Академический Документы
Профессиональный Документы
Культура Документы
OBJECTIVE:
Plan and design network
Identify and describe the elements that are recommended for structured cabling networks.
OUTLINE:
A. Planning a Network
B. Selecting a Network
C. Network Model
D. Structured Cabling
ACTIVITY:
Here are some general thoughts to keep in mind while you create your network plan:
3. Type of Server
One of the most basic questions that a network plan must answer is whether the network
will have one or more dedicated servers or rely completely on peer-to-peer networking.
a. File Servers
b. Print Servers
c. Mail Servers
4. Choosing a NOS
If you determine that your network will require one or more dedicated servers, the next
step is to determine what network operating system those servers should use. If possible,
all the servers should use the same NOS so that you don’t find yourself supporting
different operating systems.
Although you can choose from many network operating systems, from a practical point
of view, your choices are limited to the following:
6. Drawing Diagrams
One of the most helpful techniques for creating a network plan is to draw a picture of it.
The diagram can be a detailed floor plan, showing the actual location of each network
component. This type of diagram is sometimes called a physical map.
A wired Ethernet network consists of two or more computers connected together through an
Ethernet cable. This connection type is commonly used in offices around the world and can be
used to build computer networks in the home.
You are building a new home or your existing home already has Ethernet cable installed
in each room that has a device you want to connect
You are creating a network in an office or business where network speed is more
important than moving about with your computer
A wireless Ethernet network is ideal for creating a home or office network or adding mobility to
an existing wired Ethernet network. A wireless Ethernet network allows you the freedom to
move about your home or office with your notebook or tablet PC.
Create a wireless Ethernet (IEEE 802.11a, IEEE 802.11b, IEEE 802.11g or 802.11n) network if:
1. Workgroup Model
Microsoft’s workgroup model for networking distributes resources, administration, and
security throughout a network. Each computer in a workgroup can be a server, a client,
or both.
Advantage Disadvantage
Easy-to-share resources No centralized control of resources
Resources are distributed across all No centralized account management
machines
Little administrative overhead No centralized administration
Simple to design No centralized security management
Easy to implement Inefficient for more than 20 workstations
Convenient for small groups in close Security must be configured manually
proximity
Less expensive, does not require a central Increased training to operate as both client
server and server
2. Domain Model
By dedicating one or more servers to the job of controlling a domain, the domain model
adds a layer of complexity to networking. But the domain model also centralizes all
shared resources and creates a single point of administrative and security control.
Advantage Disadvantage
Centralized resource sharing Significant administrative effort and
overhead
Centralized resource controls Complicated designs; requires advanced
Building Entrance Requirements - Specifications for the point at which outside cabling
enters a building.
Equipment Room - Storage area for the more expensive, complex equipment, often the
existing telecommunications closets.
Backbone Cabling - Cabling (often referred to as vertical) that carries the signals from
equipment room to equipment room, between floors, and to and from the building
entrance connections.
Horizontal Cabling- ransmission media that carries signals from a same floor equipment
room to the various work areas.
Work Area - Any area where the computer workstations, printers, etc. are located,
typically office space.
The wiring used for backbone cabling may be either copper or fiber optic.
Recommended backbone cable maximum distance limitations include:
Voice grade 100 ohm UTP 800 meter limitation
STP data grade 150 ohm 90 meter limitation
Multimode 62.5/125μm fiber 2,000 meter limitation
Patch cable 3 - 6 meter limitation
Horizontal Cabling
Most often, horizontal cable is routed directly from the wiring closet to the workstation,
without splices, cable junctures, or taps. By eliminating splices, cable junctures and/or taps, the
potential for faulty connections and electrical noise is reduced. Although not necessary, it is
recommended that horizontal cabling be rated for category 5 use.
NETWORK TOPOLOGY
1. Bus Topology - When computers were first networked together, they were simply
connected to one cable segment in a series.
2. Ring Topology – devices connected in a closed loop and have equal access.
3. Star Topology – Star topology is a point-to-point architectural design where all computer
devices are connected to a central hub, through which all data signals must travel.
4. Hybrid Network Topology - Hybrid topology is any combination of bus, star, and ring
topology, for example, a star-bus configuration.
5. Mesh Topology - Every device is connected to every other device. Used in WANs to
interconnect LANs
6. Wireless Topology
few cables are used to connect systems
made up of transmitters that broadcast the packets using radio frequencies
contains special transmitters called cells or wireless access point
Spreadsheet application
Drawing application
Cable cost analysis prepared
Work with a partner to create a list of questions you should ask a client who has hired you to
build a network. The client wants to know which type of cable you plan to use and why, how
much the cable will cost, and why you selected the particular topology. The client also wants
you to submit a proposal that defends your choice of cabling and network design.
After you create your questionnaire, role-play with your partner. One of you will assume the
role of client, and the other the role of the network designer. The client will answer all the
questions for a fictitious company of his/her choice. The network designer will record all of the
answers.
When the questionnaire is complete, you will both analyze the requirements and determine the
appropriate topology. Create a computer diagram of the proposed network for the client.
Prepare a spreadsheet that shows a cost analysis of the cable needed to complete the job. The
cost analysis should include the type of cable, length of cable, cost of each type of cable, and
the total cable cost. Use the cost information you gathered in the cabling lesson.
Submit a proposal to the client indicating the suggested network topology. Include a summary
to convince the client that this is the best, most cost efficient design for her/his needs. Your
proposal must also defend your cable choices. Attach the computer diagram and cable cost
analysis spreadsheet to your proposal.
Objectives
Design and build a simple peer-to-peer network using a crossover cable supplied by the
instructor.
Verify connectivity between the peers using the ping command.
File and Printer Sharing
Background / Preparation
In this hands-on lab, you will plan and build a simple peer-to-peer network using two PCs and
an Ethernet crossover cable.
Two Window XP Professional PCs, each with an installed and functional Network
Interface Card (NIC)
An Ethernet crossover cable
a. A network diagram is a map of the logical topology of the network. In the space below,
sketch a simple peer-to-peer network connecting two PCs. Label one PC with IP address
192.168.1.1 and the other PC with IP address 192.168.1.2. Use labels to indicate connecting
media and any necessary network devices.
b. A simple network like the one you designed can use a hub or switch as a central connecting
device, or the PCs may be directly connected. Which kind of cable is required for a direct
Ethernet connection between the two PCs?
____________________________________________________________________________
a. Check the computer name settings for each PC and make adjustments as necessary. For each
PC, select Start and Control Panel. Double-click the System icon, then click the Computer Name
tab. Write down the computer name that is displayed following Full computer name:
b. Check to see if the two PCs have the same name. If they do, change the name of one PC by
clicking the Change button, typing a new name in the Computer name field, then clicking OK.
a. Use the Ethernet crossover cable provided by the instructor. Plug one end of the cable into
the
Ethernet NIC of PC1.
b. Plug the other end of the cable into the Ethernet NIC of PC2. As you insert the cable, you
should hear a click which indicates that the cable connector is properly inserted into the port.
a. After the Ethernet crossover cable is connected to both PCs, take a close look at each
Ethernet port. A light (usually green or amber) indicates that physical connectivity has been
established between the two NICs. Try unplugging the cable from one PC then reconnecting it
to verify that the light goes off then back on.
b. Go to the Control Panel, double click the Network Connections icon, and confirm that the
local area connection is established. The following figure shows an active local area connection.
If physical connectivity problems exist, you will see a red X over the Local Area Connection icon
with the words Network cable unplugged.
a. Configure the logical addresses for the two PCs so that they are able to communicate
using TCP/IP. On one of the PCs, go to the Control Panel, double click the Network
Connections icon,
b. and then right click the connected Local Area Connection icon. Choose Properties from
the pull-down menu.
b. Using the scroll bar in the Local Area Connection Properties window, scroll down to highlight
Internet Protocol (TCP/IP). Click the Properties button.
c. Select the Use the following IP address radio button and enter the following information:
d. Click OK, which will close the Internet Protocol (TCP/IP) Properties window. Click the Close
button to exit the Local Area Connection Properties window.
NOTE: To test TCP/IP connectivity between the PCs, Windows Firewall must be disabled
temporarily on both PCs. Windows Firewall should be re-enabled after the tests have been
completed.
a. On PC1, on the Windows XP desktop, click Start. From the Start menu, select Control Panel,
and double-click Network Connections.
b. Right-click the Local Area Connection icon and select Properties. Click the Advanced tab.
Locate and click the Settings button.:
c. Make a note of whether the firewall settings are ENABLED (ON) for the Ethernet port or
DISABLED (OFF) for the Ethernet port.
___________________________________________________________________________
18 Prepared by: MTGuillermo
DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology
Department
d. If the firewall settings are enabled, click the Off (not recommended) radio button to disable
the firewall. The setting will be re-enabled in a later step. Click OK in this dialog box and the
following to apply this setting.
e. Now that the two PCs are physically connected and configured correctly with IP addresses,
we need to make sure they communicate with each other. The ping command is a simple way
to accomplish this task. The ping command is included with the Windows XP operating system.
f. On PC1, go to Start, then Run. Type cmd, and then click OK. A Windows command prompt
window will appear as shown in the figure below.
g. At the > prompt, type ping 192.168.1.2 and press Enter. A successful ping will verify the IP
connectivity. It should produce results similar to those shown in here.
h. Repeat Steps 6a-6c on the second PC. The second PC will ping 192.168.1.1.
Step 8: (Optional – Use only if the Firewall was originally ENABLED) Re-enable the firewall
a. If you disabled the Windows Firewall in Step 6, click Start, select Control Panel, and open the
Network Connections control panel.
b. Right-click the Ethernet network connection icon and select Properties. Click the Advanced
tab. Locate and click Settings.
c. If the firewall settings are disabled (and they were enabled before this lab began), click the
On radio button to enable the firewall. Click OK in this dialog box and the following one to apply
this setting.
a. In PC 1 connect the printer. Create a text document in notepad file name: Your
Surname and save in folder name Test
Objectives:
Use Control Panel and Administrative Tools to manage hardware devices.
Use the Microsoft Management Console to load snap-ins and create consoles.
Outline:
A. Management Utilities
a. Control Panel
b. Administrative Tools
B. User and Group Management
C. User Profile Management
D. Working with Microsoft Management Console
Activity:
Activity 1: Display Administrative Tool in All Programs
Control Panel
The control panel hosts the applets and utilities used to install and configure devices and
software (particularly services)
a. Category View
b. Classic View
Category view offers nine groupings for various common configuration changes. The following
table lists the categories and their related applets.
Administrative Tools
The Administrative Tools are a collection of system configuration utilities that are more
appropriate to an MMC console than to a Control Panel Applet.
Tool Description
1. Component Services Used to administer COM and COM+
applications
23 Prepared by: MTGuillermo
DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology
Department
2. Data Sources (ODBC) Used to configure the OS to interact with
various database management systems, such
as SQL Server or FoxPro
3. Event Viewer View system messages regarding the failure
and or success of various key occurrences
within the Windows XP environment.
4. Local Security Policy Used to configure local security settings for a
system.
5. Performance Used to access System Monitor and the
Performance Logs and Alerts tool.
6. Services Used for stopping and starting services and
configuring the startup parameters for
services
7. Computer Management
1. System Tools
2. Storage
3. Services and Applications
System Tools
Storage Devices
1. Removable Storage –used to manage removable media such as floppy disks, tapes, and
Zip drives
2. Disk Defragramenter – used to improve the layout of stored data on drives by
reassembling fragmented files and aggregating unused space.
3. Disk Management – used to view and alter partitioning and volume configuration of
hard drives.
1
Step 2: Click Start Menu | Click Customize
5
4
Step 4: Double –Click SHARED FOLDERS | In the left-hand pane, click SHARES
Step 5: Double-click LOCAL USERS AND GROUPS | In the left-hand pane, Click Users
1. Local User Accounts – exists on a single computer and can’t be used in any manner
with domain resources, or to gain domain access of any kind.
2. Domain User Account – exists in a domain or in any trusting domain by virtue of
being created on a domain controller.
1. Change an account.
2. Create a new account.
3. Change the way users log on or off.
The Local Users and Groups tool in Computer Management is used to create and manage local
users.
User Accounts
User Node
2
3
Step 2: In the console tree, expand Local Users and Groups, and Select the Users Node
Step 5: In the Password and Confirm password text boxes, type “your password”
Step 9: Select the Users node, and observe the details pane
GROUPS
Groups are named collections of users. Through the use of groups, administrators can manage
users at one time because at one time because a group’s settings can be defined once and
apply to all members of the group.
TYPES OF GROUPS
DEFAULT GROUPS
GROUP DESCRIPTION
Administrators Computer administrators have complete control
over the computer
Power Users Power Users can perform most actions that administrators can
perform, but they can only modify and delete accounts that they
create. Also, they can only modify group memberships that they
have created.
Users This is the default limited user account. Users can configure the
desktop systems and create files, but they cannot make any
configuration changes to the system, add or remove accounts, or
access other users’ folders.
Backup Operators Backup Operators can back up and restore files on the computer,
regardless of which user owns those files. Backup operators cannot
be changed.
Guests This enables a guest to log on to the computer. Guests can perform
basic computing actions, but do not have all of the abilities given to
the limited user accounts.
Network Configuration This provides some basic administrative privileges for the
Operators configuration of Windows XP’s networking features. Typically, under
local usage, the administrator would handle these functions.
Remote Desktop Users If Remote Desktop is configured, this group is provided for remote
desktop users to access theremote access connection.
36 Prepared by: MTGuillermo
DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology
Department
Replicator Use by special user accounts to facilitate directory replication
between system and domain. It has no default members
Help Services Group This is provided for the Help and Support Center.
SYSTEM GROUPS
System groups are preexisting groups that you can’t manage but that appear in dialog boxes
when assigned group membership or access permissions. These are groups are used by the
system to control or place restrictions on specific groups of users based on their activities.
Batch Network
Dialup Service
Everyone System
GROUP STRATEGIES
Basic strategy
Step 2: In the details pane, under the list of groups, right-click an empty area and choose New
Group
Step 4: Click Add, and in the Enter the object names to select text box, type User01; User02
Step 5: Click OK
Step 7: In the New Group dialog box, enter the new group name Group02
Step 10: Select the Group Nodes and observe the detail pane
Step 4: In the New Password and Confirm password text boxes, type password03
o My Documents
o Cookies
o Favorites
o Desktop
o Start menu
The material stored in a user profile includes the files and folders in the following table.
Default profile
Roaming profiles stored on network server and downloaded to any computer the user
logs on to
Mandatory profiles
OBJECTIVE:
OUTLINE
A. TCP/IP Features
TCP/IP Components in Windows
B. Understanding IP ADDRESS
ACTIVITY
A suite of networking protocols, including both IPv4 and IPv6, that are widely used on the
Internet and that provide communication across interconnected networks of computers with
diverse hardware architectures and various operating systems.
IP ADDRESS
Convert to binary
2. IPv6 - 128 bits long and are represented by 16-bit hexadecimal segments
Ex. 2001:0D02:0000:0000:0000:C003:0001:F00D
Subnet Mask
Applying subnet mask allows to identify the network and host part of the IP address.
Looking at a subnet mask, if there is a 255 in an octet, then the corresponding octet in
the IP address is part of the network ID. For example, if I had an IP address of
192.168.1.15 and a subnet mask of 255.255.255.0, the fi rst three octets would make up
the network ID and the last octet would be the host ID. The network ID assigns a unique
address to the network itself, while the host ID uniquely identifies the system on the
network.
Address Classes
Every IP address belongs to a distinct address class. The Internet community defi ned
these classes to accommodate networks of various sizes. The class to which the IP
address belongs initially determines the network ID and host ID portions of the address,
Class A Addresses
IP address that starts with 127 is a class A address as well, but you are not allowed to
use any address that starts with 127 because it is reserved for the loopback address
Loopback Address
A range of 127 has been reserved for the loopback address. The loopback address is
used to refer to the local system, also known as the local host. If you want to verify that
the TCP/IP software has initialized on the local system even though you may not have an
IP address, you may PING the loopback address, which is typically referred to as
127.0.0.1.
You can test your own local system by typing ping 127.0.0.1, ping local host, or ping
loopback, to verify that the TCP/IP protocol stack is functioning on your system.
Class A 255.0.0.0
255 0 0 0
NNNNNNNN HHHHHHHH HHHHHHHH HHHHHHHH
11111111 00000000 00000000 00000000
Class B Addresses
IP address in which the value of the first octet is between 128 and 191.
255.255.0.0
255 255 0 0
NNNNNNNN NNNNNNNN HHHHHHHH HHHHHHHH
11111111 11111111 00000000 00000000
Class C Addresses
IP address in which the value of the first octet is between 192 and 223.
255.255.255.0
Class D Addresses
Class D addresses are used for special types of applications on the network known as
multicasting applications. Multicasting applications send data to a number of systems at
the same time by sending data to the multicast address, and anyone who has registered
with that address will receive the data. A multicast address is what class D addresses are
used for, so you will not be assigning them specifically to hosts on the network for
normal network communication. Class D addresses have a value on the first octet that
ranges from 224 to 239.
Class E Addresses
Class E addresses is that were designed for experimental purposes only, so you will not
ever see a class E address on a network. Class E addresses have a first octet with a value
that falls in the range of 240 to 254.
51 Prepared by: MTGuillermo
DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology
Department
Summary
Private Addresses
Another type of address you need to be aware of is what is known as a private address.
A private address is an address that can be assigned to a system but cannot be used for
any kind of Internet connectivity. The private addresses are nonroutable addresses, so
any system using them will not be able to function off the network. The following are
the three address ranges that are the private address ranges:
■ 10.0.0.0 to 10.255.255.255
■ 172.16.0.0 to 172.31.255.255
■ 192.168.0.0 to 192.168.255.255
Not being able to route data across the Internet when using these addresses will not
pose a problem, because realistically, you will have these private addresses sitting
behind a network address translation (NAT) server that will translate the private address
to a public address that can be routed on the Internet
In this activity you will practice identifying address classes for different IP addresses and their
associated subnet masks.
ADDRESS CLASS
1. 192.168.20.10
2. 10.6.5.4
3. 126.12.34.56
4. 223.222.224.34
5. 120.45.78.9
6. 189.45.89.90
7. 220.126.23.45
8. 90.12.34.78
9. 12.23.67.43
10. 15.10.35.7
11. 33.0.0.0
12. 215.23.56.78
13. 249.70.80.9
14. 230.45.90.70
15. 225.225.225.225
16. 190.90.80.70
17. 250.39.87.7
18. 12.34.90.8
19. 198.89.5.8
20. 7.9.0.0
2. 200.56.7.8
3. 3.1.2.3
4. 30.45.7.8.9
5. 223.4.5.78
6. 129.45.86.9
7. 190.45.76.8
8. 80.0.0.0
9. 220.45.89.7
10. 123.45.7.8
11. 120.78..45.44
12. 195.45.80.76
13. 10.10.10.10
14. 129.45.7.8
15. 55.12.30.0
SUBNETTING
With subnetting you take host bits from the subnet mask and mask them to be
network bits—thus creating more networks but fewer machines per network.
To determine how many bits to take from the host ID portion of the subnet
mask.
STEPS IN SUBNETTING
Given:
5 = 101 = 3 bits
Number of networks = 2n
= 134,217,728
Number of Host = 2n – 2
Number of Host = 25 – 2
= 30
Subtract 2 because the 1st and last IP address is not valid it is used as Nework ID and Broadcast
Address
Question No. 1
Question No. 2
You are responsible for subnetting the network ID of 190.34.0.0 into eight subnets. Take some
paper and walk through your binary work of subnetting this class B network into eight subnets.
Once you have calculated the information on paper, fill in the following table.
Question No. 3
Your manager has purchased a class C network range and has asked that you subnet this class C
into two subnets for the two network segments that are going to be built. One network
The class C network ID that you have purchased is 216.83.11.0. Once again, take a piece of
paper and start by writing out the default subnet mask of this class C address and then start
manipulating the host bits to get the network ID, first valid host ID, last valid host ID, broadcast
address, and new subnet mask. Once you have calculated all the required information, fill in the
following table:
Question No. 4
IPv6 Conversion
Hexidecimal to Binary Conversion
Pv6 Features
The following are the features of the IPv6 protocol:
The Next Generation TCP/IP stack in Windows Vista™ and Windows Server® 2008.
The IPv6 protocol for the Windows Server 2003 family.
The IPv6 protocol for Windows® XP Service Pack 1 (SP1) and later.
The IPv6 protocol for Windows CE .NET version 4.1 and later.
The capture and parsing of IPv6 traffic is supported by Microsoft Network Monitor.
For all the IPv6 implementations from Microsoft, you can use IPv6 without affecting IPv4
communications.
There are three possible notation types that can be used to represent IPv6 addresses. The
notation you use depends on the content of the address you want to represent.
1. Standard notation
The standard notation for IPv6 addresses is to represent the address as eight 16-bit
hexadecimal words separated by ``:'' (colons). For example:
FEDC:BA98:0332:0000:CF8A:000C:2154:7313
NOTE: It is not necessary to specify leading zeros, as long as there is at least one
numeric value in each field of the address. The above address could also be represented
as FEDC:BA98:332:0:CF8A:C:2154:7313.
2. Compressed notation
Since a large number of IPv6 addresses contain multiple fields of zeros, there is a
notation you can use to represent a single contiguous group of zero fields within an IPv6
address. This notation is a double colon ``::''. Some examples of how to use the ``::'' are
shown below.
1762:0:0:0:0:B03:1:AF18
FF01:0:0:0:CA:0:0:2
0:0:0:0:0:0:0:1
0:0:0:0:0:0:0:0
1762::B03:1:AF18
FF01::CA:0:0:2
::1
::
3. Mixed notation
IPv4 addresses that are encapsulated in IPv6 addresses can be represented using the
original IPv4 ``.'' notation as follows:
0:0:0:0:0:0:127.32.67.15
0:0:0:0:0:FFFF:127.32.67.15
It is also possible to use the compressed notation, so the addresses above would be
represented as:
::127.32.67.15
::FFFF:127.32.67.15
Subnetting Range
The 16 bits from the 49th to the 54th are for defining subnets.
0000000000000000.0000000000000000.0000000000000000.1111111111111111.0000000000
000000.0000000000000000.0000000000000000.0000000000000000
Let's say you want to break your corporate network into 64 subnets. The binary mask just for
the subnetting range would be1111110000000000 which translates to a hex value of FC00.
Some IPv6 masking tools will work with just this one hex word, otherwise a full 128-bit hex
mask would be FFFF:FFFF:FFFF:FC00:0:0:0:0.
3. Anycast
send group address that can receive multiple computers,but receive 1 computer
Unspecified address
The unspecified address (0:0:0:0:0:0:0:0 or ::) is only used to indicate the absence of an
address.
Loopback address
IPv4-compatible address
The IPv4-compatible address, 0:0:0:0:0:0:w.x.y.z or ::w.x.y.z (where w.x.y.z is the dotted
decimal representation of an IPv4 address), is used by IPv6/IPv4 nodes that are
communicating using IPv6.
IPv4-mapped address
The IPv4-mapped address, 0:0:0:0:0:FFFF:w.x.y.z or ::FFFF:w.x.y.z, is used to represent
an IPv4-only node to an IPv6 node. It is used only for internal representation.
6 to 4 address
The 6to4 address is used for communicating between two nodes running both IPv4 and
IPv6 over an IPv4 routing infrastructure. The 6to4 address is formed by combining the
prefix 2002::/16 with the 32 bits of a public IPv4 address, forming a 48-bit prefix. 6to4 is
a tunneling technique described in RFC 3056.
DNS name resolution: IPv4 host address (A) DNS name resolution: IPv6 host address
resource record (AAAA) resource record
DNS reverse resolution: IN-ADDR.ARPA DNS reverse resolution: IP6.ARPA domain
domain
1. You have a /32 prefix starting with 2001:0db8. How do you search for it in the RIPE
Database?
A.2001:db8::b450::b4 C.2001:db8::b45:0000:0000:b4
B.2001:db8::b450:0:0:b4 D.2001:db8:0:0:b450::b4
A.2001:0db8:00f0::3d0:0:00ff C.2001:db8:f0::3d0:0:ff
A.2001:db8:f3c:d7:7dab:3d:0:ff C.2001:db8:f3c:d7:7dab:3d0::ff
B.2001:db8:f3c:d7:7dab:3d0:0:ff D.2001:0db8:0f3c:00d7:7dab:03d::00ff
There are two alternative methods for activation IPv6 in WinXP (SP2)
OBJECTIVE:
Setting up a workgroup
Troubleshoot TCP/IP
Manage Connection
Configure Network Bridges
Mapped Network Drive
OUTLINE
A. Types of Workgroup
B. Setting up a Workgroup
C. Configuring Network Bridges
D. Managing Connection
E. Configuring TCP/IP
F. Troubleshooting Connections
G. Mapping Network Drives
ACTIVITY:
Activity 1: Building Peer to Peer using Switch
Activity 2: Setting up NetMeeting
Activity 3: Internet Café Software Installation
Activity 4: Building a Network using 4 switch (Use Packet Tracer)
Workgroup
A group of computers that are connected on a network and share resources, such as
printers and files. When you set up a network, Windows automatically creates a
workgroup and gives it a name.
TYPES OF WORKGROUP
Using a DCC, you can establish a connection between a Windows XP computer and any
other Microsoft Windows computer that supports DCC connections.
2. Ethernet
Ethernet is a networking standard and the most popular kind of network in use
today. When you think of a network with a typical wired configuration, you are
generally thinking of Ethernet.
3. HomePNA
4. Wireless Networks
1. Infrared—Infrared wireless uses an infrared beam to transmit data from one device
to the next, and is most often used in PC devices.
3. Wireless Local Area Networks (WLANs)—A WLAN is a wireless network that exists
within one geographic location, such as in a home, office building, school, or other
such structure.
5. Wireless Wide Area Networks (WWANs)—A WWAN connects WLANs that are
separated over wide geographic areas.
Creating a workgroup
A. 1ST Method
4. Click button to
change current computer name and
workgroup
5. To join an existing workgroup, 6. To create a new workgroup, type the name of the
type the name of the workgroup workgroup that you want to create, and
that you want to join, and then click OK.
then click OK.
7. Click OK
B. 2ND Method
Example : Station1
Click Workgroup
Example: Networking
3. Click Ok
Folders
Drives
Printers
Internet access
2. Right-click the file that you want to share, and then click Sharing and Security to view
additional settings.
3. Remote access is turned off by default. Click the Security warning message:
If you understand the security risks but want to share files without running the wizard, click
here.
5. Click Share this folder on the network, and then type a share name. You can use this name
later to access the data. You can Allow network users to change files by enabling it.
Click OK
Notes: The share name and the folder name do not have to be the same.
6. The shared folder will appear like this (with a hand under the folder)
Objectives
Design and build a simple peer-to-peer network using a straight through cable supplied
by the instructor.
Verify connectivity between the peers using the ping command.
File and Printer Sharing
Background / Preparation
In this hands-on lab, you will plan and build a simple network using switch, PCs and an
Ethernet straight through cable.
Four Window XP Professional PCs, each with an installed and functional Network
Interface Card (NIC)
An Ethernet straight through cable
Switch
Diagram:
Procedure:
1. Connect PCs to a SWITCH as shown in the diagram. What cable type is used?
________________________________________________________________________