Cyber Security Module 1 Lesson 3 Notes

Download as pdf or txt
Download as pdf or txt
You are on page 1of 20

Professional Diploma in Cyber Security

Wireless
networking and
types of networking
Module 1 Lesson 3

Summary Notes
2 www.shawacademy.com

Contents

3 Introduction

Lesson outcomes

Exploring Wireless router or


access point

5 Networking capabilities /
Exploring network Adapter

10 Common deployments of
wireless network in an enterprise
network

18 Conclusion

19 References

PROFESSIONAL DIPLOMA IN CYBER SECURITY


3 www.shawacademy.com

Lesson outcomes
By the end of this lesson, you should be able to:

• Identify wireless routers and access point.


• Highlight wireless adapters operations.
• Identify common deployments of wireless networking.
• Understanding the different network technologies.

Introduction
Today’s lesson we are going to be covering networking in depth , we’ll start by looking at a wireless router and wireless
access point. We will then discuss wireless adapter functionality highlight some of its benefits and some network
capabilities for adapters. The final section of this lesson will be to looking at some common deployments of a wireless
network, we’ll explore three different network technologies – local area network (LAN), wide area network (WAN) and
personal area network (PAN) in the business world.

Exploring Wireless router or access point


What is wireless networking?
Wireless networking is when network devices communicate wirelessly using radio waves that travel at different
frequencies and these frequencies are captured by a wireless adapter. A typical example of wireless networking would be
the use of a Wi-Fi hotspot in a coffee shop, restaurant or at a school or office.

Note : Remember our discussion in the last lesson about some of the benefits of a wireless network.

What is a wireless router?

A wireless network depends on other wireless network devices such as a wireless router or wireless access point to form a
whole wireless connection.

So, what is a wireless router?

A router is a network device that transmits data from one IP subnet to another. A wireless router serves as a mediator
between the WAN (wide area network) and the LAN (local area network) wirelessly without the use of cabling. A Wireless
router comes in different forms such as a modem, wireless broadband. In summary, a router with wireless abilities can be
referred to as a wireless router. On a wireless network, devices that are connected can share data and resources wirelessly
simply by obtaining an IP address from a DHCP server on the wireless router.

What is a DHCP server?

So, what is a DHCP server?

PROFESSIONAL DIPLOMA IN CYBER SECURITY


4 www.shawacademy.com

DHCP stands for Dynamic Host Configuration Protocol. The DHCP server plays a vital role in connecting devices on a
network. Once configured, it will automatically assign an IP address, default gateway (which is the point of exit from the
LAN to WAN) and other parameters to the connected device. A DHCP server uses a standardised protocol to send
broadcast queries from the host to the users’ laptops, computers or network printers or any end devices. Since the DHCP
server assigns IP addresses to connected devices, it can also be used for IP address management (IPAM) for tracking
connected devices and for forensics, such as data analysis.

Functions of a DHCP server

In companies, there is always a need for security when it comes to data. A critical part of organisational security today is
being able to manage the devices in circulation within the organisation. Let explore some main function of a DHCP server,
these are as follows :
• A DHCP server is used for IP address management when a DHCP server assigns an IP, a log is automatically
created of the IP, device it was assigned to and time and duration of the lease. All this information can be saved
on the server logs and used by the network administrator.
• Improves security, being able to track connected devices on the network increases the chance of network
administrator to be able to identify an unknown device on their network.

What are wireless access points (WAPs)?

Remember earlier we discussed that wireless network depends on wireless network devices such as a wireless router or
wireless access point.

So, what exactly are wireless access points?

Wireless access points are network hardware components – either a single device or a built-in component in a router that
aid connections to other connected devices. As seen in modern WAPs, like the Cisco Meraki which offer a cloud-managed
access point to provide additional security functionality such as advanced malware protection.

Functions of a WAP

A wireless access point has a lot of functionality when it comes to connected devices but there are two main functions we
will be highlighting . These are:
● Increased efficiency: when a WAP is connected to a router without WI-FI capability, the WAP serves as a medium
between the router and other network devices transmitting data from the router to the access point and
packets/data are transmitted wirelessly to the connected devices in the network.
● It also offers enhanced network coverage: a WAP can be used as a form of wireless extender to boost network
connectivity.

Benefits of a WAP

Businesses that adapt to WAP stand to benefit a lot from introducing wireless access point in their network.
These benefits include:

PROFESSIONAL DIPLOMA IN CYBER SECURITY


5 www.shawacademy.com

● Convenience: WAP offers a high-efficiency level in close proximity to connected devices. This greatly speeds up
the connection time and increases the user's capacity – to explain, a router usually comes with fewer ports but
with WAP, there could be more users connecting to the network wirelessly.
● Versatility: Users do not have any restriction with network cabling as is the case with a wired connection. Any
user connected to the wireless access point could clearly move these devices and stay with-in the network
proximity of the wireless access point and still maintain connectivity to the network.
● Productivity: Users can simply connect to any WAP close to their location and keep up with their day-to-day tasks
while on the go. Most businesses usually have centralised resources for their employees that are easily accessed
in areas where WAPs are present.
● Administrative control: With the benefits of the IP address management (IPAM) network mentioned earlier,
administrators can log in to view end-user experiences and reports. The IP address management network can also
aid in detecting vulnerability and attacks across all channels.
● Security and protection: WAP have their own built-in identity-based firewalls. In advanced WAPS, such as the
Cisco Meraki, the administrator will be able to log in to manage firewall rules, set tags to isolate users or even limit
bandwidth of user in the network.

Networking capabilities of a wireless Adapter


Capabilities of a wireless adapter
In the real world, you just click a button to connect to your wireless access point. But in this lesson, we will be showing
what happens behind the scenes when you connect to a wireless access point. We will be using a virtual machine
(Ubuntu) to show these capabilities with a step-by-step screenshot and explanations. Later in the lesson, we’ll take you
through the instalment process of Ubuntu through virtualisation.

Let’s get started, by running some basic Linux commands on command line interface on our laptops (Ubuntu) to show the
interface information and scanning wireless access points in close proximity to laptops.

Interfaces

Firstly, by typing in this command Ifconfig-a . You will see all the interfaces on your laptop. On our ‘virtual’ laptop here
you can clearly see that there are three different interfaces:

• The first one highlights an ethernet(eth0) interface for a wired network.

PROFESSIONAL DIPLOMA IN CYBER SECURITY


6 www.shawacademy.com

• The second is the loopback(lo) with an (IP) address (127.0.0.1) often referred to as the ‘localhost.’ It is used for
testing and troubleshooting on an Ethernet interface.

• The third interface highlight a wireless interface(wlan0).

wireless interface(wlan0)
Type-in this command Ifconfig wlan0 to display the wireless adapter interface only.

On our virtual laptop you can see HWaddr 8c:a9:82:b1:38:90 is the MAC- address for the laptop.

Note that there is no IP address.

Configuration of wireless interface(wlan0)


Type-in the command: iwconfig wlan0 to show more of the configuration of the wireless interface.

PROFESSIONAL DIPLOMA IN CYBER SECURITY


7 www.shawacademy.com

The information highlights the following:

• The supporting wireless adapter supports the IEEE 802.11bgn

• ESSID refers to the technical term for a network name, such as the name of the Wi-Fi network such as the coffee
shop-hotspot.

• Managed mode refers to the monitoring of all traffic received on a wireless channel. There are other various
modes with the wireless adapter such as promiscuous mode(used capturing packets without having to associate
with an access point) and master mode(where the wireless adapter acts as an access point to other connected
devices).

• Note that there is no access point access point associated to this wireless adapter.

Scanning for a wireless access point


Note that we are on MANAGED MODE. To scan for a wireless access point in close proximity, type in

Sudo iwlist wlan0 scanning to scans for any wireless access point in close proximity.

You will get the following information from the completed scan:

• On cell 01- we have the HWaddr 00:18: E7:8A: 44:63 - the MAC- address for the access point.

• We can also see the frequency the access point is on which is 2.4 GHz, and it is broadcasting on channel 6.

• Signal strength is 27 dBm.


• ESSID of the access point is named “Solar”.
• The access point is on Master mode which means this access point could serve as a point of access to other
connected devices
• Encryption type is Temporal Key Integrity Protocol (TKIP)
• Wireless access point supports the IEEE 802.11i/ WAP2 version 1

PROFESSIONAL DIPLOMA IN CYBER SECURITY


8 www.shawacademy.com

View the rate of transmission


command: iwlist wlan0 rate to see the rate of transmission of the channel in operating.

Sudo iwlist wlan0 freq to view channel of frequencies on the wireless adapter.

Note that there is a total of 13 channels and the frequency they operate in, currently connected on Channel 6.

What is IEEE802.11?
Let’s now look at some network software that supports networking capabilities.

IEEE802.11 is the wireless radio standard used to facilitate the networking design and implementation of security
protocols in wireless networking.

In terms of supported areas:

● 802.11 outlines the IEEE specification when it comes to all wireless networking.

● These standards differ in the range of speed, transmission, frequency, etc.

PROFESSIONAL DIPLOMA IN CYBER SECURITY


9 www.shawacademy.com

● The 802.11 wireless standards initially offered two modes and used 1 or 2 megabytes per second transmission
speed with a radio frequency of 2.4 gigahertz.

● Data is transmitted using Frequency Hopping Spread Spectrum (FHSS) or Direct Sequence Spread Spectrum

Let look at a table comparing common 802.11 standards.

To explain some of the terms:

• OFDM: Orthogonal Frequency-Division Multiplexing has transmission operations that have the capability to
transmit a larger amount of data on separate frequencies. Splitting the signal on separate frequencies greatly
reduces the amount of interference. OFDM is mostly associated with the IEEE 802.11a, 802.11g, 802.11n, and
802.11ac wireless standards and is used in 4G mobile phones.

• DSSS: Direct-Sequence Spread-Spectrum (DSSS) operates with the transmission of signals spreading over a full
transmission frequency spectrum to reduce the impact of interference during transmission. DSSS is commonly
used in telecommunications.

• FHSS: Frequency-hopping spread-spectrum (FHSS) dictates the application of narrowband signals that change
frequencies in an anticipated pattern. An example of this is Bluetooth.

Wireless networking is when network devices communicate wirelessly using radio waves that travel at different
frequencies and these frequencies are captured by a wireless network adapter.

So, what is a network adapter?

A network adapter is a component of hardware that aids the connection from devices to a network, it maximises
performance and greatly increases productivity for end used. When a wireless network adapter is plugged in it scans the
network and implements auto-negotiation to find the highest network speed and bandwidth capability.

Factors to consider when choosing a network adapter


When choosing a network adapter for any of your end-devices, there some key factors to put into consider. These are:

• Speed: the transmission rate of data in the network adapter.

• Capability: the specification of the network adapter, i.e. How many channels can the adapter use in transmitting
data?

• Functionality: the features of the network adapter, transmit 2.4 GHz 802.11b/g/n/ax client access radio or 5 GHz
802.11a/n/ac/ax client access radio.

• Price: the over-all cost of acquiring the network adapter.

PROFESSIONAL DIPLOMA IN CYBER SECURITY


10 www.shawacademy.com

Common deployments of wireless networks


Main types of deployment
There are three main structural types of network deployment that apply to working environments, these are:

• Centralised deployment

• Converged deployment

• Cloud-based deployment

Note it is advisable to businesses owners to seek advice from a consultant before implementing any of these
structures due to their complexity.

Centralised deployment
Centralised deployment is typically used in businesses with buildings, units or campuses in close proximity. This
deployment type could be configured as a hybrid network with the use of wired or wireless controllers to
integrate wireless functionality. A centralised deployment is designed based on the premises and all the
equipment is installed in one location.

Converged deployment
Converged deployment is typically used in businesses with remote sites, such as campuses or branch offices. The
deployment architecture is either wireless or wired connections or a combination of both. The network policy is
on the controller to efficiently manage unnecessary traffic queries thereby implementing a single policy on both
the wired and wireless controllers on every traffic.

Cloud-based deployment
In cloud-based architecture, there is a significant benefit in the use of cloud technologies to manage network
devices that are either on-premises or at a branch office. As mentioned earlier, Cisco Meraki is a good example of
fully optimising your network using cloud-based deployment.

Local Area Networks (LANs)


What is a LAN?
A LAN is a collection of devices connected in one location, note our lab demonstration in (lesson 2) were we set
up a network for a coffee shop? All the laptops were able to ping each because they were all in the same local
area network (LAN).

The size of LAN is relative to the number of devices that are connected in the network. A LAN is usually limited
geographically but can be connected to a larger geographical area with a (WAN) Wide Area Network or (MAN)
Metropolitan-Area Network. LANs comprise many different components that aid the connection such as cables,
access points, switches, etc.

PROFESSIONAL DIPLOMA IN CYBER SECURITY


11 www.shawacademy.com

Types of LAN technologies


LAN technologies can be implemented in the network as either

• client/server
• peer-to-peer

Client/Server

LAN contains several devices belonging to a ‘client’ (workstations, computer, etc ) that are connected to other
devices that act as the server. The connection between the client and the server could be wired or wireless,
depending on the user’s preference. While the servers have many different functions such as file storage,
application access, device access, and even managing the traffic of the network in the LAN

Peer-to-Peer

Peer-to-Peer local area network, there are no centralised servers sharing resources as in the case of the
client/server LAN. A peer-to-peer LAN is usually used in smaller environments than the client/server LAN. Where
connected devices share equal functionality, and the connection could be wired or wireless.

PROFESSIONAL DIPLOMA IN CYBER SECURITY


12 www.shawacademy.com

LAN Optimisation
Network performance should never be overlooked in a LAN because most businesses today depend on their local
resources to feed information to their customers on the wide area network (the WAN).

LAN optimisation can be acquire by implementing the following techniques.

• Active monitoring: Being able to monitor connected devices on the LAN can help system administrators
to detect any abnormality.
• Network segmentation: On the switches system, administrators can implement (VLAN) virtual local area
network to segment any broadcast traffic. In other words, to create a partitioned computer network
within the LAN.
• Implementing Quality of Service (QoS): the ability to dependably run high-priority applications and traffic
under limited network capacity means that network engineers can give priority to some applications in
terms of bandwidth, latency, etc.

Benefits of LAN technologies


LAN benefits to business are :

• Reduced computing power: When a LAN is been optimised it reduced computation in the network i.e., in
a well-configured network there is a simplified algorithm process in calculating the best path, load
balancing, VLAN segmentation, etc greatly reducing the processing time.

• Increased speed: In an optimised LAN, speed could reach up to 1 Gbps or more which would greatly
impact the speed at which sharing files to uploading and downloading and high-definition streaming on
the LAN providing all users with the speed needed in communicating with one another.

Wide Area Networks (WANs)


What is a WAN?
A Wide Area Network (WAN) works beyond the geographic scope of a local area network (LAN). In other words, a
WAN is basically used to interconnect a section of LAN. This could be in the form of remote LANs such as at
branch sites or a campus LAN. A WAN connecting a campus network and a remote site enables users to share
resources between the campus and the remote network through the WAN.

A WAN is controlled by the ISP (internet service provider). Each user who wants to access the WAN will have to
make an arrangement with the ISP to do so. This arrangement comes in the form of payment for their service.
ISPs come in many different forms such as a mobile service provider company, a telecommunication company,
cable company, satellite service provider, etc

PROFESSIONAL DIPLOMA IN CYBER SECURITY


13 www.shawacademy.com

Why do we need WANs?


Clearly, it’s not feasible to connect all computers across all different geographical regions of the world with
physical cabling. That’s why isolated LANs are created and interconnected with the WAN to save costs and
increase the speed of transmission.

Why do we need WAN optimisation?

∙ Businesses can interact with their customer, for example, Facebook can only be accessible through a
WAN connection.

∙ Employees can working remotely connecting to their company resources remotely.

∙ Users who need to send data across far distances make use of WAN technology i.e. A business owner in
Dublin can very easily buy goods from the USA.

∙ WANs also make learning more easily accessible, particularly for students who need to do research and
also connect to their college portal to upload project.

WAN technologies
These are some common WAN topologies that can be used to ensure there is smooth connectivity between LANs
and the WANs.

These are:

• Point-to-point topology

• Hub-and-spoke topology

• Full mesh topology


• Dual-homed topology

Let’s look at each of these WAN topologies more closely

Point-to-point topology

The point-to-point model uses point-to-point trucking between two routers in a network. This usually requires a
dedicated direct physical link connecting the two routers for the data to be transmitted from one subnet to
another, this topology is very inexpensive to implement from business within short proximity.

Hub-and-spoke topology

PROFESSIONAL DIPLOMA IN CYBER SECURITY


14 www.shawacademy.com

The hub-and-spoke topology is sometimes referred to as multipoint topology, It is usually implemented in


companies where a private network is required. A dedicated direct physical link is connected to multiple point-to-
points on other sites and every communication has to go through the hub as shown in the diagram.

Full mesh topology

The full mesh is a slight modification of the hub-and-spoke topology, in this case, all the routers communicate
directly with each other with the use of a virtual path but often require a lot of configurations and maintenance.

Dual-homed topology

The dual-homed topology is one of the best topologies to implement because of the redundancy it provides to
business, as can be seen in this diagram, an extra router is attached for an enhanced network, load balancing and
transmitting traffic with the use of a virtual path to all the connected spokes. The drawback of this topology is
that it is costly to implement.

PROFESSIONAL DIPLOMA IN CYBER SECURITY


15 www.shawacademy.com

Mode of WAN technologies


These are some mode been used by WAN technology solely use to transmit data within different WAN, these are:

• Packet switched
• Circuit-switched

Let’s look at these two modes a bit closer.

Packet switching

Remember in the first lesson of this course we spoke about ARPANET - that’s Advanced Research Projects Agency
Network – we mentioned that this was when ‘packet switching’ was first fully utilised.

Packet switching is a means of data transmission where data is broken into several segments and sent
simultaneously. Each packet contains unique identifiers, which is associated with the payloads, and the header
which includes the destination and other pieces of information. This information helps to determine the links that
packets should send over based on the addressing information in each packet.

Packet-switching does not require a circuit to establish communication, and they allow many pairs of nodes to
communicate over the same channel.

Circuit-Switching

In the case of circuit switching, a dedicated circuit or channel is used between nodes to aid communication. For a
communication session to be established, a virtual connection must have to been set up first.

PROFESSIONAL DIPLOMA IN CYBER SECURITY


16 www.shawacademy.com

These are other techniques that can be used to transmit data in a WAN. Which includes:

• An overlay network is a communications technique where a virtual network is created on top of another
network, typically a hardware and cabling infrastructure.
• Packet over SONET/SDH (PoS) refers to a packet over Synchronous Optical Network or Synchronous
Digital Hierarchy.
• Multiprotocol Label Switching (MPLS) is a network routing-optimisation technique using short path labels
addresses.
• Asynchronous Transfer Mode uses asynchronous time-division multiplexing to encode data into small,
fixed-sized cells.
• Frame Relay is a technology for transmitting data between LANs or endpoints of a WAN. These systems
are often replaced by Ethernet WANs.

Why business need WAN optimisation


WAN optimisation comes in handy when we need to improve our network performance. This is a very important
for business and also inexpensive for businesses as they do not have to buy and introduce new and expensive
hardware. Instead, they can simply modify the existing configuration. Network engineers can quite easily upscale
the software using recently developed protocols.

Examples of WAN optimisation

Due to the high volume of traffic, many business WANs suffer from latency and bandwidth limitations. WAN
optimisation offers various techniques to try and solve these problems.

For example:

• Deduplication: which is eliminating duplicate or redundant information.


• Compression: which is reducing the volume of data.
• Protocol optimisation: choosing the best protocol for different scenarios.
• Traffic shaping: managing bandwidth in different scenarios.
• Local caching: speed networking access to data.
• Software-Defined WAN: for simplifying and managing the operation of the WAN.

All these techniques improve packet delivery and data transmission either by allowing network bandwidth to
grow or shrink dynamically as required.

Benefits of WAN optimisation


When a WAN has been optimised, there are a lot of benefits both for the network engineers and the users
connected to the network. These include:

• Increased accessibility of resources: when the same files or resources are accessed repeatedly those
resources are readily accessible and saved on the cache rather than resaving the files every time.

PROFESSIONAL DIPLOMA IN CYBER SECURITY


17 www.shawacademy.com

• Increased speed: When the computer processes do not need to compute the path to take every time a
new connection is established. This greatly speeds up connection time.
• More secure and faster data recovery: When a server crashes, a business needs to be able to recover
data quickly; if this is delayed, users aren’t able to access their files and resources.
• SD-WAN: The initial WAN design was restricted to enterprise, branch, and data centre. With the SD-WAN
companies can now adopt cloud-based applications across the globe.

Personal Area Networks (PAN)

What is a PAN?

A personal area network (PAN) connects electronic devices cantered on an individual person’s workspace. This
type of network can be wired or wireless and it enables communication between computer devices in close
proximity. With PAN technologies, end-devices such as laptops, mobile phones and tablets share data and
resources among each other in close proximity. One of the most common examples of a PAN is the use of wireless
Bluetooth devices to share resources over a distance of up to 15 metres or wired connection methods, such as
USB or FireWire.

Standards of PAN technologies

The IEEE 802.15 is the standardised form of PAN technologies used in wireless networking. These standards
include:

• 802.15.1: The bedrock that established the wireless PAN standard based on Bluetooth.
• 802.15.2: An updated version of the 802.15.1
• 802.15.3: A newer standard for higher-rate transmission in wireless PANs good for multimedia purposes.
• 802.15.4 : A newer standard also with low data rates that manage to low-power consumption for
connected devices, the standard is more beneficial in devices where low-battery consumption is required
like in the case of sensors, smart badges, etc.

PROFESSIONAL DIPLOMA IN CYBER SECURITY


18 www.shawacademy.com

Benefits of PAN technologies

There are many benefits of PAN technologies, which include:

• Inexpensive: is relatively cheap compared to other technologies.


• Secure: PANs are often viewed as more secure due to the fact that every device connecting to the
network has to be authorised before data and resources can be sent across.
• Data synchronisation: connected Bluetooth devices can automatically synchronise data downloads and
uploads, and file exchanges simultaneously.
• Portable: PANs are easily embedded into electronic devices and carried about in any location.

Drawbacks of PAN technologies

PANs do come with some limitations though, such as:

• Limited proximity: There is a limitation on how far devices connected to PANs can reach.
• Slower data transmission: In comparison to other network technology like LAN and WAN, the data
transmission rate is slower, particularly when there are multiple devices in the PAN.
• Prone to interference: As with most wireless networks, a PAN can be affected by lead materials, metals,
magnets, walls and radio wave signals.

Conclusion
In this lesson, we touch base with wireless router and wireless access point. We will then highlighted wireless adapter
functionality and some of benefits and some network capabilities for adapters. Thereafter, exploring some common
deployments of a wireless network in the business world. In the last section of this lesson, we’ll explore three different
network technologies – local area networks (those are LANs), wide area networks (that’s WANs) and personal area
networks (you guessed it, that’s abbreviated to PANs) highlighting their standards, benefits and drawbacks.

PROFESSIONAL DIPLOMA IN CYBER SECURITY


19 www.shawacademy.com

References
Shimonski, R. and Al, E. (2002). Sniffer Pro : network optimization & troubleshooting
handbook. Rockland, Ma: Syngress.

Cisco. (n.d.). What Is a Wireless Network? - Wired vs Wireless. [online] Available at:
https://www.cisco.com/c/en/us/solutions/small-business/resource-
center/networking/wireless-network.html#~how-to-deploy.

Editor (n.d.). Wireless Networking. [online] Network Encyclopedia. Available at:


https://networkencyclopedia.com/wireless-networking/.

Meela (2017). Wireless Access Point vs. Wireless Router. [online] Medium. Available at:
https://medium.com/@Meela349588204/wireless-access-point-vs-wireless-router-
8fc36e14b.

Meraki, I. (2019). Cisco Meraki. [online] Cisco.com. Available at:


https://meraki.cisco.com/.

Infoblox. (n.d.). What is a DHCP Server? | Learn What They Are & How They Work.
[online] Available at: https://www.infoblox.com/glossary/dhcp-
server/#:~:text=A%20DHCP%20Server%20is%20a.

Huffman, C. (2015). Windows performance analysis field guide. Amsterdam Elsevier

PROFESSIONAL DIPLOMA IN CYBER SECURITY


20 www.shawacademy.com

Cisco Networking Academy Program (2018). Connecting networks v6 : companion guide.
Singapore: Pearson Education South Asia Pte Ltd.
www.ciscopress.com. (n.d.). WAN Technologies Overview (1.1) > WAN Concepts | Cisco
Press. [online] Available at:
https://www.ciscopress.com/articles/article.asp?p=2832405&seqNum=4.
Khan, M.A. (2009). Chapter 1: Introduction to WAN Architectures. [online] Network
World. Available at: https://www.networkworld.com/article/2248736/chapter-1--
introduction-to-wan-architectures.html.

Anon, (n.d.). Introduction to WANs | CCNA Blog. [online] Available at:


https://www.ccnablog.com/introduction-to-
wans/#:~:text=A%20WAN%20network%20can%20be

NetworkLessons.com. (2017). Introduction to WANs (Wide Area Network). [online]


Available at: https://networklessons.com/cisco/ccna-routing-switching-icnd1-100-
105/introduction-to-wans-wide-area-network.

Mehra, R., Ghai, R. and Casemore, B. (2019). Adapted from Worldwide SD-WAN Survey
Special Report. [online] Available at:
https://www.cisco.com/c/dam/en/us/solutions/collateral/enterprise-
networks/intelligent-wan/idc-tangible-benefits.pdf.

Richardson, S. (2018). Traditional WAN Technologies - Network Design. [online] Cisco


Certified Expert. Available at: https://www.ccexpert.us/network-design/traditional-
wan-technologies.html

www.industryweek.com. (n.d.). Stack Path. [online] Available at:


https://www.industryweek.com/technology-and-iiot/information-
technology/article/21948174/benefits-of-wan-optimization.
www.sciencedirect.com. (n.d.). Personal Area Network - an overview | ScienceDirect
Topics. [online] Available at:
https://www.sciencedirect.com/topics/engineering/personal-area-network.
What is a personal area network (PAN)? | Cloudflare. (n.d.). Cloudflare. [online]
Available at: https://www.cloudflare.com/learning/network-layer/what-is-a-personal-
area-network/.

www.infotech.com. (n.d.). Five LAN Performance Optimization Techniques. [online]


Available at: https://www.infotech.com/research/five-lan-performance-optimization-
PROFESSIONAL
techniquesDIPLOMA IN CYBER SECURITY

You might also like