You are on page 1of 6

Networking – Endterm Reviewer

SLIDE 11: WIRELESS STANDARDS AND


TECHNOLOGIES 802.11ax

Wireless Standards  Speed: 2.4 / 5.0 GHz


 Max Data Rate: 10-12 Gbps
802.11a
 Typical Indoor Range: 150 feet
 Speed: 5 GHz  Typical Outdoor Range: 300 feet
 Max Data Rate: 54 Mbps  Topology: Ad-hoc, Infrastructure
 Typical Indoor Range: 100 feet
Frequencies And Range
 Typical Outdoor Range: 400 feet
 Topology: Ad-hoc, Infrastructure
802.11b

 Speed: 2.4 GHz


 Max Data Rate: 11 Mbps
 Typical Indoor Range: 150 feet
 Typical Outdoor Range: 450 feet
 Topology: Ad-hoc, Infrastructure
802.11g

 Speed: 2.4 GHz


 Max Data Rate: 54 Mbps
 Typical Indoor Range: 150 feet
 Typical Outdoor Range: 450 feet
 Topology: Ad-hoc, Infrastructure
802.11n CHANNELS

 Speed: 2.4 / 5.0 GHz


 Max Data Rate: 600 Mbps
 Typical Indoor Range: 175 feet
 Typical Outdoor Range: 230 feet
 Topology: Ad-hoc, Infrastructure CHANNEL BONDING
 Backward Compatibility: 802.11a,
802.11b, and 802.11g  Combines different channels to
increase the throughput
802.11ac  Was introduced in 802.11n
 Speed: 5.0 GHz  Is configured with channels 1 and 6
 Max Data Rate: 1.3 Gbps in 2.4 GHz range
o Has total width of 70 MHz
 Typical Indoor Range: 115 feet
 Typical Outdoor Range: - o Forms a channel of 40 MHz (20
 Topology: Ad-hoc, Infrastructure + 20)
o Leaves a single non-overlapping
channel, 11 with 30 MHz
 Can be configured with 5.0 GHz

1
Networking – Endterm Reviewer

o Has a total width of 500 MHz ANTENNA TYPES


o Allows multiple bonded channels
Omni
because they are non-
overlapping  Transmit signals to all directional
equally
SERVICE SET IDENTIFIER (SSID)
 Are used in wireless routers,
Basic Service Set mobiles,
 and radio transmission towers
 Is a name given to the logical WLAN
 Are easy to install and implement
segment
 Can be installed in any direction
 Contains only one wireless access
 Have shorter range as signal is
point (WAP)
transmitted in all directions
 Does not support mobility as there is
a single WAP Directional
Extended Service Set  Transmit narrow directional signals
 Are used when you need signals in a
 Connects more than one WAPs
specific direction, such as television
 Allows clients to move from one
antennas
WAP to another WAP
 Have good transmission and
 Requires each WAP to use the same
reception of signals
SSID
 Allows the WAPS to have unique SLIDE 12: CLOUD CONCEPTS AND
BSSID CONNECTIVITY OPTION
Independent Basic Service Set (Ad-hoc) DEPLOYMENT MODELS
 Is also known as the Ad-hoc mode 1. Public Cloud
or peer—to-peernetwork
 Is a simple wireless network that - Works on the shared infrastructure
allows the wireless clients to - Requires users to pay by:
communicate with each other o Subscriptions
 Does not require a router or WAP in o Pay-per-use
between to connect with the clients - Is owned by a third-party service
provider
Roaming - Is cost-effective and easier to
 Allows the clients to move from one maintain
WAP to another WAP • Users have zero-maintenance
o Keeps a persistent connection on the infrastructure
o Does not require re- • Is less secure than the private
authentication with thesecond Cloud
WAP
 Requires the WAPs to beconfigured
with same SSIDs

2. Private Cloud

 Is set up by an organization or by a

2
Networking – Endterm Reviewer

third-party for the organization 2. IaaS - or Infrastructure as a Service


 Is dedicated to a single  Allows the network
organization administrators to
o No shared infrastructure set up their networks in the cloud
 Is more expansive than public  Works just like the on-
cloud premise infrastructure except
 Provides higher security than the access to the physical
public cloud hardware
 Provides more flexibility in  Allows upscaling and
Configuration downscaling as and when
required
3. Community Cloud  Works in the pay-per-use
 Has the same set of resources model
shared by multiple entities  Example: Amazon EC2,
 Works well with the entities, such Microsoft Azure
as federal agencies, that share
common characteristics 3. PaaS – or Platform as a Service
 Security  Provides development
 Privacy platform the programmers
and developers
 Compliance
 Hosts development tools
 Example:
 Reduces the cost of
 IBM SoftLayer
development tools for the
 Salesforce Community Cloud
developers
4. Hybrid Cloud  Example: Google App
Engine,
 Combines public and private cloud 4. DaaS – or Desktop As A Service
 Provides flexibility and security  Provides virtual desktop to
 Flexibility using the public the users via a Web browser
cloud  Uses the per-user
 Security using the private subscription model
cloud  Can be either:
 Can be used for high performance o Persistent
applications o Non-persistent
SERVICE MODELS INFRASTRUCTURE AS CODE
1. SaaS - or Software as a Service Infrastructure As Code (IaC)
delivery model.
o Is used for hosting  Use a high-level descriptive coding
applications in the cloud language to set up the infrastructure
 Provides access to the users based  Automates the provisioning of
on subscription infrastructure
 Requires a Web browser to access  Removes the manual work to:
applications o Set up and manage servers
 Examples: Gmail, Office365 o Installing operating systems

3
Networking – Endterm Reviewer

o Configuring storage and “Capabilities can be elastically provisioned


databases and released, in some cases automatically,
 Helps to orchestrate across multiple to scale rapidly outward and inward
systems commensurate with demand. To the
o Span a distributed consumer, the capabilities available for
application across several provisioning often appear to be unlimited
systems and can be appropriated in any quantity at
any time.”
In simpler terms, elasticity is about adding
CONNECTIVITY OPTIONS or removing resources to your
infrastructure in an automated manner.
Virtual Private Network (VPN)
When workload increases, resources are
A. Site-to-site VPN: automatically added for the applications that
 Is between VPN gateway in the is demanded them. When the workload
cloud and a VPN endpoint in on- decreases, the resources are automatically
premises removed without any manual intervention.
 Joins two networks over the internet. Elasticity helps in controlling cloud
 Uses IPsec resources costs. You have to pay only for
what you use. When the resources are not
B. Client-to-site VPN: required, it simply removes them.
 Is between a VPN gateway in the
cloud and a VPN client SCALABILITY

Private-Direct Connections  Is when the administrators add more


resources to get optimal
 Is a dedicated direct connection performance
between:
 Is about increasing the resources to
o The cloud environment
manage the load
o Customer’s network o Scaling Up
 Creates the IPSec-encrypted private  Add more resources
connection between two endpoints to the system
MULTITENANCY o Scaling Out
 Adding more systems
Multitenancy for load management
 Has several tenants using the same
cloud infrastructure
o The same server or system SECURITY IMPLICATIONS
o The same hard drive (for data) Let’s look at some of these security
 Is done by the cloud service provider implications.
to achieve cost efficiency
o Service attacks
ELASTICITY o Shared Cloud Computing
Services
Elasticity
o Employee Negligence
Elasticity, as defined by NIST, is: o Inadequate date backups

4
Networking – Endterm Reviewer

o Phishing and Social


Engineering Attack
o System Vulnerabilities SLIDE 13: NETWORK
TROUBLESHOOTING
Many cloud consumers use the public
1. Identify the Problem
cloud, which works with shared resources.
This causes a serious threat. If one of the  Gather information
cloud consumers having data and  Question users
applications on one server is compromised,  Identify symptoms
the threats become real for the other  Determine if anything has changed
tenants on the same server.  Duplicate the problem, if possible
 Approach multiple problems
Employee Negligence individually
Most organizations allow their employees to
remotely connect to their networks or the 2. Establish a Theory
cloud applications and data. Nowadays,  Question the obvious
employees use a mobile phones, tablets,  Consider multiple approaches
and other devices to connect to the cloud. If o Top-to-bottom/ bottom-to-top OSI
any of these is vulnerable or infected model
with malware, it can also impact the o Divide and conquer
cloud environment.
3. Test the Theory
Data backups can be a concern in the cloud
 If the theory is confirmed, determine
environment. You don’t know where your
the next steps to resolve the
data is replicated and if it is replicated at all.
problem
In a cyber-attack, such as malware or
 If the theory is not
ransomware, it might be difficult to
confirmedreestablish a new theory
retrieve data if the data is not backed up
or escalate
properly.
Specifically, social engineering and phishing 4. Establish a Plan
have been a threat to cloud environments. If  Determine the possible effects of the
a user accidentally falls to the phishing solution that you plan to implement
threat and is connected to the cloud, the  Need to determine a workaround or
a
attacker can access the user credentials
final solution
and do the lateral movement to sabotage
the cloud infrastructure.
5. Implement the Solution
Just like the on-premises infrastructure,  Implement the plan that you created
cloud infrastructure is also prone to in
vulnerabilities. After all, it is still running on the previous step
the physical infrastructure and using the  Need to have requisite permissions
same set of operating systems and to
applications. A single vulnerability in the implement the solution
operating systems or applications in the o May require additional help
cloud can let an attacker exploit the cloud
environment. 6. Verify The Functionality

5
Networking – Endterm Reviewer

 Is the next step after implementing


the solution
 Requires the validation of the
solution implemented
o Ensure there are no negative
outcomes
o Ensure the problem is fixed
 Implement preventive measures

7. Document the Scenario


 Requires the document to be
created updated based on a new or
existing problem
 Requires new document if:
o Problem is new
o Problem has never encountered
before
 Should capture the following:
o Symptoms
o Corrective actions
o Outcomes

You might also like