Download as pdf or txt
Download as pdf or txt
You are on page 1of 123

Sector : ELECTRONICS

Qualification Title :COMPUTER SYSTEM SERVICING NC-II

Unit of Competency : SET-UP COMPUTER SERVERS

Module Title : SETTING-UP COMPUTER SERVERS

LIFE GOAL INTERNATIONAL INSTITUTE


CSS Department
Mejorada Subd , Roxas City
COMPETENCY BASED LEARNING
MATERIAL

HOW TO USE THIS COMPETENCY BASED LEARNING MATERIAL

Welcome to the module: Setting-up Computer Servers, this module


contains training materials and activities for you to complete the unit of
competency “Set-up Computer Server” contains the knowledge, skills and
attitudes required for Computer System Servicing NC II.
You are required to go through a series of learning activities in order
to complete each learning outcome of the module. In each learning outcome
there are information sheets, operation sheets, jobsheets, resource sheets
and reference materials for further reading to help you better understand
the required activities. Follow these activities on your own and answer the
self check at the end of each learning outcome. Get the answer key from
your instructor and check your work honestly. If you have questions, don’t
hesitate to ask your facilitator for assistance.

Recognition of Prior Learning (RPL)

You may already have some or most of the knowledge and skills covered in
this module because you have:

• Been working for sometime


• Already completed training in this area

If you can demonstrate to your trainer that you are competent in a


particular skill or skills, talk to him about having them formally recognize so
you won’t have to do the same training again. If you have qualifications or
Certificates of Competency from previous trainings, show them to your
trainer. If the skills you acquired are still relevant to this module, they may
become part of the evidence you can present for RPL.

At the end of this learning material is a learner’s diary: use the diary to
record important dates, job undertaken and other workplace events that will
assist you in providing further details to your trainer or assessors. A record
of achievements is also provided for your trainer to complete once you
completed the module.

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 1 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
The learning material was prepared to help you achieved the required
competency
in Implementing and monitoring infectioncontrol policies and procedures
this will be the source of independent study at your own pace and with
minimum supervision or help from your instructor.

In doing the activities to complete the requirements of this module, please


be guided by the following:

• Talk to your trainer and agree on how you will organize the training
under this module. Read through the module carefully. It is divided
into sections, which cover all the skills and knowledge you need to
successfully complete this training.
• Work through all information and complete the activities in each
section. Read the information sheet and complete the self- check
provided. Suggested references are included to supplement the
materials provided in this module.
• Most probably your trainer will also be your supervisor or manager.
He is there to support you and show you the correct way to do things.
Ask for help.
• Your trainer will tell you about the important things you need to
consider when you are completing the activities and it is important
that you listen and take notes.
• You will be given plenty of opportunities to ask questions and practice
on the job. Make sure you practice your new skill during regular work
shifts. This way you will improve both your speed and memory and
also your confidence
• Talk to more experienced work mates and ask for their guidance.
• Use self-checks questions at the end of each section to test your
progress.
• When you are ready, ask your trainer to watch and observe you
perform the activities outlined in this module.

• As you work through the activities, ask for written feedback on your
progress. Your trainer keeps feedback/re assessment reports for this
reason. When you have completed this learning materials and feels
confident that you have had sufficient knowledge and skills, your
trainer will arrange an appointment with a registered assessor to
assess you. The results of the assessment will be recorded in you
Competency Achievement Record.

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 2 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
Remember to:

▪ Work through all the information and complete the activities in each
section.Read information Sheets and complete the self-check. Suggested
references are included to supplement the materials provided in this
module.
▪ Most probably your trainer will also be your supervisor or manager.
He/she is there to support you and show you the correct way to do
things.

▪ You will be given plenty of opportunity to ask questions and practice on


the job. Make sure you practice your new skills during regular work
shifts. This way you will improve both your speed and memory and also
your confidence.

▪ Use the Self-checks, Operation Sheets or JobSheets at the end of each


section to test your own progress.
▪ When youfeel confident that you have had sufficient practice, ask your
Trainer to evaluate you. The results of your assessment will be recorded
in your Progress Chart.

You need to complete this module before you can perform the next module,
Maintain and Repair Computer Systems and Networks.

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 3 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
Module Content

UNIT OF COMPETENCY: Set-up Computer Servers

MODULE TITLE: Setting-up Computer Servers

MODULE DESCRIPTOR:
This unit covers the knowledge, skills and attitudes
needed to set-up computer servers for LANs and SOHO systems. It
consists of competencies to set-up user access and configures network
services as well as to perform testing, documentation and pre-
deployment procedures.

NOMINAL DURATION: 1.5hr

LEARNING OUTCOMES:

At the end of this module you MUST be able to:


1. Set up user access
2. Configure network services
3. Perform testing, documentation and pre deployment procedures

ASSESSMENT CRITERIA:

• User folder is created in accordance with network operating system


(NOS) features
• User access level is configured based on NOS features and established
network access policies/end-user requirements.
• Security check is performed in accordance with established network
access policies/end-user requirements.
• Normal functions of server are checked in accordance with
manufacturer’s instructions
• Required modules /add-ons are installed/updated based on NOS
installation procedures
• Network services to be configured are confirmed based on user/system
requirements
• Operation of network services are checked based on user/system
requirements
• Unplanned events or conditions are responded to in accordance with
established procedures
• Pre-deployment procedures is undertaken based on enterprise policies
and procedures
Date Developed: Document No.
COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 4 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
• Operation and security check are undertaken based on end-user
requirements
• Reports are prepared/completed according to enterprise policies and
procedures.

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 5 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
Learning Outcome # 1.Set up user access

ASSESSMENT CRITERIA:
1. User folder is created in accordance with network operating system
(NOS) features
2. User access level is configured based on NOS features and established
network access policies/end-user requirements.
3. Security check is performed in accordance with established network
access policies/end-user requirements.

CONTENTS:
• Computer servers
• Windows server 2008 R2 Installation
• Peer to peer network
• Set up peer to peer network
• Drive and folder sharing
• Folder redirection
• Folder redirection configuration

CONDITIONS: Students /trainees must be provided with the following:


• Paper and pencil
• UTP cables
• Material specifications charts
• Tool Catalogues
• Wire cutter
• RJ45
• Complete set of computer system
• Network Operating system
• Router
• Switch hub
• Computer server

METHODOLOGIES:
• Modular / Self – pace
• Lecture / Demonstration
• Practical Exercises
• Video presentation

ASSESSMENT METHODS:
• Direct observation/questioning
• Demonstration
• Written test

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 6 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
Learning Experiences

Learning Outcome No.1:Set up user access

Learning Activities Special Instruction

Read Information Sheet 3.1-1. After


1. Information Sheet 3.1-1
Reading the learner is encourage to
Computer Servers
answer the self-check.
Compare your answers to Self- check key
answer. You are required to get all
2. Self-Check 3.1-1 answers correct. If not, read the
information sheet again to answer the
questions again correctly.
Perform operation Sheet 3.1-
3. Operation sheet 3.1-1
1.UsethePerformance Criteria Checklist
Windows Server 2008R2
to evaluate your own work. Present your
Installation
work to your trainer for evaluation.
Read Information Sheet 3.1-2. After
4. Information sheet 3.1-2
Reading the learner is encourage to
Peer to Peer network
answer the self-check.
Compare your answers to Self- check key
answer. You are required to get all
5. Self-Check 3.1-2 answers correct. If not, read the
information sheet again to answer the
questions again correctly.
Perform operation Sheet 3.1-
6. Operation sheet 3.1-2 2.UsethePerformance Criteria Checklist
Peer to Peer Network Set up to evaluate your own work. Present your
work to your trainer for evaluation.
Perform operation Sheet 3.1-
7. Operation sheet 3.1-3
3.UsethePerformance Criteria Checklist
How to Share Drive and
to evaluate your own work. Present your
Folder in Computer Network
work to your trainer for evaluation.

Read Information sheet3.1-4. After


8. Information sheet 3.1-4
Reading the learner is encourage to
Folder Redirection
answer the self-check.

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 7 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
Compare your answers to Self- check key
answer. You are required to get all
9. Self-Check3.1-4 answers correct. If not, read the
information sheet again to answer the
questions again correctly.
Perform operation Sheet 3.1-
10. Operation sheet 3.1-4
4.UsethePerformance Criteria Checklist
How to configure folder
to evaluate your own work. Present your
redirection
work to your trainer for evaluation.

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 8 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
Information Sheet 3.1– 1
Computer Server

Learning Objectives: After reading this information sheet the trainee will
learn about the basic concept of computer servers.

A server is a computer program or a machine that waits for requests


from other machines or software (clients) and responds to them. A server
typically processes data.The purpose of a server is to share data or hardware
and software resources among clients. This architecture is called the client–
server model. The clients may run on the same computer or may connect to
the server over a network. Typical computing servers are database servers, file
servers, mail servers, print servers, web servers, game servers, and application
servers.
Server machines (which can be either actual or virtual machines) run
server programs. In turn, a server program turns the machine on which it
runs into a server machine. However, designating a machine as "server-class
hardware" implies that it is more powerful and reliable than standard personal
computers or is specialized for performing the server's role. Servers may be
composed of large clusters of relatively simple, replaceable machines.

About Windows Server 2008 R2


Windows Server 2008 R2 is a network operating system Microsoft, and can
be deployed in medium to large scale industries in order to allow
administrators to centrally manage the entire network setup right from a
single location. The main difference between a client operating system, such
as Microsoft Windows 8, Microsoft Windows 7, etc. and a network operating
system such as Microsoft Windows Server 2008 RTM/R2, Windows Server
2003 and Windows 2000 Server is that the network operating system (NOS)
has some additional server specific features integrated in it. These additional
features include:

• Active Directory Domain Services (AD DS)


• Dynamic Host Configuration Protocol (DHCP)
• Domain Name System (DNS)
• Active Directory Certificate Services (AD CS)

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 9 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
• Active Directory Federation Services (AD FS)
• Distributed File System (DFS), etc.

Although Windows Server 2008 R2 is a network operating system, it is


initially installed just as a normal client operating system, i.e. without any
additional server oriented services or features installed in it. In order to make
the installed network operating system work as a typical server, systems
administrators must install the server services and/or features according to
the role that they want the computer to play in the network.

System Requirements
Before installing Windows Server 2008 R2, the computer must meet the
following minimum system requirements

• 1.4 GHz x86/x64 or Itanium 2 processor


• 512 MB RAM (2 GB recommended)
• Super VGA or higher display
• 32 GB disk space (10 GB for Foundation Edition)
• DVD drive
• Keyboard and pointing device

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 10 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
Self-Check 3.1-1

Identification: Minimum System requirements to install Windows Server 2008


R2

________________1. RAM
________________2. Processor
________________3. Hard disk drive
________________4. Display
________________5. Drive

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 11 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
Answer key to self-check 3.1-1

1. 512MB
2. 1.4Ghz
3. 32GB
4. Super VGA or higher display
5. DVD

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 12 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
Operation Sheet 3.1-1

Windows Server 2008 R2 Installation

Performance Objective : To install windows server 2008 R2 as a network


operating system

Supplies/Materials : windows server 2008R2 installer, installation manual,


flash drive

Equipment: Complete set of computer, avr or ups

Steps/Procedure:
Once the above discussed minimum system requirements are met,
administrators must follow the steps given below to install Windows Server
2008 R2:

1. Power on the computer on which Microsoft Windows Server 2008 R2 is to


be installed.
2. Enter into the BIOS setup to make the computer boot from DVD.
3. Insert Microsoft Windows Server 2008 R2 bootable installation media.
4. Once inserted, reboot the computer.
5. On the Install Windows screen, click Next.

Install Windows

6. On the next page, click Install now.


Date Developed: Document No.
COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 13 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
7. On Select the Operating System you want to install page, from the
displayed Windows Server 2008 R2 editions, select the appropriate edition
that is to be installed.

Select Appropriate Edition

8. On the next page, type the 25-character product key and click Next.
9. On Please read the License terms page, check I accept the license
terms checkbox and click Next.
10. On Which type of installation do you want page, click Custom
(advanced).

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 14 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
Click Custom (Advance)

11. On Where do you want to install Windows page, ensure that the hard
disk drive on which Windows Server 2008 R2 is to be installed is selected.
12. Once selected, click Drive options (advanced).

Click Drive Options

13. From the enabled options, click New to create a new disk drive partition.
14. On the Size field, specify the size of the new volume in MB.

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 15 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
Specify Volume Size

15. On the displayed Install Windows message box, click OK.


16. Back on the same page, click to select the hard disk drive partition (E.
g.Disk 0 Partition 2, in this demonstration) where Windows Server 2008
R2 is to be installed and click Next.

Select Disk Partition

17. On the Installing Windowspage, wait till the Windows Server 2008 R2
installed and the computer get restarted.

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 16 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
Installing Windows
Note: Do not press any key if the screen displays the message, ‘Press any
key to boot from CD or DVD’ while computer restarts for the first time, to
resume the installation process.

18. After second restart, on the displayed screen, click OK to change the
user password before logging on for the first time.
19. On the available fields, type and retype the new password and
press Enter.

Change Password

20. On the next confirmation screen, click OK to log on to the Windows


Server 2008 R2 computer.

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 17 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
PERFORMANCE CHECKLIST NO. 3.1-1

Windows Server 2008R2 Installation

Name of Trainee: ___________________________ Date: ___________

Directions:Check Column Yes if the identified behavior or skills was


performed correctly and No if not.

CRITERIA YES NO
1. Has entered into the BIOS setup to make the computer boot
from DVD?
2. Has inserted Microsoft Windows Server 2008 R2 bootable
installation media?
3. Has selected Appropriate Edition?
4. Has clicked Custom (Advance)?
5. Has clicked Drive Options?
6. Has specified Volume Size?
7. Has selected Disk Partition?

Comments/Suggestions:

Trainer: ___________________________________ Date: ___________________

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 18 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
Information Sheet 3.1 – 2

Peer to Peer Network (P2P)

Learning Objectives: After reading this information sheet the trainee will
learn to set up peer to peer network architecture.

PEER TO PEER NETWORK (P2P)


In its simplest form, a peer-to-peer (P2P) network is created when two or
more PCs are connected and share resources without going through a
separate server computer. A P2P network can be an ad hoc connection—a
couple of computers connected via a Universal Serial Bus to transfer files. A
P2P network also can be a permanent infrastructure that links a half-dozen
computers in a small office over copper wires. Or a P2P network can be a
network on a much grander scale in which special protocols and applications
set up direct relationships among users over the Internet.

The initial use of P2P networks in business followed the deployment in


the early 1980s of free-standing PCs. In contrast to the minimainframes of the
day, such as the VS system from Wang Laboratories Inc., which served up
word processing and other applications to dumb terminals from a central
computer and stored files on a central hard drive, the then-new PCs had self-
contained hard drives and built-in CPUs. The smart boxes also had onboard
applications, which meant they could be deployed to desktops and be useful
without an umbilical cord linking them to a mainframe. Any workers felt
liberated by having dedicated PCs on their desktops. But soon they needed a
way to share files and printers. The obvious solution was to save files to a
floppy disk and carry the disk to the intended recipient or send it by interoffice
mail.

Sneaker Nets

That practice resulted in the term "sneaker net." The most frequent
endpoint of a typical sneaker net was the worker who had a printer connected
to his machine.

While sneaker nets seemed an odd mix of the newest technology and the
oldest form of transportation, the model is really the basis for today's small
P2P workgroups.

Whereas earlier centralized computing models and today's client/server


systems are generally considered controlled environments in which individuals
use their PCs in ways determined by a higher authority, a classic P2P
workgroup network is all about openly sharing files and devices.

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 19 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
In general, office and home P2P networks operate over Ethernet (10M bit/sec.)
or Fast Ethernet (100M bit/sec.) and employ a hub-and-spoke topology.
Category 5 (twisted-pair) copper wire runs among the PCs and an Ethernet
hub or switch, enabling users of those networked PCs access to one another's
hard drives, printers or perhaps a shared Internet connection.

Both Client and Server

In effect, every connected PC is at once a server and a client. There's no


special network operating system residing on a robust machine that supports
special server-side applications like directory services (specialized databases
that control who has access to what).

In a P2P environment, access rights are governed by setting sharing


permissions on individual machines.

For example, if User A's PC is connected to a printer that User B wants


to access, User A must set his machine to allow (share) access to the printer.
Similarly, if User B wants to have access to a folder or file, or even a complete
hard drive, on User A's PC, User A must enable file sharing on his PC. Access
to folders and printers on an office P2P network can be further controlled by
assigning passwords to those resources.

Navigating a P2P Network

This diagram shows how a P2P network operates. The solid lines
indicate physical, hard-wired network cables. The dotted lines indicate that
each PC can communicate and share files with every other PC on such a
network. A printer attached to one PC can be used by other PCs on the
network—if that printer’s PC allows such use.

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 20 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
Self-check 3.1-2

True or False: Write “T” if the statement is true and “F” if the statement is
False in the space provided each number.

_______1. A P2P network cannot be an ad hoc connection

_______2 A P2P network also can be a permanent infrastructure that links a


half-dozen computers in a small office over copper wires.

_______3. A P2P network can be a network on a much grander scale in which


special protocols and applications set up direct relationships among users
over the Internet.

_______4. A P2P environment, access rights are governed by setting sharing


permissions on individual machines.

_______5. A peer-to-peer (P2P) network is created when two or more PCs are
connected and share resources without going through a separate server
computer.

_______6. In a P2P environment, access rights are governed by setting sharing


permissions on individual machines.

_______7. Access to folders and printers on an office P2P network can be


further controlled by assigning passwords to those resources.

_______8. Category 3 copper wire runs among the PCs and an Ethernet hub or
switch, enabling users of those networked PCs access to one another's hard
drives, printers or perhaps a shared Internet connection.

_______9. A classic P2P workgroup network is all about openly sharing files
and devices.

_______10. The most frequent endpoint of a typical sneaker net was the worker
who had a printer connected to his machine.

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 21 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
Answer key to Self-Check 3.1-2

1. F 6. T

2. T 7. T

3. T 8. F

4. T 9. T

5. T 10. T

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 22 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
Operation Sheet 3.1-2

Peer-To-Peer Network Setup

Introduction

When building a network, you can physically connect the computers before or
after installing (or checking) the operating systems. After installing the
operating system, there are a few you should check to make sure a computer
is working.One of the things you should do is to check that a computer can
communicate with others.

Performance Objective :To set up peer to peer network

Supplies/Materials : 2 straight thoughutp cable with rj 45 both ends

Equipment: Complete set of computer, avr or ups, wireless router, switch


hub

Steps/Procedure:
Wired Networking
To connect the computers:
1. Shut down all computers and the router (if necessary)
2. Turn on one computer you will use to setup the router
3. Your router should have come equipped with a piece of paper or a
brochure of just a few pages that lists the instructions to follow to setup
the router. One of the early instructions may ask you to insert the CD
that came with the router, in the CD drive and wait for the instructions.
Follow these instructions faithfully
4. After setting up and configuring the router, turn it off and turn off the
computer you used to set it up (this step is optional)
5. Connect each of the other computers to the router using an RJ-45 cable
for each connection:

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 23 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
Accessing the Network
After installing the operating systems on the computers, a network, named a
homegroup, is automatically created, and that network is called Homegroup.
Microsoft Windows 7 provides a fast way to create a peer-to-peer network.
6. To use it, start Windows Explorer. Depending on the computer or its
manufacturer, in the left frame, you may see an icon labeled
Homegroup:

7. If you see it, click it. A new window may come up:

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 24 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
8. Read the text and click Join Now. Another window would come up:

9. Click Next. You will be asked to provide a password.

Wireless Networking
If you plan to let some computers access the network wirelessly (using a
router that has wireless capability), you may need to use one computer to set
it up.
To do this:
10. Start the computer you will use to setup the router (you should turn the
others off):

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 25 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
11. Most, if not all, wireless routers come with very easy to follow
instructions. Most of them usually ask you to first insert the disc that
accompanies the router, that is, before physically installing the router.
Consult the documentation (usually just one or a few pieces of paper or
a small brochure) and faithfully follow its disc's instructions. At one
time, the instructions would indicate to you when to connect the
computer and the wireless router. To do this, you will use a cable
(usually supplied to you) to connect one end to the computer and
another end to the router:

Because the steps to perform depend on the router (or the


manufacturer), we will let you perform as described by their
documentation
12. After installing and setting up the wireless router, turn it off and turn
the computer off
13. For any computer that doesn't have a wireless network card but has a
wired network card, connect it to a port of the wireless router using an
RJ-45 cable. The computers that have a network card will not need a
physical connection to the wireless router:

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 26 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
14. Turn on the router. After a few seconds, turn on the computers one by
one.
You may not need to check whether they work at this time or not.
Checking Network Connectivity
15. On the Taskbar of a computer that is a member of the network, you
should see the icon for the network connectivity. The icon may appears
empty:

That's good (this is not a guaranty that everything is alright but probably
everything is fine).
If the icon appears with a rotating cursor, the computer is probably looking
for a network:

In this case, you should let it continue searching.


The icon may appear with an orange ball:

16. Click that icon to show a list of available networks (from your neighbors)
and click the name of your network.

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 27 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
If the icon appears with a red X or any suspicious sign, it means something
is wrong:

17. If the computer connects using a cable (wired connection), the first thing
you should check is whether the network cable is connected. If it's not,
connect it and check the icon again. If the cable is connected, the next
thing is to check whether the driver for the network card is installed and
up-to-date. To check it, click Start, right-click Computer, and click
Manage. On the left, click Device Manager. Check how Ethernet
Controller and/or Network Controller appear. If either or both have an
exclamation mark in their icon, ...

... right-click the item and click Properties (you can also double-click it). A
dialog box would come up. It may display a message that the drivers are not
installed:

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 28 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
There are various ways you can get the drivers. One way is to get to the web
site of the manufacturer, download the driver, and install it. Then check the
icon again.
Network Discovery

18. Network discovery makes it possible for a computer to allow other


computers to "see" it on the network. If you have a computer that needs
to participate in a network, you should allow network discovery on it. To
do that, open Windows Explorer and click Network (you can click the
Start button and click the Network option). A message should appear
under the toolbar stating "Network discovery is turned off...":

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 29 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
PERFORMANCE CHECKLIST NO. 3.1-2

Peer to Peer Network Set up

Name of Trainee: ___________________________ Date: ___________

Directions:Check Column Yes if the identified behavior or skills was


performed correctly and No if not.

CRITERIA YES NO
1. Has configured the router?
2. Has connected each of the other computers to the router using
an RJ-45 cable for each connection?

3. Has clicked that icon to show a list of available networks (from


your neighbors) and click the name of your network?

4. Has turned on the network discovery?


5. Has installed the update of the network driver?

Comments/Suggestions:

Trainer: ___________________________________ Date: ___________________

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 30 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
Operation Sheet 3.1-3

How to Share Drive and Folder in Computer Network

Performance Objective :To share drive and folder in computer network

Supplies/Materials : 2 straight thoughutp cable with rj 45 both ends

Equipment: Complete set of computer, avr or ups, wireless router, switch


hub

Steps/Procedure:

You can share your computer drive in computer network, using the following
methods.

1. At first Go to "My Computer" from Desktop or Start Menu and Open it.
2. Right Click on the required drive which you want to share and Choose
"Share width" and the "Advanced sharing.." As given below.

3. After that, drive properties window will appear, then click on "Advanced
sharing" button.
4. That displays advanced sharing dialog box then select on the "Share this
folder" check box, give required comments and the share name as given
on the screen below.

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 31 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
5. After completing all of these click on OK button.

How to Share Folder and Files in Computer Network

You can share your computer folders and files in computer network, using the
following methods.

1. At first, Go to your folder or file and right click on it, Choose "Share
with" option and then click on "Specific people.." as on the screen

below.
2. On the File sharing dialog box, choose people to share with, you can
select specific computer or can choose everyone and click on "share"
button at last. If you want to Stop sharing them on computer network,
Go to step 1 and choose "Stop sharing" option instead of "Specific
people".

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 32 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
3. After clicking on "Stop Sharing" option, you can see file sharing dialog
from where you can choose the option "Stop Sharing" - To remove all
the permissions for all the people and "Change Sharing Permissions"
option - To add or remove people or change the permission. While
changing permissions, you can do as given on the step 2.

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 33 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
PERFORMANCE CHECKLIST NO. 3.1-3

How to Share Drive and Folder in Computer Network

Name of Trainee: ___________________________ Date: ___________

Directions:Check Column Yes if the identified behavior or skills was


performed correctly and No if not.

CRITERIA YES NO
1. Has right clicked on the required drive which you want to share
and Choose "Share width" and the "Advanced sharing”?
2. Has selected on the "Share this folder" check box, give required
comments and the share name?

3. Has clicked on "Advanced sharing" button?

4. Has chosen "Share with" option and then click on "Specific


people?
5. Has chosen people to share with, you can select specific
computer or can choose everyone and click on "share" button
at last?

Comments/Suggestions:

Trainer: ___________________________________ Date: ___________________

Information Sheet 3.1-2

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 34 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
Folder Redirection

Learning Objective: After reading this information sheet the trainee will
learn to configure folder redirection

Applies To: Windows 8, Windows Server 2008 R2, Windows Server 2012

Folder Redirection

User settings and user files are typically stored in the local user profile,
under the Users folder. The files in local user profiles can be accessed only
from the current computer, which makes it difficult for users who use more
than one computer to work with their data and synchronize settings between
multiple computers. Two technologies exist to address this problem: Roaming
Profiles and Folder Redirection. Both technologies have their advantages, and
they can be used separately or together to create a seamless user experience
from one computer to another. They also provide additional options for
administrators managing user data.
Folder Redirection lets administrators redirect the path of a folder to a
new location. The location can be a folder on the local computer or a directory
on a network file share. Users can work with documents on a server as if the
documents were based on a local drive. The documents in the folder are
available to the user from any computer on the network. Folder Redirection is
located under Windows Settings in the console tree when you edit domain-
based Group Policy by using the Group Policy Management Console (GPMC).
The path is [Group Policy Object Name]\User Configuration\Policies\Windows
Settings\Folder Redirection .
Recent changes to Folder Redirection

Folder Redirection now includes the following features:

• The ability to redirect more folders in the user profile folders than in
earlier Windows operating systems. This includes
the Contacts , Downloads , Favorites , Links , Music , Saved
Games , Searches , and Videos folders.

• The ability to apply settings for redirected folders to Windows® 2000,


Windows 2000 Server®, Windows XP, and Windows Server 2003
computers. You have the option to apply the settings that you configure
on Windows Server® 2008 R2, Windows® 7, Windows Server 2008, or
Windows Vista® only to computers that are running those operating
systems, or to apply them to computers that are running earlier
Windows operating systems also. For these earlier Windows operating
systems, you can apply these settings to folders that can be redirected.
Date Developed: Document No.
COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 35 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
These are the Application Data , Desktop , My Documents , My
Pictures , and Start Menu folders. This option is available in
the Settings tab in the Properties for the folder, under Select the
redirection settings for [FolderName] .

• The option to have the Music , Pictures , and Videos folders follow
the Documents folder. In Windows operating systems earlier than
Windows Vista, these folders were subfolders of the Documents folder.
By configuring this option, you resolve any issues related to naming and
folder structure differences between and earlier and more recent
Windows operating systems. This option is available in the Target tab in
the Propertiesfor the folder, under Settings .

• The ability to redirect the Start Menu folder to a specific path for all
users. In Windows XP, the Start Menufolder could be redirected only to
a shared target folder.

Note

This capability is new only to the Start Menu folder. All other
redirectable folders in Windows Vista and later versions can also be
redirected to a specific path for all users.
Folders that can be redirected
You can use the GPMC to redirect folders.

Folder in Windows 7 and Equivalent Folder in Earlier


Windows Vista Windows Operating Systems

AppData/Roaming Application Data

Contacts Not Applicable

Desktop Desktop

Documents My Documents

Downloads Not Applicable

Favorites Not Applicable

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 36 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
Links Not Applicable

Music Not Applicable

Pictures My Pictures

Saved Games Not Applicable

Searches Not Applicable

Start Menu Start Menu

Videos Not Applicable

Advantages of Folder Redirection

• Even if users log on to different computers on the network, their data is


always available.

• Offline File technology (which is turned on by default) gives users access


to the folder even when they are not connected to the network. This is
especially useful for people who use portable computers.

• Data that is stored in a network folder can be backed up as part of


routine system administration. This is safer because it requires no
action by the user.

• If you use Roaming User Profiles, you can use Folder Redirection to
reduce the total size of your Roaming Profile and make the user logon
and logoff process more efficient for the end-user. When you deploy
Folder Redirection with Roaming User Profiles, the data synchronized
with Folder Redirection is not part of the roaming profile and is
synchronized in the background by using Offline Files after the user has
logged on. Therefore, the user does not have to wait for this data to be
synchronized when they log on or log off as is the case with Roaming
User Profiles.

• Data that is specific to a user can be redirected to a different hard disk


on the user's local computer from the hard disk that holds the operating
system files. This makes the user's data safer in case the operating
system has to be reinstalled.

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 37 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
• As an administrator, you can use Group Policy to set disk quotas,
limiting how much space is taken up by user profile folders.

Selecting a Folder Redirection target


The Target tab of the folder's Properties box enables you to select the location
of the redirected folder on a network or in the local user profile. You can
choose between the following settings:

• Basic—Redirect everyone's folder to the same location . This setting


enables you to redirect everyone's folder to the same location and is
applied to all users included in the Group Policy object (GPO). For this
setting, you have the following options in specifying a target folder
location:

o Create a folder for each user under the root path . This option
creates a folder in the form\\server\share\User Account
Name\Folder Name . Each user has a unique path for their
redirected folder.

Note

If you enable the Also apply redirection policy to Windows 2000, Windows 2000
Server, Windows XP, and Windows Server 2003 operating systems option on
the Settings tab, this option is not available for the Start Menu folder.

• Redirect to the following location . This option uses an explicit path for
the redirection location. This can cause multiple users to share the
same path for the redirected folder.

• Redirect to the local user profile location . This option moves the
location of the folder to the local user profile under the Users folder.

• Advanced—Specify locations for various user groups . This setting


enables you to specify redirection behavior for the folder based on the
security group memberships for the GPO.

• Follow the Documents folder . This option is available only for


the Music , Pictures , and Videos folders. This option resolves any issues
related to naming and folder structure differences between Windows 7
and Windows Vista, and earlier Windows operating systems. If you
choose this option, you cannot configure any additional redirection
options or policy removal options for these folders, and settings are
inherited from theDocuments folder.

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 38 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
Note

This behavior also occurs by default if you enable the Also apply redirection
policy to Windows 2000, Windows 2000 Server, Windows XP, and Windows
Server 2003 operating systems option on the Settings tab when you configure
redirection settings for the Documents folder.

• Not configured . This is the default setting. This setting specifies that
policy-based folder redirection was removed for that GPO and the folders
are redirected to the local user profile location or stay where they are
based on the redirection options selected if any existing redirection
policies were set. No changes are being made to the current location of
this folder.

Configuring additional settings for the redirected folder


In the Settings tab in the Properties box for a folder, you can enable these
settings:

• Grant the user exclusive rights . This setting is enabled by default and is
a recommended setting. This setting specifies that the administrator and
other users do not have permissions to access this folder.

• Move the contents of [FolderName] to the new location . This setting


moves all the data the user has in the local folder to the shared folder on
the network.

• Also apply redirection policy to Windows 2000, Windows 2000 Server,


Windows XP, and Windows Server 2003 operating systems . This
enables folder redirection to work withWindows 7 and Windows Vista,
and earlier Windows operating systems. This option applies only to
redirectable folders in earlier Windows operating systems, which are
the Application Data , Desktop , My Documents , My Pictures ,
and Start Menufolders.

Note

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 39 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
The AppData/Roaming (previously Application Data in earlier Windows
operating systems) folder in Windows Vista now contains several folders that
were previously under the root folder of the User Profile folder in earlier
Windows operating systems. For example, in earlier Windows operating
systems, the Start Menu folder was not under the Application Data folder. It
might not make sense to redirect all the folders under Application Datawhen
you enable the Also apply redirection policy to Windows 2000, Windows 2000
Server, Windows XP, and Windows Server 2003 operating systems setting.
Therefore, if you choose this setting, Windows 7 and Windows Vista do not
redirect the following folders automatically: Start Menu , Network
Shortcuts , Printer Shortcuts , Templates , Cookies , Sent To . If you do not
choose this setting, Windows 7 and Windows Vista automatically redirect all
folders under the Application Data folder.

• Policy Removal . The following table summarizes the behavior of


redirected folders and their contents when the GPO no longer applies,
based on your selections for policy removal. The following policy removal
options are available in the Settings tab, under Policy Removal .

Policy
Removal Selected setting Result
option

Redirect Enabled • The folder returns to its user


the folder profile location.
back to • The contents are copied, not
the user moved, back to the user profile
profile location.
location • The contents are not deleted from
when the redirected location.
policy is • The user continues to have access
removed to the contents, but only on the
local computer.

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 40 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
Redirect Disabled • The folder returns to its user
the folder profile location.
back to • The contents are not copied or
the user moved to the user profile location.
profile
location
when Note
policy is
removed If the contents of a folder are
not copied to the user profile
location, the user cannot see
them.

Leave the EitherEnabled or • The folder remains at its


folder in Disabled redirected location.
the new • The contents remain at the
location redirected location.
when • The user continues to have access
policy is to the contents at the redirected
removed folder.

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 41 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
Self-check 3.1-3

True or False: Write “T” if the statement is true and “F” if the statement is
False in the space provided each number.

Advantages of Folder Redirection

____1. Even if users log on to different computers on the network, their


data is always available.

____2. Offline File technology (which is turned on by default) gives users


access to the folder even when they are not connected to the network. This
is especially useful for people who use portable computers.

____3. Data that is stored in a network folder can be backed up as part of


routine system administration. This is safer because it requires no action
by the user.

____4. Data that is specific to a user can be redirected to a different hard


disk on the user's local computer from the hard disk that holds the
operating system files. This makes the user's data safer in case the
operating system has to be reinstalled.

____5. As an administrator, you cannot use Group Policy to set disk quotas,
limiting how much space is taken up by user profile folders.

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 42 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
Answer key to Self-Check 3.1-3

1. T

2. T

3. T

4. T

5. F

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 43 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
Operation Sheet 3.1-4

How to Configure Folder Redirection

Performance Objective :To configure folder redirection


Supplies/Materials : 2 straight thoughutp cable with rj 45 both ends

Equipment: Complete set of computer, avr or ups, wireless router, switch


hub

Steps/Procedure:
1. Open Group Policy Management MMC

Right click Group Policy Objects and click New

2. Name = Folder Redirection and click OK

3. Right click Folder Redirection and click Edit

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 44 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
4. Right click Appdata(Roaming) and click Properties

5. Use Basic setting and select Create a folder for each user as Target
folder location

Root Path is the Redirection folder of the DFS structure

6. Click OK

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 45 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
7. Do the same for the other items

8. Close the window

9. Right click ARN End users OU and click Link an existing GPO and
select Folder Redirection GPO
10. Do the same for the HGV End users GPO

Redirecting Special Folders


In most cases, you should redirect special folders to the root directory instead
of to a specific location because this appends the correct paths for you,
including %username%.
To redirect special folders to the root directory

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 46 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
1. Open a GPO that is linked to the site, domain, or OU that contains the
users whose special folders you want to redirect.

2. In the console tree, under User Configuration\Windows Settings\Folder


Redirection, double-click Folder Redirection to display the special folder
that you want to redirect.

3. Right-click the special folder that you want to redirect (such


as Desktop or My Documents), and then click Properties.

4. Click the Target tab, and then in the Settings box, select Basic -
Redirect everyone’s folder to the same location.

5. Under Target folder location, select Create a folder for each user under
the root path.

6. In the Root Path box, type a Universal Naming Convention (UNC) path,
such as \\servername\sharename, and then click OK.

7. In the Properties dialog box for the special folder, click OK.

The user name and folder name are appended to the UNC path automatically.
To redirect special folders to a specific path

1. Open a GPO that is linked to the site, domain, or OU that contains the
users whose special folders you want to redirect.

2. In the console tree, under User Configuration\Windows Settings\Folder


Redirection, double-click Folder Redirection to display the special folder
that you want to redirect.

3. Right-click the special folder that you want to redirect, and then
click Properties.

4. In the Setting box on the Target tab, select Basic - Redirect everyone’s
folder to the same location.

5. Under Target folder location, select Redirect to the following location. In


the Root Path box, type an UNC path, such as \\server\share, or type a
locally valid path, such as C:\somefolder, and then click OK.

If necessary, you can return redirected folders to their original default


locations by using the following procedure.
To redirect special folders to the local profile location

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 47 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
1. Open a GPO that is linked to the site, domain, or OU that contains the
users whose special folders you want to redirect.

2. In the console tree, double-click Folder Redirection to display the special


folder that you want to redirect.

3. Right-click the special folder that you want to redirect (such as Desktop
or My Documents), and then click Properties.

4. In the Setting box on the Target tab, select Basic - Redirect everyone’s
folder to the same location.

5. Under Target folder location, select Redirect to the local user profile
location, and then click OK.

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 48 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
PERFORMANCE CHECKLIST NO. 3.1-4

How to Configure Folder Redirection

Name of Trainee: ___________________________ Date: ___________

Directions:Check Column Yes if the identified behavior or skills was


performed correctly and No if not.

CRITERIA YES NO
1. Has created a shared folder?
2. Has edited the folder redirection?
3. Has used basic setting and select Create a folder for each
user as Target folder location?
4. Has opened a GPO that is linked to the site, domain, or OU
that contains the users whose special folders you want to
redirect?

5. Has right clicked Folder Redirection and clicked Edit?

Comments/Suggestions:

Trainer: ___________________________________ Date: ___________________

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 49 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
Learning Outcome # 2. Configure network services

ASSESSMENT CRITERIA:

1. Normal functions of server are checked in accordance with


manufacturer’s instructions
2. Required modules /add-ons are installed/updated based on NOS
installation procedures
3. Network services to be configured are confirmed based on user/system
requirements
4. Operation of network services are checked based on user/system
requirements
5. Unplanned events or conditions are responded to in accordance with
established procedures

CONTENTS:

• Active directory
• Preparation for Active Directory Domain Services Installation
• Preparation of Windows Server 2008R2 for active Directory Domain
Services Installation
• Installation of DNS Server
• Installation of File Services
• Installation of dynamic host configuration protocol
• Remote desktop connection

CONDITIONS: Students /trainees must be provided with the following:

• Paper and pencil


• UTP cables
• Material specifications charts
• Tool Catalogues
• Wire cutter
• RJ45
• Complete set of computer system
• Network Operating system
• Router
• Switch hub
• Computer server

METHODOLOGIES:
Date Developed: Document No.
COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 50 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
• Modular / Self – pace
• Lecture / Demonstration
• Practical Exercises
• Video presentation

ASSESSMENT METHODS:

• Direct observation/questioning
• Demonstration
• Written test

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 51 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
Learning Experiences

Learning Outcome No.2: Configure network services

Learning Activities Special Instruction

1. Information Sheet 3.2-1 Read Information Sheet 3.2-1. After


Reading the learner is encourage to
Active Directory
answer the self-check.
Compare your answers to Self- check key
answer. You are required to get all
2. Self-Check 3.2-1 answers correct. If not, read the
information sheet again to answer the
questions again correctly.
3. Information Sheet 3.2-2 Read Information Sheet 3.2-2. After
Preparation for Active Directory Reading the learner is encourage to
Domain Services Installation answer the self-check.
Compare your answers to Self- check key
answer. You are required to get all
4. Self-Check 3.2-1 answers correct. If not, read the
information sheet again to answer the
questions again correctly.
5. Operation sheet 3.2-1
Perform Operation Sheet 3.2-
Preparation of Windows Server
1.UsethePerformance Criteria Checklist
2008R2 for active Directory
to evaluate your own work. Present your
Domain Services Installation
work to your trainer for evaluation.
Perform Operation Sheet 3.2-
6. Operation sheet 3.2-2
2.UsethePerformance Criteria Checklist
Active Directory Domain
to evaluate your own work. Present your
Services Installation
work to your trainer for evaluation.
7. Operation sheet 3.2-3
Perform operation Sheet 3.2-
Install and Configure
3.UsethePerformance Criteria Checklist
Dynamic Host Configuration
to evaluate your own work. Present your
Protocol (DHCP) in Windows
work to your trainer for evaluation.
Server 2008R2

8. Information Sheet 3.2-3 Read Information Sheet 3.2-3. After


Reading the learner is encourage to
Domain Name System
answer the self-check.
Date Developed: Document No.
COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 52 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
Compare your answers to Self- check key
answer. You are required to get all
9. Self-Check 3.2-3 answers correct. If not, read the
information sheet again to answer the
questions again correctly.
Perform operation Sheet 3.2-
10. Operation sheet 3.2-4
4.UsethePerformance Criteria Checklist
How to Install DNS Server in
to evaluate your own work. Present your
Windows Server 2008R2
work to your trainer for evaluation.

Perform operation Sheet 3.2-


11. Operation sheet 3.2-5
5.UsethePerformance Criteria Checklist
How to Install File Services
to evaluate your own work. Present your
Role
work to your trainer for evaluation.

Perform operation Sheet 3.2-


12. Operation sheet 3.2-6 6.UsethePerformance Criteria Checklist
Remote Desktop Connection to evaluate your own work. Present your
work to your trainer for evaluation.

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 53 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
Information Sheet 3.2 – 1

Active Directory

Learning Objective: After reading this information sheet the trainee will
understand the function of active directory services

Active Directory (AD) is a directory service that Microsoft developed


for Windows domain networks. It is included in most Windows
Server operating systems as a set of processes and services. Initially, Active
Directory was only in charge of centralized domain management. Starting with
Windows Server 2008, however, Active Directory became an umbrella title for
a broad range of directory-based identity-related services.
A server running Active Directory Domain Services (AD DS) is called
a domain controller. It authenticates and authorizes all users and computers
in a Windows domain type network—assigning and enforcing security policies
for all computers and installing or updating software. For example, when a
user logs into a computer that is part of a Windows domain, Active Directory
checks the submitted password and determines whether the user is a system
administrator or normal user.
Domain Services
Active Directory Domain Services (AD DS) is the cornerstone of
every Windows domain network. It stores information about members of the
domain, including devices and users, verifies their credentials and defines
their access rights. The server (or the cluster of servers) running this service is
called a domain controller. A domain controller is contacted when a user logs
into a device, access another device across the network or runs a line-of-
business Metro-style app side loaded into a device.
Objects
Asimplified example of a publishing company's internal network. The
company has four groups with varying permissions to the three shared folders
on the network.
Active Directory structures are arrangements of information
about objects. The objects fall into two broad categories: resources (e.g.,
printers) and security principals (user or computer accounts and groups).
Security principals are assigned unique security identifiers(SIDs).
Each object represents a single entity—whether a user, a computer, a
printer, or a group—and its attributes. Certain objects can contain other
objects. An object is uniquely identified by its name and has a set of
attributes—the characteristics and information that the object represents—

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 54 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
defined by a schema, which also determines the kinds of objects that can be
stored in Active Directory.
The schema object lets administrators extend or modify the schema
when necessary. However, because each schema object is integral to the
definition of Active Directory objects, deactivating or changing these objects
can fundamentally change or disrupt a deployment. Schema changes
automatically propagate throughout the system. Once created, an object can
only be deactivated—not deleted. Changing the schema usually requires
planning.
Forests, trees, and domains
The Active Directory framework that holds the objects can be viewed at a
number of levels. The forest, tree, and domain are the logical divisions in an
Active Directory network.
Within a deployment, objects are grouped into domains. The objects for
a single domain are stored in a single database (which can be replicated).
Domains are identified by theirDNS name structure, the namespace.
A domain is defined as a logical group of network objects (computers,
users, devices) that share the same Active Directory database.
A tree is a collection of one or more domains and domain trees in a
contiguous namespace, linked in a transitive trust hierarchy.
At the top of the structure is the forest. A forest is a collection of trees
that share a common global catalog, directory schema, logical structure, and
directory configuration. The forest represents the security boundary within
which users, computers, groups, and other objects are accessible.
Organizational units
The objects held within a domain can be grouped into Organizational
Units (OUs). OUs can provide hierarchy to a domain, ease its administration,
and can resemble the organization's structure in managerial or geographical
terms. OUs can contain other OUs—domains are containers in this sense.
Microsoft recommends using OUs rather than domains for structure and to
simplify the implementation of policies and administration. The OU is the
recommended level at which to apply group policies, which are Active
Directory objects formally named Group Policy Objects (GPOs), although
policies can also be applied to domains or sites (see below). The OU is the level
at which administrative powers are commonly delegated, but delegation can be
performed on individual objects or attributes as well.

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 55 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
Self Checked 3.2-1

Identification. Write your answer before the number.

_____________1.a collection of one or more domains


_____________2. is defined as a logical group of network objects (computers,
users, devices) that share the same Active Directory database
_____________3. a directory service that Microsoft developed for Windows
domain networks.
_____________4. provide hierarchy to a domain, ease its administration, and
can resemble the organization's structure in managerial or
geographical terms.
_____________5. a collection of trees that share a common global catalog,
directory schema, logical structure, and directory
configuration.

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 56 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
Answer key to self-checked 3.2-1

1. Tree
2. Domain
3. Active directory
4. Organizational unit
5. Forest

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 57 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
Information Sheet 3.2 - 2

Preparation for Active Directory Domain Services Installation

Learning Objectives: After reading this information sheet the trainee will
learn to prepare the internet protocol address before installing Active Directory
Services.

Before installing Active Directory Domain Services on Windows Server 2008


R2, the operating system must be prepared accordingly. Preparation of
Windows Server 2008 R2 includes:

• Assigning a static IP address to the computer.


• Renaming the computer to something more specific and self-explanatory
name.
• Verifying that the computer has correct time zone configured in it.
• Specifying appropriate IP address of any existing DNS server in the network.
Note: Loopback address (127.0.0.1) can be used in case no DNS server is
present in the network, and administrators plan to install the DNS server role
on the domain controller itself during AD DS installation.

• Checking if the computer is connected to the network and the entire


network is running properly.
• Verifying that the computer has latest security patches and updates
installed in it.
• Verifying if the computer has sufficient amount of free disk space to hold
appropriate services and features along with all the required applications.
• Verifying that the physical security of the computer is strong and
impeccable.
Network Discovery

Network discovery makes it possible for a computer to allow other


computers to "see" it on the network. To take care of it on the server, start
Windows Explorer and click Network (you can click the Start button and
click the Network option). A message should appear under the toolbar
stating "Network discovery is turned off...":

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 58 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
Click that message and click "Turn on network discovery and file sharing":

You should receive a message box presenting you two options:

Click "Yes, turn on network discovery...". If some computers are already


installed and connected to the same router, their names may appear in the
Network node in Windows Explorer.

Connecting the Server to the Internet


Date Developed: Document No.
COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 59 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
Normally, when you have finished installing the server, if everything went
alright and the computer is connected to a router, you should be connected
to the Internet. To test it, you can start the browser (Internet Explorer), set
the address to http://msdn.microsoft.com, and press Enter.

Windows Updates

You should make sure your installation of the operating system can
regularly get its updates from Microsoft. To take care of this:

a. Click Start -> All Programs -> Windows Update


b. A windows will display, asking you to enable automatic updates.
Click Turn On Automatic Updates

You may be asked to install new updates. Do.

Assigning an IP Address to the Server

Every computer on the network needs an IP address so that other computers


of the network can locate it (just like every house needs a physical address
so that the post office and other people can find it).

A computer has two main ways of getting an IP address:


• A server, called a DHCP server (the word "server" here represents an
application; it doesn't have to be a different server than the one you
installed), can automatically assign (provide) an IP address to each
computer
• You can manually assign an IP address to each computer. Of course,
you need to know a little bit about something named TCP/IP, which
means you would need to know how to create and assign IP addresses
To assign an IP address to a server (that runs Microsoft Windows Server
2008 R2):
Date Developed: Document No.
COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 60 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
• In the Initial Configuration Tasks, click Configure Networking
• On the Taskbar, click Start and click Network. In the left frame, right-
click Network and click Properties. Click Local Area Connection. In the
Local Area Connection Status dialog box, click Properties

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 61 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
Self-check 3.2-2

True or False: Write “T” if the statement is true and “F” if the statement is
False in the space provided each number.

Preparation before installation of Active Directory Domain Services

1. ____Assigning a dynamic IP address to the computer.


2. ____Renaming the computer to something more specific and self-
explanatory name.
3. ____Verifying that the computer has correct time zone configured in it.
4. ____Specifying appropriate IP address of any existing DNS server in
the network.
5. ____Checking if the computer is connected to the network and the
entire network is running properly.
6. ____Verifying that the computer has latest security patches and
updates installed in it.
7. ____Verifying if the computer has sufficient amount of free disk space
to hold appropriate services and features along with all the required
applications.
8. ____Verifying that the physical security of the computer is strong and
impeccable.

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 62 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
Answer key to self-check 3.2-2

1. F 5. T

2. T 6. T

3. T 7. T

4. T 8. T

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 63 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
Operation Sheet 3.2-1

Preparation of Windows Server 2008R2 for active Directory Domain


Services Installation

Performance Objective:To assign static IP address, specify DNS server


address and rename the computer.

Supplies/Materials:2 straight thoughutp cable with rj 45 both ends

Equipment: Complete set of computer with Windows Server 2008R2


installed, avr or ups, wireless router, switch hub

Steps/Procedure:
As discussed above, after verifying the physical prerequisites and network
connection of Windows Server 2008 R2, administrators must follow the steps
given below to set time zone, assign a static IP address, specify DNS server
address, and rename the computer in order to prepare the system for AD DS
installation:

1. Log on to Windows Server 2008 R2 computer with the local administrator


account.
2. On Initial Configuration Tasks window, under Provide computer
Information section, click Set time zone.

Initial Configuration Tasks Window

3. On Date and Time box, click Change time zone.


4. On Time Zone Settings box, from Time zone drop-down list, choose the
time zone for the computer as per the location.

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 64 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
Change Time Zone

5. Once set, click OK and back on Date and Time box, click OK.
6. Back on Initial Configuration Tasks window, under Provide Computer
Information section, click Configure networking.
7. On the Network Connections window, right-click the network adapter on
which IP address is to be configured.
8. On network adapter’s properties box, from the This connection uses the
following items list, click to select Internet Protocol Version 4
(TCP/IPv4) and click Properties.
9. On Internet Protocol Version 4 (TCP/IPv4) Properties box, make sure
that General tab is selected.
10. Click to select Use the following IP address radio button.
11. Populate the enabled IP address and Subnet mask fields with correct
values.

Configure IP Address

12. On the same interface, make sure that Use the following DNS server
addresses radio button is selected.
13. In the Preferred DNS server field, type the name of an existing DNS
server. 127.0.0.1 loopback address can also be typed in the field in case
the same computer is to be used as DNS server.
Date Developed: Document No.
COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 65 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
14. Once specified, click OK to save the modified settings.
15. Back on the network adapter’s properties box, click Close.
16. Close Network Connections window when done.
17. Back on Initial Configuration Tasks window, under Provide Computer
Information section, click Provide computer name and domain.
18. On System Properties box, make sure that Computer Name tab is
selected.
19. On the selected tab, click Change.
20. On Computer Name/Domain Changes box, in the Computer
name field, specify the desired name for the computer and click OK.

Change Computer Name

21. On the displayed box, click OK.


22. Back on the System Properties box, click Close.
23. On the displayed box, click Restart Now to restart the computer in order
to allow the changes to take effect.
24. After the computer is restarted, Active Directory Domain Services (AD DS)
installation process can be initiated using local administrator account.

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 66 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
PERFORMANCE CHECKLIST NO. 3.2-1

Preparation of Windows Server 2008R2 for active Directory Domain


Services Installation

Name of Trainee: ___________________________ Date: ___________

Directions:Check Column Yes if the identified behavior or skills was


performed correctly and No if not.

CRITERIA YES NO
1. Has logged on to Windows Server 2008 R2 computer with
the local administrator account?

2. Has changed the time zone?


3. Has clicked to select Use the following IP address radio
button?
4. Has Specified the desired name of the computer?

5. Has restarted the computer?

Comments/Suggestions:

Trainer: ___________________________________ Date: ___________________

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 67 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
Operation Sheet 3.2-2

Active Directory Domain Services Installation

Performance Objective:To install active directory domain services in


Windows Server 2008R2

Supplies/Materials: 2 straight thoughutp cable with rj 45 both ends

Equipment: Complete set of computer with Windows Server 2008R2


installed, avr or ups, wireless router, switch hub

Steps/Procedure:

1. Log on to Windows Server 2008 R2 computer with the local administrator


account on which Active Directory Domain Services is to be installed.
2. On the desktop screen, press Windows + R keys simultaneously to initiate
Run command box.
3. On the Run command box, in the available field, type DCPROMO.EXE
command and press Enter key.
4. Wait till the Active Directory Domain Services binaries are installed and
click Next on the Active Directory Domain Service Installation
Wizard window when done.

In the first page of the wizard, read the text and click Next

5. In the second page of the wizard, read the text and click Next

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 68 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
6. In the third page of the wizard, click Create a New Domain In a New
Forest

7. Click Next
8. The next page asks you to create a fully-qualified domain name (FQDN).
Enter a name made of two or three parts. Examples
are example.local or learning.example.com. Remember that the
computer already has a name and every computer on the network has
or will have a name. So this is what will happen with the name you give:
1. If you give a name in two parts such
as example.local or example.com, the network name to use from a

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 69 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
browser to access this computer will
be ThisComputerName.example.local orThisComputerName.exampl
e.com. This means that this is the name the other computers will
use to "intranetly" or "webly" access its resources. This means
that, later on, you can create a web site stored in a computer (in a
server or a workstation), share resources of that computer, and
make those resources available so that other computers can
access those resources from a browser
2. If you give a name in three (or more) parts such
as support.example.local or intranet.example.local orWhatSUp.exa
mple.local or support.example.com or intranet.example.com orWh
atSUp.example.com or anything like those, the network name of
this computer will
beThisComputerName.support.example.local or ThisComputerNam
e.intranet.example.local orThisComputerName.WhatSUp.example.l
ocal or ThisComputerName.support.example.com orThisComputerN
ame.intranet.example.com or ThisComputerName.WhatSUp.examp
le.com. That's the name the other computers will use to access
this computer from a browser
There is no rule as to whether the name you use (in two parts or more
parts) is bad. You just have to decide and keep the scheme in mind.

For our example, we are using functionx.local

9. After specifying the FQDN, click Next. A window will start some
operations:

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 70 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
10. When a dialog box comes up, read its text and click Next

11. On the next page, read the text and click Next. A window will
come and start performing some operations:

12. Click Next

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 71 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
13. Click Next. If you didn't create (assign) an IP address on (to) the
server, a dialog box will come up, about IP address assignment:

In you didn't assign an IP address to the server, it means you plan to


use a DHCP server that will automatically assign IP addresses to the
computers of the network. In this case, click Yes, ...
14. A dialog box comes up

15. Read the text and click Yes

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 72 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
16. In the next page of the wizard, click Nest

17. The next page asks you to specify the administrator's password.
Click the Password text box and type the password
18. Click the Confirm Password text box and type the same password

19. After specifying the password, click Next

20. Click Next. A new dialog box will start performing an operation:

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 73 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
This may take a while

21. Click Finish


A new dialog box will ask you to reboot:

Therefore, click Restart Now


22. When the computer comes up, press CTRL + ALT + DELETE and
log in

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 74 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
PERFORMANCE CHECKLIST NO. 3.2-2

Active Directory Domain Services Installation

Name of Trainee: ___________________________ Date: ___________

Directions:Check Column Yes if the identified behavior or skills was


performed correctly and No if not.

CRITERIA YES NO
1. Has logged on to Windows Server 2008 R2 computer with
the local administrator account on which Active Directory
Domain Services is to be installed?
2. Has clicked to select Create a new domain in a new forest
radio button?
3. Has specified the Fully Qualified Domain Name (FQDN) for
the new forest root domain in the FQDN of the forest root
domain field?
4. Has assigned strong security password?
5. Has restarted the computer?

Comments/Suggestions:

Trainer: ___________________________________ Date: ___________________

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 75 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
Operation Sheet 3.2-3

Install and Configure Dynamic Host Configuration Protocol (DHCP) in


Windows Server 2008 R2

Performance Objective :To install and configure dynamic host configuration


protocol in Windows Server 2008R2

Supplies/Materials : 2 straight thoughutp cable with rj 45 both ends

Equipment: Complete set of computer with Windows Server 2008R2


installed, avr or ups, wireless router, switch hub

Steps/Procedure:
To install and configure Dynamic Host Configuration Protocol (DHCP) on
Windows Server 2008 R2, administrators must follow the steps given as
below:

1. Log on to Windows Server 2008 R2 computer with the domain


administrator or enterprise administrator account credentials on which
DHCP server is to be installed and configured.
2. Make sure that the computer has been assigned with a static IP address.
3. Ensure that the DNS server is available anywhere in the network and is
properly configured.
4. On the desktop screen, click Server Manager icon from the taskbar.
5. On the Server Manager window, from the console tree in the left, make
sure that Roles option is selected.
6. On the right pane, make sure that the Roles Summary section is
expanded.
7. From the expanded section, click Add Roles.

Click Add Roles


Date Developed: Document No.
COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 76 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
8. On Add Roles Wizard window, click Next.
9. On Select Server Roles page, from the Roles list, check DHCP
Servercheckbox and click Next.

Check DHCP Server Checkbox

10. On the DHCP Server page, click Next.


11. On Select Network Connection Bindings page, make sure that the IP
address representing the network connection that is to be bound is
checked from the Network Connections list.

Select Network Connection

12. Click Next to continue.


13. On Specify IPv4 DNS Server Settings page, populate the Preferred
DNS serer IPv4 address and optional Alternate DNS server IPv4
addressfields with the correct values.
14. Once specified, click Validate to confirm the availability of DNS server
and click Next.

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 77 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
Specify DNS Server

15. On Specify IPv4 WINS Server Settings page, leave everything as


default and click Next.
16. On Add or Edit DHCP Scopes page, click Add.
17. On Add Scope box, populate the Scope name, Starting IP address,
andEnding IP address fields with the desired values and click OK.

Add Scope

18. Back on Add or Edit DHCP Scope page, click Next.


19. On Configure DHCPv6 Stateless Mode page, leave everything as
default and click Next.
20. On Specify IPv6 DNS Server Settings page, leave everything as default
(assuming that the network setup doesn’t have IPv6 addressing scheme)
and click Next to proceed.
21. On Authorize DHCP Server page, make sure that the Use current
credentials radio button is selected. Alternatively, Use alternate
credentialsradio button can also be selected to specify the domain admin
credentials that is to be allowed to authorize DHCP server in AD DS.
Date Developed: Document No.
COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 78 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
Authorize DHCP
Note:Authorize DHCP Server page will be displayed only when an
Active Directory Domain Controller is present in the network.
In case the Active Directory Domain Controller is absent, the page is
not displayed.

22. Click Next to proceed.


23. On Confirm Installation Selections page, review the settings and
clickInstall to start the DHCP installation and configuration process.
24. Once installed, click Close on the Installation Results page.
25. Close Server Manager window when done.

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 79 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
PERFORMANCE CHECKLIST NO. 3.2-3

Install and Configure Dynamic Host Configuration Protocol (DHCP) on


Windows Server 2008 R2

Name of Trainee: ___________________________ Date: ___________

Directions:Check Column Yes if the identified behavior or skills was


performed correctly and No if not.

CRITERIA YES NO
1. Has logged on to Windows Server 2008 R2 computer with
the local administrator account on which Active Directory
Domain Services is to be installed?
2. Has clicked to select Create a new domain in a new forest
radio button?
3. Has specified the Fully Qualified Domain Name (FQDN) for
the new forest root domain in the FQDN of the forest root
domain field?
4. Has assigned strong security password?
5. Has restarted the computer?

Comments/Suggestions:

Trainer: ___________________________________ Date: ___________________

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 80 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
Information Sheet 3.2 - 3

A Domain Name System (DNS)

Learning Objectives: After reading this information sheet the trainee will
learn about domain name system (dns).

A Domain Name System (DNS)

As you may know already, whether it belongs to a network or not, every


computer must have a name. Furthermore, if it belongs to a network, a
computer must provide a way to be found by other computers. This can be
done using its name. This means that other computers must be able to
contact other fellow computers using the names.

In a network, to exchange information or to share resources, computers


communicate using languages also called protocols. One of the languages or
protocols is called Transmission Control Protocol or TCP. Another language
is called Internet protocol or IP. These two languages are usually used
together in a combination named TCP/IP.

To locate each other using TCP/IP, each computer must have an


address, named an IP address, made of a combination of numbers separated
by periods. An example is 192.168.1.248. Each computer has such a
number (address) but the number (the address) assigned to a computer
must be unique among the numbers used by other computers. As a result, a
computer can be contacted using its address. In a large network with dozens
or hundreds or thousands of computers, it can be cumbersome to keep track
of these complex numbers. A solution is to use software, named a server, so
that, if you provide the name of the computer, the server can "translate" the
name into the corresponding computer that use the actual IP address of the
computer.

The Domain Name System, named DNS, is a language (again, named a


protocol) that allows the server that receives (or is provided) the name of a
computer. Then the server checks a list (called a table) that has the names of
computers and their corresponding IP addresses. That way, the server can
locate, through the IP address, the intended computer.

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 81 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
Self-check 3.2-3

Identification. Write your answer before the number

1. In a network, to exchange information or to share resources,


computers communicate using languages also called _________.
2. These two languages are usually used together in a combination
named ___________.
3. ________ a language that allows the server that receives (or is
provided) the name of a computer.
4. To locate each other using TCP/IP, each computer must have an
address, named an ____________.
5. The server checks a list (called _________) that has the names of
computers and their corresponding IP addresses

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 82 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
Answer key to self-check 3.2-3

1. protocol
2. TCP/IP
3. DNS
4. IP address
5. table

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 83 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
Operation Sheet 3.2-4

How to Install DNS server in Windows Server 2008 R2

Performance Objective :To install and configure DNS server in Windows


Server 2008R2

Supplies/Materials : 2 straight thoughutp cable with rj 45 both ends

Equipment: Complete set of computer with Windows Server 2008R2


installed, avr or ups, wireless router, switch hub

Steps/Procedure:

1. Launch Server Manager by clicking Start > Administrative Tools >


Server Manager. Click Roles and then Add Roles.

2. Select DNS Server from the list and then click Next button.

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 84 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
3. A little introduction to DNS Server and a few useful links for further
details as shown in below image. Click Next to move on.

4. Click Install button.

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 85 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
5. DNS Server has been installed successfully as per below snapshot. Click
Close to finish the Add Roles Wizard.

PERFORMANCE CHECKLIST NO. 3.2-4

How to Install DNS server in Windows server 2008R2

Name of Trainee: ___________________________ Date: ___________

Directions:Check Column Yes if the identified behavior or skills was


performed correctly and No if not.

CRITERIA YES NO
1. Has followed the standard operating procedure ?
2. Has launched Server Manager?
3. Has selected DNS Server from the list?
4. Has clicked the Install button?
5. Has clicked close to finish the Add Roles Wizard?

Comments/Suggestions:

Trainer: ___________________________________ Date: ___________________

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 86 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
Operation Sheet 3.2-5

How to Install File Services Role

Performance Objective:To install File Services Role in Windows Server


2008R2

Supplies/Materials : 2 straight thoughutp cable with rj 45 both ends

Equipment: Complete set of computer with Windows Server 2008R2


installed, avr or ups, wireless router, switch hub

Steps/Procedure:

To install the File Services role, perform the following steps:

1. Launch the Server Manager, scroll down to the roles summary, and
Click Add Roles.

2. When the Add Roles Wizard appears, choose the File Services role
and click Next.

3. On the next page, which includes Introduction to Files services,


Things to Note, and Additional Information sections, take note of the
information and check out a few of the links. When you are ready to
proceed, click Next.

4. Next, you see the role services you can install (see Figure 1),
depending on what you want to accomplish with your file server. You
can really pick and choose the components you would like to install.
In this case, you will install all the file services components except
the indexing service.

Figure 1. Installation choices for the File Services role.

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 87 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
Note

As you may have noted in the Things to Note section of the wizard,
Windows Search Service and Indexing Service cannot be installed on
the same server. Microsoft recommends installing the Windows
Search Service, unless there is a need to support older indexes.
5. Create a DFS namespace. You can choose to create this name now or
later by using Server Manager, but in this case, create a DFS
namespace now, choose the name, and click Next.

6. Choose the namespace type. Domain-based namespaces are stored


on one or more namespace servers and within Active Directory
Domain Services. If you choose a domain–based namespace, you
then have the option of also enabling Windows Server 2008 mode.
Stand-alone namespaces are stored on a single namespace server.
After you choose your namespace type, click Next.

7. Configure your namespace by adding folders (see Figure 2) and folder


targets, which serves as your virtual view of the namespace. After
you have added folders, click Next.

Figure 2. Add folders to configure DFS namespaces.

8. At this point, configure your storage usage monitoring. Choose the


NTFS volumes you want to monitor and choose the monitoring
options. The first section is Specify the Usage Threshold of This
Date Developed: Document No.
COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 88 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
Volume; this is a percentage of the volume drive space. The second
section offers a choice of reports:

• Large File Report


• Least Recently Accessed Files
• Most Recently Accessed Files
• Quota Usage Report
• Duplicate File Report
• Files by Owner Group Report (default)
• Files by File Group Report (default)
• File Screen Audit Report

Choose the reports and volume threshold and then click Next.

9. Choose the location of the reports that should be created when a


volume threshold is reached. You can also choose to receive reports
via e-mail. Click the Send Reports to the Following Administrators
checkbox, enter an e-mail address and an SMTP server for e-mail
delivery, and click Next.

10. Choose your Windows Search Service options by simply checking the
options you want to index to be used with Windows Search Service.

11. When you see the confirmation page where you can review your
installation choices, confirm that everything is correct and click
Install.

12. When the installation is complete, you receive a results report that
confirms that all services were installed correctly. If there are any
errors, you can view what failed to install and why in this section of
the wizard. If all is well and everything has installed correctly, click
Close and restart the server.

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 89 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
PERFORMANCE CHECKLIST NO. 3.2-5

How to Install File Services Role

Name of Trainee: ___________________________ Date: ___________

Directions:Check Column Yes if the identified behavior or skills was


performed correctly and No if not.

CRITERIA YES NO
1. Has followed the standard operating procedure ?
2. Has launched Server Manager?
3. Has selected DNS Server from the list?
4. Has clicked the Install button?
5. Has clicked close to finish the Add Roles Wizard?

Comments/Suggestions:

Trainer: ___________________________________ Date: ___________________

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 90 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
Operation Sheet 3.2-6
Remote Desktop Connection

Performance Objective:To configure and allow remote desktop connection

Supplies/Materials : 2 straight thoughutp cable with rj 45 both ends

Equipment: Complete set of computer with Windows Server 2008R2


installed, avr or ups, wireless router, switch hub

Steps/Procedure:

To allow remote connections on the computer you want to connect to

1. Open System by clicking the Start button , right-


clicking Computer, and then clicking Properties.

2. Click Remote settings. If you're prompted for an administrator


password or confirmation, type the password or provide confirmation.

The Remote tab in the System Properties dialog box


3. Under Remote Desktop, select one of the three options.

4. Click Select Users.

If you're an administrator on the computer, your current user account


will automatically be added to the list of remote users and you can skip
the next two steps.

5. In the Remote Desktop Users dialog box, click Add.

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 91 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
6. In the Select Users or Groups dialog box, do the following:

• To specify the search location, click Locations, and then select the
location you want to search.
• In Enter the object names to select, type the name of the user that
you want to add, and then click OK.
The name will be displayed in the list of users in the Remote Desktop
Users dialog box. Click OK, and then click OKagain.

Note

• You can’t connect to a computer that's asleep or hibernating, so make sure


the settings for sleep and hibernation on the remote computer are set
to Never. (Hibernation is not available on all computers.) For information
about making those changes, see Change, create, or delete a power plan
(scheme).

To look up the computer name of the remote computer

1. On the remote computer, open System by clicking the Start button ,


right-clicking Computer, and then clickingProperties.
2. Under Computer name, domain, and workgroup settings, you can find
your computer name, and its full computer name if your computer is on
a domain.
Your network administrator might also be able to give you the name of the
computer.

To allow Remote Desktop connections through a Windows Firewall


If you're having trouble connecting, Remote Desktop connections might be
getting blocked by the firewall. Here's how to change that setting on a
Windows PC. If you're using another firewall, make sure the port for Remote
Desktop (usually 3389) is open.

1. On the remote computer, click Start and select Control Panel.

2. Click System and Security.

3. Click Allow a program through Windows Firewall under Windows


Firewall.
Date Developed: Document No.
COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 92 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
4. Click Change settings and then check the box next to Remote Desktop.

5. Click OK to save the changes.

To set a password for your user account


Your user account must have a password before you can use Remote Desktop
to connect to another computer.
1. Click Start and select Control Panel.

2. Double-click User Accounts.

3. Select Change your Windows Password under User Accounts.

4. Click Create a password for your account and follow the instructions
on the screen.
To start Remote Desktop on the computer you want to work from

1. Open Remote Desktop Connection by clicking the Start button . In


the search box, type Remote Desktop Connection, and then, in the list
of results, click Remote Desktop Connection.
2. In the Computer box, type the name of the computer that you want to
connect to, and then click Connect. (You can also type the IP address
instead of the computer name.)
Note
• To find the Remote Desktop Connection shortcut, click
the Start button , click All Programs, and then clickAccessories. To

quickly open Remote Desktop Connection, click the Start button ,


type mstsc in the search box, and then press Enter.
• Redirecting a device on your computer makes it available for use in a
Remote Desktop session. If a Remote Desktop Connection dialog box
appears after you click Connect and enter your credentials, you can
redirect local devices and resources, such as your local drives or Clipboard.
Click Details, and then select the check box for each item you want to
redirect.

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 93 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
PERFORMANCE CHECKLIST NO. 3.2-6

Remote Desktop Connection

Name of Trainee: ___________________________ Date: ___________

Directions:Check Column Yes if the identified behavior or skills was


performed correctly and No if not.

CRITERIA YES NO
1. Has followed the standard operating procedure ?
2. Has launched Server Manager?
3. Has selected DNS Server from the list?
4. Has clicked the Install button?
5. Has clicked close to finish the Add Roles Wizard?

Comments/Suggestions:

Trainer: ___________________________________ Date: ___________________

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 94 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
Learning Outcome # 3. Perform testing, documentation and pre-
deployment procedures

ASSESSMENT CRITERIA:
1. Pre-deployment procedures is undertaken based on enterprise policies
and procedures
2. Operation and security check are undertaken based on end-user
requirements
3. Reports are prepared/completed according to enterprise policies and
procedures.

CONTENTS:
• User account and Joining Domain
• Deploying and Operating Print Management
• Troubleshooting and Testing Network Settings

CONDITIONS: Students /trainees must be provided with the following:

• Paper and pencil


• UTP cables
• Material specifications charts
• Tool Catalogues
• Wire cutter
• RJ45
• Complete set of computer system
• Network Operating system
• Router
• Switch hub
• Computer server

METHODOLOGIES:

• Modular / Self – pace


• Lecture / Demonstration
• Practical Exercises
• Video presentation

ASSESSMENT METHODS:

• Direct observation/questioning
• Demonstration
• Written test

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 95 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
Learning Outcome No.3: Perform testing, documentation and pre-
deployment procedures

Learning Activities Special Instruction

1. Information Sheet 3.3-1 Read Information Sheet 3.3-1. After


User Account and Joining the Reading the learner is encourage to
Domain answer the self-check.
Compare your answers to Self- check key
answer. You are required to get all
2. Self-Check 3.3-1 answers correct. If not, read the
information sheet again to answer the
questions again correctly.
Perform operation Sheet 3.3-
3. Operation Sheet 3.3-1
1.UsethePerformance Criteria Checklist
Joining the Domain
to evaluate your own work. Present your
work to your trainer for evaluation.
Perform operation Sheet 3.3-
4. Operation sheet 3.3-2
2.UsethePerformance Criteria Checklist
Deploying and Operating
to evaluate your own work. Present your
Print Management
work to your trainer for evaluation.
Compare your answers to Self- check key
5. Information Sheet 3.3-2 answer. You are required to get all
Troubleshooting and Testing answers correct. If not, read the
Network Settings information sheet again to answer the
questions again correctly.
Compare your answers to Self- check key
answer. You are required to get all
6. Self-Check 3.3-2 answers correct. If not, read the
information sheet again to answer the
questions again correctly.

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 96 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
Information Sheet 3.3 – 1

User account and Joining the domain

Learning Objective: After reading this information sheet the trainee


will enable to create user account to manage the network and also to join the
other user to the domain of the server.

Creating a User Account

A computer network has to be managed. Some aspects can be done


manually and some others electronically. In order to do anything, you must
have a user account that can perform the necessary tasks. Such an account
must have appropriate rights on the network.

To create the primary account to manage the network, on the server:


a. Click Start -> Administrative Tools -> Active Directory Users and
Computers (if a message box comes up, click Continue)
b. If necessary, in the left frame, expand the name of the domain.
Click Users
c. In the left frame, right-click Users -> New -> User
d. Type the first name of the user and press Tab. If you have a middle
initial, type it and press Tab
e. Type the last name
f. Click the User Logon Name text box and type a user name. Here is an
example:

g. Click Next
h. In the next page of the wizard, type the password as Password1

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 97 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
i. Press Tab and type the same password. Here is an example:

j. Click Next

k. Click Finish

Making a User Account an Administrator

Some of the operations you will perform on the network require that the
account have the appropriate rights (also called permissions). An
administrator's account is one that can do anything on the network, such as
creating users accounts or adding computers to the network.

To make a user account become an administrator, on the server:

a. Click Start -> Administrative Tools -> Active Directory Users and
Computers
b. In the left frame, expand the domain's node
c. Click Users
d. Double-click the user name whose rights you want to manage (or right-
click that user name and click Properties)
e. Click Member Of
f. Click Add...

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 98 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
g. In the bottom text box (where the caret is blinking), type admin.
h. Click Check Names

i. Make sure Administrators is selected and underlined.

j. Click OK
Logging In to the Network

To use the network, a user must log in. This is done by providing a user
name and a password. If this is the first time you are logging in, you may be
asked to change your password.
If you are logged but you want to use another account, you can switch to
another account. To do this:
a. Click Start -> Switch User
b. Press CTRL + ALT + DELETE
c. Click Other User
d. Type the user name (such as the one you created earlier) and press Tab
e. Type the password (such as Password1 if you are continuing from the
account created earlier) and press Enter

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 99 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
i. If this is the first time you are logging in, a message will tell you
that you must change the password. Click OK
ii. Type a good password for the account and press Tab
iii. Type the password again and press Enter.
A message will inform you that your password has been changed
iv. Click OK

Optionally Creating a Computer Account


After creating a domain, you can add client computers to it. In our examples,
we will add workstations that run Microsoft Windows 7 Professional,
Ultimate, or Enterprise. There are two actions to adding a client to a
Microsoft Windows Server 2003 domain but only one is required.
Before physically or electronically adding a client to a domain, you can first
create a computer account for it. To create a computer account, you can also
click Start -> Administrative Tools -> Active Directory Users And Computers.
This would open the Active Directory Users and Computers window. In the
left frame, expand the name of the domain. Right-click the name of the
domain -> New -> Computer. This would open the New Object - Computer
dialog box. In the Computer Name text box, enter the name of the computer.
The operating systems before Windows 2000 don't use very long names.
Therefore, when naming a computer, keep this in mind and give a name
made of fewer than 15 characters. After naming the computer, click Next
twice and click Finish.

Instead of right-clicking the name of the domain, in the Active Directory


Users and Computers, you can expand the name of the domain, right-click
the Computers node -> New -> Computer. As mentioned already, in the first
page of the New Object - Computer wizard, you can type a name for the
computer. Here is an example:

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 100 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
Then click OK. After creating an account for a computer, you can add it to
the domain. Actually, primarily creating an account for a computer is not
required.

Checking the Computer Name and Domain

Always make sure you know the name of each computer on your network
and the name of the domain it belongs to.

To check the name of the computer and its domain on a workstation:

a. Click Start
b. Right-click Computer and click Properties
To check the name of the server, in the Initial Configuration Tasks, look on
the right side of Full Computer Name

To check the name of the document of the server, look on the right side of
Domain

Preparing a Workstation
There are two primary ways you prepare a computer to join the domain:

• Do Nothing: In this case, you would let the various wizards take care of
everything. You would simply follow the instructions on the screen, click
Next, OK, Finish when prompted to do so
• Take care of things as much as possible: the disadvantage of this
technique is that you should know what you are doing. The advantage is
that you would know as much as possible, what you did where.
If you use the second option, you would for example assign an IP address to
the server instead of the letting the DHCP server take care of that (Do
Nothing option). In this case also, you must prepare the workstations to join
the network. For example, you must assign an IP address to it. If you are
working on a small network, TCP/IP is not the most difficult thing you will

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 101 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
deal with (in fact you don't need to know that much about TCP/IP; you can
follow other people's instructions and you will be fine).

To prepare a workstation to join the domain, on the workstation:

a. Click Start -> Control Panel


b. Click View Network Status and Tasks (or click Network and Internet,
then Network and Sharing Center)
c. Click Local Area Connection
d. Click Properties
e. In the Networking tab of the Local Area Connection Properties, in the
checked list box, click Internet Protocol Version 4 (TCP/IPv4)

f. Click Properties
g. Click Use the Following IP Address
h. Type the IP address you want the server to use. For example, add 2
(bits) to the last byte of the IP address you gave to the server and press
Tab
i. Type the subnet mask (it should be added automatically when you press
Tab from the previous text box)
j. Type the default gateway address (use the first and the second bytes of
the IP address you had provided (such as 192.168) and use 001.001 for
the other two bytes)

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 102 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
k. For the Preferred DNS Server, type the same IP address as the server

l. Click OK
m. Click Close

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 103 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
Operation Sheet 3.3 - 2
Joining the Domain
To participate to a network, a workstation must be added to it. This is
referred to as joining a domain. When joining a domain, if the computer you
are adding doesn't have an account already, one would be created for it.

Performance Objective:To log-in the other user to the network domain

Supplies/Materials : 2 straight thoughutp cable with rj 45 both ends

Equipment: Complete set of computer with Windows Server 2008R2


installed, avr or ups, wireless router, switch hub

Steps/Procedure:
To join a domain using Microsoft Windows 7 Professional, Ultimate, or
Enterprise:

1. On the Taskbar, click Start, right-click My Computer and click


Properties...

2. Click Change Settings


3. In the System Properties dialog box, click the Computer Name tab and
click the Change... button.
If the computer is running Microsoft Windows 7 Home Premium, the
Domain radio button would be disabled, indicating that the computer
cannot join a domain:

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 104 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
4. In the Computer Name text box, enter the desired name of the
computer. If you had already created an account in the domain for this
computer, type that name
5. In the Member Of section, click the Domain radio button
6. Click the Domain text box and enter the name of the domain

7. After specifying the name of the computer and the domain to join, click
OK
8. You would then be asked to provide a user name and a password for a
user who has the permissions to let a computer join a domain.
Type the name of the domain, followed by \ and followed by the user
name of an account that can allow a computer to join a domain and
press Tab
9. Type the account's password

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 105 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
10. After entering a user and a password, click OK. If you have the
right to add computers to the domain, you would receive a Welcome
message:

Click OK
11. You will be asked to restart the computer

Click
OK

12. In the System Properties dialog box, click Close


13. When asked to restart the computer, click Restart Now
14. After the computer has restarted, press CTRL + ALT + DELETE to
Log On
15. Click Switch User
16. Click Other User
17. Type the user of a user who has an account in the network's
domain and press Tab
18. Type the password
19. Click the green button with the right pointing arrow
Date Developed: Document No.
COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 106 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
PERFORMANCE CHECKLIST NO. 3.3-2

Joining the Domain

Name of Trainee: ___________________________ Date: ___________

Directions:Check Column Yes if the identified behavior or skills was


performed correctly and No if not.

CRITERIA YES NO
1. Has installed Print Management?
2. Has opened Print Management?
3. Has added and removed print servers
4. Has viewed Printers?
5. Has installed printers to groups of users or computers by
using Group Policy?

Comments/Suggestions:

Trainer: ___________________________________ Date: ___________________

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 107 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
Operation Sheet 3.3 - 2
Deploying and Operating Print Management
Performance Objective:To deploy and operate network printers

Supplies/Materials:2 straight thoughutp cable with rj 45 both ends

Equipment: Complete set of computer with Windows Server 2008R2


installed, avr or ups, wireless router, switch hub

Steps/Procedure:

Step 1: Install Print Management


Installing Print Management is accomplished by adding or updating the
print server role. Note that the computer on which Print Management is
installed does not need to be a print server. Do one of the following:

• If the print server role is not installed, perform the following procedure.

To install the print server role


a) Click Start, point to All Programs, point to Administrative Tools,
and then click Manage Your Server.
b) Click Add or remove a role.
c) In the Configure Your Server Wizard, click Next to get to
the Server Role page.
d) On the Server Role page, click Print Server, and then
click Next twice. Follow the steps in the wizard to complete the
installation.
• If you are running an earlier version of a Windows server operating
system that has the print server role and at least one shared printer
already installed, perform the following procedure.

To update the print server role


a) Click Start, point to All Programs, point to Administrative Tools,
and then click Manage Your Server.
b) Click Update this role.
c) In the Print Server Role Wizard, click Next.
d) Follow the steps in the wizard to complete the installation.

Step 2:Open Print Management


After you install both Windows Server 2003 R2 and Print Management,
then open Print Management. If you want to use Print Management on a
computer in another location by using Remote Desktop, the remote computer
must have Windows Server 2003 R2 and Print Management installed.
To open Print Management
Date Developed: Document No.
COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 108 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
• Click Start, point to All Programs, point to Administrative Tools, and
then click Print Management.

Step 3: Add and remove print servers


You can add both a local print server and network print servers to Print
Management. Note that the computer on which Print Management is installed
does not need to be a print server.
Adding a Print Server
If the server on which you use Print Management is also a print server
and you want to manage the printers that it hosts by using Print Management,
use the following procedure to add the print server to Print Management.
To add print servers to Print Management
a) In the Print Management tree, right-click Print Management, and then
click Add/Remove Servers.

b) In the Add/Remove Servers dialog box, under Specify print server,


in Add server, do one of the following:
o Type the name.

o Click Browse to locate and select the print server.

c) Click Add to List.


d) Add as many print servers as you want, and then click OK.
Note

You can add the local server on which you are working by
clicking Add the Local Server.
To remove print servers from Print Management
a) In the Print Management tree, right-click Print Management, and then
click Add/Remove Servers.
b) In the Add/Remove Servers dialog box, under Print servers, select one or
more servers, and click Remove.
Date Developed: Document No.
COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 109 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
Step 4:View Printers
The Print Management tree contains three places where printer information
is stored: Custom Printer Filters, Print Servers, and Deployed Printers.
The Custom Printer Filtersfolder contains the All Printers object, which
contains a dynamic view of all of the printers on all of the servers available for
managing by Print Management. All of the custom views, or filters, of printers
that you create are stored in Custom Printer Filters.
The network printer servers that you add are stored in Print Servers. Every
printer server automatically is given four objects that serve as filters for
information about a server:
• Drivers
• Forms
• Ports
• Printers
To quickly access the Print Server Properties dialog box, right-click
the Drivers, Forms, or Ports objects, and then click Manage Drivers, Manage
Forms, or Manage Ports.
Deployed Printers contains a list of all of the printers located in Print
Management that are managed by Group Policy objects.

You can also show an extended view, which shows more detail about the
queue and provides access to the printer's Web page, if one is available. You
can add, remove, and sort columns in extended view.

Step 5: To install printers to groups of users or computers by using Group


Policy
a) In the Print Management tree, under the appropriate print server,
click Printers.
b) In the results pane, right-click the printer you want to deploy, and then
click Deploy with Group Policy.
c) In the Deploy with Group Policy dialog box, click Browse, and then
choose a Group Policy object.

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 110 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
d) Click OK.
e) To assign the printer connection setting to the GPO, do one or both of
the following:
o As a per-user setting, select the The users that this GPO applies
to (per user) check box.

o As a per-machine setting, select the The computers that this GPO


applies to (per machine) check box.

f) Click Add.
g) Repeat steps 3 to 6 to add the printer connection setting to another
GPO.
h) Click OK.

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 111 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
PERFORMANCE CHECKLIST NO. 3.3-1

Deploying and Operating Print Management

Name of Trainee: ___________________________ Date: ___________

Directions:Check Column Yes if the identified behavior or skills was


performed correctly and No if not.

CRITERIA YES NO
6. Has installed Print Management?
7. Has opened Print Management?
8. Has added and removed print servers
9. Has viewed Printers?
10. Has installed printers to groups of users or
computers by using Group Policy?

Comments/Suggestions:

Trainer: ___________________________________ Date: ___________________

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 112 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
Information Sheet 3.3 – 2

Troubleshooting and Testing Network Settings

Learning Objective: After reading this information sheet the trainee will
enable to fix, troubleshoot and resolve network problems.

Troubleshooting and testing network settings

Windows Operating system includes many tools for troubleshooting and


testing TCP/IP connectivity. This section looks at automated diagnostics, basic
tests that you should perform whenever you install or modify a computer's
network settings, and techniques for resolving difficult networking problems
involving DHCP and DNS. The final section shows you how to perform detailed
network diagnostics testing.

Diagnosing and resolving local area connection problems

Occasionally network cables can get unplugged or the network adapter


might experience a problem that temporarily prevents it from working. After
you plug the cable back in or solve the adapter problem, the connection
should automatically reconnect. To diagnose local area connection problems,
follow these steps:

1. Click Start and then click Network. In Network Explorer, click Network
and Sharing Center on the toolbar.
2. In Network and Sharing Center, click Manage Network Connections.
3. Right-click the connection you want to work with and select Diagnose.

Windows network diagnostics will then try to identify the problem. A list of
possible solutions is provided for identifiable configuration problems. Some
solutions provide automated fixes that you can execute by clicking the
solution. Other solutions require manual fixes; such as might be required if
you need to reset a network router or broadband modem. If your actions don't
fix the problem, refer to other appropriate parts of this troubleshooting
section.

Diagnosing and resolving internet connection problems

Because of the many interdependencies between services, protocols, and


configuration settings, troubleshooting network problems can be difficult.
Fortunately, Windows Server 2008 includes a powerful network diagnostics
tool for pinpointing problems that relate to the following:

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 113 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
• General network connectivity problems
• Internet service settings for e-mail, newsgroups, and proxies
• Settings for modems, network clients, and network adapters
• DNS, DHCP, and WINS configuration
• Default gateways and IP addresses

To diagnose internet connection problems, follow these steps:

1. Click Start and then click Network. In Network Explorer, click Network
and Sharing Center on the toolbar.
2. Click Diagnose and Repair.

Windows network diagnostics will then try to identify the problem. If


identifiable configuration problems exist, a list of possible solutions is
provided. Some solutions provide automated fixes that you can execute by
clicking the solution. Other solutions require manual fixes; such as might be
required if you need to reset a network router or broadband modem. If your
actions don't fix the problem, refer to other appropriate parts of this
troubleshooting section.
Performing basic network tests
Whenever you install a new computer or make configuration changes to the
computer's network settings, you should test the configuration. The most
basic TCP/IP test is to use the PING command to test the computer's
connection to the network. PING is a command-line command. To use it,
type ping host at the command prompt, where host is either the computer
name or the IP address of the host computer you're trying to reach.
With Windows Server 2008, you can use the following methods to test the
configuration using ping:

• Try to ping IP addresses if the computer is configured correctly and the


host you're trying to reach is accessible to the network, ping should
receive a reply, as long as pinging is allowed by the computer's firewall.
If ping can't reach the host or is blocked by a firewall, ping times out.
• On domains that use WINS, try to ping NetBIOS computer names if
NetBIOS computer names are resolved correctly by ping, the NetBIOS
facilities, such as WINS, are correctly configured for the computer.
• On domains that use DNS, try to ping DNS host names if fully
qualified DNS host names are resolved correctly by ping, DNS name
resolution is configured properly.

You might also want to test network browsing for the computer. If the
computer is a member of a Windows Server 2008 domain and computer
browsing is enabled throughout the domain, log on to the computer and then
use windows explorer or Network Explorer to browse other computers in the

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 114 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
domain. Afterward, log on to a different computer in the domain and try to
browse the computer you just configured. These tests tell you if the DNS
resolution is being handled properly in the local environment. If you can't
browse, check the configuration of the DNS services and protocols.
In some cases, discovering and sharing might be set to block discovery. You'll
need to allow discovery to resolve this by following these steps:

1. Click Start and then click Network.


2. In Network Explorer, click Network and Sharing Center on the toolbar.
3. If Network Discovery is set to Off, expand the Sharing and Discovery
panel using the Expand button, click Turn On Network Discovery, and
then click Apply to turn on this feature.

Diagnosing and resolving IP addressing problems

The current IP address settings of a computer can be obtained as discussed


in "viewing network configuration information. If a computer is having
problems accessing network resources or communicating with other
computers, an IP addressing problem might exist. Take a close look at the IP
address currently assigned, as well as other IP address settings, and use the
following tips to help in your troubleshooting:

• If the IPv4 address currently assigned to the computer is in the range


169.254.0.1 to 169.254.255.254, the computer is using Automatic
Private IP Addressing (APIPA). An automatic private IP address is
assigned to a computer when it is configured to use DHCP and its DHCP
client cannot reach a DHCP server. When using APIPA, Windows Server
2008 will automatically periodically check for a DHCP server to become
available. If a computer doesn't eventually obtain a dynamic IP address,
the network connection usually has a problem. Check the network
cable, and if necessary trace the cable back to the switch or hub into
which it connects.
• If the IPv4 address and the subnet mask of the computer are currently
set as 0.0.0.0, the network is either disconnected or someone attempted
to use a static IP address that duplicated another IP address already in
use on the network. In this case, you should access Network
Connections and determine the state of the connection. If the
connection is disabled or disconnected, this should be shown. Right-
click the connection and select Enable or Diagnose as appropriate. If the
connection is already enabled, you will need to modify the IP address
settings for the connection.
• If the IP address is dynamically assigned, make sure that another
computer on the network isn't using the same IP address. You can do
this by disconnecting the network cable for the computer that you are

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 115 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
working with and pinging the IP address in question. If you receive a
response from the ping test, you know that another computer is using
the IP address. This computer probably has an improper static IP
address or a reservation that isn't set up properly.
• If the IP address appears to be set correctly, check the subnet mask,
gateway, DNS, and WINS settings by comparing the network settings of
the computer you are troubleshooting with those of a computer that is
known to have a good network configuration. One of the biggest problem
areas is the subnet mask. When subnetting is used, the subnet mask
used in one area of the network might look very similar to that of
another area of the network. For example, the subnet mask in one IPv4
area might be 255.255.255.240, and it might be 255.255.255.248 in
another IPv4 area.

When you are using static IP addressing, you can check the current IPv4 or
IPv6 settings by entering ipconfig /all at a command prompt. The display of
the ipconfig /all command includes IPv4/IPv6 addresses, default routers, and
DNS servers for all interfaces. You can also check IPv4 and IPv6 addressing
separately. To check the IPv4 addressing configuration, enter netsh interface
IPv4 show address. To check IPv6 addressing, enter netsh interface IPv6 show
address. To use netsh to show the configuration of a remote computer use
the –r Remote Computer Name command line option. For example, to display
the configuration of the remote computer named corpserver26, you would
enter netsh -r corpserver26 interface IPv4 show address.
To make changes to the configuration of IP interfaces, use the netsh interface
IPv4 set interface and netsh interface IPv6 set interface commands. To add the
IP addresses of DNS servers, use the netsh interface IPv4 add DNS and netsh
interface IPv6 add DNS commands.

Diagnosing and resolving routing problems

As part of troubleshooting, you can verify the reachability of local and


remote destinations. You can ping your default router by its IPv4 or IPv6
address. You can obtain the local IPv4 address of your default router by
entering netsh interface IPv4 show routes. You can obtain the link-local IPv6
address of your default router by entering netsh interface IPv6 show routes.
Pinging the default router tests whether you can reach local nodes and
whether you can reach the default router, which forwards IP packets to remote
nodes.
When you ping the default IPv6 router, you must specify the zone identifier
(id) for the interface on which you want the icmpv6 echo request messages to
be sent. The zone id for the default router is listed when you enter the ipconfig
/all command.

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 116 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
If you are able to ping your default router, ping a remote destination by its
IPv4 or IPv6 address. If you are unable to ping a remote destination by its IP
address, there might be a routing problem between your node and the
destination node. Enter tracert -d ipaddress to trace the routing path to the
remote destination you use the -d command-line option to speed up the
response by preventing tracert from performing a reverse DNS query on every
near-side router interface in the routing path.
The inability to reach a local or remote destination might be due to
incorrect or missing routes in the local IP routing table. To view the local IP
routing table, enter the netsh interface IPv4 show routes or netsh interface
IPv6 show routes command. Use the command output to verify that you have
a route corresponding to your local subnet. The route with the lowest metric is
used first. If you have multiple default routes with the same lowest metric, you
might need to modify your IP router configuration so that the default route
with the lowest metric uses the interface that connects to the correct network.
You can add a route to the IP routing table by using the netsh interface IPv4
add route or netsh interface IPv6 add route command. To modify an existing
route, use the netsh interface IPv4 set route or the netsh interface IPv6 set
route command. To remove an existing route, use the netsh interface IPv4
delete route or netsh interface IPv6 delete route command.
If you suspect a problem with router performance, use the pathping -
d ipaddress command to trace the path to a destination and display
information on packet losses for each router in the path. You use the -d
command-line option to speed up the response by preventing pathping from
performing a reverse DNS query on every near-side router interface in the
routing path.

Checking ipsec policies and windows firewall

The problem with reaching a destination node might be due to the


configuration of internet protocol security (ipsec) or packet filtering. Check for
ipsec policies that have been configured on the computer having the problem,
on intermediate IPv6 routers, and on the destination computer. On computers
running windows xp or later, ipsec is configured using windows firewall with
advanced security.
In many cases, packet filtering is configured to allow specific types of traffic
and discard all others, or to discard specific types of traffic and accept all
others. Because of this, you might be able to view web pages on a web server,
but not ping the web server by its host name or IP address.
Each network connection configured on a computer can be enabled or
disabled in the windows firewall. When enabled, IPv4 and IPv6 drop incoming
requests. During troubleshooting, you can disable the windows firewall for a
specific IPv4 or IPv6 interface with the netsh interface IPv4 set interface
interface=NameOrIndex firewall=disabled and netsh interface IPv6 set interface

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 117 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
interface=NameOrIndex firewall=disabled commands. You can also completely
turn off the windows firewall with the netsh firewall set opmode
disable command. Don't forget to re-enable the firewall when you are done
troubleshooting.

Releasing and renewing DHCP settings

DHCP servers can assign many network configuration settings


automatically, including IP addresses, default gateways, primary and
secondary DNS servers, primary and secondary WINS servers, and more.
When computers use dynamic addressing, they are assigned a lease on a
specific IP address. This lease is good for a specific time period and must be
renewed periodically. When the lease needs to be renewed, the computer
contacts the DHCP server that provided the lease. If the server is available, the
lease is renewed and a new lease period is granted. You can also renew leases
manually as necessary on individual computers or by using the DHCP server
itself.
Problems that prevent network communications can occur during the lease
assignment and renewal process. If the server isn't available and cannot be
reached before a lease expires, the IP address can become invalid. If this
happens, the computer might use the alternate IP address configuration to set
an alternate address, which in most cases has settings that are inappropriate
and prevent proper communications. To resolve this problem, you'll need to
release and then renew the DHCP lease.
Another type of problem occurs when users move around to various offices
and subnets within the organization. While moving from location to location,
their computers might obtain DHCP settings from the wrong server. When the
users return to their offices, the computer might seem sluggish or perform
incorrectly because of the settings assigned by the DHCP server at another
location. If this happens, you'll need to release and then renew the DHCP
lease.
You can use the graphical interface to release and renew DHCP leases by
following these steps:

1. Click Start and then click Network. In Network Explorer, click Network
and Sharing Center on the toolbar.
2. In Network and Sharing Center, click Manage Network Connections. In
Network Connections, right-click the connection you want to work with
and then select Diagnose.
3. After windows network diagnostics tries to identify the problem, a list of
possible solutions is provided. If the computer has one or more
dynamically assigned IP addresses, one of the solutions should be
Automatically Get New IP Settings.... Click this option.

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 118 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
You can also follow these steps to use the IPCONFIG command to renew
and release settings:

1. Start an elevated command prompt.


2. To release the current settings for all network adapters, type ipconfig
/release at the command line. Then renew the lease by typingipconfig
/renew.
3. To renew a DHCP lease for all network adapters, type ipconfig /renew at
the command line.
4. You can check the updated settings by typing ipconfig /all at the
command line.

Note If a computer has multiple network adapters and you only want to work
with one or a subset of the adapters, specify all or part of the connection name
after the ipconfig /renew or ipconfig /release command. Use the asterisk as a
wildcard to match any characters in a connection's name. For example, if you
want to renew the lease for all connections with names starting with loc, type
the commandipconfig /renew loc*. If you want to release the settings for all
connections containing the word network, type the command ipconfig /release
*Network*.

Diagnosing and resolving name resolution issues

When you can reach a destination using an IP address but not reach a host
using a host name, you might have a problem with host name resolution.
Typically, name resolution issues have to do with improper configuration of
the DNS client or problems with DNS registration. You can use the following
tasks to troubleshoot problems with DNS name resolution:

• Verify DNS configuration


• Test DNS name resolution with the ping tool
• Use the nslookup tool to view DNS server responses
• Display and flush the DNS client resolver cache

On the computer having DNS name resolution problems, verify the


following information:

• Host name
• The primary DNS suffix
• DNS suffix search list
• Connection-specific DNS suffixes
• DNS servers

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 119 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
You can obtain this information by entering ipconfig /all at a command
prompt. To obtain information about which DNS names should be registered
in DNS, enter netsh interface IP show DNS.
Computers running windows vista and Windows Server 2008 support DNS
traffic over IPv6. By default, IPv6 configures the well-known site-local
addresses of DNS servers at FEC0:0:0:FFFF::1, FEC0:0:0:FFFF::2, and
FEC0:0:0:FFFF::3. To add the IPv6 addresses of your DNS servers, use the
properties of the Internet Protocol Version 6 (TCP/IPv6) component in Network
Connections or the netsh interface IPv6 add DNScommand. To register the
appropriate DNS names as IP address resource records with DNS dynamic
update, use the ipconfig/registerDNS command. Computers running windows
xp or Windows Server 2003 do not support DNS traffic over IPv6.
TCP/IP checks the DNS client resolver cache before sending DNS name
queries. The DNS resolver cache maintains a history of DNS lookups that have
been performed when a user accesses network resources using TCP/IP. This
cache contains forward lookups, which provide host name to IP address
resolution, and reverse lookups, which provide IP address to host name
resolution. After a DNS entry is stored in the resolver cache for a particular
DNS host, the local computer no longer has to query external servers for DNS
information on that host. This enables the computer to resolve DNS requests
locally, providing a quicker response.
How long entries are stored in the resolver cache depends on the time to
live (TTL) value assigned to the record by the originating server. To view
current records and see the remaining TTL value for each record, type ipconfig
/displayDNS in an elevated command prompt. These values are given as the
number of seconds that a particular record can remain in the cache before it
expires. These values are continually being counted down by the local
computer. When the TTL value reaches zero, the record expires and is
removed from the resolver cache.
Occasionally, you'll find that you need to clear out the resolver cache to
remove old entries and enable computers to check for updated DNS entries
before the normal expiration and purging process takes place. Typically, this
happens because server IP addresses have changed and the current entries in
the resolver cache point to the old addresses rather than the new ones.
Sometimes the resolver cache itself can get out of sync, particularly when
DHCP has been misconfigured.

Note Skilled administrators know that several weeks in advance of the actual
change, they should start to decrease the TTL values for DNS records that are
going to be changed. Typically, this means reducing the TTL from a number of
days (or weeks) to a number of hours, which allows for quicker propagation of
the changes to computers that have cached the related DNS records. After the
change is completed, Administrators should restore the original TTL value to
reduce renewal requests.

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 120 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
In most cases, you can resolve problems with the DNS resolver cache by
either flushing the cache or reregistering DNS. When you flush the resolver
cache, all DNS entries are cleared out of the cache and new entries are not
created until the next time the computer performs a DNS lookup on a
particular host or IP address. When you reregister DNS, Windows Server 2008
attempts to refresh all current DHCP leases and then performs a lookup on
each DNS entry in the resolver cache. By looking up each host or IP address
again, the entries are renewed and reregistered in the resolver cache. You'll
generally want to flush the cache completely and allow the computer to
perform lookups as needed. Reregister DNS only when you suspect problems
with DHCP and the DNS resolver cache.
You can test DNS name resolution by pinging a destination using its host
name or fully qualified domain name (FQDN). If an incorrect IP address is
shown, you can flush the DNS resolver cache and use the nslookup tool to
determine the set of addresses returned in the DNS Name Query Response
message.
You can use the IPCONFIG command to flush and reregister entries in the
DNS resolver cache by following these steps:

1. Start an elevated command prompt.


2. To clear out the resolver cache, type ipconfig /flushDNS at the
command line.
3. To renew DHCP leases and reregister DNS entries, type ipconfig
/registerDNS at the command line.
4. When the tasks are complete, you can check your work by
typing ipconfig /displayDNS at the command line.

To start nslookup, enter nslookup at a command prompt. At the nslookup>


prompt, use the set d2 command to get detail information about DNS
response messages. Then, use nslookup to look up the desired FQDN. Look for
A and AAAA records in the detailed display of the DNS response messages.
With IPv6, the DNS client maintains a neighbor's cache of recently resolved
link-layer addresses as well as a standard resolver cache. To display the
current contents of the neighbor cache, enter netsh interface IPv6 show
neighbors. To flush the neighbor's cache, enternetsh interface IPv6 delete
neighbors.
For IPv6, the DNS client also maintains a destination cache. The
destination cache stores next-hop IPv6 addresses for destinations. To display
the current contents of the destination cache, enter netsh interface IPv6 show
destination cache command. To flush the destination cache, enter netsh
interface IPv6 delete destination cache.

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 121 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00
Self – Check 3.3- 2

True or False: Write “T” if the statement is true and “F” if the statement is
False in the space provided each number.
______1. Astatic IP address is assigned to a computer when it is configured to
use DHCP and its DHCP client cannot reach a DHCP server.
______2. When you can reach a destination using an IP address but not reach
a host using a host name, you might have a problem with host name
resolution.
______3. After windows network diagnostics tries to identify the problem, a list
of possible solutions is not provided.
______4. Problems that prevent network communications can occur during the
lease assignment and renewal process
______5. The most basic TCP/IP test is to use the PING command to test the
computer's connection to the network.
______6. Computers running windows xp or Windows Server 2003 do not
support DNS traffic over IPv6.
______7. You can test DNS name resolution by pinging a destination using its
host name or fully qualified domain name (FQDN).
______8. Reregister DNS only when there are no problems with DHCP and the
DNS resolver cache.
______9. If a computer has multiple network adapters and you only want to
work with one or a subset of the adapters, specify all or part of the connection
name after the ipconfig /renew or ipconfig /release command.
______10. The problem with reaching a destination node might be due to the
configuration of internet protocol security (ipsec) or packet filtering.

Answer key to self-check 3.3-2

1. F 6. T
2. T 7. T
3. F 8. F
4. T 9. T
5. T 10. T

Date Developed: Document No.


COMPUTER SYSTEMS
Issued by:
SERVICING NC II
Page 122 of 124
SET-UP COMPUTER Developed by:
SERVERS JUNMAR A. CALDEO Revision # 00

You might also like