Administering Network and Hardware Peripheral
Administering Network and Hardware Peripheral
Administering Network and Hardware Peripheral
Hardware requirements
5. Click on the drop down menu arrow and select which version of Windows the program was made for.
Ring topology
Advantages of ring topology:
- All nodes on the network have equal chance of transmitting data.
- Use of cable is economical.
- Data can be sent over large distances (each computer can act as repeater)
Disadvantages:
- If one of the nodes/cable fails, the whole networks will fail.
- Difficult to add and delete nodes to /from the ring.
3. STAR TOPOLOGY
A star topology is a type of network which uses a central point to share data files, programs and resources
between clients.
In star network:
The central point is called switch or hub.
Signals are transmitted from the sending computer through the hub/switch to all computers on the
network.
Star topology
ADVANTAGES of star topology:
* Easy to add new workstations
* Has centralized control
* Failure of a single computer does not affect the whole network
* Fault of a single workstation can be identify easily
DISADVANTAGES of star topology:
* If the central point fails, the whole network will stop.
* Use of cable is not economical
4. Mesh topology
Mesh topology is a type of network in which every node has a connection to every other node in the network.
Mesh topology
4.1.3 Network media
A network media is a network device that carries a message from computer to computer.
Types of network media:
Network cables
Connectivity devices such as hub, switch, NIC, connectors, . . . etc.
Network Cable is used to join computers and network components together.
The choice of cable depends upon a number of factors such as:
- Cost
- Distance
- number of computers involved
- speed, and
- Bandwidth.
Note: Bandwidth is the amount of data that can be sent over a network cable.
Types of network cable:
Twisted-pair cable (shielded twisted pair and unshielded twisted pair)
* STP - has shield (insulation jacket around the wire)
* UTP - is the most common used cable in office environments.
- Very flexible, cheap, and very easy to install and maintain.
Coaxial cable
. Coaxial cable is an older form of network cabling.
. It is a good choice for longer distances and for supporting higher data transfer rates with
less up-to-date equipment.
Fiber-optic cable
. Data can be transmitted in the form of light pulse rather than electrical signals.
. is very well-protected, extremely fast, and very expensive.
. is less susceptible than metal cables to interference.
. is much thinner and lighter than metal wires.
4.2.1.1 Parallel
Parallel and serial networking connections are alternative methods of moving data between computers, or from
a computer to a peripheral device.
Parallel connections are still used for large computer installations and specialized tasks.
A parallel connection is more like a superhighway, where there may be eight or more lanes in each direction
moving traffic.
4.2.1.2. Serial
- A serial connection is a single-lane road, with all data moving back and forth along a single channel
for each direction Parallel Advantages of Serial
- Serial connections are easier for computers to maintain and simpler to work with, as a single serial
connection will contain data for only one networking or peripheral purpose.
4.2.1.3. Direct
From simple direct connections between computers to complete home and even IT networks, you will learn
how to select equipment and configure the systems.
4.3 Testing peripherals/cables, and other devices/ operations
Peripherals are tested for correct operation based on client’s specifications.
LO5. Configure peripheral services
5.1 Install required software to configure/manage local area network
5.1.1 Local peripherals
What is a peripheral device?
A peripheral is any computer components that is not the essential part of the computer (the processor, memory,
hard disk, . . .etc).
A local peripherals is a peripheral that can be connected to the stand alone (a single) computer.
5.1.2 Network peripherals
What is a network peripheral?
A network peripheral refers to equipment which typically enables computers to communicate each others.
* Network peripherals include: - routers,
- Switches,
- Access points,
- Network interface cards and other hardware devices.
Routers
A router is a special computer which has the ability to perform such tasks as routing and forwarding
information with use of software and hardware.
Routers contain a specialized operating system, along with such devises as RAM, flash memory, and one or
more processors.
Hub
Hubs can be defined as, small, uncomplicated, economical devices that join multiple computers, with a lower
or basic level of networking facilities.
Switch
A network switch is a small hardware device that joins multiple computers together within one local area
network.
It performs a similar role to hub, but more intelligent and faster.
Modem
A modem enables a computer to transmit data over long distances using a cable or telephone line.
Network Adapters
The term NIC refers to network adapter in the form of a card.
It is one of the most essential pieces of equipment for any computer network.
5.1 Install required software to configure/manage local area network
Basics of Server-based Network
* Whenever the number of computers in a network becomes more, you should use a server-based
environment because it becomes almost impossible for peer-to-peer networks to handle such
computing.
* In the centralized or server-based system, the clients connect to the central computer for one or more
services.
* Almost all processing is done on the server. This helps in the synchronizing the data as everyone
accesses and manipulates the data that is stored in a centralized location.
* Maintaining security in a server based networks much easier than that in a peer-to-peer network as the
only system whose security matters is the server. You only need to maintain the security of the data
and other resources of the server.
* In a server-based environment accounts for different users are created and maintained on the server
and only those users are granted the access whose details match the details specified in the
corresponding account.
* Different rights are assigned to different users such as whether this particular user has the right to print
the data, whether some user has the right to open some particular file, . . . , etc. The management of
such types of rights is easy in centralized networks because the whole administration revolves around
the server.
* It also reduces the overall cost of the system because most of the cost as you have to spent on one
system that needs more resources and also need administration and on the other hand the client
systems can be dump terminal or they can have very low processing power. This makes the server
based network cost efficient.
The advantages of server based networks.
- In sever based network, users can share equipments like laser printers.
- Management of users becomes very easy in server based network because you can manage all
users from a single computer (server).
- All the data stored on central storage device so it becomes easier to backup data.
- Security is one of the main issues when we talk about server based networks. In server based
network (environment) security is very easy to manage because one server has to make policies
and it applies on all the users in network.
- Backup of all the data is very easy to perform in server based networks as you just have to make
schedule and server automatically makes backup according to the schedule.
- A server based network has the power of managing thousands of users. You cannot do this thing in
peer to peer networks. Actually if there are ten computers and some of them are clients and some
are servers then it is impossible to manage them in peer to peer network. You have to use server
based network.
In general, server-based network has more advantage over peer-to-peer network
More scalable than peer-to-peer networks
There is a central management point for sharing resources
More easily administered due to the central management point
More secure than peer-to-peer networks
Data can be backed up from one central location
Press F10 to save the changes you made, and select Yes to confirm save.
Press Enter key to setup windows on the selected partition ,to create partition press C on
unpartitioned space
Select “Format the partition using the NTFS file system and press “Enter key”
Note: If you choose “Format the partition using the FAT file system” you will loose some special futures of
the NTFS file system
which are not available in FAT file system.
Example
1. You cannot install Active Directory (Which is to be added to the server operating system to increase
the security of your system).
2. You can not the “Disk quota management” (Which enables to the System administrators to assign
hard disk space to all users (Accounts) of the system according to their need.
Wait until it finishes formatting, Copying, and Restarting. Without touching (giving command)
anything it starts copying files when copying file progress finishes set up will restart itself after 15
seconds.
After copying files and restarting the graphical user interface displays and start installing window
components
Click Next button.
Relax and back after around 25 -30 minutes and your installation will finalize and restart , Do
nothing
Click “Finish”
Click “yes” button
The following dialogue will display always you start your server, it is recommended that to read some
points about configuring (managing) your server but for now Close it by clicking the close button in
the control button of this window in the right upper.
Type the name of the new domain (any name) and click next
Click next
Click next to the existed drive to store the Active Directory database.
Type the restore mode password if, necessary, and click next.
The restore mode password is the single password that all administrators hope to never use, however they
should also never forget it because this is the single password that might save a failed server.
Make sure the summaries are all correct because changing it afterwards can prove to be difficult click next
Active Directory installation started the actual process. This can take several minutes.
If your computer has a dynamically assigned address (from DHCP) you will be prompted to give it a static IP
address; if necessary or not configure before.
Click finish to complete the installation.
Select the "Domain" radio button then type your domain name, not including the extension and click ok.
Type a user name and password and click ok
Click Ok when the welcome message displayed and then the needs to restarted to make effective the change
5.2 Configuring access and security
- Security
Windows 2003 Server allows to provide security to files and folders; this feature is available because of the
NTFS (New Technology File System).
There are different levels of security, such as read, modify, full control etc.
Full control permissions include:
- Read - Write
- execute - delete
- change permissions
Where as modify includes 4 permissions that is, read, write, execute and delete.
- To set permissions on a folder/file use the following steps
. Right click on the object, choose properties
. Click on the security tab, and remove all the permissions by pressing the advanced button and then
unchecking the "inherit permissions option".
. When prompted to remove, press the remove button and then press ok.
. Press the add button and type the user or the group name and press ok.
. Select the permissions from the list and press ok to finish.
5.2.1. User privileges
USER MANAGEMENT
- Adding new users to active directory (creating user account)
Click Start, select "Administrative Tools" and select "Active Directory Users and Computers “.
Right Click on users and select New user, then the password setting screen displays.
Type user new user name and password and click Next and click finish
After creating user accounts, a user can log on to the server from any client machine in the domain.
5.2.1.1. System privileges
Installing & Configuring Print Server
- Installing Printer on the Server
- Log in as administrator and open printers and faxes from start -> settings
- Make sure the printer is connected to the server and it is turned on.
- Double click on add printer and press next.
- Choose "Local printer" and check "Automatically detect my plug and play printer" -> next
- Choose "yes" or "no" to print a test page and press finish.
- To share the printer right click on it and choose sharing type a share name and press ok.
- click on security tab, click add to different users to allow the printer
5.3. Configuring work stations
- Client Configuration
. In the client log in as any domain user and open printer and faxes from control panel.
. Double click on add printer, press next.
. Choose "network printer" -> next.
. Select "Connect to this printer" and type the path.
eg:- \\server name\printer name
. Press next and finish to complete the setup.
- To Enable internet printing
. In the server log in as administrator and open add/remove programs -> add/remove
windows components
. Double click on application server and then double click on "internet information server"
. Select "internet printing" and press ok and next to complete the setup.
- Client Setup for Internet Printing
- In the client open internet explorer and choose tools -> internet options, click on security.
- Select internet and set the security to "low" press ok.
- In the address bar type the servers IP address followed by the alias name.
eg:- 192.168.100.3/printers
- Click on the displayed printer name and press the connect link to install the printer.
Computer management for a remote computer or managing a remote computer
To manage a remote computer you have to be an administrator of the domain.
- Right click on the computer management (local) item choose "connect to another computer".
- Type the name of the network computer, which you want to manage and press ok. This allows you to
see all the manageable items of a remote computer, you can start or stop services on a remote
computer, you can view the event of a remote computer and you can even send console message to the
remote computer
- To send message, right click on computer management choose all tasks -> send console message type
the message and press send to send.
- You can also logoff, restart or shutdown a remote computer by right clicking on computer
management-> properties. Click the advanced tab and press the settings button under startup and
recovery. Press the shutdown button and choose either to logoff, shutdown or restart.
5.4. Sharing Network resources
- File Sharing
Sharing allows an object to be accessed from network. By default in windows 2003 server, there are some
hidden shares, these shares end with a $ symbol. To view these default shares open computer management
(right click on my computer and choose manage) and select shared folders and then shares.
- To share an object
- Right click on the object (only folder or drive), and choose sharing and security
- Select share this object and type the share name and press ok.
- The share name should be within 8 characters and should not contain any space or special
characters.
- By default, all shares are in read only mode, you can press the permissions button to provide
change permission or full control.
- You can also share Hardware, Data and Applications
LO8. Use and maximize operating system
8.1 Configuring Network operating system
A network operating system (NOS) is a computer operating system that is designed primarily to coordinate
the activities of multiple computers across a network.
* It provides the capabilities required for network operation.
- NOS provide the following functions:
- Account administration for users
- printer sharing
- common files, applications and database sharing
- Backing up data
- the ability to manage a network name directory, security, and other housekeeping aspects of a
network.
- Install Components :
Client functionality
Server functionality
8.1.1 Adding different functionalities of operating system
- Adding d/nt functionalities of operating system means installing server roles by using
configure your server wizard and manage your server roles by using manage your
server.
8.2 Operating application soft wares
8.2.1 Installing
- Installing means loading of a programs ( or connecting hardware) on to the computers.
- It is the act of putting the program/hardware onto a computer system so that it can be executed.
8.2.2 Upgrading
The term upgrade refers to the replacement of a product with a newer version of the same
product.
Adding additional features on the existing system to improve its performance.
8.2.3 Uninstalling
- The term uninstalling means Removing (an application or file) that were installed/added from a
computer.
- You can uninstall an application by selecting Add/Remove Programs from the Control Panel and
then selecting the application you want to remove.
8.3 Working with graphical user interface and command line
The operating system provides user interface for users to insert/give instructions into the computer and
receiving feedback. Based on the type of user interface the OS provides, operating systems can be put into two
groups:
- Command Line Interface (CLI) based operating systems.
- Graphical User Interface (GUI) based operating systems.
To return from this text editor, hold down the Alt key, and press F and then X.
copy Command: copy command can be used to copy files from one area to another.
Syntax: copy [source] [destination]
- source - the path and file name of the file to be copied.
- destination - the path and file name to which the file is to be copied.
ren Command: ren or rename command is used to change the name of a file.
Syntax: ren [path]oldName newName or rename oldName newName
del Command: del (which stands for ‘delete’) is used to delete files.
Syntax: del [path] filename
Exit Command: exit command lets you exit DOS and return to Windows.
- To exit DOS, type exit and press the Enter key.
Wildcard characters:
A wildcard character can be used to represent one or more letters.
The question mark (?) represents any single letter
the asterisk (*) represents one or more letters.
Examples: 1. Dir a* - displays all files and directories in the current directory that start with the letter ‘a’.
2. Dir *a – displays all files and directories in the current directory that end with the letter ‘a’.
3. Dir *me* - displays all files and directories in the current directory that contain ‘me’.
4. Dir ab?? – displays all files and directories that start with ‘ab’ and contain four characters.
Like with dir, you can use wildcard characters to copy or delete a group of files.
For example, if you want to copy all files with the extension exe, you can write: copy *.exe