WAN Communications

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *

Already have an account? Sign In »

9 hours 49 minutes
Video Transcription
Our last section here is W. A N Technologies.
The vast majority of this course focuses on the Elian because we as network technicians, spend most of our time on the land.
We want a basic understanding of what happens when traffic leaves our network. If we're connecting to a branch office or if we're connecting out to the Internet or some other environment, we have to have an upper level understanding.
if we talk about when and communication, we generally have two options circuit switching networks or packet switching networks
and a circuit switching network. Anything that uses the telephone companies links will be a circuit switch network.
If you think about it. If I call my friend in Seattle, the entire voice calls through a series of switches. But the entire amount of voice data travels through the same set of switches types of networks that use this or dial up. But also I S D N networks are circuit switched the T carriers, which are T one and T three, and we have e carriers in Europe.
Anything that uses the Pots Network, which, if you're not familiar with that acronym, it's probably the most ridiculous acronym of all time.
The Pots Network is simply the plain old telephone system it's going to be circuit switched.
The alternative to circuit switch is packet switch with packet switching. Your data is chunked into packets, and each packet finds its best way to the destination.
The benefit is you get a decent speed improvement because the pathway that's best at the very beginning may not be the pathway that's best at the end. So every packet finds its best destination
frame relay and E. T. M. We're too early technologies that use packet switching.
More importantly, anything that's based on I p So all your I P networks are going to use packet switching.
Just about everything that we use today is going to be a packet switched network.
One of these is a VoIP network voice over I. P. We, at one point in time wanted to take a digital data and send it across analog phone lines, and then everything turns digital. So now we want to take that analog voice and put it on digital lines.
We've really always tried to run these two different signaling types across the same line, but they're not compatible, so we have to have some sort of conversion with VoIP. We call that telephone E
our smartphones of the devices that really do that conversion for us back when we're connecting across analog lines were using Bonhams. VoIP used RTP, which stands for real time transfer protocol. And that's the protocol, which exchanges data and it does not secure by default.
We need to add security to devices that were developed in an unsecure manner,
the same idea that's been coming up.
We move on to multi protocol label switching, and this is a technology that's replacing a lot of the branch to Branch VPNs. So instead leasing a provider network.
The benefit of these labels is once again quality of service, being able to prioritize certain types of traffic over others. So that way we can get most of our bandwidth, and we have the most efficient communication.
What we see here is we have to networks and then in the middle. That's the providers, Mpls Domain or network, and ultimately, on the border of our network, we have something called a label edge router.
That little edge router is going to be what assigns the label to the traffic again based on prioritization needs.
It then goes through a pathway of various routers, and we call that pathway a label switching path
on the other end. It comes out through a label edge router that strips away the label and passes the data along to the IP network.
This is just a provider network that we use to connect office to office because we're not transmitting across public Internet like we would with a VPN. We have some additional security as well.
When we're talking about W. A N and Elian traffic, there is a point called the Demarcation Point or the D Mark and that mark. It's the point where the Elian ends and the W A N begins.
We need a device that takes this land traffic and connects us out to our service providers networks that we can participate or send traffic across the land.
We use T carriers like T one or T three lines use something called a channel service unit data service unit, and that would connect us specifically to the data terminal equipment that really was our router. In most instances,
there's also a tool called Smart Jack that allows the W A N provider to diagnose, possibly even reconfigure elements of our land connection.
The last topic we look at is software defined networking software. Defined networking is an arena that is just becoming more and more popular today because what we're looking at is moving towards a virtualized environment where everything that we do is essentially virtual with software defined network being able to control our network configuration through the use of software tools
as opposed to cabling and re cabling,
and going to specific routers and logging onto those routers with credentials. And using the command language native to that router switch is now going to be a matter of clicking drug interfaces and reconfiguring our network with a mouse. That's the direction that we're headed, and it's already there were certainly beginning to see that utilize more and more with cloud computing.
This was a massive module. Massive, massive, massive module are key takeaways. We looked at static routing, which requires we create a manual route throughout the route. Add command to specify were routers send their traffic. We can also enable dynamic routing protocols like R I P O S P F or B G P, that allows the routers to learn the network environment in the best path for themselves.
Many routers, but also firewalls and proxy servers, offer a service called N a T Network address Translation, which works with port address translation.
Ultimately, that allows hosts to hide behind a NAT device. All traffic presents itself with the source address of the NATS Devices external interface. So it kind of keeps us safe behind that.
We also looked at lan connectivity and talked about circuit switch versus packet switch networks and then discuss software defining networking and that being the way of the future with virtualization
Up Next