Chapter%208:%20Configuring%20Network%20Connectivity - PowerPoint PPT Presentation

About This Presentation
Title:

Chapter%208:%20Configuring%20Network%20Connectivity

Description:

Allows discovery between networked computers. 10 /19 ... Disable SSID (Service Set Identifier) broadcast. The name of the wireless network ... – PowerPoint PPT presentation

Number of Views:76
Avg rating:3.0/5.0
Slides: 30
Provided by: janet71
Learn more at: http://faculty.ccri.edu
Category:

less

Transcript and Presenter's Notes

Title: Chapter%208:%20Configuring%20Network%20Connectivity


1
Chapter 8 Configuring Network Connectivity
2
Objectives
  • Learn how to configure a network adapter
  • Learn about the Network and Sharing Center
  • Learn about Remote Access
  • Learn about small Wireless Networks

3
Installing Network Adapters
  • Network adapter cards are hardware used to
    connect a computer, and other devices, to a
    network
  • A driver must be installed
  • Installation
  • Plug and Play adapters will install automatically
  • Non-Plug and Play adapters must be installed with
    the Add Hardware Wizard in Control Panel

4
Configuring a Network Adapter
  • Use Device Manager to configure
  • StartgtComputergtSystem PropertiesgtDevice Manager
  • Expand Network Adapter icon and open the N.I.C.
  • Network adapters Properties dialog box tabs
    available.
  • General tab
  • Advanced tab
  • Driver tab
  • Details tab
  • Resources tab
  • Power Management tab

5
Configuring a Network Adapter
  • General tab
  • Name of the Adapter and Manufacturer
  • Advanced tab
  • Varies because it is Manufacturer dependant and
    should not be touched unless instructed to
  • Driver tab
  • Driver provider (Microsoft or Manufacturer)
  • Version and date driver was released
  • Location of the driver (useful for
    troubleshooting)
  • The ability to install, update, rollback, or
    disable driver

6
Configuring a Network Adapter
  • Details tab
  • Is new to Vista
  • Provides information about the network adapter
  • Device description
  • Bus number
  • Problem codes
  • Driver information
  • Resources tab
  • Provides the device resource information needed
    by all hardware in the computer
  • IRQ
  • I/O address
  • Memory
  • Power Management tab
  • Lists the power management settings for the
    network adapter, such as the ability to turn off
    the adapter if not in use to save power.

7
Troubleshooting Network Adapters
  • Common causes of network adapter problems
  • Network adapter not on the HCL (Microsofts
    Hardware Compatibility List)
  • Contact vendor for advice
  • Outdated network card driver
  • Get the latest driver from vendor website
  • Network adapter card not recognized by Windows
    Vista
  • Try manually installing
  • Hardware not working properly
  • Run diagnostics that came with adapter
  • Select Diagnose from network connections
  • Check cable

8
Troubleshooting Network Adapters
  • Common causes of network adapter problems
  • Improperly configured network protocols
  • Improperly configured network card
  • Auto detect speed
  • Full duplex
  • Bad cable
  • Especially tricky if connecting to a patch panel
    or jack
  • Bad network connection device
  • Hub
  • Switch
  • Router

9
Network and Sharing CenterUsed to view and
configure network devices, as well as to share
files and printers
10
Network LocationsProvides the name of the
network and the type of connection
  • Public
  • Used for unsecure, public networks
  • Does not allow discovery between networked
    computers
  • Private
  • Used for secure, private networks
  • Allows discovery between networked computers

Firewall will be set automatically depending on
your selection.
11
Sharing and Discovery
  • Network Discovery
  • Computer will be able to see other networked
    computers and devices. Those devices can also
    detect you.
  • Automatic On Private Off Public
  • File Sharing
  • Three folders shared by default
  • Public
  • All users on the network have read/write access
  • Public docs, downloads, music, pictures, video.
  • Users
  • A folder that only the authenticated user can
    access
  • Printers
  • All installed printers

12
Sharing and Discovery
  • Public Folder Sharing
  • Turn on to open files
  • Turn on and allow full access
  • Turn off sharing
  • Turning on, enables File Sharing
  • Printer Sharing
  • Allows printer sharing
  • Turning on printer sharing, also turns on file
    sharing as well
  • Password Protected Sharing
  • If turned on, only users with local accounts can
    authenticate and use a shared resource.
  • Media Sharing
  • If turned on, users can access your shared music,
    pictures, video, etc, and you will be able to
    locate shared media on other computers.

13
Tasks PaneFound on the left hand side of the
Network and Sharing Center, and used for
  • View Computers and Devices
  • Much better than XP and previous
  • Connect to a Network
  • Allows you to filter(wireless,dialup, etc.)
  • Manage Wireless Networks
  • Even if not connected
  • Set Up a (New) Connection or Network
  • Manage (Existing) Network Connections
  • Diagnose and Repair
  • Will attempt to fix, as well as give an option to
    report the problem to Microsoft

14
Remote Access
  • Two methods of remote access
  • Dial-in connection to a Remote Access Service
    (RAS) Server
  • Virtual Private Network (VPN) Connection
  • All data is encapsulated and encrypted.

15
Remote Access
  • Tunneling Protocols
  • Point-to-Point Tunneling Protocol (PPTP) for RAS
  • Developed by Microsoft and other industry leaders
  • Less secure than L2TP, but easier to configure
  • Used with CHAP v2 to provide secure Dial-Up
  • Layer Two Tunneling Protocol (L2TP)
  • An industry standard VPN protocol
  • Used to send IP packets over the internet or
    other public IP network
  • Most secure when used in conjunction with IPSec
    (Encryption)

16
Remote Access
  • Authentication Methods used by Vista
  • Password Authentication Protocol (PAP)
  • Plain Text password authentication
  • Challenge Handshake Authentication Protocol
    (CHAP)
  • Uses a challenge/response hashing scheme to
    eliminate clear text password transfer.
  • Microsoft CHAP v2 (MS-CHAPv2)
  • Adds to CHAP by providing stronger encryption and
    different encryption keys for sending and
    receiving
  • Extensible Authentication Protocol (EAP)
  • Used for secure authentication with devices such
    as smartcards (credit card type devices used with
    a reader)

17
Remote Access
  • Encryption Options
  • Microsoft Point-to-Point Encryption (MPPE)
  • PPTP (Point to-Point Tunneling Protocol) does
    not provide data encryption on its own. It
    utilized MPPE to provide it.
  • Internet Protocol Security (IPSec)
  • Provides high level DES (Data Encryption
    Standard) encryption
  • Data integrity
  • Data confidentiality services

18
Supporting Wireless Network Connections
  • As wireless technology becomes more mature and
    cost effective, the use of wireless network
    adapters is increasingly popular.
  • Vista Supports auto-configuration.
  • Vista automatically finds available wireless
    networks, and attaches to the preferred network.
  • StartgtNetworkgtNetwork and Sharing CentergtManage
    Wireless Networks

19
Connecting to a Wireless NetworkYou will be
asked for network name (SSID) and possibly a
Security Key or Passphrase
20
Configuring Security for a Wireless Network
  • Disable SSID (Service Set Identifier) broadcast
  • The name of the wireless network
  • Create MAC (Media Access Control) address filter
  • Unique identifier assigned to every network
    adapter
  • Enable Encryption
  • Wired Equivalent Privacy (WEP)
  • Extremely easy to decrypt
  • Wi-Fi Protected Access (WPA)
  • WPA version 2 (WPA2)

21
Overview of TCP/IP
  • Required for Internet connectivity
  • Installed by default in Vista
  • Main protocols that provide basic TCP/IP services
    include
  • Transmission Control Protocol (TCP)
  • Internet Protocol (IP)
  • User Datagram Protocol (UDP)
  • Address Resolution Protocol (ARP)
  • Internet Control Message Protocol (ICMP)
  • Internet Group Management Protocol (IGMP)

22
Basics of IPv4 Addressing
  • 32-bit address, four field address
  • Uniquely identifies your computer on the network
  • Written in dotted decimal notation
    (192.168.1.144)
  • Part identifies network and part identifies host
  • Subnet mask
  • Used to specify the network portion and host
    portion of an address
  • Address classes
  • Class A
  • 255.0.0.0 16,777,214 hosts
  • Class B
  • 255.255.0.0 65,534 hosts
  • Class C
  • 255.255.255.0 254 hosts
  • Default Gateway

23
Methods of IP Address Assignment
  • Dynamic Host Configuration Protocol (DHCP)
  • Assigns IP addressing information to computers
  • Automatic Private IP Addressing (APIPA)
  • Static Address Configuration
  • Alternate Configuration
  • Mainly for laptops that my visit 2 locations
  • Main DHCP Configuration and an alternate Fix
    address for example.

24
Domain Name System (DNS) Servers
  • Used to resolve domain names, such as
    www.sybex.com, to IP addresses.
  • DNS servers maintain a distributed database of
    all the registered domains and their IP
    addresses.
  • HOSTS files are used if DNS servers are not
    available.

25
Windows Internet Name Service (WINS) Servers
  • Used to resolve NetBIOS names to IP addresses.
  • NetBIOS names are primarily used for backwards
    compatibility with Windows NT 4.
  • LMHOSTS files are used if WINS servers are not
    available.

26
IPv6 Addressing
  • 128-bit addresses
  • Allows for a much larger address space than IPv4
    (32 bit)
  • IPv4 4,294,967,296 addresses
  • IPv6 340,282,366,920,938,463,463,374,607,431,768,
    211,456 addresses
  • Can coexist with IPv4

27
IPv6 Addressing
  • Written in hexadecimal format
  • 8 Groups of 4 Hexadecimal characters
  • Equivalent examples
  • 0123045607890000000000AB00CD00EF
  • 12345678900ABCDEF
  • Leading Zeros can be left off
  • 123456789ABCDEF
  • Additionally 2 Zeros can be replaced by 2 colons

28
Testing IP Configuration
  • ipconfig
  • Displays your IP configuration
  • Switches
  • ipconfig /all
  • ipconfig /release
  • ipconfig /renew
  • ping
  • Tests connectivity between two computers

29
TCP/IP Troubleshooting
  • Use IPConfig to determine if you are getting an
    IP address and where it is coming from
  • DHCP or Fixed
  • If you can access a resource by IP but not name,
    then suspect DNS
  • If you can access resources on your subnet, but
    not another, suspect the default gateway
  • If you can access some resources on your subnet,
    but not others, suspect physical connectivity
    issue.
Write a Comment
User Comments (0)
About PowerShow.com