SETTING UP, DESIGN AND IMPLEMENTATION OF
A LOCAL AREA NETWORK- LAN
CASE STUDY: UGANDA TECHNICAL COLLEGE- KICHWAMBA.
BY
MWESIGWA JIMMY KIKOYO
BCS/4756/31/DU.
A GRADUATION PROECT REPORT
SUBMITTED TO THE SCHOOL OF COMPUTER STUDIES FOR APPROVAL
IN PARTIAL FULFILLMENT OF THE REQUIREMENTS OF THE A WARD OF
A BACHELLOR'S DEGREE IN COMPUTER SCIENCE OF
KAMPALA INTERNATIONAL UNIVERSITY.
JUNE2009
DECLARATION: I Mwesigwa Jimmy Kikoyo do hereby declare to the best of my knowledge that this is my
original Graduation Project Report and has never been submitted to any University or Higher
Institution of learning for the same case. It is the original work done and submitted by me to the
School of Computer Studies of Kampala International University for the award of a Bachelor's
Degree in Computer Science as a requirement by Kampala International University.
The information from other peoples' works has been fully and dully referenced and
acknowledged in the text of this book for better notes and bibliography .
. ~ W £;5 (tf\Jf\ ~I'm '(Y'I 'f /)._j t_<Q""f 0 Name . .... .. ........ . ..................... . .. .
Regno: .. .. f?.~ . .!. .<-H-: ~ ~./.~ /./ ~ Signature: .... ·~· . .. .. . ..... .
Date: .. f.?~~ .. b: ~ .. ~ ... ~'QP .. '3
School of Computer Studies:
Supervisor:
~~ ·~ Name: .1 . :7: ~· · }~-,;..:_.· .... . ... . . .. .
Signature: .. ~ . . .. ... . .... . .
Date: . .. 4'(~(~.1 . . . .
Dean:
Name: . .. ............ . ... . . . .. . .. .. . .. . .
Signature: .... . ... . ......... . ........ . .. .. .
Date: ... . . . ......... . .. . ....... .. .. . .. . .. .. .
11
ACKNOWLEDGEMENT
First and foremost, I thank God for enabling and being with me in life of study since the
first year to the last year because it was not easy with out Him.
I am greatly thankful to my parents, Mr. and Mrs. Patrick Bujara, who have seen me
tlu·ough the school life, and worked tirelessly through their prayers as parents to ensure
that I become a responsible and well educated person.
I am also very thankful to the management of Madhvani and group of Companies for the
support they gave me to complete my studies when I had failed to raise my tuition for a
year and a semester.
Great thanks also go to the Administration and Management of different organizations
like the Ministry of Information and Communications Teclmology (MoiCT), Action on
Disability and Development (ADD), Kamwenge District Local Government and
Karnwenge District Union of the Disabled (KADUDI) for allowing me catTy out my
Internship training with them for various times.
Finally, I extend my thanks to various people who assisted me in one way or the other
without getting tired of me to ensure that I am successful in my studies which led me to
acquiring my Bachelor's Degree in Computer Science.
ll1
DEDICATION
This report is dedicated to my parents Mr. and Mrs. Patrick Bujara whom I have been
wishing to see me succeed in life. This also goes to my Wife Jackie, Brothers and Sisters
-Francis, Gad, Prudence, Medias, Justine (In - Law) and Christine.
Specially, this is also dedicated to my Children Joel, Job and Jordan whom I wish and
pray to God to have the same like me.
May the Good Lord Bless You All!
IV
LIST OF ABBREVEATIONS RegNo:
MoiCT:
ADD:
TCP:
IP:
IT:
LAN:
WAN:
NIC:
RJ:
CLNS
CONS
NSAPs
NETs:
UTC
NOS
FDDI
CAD
CAM
MRI
CAT
GoS
VPis
ATM
RAM
CPU NIC DRCN HTTP FPT
Registration Number.
Ministry oflnformation and Communications Technology
Action on Disability and Development.
Transmission Control Protocol
Internet Protocol
Inf01mation Technology
Local Area Network
Wide Area Network
Network Interface Card
Registered Jack
Connectionless Network Service
Connection-Oriented Network Service
Network Service Access Points
Network Entity Titles
Uganda Technical College
Network Operating System
Fiber Data Distributed Interface
Electronic mail
Computer Aided Design
Computer Aided Manufacturing
Magnetic Response Imaging
Computerized Axial Tomography
Grade of Service
Virtual Path Identifiers
Asynchronous Transfer Model
Random Access Memory
Central Processing Unit Network Interface Card Design of Reliable Communication Network Hypertext Transfer Protocol File Transfer Protocol
v
LIST OF FIGURES Fig. I.
Fig.2.
Fig.3.
Fig.4.
Fig.5.
Fig 6.
Fig. 7.
Fig. 8.
Fig 9.
Fig. 10.
Figure 11:
Figure 12:
Figure 13:
Figure 14:
Figure 31:
Figure 15:
Figure. 16: Figure. 17:
Figure. 18:
Figure. 19:
Figure. 20:
The Organizational Structure ofUTC Kichwamba
A typical bus topology.
Star Topology.
Typical Ring Topology
Mesh Topology
Star Bus Topology
Star-Ring topology
Department Relational diagram
Unshielded Twisted Pair (UTP)
RJ-45 connector
Kichwamba with Hubs or Switches
Kichwamba (Bridge) with Multiple Server Farms
Kichwamba (Bridge) with a Router and Server Clusters
Wiring the Network
Computer to be connected on the Network.
Computer and Wireless Router connection
Network Setup Wizard to run the network Network Setup Wizard to checklist for creating a network.
Network Setup Wizard to confirm use of shared connection.
Network Setup Wizard to select a network connection method
Network Setup Wizard for other Internet Connection methods.
VI
Figure. 21:
Figure. 22:
Figure. 23:
Figure. 24:
Figure. 25:
Figure. 26:
Figure. 27:
Network Setup Wizard to describe and name the computer.
Network Setup Wizard for naming the network.
Network Setup Wizard for Resource sharing
Network Setup Wizard to indicate whether the computer is ready to network
settings.
Network Setup Wizard for configuring the computer for home or small office
networking.
Network Setup Wizard to run the network setup wizard.
Network Setup Wizard for selecting the drive to use in creating a network setup
drive.
Figure. 28: Network Setup Wizard showing the drive selected.
Figure. 29: Network Setup Wizard for running the wizard with the network setup disk.
Figure. 30: Network Setup Wizard for completing the network setup wizard.
Figure. 31: Network Setup Wizard showing the user what to do for the new setup to take
effect.
Figure. 32: Network Setup Wizard showing how to run the computer on this wizard.
Figure. 33: Network Setup Wizard for Reviewing the checklist for creating the network.
Figure. 34: Network Setup Wizard for other shared connection.
Figure. 35: Network Setup Wizard for naming and describing computers in case of shared
connection.
Figure. 36: Network Setup Wizard for naming the network to specify the workgroup.
Vll
Figure. 37: Network Setup Wizard for applying network settings.
Figure. 38: Network Setup Wizard to run the network setup disk
Figure. 39: Network Setup Wizard completing the setup wizard in case of shared
Figure. 40: Shows which computers are available aud/or which files or folders have been
shared
Figure. 41:
Figure. 42:
Figure. 43:
Figure. 43:
Fig. 44:
Fig. 45:
Fig. 46:
Fig. 47:
Fig 48:
Fig 49:
Fig 50:
Fig 51:
Fig 52:
Fig 53:
Fig 54:
Showing how to add a new hardware using the wizard
Add new hardware Wizard to select the type of hardware to install.
Showing the network adapters that match with the hardware selected.
Adding the TCP/IP Protocol Stack
Configuring the TCP/IP Protocol
Server Installation
Managing Your Server
Steps taken to configure a server
To set up a server to perform one or more specific roles.
Summery of Selections
The Active Directory Installation Wizard
The Active Directory Installation Wizard showing the operating system
compatibility.
The Active Directory Installation Wizard showing the Domain controller type
The Active Directory Installation Wizard for creating new domain.
The Active Directory Installation Wizard showing the full DNS name for new
domain.
viii
Fig 55:
Fig 56:
Fig 57:
Fig 58:
Fig 59:
objects.
Fig 60:
Fig 61:
selections.
Fig 62:
Directory
Fig 63:
Fig 64:
Fig 65:
Fig 66:
Fig. 67
The Active Directory Installation Wizard showing Domain NetBios Name for the
new domain.
The Active Directory Installation Wizard showing Active Directory information
storage.
The Active Directory Installation Wizard showing shared system volume
The Active Directory Installation Wizard showing DNS Registration Diagnostics.
The Active Directory Installation Wizard showing pennissions for user and group
The Active Directory Installation Wizard to create a password used to start the
server in "Restore Mode" ..
The Active Directory Installation Wizard displaying a summary of your
The Active Directory Installation Wizard for creating and configuring Active
The Active Directory Installation Wizard configuring the components.
The Active Directory Installation Wizard is completed.
The Active Directory Installation Wizard for restarting the computer for the
installation to take effect
Dialog box titled Configure Your Server showing successful installation of Active
Directory.
Regional and Language Setup Options dialog box
IX
Table of Contents
DECLARATION: ............................................................................................................... ii
ACKNOWLEDGEMENT ................................................................................................. iii
DEDICATION ................................................................................................................... iv
LIST OF ABBREVEATIONS ............................................................................................ v
LIST OF FIGURES ........................................................................................................... vi
Table of Contents ................................................................................................................ x
DEFINITION OF TERMS: ............................................................................................. xiii
CHAPTER ONE .................................................................................................................. !
GENERAL INTRODUCTION: .......................................................................................... !
BACKGROUND TO THE STUDY: ................................................................................... !
DEPARMENTS AND COURSES: ..................................................................................... 2
PROBLEM STATEMENT: ................................................................................................ .3
AIMS AND OBJECTIVES OF THE STUDY: .................................................................. .3
General Objectives: .......................................................................................................... 3
Specific Objectives: ........................................................................................................ .3
Organizational Structure: ................................................................................................. 5
CHAPTER TWO: .................................................................................... 5 JUSTIFICATION: ............................................................................................................... 5
LITERATURE REVIEW .................................................................................................... 7
INTRODUCTION: .............................................................................................................. 7
INFORMATION TECHNOLOGY: .................................................................................... 7
Role of Information Technology Today .......................................................................... 8
Objectives of IT Architecture: ......................................................................................... 9
CHAPTER THREE: .......................................................................................................... ! 0
RESEARCH METHODOLOGY: ..................................................................................... 10
VARIOUS TYPES OF NETWORICS: .............................................................................. !!
Standard Network Topologies: ...................................................................................... !!
X
Reasons for Networking: ............................................................................................... 18
Advantages of setting up and Installing a College Network .......................................... l9
Disadvantages off setting up and Installing a College Network .................................... 20
CHAPTER FOUR: ............................................................................................................ 21
NETWORK PLANNING AND DESIGN ......................................................................... 21
Department Relational Diagram .................................................................................... 22
NETWORK PLANNING METHODOLOGY .................................................................. 22
NETWORK FORECASTING: .......................................................................................... 24
The role of forecasting ................................................................................................... 24
NETWORK DIMENSIONING ......................................................................................... 24
TRAFFIC ENGINEERING ............................................................................................... 25
NETWORK SURVIVABILITY ....................................................................................... 26
NETWORK SERVERS ..................................................................................................... 26
Server Requirements: ..................................................................................................... 26
NETWORK DESIGN ESSENTIALS: .............................................................................. 27
NETWORK MEDIA: ........................................................................................................ 27
DIFFERENT TYPES OF CABLES: ................................................................................. 27
TWISTED PAIR CABLE: ................................................................................................ 28
Advantages .................................................................................................................... .29
Disadvantages ............................................................................................................... .30
NETWORK MONITORING AND TROUBLESHOOTING: .......................................... 30
OSI MODEL: ................................................................................................................... 30
NETWORK OPERATIONS AND MANAGEMENT ..................................................... .32
CHAPTER FIVE: ............................................................................................................. .34
NETWORK IMPLEMENTATION ................................................................................... 34
NETWORK IMPLEMENTATION .................................................................................. .34
NETWORK SECURITY ................................................................................................... 36
ATTRIBUTES OF A SECURE NETWORK ............................................................... .36
SECURITY MANAGEMENT ......................................................................................... .37
GUIDES ............................................................................................................................. 38
Xl
Choosing IP Addresses for Network Machines ............................................................. 38
Configuring TCP/IP on Windows NT ........................................................................... 38
Configuring TCP/IP on Windows 95 ............................................................................. 39
Testing the TCP/IP Connection .................................................................................... .40
Wiring the Network ...................................................................................................... .40
Connecting and setting up a Wireless Network - LAN ................................................ .41
Network Setup on First Computer ................................................................................ .43
Network Setup on Additional Computers ...................................................................... 5 I
Viewing Network Connections ...................................................................................... 56
Setting up a Win9x Local Area Network ....................................................................... 57
Adding Your Network Adapter. ..................................................................................... 58
Adding the TCP/IP Protocol Stack ................................................................................ 59
Configuring the TCP/IP Protocol ................................................................................... 60
Server Installation Necessary Hardware and Software .................................................. 61
Installing the Server Operating System ......................................................................... 64
Software Installations - Workstation Operating Systems .............................................. 78
Performing a New Installation of Windows XP ............................................................ 79
NETWORK MANAGEMENT ......................................................................................... 90
NETWORK MANAGEMENT WITH WINDOWS SERVER 2003 ................................ 91
The Microsoft Management Console ............................................................................. 94
REFERENCES: ................................................................................................................. 97
Xll
DEFINITION OF TERMS:
Bus topology: This connects each computer (nodes) to a single segment trunk called a
communication line by the help of communication medium called cable e.g. coaxial cables.
Computer: This is an electronic machine that takes in data and instructions (input), works with
the data (processing) and puts out information (output). It is also taken as a device that accepts
inf01mation (in the form of digitalized data) and manipulates it for some result based on a
program or sequence of instructions on how the data is to be processed.
Computet· science is the study and the science of the theoretical foundations of inf01mation and
computation and their implementation and application in computer systems.
Data Flow diagrams: Tools that depict the flow of data through the system and then work or
FDDI: Specifies a l 00-Mbps token-passing, dual-ring LAN using fiber-optic cable. FDDI is
frequently used as high-speed backbone technology because of its support for high bandwidth
and greater distances than copper.
Information Technology: This is the capability to electronically input, process, store, output,
transmit, and receive data and information, including text, graphics, sound, and video, as well as
the ability to control machines of all kinds electronically.
Local Area Network: This is a group of computers and other devices typically connected by a
cable.
Mesh network: This is a local area network (LAN) that employs one or two connection
arrangements.
Network: This is an interconnection of three or more communicating entities. It is also an
interconnection of usually passive electronic components that performs a specific function
(which is usually limited in scope).
Netwol'idng is the practice of linking two or more computing devices together for the purpose of
sharing data.
Network topology: The specific physical, i.e., real, or logical, i.e., virtual, arrangement of the
elements of a network.
xiii
Operating System: This is a computer software that manages the resources of the computer
system.
Personal Computer: Computers that can run easy to use programs like Ms Office.
Relationships: Representation of an event that links the entities or merely a logical affinity that
exists between the entities.
Ring network: This is a network topology in which each node connects to exactly two other
nodes, forming a circular pathway for signals.
Terminal: Any input I output device that uses a key board to input and a monitor to output.
processing by that system.
Workgroup: This is a group of computers connected with a networking hardware and software
that users can share resources e.g. files and databases
xiv
CHAPTER ONE
GENERAL INTRODUCTION: As the spectacular success UTC Kichwamba is likely to rely on a series of Information aud
Communication Technology services as they are widely known and acknowledged globally,
Success in particular shall be witnessed in deployment, Design aud Implementation of Local
Area Network- LAN that will globally expose the College resources and services leading to an
efficient and effective service delivery institution.
The project shall focus on setting up, designing aud implementing of a Local Area Network -
LAN for UTC Kichwamba in F01t P01tal where the survey was taken from following a study that
was made from the college by the designer with the help of various methods that are related to
data collection and analysis.
In the world of computers, aud according to Todd Lammle and Kevin Hales in their book of
CCNP Support, Study Guide; in particular, Networking is taken to be the practice of linking
two or more computing devices together for the purpose of sharing data. Networks are built with
a mix of computer hardware aud computer software. Also Williams Sawyer Hutchinson in his
book of Using Information Teclmology defines Networking as a sub-discipline of
telecommunications, Computer Science, information technology aud I or computer engineering.
Computet· science (or computing science) is the study aud the science of the theoretical
foundations of information and computation aud their implementation and application in
computer systems.
BACKGROUND TO THE STUDY: UTC - Kichwamba is a Govemment Aided Technical College found in Kabarole District. It is
located along Kabarole - Bundibudyo Road approximately 15 km from Fort Portal Town -
Kabarole District heading to Bundibudyo District. It was founded in 1979 as a Technical
Institute offering only Certificate Courses.
It lies at the foot hills of the Rwenzori Mountains at the borders of Kabarole and Bundibudyo
Districts along the Westem Rift valley. Since it was started, it had been headed by a number of
1
Principals and more than I 00,000 students have passed through the same college and are now
champions in exploring the world and doing some recommendable work out there.
Presently, it has over 700 students of which 5% are females and the rest are male students. The
college has both teaching and non teaching staff as the major beneficiaries.
DEPARMENTS AND COURSES: The College has various departments which house different courses which lead students getting
both ordinary and advanced diplomas and Certificates respectively at the end of their studies.
Department of Civil Engineering:
• Civil Engineering.
• Land Survey.
• Brick Laying and Concrete Practice.
• Carpentry and Joinery
Department of Electrical Engineering:
• Electrical Engineering
• Electrical Installation .
• Electronics
• Refrigeration
• Motor rewinding
Depa1·tment of Mechanical Engineering:
• Mechanical Engineering
• Agricultural Engineering.
• Motor Vehicle Technology.
• Agricultural Technology.
Computer Science and Information Technology
• Computer Engineering.
• Computer Science
• Software Engineering
• Computer Applications
2
So, the Networking aspect of the College shall help the administration of UTC in the purpose of
resource sharing in terms of information and peripherals. This will be done by connecting
different departments where each of the above mentioned courses lies for better service delivery.
PROBLEM STATEMENT: UTC Kichwamba like any other un networked enterprise most of the time used computers for
traditional activities like word processing of documents, traditional information storage which is
static in a sense that that data could only accessed at particular locations of storage. To access
ce1iain information, the college staff could move from office to office in search for the required
information which was time consuming; and in case that information was urgently needed, it
used to delay the services. This could have been reduced by peripheral/ device sharing but due
to lack of networking facilities, there was no peripheral I device sharing like printers, etc. This
led the college to spending much in buying various peripherals for different staffs in the same
location leading to financial crisis.
Therefore, the establishment of a LAN at the college to provide a Networked environment
helped a lot in curbing down most of the problems that are related to a non networked
environment.
AIMS AND OBJECTIVES OF THE STUDY:
General Objectives:
To have an efficient and effective management tool of the college's resources by establishing a
LAN for advanced related activities that shall be result oriented.
Specific Objectives:
• To Study the cun·ent Network connectivity of the college to find means of solving most
of the related problems:
The Researcher first studied the networking environment of the college under which the
activities of the college were being performed. Due to the fact that the college have no
networked environment, the college staff used to move from office to office in search for the
required information which was time consuming; and in case that information is urgently
3
needed, it used to delay the services, the researcher after finding out the problems related to
that, designed a network to solve such problems.
• To design a network that addresses the cun-ent connectivity related problems of the
college.
Under this, the researcher came out with plans and designs of how the environment of UTC
Kichwamba would look like after setting up the Local Area Network while solving problems
that are related to a non networked environment. These designs and plans were handed over
to the concerned staff for approval who later gave him a go ahead to implementing the plan.
This was done because it was one way to solve problems that related to data and information
sharing and storage in a non networked environment.
• To implement the designed network to ensure that it meets the users' needs.
The researcher implemented his designed network in phases by carrying out various activities
in relation to the set LAN. These activities included the following:
o Surveying of different sites, creating suitable Network designs, and Identifying and
setting up locations for network components. These covered the first phase took a
period of30 days.
o In the second Phase, the Researcher carried out other activities as pmi of
implementation to ensure that the LAN is in place. These included the following:
Installation of conduits I tunnels for ports, testing of all ports, replacement and repair
of faulty ports, and then repmiing about all the proceeding s in this phase. This took
3 7 days to reach to completion.
o The third phase consisted of activities like, Connection of all components together,
testing the connectivity of the components and then reporting on the proceedings of
the phase. This took 22 days before completion.
o In the last phase, the Resem·cher can·ied various activities and it took him 48 days to
complete. These activities includes: ISP Connection and testing, , LAN Testing, User
Training, Report on Phase Four, and then Launching the Network,
4
Organizational Structure:
This is the mostly hierarchical concept of subordination of the college's administrative bodies
that collaborate and contribute to serve one common purpose of making it the best learning
institution. This allows better and easy allocation of responsibilities and functions to different
depmtments of the college.
Board of
Chairman BOD
Accountants Accountants
Figure 1: Organizational Structure of Kichwamba
JUSTIFICATION: The LAN of UTC Kichwamba is in position to help the college's beneficiaries get the required
information and services effectively and efficiently hence uplifting the academic performance to
the required standards.
Most of the services include but not limited to the following:
• Data Sharing:
This permits groups of users to exchange information routinely and to route data from one
individual to another as work flow demands. Data sharing also usually means that master
copies of data files reside some place in special on another computer elsewhere on the
network and that users can access the master copy in order to do their work.
• Also in a networked environment, UTC Kichwamba shall be permitted to messages,
documents and other college files that have to circulate among users. This improves human
communication substantially. Here the emails shall be used as the most popular networked
applications because it makes individuals communicate between themselves easily and
5
effectively, which was a problem for the college before thinking of implementing a LAN for
the college.
• Peripheral I device sharing in the college shall let groups of users take the advantage of
peripherals e.g. printers, scanners, faxes etc attached to correctly to the network or generally
available.
• Proper and Secure filing systems for the college in that college files shall be kept and
backed up using the network.
6
CHAPTER TWO:
LITERATURE REVIEW
INTRODUCTION: This chapter focuses on the concept and magnitude of Local Area Networks as a component with
in the Information and Communications Technology Industry and computer science at large, the
structure and effects of Local Area Networks in relation to global and national perspective as it
addresses the challenges faced in designing a LAN in UTC - Kichwamba.
Therefore, Literature Review means becoming familiar with ones research topic. It gives an
insight by suggesting a research design for dealing with the research problem.
INFORMATION TECHNOLOGY: According to Williams Sawyer Hutchnison in his Using Information Technology; Information
Technology (IT) also known as Information and Communications Technology (ICT) is
concerned with the use of technology in managing and processing information, especially in
large organizations. In particular, IT deals with the use of electronic computers and computer
software to convert, store, protect, process, transmit, and retrieve information.
Information Technology is also taken as the study, design, development, implementation,
support or management of computer-based information systems, particularly software
applications and computer hardware (Jeffrey L. Whitten and Lonnie D. Bentley in Systems
Analysis and Design Methods).
Encompassing the computer and information systems industries, information technology is the
capability to electronically input, process, store, output, transmit, and receive data and
information, including text, graphics, sound, and video, as well as the ability to control machines
of all kinds electronically (defined by the Information Technology Association of America -
ITAA).
From the above definitions and statements therefore, Information Technology is taken to be the
means by which information is acquired, organized, stored, manipulated and transmitted
electronically.
7
Role oflnformation Technology Today
According to the information retrieved from the internet (outlined by www.answers.com),
Infmmation Technology in today's world has various roles in making this world a global village
in both sectors. These include the following:
• Computers in Business:
Computers are used in keeping and managing business and financial records. Most large
companies keep the employment records of all their workers in large databases that are
managed by computer programs. Similar programs and databases are used in such business
functions as billing customers; tracking payments received and payments to be made; and
tracking supplies needed and items produced, stored, shipped, and sold.
• Computers in Medicine:
Infmmation technology plays an important role in medicine. For example, a scanner takes a
series of pictures of the body by means of Computerized Axial Tomography (CAT) or
Magnetic Resonance Imaging (MRI). A computer then combines the pictures to produce
detailed three-dimensional images of the body's organs. In addition, the MRI produces
images that show changes in body chemistly and blood flow.
• Computers in Science and Engineering:
Using supercomputers, meteorologists predict future weather by using a combination of
observations of weather conditions from many sources, a mathematical representation of the
behavior of the atmosphere, and geographic data.
Computer-aided design and computer-aided manufacturing programs, often called
CAD/CAM, have led to improved products in many fields, especially where designs tend to
be very detailed. Computer programs make it possible for engineers to analyze designs of
complex structures such as power plants and space stations.
8
• Integrated Information Systems:
With today's sophisticated hardware, software, and communications technologies, it is often
difficult to classify a system as belonging uniquely to one specific application program.
Organizations increasingly are consolidating their information needs into a single, integrated
information system.
• Information Technology Architecture:
The IT Architecture is an organized set of consensus decisions on policies & principles,
services & common solutions, standards & guidelines as well as specific vendor products
used by IT providers both inside and outside the organization trying to integrate the use of
Information Technology within its operations.
Objectives of IT Architecture:
The IT Architecture is guided by the following objectives, which help make decisions for
establishing individual standards:
• Architectural decisions should serve the Organization's mission.
• The architecture serves heterogeneous environments.
• The greater the consensus achieved for individual architectural decisions, the greater the
benefit.
• The architecture should identity areas of stability without impeding essential innovation.
• Architectural decisions should describe the tangible results of conformance and non
conformance with the architecture.
• Architectural decisions should provide sufficient documentation to assess the compliance of
a specific implementation.
9
CHAPTER THREE:
RESEARCH METHODOLOGY: These are the techniques or methods the designer used to collect data to facilitate the design and
implementation of the Local Area network for UTC- Kichwamba.
In this case, the designer collected all the necessary infmmation using methods like observing all
the activities done and consulting various documents of UTC - Kichwamba. Other methods
included Questionnaires designed by the researcher and distributed for filling to the College staff
and students to enable him get the required information to support his research.
Project Area:
The report reflects what took place at UTC - Kichwamba from where the Case Study was done.
The College is located in Kabarole District approximately 15 km along Bundibudyo Road at the
footsteps ofRwenzori Mountains.
Project Population:
The Project only targets College Administration, Tutors I Lecturers, Departmental Heads,
Teaching and Non- teaching Staffs and Students' Information.
Procedure:
Accessing the college for research, information was through the designer being given
introductory letter from the Executive Director Industrial Training and Research. Copies of the
letter were distributed to all the above said personnel to prepare for the exercise.
Documentary Evidence:
Extraction of results was facilitated through consultations made through different documents e.g.
files, records, college manuals, admission forms, financial statements, etc.
Observations:
The project designer spent much of the time watching individuals working out certain activities
from different college departments taking one at a time. This was aimed at generating new
information stmctures and improve on the existing procedures with in the college. The designer
then observed and identified the work flow patterns within the college e.g. how documents move
from one office I department to the other.
Mel"its
• Cheap method.
• No interruption of work I activities and schedules.
10
• Provides enough access to various key departments since the designer was acting like a staff
member allowed document view of various activities and procedures with in the college.
Demerits:
• The method was time consuming for substantiating results.
• Respondents were not comfortable being watched while working.
VARIOUS TYPES OF NETWORKS: During the research, the researcher took much concern and focus on different types of networks
that any networked environment may be having for it to support and solve certain problems that
are network related. In reference to various authors of different books and retrieved information
fro the Internet, the Researcher came out with various definitions of the following types of
networks as: (http://www.en.wikipedia.org/wiki/networks, Networking Complete, 2"ct Edition,
etc).
• Local Area Network- LAN is a group of computers and other devices typically connected by a cable. It is contained in a company or department and located in a single geographical area, usually a building.
• Wide area network (WAN) that is usually a larger network that covers a large geographic area.
• Wireless LANs and WANs (WLAN & WW AN) are the wireless equivalent of the LAN
and WAN.
The Researcher went ahead and found out that a variety of different kinds of media, including
twisted-pair copper wire cable, coaxial cable, optical fiber, and various wireless technologies are
used to interconnect various networks components to allow communication between them. The
components can be separated by a few meters (e.g. via Bluetooth for wireless) or nearly
unlimited distances (e.g. via the interconnections of the Internet).
Standard Network Topologies:
According to John Swartz and Todd Lammle in their Study Guide of Cisco Certified Internetwork Expert for Routing and Switching exam 350-001, a Network Topology is defined as a specific physical and virtual arrangement of network components I elements.
II
Bus Topology
A bus topology connects each computer (nodes) to a single segment trunk called a
communication line by the help of communication medium called cable e.g. coaxial cables.
This is also called Linear Bus Topology which is the simplest and most common method for
connecting computers. It is simple but a single cable break can halt the entire network. All
components of the bus topology via a back bone, a single cable segment that (theoretically)
interconnects all the computers in a straight line.
Fig.2. A typical bus topology.
A bus topology connects each computer (nodes) to a single segment trunk (a communication
line, typically coax cable that is referred to as the 'bus'. The signal travels from one end of the
bus to the other. A terminator is required at each to absorb the signal so as it does not reflect
back across the bus. A media access method called CSMAIMA is used to handle the collision
that occur when two signals placed on the wire at the same time
Advantages:
• Failure of one of the station does not affect others.
• Good compromise over the other two topologies as it allows relatively high rate of data
transmission.
• Well suited for temporary networks that must be set up in a hurry.
• Easy to implement and extend.
12
Disadvantage:
• Require a network to detect when two nodes are transmitting at the same time.
• Does not cope well with heavy traffic rates
• Difficult to administer/troubleshoot.
• Limited cable length and number of stations.
• A cable brake can disable the entire network; no redundancy.
• Maintenance cost may be higher in the long mn.
• Performance degrades as additional computers are added.
Star Topology
A bus topology connects each computer (nodes) to a single segment trunk called a
communication line by the help of communication medium called cable e.g. coaxial cables In the
Star Topology there is a central connection point called the hub which is a computer hub or
sometimes just a switch. In a Star Network the best advantage is when there is a failure in cable
then only one computer might get affected and not the entire network.
In a Star Network the entire network is dependant on the hub so if the entire network is not
working then there could be a problem with the hub. This feature makes it easy to troubleshoot
by offering a single point for error connection ad at the same time the dependency is also very
high on that single point.
Fig.3. Star Topology.
13
Advantages
• A Star Network Topology is very easy to manage because of its simplicity in functionality.
• The problems can be easily located logically in a Star Topology and therefore is easy to
troubleshoot also.
• The Star Topology is very simple in format so it is very easy to expand on the Star Topology.
Disadvantages
• The Star Topology is fully dependant on the hub and the entire working of the network depends
on the hub or the switch.
• If there are many nodes and the cable is long then the network may slow down.
Since all the computers on the network have independent control of their networks and only
dependant on the central hub computer, the failures in transmission and other possible problems
in this area are less likely. Also if the hub is safe then every computer in the network is safe. This
type of network also offers more privacy than any other network.
If one computer fails in the network it does not affect any other computer in the network and the
tasks of this computer can be easily switched very to the next computer easily using the hub
controls. In a Star Network Topology it is possible to have all the impmtant data back ups on the
hub in a private folder and this way if the computer fails you can still use your data using the
next computer in the network and accessing the backup files on the hub.
Ring Topology:
A ring network is a network topology in which each node connects to exactly two other nodes,
forming a circular pathway for signals - a ring. Data travels from node to node, with each node
handling every packet.( www. wikipedia.org/wiki/network _topology)
Because a ring topology provides only one pathway between any two nodes, ring networks may
be disrupted by the failure of a single link. A node failure or cable break might isolate every
node attached to the ring. FDDI - Fiber Distributed Data Interface networks overcome this
vulnerability by sending data on a clockwise and a counterclockwise ring.
14
Fig.4. Typical Ring Topology
Advantages
• Very orderly network where every device has access to the token and the opportunity to
transmit
• Performs better than a star topology under heavy network load
• Can create much larger network using Token Ring
• Does not require network server to manage the connectivity between the computers
Disadvantages
• One malfi.mctioning workstation or bad port in the MAU can create problems for the entire
network
• Moves, adds and changes of devices can affect the network
• Network adapter cards and MAU's are much more expensive than Ethemet cards and hubs
• Much slower than an Ethemet network under normal load
Mesh Topology: A mesh network IS a local area network (LAN) that employs one or two connection
arrangements. In this network, all the nodes are connected to each other. Mesh network topology
therefore is one of the key network architectures in which devices are connected with many
redundant interconnections between network nodes such as routers and switches to enable the
activity of communication between nodes becomes simple and easy.
15
Fig.S. Mesh Topology
Star- Bus Topology
This is a combination of the bus and the Star Topology. it is implemented when a bus backbone
interconnects two or more hubs. The star configures firm minimizes any single computer failures
which affects the network.
Fig 6. Star Bus Topology
A Star Bus Topology suits best when the network is widely spread and vastly divided into many
branches. Like any other topologies, the Star Bus Topology has its advantages and
disadvantages. A Tree Network may not suit small networks and it may be a waste of cable to
use it for small networks. Tree Topology has some limitations and the configuration should suit
those limitations.
Benefits
• A Star Bus Topology is supported by many network vendors ad even hardware vendors.
• A point to point connection is possible with Star Bus Networks.
16
• All the computers have access to the larger and their immediate networks.
• Best topology for branched out networks.
Limitations
• In a Network Topology the length of the network depends on the type of cable that is
being used.
• The Star Bus Topology network is entirely dependant on the trunk which is the main
backbone of the network. If that has to fail then the entire network would fail.
• Since the Star Bus Topology network is big it is difficult to configure and can get
complicated after a certain point.
Star- Ring Topology:
In the Star-Ring topology, the computers are connected to a central component as in a star
network. These components, however, are wired to fmm a ring network.
Like the star-bus topology, if a single computer fails, it will not affect the rest of the network. By
using token passing, each computer in a star-ring topology has an equal chance of
communicating. This allows for greater network traffic between segments than in a star-bus
topology.
Fig. 7. Star-Ring topology
17
Reasons for Networking:
Basing on the need for networked environment, the setting, designing and implementation of a
LAN - Local Area Network at UTC Kichwamba uplift the standards of the college both
effectively and efficiently through having the following in place:
• Software Sharing:
The ability to share both a software application and the files it creates amongst all of your
computers is the primary reason for setting up a network. This does not only increase in
productivity, but an increase in the organization of their computer files as well. Opening files
on a computer across your office will be as simple if they were stored on your own machine.
• Printers and other peripheral sharing:
Sometimes the printer and other peripherals shall be connected together to increase the
capabilities of other devices in the networked environment. Instead of college staff moving
from office to office searching for certain peripherals, the networked environment shall make
this easy by sharing them. on a network.
• Internet Access.
Most of the employees in your office, including yourself, can increase their productivity with
access to the Internet. Using a technology such as Cable/DSL router combined with a
network allows multiple computers to share the same Internet account simultaneously.
Advantages of setting up and Installing a College Network
• Speed: Networks provide a very rapid method for sharing and transferring files. Without a
network, files are shared by copying them to floppy disks, then carrying or sending the disks
from one computer to another which is very time-consuming.
• Cost: Networkable versions of many popular software programs are available at considerable
savings when compared to buying individually licensed copies. Besides monetary savings,
sharing a program on a network allows for easier upgrading of the program.
• Security: Files and programs on a network can be designated as "copy inhibit," so that you
do not have to worry about illegal copying of programs. Also, passwords can be established
for specific directories to restrict access to authorized users.
18
• Centralized Software Management: One of the greatest benefits of installing a network at a
school I Institution like Kichwamba is the fact that all of the software can be loaded on one
computer (the file server). This eliminates that need to spend time and energy installing
updates and tracking files on independent computers throughout the building.
• Resource Sharing: Sharing resources is another area in which a network exceeds stand
alone computers. Most institutions can not afford peripherals like laser printers, fax
machines, modems, scanners, and CD-ROM players for each computer. However, if these or
similar peripherals are added to a network, they can be shal'ed by many users.
• Electronic Mail: The presence of a network provides the hardware necessary to install an e
mail system. E-mail aids in personal and professional communication for all school
personnel, and it facilitates the dissemination of general information to the entire school staff.
Electronic mail on a LAN can enable students to communicate with teachers and peers at
their own school. If the LAN is connected to the Internet, students can communicate with
others throughout the world.
• Flexible Access: School networks allow students to access their files from computers
throughout the college. Students can begin an assignment in their classroom, save part of it
on a public access area of the network, then go to the media center after school to finish their
work. Students can also work cooperatively through the network.
• Workgroup Computing: Workgroup software (such as Microsoft BackOffice) allows many
users to work on a document or project concurrently.
Disadvantages off setting up and Installing a College Network
• Expensive to Install. Although a network will generally save money over time, the initial
costs of installation can be prohibitive. Cables, network cards, and software are expensive,
and the installation may require the services of a technician.
• Requires Administrative Time. Proper maintenance of a network requires considerable
time and expertise. Many enterprises have installed a network, only to find that they did not
budget for the necessary administrative support.
19
• File Server May Fail. Although a file server is no more susceptible to failure than any other
computer, when the files server "goes down," the entire network may come to a halt. When
this happens, the entire college may lose access to necessary programs and files.
• Cables May Break. Some of the configurations are designed to minimize the inconvenience
of a broken cable; with other configurations, one broken cable can stop the entire network.
NETWORK OPERATING SYSTEM:
For any communication within a Network to happen, the Researcher decided to have an
Operating system to support such communication of computers over a network. A network
operating system (NOS) is a computer operating system that is designed primarily to support
workstation, personal computer, and, in some instances, older tetminal that are connected on a
local area network (LAN). A network operating system provides printer sharing, common file
system and database sharing, application sharing, and the ability to manage a network name
directory, security, and other housekeeping aspects of a network.
20
CHAPTER FOUR:
NETWORK PLANNING AND DESIGN The researcher used different applications and techniques in designing the network. Some of the applications used include Ms Access for drawing relational diagrams to show how different departments from different buildings at the college shall be connected to support an interactive environment, Ms Office Project for drawing a work plan to show the period the work was to be finished.
During planning of the Network and how different departments should be connected to facilitate communication, the researcher used Relational Diagrams to explain them.
Various departments included:
Department of Civil Engineering:
• Civil Engineering.
• Land Survey.
• Brick Laying and Concrete Practice.
• Carpentry and Joinery
Department of Electrical Engineering:
• Electrical Engineering
• Electrical Installation .
• Electronics
• Refrigeration
• Motor rewinding
Department of Mechanical Engineering:
• Mechanical Engineering
• Agricultural Engineering.
• Motor Vehicle Technology.
• Agricultural Technology.
Computer Science and Information Technology
• Computer Engineering.
• Computer Science
• Software Engineering
• Computer Applications
21
Department Relational Diagram
Civil Engineering
Electrical Engineering
Fig. 8. Department Relational diagram
Mechanical Engineering
Relates to
Computer Science and IT
Network planning and design is an iterative process, encompassing topological design,
network-synthesis, and network-realization, and is aimed at ensuring that a new network or
service meets the needs of the subscriber and operator. 111 The process can be tailored according
to each new network or service. This is an extremely important process which must be performed
before the establishment of a new telecommunications network or service.
NETWORK PLANNING METHODOLOGY
Planning being the most essential in every activity, the Researcher drew plans of how the
network should operate to ensure that the network meets the required standards and.
Traditionally, network planning methodology involves
• Long-term and medium-term network planning where results I out comes should be
experienced either tlu·ough a long or medium term basis.
• Short-term network planning: this is where the researched was thinking of in case the
network could last for s very short time and needs readjustments due to un avoidable
circumstances.
22
• Operations and maintenance: This is where the researcher focused on the full operation of the
network after fully trouble shoot and maintained. Here the end users are able to us the
network for information and peripheral sharing i.e. operation of the network on a daily basis.
The network planning process begins with the acquisition of external information. This includes:
• forecasts of how the new network/service will operate;
• the economic information concerning costs;
• The technical details of the network's capabilities.
It should be considered that planning a new network/service involves implementing the new
system across the first four layers of the OS! Reference Model. This means that even before the
network planning process begins, choices must be made, involving protocols and transmission
technologies.
Once the initial decisions have been made, the network planning process involves three main
steps:
• Topological design: This stage involves determining where to place the components and
how to connect them. The (topological) optimization methods that can be used in this stage
come from an area of mathematics called Graph Theory. These methods involve detetmining
the costs of transmission and the cost of switching, and thereby determining the optimum
connection matrix and location of switches and concentrators.
• Network-synthesis: This stage involves determining the size of the components used,
subject to performance criteria such as the Grade of Service (GoS). The method used is
known as "Nonlinear Optimization", and involves detetmining the topology, required GoS,
cost of transmission, etc., and using this information to calculate a routing plan, and the size
of the components.
• Network realization: This stage involves determining how to meet capacity requirements,
and ensure reliability within the network. The method used is known as "Multicommodity
23
Flow Optimization", and involves determining all information relating to demand, costs and
reliability, and then using this information to calculate an actual physical circuit plan.
These steps are inte!Telated and are therefore performed iteratively, and in parallel with one
another. The planning process is highly complex, meaning that at each iteration, an analyst must
increase his plarming horizons, and in so doing, he must generate plans for the various layers
outlined above.
NETWORK FORECASTING:
In order to eliminate Network Traffic, the Researcher also put into considerations the estimation
of the expected traffic intensity and thus the traffic load that the network must support. In case a
similar network exists, the researcher put up measures to take traffic measurements of such a
network and use that data to calculate the exact traffic load which is likely to happen in most
instances when a similar network is not found.
The role of forecasting
The forecasting process involves several steps as follows:
• Definition of problem;
• Data acquisition;
• Choice of forecasting method;
• Analysis I Forecasting;
• Documentation and analysis of results.
NETWORK DIMENSIONING
In addition to forecasting, the Researcher also focused on Network Dimensioning. The purpose
of dimensioning a new network I service is to determine the minimum capacity requirements that
will still allow the Teletraffic Grade of Service (GaS) requirements to be met. Here the
Researcher decided to plan for peak-hour traffic, i.e. that hour during the day during which
traffic intensity is at its peak so as to meet the users' needs.
24
The dimensioning process involves determining the network's topology, routing plan, traffic
matrix, and GoS requirements, and using this information to determine the maximum call
handling capacity of the switches, and the maximum number of channels required between the
switches. This process requires a complex model that simulates the behavior of the network
equipment and routing protocols.
A dimensioning rule is that the Researcher must ensure that the traffic load should never
approach a load of I 00 percent. To calculate the correct dimensioning to comply with the above
rule, the researcher must take on-going measurements of the network's traffic, and continuously
maintain and upgrade resources to meet the changing requirements. Another reason for "over
provisioning" is to make sure that traffic can be rerouted in case a failure occurs in the network.
TRAFFIC ENGINEERING
Comparing to network engineering which adds resource, such as link, router, switch into the
network, traffic engineering targets to change traffic path on the existing network to alleviate
traffic congestion or accommodate more traffic demand, the researcher also put into
consideration Traffic Engineering as a necessity while planning and implementation of a LAN of
UTC Kichwamba.
This technology is critical when the cost of expanding network expansion is prohibitively high
and network load is not optimally balanced. The available technologies for traffic engineering
include MPLS and ATM for current Internet backbone. For example, MPLS allows catTiers to
provision LSPs with dynamic or explicit routes. The dynamic route is controlled by CSPF while
the explicit routes are optimized in an offline tool or through a Path Computation Element which
is under study by IETF. End-to-end protection is an alternative resilient approach. It provides a
backup route for each primary route. Preplanning enough bandwidth for these backup routes is
one of the active topics for survivable network design.
25
NETWORK SURVIVABILITY
In addition to the above planning methodologies, the Researcher focused on how the planned
network should last longer and meet users' requirements. He termed this as Network
Survivability.
This is a situation where the network maintains maximum network connectivity and quality of
service under failure conditions. As one of the critical requirements in network planning and
design, It involves design requirements on topology, protocol, bandwidth allocation, etc ..
Topology requirement can be maintaining a minimum two-connected network against any failure
of a single link or node. Protocol requirements include using dynamic routing protocol to reroute
traffic against network dynamics during the transition of network dimensioning or equipment
failures. Bandwidth allocation requirements pro-actively allocate extra bandwidth to avoid traffic
loss under failure conditions.
NETWORK SERVERS. Fro any network to stand and operate under any condition, there has to be a communication
driver facilitating it. This the Researcher termed it as a Network Server.
A network server therefore is a computer designed to process requests and deliver data to other
computers I clients with a specialized operating system over a local network or the Internet.
Examples of network servers include Web servers, proxy servers, and FTP servers.
Set-ver Requirements:
Wherever a machine functions as a server on a server based or peer to peer network, handling
service requests across a network invariably adds to a machine's processing load. The higher the
load, the more important it is to purchase computers with additional power to handle demands
for network resources.
Considering the above Network Planning Methodologies to ensure hat the LAN in UTC
Kichwamba operates to the maximum and meets the users' requirements, it shall have the servers
with the following specifications as listed in the table below.
26
Item Windows NT Server Windows 2000 Server
RAM 16(128 +)MB 128(256+)MB
Disk type EIDE (SCSI) EIDE(SCSI)
Disk space 124 (2000) MB 1000 (3000)MB
CPU types 80486 + (Pentium +) Pentium (Pentium II +)
CPU Count 1(2or4) 1 (2 or 4)
NIC Type EISA (PCI) PCI
NETWORK DESIGN ESSENTIALS:
Network Based Design plays an integral part in its operation and performance. The topology of a
network dictates the media used the type of channel access and the speed at which the network
operates.
Network Topology: This is a physical layout of the network. It refers not only to the physical
layout of its computers, cables and other resources, but also how those components communicate
with each other. The network topology has significant effect on its perfmmance as well as
growth potential of a network.
NETWORK MEDIA: Network media is the actual path over which an electrical signal travels as it moves from one
component to another (Networking Essentials Plus; Academic Learning Series; 3'd Edition).
Most networks today use cables to interconnect various devices employing signaling techniques,
network cables transfer signals between computers, allowing them to communicate with each
other.
There are different kinds to be used to build networks each with its own distinguishing set of
signal - carrying characteristics.
Not all computers or networked devices attach to networks by cables; a growing portion of the
networking population uses wireless technologies, either because physical obstructions or
distance limitations make cable unsuitable or because users are mobile.
27
DIFFERENT TYPES OF CABLES: A Cable is the medium through which information usually moves from one network device to
another. There are several types of cable which are commonly used with LANs. In some cases, a
network will utilize only one type of cable, other networks will use a variety of cable types. The
type of cable chosen for a network is related to the network's topology, protocol, and size.
Understanding the characteristics of different types of cable and how they relate to other aspects
of a network is necessary for the development of a successful network.
TWISTED PAIR CABLE: This is a form of wiring in which two conductors (two halves of a single circuit) are wound
together for the purposes of canceling out electromagnetic interference (EM!) from external
sources; for instance, electromagnetic radiation from unshielded twisted pair (UTP) cables,
and crosstalk between neighboring pairs.
Twisting wires decreases interference because the loop area between the wires (which
determines the magnetic coupling into the signal) is reduced. In balanced pair operation, the
two wires typically carry equal and opposite signals (differential mode) which are combined
by addition at the destination. The twist rate (also called pitch of the twist, usually defined in
twists per meter) makes up part of the specification for a given type of cable. Where pairs are
not twisted, one member of the pair may be closer to the source than the other, and thus
exposed to slightly different induced electromotive force (EMF).
In planning for the network, the researcher also considered the connectivity of the network
components to by use of twisted pair cables due to that fact that they have the following
advantages.
• Cancels out I prevents electromagnetic interference (EM!) from external sources
• Has less or no crosstalk experienced in the network during device communication.
28
Fig 9. Unshielded Twisted Pail· (UTP)
Unshielded Twisted Pair Connector
The standard connector for unshielded twisted pair cabling is an RJ-45 connector. This is a
plastic connector that looks like a large telephone-style connector. A slot allows the RJ-45 to be
inserted only one way. RJ stands for Registered Jack, implying that the connector follows a
standard borrowed from the telephone industry. This standard designates which wire goes with
each pin inside the connector.
Fig. 10. RJ-45 connector
STP cabling, also known as Screened Fully shielded Twisted Pair (S/FTP), is both individually
shielded (like STP cabling) and also has an outer metal shielding covering the entire group of
shielded copper pairs (like S/UTP). This type of cabling offers the best protection from
interference from external sources, and also eliminates alien crosstalk.
Advantages
• It is a thin, flexible cable that is easy to string between walls.
• Because UTP is small, it does not quickly fill up wiring ducts.
• UTP costs less per foot than any other type of LAN cable.
29
Disadvantages
• Twisted pair's susceptibility to electromagnetic interference greatly depends on the pair
twisting schemes (usually patented by the manufacturers) staying intact during the
installation. As a result, twisted pair cables usually have stringent requirements for
maximum pulling tension as well as minimum bend radius. This relative fragility of
twisted pair cables makes the installation practices an important part of ensuring the
cable's performance.
Therefore, the Researcher in setting up the LAN decided to use the UTP cable and RJ 45
Connectors because they are easy to use both in terms of cost and availability in the today's
market.
NETWORK MONITORING AND TROUBLESHOOTING:
For easy monitoring and troubleshooting of the network, the Researcher set up methods one
should use to ensure that the network is well monitored for proper operation and in case of any
problem, also measures were set to carryout a Troubleshooting exercise.
OSIMODEL:
This is a seven layered model set by the Researcher to help him identify which layer to deal with
during either monitoring or troubleshooting the Network ofUTC Kichwamba.
~o Application Layer
iD Presentation Layer
J[]l Session Layer
l[]ITransport Layer
30
II
I!
iC~JINetwork Layer I!
~=====2~~D==m=a=L=ink===L=ay=e=r========~l,
• •
LLC sub layer MAC sub layer
11
1 llf=P=h=y=si=ca=I=L=a=y=er=====,= ___ = __ =--==_ =ij 'I
Table 2: OSI Reference Model
The Open Systems Interconnection Basic Reference Model (OSI Reference Model or OSI
Model) is an abstract description for layered communications and computer network protocol
design. In its most basic form, it divides network architecture into seven layers which, from top
to bottom, are the Application, Presentation, Session, Transport, Network, Data-Link, and
Physical Layers. It is therefore often refened to as the OSI Seven Layer Model.
A layer is a collection of conceptually similar functions that provide services to the layer above
it and receives service from the layer below it. For example, a layer that provides error-free
communications across a network provides the path needed by applications above it, while it
calls the next lower layer to send and receive packets that make up the contents of the path.
In order to understand fully what each layer is composed of and where to tackle during the
exercise of troubleshooting and monitoring, the researcher decided to table up these layers
explaining briefly functions of each. This shall help whoever wants to do the troubleshooting and
monitoring of the Network ofKichwamba.
31
Table 3: Description of each OSI layers.
·osr Model
'Host layers
·Data unit
r- -~ -- -~H"·---~- ~
i Segment I Datagram ' I
!Packet
1 Media layers I Frame
Bit
,Layer Function
i 7. Application !Network process to application
6. Presentation Data representation and encryption i
· 5. Session 'Inter-host communication
End-to-end connections and reliability
:3. Network Path determination and logical addressing
2. Data Link Physical addressing (MAC & LLC)
, I. Physical , Media, signal and binary transmission
NETWORK OPERATIONS AND MANAGEMENT.
In Network Management and operations, the researcher put more emphasis on how Control
should be passed from one layer to the next, starting at the application layer in one station, and
proceeding to the bottom layer, over the channel to the next station and back up the hierarchy.
To manage the network properly leading to satisfactory operation of the network, the researcher
identified the major significant architectural entities found in the OSI supported network for easy
management and operation. In this, the researcher should deal with one at a time hence proper
network management.
The architectural entities focused on in an OSI network include hosts, areas, a backbone, and a
domain. A domain is any portion of an OSI network that is under common administrative
authority. Within any OSI domain, one or more areas can be defined. An area is a logical entity
formed by a set of contiguous routers and the data links that connect them. All routers in the
32
same area exchange information about all of the hosts that they can reach. The areas are
connected to form a backbone. All routers on the backbone know how to reach all areas. The
te1m end system (ES) refers to any non routing host or node; intermediate system (IS) refers to a
router.
Therefore, the above architectural entities were set to help the researcher which network
component and part of the network infrastructure to deal with while monitoring, troubleshooting
and even during management of the Kichwamba network.
33
CHAPTER FIVE:
NETWORK IMPLEMENTATION
This involves several of the configuration options that the researcher used to implement the UTC
Kichwamba LAN. The Implementation exercise focuses on each of the network components,
their connectivity and operations. This is done to prove whether there is direct communication
between them and the server.
In addition to connectivity, the researcher also focused on how the Kichwamba Bridge
communicates with various servers to enable packet movements through different network
components. In doing this the work of network implementation should be seen as to as simple as
possible.
NETWORK IMPLEMENTATION
UTC Kichwamba uses directed or dispatch mode to appear to the client as if they are
communicating directly with a real server. If the client and server are on the same network
segment, the response from the server bypasses Kichwamba Bridge, and the traffic will not be
load balanced. All traffic must pass through the Bridge and be directed to the real servers.
Kichwamba Bridge serves as a transparent leaming bridge to forward data packets between its
interfaces. Because of its bridge capability, the Bridge must not be installed on the network
parallel to another bridge. Only use Kichwamba Bridge to connect to servers allowing a single
way in or out to the network through Kichwamba Bridge.
The connectivity of the LAN Components the researcher used Hubs or Switches to connect two
or more components together for example in one department. These facilitate easy
communication of these components with in a network.
If there is another path from the network to your servers, a bridge loop is created and
Kichwamba Bridge does not work properly. Kichwamba Bridge automatically detects a bridge
loop and tries to recover. SYSLOG messages are generated to indicate there is a bridge loop, and
virtual and real servers have intermittent failures.
34
If the real servers have two single-attached interfaces (for example, they are dual-homed), make
sure that load-balanced traffic cannot bypass Kichwamba Bridge. Kichwamba Bridge must be
between the real servers and the Internet cloud that contains the clients. It must see all the
packets coming from the clients to the virtual server and all the traffic that comes back m
response to the client-to-virtual packets.
In addition, packets fi·om the clients must come in on one interface and go out to the real servers
on a different interface. If these rules are not followed, Kichwamba Bridge cannot perform load
balancing.
Figure 11: Kichwamba with Hubs or Switches
r,_,~~~----,"-.
( C:I>Brrts ~-·--~.,.,_ __ __.
Segment I
Bridge
Segment 2
While connecting multiple departments, the researcher also used the same method of using the
hub I switch to ensure that these departments are well connected and facilitate proper
communication of all the network components in these departments.
Figure 12: Kichwamba (Bridge) with Multiple Serve1· Farms
Segment I
Bridge
Segment 2
Segment 3
S'.!tver 2
S.arvnr 4
35
Figure 13: Kichwamba (Bridge) with a Router and Server Clusters
NETWORK SECURITY
Dept Hub I Switch
Dept Hub I Switch
Server 1
Server 2
Serter4
Sert.er S
Here the researcher put up the preventive measures attempt to secure the access to individual
computers in the Kichwamba network thereby protecting the computers and other shared
resources such as printers, network-attached storage connected by the network. Network
security therefore consists of the provisions made in an underlying computer network
infrastructure, policies adopted by the network administrator to protect the network and the
network -accessible resources from unauthorized access and consistent and continuous
monitoring and measurement of its effectiveness (or lack) combined together.
ATTRIBUTES OF A SECURE NETWORK
Network security stmis from authenticating any user, most likely a username and a password.
Once authenticated, the researcher configured a stateful firewall to enforce access policies such
as what services are allowed to be accessed by the network users.
In case of fail me to prevent unauthorized access, and the components fail to check potentially
harmful contents such as computer worms being transmitted over the network, the researcher put
up An Intrusion P1·evention System (IPS) to help detect and prevent harmful contents. IPS also
monitors for suspicious network traffic for contents, volume and anomalies to protect the
36
network of Kichwamba from attacks such as denial of service. Communication between two
hosts using the network could be encrypted to maintain privacy. Individual events occurring on
the network could be tracked for audit purposes and for a later high level analysis.
SECURITY MANAGEMENT
Security Management for networks is different for all kinds of situations. UTC Kichwamba for
this matter as requirement needed basic security for high maintenance and advanced software
and hardware to prevent malicious attacks from hacking and spamming. The following are the
requirements needed for the college to have a secure network.
• An adjustable firewall and proxy to allow authorized users access from the outside and
inside.
• Strong Antivirus software and Internet Security Software packages.
• Students' Internet Protection Act compliance.
• Supervision of network to guarantee updates and changes based on popular site usage.
• Constant supervision by College ICT Department and administrators to guarantee protection
against attacks by both internet and sneaker net sources.
To enhance effective implementation of the LAN at UTC Kichwamba, the researcher
decided to use the Networking Guides to help in the networking process as they play a big
role in the exercise.
The Networking guides indicate what the Researcher did while implementing the network
especially during installation and configuration of the network ofUTC Kichwamba.
The screen shots in the guides are some of the wizards followed since the procedures are easy
to use and follow in the sense that the computer tells the network administrator what to do.
Therefore, the guides with respect to networking helped the researcher a lot in setting up and
implementation of the Network as it is a click and play procedure.
37
GUIDES
ONE:
Choosing IP Addresses for Network Machines
For simplicity, class B IP addresses are used for a peer-to-peer network. The specifications for class B
IP addresses are as follows:
• The first digit of the IP address must be between 128 to 191 inclusively.
• The subnet mask is: 255.255.0.0
• The first two digits of the IP address must match on both machines. For example:
machine!: 150.100.100.10
machine2: 150.100.250.20
Here's a good example of a set ofiP address to use:
Macintosh: PC Running Windows NT or Windows 95:
Configuring TCP/IP on Windows NT
1. Go to the Network control panel.
150.100.100.10
150.100.100.20
2. From the Installed Network Software list box, select TCP/IP Protocol, aud click
Configure.
3. Make sure the Enable Automatic DHCP Configuration is deselected, and enter the
following:
IP Address: 150.100.100.20
Subnet Mask: 255.255.0.0
4. Make sure the Default Gateway aud the Primary I Secondary WINS Server entries are
blank.
5. Click DNS, and ensure everything is blank except for the Host Name, which contains the
name of your Windows NT machine. Click OK.
38
6. Click Advanced, and ensure that Enable LMHOSTS Lookup is selected. Everything else
should be either blank or deselected. Click OK.
7. Close the Network control panel, and restart Windows NT.
8. Find the file name in the \Winnt\System32\Drivers directory. Make a copy and name it
Hosts, leaving it in the same directory.
9. Edit the Hosts file, and add the following line at the bottom:
150.100.100.10 as the IP Address.
10. From the File menu, choose Save. You are now ready to test the connection.
Configuring TCP/IP on Windows 95
I. From the Network control panel, select TCP/IP, and click Properties.
2. Go to WINS Configuration, and select Disable WINS resolution.
3. Go to the IP Address, select Specify an IP Address, and enter:
IP Address: 150.100.100.20
Subnet Mask: 255.255.0.0
4. Go to Gateway, and make sure it is empty.
5. Go to DNS configuration, and select Disable DNS.
6. Click OK, and close out the Network control panel. Restart Windows 95.
7. In the main Windows directory, usually C:\Windows, find the file name. Copy the file,
and Rename it. Place the file in the main Windows directory.
8. Edit the Hosts file, and add the following line at the bottom:
150.100.100.10 as its IP address.
9. From the File menu, choose Save. You are now ready to test the connection.
NOTE: If the MSN login dialog box appears when you are connecting, click Cancel to continue. To
disable this behavior, run the Internet applet from the control panel and clear the UseAutoDial option
in the AutoDial Tab.
39
Testing the TCPIIP Connection
To test the network connection, use the Ping command line utility on the PC. Open an MS
DOS/Command window and type one of the following:
C:l>ping Computer Name or IP address
-or-
C:I>ping 150.100.100.10
Replace 150.100.100.10 and Computer name with whatever you set in the Hosts file. Using my
Computer name causes the TCP/IP service to look up the name in the Hosts file to resolve it to
an IP address. The expected output from Ping looks like the following:
C:\>ping 150.100.100.10
Pinging 150.100.100.10 with 32 bytes of data:
Reply from 150.100.100.10: bytes=32 time=lOms TTL=254
Reply from 150.100.100.10: bytes=32 time<! Oms TTL=254
Reply from 150.100.100.10: bytes=32 time<! Oms TTL=254
Reply from 150.100.100.10: bytes=32 time<! Oms TTL=254
If you receive a Bad IP address error, you need to check your Hosts file entry to ensure that the IP
address and name match what is set on the Macintosh.
If you receive a Request timed out enor, you need to check the physical network connection and
ensure that the IP address in the Hosts file matches what is set on the Macintosh.
TWO:
Network Setup (Peer-To-Peer)
Wiring the Network
1. Shut down all computers and the router (if necessary)
2. Tum on one computer you will use to setup the router
3. You router should have come equipped with a piece of paper or a brochure of just a few
pages that lists the instructions to follow to setup the router. One of the early instructions
may ask you to insert the CD that came with the router, in the CD drive and wait for the
instructions. Follow these instructions faithfully
40
4. After setting up and configuring the router, tum it off and tum off the computer you used to
set it up (this step is optional)
5. Connect each of the other computers to the router using an RJ-45 cable for each connection:
Figure 14: Wiring the Network
If you had turned off some of the machines, first turn on the router. Then, after a few seconds, tum on
the computers. If you receive some messages indicating that a network was detected, fine. If not, don't
worry, we will check the network later.
THREE
Connecting and setting up a Wireless Network- LAN
1. Sta1i the computer you will use to setup the router (you should turn the others off):
Figurel4: Computer to be connected on the Network.
2. Most, if not all, wireless routers come with very easy to follow instructions. Most of them
usually ask you to first insert the CD that accompanies the router, that is, before physically
installing the router. Consult the documentation (usually just one or a few pieces of paper or a
small brochure) and faithfully follow its CD's instructions. At one time, the instructions would
indicate to you when to connect the computer and the wireless router. To do this, you will use a
41
cable (usually supplied to you) to connect one end to the computer and another end to the router:
Figure 15: Computer and Wireless Router connection
3. Because the steps to perform depend on the router (or the manufacturer), we will let you perform
as described by their documentation
4. After installing and setting up the wireless router, tum it off and tum the computer off
5. If you didn't yet, install the wireless network card(s) on the other computer(s).
For any computer that doesn't have a wireless network card but has a wired network card,
connect it to a port of the wireless router using an RJ-45 cable. The computers that have a
network card will not need a physical connection to the wireless router:
tJ~\ ====
6. Turn on the router. After a few seconds, turn on the computers one by one.
You may not need to check whether they work at this time or not.
42
Network Connections
Netw01·k Setup on First Computer
After establishing the physical or wireless connections of the computers, you can electronically
connect them, test or check that they can "see" each other. Microsoft Windows XP makes networking
ridiculously easy. In fact, when writing these lessons, after physically connecting the computers to the
router and turning everything on, the whole network had been built and there was no pmiicularly
necessary configuration to perform: everything was ready.
To "virtually" connect the network, Microsoft Windows XP provides the Network Setup Wizard,
which is a series of dialog boxes that can guide you in this process. To stllii this wizard:
FOUR
Wirelessly Connecting a Network
I. On one of the computers that runs either Microsoft Windows XP, click Start, Progrllil1s,
Accessories, Communications, Network Setup Wizm·d.
2. The first page of the wizm·d will present a message and a bulleted list but nothing to choose:
Welcome to the Network Setup Wizard
This wizard rffl! help you set up thr~ computer to run onyoUI network With a nelV«llkyou can;
• Sha~e ""Internet connection • Set up Window~ Firewall • Shale f~e; and folders • Shale a Pfinler
To continue, clck Next
I Next> I I C.mcel
Figure. 16: Network Setup Wizard to run the network.
3. Read the text and click Next
4. The second page of the wizard also displays a message:
43
BefOlc you con!lnue, review the t&9.!ill~UU.!!!in.Q..It!l~~ill
Then, complete the following l!eps:
• ln~!all !he netwOlk cMd:, modems, .md cables. • Tum on all computer:, ptinlers, and eldemal modems. • Connect to the Internet
When you cick Next. the wizard wiU :eruch lor a ~hrued Internet connection on your netWOik.
< Back ]I Next> J I Cancel J
Figure. 17: Network Setup Wizard to checklist for creating a network.
5. Read the lines of text and click Next
6. In the third page of the wizard, if you have already created a connection to the Internet, you
can accept the first radio button. If you haven't gotten or configured a connection to the
Internet, as is the case for the computers in our series oflessons so far, click the second radio
button:
7. Click Next
The wizard found a shared lr11emet connection on the computer "Unknown Internet Connection Shar~ng device."
Do.vou want to use the cHiding shared connection IO!" this computar': Internet acceu?
0 Yes. Ute the e~l~ting :hmcd connection fOl thi$ computer':lnte:nct acceu {recommended)
0 No. let me choose .:mother way to connect to the Internet
< Sack NeJ<t > j J Cancel
Figure. 18: Network Setup Wizard to confirm use of shared connection.
44
8. In the fourth page of the wizard, as we are not dealing with the Internet at this time, click the
9. Click Next
Other radio button
Select the statement that best describes this computer:
O This computer connects direclly to the lntemet The other compute!~ on Ill)' network connect to the Internet Uvough this compute1. View an eJ.:ample.
0 This COOlpUter connects to the Internet through a residential gateway or lhroogh another compute! on my netWQfk. View .-:m e~amp!e.
00thel
Learn more about home or email office network confiauratirms.
<Back Next>
Figure. 19: Network Setup Wizard to select a network connection method
10. In the fifth page of the wizard, read the options of the three radio buttons. Because we are not
setting up, or concerned with, the Internet right now, click the This Computer Belongs To A
Network That That Does Not Have An Internet Connection radio button
I I. Click Next
Select the :t<'l\ement that best describe~ this computer:
0 Thi: computer connect: to the Internet directly 01 through a network hub. Othet ccmputer: on MJ.1 netwOfk .:~!so connect to the Internet directly or through a hub. Vjew on J%!!'Dmp!e.
(.") This computer oonnech1: direcUy to the Internet. I do not have a network yet Yinw an mwmp!e.
0 This computer belongs to .a network th;:,t doe$ not have .an lntetnet connection. Yi..,w .:m eK.:!mpJ,..
learn mme about hqme m ;mall pffjce Of!!wprk confjqw<ltjqn;.
< Back NeHt > I J Cancel
Figure. 20: Network Setup Wizard for other Internet Connection methods.
45
12. In the sixth page of the wizard, in the Computer Description text box, type a short
description such as the role or the position of the computer. There are no real rules to follow
for this text, only suggestions. For example, because this description will show in Windows
Explorer or other windows, don't make it too long. You can also include any characters you
want
13. In the Computer Name text box, type a name for the computer. For this name, there are
rules you must follow:
Computet desc;iption: !~~~~~~~!~~~:~~~~ ~.-~:~'"· "---·-· Examples: Family Room Computer or Monica's Computer
Computer name~ fCENffiAL---------·-------·~
E)(emptes: FAMilY or MONIC6.
The cunent complier name is CENTRAL.
Some Internet SerV!ce Providers (ISPs) require that .YOU use a specific computer name. This i$ often true fo1 computers with a cable modem.
If this is the case fDl' your computer, do not change the computer name provided by your ISP.
learn more about computer names and descrio!ions.
I < Back )[, Next> I / Cancel
Figure. 21: Network Setup Wizard to describe and name the computer.
14. After entering the description and the name of the computer, click Next
15. In its seventh page, the wizard prompts you to enter the name of your network. It suggests
MSHOME. You can accept this name or change it:
46
Name your ne{work by ;pedying a workgroup name below. All computer~ on yow network should have the same workgroup name.
Workgroup name: iFUNCTIONX L ~··-· -~ ·----·~. --Examples; HOME or OFFICE
< Back 1/ Next> J j Cancel
Figure. 22: Network Setup Wizard for naming the network.
16. After typing a name for the network (you can still change the name later), click Next
17. In the eighth page of the wizard, read the text:
, i ) Turning on lile and pnnter ;haling makes the Shared Documents folder avaUable to "V everyone on your nelWOik. It lll:o glve: everyone acces.: to a shared printm if one i$
available.
What do you want to do?
0 Twn on Jle and printer :hari-\g Windom Fuewa!l Wdl be configUred to allow J~e and printer sharing on your networl-...
0 Tum olllile and printer sharing Windows FirewaU will block flle and p!inter sharinQ on your netw01k. If you currently have ~hared filet 01 printers, they will no Ionge~ be m&ed
( < Back !( Ne~t > ! ( Cancel
Figure. 23: Network Setup Wizard for Resource sharing
For our project, accept the Turn On File And Printer Sharing radio button and click Next
47
18. In the ninth page of the wizard, read the text:
The wizard mJ apply the foiowing ~!ling;, This process may lake a few minutes to complete and e<~nnol be interrupled.
§~!!ing:; _____ _."' '''"''''' .-~~·~---i Internet cormection ;citing~
J Internet connection:
! Network sethng:;
Compu\ef de~criplion:
I Computer name: ,Workgroup name: L, __ .
To apply these :etlings, click Ne)({.
local Area Connection
Donnalion From Seal of L~e CENTRAL FUNCTJONX
Figure. 24: Network Setup Wizard to indicate whether the computer is ready to network settings.
Click Next
19. After clicking Next, the wizard will start creating the files used to setup a network, based
on your previous selections:
Please wait while the wi~ard configure; lhi$ computer/or home or smaU offiCe neliYOiking. This process lnll.Y take a few minute;.
Figure. 25: Network Setup Wizard for configuring the computer for home or small office networking.
When it has created the files, it would present a new page of the wizard.
In the tenth page of the wizard, read the text. Normally, you should create a setup disk:
48
i ) You need to run the Network Setup Wizard once on each of the compute~s on your 'V netwwk. To run the wiuud on computers that are not running WindowsXP.you can use
the Window; XP CD Of a Network Setup Disk.
Whaldoyouwant to do?
0 Create a NeiWO!k Setup Disk
O Ure the Nehorork Setup Disk I alleady have
OU;e myW'mdow:XP CD
QJust flllhh the wizard; J donl need to run the wizard on othet computers
I Ne~t> J
Figure. 26: Network Setup Wizard to run the network setup wizard.
To create a setup disk, you will need either a floppy drive or a flash drive (also called a jump
drive) (or any potiable drive that the computer allows).
For our lessons and if your computer has a 3.5 floppy drive, accept the Create A Network Setup
Disk radio button. Click Next
20. In the eleventh page of the wizard, you may be presented with the only portable medium
available. If your computer found more than one medium, such as a floppy drive and a flash
drive, you would be presented with the option to choose which one you would use. Here is an
example:
Select the drlvcjiOU want to u:e to creille a Netw01k Selt.p Di~k:
Remov.Jb!e 31{ Floppy (A:) Dltk(E·J
Figure. 27: Network Setup Wizard for selecting the drive to use in creating a network setup drive.
If necessary, select the drive you would use and click Next. If you select the floppy drive,
make sure you insert a floppy disk in the drive. The following page would ask you whether
49
you want to format it, which you should do:
Intel! the did~ }IOU want to u:e.
!n~e1t a di~k the into the following di;k '"'"· ;md lh<1
311: Floppy (A:)
If you want to format the di~k. click F01m& Oi:k.
I Format Disk I
File system
Allocation IJ!1it size
Vo!umel*cl
ForiMt optoos
Figure. 28: Network Setup Wizard showing the drive selected.
click Next
Cancel
21. After clicking Next, the wizard would copy the necessary files in the medium (flash drive or
floppy). After copying the files, it would give you instructions on what to do next:
_ i ) Complete the wizard and restart !hi~ computet. Then, use lhe Network Setup Disk to run ~ the Network Setup Wizard once on each of the other computers on your net well< ..
He1e's how:
1. Insert the Network Setup Di$k into the neKt computer }'OU want to network. 2. Open MJ.i Computer and then open the Network Setup Di~k. 3. Double·ckk "netsetup."
j <Back Next>
Figure. 29: Network Setup Wizard for running the wizard with the network setup disk.
After reading the instructions, remove the disk and click Next
50
22. In the last page, read the text:
Completing the Network Setup Wizard
You have successlul!y ~et up this computer lm home or small olfice netw01king.
For help with home or small office netw01king. see the following topics in Help and Support Center:
• Usino the Shared Documents folder • t3J:t~~in!tm~.L~ruU.9!~~I~
To see other computers on your network. click Start and then cfick My Network Places.
To close this wizard, click Finish.
j < Back II Finish
Figure. 30: Network Setup Wizard for completing the network setup wizard.
Click Finish
23. After clicking Finish, a message box will ask you whether you want to restart the computer:
You must restart your computer before the new settings will tal'.e effect.
Do you want to restart your computer now?
Yes II No
Figure. 31: Network Setup Wizard showing the user what to do for the new setup to take effect.
Click Yes
FIVE:
Network Setup on Additional Computers
After setting up the network on one computer, went on to the next computer.
To setup the network on the other computer(s) that will be part of your network:
Practical Learning: Connecting Additional Computers
51
1. On the next computer, click Start ->Network Places
2. Under Network Tasks, click Set Up A Home Or Office Network
3. In the first page of the wizard, read the text and click Next
Welcome to the Network Setup Wizard
Thi; wizard will help you set up this compuler to run on your network. With a network you can:
• Share an Internet connechon • Set up Wind()W~ FilewaD • Sha!e file~ and /oldeu • Share a prltller
To conlinue, ctck Ne~l
il·r.~ Ne~t> ) I Cancel I
Figure. 32: Network Setup Wizard showing how to run the computer on this wizard.
In the second page of the wizard, read the text and click Next
Befoul you continue ...
Bel01e you conlinue. review the ~!IQ'l£te"i!iOO:~JY.tO!~
Then. COillflleiO the following step$:
• ln:tal the 1'\e\work card;,modom3, and cable:. • Turn on 6!1 cOI!liMen, printer: • .end exlemal modem;, • Connect to the hllemel
\>./hen you click NeKI, Uw wi~ad will $Calch f01 a :ffired hllemet connection on ~'CUI nelWOik
I <Back Next> ) I Cancel I
Figure. 33: Network Setup Wizard for Reviewing the checklist for creating the network.
52
In the third page of the wizard, accept the first radio button and click Next
The wi:a~d found a :;Nred Internet connection on the coo.puter ''Unknown Internet Connection Sha~ing device."
Do you want to Ute the e!citling shared connection f01 thi$ compute!'slnternet acce;~?
0Yes, U$e the e!cisting sha~ed connection for thit computru's Internet accen (recorrvnendedl O No, Jet me choose another way to connect to lhe Internet
I < Back IJ Next> I Coocel I
Figure. 34: Network Setup Wizard for other shared connection.
In the fourth page of the wizard, in the Computer Description text box, type a short
description that can define or indicate what this computer is used for
4. In the Computer Name text box, type a name that will distinguish this computer in the
network. One of the rules you must observe is that the name must be unique in the
network. This means that you cannot use the same name you have already given to
another computer in the same network:
Computer descsiption: \C~~-:~~.~=-----~-~-~- -~ ----·~---~-~) E~: Fami,y Room Computer or Monica's Compuler
Computetname: iCt~NS.rAiiON ; ~::-FAM'ii.Y(;MoNi~----- .. ----~·-'
The current computer name is SUZANNE.
lea~n more about cgmputer name:: and descriotion-j.
I < Back I! Next> ! Cancel I
53
Figure. 35: Network Setup Wizard for naming and describing computers in case of shared connection.
After entering the description and the name of the computer, click Next
In the fifth page of the wizard, it is somewhat important (but it is not a requirement) that you
enter the same name you specified for the network of the first computer:
Name yout network by specifjling a w01kgroup name below. All computer: on your neiWO!k ;hou!d have the ;arne workg~oup tlllme.
W01kgroup name; jFuNcnciNX~~-~----~--~--------···-~···
E~a;;;j;J~:HOME·~-OFFt·cr-- --- - .. ·~·-
! <Back Jl NeMt> I I Wncel I
Figure. 36: Network Setup Wizard for naming the network to specify the workgroup.
If you specify a different name, you will end up with various networks, which can be annoying
or confusing but would work fine
5. After entering the name of the network, click Next
6. The wizard will try to check if that name was already specified for another computer of
the same network. If it finds that another computer is using that name, then it would
allow this computer to "join" the network. If it finds out that no other computer is using
that name, then it would create it.
54
After checking the name, the wizard will present you with a summary page:
The Wizard will apply the following setting:. Thi: proce;: rna}' take a few minute~ to c~te and coonol be interrupted
?.e_tt~:;._ _____ ~~- ---------· ·- --1 lntemet connection $Citing::
l Coonecting via ICS through: !device
i Neli'/Oik setting~
i Compute!' de~cription: ! Compvter name:
To apply the:e :etting:, click Nexl
Unknown Jntemet Connection Sharing
Common Station CMNSTAT!ON
I <Back Ne~t > I J Cancel
Figure. 37: Network Setup Wizard for applying network settings. After reading it, click Next
7. The wizard will then create the necessary files to make this computer pru.i of the network.
After creating the files, it would present a page giving you to option to create a setup
disk. This time, decline by clicking the last radio button
8. Click Next
To run the wizard with the Netwmk Setup Disk ...
_ j ·) Complete the wiz~d and re:ta~t \hi: cotqlU!er. Then. use the Netw01k Setup Disk to run \'V the Network SetupWizrud once on eoch o/ the olhet computer: on}'OUI" ne\WOik
Here's how:
1. Insert the Network Set({! Or~k nto the next computer yoo want to nelWOJk.. 2. Open My Computer and then open the Netw01k Setup Oidt 3. Double-click ''nehetup."
I <Back Jl Next> I
Figure. 38: Network Setup Wizard to run the network setup disk
55
9. Click Finish
You h.lve ~\ICeenfut}l set up this compute! for home or~ ol!icu neli'IOiking.
for help with home or :mal olfice l'lclWOiking. Sell the /oUowing topiCS in Help Md Suppo<t Cenler
• Woo the Shnu:d 00f;vm•nl: ff!ld<or • §h!lf.'!)qli!~t_¥)Q'_/~~
To see olf'let compuler; on your netWOik. click Sta<t. and Uwn diCk MyNeti'IOik Ploce;.
To close lh; Wll:llld. click Fi'll~h.
I <Bock II flllish
Figure. 39: Network Setup Wizard completing the setup wizard in case of shared
I 0. You will be asked whether you want to restart the computer or not. Click Yes
As an alternative, and as instructed when creating the setup disk:
I. On the other computer, put the setup disk in the drive
2. Using Windows Explorer, My Computer or another file utility or viewer, access the drive
that contains the disk you created and double-click the file it contains
3. Follow the instructions on the screen. They are pretty much self-explanatory
4. When asked to restart the computer, do so
SIX:
Viewing Network Connections
My Network Places
Once you have built a computer network, from time to time, you will need to check what
computers are available and/or what files or folders have been shared. To assist you with this,
Microsoft Windows XP provides a window named My Network Places.
To view the available connected computers:
Practical Learning: Viewing the Connected Computers
56
I. On one of the computers, click Start -> My Network Places.
If you don't see that option in the right column of the Stati menu, depending of your
configuration, click Stati -> Settings ->Network Connections. Then, under Other Places,
click My Network Places.
As an alternative, you can click Start-> Control Panel or Start -> Settings -> Control
Panel. Under Other Places, click My Network Places.
2. Under Network Tasks, click View Workgroup Computers
~ 1\ddiJ ~~pl~o
~\le\'<~cor.r.e.;l;lon;
~ ~opul>«<>eta,;,mJ rilkf1 v.t*"ft
i/1 ~kw•l~l~qoopwr;;..-<Jitr~
1:} ffiawr/t Wn:Wm !'><'hwrr,
,'3 111 CCITp.Jier
[) Mytlowmtl\t;
D sr..,~dJ}x~m'tl'l,h,
"Ji I'TO<\l!iHif'd F~~c;
,~2~Go
~ COIMlOfl statiOn {Orrntabon)
Figure. 40: Shows which computers are available and/or which files or folders have been shared
SEVEN:
Setting up a Win9x Local Area Network
Hardware You Will Need
I. At least two computers
2. Network adapters for each computer. The cost should be approximately $20-$50.
3.Ifyou have a IOBase-T adapters, and only two computers, you can directly connect one
computer to the other. You will need to modify the cable by connecting connect pins: 1--3,2--6,
3--1,6--2, pins 4,5,7 and 8 are unused, but are normally connected straight through.
57
If you have more than two computers, you will need a I OBase-T hub or router to connect them. The
cost will be approximately $50-$100.
EIGHT:
Adding Your Network Adapter
I. Adding Your Network Adapter
(If it is not there already
2. Click on Add New Hardware
3. Click the Next button
4. You can either have Windows9x search for the adapter by selecting YES
or select NO to manually enter the adapter
Figure. 41: Showing how to add a new hardware using the wizard
5. Click the Next button
6. If you selected NO, you will need to manually select an adapter
58
Figure. 42: Add New hardware Wizard to select the type of hardware to install.
Figure. 43: Showing the network adapters that match with the hardware selected.
Reboot if requested
NINE:
Adding the TCP/IP Protocol Stack
(If it is not there already)
Given how much the Internet is being
I. Open the Control Panel
2. Double-click on the Network icon
3. From your network adapter detection in previous table, you should see something like the
Client for Microsoft Networks, Client for Netware, your Network Adapter, IPX and
NetBEUI already installed.
4. There may or may not be IPX and NetBEUI. Just depends on what changes have been made.
5. If you want to add TCP/IP, click on the Add button.
59
6. Click on Protocol
7. Click on Microsoft
8. Click on TCPIIP
9. Then delete IPX and NetBEUI
10. Other than the adapter(s), it should look pretty much like the following screenshot.
Figure. 43: Adding the TCP/IP Protocol Stack
TEN:
Configuring the TCP/IP Protocol
IP Address
o Click on TCP/IP
o Select IP Address:
o If you have a DHCP serviced subnet, select Obtain an IP Address Automatically
If not, enter your IP address, Subnet Mask, DNS and Gateway IP address information.
60
Fig. 44: Configuring the TCP/IP Protocol
ELEVEN:
Configuring the Network
1. Under Control Panel I Network I Identification make sure each Computer has a unique name.
2. Make sure that the Workgroup name is the same for all computers
3. Do not have any spaces in either the Computer or Workgroup names. Keep them simple.
4. Select different IP address for each computer. Use the same sub net mask. If you are
connecting to the Internet, enter in the Gateway and DNS IP addresses
5. Click on the File and Print Sharing button and check off whether you want share Files or
Printers
TWELVE:
Server Installation Necessary Hardware and Software
Server Machines
In Lesson 1, we saw that a server was another computer that can participate in a client/server network,
as opposed to a peer-to-peer network. A server is used to hold resources and items that other
computers would need:
61
Fax Computer
Fig. 45: Server Installation
A server is primarily a regular computer. For a small network, identify the computer that you will use
as the server. You can use an existing computer or purchase a new one. Before starting to acquire the
necessary hardware for your network, when planning a server, you may fit one or the following
descriptions:
• I will purchase a server from the Internet: If you haven't bought a server but are planning
to purchase a computer for it,.
o I already have the/a computer and it has an operating system: If you plan to use one of
your (existing) computers as the server, check its hardware and make sure it meets the
following requirements:
o A processor with 133-MHz or higher speed; 550-MHz recommended; up to eight processors
supported on one server
o 128MB of RAM minimum required; 256MB or more recommended; 32GB
maximum
o 1.25 to 2 GB of available hard disk space
o CD-ROM or DVD-ROM drive
o VGA or hardware that supports console redirection required; Super VGA supporting
800 x 600 or higher-resolution monitor recommended
If necessary, you can purchase additional items to meet these requirements.
• If you have a computer that doesn't have any operating system and you are
planning to use it as the server of your network, make sure it meets the
62
Monito1·
following requirements:
A processor with 133-MHz or higher speed; 550-MHz recommended; up to
eight processors supported on one server
• 128MB of RAM minimum required; 256MB or more recommended; 32GB
maximum
• 1.25 to 2 GB of available hard disk space
• CD-ROM or DVD-ROM drive
• VGA or hardware that supports console redirection required; Super VGA
supporting 800 x 600 or higher-resolution monitor recommended
You will also need a monitor attached to the server. If you will not work closely with the server, that
is, if you will not "watch" the server all day long, the type of monitor you connect to it may not
be imp01tant.
Server Operating System
As its name implies, the role of a server is to serve. To perform this job, it must be loaded with a
special operating system. On this site, we cover a network that deals with a Microsoft -based
network. The company publishes a server operating system named Microsoft Windows Server
2003.
Before acquiring the operating system, a brand new computer, to use as a server, can be
purchased from a manufacturer on the Internet.. When choosing the machine, make sure it meets
the following requirements:
• 133-MHz processor required; 550-MHz recommended; up to eight processors supp01ted on
one server
• 128MB of RAM minimum required; 256MB or more recommended; 32GB maximum
• 1.25 to 2 GB of available hard disk space
• CD-ROM or DVD-ROM drive
63
• VGA or hardware that supports console redirection required; Super VGA suppmiing 800
x 600 or higher-resolution monitor recommended
• Besides these requirements, if your budget permits, change or add the following items:
o Tape Backup and Tape Software: This can help to perform regular backup of files.
o Floppy Drive: This drive cannot be completely ruled out yet. Get it just in case (you
never know).
o DVD Drive: The web site or company may suggest a CD drive. In most cases this can be
enough. Still, tty to get a DVD drive instead of a simple CD drive
o Second Network Card: This can be valuable if you are building a small network and
plan to give access to your computers to the Internet. This second can help you with
Internet connection and security
o Extended WaJTanty: No matter what its price and what else, get it (even if you think
you will never need it).
Installations and Connections
New Installation
After acquiring a computer, you may have one that is ready but doesn't have an operating. You may
have a computer with an operating system but that OS cannot be upgraded into Microsoft Windows
Server 2003. In one of these cases, you would need to perform a new installation.
THIRTEEN:
Installing the Server Operating System
I. If the computer doesn't have an operating system but it meets all the requirements and it
can boot from the CD, stati the computer. You may receive a message stating operating
system missing or something like that. Open the CD drive, put the CD in the drive, and
close it. Restart the computer. You should receive a message stating Press Any Key To
Boot From CD (or something like that)
64
2. Press any key to start the installation.
If your computer already has an operating system, start it. Open the CD drive, put the CD
in it, and close its door. If the operating system cannot be upgraded, a message box and
display and let you know. Accept to perform a new installation and click Next
3. When the installation struis, it will display a blue screen with Windows Setup on top and
some messages on the status bar (bottom of screen).
After a while, the screen will change and display a new title based on the version of
operating system you are installing. For exrunple, if you are installing Microsoft
Windows Server 2003 Enterprise Edition, the title would display
Windows Server 2003, Enterprise Edition Setup
The body of the screen will present options to you. To continue the installation, press
Enter
4. The next screen will show the Windows Licensing Agreement. Read it. Since it is long,
to navigate up and down, you can press Page Up or Page Down. After reading it, if you
accept the terms of the license, press FS. If you don't like what it says, press ESC and
stop the installation.
5. The next screen asks you to select the pmiition you want to use to install the operating
system
• If you have only one partition and it looks small, such as less than 8 GB, simply select it
• If you have only one pmiition and that, regardless of its size, you want to use it wholly to
install the OS, select it
• If you have only one partition but it is Iru·ge and you want to create various partitions,
first make sure it is selected it. Then, press C to partition it. The next screen would ask
how much space you want to use for the new partition. By default, it will propose the
total space for it. To reduce it, first press Backspace a few times to delete the numbers,
then type the desired number of megabytes, and press Enter. Press the down arrow key to
select the Unpartitioned Space option and press C. Continue in the srune way until you
have created the desired partitions
If you have many partitions already, to specify which one will be used to hold the operating system,
65
use the up and down anow keys to select it
6. After selecting the partition you will use, press Enter to install the OS in it
7. The next screen will ask you to format the selected partition and specify the type of file
system you want to use. Select the Format The Partition Using The NTFS File System
option and press Enter
8. In the next screen, the partition will get formatted. This may take a few minutes.
Once the formatting is over, the installation will continue by copying files.
After a while, a wizard, titled Windows Setup, will come up. Its first page presents you
with two options.
The first choice consists of changing the Regional and Language Options. The default
options will be selected depending on your version of the CD. For example, if you bought
the OS intended for a US use, the US English would be selected. If you want to change
the language, click the Customize button. Another dialog box, titled Regional and
Language Options, would come up with English (United States) selected. You can then
click the arrow of its combo box to change the language. After making your selection,
you can click OK. If you don't intend to change anything, you can click Cancel.
The second option consists of making changes to the way the keyboard will interpret text.
Once again, if you are installing the OS intended for a US audience, the US English is
selected by default. If you want to change it, click Details. This would open the Text
Services and Input Languages dialog box. You can change the language by clicking the
arrow of the combo box. After making the change, you can click OK. To ignore any
change, you can click Cancel or press Esc.
After dealing with the Windows Setup dialog box, click Next
9. The next screen requests that you enter your name or the name of the primary person who
will be using the computer. You must type a name other than Administrator or Guest
10. The other text box, Organization, expects the name of the company. Make sure that you
provide this information
II. After entering the name and the organization, click Next or press Enter
12. The next page of the wizard requests the Product Key, which you must enter
13. After typing the product key, click Next
66
14. The next page of the wizard shows the options available for licensing. You should accept
the Per Server option and click Next
15. The next page of the wizard, expects you to type the computer name. It also suggests a
default, based on the company name you would have entered previously as the
Organization. You can accept the suggested name, which you can still change later on, or
you can type a new name
16. We haven't mentioned "user accounts" yet but during installation, a user object is created
and it is named Administrator. When setting up the operating system, you must give a
password to this account. Obviously the password should not be too easy. Fortunately
you can give it temporary password and change it later on as your network, skills, and
concerned improve. You must enter the password in the Administrator Password text box
and type it again in the Confirm Password text box. Make sure you remember this
password because you will need it just after the installation
17. After specifying the password, click Next
18. The next page of the wizard allows you to set the date, the time, and the time zone that
the server will use. Most of the time, the computer finds out the right date and the right
time and it selects them. On the other hand, you should adjust the time zone if the default
is not the right one. This page of the wizard also allows you the let the computer adjust its
clock when daylight time is switched during the year. The option to change this is
selected by default. If you don't want the computer to take care of that, you can remove
the check mark on the check box.
After changing the options or making sure that they are right, click Next
19. After clicking next, the wizard is closed and the installation continues copying files.
After a few minutes, a new wizard, titled Windows Setup, comes up. This time, it will
ask you to accept or change the network settings of the server. The first option allows you
to let the installation take care of networking details. The second option allows you to
manually set them.
Because we will review the details of this wizard in later lessons, accept the Typical
Settings option and click Next
20. The next page of the wizard allows you to actually make this computer into a server.
Accept the first option not to "join" a domain.
67
The wizard suggests WORKGROUP as the name of the "domain". If you don't like that
name, change it. If you can't come up with a domain, you can use the one we will use.
For our lessons, our domain will be called Neptune. In this case, in the top text box, type
Neptune
21. After entering the name of the domain, click Next
22. After clicking Next, the wizard will start copying the files, again.
Once the installation has finished copying the files, the computer will stmt. When the
computer comes back, you will be asked to log in.
Press Ctrl + Alt + Delete to log in
23. Accept the User Name as Administrator.
In the Password text box, type the password you entered during the installation
24. Click OK. If you see a window titled Manage Your Server, congratulations: you have finished installed Microsoft Windows Server 2003
The Role of a Server
After you have installed Microsoft Windows Server 2003 as we did above, it is primarily a regulm·
computer. To use it as a server, you must properly transform. Fortunately, this is an easy process.
When the computer comes up and displays the desktop, the first window you see, titled Manage
Your Server, allows you define the "role" of the computer. A convenient link is available in the
middle of the window
~ Man11ging Your Server Roles __ ,j! oil .. ,.., .... ....., ............... ._ .. ..., ..... .. ...,w,.,......., .. "'b,...-.,...;.., __ , .•.
u ... - ..... ....,...., ..... ,_, ... , .... -Ml"' ...... '""
,....!'>'>,_ ..... ., ........
Fig. 46: Managing Your Server
__ , .... """""' --· ,_...,. __ ·-, ...... ,_ .. ,_ -·<"'"'""" _ ......... ,. .... \::;;'< __ _
--~ -·-,.. .. ..,.,.......,.,. .... """" ··-
68
Practical Learning: Configuring Active Directory
!. Read the text in the window and click Add Or Remove A Role
2. The first page of the wizard presents a summary of the actions you must have taken
before continuing:
Preliminary steps You cao cnrure that you ~IICceufu!y ccrilO\lro:t Y<l"' se!'WII' by co~lr>!J the f~ stePs Wore CO/\t~.
neforo tontnuin<;l, ves-'fy that the fQIQwinc;l ~ej)S h<ave been c~tod.
llut41 a! rTIC®ms Md netWO<kca<els.
Att.W. eJ ncccsS6<)' c~ble$c.
If you pt..., to usc INs server fa Internet cor.n«bvity, CQN1el:t to the Internet MW.
T,_.n on all pe~lphe<~!s, sucll as printers and external drive$.
Hllv~ yoo.r W'r'ldom S<!<nt Z003 Setup CD a~M~, or fn<>w Y<)<a' oe\WO<k M~..ucn p$.
Fig. 47: Steps taken to configure a server
Read it and click Next
3. A dialog box will display briefly and then display a list of the roles you can assign to the
server.
In the list, click Domain Controller (Active Directory)
Server Role Vou can set l.4> this server to puform ono or more spccifo:: roles. If yoo w.v\1: to~ more than one role to this sCNer, you can runtht!; wizard aQ~~<n.
Seloct a ro!e.lf the role h3s not been added, youcan4dd it. If It h!ls ~~cady been added, yooCilll remove it. If the role you want ta add or remove !!: not bs\ed, ~"' Al1d pr Rt,'TJ<WQ Pr!XI(MM,
File server f>llntsorver Ap¢c.ili:)n Sef\/Cf (115, ASnJ::T) Mall server (POPJ, SMTP) Termiml!sorver Remote 4o:CI!!ss f Y?N server !!JIW4NII$tltif.!StMJl.lii!g® Dt/5server OHCPserver StrcMI'in9 rnedil 1om:r WINSsefver
lc~cd
,. '" "' "'
Domain C<mtroller (Active Directory)
DomiOn cQOtr~ers stO<e directory 00!:~ lll'ld ~user boon P<<Xesses lll'ld dfectory ~ear~.
Fig 48: To set up a server to perform one or more specific roles.
69
4. Click Next
Summlry of selection• \1\ew Md" !orlitm tho ~you have oelotto>d.
Fig 49: Summery of Selections
5. Click Next to Run The Active Directory Installation Wizard
6. Another wizard, titled Active Directory Installation Wizard, comes up. Read its text and
click Next
Welcome to the Active Directory Installation Wizard
Till: w.wd help; you imt41Aclive Olcclor~ !elw;e~ on lhi$ ~eiVw. mllkina the ;etver a dom401 cootro!et
If tit; i; the fntlime )'OU have imta!ed Aclive Oirecl01y. ~ i; r!X:OOllllended thai )'OU rrsl reed the ovlltl'lel'l in8cJw ~
Fig 50: The Active Directory Installation Wizard
70
7. In the second page of the wizard, read the text again, and click Next
. ' , ! I i
Ope/cling System Compatibility lmp~oved secu~y ;elbngs in Wndow: Servet 2003 <)(led olde1 vetsion< of Wondow,.
Ooml~Ul cofiJale:: 1urr.ing \<fmOOVI: SCIVW 200Jinplcmer.t $¢¢\111}1 ~t'lting~ ~ teqke deoo .md oUiel ;e!'ler: to c0fl1lllt.ric~ IWh thote c!orn.m coriiukr; II'! II niole :ecue.way, TIJC I~ ok!et ver:lom cfWII"odoMc c4!)n01 n=t lrno flllW lequilcmenh'
•. W.ndoW:SS • Wrndaw:NT 4.0SP3orea.!iel
B;l del~· eomputer:,rumiog time VC!'cion: olWornhw:. ~ not be abJe to lo!:l.cn l'#h 11 ~ conttoller ~ Wndowt Seryet 2003 01 .IC(;II:f domain rcscu:cc:.
f~ !OO!Ciriorrria~~-:~.~-iblit_sikffi
Fig 51: The Active Directory Installation Wizard showing the operating system compatibility.
8. In the third page of the wizard, you must specify whether this is the first or an additional
domain controller. As this is the first, accept the first radio button and click Next
Domain Conlro!ICI Type Spec~y the role you wMllhi: ;erve~ to have.
·r ed&tiO~af~cOotrOia~f••"'''"'··""'""' lt/ i10ce0cring \11Th tM oPtion wa delete a~ md ooCount= oo tl'f: ~.
Alf Clyp!O!ll,cp!Jic key: WIJ bll dclelcd 4nd ;hou!d be expol!ed bef01c coo!irniog.
j.jj e~cd ®t~"Wcl1a: EFS•eoczypted filet Cf ~ ::hWid ~a·lk<:f)'pled Mtorc rorlll"'l4v.. or il: wa be per~ Ncccul*, ' '
Fig 52: The Active Directory Installation Wizard showing the Domain controller type
71
9. In the fourth page of the wizard, accept the first radio button and click Next
Croato Now Oom;:~in Select which lype ol domilin lo Cleale
_(4~e-'an6v(
<0:-'bomcininanew:§,!.!]:-,·:-:_<,,.,:<->_ , ___ : , Sek<:lthl: op!ioil il U'li~ 1: _!he_ll1t domWI_inYOUI otgari:afuntlf ij yw ~r.l thd·nw~
dotrillln ~o be iomp!eteylridipendent of VO\¥ cunenl l01e:t
Fig 53: The Active Directory Installation Wizard for creating new domain.
In the fifth page, you must enter the name of the domain. The name should be followed by an
Internet domain name (.com, .net, .org, .us, etc). If you have a domain in mind, type it. If you
don't have a domain in mind, for our lessons, type netconsulting.com
New Domain Name Specify a name lor U1e new domain.
;T~ihe'fuiiDNS)lameloclhtirww·dOfflaln L[\_~-~~-,1:1~adq~3ll~r:~:~~amplo.m!cfosofl_com). ful DNs:name 101 new'dOmcin:
:: Jnetconsulling.com
Fig 54: The Active Directory Installation Wizard showing the full DNS name for new domain.
10. Click Next
In the next page of the wizard, a suggested NetBIOS name displays, intended for earlier
versions of Windows":
72
NclOIOS Domain Namo SpecJy a NetBIOS name for the new !loman
Q~NeiBIOSrtalllll: jNETCONSULTfNG
Fig 55: The Active Directory Installation Wizard showing Domain NetBios Name for the new domain.
Accept it and click Next
II. The next page allows you to specify where the Active Directory information would be
stored:
Databas-e and log Folden Spec~y the folders to contain the Active Dileclory database and log f~et.
for mnt peiiOr~e andie6o¥erdtl}l.1tore the datahaie _and the_IOg on :eparate· hrud dith, · ··
Where do you want to store the Active Dilectoty d~aba~e?
Qaiaba:e foldet
Jc:\WINOOWS\NTDS
\v'hme do you want to ~tore the Active D~ectory log?
.Leo Joldel: jc:\WINDOWS\NTDS
c..,~r I
Fig 56: The Active Directory Installation Wizard showing Active Directory information storage.
12. Accept the default and click Next
13. The next page specifies where the domain's public files would be stored:
73
Shared Sy.tcm Volume Spec~;o the /older lc be ~hared a~ the ;yslem volume.
The SYSVOL fo!dol mwt be !oellled on M~NTFS WJ;'umc
Enter a~alion /01 thc-SYSVOLta!der.
fcldo!loc~ jc. \WINDOWS\SYSVOL
'"""' I Fig 57: The Active Directory Installation Wizard showing shared system volume
Accept the default and click Next
I 4. After a few seconds, the next page allows you to install DNS.
Read the options: i! '],;;.
DNS Rogi~tration Diagnostic: Verily ONS ~uppotl, 01 install DNS on lhi: compoJer.
i U tc:ta!lllh
lhi:COII'IpU!wlou:o
caoce1 I
Fig 58: The Active Directory Installation Wizard showing DNS Registration Diagnostics.
Accept the suggested second radio button and click Next
15. The next page allows you to set the default permissions:
74
Pemlinion: Select default permission~ for user and !Jiot!P objects.
'Some 's'cwer' 'piooram:, :uCh a; __ \ifr~d'iWf~ 'NT B~Ac~n' Sl!f';ice; Hi~-rl'Olmation' ;!orad oo domain coolloller;
r):~elfrlis$;00~_co_~ib!C with Pl,f:-Yf~s 2000 $eJ\>er oper.wng ~ems -: Scleci thJs oplion)t yourun SefYef PIOOfllmS on pte·W,,ows 2000 ~e!VCf oper/l!ioJ $114\Cfll$ or on_Wildow: 2000 01 WhdQW; Se~ve~ 2003 operalirg :ydenu IMl .a~e member .s-ol pte·Wmdows 2000 ~
& Aiwn:,omou: u~en can read idormalion on thi: domah
Co' ~;;:~COO.patitk ~ WXfi W!OdoWs 2001f0! Wandow: ScwCi 2003] at' J}!!llll!l~ · ·. · ' _j
seJect J!-il -~ II roo run ierver progHll!lS Ol1!;o ori WII1Ciow~ 2000 01 Wl!\dow; Setv~lr 2fl{}3 _qmoong sydem~ !hat rue !lll:!mbc!; of AcWe Dmtory domain;.' Only ~Wthenticatcid u:IU: can ,c,;d ~~ion on _UY: d:!fuah
<!!.ad:. C-' I
Fig 59: The Active Directory Installation Wizard showing permissions for user and group objects.
Accept the suggested second radio button and click Next
16. The next page prompts you to create a password used to start the server in "Restore
Mode". Enter a password in both text boxes:
Oiroclory Service: Ro:loro Modo Admini:lralor Pauword This password is used when you sllllllhe compute! !1'1 Oirec\O!J! Services Aest01e Mode.
T ypc _arid_confum tho pam\'()fd you want lo auignlo lhe Adr~Wlislralor accounl U$ed when lhl; truver 1$ $lat_tcd in Directory Services Restore Mode. The 11:stme modeAdminitlralm account is tfilferenl from the domainAdmOatratm account The pa11$Wotd; lm the accounh might be dilfcient, :o be :1.1e to tcmembor bo<h
RM!OIC MDdcfa:swO!d
ConfKrn pam'101d:
I········ I········
fo; more infwmMion about Directory Service$ Ae~toro Modo, :ceActive Dimclnry Hr:lp
C!II'ICc!
Fig 60: The Active Directory Installation Wizard to create a password used to start the server in 11Restore Mode11 ••
Click Next
17. The next page displays a summary of your selections:
75
1l! · • A 1~ i '
Summary Review and coofum the option~ you sekcted
~,~!~~~w_,_,~,·---~~~~--··-~--•N-•~•---~~~~-
~;~'F=~~;~~.;:;:.:::·:;:::" . lrhe' Nei~!OS Mme. 01 the l:!o!Mln lt NETCONSUL TJNG 1-"·:·.:t;-_-.:·_·_-:< .. ::.--'>--;.:-.-:--: ·-· :-.' > -: jOataba:e folder C:\WINOOWS\NTDS J!:??.lileloldel: C;\WINOOWSIJHDS -~YSroL lokler._~:\W~_NQOWS\SYSVOL In~ ONS ~ewice wm be in~taled and conf~ed Oil thi: compuler:Thi: eompulet r be cori'Jgi.Ked !o U$e lhh: ONS servet a:~$ prelerred DNS ~eNer. ..:::J
To change ooop!lcn, click Back-To be!)i1 the opetatioo, cEck Nett.
Fig 61: The Active Directory Installation Wizard displaying a summary of your selections.
Read the text and click Next
18. The wizard will start creating and configuring Active Directory:
~'·i!l!l!l'!.lffl!l:·ll·ll!_'l!:#!!dt~:_i:!llHil_'ll __ Ml!! .. !l:· _!tn!Iifflfil·l!:iMtil!l· Z\IZ·IF!'l*!!d#ll·•ll•••••••n•~:ttx~r~z?>~4-l;-; The::wii_ard is C()IYigurfr:i9:~dive;[)lrect_o_r.Y;.:rJils p10Ce.Ss cantil~e-sever.!il minutes or cons[dera_bl.vlon9e:,·depe)1_ding_ Of1_ th.e_.optioM you have _;e!_ected,
Sti:utln~L.
l'lr~o ~·
Fig 62: The Active Directory Installation Wizard for creating and configuring Active Directory
After a while, if you don't have the Microsoft Windows Server 2003 CD in the drive, you may
be prompted to supply it:
76
Configuring Componenb Setup i: making the conligur<tllon change: you requested
c...• I
Fig 63: The Active Directory Installation Wizard configuring the components.
After a few seconds, you may receive a message box informing you that your computer has a
static IP address. Click OK
When the dialog box comes up, simply click OK
Another message box will come up. Click it and click OK. The wizard will continue copying
files.
After a few seconds, the last page of the wizard will display. Read its summary and click
Finish
Completing the Active Directory Installation Wizat·d
~clive DirecTory i; now installed on thi; computer for the'::!] !domain netcomu!ling.corn
IT his domain controner is as;igned to the $ile iDefault·F~st·S~e·Name. S~es are managed with the r"" "'"'"' .. ., '"' '"""'"'"'"'""""tool.
I .:J To clo~e this wizard. cEck Finish.
Fllish
Fig 64: The Active Directory Installation Wizard is completed.
19. You will be asked to restart the computer:
77
!ijfuj!JH~j!§!ll·h2!Mi!J!§H!!!· l'l!ft!ll!!!!ffllll@:l!@!!l·" fmvi!Z@mi· •• ltZJiiizlii~fft -<~.1 ,· 'V/'u1d6:~~-m~::t b~--T-~at~r!e'd, bel Ole· ~he :Ch~r.ges made by the Ac~ve
Dire?lay ,Installation wizard take effect
Qon't Resta~t Now I
Fig 65: The Active Directory Installation Wizard for restarting the computer for the installation to take effect
If you have a CD in the CD drive, remove it and click Restart New
20. When the computer comes up, click the Options button and make sure that the name of
the domain is selected in the Log On To text box.
Make sure that Administrator is specified in the User Name text box.
Enter your administrator's password
21. Click OK
After the computer displays the desktop, a dialog box titled Configure Your Server will let you know
whether the installation of Active Directory was successful:
This Server is Now a Domain Controller
You hwe ruccMJfuly set ~ till:> S«Ver u 11 domain con\roler. To 6dd or remove lli\Other rola, nr1 the COI'ilQure Vl,lt$ :>etver Willlfd ~.
For 11 recOtd of YW' ch~s, see the Coof'9' 't YQ'Jr Servtr loo,
To OOso thiswilud, ckkFfflh.
Fig 66: Dialog box titled Configure Your Server showing successful installation of Active Directory.
Then Click Finish
FOURTEEN:
Software Installations- Workstation Operating Systems
Intt·oduction
When you are planning to use a computer as a workstation is a network, you should make sure that
computer meets the necessary requirements. In some cases, it may only meet the hardware
requirements without any software. In some cases, something could be missing
78
Acquiring Brand New Computers
The hardware requirements the computer must meet:
• A processor with 300 megahertz or higher processor clock speed recommended; 233
MHz minimum required (single or dual processor system); Intel Pentium/Celeron family,
or AMD K6/Athlon/Duron family, or compatible processor recommended
• 128 megabytes (MB) of RAM or higher recommended (64MB minimum supported; may
limit performance and some features)
• 1.5 gigabytes (GB) of available hard disk space
• Super VGA (800 x 600) or higher-resolution video adapter and monitor
• CD-ROM or DVD drive
• Keyboard
New Installation
A new installation of a operating system is suitable if:
• You have a new computer with no operating system at all
• You have a computer with an operating system but you want to overwrite, that is, you
want to install a new operating system on top of the old one and you don't mind loosing
(since you will loose, with a new installation) whatever files already exist in the computer
• You have a computer with an operating system but Microsoft Windows XP Professional
doesn't support an upgrade from that existing operating system
FIFTEEN:
Performing a New Installation of Windows XP
To perform a new installation:
1. Turn the computer on.
If you receive a message stating, "Diskette drive 0 seek failure", open the computer and
make sure the power cable that connects the floppy drive is connected.
79
In case you are using a computer without an operating system, and you receive a message
stating "Missing Operating System", or "Strike Fl to retry boot, F2 for setup utility", don't
worry about it at this time
2. Put the Microsoft Windows XP Professional CD in the CD drive and restart the computer
(you can press Ctrl + Alt + Delete to restatt)
o After a while, as soon as the computer statts, a message will notify you that the computer
will boot from the CD and install the operating system (the message may display "Press
any key to boot fi·om CD").
If a message of installing the operating system doesn't come up, you should restart the
computer. Then, as soon as the black screen of the computer restarting appears, press a key
such as F2 or F8 to access the BIOS. Access the Boot Sequence and check the list. If the
CD (or DVD) drive is not on top and if the instructions allow it, move the CD (or DVD)
drive to the top of the sequence. If you cannot move the CD (or DVD) drive to the top, then
disable the drives, such as floppy or hard drive, that come above it. In some cases, you can
select the drive and press the Space bar to remove the check mark from the selected item.
In this case, make sure that only the CD (or DVD) drive has a check mark next to it. After
making changes in the BIOS to make the computer boot from the CD drive, save and exit
the BIOS. Then restart the computer and follow the instructions on the screen to install the
operating system.
o If a message of installation still doesn't come up, make sure the CD drive is installed
appropriately. You could try to find out from somebody to get the Microsoft Windows 98
boot disk (it is a floppy disk that would first install the (driver for the) CD drive). (If you
have access to the Internet, you can also check the following site:
http://www.bootdisk.com/ for a boot disk). Put that disk in the floppy drive and restatt the
computer. After a while, a list of options will come up and ask you whether you want to
start the computer with or without the CD drive. Select the option that states "without" the
CD. After the CD drive has been installed, make sure you remember the drive letter
assigned to it. Switch to that drive by typing it followed by and press Enter. Then, at the
prompt, type setup.exe and press Enter. For example, if the CD drive is D, after typing D:
and pressing Enter, type D:\setup.exe and press Enter
80
*If the computer still doesn't boot from the CD and if you have access to the Internet, check
the following miicle from Microsoft: http://support.microsoft.com/?kbid=31 0994
As stated above, when the installation stmis, you may see a "Boot From CD" message. In
this case, press Enter.
After a while, you should see a blue screen titled Windows XP Professional Setup and
Welcome to Setup, To Set Up Windows XP Now, Press Enter. To continue, press Enter
3. The next screen will present to you the License Agreement. Read it. If you don't agree with
it, press Esc and stop the installation.
If you agree with the license agreement, press F8 (or the appropriate key)
4. The next screen asks you to select the pmiition you want to use to install the operating
system:
o If you have only one pmiition and it looks small, such as less than 5 GB, simply select it
o If you have only one partition and that, regardless of its size, you want to use it wholly to
install the OS, select it
o If you have only one partition but it is large and you want to create various pmiitions,
first make sure it is selected. Then, press C to partition it. The next screen would ask how
much space you want to use for the new pmiition. By default, it will propose the total
space for it. To reduce it, first press Backspace a few times to delete the numbers, then
type the desired number of megabytes, and press Enter. Press the down anow key to
select the Unpartitioned Space option and press C. Continue the smne way until you
have created the desired pmiitions.
A small pmiition of 8MB will be created by Windows. Don't touch and don't delete it
If you have many partitions already, to specify which one will be used to hold the operating
system, use the up and down anow keys to select it
5. After selecting the pmiition you will use, press Enter to install the OS in it
6. The next screen will ask you to format the selected pmiition and specify the type of file
system you want to use. Select the Format The Partition Using The NTFS File System
option and press Enter
81
7. In the next screen, the installation will start formatting the partition. This may take a few
minutes.
Once the formatting is over, the installation will sta1t loading files. This may take a few
minutes
A wizard, titled Windows XP Professional Setup, will come up. Its first page presents you
with two options.
The first choice consists of changing the Regional and Language Options. If you click
Customize, the Regional and Language Setup Options dialog box will come up:
lll®!!!·lllNi!!IMII!ml!!l·D•+m·''im'!ac®rm·!illl.ttJm· i1iJl!.l.!!l' •III•••·~~Jtt~ft, L.1J~ R~W:~~::'I'~~~-~e$Y~v~~df --· rstandards'andfor~ ' ' ' _: __ ·_·,' ' '' I: )his 'oi)ti~ at'i~_S ~_sOme PrOQi~~s fomiaf,ntrmb~rs, coo~-~ '1:::~~-s~---~--~~:< ,·, ,, ----·.•.~-ct:~ Jte.m to match 'its:'!iefOrenec's~ or' dick: ~u~omli:e tO 'choosC
your own' format~: i I !tlifllfflj@ij@ :::::J cwtomqc,, I ) ' . I s,.;., i ~erJ jt2"3,-l56,769,00
Currency: J $123,456,769,00 1
Time: Jt:55:56 PM j Short"'"'' l-;Jt"'OI30;;:,/::;:20;:-;01_..:.---,----,...--
11
,.
L~ ~-e: , _- J Sattiday,-_October,30, 2004 ... .
'''"'"'. Io help servkes provide you with local information, such as news and weather, seled your present location: ,
jUnil:ed States iJ
.
..
.
I OK Cancel
Fig. 67 Regional and Language Setup Options dialog box
8. The default options will be selected depending on your version of the CD. For example, if
you bought the OS intended for a US use, the US English would be selected. If you want to
change the language, click the Customize button. Another dialog box, titled Regional and
Language Options, would come up with English (United States) selected. You can then
click the anow of its combo box to change the language. After making your selection, you
can click OK. If you don't intend to change anything, you can click Cancel.
The bottom option consists of making changes to the way the keyboard will interpret text.
Once again, if you are installing the OS intended for a US audience, the US English is
selected by default. If you want to change it, click Details. This would open the Text
82
Services and Input Languages dialog box. You can change the language by clicking the
!UTOW of the combo box. After making the change, you can click OK. To ignore any
change, you can click Cancel or press Esc.
After dealing with the Windows Setup dialog box, click Next
9. The next screen requests that you enter your name or the name of the primary person who
will be using the computer. You must type a name other than Administrator or Guest
10. The other text box, Organization, expects the name of the company. Make sure that you
provide this information
11. After entering the name and the organization, click Next or press Enter
12. The next page of the wizard requests the Product Key, which you must enter
13. After typing the product key, click Next
14. The next page of the wizard, expects you to type the computer name. It also suggests a
default based on the organization you entered. You can accept the suggested name, which
you can still change later on, or you can type a new name
15. The dialog box also requests a password for the administrator. This password will be stored
locally, on the computer. Type a semi-difficult password in the Administrator Password
text box, such as P@s$w0rd8
16. Type the exact same password in the Confirm Password text box
17. Press Enter
18. The next page of the wizard allows you accept or change the cunent time, the date, and the
time zone of the computer. After making your selection, click Next
19. The installation will start/continue copying files.
After a while, a dialog box titled Windows XP Professional Setup will prompt you for
Network Settings. Accept Typical Settings and click Next
20. The next page of the wizard will prompt you to specify the name ofthe network or to join a
domain. Accept the default of WORKGROUP and press Enter.
The installation will continue copying the files
21. When the installation finishes copying the files, the computer will reboot. When it comes
up a Welcome to Microsoft Windows message will display. Click Next
22. In the next screen, accept the "Yes, this computer will connect through a local area network
or home network" radio button and click Next
83
23. In the next screen, click the "No, not at this time" radio button
24. Click Next
25. The next screen prompts you to enter at least one name. Enter a name that is neither
Administrator, nor Guest, nor the name of the computer
26. Click Next
27. The next screen displays Thank You and Congratulations ...
Click Finish
The computer will display Welcome for a few seconds and change to the desktop
Upgrade
If your computer already has an operating system installed, instead of performing a new installation,
you can upgrade the existing one. This would preserve the existing files and other items, such as
the computer name, the password, the name of the network, etc, and would only install the new
features and other improvements.
To perform an upgrade:
1. Start the computer as you usually do
2. Open the CD drive. Put the CD (or DVD) that contains Microsoft Windows XP
Professional in the drive and close its door. A window will display and present you some
options.
3. Click Install Windows XP.
Another window will come up with a dialog box on top of it. The dialog box will present
you the option of performing a new installation or upgrading. To choose, click the arrow
of the Installation Type combo box and select your desired option.
Keep in mind that if you perform a new installation, all existing files will be lost. When
in doubt, accept to upgrade
4. After making your selection in the dialog box, click Next
5. You will be presented with the License Agreement. Read it. If you agree with it, click the
I Accept This Agreement radio button and click Next. If you don't agree with it, click the
second radio button and click Next to stop the installation
84
6. If you agreed with the License Agreement and clicked the first radio button, click Next
7. The next screen will request the Product Key. Enter it
8. Click Next
9. In the next screen, if you (already) have an Internet connection, accept the first radio
button so the installation would check updates on the Microsoft web site. If you don't
have an Internet connection or you don't want to check the updates (since you can do this
later on anyway), click the second radio button
10. Click Next
II. Continue the installation. At one time, the computer will reboot (itself). Some time to
time, the computer will go blank for one second or half a second. Don't worry about that.
It will only be a good sign. Let it flow until it prompts you for something. Don't expect
this quiet (and perhaps boring) installation to take less than 3 0 minutes (in fact more than
that). Meanwhile, if you have nothing else to do, the installation will present (somewhat
advertising) messages that you can read or admire to keep yourself busy
12. When the installation is over and the computer has rebooted, a Welcome to Microsoft
Windows will display with Thank You For Purchasing Microsoft Windows XP. Let's
Spend A Few Minutes Setting Up Your Computer.
Click Next
13. The next screen will ask you whether you want to register online. Click the No, Not At
This Time radio button (unless you want to register at this time, in which case you would
click the first radio button)
14. Click Next
15. The next window, titled Let's get On The Internet, would prompt you to setup the Internet
at this time.
Click the Do Not Set Up An Internet Connection At This Time radio button
16. Click Next
17. A Thank You message will show Congratulations, You're Ready To Go!
Click Finish
You may be presented with a (blank) window with only one or two icons including
Recycle Bin. This would simply indicate that the installation was fine. Congratulations
85
The Computer Name
After perfmming an installation of the operating system, you can perform some routine
operations to check or change things.
To check the name of a computer, open Control Panel and double-click System. Alternatively, you can right-click My Computer and click Properties. In the System Properties dialog box, click the Computer Name tab.
Joining the Network
Joining a Domain
Creating a Computer Account
After creating a domain, you can add client computers to it. In our examples, we will add
workstations that run Microsoft Windows XP Professional. There are two actions to adding a
client to a Microsoft Windows Server 2003 domain but only one is required.
Before physically or electronically adding a client to a domain, you can first create a computer
account for it. To create a computer account, you have various alternatives:
• If using the Manage Your Server window, you can click Manage Users And Computers
In Active Directory
• You can also click Start-> Administrative Tools-> Active Directory Users And
Computers
• You can also click Start-> Control Panel-> Administrative Tools-> Active Directory
Users And Computers
Any of these actions would open the Active Directory Users and Computers window. In
the left frame, expand the name of the domain. Then you can right-click the name of the
domain-> New-> Computer. This would open the New Object - Computer dialog box.
In the Computer Name text box, enter the name of the computer. The operating systems
before Windows 2000 don't use very long names. Therefore, when naming a computer,
86
keep this in mind and give a name made of fewer than 15 characters. After naming the
computer, click Next twice and click Finish.
Instead of right-clicking the name of the domain, in the Active Directory Users And
Computers, you can expand the name of the domain, right -click the Computers node ->
New-> Computer. As mentioned already, in the first page of the New Object- Computer
wizard, you can type a name for the computer. Here is an example:
centre!
~I#MmcW;i:\'(.iido-M2000l jCENTRAL
JhC}O~~i~l!hnCr'or'~OOj)caiijolri_tN;_~to'a_~ U:eior!1~' jDcld D~Adtnn: .tl\anoe,,.
r .·.Aj~ l!if ccoiPu\ilt.~ IU a JliC•\Jfl)dow~ 2IXlQ eOII'Ipl.llel
r Anlmi IN; e~m ~ a; a backup &.wnaln· eontro!IW
Then click Next, Next, and Finish.
Joining a Domain
After creating an account for a computer, you can add it to the domain. This is referred to
as joining a domain. Normally, primarily creating an account for a computer is not
required although it's a good idea. When joining a domain, if the computer you are
adding doesn't have one already, an account would be created for it.
To join a domain using Microsoft Windows XP Professional:
I. First display the System Properties dialog box. To do this,
o You can right-click My Computer and click Properties ...
o You can display Control Panel and double-click System
2. In the System Properties, click Computer Name
87
3. Click Change ...
4. In the Computer Name text box, enter the desired name of the computer. If you
had already created an account in the domain for this computer, type that name
5. In the Member Of section, click the Domain radio button
6. Click the Domain text box and enter the name of the domain
7. After specifying the name of the computer and the domain to join, click OK
You can change the name and the membership of this computer. Changes may affect access to network resources.
Computer name: ~"·-··---·-"·------------
! rcENTRAL _____ ... J
Full computer name: CENTRAL
Member ol
®Domain:
I More ...
E~~~~-~iti~; -··-··---···-----·- .. ~_-_· _·_-·-=~-· ·_·· _·--J 0 Workgroup:
OK [ I Cancel
8. You would then be asked to asked to provide a user name and a password for a
user who has the permissions to join let a computer join a domain
88
Mowher(l
@D~
rwlconiu\na
9. After entering a user and a password, click OK. If you have the right to add
computers to the domain, you would receive a Welcome message and click OK:
Full COmpulef rnll'!le;
cnnAAL.
Member of
0Workgroup:
Wekome to the netcon:rulting clorn&n.
OK
OK II c"""
OK II"""''' I ..... .
89
~ocrwno:
CEHTRAL
M<lfi"lhil<lll 0Domait
jnetcon:Utl'l£)
0Worl1!Joup:
I 0. Once you click OK, you will be asked to restart the computer, which you should
do. Therefore, in the System Properties dialog box, click OK
II. When asked whether you want to restmi the computer, click Yes
12. After the computer has restarted, when it displays the Log On To Windows dialog
box, click the aiTow of the Log On To combo box and select the name of the
domain
13. If necessary, change the User Name in the top text box.
In the Password text box, enter the password associated with the user name
14. Click OK
NETWORK MANAGEMENT
Management Overview
Introduction
As a network administrator, you will perform various tasks to keep the network up and mnning. These
include computers, users (the people who use the network), the peripherals (the other machines
attached either to the computers or directly to the network. To make this possible, both Microsoft
Windows XP Professional and Windows Server 2003 provide the various tools you will need. If you
are managing a peer-to-peer network, the former provides local and possibly small network tools to
manage workstations. For a client/server network, Microsoft Windows Server 2003 provides all the
tools you need to locally or remotely manage the servers or the clients.
Network Management with Windows XP
90
Most of the tools used to locally manage a Microsoft Windows XP Professional or a peer-to
peer network are listed in the Administrative Tools window. To open it, you can open Control
Panel and double-click Administrative Tools:
C<>'rlp\tor Dlltll Sou1:e~ E~Of\t Vlewor M~ment (006C)
As you install more software or libraries to your computer, the tools may increase in
sophistication and number. Here is an example:
OthuPluu
(} C:flUO!;>'~'"'
,;.) ~~>Oo:>.r.Mtl
L) S."¥ed ~~"""'"' ~ '~yCO<""'~ 'J !-'.1) .. ~.-.?t'<;>t>: ..
~ot c~_,ter D~:.Scvtel f>!<'t .. ewt• l~W<Itt
Se''t•:ts ~lv-~~e->e<\t (000.:) lo'r:<"'~~ ...
• ~ 3l1l 3l1l ~ 3l1l
'
l1>:oiS•~-"'-1' 1>!-P"<><~f: .~ET ~··:-os~ft .';E'r 1-',;,.oto!: ,•,r ''""'~f: .I C. ~l;y "'~·t'IOV"<-.. ~•!=-'=" ''"'~""''"· !'r'~?-i)C'<,.,
3l1l ~ ,jJiJ ~ y,:nloof:.riET ~ •• r"'""""' ~.,.'<'< Sff'.,:u l'<tn".ew<'•k... ~1!~,,.,,,,
To use a tool, you can double-click it.
NETWORK MANAGEMENT WITH WINDOWS SERVER 2003
Like Microsoft Windows XP Professional, Windows Server 2003 groups its administration
routines under an ensemble refetTed to as Administrative Tools. Unlike the former, the later
provides various ways of accessing the tools.
91
After you have just setup Microsoft Windows Server 2003 and installed Active Directory, the
first window that comes up provides some of the most regular tools you will need to administer
the network:
Managing Your Server Roles .Y.e the tool!: and riorTMtion fa<.nd We to .add,... r'lll'IOV(I "Oies and perform your doiy adrnlnlru&m t~*-:;.
;t Domllln Controller {Active rn ... ctory)
O<:ornm ccnlrol!t!rs uoe A<:tNe Dt'ectery to~~ netwotkrew.rces wch~st!UJ<'l, ~e<s, and aj>pkatlons.
0NS (DorMin NMM S)'$1.em) Slll"o'e<S ttonslete <lorn4n and con¢or otiS 1\M\e$ to IP ••1<h-:=.
tin) Add ot remove ~ "* ,_tl Rcod llb...t serv11< rcles
tli~~em::tc
QjMM~C~~·~ cOft'CUt«Si'IActiVe Olrectcry
~ M'IM')C domW aod truru
iU! MM1>90 s~cs and strnoos
t"l,i ij.~., the noxt st~ lor
~j MM"'lCt'*ONS
til Roviow the ooxt !to;>sl« thi;rol.l
~ttbtiveToolo
l<loreTQQI;
"""""''"''" Corr:cuter.mdOom~ !rlorm:.tioo
!rtcrnotE>qlloruErm S.N'I:yCor{i.pllt!On
... ... ,_... l<li<roml"tTed-tlcl
Otllloymcnl: ondReroo. Ul:t <J Colmoo Admfl!: T~W.!
Wlt"<loM Sctvct (Q<M"
The middle section of this window provides only a limited list of tools, considered to be
the most regularly used. Alternatively, you can display the whole list of tools in a
window. To do this, under the Tools and Updates Section, you can click Administrative
Tools:
92
'1:23PM A
"' Sho!'tcut 1/14/2006 'l:lJ PN A
'"' ""''"" 1/1'1/2006 '1:23PM A
"' Shortrut 1/13/20069:1'\PM A
"' Shoftrut 1/13/2006 9:07PM A
"' ""''"" 1/13/2006 6:58PM A
"' Shortcut 1/16/2006 2:57 PI~ A
"' Shoftcut 1(13/2006 9:16PM A
"' ""''"" 1/16/2006 3:'17 PM A
"' st-.:lrtrut l/13/20069:16Pfll A
'"' Shoftcut 1(!'\{20061:53PN A I. "' ""''"" 1/1'1/20061:23 PM A
U:B Shortrut 1/14/2006 '1:23PM A
"' """'"" 1/16/20063:S6PM A 2KB Shol'tcut 1{13/2006 9:16PM A
"" ""''"" 1/15/2006 8:12AM A 2KD st-.:lrtrut 1/13/2006 8:59PM A 2KD sholtcut 1/13/2006fl:S9PM A
'"' Sholtrut 1(13/20066:06PM A
"' ShortCIJI: 1/16/2006 3:55PM A 2KD Shortcut 1/13/2006 8:57PM A
"' Shalt cut 1/13/2006 6:06PM A
"' Sholtcut l/13/20069:16PM A 2KD ""''"" 1/13/Z006 9:07PM A
"' ShortCIJI: 1/13/2006 8:57PM A
'" Shol'lcut 1/13/2006 8:57PM A
To use a tool, you can double-click it.
Another technique you can access the tools consists of clicking Start ->Administrative
Tools:
Tcrlrirla!Sltfvo:rlkeruli:19
'~,..--,;-:;--,.----"=--...::;:_ __ .~ T<~!rrirui~$Corl$.0r~
Another technique consists of click Start-> All Programs -> Administrative Tools
93
You can also click Start-> Control Panel -> Administrative Tools.
With any of these previous techniques, to use a tool, simply click it from the menu.
The Microsoft Management Console
Introduction
If you have some experience with Windows Explorer of Microsoft Windows 9X and later, you may be
aware that, in that same window, you can open your folders, view your files, open Control Panel,
or even view a web page. In the same way, to make computer and network management easy,
Microsoft Windows XP and Windows Server 2003 provide a common window named Microsoft
Management Console or MMC. This makes it possible for all routine operations to be performed
in a window that primary looks the same regardless of the task being performed. You can
perform all routines operations without formally being aware that you are using the MMC.
Practical Learning: Introducing the MMC
o To view examples of administrative applications that share an interface:
If you are using Microsoft Windows XP Professional, click open Control Panel, double-
94
0
click Administrative Tools, and double-click Computer Management
If you are using Microsoft Windows Server 2003, click Start-> Administrative tools->
Active Directory Users and Computers
Folder to store your f11vor ...
Domllin
To one more administrative window:
If you are using Microsoft Windows XP Professional, in the Administrative Tools
window, double-click Services
~!~§[~t~~: Providess .. . Provides s .. . EMblesth .. .
''~"'" .. . Enatlesct..
liE~;,~, Supports s ... Manages t. .. Mailtalns ~ .. .
'"''··· ~~"" ~ .. . Proce... Provides~ .. , ..,
>
95
3. If you are using Microsoft Windows Server 2003, click Start -> All Programs ->
Administrative tools -> Event Viewer
_fnl'
"' """" . ,;. .... ,.. ->llffillilll>IB' .
l~ • 0~!0" ""' ! Security (illAfll'kation '"" Applkatioo Errcr Rccord5 64.0 ~0
System r .. , ,., Seturly Aud1: R~cord~ 2.01>1) Directory Service DNSServer '"'= "" Sy~tem Error Retordi 61.01:0
Mia Repkation Service Directory Service LOQ Custom LOQ Error Records 61.0KB
tlliDNSS&ver '"" Custom LD'J Error Reccrd> 6'1.0KD
till ne Repkation Service '"" Custom Log Error Reccrds 6-J.OKD
I
4. Close the windows
96
REFERENCES: I. Networking Essentials Plus. Academic Learning Series. 3'd Edition.
2. CCNP Support. Study Guide. By Todd Lammle and Kevin Hales.
3. Networking Lab Manual for Network+ Guide to Networks. 3'd Edition. By Michael Grice.
4. CCNA Self Study. CCNA Intro. Exam Certification Guide.
5. CCIE - Cisco Certified Intemetwork Expert. Study Guide; Routing and Switching Exam
350-001. By John Swartz and Todd Lammle.
6. Networking Complete. 2"d Edition.
7. Using Information technology. 3'd Edition. By Williams Sawyer Hutchinson.
8. Computers, Communications and information. User's Introduction. By Sarah E. Hutchinson
Stacey C. Sawyer.
9. http://www.google.com/
I 0. http://www.answers.com/
97