1. On the Test Chapter 16: Client Workstation Basics

advertisement
Chapter 16: Client Workstation Basics
Chapter Outline
1. On the Test
a. 3.2: Identify the basic capabilities of client workstations (i.e., client connectivity, local security
mechanisms, and authentication).
b. 3.11: Given a network configuration, select the appropriate NIC and network configuration settings
(DHCP, DNS, WINS, protocols, NetBIOS/host name, etc.).
c. 4.4: Given specific parameters, configure a client to connect to the following servers: UNIX/Linux;
NetWare; Windows; Macintosh.
d. 4.8: Given a scenario, predict the impact of modifying, adding, or removing network services (e.g.,
DHCP, DNS, WINS, etc.) on network resources and users.
e. 4.11: Given a network troubleshooting scenario involving a client connectivity problem (e.g.,
incorrect protocol/client software/authentication configuration, or insufficient rights/permissions),
identify the cause of the problem.
2. Understanding Network Clients
a. A network client can be defined simply as a computer that has the necessary hardware and software
installed to allow it to connect to a network.
b. Moreover, most network clients can also function as a server. A server serves, or provides a service
to, the other clients on the network.
3. Adapters
a. Adapters are the pieces of hardware that allow the cable to connect to the computer.
b. Once the hardware is installed, a piece of software known as a device driver is installed to allow the
operating system to communicate with the hardware.
c. Some of the more common adapters are:
i. Integrated Services Digital Network (ISDN) Cards
ii. Modems
iii.Network interface cards (NICs)
4. Selecting and Installing Network Interface Cards (NICs)
a. The most common type of adapter used in a networked computer is a network interface card (NIC).
b. The NIC is a piece of hardware in the form of an expansion card that is installed inside the computer.
c. When selecting a NIC for your network installation, your choice will be governed by the type of
expansion slots that are available on the computer’s motherboard.
5. Network Software and Properties
a. Network software generally falls into three broad categories: Clients, protocols, and services.
b. This software is installed on the client computer through the Network Properties dialog box.
6. Client Software
1
a. Client software is installed on a computer to allow the computer to send requests to a server or
another computer on the network.
b. Client software, or just clients, is often referred to as a “redirector” because it has the ability to
redirect requests for resources that are not located on the local machine.
c. The most common network clients in use today are the clients for Microsoft and Novell networks.
7. Microsoft Client for Microsoft Networks
a. The Microsoft Client for Microsoft Networks is installed automatically in Microsoft Windows
operating systems whenever a network adapter installation is detected.
b. The Microsoft client allows networked computers to communicate with other computers and servers
in a Microsoft-based network.
8. Domain Configuration
a. A Windows domain is a client/server network that uses Windows servers as domain controllers.
b. The purpose of a domain controller is to handle network security, including users, groups, and
resources.
9. Peer-to-Peer Configuration
The procedures to join a workgroup are very similar to those for joining a domain.
10. Client for Novell Networks
a. Most Microsoft operating systems include a client for Novell NetWare networks; however, it is
generally preferable to use Novell’s client software.
b. The Novell client software allows Windows workstations to access and use all of the services
available on Novell NetWare servers running Novell Directory Services and ZenWorks.
11. Protocols
a. Protocols can be defined as the rules or procedures computers use to communicate with each other.
b. Each protocol must be installed on the computer and, depending on the protocol, some configuration
may be required.
c. Although a computer may have several protocols installed, each computer on the network must have
at least one protocol in common.
d. The most common protocols are NetBEUI, IPX/SPX, and TCP/IP.
12. NetBEUI
The NetBEUI protocol has no configurable parameters. Once it is installed, it is ready for use.
13. Internet Packet Exchange/Sequence Packet Exchange (IPX/SPX)
a. Internet Packet Exchange/Sequence Packet Exchange (IPX/SPX) is the protocol used in Novell
networks.
b. IPX/SPX is a fully routable protocol that requires minimal configuration.
14. Internal Network Number
2
a. The IPX internal network number uses a logical addressing format that is based on the machine’s
MAC address.
b. An IPX address contains two parts: the network address and the node address.
c. The network address is determined by the network administrator and set on the server. The node
portion of the address is the MAC address for the machine.
15. Frame Type
a. The version of NetWare you are running and the additional protocols implemented on the network
will determine which frame types must be enabled. All frame types are IEEE defined.
i. 802.3: This frame type is often referred to as 802.3 RAW. It is the default frame type setting for
NetWare 3.12 and earlier versions.
ii. 802.2: Later versions of NetWare (4.x and later) use this frame type. It is a fully IEEE-compliant
encapsulation method.
iii. ETHERNET_II: When providing interoperability with NetWare networks and TCP/IP, it is
necessary to encapsulate the packets in an IPX-compatible format. This frame type was also
used by DEC networks and AppleTalk Phase I (the original AppleTalk protocol) networks.
iv.
ETHERNET_SNAP: AppleTalk Phase II requires this frame type. It is a standard IEEE802.2
frame with SNAP extensions.
b. IPX/SPX is implemented in the Windows family of products as the NWLink Protocol.
16. TCP/IP
a. TCP/IP is not just one or two protocols, but a whole suite of protocols that can provide services and
functions on the network.
b. While a MAC address represents the physical network interface, an IP address represents a logical
location on the network or internetwork.
c. All nodes participating in a TCP/IP network must acquire a unique IP address to access services and
communicate with other nodes.
d. The information required to configure a computer to run the TCP/IP protocol depends upon the
situation. If the computer will only communicate with computers on its own subnet, the following
data is required:
i. IP address
ii. Subnet mask
e. If the computer will need to communicate outside of its own subnet, the following information is
required:
i. IP address
ii. Subnet mask
iii. Default gateway
f. If you wish to use friendly names instead of IP addresses when communicating, you will need to add
IP addresses for Windows Internet Name Servers or Domain Name Servers.
g. The IP addressing parameters can be added to the client manually or automatically.
17. Dynamic Host Configuration Protocol (DHCP)
a. Dynamic Host Configuration Protocol (DHCP) is used to dynamically, or automatically, assign
Internet Protocol (IP) addresses whenever the Transmission Control Protocol/Internet Protocol
(TCP/IP) protocol is being used on a network.
3
b. DHCP consists of both a server and a client component. In order to assign TCP/IP addresses
automatically, the DHCP Server Service must be installed on a server.
c. Once the server component is installed, a scope, or range of addresses that may be assigned, and
related parameters are developed.
d. In order to configure a client to automatically accept addresses, the client must have the built-in
ability to be a DHCP client.
e. Once the computer has restarted, it will attempt to obtain an IP address using the following steps.
i. When a DHCP client powers up, it sends DHCPDISCOVER packets across the network
ii. All DHCP servers that receive this broadcast will respond with a DHCPOFFER. DHCPOFFER
packets typically contain information such as:
a.
b.
c.
d.
e.
f.
g.
IP address that is being offered
IP address lease time
Subnet mask
Broadcast address
Routers on subnet
Domain name
Domain Name System address
iii. The client selects the offer it wants. Normally it selects the first DHCPOFFER received.
iv. When the selected DHCP server receives the DHCPREQUEST, it replies to the client with an
acknowledgement, or DHCPACK packet which completes the DHCP transaction.
18. Domain Name System (DNS)
a. The Domain Name System (DNS) is used to resolve host or fully qualified domain names
(FQDNs) to IP addresses
b. To configure a client to use DNS, the IP address of one or more DNS servers must be added to
the computer’s TCP/IP Property sheet.
19. Understanding NetBIOS Names
a. NetBIOS is an acronym that stands for Network Basic Input/Output System.
b. NetBIOS is an application programming interface (API) that adds functions designed specifically
for local area networks.
c. In order to communicate on a NetBIOS network, each node needs to be identified by a unique
name. In NetBIOS networks, names are used by each host.
d. Every client computer in a Microsoft network is assigned a name, commonly referred to as a host
name. That host name is considered a NetBIOS name.
e. That name must contain 16 or fewer characters, and it may be letters or numbers.
f. NetBIOS names may be resolved through broadcasts or through some other method, such as
WINS or LMHost files.
20. Windows Internet Name Service (WINS)
a. There are three very important things to know about the Windows Internet Name Service (WINS).
i. First, WINS has absolutely nothing to do with the Internet.
ii. Second, WINS only applies to Microsoft networks.
4
iii. Finally, WINS is used to resolve NetBIOS names to IP addresses.
b. WINS, like DNS, consists of a server and a client component. In order to use WINS, the WINS server
service must be installed on a Windows server.
21. Services
a. Network services provide functionality to the client computer.
b. Some typical examples of network services are:
i. File and Print Sharing for Microsoft Networks
ii. File and Print Sharing for Novell Networks
iii. Remote Registry Service
iv. QOS Packet Scheduler
v. Service Advertising Protocol (SAP)
22. Understanding Security
In a network environment, some type of security or control is built in to almost every function.
23. Local Security
a. In computer networks, when you hear the word local think of the computer that you are sitting in
front of.
b. Therefore, when you hear the term local security, think of security that affects only the computer
you are working at.
c. Local security starts with the login process, typically a user name and password.
d. It includes groups or roles, and file system security.
24. Logon and Role/Group Security
a. Each operating system has different logon security requirements.
b. The user account that you use to log on to the computer exists only on that computer because the
account was created at that computer.
25. File System Security
Some file systems, such as the new technology file system (NTFS), allow you to set permissions on files
and folders.
26. Network Security
a. Network security is very similar to local security in several aspects. For example, when logging into
a network, the user must supply a user name and password.
b. Users can be controlled by groups and roles.
c. The major differences are that the user accounts and groups are created at a server and not on the
local computer.
d. Therefore, when you log on, you must use a user name and password that was created at a server.
5
Download