+ All Categories
Home > Documents > Chapter 8: Configuring Network Connectivity. 2/24 Objectives Learn how to configure a network...

Chapter 8: Configuring Network Connectivity. 2/24 Objectives Learn how to configure a network...

Date post: 22-Dec-2015
Category:
View: 230 times
Download: 3 times
Share this document with a friend
Popular Tags:
29
Chapter 8: Configuring Network Connectivity
Transcript

Chapter 8: Configuring Network Connectivity

2/24

Objectives

• Learn how to configure a network adapter

• Learn about the Network and Sharing Center

• Learn about Remote Access

• Learn about small Wireless Networks

Installing Network Adapters

• Network adapter cards are hardware used to connect a computer, and other devices, to a network

• A driver must be installed• Installation

– Plug and Play adapters will install automatically

– Non-Plug and Play adapters must be installed with the Add Hardware Wizard in Control Panel

3/19

Configuring a Network Adapter

• Use Device Manager to configure– Start>Computer>System Properties>Device Manager– Expand Network Adapter icon and open the N.I.C.

• Network adapter’s Properties dialog box tabs available.– General tab– Advanced tab– Driver tab– Details tab– Resources tab– Power Management tab

4/19

Configuring a Network Adapter• General tab

– Name of the Adapter and Manufacturer• Advanced tab

– Varies because it is Manufacturer dependant and should not be touched unless instructed to

• Driver tab– Driver provider (Microsoft or Manufacturer)– Version and date driver was released– Location of the driver (useful for

troubleshooting)– The ability to install, update, rollback, or

disable driver

5/19

Configuring a Network Adapter• Details tab

– Is new to Vista– Provides information about the network adapter

• Device description• Bus number• Problem codes• Driver information

• Resources tab– Provides the device resource information needed by

all hardware in the computer• IRQ• I/O address• Memory

– Power Management tab• Lists the power management settings for the

network adapter, such as the ability to turn off the adapter if not in use to save power.

6/19

Troubleshooting Network Adapters

• Common causes of network adapter problems– Network adapter not on the HCL

(Microsoft’s Hardware Compatibility List)• Contact vendor for advice

– Outdated network card driver• Get the latest driver from vendor website

– Network adapter card not recognized by Windows Vista

• Try manually installing– Hardware not working properly

• Run diagnostics that came with adapter• Select Diagnose from network connections• Check cable

7/19

Troubleshooting Network Adapters

• Common causes of network adapter problems– Improperly configured network

protocols– Improperly configured network card

• Auto detect speed• Full duplex

– Bad cable• Especially tricky if connecting to a patch

panel or jack– Bad network connection device

• Hub• Switch• Router

8/19

Network and Sharing CenterUsed to view and configure network devices, as well

as to share files and printers

9/19

Network LocationsProvides the name of the network and the type of

connection

• Public– Used for unsecure,

public networks– Does not allow

discovery between networked computers

• Private– Used for secure,

private networks– Allows discovery

between networked computers

10/19Firewall will be set automatically depending on your

selection.

Sharing and Discovery• Network Discovery

– Computer will be able to see other networked computers and devices. Those devices can also detect you.

– Automatic On: Private Off: Public

• File Sharing– Three folders shared by default:

• Public– All users on the network have read/write access– Public docs, downloads, music, pictures, video.

• Users– A folder that only the authenticated user can access

• Printers– All installed printers

11/19

Sharing and Discovery• Public Folder Sharing

– Turn on to open files– Turn on and allow full access– Turn off sharing

• Turning on, enables File Sharing

• Printer Sharing– Allows printer sharing– Turning on printer sharing, also turns on file

sharing as well• Password Protected Sharing

– If turned on, only users with local accounts can authenticate and use a shared resource.

• Media Sharing– If turned on, users can access your shared

music, pictures, video, etc, and you will be able to locate shared media on other computers.

12/19

Tasks PaneFound on the left hand side of the Network and Sharing

Center, and used for:

• View Computers and Devices– Much better than XP and previous

• Connect to a Network– Allows you to filter(wireless,dialup, etc.)

• Manage Wireless Networks– Even if not connected

• Set Up a (New) Connection or Network• Manage (Existing) Network Connections• Diagnose and Repair

– Will attempt to fix, as well as give an option to report the problem to Microsoft

13/19

Remote Access

• Two methods of remote access:– Dial-in connection to a Remote

Access Service (RAS) Server– Virtual Private Network (VPN)

Connection• All data is encapsulated and

encrypted.

14/19

Remote Access • Tunneling Protocols

– Point-to-Point Tunneling Protocol (PPTP) for RAS

• Developed by Microsoft and other industry leaders

• Less secure than L2TP, but easier to configure

• Used with CHAP v2 to provide secure Dial-Up

– Layer Two Tunneling Protocol (L2TP)• An industry standard VPN protocol• Used to send IP packets over the

internet or other public IP network• Most secure when used in

conjunction with IPSec (Encryption)

15/19

Remote Access

• Authentication Methods used by Vista– Password Authentication Protocol (PAP)

• Plain Text password authentication– Challenge Handshake Authentication Protocol

(CHAP)• Uses a challenge/response hashing

scheme to eliminate clear text password transfer.

– Microsoft CHAP v2 (MS-CHAPv2)• Adds to CHAP by providing stronger

encryption and different encryption keys for sending and receiving

– Extensible Authentication Protocol (EAP)• Used for secure authentication with devices

such as smartcards (credit card type devices used with a reader)

16/19

Remote Access

• Encryption Options– Microsoft Point-to-Point Encryption

(MPPE)• PPTP (Point –to-Point Tunneling

Protocol) does not provide data encryption on its own. It utilized MPPE to provide it.

– Internet Protocol Security (IPSec)• Provides high level DES (Data

Encryption Standard) encryption• Data integrity• Data confidentiality services

17/19

Supporting Wireless Network Connections

• As wireless technology becomes more mature and cost effective, the use of wireless network adapters is increasingly popular.– Vista Supports auto-configuration.– Vista automatically finds available

wireless networks, and attaches to the preferred network.

– Start>Network>Network and Sharing Center>Manage Wireless Networks

18/19

Connecting to a Wireless NetworkYou will be asked for network name (SSID) and possibly a Security Key

or Passphrase

19/19

Configuring Security for a Wireless Network

• Disable SSID (Service Set Identifier) broadcast– The name of the wireless network

• Create MAC (Media Access Control) address filter– Unique identifier assigned to every

network adapter• Enable Encryption

– Wired Equivalent Privacy (WEP)• Extremely easy to decrypt

– Wi-Fi Protected Access (WPA)– WPA version 2 (WPA2)

20/19

Overview of TCP/IP• Required for Internet connectivity• Installed by default in Vista• Main protocols that provide basic

TCP/IP services include:– Transmission Control Protocol (TCP)– Internet Protocol (IP)– User Datagram Protocol (UDP)– Address Resolution Protocol (ARP)– Internet Control Message Protocol

(ICMP)– Internet Group Management Protocol

(IGMP)

21/19

Basics of IPv4 Addressing• 32-bit address, four field address• Uniquely identifies your computer on the

network• Written in dotted decimal notation

(192.168.1.144)– Part identifies network and part identifies host

• Subnet mask– Used to specify the network portion and host

portion of an address• Address classes

– Class A• 255.0.0.0 16,777,214 hosts

– Class B• 255.255.0.0 65,534 hosts

– Class C• 255.255.255.0 254 hosts

• Default Gateway22/19

Methods of IP Address Assignment

• Dynamic Host Configuration Protocol (DHCP)– Assigns IP addressing information to

computers• Automatic Private IP Addressing (APIPA)• Static Address Configuration• Alternate Configuration

– Mainly for laptops that my visit 2 locations

– Main DHCP Configuration and an alternate Fix address for example.

23/19

Domain Name System (DNS) Servers

• Used to resolve domain names, such as www.sybex.com, to IP addresses.

• DNS servers maintain a distributed database of all the registered domains and their IP addresses.

• HOSTS files are used if DNS servers are not available.

24/19

Windows Internet Name Service (WINS) Servers

• Used to resolve NetBIOS names to IP addresses.

• NetBIOS names are primarily used for backwards compatibility with Windows NT 4.

• LMHOSTS files are used if WINS servers are not available.

25/19

IPv6 Addressing

• 128-bit addresses– Allows for a much larger address

space than IPv4 (32 bit)• IPv4: 4,294,967,296 addresses• IPv6:

340,282,366,920,938,463,463,374,607,431,768,211,456 addresses

• Can coexist with IPv4

26/19

IPv6 Addressing

• Written in hexadecimal format– 8 Groups of 4 Hexadecimal

characters– Equivalent examples:

• 0123:0456:0789:0000:0000:00AB:00CD:00EF

• 123:456:789:0:0:AB:CD:EF– Leading Zeros can be left off

• 123:456:789::AB:CD:EF– Additionally 2 Zeros can be replaced by

2 colons ::

27/19

Testing IP Configuration

• ipconfig– Displays your IP configuration– Switches

• ipconfig /all• ipconfig /release• ipconfig /renew

• ping– Tests connectivity between two computers

28/19

TCP/IP Troubleshooting

• Use IPConfig to determine if you are getting an IP address and where it is coming from– DHCP or Fixed

• If you can access a resource by IP but not name, then suspect DNS

• If you can access resources on your subnet, but not another, suspect the default gateway

• If you can access some resources on your subnet, but not others, suspect physical connectivity issue.

29/19


Recommended