Вы находитесь на странице: 1из 79

DR. FILEMON C.

AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE


Computer and Networking Technology
Department

WINDOWS NETWORKING ESSENTIALS

Chapter I: Network Basic

Chapter II: Managing Users and Windows

Chapter III: TCP/IP

Chapter IV: Network on a Workgroup using Win XP

Chapter V: Window Vista Networking on a Workgroup

Chapter VI: Networking in Windows Network using Win XP

Chapter VII: Window Vista in Windows Network

Chapter VIII: Remote Networking

Chapter IX: Internet Access, ICS and ICF

Chapter X: Outlook Configuration

1 Prepared by: MTGuillermo


DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology
Department

Chapter I: NETWORK BASICS

OBJECTIVE:
Plan and design network

Define the network model available in Windows XP

Identify and describe the elements that are recommended for structured cabling networks.

Select and estimate the cost of cabling for a given network.

OUTLINE:
A. Planning a Network
B. Selecting a Network
C. Network Model
D. Structured Cabling

ACTIVITY:

Activity 1: Network Design


Activity 2: Building Peer to Peer Network (Window XP and Win 2003)

2 Prepared by: MTGuillermo


DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology
Department

TOPIC A: PLANNING A NETWORK


Before you begin any networking project, whether it’s a new network installation or an upgrade
of an existing network, you should first make a detailed plan. If you make technical decisions
too quickly, before studying all the issues that affect the project, you’ll regret it. You’ll discover
too late that a key application won’t run over the network, that the network has unacceptably
slow performance, or that key components of the network don’t work together.

Here are some general thoughts to keep in mind while you create your network plan:

 Don’t rush the plan


 Write down the network plan
 Ask someone else to read your network plan before you buy anything.
 Keep the plan up to date.

STEPS IN PLANNING A NETWORK

1. Purpose of the network


One of the first steps in planning your network is making sure that you understand why
you want the network. Make sure that you identify all the reasons why you think you
need a network and then write them down.

2. Taking the stock


One of the most challenging parts of planning a network is figuring out how to work with
the computers that you already have. In other words, you have to take a thorough
inventory of your current computers.

3. Type of Server
One of the most basic questions that a network plan must answer is whether the network
will have one or more dedicated servers or rely completely on peer-to-peer networking.

a. File Servers
b. Print Servers
c. Mail Servers

3 Prepared by: MTGuillermo


DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology
Department
d. Database Servers

4. Choosing a NOS
If you determine that your network will require one or more dedicated servers, the next
step is to determine what network operating system those servers should use. If possible,
all the servers should use the same NOS so that you don’t find yourself supporting
different operating systems.

Although you can choose from many network operating systems, from a practical point
of view, your choices are limited to the following:

 Windows Server 2003 or 2008


 Linux or another version of Unix

5. Planning the Infrastructure


Plan the details of how you will connect the computers in the network. This includes
determining which network topology that the network will use, what type of cable will
be used, where the cable will be routed, and what other devices, such as repeaters,
bridges, hubs, switches, and routers, will be needed.

6. Drawing Diagrams
One of the most helpful techniques for creating a network plan is to draw a picture of it.
The diagram can be a detailed floor plan, showing the actual location of each network
component. This type of diagram is sometimes called a physical map.

4 Prepared by: MTGuillermo


DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology
Department

TOPIC B: SELECTING A NETWORK CONNECTION


The biggest decision you need to make when creating your network is what type of connection
you will use. Gateway supports both wired and wireless Ethernet networks. Use the following
criteria as a guide when selecting a network connection.

Wired Ethernet network

A wired Ethernet network consists of two or more computers connected together through an
Ethernet cable. This connection type is commonly used in offices around the world and can be
used to build computer networks in the home.

Create a wired Ethernet network if:

 You are building a new home or your existing home already has Ethernet cable installed
in each room that has a device you want to connect

 You are creating a network in an office or business where network speed is more
important than moving about with your computer

 Your computer has an Ethernet jack for connecting to the network

Example wired Ethernet network

5 Prepared by: MTGuillermo


DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology
Department

Wireless Ethernet network

A wireless Ethernet network is ideal for creating a home or office network or adding mobility to
an existing wired Ethernet network. A wireless Ethernet network allows you the freedom to
move about your home or office with your notebook or tablet PC.

Create a wireless Ethernet (IEEE 802.11a, IEEE 802.11b, IEEE 802.11g or 802.11n) network if:

 You are looking for an alternative to installing cable for connectivity


 The ability to move about with your computer is as important as network speed
 Your computer has wireless Ethernet for networking

6 Prepared by: MTGuillermo


DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology
Department

TOPIC C: NETWORK MODEL

1. Workgroup Model
Microsoft’s workgroup model for networking distributes resources, administration, and
security throughout a network. Each computer in a workgroup can be a server, a client,
or both.

Advantage Disadvantage
Easy-to-share resources No centralized control of resources
Resources are distributed across all No centralized account management
machines
Little administrative overhead No centralized administration
Simple to design No centralized security management
Easy to implement Inefficient for more than 20 workstations
Convenient for small groups in close Security must be configured manually
proximity
Less expensive, does not require a central Increased training to operate as both client
server and server

2. Domain Model
By dedicating one or more servers to the job of controlling a domain, the domain model
adds a layer of complexity to networking. But the domain model also centralizes all
shared resources and creates a single point of administrative and security control.

Advantage Disadvantage
Centralized resource sharing Significant administrative effort and
overhead
Centralized resource controls Complicated designs; requires advanced

7 Prepared by: MTGuillermo


DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology
Department
planning
Centralized account management Requires one or more powerful, expensive
servers.
Centralized security management Support personnel need to be trained in
security management.
Efficient for virtually unlimited number of Expense for domain controllers and access
workstations lags increase with network size
Users need to be trained only to use Support personnel need to be trained in
clients domain network management.
Not restricted to close proximity Larger scope requires more user
documentation and training.

TOPIC D: STRUCTURED CABLING


Structured cabling specification T568 makes recommendations for the following basic elements
of networks:

 Building Entrance Requirements - Specifications for the point at which outside cabling
enters a building.

 Equipment Room - Storage area for the more expensive, complex equipment, often the
existing telecommunications closets.

 Backbone Cabling - Cabling (often referred to as vertical) that carries the signals from
equipment room to equipment room, between floors, and to and from the building
entrance connections.

 Horizontal Cabling- ransmission media that carries signals from a same floor equipment
room to the various work areas.

 Work Area - Any area where the computer workstations, printers, etc. are located,
typically office space.

Backbone Cabling Connects Equipment Rooms

8 Prepared by: MTGuillermo


DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology
Department

The wiring used for backbone cabling may be either copper or fiber optic.
Recommended backbone cable maximum distance limitations include:
 Voice grade 100 ohm UTP 800 meter limitation
 STP data grade 150 ohm 90 meter limitation
 Multimode 62.5/125μm fiber 2,000 meter limitation
 Patch cable 3 - 6 meter limitation

Horizontal Cabling

9 Prepared by: MTGuillermo


DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology
Department

Most often, horizontal cable is routed directly from the wiring closet to the workstation,
without splices, cable junctures, or taps. By eliminating splices, cable junctures and/or taps, the
potential for faulty connections and electrical noise is reduced. Although not necessary, it is
recommended that horizontal cabling be rated for category 5 use.

Maximum transmission speeds for horizontal cable are:


 Category 3 up to 16 MHz
 Category 4 up to 20 MHz
 Category 5 up to 100 MHz

Maximum recommended distance limitation for horizontal cable:

 100 meters total


 Maximum of 3 meters from wall jack to workstation
 Maximum of 6 meters in the telecommunications closet
 Maximum of 90 meters from telecommunications closet to wall jack

10 Prepared by: MTGuillermo


DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology
Department
The wall jack outlet must have a minimum of two ports, one for voice grade transmissions and
one for data grade transmissions. Recommended horizontal cabling includes:

 4-pair 100 ohm UTP


 2-pair 150 ohm STP
 2 fiber 62.5/125μm optical

NETWORK TOPOLOGY

1. Bus Topology - When computers were first networked together, they were simply
connected to one cable segment in a series.

2. Ring Topology – devices connected in a closed loop and have equal access.

3. Star Topology – Star topology is a point-to-point architectural design where all computer
devices are connected to a central hub, through which all data signals must travel.

11 Prepared by: MTGuillermo


DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology
Department

4. Hybrid Network Topology - Hybrid topology is any combination of bus, star, and ring
topology, for example, a star-bus configuration.

5. Mesh Topology - Every device is connected to every other device. Used in WANs to
interconnect LANs

6. Wireless Topology
 few cables are used to connect systems
 made up of transmitters that broadcast the packets using radio frequencies
 contains special transmitters called cells or wireless access point

12 Prepared by: MTGuillermo


DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology
Department
ACTIVITY 1: NETWORK DESIGN
Materials Needed

 Spreadsheet application
 Drawing application
 Cable cost analysis prepared

Work with a partner to create a list of questions you should ask a client who has hired you to
build a network. The client wants to know which type of cable you plan to use and why, how
much the cable will cost, and why you selected the particular topology. The client also wants
you to submit a proposal that defends your choice of cabling and network design.

After you create your questionnaire, role-play with your partner. One of you will assume the
role of client, and the other the role of the network designer. The client will answer all the
questions for a fictitious company of his/her choice. The network designer will record all of the
answers.

When the questionnaire is complete, you will both analyze the requirements and determine the
appropriate topology. Create a computer diagram of the proposed network for the client.
Prepare a spreadsheet that shows a cost analysis of the cable needed to complete the job. The
cost analysis should include the type of cable, length of cable, cost of each type of cable, and
the total cable cost. Use the cost information you gathered in the cabling lesson.

Submit a proposal to the client indicating the suggested network topology. Include a summary
to convince the client that this is the best, most cost efficient design for her/his needs. Your
proposal must also defend your cable choices. Attach the computer diagram and cable cost
analysis spreadsheet to your proposal.

Evaluation Criteria and Weightings

13 Prepared by: MTGuillermo


DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology
Department
Name: ________________________________________________ Section: _______________

Activity 1Building a Peer-to-Peer Network (XP meets 2003)

Objectives

Design and build a simple peer-to-peer network using a crossover cable supplied by the
instructor.
Verify connectivity between the peers using the ping command.
File and Printer Sharing

Background / Preparation

In this hands-on lab, you will plan and build a simple peer-to-peer network using two PCs and
an Ethernet crossover cable.

The following resources are required:

Two Window XP Professional PCs, each with an installed and functional Network
Interface Card (NIC)
An Ethernet crossover cable

Step 1: Diagram the network

a. A network diagram is a map of the logical topology of the network. In the space below,
sketch a simple peer-to-peer network connecting two PCs. Label one PC with IP address
192.168.1.1 and the other PC with IP address 192.168.1.2. Use labels to indicate connecting
media and any necessary network devices.

14 Prepared by: MTGuillermo


DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology
Department

b. A simple network like the one you designed can use a hub or switch as a central connecting
device, or the PCs may be directly connected. Which kind of cable is required for a direct
Ethernet connection between the two PCs?

____________________________________________________________________________

Step 2: Document the PCs

a. Check the computer name settings for each PC and make adjustments as necessary. For each
PC, select Start and Control Panel. Double-click the System icon, then click the Computer Name
tab. Write down the computer name that is displayed following Full computer name:

b. Check to see if the two PCs have the same name. If they do, change the name of one PC by
clicking the Change button, typing a new name in the Computer name field, then clicking OK.

c. Click OK to close the System Properties window.

15 Prepared by: MTGuillermo


DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology
Department
d. Why is it important that each PC on a network have a unique name?

Step 3: Connect the Ethernet cable

a. Use the Ethernet crossover cable provided by the instructor. Plug one end of the cable into
the
Ethernet NIC of PC1.

b. Plug the other end of the cable into the Ethernet NIC of PC2. As you insert the cable, you
should hear a click which indicates that the cable connector is properly inserted into the port.

Step 4: Verify physical connectivity

a. After the Ethernet crossover cable is connected to both PCs, take a close look at each
Ethernet port. A light (usually green or amber) indicates that physical connectivity has been
established between the two NICs. Try unplugging the cable from one PC then reconnecting it
to verify that the light goes off then back on.

b. Go to the Control Panel, double click the Network Connections icon, and confirm that the
local area connection is established. The following figure shows an active local area connection.
If physical connectivity problems exist, you will see a red X over the Local Area Connection icon
with the words Network cable unplugged.

16 Prepared by: MTGuillermo


DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology
Department
c. If the Local Area Connection does not indicate that it is connected, troubleshoot by repeating
Steps 3 and 4. You may also want to ask your instructor to confirm that you are using an
Ethernet crossover cable.

Step 5: Configure IP settings

a. Configure the logical addresses for the two PCs so that they are able to communicate
using TCP/IP. On one of the PCs, go to the Control Panel, double click the Network
Connections icon,
b. and then right click the connected Local Area Connection icon. Choose Properties from
the pull-down menu.

b. Using the scroll bar in the Local Area Connection Properties window, scroll down to highlight
Internet Protocol (TCP/IP). Click the Properties button.

c. Select the Use the following IP address radio button and enter the following information:

17 Prepared by: MTGuillermo


DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology
Department

d. Click OK, which will close the Internet Protocol (TCP/IP) Properties window. Click the Close
button to exit the Local Area Connection Properties window.

e. Repeat steps 5a – 5d for the second PC using the following information

Step 6: Verify IP connectivity between the two PCs

NOTE: To test TCP/IP connectivity between the PCs, Windows Firewall must be disabled
temporarily on both PCs. Windows Firewall should be re-enabled after the tests have been
completed.

a. On PC1, on the Windows XP desktop, click Start. From the Start menu, select Control Panel,
and double-click Network Connections.

b. Right-click the Local Area Connection icon and select Properties. Click the Advanced tab.
Locate and click the Settings button.:

c. Make a note of whether the firewall settings are ENABLED (ON) for the Ethernet port or
DISABLED (OFF) for the Ethernet port.
___________________________________________________________________________
18 Prepared by: MTGuillermo
DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology
Department

d. If the firewall settings are enabled, click the Off (not recommended) radio button to disable
the firewall. The setting will be re-enabled in a later step. Click OK in this dialog box and the
following to apply this setting.

e. Now that the two PCs are physically connected and configured correctly with IP addresses,
we need to make sure they communicate with each other. The ping command is a simple way
to accomplish this task. The ping command is included with the Windows XP operating system.
f. On PC1, go to Start, then Run. Type cmd, and then click OK. A Windows command prompt
window will appear as shown in the figure below.

g. At the > prompt, type ping 192.168.1.2 and press Enter. A successful ping will verify the IP
connectivity. It should produce results similar to those shown in here.

h. Repeat Steps 6a-6c on the second PC. The second PC will ping 192.168.1.1.

i. Close the Windows command prompt window on both PCs.


Step 7: Verify connectivity using My Network Places
a. A PC can share its resources with other PCs on the network. PCs with shared resources
should be visible through My Network Places. On PC1, go to Start, click My Network Places,
and then click View workgroup computers in the left pane

19 Prepared by: MTGuillermo


DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology
Department

b. Do you see an icon for the other PC in your peer-to-peer network?


______________________

c. What is the name of the other PC?


________________________________________________

d. Is it the same name you recorded in Step 2? ________________________________________

e. Perform Step 7a on the second PC.

f. Close any open windows.

Step 8: (Optional – Use only if the Firewall was originally ENABLED) Re-enable the firewall

a. If you disabled the Windows Firewall in Step 6, click Start, select Control Panel, and open the
Network Connections control panel.

b. Right-click the Ethernet network connection icon and select Properties. Click the Advanced
tab. Locate and click Settings.

c. If the firewall settings are disabled (and they were enabled before this lab began), click the
On radio button to enable the firewall. Click OK in this dialog box and the following one to apply
this setting.

Step 9: File and Printer Sharing

a. In PC 1 connect the printer. Create a text document in notepad file name: Your
Surname and save in folder name Test

20 Prepared by: MTGuillermo


DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology
Department

b. Share the printer and the folder Test

c. Using PC 2 copy the shared document in PC 1 (notepad) then print.

CHAPTER II: MANAGING USERS AND WINDOWS ENVIRONMENT

Objectives:
 Use Control Panel and Administrative Tools to manage hardware devices.

 Use the Microsoft Management Console to load snap-ins and create consoles.

 Create and troubleshoot user and group accounts

 Manage and troubleshoot user profiles

Outline:
A. Management Utilities
a. Control Panel
b. Administrative Tools
B. User and Group Management
C. User Profile Management
D. Working with Microsoft Management Console

Activity:
Activity 1: Display Administrative Tool in All Programs

Activity 2: Exploring Computer Management

Activity 2: Creating User and Group Accounts

21 Prepared by: MTGuillermo


DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology
Department
Activity 2: Create and Change Password

Activity 3: Changing a Group Membership

TOPIC A: Management Utilities


a. Control Panel
b. Administrative Tools

Control Panel

The control panel hosts the applets and utilities used to install and configure devices and
software (particularly services)

Control Panel View

a. Category View

b. Classic View

22 Prepared by: MTGuillermo


DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology
Department

Category view offers nine groupings for various common configuration changes. The following
table lists the categories and their related applets.

Category Related Applets


Accessibility Options Accessibility options
Add or Remove Programs Add or Remove Programs
Appearance and Themes Display, Folder Options, Taskbar and Start Menu
Date, Time, Language, and Regional Options Date, Time, Language, and Regional Options
Network and Internet Connections Internet Options, Network Connections
Performance and Maintenance Administrative Tools, Power Options, Scheduled
Tasks,
Printers and Other Hardware Game Controllers, Keyboard, Mouse, Phone and
Modem Options, Printers and Faxes, Scanners and
cameras
Sound, Speech and Audio Devices Sound, Speech and Audio Devices
User Accounts User Acounts

Administrative Tools

The Administrative Tools are a collection of system configuration utilities that are more
appropriate to an MMC console than to a Control Panel Applet.

The seven Administrative Tools are:

Tool Description
1. Component Services Used to administer COM and COM+
applications
23 Prepared by: MTGuillermo
DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology
Department
2. Data Sources (ODBC) Used to configure the OS to interact with
various database management systems, such
as SQL Server or FoxPro
3. Event Viewer View system messages regarding the failure
and or success of various key occurrences
within the Windows XP environment.
4. Local Security Policy Used to configure local security settings for a
system.
5. Performance Used to access System Monitor and the
Performance Logs and Alerts tool.
6. Services Used for stopping and starting services and
configuring the startup parameters for
services

7. Computer Management

Computer Management is an MMC console that serves as a common troubleshooting and


administration interfaces for several tools.

Three sections of Computer Management

1. System Tools
2. Storage
3. Services and Applications

System Tools

Tool Use this tool to

24 Prepared by: MTGuillermo


DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology
Department
Event Viewer View system messages regarding the failure
and or success of various key occurrences
within the Windows XP environment.
Shared Folders View the shared folders on the local system
Local Users and Groups Create and manage local user accounts and
groups
Performance Logs and Alerts Track performance counters and set alerts
Device Manager View and alter current hardware
configurations of all existing devices

Storage Devices
1. Removable Storage –used to manage removable media such as floppy disks, tapes, and
Zip drives
2. Disk Defragramenter – used to improve the layout of stored data on drives by
reassembling fragmented files and aggregating unused space.
3. Disk Management – used to view and alter partitioning and volume configuration of
hard drives.

Services and Applications


1. Indexing Service – used to define the corpus (collection of documents indexed for
searching) for indexing services
2. WMI Control – used to configure Windows Management Instrumentation

25 Prepared by: MTGuillermo


DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology
Department

Activity 1: Display Administrative Tool in All Programs


Step 1: Right Click Task Bar | Click Properties

1
Step 2: Click Start Menu | Click Customize

Step 3: Click Advance Tab

Set 4: Find the Administrative tool by dragging the


the scroll bar
2
Step 5: Click the option Display on the All Programs Menu |
Click OK

26 Prepared by: MTGuillermo


DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology
Department

5
4

Step 6: Click Apply | OK Button

To check if all ready in All Programs


Click Start button | All Programs | Administrative Tools

27 Prepared by: MTGuillermo


DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology
Department

ACTIVITY 2: EXPLORING COMPUTER MANAGEMENT


Step 1:
Option 1 Using Control Panel
Click Performance and Maintenance | Click Administrative Tools

28 Prepared by: MTGuillermo


DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology
Department
Option 2: If already in ALL PROGRAM
Click START | ALL PROGRAMS | ADMINISTRATIVE TOOLS

Step 2: Double-click COMPUTER MANAGEMENT

Step 3: Click EVENT VIEWER

Step 4: Double –Click SHARED FOLDERS | In the left-hand pane, click SHARES

29 Prepared by: MTGuillermo


DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology
Department

Step 5: Double-click LOCAL USERS AND GROUPS | In the left-hand pane, Click Users

30 Prepared by: MTGuillermo


DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology
Department
Step 6: Click DEVICE MANAGER | Click Action

Step 7: Choose File | Exit

31 Prepared by: MTGuillermo


DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology
Department
TOPIC B: USER AND GROUP MANAGEMENT
Type of User Accounts

1. Local User Accounts – exists on a single computer and can’t be used in any manner
with domain resources, or to gain domain access of any kind.
2. Domain User Account – exists in a domain or in any trusting domain by virtue of
being created on a domain controller.

Default user accounts


1. Administrator - has unlimited access to Windows XP computer
2. Guest - has limited access to resources; disabled by default

User Accounts in the Control Panel

Three different action from the User Account Interface

1. Change an account.
2. Create a new account.
3. Change the way users log on or off.

32 Prepared by: MTGuillermo


DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology
Department

User Accounts with Computer Management

The Local Users and Groups tool in Computer Management is used to create and manage local
users.

To Access Local Users and Groups

Right-click MY COMPUTER and Choose MANAGE

User Accounts

Local Users and


Group tools

User Node

33 Prepared by: MTGuillermo


DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology
Department

ACTIVITY 3: CREATING USER ACCOUNT USING COMPUTER MANAGEMENT

Step 1: On the Start Menu, right-click MY COMPUTER and choose MANAGE

2
3

Step 2: In the console tree, expand Local Users and Groups, and Select the Users Node

Step 3: Right-Click the Users node and choose New User

34 Prepared by: MTGuillermo


DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology
Department

Step 4: In the User name text box, type “your name”

Step 5: In the Password and Confirm password text boxes, type “your password”

Step 6: Uncheck User must change password at next logon

Step 7: Click Create

Step 8: Repeat this procedure to create 3 users

When you’re done, click Close

Step 9: Select the Users node, and observe the details pane

35 Prepared by: MTGuillermo


DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology
Department

GROUPS
Groups are named collections of users. Through the use of groups, administrators can manage
users at one time because at one time because a group’s settings can be defined once and
apply to all members of the group.

TYPES OF GROUPS

1. Local groups - exist only on a single computer

2. Global groups - exist in the domain

DEFAULT GROUPS

GROUP DESCRIPTION
Administrators Computer administrators have complete control
over the computer
Power Users Power Users can perform most actions that administrators can
perform, but they can only modify and delete accounts that they
create. Also, they can only modify group memberships that they
have created.
Users This is the default limited user account. Users can configure the
desktop systems and create files, but they cannot make any
configuration changes to the system, add or remove accounts, or
access other users’ folders.
Backup Operators Backup Operators can back up and restore files on the computer,
regardless of which user owns those files. Backup operators cannot
be changed.
Guests This enables a guest to log on to the computer. Guests can perform
basic computing actions, but do not have all of the abilities given to
the limited user accounts.
Network Configuration This provides some basic administrative privileges for the
Operators configuration of Windows XP’s networking features. Typically, under
local usage, the administrator would handle these functions.
Remote Desktop Users If Remote Desktop is configured, this group is provided for remote
desktop users to access theremote access connection.
36 Prepared by: MTGuillermo
DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology
Department
Replicator Use by special user accounts to facilitate directory replication
between system and domain. It has no default members
Help Services Group This is provided for the Help and Support Center.

SYSTEM GROUPS

System groups are preexisting groups that you can’t manage but that appear in dialog boxes
when assigned group membership or access permissions. These are groups are used by the
system to control or place restrictions on specific groups of users based on their activities.

 Anonymous Logon  Local Service

 Batch  Network

 Creator Group  Network Service

 Creator Owner  Remote Interactive Logon

 Dialup  Service

 Everyone  System

 Interactive  Terminal Server User

GROUP STRATEGIES

 Basic strategy

– Users assigned to global groups

– Global groups assigned to local groups

– Local groups assigned rights and permissions to resources

– Do not assign permissions to single users

 Plan groups carefully

 Create groups based on job function, geographic location, etc.

USER ACCOUNT TROUBLESHOOTING

37 Prepared by: MTGuillermo


DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology
Department
 Check for password errors

– Reset passwords if necessary

– Educate users on creating and remembering strong password

 Check group assignment and correct if necessary

ACTIVITY 4: CREATING GROUP ACCOUNT


Step 1: In Computer Management under Local Users and Groups, select the Groups node

Step 2: In the details pane, under the list of groups, right-click an empty area and choose New
Group

Step 3: Name the group Group01

Step 4: Click Add, and in the Enter the object names to select text box, type User01; User02

Step 5: Click OK

Step 6: Click Create

38 Prepared by: MTGuillermo


DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology
Department

Step 7: In the New Group dialog box, enter the new group name Group02

Step 8: Add User01 and User03 to the group

Step 9: Click Create and then Close

Step 10: Select the Group Nodes and observe the detail pane

39 Prepared by: MTGuillermo


DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology
Department

ACTIVITY 5: CHANGING USER’S PASSWORD

Step 1: Select the Users Node

Step 2: Right click User03 and Choose Set Password

Step 3: Click Proceed to close the warning dialog box

Step 4: In the New Password and Confirm password text boxes, type password03

Step 5: Observe the warning below the password text boxes.

Step 6: Click OK and OK again

40 Prepared by: MTGuillermo


DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology
Department

ACTIVITY 6: CHANGING A USER’S GROUP MEMBERSHIP

Step 1: Double-click User01

Step 2: Activate the Member Of tab

Step 3: Observe the list of groups

Step 4: Select the Group02 and click Remove

Step 5: Click Add

Step 6: Type the name Power Users and click OK

Step 7: Close Computer Management

41 Prepared by: MTGuillermo


DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology
Department

TOPIC C: USER PROFILE MANAGEMENT


USER PROFILES

- A collection of desktop and environmental configurations on a Windows XP system for a


specific user or group of users

- Located in \Documents and Settings folder, which includes

o My Documents

o Cookies

o Favorites

o Desktop

o Start menu

- Profile information in Ntuser.dat

The material stored in a user profile includes the files and folders in the following table.

File or folder Description


Application Data A folder containing user-specific data, such as
for Internet Explorer or Outlook
Cookies A folder containing cookies accepted by a user

42 Prepared by: MTGuillermo


DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology
Department
through the browser.
Desktop A folder containing the icons displayed on the
user’s desktop
My Recent Documents A file containing user-specific links to recently
accessed resources.
NetHood A folder containing user-specific network
mappings
PrintHood A folder containing user specific printing
mappings.
SendTo A folder containing user-specific links used in
the Send To command of the right-click pop-
up menu of files and folders.

File or folder Description


Start Menu A folder containing the user-specific Start menu layout
Templates A folder containing user specific templates
NTUSER.DAT A file containing Registry information specific to the
user.
NTUSER.DAT.LOG A transaction log file that ensures the profile can be re-
created in the event of failure.
NTUSER.INI A file containing profile-related settings, such as which
directories should not be uploaded to a roaming profile.

Default profile

 Used to create new user profiles


 New profiles created at first logon
 Default User and All Users profiles in \Documents and Settings

Local profiles vs. roaming profiles

43 Prepared by: MTGuillermo


DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology
Department
 Local profiles exist only on a single Windows XP computer

 Roaming profiles stored on network server and downloaded to any computer the user
logs on to

Mandatory profiles

 Enforces specific environment settings


 Rename user’s profile from Ntuser.dat to Ntuser.man

User profile troubleshooting

 Trouble with all user profiles or just a single profile?

 Create new user account to test Default User profile

 Log on to multiple computers to test roaming profile

 Ensure enough free space

 Delete corrupt folders or files

 Verify access permissions

 Last resort: Create a new user profile

44 Prepared by: MTGuillermo


DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology
Department

CHAPTER III: TCP/IP

OBJECTIVE:

Describe the characteristic of TCP/IP


Learn IPv4 and IPv6
Learn Custom Subnet

OUTLINE

A. TCP/IP Features
TCP/IP Components in Windows
B. Understanding IP ADDRESS

45 Prepared by: MTGuillermo


DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology
Department
Internet Protocol version 4 (IPv4)
Class of IPv4 Address
C. IPv4 Custom Subnetting
D. Internet Protocol version 6 (IPv6)
IPv6 Features
Differences of IPv4 and IPv6
IPv6 Implementations from Microsoft
Types of IPv6 Addressees
IPv6 Notation

ACTIVITY

Activity 1: Class Address and Default Subnet Mask Identification


Activity 2: IPv4 Custom Subnetting
Activity 3: IPv6 Address Notation Exercise
Activity 4: Enable IPv6 in Window XP

TOPIC A: TCP/IP FEATURES

Transmission Control Protocol/Internet Protocol (TCP/IP)

The basic language or protocol used for the Internet.

A suite of networking protocols, including both IPv4 and IPv6, that are widely used on the
Internet and that provide communication across interconnected networks of computers with
diverse hardware architectures and various operating systems.

Features of TCP/IP protocols:

 TCP/IP is independently developed from any specific hardware or operating systems


 It is open protocol standards and freely available
 It is widely used for the Internet, Intranet and Extranet
46 Prepared by: MTGuillermo
DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology
Department
 Most of the products manufactured by vendors have support for TCP/IP
 TCP/IP allows integration of different kind of networks
 It can run over an Ethernet, token ring, dial-up line or any other kinds of physical
transmission media
 TCP/IP has a common addressing scheme that allow device to uniquely address on
the entire network, even if the network is as large as the worldwide Internet
 TCP/IP standardized high-level protocols for consistent, widely available user services

TCP/IP Components in Windows

Advantages of TCP/IP components in


Advantages of the TCP/IP protocol suite Windows
A standard, routable enterprise networking protocol TCP/IP components in Windows enable
that is the most complete and accepted protocol enterprise networking and connectivity
available. All modern operating systems support for Windows and non-Windows–based
TCP/IP, and most large private networks rely on TCP/IP computers.
for much of their traffic.

47 Prepared by: MTGuillermo


DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology
Department
A technology for connecting dissimilar systems. Many TCP/IP components in Windows allow
TCP/IP application protocols were designed to access standards-based connectivity to other
and transfer data between dissimilar systems. These operating system platforms.
protocols include HTTP, FTP, and Telnet.

A robust, scaleable, cross-platform client/server TCP/IP components in Windows support


framework. the Windows Sockets application
programming interface, which
developers use to create client/server
applications.
A method of gaining access to the Internet. Windows-based computers are Internet-
ready.

TOPIC B: UNDERSTANDING IP ADDRESS

IP ADDRESS

 A unique identifier for a node or host connection on an IP network


 A 32 bit binary number usually represented as 4 decimal values consist of 4
octet

48 Prepared by: MTGuillermo


DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology
Department
Example : 140.179.220.200

Convert to binary

140 179 220 200


10001100 10110011 11011100 11001000
1st octet 2nd octet 3rd octet 4th octet

TWO TYPES OF IP ADDRESS

1. IPv4 – Ex. 192.168.1.2

2. IPv6 - 128 bits long and are represented by 16-bit hexadecimal segments

Ex. 2001:0D02:0000:0000:0000:C003:0001:F00D

Subnet Mask

Applying subnet mask allows to identify the network and host part of the IP address.

Looking at a subnet mask, if there is a 255 in an octet, then the corresponding octet in
the IP address is part of the network ID. For example, if I had an IP address of
192.168.1.15 and a subnet mask of 255.255.255.0, the fi rst three octets would make up
the network ID and the last octet would be the host ID. The network ID assigns a unique
address to the network itself, while the host ID uniquely identifies the system on the
network.

Address Classes

Every IP address belongs to a distinct address class. The Internet community defi ned
these classes to accommodate networks of various sizes. The class to which the IP
address belongs initially determines the network ID and host ID portions of the address,

49 Prepared by: MTGuillermo


DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology
Department
along with the number of hosts that are supported on that network. The different class
addresses are named Class A, Class B, Class C, Class D, and Class E.

Class A Addresses

IP address in which the first octet is between 1 and 126.

IP address that starts with 127 is a class A address as well, but you are not allowed to
use any address that starts with 127 because it is reserved for the loopback address

Loopback Address

A range of 127 has been reserved for the loopback address. The loopback address is
used to refer to the local system, also known as the local host. If you want to verify that
the TCP/IP software has initialized on the local system even though you may not have an
IP address, you may PING the loopback address, which is typically referred to as
127.0.0.1.

You can test your own local system by typing ping 127.0.0.1, ping local host, or ping
loopback, to verify that the TCP/IP protocol stack is functioning on your system.

Default subnet mask

Class A 255.0.0.0

255 0 0 0
NNNNNNNN HHHHHHHH HHHHHHHH HHHHHHHH
11111111 00000000 00000000 00000000

Class B Addresses

IP address in which the value of the first octet is between 128 and 191.

50 Prepared by: MTGuillermo


DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology
Department

Default subnet mask

255.255.0.0

255 255 0 0
NNNNNNNN NNNNNNNN HHHHHHHH HHHHHHHH
11111111 11111111 00000000 00000000

Class C Addresses

IP address in which the value of the first octet is between 192 and 223.

Default subnet mask

255.255.255.0

255 255 255 0


NNNNNNNN NNNNNNNN NNNNNNNN HHHHHHHH
11111111 11111111 11111111 00000000

Class D Addresses

Class D addresses are used for special types of applications on the network known as
multicasting applications. Multicasting applications send data to a number of systems at
the same time by sending data to the multicast address, and anyone who has registered
with that address will receive the data. A multicast address is what class D addresses are
used for, so you will not be assigning them specifically to hosts on the network for
normal network communication. Class D addresses have a value on the first octet that
ranges from 224 to 239.

Class E Addresses
Class E addresses is that were designed for experimental purposes only, so you will not
ever see a class E address on a network. Class E addresses have a first octet with a value
that falls in the range of 240 to 254.
51 Prepared by: MTGuillermo
DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology
Department

Summary

CLASS 1ST Octet Value Default Subnet Number of Host


Mask per Network
CLASS A 1–126 255.0.0.0 16,777,214
CLASS B 128–191 255.255.0.0 65,534
CLASS C 192–223 255.255.255.0 254
CLASS D 224 to 239.
CLASS E 240 to 255

Private Addresses

Another type of address you need to be aware of is what is known as a private address.
A private address is an address that can be assigned to a system but cannot be used for
any kind of Internet connectivity. The private addresses are nonroutable addresses, so
any system using them will not be able to function off the network. The following are
the three address ranges that are the private address ranges:

■ 10.0.0.0 to 10.255.255.255
■ 172.16.0.0 to 172.31.255.255
■ 192.168.0.0 to 192.168.255.255

Not being able to route data across the Internet when using these addresses will not
pose a problem, because realistically, you will have these private addresses sitting
behind a network address translation (NAT) server that will translate the private address
to a public address that can be routed on the Internet

Name: ________________________________________________ Section: _______________

52 Prepared by: MTGuillermo


DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology
Department

ACTIVITY 1: ADDRESS CLASS AND DEFAULT SUBNET MASK IDENTIFICATION

In this activity you will practice identifying address classes for different IP addresses and their
associated subnet masks.

I. Address Class Identification

ADDRESS CLASS
1. 192.168.20.10
2. 10.6.5.4
3. 126.12.34.56
4. 223.222.224.34
5. 120.45.78.9
6. 189.45.89.90
7. 220.126.23.45
8. 90.12.34.78
9. 12.23.67.43
10. 15.10.35.7
11. 33.0.0.0
12. 215.23.56.78
13. 249.70.80.9
14. 230.45.90.70
15. 225.225.225.225
16. 190.90.80.70
17. 250.39.87.7
18. 12.34.90.8
19. 198.89.5.8
20. 7.9.0.0

II. Default Subnet Masks

53 Prepared by: MTGuillermo


DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology
Department
Write the correct subnet mask of each of the ff. addresses.

ADDRESS SUBNET MASK


1. 192.168.1.3

2. 200.56.7.8

3. 3.1.2.3
4. 30.45.7.8.9
5. 223.4.5.78
6. 129.45.86.9
7. 190.45.76.8
8. 80.0.0.0
9. 220.45.89.7
10. 123.45.7.8

11. 120.78..45.44
12. 195.45.80.76
13. 10.10.10.10
14. 129.45.7.8
15. 55.12.30.0

TOPIC C: IPv4 CUSTOM SUBNETTING

SUBNETTING

 The purpose of subnetting is to break one network ID into multiple subnetworks


(subnets) so that you can follow the physical structure of the network.

 With subnetting you take host bits from the subnet mask and mask them to be
network bits—thus creating more networks but fewer machines per network.

 To determine how many bits to take from the host ID portion of the subnet
mask.

54 Prepared by: MTGuillermo


DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology
Department

STEPS IN SUBNETTING

1. Determine the number of networks and convert in to binary.

2. Reserve bits in subnet mask and find your increment

3. Use your increment to find your network ranges

SUBNETTING BASE ON NETWORKS

Given:

IP Address = 216.21.5.0 Default subnet mask = 255.255.255.0 Subnet = 5

1. Determine the number of networks and convert to binary.

Subnet = 5 convert to binary

5 = 101 = 3 bits

2. Reserve bits in subnet mask and find your increment

Default 255 255 255 0


Subnet
NNNNNNNN NNNNNNNN NNNNNNNN HHHHHHHH
Binary ADD THE 3 BITS
equivalent 11111111 11111111 11111111 11100000
Custom NNNNNNNN NNNNNNNN NNNNNNNN NNNHHHHH
Subnet
255 255 255 224
The Increment is the lowest network bits
55 Prepared by: MTGuillermo
DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology
Department

3. Use your increment to find your network ranges.

Add the increment which is 32

Subnet 1 216.21.5.0 to 216.21.5.31

Subnet 2 216.21.5.32 to 216.21.5.63

Subnet 3 216.21.5.64 to 216.21.5.95

Subnet 4 216.21.5.96 to 216.21.5.127

Subnet 5 216.21.5.128 to 216.21.5.159

Invalid IP Address is the first and last IP address of each subnet

1st IP Address – identify the nework/nework ID

Last IP Address – broadcast address

Network ID First Valid Last Valid Broadcast Subnet Mask


Host Host
Subnet 1 216.21.5.0 216.21.5.1 216.21.5.30 216.21.5.31 255.255.255.224
Subnet 2 216.21.5.32 216.21.5.33 216.21.5.62 216.21.5.63 255.255.255.224
Subnet 3 216.21.5.64 216.21.5.65 216.21.5.95 216.21.5.96 255.255.255.224
Subnet 4 216.21.5.96 216.21.5.96 216.21.5.126 216.21.5.127 255.255.255.224
Subnet 5 216.21.5.128 216.21.5.129 216.21.5.158 216.21.5.159 255.255.255.224

56 Prepared by: MTGuillermo


DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology
Department
Formula to determine the number of networks

Number of networks = 2n

Where n is equal to number of 1’s in the subnet mask

255 255 255 224


11111111 11111111 11111111 11100000

Number of networks = 227

= 134,217,728

Formula to determine the number of host

Number of Host = 2n – 2

Where n is equal to the number of O’s in the subnet mask

Number of Host = 25 – 2

= 30

Subtract 2 because the 1st and last IP address is not valid it is used as Nework ID and Broadcast
Address

Name: ________________________________________________ Section: _______________

ACTIVTY 2 : IPv4 CUSTOM SUBNETTING

Question No. 1

57 Prepared by: MTGuillermo


DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology
Department
The network ID of the class A address is 120.0.0.0. Take a few pieces of paper and calculate the
new subnet mask, network ID, fi rst valid address, last valid address, and the broadcast address
of the four subnets. Once you have calculated your answer, fill in the following table.

Network ID First Valid Last Valid Broadcast Subnet Mask


Host Host
Subnet 1
Subnet 2
Subnet 3
Subnet 4

Find the total number of networks and number of host.

Question No. 2

You are responsible for subnetting the network ID of 190.34.0.0 into eight subnets. Take some
paper and walk through your binary work of subnetting this class B network into eight subnets.
Once you have calculated the information on paper, fill in the following table.

Network ID First Valid Last Valid Broadcast Subnet Mask


Host Host
Subnet 1
Subnet 2
Subnet 3
Subnet 4
Subnet 5
Subnet 6
Subnet 7
Subnet 8

Find the total number of networks and number of host.

Question No. 3

Your manager has purchased a class C network range and has asked that you subnet this class C
into two subnets for the two network segments that are going to be built. One network

58 Prepared by: MTGuillermo


DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology
Department
segment will host client machines used by customers to do online ordering, and the other
segment will host the corporate machines used by your employees.

The class C network ID that you have purchased is 216.83.11.0. Once again, take a piece of
paper and start by writing out the default subnet mask of this class C address and then start
manipulating the host bits to get the network ID, first valid host ID, last valid host ID, broadcast
address, and new subnet mask. Once you have calculated all the required information, fill in the
following table:

Network ID First Valid Last Valid Broadcast Subnet Mask


Host Host
Subnet 1
Subnet 2

Find the total number of networks and number of host.

Question No. 4

Subnet this physical network structure.

TOPIC D: INTERNET PROTOCOL VERSION 6

59 Prepared by: MTGuillermo


DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology
Department
IPv6 (Internet Protocol Version 6)

 IPv6 is a new version of IP which is designed to be an evolutionary step from IPv4


 The key to IPv6 enhancement is the expansion of the IP address space from 32 bits to
128 bits, enabling virtually unlimited unique IP addresses
 It is recommended by the Internet Engineering Task Force on July 25, 1994 (Toronto
IETF meeting)
 The IPv6 has auto configuration feature, automatically configures interface and Brouter
addresses for you
 IPv6 protocol can coexist with current IPv4 protocol

The IPv6 Address Space

IPv6 Conversion
Hexidecimal to Binary Conversion

60 Prepared by: MTGuillermo


DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology
Department

Pv6 Features
The following are the features of the IPv6 protocol:

 New header format


 Large address space
 Efficient and hierarchical addressing and routing infrastructure
 Stateless and stateful address configuration
 Built-in security
 Better support for prioritized delivery
 New protocol for neighboring node interaction
 Extensibility

IPv6 Implementations from Microsoft


Microsoft® has the following implementations of IPv6:

 The Next Generation TCP/IP stack in Windows Vista™ and Windows Server® 2008.
 The IPv6 protocol for the Windows Server 2003 family.
 The IPv6 protocol for Windows® XP Service Pack 1 (SP1) and later.
 The IPv6 protocol for Windows CE .NET version 4.1 and later.
The capture and parsing of IPv6 traffic is supported by Microsoft Network Monitor.

For all the IPv6 implementations from Microsoft, you can use IPv6 without affecting IPv4
communications.

IPv6 address notation

There are three possible notation types that can be used to represent IPv6 addresses. The
notation you use depends on the content of the address you want to represent.

1. Standard notation 
The standard notation for IPv6 addresses is to represent the address as eight 16-bit
hexadecimal words separated by ``:'' (colons). For example:

FEDC:BA98:0332:0000:CF8A:000C:2154:7313

61 Prepared by: MTGuillermo


DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology
Department

NOTE: It is not necessary to specify leading zeros, as long as there is at least one
numeric value in each field of the address. The above address could also be represented
as FEDC:BA98:332:0:CF8A:C:2154:7313.

2. Compressed notation 
Since a large number of IPv6 addresses contain multiple fields of zeros, there is a
notation you can use to represent a single contiguous group of zero fields within an IPv6
address. This notation is a double colon ``::''. Some examples of how to use the ``::'' are
shown below.

1762:0:0:0:0:B03:1:AF18
FF01:0:0:0:CA:0:0:2
0:0:0:0:0:0:0:1
0:0:0:0:0:0:0:0

can be represented as:

1762::B03:1:AF18
FF01::CA:0:0:2
::1
::

NOTE: The FF01:0:0:0:CA:0:0:2 example is represented as FF01::CA:0:0:2 because only one ``::''


is allowed in an address.

3. Mixed notation 
IPv4 addresses that are encapsulated in IPv6 addresses can be represented using the
original IPv4 ``.'' notation as follows:

0:0:0:0:0:0:127.32.67.15
0:0:0:0:0:FFFF:127.32.67.15

It is also possible to use the compressed notation, so the addresses above would be
represented as:
::127.32.67.15
::FFFF:127.32.67.15

62 Prepared by: MTGuillermo


DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology
Department
IPv6 Prefixes
The prefix is the part of the address that indicates the bits that have fixed values or are the bits
of the subnet prefix. Prefixes for IPv6 subnets, routes, and address ranges are expressed in the
same way as Classless Inter-Domain Routing (CIDR) notation for IPv4. An IPv6 prefix is written in

address/prefix-length notation. For example, 21DA:D3::/48 and 21DA:D3:0:2F3B::/64 are IPv6


address prefixes.

IPv6 Subnet Masking

What Gets Masked (Which Bits?)


Like IPv4, an IPv6 address has a network portion and a device portion. Unlike IPv4, an IPv6
address has a dedicated subnetting portion. Here's how the ranges are divided in IPv6:

Network Address Range


In IPv6, the first 48 bits are for Internet routing.
1111111111111111.1111111111111111.1111111111111111.0000000000000000.0000000000
000000.0000000000000000.0000000000000000.0000000000000000

Subnetting Range
The 16 bits from the 49th to the 54th are for defining subnets.
0000000000000000.0000000000000000.0000000000000000.1111111111111111.0000000000
000000.0000000000000000.0000000000000000.0000000000000000

Device (Interface) Range:


The last 64 bits are for device (interface) ID's.
0000000000000000.0000000000000000.0000000000000000.0000000000000000.1111111111
111111.1111111111111111.1111111111111111.1111111111111111

Let's say you want to break your corporate network into 64 subnets. The binary mask just for
the subnetting range would be1111110000000000 which translates to a hex value of FC00.
Some IPv6 masking tools will work with just this one hex word, otherwise a full 128-bit hex
mask would be FFFF:FFFF:FFFF:FC00:0:0:0:0.

Types of IPv6 Addresses

1. Unicast - communicate specified 1 computer

63 Prepared by: MTGuillermo


DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology
Department
2. Multicast - communicate group of computers

3. Anycast
 send group address that can receive multiple computers,but receive 1 computer

Unicast IPv6 Addresses


The following types of addresses are unicast IPv6 addresses:

 Global unicast addresses


Global unicast addresses are equivalent to public IPv4 addresses. They are globally
routable and reachable on the IPv6 portion of the Internet.
 Link-local addresses
Link-local addresses are used by nodes when communicating with neighboring nodes on the
same link. For example, on a single link IPv6 network with no router, link-local addresses
are used to communicate between hosts on the link.
 Site-local addresses
Site-local addresses are equivalent to the IPv4 private address space (10.0.0.0/8,
172.16.0.0/12, and 192.168.0.0/16).
 Unique local IPv6 unicast addresses
 Special addresses

Special IPv6 Addresses


The following are special IPv6 addresses:

 Unspecified address
The unspecified address (0:0:0:0:0:0:0:0 or ::) is only used to indicate the absence of an
address.

 Loopback address

The loopback address (0:0:0:0:0:0:0:1 or ::1) is used to identify a loopback interface,


enabling a node to send packets to itself.

64 Prepared by: MTGuillermo


DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology
Department
Compatibility Addresses
To aid in the migration from IPv4 to IPv6 and the coexistence of both types of hosts, the
following addresses are defined:

 IPv4-compatible address
The IPv4-compatible address, 0:0:0:0:0:0:w.x.y.z or ::w.x.y.z (where w.x.y.z is the dotted
decimal representation of an IPv4 address), is used by IPv6/IPv4 nodes that are
communicating using IPv6.

 IPv4-mapped address
The IPv4-mapped address, 0:0:0:0:0:FFFF:w.x.y.z or ::FFFF:w.x.y.z, is used to represent
an IPv4-only node to an IPv6 node. It is used only for internal representation.

 6 to 4 address
The 6to4 address is used for communicating between two nodes running both IPv4 and
IPv6 over an IPv4 routing infrastructure. The 6to4 address is formed by combining the
prefix 2002::/16 with the 32 bits of a public IPv4 address, forming a 48-bit prefix. 6to4 is
a tunneling technique described in RFC 3056.

IPv4 Addresses and IPv6 Equivalents


IPv4 Address IPv6 Address
Internet address classes Not applicable in IPv6
Multicast addresses (224.0.0.0/4) IPv6 multicast addresses (FF00::/8)
Broadcast addresses Not applicable in IPv6
Unspecified address is 0.0.0.0 Unspecified address is ::
Loopback address is 127.0.0.1 Loopback address is ::1
Public IP addresses Global unicast addresses
Private IP addresses (10.0.0.0/8, Site-local addresses (FEC0::/10)
172.16.0.0/12, and 192.168.0.0/16)

Autoconfigured addresses (169.254.0.0/16) Link-local addresses (FE80::/64)

Text representation: Dotted decimal notation Text representation: Colon hexadecimal


format with suppression of leading zeros and
zero compression. IPv4-compatible addresses
are expressed in dotted decimal notation.

65 Prepared by: MTGuillermo


DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology
Department
Network bits representation: Subnet mask in Network bits representation: Prefix length
dotted decimal notation or prefix length notation only

DNS name resolution: IPv4 host address (A) DNS name resolution: IPv6 host address
resource record (AAAA) resource record
DNS reverse resolution: IN-ADDR.ARPA DNS reverse resolution: IP6.ARPA domain
domain

Name: ________________________________________________ Section: _______________

ACTIVITY 3: IPv6 Address Notation Exercise


In case multiple answers are possible, please circle all correct ones.

1. You have a /32 prefix starting with 2001:0db8. How do you search for it in the RIPE
Database?

A. 2001:0db8 B. 2001:0db8/32 C. 2001:0db8::/32 D. 2001:db8::/32

2. How do you correctly compress the following IPv6 address:


2001:0db8:0000:0000:0000:0000:0000:0c50

A.2001:0db8:0:0:0:0:0:0c50 B.2001:0db8::0c50 C.2001:db8::c50 D.2001:db8::c5

3. How do you correctly compress the following IPv6 address:


2001:0db8:0000:0000:b450:0000:0000:00b4

A.2001:db8::b450::b4 C.2001:db8::b45:0000:0000:b4
B.2001:db8::b450:0:0:b4 D.2001:db8:0:0:b450::b4

4. How do you correctly compress the following IPv6 address:


2001:0db8:00f0:0000:0000:03d0:0000:00ff

A.2001:0db8:00f0::3d0:0:00ff C.2001:db8:f0::3d0:0:ff

66 Prepared by: MTGuillermo


DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology
Department
B.2001:db8:f0:0:0:3d0:0:ff D.2001:0db8:0f0:0:0:3d0:0:0ff

5. How do you correctly compress the following IPv6 address:


2001:0db8:0f3c:00d7:7dab:03d0:0000:00ff

A.2001:db8:f3c:d7:7dab:3d:0:ff C.2001:db8:f3c:d7:7dab:3d0::ff
B.2001:db8:f3c:d7:7dab:3d0:0:ff D.2001:0db8:0f3c:00d7:7dab:03d::00ff

ACTIVITY: Enable IPv6 to WinXP

There are two alternative methods for activation IPv6 in WinXP (SP2)

 Use the WinXP GUI to install the new protocol

 From a CLI run “ipv6 install”

67 Prepared by: MTGuillermo


DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology
Department

CHAPTER 5: NETWORK ON A WORKGROUP USING WINDOWS XP

OBJECTIVE:

Setting up a workgroup
Troubleshoot TCP/IP
Manage Connection
Configure Network Bridges
Mapped Network Drive

OUTLINE

A. Types of Workgroup
B. Setting up a Workgroup
C. Configuring Network Bridges
D. Managing Connection
E. Configuring TCP/IP
F. Troubleshooting Connections
G. Mapping Network Drives

68 Prepared by: MTGuillermo


DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology
Department

ACTIVITY:
Activity 1: Building Peer to Peer using Switch
Activity 2: Setting up NetMeeting
Activity 3: Internet Café Software Installation
Activity 4: Building a Network using 4 switch (Use Packet Tracer)

TOPIC A: TYPES OF WORKGROUPS

Workgroup

A group of computers that are connected on a network and share resources, such as
printers and files. When you set up a network, Windows automatically creates a
workgroup and gives it a name.

TYPES OF WORKGROUP

1. Direct Cable Connection


A Direct Cable Connection (DCC) is not really a workgroup configuration in the true
sense of the word, but it does bear mentioning here because it is a quick and easy
method to connect two computers together.

Using a DCC, you can establish a connection between a Windows XP computer and any
other Microsoft Windows computer that supports DCC connections.

2. Ethernet
Ethernet is a networking standard and the most popular kind of network in use
today. When you think of a network with a typical wired configuration, you are
generally thinking of Ethernet.

3. HomePNA

69 Prepared by: MTGuillermo


DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology
Department
HomePNA is another type of network topology that is designed for home use, but it
works well in small offices too. HomePNA networks use typical PCI or USB NICs,
but each NIC connects to a standard phone jack in the home or small office using a
standard RJ-11 phone cable. Rather than using a hub and having wiring running
everywhere, you simply use existing phone lines as the network.

4. Wireless Networks

Major Type of Wireless Network

1. Infrared—Infrared wireless uses an infrared beam to transmit data from one device
to the next, and is most often used in PC devices.

2. Wireless Personal Area Networks (WPANs)—A WPAN is a personal areanetwork,


meaning it resides in one generalized space, such as a room.

3. Wireless Local Area Networks (WLANs)—A WLAN is a wireless network that exists
within one geographic location, such as in a home, office building, school, or other
such structure.

4. Wireless Metropolitan Area Networks (WMANs)—WMANs allow communication


between different locations within a single metropolitan area.

5. Wireless Wide Area Networks (WWANs)—A WWAN connects WLANs that are
separated over wide geographic areas.

70 Prepared by: MTGuillermo


DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology
Department

TOPIC B: Setting up a Workgroup

Creating a workgroup

A. 1ST Method

1. Click the Start button and then


click Control Panel

71 Prepared by: MTGuillermo


DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology
Department
2. Double click System icon of
control panel

A view of System Properties

3. Click the Computer Name Tab

4. Click button to
change current computer name and
workgroup

5. To join an existing workgroup, 6. To create a new workgroup, type the name of the
type the name of the workgroup workgroup that you want to create, and
that you want to join, and then click OK.
then click OK.

72 Prepared by: MTGuillermo


DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology
Department
Notes
 Assign each computer a
different, meaningful name.
 Assign each computer to the
same workgroup.

7. Click OK

8. To restart your computer click


YES.

9. You have successfully created or joined a workgroup.

B. 2ND Method

73 Prepared by: MTGuillermo


DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology
Department
1. Right-click my computer icon
and choose properties.

2. Click COMPUTER NAME TAB


THEN CLICK CHANGE BUTTON

 Type Computer Name.

Example : Station1

 Click Workgroup

 Type the Workgroup name

Example: Networking

3. Click Ok

Files and Folders Sharing

74 Prepared by: MTGuillermo


DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology
Department
Network users can access the files and folders that are shared. Resources that are not set up for
sharing remain private. For example, you can enable the following resources for sharing:

 Folders
 Drives
 Printers
 Internet access

Sharing files and folders

1. Locate the file and folder which you want to share

2. Right-click the file that you want to share, and then click Sharing and Security to view
additional settings.

3. Remote access is turned off by default. Click the Security warning message:
If you understand the security risks but want to share files without running the wizard, click
here.

75 Prepared by: MTGuillermo


DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology
Department
4. Select Just enable file sharing and click OK

5. Click Share this folder on the network, and then type a share name. You can use this name
later to access the data. You can Allow network users to change files by enabling it.
Click OK

Notes: The share name and the folder name do not have to be the same.

6. The shared folder will appear like this (with a hand under the folder)

7. You have successfully shared a folder.

76 Prepared by: MTGuillermo


DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology
Department

Name: ________________________________________________ Section: _______________

Activity 2: Building a Switch Based Network

Objectives

Design and build a simple peer-to-peer network using a straight through cable supplied
by the instructor.
Verify connectivity between the peers using the ping command.
File and Printer Sharing

Background / Preparation

In this hands-on lab, you will plan and build a simple network using switch, PCs and an
Ethernet straight through cable.

The following resources are required:

Four Window XP Professional PCs, each with an installed and functional Network
Interface Card (NIC)
An Ethernet straight through cable
Switch

Diagram:

77 Prepared by: MTGuillermo


DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology
Department

Procedure:

1. Connect PCs to a SWITCH as shown in the diagram. What cable type is used?

2. How would you know if you have connectivity?

3. If you do not have connectivity check the following:


d. Switch/PC powered on?

e. Correct cables used?

4. From your command prompt, ping the IP address of another PC.

a. Are pings between other PC’s also seen? ___________________________________

b. What is the average time for a ping? ______________________________________

78 Prepared by: MTGuillermo


DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology
Department
c. Which is faster hub or switch? ___________________________________________

5. Can you ping the switch? Why not?

________________________________________________________________________

6. Connect and share the printer in PC 1

7. Create a document, share and print.

79 Prepared by: MTGuillermo

Вам также может понравиться