Download - Using Mobile Computers
![Page 1: Using Mobile Computers](https://reader036.vdocument.in/reader036/viewer/2022062501/568166d2550346895ddae531/html5/thumbnails/1.jpg)
Using Mobile ComputersLesson 12
![Page 2: Using Mobile Computers](https://reader036.vdocument.in/reader036/viewer/2022062501/568166d2550346895ddae531/html5/thumbnails/2.jpg)
Objectives• Understand wireless security• Configure wireless networking• Use Windows mobility controls• Synchronize data• Use BitLocker Drive Encryption• Use remote network connections
![Page 3: Using Mobile Computers](https://reader036.vdocument.in/reader036/viewer/2022062501/568166d2550346895ddae531/html5/thumbnails/3.jpg)
Using Windows 7 on a Mobile Computer• Special configuration settings
– Power and display options• Windows 7 supports tablet PCs
– Reversible screen, touch sensitive, write on with a stylus
• Handheld devices, such as SmartPhones, need to be synchronized
![Page 4: Using Mobile Computers](https://reader036.vdocument.in/reader036/viewer/2022062501/568166d2550346895ddae531/html5/thumbnails/4.jpg)
Understanding Wireless Security• Easy to establish a wireless
connection, but a secure one is more difficult. Some types of attacks common to unsecured networks:– Eavesdropping– Masquerading– Attacks against wireless clients– Denial of service– Data tampering
![Page 5: Using Mobile Computers](https://reader036.vdocument.in/reader036/viewer/2022062501/568166d2550346895ddae531/html5/thumbnails/5.jpg)
Evaluating Wireless Networking Hardware• IEEE 802.11 standards dictate
frequencies, transmission speeds, and ranges of wireless networking products.
• Newer devices can fall back to support older devices at lower speeds.
• Security protocols are not backward compatible:– Wired Equivalent Privacy (WEP)– WiFi Protected Access (WPA and
WPA2)
![Page 6: Using Mobile Computers](https://reader036.vdocument.in/reader036/viewer/2022062501/568166d2550346895ddae531/html5/thumbnails/6.jpg)
Using Wired Equivalent Privacy (WEP)• Uses a security setting to encrypt
network traffic – Secret or shared key• Administrators must configure all
devices with the same shared secret key
• Relatively weak cryptography• Authentication methods;
– Open system– Shared Key
• Better to used the open system.
![Page 7: Using Mobile Computers](https://reader036.vdocument.in/reader036/viewer/2022062501/568166d2550346895ddae531/html5/thumbnails/7.jpg)
Using Wi-Fi Protected Access (WPA and WPA2)• Addresses the weakness of WEP• Two encryption options:
– Temporal Key Integrity Protocol (TKIP)– Advanced Encryption System (AES)
• WPA has two operational modes:– WPA-Personal (WPA-PSK)– WPA-Enterprise (WPA-RADIUS)
![Page 8: Using Mobile Computers](https://reader036.vdocument.in/reader036/viewer/2022062501/568166d2550346895ddae531/html5/thumbnails/8.jpg)
Configuring Wireless Networking• Manual configuration for wireless
adapters that are supported directly by Windows 7
![Page 9: Using Mobile Computers](https://reader036.vdocument.in/reader036/viewer/2022062501/568166d2550346895ddae531/html5/thumbnails/9.jpg)
Windows Mobility Center• Provides quick access to
configuration settings used by mobile computer users
![Page 10: Using Mobile Computers](https://reader036.vdocument.in/reader036/viewer/2022062501/568166d2550346895ddae531/html5/thumbnails/10.jpg)
Configuring Mobile Display Options• One of the benefits of mobile
computing is the ability to collaborate with others.
• Display configurations are often changed to accommodate viewing:– Connecting an external display– Configuring multiple displays– Using a display projector
![Page 11: Using Mobile Computers](https://reader036.vdocument.in/reader036/viewer/2022062501/568166d2550346895ddae531/html5/thumbnails/11.jpg)
Configuring Presentation Settings• Configuration
settings that users most often adjust before giving a presentation
![Page 12: Using Mobile Computers](https://reader036.vdocument.in/reader036/viewer/2022062501/568166d2550346895ddae531/html5/thumbnails/12.jpg)
Configuring Power Options• Power consumption is a critical issue
for laptop users who rely on batteries.
![Page 13: Using Mobile Computers](https://reader036.vdocument.in/reader036/viewer/2022062501/568166d2550346895ddae531/html5/thumbnails/13.jpg)
Synchronizing Data• For users who connect to a network
when in the office and need to take files with them when they are not connected
• Two types of synchronization:– One-way– Two-way
![Page 14: Using Mobile Computers](https://reader036.vdocument.in/reader036/viewer/2022062501/568166d2550346895ddae531/html5/thumbnails/14.jpg)
Using Offline Files• A form of fault tolerance• Workstations copy server-based
folders to the local drive• Users can work with the files whether
the network is operational or not, or even if they disconnect from the network
• When the workstation reconnects, synchronization of the files occurs
![Page 15: Using Mobile Computers](https://reader036.vdocument.in/reader036/viewer/2022062501/568166d2550346895ddae531/html5/thumbnails/15.jpg)
Transparent Caching• Causes Windows 7 to save copies of
files accessed on a remote server on a local drive
• Do not remain available when disconnected from the network
• Provides users with faster repeat access and conserves bandwidth
• Similar to BranchCache feature, except cached files are not shared with other workstations
![Page 16: Using Mobile Computers](https://reader036.vdocument.in/reader036/viewer/2022062501/568166d2550346895ddae531/html5/thumbnails/16.jpg)
Using Sync Center• Central control panel for all
synchronization partnerships• Pairs of folders or devices are
configured to synchronize their data on a regular basis
![Page 17: Using Mobile Computers](https://reader036.vdocument.in/reader036/viewer/2022062501/568166d2550346895ddae531/html5/thumbnails/17.jpg)
Using BitLocker• First released in Vista, and now
available with Windows 7 Enterprise and Ultimate
• Encrypts an entire volume to protect against unauthorized persons, such as someone stealing a hard drive:– Increased data protection– Integrity checking
![Page 18: Using Mobile Computers](https://reader036.vdocument.in/reader036/viewer/2022062501/568166d2550346895ddae531/html5/thumbnails/18.jpg)
Understanding BitLocker Requirements• Computer must have a Trusted
Platform Module (TPM) and a compatible BIOS.
• Has 5 operational modes:– TPM + startup PIN + startup key– TPM + startup key– TPM + startup PIN– Startup key only– TPM only
![Page 19: Using Mobile Computers](https://reader036.vdocument.in/reader036/viewer/2022062501/568166d2550346895ddae531/html5/thumbnails/19.jpg)
Turning on BitLocker
![Page 20: Using Mobile Computers](https://reader036.vdocument.in/reader036/viewer/2022062501/568166d2550346895ddae531/html5/thumbnails/20.jpg)
Using Data Recovery Agents (DRA)• A user account authorized to recover
BitLocker drives with a digital certificate on a Smart Card
• Must be configured using Group Policy in an AD DS
• Must enable DRA recovery for each type of BitLocker resource you want to recover
![Page 21: Using Mobile Computers](https://reader036.vdocument.in/reader036/viewer/2022062501/568166d2550346895ddae531/html5/thumbnails/21.jpg)
Using BitLocker To Go• New feature in Windows 7• Enables user to encrypt removable
USB drives – Flash drives and external HDs
![Page 22: Using Mobile Computers](https://reader036.vdocument.in/reader036/viewer/2022062501/568166d2550346895ddae531/html5/thumbnails/22.jpg)
Using Remote Network Connections• For travelling or telecommuting users
who must connect to the company network from a remote site:– Dial-up– Virtual Private Networking (VPN)– Direct Access (new)
![Page 23: Using Mobile Computers](https://reader036.vdocument.in/reader036/viewer/2022062501/568166d2550346895ddae531/html5/thumbnails/23.jpg)
Understanding Virtual Private Networking
Dial-up Connection – Point-to-Point Protocol (PPP)
Virtual Private Network (VPN) - tunneling
![Page 24: Using Mobile Computers](https://reader036.vdocument.in/reader036/viewer/2022062501/568166d2550346895ddae531/html5/thumbnails/24.jpg)
VPN Protocol Encapsulation• Point-to-Point Tunneling Protocol (PPTP)• Layer 2 Tunneling Protocol (L2TP)• Secure Socket Tunneling Protocol (SSTP)• Internet Key Exchange, Version 2 (IKEv2)
![Page 25: Using Mobile Computers](https://reader036.vdocument.in/reader036/viewer/2022062501/568166d2550346895ddae531/html5/thumbnails/25.jpg)
Creating a VPN Connection
![Page 26: Using Mobile Computers](https://reader036.vdocument.in/reader036/viewer/2022062501/568166d2550346895ddae531/html5/thumbnails/26.jpg)
Using VPN Reconnect• When a VPN was
interrupted, users had to manually re-establish the connection.
• Wireless has made this more of a problem.
• VPN Reconnect enables a computer to reconnect automatically.
![Page 27: Using Mobile Computers](https://reader036.vdocument.in/reader036/viewer/2022062501/568166d2550346895ddae531/html5/thumbnails/27.jpg)
Introducing DirectAccess• Replacement for
VPN• Eliminates the
need for clients to manually establish wide area connections to their networks
• Automatically connects to the network when connected to the Internet
![Page 28: Using Mobile Computers](https://reader036.vdocument.in/reader036/viewer/2022062501/568166d2550346895ddae531/html5/thumbnails/28.jpg)
Understanding the DirectAccess Infrastructure• Invisible to the client, but
complicated communications process with a long list of back-end infrastructure requirements:– IPV6 – Globally routable addresses– Ipsec – Provides additional security– Extensive Server requirements– Clients running Windows 7 Ultimate
or Enterprise or Server 2008 R2, in the same domain as the DirectAccess Server
![Page 29: Using Mobile Computers](https://reader036.vdocument.in/reader036/viewer/2022062501/568166d2550346895ddae531/html5/thumbnails/29.jpg)
DirectAccess Setup
![Page 30: Using Mobile Computers](https://reader036.vdocument.in/reader036/viewer/2022062501/568166d2550346895ddae531/html5/thumbnails/30.jpg)
Skills Summary• Windows Mobility Center is a shell
application that provides a central point of access to configuration settings that mobile computer users need.
• Configuring external displays is a common task for mobile computer users.
• Power settings allow you to control the power consumption of components in your mobile device.
• Offline files store copies of network files on the local drive, for use when the computer is disconnected.
![Page 31: Using Mobile Computers](https://reader036.vdocument.in/reader036/viewer/2022062501/568166d2550346895ddae531/html5/thumbnails/31.jpg)
Skills Summary (cont.)• Sync Center is a central control panel for
all of the synchronization partnerships.• BitLocker encrypts all of the files on a
volume and performs an integrity check before it permits the system to start.
• Dial-up or virtual private network (VPN) connections enable users to connect to a network from remote locations.
• DirectAccess simplifies the remote connection process for inexperienced users.