Wireless Networking and Remote Connectivity PDF

Summary

This document covers wireless networking and remote connectivity concepts. It details the need for wireless networking, the frequency spectrum, security, and implementation of wireless networks. Discusses types of wireless networks and their components.

Full Transcript

Unit 5: Wireless Networking and Remote Connectivity I. WIRELESS BASICS A. THE NEED FOR WIRELESS NETWORKING Two ways to connect computers to a network: o Wired connection o Wireless connection Wired Connection...

Unit 5: Wireless Networking and Remote Connectivity I. WIRELESS BASICS A. THE NEED FOR WIRELESS NETWORKING Two ways to connect computers to a network: o Wired connection o Wireless connection Wired Connection o Utilizes LAN/UTP cables to connect end devices. Wireless Connection o Data is transmitted through electromagnetic waves in space. B. THE FREQUENCY SPECTRUM Electromagnetic Fields (EMF) - Earth is surrounded by electric and magnetic fields; all movements generate waves. Wave characteristics vary with force: o Lower force → lower frequency waves. o Higher force → higher frequency waves. Categories of Frequency Spectrum o Audio spectrum o Radio spectrum o Optical/visible spectrum. WLANs use the radio spectrum, specifically: o 2.4 GHz band o 5 GHz band C. 2.4 GHZ AND 5 GHZ 2.4 GHz Band o 802.11 standard o Channel separation o Interchannel interference o Non-overlapping channels 5 GHz Band o 802.11a standard II. SECURING WIRELESS – Wireless data is vulnerable to interception by rogue devices. 3 pillars of security: o Authentication o Encryption o Data Integrity A. AUTHENTICATION 3-Stage Authentication Process: o Challenge o Response o Validation Authentication Process: o Common authentication process: ▪ 802.1x authentication process ▪ 802.11 Standard Authentication Methods o Open Authentication o WEP (Wired Equivalent Privacy) B. ENCRYPTION AND DATA INTEGRITY Wireless Encryption and Data Integrity Methods: o TKIP ▪ RC4 cipher algorithm - for encryption ▪ Michael algorithm - for MIC o CCMP ▪ AES (Advanced Encryption Standard) – for encryption ▪ CBC-MAC (Cipher Block Chaining Message Authentication Code) - for MIC o GCMP ▪ AES - for encryption ▪ GMAC (Galois Message Authentication Code) - for ▪ MIC WPA o Uses TKIP (Temporal Key Integrity Protocol) WPA2 o Uses CCMP (Counter/CBC-MAC Protocol WPA3 o Uses GCMP (Galois/Counter Mode Protocol) o Introduced Simultaneous Authentication of Equals (SAE) III. IMPLEMENTING A WIRELESS NETWORK Wireless Network – computer network that makes use of Radio Frequency (RF) connections between nodes in the network. Wireless Access Point (WAP) – is a networking device that allows wireless- capable devices to connect to a wired network. TYPES OF WIRELESS NETWORKS o LOCAL AREA NETWORK (LAN) o PERSONAL AREA NETWORK (PAN) o METROPOLITAN AREA NETWORK (MAN) o WIDE AREA NETWORK (WAN) o The Internet is also considered as a wireless network. COMPONENTS OF WIRELESS NETWORKS o Clients o Access Points o Routers o Network Interface Cards o Wireless Range Extenders How Does Wi-Fi Network Work? – A Wi-Fi based wireless network sends signals using radio waves (cellular phones and radios also transmit over radio waves, but at different frequencies and modulation). Service Set Identifier (SSID) – AP (Access Point) will advertise the specific network that it offers connectivity to. 1. Signal Transmission 2. Access Point (AP) Broadcasting 3. Device Detection 4. Association & Authentication 5. Data Transmission 6. Frequency Regulations 7. Interference WIRELESS CONNECTION MODES o Infrastructure o Ad hoc o Wifi-Direct o Wi-Fi Hotspot Wireless Network Planning – The process of strategizing and architecting a wireless network design that provides adequate coverage, security and capacity. 1. Coverage 2. Capacity 3. Applications 4. Security 5. Simplicity 6. Redundancy 7. Network Integration 8. Management 9. Site Survey a. Predictive b. Passive c. Active Wireless Network Implementation o Equipment Needed: ▪ Wireless Router: This is the central device that broadcasts the Wi-Fi signal. ▪ Ethernet Cable: Used to connect the router to your internet modem. o Steps to Implement: 1. Physical Setup: a. Connect the Router b. Power On c. Placement 2. Initial Configuration a. Access the Router's Settings b. Create a Network Name (SSID) c. Set a Strong Password d. Choose a Security Protocol e. Configure Other Settings 3. Connect Your Devices a. On Your Device b. Enter the Password Additional Tips: o Optimal Placement: Position the router in a central location, away from obstacles. o Firmware Updates: Keep the router's firmware updated for security and performance improvements. o Network Security: Use a strong password, enable a firewall, and consider using a VPN for added security. o Troubleshooting: If you encounter issues, check the router's logs, reset the device, or consult your internet service provider. WPA3 as the Best Security Policy o Simultaneous Authentication of Equals (SAE) o Stronger Encryption o Protection Against Weak Passwords IV. INFRARED AND BLUETOOTH Bluetooth – is a wireless technology that allows devices to communicate with each other over short distances without the need for cables or wires. o Bluetooth is used in many personal electronic devices, including: ▪ Wireless keyboards ▪ Wireless headsets ▪ Computers ▪ Cameras ▪ Televisions ▪ Home appliances such as refrigerators or ovens ▪ Car navigation and entertainment systems ▪ Medical devices o Advantages ▪ Flexibility ▪ Multi-Device Pairing ▪ Broad Application Range o Disadvantages ▪ Power Consumption ▪ Interference ▪ Security Infrared – is a type of radiation with wavelengths longer than visible light but shorter than microwaves. It's also known as thermal radiation. o IR is used in many applications, including: ▪ Infrared therapy ▪ Remote controls ▪ Night vision imaging ▪ Optical communication ▪ Remote sensing ▪ Astronomy o Advantages ▪ Security ▪ Power Efficiency o Disadvantages ▪ Range Limitation ▪ Speed ▪ Direction Requirement V. REMOTE CONNECTIVITY CONCEPTS – Remote connectivity is the ability of devices to connect with each other remotely (through internet or local network). Telephone system: Remote Connectivity – The telephone system is one of the first networks, and based on the idea of enabling two people in different physical locations to speak with each other. The basic functionality of remote connectivity is available in different devices and protocols. The following are some of the examples: o Frame Relay o Asynchronous Transfer Mode (ATM) o Remote Access Service (RAS) Types of connections o Public Switched Telephone Network (PSTN) ▪ Modem Types External modem Internal modem Multiline rack/shelf-mounted o Integrated Services Digital Network (ISDN) o ISDN Channels ▪ ISDN Interface B and D channels can be combined in any number of ways but the phone companies had established two standard configurations. ▪ ISDN Reference Points R S T U ▪ Two basic types of ISDN Service: Basic Rate Interface (BRI) Primary Rate Interface (PRI) ▪ ISDN Devices Network terminator 1 (NT1) Network terminator 2 (NT2) Terminal equipment 1 (TE1) Terminal equipment 2 (TE2) Terminal adapter (TA) ▪ Identifiers Directory Number (DN) Service Profile Identifier (SPID) Terminal Endpoint Identifier (TEI) Service Address Point Identifier (SAPI) Bearer Code (BC) o Popular Methods for Remote Connectivity: o Remote Desktop Protocol (RDP): ▪ Windows-based ▪ Mac-based o Virtual Network Computing (VNC) o SSH (Secure Shell) o Cloud-Based Remote Desktop Services o Key Considerations for Remote Connectivity: o Security o Network Connectivity o Performance o Device Compatibility VI. REMOTE ACCESS SERVICE Serial Line Internet Protocol (SLIP Point-to-Point Protocol (PPP) o High-Level Data-Link Control (HDLC) protocol o Link Control Protocol (LCP) o Network control protocols (NCPs) VII. TRENDS IN TELECOMMUNICATION 1. 5G and Beyond a. Ultra-fast speeds b. Low latency c. Massive IoT 2. Artificial Intelligence (AI) and Machine Learning (ML) a. Customer service b. Fraud detection 3. Internet of Things (IoT) a. Connected devices b. Smart homes and cities c. Data-driven insights 4. Cloud Computing a. Scalability and flexibility b. Network function virtualization (NFV) c. Edge computing 5. Cybersecurity a. Advanced threats b. 5G security c. Zero-trust security 6. Digital Transformation a. Digital services b. Data analytics c. Automation VIII. DIAL-UP NETWORKING – refers to a method of accessing the internet or a private network using a standard telephone line. How does Dial-Up Network/Internet Work? Components 1. Modem: Hardware that modulates and demodulates data to convert between analog (for phone lines) and digital signals (for computers). 2. Phone Line: Standard landline used to dial into an ISP. Steps 1. Initialization 2. Handshaking 3. Data transfer 4. Disconnection DUP Use Cases 1. Early Internet Access 2. Remote Access Services 3. Rural Internet Connectivity IX. VIRTUAL PRIVATE NETWORK (VPN) – establishes a protected network connection when using public networks by encrypting internet traffic and disguising the user's online identity, making it more difficult for third parties to track activities or steal data. By its very definition, a VPN connection is: o Virtual o Private o Networked Who uses a VPN service and why? o General Customer o Businesses and Organizations o Travelers o Students o Gaming enthusiasts Why Are VPNs So Popular for Organizations? o Enable Secure Remote Access o Provide Encryption at Rest and in Transit o Secure the Cloud Types of VPNs o Site-to-site VPN o Remote Access VPNs o Cloud VPN o SSL VPN ▪ SSL Portal VPN ▪ SSL Tunnel VPN o Double VPN ▪ VPN Protocols Types of VPN Protocols o Internet Protocol Security (IPSec) ▪ Transport Mode ▪ Tunnel Mode ▪ IPsec relies on two key protocols: Authentication Header (AH) Encapsulating Security Payload (ESP) o Secure Socket Tunneling Protocol o WireGuard o OpenVPN o Point-to-Point Tunneling Protocol (PPTP o Layer 2 Tunneling Protocol X. TERMINAL SERVICE – It is also called Windows-based Terminal (WBT). It is integrated into Windows.NET Server and exists as a system server service component. History of Terminal Services o Mainframe Era o PC Revolution Microsoft's Entry: o Windows NT 3.51 o Windows NT 4.0 Terminal Server Edition o Windows 2000 Terminal Services o Windows Server 2003 Terminal Services o Windows Server 2008 Terminal Services Modern Era: o Remote Desktop Services (RDS): ▪ Remote Desktop Session Host ▪ RemoteApp ▪ Virtual Desktop Infrastructure (VDI) Key Developments: o Improved Performance o Enhanced Security o Scalability o Flexibility Functions of Terminal Services o Benefits of Terminal Services ▪ Cross-Platform Compatibility ▪ Modernization ▪ Centralized Distribution o CORE COMPONENTS OF TERMINAL SERVICES ▪ Remote Desktop Protocol (RDP) ▪ Terminal Server o ADDITIONAL COMPONENTS OF TERMINAL SERVICES ▪ Remote Desktop Session Host ▪ Remote Desktop Licensing ▪ Remote Desktop Connection Broker ▪ Remote Desktop Web Access ▪ Remote Desktop Gateway o TYPES OF TERMINAL SERVICES ▪ Remote Desktop Session Host (RD Session Host) ▪ RemoteApp ▪ Virtual Desktop Infrastructure (VDI) o How to Setup Terminal Services ▪ Steps: Install Remote Desktop Services Roles Configure Remote Desktop Session Host Install Remote Desktop Licensing Configure Remote Desktop Connection Broker (Optional) Configure Remote Desktop Gateway (Optional)

Use Quizgecko on...
Browser
Browser