Studying Wide Area Networks in the Classroom

The Sangoma WAN EduKit allows one computer to emulate both sides of a WAN network, independently of other hardware.

Networking currently is taught at many places, and the majority of hands-on learning is done with local area networks (LANs). Even though wide area networks (WANs) are commonly used, course work typically is limited to theory, and students receive little or no practical experience using them. Reasons for this include the high cost of deploying and maintaining a WAN, the lack of WAN test equipment that runs on PC hardware and the impracticality of maintaining commercial data lines for strictly experimental purposes.

One product available for overcoming the obstacles in creating WAN labs is the Sangoma WAN EduKit. Seneca College of Applied Arts & Technology in Toronto is one educational center that is using this toolkit to successfully increase the number of WAN labs available for student use.

WAN Basics

A wide area network connects LANs that are typically separated by great distances. The best known example of a WAN is the Internet itself. A smaller-scale example is a network that connects a company's corporate headquarters with branch offices in other cities.

The actual connection (e.g., a leased line or satellite) between the points is handled by a provider, such as the telephone company. The carrier has a point of presence (POP) at each end of the link to which the company connects their equipment.

At each separate site, a company would configure a router containing a WAN adapter card to connect to their carrier's POPs. WAN adapters can communicate over the provider's network using a variety of protocols, including frame relay, HDLC, X.25, SDLC, BSC, PPP and SS7. Because the Sangoma WAN EduKit provides software and sample labs for frame relay and X.25, these protocols are explained briefly below.

Frame Relay Protocol

Frame relay is a simplified form of packet switching in which synchronous frames of data are routed to different destinations depending on header information. When frame relay is used to communicate over a WAN, the computers containing the WAN adapters are called customer premises equipment (CPE). These connections are identified by a number called a data link connection identifier (DLCI).

Once the hardware is in place to connect each office to the carrier's POPs, a path is established that allows information to be routed between them. This path is called a permanent virtual circuit or PVC, and it is always on as long as the equipment is working. The DLCI is used by the CPE to indicate which of the potentially several different PVCs configured by the provider is the correct recipient of the frame.

The maximum rate at which the carrier guarantees packets can be transmitted over the PVC without packet loss is called the committed information rate (CIR). Some providers offer the capability to specify different CIRs for inbound and outbound traffic along the PVC.

Because frame relay doesn't guarantee packet integrity, it can switch packets end to end much faster than X.25. For packet integrity, the company's routers could use a protocol such as TCP/IP to create packets encapsulated within the frame transmitted over the WAN.

X.25 Protocol

The X.25 protocol is a packet switching protocol that defines an international recommendation for the exchange of data as well as control information. X.25 guarantees data integrity and network managed flow at the cost of some network delays.

Figure 1. A line trace monitor screen, showing decoded HDLC level frames and X.25 level packets.

The computer connected to the carrier's POP is known as the data terminal equipment (DTE), and the network node is called data circuit terminating equipment (DCE). Connections over the network occur on logical channels of two types: switched virtual circuits (SVCs) and permanent virtual circuits (PVCs).

Figure 2. An X.25 packet statistics screen.

SVCs are similar to telephone calls; a connection is established, data is transferred and the connection is released. Each DTE on the network is given a unique DTE address that can be used like a telephone number. X.25 PVCs operate in the same manner as the PVCs discussed in the frame relay section.

Figure 3. An X.25 tester screen showing the various X.25 functions that may executed and an X.25 status window.

X.25 uses a store-and-forward mechanism that allows DTEs to have different line speeds, but this can introduce a noticeable delay when the blocks transferred between them are small. The store-and-forward mechanism also has a large requirement for buffering, which can make X.25 less cost-effective than frame relay.

Figure 4. A screen showing a history of X.25 asynchronous transactions.

For more information on wide area networks, I recommend reading Linux Routers written by Tony Mancill and published by Prentice Hall PTR.



Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.


sathishkumarjo's picture

Explains good about WAN and protocols.. X.25 and Frame relay.
Its quite small explanation. Can be explained in details or can give some more snapshots

One Click, Universal Protection: Implementing Centralized Security Policies on Linux Systems

As Linux continues to play an ever increasing role in corporate data centers and institutions, ensuring the integrity and protection of these systems must be a priority. With 60% of the world's websites and an increasing share of organization's mission-critical workloads running on Linux, failing to stop malware and other advanced threats on Linux can increasingly impact an organization's reputation and bottom line.

Learn More

Sponsored by Bit9

Linux Backup and Recovery Webinar

Most companies incorporate backup procedures for critical data, which can be restored quickly if a loss occurs. However, fewer companies are prepared for catastrophic system failures, in which they lose all data, the entire operating system, applications, settings, patches and more, reducing their system(s) to “bare metal.” After all, before data can be restored to a system, there must be a system to restore it to.

In this one hour webinar, learn how to enhance your existing backup strategies for better disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible bare-metal recovery solution for UNIX and Linux systems.

Learn More

Sponsored by Storix