• Skip to main content
  • Skip to primary sidebar
  • Skip to secondary sidebar
  • Skip to footer

Computer Notes

Library
    • Computer Fundamental
    • Computer Memory
    • DBMS Tutorial
    • Operating System
    • Computer Networking
    • C Programming
    • C++ Programming
    • Java Programming
    • C# Programming
    • SQL Tutorial
    • Management Tutorial
    • Computer Graphics
    • Compiler Design
    • Style Sheet
    • JavaScript Tutorial
    • Html Tutorial
    • Wordpress Tutorial
    • Python Tutorial
    • PHP Tutorial
    • JSP Tutorial
    • AngularJS Tutorial
    • Data Structures
    • E Commerce Tutorial
    • Visual Basic
    • Structs2 Tutorial
    • Digital Electronics
    • Internet Terms
    • Servlet Tutorial
    • Software Engineering
    • Interviews Questions
    • Basic Terms
    • Troubleshooting
Menu

Header Right

Home » Networking » Routing » Network Using Wan and Network Services
Next →
← Prev

Network Using Wan and Network Services

By Dinesh Thakur

The major objective of network design is to select the network service and to determine the transmission speed for the system. Following are the typical examples of network using WAN and network services:

We’ll be covering the following topics in this tutorial:

  • Host to Terminal Connection
  • LAN to LAN Connection
  • Remote LAN Connection
  • LAN to LAN Connection
  • Routing Method
  • Local Routing

Host to Terminal Connection

The host to terminal connection is a conventional type of connection between a mainframe and dumb terminals. This connection is widely used for routine work. Fixed message length, for example, makes estimation of traffic easy. As terminals are relatively slow, telephone network, low speed leased line, packet switching network, ISDN and so on are mainly used. A terminal controller (TC) may be used to integrate two or more terminals for connection with a high-speed line. The TC shown is used to integrate two or more terminals for connection with a single WAN line.

Host to Terminal Connection

LAN to LAN Connection

The configuration is used to connect LANs that are remote from one another. There is a large difference in transmission speed between LAN and WAN. In addition, using a high speed line can become substantially expensive. Therefore, proper arrangements must often be made to reduce traffic within the WAN. Leased line, ISDN, and frame relay are mainly used for this connection.

                                 LAN-to-LAN Connection

Remote LAN Connection

The configuration is mainly used to connect a remote LAN and PC. Due to the limited number of terminals to be connected and also due to restrictions on allowable expense, the types of WAN that can be used are also limited. In general ISDN is frequently used. Some servers are exclusively designed for the access purpose.

Remote LAN Connection

LAN to LAN Connection

Router Concepts

A router has two functions as follows:

  • Forwarding Function It is a function that allows selection of the appropriate route based on IP header information and sends packets through this route.
  • Filtering Function It is a function that allows dumping of invalid packets for a specific network instead of forwarding.

Forwarding Function

The most important processing in forwarding is to determine the route. In general, routing refers to the processing used for determining the next hop (IP address of next router). Here, we consider that the processing for sending packets to the host in the same network is also performed as an integral part of routing. Routing in the same network may be termed as local routing.

The routing is simple if the destination address of the host is in the same subnet. However, if it is not in the same subnet the packet must be sent to the boundary router first. The boundary router references the routing table to determine the next hop. Routing table varies in configuration depending on the routing method used. In this section we will understand the typical hop-by-hop routing table.

The routing table possessed by a router includes combination of destination address and the next hop that corresponds to that address.

The routing table for router a (address 138.25.10.1).This table lists destination addresses for each local network, and not for each destination· host. This table also includes as the next hop (the address of next router) to which the packet must be transferred. If no hops are included, this means that the destination network is directly connected to the router.

When router A receives a packet, it tracks this table to perform routing. For example, if the packets addressed to the host of network 138.25.40.0, then router A sends the packet to router C (138.25.30.1). Router C has a similar routing table so that it can perform routing.

                                        Forwarding Function

Filtering Function

The second function available with a router is that it can filter packets to determine whether they can pass through it. For example, consider that there are two networks connected via router.

Now, we impose the following conditions:

1. Hosts A and C cannot communicate using UDP packets

2. Host B cannot use FTP for communication with host D

3. Host C cannot communicate with host A

4. Host D can communicate with host B only using TELNET.

In this case the network administrator sets the router as given below:

Exclusion List

(Source host == A, Destination host == C, Protocol == UDP)

(Source host = C, Destination host = A, Protocol = UDP)

(Source host = B, Destination host = D, Port = FTP)

(Source host == D, Destination host = A)

Inclusion List

(Source host = D, Destination host = B, Protocol = TELNET)

Filtering Function

Routing Method

Routing plays a major role in the forwarding function. This can be divided into following two methods:

  • Static routing: Routing information is manually specified. It provides fixed route information to each router. If there is no change in route, it is made manually.
  • Dynamic routing: Routing information is automatically updated by routers when changes are made to the network configuration. It is convenient, as it does not involve human intervention in case of changes to the network configuration. Its disadvantage, however, is that the overhead required to send configuration change information can be a heavy burden.

Local Routing

If a packet sent from the source host is addressed to a host in the same subnet, the IP layer of the source host must obtain the MAC address of the destination host.

If a packet is addressed to a host outside the subnet of the originating host, the IP layer must search for a router to relay the packet and obtain the MAC address of that router to send the packet. Therefore, processing required for transferring a packet from the source host to the destination host or to the relaying router is called local routing.

When host A communicates’ with host B over the same LAN, addresses are specified as shown below:

Originating host IP address = A (ip), Originating host MAC address = A (mac)

Originating host IP address = B (ip), Originating host MAC address = B (mac)

On the other hand, when host A needs to communicate with the host C via router R, communication is. achieved in 2 stages, first from host A to router R, and then router R to host C.

Host A Router R

Source host IP address = A (ip), Source host MAC address = A (mac)

Destination host IP address = C (ip), Destination host MAC address = R (mac)

Router A Host C

Source host IP address = A (ip), Source host MAC address = R (mac)

Destination host IP address = C (ip), Destination host MAC address = C (mac)

It is important to note that MAC addresses change while IP addresses remain the same.

Local Routing

You’ll also like:

  1. What is a Wide Area Network (WAN)? – Difference between WAN and LAN
  2. WAN Ethernet Network
  3. Network Security Services– What is Network Security Services?
  4. Explain the Features and Form of Integrated Services Digital Network (ISDN).
  5. What is a Communication Network? Network Effectiveness Criteria
Next →
← Prev
Like/Subscribe us for latest updates     

About Dinesh Thakur
Dinesh ThakurDinesh Thakur holds an B.C.A, MCDBA, MCSD certifications. Dinesh authors the hugely popular Computer Notes blog. Where he writes how-to guides around Computer fundamental , computer software, Computer programming, and web apps.

Dinesh Thakur is a Freelance Writer who helps different clients from all over the globe. Dinesh has written over 500+ blogs, 30+ eBooks, and 10000+ Posts for all types of clients.


For any type of query or something that you think is missing, please feel free to Contact us.


Primary Sidebar

Networking

Networking Tutorials

  • Network - Home
  • Network - Uses
  • Network - Advantages
  • Network - Classification
  • Network - Architecture Type
  • Nework - Networks Vs Comms

Networking Devices

  • Network - Modem
  • Network - Routers Types
  • Network - Bluetooth
  • Network - RS-232C
  • Network - Hub
  • Network - Devices
  • Network - Bridges
  • Network - Repeaters
  • Network - Routers
  • Network - Switching Hubs
  • Network - Transceiver
  • Network - Multiplexer
  • Network - Gateway
  • Network - BNC Connector
  • Network - Optical Connectors
  • Network - NICs
  • Networking Protocol

  • Protocol - Definition
  • Protocol - IP
  • Protocol - Aloha
  • Protocol - MAC Layer
  • Protocol - Sliding Window
  • Protocol - Stop & Wait
  • Protocol - Network Protocols
  • Protocol - Token Passing
  • Protocol - SIP
  • Protocol - Ad-Hoc Networks Routing
  • Protocol - Lap-f
  • Protocol - Point-to-Point
  • Protocol - PPP
  • Protocol - PPP Phases
  • Protocol - LDP
  • Protocol - MPLS
  • Protocol - MPOA
  • Protocol - HDLC
  • Protocol - Distance Vector routing
  • Protocol - IGMP
  • Protocol - ICMP
  • Protocol - SLIP
  • Protocol - DVMRP
  • Protocol - SDLC
  • Protocol - Routing
  • Protocol - UDP
  • Protocol - ARP and RARP
  • Protocol - Link-State
  • Protocol - ARP Table
  • Protocol - RTP
  • Protocol - NHRP
  • Network Addressing

  • Addressing - Home
  • Addressing - SubNetting
  • Addressing - Classless
  • Addressing - Classes or Classful
  • Addressing - IPV4 vs IPV6
  • Addressing - IPv6
  • Addressing - Subnet Mask
  • Addressing - MAC Address
  • Addressing - Supernetting
  • Addressing - Private IP
  • Addressing - IPv4
  • Addressing - Public IP
  • Addressing - Multihomed
  • Addressing - Indirect Addressing
  • Addressing - ASP
  • Addressing - VLSM
  • Addressing - Routing Algorithms
  • Addressing - Hierarchical Routing
  • Addressing - Routing
  • Addressing - Distributed Routing
  • Addressing - Data Routing
  • Addressing - Services
  • Addressing - IP forwarding
  • Addressing - Aging
  • Addressing - Algorithm CR
  • Networking Media

  • Transmission - Home
  • Transmission - Modes
  • Transmission - Media
  • Transmission - System
  • Transmission - Bound
  • Transmission - Unbound
  • Transmission - Baseband
  • Transmission - Wired
  • Transmission - Fiber Benfits
  • Transmission - Infrared
  • Transmission - UnGuided
  • Transmission - Microwave
  • Transmission - Infrared
  • Transmission - Radio Wave
  • Transmission - Network
  • Transmission - Digital Signal
  • Transmission - Data
  • Transmission - Asynchronous
  • Transmission - Sync Vs Async
  • Cable - Twisted-Pair
  • Cable - Coaxial
  • Cable - UTP and STP
  • Cable - Fiber Optics
  • Cable - Gigabit Ethernet
  • Cable - Fast Ethernet
  • Cable - Ethernet Cable
  • Cable - Fiber-Optic Using
  • Cable - CATV
  • Cable - 100Base T
  • Cable - 10BASE T
  • Cable - 10 Base 2
  • Cable - 10 Base 5
  • Networking Types

  • IEEE - 802.11
  • IEEE - 802.5
  • IEEE - 802.15
  • IEEE - 802.11e
  • IEEE - 802.11n
  • Network - Ethernet
  • Network - Arpanet
  • Network - Frame Relay
  • Network - X.25
  • Network - Telephone
  • Network - WSN
  • Network - Metro Ethernet
  • Network - WAN Ethernet
  • Network - Wireless Mesh
  • Network - SAN
  • Network - SNA
  • Network - Cisco Architecture
  • Network - Vlan
  • Network - FDDI
  • Network - 100VG-Any
  • Network - EPON
  • Network - ISDN
  • Network - ARCNet
  • Network - Passive Optical
  • Networking Reference Models

  • Models - TCP/IP
  • Models - OSI
  • Models - MAC Layer
  • Models - Network Layer
  • Models - MAC Layer Functions
  • Models - TCP/IP Vs OSI
  • Models - CSMA
  • Models - CSMA/CD
  • Models - CSMA/CA
  • Models - CDMA
  • Models - STDM
  • Models - FDMA
  • Models - TDMA
  • Models - SDH
  • Models - CDM
  • Models - Multiplexing
  • Models - Reference
  • Models - Random Access Methods
  • Models - TCP/IP Architecture
  • Models - FDM
  • Models - IP Header
  • Models - OTN
  • Models - Amplitude Levels
  • Models - MIMO
  • Models - Plesiochronous Media
  • Models - Half Duplex
  • Models - ISO Architecture
  • Models - Data-Link Layer
  • Models - WDM
  • Models - Duplex
  • Models - Ethernet FDSE
  • Networking Switching Techniques

  • Switching - Home
  • Switching - Techniques
  • Switching - Packet
  • Switching - Circuit
  • Switching - Message
  • Switching - Packet Vs virtual Circuit
  • Switching - Cell
  • Switching - ATM Cell Structure
  • Switching - Virtual Circuit Vs Datagram
  • Switching - Time Space
  • Switching - Modulation
  • Switching - Cell Relay
  • Switching - ATM Structure
  • Switching - VC Vs PVC
  • Switching - Packet and Circuit
  • Switching - VPC
  • Switching - IP
  • Switching - Logical Channels
  • Switching - TDM
  • Switching - FDM
  • Network Codes

  • Codes - CRC
  • Codes - Error Correction and Detection
  • Codes - Hamming
  • Codes - Piggybacking
  • Codes - Encoding Techniques
  • Codes - Error Control
  • Codes - Parity Check
  • Codes - Parity bit
  • Codes - Bit Error
  • Codes - CRC
  • Codes - Transmission Errors
  • Codes - Error Detection and Correction
  • Network Communication

  • Communication - Home
  • Communication - Satellite
  • Communication - Wireless
  • Communication - Data Type
  • Communication - Congestion Control
  • Communication - Network
  • Communication - Data
  • Communication - Software
  • Communication - Layering Process
  • Networking Signaling

  • Signal - Analog
  • Signal - Digital
  • Signal - Analog Vs Digital
  • Signal - Digitization
  • Network Security

  • Security - Home
  • Security - Requirements
  • Security - Threats
  • Security - Services

Other Links

  • Networking - PDF Version

Footer

Basic Course

  • Computer Fundamental
  • Computer Networking
  • Operating System
  • Database System
  • Computer Graphics
  • Management System
  • Software Engineering
  • Digital Electronics
  • Electronic Commerce
  • Compiler Design
  • Troubleshooting

Programming

  • Java Programming
  • Structured Query (SQL)
  • C Programming
  • C++ Programming
  • Visual Basic
  • Data Structures
  • Struts 2
  • Java Servlet
  • C# Programming
  • Basic Terms
  • Interviews

World Wide Web

  • Internet
  • Java Script
  • HTML Language
  • Cascading Style Sheet
  • Java Server Pages
  • Wordpress
  • PHP
  • Python Tutorial
  • AngularJS
  • Troubleshooting

 About Us |  Contact Us |  FAQ

Dinesh Thakur is a Technology Columinist and founder of Computer Notes.

Copyright © 2025. All Rights Reserved.

APPLY FOR ONLINE JOB IN BIGGEST CRYPTO COMPANIES
APPLY NOW