Top Banner
© 2007 The McGraw-Hill Companies, Inc. All rights reserved Maintaining and Troubleshooting Networks Chapter 16
37
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Installing

© 2007 The McGraw-Hill Companies, Inc. All rights reserved

Maintaining and Troubleshooting Networks

Chapter 16

Page 2: Installing

© 2007 The McGraw-Hill Companies, Inc. All rights reserved

Overview

• In this chapter, you will learn to– Install and configure wireless networks

– Configure security

– Recognize and fix basic network problems

Page 3: Installing

© 2007 The McGraw-Hill Companies, Inc. All rights reserved

Getting the Right Sound CardInstalling and Configuring

a Wireless Network

Page 4: Installing

© 2007 The McGraw-Hill Companies, Inc. All rights reserved

Introduction

• Wireless networks are growing in popularity

• Wireless networks use radio waves or beams of infrared light to communicate with each other

• Two primary types of wireless networks– Based on IEEE 802.11 standard – Based on Bluetooth technology

Page 5: Installing

© 2007 The McGraw-Hill Companies, Inc. All rights reserved

Wireless Networking Components

• Many capabilities built-in today

– Infrared transceiver ports standard in laptops, PDAs, and high-end printers

– Infrared not usually included in desktop PCs

Page 6: Installing

© 2007 The McGraw-Hill Companies, Inc. All rights reserved

Wireless Networking Components

• Wireless Ethernet and Bluetooth often integrated or can easily be added– USB, PCI, PCI Express, or PC Card adapters

Page 7: Installing

© 2007 The McGraw-Hill Companies, Inc. All rights reserved

Wireless Networking Components

• Wireless access point (WAP)– Acts like a hub to the wireless hosts in the area

• Bluetooth– Built-in option on many newer PCs

Page 8: Installing

© 2007 The McGraw-Hill Companies, Inc. All rights reserved

Wireless Networking Software

• Wireless devices use same networking clients and protocol as wired networks

– Use CSMA/CA (CA stands for collision avoidance)

• Another option is using Request to Send/Clear to Send (RTS/CTS)

• Sending node issues an RTS to the receiving node as a request

• Receiving node replies with a CTS when it’s clear

• Once data is received, receiving node sends an ACK (acknowledge)

Page 9: Installing

© 2007 The McGraw-Hill Companies, Inc. All rights reserved

Wireless Configuration Utility

• Configure wireless networking software– Use a utility to configure parameters

• Windows built-in utility or vendor provided• Set parameters like network name

Page 10: Installing

© 2007 The McGraw-Hill Companies, Inc. All rights reserved

Wireless Networking Modes

• Ad-hoc mode

– Each wireless node is in direct contact with every other node in a decentralized free-for-all

– Form an Independent BasicService Set (IBSS)

– Called peer-to-peer mode

– Good for a few computers or temporary network such as study groups or business meetings

Page 11: Installing

© 2007 The McGraw-Hill Companies, Inc. All rights reserved

Wireless Networking Modes

• Infrastructure Mode

– Use one or more WAPs to connect wireless nodes to a wired network segment

– A single WAP servicing an area is called a Basic Service Set (BSS)

– Additional WAPs create an Extended Basic Service Set (EBSS)

Page 12: Installing

© 2007 The McGraw-Hill Companies, Inc. All rights reserved

Wireless Networking Security

• Three methods used to enhance security

1. Configure SSID

2. Filter by MAC address

3. Use encryption

Page 13: Installing

© 2007 The McGraw-Hill Companies, Inc. All rights reserved

Wireless Networking Security

• Service Set Identifier (SSID)– Configure a unique SSID or network name

• Default is often name of vendor such as “LinkSys”• Widely known so easy to guess

– Each node needs to have the same SSID– Turn off SSID broadcasting

● MAC filtering– Filtering based on each host’s MAC address– Creates a type of accepted user

Page 14: Installing

© 2007 The McGraw-Hill Companies, Inc. All rights reserved

Wireless Networking Security

• Wireless Equivalency Privacy (WEP)– Encrypts data using 40-bit or 104-bit encryption

– Provides authentication based on MAC addresses

– Significant flaws

• Wi-Fi Protected Access (WPA)– Interim upgrade to WEP– Uses encryption key integrity-checking through Extensible Authentication Protocol (EAP)

• WPA2 (IEEE 802.11i )– Full upgrade to WEP – Significant improvements– Current wireless security standard

Page 15: Installing

© 2007 The McGraw-Hill Companies, Inc. All rights reserved

Speed and Range Issues

• Wireless speeds range from 2 Mbps to54 Mbps

• Speed affected by range– Speed dynamically negotiated– Maximum throughput at approximately 25 feet or less

– At edge of range, throughput may decrease to 1 Mbps

– Range not exact• Often listed as around 150 feet or 300 feet

– Dead spots and interfering devices can affect signal

Page 16: Installing

© 2007 The McGraw-Hill Companies, Inc. All rights reserved

Wireless Networking Standards

• 802.11-based wireless networking– Three primary standards– All can work in ad-hoc or infrastructure modes

802.11a 802.11b 802.11gMaxthroughput

54 Mbps 11 Mbps 54 Mbps

Max range 150 feet 300 feet 300 feetFrequency 5 GHz 2.4 Ghz 2.4 GhzSecurity SSID, MAC,

WEP, WPASSID, MAC, WEP, WPA

SSID, MAC, WEP, WPA

Compatibility 802.11a 802.11b 802.11b, 802.11g

Page 17: Installing

© 2007 The McGraw-Hill Companies, Inc. All rights reserved

Wireless Networking Standards

• Infrared wireless networking– Simple way to share data without adding any additional hardware or software

– Uses the Infrared Data Association (IrDA) protocol

– Line-of-sight required– No authentication or encryption

• You can’t be more than 1 meter away

Infrared (IrDA)Max throughput Up to 4 MbpsMax range 1 meter (39 inches)Security NoneCompatibility IrDACommunication mode Point-to-point ad-hoc

Page 18: Installing

© 2007 The McGraw-Hill Companies, Inc. All rights reserved

Wireless Networking Standards

• Bluetooth

– Designed to create small wireless personal area networks (PANs)

– Typically used for peripherals• Mice, keyboards, PDAs, etc.

Bluetooth High-powered BluetoothMax throughput 1 Mbps 2 MbpsMax range 10 meters 300 feetCompatibility Bluetooth BluetoothCommunication mode

PAN PAN

Page 19: Installing

© 2007 The McGraw-Hill Companies, Inc. All rights reserved

Wireless Networking Standards

• Cellular

– Many PDAs and phones today allow connection to Internet

– Can add this to laptop withPC Card

– Downloads as quick as 400 to 700 Kbps

– Cellular networks have their own protocols

– Downside is the price

Page 20: Installing

© 2007 The McGraw-Hill Companies, Inc. All rights reserved

Configuring Wireless Networks

• Physically installing a wireless NIC is the same as installing a wired NIC

• Wireless network configuration utility– Used to configure additionalparameters

– Configure SSID and encryption

– Configure communication mode• Ad-hoc• Infrastructure

Page 21: Installing

© 2007 The McGraw-Hill Companies, Inc. All rights reserved

Configuring Wireless Networks

• Wi-Fi– Ad hoc

• Each wireless node needs to be configured with the same network name (SSID)

• May need to select a common channel• Configure unique host IP addresses• Configure File and Printer Sharing

Page 22: Installing

© 2007 The McGraw-Hill Companies, Inc. All rights reserved

Configuring Wireless Networks

NETGEAR wireless configuration utility

Page 23: Installing

© 2007 The McGraw-Hill Companies, Inc. All rights reserved

Configuring Wireless Networks

• Wi-Fi– Infrastructure mode

• Requires a wireless access point (WAP)• All nodes need to be configured with the same SSID• Configure the WAP with clients that match the chosen options

Page 24: Installing

© 2007 The McGraw-Hill Companies, Inc. All rights reserved

Configuring Wireless Networks

• Configuring a wireless access point is often done through a Web browser

– Enter the WAP’s default IP address (see your documentation or try 192.168.1.1) in your browser

– Enter the default administrative password (in your documentation) to log in

• The next few slides show some screenshots of the configuration pages

Page 25: Installing

© 2007 The McGraw-Hill Companies, Inc. All rights reserved

Configuring Wireless Networks

• Sample home page

Page 26: Installing

© 2007 The McGraw-Hill Companies, Inc. All rights reserved

Configuring Wireless Networks

Configuring MACaddress filtering

Page 27: Installing

© 2007 The McGraw-Hill Companies, Inc. All rights reserved

Configuring Wireless Networks

Configuring encryption

Page 28: Installing

© 2007 The McGraw-Hill Companies, Inc. All rights reserved

Configuring Wireless Networks

• Infrared– Not much to configure

– Confirm the IrDA protocol is installed

– To transfer files• Use Wireless Link applet• Use Windows Explorer

– To network two computers• Choose Connect Directly to Another Computer

Page 29: Installing

© 2007 The McGraw-Hill Companies, Inc. All rights reserved

Configuring Wireless Networks

• Bluetooth– Completely plug and play

• May need to use vendor-supplied drivers

– Bluetooth devices seek each other out• Establish a master/slave relationship

– PANs sometimes have specialized software utility

Page 30: Installing

© 2007 The McGraw-Hill Companies, Inc. All rights reserved

Troubleshooting Networks

Page 31: Installing

© 2007 The McGraw-Hill Companies, Inc. All rights reserved

Troubleshooting Networks

• Networked and non-networked situations differ drastically– Networked situations add complexity

Routeror switch

`

```

CPU1

Print server

If a user can’t print from CPU1, it could be due to many possible problems on the network.

Networked printer

Page 32: Installing

© 2007 The McGraw-Hill Companies, Inc. All rights reserved

Troubleshooting Networks

1. Verify the symptom– Talk with the user to try to get a precise

description of the symptoms

2. When did it happen?– Does it happen during boot, when the OS

loads, or after the system has been running for a while?

3. What has changed?– Try to find out if anything has changed– Even recent changes before the problem

began occurring

Page 33: Installing

© 2007 The McGraw-Hill Companies, Inc. All rights reserved

Troubleshooting Networks

4. Check the environment– Heat, humidity, dirt– What OS? What applications? Do others use

the computer?

5. Reproduce the problem– If a problem happens only once, it’s not a

problem– Otherwise, try to make the problem happen

again

6. Isolate the symptom– Hardware—remove suspect parts – Software—remove background programs or

boot into Safe Mode

Page 34: Installing

© 2007 The McGraw-Hill Companies, Inc. All rights reserved

Troubleshooting Networks

7. Separate hardware from software– Replace the suspect hardware with known

good hardware – Uninstall the suspect software and

reinstall it– Install the latest patch or upgrade– Check for viruses

8. Research– Use search engines on the Internet

9. Make the fix and test– Keep track of what you did so you may

return to the previous state if the fix does not work

Page 35: Installing

© 2007 The McGraw-Hill Companies, Inc. All rights reserved

OSI Seven-Layer Model

• Use as a guide in troubleshooting

Layer Number Name DescriptionLayer 1: Please Physical NICs (link light), cables,

switches, hubs, etc. 1s, 0sLayer 2: Do Data Link MAC addresses and CSMA/CD

Layer 3: Not Network IP operates hereLayer 4: Throw the

Transport TCP/UDP operate here

Layer 5: Sausage Session Manages connections

Layer 6: Pizza Presentation Describes how to present data

Layer 7: Away Application Interacts with user

Page 36: Installing

© 2007 The McGraw-Hill Companies, Inc. All rights reserved

Mike’s Four-Layer Model

• Hardware– Check the hardware starting with the physical layer

• Protocols– Is it installed and configured properly?

• Network– Servers and clients– Check users and groups and share names

• Shared resources– Make sure the resource has been properly shared

– Check the access allowed

Page 37: Installing

© 2007 The McGraw-Hill Companies, Inc. All rights reserved