WAN, VPN and Security Technologies
128 Kbps (BRI)
Digital Service over existing
telephone wire. Still a dial
Data Link Protocol. Both LAN
25.6 Mbps tp 2.46 Gbps
53 Byte Cells. Can use ot
services like leased lines and
SONET as well.
64 Kbps to 1.544 Mbps
Connect to Cloud and creat
Permanent Virtual Circuits
T Carrier/ E Carrier
Defines securing data over LAN using Authentication and Encryption.
Uses two protocols that insert headers into IP datagram. IP
d and IP Encapsulating Security Payload. Provides
End to End security. Both source and destination must be running
Virtual Private Networking (VPN) protocol that tunnels but has no built
in encryption. UDP (Transport
Layer) datagrams usually encapsulated
with IPSec ESP Protocol. Supports multiple network Layer protocols
(Like IP and IPX)
Point to Point
Point Tunneling Protocol (PPTP) is a popular VPN tunneling
protocol. PPTP is des
igned to establish a private channel between
communicating systems (usually a client and a server computer) in a
public network like the Internet. The protocol encapsulates data and
information/control packets using the Internet Generic Routing
on protocol version 2 (GREv2).
Protocol Designed to Secure data as it passes over network. Only
encrypts data exchanged between web servers and clients.
Authentication Protocol that directory services use to provide
sign on. The
Kerberos program acts as a trusted third party that knows
and will vouch for the identities of the organizations that want to
communicate. When two parties want to communicate, they go to the
ncipals and issue a session
key for them to use. The principals can then use the
algorithms to talk to each other.