Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 166

MODULE 2: SETTING-UP COMPUTER NETWORKS

Source: Interdisciplinary Mechatronics Structure (Craig)


EXPECTED LEARNING OUTCOMES
At the end of the module, you should be able to:

LO1. install network cables;


LO2. set network configuration;
LO3. set router/Wi-fi/wireless access point/repeater
configuration; and
LO4. inspect and test the configured computer networks
PRE-ASSESSMENT
Let us determine how much you already know about installing
mechatronic devices. Read and analyze each statement carefully.
Choose the best answer and write only the letter of your answer on
your answer sheet.

1. This term comes from the Greek word that means “air, wind or
breath, and movement.”
a. hydraulic
b. motor control
c. pneumatic
d. programmable logic control

2. This is a mechatronics system that deals with the study of liquids


in motion and pressure in pipes and cylinders.
a.actuator
b.hydraulic
c.motor control
d.pneumatic

3. This is a component of the pneumatic system used to control the


direction, flow rate, and pressure of compressed air.
a. air filter
b. pressure switch
c. reservoir
d. valve

4. This is a combination of mechanisms and electronics.


a. auto mechanics
b. electronics
c. mechanics
b. mechatronics
Lesson 2.1: Setting-Up Computer Network
 Check network connectivity of each terminal in accordance
with network design;

 Diagnose and repair any problem or fault in the network


system in line with standard operating procedures; and

 Configure Network Interface Card (NIC) in accordance with


the network design

DEFINITION OF TECHNICAL TERMS


Actuator. The component that delivers the mechanical power
that was converted either from an electric, hydraulic, or
pneumatic power source.

Air compressor. A machine that is used to compress the fresh air


drawn from the atmosphere.

Communication. The sharing of information between two or more


individuals or groups to reach a common understanding.

Hydraulic. The branch of science that deals with the study and
use of liquids as related to the mechanical aspects of physics.
LESSON INFORMATION 2.1.1
NETWORK DESIGN

After reading this Information Sheet, you should be able to:

1.Identify the five types of network topology


2.Determine the advantages and disadvantages of each type
of network topology.

5 TYPES OF NETWORK TOPOLOGY

Star network, star topology is one of the most common


network setups. In this configuration, every node connects
to a central network device, like a hub, switch, or computer.
The central network device acts as a server and the
peripheral devices act as clients. Depending on the type
of network card used in each computer of the star topology,
a coaxial cable or an RJ-45 network cable is used to con

Advantages of star topology

Centralized management of the network, through the use of


the central computer, hub, or switch.

Easy to add another computer to the network.

If one computer on the network fails, the rest of the network


continues to function normally.

Disadvantages of star topology


May have a higher cost to implement, especially when using
a switch or router as the central network device.

The central network device determines the performance and


number of nodes the network can handle.

If the central computer, hub, or switch fails, the entire


network goes down and all computers are disconnected
from the network.

Advantages of star topology

Centralized management of the network, through the use of


the central computer, hub, or switch.

Easy to add another computer to the network.

If one computer on the network fails, the rest of the network


continues to function normally.

Disadvantages of star topology

May have a higher cost to implement, especially when using


a switch or router as the central network device.

The central network device determines the performance and


number of nodes the network can handle.

If the central computer, hub, or switch fails, the entire


network goes down and all computers are disconnected
from the network.

Bus topology is a network setup in which each computer


and network device are connected to a single cable
or backbone. Depending on the type of network card used in
each computer of the bus topology, a coaxial cable or an RJ-
45 network cable is used to connect them together.
Advantages of bus topology

It works well when you have a small network.


It's the easiest network topology for connecting computers
or peripherals in a linear fashion.
It requires less cable length than a star topology.

Disadvantages of bus topology

It can be difficult to identify the problems if the whole


network goes down.
It can be hard to troubleshoot individual device issues.
Bus topology is not great for large networks.
Terminators are required for both ends of the main cable.
Additional devices slow the network down.
If a main cable is damaged, the network fails or splits into
two.

A ring topology is a network configuration in which device


connections create a circular data path. Each networked
device is connected to two others, like points on a circle.
Together, devices in a ring topology are referred to as a ring
network.

In a ring network, packets of data travel from one device to


the next until they reach their destination. Most ring
topologies allow packets to travel only in one direction,
called a unidirectional ring network. Others permit data to
move in either direction, called bidirectional.

Ring topology history

In the past, the ring topology was most commonly used in


schools, offices, and smaller buildings where networks were
smaller. However, today, the ring topology is seldom used,
having been switched to another type of network
topology for improved performance, stability, or support.

Advantages of ring topology


All data flows in one direction, reducing the chance of
packet collisions.

A network server is not needed to control network


connectivity between each workstation.

Data can transfer between workstations at high speeds.

Additional workstations can be added without impacting


performance of the network.

Mesh A network setup where each computer and network


device is interconnected with one another, allowing for most
transmissions to be distributed even if one of the
connections go down. It is a topology commonly used
for wireless networks.

Advantages of a mesh topology

Manages high amounts of traffic, because multiple devices


can transmit data simultaneously.

A failure of one device does not cause a break in the


network or transmission of data.

Adding additional devices does not disrupt data


transmission between other devices.

Disadvantages of a mesh topology

The cost to implement is higher than other network


topologies, making it a less desirable option.
Building and maintaining the topology is difficult and time
consuming.

The chance of redundant connections is high, which adds to


the high costs and potential for reduced efficiency.

5. A hybrid topology is a type of network topology that uses


two or more differing network topologies. These topologies
include a mix of bus topology, mesh topology, ring
topology, star topology, and tree topology.

Advantages of Hybrid Network Topology

1). Reliable : Unlike other networks, fault detection and


troubleshooting is easy in this type of topology. The part in
which fault is detected can be isolated from the rest of
network and required corrective measures can be taken,
WITHOUT affecting the functioning of rest of the network. 
2) Scalable: Its easy to increase the size of network by
adding new components, without disturbing existing
architecture.

3) Flexible: Hybrid Network can be designed according to


the requirements of the organization and by optimizing the
available resources. Special care can be given to nodes
where traffic is high as well as where chances of fault are
high. 
4) Effective: Hybrid topology is the combination of two or
more topologies, so we can design it in such a way that
strengths of constituent topologies are maximized while
there weaknesses are neutralized. For example we saw Ring
Topology has good data reliability (achieved by use of
tokens) and Star topology has high tolerance capability (as
each node is not directly connected to other but through
central device), so these two can be used effectively in
hybrid star-ring topology. 

Disadvantages of Hybrid Topology

1)  Complexity of Design: One of the biggest drawback of


hybrid topology is its design. Its not easy to design this type
of architecture and its a tough job for designers.
Configuration and installation process needs to be very
efficient.
2)  Costly Hub: The hubs used to connect two distinct
networks, are very expensive. These hubs are different from
usual hubs as they need to be intelligent enough to work
with different architectures and should be function even if a
part of network is down.

3)  Costly Infrastructure: As hybrid architectures are


usually larger in scale, they require a lot of cables, cooling
systems, sophisticate network devices, etc.

SELF CHECK 2.1


1.___________ is one of the most common network setups. In
this configuration, every node connects to a central network
device, like a hub, switch, or computer. The central network
device acts as a server and the peripheral devices act
as clients. Depending on the type of network card used in
each computer of the star topology, a coaxial cable or
an RJ-45 network cable is used to con

2.____________ is a network setup in which each computer


and network device are connected to a single cable
or backbone. Depending on the type of network card used in
each computer of the bus topology, a coaxial cable or an RJ-
45 network cable is used to connect them together.

3.__________ is a network configuration in which device


connections create a circular data path. Each networked
device is connected to two others, like points on a circle.

4.__________ A network setup where each computer and


network device is interconnected with one another, allowing
for most transmissions to be distributed even if one of the
connections go down. It is a topology commonly used
for wireless networks.

5.____________ is a type of network topology that uses two


or more differing network topologies. These topologies
include a mix of bus topology, mesh topology, ring
topology, star topology, and tree topology.

ANSWER KEY 2.1

1.Star Topology 
2.Bus Topology 
3. Ring Topology 
4. Mesh Topology
5. Hybrid Topology

INFORMATION SHEET 2.2

SUBNETTING

is the strategy used to partition a single physical network


into more than one smaller logical sub-networks (subnets).
An IP address includes a network segment and a host
segment. Subnets are designed by accepting bits from the IP
address's host part and using these bits to assign a number
of smaller sub-networks inside the original network.
Subnetting allows an organization to add sub-networks
without the need to acquire a new network number via the
Internet service provider (ISP). Subnetting helps to reduce
the network traffic and conceals network complexity.
Subnetting is essential when a single network number has
to be allocated over numerous segments of a local area
network (LAN).Subnets were initially designed for solving
the shortage of IP addresses over the Internet 

Each IP address consists of a subnet mask. All the class


types, such as Class A, Class B and Class C include the
subnet mask known as the default subnet mask. The
subnet mask is intended for determining the type and
number of IP addresses required for a given local network.
The firewall or router is called the default gateway. The
default subnet mask is as follows:

Class A: 255.0.0.0

Class B: 255.255.0.0

Class C: 255.255.255.0

The subnetting process allows the administrator to divide a


single Class A, Class B, or Class C network number into
smaller portions. The subnets can be subnetted again into
sub-subnets.
Dividing the network into a number of subnets provides the
following benefits:

Reduces the network traffic by reducing the volume of


broadcasts

Helps to surpass the constraints in a local area network


(LAN), for example, the maximum number of permitted
hosts.

Enables users to access a work network from their homes;


there is no need to open the complete network.

5 Different Classes of IP Address Explained with Examples,


Range, Uses

Internet Protocol (IP) is a network layer, host-to-host


delivery protocol. It means it delivers a packet from one host
to the other with no knowledge about the ports within the
host.

It is a connection-less protocol that makes it unreliable.


Hence, it is often clubbed with TCP. TCP is a reliable
protocol from the transport layer.

There are two versions of IP address. These are IPv4 and


IPv6.

An IP address uniquely identifies each host and router. This


IP address is 32 bits long.

One of the usual IP addresses that we see.

For example, 145.10.34.3.

This address is a 32-bit address represented within the


system in binary form:
10010001.00001010.00100010.00000011

An IP address format is usually divided into two parts:


Network ID: To uniquely identify the network to which the
host belongs.

Host ID: To uniquely identify the host in a particular


network.

Two hosts in the same network have the same network ID


part but different host ID part.

On the basis of this division, IP addresses are classified into


various classes.

Class A:

This Class IP address always has its first bit as 0, next 7


bits as a network address and following 24 bits as the host
address.

The range of IP addresses is 0.0.0.0 to 127.255.255.255.

This means that it allows 2^7 networks and 2^24 hosts per
network.

This class of IP address is used for the very large network.


Ex. Big Organisation

Class B:

Class B IP address always has its first bits as 10, next 14


bits as a network address and following 16 bits as the host
address.

The range of IP addresses is 128.0.0.0 to 191.255.255.255.

This means that it allows 2^14 networks and 2^16 hosts


per network.

This class of IP address is used for a medium network like


multinational companies.

Class C:
Class C IP address always has its first bits as 110, next 21
bits as a network address and following 8 bits as the host
address.

The range of IP addresses is the first block from 192.0.0.0 to


192.0.0.255 and last block from 223.255.255.0 to
223.255.255.255.

This means that it allows 2^21 networks and 2^8 hosts per
network.

This class is used for a small network such as small


companies or colleges.

Class D:

Class C IP address always has its first bits as 1110.

There is no segregation of host and network addresses.

It allows multicast which means a datagram directed to


multiple hosts.

Class E:

The address begins with 1111.

It is reserved for future use, research, and development


purpose.

We can use IP address class A, B, and C for subnetting and


supernetting in a computer network.

IP Address Classes Range:

Summarizing different classes of IP address with its range


and applications:

IP Address RangeStart- Application /


Class (Theoretical) Bits Used for

A 0.0.0.0 to0 Very large


127.255.255.255 networks

128.0.0.0 to Medium
B 191.255.255.255 10 networks

192.0.0.0 to
C 223.255.255.255 110 Small networks

224.0.0.0 to
D 239.255.255.255 1110 Multicast

240.0.0.0 to
E 247.255.255.255 1111 Experimental

IP address ranges for a different class in the table are


theoretically calculated. There are some special IP addresses
which are reserved for a special purpose.

Suppose,

IP addresses having all zero’s or one’s either in the network


id or host id are ruled out from all the IP address classes.
These IP addresses are used for a special purpose.

SELF CHECK 2.2

1-5 Enumerate the 5 Class of network


ANSWER KEY 2.2

A 0.0.0.0 to 127.255.255.255

B 128.0.0.0 to 191.255.255.255

C 192.0.0.0 to 223.255.255.255

D 224.0.0.0 to 239.255.255.255

E 240.0.0.0 to 247.255.255.255

INFORMATION SHEET 2.3


CONFIGURE NETWORK INTERFACE CARD SETTINGS

This panel allows you to configure the speed and duplex


settings for the Network Interface Cards (NIC) that have
been enabled in the server. MSL supports the following
combinations of NICs:  

a "Local" adaptor for connection to the Local Area Network


(LAN-only mode) or

a "Local" adaptor for connection to the Local Area Network


AND a "WAN" adapter for connection to the Wide Area
Network (Network Edge mode) or

a "Local" adaptor for connection to the Local Area Network


AND a "WAN" adapter for connection to the Wide Area
Network AND a “WAN” adapter bridged to the WAN interface
of the firewall (Server-gateway with bridged interface mode).

To configure the Speed and Duplex settings of a NIC:

Note: For virtual deployments, the fields are read-only. You


cannot configure the settings from this page.

Under Configuration, click Ethernet Cards.

Set the Auto Configuration field to Off, and then


click Save.

Set the Speed and Duplex parameters, and then click Save.


All other settings are read only. See the following table for
descriptions of the settings.
Note: Speed and Duplex are read only if the Ethernet card
does not support multiple options.

Setting Description

Link Yes: NIC is connected to the network.


detected No: NIC is not connected to the network.

MAC Media Access Control address of the Network


Address Interface Card

Driver (for example: tg3) of the Network


Driver
Interface Card.

Data transfer rate. Available settings are


Speed determined by the Ethernet card. Only
supported settings are displayed.

Half-duplex: uses only one wire pair with a


digital signal running in both directions on the
wire.

Full-duplex: uses two pairs of wires to


Duplex establish a point-to-point connection between
the transmitter of the transmitting device and
the receiver of the receiving device. Full-
duplex data transfer provides faster data
transmissions than half duplex.

Auto Auto Negotiation is an Ethernet process that


Negotiation allows two connected devices to choose
common transmission parameters, such as
speed, duplex mode, and flow control. During
this process, the connected devices first share
these parameters and then choose the fastest
transmission mode they both support.

Select On to apply Auto Negotiation;


select Off to configure the Speed and Duplex
settings.

INFORMATION SHEET 2.4

Networking cables 

are networking hardware used to connect one network


device to other network devices or to connect two or more
computers to share printers, scanners etc. 

What Twisted Pair Is Like and Its Cabling Standards

Twisted pair cabling is a type of wiring in which two


conductors (usually copper) of a single circuit are twisted
together. Why are the pairs twisted together? Because the
two wires are carrying equal and opposite signals, one pair
can induce crosstalk in another and the effect gets stronger
along the length of the cable, which is bad for the
transmission of signal. Twisting the pairs reduce the
crosstalk between lines. Twisted pair cabling is often used
in data networks for short and medium length connections
because of its relatively lower costs compared to optical fiber
and coaxial cable.

Shielded Twisted Pair vs. Unshielded Twisted Pair

Twisted pair network cables are often shielded in an attempt


to prevent electromagnetic interference. Twisted pair with
shielding are known as shielded twisted pair (STP). In
contrast to STP, unshielded twisted pair (UTP) is not
surrounded by any shielding.

STP cable is also divided by overall shield and individual


shield. Individual shielded twisted pair is with aluminum
foil for each twisted pair or quad. This type of shielding
protects cable from external electromagnetic interference
(EMI) entering or exiting the cable and also protects
neighboring pairs from crosstalk. Overall shielded twisted
pair is with overall foil or braided shield across all of the
pairs within the 100 Ω twisted pair cable. This type of
shielding helps prevent EMI from entering or exiting the
cable. One STP cable can have both overall and individual
shielding.

Figure 1: shielded twisted pair construction.

UTP cable without shielding is more prone to outside


interference. For this reason, this cable type is more often
found in indoor telephone applications. Outdoor telephone
cables contain hundreds or thousands pairs. Pairs that
have the same twisted rate within the cable can experience
some degree of crosstalk, so wire pairs are usually selected
carefully within a large cable to reduce the crosstalk.
Most UTP cable uses RJ45 connectors, which look like
telephone connectors (RJ11) but have eight wires instead of

four.

Figure 2: RJ45 connector (up) and RJ45 adaptor (up).

The Nearest Twisted Pair to Us: Ethernet Cable

Ethernet cable is a typical type of twisted pairs, and


probably the most familiar one to us. The following table
gives the basic information of some network cable types.

Table 1: twisted pair Ethernet cable types.


Typical
Bandwidt
Name Constructio Applications
h
n

10BASE-T and 100BASE-T4


Cat 3 UTP 16 MHz
Ethernet

Cat 4 UTP 20 MHz 16Mbit/s Token Ring

100BASE-TX & 1000BASE-T


Cat 5 UTP 100 MHz
Ethernet

Cat 100BASE-TX & 1000BASE-T


UTP 100 MHz
5e Ethernet

Cat 6 STP 250 MHz 10GBASE-T Ethernet

Cat
STP 500 MHz 10GBASE-T Ethernet
6a

10GBASE-T Ethernet or
Cat 7 STP 600 MHz POTS/CATV/1000BASE-T
over single cable

10GBASE-T Ethernet or
Cat
STP 1000 MHz POTS/CATV/1000BASE-T
7a
over single cable

40GBASE-T Ethernet or
Cat 1600-
STP POTS/CATV/1000BASE-T
8/8.1 2000 MHz
over single cable

40GBASE-T Ethernet or
Cat 1600-
STP POTS/CATV/1000BASE-T
8.2 2000 MHz
over single cable

Twisted Pair Cabling: T568A or T568B?


Two wiring standards are commonly used with twisted pair
cabling: T568A and T568B. These are telecommunications
standards from TIA and EIA that specify the pin
arrangements for the connectors (often RJ45) on UTP or STP
network cables. The number 568 refers to the order in
which the wires within the twisted pair cable are terminated
and attached to the connector. The signal is identical for
both.

Pin numbers are read left to right, with the connector tab
facing down. Notice that the pin-outs stay the same, and the
only difference is in the color coding of the wiring.

Figure 3: T568A and T568B wiring standards for twisted


pair cabling.

Coaxial Cable: Not Just a Video Cable


Coaxial cable is a type of cable that has an inner conductor
surrounded by a tubular insulating layer, surrounded by a
tubular conducting shield. The inner conductor and the

outer shield share a geometric axis. Many coaxial cable has


an insulating outer sheath or jacket.

Figure 4: coaxial cable construction.

Why Is Coaxial Cable Good for Radio Transmission?

Coaxial cable is used as a transmission line for radio


frequency (RF) signals. Its applications include feedlines
connecting radio transmitters and receivers with their
antennas, computer network connections, digital audio, and
distributing cable television signals. Coaxial cable has an
obvious advantage over other types of radio transmission
line. In a good coaxial cable, the electromagnetic field
carrying the signal exists only in the space between the
inner conductor and the outer conducting shield. For this
reason, coaxial cables are allowed to be installed next to
metal objects without power losses that occur in other types
of radio transmission line.

Widely Used Coaxial Connector Types

Many ethernet cable connector types are available in the


audio, digital, video, RF and microwave industries, each
designed for a specific purpose and application. One
consideration the number of connect-disconnect cycles that
a connector pair could withstand while still performing as
expected. Here are some common coaxial connector types.

Connector Other Maximum Fre


Female Male
Type Name Application

250 MHz to 1 G
“F” series connec
Type F Video primarily utiliz
television cable
antenna applicatio

12 GHz or more.
connector was o
designed for
systems operating
Type N / GHz, later improv
GHz and higher.
connectors follo
military standard
39012.

100 kHz or less


Phone with the name
TS,
plugs and phone plug is th
TRS
jacks connector, a phon
the female connect
10 MHz. A round
Phono
on connector co
plugs
RCA used for consum
and
audio and compos
jacks
connections.

.5 GHz. A relativ
connector used p
as an interconn
7/16 DIN / cellular and ot
called “w
applications, espec
towers.

18 GHz. The ge
APC-7 (Am
Precision Connec
mm) offers the
reflection coefficie
APC-7 7 mm same
most re
measurement of
GHz connectors,
used for metrolo
calibration.

Table 2: coaxial connector types.

The Capable Optical Fiber Cable

Optical fiber cabling is an excellent transmission medium


for its high data capacity and supported long distances. It is
indispensable in any fiber optic network. It has a fiber/glass
core within a rubber outer coating and uses beams of light
rather than electrical signals to relay data. Because light
doesn't diminish over distance the way electrical signals do,
this cabling can run for distances measured in kilometers
with transmission speeds from 10 Mbps up to 100 Gbps or
higher.

Figure 5: optical fiber cable cutaway.

The Fiber Core Size Matters: SMF and MMF

The inner fiber can be either single mode or multimode.


Generally, a single mode fiber core is 9/125µm wide,
whereas a multimode fiber core can be 62.5/125µm or
50/125µm wide. Only the early OM1 is 62.5/125µm fiber,
the later generations OM2, OM3, OM4, OM5 50/125µm
fiber. The letters “OM” stand for optical multimode. Both
multimode fiber (MMF) and single mode fiber (SMF) can be
used for high-speed transmission. MMF is often for short
reach while S
MF is for long reach.

Figure 6: multimode fiber and single mode fiber core


diameters.

Multiple Fiber Optic Connectors

Optical fiber cables can be terminated with various types of


fiber optic connectors that can be plugged into different
ports of devices. The figure below shows some common fiber
optic connector types, and the LC, SC and ST are most used
three types.
Figure 7: common fiber optic connector types.

In addition, there is a multi-fiber connector type called


MTP/MPO (Multi-fiber Push On). It is designed for higher
bandwidth applications such as 40GbE and 100GbE. 12-
and 24-fiber versions are currently used to directly connect
into 40G and 100G transceivers and also used in high
density fiber distribution areas. Higher fiber versions are
also available (48, 72 fibers) but their use and deployment is
currently limited.
INFORMATION SHEET 2.5

CABLE RACEWAY 

selection helps organize exposed cables and wires running


on your ceiling and walls.

is the premium wire management product for routing and


organizing wiring in control panels.

WIRE DUCT is one of the cable management products


developed specifically for use within cabinets and control
panels.
INFORMATION SHEET 2.5

Network connectivity checking procedures and


techniques

Step 1: Confirm network connectivity

On the source server, perform a operating system level


connectivity test on established ports from source
server/firewall to destination server/firewall. The test
should verify routing, network address translation, ports,
and URLs where applicable.

Telnet

Telnet is a good command to start your network connectivity


tests. Open a command prompt on your server
(e.g. cmd.exe or Powershell on Windows and a console or
SSH session in Unix) and execute the following:

Note for Windows 7 users, you may have enable the Telnet
client/command. To enable telnet on Windows 7, search in
the start menu for “Turn Windows features on or off”. Click
into that menu item and turn on the “Telnet client”.
<source_server> command prompt>>
telnet <destination> <destination_port>

$ telnet justintung.wordpress.com 80

If there is connectivity from the source server to the


destination, the telnet session should begin. On Windows
and Unix, a blank screen or area should appear with
a prompt. If there is no connectivity, it will just hang after
the telnet command like the following:

Connecting To <destination_server>…

and then finally show:

Connecting To <destination_server>…Could not open


connection to the host, on port <destination_port>: Connect
failed.

Telnet hang on Windows PowerShell. Same thing happens


on the normal cmd.exe window.

Moments later, we know the connectivity failed.

Other Telnet Failures

It is also possible you receive a message:

telnet: Unable to connect to remote host: Network is


unreachable

This telnet message could occur from:


Routing issues – Try a ping to the destination server (ping
<destination>). Hopefully the ping is successful, if not
check the netstat -rn to examine gateways used for routing.
It could be that a static/alternatve route needs to be created
to the destination server using an alternative gateway.

Network infrastructure down – It is possible a piece of the


network on the path to your destination server is down.

Incorrect information in telnet command – Make sure


the IPs or fully qualified domains you are using in telnet are
correct.

Terminology

<source_server> is the server we are coming from and


where the command is being executed on the operating
system. The firewall should be opened from the source
server and its source ports to the destination server and its
destination ports.

<destination> is the destination server IP or fully qualified


domain name (FQDN). The IP should work whether you are
using an IPv4 or IPv6 address. However, if you are testing
IPv6 connectivity, it is likely you will use a FQDN due to the
long length of IPv6 addresses.

<destination_port> is the port on the destination server


you are trying to get to. The destination server should be
listening on this port. The following command  (netstat -a)
can be used on the destination server to check if the port is
listening and you should be looking for the port after the IP
address and whether its state is listening:
$ netstat -a

 Proto  Local Address          Foreign Address        State

 TCP   
10.86.32.211:80            fcore:0                LISTENING

In this example, we know the machine where we are


executing the command is listening on port 80 on the IP
address 10.86.32.211.

If there is no connectivity, follow steps below


for troubleshooting procedures.

Step 2: Check other stuff

Check firewall rule and network implementation

Check you have the right IPs, fully qualified domain names
(FQDN), and ports for the servers. Sometimes firewall rules
are not requested properly and more work needs to be done
to make connectivity happen such as:

Host file entries

Routing: static routes, address resolution protocol (ARP)


configurations

Network Address Translation (NAT)

Security: VPN configuration, If applicable, ensure SSL


certificate trust is in place and/or certificate exchanges
installed and in place (e.g. 1-way, 2-way SSL certificates
installed, and destination network can see successful SSL
handshakes).

Servers may have several IPs – make sure the correct ones
are used and seen on the firewall(s)
Another type of test: Application Interface Test (depending
on application availability)

This type of testing occurs from the application running on


the source server and is common if you do not have access
to the servers themselves and may be easier to perform. In
this test, the application on the source server generates a
test message/request to be received on the destination
server interface and source confirms a valid response. This
test confirms URL in place and basic messaging interface is
available.

Step 3: Network connectivity troubleshooting on server

1. Test Connectivity on source server(s)

a. Initial test by server operator:


Telnet to destination IP via destination port. If IPs are using
network address translation (NAT), choose the appropriate
IP from source server – the IP the firewall sees and
translates from the source server.

b. If telnet fails:
Check if static routing is done in source server routing
table. Make sure routing goes to the correct default gateway
and ping default gateway to check if it works.

Netstat – Checking the IP configuration on the server

netstat -rn

to check IP configuration on server and:

ping <destination_server>

Runs in Windows natively and in Unix sometimes under


/usr/sbin/ping
c. If server routing table is ok:
Conduct the telnet test while having network resources
monitor firewalls between source and destination points.

d. If traffic is not picked up on firewall:


Check points along the network path. If possible trace the
network route. Traffic bound for the destination address
should be monitored in case source server IPs are not seen
on the firewall.

Traceroute – Find network routes

Use:

/usr/sbin/traceroute

to destination server and check for default gateway


(assuming devices along the way do not have ICMP blocked).

Step 4: Network protocol/packet analyzers

If you have exhausted the steps outlined above and there is


still no connectivity … 

you may have to use logging tools and applications traces.

The use of Wireshark, TCPdump, or similar tools for


network protocol and packet analysis on the source and/or
destination servers and firewalls will aid in the
troubleshooting by checking for abnormalities or errors in
packets.

Analyzing application logs

If you are working with applications that need the network


connectivity, you can enable verbose logging on the
application. When testing web services, you can enable
logging for protocol level APIs. For example, if a Java
application is a web service client and is connecting to the
web service endpoint, we could enable logging of the HTTP
implementation in Java via JVM arguments or look at

The unit of competency Setup Computer Server contains


the knowledge, skills and attitudes required for a Computer
Systems Servicing NC-II.

LEARNING OUTCOME

INFORMATION SHEET 2.1

Windows Server

Windows Server is a group of operating systems designed


by Microsoft that supports enterprise-level management,
data storage, applications, and communications. Previous
versions of Windows Server have focused on stability,
security, networking, and various improvements to the file
system. Other improvements also have included
improvements to deployment technologies, as well as
increased hardware support. Microsoft has also created
specialized SKUs of Windows Server that focus on the home
and small business markets. Windows Server 2012 R2 is
the latest release of Windows Server, and focuses on cloud
computing.

 DNS. (Domain Name System) The Internet's system for


converting alphabetic names into numeric IP addresses. For
example, when a Web address (URL) is typed into a
browser, DNS servers return the IP address of the
Web server associated with that name.

-stands for Domain Name System. The


main function of DNS is to translate domain names into IP
Addresses, which computers can understand. It also
provides a list of mail servers which accept Emails for each
domain name.
A DNS hosting service is a service that runs Domain Name
System servers. Most, but not all, domain name
registrars include DNS hosting service with registration.
Free DNS hosting services also exist. Many third-party DNS
hosting services provide Dynamic DNS.

DNS hosting service is optimal when the provider has


multiple servers in various geographic locations that provide
resilience and minimize latency for clients around the world.
By operating DNS nodes closer to end users, DNS queries
travel a much shorter distance, resulting in faster Web
address resolution speed.[1]

What is DHCP?

DHCP itself is a network management tool for use with


networks working on the Transmission Control Protocol
(TCP) and Internet Protocol (IP), which combined form the
TCP/IP suite of internet protocols.

Essentially, DHCP is the protocol responsible for the


management and automatic configuration of IP addresses
within a network. But it also handles the configuration of
default gateways, domain name server (DNS) information
and the assigning of correct subnet masks for devices on
the network

Terminal Services role in Windows Server 2008 allows


remote access to the server by clients running the Terminal
Services client (Remote Desktop Connection) on their
computers. Effectively decoupling the computational
resource (the server on which the Terminal Services role is
installed) and the input/output (the client computer
through the use of a software client), Terminal Services can
help an organization significantly simplify its desktop
computing efforts. The Terminal Services Manager provides
the interface through which Terminal Servers, client
connections, users, and processes are managed. Use
Terminal Services Manager to manage the local Terminal
Server, systems in trusted domains, or standalone servers.
You'll see some of this in action in this column.

Print Services is available for installation as a server role on


all versions of Windows Server 2008 except the Web Server
Edition.  The Print Services Role and the associated services
and features may be installed via the new Server Manager
console or ServerManagerCMD.exe command-line role
management tool.  By default the print spooler service is
installed and started on a new installation of Windows
Server 2008.  The Print Services server role is not required
to install and share printers.  However, installing the role
allows the ability to install the dependent role services and
manage the local print server using the Server Manager
console.  When a printer is shared on the server, firewall
exceptions for File and Printer Sharing (ports 137, 138, 139
and 445) are enabled.

When the Print Services role is installed, there are three role
services that are available for installation:

Print Server: The Print Server role service is a mandatory


role service for the Print Services role.  When the Print
Server role is installed, the Print Services Tools Remote
Server Administration Tool feature is also installed.  The
Print Management Console (PMC) is then accessible from
Server Manager, Administrative Tools, or as an MMC snap-
in.  Although the installation of the Print Server role service
does not require a system restart, the removal of the role
service does.
Active Directory Domain Services

Purpose

Microsoft Active Directory Domain Services are the


foundation for distributed networks built on Windows 2000
Server, Windows Server 2003 and Microsoft Windows
Server 2008 operating systems that use domain controllers.
Active Directory Domain Services provide secure,
structured, hierarchical data storage for objects in a
network such as users, computers, printers, and services.
Active Directory Domain Services provide support for
locating and working with these objects.

This guide provides an overview of Active Directory Domain


Services and sample code for basic tasks, such as searching
for objects and reading properties, to more advanced tasks
such as service publication.

Windows 2000 Server and later operating systems provide a


user interface for users and administrators to work with the
objects and data in Active Directory Domain Services. This
guide describes how to extend and customize that user
interface. It also describes how to extend Active Directory
Domain Services by defining new object classes and
attributes.

File Server – Although not required to share files, adding


this core role service allows you to use the Share And
Storage Management snap-in.

Distributed File System – Enables sharing files using the


DFS namespace and replicating files between DFS servers. If
you select this role service, the wizard will prompt you to
configure a namespace.

File Server Resources Manager – Installs tools for


generating storage reports, configuring quotas, and defining
file screening policies. If you select this role service, the
wizard will prompt you to enable storage monitoring on the
local disks.

Services for Network File System – Provides connectivity


for UNIX client computers that use Network File System
(NFS) for file sharing. Note that most modern UNIX
operating systems can connect to standard Windows file
shares, so this service is typically not required.

Windows Search Service – Indexes files for faster searching


when clients connect to shared folders. This role service is
not intended for enterprise use. If you select this role
service, the wizard will prompt you to enable indexing on
the local disks.

Windows Server 2003 File Services – Provides services


compatible with computers running Windows Server 2003.

Select the relevant options then click Next to continue.

Select Create a namespace later using DFS Management


snap-in. Click Next to continue. Select volumes to be
monitored then click Next to continue.

Set the report options then click Next to continue. Review


chosen options then click Install. Click Close to complete
the installation. File Services role is now installed.
STEP BY STEP GUIDE TO SETUP ACTIVE DIRECTORY
ON WINDOWS SERVER 2008

This tutorial will explain how to install AD on server 2008.


This will valid for windows 2008 R2 as well.

Requirement:

Minimum: Single processor with 1.4 GHz (x64


processor) or 1.3GHz (Dual Core)

Minimum: 512 MB RAM

Minimum: 32 GB or greater

The first step is to assign a ip to the server that you going to


deploy the AD. Its nessary to install it as DNS server too. So
its better to have fixed ip it doesn't mean you cannot install
AD without fixed ip address but it will solve lot of issues if
you used fixed ip.
In here the server ip is 10.0.0.14. Since we going to make it
as DNS server too you should use the same ip as the
preferred DNS server.

Next step is to install the Active directory roles. Unlikely the


older version of windows servers Microsoft highly
recommend to use server manager option to install roles
before you run dcpromo.

 
Click on start menu and select the Server Manager

Select the roles from the right hand panel and click on add
roles option.

From the roles list select the "Active Directory Domain


Services" role and Click "Next"
Review the confirmation and click on "Next"

Review the installation confirmation and click on "Next"


It will take few minutes to complete and when its done you
will get this confirmation. And then click on "Close"

After that you will need to do a reboot.

After reboot please open up the "server Manager" again. And


then click on "Roles" there you will see the "Active Directory
Domain Services" is successfully installed in there. click on
it then you will get a window like below.

In their please pay attention to the message

So please click on that link and it will start the DCPROMO


wizard.

So next step to go through the DC promo wizard.

To start the installation click on "Next"


Click on "Next"
Since we going to install New domain Controller in new
forest please select the option "Create a new domain in new
forest" option and click on "Next"
Now we have to provide the name for our domain controller.
It must be FQDN. In our case I used rebeladmin.com as the
domain. Please click "Next" after it.
In this window it will ask to select forest function level. If
you going to add server 2003 domain controller to your
forest later don't select the function level as server 2008. If
you going to use full features of 2008 Ad you must select
forest function level as server 2008. In my case I used server
2008. Click on "Next" after the select.
In next window since it's the first DC we should make it as
DNS server too. Leave the default selection and click on
"Next"
If the wizard cannot create a delegation for the DNS server,
it displays a message to indicate that you can create the
delegation manually. To continue, click "Yes"
In next window it will show up the database location. It its
going to be bigger AD its good if you can keep NTDS
database in different partition. Click on "Next" after
changes.
In next window its asking to define a restore mode
password. Its more important if you had to do a restore from
backup in a server crash. Click on "Next" after filling it.
Next window is giving you a brief of the installation. Click on
"Next"
Then it will start the installation of the AD. It will take some
time to complete. After complete of the installation perform
a server reboot.
After the reboot now you can login to the domain. Please use
the login as following example

User name : your domain\administrator

Password : XXXXXXXX

Now its done and you can view the active directory options
on administrative tools menu
SELF-CHECK NO. 1.1-11

a.Enumerate the step by step guide in installing active


directory domain services

ANSWER KEY 1.1-11

Assign ip address in server

Select roles

Add roles

Check box in active directory domain services

Next

Next

Install

Restart

Type dcpromo

Next

Next

Create a new domain forest

Next

Type fqdn

Next

Select windows server 2008

Next

Select dns
Next

Yes

Next

Type password and confirm password

Next

reboot

DYNAMIC HOST CONFIGURATION PROTOCOL


SERVICES

INFORMATION SHEET 1.1-12

STEP BY STEP GUIDE TO INSTALL DHCP ROLE AND


CONFIGURE

Let’s see how we can configure DHCP server in a Windows


Server Environment. For the demo I will be using Windows
2008 R2 Server.
To start first need to log in to the server with administrator
privileges. Then start the “server Manager” by clicking on
“Server Manager” icon on task bar. Then go to “Roles”

Then click on “Add Roles” option to open Add roles Wizard.

Then it will load the Roles Wizard and select the “DHCP
Server” From the list and click next to continue.
Then it will give description about the role. Click next to
continue.
Next window is asking to use which interface to serve DHCP
clients. If server has multiple NIC with multiple IP you can
add them also to serve DHCP clients.
In next window it will give opportunity to add DNS settings
that should apply for DHCP clients.
Next window is to define the WINS server details.
In next window we can add the scope, the Starting IP, End
IP of the DHCP range, subnet mask, default gateway, leased
time etc.
In next Window it can configure to support IPv6 as well.
Then it will give the confirmation window before begin the
install. Click on “Install”
Once installation finishes DHCP server interface can open
from Start > Administrative Tools > DHCP
Using the DHCP it is possible to even configure multiple
Scopes configurations to the network. In a

network there can be different network segments. It is


waste to setup different DHCP servers for each segment.
Instead of that it is possible to create different Scopes to
issue DHCP for the
SELF-CHECK NO. 1.1-12

a.Enumerate the step by step guide installing dhcp services

ANSWER KEY NO. 1.1-2

a.

Roles

Add roles

Check box dhcp services

Next

Next

Check box

Next

Select validate

Click wins is not required

Next

Add scope

Ok

Next

Disable dhcp6 stateless

install
TERMINAL SERVICES

INFORMATION SHEET 1.1-13

Install Remote Desktop Licensing Role

To start go into the Server Manager on the server that will


host the Licensing role service.
Under Roles Summary select “Add Roles”.

Click Next.
Check Remote Desktop Services and click Next.

Click Next.
Check Remote Desktop Licensing and select Next.

Discovery scopes are no longer used for licensing with


Windows 2008 R2 Remote Desktop, we can assign these to
our Remote Desktop Session Host manually or through a
group policy.  There is a 120 day grace period allowed
for connections to a Remote Desktop Session Host before a
license server needs to be activated.  Click Next.

Confirm the settings and click Install.  Then click Close


once the install is completed.

SELF-CHECK NO. 1.1-13

a.Enumerat the step by step installing terminal services

ANSWER KETY 1.1-13

a.

roles

add roles

next
check box terminal services or remote desktop services

next

install

remote desktop licensing

next

install

PRINT AND SERVICES ROLE


INFORMATION SHEET NO 1.1-14

1. Installing print services

Installing print services for Windows Server 2008 R2 is done


by adding the Print and Document Services role. This role is
added using Server Manager. Print services includes four
primary role services (see Figure 1):

Print Server

LPD Service

Internet Printing

Distributed Scan Server

Figure 1. Print Server Role Services.

image:
http://tutorial.programming4.us/image/1303/Administeri
ng%20Print%20and%20Document%20Services_1.jpg

2. Administering a print server

The print server role service adds all components necessary


to set up, share, and manage network printers. After
installing this role, you will notice that the Print
Management console will be added to Server Manager and
can be accessed from the node Roles | Print and Document
Services | Print Management (see Figure 2).

Figure 2. Print Management Console.

image:
http://tutorial.programming4.us/image/1303/Administeri
ng%20Print%20and%20Document%20Services_2.jpg
Installing a network printer on print server

Using the print management console, you can manage all


your network printers from one central console. One of the
first steps you will want to perform is to install network
printers on your print server. This can be done by
performing the following steps within the print management
console:

1 Select the Printers node under Print Management | Print


. Servers | your print server name (see Figure 3).

Figure 3. Print Server Printers Node.

image:
http://tutorial.programming4.us/image/1303/Administeri
ng%20Print%20and%20Document%20Services_3.jpg

2 Right click the Printers node and select the option Add


. Printer...
3 You can choose how to locate the printer you want to
. install including searching the network, using an existing
port, or creating a new port. In this exercise, we will choose
the option to search the network (see Figure 4). Then
click Next.

Figure 4. Printer port options.

image:
http://tutorial.programming4.us/image/1303/Administeri
ng%20Print%20and%20Document%20Services_4.jpg
4 The printer installation wizard will begin searching the
. local network for printers. After the search is complete, any
network printers found are listed in the wizard as seen
in Figure 5.

Figure 5. Searching for Network Printers.

image:
http://tutorial.programming4.us/image/1303/Administeri
ng%20Print%20and%20Document%20Services_5.jpg

5 Select the printer you want to install, and then click Next.


. The wizard will attempt to add a port for the selected
printer.
6 You will next need to give the printer a name and share
. name (see Figure 6). Additionally, you can list location and
comments to make it easier for users to find the printer.
For example, by using the notation HQ/2nd/Processing
Room, users can search for a printer based on its location.
When searching Active Directory for printers, a user could
enter the search HQ/2nd/* to list all printers on the
second floor in the HQ building.

Figure 6. Creating Printer Share.

image:
http://tutorial.programming4.us/image/1303/Administeri
ng%20Print%20and%20Document%20Services_6.jpg

7 After entering relevant printer information, click Next to


. continue. Then click Next again to install the printer
driver. When the installation is complete you will receive a
confirmation page. Click Finish to close the wizard.
Once the printer has been created, you can make the
printer more accessible and easier to find by publishing it to
Active Directory. To do this, locate the printer in the printer
management console and choose properties. Then click
the Sharing tab and select the option List in Directory as
seen in Figure 7. Then click OK.

Figure 7. Publishing Shared Printer to Active Directory.

image:
http://tutorial.programming4.us/image/1303/Administeri
ng%20Print%20and%20Document%20Services_7.jpg

You can now access this printer from a Windows client by


entering the UNC path to the printer share (\\Server
Name\Printer Share) or by searching Active Directory as
seen in Figure 8.

Figure 8. Searching Active Directory for Published Printer.

image:
http://tutorial.programming4.us/image/1303/Administeri
ng%20Print%20and%20Document%20Services_8.jpg

Deploying printers using Group Policy

Additionally, you can push shared printers out to users via


Group Policy. To deploy a printer via Group Policy, perform
the following:
1 Locate the printer in the printer management console.
. Then right click the printer you want to deploy and choose
the option Deploy with Group Policy. This will open the
Deploy with Group Policy window.
2 Click the Browse button to select the GPO you want to use
. to deploy the selected printer (see Figure 9). If you want to
use a new GPO specifically for deploying printers, you will
need to create the GPO prior to using the deploy with
group policy option within the print management console.

Figure 9. Deploy with Group Policy Options.

image:
http://tutorial.programming4.us/image/1303/Administeri
ng%20Print%20and%20Document%20Services_9.jpg

3 Next you need to select whether you want the printer to be


. deployed to computers or users. By selecting computers,
the printer will be deployed to any user who logs on to
computers to which this policy is applied. If you select
users, the printer will be deployed to users to whom the
policy is applied, no matter which computer they log on to.
If you want to deploy the printer to both users and
computers, select both options. Then click Add.
4 You should now see the printer listed in the Deploy with
. Group Policy windows as seen in Figure 10. Click OK to
complete the GPO setup.

Figure 10. Selecting a GPO.

image:
http://tutorial.programming4.us/image/1303/Administeri
ng%20Print%20and%20Document%20Services_10.jpg
You can now log on to a computer that the policy is applied
to and you should see the printer installed and ready to use.

Read more at
http://tutorial.programming4.us/windows_server/windows
-server-2008-r2-file-and-print-services---administering-
print-and-document-services-(part-
1).aspx#7ATpCR6yJ8ykQ1sW.99

SELF-CHECK NO. 1.1-14

a.Enumerate the step by step guide installing print services

ANSWER KETY 1.1-14

a.

Roles

Add roles

Check box print services

Next
Next

install

FILE SERVICES ROLE

In this blog post, we’ll cover the basics of the Distributed


File System (DFS) in Windows Server 2008, which offers
users simplified access to a set of file shares and helps
administrators easily maintain the file server infrastructure
behind those file shares, including options for load sharing,
replication and site awareness.

Many File Servers and File Shares

It’s a common scenario. Over time, a company ends up with


a large number of file servers that were created at different
times and by different teams. The users are left to figure out
where their files are stored, mapping many drives to file
shares and learning complex UNC paths
like \\server23\ffiles and \\finance.asia.company.com\spr
eadsheets and even something like \\10.1.23.45\scratch.
To complicate things further, when an old file server is
replaced, paths are broken and mapped drives stop
working. It can be challenging.

You also probably heard the proposition to invest in a


complex project to consolidate everything into a large file
server or NAS appliance. While those projects will solve the
problem for a while, you will need to spend a lot of
resources to move the data around and fix users’ mapped
drives and paths. All that to have that new server eventually
become too small and need replacing again. Or you will
need many of those larger servers, starting the cycle over.

It turns out it doesn’t have to be that way. Windows Server


already provides a way to manage a large set of file shares
as a consolidated list, under common namespaces. From
your users’ perspective, each namespace looks like a single
file share with many folders. From an administrators’
perspective, you can easily add more file servers or
consolidate existing file servers without complex “forklift”
migrations. And those are just a few of the benefits of DFS.

Adding the DFS Services 

DFS Services are available on all currently supported


versions of Windows Server, but there are significant
improvements in the Windows Server 2008 editions. The
DFS namespace client is available for all currently
supported versions of Windows, both client and server.
Domain-based DFS namespaces require the use of Active
Directory.

To add the DFS Services to Windows Server 2008, you will


use the Server Manager tool. First, you need to expand the
"Roles" item on the tree to make sure that the File Service
role is installed. Then you will right-click on "File Services"
and click on option to "Add Role Services". That's where you
you will find the option to add DFS:
Another way to add the DFS Services is using the
ServerManagerCmd.EXE command line tool. You can also
use ServerManagerCmd to make sure that the right role and
role services are installed. Here's a sample command line:

C:\>servermanagercmd -query | find "[FS"

[X] File Server [FS-FileServer]


[X] Distributed File System [FS-DFS]

[X] DFS Namespaces [FS-DFS-Namespace]

[X] DFS Replication [FS-DFS-Replication]

[ ] File Server Resource Manager [FS-Resource-Manager]

[X] Services for Network File System [FS-NFS-Services]

[ ] Windows Search Service [FS-Search-Service]

[ ] Windows Server 2003 File Services [FS-Win2003-


Services]

[ ] File Replication Service [FS-Replication]

[ ] Indexing Service [FS-Indexing-Service]

C:\>

DFS Namespaces

A DFS namespace is basically a place where you will have


links to all your file shares. From an administrator point of
view, you should think of it as a folder structure where you
keep the list of target file shares. Your users will see it as a
single share with many folders and they will have no idea
that they are navigating across a set of servers to get to the
subfolders and files.

When configuring DFS, you have a choice of using a


domain-based or a stand-alone namespace. If you already
have Active Directory deployed, you should consider using a
domain-based namespace. If you’re not using Active
Directory, your only choice is a stand-alone one.

The main advantage of the domain-based namespaces is


that your configuration will be stored in Active Directory
and you won’t have to rely on a single server to provide the
namespace information to your clients. The path users refer
to uses the name of the domain and it will not need to
change because your namespace server name changed (only
if you change your domain name). With a stand-alone DFS,
that server name becomes part of the main path to the
namespace.
There are also two domain-based DFS modes: Windows
Server 2008 mode and Windows Server 2000 mode.
Windows Server 2008 mode (which requires Windows Server
2003 forest functional level, Windows Server 2008 domain
functional level and Windows Server 2008 running on all
namespace servers) includes support for more than 5,000
folders with targets per namespace and access-based
enumeration.

Creating a Namespace

After you install the service, your next step is to create the
namespace. Here’s are the steps to create a domain-based
namespace:

Start “DFS Management” from the “Administrative Tools”.


On the tree on the left side, click on “Namespaces”.
Click on “New Namespace…” action on the panel on the
right to start the “New Namespace Wizard”.
Enter the name of the namespace server and click “Next”.
Enter the name of the namespace and click “Next”.
Select the type of Namespace and click “Next”. In my case,
I’m using a domain-based namespace with 2008 mode
enabled. On the review screen, click “Create” and then click
“Close” when it’s done. You will end up with a brand new
namespace with no folders:
Note: DFS-N “namespaces” are also sometimes called
“namespace roots” or simply “roots”. This naming
convention was used in older versions of DFS-N and you will
also see it in the command-line tools.

Adding Folders to the Namespace

After your create the namespace, you will add folders to it,
specifying the associated folder target. This means pointing
to the actual file shares, making each one appear to users
as a folder under the namespace. Before you do that, you
want to think long and hard about the folder structure
you’re creating. A basic goal of DFS is to create a stable
infrastructure that will not constantly change on your
users.

To start, click on the “New Folder…” action on the panel on


the right. In the example below, I will enter the name of the
folder which as “Finance”. I will also enter one associated
folder target, which will be “\\JOSEBDA-N2\FinanceDocs”
(this share was configured beforehand). Here are the results
right before I click “OK” to create the new folder:

Finally, here’s the end result in the “DFS Management”


window:
I could also have folders with no targets (just to create a
hierarchy in the namespace) or folders with multiple folder
targets.

Note: DFS-N “folders” are also sometimes called “links”.


DFS-N “folder targets” and also sometimes called “link
targets”. These naming conventions were used in older
versions of DFS-N and you will also see it in the command-
line tools.

Multiple Targets
It’s useful to have multiple copies of the same data stored in
different file servers. One reason for that is fault-tolerance (if
one server is unavailable, you can still access the other
one). The other reason is to choose the copy of the data that
is closer to you. If you’re in a branch office and you want to
access a very large file, you would rather get a copy from a
server in that branch.

It’s actually quite simple to add more folder targets to an


existing folder or create the folder with multiple targets
initially. All you have to do is make sure that you provide
the multiple targets for the same folder in that namespace
when you configure it.
If you’re using domain-based DFS, the clients will be
directed to the target that is closest to them. If there is no
target nearby, the clients will be pointed to a remote one.
This is similar to what happens when clients are looking for
a domain controller. DFS uses the site information in Active
Directory to determine which server works best.

Having multiple file servers serving the same data is also


useful for maintenance. If you need to apply a security
update or add some memory to the server, you can count on
the fact that there is at least another server out there that
can service client requests while that specific server is
down.
DFS Replication

At this point, you’re probably thinking: How does the data


get copied across multiple servers?

Well, Windows Server includes a component to replicate


data between file servers in case you need that. It’s called
DFS-R (Distributed File System Replication). DFS-R was
introduced with Windows Server 2003 R2 (replacing the old
NTFRS with many advantages). DFS-R can be used for both
domain-based and stand-alone DFS.

To replicate files between two (or more) shares, you need to


create a replication group and specify a few things like
which servers will replicate (members) and what they will
replicate (replicated folders). DFS-R is aware of site topology.
It also has options to control scheduling and the use of
bandwidth (throttling). DFS-R uses Remote Differential
Compression (RDC), meaning that only changes in the files
are sent over the network, not the entire file.

There are specific changes in Windows Server 2008 DFS-R,


including improved performance, better network bandwidth
utilization, quicker recovery from unexpected shutdowns
and support for Read-Only Domain Controllers.
Configuring Replication

When you create multiple folder targets for a folder, the DFS
Management tool will offer you to automatically setup the
replication group:

Assuming you have installed the DFS-R role service on both


servers, it will go ahead and setup replication for you. It’s
done via the “Replicate Folder Wizard”.

To start, it will ask you the replication group name and the
replicated folder name:
It will then verify if the server working as folder targets for
that DFS folder can be a replication member. Our two
servers are eligible:

Next, you need to select one of the servers as the primary


member. This should be the server that contains the files
you want to replicate and will be the authoritative server
during the initial replication:
You will also need to select a topology. This is important if
you have a larger number of servers and need to control
how they replicate. For instance, if you have a central server
in HQ and several branch servers, you can make sure the
branch servers do not try to replicate with each other
directly, but always replicate only with the HQ servers. In
our case, with only two servers, "Full Mesh" will do:
Finally, you need to select the bandwidth and schedule.
This will allow you do restrict the amount of bandwidth that
DFS-R can use and also specify specific times during the
day when replication is allowed. In this case, I will keep it
simple, replicating at all hours and using the full
bandwidth.
After the review screen, the wizard will set up replication for
you. Here’s the end result:
DFS Tools

As you saw, the most common administration activities


related to DFS-N and DFS-R can be performed using the
“DFS Management” MMC. This tool will show up under
“Administrative Tools” after you add the DFS role service in
Server Manager.

You can also add just the MMC for remote management of a
DFS namespace server from a server that does not have the
actual DFS Services installed. You will find that option in
Server Manager, under Add Feature, Remote Server
Administration Tools (RSAT), Role Administration Tools, File
Services Tools.
Another way to manage DFS-N is to use DFSUTIL.EXE,
which is a command line tool. There are plenty of options
and you can automate pretty much any DFS-related
activity, from creating a namespace to adding folders to
exporting the entire configuration to troubleshooting.
DFSUTIL.EXE is an in-box tool in Windows Server 2008.
Here’s a sample screen for DFSUTIL:

C:\>dfsutil
DESCRIPTION:
Manages DFS Namespaces, servers and clients.
NOTES:
* Use the Dfsutil /oldcli command to use of the original
Dfsutil syntax.
* Use the /? parameter after any command to display help
for the command.
* Dfsutil commands use the original Distributed File System
terminology,
  with updated DFS Namespaces terminology provided as
explanation for most
  commands.
* If you specify at the end of a command an object (such as
a namespace server)
  about which you want information, most commands will
display the information
  without requiring further parameters or commands. For
example, when using the
  Dfsutil Root command, you can append a namespace root
to the command to view
  information about the root.

EXAMPLES:
Dfsutil Root
Dfsutil /oldcli
Dfsutil /?

------ Commands Supported ------


Root                  Displays,creates,removes,imports,exports
namespace roots.
Link                  Displays, creates, removes, or moves
folders (links).
Target                Displays,creates,modifies folder targets
(link targets).
Property              Displays or modifies a folder target or
namespace server.
Client                Displays or modifies client information or
registry keys.
Server                Displays or modifies namespace
configuration on the server.
Diag                  Perform diagnostics or view
dfsdirs/dfspath.
Domain                Displays all domain-based namespaces in
a domain.
Cache                 Displays or flushes the client cache.

C:\>

Note: DFSCMD is an older version of the DFS-N command-


line tool. You should use DFSUTIL instead.

For DFS-R, the command line tool is DFSRADMIN.EXE.


Here’s a sample screen:

C:\>dfsradmin

=== Supported Objects ===


You can perform actions on the following objects:
Bulk          Perform several actions by using a single input
file
Conn          Perform actions on connections between
members of a replication group
Health        Generate a health report for one or more
members of a
              replication group
Mem           Perform actions on a member of a replication
group
Membership    Perform actions related to a member's
participation in a
              replicated folder
PropRep       Generate propagation report for one or more
propagation test files
PropTest      Generate and drop a propagation test file on a
membership,
              used for testing replication
RF            Perform actions on a folder that is replicated
between members
              of a replication group
RG            Perform actions on a group of computers that
participates in
              replication
Sub           Perform actions related to a member's
subscription in
              replication groups

Type "DfsrAdmin <Object> /?" for detailed help.


Usage: DfsrAdmin <Object> <Action> [<SubObject>]
[<SubAction>]
       </Parameter:Value> ... [</Optional-
Parameter:Value> ...]
       [/Domain:<value>] [/DC:<value>] [/CSV] [/Force]

=== Optional Parameters Supported For All Commands ===


/Domain: Specify the domain for the replication group
/DC:     Specify the domain controller to connect to in the
replication
         group's domain
/Force:  Specify that a failed operation is skipped when an
action causes a
         series of operations to be performed

=== Optional Parameter Supported For All List Commands


===
/CSV:    Dumps the list output in CSV format
C:\>

Conclusion

I hope this provided you a good overview of DFS. There’s a


lot more to talk about, as you probably guessed. One could
write an entire book on this. If you like what you read so far,
I suggest you start working with it on a test environment
and look at the links below for additional information. You
users will thank you…

SELF CHECK NO 1.1-15

a.Enumerate the step by step guide of installing files servies

ANSWER KETY 1.1-15

a.

roles

add roles

check box file services

check box file services resource manager

check box distributed file system

nextc

next

install

DNS ROLE SERVICES


DNS (DOMAIN NAME SERVICE)

This is the main and commonly used name resolution


technique in modern computer networks. There are two
main name space principles, the domain name hierarchy
and IP space. DNS represents the domain hierarchy and
provide translation services for it and IP name spaces. DNS
servers will keep records about hostnames along with the ip
addresses and depend on the queries it will translate IP
addresses to hostname or hostnames to IP addresses. Users
more like to use user-friendly domain names, hostnames
instead of complex ip addresses. If you look in to IPV6 it’s
really hard to use IP address to communicate as it’s too
complex. With use of DNS you don’t need to keep track of
those ip addresses.
 
There is lot of DNS servers available from different vendors
but it’s all doing the same thing. Most popular DNS servers
are Microsoft Windows DNS servers and BIND DNS servers
runs on linux/unix kernel. 
 
These DNS servers will holds different type of service
records such as Mail exchange (MX) which defines the
domain mail server settings, Name Server Records (NS),
Canonical Name Record (CNAME) to represent alias for
another DNS name etc.

Let’s look how you can simply setup DNS server on


Windows Server 2008 R2.

1.    As the first option you need to log in to the server with
administrator privileges. Then click on “Server Manager” in
the Task Bar. It will load the server manager interface. From
it select “Roles”.
2.    Then click on “Add Roles” to continue. It will load the
add roles wizard. Click on “Next”

3.    From the list select “DNS server” and click on “Next” to
continue.
4.    Then it will give description about DNS server. Click
“Next” to Continue.
5.    Then it will give Confirmation and click on “Install” to
continue.

6.    Once it install it will give a confirmation.


7.    After the installation you can start the server interface
by Start > Administrative Tools > DNS
8.    Now we need to create Lookup Zones. Let’s starts with
Forward Lookup Zones. First right click on “Forward Lookup
Zone” and Add new Zone.
9.    It will open new Wizard and click on “Next” then new
window will appear select “Primary Zone” since this going to
be the first DC server. Click on Next after selecting.

10.    In next window it ask about the Zone name. you have
to put same name you used as prefix name in previous step.
11.    In next window click on option “Allow both nonsecure
and secure dynamic updates” option to accept updates
automatically to DNS Zone. and click “Next” it will end the
wizard and click on “Finish” to create Zone.
12.    The next step is to create “Reverse Lookup Zone”. in
DNS window right click on “Reverse Lookup Zone” and click
Create new Zone

13.    In next window click on “Next” to start and select


“Primary Zone” as its first server and click on next
14.    In next window in network id section put the first 3
segments of the ip range. And click on Next

15.    In next window keep default name for the zone name
and click on next.
16.    In updates window allow “Allow both nonsecure and
secure dynamic updates” and click on next

17.    In next window click on finish and it will create the


zone. With this we done with the DNS server setup.
After create the necessary zone files, we can add records to
the zones. Computers that need to be accessed from Active
Directory and DNS domains must have DNS records.
Although there are many different types of DNS records,
most of these record types aren't commonly used. Let’s see
some of the DNS records available.

•    A (address) Maps a host name to an IP address. When a


computer has multiple adapter cards or IP addresses, or
both, it should have multiple address records.
•    CNAME (canonical name) Sets an alias for a host
name. For example, using this record, zeta.microsoft.com
can have an alias as www.greenwich.com
•    MX (mail exchange) Specifies a mail exchange server
for the domain, which allows mail to be delivered to the
correct mail servers in the domain.
•    NS (name server) Specifies a name server for the
domain, which allows DNS lookups within various zones.
Each primary and secondary name server should be
declared through this record.
•    PTR (pointer) Creates a pointer that maps an IP
address to a host name for reverse lookups.
•    SOA (start of authority) Declares the host that's the
most authoritative for the zone and, as such, is the best
source of DNS information for the zone. Each zone file must
have an SOA record (which is created automatically when
you add a zone).
Lesson 3.2: Set router/Wi-fi/Wireless access
point/repeater configuration

 Configure client device systems settings in accordance with


manufacturer’s instructions and end user preference

 Configure LAN in accordance with manufacturer’s


instructions and network design

 Configure WAN in accordance with manufacturer’s


instructions and network design

 Configure wireless settings in accordance with


manufacturer’s instructions, network design, and end-user
preferences

 Configure security/firewall/advanced settings in accordance


with manufacturers instruction and end-user preferences

DEFINITION OF TECHNICAL TERMS


Access points. Station that transmits and receives data
(sometimes referred to as a transceiver)

Cloud Computing. The use of various services, such as


software development platforms, servers, storage and
software, over the internet, often referred to as the "cloud."

Gateways. Node (router) in a computer network, a key stopping


point for data on its way to or from other networks.

Routers. Device that analyzes the contents of data packets


transmitted within a network or to another network.
LESSON INFORMATION 3.2.1
Wireless Network

A wireless network is a computer network that uses wireless data


connections between network nodes.

Wireless networking is a method by which


homes, telecommunications networks and business installations
avoid the costly process of introducing cables into a building, or as a
connection between various equipment locations.

 Wireless telecommunications networks are generally implemented


and administered using radio communication. This implementation
takes place at the physical level (layer) of the OSI model network
structure.

Examples of wireless networks include cell phone networks, wireless


local area networks (WLANs), wireless sensor networks, satellite
communication networks, and terrestrial microwave networks.

Wireless PAN
Wireless personal area
networks (WPANs) connect devices
within a relatively small area, that is
generally within a person's reach. For
example, both Bluetooth radio and
invisible infrared light provides a WPAN
for interconnecting a headset to a
laptop. ZigBee also supports WPAN
applications. Wi-Fi PANs are becoming
commonplace (2010) as equipment
designers start to integrate Wi-Fi into a
variety of consumer electronic
devices. Intel "My WiFi" and Windows
7 "virtual Wi-Fi" capabilities have made
Wi-Fi PANs simpler and easier to set up
and configure.

Wireless LAN
Wireless LANs are often used for connecting to local resources and to
the Internet
A wireless local area network (WLAN) links two or more devices over a
short distance using a wireless distribution method, usually providing
a connection through an access point for internet access. The use
of spread-spectrum or OFDM technologies may allow users to move
around within a local coverage area, and still remain connected to the
network.
Products using the IEEE 802.11 WLAN standards are marketed under
the Wi-Fi brand name . Fixed wireless technology implements point-
to-point links between computers or networks at two distant
locations, often using dedicated microwave or modulated laser
light beams over line of sight paths. It is often used in cities to
connect networks in two or more buildings without installing a wired
link. To connect to Wi-Fi, sometimes are used devices like a router or
connecting HotSpot using mobile smartphones.

Wireless ad hoc network


A wireless ad hoc network, also known as a wireless mesh
network or mobile ad hoc network (MANET), is a wireless network
made up of radio nodes organized in a mesh topology. Each node
forwards messages on behalf of the other nodes and each node
performs routing. Ad hoc networks can "self-heal", automatically re-
routing around a node that has lost power. Various network layer
protocols are needed to realize ad hoc mobile networks, such
as Distance Sequenced Distance Vector routing, Associativity-Based
Routing, Ad hoc on-demand Distance Vector routing, and Dynamic
source routing.

Wireless MAN
Wireless metropolitan area networks are a type of wireless network
that connects several wireless LANs.

WiMAX is a type of Wireless MAN and is described by the IEEE


802.16 standard
Benefits of a wireless network
Convenience Access your network resources from any location
within your wireless network's coverage area or
from any Wi-Fi hotspot.

Mobility You're not tied to your desk, as you are with a


wired connection. You and your employees can go
online in conference room meetings, for example.

Productivity Wireless access to the Internet and to your


company's key applications and resources helps
your staff get the job done and encourages
collaboration.

Easy setup You don't have to string cables, so installation can


be quick and cost effective.

Expandability You can easily expand wireless networks with


existing equipment, whereas a wired network
might require additional wiring.

Security Advances in wireless networks provide robust


security protections

Cost Because wireless networks eliminate or reduce


wiring expenses, they can cost less to operate than
wired networks.

Gateway

A gateway is a node (router) in a computer network, a key stopping


point for data on its way to or from other networks. Thanks to
gateways, we are able to communicate and send data back and forth.
The Internet wouldn't be any use to us without gateways (as well as a
lot of other hardware and software).
In a workplace, the gateway is the computer that routes traffic from a
workstation to the outside network that is serving up the Web pages.
For basic Internet connections at home, the gateway is the Internet
Service Provider that gives you access to the entire Internet.
A node is simply a physical place where the data stops for either
transporting or reading/using. (A computer or modem is a node; a
computer cable isn't.) Here are a few node notes:
On the Internet, the node that's a stopping point can be a gateway or
a host node.
A computer that controls the traffic your Internet Service Provider
(ISP) receives is a node.
If you have a wireless network at home that gives your entire family
access to the Internet, your gateway is the modem (or modem-router
combo) your ISP provides so you can connect to their network. On the
other end, the computer that controls all of the data traffic your
Internet Service Provider (ISP) takes and sends out is itself a node.
When a computer-server acts as a gateway, it also operates as a
firewall and a proxy server. A firewall keeps out unwanted traffic and
outsiders off a private network. A proxy server is software that "sits"
between programs on your computer that you use (such as a Web
browser) and a computer server—the computer that serves your
network. The proxy server's task is to make sure the real server can
handle your online data requests.
Routers can be gateways because a router can control the path
through which information is sent in and out. It does so by using
built-in headers and forwarding tables to figure out where packets of
data need to be sent. Those packets of data carry your emails,
transactions, online activity and so on.
A gateway is one of the many ways our data is moved over the Web for
us. The gateway gives us entry into different networks so we can send
email, look at Web pages, buy things online, and more. You can easily
say that gateways deliver the freedom, information and convenience
we enjoy online.
Firewall
A firewall is a system designed to prevent unauthorized access to or
from a private network. You can implement a firewall in either
hardware or software form, or a combination of both. Firewalls
prevent unauthorized internetusers from accessing private networks
connected to the internet, especially intranets. All messages entering
or leaving the intranet (the local network to which you are connected)
must pass through the firewall, which examines each message and
blocks those that do not meet the specified security criteria.
Several types of firewalls exist:

 Packet filtering: The system examines each packet entering or


leaving the network and accepts or rejects it based on user-
defined rules. Packet filtering is fairly effective and transparent
to users, but it is difficult to configure. In addition, it is
susceptible to IP spoofing.

 Circuit-level gateway implementation: This process applies


security mechanisms when a TCP or UDP connection is
established. Once the connection has been made, packets can
flow between the hosts without further checking.

 Acting as a proxy server: A proxy server is a type of gateway


that hides the true network address of the computer(s)
connecting through it. A proxy server connects to the internet,
makes the requests for pages, connections to servers, etc., and
receives the data on behalf of the computer(s) behind it. The
firewall capabilities lie in the fact that a proxy can be configured
to allow only certain types of traffic to pass (for
example, HTTP files, or web pages). A proxy server has the
potential drawback of slowing network performance, since it has
to actively analyze and manipulate traffic passing through it.

 Web application firewall: A web application firewall is a


hardware appliance, server plug-in, or some other software filter
that applies a set of rules to a HTTP conversation. Such rules
are generally customized to the application so that many
attacks can be identified and blocked.

In Windows and macOS, firewalls are built into the operating system.

Third-party firewall packages also exist, such as Zone Alarm, Norton


Personal Firewall, Tiny, Black Ice Protection, and McAfee Personal
Firewall. Many of these offer free versions or trials of their commercial
versions.

In addition, many home and small office broadband routers have


rudimentary firewall capabilities built in. These tend to be simply
port/protocol filters, although models with much finer control are
available.

Enabling Windows 7 Firewall.


One of the security features that Microsoft provides to keep your
information private is the Windows Firewall. By enabling the Windows
Firewall and keeping Windows 7 up to date, you can keep your
computer safe from outsiders and avoid several kinds of attacks on
your data. The Windows Firewall is designed to keep your computer
safe from outsiders by preventing any program from entering or
exiting your computer via the Internet.

1. Choose Start→Control Panel→System and Security→Windows


Firewall.
2. Click the Turn Windows Firewall On or Off link in the left pane
of the window. The Windows Firewall Customize Settings
window opens.
3. Select the Turn on Windows Firewall radio button for one or
both of the network locations. Click OK.
4. You can choose to impose a different level of security on each of
the network types: Home or Work (Private) Network Location
Settings and Public Network Location Settings.
5. Click the Close button to close Windows Security Center and
the Control Panel.
Cloud Computing
Cloud computing is the use of various services, such as software
development platforms, servers, storage and software, over the
internet, often referred to as the "cloud."
In general, there are three cloud computing characteristics that are
common among all cloud-computing vendors:
1. The back-end of the application (especially hardware) is
completely managed by a cloud vendor.
2. A user only pays for services used (memory, processing time
and bandwidth, etc.).

3. Services are scalable

Many cloud computing advancements are closely related to


virtualization. The ability to pay on demand and scale quickly is
largely a result of cloud computing vendors being able to pool
resources that may be divided among multiple clients.
Testing Network Connectivity
A few tools can help you determine whether the network can send
data between computers; these tools test the network protocols as well
as low-level network hardware layers.
ping
ping is a fundamental tool for testing TCP/IP network connectivity.
Because most networks today use the Internet (TCP/IP) protocol for
file and printer sharing services, as well as for Internet access, most
Windows users can use the ping test to confirm that their network
cabling, hardware, and the TCP/IP protocol are all functioning
correctly. Ping sends several data packets to a specified computer and
waits for the other computer to send the packets back.

Assigning IP Addresses (No Router)

Self Check 3.2.1


Direction: Enumerate at least 5 Benefits of a wireless network
1. _________________________

2. _________________________

3. _________________________

4. _________________________

5. _________________________
LEARNING ACTIVITY 3.2.1

Firewall Configuration
TASK TITLE:

Given the necessary tools and equipment,


OBJECTIVES:
you should be able to configure firewall
and network security.

LABORATORY WORK: Materials:

1. List down the Computers


available security feature
found on Windows Windows 7 as Operating Systems
Operating System

2. Perform the securing


firewalls

EVALUATION: The student will be assessed according to the


performance criteria.

Performance Criteria 2.2.1

Did you…. Yes No

1. Recognize the available security feature of Windows OS.

2. Determine the use of firewalls

3. Explain when to turn on/off security feature.

4. Successfully turns on the firewall.


LESSON INFORMATION 3.2.2
Wireless Configuration
Router
A router is a device that analyzes the contents of data packets
transmitted within a network or to another network. Routers
determine whether the source and destination are on the same
network or whether data must be transferred from one network type
to another, which requires encapsulating the data packet with routing
protocol header information for the new network type.

Router Configuration
1. Connect the LAN cable to the router to computer servers

2. Open any computer browser, like google chrome, and type its
default IP address(most of the IP address is located at the bottom
of the device) e.g. 192.168.0.1
3. Enter user credentials.
Eg. By default Username: admin Password: admin

4. On the Graphical User Interface(GUI) of the router, click on


system tools menu and hit Restore.
5. The router will restore to its original setting.

6. On the menu, select Wireless -> Wireless Settings. To change


Wireless Network Name also known as SSID.
7. To secure the wireless connection, click Wireless Security. Type
the desired wireless password.

8. To disable routers DHCP, click on DHCP tab, hit DHCP Settings,


and select Disabled.
9. The router will automatically restart after disabling the routers
DHCP.

Configure Local Network Area


It is virtually impossible to find a business that does not have a local
area network in place. If you work in an office setup that has a local
area connection and would like to setup your PC to the LAN to
connect to the Internet, then look no further.
1. Attach the RJ-45 connector to the Ethernet network port on
your PC.
2. Right click on ‘My Network Places’ icons located on the desktop and
in the popup menu. Click on Properties

Alternatively, click ‘Start’ from the taskbar and right click on


‘My Network Places’ option from the popup menu. In the menu that
appears select ‘Properties’

3. Right-click on ‘Local Area Connection’ in the new Window that


appears (under the LAN or High-Speed internet section).
4. Click Properties in the popup menu that appears.

5. Scroll down and select ‘Internet Protocol (TCP/IP) and click on


‘Properties' in the Local Area Connection dialog box that appears
under the connection box.
6. Opt for obtaining the configuration settings automatically or
manually. To obtain the settings automatically, select ‘Obtain an IP
Address Automatically’. However, to use this option, you will need to
have a DHCP server that will function in allocating and managing IP
address to ensure that there are no conflicts.

7. Configure your PC to the network manually, if you modem isn't


connected that with the options mentioned above.
Click the option ‘Use the following IP Address’.
Enter the IP address to use. It is important that you consult your
network administrator on the IP to use so as to avoid conflicts
occurring in the network, i.e. a situation where two PCs have similar
IP addresses.

Enter the Subnet Mask and Default gateway. The subnet mask is
used to identify the network level you are in while the default gateway
identifies the router connection
8. Check connection. This will enable you to know if the local area
connection is connected or disconnected.

Dynamic means "constantly changing." The


prefix dyna means power; however, dynamic IP addresses aren't more
powerful, but they can change (or be changed).
Static means staying the same. Static. Stand. Stable. Yes, static IP
addresses don't change.

Most IP addresses assigned today by Internet Service Providers are


dynamic IP addresses. It's more cost effective for the ISP and you.

How to share your laptop wireless internet connection to another


computer 

If you have an internet connection on your laptop by means of your


Wireless adapter, or a USB Modem, you could share this to other
computer, and here it what it takes:

Step 1: Create a cross over cable. How to create a cross over


cable? click here

Step 2: Connect the first end to your laptop LAN port,

Step 3: Connect the other other end to your computer without a


wireless LAN

Step 4: Go to Network sharing center. 


Step 5: Click Change adapter settings

Step 6: Right click on your wireless adapter (the one connected on the
internet) then click properties
Step 7: Click Sharing tab and choose allow other user to connect
through this computer's internet connection, then choose the LAN
adapter where you connect your cross over cable.

Note: your wireless adapter or the network device that you shared will
become the gateway and will serve as a gateway for other computers
connected on it.

Also, choose obtain IP address automatically option if your internet


connection is a dynamic type, If static, you will be required to
configure this correctly.
CONFIGURE N ROUTER AS A WIRELESS ACCESS POINT
The main router will be connected to the TP-Link N router via LAN port (as seen
below).  The WAN port is not used for this configuration.

                     Main Router                                                     Access Point

Step 1

Connect your computer to a second LAN port on your TP-Link N router using an
Ethernet cable.* Login to the TP-Link web interface through the IP address listed
on the label on the bottom of your TP-Link N router (see below link for
assistance):

Note: Though possible, it is not recommended to attempt this process over Wi-Fi

 Step 2

Go to Network>LAN on the side menu and change the LAN IP address of your


TP-Link N router to an IP address on the same segment of the main router. This
IP address should be outside the main router’s DHCP range.

 Example: if the DHCP of your main router is 192.168.2.100 – 192.168.2.199


then you can set the IP of the TP-Link N router to 192.168.2.X (X should be
outside your main router's DHCP range), like 192.168.2.11.

Note:  After changing the LAN IP address a reboot will be required and you will
need to log into the TP-Link N router with the new IP address.

Step 3

Go to Wireless>Wireless Settings and configure the SSID (Network name)which


can be the same or different from the main router’s. Select Save.
 Step 4

Go to Wireless>Wireless Security and configure the wireless


security. WPA/WPA2-Personal is recommended as the most secure option. 
Once configured, click Save.

Note: If using a dual band router, repeat this process for the 5GHz band as well.

 Step 5

Go to DHCP>DHCP Settings and select Disable the DHCP Server. Select Save.


Step 6

Go to System Tools>Reboot and select Reboot to reboot the device.

 Step 7

Use an Ethernet cable to connect the main router to your TP-Link N router
through their LAN ports (any LAN ports may be used). All other LAN ports on
your TP-Link N router will now grant devices Internet access. Alternatively, any
Wi-Fi device can now access the Internet through your TP-Link N router by
using the SSID and Password set up in the above steps.
SELF-CHECK 3.1
Choose the correct answer to the question. Write only the letter of the
answer on your answer sheet.

1. Device that analyzes the contents of data packets transmitted


within a network or to another network
a. Access point
b. Repeater
c. Router
d. Switch

2. Dynamic means "constantly changing." The


prefix dyna means __________; however, dynamic IP addresses
aren't more powerful, but they can change (or be changed).
a. active
b. force
c. multiple
d. power
Lesson 2.4: Inspect and test the configured
computer networks

 Follow OHS procedures in testing configured computer


system and networks;

 Apply testing on configured computer system and networks


in accordance with the job requirement; and

 Accomplish technical reports on the tests conducted.

DEFINITION OF TECHNICAL TERMS


IP config. is a command used to find out the IP address of a
certain network.

Ping. a command prompt used to test the ability of the source


computer to reach a specified destination computer.
LESSON INFORMATION 2.4.1

Safety Precautions

Occupational Health and Safety (OHS) Policy – An Information and


Communication technology (ICT) student should know how to behave
when working in the computer laboratory, and to accomplish task
safely. Safety practices should be learned early and always adheres in
working with any electrical and electronic device, including personal
computers and its peripherals. This is for your protection as well as
to the people working with you, and for the devices that you are using.

Occupational safety and health (OSH) is a planned system of


working to prevent illness and injury where you work by recognizing
and identifying hazards and risks. Health and safety procedure is the
responsibility of all persons in the computer and technology
industries. You must identify the hazards where you are working and
decide how dangerous they are. Eliminate the hazard or modify the
risk that it presents.

Occupational Health and Safety standards


Each student has a responsibility to their colleagues and their
organization to report and act upon any potential workplace hazard.
Students need to be aware of the type of hazards that are possibly
present in their work environment

Procedure
1. Identify the hazard.
2. Clear the area close to the hazard.
3. Partition the hazard off or clearly identify the area to protect
other people from harm.
4. If the hazard can be easily and safely cleared, then do so.
If not…
5. Report the hazard to the appropriate person (such as teacher in
charge, principal etc.) to obtain assistance.
6. After clearing the hazard, fill out the correct documentation to
assist in identifying improved practice to reduce further
incidence of hazards.
All hazards must be reported using an Accidental Report form. This
enables us to track the kinds of hazards we have in our workplace,
and take action when necessary to make it safer for all student and
clients.

Accident Reports
Forms are used to give specific details with regards to accidents
that happened in the laboratory during experiments.

Accident reports contain the following details:


 Name of the person injured
 Date and time of the accident
 Type of injury
 First aid given
 Action taken to prevent further accidents

Accident Report Sample Form

Date:

Form No: Accident Report Form

Rm. No:

Name: Yr/Sec:

Type of Injury Cause of Injury Remedy

Hazardous substances
If the workplace hazard appears to be dangerous to staff and
clients and professional assistance is required:
A. Call the supervisor or manager and advise them of the
problem and the urgency of the matter.
B. Depending on the risk, an evacuation may be called.
C. Follow the evacuation procedure.
D. The supervisor or manager will call in the fire brigade or
specialized personnel who will deal with the spill.

Fire Exits
All fire exits should be kept clear from any obstacles. All
students have a responsibility to make sure that chairs, empty boxes
or any other type of obstacle are not placed in or near fire exit
doorways.
All corridors also need to have equipment stored on one side
only to ensure that in the event of an emergency there is a clear exit.
Fire Safety Procedure
Each work area has a designated fire warden, who in the event
of a fire will take charge. They are recognized by the use of the red
hard hat they wear.

If you find the fire:


 Assess the danger prior to doing anything.
 If it is safe, assist anyone to move away from the vicinity of the
fire.
 If it is possible, close the door to the fire area.
 Call for assistance. Verbally call FIRE, FIRE, in a loud and clear
voice.
 Break the glass section of the fire alert call point.
 Call to the switch; ensure you know where the fire is, any other
details that may be of assistance to the fire brigade. Details
could be size of the fire, cause or type of fire, any people hurt or
trapped, has anyone tried to put it out.
 If it is safe to do so, put out the fire with the correct
extinguisher or fire hose

If the designated fire officer is not present, someone quickly


needs to take responsibility and:
1. Locate the source of the fire.
2. Locate any people.
3. Remove all people from the building.
4. Once outside, do a head count.
5. Notify the authorities.

Personal Safety While Working with PCs


Computer equipment can be dangerous, and you or others can
be injured or even killed if you don’t follow proper safety guidelines
when working along with PCs. The following are some precautionary
measures to take before working with any computer equipment:

 Wear shoes with non-conductive rubber soles to help reduce the


chance of being shocked or seriously injured in an electrical
accident.
 Do not work on components that are plugged into their power
source.
 Do not remove expansion cards from a computer when it is
turned on.
 Remove jewelries when working inside any computer-related
equipment.
 Be sure not to pour water on electronic components.

LESSON INFORMATION 2.4.2

Guidelines for Testing Configured Computer System and


Network

Testing Your Computer Network

You've set up all your network switches, plugged in all the


cables, and configured all your computers. One task remains before
you can declare your network is finished: You must verify that the
network works as expected.
Here are a few simple tests you can conduct to make sure your
network is functional:

1. Check the physical connections.

Check that the Link light — the little red or green light next to the
RJ-45 port — is lit on every computer. You must check this light both
on the computer itself and on the switch or router the computer is
plugged into. If this light is not on, you have a connection problem —
most likely a bad cable.

2. Verify that you can log in.

When you're sure the physical connections are good, you should
attempt to log in to each of your network computers using a valid
domain user account.

3. Check the network configuration.

Click the Start button, type cmd and press Enter. Then, enter the
command ipconfig /all and press Enter.
This command will spit out numerous lines of information. The line
you're looking for should resemble this:

IPv4 Address. . . . . . . . . . . : 192.168.1.125 (Preferred)

If this part of the output does not show a valid IP address, you
need to check that your IP configuration is set correctly and that your
DHCP server is working.

4. Verify that the computers can ping each other.

Another basic test you should perform is to use the ping command
from a command prompt to make sure that the computers on your
network can contact one another. Do several ping tests. First, make
sure that TCP/IP is up and running by having the computer try to
ping itself. Open a command prompt and type ping local host. The
output from this command will indicate whether or not the ping was
successful. Next, try to ping your servers by name. For example, if
your file server is named FileServer01, use the command ping
FileServer01.

Writing a Technical Report on Test Conducted

Technical Report is any document that records the procedure


adopted and results obtained from a scientific or technical activity or
investigation. Use the following format for a technical report for your
recently conducted test.

TECHNICAL REPORT ON TEST CONDUCTED

Name of Technician: ________________________________________


Date of Inspection: __________________ Time: _________________

Device Tested:

Specification:
Diagnosis:

Action Taken:

Remarks:

SELF-CHECK 2.4.2
Choose the correct answer to the question. Write only the letter of the
answer on your answer sheet.
LEARNING ACTIVITY 2.4.2
Directions: In this activity, you will check the status of your wireless
connection, investigate the availability of wireless networks, and test
connectivity. After accomplishing the task, you need to write a
technical report regarding the test conducted.

Recommended Equipment

 A computer with Windows XP Professional installed


 A wireless NIC installed
 An Ethernet NIC installed
 Linksys WRT300N Wireless Router
 Internet connectivity

Step 1
 Disconnect the Ethernet patch cable from your computer.
 A red “X” appears over the “Local Area Connection” icon

Figure 1. Local Area Connection- A Network Cable is Unplugged

 Hover over the “Wireless Network Connection” icon in the tray.

Figure 2. Wireless Network Connection Icon in System Tray

 Open a command window.


 Ping 127.0.0.1.
Figure 3. Ping 127.0.0.1

 Use the ipconfig command.


 Get IP address of the default gateway.

Figure 4. Ipconfig window

 Ping the default gateway.

Figure 5. Ping the Default Gateway

 A successful ping indicates that there is a connection between


the computer and the default gateway.
Step 2
 Open a web browser.
 Type www.google.com in the “Address” field, and then press
Return.

Step 3
 Open the Network Connections window.

Figure 6. Network Connections Window

 Right-click the wireless connection and choose Properties.


 Click the Wireless Networks tab.

Figure 7. Wireless Networks Tab

 Click the View Wireless Networks button.


TECHNICAL REPORT ON TEST CONDUCTED

Name of Technician: ________________________________________


Date of Inspection: __________________ Time: _________________

Device Tested:

Specification:

Diagnosis:

Action Taken:

Remarks:
POST-ASSESSMENT

Choose the best answer and write only the letter of your answer on
your answer sheet.

Refer to the Answer Key.


ANSWER KEY
Area of Specialization: COMPUTER SYSTEMS SERVICING NC II

Module Title: MODULE 2 (SETTING-UP COMPUTER NETWORKS)

Post-
Preassessment Self-Check 1.1
Assessment

You might also like