0% found this document useful (0 votes)
502 views56 pages

Module 4 Sucs

The document provides instructions for a lesson on understanding server-client networking. It begins with an introduction that outlines the parts and structure of the module, including expectations, a pre-test, lesson, activities, and post-test. The lesson defines client-server networking, explains that a client requests services from a server, and discusses the main advantages of the client-server model including centralized data management, security, and backup capabilities. It also compares characteristics of clients versus servers. The activities section includes an acronym activity related to clients and servers.

Uploaded by

arkie
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
502 views56 pages

Module 4 Sucs

The document provides instructions for a lesson on understanding server-client networking. It begins with an introduction that outlines the parts and structure of the module, including expectations, a pre-test, lesson, activities, and post-test. The lesson defines client-server networking, explains that a client requests services from a server, and discusses the main advantages of the client-server model including centralized data management, security, and backup capabilities. It also compares characteristics of clients versus servers. The activities section includes an acronym activity related to clients and servers.

Uploaded by

arkie
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 56

INSTRUCTIONS AT THE BACK

JULITO B. JUDILLA
SUBJECT TEACHER
LO 1: SET UP USER
Lesson 1 : UNDERSTANDING SERVER CLIENT NETWORKING
For the learner:
Welcome to the Technical Vocational Livelihood Education ICT CSS NC II
Module on Set-up User Access :Understanding Server-Client Networking .
The hand is one of the most symbolized part of the human body. It is often used
to depict skill, action and purpose. Through our hands we may learn, create
and accomplish. Hence, the hand in this learning resource signifies that you as
a learner is capable and empowered to successfully achieve the relevant
competencies and skills at your own pace and time. Your academic success lies
in your own hands!
This module was designed to provide you with fun and meaningful opportunities
for guided and independent learning at your own pace and time. You will be
enabled to process the contents of the learning material while being an active
learner.
This module has the following parts and corresponding icons:
Expectation - These are what you will be able to know after completing
the lessons in the module

Pre-test - This will measure your prior knowledge and the


concepts to be mastered throughout the lesson.

Recap - This section will measure what learnings and skills that
you understand from the previous lesson.

Lesson- This section will discuss the topic for this module.

Activities - This is a set of activities you will perform.

Wrap Up- This section summarizes the concepts and applications


of the lessons.

Valuing-this part will check the integration of values in the


learning competency.

Post-test - This will measure how much you have learned from
the entire module.
EXPECTATION

After completing the lesson the learners should be able to:


1. define Client-Server Network
2. differentiate Client from Server
3. cite the importance of securing server for the client

PRE–TEST
Directions: Read each statement below carefully. Identify if the following
statement is CLIENT or SERVER. Write your answer on your answer
sheet/notebook.
_______ 1. Powerful expensive machine
_______ 2. Checks authorization
_______ 3. Performs query/update processing and transmits responses.
_______ 4. Supports single-log in at a time
_______ 5. Delivers high performance

RECAP
IDENTIFICATION: Identify the following network topologies. Write your
answer on your answer sheet.
LESSON
UNDERSTANDING CLIENT-SERVER

Introduction
Client-server networking grew in popularity during the 1990s as personal
computers became the alternative to mainframe computers. Client-server
networking refers to a computer networking model that uses both client
hardware devices and servers, each with specific functions. The client-server
model can be used on the internet as well as on a local area network (LAN).
Examples of client-server systems on the internet include web browsers and
web servers, FTP clients and servers, and the DNS.
This lesson will broaden your understanding about server client networking.

Illustration below shows an example of server-client networking :

Fig 1. www.Tech Terms.com

Server-Client Networking Defined

Client-server denotes a relationship between cooperating programs in an


application, composed of clients initiating requests for services and servers
providing that function or service.

A client-server network is the medium through which clients access


resources and services from a central computer, via either a local area network
(LAN) or a wide area network (WAN), such as the Internet. A unique server called
a daemon may be employed for the sole purpose of awaiting client requests, at
which point the network connection is initiated until the client request has been
fulfilled.
Network traffic is categorized as client-to-server (north-south traffic) or
server-to server (east-west traffic). Popular network services include e-mail, file
sharing, printing, and the World Wide Web. A major advantage of the client-
server network is the central management of applications and data.
https://www.omnisci.com/technical-glossary/client-server

In simple method definitions,

Client - any process that requests specific services from the Server.

Server - a process which provides requested services for the Client.

Fig 1. Server-client Networking :https://www.e-tesda.gov.ph

CLIENT vs SERVER

CLIENT SERVER

A client machine is a Server machine is a high-end


small computer with a computer with an advanced
basic hardware hardware configuration
configuration
A client is a simple and Server is a powerful expensive
less powerful machine machine.
A client is used for simple Server is used for storing huge data
tasks files and applications.
A client performs based Server delivers high performance
on user standard
A client supports a A server supports simultaneous,
single user log-in at a multiple user log-ins
time.
http://www.differencebetween.net

The main advantage of the client-server network is supporting a


shared database or site to be obtained or updated by many computers
while keeping only one control center for the operation. This makes it
feasible for businesses to share information, upload data, or reach the
program without being bound down to one particular computer site.
As the information is obtained online, a client-server model gives more
power and control over what is being kept.
Additionally, this model has improved security, usually with
encryption, making sure that the data is only available to authorized
people. A client-server model also makes it simpler to back up
valuable information than if it was collected across many devices. A
network administrator can easily configure a backup for the server,
and if the first data were to be destroyed, he or she would only want
to recover the single backup.

ACTIVITIES

Activity 1. My Client, My Server


Direction: Make an ACRONYM that will best describe or relevant to client and
server

C - omputer S - upport

L - E -

I - R -

E - V -

N - E -

T - R -

NOTE: Answer the remaining letters.


WRAP–UP
Client-server networking refers to a computer networking model
that uses both client hardware devices and servers, each with specific
functions. The clientserver model can be used on the internet as well as on a
local area network (LAN).
Client-server denotes a relationship between cooperating programs in an
application, composed of clients initiating requests for services and servers
providing that function or service. In simple definition, Client is any process
that requests specific services from the Server while Server is a process which
provides requested services for the Client. The main advantage of the client-
server network is supporting a shared database or site to be obtained or updated
by many computers while keeping only one control center for the operation. this
model has improved security, usually with encryption, making sure that the
data is only available to authorized people. A clientserver model also makes it
simpler to back up valuable information than if it was collected across many
devices. A network administrator can easily configure a backup for the server,
and if the first data were to be destroyed, he or she would only want to recover
the single backup.

VALUING

If you will become a Systems Administrator someday, how will you secure
the server for your clients?

Answer:
____________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
POST TEST
Multiple choice
Directions: Write the letter of the correct answer on your answer
sheet/notebook.

1. The following are using server for the clients, EXCEPT:


A. Facebook C. Cinemas
B. Banks D. Google

2. Any process that requests specific services from the server.


A. Mobile Phone C. Server
B. Client D. Webpage

3. Having a characteristic of being so powerful and expensive machine.


A. CPU C. Client
B. Personal Computer D. Server

4. Which of the following is NOT A CLIENT?


A. Smartphone C. Satellites
B. Personal Computer D. Tablet

5. Assuming that you are the Systems Administrator of the company, what
is the best thing you should do to secure data on the server?
A. Secure backup C. Record the data
B. Implement encryption D. Secure anti-virus

.
LO 1: SET UP USER

Lesson 2 : Types and Functions of a Server.

EXPECTATION
After completing the lesson the learners should be able to:
1. enumerate the types of servers
2. compare the functions of server and clients
3. appreciate the role of server in the world.

PRE–TEST
Directions: Read each statement below carefully. Write T if the statement
is correct and F if not in the space provided before each number.
_______ 1. Server is a computer program that provides a service
another computer programs and their users.
_______ 2. There are mainly four types of Server Hardware
_______ 3. A mail server is a computer system that sends and receives
email using standard email services.
_______ 4. Servers are named depending on what they serve.
_______ 5. Server checks authorization.

RECAP
Directions: Read each statement below carefully. Identify if the following
statement is CLIENT or SERVER. Write your answer in the space
provided before each number.
_______ 1. Powerful expensive machine
_______ 2. Checks authorization.
_______ 3. Performs query/update processing and transmits responses to
client.
_______ 4. Supports single-log in at a time.
_______ 5. Delivers high performance.
LE S S O N

Types and Functions of a Server Introduction

A physical computer which runs a server programme is frequently


refer to as a SERVER. Servers perform various essential tasks and
activities that is a very crucial thing of any organization's IT
infrastructure. The many complex processes that take place during an
activity, for example a security and authentication to billing and orders,
the purchase could not take place without several powerful servers
handling the load hence servers are very much important for any
organization.

This lesson will broaden your understanding about the types and
functions of a server.

Illustration below shows an example of how server serves across the


network:

Fig 1. http://www.functionx.com/networking/Lesson06.htm

Functions of Server vs Client

The main and important function of a server is to listen in on a port


for incoming network requests, and a good demonstration of this is the
interaction between a Web server and browser. For a user the process is
instantaneous, but when he clicks a link while surfing on the Web,
several things are taking place behind the scenes like the request for the
Web page is transmitted to the corresponding web server, and the server
fetches and assembles the Web page and retransmits it using a protocol
like HTTP, and, the user's browser receives the data, converts it, and
displays the page.
FUNCTIONS OF A SERVER AND ITS CLIENTS

SERVER

CLIENTS
Fig 2. www.freeiconspng.com Fig 3 https://www.parallels.com

Checks authorization Managing the user interface

Ensures that integrity constraints are Accepts and checks the syntax of user
not violated inputs

Performs query / update processing Processes application logic


and transmit processing to client

Accepts and processes database Generates database request and


requests from client transmits to server

Maintains systems catalog Passes response back to server

Provide concurrent database access


and recovery control.

Source: e-tesda.gov.ph

TYPES OF SERVERS
There are mainly three (3) types of Server Hardware:

1. Tower Server - It is a computer intended


for use as a server that built in an upright
cabinet that stands alone. The cabinet is called a
tower which is similar in size and shape to the
cabinet for a towerstyle personal computer.

Fig 4. Dell.com
2. Rack Server - A rack server, is a rack-mounted server and a
computer dedicated server to use as a server and designed to be
installed in a framework called a rack. The rack contains multiple
mounting slots, each designed to hold a hardware unit secured in place
with screws.

Fig 5. https://www.cisco.com

3. Blade Server - Blade server is a server architecture that houses


multiple server modules in a single chassis. It is widely used to improve
system management and either self-standing or rack mounted, the chassis
provides the power supply, and each blade has its own CPU, RAM and
storage.

Fig.6. https://www.openpr.com

Software Server includes:


1. Proxy server- It is a server that is called a computer, acts as an
intermediary between the user's computer and the Internet and allows
client computers to make indirect network connections to other
network services.
2. Mail server - A mail server is a computer system that sends and receives
email using standard email services protocols like the SMTP protocol
that sends messages and handles outgoing mail requests.
3. DNS name -It is a program that uses HTTP to serve the files that form
Web pages to users, in response to their requests. Dedicated computers
and appliances are may be called as Web servers.
4. Application server -This type of server is acts as a set of components
accessible to the software developer through a standard API defined for
the platform itself. These are usually performed in the same running
environment as their web server(s), and their main work is to support
the construction of dynamic pages.
5. Active Directory Server -Active Directory (AD) is consists of several
services that run on Windows Server to manage permissions and access
to networked resources. AD stores data as objects and it is a single
element, such as a user, group, application or device, such as a printer.
These objects are normally defined as either resources like printers or
computers or security principals such as users or groups.
6. DHCP SERVER - Here DHCP stands for a dynamic host configuration
protocol.

Which is a network protocol used on IP networks where it is automatically


assigns an IP address and other information to each host on the network
hence it can communicate efficiently with other endpoints.

7. DNS SERVER - DNS stands for Domain Name System. It is the


Internet's system for converting alphabetic names into numeric IP
addresses for example, when a URL is typed into a browser, DNS
servers return the IP address of the Web server associated with that
name.
8. Terminal Server - A terminal server is a network device that enables
connections to multiple client server network systems and connect to a
LAN network. Microsoft introduced this concept by releasing terminal
services as a part of the Windows Server OS.
9. Print Server - It is also called as printer server, which is a device that
connects printers to client computers over a network. Print server
accepts print jobs from the computers and sends the jobs to the
appropriate printers.
ACTIVITIES

Activity 1. SERVES ME RIGHT!


Direction: Read each statement on the right. Name the appropriate server
for each statement. Write your answer on your answer sheet/notebook.

1. I need a metal framework with multiple mounting slots to hold my


hardware.
Answer: ______________________________

2. I need to house my multiple server modules into one single


chassis.

Answer: _____________________________

3. I need a server that built in an upright cabinet that stands alone.


Answer: ______________________________

4. I need a server where it automatically assigns an IP address and


other information to each host on my network.
Answer: _____________________________

5. I need a server that can accept print jobs from the computers and
send the jobs to the appropriate printers.
Answer: ____________________________

WRAP–UP
The main and important function of a server is to listen in on a port for
incoming network requests, and a good demonstration of this is the
interaction between a Web server and browser.
There are three (3) types of Server Hardware depending on
their uses: Tower, Rack and Blade Servers. Hardware Servers cannot be
completed without Software Servers that serve as communicators.
Technically, server do not include software. But without
software server is a dead piece. What is the use of server (Just a hardware
alone), there is no use. We need to have software also to use it. To put it
in another word, Think of your laptop, if there is no software, how will
you use your laptop ? Similar way, without software, We can not use
servers.
Servers offer high reliability and dependability features that
are just not available on desktop PCs. It has proven performance
advantages than PCs. And ultimately, it help improve productivity and
reduce operating expenses.

VALUING

Direction : List down at least 5 important roles of a server in business,


education, governance and communications.
1
2.
3.
4.
5.

POST TEST
Multiple choice
Directions: Write the letter of the correct answer on your answer
sheet/notebook.
1. It is a computer intended for use as a server that built in an upright
cabinet that stands alone.
A. Blade Server C. DNS
B. Tower Server D. Rack Server
2. Any process where it is automatically assigns an IP address and
other information to each host on the network hence it can
communicate efficiently with other endpoints.
A. Active Directory C. Mail Server
B. Terminal Server D. DHCP Server
3. It is the Internet's system for converting alphabetic names into
numeric IP addresses.
A. DNS Server C. Open-Source Server
B. Blade Server D. Telnet Server
4. Acts as an intermediary between the user's computer and the
Internet.
A. Print server C. Proxy Server
B. Terminal Server D. FTP server
5. The following are SERVER HARDWARES, EXCEPT
A. Tower Server C. Blade Server
B. Print Server D. Rack Server
LO 1: SET UP USER
Lesson 3 : Network Operating System (NOS).

EXPECTATION

This module deals with the skills and knowledge required in


understanding Server- Server Networking.
Upon completion of this module you should be able to:
1. Define Network Operating System (NOS)
2. Explain the types of Network Operating System(NOS)
3. Cite some importance of Network Operating Systems (NOS)

PRE–TEST

Directions: Read each statement below carefully. Encircle the letter of


the correct answer.
1. It is designed with the sole purpose of supporting workstations,
database, application, file and printer access sharing between
multiple computers in a network.
a. Operational logic c. Network System
b. Network Operating System d. Occupational Health and
Safety
2. Type of NOS that allow users to share resources and files
located on their computers and to access shared resources found
on other computers
a. Peer to Peer c. Client/Server
b. One to Many d. Many to Many
3. Type of NOS that allows the network to centralize functions and
applications in one or more dedicated file servers.
a. Many to Many c. Peer to Peer
b. One to Many d. Client/Server
4. The following are considered popular Network Operating Systems
EXCEPT:
a. Linux/UNIX c. Macintosh OS X
b. Windows 7 d. Microsoft Windows Server
5. Which of the following is NOT an advantage of Client/Server Network?
a. Interoperability c. Maintenance
b. Scalability d. Flexibility
RECAP

Multiple choice
Directions: Encircle the letter of the correct answer.
1. It is a computer intended for use as a server that built in an upright
cabinet that stands alone.
A. Blade Server C. DNS
B. Tower Server D. Rack Server
2. Any process where it is automatically assigns an IP address and other
informationto each host on the network hence it can communicate
efficiently with other endpoints.
A. Active Directory C. Mail Server
B. Terminal Server D. DHCP Server
3. It is the Internet's system for converting alphabetic names into numeric
IP addresses.
A. DNS Server C. Open-Source Server
B. Blade Server D. Telnet Server
4. Acts as an intermediary between the user's computer and the Internet.
A. Print Server C. Proxy Server
B. Terminal Server D. FTP Server
5. The following are SERVER HARDWARE, EXCEPT
A. Tower Server C. Blade Server
B. Print Server D. Rack Server

LESSON
Network Operating System (NOS)
Introduction

A network operating system is a specialized operating system for a


network device such as a router, switch or firewall.

Historically operating systems with networking capabilities were


described as network operating system because they allowed personal
computers (PCs) to participate in computer networks and shared file and
printer access within a local area network (LAN). This description of
operating systems is now largely historical, as common operating systems
include a network stack to support a client–server model.
You have heard a lot about the network operating system (NOS) but
not fully understand it. Therefore this lesson will broaden your
understanding about the Network Operating Systems (NOS)

Illustration shows an example


of Network Operating
System:

fig 1. https://medium.com

What is Network Operating System (NOS)

A computer operating system referred to as Networking Operating


System was designed with the sole purpose of supporting workstations,
database, application, file and printer access sharing between multiple
computers in a network.

There are two (2) major types of Network Operating System


namely:

❖ Peer-to-Peer
❖ Client/Server

Peer-to-Peer
Peer-to-peer network operating systems
allow users to share resources and files
located on their computers and to access
shared resources found on other computers.
However, they do not have a file server or a
centralized management source (See fig. 1). In
a peer-to-peer network, all computers are
considered equal; they all have the same
abilities to use the resources available on the network. Peer-to-peer
networks are designed primarily for small to medium local area
networks. Nearly all modern desktop operating systems, such as
Macintosh OSX, Linux, and Windows, can function as peer-to-peer
network operating
systems. https://fcit.usf.edu
Advantages of a peer-to-peer network:
• Less initial expense - No need for a dedicated server.
• Setup - An operating system (such as Windows 7) already in place
may only need to be reconfigured for Advantages of a peer-to-peer
network

Disadvantages of a peer-to-peer network:


• Decentralized - No central repository for files and applications.
• Security - Does not provide the security available on a client/server
network.

Client/Server

Client/server network operating systems allow the network to


centralize functions and applications in one or more dedicated file
servers. The file servers become the heart of the system, providing
access to resources and providing
security. Individual workstations (clients)
have access to the resources available on
the file servers. The network operating
system provides the mechanism to
integrate all the components of the
network and allow multiple users to
simultaneously share the same resources
irrespective of physical location.
UNIX/Linux and the Microsoft family
of Windows Servers are examples of client/server https://fcit.usf.edu
network operating systems.

Advantages of a client/server network:

• Centralized - Resources and data security are controlled through the


server.
• Scalability - Any or all elements can be replaced individually as
needs increase.
• Flexibility - New technology can be easily integrated into system.
• Interoperability - All components (client/network/server) work
together.
• Accessibility - Server can be accessed remotely and across multiple
platforms.
Disadvantages of a client/server network:

• Expense - Requires initial investment in dedicated server.


• Maintenance - Large networks will require a staff to ensure efficient
operation.
• Dependence - When server goes down, operations will cease across
the network.
Network Operating System Software
The following links include some of the more popular peer-to-peer and
client/server network operating systems.
➢ Macintosh OS X
➢ Microsoft Windows Server
➢ UNIX/Linux

ACTIVITIES

Activity 1. You Can Design


Direction: Using the icons below, draw /design a sample of each type of
Network Operating System (NOS). Do this in your answer sheet/notebook

Client Printer Server Switch/Hub Router

https://www.freeiconspng.com (edited by mr. c caruz)


NOTE: Pls add INTERNET CONNECTION (cloud icon) on your design. You can create
more than 2 clients if you want.

.
WRAP–UP

Direction:
Complete the missing statement

Network Operating System is


________________________________________________________
_______________________________________________________________________
______________
_______________________________________________________________________
______________
There are two types of Network Operating System, namely
____________________________ and _________________________________.

VALUING

You are planning to open a small internet café. What type of


network operating system is appropriate for business? Layout your plan
and explain your answer. Write your answer in a separate worksheet
provided for this activity.
POST TEST

TRUE or FALSE.
Directions: Read each statement below carefully. Write T if the statement
is correct and F if not on your answer sheet/notebook.

_______ 1 Client/server network operating systems allow the


network to centralize functions and applications in one or more
dedicated file servers.

_______ 2. Client/Server is centralized because resources and data


security are controlled through the server.

_______ 3. One of the disadvantages of a peer to peer network is security.

_______ 4. Peer-to-peer network operating systems allow users to share


resources and files located on their computers and to access
shared resources found on other computers.

_______ 5. Windows Server 2008 R2 can be used as NOS in your server.


LO 1: SET UP USER
Lesson 4 : Installing VMware Workstation 12 for Server-Client
Virtualization.

EXPECTATION
After completing the lesson the learners should be able to:
A. define Virtualization Software;
B. demonstrate the process of installing VMware Workstation 12; and
C. give importance of Virtualization in these trying times

PRE–TEST
Chronology
Directions: Arrange the steps in installing VMware Workstation 12 for
virtualization in alphabetical order from A to F.
_____1. Double click the executable file for VMware workstation 12. Allow the
program to install in your device and click next.
_____2. Find the VMware Workstation 12 Pro from the list of program and
execute.
_____3. Select Install from installer disk image file (iso). Browse for your
Windows Server
2008 R2 ISO image file.From the Easy Install Information, select
Windows Server
2008 R2 Standard version.DO NOT ENTER PRODUCT KEY. Click YES
to continue.
_____4. Select Create a New Virtual Machine from the Home Tab. Select Typical
(Recommended) as type of configuration and click NEXT.
_____5. Let the installation continue. Enter the license key from the crack folder
and click FINISH.
______6. Specify disk capacity from 40 Gb to 100 Gb. Select Store virtual disk
as a single file. Click NEXT and click FINISH.
RECAP
Directions: Read each statement below carefully. Write T if the statement is
correct and F if not , write your answer on your answer sheet.

_______ 1 Client/server network operating systems allow the network to


centralize functions and applications in one or more dedicated file
servers.
_______ 2. Client/Server is centralized because resources and data
security are controlled through the server.
_______ 3. One of the disadvantages of a peer to peer network is security.
________4. Peer-to-peer network operating systems allow users to share
resources and files located on their computers and to access shared resources
found on other computers.
_______ 5. Windows Server 2008 R2 can be used as NOS.

LESSON
Installing VMware Workstation 12 for Server-Client Virtualization

Introduction
VMware Workstation Pro allows you to run multiple operating systems at
once on the same Windows or Linux PC. Create real Linux and Windows VMs
and other desktop, server, and tablet environments, complete with configurable
virtual networking and network condition simulation, for use in code
development, solution architecting, application testing, product
demonstrations and more.
Illustration below shows a logo of VMware Workstation 12 Pro to be
used as Virtual Machine for the series of hands on activities:

Fig.1. Logo of VMware workstation 12 Pro


What is VIRTUALIZATION SOFTWARE?

Virtualization software allows you to run two or more operating systems


using only one PC. So it’s like two (or more) computers in one. One is physical,
and the others are virtual. More broadly, virtualization can refer to any instance
of one IT resource hosting multiple other IT resources, including applications,
servers, clients, storage capacities, or networks.
Virtualization software, also called a hypervisor, is what allows one
computer or server to host multiple operating systems.

Virtual networking enables communication between multiple computers,


virtual machines (VMs), virtual servers, or other devices across different office
and data center locations. While physical networking connects computers
through cabling and other hardware, virtual networking extends these
capabilities by using software management to connect computers and servers
over the Internet. It uses virtualized versions of traditional network tools, like
switches and network adapters, allowing for more efficient routing and easier
network configuration changes.

How to install VMware Workstation 12 Pro?


With these trying times, we do not allow to have face-to -face classroom
set up so we will not be able to have an actual PC or in virtualization process,
called physical machine. Virtual machine is our own little way to practice and
have a bit of knowledge and skills to virtualize server-client set up.
The following steps are illustrated so as to follow completely the process:
With the given software, double click the executable file located inside the
installation folder. In this case, VMware installation folder is securely save at
the important file storage (depending on the location where it is saved).

Fig. 1. Finding the location of installation folder


Fig. 2. Double click the executable file

Fig. 3. Allow the program to install

Fig. 4. Accept the license agreement in your device. Then a welcome screen by
ticking the checkbox. will appear, just click NEXT…
Fig. 5. Let the Enhanced Keyboard Fig. 6. Uncheck the checkboxes…NEXT,
remain unchecked
then NEXT….

Fig. 7. Let the shortcuts remain selected . . button.. Fig.8. Commence installation by clicking INSTALL
Click NEXT…..
Fig. 9. Installing software . . . .
Fig. 10. Press LICENSE button ..

Fig. 11. Go to the installation folder and open

the crack folder to see the license keys

Fig. 12. Copy the first license key and past it to the

textbox…press enter toexecute…. and click FINISH …


ACTIVITIES
Activity 1. Hands-on Activity
Let us try to uninstall the VMware Workstation 12 Pro. Follow these steps:
1. From the list of program, find the VMware Workstation Pro. Right Click
RMB and click UNINSTALL . . .
2. By clicking uninstall brings you to control panel. Find VMware Workstation
program, press RMB and click CHANGE. A welcome screen will appear,
then lick NEXT..

3. Choose the operation you want to perform. Choose CHANGE. Wait until
the program is uninstallation is finished.
4. Uncheck the textboxes… 5. Click REMOVE button . . . .

6. Wait for the process to remove the 7. Click FINISH . . . .


program…

8. Look for the default location of your Virtual Machine folder where vm is
saved. Delete the virtual machine folder completely IF THE FOLDER IS
STILL UNDELETED.

9. Restart your computer/laptop and do the installation all over again. Do


figures 1 to 12. Then try uninstalling procedures.

10. Answer the Self-Assessment Guide to assess yourself how far have you
gone through with our activity.
WRAP–UP
Directions: Complete the missing statement.

Virtualization on VMWare Workstation allows you to run multiple


operating systems at once on the same Windows or Linux PC. Virtualization
software gives you to have one or more PC in one, that is physical and the
others are virtual. Virtualization software, also called hypervisor is what allows
one computer or server to host multiple operating systems.

VALUING
As ICT/CSS student, what can you say about the use of VMware in these
trying times?

____________________________________________________________________________
____

____________________________________________________________________________
____

____________________________________________________________________________
____

_____________________________________________________________________________
___
_____________________________________________________________________________
POST TEST

Chronology.

Directions: Arrange the following steps in installing and uninstalling VMware


Workstation 12 Pro by writing the letters from A to E before each number.
Answer this activity in a separate worksheet provided to this module.

_______ 1. Execute the VMware application file (exe).

_______ 2. Wait for the process until to finish the installation.

_______ 3. Press the license button and enter license key from the crack folder
and paste it into the textbox, then press finish.

_______ 4. To uninstall the software, select vmware workstation from the list of
programs and select uninstall.

_______ 5. From the control panel, click RMB and click change. Wait until
uninstallation process is finished. Delete the default folder of virtual
machine completely.
LO 1: SET UP USER
Lesson 5 : Installing VMware NOS Virtualization.

EXPECTATION
After completing the lesson the learners should be able to:
A. understand the use of VMware in installing NOS as Virtual Machine;
B. demonstrate the process of installing and uninstalling NOS from the
VMware
C. give importance of installing NOS using VMware as ICT/CSS student

PRE–TEST
Directions: Read each statement below carefully. Write T if the statement is
correct and F if not in the space provided before each number.
_____1. You cannot shut your computer down without selecting one of the
options or typing comment from the shutdown event tracker.
_____2. Pressing Ctrl+G provides access to input directly inside the VM
_____3. After pressing Start button, then switch user, combo keys of
CTRL+ALT+DELETE will appear
_____4. You can log on two accounts (user and admin) at a time
_____5. By pressing Ctrl+Alt keys to return to your physical
machine.

RECAP
CHRONOLOGY
Directions: Arrange the following steps in installing and uninstalling VMware
Workstation 12 in chronological order from A to E.
_______ 1. Execute the VMware application file (exe).
_______ 2. To uninstall the software, select vmware workstation from the list of
programs and select uninstall.
_______ 3. From the control panel, click RMB and click change. Wait until
uninstallation process is finished. Delete the default folder of virtual machine
completely
_______ 4. Press the license button and enter license key from the crack folder
and paste it into the textbox, then press finish.
_______ 5. Wait for the process until to finish the installation.

LESSON

Installing Network Operating System (NOS) in a Virtual Machine

Introduction

In our previous discussion, virtualization software allows you to run two


or more operating systems using only one PC. So it’s like two (or more)
computers in one. One is physical, and the others are virtual.
A virtual network connects virtual machines and devices, no matter their
location, using software. In a physical network, layer 2 and 3 functions of the
OSI model happen within physical switches and routers. Plus, physical network
interface cards (NIC) and network adapters are used to connect computers and
servers to the network. Virtual networking shifts these and other activities to
software. A software application, called a virtual switch or vSwitch, controls and
directs communication between the existing physical network and virtual parts
of the network, like virtual machines. And a virtual network adapter allows
computers and VMs to connect to a network, including making it possible for
all the machines on a local area network (LAN) to connect to a larger network.
Illustration below shows a Network Operating System (NOS) installed in a
virtual machine (vm).
How to install Network Operating System (NOS) in a Virtual Machine (VM)?

The following are the steps in installing Network Operating System (NOS) in a
virtual machine:
NOTE: Always disconnect from the internet while using VMware.

Fig 1. Open your VMware and

click Create a New Virtual

Machine

Fig 2 . A welcome screen will appear. Select

TYPICAL as a type of configuration and click

NEXT…
Fig 3 . Select installerdisc image file

(iso) as guest operating system. Click

browse to locate your Network

Operating System in this case,

Window Server 2008 R2 iso file.


Fig. 4. Dropdown for the version of Windows Fig. 5. When ask for the product key,
Server 2008 R2 Standard.
tick the checkbox and click NEXT

Fig.6. Remember the default location of Fig 7. Specify the disk


capacity of its your virtual machine…..NEXT…
maximum disk size from 40.0 to 100.0 GB. Select store virtualdisk as a
singlefile..NEXT..

Fig 8. Click finish to start Create ng your virtual


machine.
Fig.9. Your NOS is starting to boot….

Fig.10.
Installing NOS..

Fig. 11. After finishing the installation process, you will


arrive in the user account.
ACTIVITIES

Activity 1. Hands-on Activity


Let us do the following steps : (NOTE : Remember to disconnect from the
internet)

1. From your user account, click


start button. from the dropdown
menu, select shutdown or press
ALT+ F4.

From the shutdown 2.


event tracker
dropdown menu,
select Operating
System ;
Reconfiguration
(planned).Then press
OK. Shutdown both
machines.

3. Open your VM by double clicking POWER ON THIS VIRTUAL MACHINE

4 . A VMware screen will


appear on the desktop . . . .
5. By doing such steps, should now be at your user account. These steps
are so important to remember when using your NOS on this Virtual
Machine.
6. To delete the NOS from the virtual machine, you need to shutdown the
VM properly. See step 1 and 2 in our hand-on activity to shutdown the VM.

7. While the virtual machine is shutted down, right click your machine
(Windows Server 2008 R2
Standard) and click
REMOVE.
8. A confirmation screen
will appear. Click
REMOVE.

9. Close your VMware Workstation 12.


Go to the default folder installation of
you vmware. Double click the folder
named “Virtual Machine”. Delete your
Windows Server 2008 R2 x 64, the
machine that you have created a while
ago.

NOTE: This step is intended for removing a particular machine. Otherwise, you
need to to delete the Virtual Machines folder if you want to delete the VMware,
then uninstall from programs as per previous discussion.
10. Repeat the above process from figures 1 to 11.
11. Uninstall the machine (see our hands on activity from 1 to 9.
12. Repeat all the processes of installing and uninstalling the machine (NOS).
13. On your worksheet, assess yourself based on the given scales from 1 to 5. 1
as the lowest and 5 as the highest. It is important to note that both
machines are shutted down properly to avoid corrupting the OS just like
your physical machine.
WRAP–UP
Direction: Complete the missing statement.

A virtual network connects virtual machines and devices, no matter their


location, using software. ISO is a type of disk image file that is commonly used
for virtualizing machine. The shutdown event tracker describes why you
shutdown the computer(virtual machine). You can only delete a particular
machine if the machine is shutted down.. By default, the created machine can
only be found inside the VMware “Virtual Machine” folder.

VALUING
As ICT/CSS student, what do you think is the advantage of installing NOS
using VMware ?

_____________________________________________________________________________
___

_____________________________________________________________________________
___

_____________________________________________________________________________
___

_____________________________________________________________________________
___

_____________________________________________________________________________
____

_____________________________________________________________________________
____

_____________________________________________________________________________
__
POST TEST
TRUE or FALSE
Directions: Read each statement below carefully. Write T if the statement is
correct and F if not in the space provided before each number.
_______ 1. You can remove the machine (virtual) even if it is currently use or
open.
_______ 2. Virtual networks connects the machine (virtual) and its devices.
_______ 3. Windows Server R2 web Edition is commonly used as CSS students.
_______ 4. Depends on the user and number of virtual machines, disk capacity
can be increased.
_______ 5. After finishing the NOS installation on VMware, you will arrive at your
user account
LO 1: SET UP USER ACCESS
Lesson 6 :
Accessing User and Administrator Accounts
in Server Operating System (NOS) Using VMware

EXPECTATION
After completing the lesson the learners should be able to:
A. understand user-admin switching accounts using
VMware;
B. demonstrate access on user and admin accounts
using VMware
C. give importance of using VMware as ICT/CSS student.

PRE–TEST

TRUE or FALSE
Directions: Read each statement below carefully. Write T if the
statement is correct and F if not in the space provided before each
number.
_____1. You cannot shut your computer down without selecting one of
the options or typing comment from the shutdown event
tracker.
_____2. Pressing Ctrl+G provides access to input directly inside the VM
_____3. After pressing Start button, then switch user, combo keys of
CTRL+ALT+DELETE will appear
_____4. You can log on two accounts (user and admin) at a time
_____5. By pressing Ctrl+Alt keys to return to your
physical machine.
RECAP
CHRONOLOGY
Directions: Arrange the following steps in installing and uninstalling
VMware Workstation 12 in chronological order from A to E after each
number.
_______ 1. Execute the VMware application file (exe).
_______ 2. To uninstall the software, select vmware workstation from the
list of programs and select uninstall.
_______ 3. From the control panel, click RMB and click change. Wait until
uninstallation process is finished. Delete the default folder of
virtual machine completely _______ 4. Press the license button and enter
license key from the crack folder and paste it into the textbox,
then press finish.
_______ 5. Wait for the process until to finish the installation.

LESSON
Accessing User and Administrator Accounts in Server Operating
System (NOS) Using VMware

Introduction

In our previous discussion, virtualization software allows you to run


two or more operating systems using only one PC. It uses virtualized
versions of traditional network tools, like switches and network adapters,
allowing for more efficient routing and easier network configuration
changes.
As of this time, it is expected that you have mastered the process of
installing and uninstalling the VMware Workstation 12 Pro as your
Virtual Machine software and installing and uninstalling Windows Server
2008 R2 Standard as your Network
Operating System or NOS. Those knowledge and skills stated above are
essentials to our training set for Setting Up Computer Servers virtually
so as to move forward and prepare yourself for TESDA National
Certification (NC II ).
So, for today’s lesson, we will discuss the process of accessing
accounts as we shift from user to administrator account and vice-versa.
Illustrations below are sample of user account and administrator account:
Fig. A. User Account Fig. B. Administrator
Account

Accessing User and Administrator Accounts in Server Operating System (NOS)


Using VMware

The following are the steps


in switching accounts from
user to administrator
accounts :

Fig. 1.From the User


account, press start button
and select Switch User.

Please take note that pressing Ctrl+G provides access to input


directly inside the VM otherwise, press Ctrl+Alt keys to return to
your physical machine.

Fig.2. Pressing
CTRL + ALT + DELETE
Fig 3. Security screen will
appear on your

display. pressing Esc will give you


access to administrator account.

Fig. 4. Click administrator account to


switch in..

Fig. 5. If this is your first time to access the administrator account, then
you are required to create
password. Click OK. Create
password and confirm. Click
arrow button to proceed.

Fig. 6. Remember to have at


least 8 characters including
special character and
numbers.
Example:Password :
@dmin123

If you have successfully created a password.. click OK . .

..
Fig.7. After successfully entering the correct password, it will now
leads you to the administrator account.
Fig.8. Now if after successfully log on the administrator account, and
happen to see the VMware tool installing, let it be installed as
shown below:

Fig. 9. Then try to go back to user account by clicking start button,


and from the dropdown list, select switch user.

As you can see,


both accounts are
currently logged in.
It is always impor-
tant know, who’s
account is logged
in.
ACTIVITIES

Activity 1. Hands-on Activity


Directions. On your laptop, try to do the following:

From the user account,


1.
try to shutdown the

machine by pressing

start button, dropdown

list and select shut

down or press ALT+ F4

Select shutdown from

the dropdown menu.

From the shutdown

event tracker

dropdown menu,

select Operating
2.
System ;

Reconfiguration

(planned).Then press

OK. What happened to

your VM?
Open your VM by double clicking POWER ON THIS VIRTUAL MACHINE

3. You are now in the user account right? Now, try to log off user
account and click the administrator account.
4. Try to reverse the process, this time, log off the admin account and
select user account, then shut down.
5. Power on the virtual machine. From the user account, switch user
and select admin account while the user account is logged on…
6. Shut down admin account. A warning screen will appear…just click
YES…
7. Do number 6 and 7, but this time, let the admin logged in and shut
down the user account. What’s the difference between logging off
and shutting down the accounts during switching?
8. Power on the virtual machine .Repeat the above procedures until
you master the pro cess of logging on and shutting down either
one at a time or both accounts.
9. On your worksheet, assess yourself based on the given scales from 1
to 5. 1 as the lowest and 5 as the highest.
It is important to note that both machines are shutted down properly to
avoid corrupting the OS just like your physical machine.

WRAP–UP
Directions: Complete the missing statement.

Switching accounts in Windows Server 2008 R2 Standard on a


Virtual Machine can give us access to log in and off and shut down the
machine. Logging off an account and switch to another account will not
affect the performance of the other virtual machines.
Shutting down an account while the other account is logged in can
shut down all the machines.

VALUING
What do you think is the significance of practicing switch users using
MVware ?

_____________________________________________________________________________

____________________________________________________________________________

_____________________________________________________________________________

_____________________________________________________________________________

_____________________________________________________________________________
POST TEST
Multiple choice
Directions: Read each statement below carefully. Write T if the
statement is correct and F if not in the space provided before each
number.
_______ 1. In VMware, pressing CTRL + G will bring you back to your
physical machine. _______ 2. You cannot shut your computer down
without selecting one of the options or typing comment from
the shutdown event tracker.
_______ 3. You can log on both accounts (admin and user accounts) at a
time.
_______ 4. Both accounts must be properly shutdown.
_______ 5. By pressing CTRL + G or move the pointer inside will give
access direct input to your VM.

ADDITIONAL CORE 3 ACTIVITIES


STEPS ON HOW TO CONFIGURE WINDOWS 2O12 SERVER
1. Install and Configure (Active Directory Domain and DNS):
➢ Disconnect the Power Chord from the ROUTER only
➢ Turn off the CLIENT PC
➢ Right click the LAN icon on the Server PC and click ‘Open Network and Sharing Center’
➢ Click 'Ethernet' then ‘Properties’
➢ Double click 'Internet Protocol Version 4 (TCP IPv4)
➢ Assign an IP address: 192.168.1.100
➢ Click ‘Subnet Mask’
Default Gateway: 192.168.1.143
Preferred DNS: 192.168.1.100 click 'OK’ then ‘Close’
➢ Click ‘Server Manager’ then click ‘Add roles and features’
➢ Click 'Next' - ‘Next’- ‘Next’
➢ Check ‘Active Directory Domain Services’
➢ Click ‘Add Features’ click ‘Next’-‘Next’
➢ Click ‘Install’ then click ‘Promote this server to a domain controller
➢ Select ‘Add a new forest’ and type zagmnhs.edu in ‘Root domain name’ box then click ‘Next’
➢ Password @dmin123 click ‘Next’- ‘Next’- ‘Next’
➢ Click 'Next’ then click ‘Install’
2. Install and Configure (DHCP):
➢ Click ‘Server Manager’ click ‘Add roles and features’
➢ Click 'Next' - ‘Next’- ‘Next’
➢ Check 'DHCP Server' click ‘Add Features’
➢ Click 'Next' - ‘Next’
➢ Click 'Install' Click ‘Complete DCHP Configuration’
➢ Click ‘Next’ then click ‘Commit’
➢ Click ‘Close’
➢ Click 'Server Manager’ Click ‘Tools’
➢ Click 'DHCP' then double click zagmnhs.edu
➢ Double click ‘IPv4’ then click ‘More Actions’
➢ Click ‘New Scope’ then click ‘Next’
➢ Type ‘Comp. Scope’ then click ‘Next’
➢ Fill-in the ff. inside the boxes
o Starting IP address: 192.168.1.101
o Ending IP address: 192.168.1.105
o Click ‘Next’
➢ Click 'Next' - ‘Next’- ‘Next’
➢ Default gateway type-in the Router IP Address: 192.168.1.143 and click ‘Add’ then ‘Next’
➢ Click 'Next' - ‘Next’- ‘Next’ then click 'Finish’
➢ Restart server PC
➢ Open Server Manager, Click Tools then click DHCP. Look for the ‘Address Leases’ make sure that
there’s an IP released for the Client PC (Note: you must start/ power on client PC in order to have an IP)
3. Adding the Wired CLIENT PC:
➢ Power on the CLIENT PC and wait for the pop-up message to appear
➢ Click 'Public Network' then ‘Close’
➢ Click 'Start' and Right click 'Computer' then Click 'Properties'
➢ Click 'Change Settings'
➢ Click 'Domain' and type-in zagmnhs.edu
➢ Type-in ‘Administrator’ and password @dmin123 then click 'OK'
➢ Click 'Restart Now'
4. Drive Partitioning: (Server PC)
➢ Right click Start then click ‘Disk Management’
➢ Right click Drive C: at the bottom part the click ‘Shrink Volume’
➢ Drive C: 60% - D:40% then click ‘Shrink’
➢ Right click ‘Unallocated’ click ‘New Simple Volume’ then click ‘Next’ until ‘Finish’
➢ Don’t close until you will not see ‘New Volume’
5. Folder Redirection: (SERVER PC)
First Step
➢ Open the folder on the task Bar
➢ then Right Click Drive D: then click properties
➢ Change the ‘Security Settings’ of Drive D: remain these three accounts: Creator, System and
Administrators
➢ Open the ‘Drive’ then create a New Folder named ‘TESDA Redirection’
➢ Right click the folder and go to 'Properties'
➢ Under Sharing Tab click 'Advanced Sharing'
➢ Check 'Share this folder' and click 'Permissions'
➢ Remove ‘Everyone’ and click ‘Add’
➢ Type 'Do' then click ‘Check Names'
➢ Select 'Domain Users' then click 'OK'
➢ Check 'Full Control' and click 'OK'
➢ Highlight 'Network Path' right click and click 'Copy'
Second Step
➢ Click Server Manager – ‘Tools’ then Click 'Active Directory Users and Computers'
➢ Right click zagmnhs.edu point 'New' then click 'Organizational Unit'
➢ Type-in ‘TESDA Redirection’ then click 'OK'
➢ Right click ‘TESDA Redirection’ folder point 'New' then click 'User' type-in ‘Josh’
➢ Select ‘Password never expires’ and type-in the password click 'Next’ then click 'Finish'
➢ Right click ‘Josh’
➢ Click ‘Properties’ then click ‘Profile’ tab
➢ Click ‘Connect’ button then select Drive letter: Z
➢ Under To: box Paste the ‘Network Path’
➢ \\server name\folder name \%username% click ‘OK’
Create 2nd User or more:
➢ Right click ‘Josh’
➢ Click ‘Copy’ - Same process with ‘Josh’ only the name will be changed to ‘EJ’
Third Step
➢ Open the 'Group Policy Management'
➢ Expand the Domain three times and right click ‘TESDA Redirection’ folder then click 'Create a GPO in
this domain...
➢ Type-in ‘MY GPO’ then click 'OK'
➢ Right click ‘MY GPO’ then click 'Edit'
➢ Double click User Configuration, Policies, Windows Settings, Folder Redirection, then right click
'Documents' click 'Properties'
➢ On the 'Target' Tab Select 'Basic-Redirect everyone's folder...'
➢ Paste the ‘Network Path’ to 'Root Path'
➢ Click ‘Settings Tab'
➢ Uncheck ‘Grant the user exclusive rights to documents’
Click 'Ok’ Click 'Yes’

How to print using network printer


1. Turn on Power of the Printer

SERVER PC
2. Insert the printer cable to the server USB port
3. Click start menu then open control panel
4. Under HARDWARE, Click view device and printer
5. Highlight Epson L120 series then right click Epson L120
6. Select printer properties
7. Click sharing tab then check share this folder and list in the directory
8. Click apply then ok

CLIENT PC
9. Log in as first user
10. Click start menu
11. Under search type in \\ server name or
\\ server IP then enter
12. Double click Epson L120
13. Wait until it finish installing driver
14. Open document to print
15. Then print

HOW TO CONFIGURE REMOTE DESTOP


SERVICES
SERVER PC
1. Open server manager
2. Click Add Roles and features
3. Click next, next, next
4. Check Remote Desktop services then next, next, next
5. Check remote desktop session host then click add features then next
6. Check restart then yes then install.
Computer restart automatically
7. Open server manager
8. Wait until the add features wizard finishes installation, then restart server PC.
CLIENT PC
9. Log in as first/SECOND user
10. Click start
11. Open remote desktop connection
12. Type in SERVER NAME OR SERVER IP then click connect
13. Click use another account
14. Type in username: administrator
password: @dmin123
Click ok
GENERAL INSTRUCTIONS:
ANSWER ONLY THE FOLLOWING PER
MODULE/LESSON:
Valuing
Post Test
ASA ISULAT ANG ANSWER?
Adto isulat sa lain nga papel ang answer….
DILI SULATAN ANG MODULE

KANUS A E PASS ANG ANSWER?


KADA BERNES E PASS

POYDE DUNGANON OG PASS TANAN?


DILI POYDE….
E PASS JUD ANG ANSWER KADA BERNES ANG NA ASSIGN NGA
MODULE/LESSON OF THE WEEK

MODULE AND LESSON ASSIGNMENT:


Module 4 Lesson 1 for week 1
Module4 Lesson 2 for week 2
Module 4 Lesson 3 for week 3
Module4 Lesson 4 for week 4
ASSESSMENT 1 for week 5
Module 4 Lesson 5 for week 6
Module 4 Lesson 6 for week 7
ASSESSMENT 2 for week 8

You might also like