• To have network connectivity you need: Connected NIC, properly configured TCP/IP, and network client
Network connections can be configured in the Network and Sharing Center applet of the Control Panel. From here you’ll have the option to set up a new connection or network. You can then choose to “Connect to the Internet,” “Set up a new network,” or Connect to a workplace”
VPN
Using a VPN creates an encrypted tunnel between your device (such as a mobile laptop) and a VPN concentrator somewhere else on the network. Usually your corporate private internal network sits behind a firewall. If you’re at an airport with your laptop for example, you would then not have access to your corporate network. With a VPN, you can create an encrypted tunnel through the Internet to connect to the VPN concentrator. If someone were to view your traffic they could see packets going to the VPN concentrator but would be unable to view the information because it is encrypted. The VPN concentrator then decrypts the data and sends it to your internal corporate network.
The VPN concentrator usually sits in the DMZ?
Windows has a built in VPN client. To set up a VPN connection, you’ll need to specify the Internet address and the destination name. Additionally there are options to integrate a smart card for multi factor authentication.
Dial-ups
Dial up connection uses standard phone lines. Dial up is not often seen for connections but still may be used by network administrators when a primary connection has gone down.
To configure a dial up connection you’ll need to provide authentication (user name and password) and the phone number to dial.
Use the network status icon at the bottom of the screen to connect or disconnect.
Wireless
A wireless network connection configuration involves providing a network name (SSID), Security type (usually WPA2 or WPA2-Enterprise), and Encryption Type (AES or TKIP). You may also need to provide a security key. In a home environment using WPA2-Personal, the security key is usually a pre-shared key that will be used by each device to access the wireless network. In an enterprise environment, using WPA2-Enterprise, the security key would use 802.1X authentication. This integrates the wireless access point to the same authentication credentials you use for everything else in your network. Each individual uses their normal username and password for wireless access.
Wired
Wired connections are usually made via Ethernet cable.
WWAN (Cellular)
WWAN stands for Wireless Wide Area Network. WWAN involves using a mobile phone provider to allow internet access over cellular frequencies. Internet connection via WWAN does not only have to be on cell phones but can also be utilized by mobile devices such as laptops and tablets. WWAN capability is accomplished by using a hardware adapter. If a hardware adapter is used, it’s possible that you might need to use third party software in its configuration.
Otherwise if a hardware adapter is not used, you may be able to connect your device to your mobile phone via USB or 802.11 wireless and use tethering or hotspot capabilities from your mobile phone.