Module 5

17
Microsoft ® Official Course Module 5 Implementing Wireless Network Connections

description

Module 5. Implementing Wireless Network Connections. Module Overview. Overview of Wireless NetworksImplementing a Wireless Network. Lesson 1: Overview of Wireless Networks. - PowerPoint PPT Presentation

Transcript of Module 5

Page 1: Module 5

Microsoft® Official Course

Module 5

Implementing Wireless Network Connections

Page 2: Module 5

Module Overview

Overview of Wireless Networks• Implementing a Wireless Network

Page 3: Module 5

Lesson 1: Overview of Wireless Networks

What Is a Wireless Network?Wireless Network TechnologiesWhat Is Wireless Broadband?•Security Protocols for a Wireless Network

Page 4: Module 5

What Is a Wireless Network?

Advantages• Extends or replaces wired

infrastructure (wire-free)• Increases productivity for

mobile employees• Provides access to internet in

public places

Disadvantages• Possible interference• Potential security risk• Additional management

A wireless network consists of:

Can operate in two modes:

Interconnected devices connected by radio waves instead of wires

or cables

Ad hoc

Infrastructure

Page 5: Module 5

Wireless Network Technologies

Windows 8 provides built-in support for all standards, but it also depends on:

• The wireless network adapter• The wireless network adapter driver

Page 6: Module 5

What Is Wireless Broadband?Wireless broadband:

• Provides high-speed wireless Internet and data network access

• Is comparable to wired broadband, such as ADSL or cable modem

• Is used to provide constant connectivity to the Internet and corporate networks

Windows 8 support for Wireless broadband:

• Driver-based model for mobile broadband devices

• Uses the same user interface regardless of the provider

Page 7: Module 5

Security Protocols for a Wireless NetworkSecurity standard

Authentication methods

Encryption methods Remarks

IEEE 802.11 Open system and shared key WEP •Weak authentication and encryption

•Use is highly discouraged

IEEE 802.1X EAP authentication methods

WEP •Strong EAP methods provide strong authentication

WPA-Enterprise 802.1X TKIP/AES •Strong authentication (with strong EAP method) and strong (TKIP) or very strong (AES) encryption•Used for medium and large organizations

WPA-Personal PSK TKIP/AES •Strong authentication (with strong PSK) and strong (TKIP) or very strong (AES) encryption•Used for home networks or small offices

WPA2-Enterprise 802.1X TKIP/AES •Strong authentication (with strong EAP method) and strong (TKIP) or very strong (AES) encryption•Used for medium and large organizations

WPA2-Personal PSK TKIP/AES •Strong authentication (with strong PSK) and strong (TKIP) or very strong (AES) encryption.•Used for home networks or small offices

Page 8: Module 5

Lesson 2: Implementing a Wireless NetworkConfiguring Hardware for Connecting to a Wireless NetworkWireless Network SettingsConnecting to a Wireless NetworkImproving Wireless Signal Strength•Process for Troubleshooting Wireless Network Connection Issues

Page 9: Module 5

Configuring Hardware for Connecting to a Wireless Network

• Connect and configure a WAP

• Configure a wireless network adapter in the client computer

Configuring Client Computers• Connect to a Network dialog box• Command line: netsh wlan• Group Policy

Page 10: Module 5

Wireless Network Settings

Page 11: Module 5

Connecting to a Wireless Network

Page 12: Module 5

Improving Wireless Signal Strength

To improve the signal strength:

• Ensure close proximity to the WAP• Consider installing an external antenna• Check for physical obstructions• Add WAPs• Check for devices that may cause interference• Consider changing the wireless channel

Page 13: Module 5

Process for Troubleshooting Wireless Network Connection Issues

• Attempt to connect to a wireless network

• Diagnose the connection by using Windows Network Diagnostics tool

• Review the diagnostic information

• Identify the problem from the list of problems found

• Resolve the problem that you identified

Page 14: Module 5

Lab: Planning the Implementation of Wireless Network ConnectionsExercise 1: Planning a Wireless Network•Exercise 2: Determining the Cause of Wireless Network Problems

Logon InformationNo virtual machines are required for this exercise

Estimated Time: 30 minutes

Page 15: Module 5

Lab Scenario

A. Datum Corporation is planning to implement a wireless network to enable certain employees to connect their laptops to the corporate network. 

Page 16: Module 5

Lab ReviewIn the lab, you were tasked with making the wireless network as secure as possible. Is this appropriate in situations where you want to make the wireless network accessible to anyone, for example, in a coffee shop? How will you go about configuring the wireless infrastructure to support access in this way?Is it advisable to connect this less-restricted wireless network to your corporate network?• Can you think of a way in which legitimate users from your organization can connect wirelessly to your infrastructure from the same coffee shop area, while not providing the same access to anonymous users?

Page 17: Module 5

Module Review and Takeaways

Real-world Issues and ScenariosTools•Common Issues and Troubleshooting Tips