaseT, 100BaseT, & 1000BaseT) i. Grade of cable - UTP CAT-6 cable ii. Termination - Internal cabling: segment of UTP Ethernet may not exceed 90 meters 5. Cables entering building a. The point of entry should be inaccessible to the public....
Words: 6096 - Pages: 25
...GENERAL QUESTIONS (Q1-Q4) Q1: How many LANs and WANs are forming the enterprise network? LANs: __________ WANs: _____________ Q2: How many subnetworks do you see? Answer: __________ subnetworks List the subnetworks: Q3: When PC1 communicates with Server 1, how many data links a message has to go through? Answer: __________ data links When PC1 communicates with Server 1, how many physical links a message has to go through? Answer: __________ physical links When PC1 communicates with Server 3, how many data links a message has to go through? Answer: __________ data links When PC7 communicates with Server 2, how many different routes a message can take? Answer: __________ routes Q4: What physical topology is used to interconnect the four routers? ____________________ SECTION 2: NOW, CREATE ALL NETWORK NODES (PCS, SERVERS, ROUTERS, AND SWITCHES) ON PACKET TRACER. NO CABLING YET. CHANGE ALL LABELS OF NETWORK NODES AS IN THE FIGURE. Questions (Q5-Q12) based on the R2 (1841 Router) in “out-of-the-box condition”. Q5: How may Ethernet ports does the 1841 router have initially? Answer: __________ Q6: What are the port (interface) names assigned to the Ethernet ports? Answer: Q7: What are MAC addresses of Ethernet ports (or LAN ports)? Do not worry about VLAN1 now. Q8: How may WAN ports (also called Serial ports) does the router have? Answer: _________ Q9: Do LAN/WAN ports have an IP address? Answer: _________ Q10: Are LAN/WAN ports currently up or down? Answer: _________ ...
Words: 1354 - Pages: 6
...NT2580 Week 2 Essay Create a Remote Access Policy Definition NT2580 The requirements for establishing a secure connection between remote locations vary between organizations. The needs of the organization are based on the type of information and data being transferred, as well as the sensitivity of the information. There are several options available to networks to get their data sent securely and reliably. All seven layers of the OSI model must be taken into account when designing secure Remote Access Control Policies. In order to create a secure remote connection between offices in Atlanta, San Francisco, Chicago, and Dallas, a WAN link would be the best type of connection. A dedicated WAN link would offer the organization a secure, reliable, dedicated P2P type of connection. Wide Area Network links would be monitored by the owners of the lines that connect each location. Leased lines from the providers will allow for scalability with potential growth. The downside to this type of connection is the expense and an internet connection is not necessarily provided by the link. In order to add to the security of the network physical and logical access controls are necessary. Logical implementations added to the network will be Acceptable, Email, and Wireless Use policies, Antivirus and firewall software, as well as Extranet, Interconnection, and Host Security. In order to ensure the physical assets, as well as employees, physical security must also be considered. Locked...
Words: 704 - Pages: 3