Peer To Peer Connection G12
Peer To Peer Connection G12
PEER to PEER
COMPUTER
SYSTEM SERVICING
1
Client/serverNetwork- a computer network in which one centralized, powerful
computer called server is a hub to which many less powerful personal compters or
workstations called clients are connected.
Coaxial cable- a type of wire that consists of a center wire surrounded by insulation
and then a grounded shield of braided wire which minimizes electrical interference.
Configuration- the way a system is set up. Configuration can refer to either
hardware or software, or the combination of both.
Cross-over- is a cable used to connect two network devices directly.
Direct X- a set of APIs developed by Microsoft that enables programmers to write
programs that access hardware features of a computer without knowing exactly what
hardware will be installed on the machine where the program eventually runs.
Fiber optic- is a technology that uses glass (or plastic) threads (fibers) to transmit
data. Fiber optics has several advantages over traditional metal communications
lines.
IP Address- is a number that is used to identify a device on the network.
IP config- is a command used to find out the IP address of a certain network.
Network- is a group of two or more computer systems linked together.
Peer-to-peer Network- a type of network in which each workstation has equivalent
capabilities and responsibilities.
Ping- a command prompt used to test the ability of the source computer to reach a
specified destination computer.
Protocol- is the special set of rules that end points in a telecommunication
connection use when they communicate.
Registry- is a database used by Windows operating system to store
configuration information.
RJ45- short for Registered Jack-45, it is an eight-wire connector used commonly to
connect computers onto a Local-Area Network (LAN).
Security- techniques for ensuring that data stored in a computer cannot be read or
compromised by any individuals without authorization
Straight-through- is used in local area network to connect a PC to a network hub
and router.
Subnet mask- is used to determine what subnet an IP address belongs to. An IP
address has two components, the network address and the host address.
Twisted pair- is a type of cable that consists of two independently insulated wires
twisted around one another.
2
Virus- is a program or piece of code that is loaded onto your computer without your
knowledge and runs against your wishes.
NETWORK
A network consists of two or more computers that are linked in order to
share resources (such as printers and CD-ROMs), exchange files, or allow
electronic communications. The computers on a network may be linked through
cables, telephone lines, radio waves, satellites, or infrared light beams.
There are three basic types of networks which includes the following:
4
computer into analog signals that can travel
across conventional phone lines. The modem
modulates the signal at the sending end and
demodulates at the receiving end
5
6. It is a device that connects a client computer, server, printer or
other component to your network.
7. A device filters data traffic at a network boundary.
8. It is a device that gathers the signals from devices that are connected
to it, and then regenerates a new copy of each signal.
9. It is a small, simple, inexpensive device that joins multiple
computers together.
10. Type of network that is confined to a relatively small area.
Computer Networks
Networks are collections of computers, software, and hardware that are all
connected to help their users work together. A network connects computers
by means of cabling systems, specialized software, and devices that manage
data traffic. A network enables users to share files and resources, such as
printers, as well as send messages electronically (e-mail) to each other.
The most common networks are Local Area Networks or LANs for short. A
LAN connects computers within a single geographical location, such as one office
building, office suite, or home. By contrast, Wide Area Networks (WANs)
span different cities or even countries, using phone lines or satellite links.
Network System Configuration
All networks go through roughly the same steps in terms of design,
rollout, configuration, and management.
Designing Your Network
Plan on the design phase to take anywhere from one to three working days,
depending on how much help you have ad how big your network is.
Here are the key tasks:
• Settle on a peer-to-peer network or a client/server network.
• Pick you network system software.
• Pick a network language.
• Figure out what hardware you need.
• Decide on what degree of information security you need.
• Choose software and hardware solutions to handle day-to-day
management chores.
6
• Install the server or servers if you’re setting up a client/server network. (If
you are setting up a peer-to-peer network, you typically don’t have to worry
about any dedicated servers.)
• Set up the workstation hardware.
• Plug in and cable the Network Interface Cards (NICs – these connect the
network to the LAN).
• Install the hub or hubs (if you are using twisted-pair cable).
• Install printers.
• Load up the server software (the NOS, or Network Operating System) if
your network is a client/server type.
• Install the workstation software.
• Install modem hardware for remote dial-up (if you want the users to be
able to dial into the network).
• Install the programs you want to run (application software).
Configuring Your Network
Network configuration means customizing the network for your own use.
• Creating network accounts for your users (names, passwords, and groups).
• Creating areas on shared disk drives for users to share data files.
• Creating areas on shared disk drives for users to share programs
(unless everyone runs programs from their own computer).
• Setting up print queues (the software that lets users share networked
printers).
• Installing network support on user workstations, so they can "talk" to
your network.
Managing Your Network
The work you do right after your LAN is up and running and configured can save
you huge amounts of time in the coming months.
• Mapping your network for easier management and troubleshooting.
• Setting up appropriate security measures to protect against accidental
and intentional harm.
• Tuning up your LAN so that you get the best possible speed from it.
• Creating company standards for adding hardware and software, so you don’t
have nagging compatibility problems later.
• Putting backup systems in place so that you have copies of data and
programs if your hardware fails.
• Installing some monitoring and diagnostic software so that you can check on
your
network’s health and get an early warning of impleading problems.
• Figuring out how you plan to handle troubleshooting – educating your LAN
7
administrator, setting up a support contract with a software vendor, and so on
Smooth Setup
One key advantage of a peer-to-peer network is that it’s easy to setup. With the
simplest sort of peer-to-peer network, you just use the built-in networking that
comes with your operating system (Windows 98, Windows XP, Windows
7, Windows 8 and so on) and you have very little software to set up – even less
if you have computers that have the operating system preinstalled, as most
computers do these days.
For Windows XP and Windows 7, the basic steps to setting up a peer-to-
peer network are as follows:
(Review for Cabling) UTP Cable
A UTP cable (category 5) is one of the most popular LAN cables. This
cable consists of 4 twisted pairs of metal wires (that means there are 8 wires in
the cable). Adding RJ45 connectors at both ends of the UTP cable it becomes a
LAN cable they usually use.
Preparation
You need a UTP Cable, Crimping Tool, RJ45, and Cutter
Making Cable
Follow the steps below.
1. Remove the outmost vinyl shield for 12mm at one end of the cable (we call
this side A-side).
8
2. Arrange the metal wires in parallel (refer the each section's wire
arrangement table). Don't remove the shield of each metal line.
3. Insert the metal wires into RJ45 connector on keeping the metal
wire
arrangement.
4. Set the RJ45 connector (with the cable) on the pliers, and squeeze it tightly.
5. Make the other side of the cable (we call this side B-side) in the same way.
6. After you made it, you don't need to take care of the direction of the cable.
(Any cable in this page is directionless --- that means you can set either end
of the cable to either device.)
How to see the wire arrangement
Take the UTP cable with your left hand and a RJ45 connector with your
right hand. Hold the RJ45 connector in the way you can see the contact metal
face of the
The tables below are for the case where the UTP cable consists of
green/green-white, orange/orange-white, blue/blue-white, brown/brown-white
twisted pairs.
9
1 orange-white orange-white
2 orange orange
3 green-white green-white
4 blue blue
5 blue-white blue-white
6 green green
7 brown-white brown-white
8 brown brown
2 orange green
3 green-white orange-white
4 blue blue
5 blue-white blue-white
6 green orange
7 brown-white brown-white
8 brown brown
10
To create a peer network, you must have the following component
• A network interface or Local Area Network (LAN) adapter for each computer. The same
manufacturer and model of network card is preferred.
• Cabling that is supported by the network cards.
• Windows servers or 7 drivers for the network cards.
• A common network protocol.
• A unique computer name
Internet Protocols
A protocol is a set of rules. A letter sent through the postal system
also uses protocols. Part of the protocol specifies where on the envelope the
delivery address needs to be written. If the delivery address is written in the
wrong place, the letter cannot be delivered. Internet protocol works in
a similar way. Internet protocols are sets of rules governing communication
within and between computers on a network. Protocol specifications
define the format of the messages to be exchanged.
Timing is crucial to network operation. Protocols require messages to
arrive within a certain amount of time so that computers do not wait
indefinitely for messages that may have been lost. Therefore, systems
maintain one or more times during transmission of data. Protocols also
initiate alternative actions if the network does not meet the timing rules. Many
protocols consist of a suite of other protocols that are stacked in
layers. These layers depend on the operation of the other layers in the
suite to
function properly.
The main functions of protocols are:
• Identifying errors
• Compressing the data
• Deciding how the data should be sent
• Addressing the data
• Deciding how to announce sent and received data
11
encounter other protocols as your experience in IT grows, but they are not
used as often as the common protocols described here:
• TCP/IP: The Transmission Control Protocol /Internet Protocol
(TCP/IP) suite of protocols has become the dominant standard for
internetworking. TCP/IP represents a set of public standards that
specify how packets of information are exchanged between
computers over one or more networks.
• IPX/SPX: Internetwork Packet Exchange/Sequenced Packet Exchange
is the protocol suite originally employed by Novell Corporation’s
network operating system, NetWare. It delivers functions similar to
those included in TCP/IP. Novell in its current releases supports the
TCP/IP suite. A large installed base of NetWare networks continues to
use IPX/SPX.
• NetBEUI: NetBIOS Extended User Interface is a protocol used
primarily on small Windows NT networks. NetBEUI cannot be routed or
used by routers to talk to each other on a large network. NetBEUI is
suitable for small peer-to-peer networks, involving a few computers
directly connected to each other. It can be used in conjunction with
another routable protocol such as TCP/IP. This gives the network
administrator the advantages of the high performance of NetBEUI
within the local network and the ability to communicate beyond the
LAN over TCP/IP.
IP Addressing
An IP address is a number that is used to identify a device on the
network. Each device on a network must have a unique IP address to
communicate with other network devices. Network devices are those
that move data across the network, including hubs, switches, and routers. On
a LAN, each host (device that sends or receives information on the
network) and network device must have an IP address within the same
network to be able to communicate with each other.
A person’s name and fingerprints usually do not change. They
provide a label or address for the person’s physical aspect—the body. A
person’s mailing address, on the other hand, relates to where the person
lives or picks up mail. This address can change. On a host, the Media
Access Control
13
(MAC) address is assigned to the host Network Interface Card (NIC) and is
known as the physical address. The physical address remains the same
regardless of where the host is placed on the network in the same way that
fingerprints remain with someone regardless of where he or she goes.
An IP address consists of a series of 32 binary bits (1s and 0s). It is
very difficult for humans to read a binary IP address. For this reason, the 32
bits are grouped into four 8-bit bytes called octets. An IP address, even in this
grouped format, is hard for humans to read, write, and remember. Therefore,
each octet is presented as its decimal value, separated by a decimal point or
period. This format is called dotted-decimal notation. When a host is
configured with an IP address, it is entered as a dotted-decimal number, such
as 192.168.1.5.
IP Classes Purpose
Class A Used for large networks, implemented by large companies and
some countries
Class B Used for medium-sized networks, implemented by universities
Class C Used for small networks, implemented by ISPs for customer
subscriptions
Class D Used for special use for multicasting
Class E Used for experimental testing
14
Subnet Mask
The subnet mask indicates the network portion of an IP address. Like
the IP address, the subnet mask is a dotted-decimal number. Usually all hosts
within a LAN use the same subnet mask. Table 3 shows default subnet
masks for usable IP addresses that are mapped to the first three classes of IP
addresses:
• 255.0.0.0: Class A, which indicates that the first octet of the IP address
is the network portion
• 255.255.0.0: Class B, which indicates that the first two octets of the IP
address are the network portion
• 255.255.255.0: Class C, which indicates that the first three octets
of the IP address are the network portion
15
Figure 51. Command Prompt Window
3) Type ipconfig and press enter. The figure below shows the IP configuration
window using the ipconfig command. The information from this window will be
useful because it shows the IP address, subnet mask and default gateway of
a network you are connected
to.
16
1. Open the Command Prompt or Terminal. Every operating system has
a command line interface that will allow you to run the Ping command.
The Ping command operates virtually and identically on all systems.
If using Windows, open the Command Prompt. Click the
Start button and enter "cmd" into the Search field. Windows 8
users can type "cmd" while on the Start screen. Press Enter
to launch the Command Prompt.
2. Type ping followed by an IP address or a website address then
press Enter key to execute the command. Here is a brief explanation
of commonly used ping commands:
o ping 127.0.0.1 (This is a "loopback ping" - your computer trying to
talk to itself. If the loopback step fails, it might be because the TCP
drivers are corrupted, the network adapter might not be working, or
another service is interfering with IP.)
o ping <IP address> (This will ping the IP address of a device like a
local computer, remote server or any client that receives an IP
address to verify that it is reachable and that you can communicate
with it properly.) Example: ping 192.168.1.1 (this is the default IP
address of NETGEAR routers)
o ping<website address> (This command will test for the Internet
connectivity and DNS functionality.) Example: ping
www.netgear.com, ping google.com
17
address, 10.1.1.86.) This also shows that the computer is online and it
has Internet access.
The second arrow shows that all of the sent packets are received
showing that there is 0% loss. This means that the connection is available
and stable.
The third arrow shows the average time it took to answer. "Average =
0ms" is the best possible result. This kind of result is usually received if
the device you tried to reach is within the same network.
Assigning a static IP Address
In a home network with several computers and devices, it is ideal to assign
each of them a specific address. This is for the purpose of avoiding
problems when you do troubleshooting which requires figuring out the IP
address of each of them. It is also a means to prevent address conflicts
between the devices. You can also manage them with ease if you have
assigned their own addresses.
Here are the procedures in assigning an IP Address on a windows base
computer system:
18
5. Click the Properties button. The Internet Protocol (TCP/IP) Properties
dialog box appear.
19
9. Type the address for the preferred DNS server. The address should be
obtained from your Internet Service Protocol. It is used to help your
computer find web pages and other addresses on the internet.
10. Type the address for the alternate DNS server.
The alternate Domain Name System (DNS) server’s IP address is
something that your ISP provides.
11. Click OK to confirm the settings.
12. Close all other open dialog boxes and windows.
21
Ping
The ping is a Command Prompt command used to test the ability of the source computer to
reach a specified destination computer. The ping command is usually used as a simple way to
verify that a computer can communicate over the network with another computer or network
device.
The ping command operates by sending Internet Control Message Protocol (ICMP) Echo
Request messages to the destination computer and waiting for a response. How many of
those responses are returned, and how long it takes for them to return, are the two major
pieces of information that the ping command provides.
Syntax Description
-t Using this option will ping the target until you force it to stop
using Ctrl-C.
-n count This option sets the number of ICMP Echo Request messages
to send. If you execute the ping command without this option,
four requests will be sent.
-l size Use this option to set the size, in bytes, of the echo request
packet from 32 to 65,527. The ping command will send a 32
byte echo request if you do not use the -l option.
-f Use this ping command option to prevent ICMP Echo Requests
from being fragmented by routers between you and the target.
The -f option is most often used to troubleshoot Path Maximum
Transmission Unit (PMTU) issues.
-i TTL This option sets the Time to Live (TTL) value, the maximum of
which is 255.
-v TOS This option allows you to set a Type of Service (TOS) value.
Beginning in Windows 7, this option no longer functions but still
exists for compatibility reasons.
22
-r count Use this ping command option to specify the number
of hops between the computer and the target computer or
device that you would like to be recorded and displayed. The
maximum value for count is 9 so use the tracert
command instead. If you are interested in viewing all hops
between two devices.
-s count Use this option to report the time, in Internet Timestamp
format, that each echo request is received and echo reply is
sent. The maximum value for count is 4 which means that only
23
Figure Step 3
Figure 58.
Pinging
24
count) is a number that usually starts at 255 and counts down by one
every time the message gets rerouted through an intermediary
computer.
ACTIVITY I. Protocols
Directions: In this worksheet, write the name of the protocol and the default
port(s) for each protocol definition in the table. Do this on your notebook.
Be prepared to discuss your answers in front of the class.
Protocol Definition Protocol Default
Port(s)
25
ACTIVITY II. Identifying IP
Address Classes
Directions: In this worksheet, your teacher will write several IP addresses
with their appropriate subnet masks. You will copy the IP address and Subnet
Mask. You will write which IP Address Class is appropriate in the IP Address
Class column in the chart below. An example has been provided for you.
Be prepared to discuss the IP Address Class you select.
IP Address Subnet Mask IP Address Class
10.0.0.0 255.0.0.0 A
Post-Test
Directions: Give the complete meaning of the following acronyms. Write your
answer in a separate sheet of paper.
1. UTP
2. STP
3. IP
4. TCP /IP
5. HTTP
6. FTP
7. SSH
8. IMAP
9. SMTP
10. DHCP
11. DNS
12. TTL
13. LAN
14. VPN
15. NIC
26