Na Reviewer
Na Reviewer
• Hardware Optimization: Virtualization enables the Energy Efficiency: Virtualization contributes to energy
consolidation of multiple virtual machines (VMs) onto a savings by consolidating physical servers and reducing
single physical server, effectively utilizing the available the overall power consumption. By running fewer
hardware resources. This consolidation reduces the need physical servers, organizations can reduce their carbon
for additional physical servers, leading to cost savings in footprint and energy costs.
terms of hardware acquisition, power consumption, and
data center space.
Types of Virtualization
• Increased Flexibility and Scalability: Virtualization
provides flexibility in resource allocation, allowing for There are several types of virtualization, each
dynamic scaling of computing resources. Administrators catering to different aspects of computing and IT
can easily adjust CPU, memory, storage, and network infrastructure. The common types of virtualization
allocations to meet changing demands. Virtual machines include:
can be provisioned or decommissioned quickly, ensuring
efficient resource utilization and agility in responding to • Server Virtualization: Server virtualization
workload variations. involves creating multiple virtual instances or
virtual machines (VMs) on a single physical
• Improved Server Utilization: By running multiple server. Each VM runs its own operating system
virtual machines on a single physical server, virtualization and applications independently of others. This
maximizes server utilization. Underutilized servers can be type of virtualization allows for better hardware
consolidated, resulting in improved efficiency and cost utilization, increased flexibility, and simplified
savings. management of server resources.
• Simplified Management: Virtualization simplifies the • Desktop Virtualization: Desktop virtualization,
management of IT infrastructure by providing centralized also known as virtual desktop infrastructure
control and administration. Administrators can use (VDI), enables the creation of virtual desktop
management software to provision, monitor, and manage environments that can be accessed remotely.
Instead of running the operating system and There are several top virtualization software solutions
applications directly on individual physical available in the market, each with its own strengths
desktops or laptops, they are hosted and executed and features. The choice of virtualization software
on virtual machines in a centralized server depends on factors such as specific requirements,
infrastructure. This approach provides users with budget, scalability needs, and compatibility with the
the flexibility to access their desktop existing IT infrastructure. Here are some of the
environment from various devices while leading virtualization software options:
centralizing management and security.
• VMware vSphere: VMware vSphere is a
• Application Virtualization: Application comprehensive virtualization platform that
virtualization decouples applications from the provides server virtualization, virtual
underlying operating system, allowing them to networking, storage management, and
run in isolated environments. This type of centralized management capabilities. It offers
virtualization eliminates conflicts between advanced features like live migration, high
applications, simplifies deployment, and availability, and distributed resource scheduling.
provides greater flexibility in managing software VMware also provides a range of products
versions and compatibility. Users can run tailored for specific use cases, such as VMware
virtualized applications on their desktops without Workstation for desktop virtualization and
installing them directly on their operating VMware ESXi for free bare-metal hypervisor.
system.
• Microsoft Hyper-V: Hyper-V is Microsoft's
• Network Virtualization: Network virtualization virtualization platform integrated into Windows
involves abstracting network resources, such as Server. It offers server virtualization capabilities,
switches, routers, and firewalls, from the including support for creating and managing
underlying physical network infrastructure. It virtual machines, live migration, and high
enables the creation of virtual networks, logically availability. Hyper-V also provides integration
segmented from the physical network, to provide with other Microsoft products and technologies,
improved network scalability, isolation, and such as Active Directory and System Center for
flexibility. Network virtualization is commonly centralized management.
used in cloud computing environments and
software-defined networking (SDN) • Oracle VM VirtualBox: VirtualBox is a free
architectures. and open-source virtualization software that
supports running multiple operating systems on a
• Storage Virtualization: Storage virtualization single host machine. It is available for various
combines physical storage devices into a single platforms, including Windows, macOS, Linux,
virtual storage pool. It allows for centralized and Solaris. VirtualBox offers features like
management and allocation of storage resources seamless window integration, shared folders, and
across multiple servers or systems. Storage support for virtual disk formats.
virtualization simplifies storage management,
improves resource utilization, and facilitates • Citrix Hypervisor: Formerly known as
features like data replication, snapshots, and XenServer, Citrix Hypervisor is an enterprise-
automated backup processes. grade virtualization platform that provides server
virtualization capabilities, including live
• Operating System migration, high availability, and centralized
Virtualization/Containerization: Operating management. It offers integration with Citrix
system virtualization, also known as Virtual Apps and Desktops (formerly XenApp
containerization, involves the creation of and XenDesktop) for delivering virtual
lightweight, isolated environments, known as applications and desktops to end-users.
containers, on a single operating system instance.
Containers share the host operating system's • Proxmox Virtual Environment: Proxmox VE
kernel and libraries, enabling efficient resource is an open-source virtualization platform that
utilization and rapid application deployment. combines virtualization and containerization. It
Containerization is popular for microservices supports both KVM (Kernel-based Virtual
architectures and enables the scalability and Machine) and LXC (Linux Containers)
portability of applications. technologies, allowing users to create and
manage virtual machines and containers on the
Virtualization Software Solutions same platform. Proxmox VE also includes
features like high availability, live migration, and • Virtual Networking: VirtualBox provides
backup/restore functionality. various networking options, including NAT
(Network Address Translation), bridged
• Nutanix AHV: Nutanix AHV is a hypervisor networking, and internal networking. These
integrated into the Nutanix Enterprise Cloud options enable virtual machines to communicate
Platform. It provides virtualization capabilities with each other, the host system, and external
for running virtual machines on Nutanix hyper- networks.
converged infrastructure. Nutanix AHV offers
features like data locality, intelligent load • Guest Additions: VirtualBox includes Guest
balancing, and automated resource optimization. Additions, which are drivers and tools that
enhance the performance and integration of guest
Oracle VM VirtualBox operating systems. Guest Additions provide
• Oracle VirtualBox is a powerful and widely used features like shared folders, seamless mouse
open-source virtualization software. It allows integration, and better display resolutions within
you to create and run virtual machines (VMs) on virtual machines.
your computer, emulating multiple operating • Virtual USB Support: VirtualBox supports
systems within a single physical machine. With USB passthrough, allowing virtual machines to
VirtualBox, you can install and run different access USB devices connected to the host
operating systems, such as Windows, Linux, system. This enables the use of USB devices
macOS, and more, simultaneously on your host such as printers, storage devices, and external
machine. peripherals within virtual machines.
• VirtualBox provides a platform for • Extensible Architecture: VirtualBox offers an
virtualization, allowing you to allocate system extensible architecture with an API that allows
resources like CPU, memory, and storage to each developers to create plugins and extensions,
virtual machine. This enables you to test extending the functionality of the software and
software applications, simulate network integrating it with other tools and systems.
environments, run legacy operating systems, and
perform various tasks in isolated virtual
environments without interfering with your main
operating system. Network Operating System (NOS)
Key features of Oracle VirtualBox include: Network Operating Systems (NOS) are specialized
software systems that manage and coordinate
• Cross-Platform Support: VirtualBox runs on network resources and provide services for
multiple host operating systems, including networked devices. They facilitate communication,
Windows, macOS, Linux, and Solaris, making it data sharing, and resource management across a
a versatile virtualization solution for different network of computers, servers, and other devices.
computer platforms. Below are the features of Network Operating
Systems:
• Easy Virtual Machine Creation: VirtualBox
offers an intuitive user interface that allows you User Management: NOS allows administrators
to create new virtual machines with predefined to create and manage user accounts, control
configurations or customize them according to access permissions, and enforce security policies
your needs. You can specify the amount of across the network. It provides authentication
memory, allocate virtual hard disks, configure and authorization mechanisms to ensure secure
network settings, and choose other hardware access to network resources.
configurations. File and Print Sharing: NOS enables file and
printer sharing among networked devices. It
• Snapshot and Rollback: VirtualBox allows you allows users to access files and directories stored
to take snapshots of your virtual machines at on different computers and printers connected to
different stages, capturing their entire state. This the network. NOS manages file access
feature enables you to experiment with software permissions, file locking, and print queue
installations, system configurations, or any management.
changes and easily revert back to a previous
Network Resource Allocation: NOS provides
snapshot if needed.
mechanisms for allocating and managing
network resources such as bandwidth, IP
addresses, and network protocols. It ensures administrators identify and resolve network
efficient utilization of network resources and issues promptly.
helps prioritize traffic based on predefined rules
and policies.
Network Security: NOS includes security Capabilities of Network Operating System
features such as firewalls, intrusion detection and
prevention systems, and encryption mechanisms • Network Communication: NOS enables
to protect the network and its resources from communication between different devices on the
unauthorized access, data breaches, and network. It manages protocols, routing, and
malicious activities. addressing schemes to facilitate data exchange
Network Services: NOS offers various network and collaboration among networked devices.
services, such as domain name resolution (DNS),
dynamic host configuration protocol (DHCP), • Network File System: NOS allows users to
network time protocol (NTP), and directory access and share files stored on remote
services. These services help in the smooth computers as if they were local files. It provides
operation and management of the network. a unified file system view across the network,
Centralized Management: NOS provides making it easier for users to access and manage
centralized management interfaces or consoles files from different locations.
that allow administrators to monitor and control • Network Printing: NOS manages print queues,
network devices, configure network settings, and spooling, and printer access, allowing multiple
troubleshoot issues from a single location. This users to share printers and send print jobs from
centralization simplifies network administration various devices on the network.
and reduces the complexity of managing
distributed network resources. • Network Backup and Recovery: NOS provides
mechanisms for backing up critical data and
Capabilities of Network Operating System system configurations to ensure data integrity
and facilitate disaster recovery in case of system
Network Communication: NOS enables
failures or data loss.
communication between different devices on the
network. It manages protocols, routing, and • Network Monitoring and Troubleshooting: NOS
addressing schemes to facilitate data exchange includes monitoring tools that track network
and collaboration among networked devices. performance, detect errors or bottlenecks, and
generate reports for troubleshooting and
Network File System: NOS allows users to
optimization purposes. These tools help
access and share files stored on remote
administrators identify and resolve network
computers as if they were local files. It provides
issues promptly.
a unified file system view across the network,
making it easier for users to access and manage
files from different locations.
NOS Examples
Network Printing: NOS manages print queues,
spooling, and printer access, allowing multiple There are several Network Operating Systems (NOS)
users to share printers and send print jobs from available in the market, each with its own set of
various devices on the network. features and capabilities. The choice of the top NOS
depends on factors such as the specific requirements
Network Backup and Recovery: NOS provides of the network environment, scalability needs,
mechanisms for backing up critical data and compatibility with existing infrastructure, and vendor
system configurations to ensure data integrity support. Here are some of the top NOS options:
and facilitate disaster recovery in case of system
failures or data loss. • Windows Server: Microsoft Windows Server is
a widely used NOS that offers a range of
Network Monitoring and Troubleshooting: NOS networking features and services. It provides
includes monitoring tools that track network robust user management, file and print sharing,
performance, detect errors or bottlenecks, and Active Directory integration, and network
generate reports for troubleshooting and security features. Windows Server also supports
optimization purposes. These tools help features like DNS, DHCP, and Group Policy for
centralized management.
• Linux: Linux distributions such as Ubuntu • Improved Hybrid Cloud Capabilities:
Server, CentOS, and Red Hat Enterprise Linux Windows Server 2019 offers enhanced
are popular choices for NOS. Linux offers integration with Microsoft Azure, enabling
flexibility, stability, and extensive networking organizations to build hybrid cloud
capabilities. It provides services like Samba for environments. It includes features like Azure
file and print sharing, BIND for DNS, and Backup, Azure Site Recovery, and Azure File
DHCP server for IP address allocation. Linux Sync, allowing seamless data backup, disaster
also offers advanced security features and can be recovery, and synchronization between on-
customized to suit specific networking premises servers and Azure cloud services.
requirements.
• Enhanced Security: Windows Server 2019
• macOS Server: macOS Server is Apple's NOS incorporates various security enhancements to
designed for Mac-based networks. It offers protect against modern cyber threats. It includes
services like file and print sharing, Time Windows Defender Advanced Threat Protection
Machine backups, DNS, DHCP, and VPN (ATP) for proactive threat detection and
services. macOS Server integrates well with response. Other security features include
Apple devices and provides a user-friendly Shielded Virtual Machines for protecting
interface for network administration. virtualized workloads, improved Windows
Defender Firewall, and support for Windows
• Novell Open Enterprise Server (OES): OES is Server System Center Endpoint Protection.
a Linux-based NOS developed by Micro Focus.
It combines the networking capabilities of Linux • Improved Hyper-Converged Infrastructure
with Novell's NetWare services, providing (HCI): Windows Server 2019 enhances the
features like file and print sharing, directory software-defined storage (SDS) capabilities for
services, and eDirectory for user management. building and managing hyper-converged
OES offers interoperability with Windows and infrastructure. It includes features like Storage
Linux environments. Spaces Direct, which allows organizations to use
industry-standard servers with local storage to
• FreeBSD: FreeBSD is a UNIX-like operating create highly available and scalable storage
system that can function as a NOS. It provides solutions.
excellent network performance, stability, and
security features. FreeBSD offers services like • Enhanced Container Support: Windows
file and print sharing, DNS, DHCP, and firewall Server 2019 provides improved support for
capabilities. It is highly customizable and containers, allowing organizations to modernize
suitable for a wide range of network their applications and infrastructure. It includes
environments. Windows Server Containers and Hyper-V
Containers, which enable the deployment and
• Cisco IOS: Cisco IOS (Internetwork Operating management of isolated containerized
System) is the NOS used in Cisco networking applications with improved performance and
devices, such as routers and switches. It offers density.
advanced networking features, routing protocols,
and extensive management capabilities. Cisco • Kubernetes Support: Windows Server 2019
IOS is primarily used in enterprise networking includes native support for Kubernetes, an open-
environments where Cisco hardware is deployed. source container orchestration platform. It allows
organizations to deploy and manage
Windows Server 2019 containerized applications using Kubernetes on
Windows Server 2019 is a server operating system Windows Server environments.
developed by Microsoft as part of the Windows NT • Improved Remote Desktop Services (RDS):
family of operating systems. It is the successor to Windows Server 2019 introduces several
Windows Server 2016 and was released on October enhancements to Remote Desktop Services,
2, 2018. Windows Server 2019 is designed to provide enabling secure and efficient remote access to
a robust and reliable platform for running enterprise- applications and desktops. It includes features
level applications and services. like improved graphics performance, enhanced
Here are some key features and capabilities of management tools, and support for Microsoft
Windows Server 2019: Azure Active Directory for authentication.
• Enhanced Windows Admin Center: Windows web applications, and services on your Windows
Server 2019 comes with an improved Windows Server.
Admin Center, a web-based management
interface that provides a unified management • Remote Desktop Services (RDS): This role
experience for Windows Server deployments. It allows you to deploy and manage remote
offers a centralized dashboard for managing desktop sessions and virtual desktop
servers, virtual machines, storage, networking, infrastructure (VDI). It enables remote access to
and other server components. desktops and applications for users across the
network.
• Hyper-V: The Hyper-V role enables you to
Windows Server 2019 Roles create and manage virtual machines on your
server. It provides a virtualization platform for
Windows Server provides a variety of roles that running multiple operating systems and
allow you to configure and manage specific applications simultaneously.
functionalities and services on your server. These
roles enable you to customize the server's behavior to • Network Policy and Access Services (NPAS):
suit your specific needs. This role includes services like Network Policy
Server (NPS), Routing and Remote Access
Service (RRAS), and Health Registration
Authority (HRA). It allows you to configure and
manage network access policies, VPNs, and
Here are some commonly used roles in Windows authentication services.
Server:
• Active Directory Certificate Services (AD
• Active Directory Domain Services (AD DS): CS): This role allows you to set up a public key
This role enables you to create and manage a infrastructure (PKI) and issue and manage digital
centralized directory service for user and certificates. It provides secure communication
computer management. It allows you to create and authentication services within your network.
domains, organize objects, and enforce security
policies in a Windows Server environment. • Windows Server Update Services (WSUS):
This role enables centralized management of
• DNS Server: The DNS (Domain Name System) Microsoft software updates. It allows you to
role provides name resolution services, mapping control and distribute updates to Windows
domain names to IP addresses and vice versa. It operating systems and other Microsoft products
allows clients to locate resources on the network within your network.
using friendly domain names.
• DHCP Server: The DHCP (Dynamic Host
Configuration Protocol) role automates the Windows Domain
allocation of IP addresses, subnet masks, and A domain specifically refers to an Active Directory
other network configuration parameters to client domain. Active Directory is a directory service
devices on a network. It simplifies network provided by Microsoft that stores information about
administration by dynamically managing IP objects on a network, such as users, computers, and
addresses. groups. An Active Directory domain is a logical
• File and Storage Services: This role enables grouping of network resources that share a common
you to set up and manage file shares, network- directory database. It allows for centralized
attached storage (NAS), and storage area administration, security management, and
network (SAN) solutions. It includes features authentication within a network environment.
like File Server, DFS (Distributed File System), Key points about domains in the context of
and iSCSI (Internet Small Computer System Windows networking:
Interface) target.
• Single Sign-On: In an Active Directory domain,
• Web Server (IIS): The Web Server role installs users can log in with a single set of credentials
and configures Internet Information Services (username and password) and access resources
(IIS), allowing you to host and manage websites, throughout the network without needing separate
authentication for each resource.
• Domain Controller: A domain controller is a 2. Wireless Access Points (APs): Wireless access
server running Windows Server operating points are devices that provide wireless
system with Active Directory Domain Services connectivity to devices within their coverage
(AD DS) role installed. It is responsible for area. They act as bridges between wireless
authenticating users, managing security policies, devices and the wired network, allowing wireless
and maintaining the directory database for the clients to access network resources and the
domain. internet.
• Domain Name: A domain has a unique domain 3. Wi-Fi Standards: The Institute of Electrical and
name, which is a hierarchical name assigned to Electronics Engineers (IEEE) defines various
identify the domain. In Windows networking, Wi-Fi standards, such as IEEE 802.11a, 802.11b,
domain names typically follow the DNS 802.11g, 802.11n, 802.11ac, and 802.11ax. Each
(Domain Name System) naming conventions, standard offers different data transfer rates,
such as example.com or company.local. frequency bands, and features.
• Trust Relationships: Domains can establish 4. SSID (Service Set Identifier): SSID is the name
trust relationships with other domains, allowing of a wireless network. When devices search for
users from one domain to access resources in available networks, they display a list of SSIDs,
another domain. Trust relationships enable and users can connect to the network of their
collaboration and resource sharing between choice by entering the appropriate credentials.
different domains.
5. Wi-Fi Authentication and Encryption: To
• Group Policy: Group Policy is a feature of secure wireless networks, various authentication
Active Directory that allows administrators to and encryption methods are used. WPA2 (Wi-Fi
define and enforce settings and configurations Protected Access II) and WPA3 are the common
for users and computers within a domain. It security protocols that ensure the confidentiality
provides centralized management of policies, and integrity of data transmitted over wireless
preferences, and security settings. networks.
• Resource Sharing: In a domain, resources such Advantages of Wireless Networks
as files, printers, and applications can be shared
and accessed by users across the network. • Mobility: Wireless networking allows users to
Domain-based security and access control connect to the internet and network resources
mechanisms ensure that only authorized users from anywhere within the coverage area of an
can access these resources. access point. Users can move freely without
being tied to a physical network connection.
• Convenience: Wireless networking eliminates
Wireless Network Administration the need for Ethernet cables, making it easy to
set up and connect devices without physical
Wireless networking, also known as Wi-Fi, is a constraints.
technology that enables devices to connect to
computer networks without the need for physical • Scalability: Wireless networks can be easily
cables. It has become an integral part of modern expanded and adapted to accommodate more
communication and connectivity, allowing users to devices and users without the need for additional
access the internet, share data, and communicate cabling.
wirelessly.
• Cost-Effective: Deploying wireless networks
Key Concepts can be cost-effective, especially in scenarios
where running physical cables would be difficult
1. Wireless Communication: Wireless networking or expensive.
uses radio waves to transmit data between
devices. These radio waves travel through the • Flexibility: Wireless networking provides
air, enabling wireless devices like laptops, flexibility in network layout and device
smartphones, tablets, and IoT (Internet of placement, making it suitable for diverse
Things) devices to communicate with each other environments, such as homes, offices, public
and access network resources. spaces, and outdoor areas.
Challenges for Wireless Networks • Wireless Network Adapter: A wireless network
adapter, also known as a Wi-Fi adapter or
• Signal Interference: Wireless signals can be wireless NIC (Network Interface Card), is a
affected by interference from other electronic hardware component that allows devices like
devices, physical obstacles, and neighboring computers, laptops, and smartphones to connect
wireless networks. to a wireless network. It receives wireless signals
• Security: Ensuring the security of wireless from the AP and transmits data between the
networks is crucial to prevent unauthorized device and the network.
access and data breaches. • Wireless Range Extender (Repeater): A
• Bandwidth Limitations: The available wireless range extender or repeater is used to
bandwidth in wireless networks is shared among extend the coverage area of a wireless network.
connected devices, which can impact It receives the wireless signal from the main AP
performance in crowded environments. and rebroadcasts it, effectively increasing the
network's coverage range. Range extenders are
• Range and Coverage: The coverage area of an useful in scenarios where the wireless signal
access point can be limited, necessitating careful strength is weak in certain areas.
planning for proper coverage in larger areas.
• Wireless LAN Controller (WLC): A wireless
LAN controller is a device used to centrally
manage and control multiple APs in large
wireless networks. It provides features like
automatic configuration, firmware updates, and
seamless roaming for connected devices. WLCs
offer improved scalability and security
management for enterprise-level wireless
Wireless Network Components networks.
Wireless networks consist of various components that • Wireless Bridge: A wireless bridge connects
work together to provide wireless connectivity and two separate wired networks via a wireless link.
enable devices to communicate without physical It allows network segments that are physically
cables. Understanding these components is essential distant from each other to communicate
for designing, configuring, and managing wireless wirelessly. Wireless bridges are commonly used
networks effectively. Here are the key wireless to connect buildings or remote areas without the
network components: need for running physical cables.
• Wireless Access Point (AP): The wireless • Wireless Clients: Wireless clients are the
access point is a critical component of a wireless devices that connect to the wireless network,
network. It serves as a central hub that enables such as laptops, smartphones, tablets, printers,
wireless devices to connect to the wired network. and IoT devices. These devices use wireless
APs transmit and receive wireless signals, network adapters to communicate with the AP
allowing devices like laptops, smartphones, and and access network resources.
IoT devices to communicate with the network
and access the internet. In larger networks, • Wireless Mesh Nodes: Wireless mesh networks
multiple APs are strategically placed to ensure consist of multiple APs that form a self-
seamless coverage and roaming. configuring and self-healing network. Each AP
acts as a node and communicates with
• Wireless Router: A wireless router combines neighboring nodes to relay data and extend
the functionality of a traditional wired router and network coverage. Mesh networks are useful in
a wireless access point. It acts as the gateway large outdoor areas and challenging
between the local network (LAN) and the environments.
internet (WAN). Wireless routers provide DHCP
services to assign IP addresses to devices on the
network and offer features like Network Address
Wireless Network Standards
Translation (NAT) to share a single public IP
address among multiple devices. Wireless network standards are sets of specifications
and protocols that define how wireless devices
communicate with each other and access network to optimize data transmission and reduce power
resources. These standards are established by consumption.
organizations such as the Institute of Electrical and
Electronics Engineers (IEEE) and the Wi-Fi Alliance
to ensure interoperability and compatibility among Wireless Network Encryption
different wireless devices. Here are some of the
commonly used wireless network standards: Wireless network encryption and authentication are
critical security measures used to protect the
• IEEE 802.11a: IEEE 802.11a was one of the confidentiality and integrity of data transmitted over
earliest wireless LAN standards, operating in the a wireless network. They ensure that only authorized
5 GHz frequency band. It offers a maximum data users can access the network and prevent
rate of up to 54 Mbps and provides better eavesdropping or unauthorized access by malicious
immunity to interference compared to the 2.4 entities. Two primary security components involved
GHz band. However, it has a shorter range in wireless network security are encryption and
compared to 802.11b and g. authentication:
• IEEE 802.11b: IEEE 802.11b operates in the 2.4 Encryption – Encryption is the process of converting
GHz frequency band and supports data rates up data into a code or cipher to prevent unauthorized
to 11 Mbps. It offers a longer range compared to access. In wireless networks, encryption is applied to
802.11a but is more susceptible to interference the data transmitted between devices and access
from other devices operating in the 2.4 GHz points, making it unreadable to anyone who
band, such as microwave ovens and cordless intercepts it without the encryption key.
phones.
Common encryption protocols used in wireless
• IEEE 802.11g: IEEE 802.11g operates in the 2.4 networks are:
GHz band and provides backward compatibility
with 802.11b. It supports data rates up to 54 • WEP (Wired Equivalent Privacy): WEP was
Mbps, offering a balance between speed and one of the earliest encryption standards for
range. 802.11g became widely adopted due to its wireless networks. However, it is now
compatibility with existing 802.11b devices. considered weak and vulnerable to attacks. It is
not recommended to use WEP as it can be easily
• IEEE 802.11n: IEEE 802.11n, commonly cracked.
referred to as Wi-Fi 4, operates in both the 2.4
GHz and 5 GHz frequency bands. It introduced • WPA (Wi-Fi Protected Access): WPA was
multiple-input, multiple-output (MIMO) introduced as an improvement over WEP. WPA
technology, allowing for higher data rates and uses a stronger encryption algorithm called TKIP
improved range compared to previous (Temporal Key Integrity Protocol) to protect
standards. 802.11n can achieve data rates up to data. However, it also has some vulnerabilities,
600 Mbps. and it is recommended to use the more secure
WPA2 or WPA3 if possible.
• IEEE 802.11ac: IEEE 802.11ac, also known as
Wi-Fi 5, operates in the 5 GHz band and offers • WPA2 (Wi-Fi Protected Access II): WPA2 is
higher data rates and improved performance the most widely used and secure encryption
compared to 802.11n. It introduced wider protocol for wireless networks. It uses AES
channel bandwidths, beamforming, and multi- (Advanced Encryption Standard) for data
user MIMO, enabling data rates of up to several encryption and is considered highly secure when
gigabits per second. strong passwords are used.
• IEEE 802.11ax: IEEE 802.11ax, also known as • WPA3 (Wi-Fi Protected Access 3): WPA3 is
Wi-Fi 6, is the latest wireless LAN standard. It the latest and most advanced encryption
operates in both the 2.4 GHz and 5 GHz bands standard. It offers improved security features,
and focuses on improving efficiency and including individualized data encryption and
performance in dense environments with many protection against brute-force attacks. WPA3 is
connected devices. Wi-Fi 6 introduces features recommended for the highest level of wireless
like Orthogonal Frequency Division Multiple network security.
Access (OFDMA) and Target Wake Time (TWT)
Wireless Network Topologies
Wireless network topologies refer to the ways in 2. Temporary Network: Ad-hoc networks are
which wireless devices are interconnected to form a often created for specific purposes and are
network. These topologies determine how devices temporary in nature. Once devices leave the
communicate with each other and access network network or disconnect, the ad-hoc network
resources. There are two primary wireless network dissolves.
topologies: infrastructure mode and ad-hoc mode.
Let's explore each of them: 3. Limited Range: Ad-hoc networks typically have
a smaller coverage area since devices need to be
Infrastructure Mode: In infrastructure mode, within direct radio range of each other to
wireless devices communicate through a central hub communicate.
or access point (AP). The access point acts as the
focal point for all wireless communication within the 4. Device-to-Device Communication: Devices in
network. Devices, such as laptops, smartphones, and an ad-hoc network can share files, collaborate,
IoT devices, connect to the access point to access the and communicate directly with one another
network and the internet. without going through a central access point.
Key features of infrastructure mode are as follows: 5. Suitable for Small Groups: Ad-hoc networks
are useful for scenarios like ad-hoc meetings, file
1. Centralized Hub: The access point serves as a sharing between devices in proximity, or gaming
centralized hub, managing the wireless network sessions.
and handling the communication between
devices and the wired network.
2. Wi-Fi Coverage Area: The access point defines Wireless Network Authentication
the coverage area of the wireless network. Authentication is the process of verifying the identity
Devices need to be within the range of the access of users or devices before granting them access to the
point to maintain connectivity. network. It ensures that only authorized users can
3. Seamless Roaming: Devices can seamlessly connect to the network and access its resources.
roam between multiple access points within the Common authentication methods in wireless
same network, allowing for continuous networks include:
connectivity while moving within the coverage
area. • Pre-Shared Key (PSK) Authentication: In
PSK authentication, users or devices must enter a
4. Scalability: Infrastructure mode allows for the pre-shared passphrase (password) to connect to
easy addition of more devices by connecting the wireless network. The same passphrase is
them to the existing access point or by adding used for both encryption and authentication. PSK
more access points to expand the coverage area. is commonly used in home and small office
5. Internet Connectivity: The access point environments.
provides a gateway for wireless devices to access • Enterprise Authentication: Enterprise
the internet through the wired network authentication is used in larger networks, such as
connection. corporate environments. It involves a more
robust authentication process using an external
• Ad-Hoc Mode: In ad-hoc mode, wireless authentication server, such as RADIUS (Remote
devices communicate directly with each Authentication Dial-In User Service). Enterprise
other without the need for a central access authentication methods, like WPA2-Enterprise
point. In this topology, each wireless device and WPA3-Enterprise, offer individualized user
acts as both a transmitter and a receiver, credentials and more secure authentication.
enabling peer-to-peer communication. • Captive Portal: A captive portal is a web page
that requires users to authenticate before
Key features of ad-hoc mode: accessing the internet. Users are typically
1. Decentralized Communication: Devices required to provide credentials or accept terms
communicate directly with each other, forming a and conditions to gain access.
temporary network. There is no central hub or Combining strong encryption and authentication
access point involved in managing methods ensures that wireless networks are well-
communication. protected against unauthorized access and data
breaches. It is essential to use the latest and most 8. Keep APs, routers, and other network devices
secure encryption and authentication protocols updated with the latest firmware provided by the
available to maintain a high level of wireless network manufacturers. Firmware updates often include
security. Additionally, regularly updating passwords security patches to address vulnerabilities.
and monitoring the network for suspicious activity
are essential practices to maintain a secure wireless 9. Use Wireless Intrusion Detection System (WIDS)
environment. and Wireless Intrusion Prevention System
(WIPS) to monitor and detect potential threats,
Securing Wireless Network such as rogue APs and unauthorized access
attempts.
Securing wireless networks is of utmost importance
to protect sensitive data, prevent unauthorized access, 10. If remote access to the network is required, use a
and ensure the overall integrity of the network. VPN to establish an encrypted tunnel, ensuring
Implementing robust security measures will help secure access to the internal resources.
safeguard against potential threats and attacks.
11. Ensure physical security of the APs and network
Here are essential steps to secure wireless networks: equipment by placing them in locked and
monitored areas to prevent unauthorized
1. Change the default login credentials (username physical access.
and password) of the wireless access points
(APs) and routers to prevent unauthorized 12. Educate users about the importance of wireless
access to their configuration interfaces. network security, including the risks of
connecting to unsecured public Wi-Fi networks
2. Enable WPA2 or WPA3 (Wi-Fi Protected and the use of strong passwords.
Access) encryption on the wireless network.
Avoid using older and weaker encryption
methods like WEP (Wired Equivalent Privacy),
as they are more susceptible to security
breaches.
3. Use strong and unique passwords for both the
Wi-Fi network and the administrative access to
the APs and routers. Avoid using easily
guessable passwords.
4. Disable the broadcasting of the network's SSID
(Service Set Identifier) to make it less visible to
casual observers. While this doesn't provide
robust security, it can deter casual attempts to
connect.
5. Implement MAC address filtering on the AP to
allow only specified devices with registered
MAC addresses to connect to the network.
However, keep in mind that MAC addresses can
be spoofed, so this should not be the sole
security measure.
6. Set up VLANs (Virtual LANs) to segregate
different types of devices and network traffic.
This limits the scope of potential attacks and
enhances network security.
7. If necessary, create a separate guest network
with limited access to the local network
resources. This way, guest users can access the
internet without compromising the main
network.