0% found this document useful (0 votes)
220 views

Computer System and Network Configurations

The document discusses computer networks and how to configure a peer-to-peer network. It describes what a network is and the basic components, including cables, hardware, and software. It provides steps for designing, rolling out, configuring, and managing a network. Specifically for setting up a peer-to-peer network, it lists the required components and provides a multi-step process for installing hardware, software, and configuring file and printer sharing on each computer.

Uploaded by

Romel Bucaloy
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
220 views

Computer System and Network Configurations

The document discusses computer networks and how to configure a peer-to-peer network. It describes what a network is and the basic components, including cables, hardware, and software. It provides steps for designing, rolling out, configuring, and managing a network. Specifically for setting up a peer-to-peer network, it lists the required components and provides a multi-step process for installing hardware, software, and configuring file and printer sharing on each computer.

Uploaded by

Romel Bucaloy
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 62

Computer System and Network Configurations

Computer Networks

Networks are collections of computers, software, and hardware that are all
connected to help their users work together. A network connects computers by means
of cabling systems, specialized software, and devices that manage data traffic. A
network enables users to share files and resources, such as printers, as well as send
messages electronically (e-mail) to each other.

The most common networks are Local Area Networks or LANs for short. A LAN
connects computers within a single geographical location, such as one office building,
office suite, or home. By contrast, Wide Area Networks (WANs) span different cities or
even countries, using phone lines or satellite links.

Network System Configuration

All networks go through roughly the same steps in terms of design, rollout,
configuration, and management.

Designing Your Network

Plan on the design phase to take anywhere from one to three working days,
depending on how much help you have ad how big your network is.

Here are the key tasks:

 Settle on a peer-to-peer network or a client/server network.


 Pick you network system software.
 Pick a network language.
 Figure out what hardware you need.
 Decide on what degree of information security you need.
 Choose software and hardware solutions to handle day-to-day management chores.

Rolling Out Your Network

Rolling out your network requires the following steps:

 Run and test network cables.


 Install the server or servers if you’re setting up a client/server network. (If you are
setting up a peer-to-peer network, you typically don’t have to worry about any
dedicated servers.)
 Set up the workstation hardware.
 Plug in and cable the Network Interface Cards (NICs – these connect the network to
the LAN).
 Install the hub or hubs (if you are using twisted-pair cable).
 Install printers.
 Load up the server software (the NOS, or Network Operating System) if your
network is a client/server type.
 Install the workstation software.
 Install modem hardware for remote dial-up (if you want the users to be able to dial
into the network).
 Install the programs you want to run (application software).

Configuring Your Network

Network configuration means customizing the network for your own use.

 Creating network accounts for your users (names, passwords, and groups).
 Creating areas on shared disk drives for users to share data files.
 Creating areas on shared disk drives for users to share programs (unless everyone
runs programs from their own computer).
 Setting up print queues (the software that lets users share networked printers).
 Installing network support on user workstations, so they can "talk" to your network.

 Managing Your Network

The work you do right after your LAN is up and running and configured can save you
huge amounts of time in the coming months.

 Mapping your network for easier management and troubleshooting.


 Setting up appropriate security measures to protect against accidental and
intentional harm.
 Tuning up your LAN so that you get the best possible speed from it.
 Creating company standards for adding hardware and software, so you don’t have
nagging compatibility problems later.
 Putting backup systems in place so that you have copies of data and programs if
your hardware fails.
 Installing some monitoring and diagnostic software so that you can check on your
network’s health and get an early warning of impleading problems.
 Figuring out how you plan to handle troubleshooting – educating your LAN
administrator, setting up a support contract with a software vendor, and so on.

Smooth Setup

One key advantage of a peer-to-peer network is that it’s easy to setup. With the
simplest sort of peer-to-peer network, you just use the built-in networking that comes
with your operating system (Windows 98, Windows XP, Windows 7, Windows 8 and so
on) and you have very little software to set up – even less if you have computers that
have the operating system preinstalled, as most computers do these days.

For Windows XP and Windows 7, the basic steps to setting up a peer-to-peer


network are as follows:

(Review for Cabling) UTP Cable

A UTP cable (category 5) is one of the most popular LAN cables. This cable
consists of 4 twisted pairs of metal wires (that means there are 8 wires in the cable).
Adding RJ45 connectors at both ends of the UTP cable it becomes a LAN cable they
usually use.

Preparation

You need a UTP Cable, Crimping Tool, RJ45, and Cutter


Figure 25. Materials for Cabling

Making Cable
Follow the steps below.

1. Remove the outmost vinyl shield for 12mm at one end of the cable (we call this side
A-side).
2. Arrange the metal wires in parallel (refer the each section's wire arrangement table).
Don't remove the shield of each metal line.
3. Insert the metal wires into RJ45 connector on keeping the metal wire arrangement.
4. Set the RJ45 connector (with the cable) on the pliers, and squeeze it tightly.
5. Make the other side of the cable (we call this side B-side) in the same way.
6. After you made it, you don't need to take care of the direction of the cable. (Any
cable in this page is directionless --- that means you can set either end of the cable
to either device.)

How to see the wire arrangement

Take the UTP cable with your left hand and a RJ45 connector with your right
hand. Hold the RJ45 connector in the way you can see the contact metal face of the
RJ45 connector.

The tables below are for the case where the UTP cable consists of green/green-
white, orange/orange-white, blue/blue-white, brown/brown-white twisted pairs.
10 Base T / 100 Base T Straight

10BaseT and 100BaseT are most common mode of LAN. You can use UTP
category-5 cable for both modes. (You can use UTP category-3 cable for 10BaseT, in
which there are only 3 wires inside the cable.)

A straight cable is used to connect a computer to a hub. You can use it to


connect 2 hubs in the case one of the hubs has an uplink port (and you use normal port
on the other hub).

Pin ID side A side B


1 orange- orange-white
2 orange orange
3 green-white green-white
4 blue blue
5 blue-white blue-white
6 green green
7 brown-white brown-white
8 brown brown

10 Base T / 100 Base T Cross


A cross cable for 10BaseT and 100BaseT is used to connect 2 computers
directly (with ONLY the UTP cable). It is also used when you connect 2 hubs with a
normal port on both hubs. (In other words, the cross cable is used relatively in a rare
case.)

Pin side A side B


ID
1 orange- green-
2 white
orange white
green
3 green- orange-
4 white
blue white
blue
5 blue-white blue-white
6 green orange
7 brown- brown-
8 white
brown white
brown

To create a peer network, you must have the following components:


• A network interface or Local Area Network (LAN) adapter for each computer. The
same manufacturer and model of network card is preferred.

• Cabling that is supported by the network cards.

• Windows XP or 7 drivers for the network cards.

• A common network protocol.

• A unique computer name for each computer.

Task1. Creating Peer to Peer Network

To create a peer network, follow these steps for each computer connected to the
network:

1. Shut down the computer and install the network card and appropriate cabling for
each computer.

NOTE: For information about how to configure your network adapters and
physically connect your computers, consult the documentation included
with your network adapters or contact the manufacturer(s) of your network
adapters.

2. Start Windows and install the network drivers. Windows may detect your network
card and install the drivers when you start the computer. If the network card drivers are
not included with Windows, follow the manufacturer's instructions about how to install
the network drivers.

3. Choose a client and a common protocol for each computer. To do this, follow these
steps:

a. Click Start, point to Settings, click Control Panel, and then double-click Network.

b. Click Add, click Client, and then click Add.

c. In the Manufacturers box, click the appropriate manufacturer, click the appropriate
client in the Network Clients box, and then click OK.

d. Click Add, click Protocol, and then click Add.


e. In the Manufacturers box, click the appropriate manufacturer, click the appropriate
protocol in the Network Protocol box, and then click OK.

4. Configure a peer server. Each computer that is configured for File and Printer
Sharing can act as a server. To configure a computer for File and Printer Sharing, use
the following steps:

a. Click Start, point to Settings, click Control Panel, and then double-click Network.

b. Click File and Print Sharing, click one or both options to share files and printers,
click OK, and then click OK again.

c. Click Yes when you are prompted to restart your computer.

5. Give each computer a unique computer name. To do this, use the following steps:

a. Click Start, point to Settings, click Control Panel, and then double-click Network.

b. On the Identification tab, type a unique name in the Computer name box.

c. Click OK, and then click Yes when you are prompted to restart your computer.

NOTE: The computer name must be unique for each computer on the
network and should be no more than 15 characters in length. In small
networks, the workgroup name should be the same for each computer
so that all computers are visible in the same workgroup when browsing.
You should not use spaces or the following characters in computer and
: workgroup names

Troubleshooting computer system network

Causes of Network Trouble

If a computer is unable to connect to a network or see other computers on a


network, it may be necessary to troubleshoot the network. A network may not work
because of any of the reasons below.

1. Network card not properly connected.


2. Bad network card drivers or software settings.
3. Firewall preventing computers from seeing each other.
4. Connection related issues.
5. Bad network hardware.
Solution

Because of the large variety of network configurations, operating systems and


setup, not all of the below information may apply to your network or operating system. If
your computer is connected to a company or large network, or you are not the
administrator of the network, it is recommended that if you are unable to resolve your
issues after following the below recommendations, you should contact the network
administrator or company representative.

Verify connections / LEDs

Verify that the network cable is properly connected to the back of the computer.
In addition, when checking the connection of the network cable, ensure that the LEDs
on the network are properly illuminated. For example, a network card with a solid green
LED or light usually indicates that the card is either connected or receiving a signal.

If, however, the card does not have any lights or has orange or red lights, it is
possible that the card is bad, not connected properly, or the card is not receiving a
signal from the network.

If you are on a small or local network and have the capability of checking a hub
or switch, verify that the cables are properly connected and that the hub or switch has
power.

Adapter resources

Ensure that if this is a new network card being installed into the computer that the
card's resources are properly set and not conflicting with any hardware in the computer.

Adapter functionality

Verify that the network card is capable of detecting or seeing itself by using the
ping command. Windows / MS-DOS users ping the computer from a MS-DOS prompt.
Unix / Linux variant users ping the computer from the shell.
To ping the card or the local host, type either ping 127.0.0.1 or ping local host
This should show a listing of replies from the network card. If you receive an error
or if the transmission failed, it is likely that either the network card is not physically
installed into the computer correctly, or that the card is bad.

Protocol
Verify that the correct protocols are installed on the computer. Most networks
today will utilize TCP/IP, but may also utilize or require IPX/SPX and NetBEUI.
When the TCP/IP protocol is installed, unless a DNS server or other computer
assigns the IPX address, the user must specify an IP address as well as a Subnet
Mask. To do this, follow the instructions below.
1. Click Start / Settings / Control Panel
2. Double-click the Network icon
3. Within the configuration tab double-click the TCP/IP protocol icon. Note: Do not click
on the PPP or Dial-Up adapter, click on the network card adapter.
4. In the TCP/IP properties click the IP address tab
5. Select the option to specify an IP address
6. Enter the IP address and Subnet Mask address, an example of such an
address could be:
IP Address: 102.55.92.1
Subnet Mask: 255.255.255.192
1. When specifying these values, the computers on the network must all have the
same Subnet Mask and have a different IP Address. For example, when using the
above values on one computer you would want to use an IP address of 102.55.92.2
on another computer and then specify the same Subnet Mask.

Firewall

If your computer network utilizes a firewall, ensure that all ports required are open.
If possible, close the firewall software program or disconnect the computer from the
firewall to ensure it is not causing the problem.

Additional time

In some cases it may take a computer some additional time to detect or see the
network. If after booting the computer you are unable to see the network, give the
computer 2-3 minutes to detect the network. Windows users may also want to try
pressing the F5 (refresh) key when in Network Neighborhood to refresh the network
connections and possibly detect the network

Additional troubleshooting

If after following or verifying the above recommendations you are still unable to
connect or see the network, attempt one or more of the below recommendations.
If you have installed or are using TCP/IP as your protocol you can ping another
computer's IP address to verify if the computer is able to send and receive data. To do
this, Windows or MS-DOS users must be at a prompt and Linux / Unix variant users
must open or be at a shell.
Once at the prompt assuming, that the address of the computer you wish to ping
is 102.55.92.2, you would type:
ping 102.55.92.2
If you receive a response back from this address (and it is a different computer),
this demonstrates that the computer is communicating over the network. If you are still
unable to connect or see the network, it is possible that other issues may be present.
Another method of determining network issues is to use the tracert command if
you are a MS-DOS or Windows user or the trace route command if you are a Linux /
Unix variant user. To use this command you must be at the command prompt or shell.
Ortrace route 102.55.92.2
This should begin listing the hops between the computer and network devices.
When the connection fails, determine what device is causing the issue by reviewingthe
trace route listing.

Networking with DHCP

Task: Setting up a local area network with a Dynamic Host Control Protocol
(DHCP) server is easy. The DHCP server provides all the information your computer
needs to get up and running on the network. Once connected, you will check network
connectivity with the router and at least one other peer on the network.
Procedures:
Getting connected

1. Before connecting your PC to the network, be sure the Windows XP operating


system is running on your computer. You will use Windows XP sp2 throughout this
activity.

2. Next, open a terminal window on your computer by clicking on Applications-


>Accessories->Terminal.

3. In the terminal window, type ipconfig and press Enter.

a. How many network devices are listed in the output? Record their names in your
worksheet.

b. Is there an IPv4 address listed for any of the network devices? If so, record your
IP address (es) in your worksheet.

4. Connect your computer to a network switch using a patch cable. Did you get a light
on the switch? Record the port number you connected to in your worksheet.

5. Draw a diagram of the entire local area network in the space below, including the

router, any switches or hubs, and all connected PCs.

6. Run ifconfig again. Do you see an IP address? If so, record it in your worksheet.

7. In the terminal window, type dhclient eth1 and press Enter. Describe what happens.

Checking your connection:

1. Check connectivity with the router with the ping command. Type ping -c4 10.0.1.1
and press Enter. Record the times listed in the last column of the output. What was the
average round trip time (rtt) from your computer to the router and back?

2. Ask another group for their IP address. Check connectivity with that group's computer
with ping. Run ping as shown above, substituting the new IP address for the one listed
in the previous item. Record the times listed in the last column below. What was the
average round trip time (rtt)?

3. When you have completed the activity, shut down your computer and return to your
seat.

Title: Networking with Static IPs

Purpose: While setting up a network with a Dynamic Host Control Protocol


(DHCP) server is very convenient, it is sometimes preferable to use static IP addresses.
In this activity, you will join the network using an IP address and netmask provided by
your instructor. Once connected, you will check network connectivity with at least one
other peer on the network.
Procedures:

Getting connected

1. Before connecting your PC to the network, be sure the windows Operating


system is running on your computer.

2. When the boot process is completed, connect your computer to the network
switch using a patch cable. Did you get a light? What port number did you
connect to on the switch?

3. Draw a diagram of the entire network in the space below.

4. To configure your network settings, click System->Administration->Network.

5. In the Network settings window, make sure the Connections tab is selected.

6. Click on Wired connection, and then click the Properties button.

7. In the Interface properties window, change the Configuration setting to Static


IP address.

8. Enter the IP address provided by your instructor in the IP address field.

9. Enter 10.0.1.0 in the Gateway address field.

10. Finally, enter 255.255.255.0 in the Subnet mask field. Click OK to close the
Interface properties window.

11. Click OK to close the Network settings window.

Checking your connection

1. Open a terminal window on your computer, if one is not already open, by


clicking Applications->Accessories->Terminal.

2. Type ipconfig and press Enter. Are your network setting correct? If not, repeat
the steps 4–11 in the previous section.

3. Ask another group for their IP address. Check connectivity with that group's
computer with ping. For example, ping -c4 10.0.1.200. Record the times listed
in the last column below. What was the average round trip time?
4. Ask a second group for their IP address. Check connectivity to that group's
computer with ping. Record the times listed in the last column below. What
was the average round trip time?

Task 1. Practicing TCP/IP Networking Skills

While connected to the Internet or another TCP/IP network, answer these


questions:

1. What is your current IP address?

2. Release and renew your IP address. Now what is your IP address?

3. Are you using dynamic or static IP addressing? How do you know?

4. What is your adapter address for this connection?

5. What is your default gateway IP address?

6. What response do you get when you ping the default gateway?

Networking Devices, Media and Connector

To make data transmission more extensible and efficient than a simple peer-to-
peer network, network designers use specialized network devices such as hubs,
switches, routers, and wireless access points to send data between devices. You have
already discussed in your Grade 9 CHS class the different devices used in networking
and which provides you the knowledge on the common networking cables that are
essential in putting up a network.

Common Network Cables

Until recently, cables were the only medium used to connect devices on
networks. A wide variety of networking cables are available. Coaxial and twisted-pair
cables use copper to transmit data. Fiber-optic cables use glass or plastic to transmit
data. These cables differ in bandwidth, size, and cost. You need to know what type of
cable to use based on the job requirements. You also need to be able to troubleshoot
and repair problems along the way.
Twisted Pair
Twisted pair is a type of copper cabling that is used for telephone
communications and most Ethernet networks. A pair of wires forms a circuit that
transmits data. The pair is twisted to provide protection against crosstalk, the noise
generated by adjacent pairs of wires in the cable. Pairs of copper wires are encased in
color-coded plastic insulation and are twisted together. An outer jacket protects the
bundles of twisted pairs.

Source: www.lanshack.com
Figure 39. UTP and STP Cable

When electricity flows through a copper wire, a magnetic field is created around
the wire. A circuit has two wires, and in a circuit, the two wires have oppositely-charged
magnetic fields. When the two wires of the circuit are next to each other, the magnetic
fields cancel each other out. This is called the cancellation effect. Without the
cancellation effect, your network communications become slow because of the
interference caused by the magnetic fields.

The two basic types of twisted-pair cables are as follows:


 Unshielded twisted pair (UTP) is the cable that has two or four pairs of wires.
This type of cable relies solely on the cancellation effect produced by the twisted-
wire pairs that limits signal degradation caused by electromagnetic interface
(EMI) and radio frequency interference (RFI). UTP is the most commonly used
cabling in networks. UTP cables have a range of 328 feet (100 m).
 With shielded twisted pair (STP), each pair of wire is wrapped in metallic foil to
better shield the wires from noise. Four pairs of wires are then wrapped in an
overall metallic braid or foil. STP reduces electrical noise from within the cable. It
also reduces EMI and RFI from outside the cable. Although STP prevents
interference better than UTP, STP is more expensive because of the extra
shielding. It is also more difficult to install because of the thickness. In addition,
the metallic shielding must be grounded at both ends. If it is improperly
grounded, the shield acts like an antenna, picking up unwanted signals.

Category Rating
UTP comes in several categories that are based on two factors:
 The number of wires in the cable
 The number of twists in those wires
1. Category 3 is the wiring used for telephone systems and Ethernet LAN at 10
Mega byte per second (Mbps).
2. Category 3 has four pairs of wires.
3. Category 5 and Category 5e have four pairs of wires with a transmission rate
of 100 Mbps.
4. Category 5 and Category 5e is the most common network cables used.
5. Category 5e has more twists per foot than Category 5 wiring.
These extra twists further prevent interference from outside sources and from the
other wires within the cable.
Some Category 6 cables use a plastic divider to separate the pairs of wires,
which prevents interference. The pairs also have more twists than Category 5e cable.

Coaxial Cable
Coaxial cable is a copper-cored cable surrounded by a heavy shielding. Coaxial
cable is used to connect the computers to the rest of the network.

Source: www.phoneam.com
Figure 40. Coaxial Cable
Coaxial cable uses “British Naval Connectors (BNC)” or “Bayonet Neill-
Concelman” connectors, at the ends of the cables to make the connection. Several
types of coaxial cable exist:
 Thicknet (10BASE5) is a coaxial cable used in networks operating at 10 Mbps,
with a maximum length of 500 meters.
 Thinnet (10BASE2) is a coaxial cable used in networks operating at 10 Mbps,
with a maximum length of 185 meters.
 RG-59 is most commonly used for cable television in the U.S.
 RG-6 is higher-quality cable than RG-59, with more bandwidth and less
susceptibility to interference.

Fiber-Optic Cable
An optical fiber is a glass or plastic conductor that transmits information using
light. Fiber optic cable has one or more optical fibers enclosed in a sheath or jacket.
Because it is made of glass, fiber-optic cable is not affected by EMI or RFI. All signals
are converted to light pulses to enter the cable and are converted back into electrical
signals when they leave it. This means that fiber-optic cable can deliver signals that are
clearer, and can go farther, without compromising the clarity of signals.

Source: www.picstopin.com
Figure 41. Fiber Optic Cable

Fiber-optic cable can reach distances of several miles or kilometers before the
signal needs to be regenerated. Fiber-optic cable usually is more expensive to use than
copper cable, and the connectors are more costly and harder to assemble. Common
connectors for fiber-optic networks are SC, ST, and LC. These three types of fiber-optic
connectors are half-duplex, which allows data to flow in only one direction. Therefore,
two cables are needed.

These are the two types of glass fiber-optic cable:


 Multimode is the cable that has a thicker core than single-mode cable. It is
easier to make, can use simpler light sources such as Light Emitting Diodes
(LEDs), and works well over distances of a few kilometers or less.
 Single-mode is the cable that has a very thin core. It is harder to make, uses
lasers as a light source, and can transmit signals dozens of kilometers with ease.

Creating Ethernet Cable


Ethernet cabling has been the standard in networking installation for years. It is
the fastest way of connecting PC to a peer or to your router or a central switch.  This
section of the module will bring you back to the procedures in creating an Ethernet
cable specifically straight-through and cross-over. Try to recall the procedures as you
go on with the lesson.

Fabricating an Ethernet Cross-over and Straight-through Cable


In an Ethernet networking environment – like in a home or an office with multiple
PCs that are wired – the computers need to be connected to a central router to allow
data transfer. The router takes all the bits being sent out by the computers and relays
them onto the other devices on the network.
The straight-through Ethernet cable is used in local area network to connect a
PC to a network hub and router. This is the standard cable used for almost all purposes.
A cross-over cable, on the other hand, can be used to connect two network
devices directly, without the need for a router in the middle. It simply reverses some of
the pins so that the output on one computer is being sent to the input of another.
Bear in mind that safety precautions must always be applied and observed
during the fabrication of the said cables. Also, materials and tools to be used must
always be complete and functional to save time, money and effort.
The following items are the materials and tools used for making Ethernet cables:
 Ethernet Cable Category 5e or Cat5e- standard wire for cabling;
 RJ45 crimpable connectors for Cat5e;
 RJ45 Crimping tool;
 Wire cutter, stripper or pliers; and
 Ethernet cable tester.
Cable Fabrication Procedures

Cross-Over Straight-Through

Figure 42. Cross-Over and Straight-Through Color Coding

The picture below will serve as your guide in making the two important Ethernet
cables.
1. Cut into the plastic sheath 1 inch from the end of the cut cable. The crimping tool
has a razor blade that will do the trick with practice.

Figure 43. Step 1


2. Unwind and pair the similar colors.

Figure 44. Step 2


3. Pinch the wires between your fingers and straighten them out as shown. The
color order is important to do this correctly.

Figure 45. Step 3


4. Use wire cutter to make a straight cut across the wires 1/2 inch from the cut
sleeve to the end of the wires.
5. Push the wires into the connector. Each wire fits into a slot in the RJ45
connector. Note the position of the blue plastic shielding. Also note how the wires
go all the way to the end.
Figure 46. Step 5

6. Take view from the top. Make sure the wires are all the way in. There should be
no short wires.

Figure
7. Crimping the Cable – carefully 47.the
place Step 6
connector into the Ethernet Crimper and
cinch down on the handles tightly. The copper splicing tabs on the connector will
pierce into each of the eight wires. There is also a locking tab that holds the blue
plastic sleeve in place for a tight compression fit. When you remove the cable
from the crimper, that end is ready to use.

Figure 48. Step 7


8. For a standard "Straight-Through" cable, repeat all steps and wire color order on
the other end of cable. For a cross-over cable - the other end will have a different
color order as shown by the crossover picture on page 84.
9. Make sure to test the cables before installing them. An inexpensive Ethernet
cable tester does this quite well.

Figure 49. Step 9

Now that you are equipped with the


knowledge on the different cables used in networking, you also need to know that f iber
technologies and connectors have changed through the years. In these videos, you will
learn about the different fiber connectors, copper connectors and their characteristics.
To watch the video presentations just type in the following URL:

1) http://www.professormesser.com/n10-005/copper-connectors/

2)http://www.professormesser.com/n10-005/copper-connectors/
3.http://www.professormesser.com/n10-005/utp-stp-and-coaxial-cabling/

I hope you learned a lot from the video presentations. After


watching the videos, answer the following guide questions and submit it to
your teacher. Write your answer in a clean sheet of paper. Good Luck!

Here are the questions:

1. What are the different types of fiber connectors? Cite their advantages and
disadvantages.
______________________________________________________________
______________________________________________________________
______________________________________________________________
__________________________.

2. List down the different types of connectors.


______________________________________________________________
______________________________________________________________
______________________________________________________________
__________________________

3. What are the characteristics of UTP, STP and coaxial cable?


______________________________________________________________
____________________________________________
______________________________________________________________
____________________________________________

Internet Protocols

A protocol is a set of rules. A letter sent through the postal system also uses
protocols. Part of the protocol specifies where on the envelope the delivery address
needs to be written. If the delivery address is written in the wrong place, the letter
cannot be delivered. Internet protocol works in a similar way. Internet protocols are sets
of rules governing communication within and between computers on a network. Protocol
specifications define the format of the messages to be exchanged.
Timing is crucial to network operation. Protocols require messages to arrive
within a certain amount of time so that computers do not wait indefinitely for messages
that may have been lost. Therefore, systems maintain one or more times during
transmission of data. Protocols also initiate alternative actions if the network does not
meet the timing rules. Many protocols consist of a suite of other protocols that are
stacked in layers. These layers depend on the operation of the other layers in the suite
to function properly.

The main functions of protocols are:


 Identifying errors
 Compressing the data
 Deciding how the data should be sent
 Addressing the data
 Deciding how to announce sent and received data
To understand how networks and the Internet work, you must be familiar with the
commonly used protocols. These protocols are used to browse the web, send and
receive e-mail, and transfer data files. You will encounter other protocols as your
experience in IT grows, but they are not used as often as the common protocols
described here:
 TCP/IP: The Transmission Control Protocol /Internet Protocol (TCP/IP) suite of
protocols has become the dominant standard for internetworking. TCP/IP
represents a set of public standards that specify how packets of information are
exchanged between computers over one or more networks.
 IPX/SPX: Internetwork Packet Exchange/Sequenced Packet Exchange is the
protocol suite originally employed by Novell Corporation’s network operating
system, NetWare. It delivers functions similar to those included in TCP/IP. Novell
in its current releases supports the TCP/IP suite. A large installed base of
NetWare networks continues to use IPX/SPX.
 NetBEUI: NetBIOS Extended User Interface is a protocol used primarily on small
Windows NT networks. NetBEUI cannot be routed or used by routers to talk to
each other on a large network. NetBEUI is suitable for small peer-to-peer
networks, involving a few computers directly connected to each other. It can be
used in conjunction with another routable protocol such as TCP/IP. This gives the
network administrator the advantages of the high performance of NetBEUI within
the local network and the ability to communicate beyond the LAN over TCP/IP.

Figure 50. Commonly Used Internet Protocol

TCP /IP
IPX /
HTTP
SPX

Apple NetBEU
Talk I

Internet
Protocol

IMAP FTP

SSH Telnet

SMTP
 AppleTalk: AppleTalk is a protocol suite used to network Macintosh computers.
It is composed of a comprehensive set of protocols that span the seven layers of
the Open Systems Interconnection (OSI) reference model. The AppleTalk
protocol was designed to run over LocalTalk, which is the Apple LAN physical
topology. This protocol is also designed to run over major LAN types, notably
Ethernet and Token Ring.
 HTTP: Hypertext Transfer Protocol governs how files such as text, graphics,
sound, and video are exchanged on the World Wide Web (WWW). The Internet
Engineering Task Force (IETF) developed the standards for HTTP.
 FTP: File Transfer Protocol provides services for file transfer and manipulation.
FTP allows multiple simultaneous connections to remote file systems.
 SSH: Secure Shell is used to securely connect to a remote computer.
 Telnet: It is an application used to connect to a remote computer that lacks
security features.
 POP3: Post Office Protocol is used to download e-mail from a remote mail
server.
 IMAP: Internet Message Access Protocol is also used to download
e-mail from a remote mail server.
 SMTP: Simple Mail Transfer Protocol is used to send e-mail to a remote e-mail
server.
The more you understand about each of these protocols, the more you will
understand how networks and the Internet work.

IP Addressing
An IP address is a number that is used to identify a device on the network. Each
device on a network must have a unique IP address to communicate with other network
devices. Network devices are those that move data across the network, including hubs,
switches, and routers. On a LAN, each host (device that sends or receives information
on the network) and network device must have an IP address within the same network
to be able to communicate with each other.
A person’s name and fingerprints usually do not change. They provide a label or
address for the person’s physical aspect—the body. A person’s mailing address, on the
other hand, relates to where the person lives or picks up mail. This address can change.
On a host, the Media Access Control (MAC) address is assigned to the host Network
Interface Card (NIC) and is known as the physical address. The physical address
remains the same regardless of where the host is placed on the network in the same
way that fingerprints remain with someone regardless of where he or she goes.
An IP address consists of a series of 32 binary bits (1s and 0s). It is very difficult
for humans to read a binary IP address. For this reason, the 32 bits are grouped into
four 8-bit bytes called octets. An IP address, even in this grouped format, is hard for
humans to read, write, and remember. Therefore, each octet is presented as its decimal
value, separated by a decimal point or period. This format is called dotted-decimal
notation. When a host is configured with an IP address, it is entered as a dotted-decimal
number, such as 192.168.1.5.

Imagine if you had to enter the 32-bit binary equivalent of this:


11000000101010000000000100000101. If you mistyped just 1 bit, the
address would be different, and the host may not be able to communicate
on the network. The logical 32-bit IP address is hierarchical and is
composed of two parts. The first part identifies the network, and the second
part identifies a host on that network. Both parts are required in an IP
address. For example, if a host has an IP address of 192.168.18.57, the
first three octets, 192.168.18, identify the network portion of the address,
and the last octet, 57, identifies the host. This is called hierarchical
addressing, because the network portion indicates the network on which
each unique host address is located. Routers only need to know how to
reach each network, not the location of each individual host.

Table 6. Five Classes of IP Address

IP Classes Purpose
Class A Used for large networks, implemented by large companies and
some countries
Class B Used for medium-sized networks, implemented by universities
Class C Used for small networks, implemented by ISPs for customer
subscriptions
Class D Used for special use for multicasting
Class E Used for experimental testing

Subnet Mask
The subnet mask indicates the network portion of an IP address. Like the IP
address, the subnet mask is a dotted-decimal number. Usually all hosts within a LAN
use the same subnet mask. Table 3 shows default subnet masks for usable IP
addresses that are mapped to the first three classes of IP addresses:
 255.0.0.0: Class A, which indicates that the first octet of the IP address is the
network portion
 255.255.0.0: Class B, which indicates that the first two octets of the IP address
are the network portion
 255.255.255.0: Class C, which indicates that the first three octets of the IP
address are the network portion

Table 7. Default Subnet Masks for Usable IP Addresses

Class A Network Host


Octet 1 2 3 4

Class B Network Host


Octet 1 2 3 4

Class C Network Host


Octet 1 2 3 4

Class D addresses are used for multicast groups. There is no need to allocate
octet or bits to separate network and host addresses. Class E addresses are reserved
for research use only.

IpConfig

Ipconfig is a command used to find out the IP address of a certain network you
are connected to.

How to use the ipconfig command?


1) Click on Start Button, then type cmd (command prompt) on the search box.
2) A black screen will appear as shown in the figure below.
Figure 51. Command Prompt Window

3) Type ipconfig and press enter. The figure below shows the IP configuration
window using the ipconfig command. The information from this window will be
useful because it shows the IP address, subnet mask and default gateway of
a network you are connected to.

Assigning a static Figure 52. IP Configuration in CMD Window


IP Address
In a home network with several computers and devices, it is ideal to assign each
of them a specific address. This is for the purpose of avoiding problems when you do
troubleshooting which requires figuring out the IP address of each of them. It is also a
means to prevent address conflicts between the devices. You can also manage them
with ease if you have assigned their own addresses.
Here are the procedures in assigning an IP Address on a windows base
computer system:
1. Open the Control Panel’s Network Connections icon.
2. Open the icon representing your computer’s network connection.
3. Click the Properties button in the Status dialog box.
4. From the list of items, choose Internet Protocol (TCP/IP).
Figure 53. Wireless Network Connections Properties Dialog Box

5. Click the Properties button. The Internet Protocol (TCP/IP) Properties dialog box
appears.

Figure 54. TCP / IPV4 Dialog Box

6. Type the IP address for your computer. Enter the appropriate IP Address in the
IP address section.
7. Type a subnet mask. The value used on a local network is
commonly 255.255.255.0, but it can be different, such as 255.255.255.127.
8. Type the default gateway address. The default gateway is the router, so type the
router’s address. Figure 54 shows an example of assigning an IP Address,
Subnet mask and default gateway.

9. Type the
address for
the
preferred DN
S  server. The
address
should be
obtained
from your
Internet Service Protocol. It is used to help your computer
Figure 55.find web pages
Assigning an IPand
Address
other addresses on the internet.
10. Type the address for the alternate DNS server.
The alternate Domain Name System (DNS) server’s IP address is something that
your ISP provides.
11. Click OK to confirm the settings.
12. Close all other open dialog boxes and windows .

Assigning a Dynamic IP Address


If more than a few computers comprise the LAN, manually configuring IP
addresses for every host on the network can be time-consuming and prone to errors. In
this case, using a Dynamic Host Configuration Protocol (DHCP) server would
automatically assign IP addresses and greatly simplify the addressing process.
Figure 56. Assigning a Dynamic IP Address

Dynamic Host Configuration Protocol (DHCP) is a software utility used to


dynamically assign IP addresses to network devices. This dynamic process eliminates
the need to manually assign IP addresses. A DHCP server can be set up and the hosts
can be configured to automatically obtain an IP address. When a computer is set to
obtain an IP address automatically, the other entire IP addressing configuration boxes
are dimmed or disabled. The server maintains a list of IP addresses to assign, and it
manages the process so that every device on the network receives a unique IP
address. Each address is held for a predetermined amount of time. When the time
expires, the DHCP server can use this address for any computer that joins the network.

These are the IP address information that a DHCP server can assign to hosts:
 IP address
 Subnet mask
 Default gateway
 Optional values, such as a Domain Name System (DNS) server address

The DHCP server receives a request from a host. The server then selects IP
address information from a set of predefined addresses that are stored in a database.
After the IP address information is selected, the DHCP server offers these values to the
requesting host on the network. If the host accepts the offer, the DHCP server leases
the IP address for a specific period of time.
Using a DHCP server simplifies the administration of a network because the
software keeps track of IP addresses. Automatically configuring TCP/IP also reduces
the possibility of assigning duplicate or invalid IP addresses. Before a computer on the
network can take advantage of the DHCP server services, the computer must be able to
identify the server on the local network. You can configure a computer to accept an IP
address from a DHCP server by clicking the Obtain an IP address automatically option
in the NIC configuration window, as shown in Figure 56.
If your computer cannot communicate with the DHCP server to obtain an IP
address, the Windows operating system automatically assigns a private IP address. If
your computer is assigned an IP address in the range of 169.254.0.0 to
169.254.255.255, it can communicate with only other computers in the same range. An
example of when these private addresses would be useful is in a classroom lab where
you want to prevent access outside to your network. This operating system feature is
called Automatic Private IP Addressing (APIPA). APIPA continually requests an IP
address from a DHCP server for your computer.
Ping
The ping is a Command Prompt command used to test the ability of the source
computer to reach a specified destination computer. The ping command is usually used
as a simple way to verify that a computer can communicate over the network with
another computer or network device.
The ping command operates by sending Internet Control Message Protocol
(ICMP) Echo Request messages to the destination computer and waiting for a
response. How many of those responses are returned, and how long it takes for them to
return, are the two major pieces of information that the ping command provides.

Table 8. Ping Command Syntax


Syntax Description
-t  Using this option will ping the target until you force it to stop
using Ctrl-C.

-a - This ping command option will resolve, if possible,


the hostname of an IP address target.

-n count  This option sets the number of ICMP Echo Request messages
to send. If you execute the ping command without this option,
four requests will be sent.
-l size  Use this option to set the size, in bytes, of the echo request
packet from 32 to 65,527. The ping command will send a 32
byte echo request if you do not use the -l option.
-f  Use this ping command option to prevent ICMP Echo Requests
from being fragmented by routers between you and the target.
The -f option is most often used to troubleshoot Path Maximum
Transmission Unit (PMTU) issues.
-i TTL  This option sets the Time to Live (TTL) value, the maximum of
which is 255.
-v TOS  This option allows you to set a Type of Service (TOS) value.
Beginning in Windows 7, this option no longer functions but still
exists for compatibility reasons.
-r count  Use this ping command option to specify the number
of hops between the computer and the target computer or
device that you would like to be recorded and displayed. The
maximum value for count is 9 so use the tracert
command instead. If you are interested in viewing all hops
between two devices.
-s count  Use this option to report the time, in Internet Timestamp
format, that each echo request is received and echo reply is
sent. The maximum value for count is 4 which means that only
the first four hops can be time stamped.
-w timeout  Specifying a timeout value when executing the ping command
adjusts the amount of time, in milliseconds, that ping waits for
each reply. If you do not use the -w option, the default timeout
value is used which is 4000, or 4 seconds.
-R  This option tells the ping command to trace the round trip path.
-S srcaddr  Use this option to specify the source address.
-4  This forces the ping command to use IPv4 only but is only
necessary if target is a hostname and not an IP address.
-6  This forces the ping command to use IPv6 only but as with
the -4 option, is only necessary when pinging a hostname.

target  This is the destination you wish to ping, which is either an IP


address or a hostname.
/?  Use the help switch with the ping command to show detailed
help about the command's several options.

Using the ping Command


Ping is one of your most important tools in troubleshooting Internet problems. It
shows you whether the Domain Name Server is working, whether the computer you are
trying to talk to is reachable, and how long it takes to get there. It does this at a very low
level — only the most basic Internet functions have to be up and running.

1) Click on Start Button, then type cmd (command prompt) on the search box.
2) A black screen will appear as shown in the figure below.
3) Type ping followed by the IP address you desire to verify. The figure below
shows the screen of the ping command and its output.
Figure 57. Step 3

Figure 58. Pinging


This output shows several things:
 Decoding names to network addresses — A domain name server (DNS)
resolves machine names to numeric addresses. A single machine can have
many names, all of which resolve to the same Internet address. In the example
just given, the name www.google.com resolves to the Internet address
122.2.152.23.
 Round-trip response time — The parts of the replies that say things like
time=105ms show you how long it took from the time the client machine sent out
the ping message until a reply came back (1 ms is 1 millisecond, or one
thousandth of a second). The variability in the times you see reflects that
networks do not always respond identically. Differing amounts of traffic on the
communication lines or differing loads on the server are common causes. You
will see very different response times depending on the access equipment you
use.
 Routing hop count — The part of the replies that says TTL=50 tells you about
the route the message took from one point to another. The acronym TTL stands
for Time to Live, which is a measure of how many rerouting from one point to
another the packet has to go through before IP declares it undeliverable. The
number following TTL (called the hop count) is a number that usually starts at
255 and counts down by one every time the message gets rerouted through an
intermediary computer.

To deepen your understanding with


regard to the Internet Protocols, IP Address and subneting, utilize the Internet
and the website www.professormesser.com, watch and learn from the video
presentations. Use the URLs below:

1. http://www.professormesser.com/n10-005/binary-math-2/

2. http://www.professormesser.com/n10-005/ip-classes/
3. http://www.professormesser.com/n10-005/networkingprotocols/

4. http://www.professormesser.com/n10-005/subnetting/

Reflection on the video presentations


Directions: Answer the essential questions below based on the video presentations you
had watched. Write your answer in a clean sheet of paper.
1. What are the procedures involved in calculating IP address and the procedures
in converting IP address to binary and vice versa?
________________________________________________________________
________________________________________________________________
________________________________________What are the different IP
Classes? Discuss each briefly and give examples.
________________________________________________________________
________________________________________________________________
________________________________________
2. What are the distinguished Internet Protocols? Describe each.
________________________________________________________________
________________________________________________________________
________________________________________
3. What are the necessary procedures in calculating subnet mask or simply
subneting? Show an example solution for the calculation.
________________________________________________________________
________________________________________________________________
________________________________________

Configure an Ethernet NIC to use DHCP


Directions: Configure an Ethernet NIC to use DHCP to obtain an IP address. You need
to follow the procedures given below and apply safety precautions in accomplishing this
task. While doing the activity, you have to answer activity questions written after every
step. Write your answer in a clean sheet of paper. Your performance will be rated based
on the performance rubrics.

Rubrics for Configuration

Criteria B D AP P A Total
(70-74) (75-79) (80-84) (85-89) (90-100) (=score x %)
Proper
Configuration (30
%)
(The configured
hardware was
properly configured
according to job
specification.)
Adherence to the
Procedures (30%)
(The specified job
was done by
following the
procedures. Safety
measures were
observed during the
activity.)
Quality of Work
(30%)
(The device was
configured properly.)

Comprehension
(10%)
(Interview / Guide
questions were
answered correctly
according to the job
requirements.)
Grand Total
Legend:
B- Beginner
D- Developing
AP- Approaching Proficiency
P- Proficient
A- Advance
Recommended Equipment
 Linksys 300N router
 A computer running Window XP Professional
 Ethernet patch cable

Procedures:
Step 1
 Plug one end of the Ethernet patch cable into “Port 1” at the back of the router.
 Plug the other end of the Ethernet patch cable into the network port on the NIC in
your computer.
 Plug in the power cable of the router if it is not already plugged in.
 Turn on your computer and log on to Windows as an administrator.
 Click Start.
 Right-click My Network Places, and then choose Properties.
 The “Network Connections” window appears.

Figure 59. My Network Places


Step 2
 Right-click Local Area Connection, and then choose Properties.
 The “Local Area Connection Properties” window appears.

Figure 60. Local Area Connection Properties


Activity Questions:
1. What is the name and model number of the NIC in the “Connect using:”
field?
2. What are the items listed in the “This connection uses the following items:”
field?
Step 3
 Choose Internet Protocol (TCP/IP).
 Click Properties.
 The “Internet Protocol (TCP/IP) Properties” window appears.
Figure 61. Internet Protocol (TCP/IP) Properties

Activity Question:
3. What is the IP address, Subnet mask, and Default gateway listed in the
fields of the “Use the following IP address:” area?
Answers may vary. If the computer is configured to obtain an IP address
automatically, there will be no information in the fields.

 Click the Obtain an IP address automatically radio button.


 Click OK. The “Internet Protocol (TCP/IP) Properties” window closes.
Figure 62. Local Area Connection Properties Window

 Click OK.
 Restart your computer.
Step 4
 Log on to Windows as an administrator.
 Check the lights at the back of the NIC. These lights will blink when there is network
activity.
 Choose Start > Run.
 Type cmd and click OK.
 Type ipconfig/all, and then press the Enter key.

Figure 64. ipconfig all window

Activity

Questions:
1. What is the IP address and subnet mask of the “Ethernet Adapter Local Area Network
Connection”?
2. What is the IP address of the DHCP server?
3. On what date was the Lease obtained?
4. On what date will the Lease expire?
Task 2
Configure Wireless Router
Directions: Configure and test the wireless settings on the LinksysWRT300N.
Recommended Equipment
 A computer with Windows XP Professional / Windows 7
 A Wireless NIC installed
 An Ethernet NIC installed
 Linksys WRT300N Wireless Router
 Ethernet patch cable
Step 1

 Connect the computer to one of the Ethernet ports on the wireless router with an
Ethernet patch cable.
 Plug in the power of the wireless router. Boot the computer and log in as an
administrator.
Step 2

 Choose start > Run, and type “cmd”. Press the Return key.
 Type ipconfig.
 What is the default gateway for the computer?
Step 3

 Open your browser. Type “192.168.1.1” in the “Address” field, and then press
Return.

Figure 65. Browser Window

 The “Connect to 192.168.1.1” window appears.


Figure 66. Connect to 192.168.1.1 Window

 Type “admin” in the “Password” field.


 The Setup screen appears.
Step 4

 Click the “Wireless” tab.


 Choose “Mixed” in the “Network Mode” drop-down box.

Figure 67. Wireless Tab Window

 Type “CHS#” in the “Network Name (SSID)” field, where # is the number assigned by
your instructor.
 Click Save Settings.
 The “Settings are successful” screen appears.

Figure 67. Settings are Successful Window

 Click Continue, and then close the browser window.

Step 4

 Unplug the Ethernet patch cable from the rear of the computer.
 Choose Start, and then right-click My Network Places. Choose Properties.
 Double-click the wireless adapter, and then select View Wireless Networks.
 Choose CHS, and then click the Connect button.
 Open Internet Explorer, and then connect to the wireless router.
 Log in to the wireless router.
 Close Internet Explorer.

Peer-to-Peer Network
In a peer-to-peer network, devices are connected directly to each other without
any additional networking devices between them, as shown in Figure 68. In this type of
network, each device has equivalent capabilities and responsibilities. Individual users
are responsible for their own resources and can decide which data and devices to
share. Because of that, the network has no central point of control or administration.

Figure 68. Peer-to-Peer Network

It allows certain files and folders to be shared with everyone or with selected
users. Peer-to-peer networks are quite common in small offices that do not use a
dedicated file server. Files and folders can be configured to allow network users to copy
them, but not alter them in their original location, which is a common safety precaution.
However, files and folders can also be assigned a "read/write" status that allows either
selected users or all users on the network to change them.
Peer-to-peer networking differs from client-server networking, where certain
devices have responsibility for providing or "serving" data and other devices consume or
otherwise act as "clients" of those servers.

Setting up a peer-to-peer network in Windows XP


The steps described below are provided as a general guide that will work for
most home networking situations. However, it may not work for all scenarios.
Do the following steps to set up your own inclusive home network:
1. Make sure both systems have Network Interface Cards (NICs) installed and are
using the proper cables.

NOTE: For a direct network cable connection between two PCs (not
with a hub, switch or router), you need to have a cross-over cable.

2. For PCs with Windows XP, the home networking wizard can be used to set up
Windows for your network.
a. Click Start, and then Control Panel.
b. Select Network and internet connections.
c. Double-click Network setup wizard and follow the on-screen instructions.
.
NOTE: If the Network setup wizard is unsuccessful, continue with the
steps below.

3. Click Start, Control Panel, Network and Internet Connections, and


then Network Connections. At Network Connection Windows, you will see the Local
Area Connection Icon, Right click it and select Properties. Local Area Connection
window appears.
Figure 69. Network Connection Window

4. Click on the General tab.

Figure 70. LAN Properties General Tab


5. A device name should appear under "connect using." If not, there is a hardware
issue and Windows is not recognizing the network hardware. This issue must be fixed
before continuing.
a. At the General Tab, Put a check mark at the following:
- Client for Microsoft Network
- File and Printer Sharing for Microsoft Network
- Internet Protocol (TCP/IP)

b. Put a check mark saying Show icon in notification area when


connected.
c. Select the Internet Protocol (TCP/IP) and click the Properties button

NOTE: If any of the above component is not installed, install them by


selecting Add or Install, and then selecting the missing component, and
clicking Add.

Figure 70. LAN Properties General Tab


Figure 71. TCP/IP- Properties

d. At the IP Address tab, select Specify IP Address.


e. Enter 192.168.0.1 as the unique IP Address for the first machine. For
each other PC add one to the last number in the IP address. For
example,
 KIDSPC1 = 192.168.0.1 ,
 MOMSPC2 = 192.168.0.2 ,
 and WORKPC3 = 192.168.0.3 .

NOTE: 192.168.0.x is an IP Address reserved for private networks


and is not routable to the Internet.
Figure 72. Assigning IP Address and Subnet Mask

6. In the Subnet mask field enter: 255.255.255.0


All PCs on the same network use the same subnet mask. Click the Ok button to finish
configuration and to close the Local Area Connection Properties windows .

Note: The Domain Name System (DNS) is optional. If you have a DNS
system and your connected to ISP you can input an IP address which
came from the DNS server.
Click Start, right-click My Computer, and then select Properties.

7. Click the Computer Name tab and click the Change button.


8. Enter a name that describes the PC in the Computer Description field. For
example, KIDSPC1, MOMSPC2, or WORKPC3.
9. Enter the workgroup name for your network. Use the same workgroup name for all
PCs on the network. Spelling is important in this step.
10. Repeat these steps for each PC on the network.
11. Wait two minutes after Windows opens on all PCs, and then double-click
the Network Neighborhood icon on the desktop. If all went well, you should see all
the PC names on the network when files and folders are being shared. If you do not
see them, press F5 to refresh the screen.
12. If after refreshing the network window, the other PCs still do not appear, check the
firewall settings that may be interfering with the communication.

Setting up a Peer-to-Peer network in Windows 7


If you are going to work with Windows 7 operating system, the following
procedures are used to set up a peer-to-peer network:
1. On Desktop ==> Select My Computer ==> Right Click ==> Select properties.
Figure 73. Step 1
2. Select Change Setting (administrative permission will be required in this
procedure).

Figure 74. Step 2

3. Click or select Change.


Figure 75. Step 3

4. Change computer name and workgroup name. Then, click OK.

Figure 76. Step 4

5. Save the change (A Reboot will be required).


Figure 77. Step 5
6. After Reboot ==> Right Click on My Network Place ==> Properties.

Figure 78. Step 6

7. Turn on Network discovery, File sharing, Printer Sharing.

Figure 79. Step 7

8. Click on Manage network connections.


Figure 80. Step 8

9. Select Local Area Connection ==> Properties

Figure 81. Step 9

10. Select Internet Protocol version 4 (TCP/IPv4) ==> properties.


Figure 82. Step 10

11. Now enter the assigned IP address and then click OK.

Figure 83. Step 11


12. Now open My network place ==> Click to change then Select Turn on network
discovery and file sharing.

Figure 84. Step 12

13. If you could see all computers in My Network place, you have successfully
configured a workgroup.

Figure 85. Step 13

Client-Server Network
In a client/server network, the server provides the requested information or
service to the client. Servers on a client/server network commonly perform some of the
processing work for client machines, such as sorting through a database before
delivering only the records requested by the client.

Server
Figure 86. Client/Server Network

One example of a client/server network is a corporate environment in which


employees use a company e-mail server to send, receive, and store e-mail. The e-mail
client on an employee computer issues a request to the e-mail server for any unread e-
mail. The server responds by sending the requested e-mail to the client.
In a client/server model, the servers are maintained by network administrators.
Data backups and security measures are implemented by the network administrator.
The network administrator also controls user access to the network resources. All the
data on the network is stored on a centralized file server. Shared printers on the
network are managed by a centralized print server. Network users with the proper
permissions can access both the data and shared printers. Each user must provide an
authorized username and password to gain access to network resources that he or she
is permitted to use. For data protection, an administrator performs a routine backup of
all the files on the servers. If a computer crashes, or data is lost, the administrator can
easily recover the data from a recent backup.

File and Printer Sharing

File Sharing is sharing of or offering access to digital information or resources,


including documents, multimedia (audio/video), graphics, computer programs, images
and e-books. It is the private or public distribution of data or resources in a network with
different levels of sharing privileges.

File sharing can be done using several methods. The most common techniques
include the following:

 Removable storage devices


 Centralized file hosting server installations on networks
 World Wide Web-oriented hyperlinked documents
 Distributed peer-to-peer networks

Sharing Resources and Accessing Shared Resources


1. Open My Computer, double-click the C: drive, and create a new folder on the C:
drive. Name it Shared. Right-click the Shared folder and select Properties.
2. In the Shared Properties dialog box, select the Sharing tab.
 Notice that the Select the Share This Folder button.
 Type the Share Name. Click Apply and the computer you are linked to should be
able to view your Shared folder.
3. Right-click My Network Places, which should be located on your desktop. Select
Properties.
4. Right-click your connection (look for
a name like Local Area
Connection) and again select
Properties.
5. In your Local Area
Connection Properties dialog box,
select File and Print Sharing for
Microsoft Networks and click OK. If
you don’t see an option for File and
Print Sharing, click Install and select a
service and then click Add. Now select
the File and Print Sharing o Figure 101. My Computer option.
o Figure 102. Shared Document
Properties
6. Open My Network Places- double-click theWindow
icon- and select the Entire Network
option under Other Places at the left of the window. In the main (right-hand) pane,
you should see one or more options. Double-click the Microsoft Windows Network
icon.

Local Disk (C:\PC 1)

7. You’re now at the main


Figure network
103. screen,
Microsoft where
Windows you should see what’s called a
Network
workgroup. A workgroup is a basic group of computers connected to the same
Window
Ethernet network. Double-click the workgroup to see all the computers connected to
your Ethernet network.
o Figure 104. Shared Documents
Window
At this point, you can access any of the other computers and see what folders
they have shared. If you don’t see any computer but your own, just wait a few minutes
and refresh your screen. If you don’t see other computers, then it’s time to troubleshoot
the network problems.

Printer Sharing
One of the primary reasons that networks were developed was to allow groups of
computer users to share peripheral devices such as printer. Sharing a single printer
among a group of users costs much less than buying a printer for each computer.
Low-cost printers usually require a separate print server to allow network
connectivity because these printers do not have built-in network interfaces. The
computer that is connected to the printer can serve as the print server. Most personal
computer operating systems have built-in printer sharing capability.

Setting up printer sharing is simple with Windows XP. The following steps enable
a computer to share a printer:

Step 1. Choose Start > Printers and Faxes.


Step 2. Right-click the printer, and choose Properties.
Step 3. Click the Sharing tab.
Step 4. Click the Share this printer radio button.
Step 5. Keep or change the share name.
Step 6. Click Apply.
All the computers that use the shared printer must have the correct drivers
installed. Drivers for other operating systems can be installed on the print server.
To connect to the printer from another computer on the network, choose Start >
Printers and Faxes > Add Printer. The Add Printer Wizard appears. Follow the steps
using the wizard.

You might also like