CHAPTER FOURTEEN: MANGING WINDOWS NETWORKING Flashcards
(54 cards)
Network Interface Card (NIC)
Your computer uses a piece of hardware called a network adapter (or NIC) to connect to a network. It can connect with a cable to a switch, or wirelessly to a Wi-Fi access point.
To work correctly, the settings on this adapter need to match the device it’s connecting to.
Wired Connections (Ethernet)
Most wired networks use a system called Ethernet. That just means you use a cable with big plugs (called RJ45 jacks) to connect to a network.
The adapter and the switch it connects to should support the same type of Ethernet.
Usually, both ends will auto-negotiate—they figure out the best settings automatically.
When you plug in the cable, Windows creates a connection and gives it a name like Ethernet.
If you have more than one adapter, they’ll be named Ethernet2, Ethernet3, etc.
You can change these names if you want.
To change Ethernet settings yourself:
- Go to Device Manager, right-click the adapter, choose Properties, then go to the Advanced tab.
- Or go to Network & Internet settings and click on the adapter.
Wireless Connections (Wi-Fi)
To connect wirelessly:
Click the network icon in the bottom-right corner of your screen.
You’ll see a list of available networks.
If a network shows up, that means its SSID (name) is being broadcast.
You’ll also see:
- Signal bars showing how strong the signal is.
- A lock icon if the network needs a password (uses encryption).
Click a network, enter the password, and you’re connected!
If you choose Connect Automatically, Windows will join it on its own whenever it’s nearby.
If the network doesn’t show up, you might need to add it manually:
- Go to Network & Internet > Wi-Fi > Manage known networks > Add new network.
- You can also change Wi-Fi adapter settings in Device Manager.
IP Addressing
For your computer to talk to others on a network, it needs an IP address—a kind of digital street address.
There are two versions:
- IPv4: Most common, looks like this: 192.168.1.100
The subnet mask (like 255.255.255.0) tells the computer which part is the network and which part is the host (your specific device).
- IPv6: Newer, longer addresses, like 2001:0db8:85a3::8a2e:0370:7334
Designed to allow way more devices on the internet.
It uses prefixes to identify parts of the network.
default gateway
the router that sends traffic to other networks
DNS severs
which translates website names like google.com into IP addresses
Static vs. Dynamic IP Addresses
Static: You type in the IP address manually. This is more work and is mostly used for servers or special devices.
Dynamic: A service called DHCP automatically gives your computer a working IP address. Much easier—this is the default for most home and office networks.
Windows Network Configuration
Each network adapter (Ethernet or Wi-Fi) in Windows usually has:
Client for Microsoft Networks (lets your PC share files and printers).
Internet Protocol (IPv4 and IPv6).
Link-layer Topology Discovery (helps your computer find other devices)
Network Location Types
Public: Your PC hides itself from other devices. Good for airports, coffee shops, etc.
Private: Your PC is visible to other devices—good for home or work networks.
Network Discovery lets you see other computers in File Explorer under Network.
Windows uses something called UNC paths to find shared stuff, like this:
Windows Defender Firewall
The firewall is like a bouncer—it controls what’s allowed in or out of your computer’s network.
You can:
Turn it on or off.
Block all incoming connections.
Allow or block specific apps:
- Go to Firewall & network protection > Allow an app through firewall.
- Check the boxes for the networks (Public or Private) where the app is allowed.
- Or click Allow another app to find one not listed.
VPN and WWAN (Cellular) Connections
VPN (Virtual Private Network):
Think of it like a secure tunnel through the internet. It lets you connect to a work or private network while keeping the connection safe and encrypted.
WWAN (Wireless Wide Area Network):
This is like using your cellular data (like LTE/5G) to go online.
Wireless Wide Area Network (WWAN)
A Wireless Wide Area Network lets your computer or tablet connect to the internet using cellular networks, like how your phone does. Think of it as using mobile data on a laptop.
It uses a WWAN adapter — a little device, either inside your computer or plugged in through USB, that talks to the mobile network.
The speed of your internet (called bandwidth) depends on whether your area and adapter support 3G, 4G, or 5G (newer = faster).
You can turn the connection on or off using the little Wi-Fi or network icon near the clock in Windows, or by going into Network and Internet settings.
To avoid this, you can tell Windows that your connection is metered (limited), and even set a data cap (a maximum amount of data you’re allowed to use).
Proxy Settings
A proxy server is like a middleman between your computer and the internet.
Instead of your PC going straight to websites, it asks the proxy server to go get the data for it.
This can help make things faster and more secure.
For example, the proxy might cache (store) copies of websites so they load faster for others.
different types of proxy settings
Transparent (intercepting) proxies: You don’t have to set anything up — it just works.
Autoconfiguring proxies: They set themselves up for you.
Manual proxies: You have to enter the IP address and port number in settings to make it work.
Troubleshooting Windows Networking
Your IP address is like your computer’s phone number on the network. If something goes wrong with your IP, Windows might say:
Unplugged or disconnected: You might not be connected at all — check your Wi-Fi or cable.
Limited connectivity: Your computer asked for an IP address using DHCP (Dynamic Host Configuration Protocol) but didn’t get one. So Windows assigns itself a weird address like 169.254.x.x — this won’t get you online.
No Internet Access: You’re connected to your router or local network, but the internet itself isn’t working — maybe a DNS (Domain Name System) or router problem.
The ping Command
Let’s say your computer is connected properly — but you still can’t get to a printer, shared folder, or email server.
To figure out if it’s a network problem and not just a software bug, use: This is like sending a digital “Are you there?” message to another computer or device.
If it works, great. If not, you might see messages like:
Reply from SenderIP: Destination unreachable: The device you’re trying to reach can’t be found. Might be turned off or there’s a wrong IP or subnet mask.
Reply from GatewayIP: Destination unreachable: Your router doesn’t know how to get to that destination. Could be a misconfigured router.
Request timed out: The device didn’t answer — maybe it’s offline or set to ignore pings.
Troubleshoot Remote Network Connectivity (trace route_
Use tracert (Trace Route)
It shows you each hop (router) your request goes through on the way to the final destination.
You’ll see:
A list of routers (or hops).
How long each hop takes.
If a step fails, it shows timeouts (marked with *), which might mean something is wrong along the way.
pathping
This command does a tracert, and then pings every hop multiple times to show latency (delay) and packet loss. If there’s a problem with your router or internet provider, this helps narrow it down.
What is Name Resolution?
It’s when your computer uses DNS to translate names like www.google.com into IP addresses.
If DNS isn’t working, you might still be able to reach websites by IP, but not by name.
Other issues might include:
Firewall or security software blocking connections.
The application itself being broken.
The server is up, but the specific service or app is not running.
netstat Command
This shows which ports are open, and which programs are using them.
-a: Show all ports, including UDP.
-b: Show the actual program using each port (admin mode only).
-o: Show the process ID (PID).
-n: Show everything in numbers (faster).
-e, -s: Show Ethernet and protocol statistics.
What Are Security Controls?
Security controls are tools or rules that protect your stuff—your files, your network, your identity, and your devices.
types of security controls
Physical Controls – These are real-world things like locks, doors, and fences that keep people out of places.
Procedural Controls – These are rules people follow, like security training, incident response plans, and company policies.
Logical Controls – These are digital protections built into your computer or software. Things like passwords, firewalls, and antivirus software fall here.
Access Control & the AAA Triad
A big part of digital security is Access Control—deciding who can get in, what they can do, and keeping track of it. This is explained by something called the AAA triad:
- Authentication – Proving you are who you say you are. Usually with a password or PIN.
- Authorization – Deciding what you’re allowed to do. Can you just read a file or also change it?
- Accounting – Logging what happened. The system keeps records of who did what and when.
Access Control Lists (ACLs)
An Access Control List (ACL) is like a guest list for a file or resource.
It lists who (subject) can access something and what they’re allowed to do (permissions).
The list includes Access Control Entries (ACEs) – each ACE says “This person or device can do X.”