Presentation is loading. Please wait.

Presentation is loading. Please wait.

Windows Vista Configuration MCTS 70- 620: Advanced Networking.

Similar presentations


Presentation on theme: "Windows Vista Configuration MCTS 70- 620: Advanced Networking."— Presentation transcript:

1 Windows Vista Configuration MCTS 70- 620: Advanced Networking

2 Introduction to TCP/IP TCP/IP (Transmission Control Protocol/Internet Protocol) is a suite of protocols on which the Internet is based. Internet Protocol (IP) is the lowest protocol within the TCP/IP suite and is responsible for addressing and routing packets between hosts. Connections on TCP/IP addresses are called hosts and are assigned a unique IP address. By default, Vista enables and supports both IPv4 and IPv6 through a dual-IP-layer architecture.

3 IPv4 TCP/IP Addressing An IP address consists of four 8-bit numbers (octet) divided by periods (.). They are manually assigned and configured (static IP addresses) or dynamically assigned and configured by a Dynamic Host Configuration. No two connections can use the same IP address. The TCP/IP address consists of a network number and a host number.

4 IPv4 TCP/IP Addressing A subnet mask is used to define which address bits describe the network number and which address bits describe the host address. The format very similar to the IP address, with four 8-bit numbers separated by periods (.). IP address (15.2.3.6) Subnet mask = (255.255.255.0, 15.2.3.0) Every computer on the network requires an address that begins 15.2.3 The host number ( the last in the sequence) makes the entire address unique.

5 IPv4 TCP/IP Addressing The default gateway must be defined for users to communicate with computers on other networks. Only one gateway must be specified if the LAN is connected to two or more networks. If the data packet is meant to be sent to a computer on another network, the gateway forwards the data packet to the router.

6 Private Network Addresses 10.x.x.x (1 Class A address range) 172.16.x.x to 172.31.x.x (16 Class B address ranges) 192.168.0.x and 192.168.255.x (256 Class C address ranges)

7 Benefits of IPv6 Larger address space Efficient routing Straightforward configuration Enhanced security

8 IPv4 and IPv6 Addresses IPv4 is based on 32-bit addresses. IPv6 uses 128 bits for the addresses. IPv6 can handle all of today’s IP-based machines and allow for future growth. An IPv6 address is divided into groups of 16 bits, written as 4 hex digits. FE80:0000:0000:0000:02A0:D2EF:FEA5:E9F5 IPv4 and IPv6 are split into two parts. IPv6 has a fixed prefix that contains specific routing and subnet information. The first 64 bits define the network address and the second 64 bits define the host address.

9 Fully Qualified Domain Names (FQDNs) www.microsoft.com www.intel.com server1.acme.com

10 Name Resolution A Domain Name Server (DNS) contains the host name and IP address information for all domains on the Internet. A HOSTS file on each machine can also be used to translate domain/host names to IP addresses. A disadvantage of using HOSTS files is that you must add entries on every machine. NetBIOS naming scheme is very much like that used to identify share names for file and printers, \\COMPUTERNAME\SHARENAME. Problems with the DNS server/HOSTS file or the WINS server/LMHOSTS file come with accessing a network by name rather than IP address.

11 IP Configuration on Windows Vista Machines

12 DNS server address settings for IPv4 and IPv6 To obtain a DNS server address automatically: Click Obtain DNS Server Address Automatically, and then click OK. To specify a DNS server address: Click Use the Following DNS Server Addresses, and then, in the Preferred DNS server and Alternate DNS server boxes, type the addresses of the primary and secondary DNS servers.

13 Tools to Help Diagnose Network Problems

14 Typical Troubleshooting Process 1. Check local IP configuration ( ipconfig ). 2. Use the ping command to gather more information on the extent of the problem: Ping the loopback address (127.0.0.1). Ping the local IP address. Ping the remote gateway. Ping the remote computer. 3. Identify each hop (router) between two systems using the tracert command. 4. Verify DNS configuration using the nslookup command.

15 Wireless Adapter Modes Ad hoc - Wireless adapter connects directly to other computers with wireless adapters. Infrastructure - Wireless adapter connects to an access point (AP).

16 Popular Wireless Standards

17 WPA-compatible and WPA2-compatible Device Modes Personal mode provides authentication via a preshared key or password. Enterprise mode provides authentication using IEEE 802.1X and Extensible Authentication Protocol (EAP).

18 Wireless Security Personal Uses a pre-shared encryption key. Key is programmed into the AP and all wireless devices. Changed regularly so that the same session key is never used twice. Enterprise Uses session keys and group keys. Used to create a private virtual port between the AP and the client. Keys are generated dynamically and are rotated to help safeguard the integrity of keys over time.

19 Configuring a Wireless Connection

20 Network and Sharing Center

21 Manage Wireless Networks Lists wireless networks in the order in which the computer should try to use the available networks. Starts with the network at the top of the list and moves on as a connection cannot be established. Order can be changed using the Move Up or Move Down buttons. Click Add to create a new wireless network. Click Remove to delete a listed wireless network.

22 Supported Remote Connections Dial-up Broadband Virtual private network (VPN)

23 Dial-up Connection Uses a modem and a phone line to connect to: A modem pool at an Internet service provider (ISP) so that the computer can connect to the Internet. A modem pool on an internal network (such as work) to access network resources such as e-mail and data files.

24 Broadband Connections Typically uses a cable or Digital Subscriber Line (DSL) connection. Router or modem is used need to connect to the service provider. Network adapter is used to connect to the router or modem. Connection is established over the local area network (LAN) and must be configure to gain access to the internet. To set specific configuration options you may need create a broadband connection.

25 Virtual Private Networking Creation of secured, point-to-point connections across a private network or a public network such as the Internet. Uses tunneling protocols, to make a virtual call to a virtual port on a virtual private networking service. Vista supports Point-to-Point Tunneling Protocol (PPTP) and Microsoft Point-to-Point Encryption (MPPE). Used to establish secure communications channels over an existing dial-up or broadband connection.


Download ppt "Windows Vista Configuration MCTS 70- 620: Advanced Networking."

Similar presentations


Ads by Google