Title: Chapter%208:%20Configuring%20Network%20Connectivity
1Chapter 8 Configuring Network Connectivity
2Objectives
- Learn how to configure a network adapter
- Learn about the Network and Sharing Center
- Learn about Remote Access
- Learn about small Wireless Networks
3Installing Network Adapters
- Network adapter cards are hardware used to
connect a computer, and other devices, to a
network - A driver must be installed
- Installation
- Plug and Play adapters will install automatically
- Non-Plug and Play adapters must be installed with
the Add Hardware Wizard in Control Panel
4Configuring a Network Adapter
- Use Device Manager to configure
- StartgtComputergtSystem PropertiesgtDevice Manager
- Expand Network Adapter icon and open the N.I.C.
- Network adapters Properties dialog box tabs
available. - General tab
- Advanced tab
- Driver tab
- Details tab
- Resources tab
- Power Management tab
5Configuring a Network Adapter
- General tab
- Name of the Adapter and Manufacturer
- Advanced tab
- Varies because it is Manufacturer dependant and
should not be touched unless instructed to - Driver tab
- Driver provider (Microsoft or Manufacturer)
- Version and date driver was released
- Location of the driver (useful for
troubleshooting) - The ability to install, update, rollback, or
disable driver
6Configuring a Network Adapter
- Details tab
- Is new to Vista
- Provides information about the network adapter
- Device description
- Bus number
- Problem codes
- Driver information
- Resources tab
- Provides the device resource information needed
by all hardware in the computer - IRQ
- I/O address
- Memory
- Power Management tab
- Lists the power management settings for the
network adapter, such as the ability to turn off
the adapter if not in use to save power.
7Troubleshooting Network Adapters
- Common causes of network adapter problems
- Network adapter not on the HCL (Microsofts
Hardware Compatibility List) - Contact vendor for advice
- Outdated network card driver
- Get the latest driver from vendor website
- Network adapter card not recognized by Windows
Vista - Try manually installing
- Hardware not working properly
- Run diagnostics that came with adapter
- Select Diagnose from network connections
- Check cable
8Troubleshooting Network Adapters
- Common causes of network adapter problems
- Improperly configured network protocols
- Improperly configured network card
- Auto detect speed
- Full duplex
- Bad cable
- Especially tricky if connecting to a patch panel
or jack - Bad network connection device
- Hub
- Switch
- Router
9Network and Sharing CenterUsed to view and
configure network devices, as well as to share
files and printers
10Network LocationsProvides the name of the
network and the type of connection
- Public
- Used for unsecure, public networks
- Does not allow discovery between networked
computers - Private
- Used for secure, private networks
- Allows discovery between networked computers
Firewall will be set automatically depending on
your selection.
11Sharing and Discovery
- Network Discovery
- Computer will be able to see other networked
computers and devices. Those devices can also
detect you. - Automatic On Private Off Public
- File Sharing
- Three folders shared by default
- Public
- All users on the network have read/write access
- Public docs, downloads, music, pictures, video.
- Users
- A folder that only the authenticated user can
access - Printers
- All installed printers
12Sharing and Discovery
- Public Folder Sharing
- Turn on to open files
- Turn on and allow full access
- Turn off sharing
- Turning on, enables File Sharing
- Printer Sharing
- Allows printer sharing
- Turning on printer sharing, also turns on file
sharing as well - Password Protected Sharing
- If turned on, only users with local accounts can
authenticate and use a shared resource. - Media Sharing
- If turned on, users can access your shared music,
pictures, video, etc, and you will be able to
locate shared media on other computers.
13Tasks PaneFound on the left hand side of the
Network and Sharing Center, and used for
- View Computers and Devices
- Much better than XP and previous
- Connect to a Network
- Allows you to filter(wireless,dialup, etc.)
- Manage Wireless Networks
- Even if not connected
- Set Up a (New) Connection or Network
- Manage (Existing) Network Connections
- Diagnose and Repair
- Will attempt to fix, as well as give an option to
report the problem to Microsoft
14Remote Access
- Two methods of remote access
- Dial-in connection to a Remote Access Service
(RAS) Server - Virtual Private Network (VPN) Connection
- All data is encapsulated and encrypted.
15Remote Access
- Tunneling Protocols
- Point-to-Point Tunneling Protocol (PPTP) for RAS
- Developed by Microsoft and other industry leaders
- Less secure than L2TP, but easier to configure
- Used with CHAP v2 to provide secure Dial-Up
- Layer Two Tunneling Protocol (L2TP)
- An industry standard VPN protocol
- Used to send IP packets over the internet or
other public IP network - Most secure when used in conjunction with IPSec
(Encryption)
16Remote Access
- Authentication Methods used by Vista
- Password Authentication Protocol (PAP)
- Plain Text password authentication
- Challenge Handshake Authentication Protocol
(CHAP) - Uses a challenge/response hashing scheme to
eliminate clear text password transfer. - Microsoft CHAP v2 (MS-CHAPv2)
- Adds to CHAP by providing stronger encryption and
different encryption keys for sending and
receiving - Extensible Authentication Protocol (EAP)
- Used for secure authentication with devices such
as smartcards (credit card type devices used with
a reader)
17Remote Access
- Encryption Options
- Microsoft Point-to-Point Encryption (MPPE)
- PPTP (Point to-Point Tunneling Protocol) does
not provide data encryption on its own. It
utilized MPPE to provide it. - Internet Protocol Security (IPSec)
- Provides high level DES (Data Encryption
Standard) encryption - Data integrity
- Data confidentiality services
18Supporting Wireless Network Connections
- As wireless technology becomes more mature and
cost effective, the use of wireless network
adapters is increasingly popular. - Vista Supports auto-configuration.
- Vista automatically finds available wireless
networks, and attaches to the preferred network. - StartgtNetworkgtNetwork and Sharing CentergtManage
Wireless Networks
19Connecting to a Wireless NetworkYou will be
asked for network name (SSID) and possibly a
Security Key or Passphrase
20Configuring Security for a Wireless Network
- Disable SSID (Service Set Identifier) broadcast
- The name of the wireless network
- Create MAC (Media Access Control) address filter
- Unique identifier assigned to every network
adapter - Enable Encryption
- Wired Equivalent Privacy (WEP)
- Extremely easy to decrypt
- Wi-Fi Protected Access (WPA)
- WPA version 2 (WPA2)
21Overview of TCP/IP
- Required for Internet connectivity
- Installed by default in Vista
- Main protocols that provide basic TCP/IP services
include - Transmission Control Protocol (TCP)
- Internet Protocol (IP)
- User Datagram Protocol (UDP)
- Address Resolution Protocol (ARP)
- Internet Control Message Protocol (ICMP)
- Internet Group Management Protocol (IGMP)
22Basics of IPv4 Addressing
- 32-bit address, four field address
- Uniquely identifies your computer on the network
- Written in dotted decimal notation
(192.168.1.144) - Part identifies network and part identifies host
- Subnet mask
- Used to specify the network portion and host
portion of an address - Address classes
- Class A
- 255.0.0.0 16,777,214 hosts
- Class B
- 255.255.0.0 65,534 hosts
- Class C
- 255.255.255.0 254 hosts
- Default Gateway
23Methods of IP Address Assignment
- Dynamic Host Configuration Protocol (DHCP)
- Assigns IP addressing information to computers
- Automatic Private IP Addressing (APIPA)
- Static Address Configuration
- Alternate Configuration
- Mainly for laptops that my visit 2 locations
- Main DHCP Configuration and an alternate Fix
address for example.
24Domain Name System (DNS) Servers
- Used to resolve domain names, such as
www.sybex.com, to IP addresses. - DNS servers maintain a distributed database of
all the registered domains and their IP
addresses. - HOSTS files are used if DNS servers are not
available.
25Windows Internet Name Service (WINS) Servers
- Used to resolve NetBIOS names to IP addresses.
- NetBIOS names are primarily used for backwards
compatibility with Windows NT 4. - LMHOSTS files are used if WINS servers are not
available.
26IPv6 Addressing
- 128-bit addresses
- Allows for a much larger address space than IPv4
(32 bit) - IPv4 4,294,967,296 addresses
- IPv6 340,282,366,920,938,463,463,374,607,431,768,
211,456 addresses - Can coexist with IPv4
27IPv6 Addressing
- Written in hexadecimal format
- 8 Groups of 4 Hexadecimal characters
- Equivalent examples
- 0123045607890000000000AB00CD00EF
- 12345678900ABCDEF
- Leading Zeros can be left off
- 123456789ABCDEF
- Additionally 2 Zeros can be replaced by 2 colons
28Testing IP Configuration
- ipconfig
- Displays your IP configuration
- Switches
- ipconfig /all
- ipconfig /release
- ipconfig /renew
- ping
- Tests connectivity between two computers
29TCP/IP Troubleshooting
- Use IPConfig to determine if you are getting an
IP address and where it is coming from - DHCP or Fixed
- If you can access a resource by IP but not name,
then suspect DNS - If you can access resources on your subnet, but
not another, suspect the default gateway - If you can access some resources on your subnet,
but not others, suspect physical connectivity
issue.