Presentation is loading. Please wait.

Presentation is loading. Please wait.

Chapter 8: Configuring Network Connectivity. 2/24 Objectives Learn how to configure a network adapter Learn about the Network and Sharing Center Learn.

Similar presentations


Presentation on theme: "Chapter 8: Configuring Network Connectivity. 2/24 Objectives Learn how to configure a network adapter Learn about the Network and Sharing Center Learn."— Presentation transcript:

1 Chapter 8: Configuring Network Connectivity

2 2/24 Objectives Learn how to configure a network adapter Learn about the Network and Sharing Center Learn about Remote Access Learn about small Wireless Networks

3 Installing Network Adapters Network adapter cards are hardware used to connect a computer, and other devices, to a network A driver must be installed Installation –Plug and Play adapters will install automatically –Non-Plug and Play adapters must be installed with the Add Hardware Wizard in Control Panel 3/19

4 Configuring a Network Adapter Use Device Manager to configure –Start>Computer>System Properties>Device Manager –Expand Network Adapter icon and open the N.I.C. Network adapter’s Properties dialog box tabs available. –General tab –Advanced tab –Driver tab –Details tab –Resources tab –Power Management tab 4/19

5 Configuring a Network Adapter General tab –Name of the Adapter and Manufacturer Advanced tab –Varies because it is Manufacturer dependant and should not be touched unless instructed to Driver tab –Driver provider (Microsoft or Manufacturer) –Version and date driver was released –Location of the driver (useful for troubleshooting) –The ability to install, update, rollback, or disable driver 5/19

6 Configuring a Network Adapter Details tab –Is new to Vista –Provides information about the network adapter Device description Bus number Problem codes Driver information Resources tab –Provides the device resource information needed by all hardware in the computer IRQ I/O address Memory –Power Management tab Lists the power management settings for the network adapter, such as the ability to turn off the adapter if not in use to save power. 6/19

7 Troubleshooting Network Adapters Common causes of network adapter problems –Network adapter not on the HCL ( Microsoft’s Hardware Compatibility List) Contact vendor for advice –Outdated network card driver Get the latest driver from vendor website –Network adapter card not recognized by Windows Vista Try manually installing –Hardware not working properly Run diagnostics that came with adapter Select Diagnose from network connections Check cable 7/19

8 Troubleshooting Network Adapters Common causes of network adapter problems –Improperly configured network protocols –Improperly configured network card Auto detect speed Full duplex –Bad cable Especially tricky if connecting to a patch panel or jack –Bad network connection device Hub Switch Router 8/19

9 Network and Sharing Center Used to view and configure network devices, as well as to share files and printers 9/19

10 Network Locations Provides the name of the network and the type of connection Public –Used for unsecure, public networks –Does not allow discovery between networked computers Private –Used for secure, private networks –Allows discovery between networked computers 10/19 Firewall will be set automatically depending on your selection.

11 Sharing and Discovery Network Discovery –Computer will be able to see other networked computers and devices. Those devices can also detect you. –Automatic On: Private Off: Public File Sharing –Three folders shared by default: Public –All users on the network have read/write access –Public docs, downloads, music, pictures, video. Users –A folder that only the authenticated user can access Printers –All installed printers 11/19

12 Sharing and Discovery Public Folder Sharing –Turn on to open files –Turn on and allow full access –Turn off sharing Turning on, enables File Sharing Printer Sharing –Allows printer sharing –Turning on printer sharing, also turns on file sharing as well Password Protected Sharing –If turned on, only users with local accounts can authenticate and use a shared resource. Media Sharing –If turned on, users can access your shared music, pictures, video, etc, and you will be able to locate shared media on other computers. 12/19

13 Tasks Pane Found on the left hand side of the Network and Sharing Center, and used for: View Computers and Devices –Much better than XP and previous Connect to a Network –Allows you to filter(wireless,dialup, etc.) Manage Wireless Networks –Even if not connected Set Up a (New) Connection or Network Manage (Existing) Network Connections Diagnose and Repair –Will attempt to fix, as well as give an option to report the problem to Microsoft 13/19

14 Remote Access Two methods of remote access: –Dial-in connection to a Remote Access Service (RAS) Server –Virtual Private Network (VPN) Connection All data is encapsulated and encrypted. 14/19

15 Remote Access Tunneling Protocols –Point-to-Point Tunneling Protocol (PPTP) for RAS Developed by Microsoft and other industry leaders Less secure than L2TP, but easier to configure Used with CHAP v2 to provide secure Dial-Up –Layer Two Tunneling Protocol (L2TP) An industry standard VPN protocol Used to send IP packets over the internet or other public IP network Most secure when used in conjunction with IPSec (Encryption) 15/19

16 Remote Access Authentication Methods used by Vista –Password Authentication Protocol (PAP) Plain Text password authentication –Challenge Handshake Authentication Protocol (CHAP) Uses a challenge/response hashing scheme to eliminate clear text password transfer. –Microsoft CHAP v2 (MS-CHAPv2) Adds to CHAP by providing stronger encryption and different encryption keys for sending and receiving –Extensible Authentication Protocol (EAP) Used for secure authentication with devices such as smartcards (credit card type devices used with a reader ) 16/19

17 Remote Access Encryption Options –Microsoft Point-to-Point Encryption (MPPE) PPTP (Point –to-Point Tunneling Protocol) does not provide data encryption on its own. It utilized MPPE to provide it. –Internet Protocol Security (IPSec) Provides high level DES (Data Encryption Standard) encryption Data integrity Data confidentiality services 17/19

18 Supporting Wireless Network Connections As wireless technology becomes more mature and cost effective, the use of wireless network adapters is increasingly popular. –Vista Supports auto-configuration. –Vista automatically finds available wireless networks, and attaches to the preferred network. –Start>Network>Network and Sharing Center>Manage Wireless Networks 18/19

19 Connecting to a Wireless Network You will be asked for network name (SSID) and possibly a Security Key or Passphrase 19/19

20 Configuring Security for a Wireless Network Disable SSID (Service Set Identifier) broadcast –The name of the wireless network Create MAC (Media Access Control) address filter –Unique identifier assigned to every network adapter Enable Encryption –Wired Equivalent Privacy (WEP) Extremely easy to decrypt –Wi-Fi Protected Access (WPA) –WPA version 2 (WPA2) 20/19

21 Overview of TCP/IP Required for Internet connectivity Installed by default in Vista Main protocols that provide basic TCP/IP services include: –Transmission Control Protocol (TCP) –Internet Protocol (IP) –User Datagram Protocol (UDP) –Address Resolution Protocol (ARP) –Internet Control Message Protocol (ICMP) –Internet Group Management Protocol (IGMP) 21/19

22 Basics of IPv4 Addressing 32-bit address, four field address Uniquely identifies your computer on the network Written in dotted decimal notation (192.168.1.144) –Part identifies network and part identifies host Subnet mask –Used to specify the network portion and host portion of an address Address classes –Class A 255.0.0.016,777,214 hosts –Class B 255.255.0.065,534 hosts –Class C 255.255.255.0254 hosts Default Gateway 22/19

23 Methods of IP Address Assignment Dynamic Host Configuration Protocol (DHCP) –Assigns IP addressing information to computers Automatic Private IP Addressing (APIPA) Static Address Configuration Alternate Configuration –Mainly for laptops that my visit 2 locations –Main DHCP Configuration and an alternate Fix address for example. 23/19

24 Domain Name System (DNS) Servers Used to resolve domain names, such as www.sybex.com, to IP addresses. DNS servers maintain a distributed database of all the registered domains and their IP addresses. HOSTS files are used if DNS servers are not available. 24/19

25 Windows Internet Name Service (WINS) Servers Used to resolve NetBIOS names to IP addresses. NetBIOS names are primarily used for backwards compatibility with Windows NT 4. LMHOSTS files are used if WINS servers are not available. 25/19

26 IPv6 Addressing 128-bit addresses –Allows for a much larger address space than IPv4 (32 bit) IPv4: 4,294,967,296 addresses IPv6: 340,282,366,920,938,463,463,374,6 07,431,768,211,456 addresses Can coexist with IPv4 26/19

27 IPv6 Addressing Written in hexadecimal format –8 Groups of 4 Hexadecimal characters –Equivalent examples: 0123:0456:0789:0000:0000:00AB:00 CD:00EF 123:456:789:0:0:AB:CD:EF –Leading Zeros can be left off 123:456:789::AB:CD:EF –Additionally 2 Zeros can be replaced by 2 colons :: 27/19

28 Testing IP Configuration ipconfig –Displays your IP configuration –Switches ipconfig /all ipconfig /release ipconfig /renew ping –Tests connectivity between two computers 28/19

29 TCP/IP Troubleshooting Use IPConfig to determine if you are getting an IP address and where it is coming from –DHCP or Fixed If you can access a resource by IP but not name, then suspect DNS If you can access resources on your subnet, but not another, suspect the default gateway If you can access some resources on your subnet, but not others, suspect physical connectivity issue. 29/19


Download ppt "Chapter 8: Configuring Network Connectivity. 2/24 Objectives Learn how to configure a network adapter Learn about the Network and Sharing Center Learn."

Similar presentations


Ads by Google