9781423901402_PPT_Ch12 - Information Technology in Theory...

Info iconThis preview shows pages 1–10. Sign up to view the full content.

View Full Document Right Arrow Icon
Chapter 12 Wide Area Networks Information Technology in Theory By Pelin Aksoy and Laura DeNardis
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
2 Objectives Understand the concept of a wide area network Identify the main technical components of a wide area network Distinguish between packet switching and circuit switching Understand virtual private networks (VPNs) Information Technology in Theory
Background image of page 2
3 Objectives (continued) Gain familiarity with the most important commercial WAN services Understand WAN access technologies, including dedicated lines, xDSL, cable modem access, and WiMAX Identify important network management functions Information Technology in Theory
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
4 WAN Background Industry convention describes a WAN as a network that spans a large geographical distance The largest example of a WAN is the public Internet, but many other types of WANs exist Wide area networking is sometimes referred to as enterprise networking Information Technology in Theory
Background image of page 4
5 WAN Background (continued) Wide area networking developed from the way businesses first used computer networks to exchange information internally, beginning in the mid-1970s Several architectural features distinguished these networks from modern WANs WANs now support voice, data, and multimedia information; use open network protocols; and often are offered over a public network such as the Internet Information Technology in Theory
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
6 Packet Switching Information sent over the Internet is broken into small segments called packets Each packet contains the actual information content to be transmitted, as well as the order of the packet, the sender’s binary address (called the source address), and the binary address of the packet’s destination (called the destination address) Information Technology in Theory
Background image of page 6
7 Packet Switching (continued) The path that one packet traverses over a network from source to destination may be different from the next packet’s path, depending on network congestion or other conditions In this type of networking approach, known as connectionless packet switching , no dedicated end- to-end physical connection is established for the duration of data transmission Information Technology in Theory
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
8 Packet Switching (continued) Network devices called routers read the destination address and determine how to expeditiously route packets through the networks, based on routing algorithms that are designed to minimize latency Routers are also designed to minimize hops , the number of times a packet traverses various routers as it is transmitted over a network Once all the packets from a given transmission reach their destination, they are reassembled in correct order Information Technology in Theory
Background image of page 8
9 Packet Switching (continued) The packet-switching approach contrasts with the circuit-switching approach of the traditional telephone network The circuit-switching approach establishes a physical, dedicated end-to-end path through the network
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 10
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 52

9781423901402_PPT_Ch12 - Information Technology in Theory...

This preview shows document pages 1 - 10. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online