Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 94

Chapter 14: Wireless Networking

Copyright © 2016 30 Bird Media LLC


You will learn how to:
 About wireless networking standards
 About wireless security standards
Module A: Wireless technology

Copyright © 2016 30 Bird Media LLC


You will learn how to:
 About wireless networks
 About Wi-Fi standards
Copyright © 2016 30 Bird Media LLC
About radio broadcasts
Wireless Transceivers

Copyright © 2016 30 Bird Media LLC


Omindirectional
Unidirectional
Managing Bandwidth
The 2.4GHz Band

Copyright © 2016 30 Bird Media LLC


Spread Spectrum
Copyright © 2016 30 Bird Media LLC
MIMO Transmission
Copyright © 2016 30 Bird Media LLC
Expanding wireless networks
Local wireless technologies

Copyright © 2016 30 Bird Media LLC


 RF
 RFID
 Bluetooth
 NFC
 ANT+
 Z-Wave
 ZigBee
Copyright © 2016 30 Bird Media LLC
Discussion: Wireless signals
Assessment: Wireless technology

You want to create a point-to-point wireless link between two buildings which
are rather far apart. Your goals are to keep a strong signal between the two
transceivers without sending too much signal elsewhere. What antenna style
should you use for each? Choose the best response.
A. Dipole
B. MIMO
C. Monopole
D. Yagi
D
Assessment: Wireless technology

MIMO devices use multiple antennas transmitting on different channels to boost


bandwidth. True or false?
A. True
B. False
False
Assessment: Wireless technology

While you can make a radio conversation full-duplex, Wi-Fi is always half-
duplex. True or false?
A. True
B. False
True
Assessment: Wireless technology

How does the 5GHz band differ from the 2.4GHz band? Choose all that apply.
A. Fewer non-overlapping channels
B. Less interference from non-Wi-Fi sources
C. Longer range
D. More interference from non-Wi-Fi sources
E. More non-overlapping channels
F. Shorter range
B, E, F
Assessment: Wireless technology

You're placing multiple overlapping Wi-Fi hotspots in your US office. What


channels can you use to avoid overlap? Choose the best response.
A. 1, 4, 7, and 10
B. 1, 6, and 11
C. 1, 6, 11, and 14
D. 2, 7, and 12
E. 4, 9, and 14
B
Assessment: Wireless technology

You want to set up a wireless network to control your household lighting,


thermostat, and security system. What technology would you most likely use?
Choose the best response.
A. ANT+
B. Bluetooth
C. RFID
D. Z-Wave
D
Module B: Wi-Fi standards

Copyright © 2016 30 Bird Media LLC


You will learn:
 About Wi-Fi standards
 About wireless security risks
 How to choose Wi-Fi encryption standards
Wi-Fi networks

 Infrastructure networks are centrally managed from a central wireless access


point (WAP) that mediates all communications
 Usually the WAP also has a connection to a wired LAN or the Internet
 Ad hoc or peer-to-peer networks have no WAP: clients communicate directly
with each other
 Every Wi-Fi access point has a service set identifier (SSID), a string of up to
32 octets that can be used by clients to identify it
Wi-Fi Network frequencies
 2.4 GHz Industrial, scientific, and medical (ISM) band
 Good indoor penetration
 Up to 14 channels
 Channel overlap can cause interference
 5 GHz U-NII band
 More expensive
 Shorter range
 23 non-overlapping channels with less interference
 60 GHz millimeter wave band
 Support very high data rate
 Typically don't penetrate walls
 VHF and UHF frequencies
 Used by television stations, now targeted for Wi-Fi use
 Will use white space that won't interfere with TV
 Technology and legal regulations still being sorted out
Early Wi-Fi standards

 802.11a – supports speeds of up to 54Mbps on the 5 GHz band


 It was popular for high speed applications, but expensive equipment and early
hardware issues limited its adoption
 802.11.b – supports speeds of up to 11Mbps on the 2.4GHz band
 While it had lower speed than 802.11a, cheaper hardware and longer range made it the
most popular wireless standard of the early 2000s
Current Wi-Fi Standards

Copyright © 2016 30 Bird Media LLC


 802.11g
 Speeds up to 54MBps over the 2.4 GHz band
 802.11n
 Speeds up to 600 Mbps over either 2.4 GHz or 5 GHz band
 Introduced MIMO and wider 40MHz channels via channel bonding
 Can increase channel overlap
 802.11ac
 Speeds up to 6.93 Gbps in the 5GHz band
 Uses still-wider 80MHz channels (VHT), more MIMO antennas, and beamforming
technology
Wi-Fi interoperability
 Wi-Fi communication can only happen at speeds supported by both devices
 An older device on a newer network will still only use its original speed even
if other devices are faster
 Older devices might not support current encryption standards, so allowing
them might require using compatible (and thus weaker) security
 Newer standards require MIMO to reach their maximum theoretical rate
 Some devices don't operate by strict 802.11 standards
 These include early "draft version" devices, and others using proprietary or non-
standard enhancements
Wi-Fi Encryption Standards
 WEP (Wired Equivalent Privacy)
 Part of original Wi-Fi standard
 Uses the RC4 encryption cipher
 Has many flaws
 WPA (Wi-Fi Protected Access)
 Part of the draft 802.11i standard
 Has critical limitations
 WPA2
 WPA2
 Final version of WPA
 Mandatory support for 128-bit encryption using the strong and well-
regarded Advanced Encryption Standard(AES) cipher.
WPA options

 WPA-Personal (or pre-shared key (PSK))


 Uses passphrase between 8 and 63 ASCII characters
 Manually distributed to each authorized user
 Convenient for small networks with few users
 Drawback: all users use same key
 WPA-Enterprise (or 802.1x mode)
 Connecting clients communicate only with external authentication server, with a username and password
 More work to set up, but easier to maintain and keep secure
 WPS (Wi-Fi Protected Setup)
 Designed for home networks to easily control network access
 Allows key to be shared with new device
 Convenient, but is susceptible to brute force cracking
Assessment: Wi-Fi standards

What Wi-Fi standard can operate in either the 2.4GHz or 5GHz band? Choose the
best response.
A. 802.11a
B. 802.11b
C. 802.11g
D. 802.11n
E. 802.11ac
D
Assessment: Wi-Fi standards

Order the following wireless encryption standards from strongest to weakest.


A. WEP
B. WPA-AES
C. WPA-TKIP
D. WPA2-AES
E. WPA2-TKIP
WPA2-AES, WPA-AES, WPA2-TKIP, WPA-TKIP, then WEP
Assessment: Wi-Fi standards

Enabling WPS makes your wireless network ________. Choose the best answer.
A. Less convenient to connect to, but more secure
B. More convenient to connect to, but less secure
C. Less convenient and less secure
D. More convenient and more secure
B
Assessment: Wi-Fi standards

WPA-Enterprise uses stronger encryption algorithms than WPA-Personal. True or


false?
A. True
B. False
False
Summary: Wireless Networking

You should now know:


 About the common standards used by 802.11 Wi-Fi networks, including
connection speeds, common features, and the radio channels used.
 About the encryption standards used by Wi-Fi, as well as their known
vulnerabilities.
Chapter 15: Windows Networking

You will learn how to:

 Share and secure resources


 Establish network connections
 Troubleshoot network connection issues
Module A: Network shares

You will learn:

 About domains, workgroups, and homegroups


 About network locations
 How to share folders
 How to share printers
Resource sharing

 Windows includes tools for a wide range of network services: While some of
them are usable on the Internet, many others are intended for use within local
networks
 Some of them are widely used standards, and others use proprietary
Microsoft protocols intended for Windows networks specifically
 How they're used depends entirely on the size, security level, and
organizational structure of your LAN.
Windows Sharing Models
 Workgroup
 Must be a small, local network
 Peer-to-peer network with no central administration
 Each computer controls its accounts and resources
 Domain
 Only supported by business editions of Windows
 Supports large networks
 Centrally managed client/server networks
 Accounts and resources centrally controlled by administrators
 Homegroup
 Windows 7 and later systems can join
 Can be joined by anyone with shared password
 A computer can be in both a workgroup and a homegroup
 Intended for sharing printers and media files
 Don't have unique names
Joining workgroups or domains
NETDOM Commands
 Netdom add
 Adds workstation or server account to domain
 Netdom computername
 Manages both primary and alternate names for computer.
 Netdom renamecomputer
 Renames domain computer
 Netdom join
 Joins workstation or server to domain
 Netdom move
 Moves workstation or server from one domain to another
 Netdom remove
 Removes workstation or server from domain
 Netdom query
 Queries domain for membership and trust settings
 Netdom reset
 Resets secure relationship between workstation and controller
 Netdom help <command>
 Displays help information for given command
Setting Network Location
Create or Join Homegroup

1. Verify network location is set to Home or Private.


2. In Control panel, click Network and Internet > HomeGroup.
3. Create or join a homegroup.
 Create homegroup: Click Create a homegroup and follow instructions.
 Join detected homegroup: Click Join homegroup and follow instructions.
 If already joined to homegroup, may change sharing, view password, or leave group.
 If you created homegroup, may change password.
4. Click Save Changes.
Homegroup Settings
Folder Sharing
Shared Folders Mapped Network Drives

Public Folders
Homegrown
Folders

Administrative
Shares
Browsing Networks
 In Explorer, click Network to view computers and network
devices.
 Double-clicking computers will navigate to shared resources.
 Double-clicking other devices will depend on their nature.
 Type network location into Address bar
 Use same process anywhere else that uses Explorer browser,
such as Open or Save As windows.
 Some applications integrate access to Windows shares.
 Appearing devices are not necessarily accessible.
Mapping Network Drives

1. Right-click shared folder and


click Map network drive.
2. Set options:
 Drive letter to use
 Check Reconnect at login to
make share permanent
 Connect to share as different
user
3. Click Finish
Sharing Folders

1. Select file or folder to share.


2. Open File Sharing window:
 Windows 7: Share With > Specific People
 Windows 8/: Click Specific People on Share tab
 Any version of Windows: right-click and choose Share With > Specific People
 Homegroup: Choose Homegroup (Read) or Homegroup (Read/Write).
3. Choose whom to share with:
 Workgroup: Click arrow, select local user, click Add.
 Domain: Click arrow, select Find People.
 Type name in box and click Add.
4. Choose permissions for each user.
 Remove users by clicking permission level and choosing Remove.
5. Click Share.
Sharing Printers

1. Right-click printer to share and click Printer properties.


2. On Sharing tab, check Share this printer.
3. Specify share name.
4. Click Additional Drivers to install drivers for other clients.
5. Click OK.
Advanced sharing settings
Managing offline files
NET Commands
Net Share Lists, creates, and removes network shares on the local
computer.
Net Use Displays or connects to shares on remote computers.
Net View Lists computers and devices on the network.
Net File Shows or closes open files on a server.
Net Sessions Lists or ends communication sessions with network
computers.
Net Accounts Sets logon and password requirements for users
Net Computer Adds or removes a computer from a domain
Net Start Starts a Windows service.
Net Stop Stops a Windows service.
Net Pause Pauses a Windows service.
Net Continue Continues a Windows service.
Assessment: Network shares

You're setting up a small office LAN, and you want individual users to
independently share individual folders and printers. What kind of sharing model
should you use? Choose the best reply.
A. Domain
B. Homegroup
C. Private
D. Workgroup
D
Assessment: Network shares

What network locations have network discovery enabled by default? Choose all
that apply.
A. Domain
B. Home
C. Private
D. Public
E. Work
A, B, C, E
Assessment: Network shares

What can you manage with the net command? Choose all correct answers.
A. Network print jobs
B. Network security settings
C. Network shares
D. Windows services
E. Wireless network connections
A, C, D
Assessment: Network shares
Your office has enabled workgroup sharing of files and printers, and for
security reasons password-protected file sharing will remain on. What rules
will you need to keep in mind when supporting user problems? Choose all
that apply.
A. Once a folder is shared, it's uploaded to a central file servers.
B. To access network resources, you must know a user name and
password for the specific host computer.
C. To access network resources, you must know a shared password.
D. You can only access folders if the computer which originally shared
them is powered on and connected to the network.
E. Your user name and password are good across the entire workgroup.
B, D
Assessment: Network shares

Your enterprise LAN uses a VPN so that users working from home can access
shared Windows folders in the office, but it doesn't work as well for travelling
employees in locations with unreliable or no internet access. What steps could
remote users take to keep access to important folders on the road? Choose the
best response.
A. Change the network location to Work
B. Configure a homegroup
C. Designate those folders as offline files
D. Map the shared folders as a network drive
C
Module B: Network Connections

You will learn:

 About the Network and Sharing Center


 How to create network connections
 How to manage network connections
 About Remote Desktop and Remote Assistance
Network and Sharing Center
Connecting to networks
Connecting to a Network
 Ethernet: Simply plug into it. Windows will
detect and connect automatically.
 Wi-Fi or WWAN network: Click Connect to a
network or click wireless network icon in
system tray. Select the network and click
Connect. Enter security credentials.
 To join other saved networks, click Connect to a
network.
 Click Set up a new connection or network to
view list of available connection types.
Manually Connect to Wireless Network
Copyright © 2016 30 Bird Media LLC
Setting up mobile hotspots
Managing Network Connections

 Double-click connection to open Status window.


 Click Enable or Disable to toggle active connections.
 Click Rename this connection to change connection's
displayed name.
 Click Change settings of this connection to open
Properties window.
 Click Diagnose this connection to run
automated troubleshooting tool.
Changing Connection Priority

1. In Network Connections window, press Alt to activate hidden


menus.
2. Click Advanced > Advanced Settings.
3. Set priorities:
4. To change adapter priority, select it and click promote or demote
button.
5. To change binding priority, select it and click promote or demote
button.
6. Click OK.
Viewing connection status

Status Details
Configuring NIC options
Configuring IP addresses
Exercise: Configuring a static IP address
Remote Desktop Services

 Remote Desktop Connection is designed to log into unattended remote systems,


for example to access your work computer from home
 Remote Assistance is used for remote technical assistance connections, for
example to let you access a friend or coworker's system and help directly
Configuring Remote Settings
Requesting Remote Assistance

1. Open Remote Assistance.


2. Click Invite someone you trust to help you.
3. Choose how to send request.
• Easy Connect
• E-mail
• As a file
4. Send invitation.
5. Separately communicate password to person helping you.
6. Leave window open until connection.
7. Confirm giving access.
Giving Remote Assistance

1. Double-click invitation file.


2. Enter password and click OK.
3. Assist recipient with problems.
• Use chat window
• Request control
• Configure connection settings
4. Close window.
Creating Remote Desktop Connections

1. Type “remote desktop” in search box, then click Remote Desktop Connection.
2. Choose type of connection to make.
• For quick connection, enter remote computer address.
• To use custom settings or save a shortcut for later use, click Options.
3. Configure options if necessary.
• Resolution and color
• Use of computer resources over connection
• Applications to automatically run on remote system
• Windows visual effects
• Security and network settings
• Address and user to connect as.
• Save connection
4. Click Connect.
Other remote access programs

 Telnet
 SSH
SSH
Exercise: Using Remote Assistance
Assessment: Network Connections

What kind of network connection could you use to connect to your workplace LAN
through your existing home Internet connection?
A. Dial-up
B. PPPoE
C. VLAN
D. VPN
D
Assessment: Network Connections

Your company doesn't use Internet Explorer any more. Why should you still know
how to configure its browser options? Choose the best response.
A. To configure dialup connections
B. To configure proxy settings
C. To manually connect to wireless networks
D. To use Remote Assistance
B
Assessment: Network Connections

Which window would show you bindings for "Local Area Connection 2"?
A. Ethernet Properties
B. Local Area Connection 2 Properties
C. Local Area Connection 2 Status
D. Network Connections
B
Assessment: Network Connections

You need to make sure an adapter is configured to use the network's QoS settings.
Which advanced Ethernet property should you check?
A. Duplexing
B. MTU
C. Priority
D. WoL
C
Assessment: Network Connections

hich is true when configuring a static IPv4 address for a Windows workstation?
Choose all that apply.
A. You can still use DHCP configuration for IPv6.
B. You can use DHCP to configure a DNS server automatically.
C. You must also configure a valid default gateway.
D. You must manually configure a DNS server.
E. Your IPv6 address must also be manually configured.
A, C, D
Assessment: Network Connections

Which of the following Windows editions can receive incoming Remote Desktop
connections? Select all answers that apply.
A. Windows 7 Home Basic
B. Windows 7 Home Premium
C. Windows 7 Professional
D. Windows 8.1
E. Windows 10 Pro
C, E
Module C: Connection Troubleshooting

You will learn how to:

 Use command line network tools


 Troubleshoot network connections
TCP/IP tools
ipconfig Windows: displays or refreshes IP settings.
ifconfig Unix-like systems: displays or configures IP settings.
nbtstat Windows: displays diagnostic information for NetBIOS
over TCP/IP.
Netstat Displays variety of network information: active
connections, routing tables, and traffic statistics.
Nslookup Performs DNS lookups and displays IP address of host.
Ping Tests reachability and latency of host.
traceroute/tracert Displays hop-by-hop path to host.
pathping Windows: Behaves similarly to tracert by pinging every
hop along route to determine relative latency.
ipconfig parameters
Parameter Description
/all Displays name, physical address, DNS, and DHCP
settings.

/release [interface] Releases current IPv4 address for all interfaces or for a
single specified interface.
/renew [interface] Renews current IPv4 or IPv6 address for all interfaces,
or for a single specified interface.
/release6 [interface] Like /release , but for IPv6 address.
/renew6 [interface] Like /renew , but for IPv6 address
/displaydns Displays current contents of DNS cache.
/flushdns Deletes DNS cache.
/registerdns Renews all DHCP leases and re-registers with DNS
servers.
ifconfig parameters
Parameter Description
-a Shows information for active and inactive interfaces.

interfaceup Enables specified interface.


interfacedown Disables specified interface.
interfacedhcp release Releases DHCP lease.
interfacedhcp start Leases new DHCP address.
interfaceip_address Assigns static IP address.
interfacenetmaskip_address Assigns netmask for static IP address.
interfacemtuvalue Sets Ethernet MTU.
interfacepromisc Enables promiscuous mode, allowing interface to read all
packets passing through network segment.

Interface -promisc Disables promiscuous mode.


inet6 Inserted immediately after interface with any IPv4 related
parameter, specifies IPv6 equivalent.
nslookup commands
Command Description
nslookup Enters interactive mode using default DNS server.
nslookup server Enters interactive mode using specified server.
nslookup host Performs a single lookup using default DNS server.
nslookup hostserver Performs a single lookup using specified server.
ping parameters
Parameter Description
-ncount Sends specified number of pings.
-t Continues to ping until stopped
-a Attempts to do reverse DNS lookup of IP address pinged.
-lsize Sets size of packet.
-f Prevents packet fragmentation.
-iTTL Sets TTL value of packet.
-wtime Sets timeout value for each packet in milliseconds (default 4000.)
-4 or -6 Forces use of IPv4 or IPv6.
traceroute
Windows parameter Linux parameter Description
-d -n Doesn't perform reverse DNS lookups.
-h maximum_hops -m maximum_hops Specifies maximum TTL (default 30)
-w milliseconds -w seconds Specifies timeout (Windows default
4000ms, Linux default 5.0s)
Choosing Command Line Tools

 To check end-to-end connectivity, start with ping.


 Use ipconfig or ifconfig to check adapter settings.
 Use nslookup to test DNS server functions.
 If you suspect problems with address resolution, clear DNS cache using
ipconfig or ifconfig.
 Use netstat or GUI monitoring tools to examine existing network traffic.
 To investigate route issues, use traceroute.
Network troubleshooting
Troubleshooting Connection Status

 Make sure physical connection is secure.


 Verify that adapter is enabled.
 If adapter is enabled, try disabling and re-enabling.
 Make sure all correct drivers and device bindings are installed.
 Verify local network requirements.
 Verify correct credentials and security settings.
 Verify correct interface is being used.
 Check for substandard wiring, improper duplexing settings, LAN congestion or
misconfiguration, or applications consuming bandwidth.
Troubleshooting Network
Settings
 Improper IP address settings are the easiest way to foul up a physically functional
connection.
 Ability to connect by IP address but not domain name suggests DNS problems.
 Remember that IPv4 and IPv6 must be configured separately, so know which one (or
both) your network uses.
 A limited connection to local resources but not internet resources can have a variety
of causes.
 If some applications connect to the network but others don't, verify your firewall and
proxy settings.
 Inability to send or receive email may be due to firewall or spam filter settings, but
the first place to check is in the email client itself.
 If nothing obviously seems wrong, try running the network troubleshooter in Settings
or Control Panel.
 If you can't find anything wrong on the local system, escalate further into the
network.
Troubleshooting Wireless Connections

 Weak signals might mean attenuation or interference. Try moving client or WAP.
 Low performance can also be caused by network congestion or conflicting
standards.
 Network security settings can interfere with connection.
 Connected to correct WAP?
 Ensure wireless connection itself is turned on.
Assessment: Connection Troubleshooting

Which network tools are found in Windows but not typically in Unix-like operating
systems? Select all answers that apply.
A. ifconfig
B. ipconfig
C. nbtstat
D. ping
E. traceroute
B, C
Assessment: Connection Troubleshooting

You can't ping any other hosts, even on the local subnet. What should you check
next?
A. Application settings
B. DNS server
C. IP address settings
D. MTU settings
C
Assessment: Connection Troubleshooting

You can connect to the Internet, but not to local network shares. What should you
check first?
A. DNS settings
B. IP address settings
C. Network location
D. Windows Firewall
C
Assessment: Connection Troubleshooting

On your laptop, you can see a couple of hotspots, but not the one you want to connect
to. What can you try to fix it? Select all answers that apply.
A. Double-check the encryption standard being used.
B. Make sure the adapter is turned on.
C. Move the laptop closer to the WAP.
D. Set the network to connect without SSID broadcast.
C, D
Summary: Windows Networking

You should now know:


 About sharing and security on the network, including the different resource
sharing models used by Windows, how to share folders and printers, and how to
configure Windows Firewall
 How to establish and maintain network connections in Windows, including LAN,
Internet, dialup, wireless, and Remote Desktop Services
 How to troubleshoot wired and wireless connections in Windows, using GUI and
command-line tool

You might also like