Internet, WAN data channels

Global networks are designed specifically for data transfer. They cover vast territories and many computers. They are used to combine disparate channels into a single system that helps people interact through computers, being in different parts of the world. Data channels are designed for access to the global Internet and for interaction in corporate internal networks using the same technologies.

Purpose of data transmission channels

Regional network - designed to connect users over a considerable distance within the same administrative, geographical area. Appointment - specialized.
Global network - covers subscribers at a considerable distance, which includes different geographical areas. Purpose - the union of regional networks and channels into a single global Internet network.
Both networks are regulated by control centers, which are responsible for the operation of packet data transmission channels, interaction efficiency, speed and communication routes between individual subscribers. To do this, host nodes are installed in network nodes that distribute the load — computing systems for many users, and switches — special computers that connect subscriber points to the World Wide Web.
Such separate channels within the network are designed to reduce the load; they connect subscribers in a roundabout way, bypassing the control center.

System elements

  1. Internet access providers and service providers.
  2. Physical data transmission channels:
  • wireless;
  • wired.
  1. Equipment for connecting to the network:
  • Switches - devices for connecting two or more computers to a node network within its segments; operate on the basis of the second level of the OSI model and bridge technologies (multiport bridges).
  • Routers - devices are designed to coordinate among themselves several network nodes. This is a specialized computer equipped with network interfaces. Models with a third level of OSI connect several networks.
  1. VPN tunnels are logical channels of interaction.

What are VPN tunnels?

So generically called technologies that provide network logical connections on top of the first network, like the Internet. Another name is WAN channels.
The virtual (logical) network is based on cryptography technology - a set of protection against hacks, repetitions and changes in packet information that is transmitted by users. To do this, use: encryption, public key infrastructure, authentication. Unlike connecting to a regular network, where the degree of trust is important (public or home network, etc.), cryptography eliminates the need for additional control of connected devices and core networks.
Using different connection protocols, using VPN create three types of messages:
  • network - network;
  • node - network;
  • node - node.

Encryption methods

  1. PPTP - the method guarantees the creation of a secure connection over the Internet. Two types of encryption protocols are involved:
  • MPPE (Microsoft Point-to-Point Encryption), which is compatible with the first / second version of MSCHAP;
  • EAP-TLS helps create a secure connection for users between themselves and directly to the server. To do this, coordinate the length of the parameters and the key.
  1. MPPE - a method designed to create a secure connection for users who transfer data via the Internet. To do this, use encryption keys with a length of 40, 56 and 128 bits, which are automatically changed for all packet transmissions. The minimum length (40 bits) is suitable for older versions of the Windows operating system.
The protocol is designed for serial data transfer (point-to-point), at which information loss is minimized. The new key is calculated based on the decryption of the previous data packet.
You cannot use the MPPE protocol to build virtual networks through physical networks: data packets arrive in an altered sequence. Therefore, the PPTP protocol is used to change the order of transmission of data packets in encryption keys, creating independent decryption. Both protocols are used in different operating systems (BSD, MicrosoftWindows and others), with a difference in the VPN operation algorithms.
Using the connection “tunneling - authentication - encryption" it becomes possible to transfer information between two clients of the global network, through modeling local (virtual). This creates a secure private network.

What are we doing?

  1. We study the company's business processes:
  • determine the nature of the internal message of the organization’s team;
  • find out the number and location of branches, within the state and abroad;
  • find out ways and channels of interaction with customers.
  1. We analyze your data transmission system:
  • carry out an inventory of equipment and connections;
  • test the speed and stable data transmission through physical channels;
  • take an inventory of technical documentation, improve the system or develop from scratch;
  • determine the technical possibilities of interaction with a second Internet provider;
  • developing an optimal plan for organizing a physical data transmission channel (wired or wireless) for internal and external communication of employees.
  1. We are preparing a complete solution for the company
  1. fault tolerant Internet access channels;
  • correction of load balance on access channels;
  • коррекция баланса нагрузки на каналы доступа;
  • creation of encrypted tunnels that connect computers within the local Internet network.
  1. Estimate: the cost of work and supplies, equipment Mikro Tic.
  2. Project documents.
4. The final stage - the technical implementation of the project to create an external and internal network for your company.
Form not found or is not published
Found a typo? Please select it and press Ctrl + Enter.