Windows Networking Update3

95
DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE Computer and Networking Technology Department WINDOWS NETWORKING ESSENTIALS Chapter I: Network Basic Chapter II: Managing Users and Windows Chapter III: TCP/IP Chapter IV: Network on a Workgroup using Win XP Chapter V: Window Vista Networking on a Workgroup Chapter VI: Networking in Windows Network using Win XP Chapter VII: Window Vista in Windows Network Chapter VIII: Remote Networking Chapter IX: Internet Access, ICS and ICF Chapter X: Outlook Configuration 1 Prepared by: MTGuillermo

Transcript of Windows Networking Update3

Page 1: Windows Networking Update3

DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE

Computer and Networking Technology Department

WINDOWS NETWORKING ESSENTIALS

Chapter I: Network Basic

Chapter II: Managing Users and Windows

Chapter III: TCP/IP

Chapter IV: Network on a Workgroup using Win XP

Chapter V: Window Vista Networking on a Workgroup

Chapter VI: Networking in Windows Network using Win XP

Chapter VII: Window Vista in Windows Network

Chapter VIII: Remote Networking

Chapter IX: Internet Access, ICS and ICF

Chapter X: Outlook Configuration

1 Prepared by: MTGuillermo

Page 2: Windows Networking Update3

DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE

Computer and Networking Technology Department

Chapter I: NETWORK BASICS

OBJECTIVE:

Plan and design network

Define the network model available in Windows XP

Identify and describe the elements that are recommended for structured cabling networks.

Select and estimate the cost of cabling for a given network.

OUTLINE:

A. Planning a NetworkB. Selecting a NetworkC. Network ModelD. Structured Cabling

ACTIVITY:

Activity 1: Network DesignActivity 2: Building Peer to Peer Network (Window XP and Win 2003)

2 Prepared by: MTGuillermo

Page 3: Windows Networking Update3

DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE

Computer and Networking Technology Department

TOPIC A: PLANNING A NETWORK

Before you begin any networking project, whether it’s a new network installation or an upgrade of an existing network, you should first make a detailed plan. If you make technical decisions too quickly, before studying all the issues that affect the project, you’ll regret it. You’ll discover too late that a key application won’t run over the network, that the network has unacceptablyslow performance, or that key components of the network don’t work together.

Here are some general thoughts to keep in mind while you create your network plan:

Don’t rush the plan Write down the network plan Ask someone else to read your network plan before you buy anything. Keep the plan up to date.

STEPS IN PLANNING A NETWORK

1. Purpose of the networkOne of the first steps in planning your network is making sure that you understand why you want the network. Make sure that you identify all the reasons why you think you need a network and then write them down.

2. Taking the stockOne of the most challenging parts of planning a network is figuring out

how to work with the computers that you already have. In other words, you have to take a thorough inventory of your current computers.

3. Type of ServerOne of the most basic questions that a network plan must answer is whether the network will have one or more dedicated servers or rely completely on peer-to-peer networking.

a. File Servers

3 Prepared by: MTGuillermo

Page 4: Windows Networking Update3

DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE

Computer and Networking Technology Department

b. Print Serversc. Mail Serversd. Database Servers

4. Choosing a NOSIf you determine that your network will require one or more dedicated

servers, the next step is to determine what network operating system those servers should use. If possible, all the servers should use the same NOS so that you don’t find yourself supporting different operating systems.

Although you can choose from many network operating systems, from a practical point of view, your choices are limited to the following:

Windows Server 2003 or 2008 Linux or another version of Unix

5. Planning the InfrastructurePlan the details of how you will connect the computers in the network. This includes determining which network topology that the network will use, what type of cable will be used, where the cable will be routed, and what other devices, such as repeaters, bridges, hubs, switches, and routers, will be needed.

6. Drawing DiagramsOne of the most helpful techniques for creating a network plan is to draw a picture of it. The diagram can be a detailed floor plan, showing the actual location of each network component. This type of diagram is sometimes called a physical map.

4 Prepared by: MTGuillermo

Page 5: Windows Networking Update3

DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE

Computer and Networking Technology Department

TOPIC B: SELECTING A NETWORK CONNECTION

The biggest decision you need to make when creating your network is what type of connection you will use. Gateway supports both wired and wireless Ethernet networks. Use the following criteria as a guide when selecting a network connection.

Wired Ethernet network

A wired Ethernet network consists of two or more computers connected together through an Ethernet cable. This connection type is commonly used in offices around the world and can be used to build computer networks in the home.

Create a wired Ethernet network if:

You are building a new home or your existing home already has Ethernet cable installed in each room that has a device you want to connect

You are creating a network in an office or business where network speed is more important than moving about with your computer

Your computer has an Ethernet jack for connecting to the network

Example wired Ethernet network

5 Prepared by: MTGuillermo

Page 6: Windows Networking Update3

DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE

Computer and Networking Technology Department

Wireless Ethernet network

A wireless Ethernet network is ideal for creating a home or office network or adding mobility to an existing wired Ethernet network. A wireless Ethernet network allows you the freedom to move about your home or office with your notebook or tablet PC.

Create a wireless Ethernet (IEEE 802.11a, IEEE 802.11b, IEEE 802.11g or 802.11n) network if:

You are looking for an alternative to installing cable for connectivity The ability to move about with your computer is as important as network speed Your computer has wireless Ethernet for networking

6 Prepared by: MTGuillermo

Page 7: Windows Networking Update3

DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE

Computer and Networking Technology Department

TOPIC C: NETWORK MODEL

1. Workgroup ModelMicrosoft’s workgroup model for networking distributes resources, administration, and security throughout a network. Each computer in a workgroup can be a server, a client, or both.

Advantage DisadvantageEasy-to-share resources No centralized control of resourcesResources are distributed across all machines

No centralized account management

Little administrative overhead No centralized administration Simple to design No centralized security managementEasy to implement Inefficient for more than 20 workstationsConvenient for small groups in close proximity

Security must be configured manually

Less expensive, does not require a central server

Increased training to operate as both client and server

2. Domain Model By dedicating one or more servers to the job of controlling a domain, the domain model adds a layer of complexity to networking. But the domain model also centralizes all shared resources and creates a single point of administrative and security control.

Advantage Disadvantage

7 Prepared by: MTGuillermo

Page 8: Windows Networking Update3

DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE

Computer and Networking Technology Department

Centralized resource sharing Significant administrative effort and overhead

Centralized resource controls Complicated designs; requires advanced planning

Centralized account management Requires one or more powerful, expensive servers.

Centralized security management Support personnel need to be trained in security management.

Efficient for virtually unlimited number of workstations

Expense for domain controllers and access lags increase with network size

Users need to be trained only to use clients

Support personnel need to be trained in domain network management.

Not restricted to close proximity Larger scope requires more user documentation and training.

TOPIC D: STRUCTURED CABLING

Structured cabling specification T568 makes recommendations for the following basic elements of networks:

Building Entrance Requirements - Specifications for the point at which outside cabling enters a building.

Equipment Room - Storage area for the more expensive, complex equipment, often the existing telecommunications closets.

Backbone Cabling - Cabling (often referred to as vertical) that carries the signals from equipment room to equipment room, between floors, and to and from the building entrance connections.

Horizontal Cabling- ransmission media that carries signals from a same floor equipment room to the various work areas.

Work Area - Any area where the computer workstations, printers, etc. are located, typically office space.

Backbone Cabling Connects Equipment Rooms

8 Prepared by: MTGuillermo

Page 9: Windows Networking Update3

DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE

Computer and Networking Technology Department

The wiring used for backbone cabling may be either copper or fiber optic.Recommended backbone cable maximum distance limitations include:

Voice grade 100 ohm UTP 800 meter limitation STP data grade 150 ohm 90 meter limitation Multimode 62.5/125μm fiber 2,000 meter limitation Patch cable 3 - 6 meter limitation

Horizontal Cabling

9 Prepared by: MTGuillermo

Page 10: Windows Networking Update3

DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE

Computer and Networking Technology Department

Most often, horizontal cable is routed directly from the wiring closet to the workstation, without splices, cable junctures, or taps. By eliminating splices, cable junctures and/or taps, the potential for faulty connections and electrical noise is reduced. Although not necessary, it is recommended that horizontal cabling be rated for category 5 use.

Maximum transmission speeds for horizontal cable are: Category 3 up to 16 MHz Category 4 up to 20 MHz Category 5 up to 100 MHz

Maximum recommended distance limitation for horizontal cable:

100 meters total Maximum of 3 meters from wall jack to workstation Maximum of 6 meters in the telecommunications closet Maximum of 90 meters from telecommunications closet to wall jack

10 Prepared by: MTGuillermo

Page 11: Windows Networking Update3

DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE

Computer and Networking Technology Department

The wall jack outlet must have a minimum of two ports, one for voice grade transmissions and one for data grade transmissions. Recommended horizontal cabling includes:

4-pair 100 ohm UTP 2-pair 150 ohm STP 2 fiber 62.5/125μm optical

NETWORK TOPOLOGY

1. Bus Topology - When computers were first networked together, they were simplyconnected to one cable segment in a series.

2. Ring Topology – devices connected in a closed loop and have equal access.

3. Star Topology – Star topology is a point-to-point architectural design where all computer devices are connected to a central hub, through which all data signals must travel.

11 Prepared by: MTGuillermo

Page 12: Windows Networking Update3

DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE

Computer and Networking Technology Department

4. Hybrid Network Topology - Hybrid topology is any combination of bus, star, and ring topology, for example, a star-bus configuration.

5. Mesh Topology - Every device is connected to every other device. Used in WANs to interconnect LANs

6. Wireless Topology few cables are used to connect systems made up of transmitters that broadcast the packets using radio frequencies contains special transmitters called cells or wireless access point

ACTIVITY 1: NETWORK DESIGN12 Prepared by: MTGuillermo

Page 13: Windows Networking Update3

DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE

Computer and Networking Technology Department

Materials Needed

Spreadsheet application Drawing application Cable cost analysis prepared

Work with a partner to create a list of questions you should ask a client who has hired you to build a network. The client wants to know which type of cable you plan to use and why, how much the cable will cost, and why you selected the particular topology. The client also wants you to submit a proposal that defends your choice of cabling and network design.

After you create your questionnaire, role-play with your partner. One of you will assume the role of client, and the other the role of the network designer. The client will answer all the questions for a fictitious company of his/her choice. The network designer will record all of the answers.

When the questionnaire is complete, you will both analyze the requirements and determine the appropriate topology. Create a computer diagram of the proposed network for the client. Prepare a spreadsheet that shows a cost analysis of the cable needed to complete the job. The cost analysis should include the type of cable, length of cable, cost of each type of cable, and the total cable cost. Use the cost information you gathered in the cabling lesson.

Submit a proposal to the client indicating the suggested network topology. Include a summary to convince the client that this is the best, most cost efficient design for her/his needs. Your proposal must also defend your cable choices. Attach the computer diagram and cable cost analysis spreadsheet to your proposal.

Evaluation Criteria and Weightings

Name: ________________________________________________ Section: _______________

13 Prepared by: MTGuillermo

Page 14: Windows Networking Update3

DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE

Computer and Networking Technology Department

Activity 1Building a Peer-to-Peer Network (XP meets 2003)

Objectives

Design and build a simple peer-to-peer network using a crossover cable supplied by the instructor.Verify connectivity between the peers using the ping command.File and Printer Sharing

Background / Preparation

In this hands-on lab, you will plan and build a simple peer-to-peer network using two PCs and an Ethernet crossover cable.

The following resources are required:

Two Window XP Professional PCs, each with an installed and functional Network Interface Card (NIC)An Ethernet crossover cable

Step 1: Diagram the network

a. A network diagram is a map of the logical topology of the network. In the space below, sketch a simple peer-to-peer network connecting two PCs. Label one PC with IP address 192.168.1.1 and the other PC with IP address 192.168.1.2. Use labels to indicate connecting media and any necessary network devices.

14 Prepared by: MTGuillermo

Page 15: Windows Networking Update3

DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE

Computer and Networking Technology Department

b. A simple network like the one you designed can use a hub or switch as a central connecting device, or the PCs may be directly connected. Which kind of cable is required for a direct Ethernet connection between the two PCs?

____________________________________________________________________________

Step 2: Document the PCs

a. Check the computer name settings for each PC and make adjustments as necessary. For each PC, select Start and Control Panel. Double-click the System icon, then click the Computer Name tab. Write down the computer name that is displayed following Full computer name:

b. Check to see if the two PCs have the same name. If they do, change the name of one PC by clicking the Change button, typing a new name in the Computer name field, then clicking OK.

c. Click OK to close the System Properties window.

d. Why is it important that each PC on a network have a unique name?

15 Prepared by: MTGuillermo

Page 16: Windows Networking Update3

DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE

Computer and Networking Technology Department

Step 3: Connect the Ethernet cable

a. Use the Ethernet crossover cable provided by the instructor. Plug one end of the cable into theEthernet NIC of PC1.

b. Plug the other end of the cable into the Ethernet NIC of PC2. As you insert the cable, you should hear a click which indicates that the cable connector is properly inserted into the port.

Step 4: Verify physical connectivity

a. After the Ethernet crossover cable is connected to both PCs, take a close look at each Ethernet port. A light (usually green or amber) indicates that physical connectivity has been established between the two NICs. Try unplugging the cable from one PC then reconnecting it to verify that the light goes off then back on.

b. Go to the Control Panel, double click the Network Connections icon, and confirm that the local area connection is established. The following figure shows an active local area connection. If physical connectivity problems exist, you will see a red X over the Local Area Connection icon with the words Network cable unplugged.

16 Prepared by: MTGuillermo

Page 17: Windows Networking Update3

DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE

Computer and Networking Technology Department

c. If the Local Area Connection does not indicate that it is connected, troubleshoot by repeating Steps 3 and 4. You may also want to ask your instructor to confirm that you are using an Ethernet crossover cable.

Step 5: Configure IP settings

a. Configure the logical addresses for the two PCs so that they are able to communicate using TCP/IP. On one of the PCs, go to the Control Panel, double click the Network Connections icon,

b. and then right click the connected Local Area Connection icon. Choose Properties from the pull-down menu.

b. Using the scroll bar in the Local Area Connection Properties window, scroll down to highlight Internet Protocol (TCP/IP). Click the Properties button.

c. Select the Use the following IP address radio button and enter the following information:

17 Prepared by: MTGuillermo

Page 18: Windows Networking Update3

DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE

Computer and Networking Technology Department

d. Click OK, which will close the Internet Protocol (TCP/IP) Properties window. Click the Close button to exit the Local Area Connection Properties window.

e. Repeat steps 5a – 5d for the second PC using the following information

Step 6: Verify IP connectivity between the two PCs

NOTE: To test TCP/IP connectivity between the PCs, Windows Firewall must be disabled temporarily on both PCs. Windows Firewall should be re-enabled after the tests have been completed.

a. On PC1, on the Windows XP desktop, click Start. From the Start menu, select Control Panel, and double-click Network Connections.

b. Right-click the Local Area Connection icon and select Properties. Click the Advanced tab. Locate and click the Settings button.:

18 Prepared by: MTGuillermo

Page 19: Windows Networking Update3

DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE

Computer and Networking Technology Department

c. Make a note of whether the firewall settings are ENABLED (ON) for the Ethernet port or DISABLED (OFF) for the Ethernet port. ___________________________________________________________________________

d. If the firewall settings are enabled, click the Off (not recommended) radio button to disable the firewall. The setting will be re-enabled in a later step. Click OK in this dialog box and the following to apply this setting.

e. Now that the two PCs are physically connected and configured correctly with IP addresses, we need to make sure they communicate with each other. The ping command is a simple way to accomplish this task. The ping command is included with the Windows XP operating system.f. On PC1, go to Start, then Run. Type cmd, and then click OK. A Windows command prompt window will appear as shown in the figure below.

g. At the > prompt, type ping 192.168.1.2 and press Enter. A successful ping will verify the IP connectivity. It should produce results similar to those shown in here.

h. Repeat Steps 6a-6c on the second PC. The second PC will ping 192.168.1.1.

i. Close the Windows command prompt window on both PCs.Step 7: Verify connectivity using My Network Placesa. A PC can share its resources with other PCs on the network. PCs with shared resources should be visible through My Network Places. On PC1, go to Start, click My Network Places, and then click View workgroup computers in the left pane

19 Prepared by: MTGuillermo

Page 20: Windows Networking Update3

DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE

Computer and Networking Technology Department

b. Do you see an icon for the other PC in your peer-to-peer network? ______________________

c. What is the name of the other PC? ________________________________________________

d. Is it the same name you recorded in Step 2? ________________________________________

e. Perform Step 7a on the second PC.

f. Close any open windows.

Step 8: (Optional – Use only if the Firewall was originally ENABLED) Re-enable the firewall

a. If you disabled the Windows Firewall in Step 6, click Start, select Control Panel, and open the Network Connections control panel.

b. Right-click the Ethernet network connection icon and select Properties. Click the Advanced tab. Locate and click Settings.

c. If the firewall settings are disabled (and they were enabled before this lab began), click the On radio button to enable the firewall. Click OK in this dialog box and the following one to apply this setting.

Step 9: File and Printer Sharing

a. In PC 1 connect the printer. Create a text document in notepad file name: Your Surname and save in folder name Test

20 Prepared by: MTGuillermo

Page 21: Windows Networking Update3

DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE

Computer and Networking Technology Department

b. Share the printer and the folder Test

c. Using PC 2 copy the shared document in PC 1 (notepad) then print.

CHAPTER II: MANAGING USERS AND WINDOWS ENVIRONMENT

Objectives:

Use Control Panel and Administrative Tools to manage hardware devices.

Use the Microsoft Management Console to load snap-ins and create consoles.

Create and troubleshoot user and group accounts

Manage and troubleshoot user profiles

Outline:A. Management Utilities

a. Control Panelb. Administrative Tools

B. User and Group ManagementC. User Profile ManagementD. Working with Microsoft Management Console

Activity:

Activity 1: Display Administrative Tool in All Programs

Activity 2: Exploring Computer Management

Activity 2: Creating User and Group Accounts

21 Prepared by: MTGuillermo

Page 22: Windows Networking Update3

DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE

Computer and Networking Technology Department

Activity 2: Create and Change Password

Activity 3: Changing a Group Membership

TOPIC A: Management Utilities

a. Control Panelb. Administrative Tools

Control Panel

The control panel hosts the applets and utilities used to install and configure devices and software (particularly services)

Control Panel View

a. Category View

b. Classic View

22 Prepared by: MTGuillermo

Page 23: Windows Networking Update3

DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE

Computer and Networking Technology Department

Category view offers nine groupings for various common configuration changes. The following table lists the categories and their related applets.

Category Related AppletsAccessibility Options Accessibility optionsAdd or Remove Programs Add or Remove ProgramsAppearance and Themes Display, Folder Options, Taskbar and Start MenuDate, Time, Language, and Regional Options Date, Time, Language, and Regional OptionsNetwork and Internet Connections Internet Options, Network ConnectionsPerformance and Maintenance Administrative Tools, Power Options, Scheduled

Tasks,Printers and Other Hardware Game Controllers, Keyboard, Mouse, Phone and

Modem Options, Printers and Faxes, Scanners and cameras

Sound, Speech and Audio Devices Sound, Speech and Audio DevicesUser Accounts User Acounts

Administrative Tools

The Administrative Tools are a collection of system configuration utilities that are more appropriate to an MMC console than to a Control Panel Applet.

The seven Administrative Tools are:

Tool Description1. Component Services Used to administer COM and COM+

23 Prepared by: MTGuillermo

Page 24: Windows Networking Update3

DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE

Computer and Networking Technology Department

applications2. Data Sources (ODBC) Used to configure the OS to interact with

various database management systems, such as SQL Server or FoxPro

3. Event Viewer View system messages regarding the failure and or success of various key occurrences within the Windows XP environment.

4. Local Security Policy Used to configure local security settings for a system.

5. Performance Used to access System Monitor and the Performance Logs and Alerts tool.

6. Services Used for stopping and starting services and configuring the startup parameters for services

7. Computer Management

Computer Management is an MMC console that serves as a common troubleshooting and administration interfaces for several tools.

Three sections of Computer Management

1. System Tools2. Storage3. Services and Applications

System Tools

24 Prepared by: MTGuillermo

Page 25: Windows Networking Update3

DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE

Computer and Networking Technology Department

Tool Use this tool toEvent Viewer View system messages regarding the failure

and or success of various key occurrences within the Windows XP environment.

Shared Folders View the shared folders on the local systemLocal Users and Groups Create and manage local user accounts and

groupsPerformance Logs and Alerts Track performance counters and set alertsDevice Manager View and alter current hardware

configurations of all existing devices

Storage Devices

1. Removable Storage –used to manage removable media such as floppy disks, tapes, and Zip drives

2. Disk Defragramenter – used to improve the layout of stored data on drives by reassembling fragmented files and aggregating unused space.

3. Disk Management – used to view and alter partitioning and volume configuration of hard drives.

Services and Applications1. Indexing Service – used to define the corpus (collection of documents indexed for

searching) for indexing services2. WMI Control – used to configure Windows Management Instrumentation

25 Prepared by: MTGuillermo

Page 26: Windows Networking Update3

DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE

Computer and Networking Technology Department

Activity 1: Display Administrative Tool in All Programs

Step 1: Right Click Task Bar | Click Properties

Step 2: Click Start Menu | Click Customize

Step 3: Click Advance Tab

Set 4: Find the Administrative tool by dragging the the scroll bar

Step 5: Click the option Display on the All Programs Menu | Click OK

26 Prepared by: MTGuillermo

2

1

3

Page 27: Windows Networking Update3

DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE

Computer and Networking Technology Department

Step 6: Click Apply | OK Button

To check if all ready in All Programs

Click Start button | All Programs | Administrative Tools

27 Prepared by: MTGuillermo

4

6

5

Page 28: Windows Networking Update3

DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE

Computer and Networking Technology Department

ACTIVITY 2: EXPLORING COMPUTER MANAGEMENT

Step 1: Option 1 Using Control Panel Click Performance and Maintenance | Click Administrative Tools

28 Prepared by: MTGuillermo

2

1

3

Page 29: Windows Networking Update3

DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE

Computer and Networking Technology Department

Option 2: If already in ALL PROGRAM Click START | ALL PROGRAMS | ADMINISTRATIVE TOOLS

Step 2: Double-click COMPUTER MANAGEMENT

Step 3: Click EVENT VIEWER

Step 4: Double –Click SHARED FOLDERS | In the left-hand pane, click SHARES

29 Prepared by: MTGuillermo

Page 30: Windows Networking Update3

DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE

Computer and Networking Technology Department

Step 5: Double-click LOCAL USERS AND GROUPS | In the left-hand pane, Click Users

30 Prepared by: MTGuillermo

Page 31: Windows Networking Update3

DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE

Computer and Networking Technology Department

Step 6: Click DEVICE MANAGER | Click Action

Step 7: Choose File | Exit

31 Prepared by: MTGuillermo

Page 32: Windows Networking Update3

DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE

Computer and Networking Technology Department

TOPIC B: USER AND GROUP MANAGEMENT

Type of User Accounts

1. Local User Accounts – exists on a single computer and can’t be used in any manner with domain resources, or to gain domain access of any kind.

2. Domain User Account – exists in a domain or in any trusting domain by virtue of being created on a domain controller.

Default user accounts1. Administrator - has unlimited access to Windows XP computer2. Guest - has limited access to resources; disabled by default

User Accounts in the Control Panel

Three different action from the User Account Interface

1. Change an account.2. Create a new account.3. Change the way users log on or off.

32 Prepared by: MTGuillermo

Page 33: Windows Networking Update3

DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE

Computer and Networking Technology Department

User Accounts with Computer Management

The Local Users and Groups tool in Computer Management is used to create and manage local users.

To Access Local Users and Groups

Right-click MY COMPUTER and Choose MANAGE

33 Prepared by: MTGuillermo

User Accounts

Local Users and Group tools

User Node

Page 34: Windows Networking Update3

DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE

Computer and Networking Technology Department

ACTIVITY 3: CREATING USER ACCOUNT USING COMPUTER MANAGEMENT

Step 1: On the Start Menu, right-click MY COMPUTER and choose MANAGE

Step 2: In the console tree, expand Local Users and Groups, and Select the Users Node

Step 3: Right-Click the Users node and choose New User

34 Prepared by: MTGuillermo

1

2

3

Page 35: Windows Networking Update3

DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE

Computer and Networking Technology Department

Step 4: In the User name text box, type “your name”

Step 5: In the Password and Confirm password text boxes, type “your password”

Step 6: Uncheck User must change password at next logon

Step 7: Click Create

Step 8: Repeat this procedure to create 3 users

When you’re done, click Close

Step 9: Select the Users node, and observe the details pane

35 Prepared by: MTGuillermo

Page 36: Windows Networking Update3

DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE

Computer and Networking Technology Department

GROUPS

Groups are named collections of users. Through the use of groups, administrators can manage users at one time because at one time because a group’s settings can be defined once and apply to all members of the group.

TYPES OF GROUPS

1. Local groups - exist only on a single computer

2. Global groups - exist in the domain

DEFAULT GROUPS

GROUP DESCRIPTIONAdministrators Computer administrators have complete control

over the computerPower Users Power Users can perform most actions that administrators can

perform, but they can only modify and delete accounts that they create. Also, they can only modify group memberships that theyhave created.

Users This is the default limited user account. Users can configure the desktop systems and create files, but they cannot make any configuration changes to the system, add or remove accounts, or access other users’ folders.

Backup Operators Backup Operators can back up and restore files on the computer, regardless of which user owns those files. Backup operators cannot be changed.

Guests This enables a guest to log on to the computer. Guests can perform basic computing actions, but do not have all of the abilities given to the limited user accounts.

Network Configuration Operators

This provides some basic administrative privileges for the configuration of Windows XP’s networking features. Typically, under local usage, the administrator would handle these functions.

Remote Desktop Users If Remote Desktop is configured, this group is provided for remote desktop users to access theremote access connection.

36 Prepared by: MTGuillermo

Page 37: Windows Networking Update3

DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE

Computer and Networking Technology Department

Replicator Use by special user accounts to facilitate directory replication between system and domain. It has no default members

Help Services Group This is provided for the Help and Support Center.

SYSTEM GROUPS

System groups are preexisting groups that you can’t manage but that appear in dialog boxes when assigned group membership or access permissions. These are groups are used by the system to control or place restrictions on specific groups of users based on their activities.

Anonymous Logon

Batch

Creator Group

Creator Owner

Dialup

Everyone

Interactive

Local Service

Network

Network Service

Remote Interactive Logon

Service

System

Terminal Server User

GROUP STRATEGIES

Basic strategy

– Users assigned to global groups

– Global groups assigned to local groups

– Local groups assigned rights and permissions to resources

– Do not assign permissions to single users

Plan groups carefully

Create groups based on job function, geographic location, etc.

USER ACCOUNT TROUBLESHOOTING

37 Prepared by: MTGuillermo

Page 38: Windows Networking Update3

DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE

Computer and Networking Technology Department

Check for password errors

– Reset passwords if necessary

– Educate users on creating and remembering strong password

Check group assignment and correct if necessary

ACTIVITY 4: CREATING GROUP ACCOUNT

Step 1: In Computer Management under Local Users and Groups, select the Groups node

Step 2: In the details pane, under the list of groups, right-click an empty area and choose New Group

Step 3: Name the group Group01

Step 4: Click Add, and in the Enter the object names to select text box, type User01; User02

Step 5: Click OK

Step 6: Click Create

38 Prepared by: MTGuillermo

Page 39: Windows Networking Update3

DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE

Computer and Networking Technology Department

Step 7: In the New Group dialog box, enter the new group name Group02

Step 8: Add User01 and User03 to the group

Step 9: Click Create and then Close

Step 10: Select the Group Nodes and observe the detail pane

39 Prepared by: MTGuillermo

Page 40: Windows Networking Update3

DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE

Computer and Networking Technology Department

ACTIVITY 5: CHANGING USER’S PASSWORD

Step 1: Select the Users Node

Step 2: Right click User03 and Choose Set Password

Step 3: Click Proceed to close the warning dialog box

Step 4: In the New Password and Confirm password text boxes, type password03

Step 5: Observe the warning below the password text boxes.

Step 6: Click OK and OK again

40 Prepared by: MTGuillermo

Page 41: Windows Networking Update3

DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE

Computer and Networking Technology Department

ACTIVITY 6: CHANGING A USER’S GROUP MEMBERSHIP

Step 1: Double-click User01

Step 2: Activate the Member Of tab

Step 3: Observe the list of groups

Step 4: Select the Group02 and click Remove

Step 5: Click Add

Step 6: Type the name Power Users and click OK

Step 7: Close Computer Management

41 Prepared by: MTGuillermo

Page 42: Windows Networking Update3

DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE

Computer and Networking Technology Department

TOPIC C: USER PROFILE MANAGEMENT

USER PROFILES

- A collection of desktop and environmental configurations on a Windows XP system for a specific user or group of users

- Located in \Documents and Settings folder, which includes

o My Documents

o Cookies

o Favorites

o Desktop

o Start menu

- Profile information in Ntuser.dat

The material stored in a user profile includes the files and folders in the following table.

File or folder DescriptionApplication Data A folder containing user-specific data, such as

42 Prepared by: MTGuillermo

Page 43: Windows Networking Update3

DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE

Computer and Networking Technology Department

for Internet Explorer or OutlookCookies A folder containing cookies accepted by a user

through the browser.Desktop A folder containing the icons displayed on the

user’s desktopMy Recent Documents A file containing user-specific links to recently

accessed resources.NetHood A folder containing user-specific network

mappingsPrintHood A folder containing user specific printing

mappings.SendTo A folder containing user-specific links used in

the Send To command of the right-click pop-up menu of files and folders.

File or folder DescriptionStart Menu A folder containing the user-specific Start menu layoutTemplates A folder containing user specific templatesNTUSER.DAT A file containing Registry information specific to the

user.NTUSER.DAT.LOG A transaction log file that ensures the profile can be re-

created in the event of failure.NTUSER.INI A file containing profile-related settings, such as which

directories should not be uploaded to a roaming profile.

Default profile

Used to create new user profiles New profiles created at first logon Default User and All Users profiles in \Documents and Settings

43 Prepared by: MTGuillermo

Page 44: Windows Networking Update3

DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE

Computer and Networking Technology Department

Local profiles vs. roaming profiles

Local profiles exist only on a single Windows XP computer

Roaming profiles stored on network server and downloaded to any computer the user logs on to

Mandatory profiles

Enforces specific environment settings Rename user’s profile from Ntuser.dat to Ntuser.man

User profile troubleshooting

Trouble with all user profiles or just a single profile?

Create new user account to test Default User profile

Log on to multiple computers to test roaming profile

Ensure enough free space

Delete corrupt folders or files

Verify access permissions

Last resort: Create a new user profile

44 Prepared by: MTGuillermo

Page 45: Windows Networking Update3

DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE

Computer and Networking Technology Department

CHAPTER III: TCP/IP

OBJECTIVE:

Describe the characteristic of TCP/IPLearn IPv4 and IPv6Learn Custom Subnet

OUTLINE

A. TCP/IP Features

45 Prepared by: MTGuillermo

Page 46: Windows Networking Update3

DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE

Computer and Networking Technology Department

TCP/IP Components in WindowsB. Understanding IP ADDRESS

Internet Protocol version 4 (IPv4)Class of IPv4 Address

C. IPv4 Custom Subnetting D. Internet Protocol version 6 (IPv6)

IPv6 FeaturesDifferences of IPv4 and IPv6IPv6 Implementations from MicrosoftTypes of IPv6 AddresseesIPv6 Notation

ACTIVITY

Activity 1: Class Address and Default Subnet Mask IdentificationActivity 2: IPv4 Custom Subnetting

Activity 3: IPv6 Address Notation Exercise Activity 4: Enable IPv6 in Window XP

TOPIC A: TCP/IP FEATURES

Transmission Control Protocol/Internet Protocol (TCP/IP)

The basic language or protocol used for the Internet.

A suite of networking protocols, including both IPv4 and IPv6, that are widely used on the Internet and that provide communication across interconnected networks of computers with diverse hardware architectures and various operating systems.

Features of TCP/IP protocols:

TCP/IP is independently developed from any specific hardware or operating systems

46 Prepared by: MTGuillermo

Page 47: Windows Networking Update3

DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE

Computer and Networking Technology Department

It is open protocol standards and freely available It is widely used for the Internet, Intranet and Extranet Most of the products manufactured by vendors have support for TCP/IP TCP/IP allows integration of different kind of networks It can run over an Ethernet, token ring, dial-up line or any other kinds of physical

transmission media TCP/IP has a common addressing scheme that allow device to uniquely address on

the entire network, even if the network is as large as the worldwide Internet TCP/IP standardized high-level protocols for consistent, widely available user services

TCP/IP Components in Windows

Advantages of the TCP/IP protocol suiteAdvantages of TCP/IP components in Windows

A standard, routable enterprise networking protocol that is the most complete and accepted protocol available. All modern operating systems support TCP/IP, and most large private networks rely on TCP/IP for much of their traffic.

TCP/IP components in Windows enable enterprise networking and connectivity for Windows and non-Windows–based computers.

47 Prepared by: MTGuillermo

Page 48: Windows Networking Update3

DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE

Computer and Networking Technology Department

A technology for connecting dissimilar systems. Many TCP/IP application protocols were designed to access and transfer data between dissimilar systems. These protocols include HTTP, FTP, and Telnet.

TCP/IP components in Windows allow standards-based connectivity to other operating system platforms.

A robust, scaleable, cross-platform client/server framework.

TCP/IP components in Windows support the Windows Sockets application programming interface, which developers use to create client/server applications.

A method of gaining access to the Internet. Windows-based computers are Internet-ready.

TOPIC B: UNDERSTANDING IP ADDRESS

IP ADDRESS

A unique identifier for a node or host connection on an IP network A 32 bit binary number usually represented as 4 decimal values consist of 4

octet

48 Prepared by: MTGuillermo

Page 49: Windows Networking Update3

DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE

Computer and Networking Technology Department

Example : 140.179.220.200

Convert to binary

140 179 220 20010001100 10110011 11011100 110010001st octet 2nd octet 3rd octet 4th octet

TWO TYPES OF IP ADDRESS

1. IPv4 – Ex. 192.168.1.2

2. IPv6 - 128 bits long and are represented by 16-bit hexadecimal segments

Ex. 2001:0D02:0000:0000:0000:C003:0001:F00D

Subnet Mask

Applying subnet mask allows to identify the network and host part of the IP address.

Looking at a subnet mask, if there is a 255 in an octet, then the corresponding octet in the IP address is part of the network ID. For example, if I had an IP address of 192.168.1.15 and a subnet mask of 255.255.255.0, the fi rst three octets would make up the network ID and the last octet would be the host ID. The network ID assigns a unique address to the network itself, while the host ID uniquely identifies the system on the network.

Address Classes

Every IP address belongs to a distinct address class. The Internet community defi ned these classes to accommodate networks of various sizes. The class to which the IP address belongs initially determines the network ID and host ID portions of the address,

49 Prepared by: MTGuillermo

Page 50: Windows Networking Update3

DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE

Computer and Networking Technology Department

along with the number of hosts that are supported on that network. The different class addresses are named Class A, Class B, Class C, Class D, and Class E.

Class A Addresses

IP address in which the first octet is between 1 and 126.

IP address that starts with 127 is a class A address as well, but you are not allowed to use any address that starts with 127 because it is reserved for the loopback address

Loopback Address

A range of 127 has been reserved for the loopback address. The loopback address is used to refer to the local system, also known as the local host. If you want to verify that the TCP/IP software has initialized on the local system even though you may not have an IP address, you may PING the loopback address, which is typically referred to as 127.0.0.1.

You can test your own local system by typing ping 127.0.0.1, ping local host, or ping loopback, to verify that the TCP/IP protocol stack is functioning on your system.

Default subnet mask

Class A 255.0.0.0

255 0 0 0NNNNNNNN HHHHHHHH HHHHHHHH HHHHHHHH11111111 00000000 00000000 00000000

Class B Addresses

IP address in which the value of the first octet is between 128 and 191.

50 Prepared by: MTGuillermo

Page 51: Windows Networking Update3

DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE

Computer and Networking Technology Department

Default subnet mask

255.255.0.0

255 255 0 0NNNNNNNN NNNNNNNN HHHHHHHH HHHHHHHH11111111 11111111 00000000 00000000

Class C Addresses

IP address in which the value of the first octet is between 192 and 223.

Default subnet mask

255.255.255.0

255 255 255 0NNNNNNNN NNNNNNNN NNNNNNNN HHHHHHHH11111111 11111111 11111111 00000000

Class D Addresses

Class D addresses are used for special types of applications on the network known as multicasting applications. Multicasting applications send data to a number of systems at the same time by sending data to the multicast address, and anyone who has registered with that address will receive the data. A multicast address is what class D addresses are used for, so you will not be assigning them specifically to hosts on the network for normal network communication. Class D addresses have a value on the first octet that ranges from 224 to 239.

Class E AddressesClass E addresses is that were designed for experimental purposes only, so you will not ever see a class E address on a network. Class E addresses have a first octet with a value that falls in the range of 240 to 254.

51 Prepared by: MTGuillermo

Page 52: Windows Networking Update3

DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE

Computer and Networking Technology Department

Summary

CLASS 1ST Octet Value Default Subnet Mask

Number of Host per Network

CLASS A 1–126 255.0.0.0 16,777,214CLASS B 128–191 255.255.0.0 65,534CLASS C 192–223 255.255.255.0 254CLASS D 224 to 239.CLASS E 240 to 255

Private Addresses

Another type of address you need to be aware of is what is known as a private address. A private address is an address that can be assigned to a system but cannot be used for any kind of Internet connectivity. The private addresses are nonroutable addresses, so any system using them will not be able to function off the network. The following are the three address ranges that are the private address ranges:

■ 10.0.0.0 to 10.255.255.255■ 172.16.0.0 to 172.31.255.255■ 192.168.0.0 to 192.168.255.255

Not being able to route data across the Internet when using these addresses will not pose a problem, because realistically, you will have these private addresses sitting behind a network address translation (NAT) server that will translate the private address to a public address that can be routed on the Internet

Name: ________________________________________________ Section: _______________

52 Prepared by: MTGuillermo

Page 53: Windows Networking Update3

DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE

Computer and Networking Technology Department

ACTIVITY 1: ADDRESS CLASS AND DEFAULT SUBNET MASK IDENTIFICATION

In this activity you will practice identifying address classes for different IP addresses and their associated subnet masks.

I. Address Class Identification

ADDRESS CLASS

1. 192.168.20.10

2. 10.6.5.4

3. 126.12.34.56

4. 223.222.224.34

5. 120.45.78.9

6. 189.45.89.90

7. 220.126.23.45

8. 90.12.34.78

9. 12.23.67.43

10. 15.10.35.7

11. 33.0.0.0

12. 215.23.56.78

13. 249.70.80.9

14. 230.45.90.70

15. 225.225.225.225

16. 190.90.80.70

17. 250.39.87.7

18. 12.34.90.8

19. 198.89.5.8

20. 7.9.0.0

II. Default Subnet Masks

53 Prepared by: MTGuillermo

Page 54: Windows Networking Update3

DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE

Computer and Networking Technology Department

Write the correct subnet mask of each of the ff. addresses.

ADDRESS SUBNET MASK1. 192.168.1.3

2. 200.56.7.8

3. 3.1.2.3

4. 30.45.7.8.9

5. 223.4.5.78

6. 129.45.86.9

7. 190.45.76.8

8. 80.0.0.0

9. 220.45.89.7

10. 123.45.7.8

11. 120.78..45.44

12. 195.45.80.76

13. 10.10.10.10

14. 129.45.7.8

15. 55.12.30.0

TOPIC C: IPv4 CUSTOM SUBNETTING

54 Prepared by: MTGuillermo

Page 55: Windows Networking Update3

DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE

Computer and Networking Technology Department

SUBNETTING

The purpose of subnetting is to break one network ID into multiple subnetworks (subnets) so that you can follow the physical structure of the network.

With subnetting you take host bits from the subnet mask and mask them to be network bits—thus creating more networks but fewer machines per network.

To determine how many bits to take from the host ID portion of the subnet mask.

STEPS IN SUBNETTING

1. Determine the number of networks and convert in to binary.

2. Reserve bits in subnet mask and find your increment

3. Use your increment to find your network ranges

SUBNETTING BASE ON NETWORKS

Given:

IP Address = 216.21.5.0 Default subnet mask = 255.255.255.0 Subnet = 5

1. Determine the number of networks and convert to binary.

Subnet = 5 convert to binary

5 = 101 = 3 bits

2. Reserve bits in subnet mask and find your increment

55 Prepared by: MTGuillermo

Page 56: Windows Networking Update3

DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE

Computer and Networking Technology Department

Default Subnet

255 255 255 0

NNNNNNNN NNNNNNNN NNNNNNNN HHHHHHHHBinary equivalent 11111111 11111111 11111111

ADD THE 3 BITS11100000

Custom Subnet

NNNNNNNN NNNNNNNN NNNNNNNN NNNHHHHH

255 255 255 224The Increment is the lowest network bits

3. Use your increment to find your network ranges.

Add the increment which is 32

Subnet 1 216.21.5.0 to 216.21.5.31

Subnet 2 216.21.5.32 to 216.21.5.63

Subnet 3 216.21.5.64 to 216.21.5.95

Subnet 4 216.21.5.96 to 216.21.5.127

Subnet 5 216.21.5.128 to 216.21.5.159

Invalid IP Address is the first and last IP address of each subnet

1st IP Address – identify the nework/nework ID

Last IP Address – broadcast address

56 Prepared by: MTGuillermo

Page 57: Windows Networking Update3

DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE

Computer and Networking Technology Department

Network ID First Valid Host

Last Valid Host

Broadcast Subnet Mask

Subnet 1 216.21.5.0 216.21.5.1 216.21.5.30 216.21.5.31 255.255.255.224Subnet 2 216.21.5.32 216.21.5.33 216.21.5.62 216.21.5.63 255.255.255.224Subnet 3 216.21.5.64 216.21.5.65 216.21.5.95 216.21.5.96 255.255.255.224Subnet 4 216.21.5.96 216.21.5.96 216.21.5.126 216.21.5.127 255.255.255.224Subnet 5 216.21.5.128 216.21.5.129 216.21.5.158 216.21.5.159 255.255.255.224

Formula to determine the number of networks

Number of networks = 2n

Where n is equal to number of 1’s in the subnet mask

255 255 255 22411111111 11111111 11111111 11100000

Number of networks = 227

= 134,217,728

Formula to determine the number of host

Number of Host = 2n – 2

Where n is equal to the number of O’s in the subnet mask

Number of Host = 25 – 2

= 30

Subtract 2 because the 1st and last IP address is not valid it is used as Nework ID and Broadcast Address

57 Prepared by: MTGuillermo

Page 58: Windows Networking Update3

DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE

Computer and Networking Technology Department

Name: ________________________________________________ Section: _______________

ACTIVTY 2 : IPv4 CUSTOM SUBNETTING

Question No. 1

The network ID of the class A address is 120.0.0.0. Take a few pieces of paper and calculate the new subnet mask, network ID, fi rst valid address, last valid address, and the broadcast address of the four subnets. Once you have calculated your answer, fill in the following table.

Network ID First Valid Host

Last Valid Host

Broadcast Subnet Mask

Subnet 1Subnet 2Subnet 3Subnet 4

Find the total number of networks and number of host.

Question No. 2

You are responsible for subnetting the network ID of 190.34.0.0 into eight subnets. Take some paper and walk through your binary work of subnetting this class B network into eight subnets. Once you have calculated the information on paper, fill in the following table.

Network ID First Valid Host

Last Valid Host

Broadcast Subnet Mask

Subnet 1Subnet 2Subnet 3Subnet 4Subnet 5Subnet 6Subnet 7Subnet 8

58 Prepared by: MTGuillermo

Page 59: Windows Networking Update3

DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE

Computer and Networking Technology Department

Find the total number of networks and number of host.

Question No. 3

Your manager has purchased a class C network range and has asked that you subnet this class C into two subnets for the two network segments that are going to be built. One network segment will host client machines used by customers to do online ordering, and the other segment will host the corporate machines used by your employees.

The class C network ID that you have purchased is 216.83.11.0. Once again, take a piece of paper and start by writing out the default subnet mask of this class C address and then start manipulating the host bits to get the network ID, first valid host ID, last valid host ID, broadcast address, and new subnet mask. Once you have calculated all the required information, fill in the following table:

Network ID First Valid Host

Last Valid Host

Broadcast Subnet Mask

Subnet 1Subnet 2

Find the total number of networks and number of host.

Question No. 4

Subnet this physical network structure.

59 Prepared by: MTGuillermo

Page 60: Windows Networking Update3

DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE

Computer and Networking Technology Department

TOPIC D: INTERNET PROTOCOL VERSION 6

IPv6 (Internet Protocol Version 6)

IPv6 is a new version of IP which is designed to be an evolutionary step from IPv4 The key to IPv6 enhancement is the expansion of the IP address space from 32 bits to

128 bits, enabling virtually unlimited unique IP addresses It is recommended by the Internet Engineering Task Force on July 25, 1994 (Toronto

IETF meeting) The IPv6 has auto configuration feature, automatically configures interface and Brouter

addresses for you IPv6 protocol can coexist with current IPv4 protocol

The IPv6 Address Space

60 Prepared by: MTGuillermo

Page 61: Windows Networking Update3

DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE

Computer and Networking Technology Department

IPv6 Conversion

Hexidecimal to Binary Conversion

Pv6 FeaturesThe following are the features of the IPv6 protocol:

New header format

Large address space

Efficient and hierarchical addressing and routing infrastructure

Stateless and stateful address configuration

Built-in security

Better support for prioritized delivery

New protocol for neighboring node interaction

Extensibility

IPv6 Implementations from MicrosoftMicrosoft® has the following implementations of IPv6:

The Next Generation TCP/IP stack in Windows Vista™ and Windows Server® 2008.

The IPv6 protocol for the Windows Server 2003 family.

The IPv6 protocol for Windows® XP Service Pack 1 (SP1) and later.

The IPv6 protocol for Windows CE .NET version 4.1 and later.

The capture and parsing of IPv6 traffic is supported by Microsoft Network Monitor.

61 Prepared by: MTGuillermo

Page 62: Windows Networking Update3

DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE

Computer and Networking Technology Department

For all the IPv6 implementations from Microsoft, you can use IPv6 without affecting IPv4 communications.

IPv6 address notation

There are three possible notation types that can be used to represent IPv6 addresses. The notation you use depends on the content of the address you want to represent.

1. Standard notation The standard notation for IPv6 addresses is to represent the address as eight 16-bit hexadecimal words separated by ``:'' (colons). For example:

FEDC:BA98:0332:0000:CF8A:000C:2154:7313

NOTE: It is not necessary to specify leading zeros, as long as there is at least one numeric value in each field of the address. The above address could also be represented as FEDC:BA98:332:0:CF8A:C:2154:7313.

2. Compressed notation Since a large number of IPv6 addresses contain multiple fields of zeros, there is a notation you can use to represent a single contiguous group of zero fields within an IPv6 address. This notation is a double colon ``::''. Some examples of how to use the ``::'' are shown below.

1762:0:0:0:0:B03:1:AF18 FF01:0:0:0:CA:0:0:2 0:0:0:0:0:0:0:1 0:0:0:0:0:0:0:0

can be represented as:

1762::B03:1:AF18 FF01::CA:0:0:2 ::1 ::

NOTE: The FF01:0:0:0:CA:0:0:2 example is represented as FF01::CA:0:0:2 because only one ``::'' is allowed in an address.

62 Prepared by: MTGuillermo

Page 63: Windows Networking Update3

DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE

Computer and Networking Technology Department

3. Mixed notation IPv4 addresses that are encapsulated in IPv6 addresses can be represented using the original IPv4 ``.'' notation as follows:

0:0:0:0:0:0:127.32.67.15 0:0:0:0:0:FFFF:127.32.67.15

It is also possible to use the compressed notation, so the addresses above would be represented as: ::127.32.67.15 ::FFFF:127.32.67.15

IPv6 PrefixesThe prefix is the part of the address that indicates the bits that have fixed values or are the bits of the subnet prefix. Prefixes for IPv6 subnets, routes, and address ranges are expressed in the same way as Classless Inter-Domain Routing (CIDR) notation for IPv4. An IPv6 prefix is written in

address/prefix-length notation. For example, 21DA:D3::/48 and 21DA:D3:0:2F3B::/64 are IPv6 address prefixes.

IPv6 Subnet Masking

What Gets Masked (Which Bits?)Like IPv4, an IPv6 address has a network portion and a device portion. Unlike IPv4, an IPv6 address has a dedicated subnetting portion. Here's how the ranges are divided in IPv6:

Network Address RangeIn IPv6, the first 48 bits are for Internet routing.1111111111111111.1111111111111111.1111111111111111.0000000000000000.0000000000000000.0000000000000000.0000000000000000.0000000000000000

Subnetting RangeThe 16 bits from the 49th to the 54th are for defining subnets.0000000000000000.0000000000000000.0000000000000000.1111111111111111.0000000000000000.0000000000000000.0000000000000000.0000000000000000

Device (Interface) Range:The last 64 bits are for device (interface) ID's.

63 Prepared by: MTGuillermo

Page 64: Windows Networking Update3

DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE

Computer and Networking Technology Department

0000000000000000.0000000000000000.0000000000000000.0000000000000000.1111111111111111.1111111111111111.1111111111111111.1111111111111111

Let's say you want to break your corporate network into 64 subnets. The binary mask just for the subnetting range would be1111110000000000 which translates to a hex value of FC00. Some IPv6 masking tools will work with just this one hex word, otherwise a full 128-bit hex mask would be FFFF:FFFF:FFFF:FC00:0:0:0:0.

Types of IPv6 Addresses

1. Unicast - communicate specified 1 computer

2. Multicast - communicate group of computers

3. Anycast send group address that can receive multiple computers,but receive 1 computer

Unicast IPv6 AddressesThe following types of addresses are unicast IPv6 addresses:

Global unicast addresses

Global unicast addresses are equivalent to public IPv4 addresses. They are globally routable and reachable on the IPv6 portion of the Internet.

Link-local addresses

Link-local addresses are used by nodes when communicating with neighboring nodes on the same link. For example, on a single link IPv6 network with no router, link-local addresses are used to communicate between hosts on the link.

Site-local addresses

Site-local addresses are equivalent to the IPv4 private address space (10.0.0.0/8, 172.16.0.0/12, and 192.168.0.0/16).

Unique local IPv6 unicast addresses

Special addresses

64 Prepared by: MTGuillermo

Page 65: Windows Networking Update3

DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE

Computer and Networking Technology Department

Special IPv6 AddressesThe following are special IPv6 addresses:

Unspecified address

The unspecified address (0:0:0:0:0:0:0:0 or ::) is only used to indicate the absence of an address.

Loopback address

The loopback address (0:0:0:0:0:0:0:1 or ::1) is used to identify a loopback interface, enabling a node to send packets to itself.

Compatibility AddressesTo aid in the migration from IPv4 to IPv6 and the coexistence of both types of hosts, the following addresses are defined:

IPv4-compatible address

The IPv4-compatible address, 0:0:0:0:0:0:w.x.y.z or ::w.x.y.z (where w.x.y.z is the dotted decimal representation of an IPv4 address), is used by IPv6/IPv4 nodes that are communicating using IPv6.

IPv4-mapped addressThe IPv4-mapped address, 0:0:0:0:0:FFFF:w.x.y.z or ::FFFF:w.x.y.z, is used to represent an IPv4-only node to an IPv6 node. It is used only for internal representation.

6 to 4 address

The 6to4 address is used for communicating between two nodes running both IPv4 and IPv6 over an IPv4 routing infrastructure. The 6to4 address is formed by combining the prefix 2002::/16 with the 32 bits of a public IPv4 address, forming a 48-bit prefix. 6to4 is a tunneling technique described in RFC 3056.

IPv4 Addresses and IPv6 EquivalentsIPv4 Address IPv6 Address

Internet address classes Not applicable in IPv6Multicast addresses (224.0.0.0/4) IPv6 multicast addresses (FF00::/8)Broadcast addresses Not applicable in IPv6

65 Prepared by: MTGuillermo

Page 66: Windows Networking Update3

DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE

Computer and Networking Technology Department

Unspecified address is 0.0.0.0 Unspecified address is ::Loopback address is 127.0.0.1 Loopback address is ::1Public IP addresses Global unicast addressesPrivate IP addresses (10.0.0.0/8, 172.16.0.0/12, and 192.168.0.0/16)

Site-local addresses (FEC0::/10)

Autoconfigured addresses (169.254.0.0/16) Link-local addresses (FE80::/64)

Text representation: Dotted decimal notation Text representation: Colon hexadecimal format with suppression of leading zeros and zero compression. IPv4-compatible addresses are expressed in dotted decimal notation.

Network bits representation: Subnet mask in dotted decimal notation or prefix length

Network bits representation: Prefix length notation only

DNS name resolution: IPv4 host address (A) resource record

DNS name resolution: IPv6 host address (AAAA) resource record

DNS reverse resolution: IN-ADDR.ARPA domain

DNS reverse resolution: IP6.ARPA domain

Name: ________________________________________________ Section: _______________

ACTIVITY 3: IPv6 Address Notation Exercise

In case multiple answers are possible, please circle all correct ones.

1. You have a /32 prefix starting with 2001:0db8. How do you search for it in the RIPE Database?

A. 2001:0db8 B. 2001:0db8/32 C. 2001:0db8::/32 D. 2001:db8::/32

2. How do you correctly compress the following IPv6 address:2001:0db8:0000:0000:0000:0000:0000:0c50

A.2001:0db8:0:0:0:0:0:0c50 B.2001:0db8::0c50 C.2001:db8::c50 D.2001:db8::c5

66 Prepared by: MTGuillermo

Page 67: Windows Networking Update3

DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE

Computer and Networking Technology Department

3. How do you correctly compress the following IPv6 address:2001:0db8:0000:0000:b450:0000:0000:00b4

A.2001:db8::b450::b4 C.2001:db8::b45:0000:0000:b4

B.2001:db8::b450:0:0:b4 D.2001:db8:0:0:b450::b4

4. How do you correctly compress the following IPv6 address:2001:0db8:00f0:0000:0000:03d0:0000:00ff

A.2001:0db8:00f0::3d0:0:00ff C.2001:db8:f0::3d0:0:ff

B.2001:db8:f0:0:0:3d0:0:ff D.2001:0db8:0f0:0:0:3d0:0:0ff

5. How do you correctly compress the following IPv6 address:2001:0db8:0f3c:00d7:7dab:03d0:0000:00ff

A.2001:db8:f3c:d7:7dab:3d:0:ff C.2001:db8:f3c:d7:7dab:3d0::ff

B.2001:db8:f3c:d7:7dab:3d0:0:ff D.2001:0db8:0f3c:00d7:7dab:03d::00ff

ACTIVITY: Enable IPv6 to WinXP

There are two alternative methods for activation IPv6 in WinXP (SP2)

Use the WinXP GUI to install the new protocol

67 Prepared by: MTGuillermo

Page 68: Windows Networking Update3

DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE

Computer and Networking Technology Department

From a CLI run “ipv6 install”

CHAPTER 5: NETWORK ON A WORKGROUP USING WINDOWS XP

OBJECTIVE:

Setting up a workgroup

68 Prepared by: MTGuillermo

Page 69: Windows Networking Update3

DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE

Computer and Networking Technology Department

Troubleshoot TCP/IP

Manage Connection

Configure Network Bridges

Mapped Network Drive

OUTLINE

A. Types of WorkgroupB. Setting up a Workgroup

C. Configuring Network Bridges

D. Managing Connection

E. Configuring TCP/IP

F. Troubleshooting Connections

G. Mapping Network Drives

ACTIVITY: Activity 1: Building Peer to Peer using Switch

Activity 2: Setting up NetMeetingActivity 3: Internet Café Software InstallationActivity 4: Building a Network using 4 switch (Use Packet Tracer)

TOPIC A: TYPES OF WORKGROUPS

Workgroup

A group of computers that are connected on a network and share resources, such as printers and files. When you set up a network, Windows automatically creates a

69 Prepared by: MTGuillermo

Page 70: Windows Networking Update3

DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE

Computer and Networking Technology Department

workgroup and gives it a name.

TYPES OF WORKGROUP

1. Direct Cable ConnectionA Direct Cable Connection (DCC) is not really a workgroup configuration in the true sense of the word, but it does bear mentioning here because it is a quick and easy method to connect two computers together.

Using a DCC, you can establish a connection between a Windows XP computer and any other Microsoft Windows computer that supports DCC connections.

2. EthernetEthernet is a networking standard and the most popular kind of network in usetoday. When you think of a network with a typical wired configuration, you aregenerally thinking of Ethernet.

3. HomePNAHomePNA is another type of network topology that is designed for home use, but itworks well in small offices too. HomePNA networks use typical PCI or USB NICs,but each NIC connects to a standard phone jack in the home or small office using astandard RJ-11 phone cable. Rather than using a hub and having wiring runningeverywhere, you simply use existing phone lines as the network.

4. Wireless Networks

Major Type of Wireless Network

1. Infrared—Infrared wireless uses an infrared beam to transmit data from one device to the next, and is most often used in PC devices.

2. Wireless Personal Area Networks (WPANs)—A WPAN is a personal areanetwork, meaning it resides in one generalized space, such as a room.

3. Wireless Local Area Networks (WLANs)—A WLAN is a wireless network that exists within one geographic location, such as in a home, office building, school, or other such structure.

70 Prepared by: MTGuillermo

Page 71: Windows Networking Update3

DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE

Computer and Networking Technology Department

4. Wireless Metropolitan Area Networks (WMANs)—WMANs allow communicationbetween different locations within a single metropolitan area.

5. Wireless Wide Area Networks (WWANs)—A WWAN connects WLANs that are separated over wide geographic areas.

TOPIC B: Setting up a Workgroup

71 Prepared by: MTGuillermo

Page 72: Windows Networking Update3

DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE

Computer and Networking Technology Department

Creating a workgroup

A. 1ST Method

1. Click the Start button and then click Control Panel

2. Double click System icon of control panel

A view of System Properties

3. Click the Computer Name Tab

72 Prepared by: MTGuillermo

Page 73: Windows Networking Update3

DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE

Computer and Networking Technology Department

4. Click button to change current computer name and workgroup

5. To join an existing workgroup, type the name of the workgroup that you want to join, andthen click OK.

6. To create a new workgroup, type the name of the workgroup that you want to create, andthen click OK.

Notes Assign each computer a

different, meaningful name. Assign each computer to the

same workgroup.

7. Click OK

8. To restart your computer click YES.

9. You have successfully created or joined a workgroup.

73 Prepared by: MTGuillermo

Page 74: Windows Networking Update3

DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE

Computer and Networking Technology Department

B. 2ND Method

1. Right-click my computer icon and choose properties.

2. Click COMPUTER NAME TAB THEN CLICK CHANGE BUTTON

Type Computer Name.

Example : Station1

Click Workgroup

Type the Workgroup name

Example: Networking

3. Click Ok

74 Prepared by: MTGuillermo

Page 75: Windows Networking Update3

DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE

Computer and Networking Technology Department

Files and Folders Sharing

Network users can access the files and folders that are shared. Resources that are not set up for sharing remain private. For example, you can enable the following resources for sharing:

Folders Drives Printers Internet access

Sharing files and folders

1. Locate the file and folder which you want to share

2. Right-click the file that you want to share, and then click Sharing and Security to view additional settings.

3. Remote access is turned off by default. Click the Security warning message:If you understand the security risks but want to share files without running the wizard, click here.

75 Prepared by: MTGuillermo

Page 76: Windows Networking Update3

DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE

Computer and Networking Technology Department

4. Select Just enable file sharing and click OK

5. Click Share this folder on the network, and then type a share name. You can use this name later to access the data. You can Allow network users to change files by enabling it.Click OK

Notes: The share name and the folder name do not have to be the same.

6. The shared folder will appear like this (with a hand under the folder)

76 Prepared by: MTGuillermo

Page 77: Windows Networking Update3

DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE

Computer and Networking Technology Department

7. You have successfully shared a folder.

Name: ________________________________________________ Section: _______________

Activity 2: Building a Switch Based Network

Objectives

Design and build a simple peer-to-peer network using a straight through cable supplied by the instructor.Verify connectivity between the peers using the ping command.File and Printer Sharing

Background / Preparation

In this hands-on lab, you will plan and build a simple network using switch, PCs and an Ethernet straight through cable.

The following resources are required:

Four Window XP Professional PCs, each with an installed and functional Network Interface Card (NIC)An Ethernet straight through cableSwitch

Diagram:

77 Prepared by: MTGuillermo

Page 78: Windows Networking Update3

DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE

Computer and Networking Technology Department

Procedure:

1. Connect PCs to a SWITCH as shown in the diagram. What cable type is used?

2. How would you know if you have connectivity?

3. If you do not have connectivity check the following:d. Switch/PC powered on?

e. Correct cables used?

4. From your command prompt, ping the IP address of another PC.

a. Are pings between other PC’s also seen? ___________________________________

b. What is the average time for a ping? ______________________________________

78 Prepared by: MTGuillermo

Page 79: Windows Networking Update3

DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE

Computer and Networking Technology Department

c. Which is faster hub or switch? ___________________________________________

5. Can you ping the switch? Why not? ________________________________________________________________________

6. Connect and share the printer in PC 1

7. Create a document, share and print.

79 Prepared by: MTGuillermo