You are on page 1of 5

How to Configure a Network

In this section you will learn how to configure a network, peer to peer, client server, workstation, server,
basic data communication.

Peer to Peer network model

Before configuring a computer network, you have to decide that, which networking model you require.
There are two main types of network models. Peer to peer and client-server network model. In the peer
to peer network model you simply use the same Workgroup for all the computers and a unique name for
each computer.
Additionally, you will have to give a unique IP address of the same class A, B, or C for all the
computers in your network and its related subnet mask e.g if you decide to use class A IP address for
your three computers in your Peer to Peer network then your IP address/Subnet mask settings can be as

Computer Name IP Address Subnet Mask Workgroup

PC1 Officenetwork

PC2 Officenetwork
PC3 Officenetwor

Please note that the above example is for only illustration purpose so you can choose any IP address,
computer name and workgroup name of your interest.

For doing this right click on My Computer and then click Properties then go to the Network
Identification section and set these.

In a peer to peer network all computers acts as a client because there is not centralized server. Peer to
peer network is used where not security is required in the network.

If a computer fails to work then all other computers work normally in

peer to peer network.

Client/Server Network Model

In the client/server network model a computer plays a centralized role and is known as a server all other
computers in the network are known as clients. All client computers access the server simultaneously for
files, database, docs, spreadsheets, web pages and resources like hard diver, printer, fax modem,
CD/DVD ROM and others. In other words, all the client computes depends on the server and if server
fails to respond or crash then networking/communication between the server and the client computes
If you want to configure a client-server network model then first prepare the server. Install Windows
2000 or Windows 2003 Server from the CD on the server computer and make a domain. You can create
a domain by this command on the Run “DCPROMO”. You can give this command once you install the
server successfully. After you give the DCPROMO command you will be asked for a unique domain
name. All the client computers will use the same unique domain name for becoming the part of this
domain. This command will install the active directory on the server, DNS and other required things. A
step by step wizard will run and will guide you for the rest of the steps. Make sure that a network cable
is plugged in the LAN card of the server when you run the DCPROMO.exe command.

When the Active directory is properly installed on the server, restart the server. You can create network
users on the server computer and also name/label the network resources like computers/printers etc.

Once you install the server successfully now come to the client computers. Install Windows 2000
professional on your all client computers. Once you install the Windows 2000 professional on the clients
the next step is to make this computer (client computer) a part of the network.

Configuration Steps

1. Choose a unique name for each client computer

2. Choose unique IP address for each computer and relevant.
3. Use the same domain name for all client PCs.

Network/System administrators are required to do these administrative tasks on the server and client
computers. Any shared resources on the network either on the server or the clients can be access through
the My Network Places in the Windows 2000 platform. There is another way to connect to the shared
resources by giving this command in the run \\ComputerName\SharedDriveLetter.

Network configurations steps can be implemented by right clicking the My Computer>Properties>

For giving the IP address you will have to right click on the My Network places>properties>Local Area
Connection>Properties>Internet Protocols (TCP/IP)>Properties and then give the IP address and subnet
mask of the same range and class for all the computers in the network.
An Overview of the Wireless Networking

Here you will find wireless networking tutorials, what is wifi, general security overview, wlans, wpans,
wmans, wep and wireless access control overview. Whether you want to make a phone call from your
mobile, received a message on your pager, checked your email from a PDA we have come across a
wireless data or voice network.
If a user or a company wants to make a data portable then Wireless networking is the answer. A wireless
networking system can avoid the downtime, which may be caused in the wired network. A wireless
network is also save your time and efforts in installing the lot of cables.

Also, if you need to relocate a client machine in your office, you only need to move the computer with
wireless network card.

Wireless networking is very useful in the public places, libraries, hotels, schools, airports, railway
stations where one might find wireless access to the internet. A drawback in the wireless internet is that
quality of service (QOS) is not guaranteed if there is any interference then the connection may be

Wireless Network Types

Wireless Local Area Networks (WLANS)

WLANS allow users in local area, such as in a university or a library to form a network and gain
wireless access to the internet. A temporary network can be formed by a small number of users without
the need of access point; given that they do not need to access the resources.

Wireless Personal Area Networks (WPANS)

There are two current technologies for wireless personal network Bluetooth and Infra Red. These
technologies will allow the connectivity of personal devices within an area of 30 feet. Infra Red requires
a direct line and the range is less as compared to Bluetooth technology.

Wireless Metropolitan Area Networks (WMANS)

WMANS allow the connectivity of multiple networks in a metropolitan area such as building in a city.
The network connectivity is the alternative of copper or fiber cabling.

Wireless Wide Area Networks (WWANS)

WWANS or Wireless Area Networks can be maintained over large areas such as in different cities or
between different countries, via multiple satellite systems or antenna sites. The types of system are
called 2G systems.
The following table shows the range those different types of wireless network covers.
Network Meter
Personal Area Network 0-10
Local Area Network 0-100
Wide Are Network 0-10000
Security in Wireless Networking
The following different types of security methods are available in the wireless networking.

Wired Equivalent Privacy (WEP)

Wired Equivalent Privacy is intended to stop the interference of radio frequency that is signaled by
unauthorized users and this security measure is most suitable for the small networks. There is not key
management protocol and each key is entered manually into the clients that’s why this is very time
consuming administrative task. The WEP security method is based on the RC4 encryption algorithm. In
the WEP all the client computers and Access points are configured with the same encryption and
decryption keys.

Service Set Identifier (SSID)

Service Set Identifier (SSID) acts a simple password by allowing WLAN network to be split up into
different networks and each having a unique identifier. These identifiers are configured in the multiple
access points. To access any of any networks, a computer is configured in such a way that each is having
a corresponding SSID identifier for that network. If the SSID match between the two computers or
networks then access is granted to each other.

Media Access Control filtering (MAC Access Control)

A list of the MAC addresses of the client computers can be inputted into an Access point and only those
computers are granted to give the access to the network. When a computer makes a request, its MAC
address is compared to the list of the MAC addresses to the Access point and based on this access
permission granted to deny.
This is a good security method but it is mainly involved in the small wireless networks because there is
more manual work is involved of entering the MAC address into the Access point.


Bluetooth is a simple type of the wireless networking that operates in the digital devices, like mobiles
phones, personal computers, PDA, Laptops, digital camera, MP3 players and other Bluetooth enabled
devices to form a small network. In the Bluetooth technology eight devices can be connected to each
other at the same time. Bluetooth can also be found in the headsets, hands-free kits, wireless keyboards
and mouse. Bluetooth technology was invented by Ericsson in 1994 and after four years in 1998 some
major mobile phone companies such as Nokia, Ericsson, Intel and Toshiba formed a group to promote
this technology.

Bluetooth technology falls in the category of personal area networking because it operates in the range
of 30 to 300 feet. Bluetooth uses the radio waves technology, which is not very expensive and has low
power consumption. Many different companies are intended to add the Bluetooth chip in their digital
devices. Bluetooth technology is getting very popularity because of its low cost and portability.

The Future of Wireless Networking

WLANS wireless networking type is very popular in home networking and more than 20 percent homes
with broadband internet are using WLANS and this number is increasing. In a general estimate
worldwide hotspots have now reached more than 30,000 and will grow about 210,000 in the next few
years. Most large hotels already offer Wi-Fi and the business travelers are willing to pay wireless access.
802.11 is the next Wi-Fi speed standard is set to offer bandwidth around 108Mbps and is still under
development. With the speed of 70 Mbps and a range up to 30 miles, the 80216 standard, known as
WiMAX is sure to get boost.

Some Tips & Tricks

• When purchasing a wireless NIC card try to get one that is having external antenna. When you are out
and using Wi-Fi enabled laptop, disable Microsoft file and sharing, which enables other computers in a
network to access data and resources on your computer. In this way, your computer or laptop will be
saved from hackers.
• If you are concerned about the interference from the other wireless access point set the AP and wireless
computers to use a non-overlapping channel.
• Change the configuration interface password of the access point before you enable it.
• Only buy an access point that is having upgradeable capabilities. By this way you can take the
advantage of security enhancements.
• Keep the access point up to date.