0% found this document useful (0 votes)
109 views

SDFC - Basics of Networking

Uploaded by

LouR2011
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
109 views

SDFC - Basics of Networking

Uploaded by

LouR2011
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 59

BASICS OF

NETWORKING
SERVICE DESK FOUNDATION CERTICATION
Agenda
01 Introduction to Networking

02 Types of Cables

03 Network Concepts

04 Network Components

05 Networking Commands

06 Virtual Private Network

07 Wireless Radio : Wi-Fi

Copyright © 2020 Accenture. All rights reserved. 2


0
1
Introduction to Networking
Introduction to Networking

• A network is an interconnection of two or more network


devices, that are linked/ connected in order to share
resources, exchange information, or allow electronic
communications.
• A network allows us to share files, stream media, play
network games and printer sharing between 2 or more
devices.

• Networks can be classified based on the following


categories:
1. Size
2. Entity
3. Connectivity
4. Topology

Copyright © 2020 Accenture. All rights reserved. 4


Network Classification
Network

Size Entity Connectivity Topology


 Local Area  Home Network  Peer – to –  Bus Topology
Network Peer Network
 Enterprise  Ring Topology
 Metropolitan Area Network  Client – Server
Network Network  Star Topology

 Wide Area  Mesh Topology


Network
 Hybrid
Topology

Copyright © 2020 Accenture. All rights reserved. 5


Networks Classification - Size

Local Area Network Metropolitan Area Network Wide Area Network

• A local area network, or LAN, is • A metropolitan area network, is • A wide area network, or WAN,
a network in which computers a network in which the is a network that spans a large
are relatively close together, computers are spread across geographic territory, such as an
such as within the same office an entire city. entire state or country, or even
or building. an entire continent.
• MAN connects two or more
• Usually a LAN is contained LANs that are within the same • The biggest WAN on the planet
within a single building, but a city but are far enough apart is known as the world wide web
LAN can extend to several that the networks can’t be or the ‘Internet’.
buildings on a campus. connected using a simple cable
or wireless connection. • Example: Accenture’s global
• Example: Network within an network
Accenture office building(s) • Example: Network between
Accenture buildings in a city

Copyright © 2020 Accenture. All rights reserved. 6


Network Classification - Entity

Home Network Enterprise Network

Copyright © 2020 Accenture. All rights reserved. 7


Network Classification - Connectivity

Peer – to – Peer (P2P) Network Client – Server Network

Copyright © 2020 Accenture. All rights reserved. 8


Network Classification - Connectivity

Peer – to – Peer (P2P) Network Client – Server Network


• Peer-to-peer networks involve two or more computers • A client-server network involves multiple clients, or
pooling individual resources such as disk drives, DVD workstations, connecting to at least one central server.
players and printers. These shared resources are Most data and applications are installed on the server.
available to every computer in the network.
• When clients need access to these resources, they
• Each computer acts as both the client and the server, access them from the server. Servers often have private
communicating directly with the other computers. user directories as well as multiple public directories.
The clients are allowed to function as workstations
• On a peer-to-peer network, for example, a printer on without sharing any resources.
one computer can be used by any other computer on
the network. These networks are inexpensive to set • It is easier to upgrade software applications and files
up. because they are held on one single computer. System-
wide services can be provided through the server
software.

Copyright © 2020 Accenture. All rights reserved. 9


Network Classification - Topology

Copyright © 2020 Accenture. All rights reserved. 10


Network Classification - Topology

1. Bus Topology 2. Ring Topology 3. Star Topology

• Bus topology orients all devices • Ring topology is where nodes • Star topology is laid out so every
on a network along a single are arranged in a circle (or node in the network is directly
cable running from one end of ring). Data travels through the connected to one central hub via
the network to the other ring in either one or both coaxial, twisted-pair, or fiber-
directions. optic cable.
• Bus topologies are a good, cost-
effective choice for smaller • Ring topology is efficient at • It is stable as one node’s failure
networks because the layout is
transmitting data without errors. does not affect the network and
simple.
devices can be added or

• It also requires constant
Data transmission along a single removed without taking the
cable means that bus topology is vigilance as cable/node failure network offline.
vulnerable to cable failure and can bring down the entire
slow transmission speeds. network. Addition of devices
• Star topology is heavily
increases the communication
dependent on the central node
delay.
and data transmission is limited
by the technical configuration of
the central node.
Copyright © 2020 Accenture. All rights reserved. 11
Network Classification - Topology

4. Tree Topology 5. Mesh Topology 6. Hybrid Topology

• Tree topology has a parent-child • Mesh topology is an intricate and


• Hybrid topologies combine two or
hierarchy with the central node elaborate structure of point-to-
more topology structures. Hybrid
functioning like a tree trunk for point connections where the
structures are commonly found in
the network, with nodes nodes are interconnected. Mesh
enterprises where teams have
extending outward in a branch- networks can be full or partial
custom network requirements.
like fashion. mesh.

• It allows easy addition of nodes • Mesh topologies are reliable and • The main advantage of hybrid
and network expansion. stable, and the complex degree of structures is the degree of
Troubleshooting errors is also a interconnectivity between nodes flexibility they provide as there
straightforward process as each makes the network resistant to are few limitations on the network
branch can be individually failure. structure itself that a hybrid setup
assessed. can’t accommodate.
• Mesh topologies are incredibly
• Entire network depends on the labor-intensive. Each
interconnection between nodes • Combining multiple topologies
health of the root node. Failure of makes the network design very
the root node will lead to failure requires a cable and configuration
once deployed, so it can also be complex and drives up the cost.
of all the subsequent branches.
time-consuming to set up.
Copyright © 2020 Accenture. All rights reserved. 12
Summary

01 02 03
A network is an interconnection of A network allows us to share files, Networks cab be classified based
two or more network devices, that stream media, play network games on their size, entity, connectivity
are linked/ connected in order to and printer sharing between 2 or and topology.
share resources, exchange more devices.
information, or allow electronic
communications.

Copyright © 2020 Accenture. All rights reserved. 13


0
2
Types of Cables
Types of Cables

01 Co-Axial Cable 02 Unshielded Twisted Pair (UTP)

03 Shielded Twisted Pair (STP) 04 Fiber Optic Cable

Copyright © 2020 Accenture. All rights reserved. 15


UTP Cables
The following summarizes the features of UTP cable:

1. Speed and throughput—10 to 1000 Mbps


2. Average cost per node—Least expensive
3. Media and connector size—Small
4. Maximum cable length—100 m (short)

Commonly used types of UTP cabling are as follows:

• Category 1 — Used for telephone communications. Unsuitable for transmitting data. CAT 5e
• Category 2 — Can transmit data at speeds up to 4 megabits per second (Mbps).
• Category 3 — Can transmit data at speeds up to 10 Mbps.
• Category 4 — Can transmit data at speeds up to 16 Mbps.
• Category 5 — Can transmit data at speeds up to 100 Mbps.
CAT 6
• Category 5e — Used in networks running at speeds up to 1000 Mbps (1 Gbps).
• Category 6/6a — Can transmit data at 10 Gbps up to 55 meters.
• Category 7 — Can transmit data at 10 Gbps up to 100 meters
Copyright © 2020 Accenture. All rights reserved. 16
Ethernet Cable

• Ethernet cable is one of the most popular forms of


network cable used on wired networks. Ethernet cables
connect devices on local area networks such as PCs,
routers, and switches to each other.

• Ethernet cables are by crimping UTP cable to and RJ – 45


jack.

• The RJ (Registered Jack) – 45 jack is an 8 – pin


connector that provides an interface between the UTP
cable and the computer to exchange information.

• The RJ – 11 connector is typically used with phones in


PSTN networks or with VOIP networks.

Copyright © 2020 Accenture. All rights reserved. 17


Fiber Optic Cable
Plastic
Kevlar Reinforcing
Outer Jacket Shield Glass Fiber
Material
and Cladding

• Fiber optic cables can function in 2 modes:


1. Single – mode: One stream of laser generated light (100 km)
2. Multi – mode : Multiple streams of LED generated light (2km)
• Applications of fiber optic cable include long
distance telecommunication or providing a high-speed data connection
between different parts of a building.
Multimode
Connector

Copyright © 2020 Accenture. All rights reserved. 18


Summary

01 02 03
There are a wide variety of cables Unshielded twisted pair cable is Fiber optic cable is used for long
used to create networks. The most used with the RJ – 45 connector to range data transmission. It provides
common types of cables are co- create the ethernet/patch cable fast and reliable data transmission
axial, unshielded/shielded twisted used to connect computers with but it more expensive to implement
pair and fiber optic cable. other computers or routers and than other cables.
switches.

Copyright © 2020 Accenture. All rights reserved. 19


0
3
Network Concepts
Open Systems Interconnection (OSI) Model

• The Open Systems Interconnection (OSI) model


describes seven layers that computer systems use to
communicate over a network. It was the first standard
model for network communications, adopted by all
major computer and telecommunication companies in
the early 1980s.

• The modern Internet is not based on OSI, but on the


simpler TCP/IP model. However, the OSI 7-layer model
is still widely used, as it helps visualize and
communicate how networks operate, and helps isolate
and troubleshoot networking problems.

• OSI was introduced in 1983 by representatives of the


major computer and telecom companies. It was
adopted by ISO as an international standard in 1984.
OSI Model – Layer Functions

Copyright © 2020 Accenture. All rights reserved. 22


OSI Model - Encapsulation

Copyright © 2020 Accenture. All rights reserved. 23


OSI Model vs TCP/IP Model

Copyright © 2020 Accenture. All rights reserved. 24


IPv4 Address

• An Internet Protocol address (IP address) is a


numerical label assigned to each device connected to
a computer network that uses the Internet Protocol for
communication.
• An IP address serves two main functions: host or
network interface identification and location
addressing.
• Network administrators assign an IP address to each
device connected to a network. Such assignments
may be on a static (fixed or permanent) or dynamic
basis, depending on network practices and software
features.
• There are 2 versions of IP address in use today: IPv4
and IPv6.

Copyright © 2020 Accenture. All rights reserved. 25


IPv6 Address

• An Internet Protocol Version 6 address (IPv6 address)


is used to identify a computer, or a network node
participating in an IPv6 computer network and locate it
in the network.
• IPv6 was standardized in 1998 because of the growth
of the Internet and the depletion of available IPv4
addresses.
• IPv4 has a limited address space as the address size
is restricted to 32 bits. IPv6 improves on IPv4 by
providing a 128-bit address size.
• IPv6 deployment has been ongoing since mid 2000’s.
Most of the modern systems are designed to work with
IPv4 as well as IPv6 networks.

Copyright © 2020 Accenture. All rights reserved. 26


IP Addressing - Classes
• The 32-bit IP address is divided into five sub-classes. Each of
these classes has a valid range of IP addresses. Classes D and
E are reserved for multicast and experimental purposes
respectively.

• IPv4 address is divided into two parts:

Network ID & Host ID

• The class of IP address is used to determine the bits used for


network ID and host ID and the number of total networks and
hosts possible in that class. Each ISP or network administrator
assigns IP address to each device that is connected to its
network.
Private IP Addresses:
• Each class has a range of IP addresses that are reserved for
Class A  10.0.0.0 to 10.255.255.255
systems not connected to the internet that do not require a
globally unique IP address. These are referred to as private IP Class B  172.16.0.0 to 172.31.255.255
address. Class C  192.168.0.0 to 192.168.255.255

Copyright © 2020 Accenture. All rights reserved. 27


Subnet Mask
Subnet Mask helps in determining the Network and the Host. It hides (masks) the network portion of the address and identifies
what bits may be used to assign addresses to hosts.

8 Network Bits 24 Host Bits


8 bits 8 bits 8 bits 8 bits
Default Subnet Mask Class A Network Host Host Host

255 0 0 0

16 Network Bits 16 Host Bits


8 bits 8 bits 8 bits 8 bits
Default Subnet Mask Class B Network Network Host Host

255 255 0 0

24 Network Bits 8 Host Bits


8 bits 8 bits 8 bits 8 bits
Default Subnet Mask Class C Network Network Network Host

255 255 255 0

Copyright © 2020 Accenture. All rights reserved. 28


Dynamic Host Configuration Protocol - DHCP

• It enables a DHCP server to automatically


assign an IP address to a computer from a
defined range of IP addresses (scope)
configured for a given network.
• There are 2 types of IP address allocation:
Static and Dynamic
• When a device is assigned a static IP
address, it does not change. The device
always has the same IP address.
• Most devices use dynamic IP addresses,
which are assigned by the DHCP when they
connect. These IP addresses are temporary
and can change over time.

Copyright © 2020 Accenture. All rights reserved. 29


Domain Name System - DNS

• DNS is a service that translates domain


name, and the web addresses typed in the
address bar of a web browser into
corresponding IP addresses & vice-versa.
• The DNS implements a distributed database
to store the name and address information
for all public hosts on the Internet. DNS
system is in fact, its own network.
• If one DNS server doesn't know how to
translate a particular domain name, it asks
another one, and so on, until the correct IP
address is returned.

Copyright © 2020 Accenture. All rights reserved. 30


Summary

01 02 03
The OSI model provides a Devices are identified on an DHCP service allows dynamic
theoretical description of the network via an IP address. There assignment of IP addresses on a
network communication. The are 2 types of IP address version in network and DNS service translates
TCP/IP model is used for real world use currently: IPv4 and IPv6. domain names into IP addresses or
application. vice versa.

Copyright © 2020 Accenture. All rights reserved. 31


0
4
Network Components
Network Interface Controller - NIC

• Network Interface Controller (NIC) is a


computer hardware component that
connects a computer to a computer
network.

• The network controller implements the


electronic circuitry required to
communicate using a specific physical
layer and data link layer standard such
as Ethernet or Wi-Fi.

• Every NIC has a unique MAC address. A


unique IP address is assigned to NIC to
build a network.
Ethernet Hub

• An Ethernet hub is a network hardware device for


connecting multiple Ethernet devices together and
making them act as a single network segment.

• HUB just broadcasts the data packets to all the LAN


cards in a network and the destined recipient picks
them and all other computers discard the data
packets

• Hub is a physical layer (layer 1) device. HUB has 5,


8, 16 & more ports in which one port is uplink port
used to connect with the next Hub.

• Active Hub can also act as a repeater.

Copyright © 2020 Accenture. All rights reserved. 34


Network Switch

• A network switch is networking hardware that


connects devices on a computer network by using
packet switching to receive and forward data to the
destination device.

• Switch uses MAC addresses to forward data at the


data link layer (layer 2) of the OSI model.

• When data packets arrives at the switch, it matches


the destination address(MAC) of the data packet
through its switching table and sends data only to
the destination computer

• Switching Table includes Port Numbers & MAC


addresses of every network device in its network.

Copyright © 2020 Accenture. All rights reserved. 35


Switch Functions – Empty Switching Table
Switching Table

A B

0260.8c01.1111 0260.8c01.3333
E0 E1

C E2 E3 D

0260.8c01.2222 0260.8c01.4444

Initially MAC address table is empty

Copyright © 2020 Accenture. All rights reserved. 36


Switch Functions – Learning Source Address
Switching Table
E0: 0260.8c01.1111

A B

0260.8c01.1111 0260.8c01.3333
E0 E1

C D
E2 E3
0260.8c01.2222 0260.8c01.4444

• Station A sends a frame to Station C.


• Switch caches station A’s MAC address to port E0 by learning the source address of
data frames.
• The frame from station A to station C is broadcasted (unknown destination unicasts
are flooded) to all ports except port E0.

Copyright © 2020 Accenture. All rights reserved. 37


Switching Functions - Learning Source Address
Switching Table
E0: 0260.8c01.1111
E3: 0260.8c01.4444
A B

0260.8c01.1111 0260.8c01.3333
E0 E1

C E2 E3 D

0260.8c01.2222 0260.8c01.4444

• Station D sends a frame to station C.


• Switch caches station D’s MAC address to port E3 by learning the source address of
data frames.
• The frame from station D to station C is broadcasted to all ports except port E3.

Copyright © 2020 Accenture. All rights reserved. 38


Switch Functions – Frame Filtering
Switching Table
E0: 0260.8c01.1111
E2: 0260.8c01.2222
A E1: 0260.8c01.3333 B
E3: 0260.8c01.4444
0260.8c01.1111 0260.8c01.3333
E0 E1
X
C
E2
XE3 D

0260.8c01.2222 0260.8c01.4444

• Station A sends a frame to station C.


• Since the switch is aware of the destination address, it unicasts the frame to
the destination.

Copyright © 2020 Accenture. All rights reserved. 39


Router

• Router is a networking device that forwards data packets between


computer networks. It is used to connect 2 or more logically or
physically different networks.

• When a data packet comes in on one of the lines, the router uses
information in its routing table or routing policy and directs the packet
to the next network on its journey towards its destination.

• The most familiar type of IP routers are home and small office
routers that simply forward IP packets between the home computers
and the Internet.

• More sophisticated routers, such as enterprise routers, connect large


business or ISP networks to the powerful core routers that forward
data at high speed along the optical fiber lines of the Internet
backbone.

Copyright © 2020 Accenture. All rights reserved. 40


IP Routing
20.0.0.0/8

Routing Table
Destination Exit Int.
10.0.0.0/8 E1 20.0.0.1

20.0.0.0/8 E2
30.0.0.0/8 E3
30.0.0.0/8
40.0.0.0/8 E4

Router E2
E3
E1
40.0.0.1 E4
10.0.0.1 30.0.0.1
40
.0 .0.
1
10.0.0.0/8

40.0.0.0/8
40.0.0.1

Copyright © 2020 Accenture. All rights reserved. 41


Firewall

• It is a network security system that monitors


and controls incoming and outgoing network
traffic based on predetermined security rules.

• Firewalls can be hardware-based or software-


based. They may also functionality such as
DHCP or VPN services.

• A firewall typically establishes a barrier


between a trusted network and an untrusted
network, such as the Internet.

Copyright © 2020 Accenture. All rights reserved. 42


Gateway

• A network gateway is an internetworking


system that joins two networks together and it
can be configured in software, hardware or
both. Network gateway can operate at any level
of OSI layers model.
• The gateway is implemented at the edge of a
network and manages all data that is directed
internally or externally from that network. When
one network wants to communicate with
another, the data packet is passed to the
gateway and then routed to the destination
through the most efficient path.
• In its configurations, you first configure the
public side of the gateway and the IP address,
which is assigned to you by your ISP. The
public side configurations generally includes,
assigning the IP address, DNS server, subnet
mask, ISP gateway IP address and host name.

Copyright © 2020 Accenture. All rights reserved. 43


Summary

01 02 03
NIC card acts a medium to Hub, Switch and Router are Firewall is used to inspect
exchange data between a network network devices that operate at information entering or leaving a
and a computer. Each NIC has a Layer 1, 2 and 3 respectively. They network. A gateway is a system that
unique MAC address assigned to it are tasked with data transmission can be established at any layer and
by the manufacturer. within a network. acts as a point of entry into a
network.

Copyright © 2020 Accenture. All rights reserved. 44


0
5
Network Commands
Network Commands
ipconfig /all ipconfig /release ipconfig /renew

• Displays the full TCP/IP • Sends a DHCPRELEASE • Renews DHCP configuration


configuration for all adapters. message to the DHCP server for all adapters.
Adapters can represent to release the current DHCP
physical interfaces, such as configuration and discard the
installed network adapters, or IP address configuration for all
logical interfaces, such as dial- adapters.
up connections.

ipconfig /flushdns ping <hostname> tracert <hostname>

• Flushes and resets the contents • Verifies IP-level connectivity to • Determines the path taken to a
of the DNS client resolver cache. another TCP/IP computer by destination by sending ICMP
During DNS troubleshooting, this sending ICMP echo Request echo Request or ICMPv6
procedure can discard negative messages. The receipt of messages to the destination
cache entries from the cache, as
corresponding echo Reply with incrementally increasing
well as any other entries that
messages are displayed, along time to live (TTL) field values.
have been added dynamically.
with round-trip times.

Copyright © 2020 Accenture. All rights reserved. 46


0
6
Virtual Private Network (VPN)
Demilitarized Zone (DMZ)

• Demilitarized Zone is a physical or logical subnetwork that contains and exposes an organization's external-facing
services to an untrusted, usually larger, network such as the Internet. The purpose of a DMZ is to add an additional layer
of security to an organization’s LAN.

• VPN Servers along with other services are usually hosted in the DMZ subnet of the organization so that they are
accessible by the internal as well as external resources.
Virtual Private Network (VPN)

• VPN is an encrypted connection over the Internet


from a device to a network. The encrypted
connection helps ensure that sensitive data is
safely transmitted. It prevents unauthorized
people from eavesdropping on the traffic and
allows the user to conduct work remotely.

• VPN extends a corporate network through


encrypted connections made over the Internet.
Because the traffic is encrypted between the
device and the network, traffic remains private as
it travels. An employee can work outside the
office and still securely connect to the corporate
network. Even smartphones and tablets can
connect through a VPN.

Copyright © 2020 Accenture. All rights reserved. 49


Types of VPN

1. Remote Access VPN:

A remote access VPN securely connects a


device outside the corporate office. The
devices are known as endpoints and may be
laptops, tablets, or smartphones. Think of
remote access as computer to network.

2. Site – to – Site VPN:

A site-to-site VPN connects the corporate office


to branch offices over the Internet. Site-to-site
VPNs are used when distance makes it
impractical to have direct network connections
between these offices. Dedicated equipment is
used to establish and maintain a connection.
Think of site-to-site access as network to
network.

Copyright © 2020 Accenture. All rights reserved. 50


VPN - Prerequisites

A VPN connection requires the following prerequisites:

1. Computer

2. Internet connectivity

3. VPN client (hardware/software based)

4. VPN account credentials

5. VPN token (for MFA)

Copyright © 2020 Accenture. All rights reserved. 51


Summary

01 02 03
DMZ is subnet of an organization’s VPN is an encrypted connection VPN connection requires the
network that is accessible by over the Internet from a device to a availability of certain prerequisites
internal and external resources. network. There are two types of in order to successfully establish
VPN. connection to a VPN server.

Copyright © 2020 Accenture. All rights reserved. 52


0
7
Wireless Radio (Wi-Fi)
Wireless Radio (Wi – Fi)

• Wi-Fi is a family of wireless network protocols, based on


the IEEE 802.11 family of standards commonly used for
local area networking of devices and Internet access.

• Wi-Fi networks have no physical wired connection


between sender and receiver and communicate by
using radio frequency (RF) technology.

• Wi-Fi network signal is broadcasted by an Access Point


(AP). A computer must be enabled with wireless network
adapter in order to connect to an AP.

Copyright © 2020 Accenture. All rights reserved. 54


Wi – Fi Security

• Wireless security is the prevention of unauthorized access or damage


to computers or data using wireless networks, which include Wi-Fi
networks. Wireless security can be categorized into:

1. Wi – Fi Authentication
2. Wi – Fi Encryption

• Wi – Fi authentication includes contains protocols like:

1. Open authentication
2. Shared authentication
3. Extensible Authentication Protocol

• The latest Wi – Fi encryption standard is WPA3. Older standards


include usage WPA2 and WPA.

Copyright © 2020 Accenture. All rights reserved. 55


Wi – Fi Service Set Identifier (Wi – Fi SSID)

• Service Set Identifier (SSID) is a 32-character alphanumeric


key that is used to identify a Wi – Fi access point.

• SSID broadcast can be enabled or disabled via a router admin


page.

• Networks that do not broadcast their SSID are referred to as


hidden networks. They are considered more secure as
compared to a network broadcasting its SSID.

Copyright © 2020 Accenture. All rights reserved. 56


Summary

01 02 03
Wi - Fi networks use radio waves to Wireless networks need to be kept Wi – Fi networks are identified by
exchange information with devices. secure so that information is not their SSID. The SSID broadcasting
Wireless enabled devices connect accessed in an unauthorized way. can be enabled or disabled as per
to Wi – Fi network via an AP. an administrators preference.

Copyright © 2020 Accenture. All rights reserved. 57


References
1. https://www.geeksforgeeks.org/difference-between-lan-man-and-wan/

2. https://www.dnsstuff.com/what-is-network-topology

3. http://www.firewall.cx/networking-topics/cabling-utp-fibre/112-network-cabling-utp.html

4. https://www.cloudflare.com/learning/ddos/glossary/open-systems-interconnection-model-osi/

5. https://www.geeksforgeeks.org/introduction-of-classful-ip-addressing/

6. https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/windows-com
mands

7. https://www.cisco.com/c/en_in/products/security/vpn-endpoint-security-clients/what-is-vpn.html

8. https://www.cisco.com/c/en/us/solutions/small-business/resource-center/security/how-does-a-vpn-w
ork.html

9. https://www.netspotapp.com/wifi-encryption-and-security.html
Thank you for your time!

You might also like