0% found this document useful (0 votes)
28 views14 pages

Na Reviewer

Network performance monitoring is essential to maintain a robust network. It involves continuously monitoring metrics to ensure optimal performance, enhance user experience, detect issues promptly, and inform capacity planning. Key metrics include latency, bandwidth, packet loss, and more. Tools like Wireshark and SNMP protocols are commonly used to monitor networks and diagnose performance issues.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
28 views14 pages

Na Reviewer

Network performance monitoring is essential to maintain a robust network. It involves continuously monitoring metrics to ensure optimal performance, enhance user experience, detect issues promptly, and inform capacity planning. Key metrics include latency, bandwidth, packet loss, and more. Tools like Wireshark and SNMP protocols are commonly used to monitor networks and diagnose performance issues.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 14

Introduction to network performance monitoring Overall, network performance monitoring is

and its importance essential for maintaining a robust and efficient


Network performance monitoring refers to the network infrastructure. It helps organizations
process of continuously monitoring and measuring ensure optimal performance, enhance user
the performance and health of a computer network. It experience, detect and resolve issues promptly,
involves tracking various performance metrics, and make informed decisions regarding network
analyzing network traffic, and identifying potential capacity and security.
bottlenecks or issues that can impact the network's
efficiency and user experience. Key performance metrics and indicators (e.g.,
The importance of network performance latency, bandwidth, packet loss)
monitoring cannot be overstated. Here are some key
reasons why it is crucial: 1. Latency: Latency refers to the time delay
1. Proactive issue detection: Network between sending a request and receiving a
performance monitoring allows IT professionals response. It measures the time it takes for data
to proactively identify and address potential packets to travel from the source to the
performance issues before they escalate into destination and back. Lower latency is desirable
major problems. By monitoring performance for applications that require real-time
metrics in real-time, IT teams can detect responsiveness, such as VoIP or online gaming.
anomalies, unusual traffic patterns, or signs of 2. Bandwidth: Bandwidth is the maximum amount
network congestion, and take corrective actions of data that can be transmitted over a network in
promptly. a given time period. It represents the capacity of
2. Improved user experience: A well-monitored the network connection and is usually measured
network ensures that users have a seamless and in bits per second (bps). Higher bandwidth
reliable experience when accessing network allows for faster data transfer rates and better
resources, applications, and services. By performance for applications that require high
monitoring network performance, organizations data throughput.
can identify and resolve issues that may cause 3. Packet Loss: Packet loss occurs when data
slow response times, delays, or service packets do not reach their destination
disruptions, ultimately enhancing user successfully. It can be caused by network
satisfaction and productivity. congestion, faulty network equipment, or
3. Capacity planning: Network performance transmission errors. Packet loss can degrade
monitoring provides valuable insights into network performance and result in
network usage trends and patterns over time. By retransmissions, affecting the overall throughput
analyzing these metrics, organizations can and quality of applications.
effectively plan for future capacity needs, 4. Jitter: Jitter refers to the variation in the delay of
anticipate network growth, and make informed received packets. It measures the inconsistency
decisions regarding network upgrades or in the arrival time of packets at the destination.
expansions. Excessive jitter can disrupt real-time
4. Troubleshooting and problem resolution: applications, such as VoIP or video
When network issues arise, performance conferencing, leading to poor audio/video quality
monitoring data can serve as a valuable resource and latency issues.
for troubleshooting. By analyzing network traffic 5. Round-Trip Time (RTT): RTT is the time it
and performance metrics, IT teams can quickly takes for a data packet to travel from the source
pinpoint the root cause of problems, whether it's to the destination and back. It is often used to
a misconfiguration, faulty hardware, or excessive estimate latency and can help identify network
network traffic. congestion or delays in data transmission.
5. Security monitoring: Network performance 6. Throughput: Throughput is the measure of the
monitoring can also help in identifying potential actual amount of data that is successfully
security threats or anomalies within the network. transmitted over a network in a given time
Unusual or unexpected network traffic patterns period. It represents the effective data transfer
can be indicators of malicious activities, such as rate and can be influenced by factors such as
a distributed denial-of-service (DDoS) attack or bandwidth, latency, and packet loss.
unauthorized access attempts. By monitoring 7. Network Utilization: Network utilization
network performance, organizations can detect measures the percentage of the available network
and respond to security incidents promptly. capacity that is being used. It indicates how
much of the network's capacity is being utilized
at a given time and can help identify potential 7. ManageEngine OpManager: A network monitoring
bottlenecks or capacity constraints. tool that provides network performance monitoring,
8. Error Rates: Error rates indicate the number of fault management, and device discovery. It offers a
transmission errors or data corruption occurring user-friendly interface, customizable dashboards, and
in the network. High error rates can degrade performance reports.
network performance and impact the integrity of 8. Cacti: An open-source network graphing solution
transmitted data. that uses SNMP to gather data from network devices
and create graphs for performance analysis.

Tools for network performance monitoring and


analysis (e.g., Wireshark, SNMP) Troubleshooting methodologies and best
practices:
There are several tools available for network
performance monitoring and analysis. Here are two  Gather Information: Gather relevant
commonly used tools: information about the network, including
topology, device configurations, and recent
1. Wireshark: Wireshark is a powerful and popular changes. Obtain details about the reported issue,
open-source packet analyzer. It allows you to capture, symptoms, and affected users or applications.
analyze, and dissect network packets in real-time.  Define the Problem: Clearly define the problem
Wireshark supports multiple protocols and provides by identifying specific symptoms and their
detailed information about network traffic, including impact on network performance. Isolate the
packet headers, payload, and timing. It helps in problem to a specific device, segment, or
diagnosing network issues, troubleshooting, and application to narrow down the troubleshooting
performance analysis. scope.
2. Simple Network Management Protocol (SNMP):  Divide and Conquer: Divide the network into
SNMP is a protocol used for managing and smaller segments or components to isolate the
monitoring network devices. It enables the collection problematic area. Use techniques like ping tests,
and organization of network performance data from traceroute, and connectivity tests to identify
various devices, such as routers, switches, and where the issue lies. Start troubleshooting from
servers. SNMP-based monitoring systems can the edge devices and work your way towards the
retrieve and analyze SNMP data, providing insights core.
into device performance, status, and resource  Analyze Network Traffic: Capture and analyze
utilization. network traffic using tools like Wireshark. Look
for abnormal patterns, high bandwidth
Other network performance monitoring and
utilization, packet loss, or errors. Analyzing
analysis tools include:
network traffic helps identify the source of
3. PRTG Network Monitor: A comprehensive performance issues.
network monitoring tool that provides real-time  Document Changes and Solutions: Document
monitoring of network devices, servers, and all changes made during troubleshooting,
applications. It offers customizable dashboards, including configurations, adjustments, or fixes
alerts, and reports for performance analysis. applied. This documentation serves as a
4. Nagios: An open-source network monitoring tool that reference for future troubleshooting and helps
offers monitoring capabilities for network devices, track patterns or recurring issues.
servers, and services. It provides event notifications,
performance graphs, and reports to monitor network
performance. Wireshark
5. Zabbix: A monitoring platform that allows for
monitoring network devices, servers, and • Wireshark is a widely used open-source network
applications. It supports various monitoring methods, protocol analyzer and packet capture tool. It
including SNMP, agent-based monitoring, and more. allows users to capture and analyze network
6. SolarWinds Network Performance Monitor: A traffic in real-time or from saved capture files.
commercial network monitoring tool that provides Wireshark supports a vast array of network
comprehensive network performance monitoring and protocols and provides detailed information
analysis. It offers real-time monitoring, customizable about each packet, enabling network
dashboards, alerts, and reporting features. administrators, developers, and security
professionals to troubleshoot network issues,
analyze protocol behavior, and diagnose network experience, ensure timely delivery of data, and
performance problems. Here are four notable maximize the utilization of network resources.
features of Wireshark: Here are three commonly used network
optimization techniques:
• Packet Capture and Analysis: Wireshark
provides a robust packet capture engine that • Quality of Service (QoS): QoS is a set of
allows users to capture network traffic from techniques that prioritize and manage network
different interfaces. It supports capturing packets traffic to ensure reliable and predictable
from wired and wireless networks, including performance for critical applications. QoS allows
Ethernet, Wi-Fi, and Bluetooth. Once the packets network administrators to allocate bandwidth,
are captured, Wireshark displays detailed prioritize certain types of traffic, and enforce
information about each packet, such as protocol policies to meet specific performance
headers, payload, source and destination IP requirements. By assigning different levels of
addresses, and timing information. This feature priority to various types of network traffic, QoS
helps in network troubleshooting, protocol ensures that critical applications, such as voice
analysis, and security auditing. and video, receive sufficient bandwidth and low
latency while less time-sensitive traffic is
• Extensive Protocol Support: Wireshark appropriately managed.
supports a vast range of network protocols,
making it a versatile tool for analyzing various • Traffic Shaping: Traffic shaping is a technique
types of traffic. It can dissect and display the used to control the flow of network traffic and
contents of protocols like TCP, UDP, HTTP, prevent congestion by smoothing the traffic
DNS, FTP, SMTP, TLS, and many more. flow. It involves regulating the rate at which
Wireshark's ability to interpret and analyze packets are transmitted to avoid exceeding the
protocols at a granular level provides insights available bandwidth and causing network
into protocol behavior, potential issues, and congestion. By shaping the traffic, network
protocol-specific troubleshooting. administrators can prioritize certain traffic types,
control the transmission rates, and allocate
• Advanced Filtering and Search: Wireshark bandwidth based on specific needs. Traffic
offers powerful filtering and search capabilities shaping helps in optimizing network
to isolate and analyze specific packets or types of performance and ensuring fair resource
traffic. It allows users to create display filters allocation.
based on different criteria, such as IP addresses,
port numbers, protocols, packet lengths, or • Caching: Caching involves storing frequently
specific patterns in packet contents. This feature accessed data closer to the users or at strategic
helps in focusing on relevant packets, reducing points within the network to reduce latency and
the noise, and quickly identifying specific issues improve response times. Caching can be applied
or patterns in network traffic. at various levels, such as web browsers, proxy
servers, or content delivery networks (CDNs).
• Rich Analysis and Visualization: Wireshark By caching commonly accessed content, such as
provides various tools and features to analyze web pages, images, or videos, network traffic
and visualize network traffic. It offers statistics can be reduced, and users can experience faster
and summary views, allowing users to examine access to content. Caching helps in optimizing
packet counts, protocol distribution, round-trip network utilization, reducing bandwidth
times, and other key metrics. Wireshark also consumption, and improving overall user
supports generating graphs, charts, and time- experience.
based plots to visualize network performance
and behavior. These analysis and visualization These network optimization techniques are used to
capabilities aid in identifying trends, anomalies, address common challenges in network performance,
and performance bottlenecks in the network. such as bandwidth limitations, congestion, and
latency. By implementing QoS, traffic shaping, and
Introduction to network optimization techniques caching strategies, organizations can enhance
• Network optimization techniques are employed network performance, prioritize critical applications,
to improve the performance, efficiency, and allocate resources efficiently, and provide a better
utilization of computer networks. These user experience.
techniques aim to enhance the overall user
Virtualization virtual machines and their resources from a single
interface, streamlining operational tasks and reducing
Virtualization refers to the process of creating virtual administrative overhead.
or simulated versions of various computing
resources, such as servers, operating systems, storage Enhanced Disaster Recovery and Business Continuity:
devices, or network resources. It involves the Virtualization facilitates robust disaster recovery and
abstraction of physical hardware and the creation of business continuity strategies. Virtual machine snapshots
virtual environments that mimic the functionalities and replication features allow for quick and efficient
and capabilities of the underlying physical resources. backups, ensuring data integrity and minimizing
downtime in the event of system failures or disasters.
• At its core, virtualization enables the Virtual machines can be easily migrated between physical
consolidation of multiple virtual instances or servers to maintain service availability.
machines onto a single physical machine. These
virtual instances, known as virtual machines Testing and Development Environments: Virtualization
(VMs), are isolated from one another and can enables the creation of isolated test and development
run their own operating systems and environments. Virtual machines can be used to test
applications. The virtualization layer, typically software configurations, perform compatibility checks,
implemented through a hypervisor, manages the and prototype new systems without impacting production
allocation of physical resources to the virtual environments. This isolation ensures a safe and controlled
machines, ensuring efficient utilization of environment for experimentation and development.
hardware.
Improved Security and Isolation: Virtualization
provides enhanced security by isolating virtual machines
from one another. Each virtual machine operates
Benefits of Virtualization independently, with its own operating system and
Virtualization offers numerous benefits across applications, reducing the risk of vulnerabilities spreading
different aspects of computing and IT infrastructure. across systems. Additionally, virtual machines can be
Here are some of the key advantages of isolated in secure sandbox environments for running
virtualization: untrusted or potentially harmful applications.

• Hardware Optimization: Virtualization enables the Energy Efficiency: Virtualization contributes to energy
consolidation of multiple virtual machines (VMs) onto a savings by consolidating physical servers and reducing
single physical server, effectively utilizing the available the overall power consumption. By running fewer
hardware resources. This consolidation reduces the need physical servers, organizations can reduce their carbon
for additional physical servers, leading to cost savings in footprint and energy costs.
terms of hardware acquisition, power consumption, and
data center space.
Types of Virtualization
• Increased Flexibility and Scalability: Virtualization
provides flexibility in resource allocation, allowing for There are several types of virtualization, each
dynamic scaling of computing resources. Administrators catering to different aspects of computing and IT
can easily adjust CPU, memory, storage, and network infrastructure. The common types of virtualization
allocations to meet changing demands. Virtual machines include:
can be provisioned or decommissioned quickly, ensuring
efficient resource utilization and agility in responding to • Server Virtualization: Server virtualization
workload variations. involves creating multiple virtual instances or
virtual machines (VMs) on a single physical
• Improved Server Utilization: By running multiple server. Each VM runs its own operating system
virtual machines on a single physical server, virtualization and applications independently of others. This
maximizes server utilization. Underutilized servers can be type of virtualization allows for better hardware
consolidated, resulting in improved efficiency and cost utilization, increased flexibility, and simplified
savings. management of server resources.
• Simplified Management: Virtualization simplifies the • Desktop Virtualization: Desktop virtualization,
management of IT infrastructure by providing centralized also known as virtual desktop infrastructure
control and administration. Administrators can use (VDI), enables the creation of virtual desktop
management software to provision, monitor, and manage environments that can be accessed remotely.
Instead of running the operating system and There are several top virtualization software solutions
applications directly on individual physical available in the market, each with its own strengths
desktops or laptops, they are hosted and executed and features. The choice of virtualization software
on virtual machines in a centralized server depends on factors such as specific requirements,
infrastructure. This approach provides users with budget, scalability needs, and compatibility with the
the flexibility to access their desktop existing IT infrastructure. Here are some of the
environment from various devices while leading virtualization software options:
centralizing management and security.
• VMware vSphere: VMware vSphere is a
• Application Virtualization: Application comprehensive virtualization platform that
virtualization decouples applications from the provides server virtualization, virtual
underlying operating system, allowing them to networking, storage management, and
run in isolated environments. This type of centralized management capabilities. It offers
virtualization eliminates conflicts between advanced features like live migration, high
applications, simplifies deployment, and availability, and distributed resource scheduling.
provides greater flexibility in managing software VMware also provides a range of products
versions and compatibility. Users can run tailored for specific use cases, such as VMware
virtualized applications on their desktops without Workstation for desktop virtualization and
installing them directly on their operating VMware ESXi for free bare-metal hypervisor.
system.
• Microsoft Hyper-V: Hyper-V is Microsoft's
• Network Virtualization: Network virtualization virtualization platform integrated into Windows
involves abstracting network resources, such as Server. It offers server virtualization capabilities,
switches, routers, and firewalls, from the including support for creating and managing
underlying physical network infrastructure. It virtual machines, live migration, and high
enables the creation of virtual networks, logically availability. Hyper-V also provides integration
segmented from the physical network, to provide with other Microsoft products and technologies,
improved network scalability, isolation, and such as Active Directory and System Center for
flexibility. Network virtualization is commonly centralized management.
used in cloud computing environments and
software-defined networking (SDN) • Oracle VM VirtualBox: VirtualBox is a free
architectures. and open-source virtualization software that
supports running multiple operating systems on a
• Storage Virtualization: Storage virtualization single host machine. It is available for various
combines physical storage devices into a single platforms, including Windows, macOS, Linux,
virtual storage pool. It allows for centralized and Solaris. VirtualBox offers features like
management and allocation of storage resources seamless window integration, shared folders, and
across multiple servers or systems. Storage support for virtual disk formats.
virtualization simplifies storage management,
improves resource utilization, and facilitates • Citrix Hypervisor: Formerly known as
features like data replication, snapshots, and XenServer, Citrix Hypervisor is an enterprise-
automated backup processes. grade virtualization platform that provides server
virtualization capabilities, including live
• Operating System migration, high availability, and centralized
Virtualization/Containerization: Operating management. It offers integration with Citrix
system virtualization, also known as Virtual Apps and Desktops (formerly XenApp
containerization, involves the creation of and XenDesktop) for delivering virtual
lightweight, isolated environments, known as applications and desktops to end-users.
containers, on a single operating system instance.
Containers share the host operating system's • Proxmox Virtual Environment: Proxmox VE
kernel and libraries, enabling efficient resource is an open-source virtualization platform that
utilization and rapid application deployment. combines virtualization and containerization. It
Containerization is popular for microservices supports both KVM (Kernel-based Virtual
architectures and enables the scalability and Machine) and LXC (Linux Containers)
portability of applications. technologies, allowing users to create and
manage virtual machines and containers on the
Virtualization Software Solutions same platform. Proxmox VE also includes
features like high availability, live migration, and • Virtual Networking: VirtualBox provides
backup/restore functionality. various networking options, including NAT
(Network Address Translation), bridged
• Nutanix AHV: Nutanix AHV is a hypervisor networking, and internal networking. These
integrated into the Nutanix Enterprise Cloud options enable virtual machines to communicate
Platform. It provides virtualization capabilities with each other, the host system, and external
for running virtual machines on Nutanix hyper- networks.
converged infrastructure. Nutanix AHV offers
features like data locality, intelligent load • Guest Additions: VirtualBox includes Guest
balancing, and automated resource optimization. Additions, which are drivers and tools that
enhance the performance and integration of guest
Oracle VM VirtualBox operating systems. Guest Additions provide
• Oracle VirtualBox is a powerful and widely used features like shared folders, seamless mouse
open-source virtualization software. It allows integration, and better display resolutions within
you to create and run virtual machines (VMs) on virtual machines.
your computer, emulating multiple operating • Virtual USB Support: VirtualBox supports
systems within a single physical machine. With USB passthrough, allowing virtual machines to
VirtualBox, you can install and run different access USB devices connected to the host
operating systems, such as Windows, Linux, system. This enables the use of USB devices
macOS, and more, simultaneously on your host such as printers, storage devices, and external
machine. peripherals within virtual machines.
• VirtualBox provides a platform for • Extensible Architecture: VirtualBox offers an
virtualization, allowing you to allocate system extensible architecture with an API that allows
resources like CPU, memory, and storage to each developers to create plugins and extensions,
virtual machine. This enables you to test extending the functionality of the software and
software applications, simulate network integrating it with other tools and systems.
environments, run legacy operating systems, and
perform various tasks in isolated virtual
environments without interfering with your main
operating system. Network Operating System (NOS)

Key features of Oracle VirtualBox include: Network Operating Systems (NOS) are specialized
software systems that manage and coordinate
• Cross-Platform Support: VirtualBox runs on network resources and provide services for
multiple host operating systems, including networked devices. They facilitate communication,
Windows, macOS, Linux, and Solaris, making it data sharing, and resource management across a
a versatile virtualization solution for different network of computers, servers, and other devices.
computer platforms. Below are the features of Network Operating
Systems:
• Easy Virtual Machine Creation: VirtualBox
offers an intuitive user interface that allows you  User Management: NOS allows administrators
to create new virtual machines with predefined to create and manage user accounts, control
configurations or customize them according to access permissions, and enforce security policies
your needs. You can specify the amount of across the network. It provides authentication
memory, allocate virtual hard disks, configure and authorization mechanisms to ensure secure
network settings, and choose other hardware access to network resources.
configurations.  File and Print Sharing: NOS enables file and
printer sharing among networked devices. It
• Snapshot and Rollback: VirtualBox allows you allows users to access files and directories stored
to take snapshots of your virtual machines at on different computers and printers connected to
different stages, capturing their entire state. This the network. NOS manages file access
feature enables you to experiment with software permissions, file locking, and print queue
installations, system configurations, or any management.
changes and easily revert back to a previous
 Network Resource Allocation: NOS provides
snapshot if needed.
mechanisms for allocating and managing
network resources such as bandwidth, IP
addresses, and network protocols. It ensures administrators identify and resolve network
efficient utilization of network resources and issues promptly.
helps prioritize traffic based on predefined rules
and policies.
 Network Security: NOS includes security Capabilities of Network Operating System
features such as firewalls, intrusion detection and
prevention systems, and encryption mechanisms • Network Communication: NOS enables
to protect the network and its resources from communication between different devices on the
unauthorized access, data breaches, and network. It manages protocols, routing, and
malicious activities. addressing schemes to facilitate data exchange
 Network Services: NOS offers various network and collaboration among networked devices.
services, such as domain name resolution (DNS),
dynamic host configuration protocol (DHCP), • Network File System: NOS allows users to
network time protocol (NTP), and directory access and share files stored on remote
services. These services help in the smooth computers as if they were local files. It provides
operation and management of the network. a unified file system view across the network,
 Centralized Management: NOS provides making it easier for users to access and manage
centralized management interfaces or consoles files from different locations.
that allow administrators to monitor and control • Network Printing: NOS manages print queues,
network devices, configure network settings, and spooling, and printer access, allowing multiple
troubleshoot issues from a single location. This users to share printers and send print jobs from
centralization simplifies network administration various devices on the network.
and reduces the complexity of managing
distributed network resources. • Network Backup and Recovery: NOS provides
mechanisms for backing up critical data and
Capabilities of Network Operating System system configurations to ensure data integrity
and facilitate disaster recovery in case of system
 Network Communication: NOS enables
failures or data loss.
communication between different devices on the
network. It manages protocols, routing, and • Network Monitoring and Troubleshooting: NOS
addressing schemes to facilitate data exchange includes monitoring tools that track network
and collaboration among networked devices. performance, detect errors or bottlenecks, and
generate reports for troubleshooting and
 Network File System: NOS allows users to
optimization purposes. These tools help
access and share files stored on remote
administrators identify and resolve network
computers as if they were local files. It provides
issues promptly.
a unified file system view across the network,
making it easier for users to access and manage
files from different locations.
NOS Examples
 Network Printing: NOS manages print queues,
spooling, and printer access, allowing multiple There are several Network Operating Systems (NOS)
users to share printers and send print jobs from available in the market, each with its own set of
various devices on the network. features and capabilities. The choice of the top NOS
depends on factors such as the specific requirements
 Network Backup and Recovery: NOS provides of the network environment, scalability needs,
mechanisms for backing up critical data and compatibility with existing infrastructure, and vendor
system configurations to ensure data integrity support. Here are some of the top NOS options:
and facilitate disaster recovery in case of system
failures or data loss. • Windows Server: Microsoft Windows Server is
a widely used NOS that offers a range of
 Network Monitoring and Troubleshooting: NOS networking features and services. It provides
includes monitoring tools that track network robust user management, file and print sharing,
performance, detect errors or bottlenecks, and Active Directory integration, and network
generate reports for troubleshooting and security features. Windows Server also supports
optimization purposes. These tools help features like DNS, DHCP, and Group Policy for
centralized management.
• Linux: Linux distributions such as Ubuntu • Improved Hybrid Cloud Capabilities:
Server, CentOS, and Red Hat Enterprise Linux Windows Server 2019 offers enhanced
are popular choices for NOS. Linux offers integration with Microsoft Azure, enabling
flexibility, stability, and extensive networking organizations to build hybrid cloud
capabilities. It provides services like Samba for environments. It includes features like Azure
file and print sharing, BIND for DNS, and Backup, Azure Site Recovery, and Azure File
DHCP server for IP address allocation. Linux Sync, allowing seamless data backup, disaster
also offers advanced security features and can be recovery, and synchronization between on-
customized to suit specific networking premises servers and Azure cloud services.
requirements.
• Enhanced Security: Windows Server 2019
• macOS Server: macOS Server is Apple's NOS incorporates various security enhancements to
designed for Mac-based networks. It offers protect against modern cyber threats. It includes
services like file and print sharing, Time Windows Defender Advanced Threat Protection
Machine backups, DNS, DHCP, and VPN (ATP) for proactive threat detection and
services. macOS Server integrates well with response. Other security features include
Apple devices and provides a user-friendly Shielded Virtual Machines for protecting
interface for network administration. virtualized workloads, improved Windows
Defender Firewall, and support for Windows
• Novell Open Enterprise Server (OES): OES is Server System Center Endpoint Protection.
a Linux-based NOS developed by Micro Focus.
It combines the networking capabilities of Linux • Improved Hyper-Converged Infrastructure
with Novell's NetWare services, providing (HCI): Windows Server 2019 enhances the
features like file and print sharing, directory software-defined storage (SDS) capabilities for
services, and eDirectory for user management. building and managing hyper-converged
OES offers interoperability with Windows and infrastructure. It includes features like Storage
Linux environments. Spaces Direct, which allows organizations to use
industry-standard servers with local storage to
• FreeBSD: FreeBSD is a UNIX-like operating create highly available and scalable storage
system that can function as a NOS. It provides solutions.
excellent network performance, stability, and
security features. FreeBSD offers services like • Enhanced Container Support: Windows
file and print sharing, DNS, DHCP, and firewall Server 2019 provides improved support for
capabilities. It is highly customizable and containers, allowing organizations to modernize
suitable for a wide range of network their applications and infrastructure. It includes
environments. Windows Server Containers and Hyper-V
Containers, which enable the deployment and
• Cisco IOS: Cisco IOS (Internetwork Operating management of isolated containerized
System) is the NOS used in Cisco networking applications with improved performance and
devices, such as routers and switches. It offers density.
advanced networking features, routing protocols,
and extensive management capabilities. Cisco • Kubernetes Support: Windows Server 2019
IOS is primarily used in enterprise networking includes native support for Kubernetes, an open-
environments where Cisco hardware is deployed. source container orchestration platform. It allows
organizations to deploy and manage
Windows Server 2019 containerized applications using Kubernetes on
Windows Server 2019 is a server operating system Windows Server environments.
developed by Microsoft as part of the Windows NT • Improved Remote Desktop Services (RDS):
family of operating systems. It is the successor to Windows Server 2019 introduces several
Windows Server 2016 and was released on October enhancements to Remote Desktop Services,
2, 2018. Windows Server 2019 is designed to provide enabling secure and efficient remote access to
a robust and reliable platform for running enterprise- applications and desktops. It includes features
level applications and services. like improved graphics performance, enhanced
Here are some key features and capabilities of management tools, and support for Microsoft
Windows Server 2019: Azure Active Directory for authentication.
• Enhanced Windows Admin Center: Windows web applications, and services on your Windows
Server 2019 comes with an improved Windows Server.
Admin Center, a web-based management
interface that provides a unified management • Remote Desktop Services (RDS): This role
experience for Windows Server deployments. It allows you to deploy and manage remote
offers a centralized dashboard for managing desktop sessions and virtual desktop
servers, virtual machines, storage, networking, infrastructure (VDI). It enables remote access to
and other server components. desktops and applications for users across the
network.
• Hyper-V: The Hyper-V role enables you to
Windows Server 2019 Roles create and manage virtual machines on your
server. It provides a virtualization platform for
Windows Server provides a variety of roles that running multiple operating systems and
allow you to configure and manage specific applications simultaneously.
functionalities and services on your server. These
roles enable you to customize the server's behavior to • Network Policy and Access Services (NPAS):
suit your specific needs. This role includes services like Network Policy
Server (NPS), Routing and Remote Access
Service (RRAS), and Health Registration
Authority (HRA). It allows you to configure and
manage network access policies, VPNs, and
Here are some commonly used roles in Windows authentication services.
Server:
• Active Directory Certificate Services (AD
• Active Directory Domain Services (AD DS): CS): This role allows you to set up a public key
This role enables you to create and manage a infrastructure (PKI) and issue and manage digital
centralized directory service for user and certificates. It provides secure communication
computer management. It allows you to create and authentication services within your network.
domains, organize objects, and enforce security
policies in a Windows Server environment. • Windows Server Update Services (WSUS):
This role enables centralized management of
• DNS Server: The DNS (Domain Name System) Microsoft software updates. It allows you to
role provides name resolution services, mapping control and distribute updates to Windows
domain names to IP addresses and vice versa. It operating systems and other Microsoft products
allows clients to locate resources on the network within your network.
using friendly domain names.
• DHCP Server: The DHCP (Dynamic Host
Configuration Protocol) role automates the Windows Domain
allocation of IP addresses, subnet masks, and A domain specifically refers to an Active Directory
other network configuration parameters to client domain. Active Directory is a directory service
devices on a network. It simplifies network provided by Microsoft that stores information about
administration by dynamically managing IP objects on a network, such as users, computers, and
addresses. groups. An Active Directory domain is a logical
• File and Storage Services: This role enables grouping of network resources that share a common
you to set up and manage file shares, network- directory database. It allows for centralized
attached storage (NAS), and storage area administration, security management, and
network (SAN) solutions. It includes features authentication within a network environment.
like File Server, DFS (Distributed File System), Key points about domains in the context of
and iSCSI (Internet Small Computer System Windows networking:
Interface) target.
• Single Sign-On: In an Active Directory domain,
• Web Server (IIS): The Web Server role installs users can log in with a single set of credentials
and configures Internet Information Services (username and password) and access resources
(IIS), allowing you to host and manage websites, throughout the network without needing separate
authentication for each resource.
• Domain Controller: A domain controller is a 2. Wireless Access Points (APs): Wireless access
server running Windows Server operating points are devices that provide wireless
system with Active Directory Domain Services connectivity to devices within their coverage
(AD DS) role installed. It is responsible for area. They act as bridges between wireless
authenticating users, managing security policies, devices and the wired network, allowing wireless
and maintaining the directory database for the clients to access network resources and the
domain. internet.
• Domain Name: A domain has a unique domain 3. Wi-Fi Standards: The Institute of Electrical and
name, which is a hierarchical name assigned to Electronics Engineers (IEEE) defines various
identify the domain. In Windows networking, Wi-Fi standards, such as IEEE 802.11a, 802.11b,
domain names typically follow the DNS 802.11g, 802.11n, 802.11ac, and 802.11ax. Each
(Domain Name System) naming conventions, standard offers different data transfer rates,
such as example.com or company.local. frequency bands, and features.
• Trust Relationships: Domains can establish 4. SSID (Service Set Identifier): SSID is the name
trust relationships with other domains, allowing of a wireless network. When devices search for
users from one domain to access resources in available networks, they display a list of SSIDs,
another domain. Trust relationships enable and users can connect to the network of their
collaboration and resource sharing between choice by entering the appropriate credentials.
different domains.
5. Wi-Fi Authentication and Encryption: To
• Group Policy: Group Policy is a feature of secure wireless networks, various authentication
Active Directory that allows administrators to and encryption methods are used. WPA2 (Wi-Fi
define and enforce settings and configurations Protected Access II) and WPA3 are the common
for users and computers within a domain. It security protocols that ensure the confidentiality
provides centralized management of policies, and integrity of data transmitted over wireless
preferences, and security settings. networks.
• Resource Sharing: In a domain, resources such Advantages of Wireless Networks
as files, printers, and applications can be shared
and accessed by users across the network. • Mobility: Wireless networking allows users to
Domain-based security and access control connect to the internet and network resources
mechanisms ensure that only authorized users from anywhere within the coverage area of an
can access these resources. access point. Users can move freely without
being tied to a physical network connection.
• Convenience: Wireless networking eliminates
Wireless Network Administration the need for Ethernet cables, making it easy to
set up and connect devices without physical
Wireless networking, also known as Wi-Fi, is a constraints.
technology that enables devices to connect to
computer networks without the need for physical • Scalability: Wireless networks can be easily
cables. It has become an integral part of modern expanded and adapted to accommodate more
communication and connectivity, allowing users to devices and users without the need for additional
access the internet, share data, and communicate cabling.
wirelessly.
• Cost-Effective: Deploying wireless networks
Key Concepts can be cost-effective, especially in scenarios
where running physical cables would be difficult
1. Wireless Communication: Wireless networking or expensive.
uses radio waves to transmit data between
devices. These radio waves travel through the • Flexibility: Wireless networking provides
air, enabling wireless devices like laptops, flexibility in network layout and device
smartphones, tablets, and IoT (Internet of placement, making it suitable for diverse
Things) devices to communicate with each other environments, such as homes, offices, public
and access network resources. spaces, and outdoor areas.
Challenges for Wireless Networks • Wireless Network Adapter: A wireless network
adapter, also known as a Wi-Fi adapter or
• Signal Interference: Wireless signals can be wireless NIC (Network Interface Card), is a
affected by interference from other electronic hardware component that allows devices like
devices, physical obstacles, and neighboring computers, laptops, and smartphones to connect
wireless networks. to a wireless network. It receives wireless signals
• Security: Ensuring the security of wireless from the AP and transmits data between the
networks is crucial to prevent unauthorized device and the network.
access and data breaches. • Wireless Range Extender (Repeater): A
• Bandwidth Limitations: The available wireless range extender or repeater is used to
bandwidth in wireless networks is shared among extend the coverage area of a wireless network.
connected devices, which can impact It receives the wireless signal from the main AP
performance in crowded environments. and rebroadcasts it, effectively increasing the
network's coverage range. Range extenders are
• Range and Coverage: The coverage area of an useful in scenarios where the wireless signal
access point can be limited, necessitating careful strength is weak in certain areas.
planning for proper coverage in larger areas.
• Wireless LAN Controller (WLC): A wireless
LAN controller is a device used to centrally
manage and control multiple APs in large
wireless networks. It provides features like
automatic configuration, firmware updates, and
seamless roaming for connected devices. WLCs
offer improved scalability and security
management for enterprise-level wireless
Wireless Network Components networks.
Wireless networks consist of various components that • Wireless Bridge: A wireless bridge connects
work together to provide wireless connectivity and two separate wired networks via a wireless link.
enable devices to communicate without physical It allows network segments that are physically
cables. Understanding these components is essential distant from each other to communicate
for designing, configuring, and managing wireless wirelessly. Wireless bridges are commonly used
networks effectively. Here are the key wireless to connect buildings or remote areas without the
network components: need for running physical cables.
• Wireless Access Point (AP): The wireless • Wireless Clients: Wireless clients are the
access point is a critical component of a wireless devices that connect to the wireless network,
network. It serves as a central hub that enables such as laptops, smartphones, tablets, printers,
wireless devices to connect to the wired network. and IoT devices. These devices use wireless
APs transmit and receive wireless signals, network adapters to communicate with the AP
allowing devices like laptops, smartphones, and and access network resources.
IoT devices to communicate with the network
and access the internet. In larger networks, • Wireless Mesh Nodes: Wireless mesh networks
multiple APs are strategically placed to ensure consist of multiple APs that form a self-
seamless coverage and roaming. configuring and self-healing network. Each AP
acts as a node and communicates with
• Wireless Router: A wireless router combines neighboring nodes to relay data and extend
the functionality of a traditional wired router and network coverage. Mesh networks are useful in
a wireless access point. It acts as the gateway large outdoor areas and challenging
between the local network (LAN) and the environments.
internet (WAN). Wireless routers provide DHCP
services to assign IP addresses to devices on the
network and offer features like Network Address
Wireless Network Standards
Translation (NAT) to share a single public IP
address among multiple devices. Wireless network standards are sets of specifications
and protocols that define how wireless devices
communicate with each other and access network to optimize data transmission and reduce power
resources. These standards are established by consumption.
organizations such as the Institute of Electrical and
Electronics Engineers (IEEE) and the Wi-Fi Alliance
to ensure interoperability and compatibility among Wireless Network Encryption
different wireless devices. Here are some of the
commonly used wireless network standards: Wireless network encryption and authentication are
critical security measures used to protect the
• IEEE 802.11a: IEEE 802.11a was one of the confidentiality and integrity of data transmitted over
earliest wireless LAN standards, operating in the a wireless network. They ensure that only authorized
5 GHz frequency band. It offers a maximum data users can access the network and prevent
rate of up to 54 Mbps and provides better eavesdropping or unauthorized access by malicious
immunity to interference compared to the 2.4 entities. Two primary security components involved
GHz band. However, it has a shorter range in wireless network security are encryption and
compared to 802.11b and g. authentication:
• IEEE 802.11b: IEEE 802.11b operates in the 2.4 Encryption – Encryption is the process of converting
GHz frequency band and supports data rates up data into a code or cipher to prevent unauthorized
to 11 Mbps. It offers a longer range compared to access. In wireless networks, encryption is applied to
802.11a but is more susceptible to interference the data transmitted between devices and access
from other devices operating in the 2.4 GHz points, making it unreadable to anyone who
band, such as microwave ovens and cordless intercepts it without the encryption key.
phones.
Common encryption protocols used in wireless
• IEEE 802.11g: IEEE 802.11g operates in the 2.4 networks are:
GHz band and provides backward compatibility
with 802.11b. It supports data rates up to 54 • WEP (Wired Equivalent Privacy): WEP was
Mbps, offering a balance between speed and one of the earliest encryption standards for
range. 802.11g became widely adopted due to its wireless networks. However, it is now
compatibility with existing 802.11b devices. considered weak and vulnerable to attacks. It is
not recommended to use WEP as it can be easily
• IEEE 802.11n: IEEE 802.11n, commonly cracked.
referred to as Wi-Fi 4, operates in both the 2.4
GHz and 5 GHz frequency bands. It introduced • WPA (Wi-Fi Protected Access): WPA was
multiple-input, multiple-output (MIMO) introduced as an improvement over WEP. WPA
technology, allowing for higher data rates and uses a stronger encryption algorithm called TKIP
improved range compared to previous (Temporal Key Integrity Protocol) to protect
standards. 802.11n can achieve data rates up to data. However, it also has some vulnerabilities,
600 Mbps. and it is recommended to use the more secure
WPA2 or WPA3 if possible.
• IEEE 802.11ac: IEEE 802.11ac, also known as
Wi-Fi 5, operates in the 5 GHz band and offers • WPA2 (Wi-Fi Protected Access II): WPA2 is
higher data rates and improved performance the most widely used and secure encryption
compared to 802.11n. It introduced wider protocol for wireless networks. It uses AES
channel bandwidths, beamforming, and multi- (Advanced Encryption Standard) for data
user MIMO, enabling data rates of up to several encryption and is considered highly secure when
gigabits per second. strong passwords are used.
• IEEE 802.11ax: IEEE 802.11ax, also known as • WPA3 (Wi-Fi Protected Access 3): WPA3 is
Wi-Fi 6, is the latest wireless LAN standard. It the latest and most advanced encryption
operates in both the 2.4 GHz and 5 GHz bands standard. It offers improved security features,
and focuses on improving efficiency and including individualized data encryption and
performance in dense environments with many protection against brute-force attacks. WPA3 is
connected devices. Wi-Fi 6 introduces features recommended for the highest level of wireless
like Orthogonal Frequency Division Multiple network security.
Access (OFDMA) and Target Wake Time (TWT)
Wireless Network Topologies
Wireless network topologies refer to the ways in 2. Temporary Network: Ad-hoc networks are
which wireless devices are interconnected to form a often created for specific purposes and are
network. These topologies determine how devices temporary in nature. Once devices leave the
communicate with each other and access network network or disconnect, the ad-hoc network
resources. There are two primary wireless network dissolves.
topologies: infrastructure mode and ad-hoc mode.
Let's explore each of them: 3. Limited Range: Ad-hoc networks typically have
a smaller coverage area since devices need to be
Infrastructure Mode: In infrastructure mode, within direct radio range of each other to
wireless devices communicate through a central hub communicate.
or access point (AP). The access point acts as the
focal point for all wireless communication within the 4. Device-to-Device Communication: Devices in
network. Devices, such as laptops, smartphones, and an ad-hoc network can share files, collaborate,
IoT devices, connect to the access point to access the and communicate directly with one another
network and the internet. without going through a central access point.

Key features of infrastructure mode are as follows: 5. Suitable for Small Groups: Ad-hoc networks
are useful for scenarios like ad-hoc meetings, file
1. Centralized Hub: The access point serves as a sharing between devices in proximity, or gaming
centralized hub, managing the wireless network sessions.
and handling the communication between
devices and the wired network.
2. Wi-Fi Coverage Area: The access point defines Wireless Network Authentication
the coverage area of the wireless network. Authentication is the process of verifying the identity
Devices need to be within the range of the access of users or devices before granting them access to the
point to maintain connectivity. network. It ensures that only authorized users can
3. Seamless Roaming: Devices can seamlessly connect to the network and access its resources.
roam between multiple access points within the Common authentication methods in wireless
same network, allowing for continuous networks include:
connectivity while moving within the coverage
area. • Pre-Shared Key (PSK) Authentication: In
PSK authentication, users or devices must enter a
4. Scalability: Infrastructure mode allows for the pre-shared passphrase (password) to connect to
easy addition of more devices by connecting the wireless network. The same passphrase is
them to the existing access point or by adding used for both encryption and authentication. PSK
more access points to expand the coverage area. is commonly used in home and small office
5. Internet Connectivity: The access point environments.
provides a gateway for wireless devices to access • Enterprise Authentication: Enterprise
the internet through the wired network authentication is used in larger networks, such as
connection. corporate environments. It involves a more
robust authentication process using an external
• Ad-Hoc Mode: In ad-hoc mode, wireless authentication server, such as RADIUS (Remote
devices communicate directly with each Authentication Dial-In User Service). Enterprise
other without the need for a central access authentication methods, like WPA2-Enterprise
point. In this topology, each wireless device and WPA3-Enterprise, offer individualized user
acts as both a transmitter and a receiver, credentials and more secure authentication.
enabling peer-to-peer communication. • Captive Portal: A captive portal is a web page
that requires users to authenticate before
Key features of ad-hoc mode: accessing the internet. Users are typically
1. Decentralized Communication: Devices required to provide credentials or accept terms
communicate directly with each other, forming a and conditions to gain access.
temporary network. There is no central hub or Combining strong encryption and authentication
access point involved in managing methods ensures that wireless networks are well-
communication. protected against unauthorized access and data
breaches. It is essential to use the latest and most 8. Keep APs, routers, and other network devices
secure encryption and authentication protocols updated with the latest firmware provided by the
available to maintain a high level of wireless network manufacturers. Firmware updates often include
security. Additionally, regularly updating passwords security patches to address vulnerabilities.
and monitoring the network for suspicious activity
are essential practices to maintain a secure wireless 9. Use Wireless Intrusion Detection System (WIDS)
environment. and Wireless Intrusion Prevention System
(WIPS) to monitor and detect potential threats,
Securing Wireless Network such as rogue APs and unauthorized access
attempts.
Securing wireless networks is of utmost importance
to protect sensitive data, prevent unauthorized access, 10. If remote access to the network is required, use a
and ensure the overall integrity of the network. VPN to establish an encrypted tunnel, ensuring
Implementing robust security measures will help secure access to the internal resources.
safeguard against potential threats and attacks.
11. Ensure physical security of the APs and network
Here are essential steps to secure wireless networks: equipment by placing them in locked and
monitored areas to prevent unauthorized
1. Change the default login credentials (username physical access.
and password) of the wireless access points
(APs) and routers to prevent unauthorized 12. Educate users about the importance of wireless
access to their configuration interfaces. network security, including the risks of
connecting to unsecured public Wi-Fi networks
2. Enable WPA2 or WPA3 (Wi-Fi Protected and the use of strong passwords.
Access) encryption on the wireless network.
Avoid using older and weaker encryption
methods like WEP (Wired Equivalent Privacy),
as they are more susceptible to security
breaches.
3. Use strong and unique passwords for both the
Wi-Fi network and the administrative access to
the APs and routers. Avoid using easily
guessable passwords.
4. Disable the broadcasting of the network's SSID
(Service Set Identifier) to make it less visible to
casual observers. While this doesn't provide
robust security, it can deter casual attempts to
connect.
5. Implement MAC address filtering on the AP to
allow only specified devices with registered
MAC addresses to connect to the network.
However, keep in mind that MAC addresses can
be spoofed, so this should not be the sole
security measure.
6. Set up VLANs (Virtual LANs) to segregate
different types of devices and network traffic.
This limits the scope of potential attacks and
enhances network security.
7. If necessary, create a separate guest network
with limited access to the local network
resources. This way, guest users can access the
internet without compromising the main
network.

You might also like