Presentation is loading. Please wait.

Presentation is loading. Please wait.

Overview of Client Configuration By Nanda Ganesan, Ph.D. © Nanda Ganesan.

Similar presentations


Presentation on theme: "Overview of Client Configuration By Nanda Ganesan, Ph.D. © Nanda Ganesan."— Presentation transcript:

1 Overview of Client Configuration By Nanda Ganesan, Ph.D. © Nanda Ganesan

2 Chapter Objectives Describe the basics of client configuration Present examples of advanced features for NICs such as installing additional cards Explain the addition of other protocols such as IPX/SPX etc. Outline a few network services that could be configured Discuss the logon and security options when configuring a client

3 Chapter Modules Client configuration Basics Some LAN Protocols TCP/IP Installation and Configuration Other Network Services Logon and Security Options and Summary

4 MODULE 1 Client Configuration Basics

5 Client Configuration Overview Client configuration is a two step process Step 1: Facilitate general network address –Internet access Step 2: Facilitate specific network address –Microsoft or other network address

6 General Network Access Install NIC, drivers, TCP/IP etc. Test for access Access the Internet

7 Specific Network Address Give the computer a name Enter the computer in a domain or a workgroup –Domain name applies to client server networks –Workgroup name applies to peer-to-peer networks Access one or more specific networks

8 Components to be Configured Step 1: General network access –NIC –Client for a particular network –Protocol –Services Step 2: Specific network access –Computer ID –Define Workgroup or Domain

9 Components to be Configure for General Access NIC Protocol and properties Client for a Network –Microsoft or Novell for example Network services –File and print sharing, if desired

10 End of Module 1

11 Module 2 NIC Configuration

12 Install the adapter When an OS such as Windows XP is installed the NIC will automatically be installed Install the latest driver for the adapter –The latest driver for a particular operating system is usually obtained from the NIC manufacturers website

13 NIC Functioning Check for proper functioning of the NIC by going through the device manager –There should not be a yellow exclamation mark next to the NIC Most problems can be solved by installing the correct driver Driver installation could be done by invoking an installation wizard

14 Checking for Functioning of NIC Go through the device manager to check for proper functioning of the NIC

15

16

17

18

19 Correcting Problems In the previous slide there was no yellow exclamation mark against the NIC –Therefore, the NIC is properly functioning If there was a yellow exclamation mark, then, in most instances, then the NIC is not functioning properly –Most problems could be solved by installing the correct driver or updating the driver for NIC

20 Installing or Updating the Driver There are different ways of accessing the properties of the NIC to update the driver –One is to access the properties from the device manger listed in the Computer Management Console that was shown before –The other is to access the properties from either the control panel or from the network neighborhood icon Updating will be discussed under a different module

21 Multiple Adapter In general, there would be only one NIC in the computer It is also possible to have multiple adapters in a computer –A protocol can be bound to each adapter –The protocol could be different in each case

22 Reasons for Multiple Adapters Use the computer as a router Host multiple virtual websites on a single server with each IP address assigned to each NIC being referenced by a particular domain name

23 A Multiple Adapter Application Scenario Microsoft/ Ethernet/ TCP/IP NIC 1 NIC 2 Microsoft/ Token Ring/ TCP/IP Multi-homed Computer

24 End of Module 2

25 Module 3 NIC Properties

26 Accessing NIC Properties From CMC (Computer Management Console) From Network Neighborhood From Control Panel

27 Accessing NIC Properties from CMC Accessing the CMC was shown in a previous module The following slides outline the rest of the procedure

28

29

30 Accessing the NIC Properties from Network Neighborhood The steps are shown in the following slides

31

32

33

34

35

36 NIC Properties General Advanced Driver –Accessed and used for updating the driver Resources Power Management

37 Updating the Driver Access the driver tab Start the update wizard and follow the steps In the following example, a driver that has already been downloaded and stored in a local folder named H:\Internet Download\NIC Driver is used for updating

38

39

40

41

42

43

44

45

46

47 Updating Complete There was no yellow exclamation mark against the NIC in the CMC The installation is assumed to be correct

48 Other NIC Features General Advanced Resources Power Management

49

50

51

52

53 End of Module 3

54 Module 4 A Preview of Major LAN Protocols

55 Major Protocols TCP/IP –De facto protocols of the Internet IPX/SPX –Used in Novell networks NetBEUI –A non routable local protocol

56 NetBEUI Supported by –Windows 9X, Windows NT, Windows 2000 and Windows XP Non-routable protocol used for setting a local LAN that does not require Internet access Can be used for an internal peer-to-peer or client-server network

57 IPX/SPX Compatible Protocol Used in Novell networks Required for interoperability of Windows network with Novell networks Routable protocol IPX/SPX can be used for peer-to-peer or client-server networking

58 TCP/IP An important protocol used widely on the Internet A routable protocol Supports communication with UNIX networks or any other network that work under the TCP/IP protocol –The base protocol in UNIX networks is TCP/IP Can be used for configuring peer-to-peer as well as client-server networks of very large scale

59 A TCP/IP Application Scenario Workstation The Internet Router Local Router Workstation Lab Configure the workstation for Internet access by Installing TCP/IP.

60 End of Module 4

61 Module 5 Basic TCP/IP Installation and Configuration

62 TCP/IP Installation and Configuration A two-step process First, install the protocol –With many modern OSs such as Windows XP, it is automatically installed Second, configure its properties –When TCP/IP is automatically installed, the properties are set to be obtained from a DHCP server –However, it is also possible to manually set the properties

63 TCP/IP Installation Steps Choose Network/ Properties Install Protocol Choose TCP/IP Start End From Network Neighborhood/ Properties. Add OK TCP/IP protocol installed.

64 Accessing the Window for TCP/IP Properties Under different Windows operating systems the TCP/IP properties are accessed in different ways –The best and the most consistent way to access TCP/IP properties Windows is to go through the Control Panel and then select the Network Icon –Another way to access the properties is to go through Network Neighborhood –Thereafter, select the network properties (Based on the NIC) and then then continue to select the TCP/IP properties

65 Accessing TCP/IP Properties Tab Choose Network TCP/IP/ Properties Start From Network Neighborhood/ Properties. Define TCP/IP properties Proceed

66

67

68

69

70 TCP/IP Configuration Options Dynamic IP –A DHCP server must be present in the network to issue dynamic IP –In a number of cases, the MAC address of the client is registered to prevent unauthorized leasing of IP addresses to clients Static IP –Obtain the IP address specifications from the network administrator

71 DHCP and TCP/IP Configuration Without a DHCP server –Requires the static assignment of IP addresses and properties –The DHCP server need not reside on the same subnet With a DHCP server –IP addresses etc. are automatically assigned by the DHCP server –Select the appropriate option for the TCP/IP address to be dynamically assigned by the DHCP server

72

73 TCP/IP Properties Subnet Mask Gateway DNS Advanced TCP/IP Properties IP Address

74 Assignment of Properties for TCP/IP IP address Subnet mask Gateway address DNS address –Preferred –Alternate, if available

75

76 Alternate IP If the computer is used on another network as well, an alternate IP address may also be set –It can be a private IP address –Or, it could well be a static IP address that is manually set

77

78

79

80 IP Addresses for Restricted Internal LANs For an internal network, only the IP addresses and the subnet masks need to be assigned –Note that subnet mask is not an IP address Such networks will not have access to the outside world meaning that it would not have a connection to the Internet There are also some IP addresses reserved for internal use that are known as private addresses –An example is 192.168.0.1

81 Facilitating External Access A gateway address is required to facilitate external address A gateway is generally a router that directs the traffic to the next segment of the network that would eventually be linked through a series of hops over network segment to its destination There can be more than one gateway present in a network meaning that multiple gateway addresses can be entered in the TCP/IP properties window

82 IP Address Assignment Summarized IP Address Obtain IP Address automatically Specify IP Address IP Address 123.345.678.90 Subnet Mask 255.255.255.0 DHCP Non-DHCP Gateway, DNS and WINS addresses

83 End of Module 5

84 Module 6 Advanced TCP/IP Settings

85 Accessing Advanced Properties Advanced properties can be accessed from the tab marked advanced

86

87 Advanced Properties of TCP/IP IP settings DNS WINS Options –Security related

88 IP and Gateway Settings Multiple IP addresses for the same NIC Multiple gateways

89

90 DNS Multiple DNSs Search suffix order Registering current computer with the DNS server

91

92 Adding Search Suffixes The added search suffixes will be added to resolve http address entries to IP addresses Example: tamilcanadian.com If we enter http://news, then it would be interpreted as http://news.tamilcanadian.comhttp://news http://news.tamilcanadian.com

93

94

95

96

97

98 WINS Setting multiple WINSs Add LMHOST lookup –A local table used for resolving windows names to IP addresses Set NetBIOS over TCP/IP to cater for older applications that rely on NetBIOS

99

100 More on WINS WINS Configuration –This can be configured if there is a WINS server on the network –The purpose of the WINS server is to resolve Windows client names into IP addresses –Windows names are not common in today’s environment as all computer names are based on TCP/IP

101 Options Set TCP/IP filtering by limiting access to certain ports for certain protocols In the following example, TCP/IP filtering is used for limiting access to port 80 only

102

103

104

105

106

107

108

109

110

111

112

113 TCP/IP Implementation and Configuration End Result The workstation is ready for Internet access Tasks possible –Access Internet Note: The computer may have a name generated by the OS such as Windows XP

114 End of Module 6

115 Module 7 Network Client and Services

116 Module Objectives Sample services Backup data Remote printer administration Summary of major networking components

117 Sample Services Backup of data HP Laser Jet administration File and printer sharing –Microsoft networks

118 Backup Data Arcada Backup Agent WorkstationBackup Tape

119 Remote HP LaserJet Administration HP JetAdmin service installed. LaserJet connected directly to the network. WorkstationHP LaserJet

120 End of Module

121 MODULE Logon and Security Options and Summary

122 Module Objectives Primary logon options Network logon options Workstation logon in peer-to-peer networks An option in workstation security implementation

123 Logon Local Workgroup Domain –Active Directory –Non-Active Directory

124 Primary Logon Options (Windows 9x) Windows Log On User enters local Windows mode –Password is supported –But, password does not control access to local resources Network Log On –User enters network through local workstation –Password is supported –Password controls access to network resources

125 Primary Logon Options Windows Network

126 Network Logon Options Connecting to a peer-to-peer LAN –The client becomes part of a workgroup Connecting to a Client-Server LAN –The client becomes part of a domain Quick Log-on –Network drives are not connected Log-on –Networks drives are connected –Chosen in most cases of peer-to-peer networking

127 Workstation Logon in Peer-to- Peer Configuration Password does not protect access to the local workstation in the case of a client that operates under Windows 9x –Windows NT 4.0 Work Station, Windows 2000 Professional and provides protection at this level Only network resources are protected by passwords

128 An Option in Workstation Security Implementation BIOS level Implementation –A password can be implemented Forgotten passwords –Change the password jumper setting –Restart the system BIOSPassword Jumper Motherboard

129 Summary of Major Networking Components Client Adapter Protocol Services Identification (Network Station) Logon security –Logon locally or into a Domain

130 END OF MODULE END OF CHAPTER

131 Installation of Other Components When a protocol is installed other components such as the Client option may be installed In certain case, the File and Print sharing service may also be installed –This service must be activated to allow files and printers to be shared by others in the network


Download ppt "Overview of Client Configuration By Nanda Ganesan, Ph.D. © Nanda Ganesan."

Similar presentations


Ads by Google