Download presentation
Presentation is loading. Please wait.
Published byLaura Banks Modified over 9 years ago
1
Overview of Client Configuration By Nanda Ganesan, Ph.D. © Nanda Ganesan
2
Chapter Objectives Describe the basics of client configuration Present examples of advanced features for NICs such as installing additional cards Explain the addition of other protocols such as IPX/SPX etc. Outline a few network services that could be configured Discuss the logon and security options when configuring a client
3
Chapter Modules Client configuration Basics Some LAN Protocols TCP/IP Installation and Configuration Other Network Services Logon and Security Options and Summary
4
MODULE 1 Client Configuration Basics
5
Client Configuration Overview Client configuration is a two step process Step 1: Facilitate general network address –Internet access Step 2: Facilitate specific network address –Microsoft or other network address
6
General Network Access Install NIC, drivers, TCP/IP etc. Test for access Access the Internet
7
Specific Network Address Give the computer a name Enter the computer in a domain or a workgroup –Domain name applies to client server networks –Workgroup name applies to peer-to-peer networks Access one or more specific networks
8
Components to be Configured Step 1: General network access –NIC –Client for a particular network –Protocol –Services Step 2: Specific network access –Computer ID –Define Workgroup or Domain
9
Components to be Configure for General Access NIC Protocol and properties Client for a Network –Microsoft or Novell for example Network services –File and print sharing, if desired
10
End of Module 1
11
Module 2 NIC Configuration
12
Install the adapter When an OS such as Windows XP is installed the NIC will automatically be installed Install the latest driver for the adapter –The latest driver for a particular operating system is usually obtained from the NIC manufacturers website
13
NIC Functioning Check for proper functioning of the NIC by going through the device manager –There should not be a yellow exclamation mark next to the NIC Most problems can be solved by installing the correct driver Driver installation could be done by invoking an installation wizard
14
Checking for Functioning of NIC Go through the device manager to check for proper functioning of the NIC
19
Correcting Problems In the previous slide there was no yellow exclamation mark against the NIC –Therefore, the NIC is properly functioning If there was a yellow exclamation mark, then, in most instances, then the NIC is not functioning properly –Most problems could be solved by installing the correct driver or updating the driver for NIC
20
Installing or Updating the Driver There are different ways of accessing the properties of the NIC to update the driver –One is to access the properties from the device manger listed in the Computer Management Console that was shown before –The other is to access the properties from either the control panel or from the network neighborhood icon Updating will be discussed under a different module
21
Multiple Adapter In general, there would be only one NIC in the computer It is also possible to have multiple adapters in a computer –A protocol can be bound to each adapter –The protocol could be different in each case
22
Reasons for Multiple Adapters Use the computer as a router Host multiple virtual websites on a single server with each IP address assigned to each NIC being referenced by a particular domain name
23
A Multiple Adapter Application Scenario Microsoft/ Ethernet/ TCP/IP NIC 1 NIC 2 Microsoft/ Token Ring/ TCP/IP Multi-homed Computer
24
End of Module 2
25
Module 3 NIC Properties
26
Accessing NIC Properties From CMC (Computer Management Console) From Network Neighborhood From Control Panel
27
Accessing NIC Properties from CMC Accessing the CMC was shown in a previous module The following slides outline the rest of the procedure
30
Accessing the NIC Properties from Network Neighborhood The steps are shown in the following slides
36
NIC Properties General Advanced Driver –Accessed and used for updating the driver Resources Power Management
37
Updating the Driver Access the driver tab Start the update wizard and follow the steps In the following example, a driver that has already been downloaded and stored in a local folder named H:\Internet Download\NIC Driver is used for updating
47
Updating Complete There was no yellow exclamation mark against the NIC in the CMC The installation is assumed to be correct
48
Other NIC Features General Advanced Resources Power Management
53
End of Module 3
54
Module 4 A Preview of Major LAN Protocols
55
Major Protocols TCP/IP –De facto protocols of the Internet IPX/SPX –Used in Novell networks NetBEUI –A non routable local protocol
56
NetBEUI Supported by –Windows 9X, Windows NT, Windows 2000 and Windows XP Non-routable protocol used for setting a local LAN that does not require Internet access Can be used for an internal peer-to-peer or client-server network
57
IPX/SPX Compatible Protocol Used in Novell networks Required for interoperability of Windows network with Novell networks Routable protocol IPX/SPX can be used for peer-to-peer or client-server networking
58
TCP/IP An important protocol used widely on the Internet A routable protocol Supports communication with UNIX networks or any other network that work under the TCP/IP protocol –The base protocol in UNIX networks is TCP/IP Can be used for configuring peer-to-peer as well as client-server networks of very large scale
59
A TCP/IP Application Scenario Workstation The Internet Router Local Router Workstation Lab Configure the workstation for Internet access by Installing TCP/IP.
60
End of Module 4
61
Module 5 Basic TCP/IP Installation and Configuration
62
TCP/IP Installation and Configuration A two-step process First, install the protocol –With many modern OSs such as Windows XP, it is automatically installed Second, configure its properties –When TCP/IP is automatically installed, the properties are set to be obtained from a DHCP server –However, it is also possible to manually set the properties
63
TCP/IP Installation Steps Choose Network/ Properties Install Protocol Choose TCP/IP Start End From Network Neighborhood/ Properties. Add OK TCP/IP protocol installed.
64
Accessing the Window for TCP/IP Properties Under different Windows operating systems the TCP/IP properties are accessed in different ways –The best and the most consistent way to access TCP/IP properties Windows is to go through the Control Panel and then select the Network Icon –Another way to access the properties is to go through Network Neighborhood –Thereafter, select the network properties (Based on the NIC) and then then continue to select the TCP/IP properties
65
Accessing TCP/IP Properties Tab Choose Network TCP/IP/ Properties Start From Network Neighborhood/ Properties. Define TCP/IP properties Proceed
70
TCP/IP Configuration Options Dynamic IP –A DHCP server must be present in the network to issue dynamic IP –In a number of cases, the MAC address of the client is registered to prevent unauthorized leasing of IP addresses to clients Static IP –Obtain the IP address specifications from the network administrator
71
DHCP and TCP/IP Configuration Without a DHCP server –Requires the static assignment of IP addresses and properties –The DHCP server need not reside on the same subnet With a DHCP server –IP addresses etc. are automatically assigned by the DHCP server –Select the appropriate option for the TCP/IP address to be dynamically assigned by the DHCP server
73
TCP/IP Properties Subnet Mask Gateway DNS Advanced TCP/IP Properties IP Address
74
Assignment of Properties for TCP/IP IP address Subnet mask Gateway address DNS address –Preferred –Alternate, if available
76
Alternate IP If the computer is used on another network as well, an alternate IP address may also be set –It can be a private IP address –Or, it could well be a static IP address that is manually set
80
IP Addresses for Restricted Internal LANs For an internal network, only the IP addresses and the subnet masks need to be assigned –Note that subnet mask is not an IP address Such networks will not have access to the outside world meaning that it would not have a connection to the Internet There are also some IP addresses reserved for internal use that are known as private addresses –An example is 192.168.0.1
81
Facilitating External Access A gateway address is required to facilitate external address A gateway is generally a router that directs the traffic to the next segment of the network that would eventually be linked through a series of hops over network segment to its destination There can be more than one gateway present in a network meaning that multiple gateway addresses can be entered in the TCP/IP properties window
82
IP Address Assignment Summarized IP Address Obtain IP Address automatically Specify IP Address IP Address 123.345.678.90 Subnet Mask 255.255.255.0 DHCP Non-DHCP Gateway, DNS and WINS addresses
83
End of Module 5
84
Module 6 Advanced TCP/IP Settings
85
Accessing Advanced Properties Advanced properties can be accessed from the tab marked advanced
87
Advanced Properties of TCP/IP IP settings DNS WINS Options –Security related
88
IP and Gateway Settings Multiple IP addresses for the same NIC Multiple gateways
90
DNS Multiple DNSs Search suffix order Registering current computer with the DNS server
92
Adding Search Suffixes The added search suffixes will be added to resolve http address entries to IP addresses Example: tamilcanadian.com If we enter http://news, then it would be interpreted as http://news.tamilcanadian.comhttp://news http://news.tamilcanadian.com
98
WINS Setting multiple WINSs Add LMHOST lookup –A local table used for resolving windows names to IP addresses Set NetBIOS over TCP/IP to cater for older applications that rely on NetBIOS
100
More on WINS WINS Configuration –This can be configured if there is a WINS server on the network –The purpose of the WINS server is to resolve Windows client names into IP addresses –Windows names are not common in today’s environment as all computer names are based on TCP/IP
101
Options Set TCP/IP filtering by limiting access to certain ports for certain protocols In the following example, TCP/IP filtering is used for limiting access to port 80 only
113
TCP/IP Implementation and Configuration End Result The workstation is ready for Internet access Tasks possible –Access Internet Note: The computer may have a name generated by the OS such as Windows XP
114
End of Module 6
115
Module 7 Network Client and Services
116
Module Objectives Sample services Backup data Remote printer administration Summary of major networking components
117
Sample Services Backup of data HP Laser Jet administration File and printer sharing –Microsoft networks
118
Backup Data Arcada Backup Agent WorkstationBackup Tape
119
Remote HP LaserJet Administration HP JetAdmin service installed. LaserJet connected directly to the network. WorkstationHP LaserJet
120
End of Module
121
MODULE Logon and Security Options and Summary
122
Module Objectives Primary logon options Network logon options Workstation logon in peer-to-peer networks An option in workstation security implementation
123
Logon Local Workgroup Domain –Active Directory –Non-Active Directory
124
Primary Logon Options (Windows 9x) Windows Log On User enters local Windows mode –Password is supported –But, password does not control access to local resources Network Log On –User enters network through local workstation –Password is supported –Password controls access to network resources
125
Primary Logon Options Windows Network
126
Network Logon Options Connecting to a peer-to-peer LAN –The client becomes part of a workgroup Connecting to a Client-Server LAN –The client becomes part of a domain Quick Log-on –Network drives are not connected Log-on –Networks drives are connected –Chosen in most cases of peer-to-peer networking
127
Workstation Logon in Peer-to- Peer Configuration Password does not protect access to the local workstation in the case of a client that operates under Windows 9x –Windows NT 4.0 Work Station, Windows 2000 Professional and provides protection at this level Only network resources are protected by passwords
128
An Option in Workstation Security Implementation BIOS level Implementation –A password can be implemented Forgotten passwords –Change the password jumper setting –Restart the system BIOSPassword Jumper Motherboard
129
Summary of Major Networking Components Client Adapter Protocol Services Identification (Network Station) Logon security –Logon locally or into a Domain
130
END OF MODULE END OF CHAPTER
131
Installation of Other Components When a protocol is installed other components such as the Client option may be installed In certain case, the File and Print sharing service may also be installed –This service must be activated to allow files and printers to be shared by others in the network
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.