Loading learning content...
When a user in the Tokyo office opens a document stored on a server in New York, their request traverses a complex web of carrier networks, submarine cables, and routing infrastructure spanning 10,000+ kilometers. When that file loads in seconds rather than minutes, it's because of deliberate Wide Area Network (WAN) design decisions made by network architects who understood how to optimize connectivity across vast distances.
WAN design is the discipline of connecting geographically distributed sites—branch offices, datacenters, cloud providers, and partners—into a cohesive enterprise network. Unlike campus networks where you control every cable and switch, WAN design involves navigating carrier services, managing costs that can exceed millions annually, and engineering solutions that perform reliably across infrastructure you don't own.
By the end of this page, you will understand WAN topology options and their tradeoffs, carrier service types and selection criteria, WAN routing protocol design, traffic engineering techniques, and emerging architectures like SD-WAN and SASE. You'll acquire the knowledge to design cost-effective, high-performance, resilient WAN architectures for enterprises operating across cities, countries, and continents.
A Wide Area Network (WAN) connects geographically dispersed locations using telecommunications carrier infrastructure. Unlike Local Area Networks (LANs) where organizations own and control the physical infrastructure, WANs traverse carrier networks—introducing dependencies on external providers, service level agreements, and fundamentally different economics.
WAN vs. LAN: Key Differences:
| Characteristic | LAN (Campus/Branch) | WAN |
|---|---|---|
| Ownership | Organization owns infrastructure | Carrier owns infrastructure |
| Geography | Single building or campus (<5km) | Cities, countries, continents (km to 1000s km) |
| Bandwidth | 1-400 Gbps common | 10 Mbps - 100 Gbps (cost-dependent) |
| Latency | <1ms typical | 5-300ms (distance-dependent) |
| Cost Model | CapEx (equipment, cabling) | OpEx (recurring monthly) |
| Bandwidth Cost | ~$0.01/Mbps/month (amortized) | ~$1-100/Mbps/month (varies by technology, location) |
| Provisioning | Days (internal project) | Weeks to months (carrier processes) |
| Control | Complete control | Limited to equipment at site edges |
WAN Design Objectives:
Effective WAN design balances multiple competing objectives:
Performance: Minimize latency, maximize available bandwidth, and ensure consistent application response times.
Reliability: Provide redundant paths to eliminate outages from single component failures. Target 99.9-99.99% availability.
Security: Protect data in transit across untrusted carrier infrastructure through encryption and access control.
Cost Efficiency: Optimize bandwidth investments; WAN costs often exceed $1M annually for large enterprises.
Scalability: Support business growth without architectural redesign. Add sites, increase bandwidth, extend to cloud.
Manageability: Enable centralized visibility and control despite distributed infrastructure.
Agility: Provision and modify connectivity quickly to support business changes.
The relative priority of these objectives varies by organization. A financial trading firm prioritizes performance and reliability above cost. A retail chain with 5,000 stores may prioritize cost efficiency and scalability.
WAN bandwidth costs correlate with distance, but non-linearly. Metro connections (same city) cost significantly less than long-haul (cross-country) or international circuits. Submarine and inter-continental capacity remains expensive due to limited infrastructure. Design decisions should account for these economics—keep high-bandwidth traffic local when possible.
WAN topology determines how sites interconnect and how traffic flows between locations. The choice profoundly impacts performance, cost, resilience, and operational complexity.
1. Hub-and-Spoke (Star) Topology
All remote sites (spokes) connect to a central hub (typically headquarters or primary datacenter). Traffic between spokes traverses the hub.
2. Full Mesh Topology
Every site has direct connectivity to every other site. Provides optimal path selection and maximum resilience.
Characteristics:
3. Partial Mesh Topology
Strategic subset of sites have direct connectivity based on traffic patterns and business requirements. Balance between hub-and-spoke simplicity and full mesh optimization.
Design Approach:
4. Hierarchical/Regional Hub Topology
Large enterprises often adopt multi-tier WANs with regional aggregation:
This hierarchy limits inter-continental traffic, keeps latency-sensitive applications regional, and enables localized management while maintaining global connectivity.
With applications migrating to cloud (AWS, Azure, GCP), topology increasingly centers on cloud rather than enterprise datacenters. Sites connect to nearest cloud on-ramp (Direct Connect, ExpressRoute), with cloud backbone carrying inter-site traffic. This shifts WAN complexity to cloud providers and enables consistent global performance for cloud-native applications.
Enterprises purchase WAN connectivity from telecommunications carriers (AT&T, Verizon, BT, NTT, etc.). Understanding carrier service offerings is essential for procurement decisions:
Layer 1 Services: Physical Transport
Layer 2 Services: Ethernet and Beyond
| Service Type | Description | Use Case | Typical Bandwidth |
|---|---|---|---|
| E-Line (Point-to-Point) | Dedicated Ethernet connection between two sites | Datacenter interconnect, high-bandwidth site pairs | 10 Mbps - 100 Gbps |
| E-LAN (Multipoint) | Layer 2 connectivity between multiple sites (virtual LAN) | Sites needing direct L2 adjacency (stretched VLANs) | 10 Mbps - 10 Gbps |
| E-Tree (Hub-and-Spoke L2) | Hub site can reach all spokes; spokes only reach hub | Datacenter with multiple branch access | 10 Mbps - 10 Gbps |
| VPLS (Virtual Private LAN Service) | MPLS-based multipoint Ethernet emulation | Geographically dispersed L2 domains | 1 Mbps - 10 Gbps |
Layer 3 Services: Managed Routing
MPLS VPN (IP VPN)
The dominant managed WAN service for enterprises. Carrier manages routing within their MPLS backbone; customer receives IP connectivity.
Three MPLS VPN Classes:
Class of Service (CoS) with SLA: Carrier guarantees latency, jitter, and packet loss for different traffic classes. Essential for real-time applications (voice, video).
Standard: Best-effort forwarding within carrier network. Lower cost but no performance guarantees.
Burstable: Committed Information Rate (CIR) with ability to burst above during low utilization. Pay base rate plus overages.
Typical MPLS VPN SLAs:
SLAs are contractual promises with financial penalties, but they don't prevent outages—they provide credits when outages occur. A 99.9% SLA permits nearly 9 hours of yearly downtime. If your business requires higher availability, design redundancy using multiple carriers/paths rather than relying solely on SLA guarantees.
Internet as WAN Transport
The public internet, once considered unsuitable for enterprise WAN, is increasingly viable as primary or hybrid transport:
Internet Advantages:
Internet Challenges:
Hybrid WAN Strategy: Most organizations now deploy hybrid WAN—combining MPLS (for critical, real-time applications) with internet (for cloud access, bandwidth-heavy transfers, backup). SD-WAN orchestrates traffic steering between these transports.
Routing protocol selection and design profoundly impact WAN behavior—convergence time, path selection, scalability, and troubleshooting complexity. WAN routing must address challenges absent from campus environments: variable link quality, asymmetric paths, and scale across potentially thousands of sites.
Routing Protocol Options for Enterprise WAN:
| Protocol | Type | Scalability | Convergence | Best Suited For |
|---|---|---|---|---|
| OSPF | Link-State (IGP) | Medium (areas required) | Fast (sub-second with tuning) | Single-carrier MPLS, medium WAN |
| EIGRP | Advanced Distance Vector (IGP) | High (summarization) | Very Fast (DUAL) | Cisco-only environments |
| IS-IS | Link-State (IGP) | Very High | Fast | Service provider, large enterprise |
| BGP | Path Vector (EGP) | Unlimited | Slower (by design) | Internet connectivity, MPLS VPN, SD-WAN |
| Static | Manual | Low | N/A (manual) | Stub sites, backup paths |
OSPF WAN Design Considerations:
OSPF is commonly used for enterprise WANs, particularly over MPLS VPN where it interfaces with carrier-provided PE-CE routing.
Key Design Principles:
Area Design: Place all sites in Area 0 for simple deployments (< 100 sites). For larger WANs, use multiple areas with hub sites as ABRs.
Network Types:
Summarization: Summarize at area boundaries to reduce LSA propagation and routing table size.
Stub Areas: Configure stub or totally-stubby areas for branch sites that don't need full routing table.
Timer Tuning: Default OSPF Hello (10s) / Dead (40s) timers may be too slow. Consider 1s/4s for fast convergence, balanced against stability.
12345678910111213141516171819202122232425262728293031323334353637383940
! OSPF WAN Design - Hub Router Configuration! Demonstrates enterprise WAN best practices router ospf 1 router-id 10.255.0.1 ! Passive-interface default prevents unintended adjacencies passive-interface default no passive-interface GigabitEthernet0/0/0 ! WAN interface no passive-interface GigabitEthernet0/0/1 ! WAN interface ! Summarize branch prefixes toward core area 10 range 10.10.0.0 255.255.0.0 ! Stub area for branch sites (no external routes needed) area 20 stub no-summary ! Auto-cost reference for modern link speeds auto-cost reference-bandwidth 100000 ! 100 Gbps reference ! Fast convergence timers timers throttle spf 50 100 5000 timers throttle lsa 50 100 5000 ! WAN Interface Configurationinterface GigabitEthernet0/0/0 description MPLS-VPN-Primary ip ospf 1 area 0 ip ospf network point-to-point ip ospf hello-interval 1 ip ospf dead-interval 4 ip ospf cost 10 ! Prefer over backup interface GigabitEthernet0/0/1 description Internet-VPN-Backup ip ospf 1 area 0 ip ospf network point-to-point ip ospf hello-interval 1 ip ospf dead-interval 4 ip ospf cost 100 ! Higher cost = backup pathBGP for WAN Design:
BGP, while traditionally an internet routing protocol, increasingly appears in enterprise WANs:
When to Use BGP:
BGP WAN Design Principles:
Bidirectional Forwarding Detection (BFD) provides sub-second failure detection independent of routing protocol timers. Deploy BFD on all WAN links and integrate with OSPF/BGP for rapid convergence without aggressive (potentially unstable) protocol timer tuning. Typical BFD timers: 100ms transmit, 300ms detect.
WAN links are expensive and constrained compared to LAN. Performance optimization techniques extract maximum value from WAN investments and ensure acceptable application experience despite distance and bandwidth limitations.
Quality of Service (QoS)
QoS ensures critical applications receive priority under congestion. Without QoS, a large file transfer can starve a voice call, causing unacceptable quality.
QoS Building Blocks:
| Traffic Class | DSCP Value | Treatment | Examples |
|---|---|---|---|
| Network Control | CS6 (48) | Priority (protected) | Routing protocols, network management |
| Voice (EF) | EF (46) | Strict Priority, <10% BW | VoIP bearer traffic |
| Video Conferencing | AF41 (34) | Priority, <23% BW | Real-time video |
| Call Signaling | CS3 (24) | Guaranteed | SIP, H.323, SCCP signaling |
| Transactional Data | AF21 (18) | Guaranteed, low drop | Database, ERP, interactive |
| Bulk Data | AF11 (10) | Best Effort+ | Email, file transfer, backup |
| Default/Scavenger | BE (0) / CS1 (8) | Best Effort/Low | Internet, social media, P2P |
WAN Optimization (WAN-X)
WAN optimization appliances (Riverbed Steelhead, Cisco WAAS, Silver Peak) improve application performance over WAN through:
Data Deduplication: Eliminate redundant data across transfers. Byte-level deduplication can reduce transferred data by 70-95% for repeated patterns (documents, code, backups).
Compression: Compress unique data using LZ-based algorithms. Additional 40-60% reduction on compressible content.
Protocol Optimization: Overcome protocol inefficiencies:
SSL/TLS Optimization: Decrypt, optimize, re-encrypt for protocols with end-to-end encryption. Requires certificate management.
Application Caching: Cache frequently accessed content locally (video streams, software updates).
WAN Optimization Deployment Models:
Traditional WAN optimization was designed for client-server traffic to enterprise datacenters. Cloud/SaaS traffic often bypasses optimization appliances (direct internet breakout) or uses different optimization (CDNs, cloud provider networks). Evaluate whether WAN-X investments remain relevant as traffic patterns shift to cloud. SD-WAN platforms often include comparable capabilities.
WAN circuits traverse infrastructure outside your control—carrier networks, third-party fiber, shared conduits, and internet exchanges. Resilience design must account for failures at multiple levels.
Failure Domains and Redundancy Strategies:
| Failure Point | Impact | Mitigation Strategy |
|---|---|---|
| Last-Mile Circuit | Site isolated from WAN | Dual circuits from diverse paths/carriers |
| Carrier Network | All sites on that carrier affected | Multi-carrier strategy; backup via alternative carrier |
| CE Router | Site isolated (single device) | Dual routers with HSRP/VRRP and diverse uplinks |
| PE Router | Multiple customers affected | Carrier responsibility; connect to diverse PEs |
| Fiber Cut | All circuits in that path | Request physically diverse paths from carrier |
| Building Entry | All connectivity to building | Dual building entry points for critical sites |
| Regional Event | All sites in region affected | Geographically distributed redundancy |
Carrier Diversity Best Practices:
True Diversity Assessment: Carriers often share underlying infrastructure. Two "different" circuits may travel the same fiber. Request diversity reports showing physical path separation.
Entrance Facility Separation: For critical sites, bring circuits into different building entrance points, ideally on different sides of the building.
Last-Mile Technology Mix: Combine fiber and LTE, or different fiber providers, to reduce common-mode failures.
Carrier Selection Strategy: Use different carriers for primary and backup. Reduces exposure to carrier-specific outages or business issues.
Active-Active vs. Active-Standby:
4G/5G cellular provides excellent WAN backup due to completely independent infrastructure (towers vs. fiber). Modern enterprise routers include integrated LTE. For critical sites, LTE backup activates automatically on primary failure. Design policies to limit non-essential traffic over metered cellular connections.
The enterprise WAN is undergoing fundamental transformation. Traditional architectures—designed when applications lived in enterprise datacenters—struggle with cloud-centric traffic patterns. Two converging trends are reshaping WAN design:
SD-WAN: Software-Defined Wide Area Network
SD-WAN (introduced in Branch Connectivity, expanded here) transforms WAN architecture by:
Abstracting Transport: Multiple underlying transports (MPLS, internet, LTE) appear as a unified fabric. Traffic steered based on application requirements and real-time path quality.
Centralizing Control: Policies defined once in central controller, deployed automatically to all sites. Enables enterprise-wide consistency and rapid change.
Enabling Direct Cloud Access: Sites access cloud/SaaS directly via local internet breakout, reducing latency and avoiding backhaul costs.
Simplifying Operations: Zero-touch deployment, automated configuration, and comprehensive visibility reduce operational burden.
SASE: Secure Access Service Edge
SASE (pronounced "sassy"), defined by Gartner in 2019, converges SD-WAN with cloud-delivered security into a unified service:
SASE Components:
SASE Benefits:
While SASE represents the strategic direction, the market remains early and fragmented. Few vendors offer complete, mature SASE stacks. Most enterprises adopt gradually—starting with SD-WAN, adding cloud security components over time. Evaluate vendors carefully; marketing claims often exceed delivery capabilities.
We've covered substantial ground in WAN architecture. Let's consolidate the key takeaways:
What's Next:
With campus, branch, and WAN design understood, we'll next explore Security Zones—how to segment enterprise networks to contain threats, enforce access policies, and align network architecture with security requirements. Security zone design integrates network and security architecture into a cohesive defense strategy.
You now understand the principles and practices of WAN design—from topology selection and carrier services to routing protocols and modern SD-WAN evolution. This knowledge enables you to architect, evaluate, and optimize Wide Area Networks connecting enterprise sites across any distance.