Network Redesign
Network Redesign
A network consists of two or more computers that are linked in order to share resources (such
as printers and CDs), exchange files, or allow electronic communications. The computers on
a network may be linked through cables, telephone lines, radio waves, satellites, or infrared
light beams.
Two very common types of networks include:
Local Area Network
A Local Area Network (LAN) is a network that is confined to a relatively small area. It is
generally limited to a geographic area such as a writing lab, school, or building.
Computers connected to a network are broadly categorized as servers or workstations.
Servers are generally not used by humans directly, but rather run continuously to provide
"services" to the other computers (and their human users) on the network. Services provided
can include printing and faxing, software hosting, file storage and sharing, messaging, data
storage and retrieval, complete access control (security) for the network's resources, and
many others.
Workstations are called such because they typically do have a human user which interacts
with the network through them. Workstations were traditionally considered a desktop,
consisting of a computer, keyboard, display, and mouse, or a laptop, with with integrated
keyboard, display, and touchpad. With the advent of the tablet computer, and the touch screen
devices such as iPad and iPhone, our definition of workstation is quickly evolving to include
those devices, because of their ability to interact with the network and utilize network
services.
Servers tend to be more powerful than workstations, although configurations are guided by
needs. For example, a group of servers might be located in a secure area, away from humans,
and only accessed through the network. In such cases, it would be common for the servers to
operate without a dedicated display or keyboard. However, the size and speed of the server's
processor(s), hard drive, and main memory might add dramatically to the cost of the system.
On the other hand, a workstation might not need as much storage or working memory, but
might require an expensive display to accommodate the needs of its user. Every computer on
a network should be appropriately configured for its use.
On a single LAN, computers and servers may be connected by cables or wirelessly. Wireless
access to a wired network is made possible by wireless access points (WAPs). These WAP
devices provide a bridge between computers and networks. A typical WAP might have the
theoretical capacity to connect hundreds or even thousands of wireless users to a network,
although practical capacity might be far less.
Nearly always servers will be connected by cables to the network, because the
cable connections remain the fastest. Workstations which are stationary
(desktops) are also usually connected by a cable to the network, although the cost
of wireless adapters has dropped to the point that, when installing workstations
in an existing facility with inadequate wiring, it can be easier and less expensive to
use wireless for a desktop.
Wide Area Network
Wide Area Networks (WANs) connect networks in larger geographic areas, such as Florida,
the United States, or the world. Dedicated transoceanic cabling or satellite uplinks may be
used to connect this type of global network.
Using a WAN, schools in Florida can communicate with places like Tokyo in a matter of
seconds, without paying enormous phone bills. Two users a half-world apart with
workstations equipped with microphones and a webcams might teleconference in real time. A
WAN is complicated. It uses multiplexers, bridges, and routers to connect local and
metropolitan networks to global communications networks like the Internet. To users,
however, a WAN will not appear to be much different than a LAN.
Advantages of Installing a School Network
User access control.
Modern networks almost always have one or more servers which allows
centralized management for users and for network resources to which they
have access. User credentials on a privately-owned and operated network
may be as simple as a user name and password, but with ever-increasing
attention to computing security issues, these servers are critical to ensuring
that sensitive information is only available to authorized users.
Information storing and sharing.
Computers allow users to create and manipulate information. Information
takes on a life of its own on a network. The network provides both a place
to store the information and mechanisms to share that information with
other network users.
Connections.
Administrators, instructors, and even students and guests can be
connected using the campus network.
Services.
The school can provide services, such as registration, school directories,
course schedules, access to research, and email accounts, and many others.
(Remember, network services are generally provided by servers).
Internet.
The school can provide network users with access to the internet, via an
internet gateway.
Computing resources.
The school can provide access to special purpose computing devices which
individual users would not normally own. For example, a school network
might have high-speed high quality printers strategically located around a
campus for instructor or student use.
Flexible Access.
School networks allow students to access their information from connected devices
throughout the school. Students can begin an assignment in their classroom, save part of it
on a public access area of the network, then go to the media center after school to finish
their work. Students can also work cooperatively through the network.
Workgroup Computing.
Resources ::::
https://fcit.usf.edu/network/chap1/chap1.htm#:~:text=A%20network%20consists%20of
%20two,satellites%2C%20or%20infrared%20light%20beams.
computer network
A computer network, also referred to as a data network, is a series of interconnected nodes that can
transmit, receive and exchange data, voice and video traffic.
Computer networks have a variety of uses that many would see as essential today,
including the following:
file sharing, which enables users to share data files through a network;
application sharing, which enables users to share applications through a
network;
hardware sharing, which enables users in a network to share hardware
devices, such as printers and hard drives;
client-server model, which enables data to be stored on servers, where end-
user devices -- or clients -- can access that data;
voice over IP (VoIP), which enables users to send voice data through
internet protocols;
communication, which can include video, text and voice;
e-commerce, which enables users to sell and buy products over the internet;
and
gaming, which enables multiple users to play together from various locations.
In addition, program design requires skills and knowledge in both computer network
technologies and program requirements.
Computer networks operate using a varying set of hardware and software. All packet-
switched networks use Transmission Control Protocol/Internet Protocol (TCP/IP) to
establish a standard means of communication. Each endpoint in a network has a unique
identifier that is used to indicate the source or destination of the transmission. Identifiers
include the node's IP address or Media Access Control (MAC) address. Endpoint nodes,
which are used for routing purposes, include switches and routers, servers, personal
computers, phones, networked printers and other peripheral computing devices, as well
as sensors and actuators. The Open Systems Interconnection (OSI) model defines how
data is transferred between computers.
A network's capacity is how much traffic the network can support at any one time while
still meeting service-level agreements (SLAs). Network capacity is measured in terms
of bandwidth. Bandwidth is quantified by the theoretical maximum number of bits per
second (bps) that can pass through a network device. Throughput is a measure of the
actual speed of a successful transmission after accounting for factors like latency,
processing power and protocol overhead.
Advantages
Networks are often categorized by the wired or wireless transmission technology they
support, as well as the scope of their domains. Some examples of computer networks
include the following:
Networks can be public or private. While anyone can access the public internet, access
to private and virtually private networks requires the end user to be assigned access
credentials.
In the enterprise, network access control (NAC) systems typically use security policies to
control access to the organization's network. This means that network devices are not
allowed to connect unless they meet a predefined business policy, which is enforced by
NAC products. When deployed, NAC systems immediately discover all the devices
connected to a network, categorize them by type and then react to them based on
preconfigured compliance rules implemented by the organization's security team.
Network topologies
Network topologies are the physical or logical structure of a network. The term network
fabric describes the way each topology creates a particular type of crisscross pattern of
connections, such as bus, ring and star topologies. The word fabric is used as an
allusion to threads in a fabric. A good way to remember the difference is that network
fabrics describe a network topology.
Resources::::
https://www.google.com/amp/s/www.techtarget.com/searchnetworking/definition/network
%3famp=1
Source: Unsplash
With networks at the heart of the most modern business, network design can
have a major impact on business outcomes. Finding the right balance of network
performance, security, redundancy, and cost require a unique mix of project
management and technical skill. To help you nail your next network design
project, we’ll take a deep dive on the topic, provide a basic framework you can
follow, and look at some best practices to keep in mind as you go.
What is network design?
Network design is the practice of planning and designing a communications network.
Network design starts with identifying business and technical requirements and
continues until just before the network implementation stage (when you actually
do the work to deploy and configure what was designed). Network design
includes things like network analysis, IP addressing, hardware selection, and
implementation planning.
In simple networks, like those found in most homes and small offices, network
design is a straightforward process. In large enterprise networks, the network
design process is often very complex and involves multiple stakeholders.
Once you’ve detailed the business requirements, it’s time to move on to the
technical/functional requirements. Example requirements include:
Bandwidth
Security requirements
Specific protocols the project must implement
RTO/RPO (recovery time objective/recovery point objective) numbers
Uptime SLAs (service level agreements)
When you create your requirements, don’t overlook constraints. For example,
business requirements will have a budget constraint. Technical requirements
may have constraints such as the need to continue supporting legacy apps.
Whatever the state of the network is, it’s important you know early in the design
process. You need to assess the network’s current state before you make any
specific design recommendations. At the end of this step, you should
understand the network layout, performance, data flows, applications & services
on the network, network security, and physical and logical layout.
When it comes to physical network design you’ll need to address things like:
IP addressing/subnetting
VLANs
Data flows
Network topology
At the end of this step, you should be able to create a static map of the
physical and logical network you’re designing.
Tip: Don’t forget about cloud workloads and cloud networks. Your network
design will need to account for on-premises and cloud data flows.
Before we move on to the next step, let’s take a look at two key network design
concepts: hierarchical network layers and top-down vs bottom-up design.
Core layer. This is the layer that routes traffic between different geographical
sites. In other words, it’s the network backbone. The core layer is where high-
throughput, expensive core routers shine.
Distribution layer. The distribution layer sits between the core and access
layers. It acts as a boundary and implements network policies to restrict or allow
data flows between different subnets within the network. Less expensive routers
and L3 switches are the common workhorses of the distribution layer.
Access layer. The access layer is the layer for endpoint devices like user PCs,
printers, and VoIP phones. Smaller “access switches” are responsible for
switching packets and routing traffic at this layer.
In some cases, you may not need all three of these layers. For example, many
networks bypass the distribution layer altogether.
As a result, bottom-up can be quicker but can often lead to missed requirements
or compromises on desired outcomes, as designing a network from the bottom
up locks you into certain outcomes before you get to the application layer where
users get work done.
During this stage, you’ll choose specific cables, racks, network devices, servers,
applications, cloud services, etc. to make your design a reality. For custom parts
or large orders, keep in mind potential supply-chain issues. If you can’t get your
structured cabling or access switches in time, you can slow down project
completion.
Not sure what network devices to implement? Take a look at some of the
most popular options in Auvik’s Network Diversity Report for 2020 for free.
Tight project management and keeping stakeholders informed are key parts of
getting your plan right. A network deployment has a lot of moving parts and
your plan should account for project milestones, change management, and key
deliverables. Additionally, if the network will be managed by a different team
than those doing the implementation, you’ll need a transition plan. If you’re
responsible for network management going forward, developing a plan for how
you’ll monitor and maintain the network is important as well.
However, there are many network design projects where the resource and time
investment in going top-down just doesn’t make sense. For example, if you’re
already familiar with an organization’s overall business requirements and simply
need to expand a network or increase bandwidth, bottom-up can be much more
efficient.
3. Standardize everything
If it can be standardized, standardize it. It will make troubleshooting, patching,
maintenance, and asset management drastically easier in the long run.
Here are some examples of things you can and should standardize:
Regulatory requirements
When you’re designing a network, you need to account for legal regulations that
impact both the physical and logical design of your network. For example, local
building codes may impact how you run structured cabling. Similarly, the
National Electrical Code in the US has requirements relevant to the electrical
power your network devices will require. From a logical perspective, regulations
like HIPAA, PCI DSS, and GDPR can impact both data in transit and data at rest.
During the network design process, you’ll need to keep these requirements in
mind to build a compliant network.
Of course, resilience and redundancy come with a budgetary cost. Your network
design will need to balance resilience and redundancy against the expense.
Reliably achieving five-nines (99.999% uptime) is great if you can do it, but it ain’t
cheap!
A good way to frame this tradeoff is: considering your cost of downtime (i.e. how
many dollars per minute/hour will you lose if the network goes down) and
balancing that against your exposure to downtime with your current redundancy
plan.
Make sure your electrical panels and electrical outlets can accommodate your
new equipment.
Make sure to account for power-over-Ethernet (PoE) loads when sizing UPS
(battery backups) and other power equipment.
Make sure your server room cooling can handle the additional heat generated by
your new network gear or plan to invest in supplemental cooling.
There’s no one size fits all network design. With the right approach, however,
you can create a design that matches your business requirements. Of course, as
network lifecycle models like PPDIOO demonstrate, it doesn’t stop after the
design stage!
===
Network design and implementation are only the beginning. Once a network
goes live, that’s when the real work begins. Proactive network
monitoring helps you ensure the network is working as it should and can
inform your decisions when it comes time to expand or refresh the network.
Resources:::
https://www.auvik.com/franklyit/blog/network-design-best-practices/
Resources:::::
https://www.heavy.ai/technical-glossary/network-topology
Internet Protocol (IP) is the method or protocol by which data is sent from one computer
to another on the internet. Each computer -- known as a host -- on the internet has at
least one IP address that uniquely identifies it from all other computers on the internet.
IP is the defining set of protocols that enable the modern internet. It was initially defined
in May 1974 in a paper titled, "A Protocol for Packet Network Intercommunication,"
published by the Institute of Electrical and Electronics Engineers and authored by Vinton
Cerf and Robert Kahn.
At the core of what is commonly referred to as IP are additional transport protocols that
enable the actual communication between different hosts. One of the core protocols that
runs on top of IP is the Transmission Control Protocol (TCP), which is often why IP is
also referred to as TCP/IP. However, TCP isn't the only protocol that is part of IP.
IP packets
While IP defines the protocol by which data moves around the internet, the unit that does
the actual moving is the IP packet.
An IP packet's envelope is called the header. The packet header provides the
information needed to route the packet to its destination. An IP packet header is up to 24
bytes long and includes the source IP address, the destination IP address and
information about the size of the whole packet.
The other key part of an IP packet is the data component, which can vary in size. Data
inside an IP packet is the content that is being transmitted.
What is an IP address?
Similar to the way a street address identifies the location of a home or business, an IP
address provides an address that identifies a specific system so data can be sent to it or
received from it.
The most widely used version of IP for most of the internet's existence has been Internet
Protocol Version 4 (IPv4).
IPv4 provides a 32-bit IP addressing system that has four sections. For example, a
sample IPv4 address might look like 192.168.0.1, which coincidentally is also commonly
the default IPv4 address for a consumer router. IPv4 supports a total of 4,294,967,296
addresses.
A key benefit of IPv4 is its ease of deployment and its ubiquity, so it is the default
protocol. A drawback of IPv4 is the limited address space and a problem commonly
referred to as IPv4 address exhaustion. There aren't enough IPv4 addresses available
for all IP use cases. Since 2011, IANA (Internet Assigned Numbers Authority) hasn't had
any new IPv4 address blocks to allocate. As such, Regional Internet Registries (RIRs)
have had limited ability to provide new public IPv4 addresses.
The massive availability of address space is the primary benefit of IPv6 and its most
obvious impact. The challenges of IPv6, however, are that it is complex due to its large
address space and is often challenging for network administrators to monitor and
manage.
IP network protocols
There are several commonly used network protocols that run on top of IP, including:
The benefits of WiFi networks are accompanied by some additional concerns that
must be addressed from an administrator’s point of view. It’s not just a matter of
supplying enough connections for all of your users. You need to be aware of aspects
of your network such as coverage area and channel overlap.
For those of us with home WiFi networks, we are our own network admins. If you are
in this situation or are just a curious end user, one of the characteristics of your
network that you need to understand is the WiFi signal strength. This value will be a
determining factor in the activities for which your network can be used. Let’s take a
deeper look at WiFi signals and how they can impact your wireless network usage.
What is a WiFi Signal?
A WiFi network employs radio waves to establish communication between devices.
These devices may include computers, mobile phones, tablets or network routers.
The wireless network router is the interface between a wired connection to the
Internet or other Ethernet network and the wirelessly connected devices.
The router decodes radio signals received from the users of the WiFi network and
transmits them to the Internet. Conversely, data received from the Internet is
converted from binary data into radio waves for distribution to the devices that are
using the network.
The radio waves which comprise WiFi signals make use of the 2.4 GHz and 5 GHz
frequency bands. These are higher than the frequencies used for televisions or cell
phones and allow more data to be carried than do the lower frequencies.
WiFi signals use the 802.11 networking standards when transmitting data. There are
a number of different varieties of the protocol that are used in WiFi networking. Some
of the more common ones you will see are 802.11n which is used on the 2.4GHz
band and 802.11ac primarily used for 5GHz transmission. Others you might see are
802.11b which is the slowest standard and 802.11g.
What is a Good Wifi Signal Strength?
The strength of the WiFi signal throughout the network’s coverage area directly
impacts the ability of users to perform various activities in a timely manner. Before
delving into which signal strengths are appropriate for certain uses of your WiFi
network, let’s discuss how WiFi signals strengths are measured.
The most consistent method of indicating signal strength is with a quantity known as
a dBm. This term stands for decibels relative to a milliwatt and is expressed as a
negative number from 0 to -100. Therefore, a signal of -40 is more powerful than a
signal of -80 since -80 is further from 0 and therefore a smaller number.
The dBm scale is logarithmic rather than linear, which means that the changes
between signal strengths do not scale in a smooth and gradual manner. On this
scale a difference of 3 dBm leads to a halving or doubling of the previous signal’s
strength.
Background noise levels that can impact your WiFi performance are also expressed
in dBms. In the case of noise levels, a value close to zero indicates high levels of
noise. Noise measured at -10 is greater than that of -40.
WiFi signal strength is also sometimes indicated by the Received Signal Strength
Indicator (RSSI level), which is a measurement that represents the relative quality of
a received signal on a device. What’s interesting about this measurement is the fact
that it has no standardized relationship to any particular physical parameter, so it’s
up to vendors to provide their own range of RSSI values.
The most typical RSSI range goes from approximately -30 to -100, and the lower the
number is, the weaker the signal. This range roughly corresponds to the dBm scale,
which is why the measurements of WiFi signal strength are sometimes used
interchangeably. That said, there are some vendors who use a positive scale. For
example, Cisco uses 0-100 scale, and Atheros uses 0-60.
What Is a Good WiFi Signal Strength in dBm?
Do you want to know what is a good signal strength for WiFi in dBm? The
following table indicates the minimum signal strengths that you should strive
for in order to use your WiFi network for various purposes.
Signal
Qualifier Suitable Uses
Strength
-100
Worst Total noise.
dBm
What Factors Can Impact WiFi Signal Strength?
There are a number of factors that can impact the strength of your network’s
WiFi signal. Some of them are:
Router location
There are several different aspects of your router’s location that can impact its
ability to deliver a good signal throughout your intended coverage area. These
include:
The height of the router — You should locate your router as high as
possible. Placing it on the floor or on low shelves will impede its ability
to provide a strong signal.
Central location — You will obtain the best WiFi coverage if your router
is located centrally in your home or office. Placing it in a corner of the
house will result in WiFi leakage and reduced signal in your coverage
area.
Interference from other devices — Microwaves and cordless phones
may use the same frequency band as your WiFi router and contribute
background noise that impacts the signal level.
Walls and floors — The best WiFi signal will be obtained if the devices
that will be using the router have a clear line of sight to it. Signals that
travel through walls and floors will have their strength negatively
affected.
Keeping your router up to date isn’t difficult since all you need to do is log in to
its admin interface from time to time and install any available updates. If
possible, we highly recommend you configure your router to install firmware
updates automatically as soon as they become available. That way, your
router will always keep operating at peak efficiency without you having to
constantly check for updates.
Wireless Settings
Your wireless settings can have a dramatic impact on WiFi signal strength. In
densely populated areas with many overlapping WiFi networks, it’s a good idea to
take advantage of the 5 GHz band, which provides faster data transfer speeds
compared with the much more commonly used 2.4 GHz band.
If that’s not possible because your router or your devices don’t support the 5
GHz band, then at least make sure that you’re using the right channel in the
2.4 GHz band. Read more on to How find the best WiFi channel.
In North America, you have 11 channels to choose from, but only three of these channels
are non-overlapping (1, 6, and 11), and these are the channels you should use because
they don’t suffer from the so-called co-channel signal interference.
To prevent this from happening, you can optimize your wireless settings, but there’s
only so much you can do if your router is too old or too weak. If that’s really the case,
we recommend you bite the bullet and get a new router, preferably one that supports
WiFi 802.11ac as well as WiFi 6. Such router will serve you well for many years, and
you’ll appreciate the performance boost provided by it.
How to Test Your WiFi Signal Strength
In order to determine your WiFi signal strength, your best course of action is to
use a WiFi signal strength app like NetSpot. Installing this excellent WiFi
analyzer on a laptop or mobile device will allow you to test the strength of the
WiFi signal throughout your coverage area. Here’s how to do it.
1. Download and install the NetSpot application on your Windows laptop,
Android device or MacBook. The free version is sufficient to get your
WiFi signal strength.
2. Launch the application and select Discover from the top of the app’s
main window.
3. Identify your WiFi network from among those that the app discovers.
4. You will be presented with a number of statistics regarding your network
and among them is the signal strength.
5. Take note of the strength in your current location and proceed to move
around your coverage area with the device that is running NetSpot.
6. Perform a systematic survey of your coverage area while noting the
WiFi signal strength to alert you to problem areas that may need to be
addressed in order to use your network as you intended.
In Windows, you can find your current signal strength from the Command
Prompt. This is what you need to do:
Open the Start menu, type “CMD”, and hit Enter.
Enter the following command and hit Enter: netsh wlan show interfaces.
Look for the “Signal” line. The percentage indicates your signal strength.
What is a good WiFi signal strength percentage? That depends on the
intended use case. For high-definition streaming, online gaming, large file
transfers, and video chatting, you want to be as close to 100% as possible.
For email, casual web browsing, and other activities that don’t require too
much bandwidth, even 50% may be acceptable.
You can, of course, simply click on the WiFi indicator icon to see the
approximate strength of your WiFi, but we don’t recommend you rely on this
information too much.
Resources :::::
https://www.netspotapp.com/wifi-signal-strength/wifi-signal-strength-and-its-
impact.html
A Complete Guide To
Wireless (Wi-Fi) Security
In the modern world, it seems as though it would be nearly impossible to function
without access to the wireless internet. People everywhere rely on Wi-Fi for
everything from entertainment to achieving their goals. But with the ubiquity of the
internet comes an underlying danger in the form of hackers who look to exploit
security flaws to gain access to your private data and information.
As we continue into a future in which everything from our phone to our refrigerator
operates using a wireless internet connection, it is becoming increasingly important
to understand how to keep our Wi-Fi safe and secure.
In this article, we will provide you with everything you need to understand the basics
of Wi-Fi security and what wireless security you should use. If you want a more
personal take, book a free consultation call with our Wi-Fi security engineers here at
SecureW2.
Wired Equivalent Privacy (WEP) is the first security protocol ever put in practice.
Designed in 1997, it has become obsolete but is still used in modern times with older
devices.
WEP uses a data encryption scheme that is based on a combination of user- and
system-generated key values. However, it is widely known that WEP is the least
secure network type as hackers have developed tactics of reverse-engineering and
cracking the encryption system.
WI-FI PROTECTED ACCESS (WPA)
Wi-Fi Protected Access (WPA) was developed to deal with the flaws that were found
with the WEP protocol. WPA offers features such as the Temporal Key Integrity
Protocol (TKIP) which was a dynamic 128-bit key that was harder to break into than
WEP’s static, unchanging key.
It also introduced the Message Integrity Check, which scanned for any altered
packets sent by hackers, the Temporal Key Integrity Protocol (TKIP), and the pre-
shared key (PSK), among others, for encryption.
In 2004, WPA2 brought significant changes and more features to the wireless
security gambit. WPA2 replaced TKIP with the Counter Mode Cipher Block Chaining
Message Authentication Code Protocol (CCMP) which is a far superior encryption
tool.
WPA2 has been the industry standard since its inception, on March 13, 2006, the Wi-
Fi Alliance stated that all future devices with the Wi-Fi trademark had to use WPA2.
WPA2-PSK
WPA2-PSK (Pre-Shared Key) requires a single password to get on the wireless
network. It’s generally accepted that a single password to access Wi-Fi is safe but
only as much as you trust those using it. A major vulnerability comes from the
potential damage done when login credentials get placed in the wrong hands. That is
why this protocol is most often used for a residential or open Wi-Fi network.
To encrypt a network with WPA2-PSK you provide your router not with an encryption
key, but rather with a plain-English passphrase between 8 and 63 characters long.
Using CCMP, that passphrase, along with the network SSID, is used to generate
unique encryption keys for each wireless client. And those encryption keys are
constantly changed. Although WEP also supports passphrases, it does so only as a
way to more easily create static keys, which are usually composed of the hex
characters 0-9 and A-F.
WPA2-Enterprise
WPA2-Enterprise requires a RADIUS server, which handles the task of authenticating
network user’s access. The actual authentication process is based on the 802.1X
policy and comes in several different systems labeled EAP.
There are just a few components that are needed to make WPA2-Enterprise work.
Realistically, if you already have access points and some spare server space, you
possess all the hardware needed to make it happen.
WP3 is introducing the first major changes to wireless security in 14 years. Some
notable additions for the security protocol are:
Greater protection for passwords
Individualized encryption for personal and open networks
More security for enterprise networks.
WPA3-PSK
To improve the effectiveness of PSK updates to WPA3-PSK offer greater protection
by improving the authentication process.
WPA3-Enterprise
WPA3-Enterprise offers some added benefits but overall little changes in terms of
security with the jump from WPA2-Enterprise.
It is important to know the threats that are most prevalent in order to be able to
implement the proper security measures.
MAN-IN-THE-MIDDLE ATTACKS
Cracking and decrypting passwords is an old method that consists of what is known
as “A brute force attack.” This attack consists of using a trial and error approach and
hoping to eventually guess correctly. However, there are many tools that hackers can
use to expedite the process.
Luckily, you can use these same tools to try and test your own network’s security.
Software like John the Ripper, Nessus, and Hydra are a good place to start.
PACKET SNIFFERS
Packet sniffers are computer programs that can monitor traffic on a wireless
network. They can also intercept some data packages and provide a user with their
contents. They can be used to harmlessly gather data about traffic, but in the wrong
hands can introduce errors and break down a network.
While the costs of maintaining and implementing a PKI infrastructure to allow for
certificate authentication may seem daunting, SecureW2 can offer an easy
configuration to allow you to easily maintain the most secure network possible
Resources:::::
https://www.securew2.com/blog/complete-guide-wi-fi-security
What Does Network Security Protocols Mean?
Network security protocols are a type network protocol that ensures the
security and integrity of data in transit over a network connection.
Network security protocols define the processes and methodology to
secure network data from any illegitimate attempt to review or extract
the contents of data.
Resources::::
https://www.techopedia.com/definition/29036/network-security-
protocols#:~:text=Network%20security%20protocols%20are%20a,extract%20the
%20contents%20of%20data.
Michael Linn
Last Modified Date: June 28, 2022
Network security protocols are used to protect computer data and
communication in transit. The primary tool used to protect information as
it travels across a network is cryptography. Cryptography uses
algorithms to encrypt data so that it is not readable by unauthorized
users. Generally, cryptography works with a set of procedures or
protocols that manage the exchange of data between devices and
networks. Together, these cryptographic protocols enhance secure data
transfer.
Resources:::::
https://www.easytechjunkie.com/what-are-network-security-protocols.htm
What is a Server?
A server is a computer program or device that provides a service to another computer program and its
user, also known as the client.
The operating system also provides the means for clients to communicate with the
server application. The server's IP address and fully qualified domain name, for
example, are assigned at the operating system level.
There are both similarities and differences between desktop computers and servers.
Most servers are based on X86/X64 CPUs and can run the same code as an X86/X64
desktop computer. Unlike most desktop computers, however, physical servers often
include multiple CPU sockets and error correcting memory. Servers also generally
support a far greater quantity of memory than most desktop computers.
Server hardware also differs from desktop hardware in terms of its form factor. Modern
desktop computers often exist as mini towers, designed to be placed under a desk.
Although there are still some vendors that offer tower servers, most servers are
designed to be rack mounted. These rack mount systems are described as having a 1U,
2U or 4U form factor, depending on how much rack space they occupy -- a 2U server
takes up twice as much rack space as a 1U server.
Another key difference between a desktop computer and a server is the operating
system. A desktop operating system might be able to perform some server-like
functionality but isn't designed or licensed to take the place of a server operating
system. Windows 10, for example, is a desktop operating system.
Some Windows 10 editions include Hyper-V, Microsoft's virtual machine platform. Even
though both Windows 10 and Windows Server can run Hyper-V, Windows 10's
hypervisor is intended to be primarily used for development purposes, whereas the
version of Hyper-V included with Windows Server is designed for running production
virtual servers.
Similarly, the Windows 10 operating system can make files available to devices on a
local network. However, Windows 10 was never designed for large-scale file sharing.
Windows Server, however, can be configured to act as a fully featured file server. In
large organizations, a distributed file system can be created across an entire server farm
for the purpose of providing better performance, scalability and resiliency than what one
physical server would be able to provide by itself.
Types of servers
Servers are often categorized in terms of their purpose. A few examples of the types of
servers available are as follows:
Hardware
Operating systems
Another component is the server operating system. A server operating system, such as
Windows Server or Linux, acts as the platform that enables applications to run. The
operating system provides applications access to the hardware resources that they need
and enables network connectivity.
The application is what enables the server to do its job. For example, a database server
would run a database application. Likewise, an email server would need to run a mail
application.
Choosing the right server
There are many factors to consider in the midst of a server selection, including virtual
machine and container consolidation. When choosing a server, evaluate the importance
of certain features based on the use cases.
Security capabilities are also important and there are a number of protection, detection
and recovery features to consider, including native data encryption to protect data in
flight and data at rest, as well as persistent event logging to provide an indelible record
of all activity.
If the server will rely on internal storage, the choice of disk types and capacity is also
important because it can have a significant influence on input/output (I/O) and
resilience.
Many organizations are shrinking the number of physical servers in their data centers as
virtualization enables fewer servers to host more workloads. The advent of cloud
computing has also changed the number of servers an organization needs to host on
premises.
Packing more capability into fewer boxes can reduce overall capital expenses, data
center floor space and power and cooling demands. Hosting more workloads on fewer
boxes, however, can also pose an increased risk to the business because more
workloads will be affected if the server fails or needs to be offline for routine
maintenance.
A server maintenance checklist should cover physical elements, as well as the system's
critical configuration.
Resources::::
https://www.techtarget.com/whatis/definition/server?amp=1
1. Dictionary
2. Networking
3. Switch
Switch
Last updated: August 26, 2020
TABLE OF CONTENTS
What Does Switch Mean?
A switch, in the context of networking, is a high-speed device that receives incoming data
packets and redirects them to their destination on a local area network (LAN).
A LAN switch operates at the data link layer (Layer 2) or the network layer of the OSI Model
and, as such it can support all types of packet protocols. The layer 2 switch is also sometimes
called a bridge: its function is to send frames containing data packets between nodes or
segments of a network.
Essentially, switches are the traffic cops of a simple local area network. Switching establishes
the trajectory for the frames as the data units, and how the data moves from one area of a
network to another.
By contrast, routing takes place at layer 3, there data gets sent between networks or from one
network to another.
Switch
A switch in an Ethernet-based LAN reads incoming TCP/IP data
packets/frames containing destination information as they pass into one
or more input ports. The destination information in the packets is used to
determine which output ports will be used to send the data on to its
intended destination. Again, the thing to remember is that the switch is
operating at the data link layer, layer 2, sending a frame that contains a
single data packet.
Switches are similar to hubs, only smarter. A hub simply connects all the
nodes on the network – without switching, communication happens in a
haphazard manner, with any device trying to communicate at any given
time, resulting in many collisions. A switch, on the other hand, creates an
electronic tunnel between source and destination ports for a split second,
that no other traffic can enter. This results in communication without
collisions.
Switches are similar to routers as well, but a router has the additional
ability to forward packets between different networks, whereas a switch is
limited to node-to-node communication on the same network. Other types
of activity take place in successive layers of the OSI model: at layer 4
(the transport layer,) layer 5 (the session layer,) layer 6 (the presentation
layer,) and layer 7 (the application layer) governing the level closest to
the end user.
Like other aspects of networking in the OSI model, switching has evolved
due to the emergence of virtualization and logical advancements in
networking. For example, now, the hardware components, be they
bridges or switches or routers or other gear, are partitioned in a virtual
machine (VM) instead of being composed of discrete hardware units “on
bare metal.”
The development of the virtual LAN or VLAN means that packets/frames
may be moving between nodes as part of multiple LAN setups, where
traffic is walled off logically according to its given LAN designation.
Resources like CPU and RAM are parceled out by virtual system
administrators.
Although virtualization has brought much more versatility to systems,
problems like VM sprawl can result if systems are not well ordered. So the
layer 2 switch or bridge serves its designated function to keep network
activity consistent and transparent.
Resources::::
https://www.techopedia.com/definition/2306/switch-networking
What is a router?
A router is a device that connects two or more packet-switched networks or
subnetworks. It serves two primary functions: managing traffic between these
networks by forwarding data packets to their intended IP addresses, and allowing
multiple devices to use the same Internet connection.
There are several types of routers, but most routers pass data between LANs (local
area networks) and WANs (wide area networks). A LAN is a group of connected
devices restricted to a specific geographic area. A LAN usually requires a single
router.
A WAN, by contrast, is a large network spread out over a vast geographic area. Large
organizations and companies that operate in multiple locations across the country,
for instance, will need separate LANs for each location, which then connect to the
other LANs to form a WAN. Because a WAN is distributed over a large area, it often
necessitates multiple routers and switches*.
*A network switch forwards data packets between groups of devices in the same
network, whereas a router forwards data between different networks.
Wired router: Like a wireless router, a wired router also uses an Ethernet cable to
connect to a modem. It then uses separate cables to connect to one or more
devices within the network, create a LAN, and link the devices within that network
to the Internet.
In addition to wireless and wired routers for small LANs, there are many specialized
types of routers that serve specific functions:
Core router: Unlike the routers used within a home or small business LAN, a core
router is used by large corporations and businesses that transmit a high volume
of data packets within their network. Core routers operate at the "core" of a
network and do not communicate with external networks.
Edge router: While a core router exclusively manages data traffic within a large-
scale network, an edge router communicates with both core routers and external
networks. Edge routers live at the "edge" of a network and use the BGP (Border
Gateway Protocol) to send and receive data from other LANs and WANs.
Virtual router: A virtual router is a software application that performs the same
function as a standard hardware router. It may use the Virtual Router Redundancy
Protocol (VRRP) to establish primary and backup virtual routers, should one fail.
Resources::::
https://www.cloudflare.com/en-gb/learning/network-layer/what-is-a-router/
The repeater forwards traffic between wireless users and the wired network by
sending data to either another repeater or an access point that is connected to the
wired network. The data is sent through the route that provides the best performance
for the client.
Bridges
Access points can be configured as root or non-root bridges to join multiple
networks. An access point in this role will establish a wireless link with a non-root
bridge. Traffic is then passed over the wireless link to the wired network.
Workgroup bridge
Access points that are in workgroup bridge mode can "associate" to other access
points as clients and provide network connections for devices connected to Ethernet
ports.
For example, if your business needs wireless connectivity for a group of network
printers, you can connect the printers to a hub or a switch, connect the hub or switch
to the access point Ethernet port, and configure the access point as a workgroup
bridge. The workgroup bridge will then "associate" to an access point on your
network.
For one, a wireless network is more convenient to access. Adding new users is a lot
less complicated, too. And you can easily provide Internet access to guest users by
giving them a password to access your wireless network securely.
Also you can easily segment users, including guests, to help protect your network
resources and assets.
WAPs that meet the new Wi-Fi 6 (802.11ax) standard, for example, can help you
build a reliable, scalable, and secure wireless network to handle the rapidly growing
number of Internet of Things (IoT) devices—and the data that those devices will
create.
Resources :::::
https://www.cisco.com/c/en/us/solutions/small-business/resource-center/
networking/what-is-access-point.html#~types-of-access-points
Resources::::::
https://www.techopedia.com/definition/3160/bridge
Twisted pair cabling is a form of wiring in which pairs of wires (the forward and return
conductors of a single circuit) are twisted together for the purposes of canceling
out electromagnetic interference (EMI) from other wire pairs and from external sources. This
type of cable is used for home and corporate Ethernet networks. Twisted pair cabling is used
in short patch cables and in the longer runs in structured cabling.
There are two types of twisted pair cables: shielded and unshielded.
Multi-mode fiber cables with LC (top) and ST (bottom) optical fiber connectors, both with protective
caps in place.
Main article: Optical fiber cable
Resources ::::
https://en.m.wikipedia.org/wiki/Networking_cables
https://en.m.wikipedia.org/wiki/IP_address
Manual:Winbox
Winbox is a small utility that allows administration of MikroTik RouterOS using a fast
and simple GUI. It is a native Win32 binary, but can be run on Linux and MacOS
(OSX) using Wine. All Winbox interface functions are as close as possible mirroring
the console functions, that is why there are no Winbox sections in the manual. Some
of advanced and system critical configurations are not possible from winbox, like
MAC address change on an interface Winbox changelog
From Winbox v3.14, the following security features are used:
Winbox.exe is signed with an Extended Validation certificate, issued by SIA Mikrotīkls (MikroTik).
WinBox uses ECSRP for key exchange and authentication (requires new winbox version).
Both sides verify that other side knows password (no man in the middle attack is possible).
Winbox in RoMON mode requires that agent is the latest version to be able to connect to latest
version routers.
Winbox uses AES128-CBC-SHA as encryption algorithm (requires winbox version 3.14 or above).
Starting Winbox
Winbox loader can be downloaded from the mikrotik download page. When
winbox.exe is downloaded, double click on it and winbox loader window will pop up:
To connect to the router enter IP or MAC address of the router, specify username
and password (if any) and click on Connect button. You can also enter the port
number after the IP address, separating them with a colon, like this
192.168.88.1:9999. The port can be changed in RouterOS services menu.
You can also use neighbor discovery, to list available routers use Neighbors tab:
From list of discovered routers you can click on IP or MAC address column to
connect to that router. If you click on IP address then IP will be used to connect, but
if you click on MAC Address then MAC address will be used to connect to the router.
Note: Neighbor discovery will show also devices which are not compatible with
Winbox, like Cisco routers or any other device that uses CDP (Cisco Discovery
Protocol). If you will try to connect to SwOS device, then connection will be
established through web browser
-- Buttons/check-boxes
Connect - Connect to the router
Connect To RoMON - Connect to RoMON Agent
Add/set - Save/Edit any of saved router entries in Managed tab.
Open In New Window - Leaves loader open in background and opens new windows for each
device to which connection is made.
-- Fields
Connect To: - destination IP or MAC address of the router
Login - username used for authentication
Password - password used for authentication
Keep Password - if unchecked, password is not saved to the list
Advanced mode:
-- Buttons/check-boxes
Browse - Browse file directory for some specific session
Keep Password - if unchecked, password is not saved to the list
Secure mode - if checked, winbox will use DH-1984 for key exchange and modified and
hardened RC4-drop3072 encryption to secure session.
Autosave session - Saves sessions automatically for devices to which connection are made.
-- Fields:
Session - Saved router session.
Note - Note that is assigned to save router entry.
Group - Group to which saved router entry is assigned.
RoMON Agent - Select RoMON Agent from available device list
-- Tools
Advanced Mode - Enables/Disables advanced mode view
Import - Imports saved session file
Export - Exports saved session file
Move Session Folder - Change path where session files are stored
Clear cache - Clear winbox cache
Check For Updates - Check for updates for Winbox loader
It is possible to use command line to pass connect to, user and password
parameters automatically:
Wine is a software that allows you to run Windows executable files on macOS. Install
latest Wine software from the official Wine HQ homepage, during installation you
must check the "64 bit" checkbox, so that it can operate in macOS Catalina and
newer. Then, you will have to launch Winbox 64bit version using this command line:
/Applications/Wine\ Staging.app/Contents/Resources/wine/bin/wine64
/Applications/winbox64.exe
Change the command according to where you installed Wine and where you have
put the Winbox64 executable. This is the easiest and most reliable way to run
Winbox on new macOS versions.
Wine bottler
For older macOS versions, It is possible to use Winbox in Apple macOS operating
system by using Wine emulation software. For easier use it can be combined
with WineBottler software to create a more convenient executable.
Homebrew
Also for older macOS versions, If the bottled version does not work, you can use
Homebrew to install Wine and then launch the regular Winbox.exe file from our
download page
Requirements:
1. Xcode latest version. If you have Xcode 9-beta, delete Xcode 8 first, then rename the Beta to
"Xcode".
2. Homebrew
If you'd like to create a launcher in MacOS, to avoid launching Wine from the
Terminal, you can do it with Automator and save the result as a service or as an app.
This is an example setup:
Interface Overview
Winbox interface has been designed to be intuitive for most of the users. Interface
consists of:
Main toolbar at the top where users can add various info fields, like CPU and memory usage.
Menu bar on the left - list of all available menus and sub-menus. This list changes depending on
what packages are installed. For example if IPv6 package is disabled, then IPv6 menu and all it's
sub-menus will not be displayed.
Work area - area where all menu windows are opened.
Title bar shows information to identify with which router Winbox session is opened.
Information is displayed in following format:
From screenshot above we can see that user krisjanis is logged into router with
IPv4/IPv6 address [fe80::4e5e:cff:fef6:c0ab%3]. Router's ID is 3C18-
Krisjanis_GW, currently installed RouterOS version is v6.36rc6, RouterBoard
is CCR1036-12G-4S and platform is tile.
On the Main toolbar's left side is located undo and redo buttons to quickly undo any
changes made to configuration. On the right side is located:
winbox traffic indicator displayed as a green bar,
indicator that shows whether winbox session uses encryption
Work Area and child windows
Winbox has MDI interface meaning that all menu configuration (child) widows are
attached to main (parent) Winbox window and are showed in work area.
Child windows can not be dragged out of working area. Notice in screenshot above
that Interface window is dragged out of visible working area and horizontal scroll bar
appeared at the bottom. If any window is outside visible work area boundaries the
vertical or/and horizontal scrollbars will appear.
Child window menu bar
Each child window has its own toolbar. Most of the windows have the same set of
toolbar buttons:
Sort - allows to sort out items depending on various parameters. Read more >>
Almost all windows have quick search input field at the right side of the toolbar. Any
text entered in this field is searched through all the items and highlighted as
illustrated in screenshot below
Resources:::::
https://wiki.mikrotik.com/wiki/Manual:Winbox
Windows Server exhibits and provides the same capability, features and
operating mechanism of a standard server operating system and is based
on the Windows NT architecture.
1. Dictionary
2. Privacy and Compliance
3. Windows Server
Windows Server
Last updated: April 16, 2012
TABLE OF CONTENTS
What Does Windows Server Mean?
Windows Server refers to any type of server instance that is installed, operated and managed by any
of the Windows Server family of operating systems.
Windows Server exhibits and provides the same capability, features and operating mechanism of a
standard server operating system and is based on the Windows NT architecture.
Advertisement
Resources:::::
https://docs.microsoft.com/en-us/windows/win32/srvnodes/windows-server