Module 5 Configuring Wireless Network Connection.

Slides:



Advertisements
Similar presentations
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Configure a Wireless Router LAN Switching and Wireless – Chapter 7.
Advertisements

CN1260 Client Operating System Kemtis Kunanuraksapong MSIS with Distinction MCT, MCITP, MCTS, MCDST, MCP, A+
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 14: Troubleshooting Remote Connections.
Hands-On Microsoft Windows Server 2003 Administration Chapter 11 Administering Remote Access Services.
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Introduction to Wireless Networking. Basic Wireless and Wired Network.
XP 1 New Perspectives on Microsoft Windows XP, 2005 Service Pack 2 Update Appendix D Microsoft Windows XP, Service Pack 2 Update Appendix D – Setting Up.
Module 8 Configuring Mobile Computers and Remote Access in Windows 7.
Wireless Networking 102.
Managing Client Access
Module 4 Managing Client Access. Module Overview Configuring the Client Access Server Role Configuring Client Access Services for Outlook Clients Configuring.
© 2013 The McGraw-Hill Companies, Inc. All rights reserved Mike Meyers’ CompTIA A+ ® Guide to 802: Managing and Troubleshooting PCs Fourth Edition (Exam.
WIRELESS SECURITY ASHIMA SOOD PEYTON GREENE. OVERVIEW History Introduction to Wireless Networking Wireless Network Security Methods Securing Wireless.
Wireless Versus Wired Network Components By: Steven R. Yasoni & Dario Strazimiri.
Configuring Mobile Computing and Remote Access
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Wireless Router LAN Switching and Wireless – Chapter 7.
Wrocław University of Technology, Faculty of Fundamental Problems of Technology. 1.
Module 4: Add Client Computers and Devices to the Network.
Securing Microsoft® Exchange Server 2010
Managing Active Directory Domain Services Objects
Microsoft ® Official Course Module 10 Optimizing and Maintaining Windows ® 8 Client Computers.
Version Slide 1 Format of lecture Introduction to Wireless Wireless standards Applications Hardware devices Performance issues Security issues.
Summary: Windows XP wireless client utility offers the same interface regardless of the vendor. Service Pac1 has a slightly different interface than Service.
Implementing Network Access Protection
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Configure a Wireless Router LAN Switching and Wireless – Chapter 7.
Module 2 Designing Microsoft® Exchange Server 2010 Integration with the Current Infrastructure.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—-3-1 Wireless LANs Implementing a WLAN.
1 Chapter Overview Using the New Connection Wizard to configure network and Internet connections Using the New Connection Wizard to configure outbound.
Module 7: Fundamentals of Administering Windows Server 2008.
20411B 8: Installing, Configuring, and Troubleshooting the Network Policy Server Role Presentation: 60 minutes Lab: 60 minutes After completing this module,
Module 11: Remote Access Fundamentals
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Wireless standards Unit objective Compare and contrast different wireless standards Install and configure a wireless network Implement appropriate wireless.
1. Insert the Resource CD into your CD-ROM drive, click Start and choose Run. In the field that appears, enter F:\XXX\Setup.exe (if “F” is the letter of.
Module 8: Configuring Network Access Protection
Understanding Wireless Networking. WiFi Technology WiFi began as a way to extend home and small office network access without installing more cable. As.
Module 4 Planning and Deploying Client Access Services in Microsoft® Exchange Server 2010 Presentation: 120 minutes Lab: 90 minutes After completing.
1. Outlines Introduction What is Wi-Fi ? Wi-Fi Standards Hotspots Wi-Fi Network Elements How a Wi-Fi Network Works Advantages and Limitations of Wi-Fi.
Module 6 Securing Content. Module Overview Administering SharePoint Groups Implementing SharePoint Roles and Role Assignments Securing and Auditing SharePoint.
Module 3 Configuring File Access and Printers on Windows 7 Clients.
WIRELESS NETWORKING Ramiah Qasem, Jahmia Algahmie, Andrew Speice.
Lesson 10: Configuring Network Settings MOAC : Configuring Windows 8.1.
Using Routing and Remote Access Chapter Five. Exam Objectives in this Chapter:  Plan a routing strategy Identify routing protocols to use in a specified.
Sybex CCNA Chapter 14: Cisco Wireless Technologies Instructor & Todd Lammle.
Module 3 Planning for Active Directory®
NETWORKING & SYSTEM UPDATES
Summary: Unlike WindowsXP, Windows2000 wireless client utilities are different from vendor to vendor and even within versions of a vendor’s client utility.
Module 5 Configuring Wireless Network Connections.
Cisco Discovery Home and Small Business Networking Chapter 7 – Wireless Networking Jeopardy Review v1.1 Darren Shaver Kubasaki High School – Okinawa,
Module 14: Advanced Topics and Troubleshooting. Microsoft ® Windows ® Small Business Server (SBS) 2008 Management Console (Advanced Mode) Managing Windows.
 Today’s networks are no longer limited to using cabled, or wired, devices.  Today’s networks have a mix of wired systems along with wireless systems.
There is a lot to talk about if we think of the advantages of a wireless connection, the most important of its aspects is mobility and everything that.
Windows Vista Configuration MCTS : Advanced Networking.
Chapter-7 Basic Wireless Concepts and Configuration.
Wi-Fi Presented By: N. Rakesh Kumar (07D01A0591).
Labs. Session 1 Lab: Installing and Configuring Windows 7 Exercise 1: Migrating Settings by Using Windows Easy Transfer Exercise 2: Configuring a Reference.
Module Overview Overview of Wireless Networks Configure a Wireless Network.
Discovery Internetworking Module 7 JEOPARDY K. Martin.
Wireless Networks Dave Abbott.
Module 9: Configuring Network Access
Managing Windows Devices
Wireless Technologies
Wireless Fidelity 1 1.
Wireless Local Area Network (WLAN)
Lesson #10 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 10 Configuring Network and Firewall Settings.
Wireless Networking Chapter 23.
On and Off Premise Secure Access
Configure a Wireless Router
Configure a Wireless Router
Presentation transcript:

Module 5 Configuring Wireless Network Connection

Module Overview Overview of Wireless Networks Configuring a Wireless Network

Lesson 1: Overview of Wireless Networks What is a Wireless Network? Wireless Network Technologies Security Protocols for a Wireless Network

What is a Wireless Network? Advantages Extends or replaces wired infrastructure (wire-free) Increases productivity for mobile employees Provides easy access to internet in public places Disadvantages Possible interference Potential security risk Additional management A wireless network: Two modes: Interconnected devices, connected by radio waves instead of wires or cables Ad hoc Infrastructure

Wireless Network Technologies Wireless Broadband: Provides high-speed wireless internet and data network access Comparable to wired broadband, such as ADSL or cable modem Used to have constant connectivity to internet and corporate network Windows 7 supports for Wireless Broadband: Driver-based model for mobile broadband devices Used the same user interface regardless of the provider Standard Maximum bit rate Range of frequenciesUsage a 54 MbpsC-Band ISM (5.725 to GHz)Not widely used b 11 MbpsS-Band ISM (2.4 to 2.5 GHz)Widely used g 54 MbpsS-Band ISMGaining popularity n 600 MbpsC-Band and S-Band ISMGaining popularity, not yet finalized Windows 7 provides built-in support for all standards, but also depends on: The wireless network adapter The wireless network adapter driver

Security standard Authentication methods Encryption methods Remarks IEEE Open system and shared key WEP Weak authentication and encryption. Use is highly discouraged IEEE 802.1X EAP authentication methods WEPStrong EAP methods provide strong authentication WPA-Enterprise 802.1XTKIP / AES Strong authentication (with strong EAP method) and strong (TKIP) or very strong (AES) encryption Used for medium and large organizations WPA-Personal PSKTKIP / AES Strong authentication (with strong PSK) and strong (TKIP) or very strong (AES) encryption Used for home networks or small offices WPA2-Enterprise 802.1XTKIP / AES Strong authentication (with strong EAP method) and strong (TKIP) or very strong (AES) encryption Used for medium and large organizations WPA2-Personal PSKTKIP / AES Strong authentication (with strong PSK) and strong (TKIP) or very strong (AES) encryption. Used for home networks or small offices Security Protocols for a Wireless Network

Lesson 2: Configuring a Wireless Network Configuring Hardware for Connecting to a Wireless Network Wireless Network Settings Demonstration: Connecting to a Wireless Network Improving the Wireless Signal Strength Process for Troubleshooting a Wireless Network Connection

Configuring Hardware for Connecting to a Wireless Network Connect and configure a Wireless Access Point Configure a wireless network adapter in the client computer Configuring Client Computers Connect to a Network dialog box Command line: netsh wlan Group policy Connect to a Network dialog box Command line: netsh wlan Group policy

General Settings Connection Settings Security Type Encryption Type Security tab Right click any network profile  Properties Right click any network profile  Properties Security Types Wireless Network Settings Control Panel  Network and Internet  Network and Sharing Center  Manage Wireless Networks Control Panel  Network and Internet  Network and Sharing Center  Manage Wireless Networks

Your instructor will demonstrate how to: Connect to a public and open wireless network Configure an unlisted wireless network Connect to that network Configure an unlisted wireless network Connect to that network Connect to the administrative webpage of a wireless AP Configure the security settings of the wireless AP Connect to the administrative webpage of a wireless AP Configure the security settings of the wireless AP Demonstration: Connecting to a Wireless Network 10 min

Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.

Improving the Wireless Signal Strength To improve the signal strength: Ensure close proximity to the wireless AP Consider installing an external antenna Check for physical obstructions Add wireless APs Check for devices that may cause interference Consider changing the wireless channel

Review the diagnostic information 3 3 Identify the problem from the list of problems found 4 4 Resolve the problem that was identified 5 5 Diagnose the connection by using Windows Network Diagnostics tool 2 2 Accessed from:  Right click network icon on System Tray  Click Troubleshoot problems Accessed from:  Right click network icon on System Tray  Click Troubleshoot problems Attempt to connect to a wireless network 1 1 Accessed from:  Network and Sharing Center  System Tray Accessed from:  Network and Sharing Center  System Tray Attempt to connect to a wireless network 1 1 Diagnose the connection by using Windows Network Diagnostics tool 2 2 Review the diagnostic information 3 3 Identify the problem from the list of problems found 4 4 Resolve the problem that was identified 5 5 Process for Troubleshooting a Wireless Network Connection

Lab: Configuring Wireless Network Connections Exercise 1: Determine the appropriate configuration for a wireless network Exercise 2: Troubleshooting Wireless Connectivity Estimated time: 30 minutes

Lab Scenario The Contoso Corporation is implementing Windows 7 desktops throughout their organization. You are a help- desk technician in the Contoso Corporation. Amy Rusko is the Production manager for Contoso in the UK. She visits every manufacturing plant to ensure that the plant is functioning optimally. Amy has decided that providing wireless access for users in the plants would increase productivity. She has requested help to determine what she needs to buy for each plant and needs your input to be able to price the project. Each plant has a different office area with varying numbers of office workers. You have established that the largest plant area is 50 meters by 50 meters and has around 180 plant workers.

Lab Review 1. In the lab, you were tasked with making the wireless network as secure as possible. Is this appropriate in situations where you want to make the wireless network accessible to anyone – for example, in a coffee shop? How would you go about configuring the wireless infrastructure to support access in this way? 2. Would it be advisable to connect this less-restricted wireless network to your corporate network? 3. Can you think of a way in which legitimate users from your organization can connect wirelessly to your infrastructure from the same coffee shop area, while not providing the same access to anonymous users?

Module Review and Takeaways Common Issues and Troubleshooting Tips Real-world Issues and Scenarios Tools