Module 5
Configuring Wireless
Network Connection
Module Overview
• Overview of Wireless Networks
• Configuring a Wireless Network
Lesson 1: Overview of Wireless Networks
• What is a Wireless Network?
• Wireless Network Technologies
• Security Protocols for a Wireless Network
What is a Wireless Network?
A wireless network:
Interconnected devices, connected by
radio waves instead of wires or cables
Two modes:
Ad hoc Infrastructure
Advantages Disadvantages
•• Extends
Extends or
or replaces
replaces wired
wired •• Possible
Possible interference
interference
infrastructure
infrastructure (wire-free)
(wire-free)
•• Increases
Increases productivity
productivity for
for mobile
mobile •• Potential
Potential security
security risk
risk
employees
employees
•• Provides
Provides easy
easy access
access to
to internet
internet in
in •• Additional
Additional management
management
public
public places
places
Wireless Network Technologies
Wireless Broadband:
Maximum
Standard Range of frequencies Usage
bit rate
Provides high-speed wireless internet and data network
ü
access
802.11a 54 Mbps C-Band ISM (5.725 to 5.875 GHz) Not widely used
Comparable to wired broadband, such as ADSL or cable
ü Comparable
802.11b 11 Mbps to wired
S-Band broadband,
ISM (2.4 to 2.5 GHz)
Widely used
modem
802.11g
Used 54toMbps
have S-Band ISM
constant Gaining popularity
connectivity to internet and
ü
corporate network
802.11n 600 Mbps C-Band and S-Band ISM Gaining popularity, not yet finalized
Windows 7 supports for Wireless Broadband:
Windows 7 provides built-in support for all
standards, butmodel
ü Driver-based also for
depends on:
mobile broadband devices
ü The wireless network adapter
ü Used the same user interface regardless of the provider
ü The wireless network adapter driver
Security Protocols for a Wireless Network
Authentication Encryption
Security standard Remarks
methods methods
Open system and Weak authentication and encryption. Use is highly
IEEE 802.11 WEP
shared key discouraged
EAP authentication
IEEE 802.1X WEP Strong EAP methods provide strong authentication
methods
•Strong authentication (with strong EAP method)
WPA-Enterprise 802.1X TKIP / AES and strong (TKIP) or very strong (AES) encryption
•Used for medium and large organizations
•Strong authentication (with strong PSK) and strong
WPA-Personal PSK TKIP / AES (TKIP) or very strong (AES) encryption
•Used for home networks or small offices
•Strong authentication (with strong EAP method)
WPA2-Enterprise 802.1X TKIP / AES and strong (TKIP) or very strong (AES) encryption
•Used for medium and large organizations
•Strong authentication (with strong PSK) and strong
WPA2-Personal PSK TKIP / AES (TKIP) or very strong (AES) encryption.
•Used for home networks or small offices
Lesson 2: Configuring a Wireless Network
• Configuring Hardware for Connecting to a Wireless
Network
• Wireless Network Settings
• Demonstration: Connecting to a Wireless Network
• Improving the Wireless Signal Strength
• Process for Troubleshooting a Wireless Network
Connection
Configuring Hardware for Connecting to a
Wireless Network
ü Connect and configure a Wireless Access Point
Configure a wireless network adapter in the client
ü
computer
Configuring Client Computers
•• Connect to a Network dialog box
•• Command line: netsh wlan
•• Group policy
Wireless Network Settings
Right click
click any
RightPanel any network
network
Control
Control
profile
Security
Panel Type tab
Security Encryption Type
profile
Network
Network and
and
Properties
Properties
Internet
Internet
Network
NetworkGeneral Settings
and
and
Security Types
Sharing
Sharing
Center
Center
Connection Settings
Manage
Manage
Wireless
Wireless
Networks
Networks
Demonstration: Connecting to a Wireless
Network
Your instructor will demonstrate how to:
•• Connect to the administrative webpage of a
wireless AP
•• Configure the security settings of the wireless AP
•• Configure an unlisted wireless network
•• Connect to that network
•• Connect to a public and open wireless network
10
10 min
min
Improving the Wireless Signal Strength
To improve the signal strength:
Ensure close proximity to the
ü
wireless AP
Consider installing an external
ü
antenna
ü Check for physical obstructions
ü Add wireless APs
Check for devices that may cause
ü
interference
Consider changing the wireless
ü
channel
Process for Troubleshooting a Wireless Network
Connection
Review the
Diagnose the connection by using Windows
1
2 Attempt
Attempt
diagnostic
3 Network to
to connect
connectto to
a wireless
a wireless
network
network
Diagnostics tool
information
Diagnose the connection by using Windows
2 Accessed
Accessed
Network from:
from:
Diagnostics tool
Identify
Accessed
Accessed the
from:
from:
Right
Right click
click from
problem
Network
Network and
and on
network
network icon
icon on
4 the
Reviewlist
Sharing
3 System
Sharing ofthe
Center
Center
System Tray
Tray diagnostic information
problems
System
Click Tray
System Tray
Click
found
Troubleshoot
Identify
Troubleshootthe problem from the list of
4 problems
problems
problems found
Resolve the
5 Resolve
problem that the problem that was identified
5 was identified
Lab: Configuring Wireless Network Connections
• Exercise 1: Determine the appropriate configuration for a
wireless network
• Exercise 2: Troubleshooting Wireless Connectivity
Estimated time: 30 minutes
Lab Scenario
• The Contoso Corporation is implementing Windows 7
desktops throughout their organization. You are a help-
desk technician in the Contoso Corporation.
• Amy Rusko is the Production manager for Contoso in the
UK. She visits every manufacturing plant to ensure that
the plant is functioning optimally. Amy has decided that
providing wireless access for users in the plants would
increase productivity.
• She has requested help to determine what she needs to
buy for each plant and needs your input to be able to price
the project.
• Each plant has a different office area with varying
numbers of office workers. You have established that the
largest plant area is 50 meters by 50 meters and has
around 180 plant workers.
Lab Review
1. In the lab, you were tasked with making the wireless
network as secure as possible. Is this appropriate in
situations where you want to make the wireless network
accessible to anyone – for example, in a coffee shop?
How would you go about configuring the wireless
infrastructure to support access in this way?
2. Would it be advisable to connect this less-restricted
wireless network to your corporate network?
3. Can you think of a way in which legitimate users from
your organization can connect wirelessly to your
infrastructure from the same coffee shop area, while not
providing the same access to anonymous users?
Module Review and Takeaways
• Common Issues and Troubleshooting Tips
• Real-world Issues and Scenarios
• Tools