Studying Wide Area Networks in the Classroom
Networking currently is taught at many places, and the majority of hands-on learning is done with local area networks (LANs). Even though wide area networks (WANs) are commonly used, course work typically is limited to theory, and students receive little or no practical experience using them. Reasons for this include the high cost of deploying and maintaining a WAN, the lack of WAN test equipment that runs on PC hardware and the impracticality of maintaining commercial data lines for strictly experimental purposes.
One product available for overcoming the obstacles in creating WAN labs is the Sangoma WAN EduKit. Seneca College of Applied Arts & Technology in Toronto is one educational center that is using this toolkit to successfully increase the number of WAN labs available for student use.
A wide area network connects LANs that are typically separated by great distances. The best known example of a WAN is the Internet itself. A smaller-scale example is a network that connects a company's corporate headquarters with branch offices in other cities.
The actual connection (e.g., a leased line or satellite) between the points is handled by a provider, such as the telephone company. The carrier has a point of presence (POP) at each end of the link to which the company connects their equipment.
At each separate site, a company would configure a router containing a WAN adapter card to connect to their carrier's POPs. WAN adapters can communicate over the provider's network using a variety of protocols, including frame relay, HDLC, X.25, SDLC, BSC, PPP and SS7. Because the Sangoma WAN EduKit provides software and sample labs for frame relay and X.25, these protocols are explained briefly below.
Frame relay is a simplified form of packet switching in which synchronous frames of data are routed to different destinations depending on header information. When frame relay is used to communicate over a WAN, the computers containing the WAN adapters are called customer premises equipment (CPE). These connections are identified by a number called a data link connection identifier (DLCI).
Once the hardware is in place to connect each office to the carrier's POPs, a path is established that allows information to be routed between them. This path is called a permanent virtual circuit or PVC, and it is always on as long as the equipment is working. The DLCI is used by the CPE to indicate which of the potentially several different PVCs configured by the provider is the correct recipient of the frame.
The maximum rate at which the carrier guarantees packets can be transmitted over the PVC without packet loss is called the committed information rate (CIR). Some providers offer the capability to specify different CIRs for inbound and outbound traffic along the PVC.
Because frame relay doesn't guarantee packet integrity, it can switch packets end to end much faster than X.25. For packet integrity, the company's routers could use a protocol such as TCP/IP to create packets encapsulated within the frame transmitted over the WAN.
The X.25 protocol is a packet switching protocol that defines an international recommendation for the exchange of data as well as control information. X.25 guarantees data integrity and network managed flow at the cost of some network delays.
The computer connected to the carrier's POP is known as the data terminal equipment (DTE), and the network node is called data circuit terminating equipment (DCE). Connections over the network occur on logical channels of two types: switched virtual circuits (SVCs) and permanent virtual circuits (PVCs).
SVCs are similar to telephone calls; a connection is established, data is transferred and the connection is released. Each DTE on the network is given a unique DTE address that can be used like a telephone number. X.25 PVCs operate in the same manner as the PVCs discussed in the frame relay section.
X.25 uses a store-and-forward mechanism that allows DTEs to have different line speeds, but this can introduce a noticeable delay when the blocks transferred between them are small. The store-and-forward mechanism also has a large requirement for buffering, which can make X.25 less cost-effective than frame relay.
For more information on wide area networks, I recommend reading Linux Routers written by Tony Mancill and published by Prentice Hall PTR.
- The Tiny Internet Project, Part I
- Machine Learning with Python
- SUSECON 2016: Where Technology Reigns Supreme
- Download "Linux Management with Red Hat Satellite: Measuring Business Impact and ROI"
- Free Today: September Issue of Linux Journal (Retail value: $5.99)
- Bitcoin on Amazon! Sort of...
- Android Browser Security--What You Haven't Been Told
- Securing the Programmer
- The Many Paths to a Solution
Pick up any e-commerce web or mobile app today, and you’ll be holding a mashup of interconnected applications and services from a variety of different providers. For instance, when you connect to Amazon’s e-commerce app, cookies, tags and pixels that are monitored by solutions like Exact Target, BazaarVoice, Bing, Shopzilla, Liveramp and Google Tag Manager track every action you take. You’re presented with special offers and coupons based on your viewing and buying patterns. If you find something you want for your birthday, a third party manages your wish list, which you can share through multiple social- media outlets or email to a friend. When you select something to buy, you find yourself presented with similar items as kind suggestions. And when you finally check out, you’re offered the ability to pay with promo codes, gifts cards, PayPal or a variety of credit cards.Get the Guide