windows networking update3
TRANSCRIPT
DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology Department
WINDOWS NETWORKING ESSENTIALS
Chapter I: Network Basic
Chapter II: Managing Users and Windows
Chapter III: TCP/IP
Chapter IV: Network on a Workgroup using Win XP
Chapter V: Window Vista Networking on a Workgroup
Chapter VI: Networking in Windows Network using Win XP
Chapter VII: Window Vista in Windows Network
Chapter VIII: Remote Networking
Chapter IX: Internet Access, ICS and ICF
Chapter X: Outlook Configuration
1 Prepared by: MTGuillermo
DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology Department
Chapter I: NETWORK BASICS
OBJECTIVE:
Plan and design network
Define the network model available in Windows XP
Identify and describe the elements that are recommended for structured cabling networks.
Select and estimate the cost of cabling for a given network.
OUTLINE:
A. Planning a NetworkB. Selecting a NetworkC. Network ModelD. Structured Cabling
ACTIVITY:
Activity 1: Network DesignActivity 2: Building Peer to Peer Network (Window XP and Win 2003)
2 Prepared by: MTGuillermo
DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology Department
TOPIC A: PLANNING A NETWORK
Before you begin any networking project, whether it’s a new network installation or an upgrade of an existing network, you should first make a detailed plan. If you make technical decisions too quickly, before studying all the issues that affect the project, you’ll regret it. You’ll discover too late that a key application won’t run over the network, that the network has unacceptablyslow performance, or that key components of the network don’t work together.
Here are some general thoughts to keep in mind while you create your network plan:
Don’t rush the plan Write down the network plan Ask someone else to read your network plan before you buy anything. Keep the plan up to date.
STEPS IN PLANNING A NETWORK
1. Purpose of the networkOne of the first steps in planning your network is making sure that you understand why you want the network. Make sure that you identify all the reasons why you think you need a network and then write them down.
2. Taking the stockOne of the most challenging parts of planning a network is figuring out
how to work with the computers that you already have. In other words, you have to take a thorough inventory of your current computers.
3. Type of ServerOne of the most basic questions that a network plan must answer is whether the network will have one or more dedicated servers or rely completely on peer-to-peer networking.
a. File Servers
3 Prepared by: MTGuillermo
DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology Department
b. Print Serversc. Mail Serversd. Database Servers
4. Choosing a NOSIf you determine that your network will require one or more dedicated
servers, the next step is to determine what network operating system those servers should use. If possible, all the servers should use the same NOS so that you don’t find yourself supporting different operating systems.
Although you can choose from many network operating systems, from a practical point of view, your choices are limited to the following:
Windows Server 2003 or 2008 Linux or another version of Unix
5. Planning the InfrastructurePlan the details of how you will connect the computers in the network. This includes determining which network topology that the network will use, what type of cable will be used, where the cable will be routed, and what other devices, such as repeaters, bridges, hubs, switches, and routers, will be needed.
6. Drawing DiagramsOne of the most helpful techniques for creating a network plan is to draw a picture of it. The diagram can be a detailed floor plan, showing the actual location of each network component. This type of diagram is sometimes called a physical map.
4 Prepared by: MTGuillermo
DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology Department
TOPIC B: SELECTING A NETWORK CONNECTION
The biggest decision you need to make when creating your network is what type of connection you will use. Gateway supports both wired and wireless Ethernet networks. Use the following criteria as a guide when selecting a network connection.
Wired Ethernet network
A wired Ethernet network consists of two or more computers connected together through an Ethernet cable. This connection type is commonly used in offices around the world and can be used to build computer networks in the home.
Create a wired Ethernet network if:
You are building a new home or your existing home already has Ethernet cable installed in each room that has a device you want to connect
You are creating a network in an office or business where network speed is more important than moving about with your computer
Your computer has an Ethernet jack for connecting to the network
Example wired Ethernet network
5 Prepared by: MTGuillermo
DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology Department
Wireless Ethernet network
A wireless Ethernet network is ideal for creating a home or office network or adding mobility to an existing wired Ethernet network. A wireless Ethernet network allows you the freedom to move about your home or office with your notebook or tablet PC.
Create a wireless Ethernet (IEEE 802.11a, IEEE 802.11b, IEEE 802.11g or 802.11n) network if:
You are looking for an alternative to installing cable for connectivity The ability to move about with your computer is as important as network speed Your computer has wireless Ethernet for networking
6 Prepared by: MTGuillermo
DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology Department
TOPIC C: NETWORK MODEL
1. Workgroup ModelMicrosoft’s workgroup model for networking distributes resources, administration, and security throughout a network. Each computer in a workgroup can be a server, a client, or both.
Advantage DisadvantageEasy-to-share resources No centralized control of resourcesResources are distributed across all machines
No centralized account management
Little administrative overhead No centralized administration Simple to design No centralized security managementEasy to implement Inefficient for more than 20 workstationsConvenient for small groups in close proximity
Security must be configured manually
Less expensive, does not require a central server
Increased training to operate as both client and server
2. Domain Model By dedicating one or more servers to the job of controlling a domain, the domain model adds a layer of complexity to networking. But the domain model also centralizes all shared resources and creates a single point of administrative and security control.
Advantage Disadvantage
7 Prepared by: MTGuillermo
DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology Department
Centralized resource sharing Significant administrative effort and overhead
Centralized resource controls Complicated designs; requires advanced planning
Centralized account management Requires one or more powerful, expensive servers.
Centralized security management Support personnel need to be trained in security management.
Efficient for virtually unlimited number of workstations
Expense for domain controllers and access lags increase with network size
Users need to be trained only to use clients
Support personnel need to be trained in domain network management.
Not restricted to close proximity Larger scope requires more user documentation and training.
TOPIC D: STRUCTURED CABLING
Structured cabling specification T568 makes recommendations for the following basic elements of networks:
Building Entrance Requirements - Specifications for the point at which outside cabling enters a building.
Equipment Room - Storage area for the more expensive, complex equipment, often the existing telecommunications closets.
Backbone Cabling - Cabling (often referred to as vertical) that carries the signals from equipment room to equipment room, between floors, and to and from the building entrance connections.
Horizontal Cabling- ransmission media that carries signals from a same floor equipment room to the various work areas.
Work Area - Any area where the computer workstations, printers, etc. are located, typically office space.
Backbone Cabling Connects Equipment Rooms
8 Prepared by: MTGuillermo
DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology Department
The wiring used for backbone cabling may be either copper or fiber optic.Recommended backbone cable maximum distance limitations include:
Voice grade 100 ohm UTP 800 meter limitation STP data grade 150 ohm 90 meter limitation Multimode 62.5/125μm fiber 2,000 meter limitation Patch cable 3 - 6 meter limitation
Horizontal Cabling
9 Prepared by: MTGuillermo
DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology Department
Most often, horizontal cable is routed directly from the wiring closet to the workstation, without splices, cable junctures, or taps. By eliminating splices, cable junctures and/or taps, the potential for faulty connections and electrical noise is reduced. Although not necessary, it is recommended that horizontal cabling be rated for category 5 use.
Maximum transmission speeds for horizontal cable are: Category 3 up to 16 MHz Category 4 up to 20 MHz Category 5 up to 100 MHz
Maximum recommended distance limitation for horizontal cable:
100 meters total Maximum of 3 meters from wall jack to workstation Maximum of 6 meters in the telecommunications closet Maximum of 90 meters from telecommunications closet to wall jack
10 Prepared by: MTGuillermo
DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology Department
The wall jack outlet must have a minimum of two ports, one for voice grade transmissions and one for data grade transmissions. Recommended horizontal cabling includes:
4-pair 100 ohm UTP 2-pair 150 ohm STP 2 fiber 62.5/125μm optical
NETWORK TOPOLOGY
1. Bus Topology - When computers were first networked together, they were simplyconnected to one cable segment in a series.
2. Ring Topology – devices connected in a closed loop and have equal access.
3. Star Topology – Star topology is a point-to-point architectural design where all computer devices are connected to a central hub, through which all data signals must travel.
11 Prepared by: MTGuillermo
DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology Department
4. Hybrid Network Topology - Hybrid topology is any combination of bus, star, and ring topology, for example, a star-bus configuration.
5. Mesh Topology - Every device is connected to every other device. Used in WANs to interconnect LANs
6. Wireless Topology few cables are used to connect systems made up of transmitters that broadcast the packets using radio frequencies contains special transmitters called cells or wireless access point
ACTIVITY 1: NETWORK DESIGN12 Prepared by: MTGuillermo
DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology Department
Materials Needed
Spreadsheet application Drawing application Cable cost analysis prepared
Work with a partner to create a list of questions you should ask a client who has hired you to build a network. The client wants to know which type of cable you plan to use and why, how much the cable will cost, and why you selected the particular topology. The client also wants you to submit a proposal that defends your choice of cabling and network design.
After you create your questionnaire, role-play with your partner. One of you will assume the role of client, and the other the role of the network designer. The client will answer all the questions for a fictitious company of his/her choice. The network designer will record all of the answers.
When the questionnaire is complete, you will both analyze the requirements and determine the appropriate topology. Create a computer diagram of the proposed network for the client. Prepare a spreadsheet that shows a cost analysis of the cable needed to complete the job. The cost analysis should include the type of cable, length of cable, cost of each type of cable, and the total cable cost. Use the cost information you gathered in the cabling lesson.
Submit a proposal to the client indicating the suggested network topology. Include a summary to convince the client that this is the best, most cost efficient design for her/his needs. Your proposal must also defend your cable choices. Attach the computer diagram and cable cost analysis spreadsheet to your proposal.
Evaluation Criteria and Weightings
Name: ________________________________________________ Section: _______________
13 Prepared by: MTGuillermo
DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology Department
Activity 1Building a Peer-to-Peer Network (XP meets 2003)
Objectives
Design and build a simple peer-to-peer network using a crossover cable supplied by the instructor.Verify connectivity between the peers using the ping command.File and Printer Sharing
Background / Preparation
In this hands-on lab, you will plan and build a simple peer-to-peer network using two PCs and an Ethernet crossover cable.
The following resources are required:
Two Window XP Professional PCs, each with an installed and functional Network Interface Card (NIC)An Ethernet crossover cable
Step 1: Diagram the network
a. A network diagram is a map of the logical topology of the network. In the space below, sketch a simple peer-to-peer network connecting two PCs. Label one PC with IP address 192.168.1.1 and the other PC with IP address 192.168.1.2. Use labels to indicate connecting media and any necessary network devices.
14 Prepared by: MTGuillermo
DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology Department
b. A simple network like the one you designed can use a hub or switch as a central connecting device, or the PCs may be directly connected. Which kind of cable is required for a direct Ethernet connection between the two PCs?
____________________________________________________________________________
Step 2: Document the PCs
a. Check the computer name settings for each PC and make adjustments as necessary. For each PC, select Start and Control Panel. Double-click the System icon, then click the Computer Name tab. Write down the computer name that is displayed following Full computer name:
b. Check to see if the two PCs have the same name. If they do, change the name of one PC by clicking the Change button, typing a new name in the Computer name field, then clicking OK.
c. Click OK to close the System Properties window.
d. Why is it important that each PC on a network have a unique name?
15 Prepared by: MTGuillermo
DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology Department
Step 3: Connect the Ethernet cable
a. Use the Ethernet crossover cable provided by the instructor. Plug one end of the cable into theEthernet NIC of PC1.
b. Plug the other end of the cable into the Ethernet NIC of PC2. As you insert the cable, you should hear a click which indicates that the cable connector is properly inserted into the port.
Step 4: Verify physical connectivity
a. After the Ethernet crossover cable is connected to both PCs, take a close look at each Ethernet port. A light (usually green or amber) indicates that physical connectivity has been established between the two NICs. Try unplugging the cable from one PC then reconnecting it to verify that the light goes off then back on.
b. Go to the Control Panel, double click the Network Connections icon, and confirm that the local area connection is established. The following figure shows an active local area connection. If physical connectivity problems exist, you will see a red X over the Local Area Connection icon with the words Network cable unplugged.
16 Prepared by: MTGuillermo
DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology Department
c. If the Local Area Connection does not indicate that it is connected, troubleshoot by repeating Steps 3 and 4. You may also want to ask your instructor to confirm that you are using an Ethernet crossover cable.
Step 5: Configure IP settings
a. Configure the logical addresses for the two PCs so that they are able to communicate using TCP/IP. On one of the PCs, go to the Control Panel, double click the Network Connections icon,
b. and then right click the connected Local Area Connection icon. Choose Properties from the pull-down menu.
b. Using the scroll bar in the Local Area Connection Properties window, scroll down to highlight Internet Protocol (TCP/IP). Click the Properties button.
c. Select the Use the following IP address radio button and enter the following information:
17 Prepared by: MTGuillermo
DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology Department
d. Click OK, which will close the Internet Protocol (TCP/IP) Properties window. Click the Close button to exit the Local Area Connection Properties window.
e. Repeat steps 5a – 5d for the second PC using the following information
Step 6: Verify IP connectivity between the two PCs
NOTE: To test TCP/IP connectivity between the PCs, Windows Firewall must be disabled temporarily on both PCs. Windows Firewall should be re-enabled after the tests have been completed.
a. On PC1, on the Windows XP desktop, click Start. From the Start menu, select Control Panel, and double-click Network Connections.
b. Right-click the Local Area Connection icon and select Properties. Click the Advanced tab. Locate and click the Settings button.:
18 Prepared by: MTGuillermo
DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology Department
c. Make a note of whether the firewall settings are ENABLED (ON) for the Ethernet port or DISABLED (OFF) for the Ethernet port. ___________________________________________________________________________
d. If the firewall settings are enabled, click the Off (not recommended) radio button to disable the firewall. The setting will be re-enabled in a later step. Click OK in this dialog box and the following to apply this setting.
e. Now that the two PCs are physically connected and configured correctly with IP addresses, we need to make sure they communicate with each other. The ping command is a simple way to accomplish this task. The ping command is included with the Windows XP operating system.f. On PC1, go to Start, then Run. Type cmd, and then click OK. A Windows command prompt window will appear as shown in the figure below.
g. At the > prompt, type ping 192.168.1.2 and press Enter. A successful ping will verify the IP connectivity. It should produce results similar to those shown in here.
h. Repeat Steps 6a-6c on the second PC. The second PC will ping 192.168.1.1.
i. Close the Windows command prompt window on both PCs.Step 7: Verify connectivity using My Network Placesa. A PC can share its resources with other PCs on the network. PCs with shared resources should be visible through My Network Places. On PC1, go to Start, click My Network Places, and then click View workgroup computers in the left pane
19 Prepared by: MTGuillermo
DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology Department
b. Do you see an icon for the other PC in your peer-to-peer network? ______________________
c. What is the name of the other PC? ________________________________________________
d. Is it the same name you recorded in Step 2? ________________________________________
e. Perform Step 7a on the second PC.
f. Close any open windows.
Step 8: (Optional – Use only if the Firewall was originally ENABLED) Re-enable the firewall
a. If you disabled the Windows Firewall in Step 6, click Start, select Control Panel, and open the Network Connections control panel.
b. Right-click the Ethernet network connection icon and select Properties. Click the Advanced tab. Locate and click Settings.
c. If the firewall settings are disabled (and they were enabled before this lab began), click the On radio button to enable the firewall. Click OK in this dialog box and the following one to apply this setting.
Step 9: File and Printer Sharing
a. In PC 1 connect the printer. Create a text document in notepad file name: Your Surname and save in folder name Test
20 Prepared by: MTGuillermo
DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology Department
b. Share the printer and the folder Test
c. Using PC 2 copy the shared document in PC 1 (notepad) then print.
CHAPTER II: MANAGING USERS AND WINDOWS ENVIRONMENT
Objectives:
Use Control Panel and Administrative Tools to manage hardware devices.
Use the Microsoft Management Console to load snap-ins and create consoles.
Create and troubleshoot user and group accounts
Manage and troubleshoot user profiles
Outline:A. Management Utilities
a. Control Panelb. Administrative Tools
B. User and Group ManagementC. User Profile ManagementD. Working with Microsoft Management Console
Activity:
Activity 1: Display Administrative Tool in All Programs
Activity 2: Exploring Computer Management
Activity 2: Creating User and Group Accounts
21 Prepared by: MTGuillermo
DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology Department
Activity 2: Create and Change Password
Activity 3: Changing a Group Membership
TOPIC A: Management Utilities
a. Control Panelb. Administrative Tools
Control Panel
The control panel hosts the applets and utilities used to install and configure devices and software (particularly services)
Control Panel View
a. Category View
b. Classic View
22 Prepared by: MTGuillermo
DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology Department
Category view offers nine groupings for various common configuration changes. The following table lists the categories and their related applets.
Category Related AppletsAccessibility Options Accessibility optionsAdd or Remove Programs Add or Remove ProgramsAppearance and Themes Display, Folder Options, Taskbar and Start MenuDate, Time, Language, and Regional Options Date, Time, Language, and Regional OptionsNetwork and Internet Connections Internet Options, Network ConnectionsPerformance and Maintenance Administrative Tools, Power Options, Scheduled
Tasks,Printers and Other Hardware Game Controllers, Keyboard, Mouse, Phone and
Modem Options, Printers and Faxes, Scanners and cameras
Sound, Speech and Audio Devices Sound, Speech and Audio DevicesUser Accounts User Acounts
Administrative Tools
The Administrative Tools are a collection of system configuration utilities that are more appropriate to an MMC console than to a Control Panel Applet.
The seven Administrative Tools are:
Tool Description1. Component Services Used to administer COM and COM+
23 Prepared by: MTGuillermo
DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology Department
applications2. Data Sources (ODBC) Used to configure the OS to interact with
various database management systems, such as SQL Server or FoxPro
3. Event Viewer View system messages regarding the failure and or success of various key occurrences within the Windows XP environment.
4. Local Security Policy Used to configure local security settings for a system.
5. Performance Used to access System Monitor and the Performance Logs and Alerts tool.
6. Services Used for stopping and starting services and configuring the startup parameters for services
7. Computer Management
Computer Management is an MMC console that serves as a common troubleshooting and administration interfaces for several tools.
Three sections of Computer Management
1. System Tools2. Storage3. Services and Applications
System Tools
24 Prepared by: MTGuillermo
DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology Department
Tool Use this tool toEvent Viewer View system messages regarding the failure
and or success of various key occurrences within the Windows XP environment.
Shared Folders View the shared folders on the local systemLocal Users and Groups Create and manage local user accounts and
groupsPerformance Logs and Alerts Track performance counters and set alertsDevice Manager View and alter current hardware
configurations of all existing devices
Storage Devices
1. Removable Storage –used to manage removable media such as floppy disks, tapes, and Zip drives
2. Disk Defragramenter – used to improve the layout of stored data on drives by reassembling fragmented files and aggregating unused space.
3. Disk Management – used to view and alter partitioning and volume configuration of hard drives.
Services and Applications1. Indexing Service – used to define the corpus (collection of documents indexed for
searching) for indexing services2. WMI Control – used to configure Windows Management Instrumentation
25 Prepared by: MTGuillermo
DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology Department
Activity 1: Display Administrative Tool in All Programs
Step 1: Right Click Task Bar | Click Properties
Step 2: Click Start Menu | Click Customize
Step 3: Click Advance Tab
Set 4: Find the Administrative tool by dragging the the scroll bar
Step 5: Click the option Display on the All Programs Menu | Click OK
26 Prepared by: MTGuillermo
2
1
3
DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology Department
Step 6: Click Apply | OK Button
To check if all ready in All Programs
Click Start button | All Programs | Administrative Tools
27 Prepared by: MTGuillermo
4
6
5
DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology Department
ACTIVITY 2: EXPLORING COMPUTER MANAGEMENT
Step 1: Option 1 Using Control Panel Click Performance and Maintenance | Click Administrative Tools
28 Prepared by: MTGuillermo
2
1
3
DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology Department
Option 2: If already in ALL PROGRAM Click START | ALL PROGRAMS | ADMINISTRATIVE TOOLS
Step 2: Double-click COMPUTER MANAGEMENT
Step 3: Click EVENT VIEWER
Step 4: Double –Click SHARED FOLDERS | In the left-hand pane, click SHARES
29 Prepared by: MTGuillermo
DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology Department
Step 5: Double-click LOCAL USERS AND GROUPS | In the left-hand pane, Click Users
30 Prepared by: MTGuillermo
DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology Department
Step 6: Click DEVICE MANAGER | Click Action
Step 7: Choose File | Exit
31 Prepared by: MTGuillermo
DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology Department
TOPIC B: USER AND GROUP MANAGEMENT
Type of User Accounts
1. Local User Accounts – exists on a single computer and can’t be used in any manner with domain resources, or to gain domain access of any kind.
2. Domain User Account – exists in a domain or in any trusting domain by virtue of being created on a domain controller.
Default user accounts1. Administrator - has unlimited access to Windows XP computer2. Guest - has limited access to resources; disabled by default
User Accounts in the Control Panel
Three different action from the User Account Interface
1. Change an account.2. Create a new account.3. Change the way users log on or off.
32 Prepared by: MTGuillermo
DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology Department
User Accounts with Computer Management
The Local Users and Groups tool in Computer Management is used to create and manage local users.
To Access Local Users and Groups
Right-click MY COMPUTER and Choose MANAGE
33 Prepared by: MTGuillermo
User Accounts
Local Users and Group tools
User Node
DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology Department
ACTIVITY 3: CREATING USER ACCOUNT USING COMPUTER MANAGEMENT
Step 1: On the Start Menu, right-click MY COMPUTER and choose MANAGE
Step 2: In the console tree, expand Local Users and Groups, and Select the Users Node
Step 3: Right-Click the Users node and choose New User
34 Prepared by: MTGuillermo
1
2
3
DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology Department
Step 4: In the User name text box, type “your name”
Step 5: In the Password and Confirm password text boxes, type “your password”
Step 6: Uncheck User must change password at next logon
Step 7: Click Create
Step 8: Repeat this procedure to create 3 users
When you’re done, click Close
Step 9: Select the Users node, and observe the details pane
35 Prepared by: MTGuillermo
DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology Department
GROUPS
Groups are named collections of users. Through the use of groups, administrators can manage users at one time because at one time because a group’s settings can be defined once and apply to all members of the group.
TYPES OF GROUPS
1. Local groups - exist only on a single computer
2. Global groups - exist in the domain
DEFAULT GROUPS
GROUP DESCRIPTIONAdministrators Computer administrators have complete control
over the computerPower Users Power Users can perform most actions that administrators can
perform, but they can only modify and delete accounts that they create. Also, they can only modify group memberships that theyhave created.
Users This is the default limited user account. Users can configure the desktop systems and create files, but they cannot make any configuration changes to the system, add or remove accounts, or access other users’ folders.
Backup Operators Backup Operators can back up and restore files on the computer, regardless of which user owns those files. Backup operators cannot be changed.
Guests This enables a guest to log on to the computer. Guests can perform basic computing actions, but do not have all of the abilities given to the limited user accounts.
Network Configuration Operators
This provides some basic administrative privileges for the configuration of Windows XP’s networking features. Typically, under local usage, the administrator would handle these functions.
Remote Desktop Users If Remote Desktop is configured, this group is provided for remote desktop users to access theremote access connection.
36 Prepared by: MTGuillermo
DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology Department
Replicator Use by special user accounts to facilitate directory replication between system and domain. It has no default members
Help Services Group This is provided for the Help and Support Center.
SYSTEM GROUPS
System groups are preexisting groups that you can’t manage but that appear in dialog boxes when assigned group membership or access permissions. These are groups are used by the system to control or place restrictions on specific groups of users based on their activities.
Anonymous Logon
Batch
Creator Group
Creator Owner
Dialup
Everyone
Interactive
Local Service
Network
Network Service
Remote Interactive Logon
Service
System
Terminal Server User
GROUP STRATEGIES
Basic strategy
– Users assigned to global groups
– Global groups assigned to local groups
– Local groups assigned rights and permissions to resources
– Do not assign permissions to single users
Plan groups carefully
Create groups based on job function, geographic location, etc.
USER ACCOUNT TROUBLESHOOTING
37 Prepared by: MTGuillermo
DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology Department
Check for password errors
– Reset passwords if necessary
– Educate users on creating and remembering strong password
Check group assignment and correct if necessary
ACTIVITY 4: CREATING GROUP ACCOUNT
Step 1: In Computer Management under Local Users and Groups, select the Groups node
Step 2: In the details pane, under the list of groups, right-click an empty area and choose New Group
Step 3: Name the group Group01
Step 4: Click Add, and in the Enter the object names to select text box, type User01; User02
Step 5: Click OK
Step 6: Click Create
38 Prepared by: MTGuillermo
DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology Department
Step 7: In the New Group dialog box, enter the new group name Group02
Step 8: Add User01 and User03 to the group
Step 9: Click Create and then Close
Step 10: Select the Group Nodes and observe the detail pane
39 Prepared by: MTGuillermo
DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology Department
ACTIVITY 5: CHANGING USER’S PASSWORD
Step 1: Select the Users Node
Step 2: Right click User03 and Choose Set Password
Step 3: Click Proceed to close the warning dialog box
Step 4: In the New Password and Confirm password text boxes, type password03
Step 5: Observe the warning below the password text boxes.
Step 6: Click OK and OK again
40 Prepared by: MTGuillermo
DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology Department
ACTIVITY 6: CHANGING A USER’S GROUP MEMBERSHIP
Step 1: Double-click User01
Step 2: Activate the Member Of tab
Step 3: Observe the list of groups
Step 4: Select the Group02 and click Remove
Step 5: Click Add
Step 6: Type the name Power Users and click OK
Step 7: Close Computer Management
41 Prepared by: MTGuillermo
DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology Department
TOPIC C: USER PROFILE MANAGEMENT
USER PROFILES
- A collection of desktop and environmental configurations on a Windows XP system for a specific user or group of users
- Located in \Documents and Settings folder, which includes
o My Documents
o Cookies
o Favorites
o Desktop
o Start menu
- Profile information in Ntuser.dat
The material stored in a user profile includes the files and folders in the following table.
File or folder DescriptionApplication Data A folder containing user-specific data, such as
42 Prepared by: MTGuillermo
DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology Department
for Internet Explorer or OutlookCookies A folder containing cookies accepted by a user
through the browser.Desktop A folder containing the icons displayed on the
user’s desktopMy Recent Documents A file containing user-specific links to recently
accessed resources.NetHood A folder containing user-specific network
mappingsPrintHood A folder containing user specific printing
mappings.SendTo A folder containing user-specific links used in
the Send To command of the right-click pop-up menu of files and folders.
File or folder DescriptionStart Menu A folder containing the user-specific Start menu layoutTemplates A folder containing user specific templatesNTUSER.DAT A file containing Registry information specific to the
user.NTUSER.DAT.LOG A transaction log file that ensures the profile can be re-
created in the event of failure.NTUSER.INI A file containing profile-related settings, such as which
directories should not be uploaded to a roaming profile.
Default profile
Used to create new user profiles New profiles created at first logon Default User and All Users profiles in \Documents and Settings
43 Prepared by: MTGuillermo
DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology Department
Local profiles vs. roaming profiles
Local profiles exist only on a single Windows XP computer
Roaming profiles stored on network server and downloaded to any computer the user logs on to
Mandatory profiles
Enforces specific environment settings Rename user’s profile from Ntuser.dat to Ntuser.man
User profile troubleshooting
Trouble with all user profiles or just a single profile?
Create new user account to test Default User profile
Log on to multiple computers to test roaming profile
Ensure enough free space
Delete corrupt folders or files
Verify access permissions
Last resort: Create a new user profile
44 Prepared by: MTGuillermo
DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology Department
CHAPTER III: TCP/IP
OBJECTIVE:
Describe the characteristic of TCP/IPLearn IPv4 and IPv6Learn Custom Subnet
OUTLINE
A. TCP/IP Features
45 Prepared by: MTGuillermo
DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology Department
TCP/IP Components in WindowsB. Understanding IP ADDRESS
Internet Protocol version 4 (IPv4)Class of IPv4 Address
C. IPv4 Custom Subnetting D. Internet Protocol version 6 (IPv6)
IPv6 FeaturesDifferences of IPv4 and IPv6IPv6 Implementations from MicrosoftTypes of IPv6 AddresseesIPv6 Notation
ACTIVITY
Activity 1: Class Address and Default Subnet Mask IdentificationActivity 2: IPv4 Custom Subnetting
Activity 3: IPv6 Address Notation Exercise Activity 4: Enable IPv6 in Window XP
TOPIC A: TCP/IP FEATURES
Transmission Control Protocol/Internet Protocol (TCP/IP)
The basic language or protocol used for the Internet.
A suite of networking protocols, including both IPv4 and IPv6, that are widely used on the Internet and that provide communication across interconnected networks of computers with diverse hardware architectures and various operating systems.
Features of TCP/IP protocols:
TCP/IP is independently developed from any specific hardware or operating systems
46 Prepared by: MTGuillermo
DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology Department
It is open protocol standards and freely available It is widely used for the Internet, Intranet and Extranet Most of the products manufactured by vendors have support for TCP/IP TCP/IP allows integration of different kind of networks It can run over an Ethernet, token ring, dial-up line or any other kinds of physical
transmission media TCP/IP has a common addressing scheme that allow device to uniquely address on
the entire network, even if the network is as large as the worldwide Internet TCP/IP standardized high-level protocols for consistent, widely available user services
TCP/IP Components in Windows
Advantages of the TCP/IP protocol suiteAdvantages of TCP/IP components in Windows
A standard, routable enterprise networking protocol that is the most complete and accepted protocol available. All modern operating systems support TCP/IP, and most large private networks rely on TCP/IP for much of their traffic.
TCP/IP components in Windows enable enterprise networking and connectivity for Windows and non-Windows–based computers.
47 Prepared by: MTGuillermo
DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology Department
A technology for connecting dissimilar systems. Many TCP/IP application protocols were designed to access and transfer data between dissimilar systems. These protocols include HTTP, FTP, and Telnet.
TCP/IP components in Windows allow standards-based connectivity to other operating system platforms.
A robust, scaleable, cross-platform client/server framework.
TCP/IP components in Windows support the Windows Sockets application programming interface, which developers use to create client/server applications.
A method of gaining access to the Internet. Windows-based computers are Internet-ready.
TOPIC B: UNDERSTANDING IP ADDRESS
IP ADDRESS
A unique identifier for a node or host connection on an IP network A 32 bit binary number usually represented as 4 decimal values consist of 4
octet
48 Prepared by: MTGuillermo
DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology Department
Example : 140.179.220.200
Convert to binary
140 179 220 20010001100 10110011 11011100 110010001st octet 2nd octet 3rd octet 4th octet
TWO TYPES OF IP ADDRESS
1. IPv4 – Ex. 192.168.1.2
2. IPv6 - 128 bits long and are represented by 16-bit hexadecimal segments
Ex. 2001:0D02:0000:0000:0000:C003:0001:F00D
Subnet Mask
Applying subnet mask allows to identify the network and host part of the IP address.
Looking at a subnet mask, if there is a 255 in an octet, then the corresponding octet in the IP address is part of the network ID. For example, if I had an IP address of 192.168.1.15 and a subnet mask of 255.255.255.0, the fi rst three octets would make up the network ID and the last octet would be the host ID. The network ID assigns a unique address to the network itself, while the host ID uniquely identifies the system on the network.
Address Classes
Every IP address belongs to a distinct address class. The Internet community defi ned these classes to accommodate networks of various sizes. The class to which the IP address belongs initially determines the network ID and host ID portions of the address,
49 Prepared by: MTGuillermo
DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology Department
along with the number of hosts that are supported on that network. The different class addresses are named Class A, Class B, Class C, Class D, and Class E.
Class A Addresses
IP address in which the first octet is between 1 and 126.
IP address that starts with 127 is a class A address as well, but you are not allowed to use any address that starts with 127 because it is reserved for the loopback address
Loopback Address
A range of 127 has been reserved for the loopback address. The loopback address is used to refer to the local system, also known as the local host. If you want to verify that the TCP/IP software has initialized on the local system even though you may not have an IP address, you may PING the loopback address, which is typically referred to as 127.0.0.1.
You can test your own local system by typing ping 127.0.0.1, ping local host, or ping loopback, to verify that the TCP/IP protocol stack is functioning on your system.
Default subnet mask
Class A 255.0.0.0
255 0 0 0NNNNNNNN HHHHHHHH HHHHHHHH HHHHHHHH11111111 00000000 00000000 00000000
Class B Addresses
IP address in which the value of the first octet is between 128 and 191.
50 Prepared by: MTGuillermo
DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology Department
Default subnet mask
255.255.0.0
255 255 0 0NNNNNNNN NNNNNNNN HHHHHHHH HHHHHHHH11111111 11111111 00000000 00000000
Class C Addresses
IP address in which the value of the first octet is between 192 and 223.
Default subnet mask
255.255.255.0
255 255 255 0NNNNNNNN NNNNNNNN NNNNNNNN HHHHHHHH11111111 11111111 11111111 00000000
Class D Addresses
Class D addresses are used for special types of applications on the network known as multicasting applications. Multicasting applications send data to a number of systems at the same time by sending data to the multicast address, and anyone who has registered with that address will receive the data. A multicast address is what class D addresses are used for, so you will not be assigning them specifically to hosts on the network for normal network communication. Class D addresses have a value on the first octet that ranges from 224 to 239.
Class E AddressesClass E addresses is that were designed for experimental purposes only, so you will not ever see a class E address on a network. Class E addresses have a first octet with a value that falls in the range of 240 to 254.
51 Prepared by: MTGuillermo
DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology Department
Summary
CLASS 1ST Octet Value Default Subnet Mask
Number of Host per Network
CLASS A 1–126 255.0.0.0 16,777,214CLASS B 128–191 255.255.0.0 65,534CLASS C 192–223 255.255.255.0 254CLASS D 224 to 239.CLASS E 240 to 255
Private Addresses
Another type of address you need to be aware of is what is known as a private address. A private address is an address that can be assigned to a system but cannot be used for any kind of Internet connectivity. The private addresses are nonroutable addresses, so any system using them will not be able to function off the network. The following are the three address ranges that are the private address ranges:
■ 10.0.0.0 to 10.255.255.255■ 172.16.0.0 to 172.31.255.255■ 192.168.0.0 to 192.168.255.255
Not being able to route data across the Internet when using these addresses will not pose a problem, because realistically, you will have these private addresses sitting behind a network address translation (NAT) server that will translate the private address to a public address that can be routed on the Internet
Name: ________________________________________________ Section: _______________
52 Prepared by: MTGuillermo
DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology Department
ACTIVITY 1: ADDRESS CLASS AND DEFAULT SUBNET MASK IDENTIFICATION
In this activity you will practice identifying address classes for different IP addresses and their associated subnet masks.
I. Address Class Identification
ADDRESS CLASS
1. 192.168.20.10
2. 10.6.5.4
3. 126.12.34.56
4. 223.222.224.34
5. 120.45.78.9
6. 189.45.89.90
7. 220.126.23.45
8. 90.12.34.78
9. 12.23.67.43
10. 15.10.35.7
11. 33.0.0.0
12. 215.23.56.78
13. 249.70.80.9
14. 230.45.90.70
15. 225.225.225.225
16. 190.90.80.70
17. 250.39.87.7
18. 12.34.90.8
19. 198.89.5.8
20. 7.9.0.0
II. Default Subnet Masks
53 Prepared by: MTGuillermo
DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology Department
Write the correct subnet mask of each of the ff. addresses.
ADDRESS SUBNET MASK1. 192.168.1.3
2. 200.56.7.8
3. 3.1.2.3
4. 30.45.7.8.9
5. 223.4.5.78
6. 129.45.86.9
7. 190.45.76.8
8. 80.0.0.0
9. 220.45.89.7
10. 123.45.7.8
11. 120.78..45.44
12. 195.45.80.76
13. 10.10.10.10
14. 129.45.7.8
15. 55.12.30.0
TOPIC C: IPv4 CUSTOM SUBNETTING
54 Prepared by: MTGuillermo
DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology Department
SUBNETTING
The purpose of subnetting is to break one network ID into multiple subnetworks (subnets) so that you can follow the physical structure of the network.
With subnetting you take host bits from the subnet mask and mask them to be network bits—thus creating more networks but fewer machines per network.
To determine how many bits to take from the host ID portion of the subnet mask.
STEPS IN SUBNETTING
1. Determine the number of networks and convert in to binary.
2. Reserve bits in subnet mask and find your increment
3. Use your increment to find your network ranges
SUBNETTING BASE ON NETWORKS
Given:
IP Address = 216.21.5.0 Default subnet mask = 255.255.255.0 Subnet = 5
1. Determine the number of networks and convert to binary.
Subnet = 5 convert to binary
5 = 101 = 3 bits
2. Reserve bits in subnet mask and find your increment
55 Prepared by: MTGuillermo
DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology Department
Default Subnet
255 255 255 0
NNNNNNNN NNNNNNNN NNNNNNNN HHHHHHHHBinary equivalent 11111111 11111111 11111111
ADD THE 3 BITS11100000
Custom Subnet
NNNNNNNN NNNNNNNN NNNNNNNN NNNHHHHH
255 255 255 224The Increment is the lowest network bits
3. Use your increment to find your network ranges.
Add the increment which is 32
Subnet 1 216.21.5.0 to 216.21.5.31
Subnet 2 216.21.5.32 to 216.21.5.63
Subnet 3 216.21.5.64 to 216.21.5.95
Subnet 4 216.21.5.96 to 216.21.5.127
Subnet 5 216.21.5.128 to 216.21.5.159
Invalid IP Address is the first and last IP address of each subnet
1st IP Address – identify the nework/nework ID
Last IP Address – broadcast address
56 Prepared by: MTGuillermo
DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology Department
Network ID First Valid Host
Last Valid Host
Broadcast Subnet Mask
Subnet 1 216.21.5.0 216.21.5.1 216.21.5.30 216.21.5.31 255.255.255.224Subnet 2 216.21.5.32 216.21.5.33 216.21.5.62 216.21.5.63 255.255.255.224Subnet 3 216.21.5.64 216.21.5.65 216.21.5.95 216.21.5.96 255.255.255.224Subnet 4 216.21.5.96 216.21.5.96 216.21.5.126 216.21.5.127 255.255.255.224Subnet 5 216.21.5.128 216.21.5.129 216.21.5.158 216.21.5.159 255.255.255.224
Formula to determine the number of networks
Number of networks = 2n
Where n is equal to number of 1’s in the subnet mask
255 255 255 22411111111 11111111 11111111 11100000
Number of networks = 227
= 134,217,728
Formula to determine the number of host
Number of Host = 2n – 2
Where n is equal to the number of O’s in the subnet mask
Number of Host = 25 – 2
= 30
Subtract 2 because the 1st and last IP address is not valid it is used as Nework ID and Broadcast Address
57 Prepared by: MTGuillermo
DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology Department
Name: ________________________________________________ Section: _______________
ACTIVTY 2 : IPv4 CUSTOM SUBNETTING
Question No. 1
The network ID of the class A address is 120.0.0.0. Take a few pieces of paper and calculate the new subnet mask, network ID, fi rst valid address, last valid address, and the broadcast address of the four subnets. Once you have calculated your answer, fill in the following table.
Network ID First Valid Host
Last Valid Host
Broadcast Subnet Mask
Subnet 1Subnet 2Subnet 3Subnet 4
Find the total number of networks and number of host.
Question No. 2
You are responsible for subnetting the network ID of 190.34.0.0 into eight subnets. Take some paper and walk through your binary work of subnetting this class B network into eight subnets. Once you have calculated the information on paper, fill in the following table.
Network ID First Valid Host
Last Valid Host
Broadcast Subnet Mask
Subnet 1Subnet 2Subnet 3Subnet 4Subnet 5Subnet 6Subnet 7Subnet 8
58 Prepared by: MTGuillermo
DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology Department
Find the total number of networks and number of host.
Question No. 3
Your manager has purchased a class C network range and has asked that you subnet this class C into two subnets for the two network segments that are going to be built. One network segment will host client machines used by customers to do online ordering, and the other segment will host the corporate machines used by your employees.
The class C network ID that you have purchased is 216.83.11.0. Once again, take a piece of paper and start by writing out the default subnet mask of this class C address and then start manipulating the host bits to get the network ID, first valid host ID, last valid host ID, broadcast address, and new subnet mask. Once you have calculated all the required information, fill in the following table:
Network ID First Valid Host
Last Valid Host
Broadcast Subnet Mask
Subnet 1Subnet 2
Find the total number of networks and number of host.
Question No. 4
Subnet this physical network structure.
59 Prepared by: MTGuillermo
DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology Department
TOPIC D: INTERNET PROTOCOL VERSION 6
IPv6 (Internet Protocol Version 6)
IPv6 is a new version of IP which is designed to be an evolutionary step from IPv4 The key to IPv6 enhancement is the expansion of the IP address space from 32 bits to
128 bits, enabling virtually unlimited unique IP addresses It is recommended by the Internet Engineering Task Force on July 25, 1994 (Toronto
IETF meeting) The IPv6 has auto configuration feature, automatically configures interface and Brouter
addresses for you IPv6 protocol can coexist with current IPv4 protocol
The IPv6 Address Space
60 Prepared by: MTGuillermo
DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology Department
IPv6 Conversion
Hexidecimal to Binary Conversion
Pv6 FeaturesThe following are the features of the IPv6 protocol:
New header format
Large address space
Efficient and hierarchical addressing and routing infrastructure
Stateless and stateful address configuration
Built-in security
Better support for prioritized delivery
New protocol for neighboring node interaction
Extensibility
IPv6 Implementations from MicrosoftMicrosoft® has the following implementations of IPv6:
The Next Generation TCP/IP stack in Windows Vista™ and Windows Server® 2008.
The IPv6 protocol for the Windows Server 2003 family.
The IPv6 protocol for Windows® XP Service Pack 1 (SP1) and later.
The IPv6 protocol for Windows CE .NET version 4.1 and later.
The capture and parsing of IPv6 traffic is supported by Microsoft Network Monitor.
61 Prepared by: MTGuillermo
DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology Department
For all the IPv6 implementations from Microsoft, you can use IPv6 without affecting IPv4 communications.
IPv6 address notation
There are three possible notation types that can be used to represent IPv6 addresses. The notation you use depends on the content of the address you want to represent.
1. Standard notation The standard notation for IPv6 addresses is to represent the address as eight 16-bit hexadecimal words separated by ``:'' (colons). For example:
FEDC:BA98:0332:0000:CF8A:000C:2154:7313
NOTE: It is not necessary to specify leading zeros, as long as there is at least one numeric value in each field of the address. The above address could also be represented as FEDC:BA98:332:0:CF8A:C:2154:7313.
2. Compressed notation Since a large number of IPv6 addresses contain multiple fields of zeros, there is a notation you can use to represent a single contiguous group of zero fields within an IPv6 address. This notation is a double colon ``::''. Some examples of how to use the ``::'' are shown below.
1762:0:0:0:0:B03:1:AF18 FF01:0:0:0:CA:0:0:2 0:0:0:0:0:0:0:1 0:0:0:0:0:0:0:0
can be represented as:
1762::B03:1:AF18 FF01::CA:0:0:2 ::1 ::
NOTE: The FF01:0:0:0:CA:0:0:2 example is represented as FF01::CA:0:0:2 because only one ``::'' is allowed in an address.
62 Prepared by: MTGuillermo
DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology Department
3. Mixed notation IPv4 addresses that are encapsulated in IPv6 addresses can be represented using the original IPv4 ``.'' notation as follows:
0:0:0:0:0:0:127.32.67.15 0:0:0:0:0:FFFF:127.32.67.15
It is also possible to use the compressed notation, so the addresses above would be represented as: ::127.32.67.15 ::FFFF:127.32.67.15
IPv6 PrefixesThe prefix is the part of the address that indicates the bits that have fixed values or are the bits of the subnet prefix. Prefixes for IPv6 subnets, routes, and address ranges are expressed in the same way as Classless Inter-Domain Routing (CIDR) notation for IPv4. An IPv6 prefix is written in
address/prefix-length notation. For example, 21DA:D3::/48 and 21DA:D3:0:2F3B::/64 are IPv6 address prefixes.
IPv6 Subnet Masking
What Gets Masked (Which Bits?)Like IPv4, an IPv6 address has a network portion and a device portion. Unlike IPv4, an IPv6 address has a dedicated subnetting portion. Here's how the ranges are divided in IPv6:
Network Address RangeIn IPv6, the first 48 bits are for Internet routing.1111111111111111.1111111111111111.1111111111111111.0000000000000000.0000000000000000.0000000000000000.0000000000000000.0000000000000000
Subnetting RangeThe 16 bits from the 49th to the 54th are for defining subnets.0000000000000000.0000000000000000.0000000000000000.1111111111111111.0000000000000000.0000000000000000.0000000000000000.0000000000000000
Device (Interface) Range:The last 64 bits are for device (interface) ID's.
63 Prepared by: MTGuillermo
DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology Department
0000000000000000.0000000000000000.0000000000000000.0000000000000000.1111111111111111.1111111111111111.1111111111111111.1111111111111111
Let's say you want to break your corporate network into 64 subnets. The binary mask just for the subnetting range would be1111110000000000 which translates to a hex value of FC00. Some IPv6 masking tools will work with just this one hex word, otherwise a full 128-bit hex mask would be FFFF:FFFF:FFFF:FC00:0:0:0:0.
Types of IPv6 Addresses
1. Unicast - communicate specified 1 computer
2. Multicast - communicate group of computers
3. Anycast send group address that can receive multiple computers,but receive 1 computer
Unicast IPv6 AddressesThe following types of addresses are unicast IPv6 addresses:
Global unicast addresses
Global unicast addresses are equivalent to public IPv4 addresses. They are globally routable and reachable on the IPv6 portion of the Internet.
Link-local addresses
Link-local addresses are used by nodes when communicating with neighboring nodes on the same link. For example, on a single link IPv6 network with no router, link-local addresses are used to communicate between hosts on the link.
Site-local addresses
Site-local addresses are equivalent to the IPv4 private address space (10.0.0.0/8, 172.16.0.0/12, and 192.168.0.0/16).
Unique local IPv6 unicast addresses
Special addresses
64 Prepared by: MTGuillermo
DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology Department
Special IPv6 AddressesThe following are special IPv6 addresses:
Unspecified address
The unspecified address (0:0:0:0:0:0:0:0 or ::) is only used to indicate the absence of an address.
Loopback address
The loopback address (0:0:0:0:0:0:0:1 or ::1) is used to identify a loopback interface, enabling a node to send packets to itself.
Compatibility AddressesTo aid in the migration from IPv4 to IPv6 and the coexistence of both types of hosts, the following addresses are defined:
IPv4-compatible address
The IPv4-compatible address, 0:0:0:0:0:0:w.x.y.z or ::w.x.y.z (where w.x.y.z is the dotted decimal representation of an IPv4 address), is used by IPv6/IPv4 nodes that are communicating using IPv6.
IPv4-mapped addressThe IPv4-mapped address, 0:0:0:0:0:FFFF:w.x.y.z or ::FFFF:w.x.y.z, is used to represent an IPv4-only node to an IPv6 node. It is used only for internal representation.
6 to 4 address
The 6to4 address is used for communicating between two nodes running both IPv4 and IPv6 over an IPv4 routing infrastructure. The 6to4 address is formed by combining the prefix 2002::/16 with the 32 bits of a public IPv4 address, forming a 48-bit prefix. 6to4 is a tunneling technique described in RFC 3056.
IPv4 Addresses and IPv6 EquivalentsIPv4 Address IPv6 Address
Internet address classes Not applicable in IPv6Multicast addresses (224.0.0.0/4) IPv6 multicast addresses (FF00::/8)Broadcast addresses Not applicable in IPv6
65 Prepared by: MTGuillermo
DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology Department
Unspecified address is 0.0.0.0 Unspecified address is ::Loopback address is 127.0.0.1 Loopback address is ::1Public IP addresses Global unicast addressesPrivate IP addresses (10.0.0.0/8, 172.16.0.0/12, and 192.168.0.0/16)
Site-local addresses (FEC0::/10)
Autoconfigured addresses (169.254.0.0/16) Link-local addresses (FE80::/64)
Text representation: Dotted decimal notation Text representation: Colon hexadecimal format with suppression of leading zeros and zero compression. IPv4-compatible addresses are expressed in dotted decimal notation.
Network bits representation: Subnet mask in dotted decimal notation or prefix length
Network bits representation: Prefix length notation only
DNS name resolution: IPv4 host address (A) resource record
DNS name resolution: IPv6 host address (AAAA) resource record
DNS reverse resolution: IN-ADDR.ARPA domain
DNS reverse resolution: IP6.ARPA domain
Name: ________________________________________________ Section: _______________
ACTIVITY 3: IPv6 Address Notation Exercise
In case multiple answers are possible, please circle all correct ones.
1. You have a /32 prefix starting with 2001:0db8. How do you search for it in the RIPE Database?
A. 2001:0db8 B. 2001:0db8/32 C. 2001:0db8::/32 D. 2001:db8::/32
2. How do you correctly compress the following IPv6 address:2001:0db8:0000:0000:0000:0000:0000:0c50
A.2001:0db8:0:0:0:0:0:0c50 B.2001:0db8::0c50 C.2001:db8::c50 D.2001:db8::c5
66 Prepared by: MTGuillermo
DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology Department
3. How do you correctly compress the following IPv6 address:2001:0db8:0000:0000:b450:0000:0000:00b4
A.2001:db8::b450::b4 C.2001:db8::b45:0000:0000:b4
B.2001:db8::b450:0:0:b4 D.2001:db8:0:0:b450::b4
4. How do you correctly compress the following IPv6 address:2001:0db8:00f0:0000:0000:03d0:0000:00ff
A.2001:0db8:00f0::3d0:0:00ff C.2001:db8:f0::3d0:0:ff
B.2001:db8:f0:0:0:3d0:0:ff D.2001:0db8:0f0:0:0:3d0:0:0ff
5. How do you correctly compress the following IPv6 address:2001:0db8:0f3c:00d7:7dab:03d0:0000:00ff
A.2001:db8:f3c:d7:7dab:3d:0:ff C.2001:db8:f3c:d7:7dab:3d0::ff
B.2001:db8:f3c:d7:7dab:3d0:0:ff D.2001:0db8:0f3c:00d7:7dab:03d::00ff
ACTIVITY: Enable IPv6 to WinXP
There are two alternative methods for activation IPv6 in WinXP (SP2)
Use the WinXP GUI to install the new protocol
67 Prepared by: MTGuillermo
DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology Department
From a CLI run “ipv6 install”
CHAPTER 5: NETWORK ON A WORKGROUP USING WINDOWS XP
OBJECTIVE:
Setting up a workgroup
68 Prepared by: MTGuillermo
DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology Department
Troubleshoot TCP/IP
Manage Connection
Configure Network Bridges
Mapped Network Drive
OUTLINE
A. Types of WorkgroupB. Setting up a Workgroup
C. Configuring Network Bridges
D. Managing Connection
E. Configuring TCP/IP
F. Troubleshooting Connections
G. Mapping Network Drives
ACTIVITY: Activity 1: Building Peer to Peer using Switch
Activity 2: Setting up NetMeetingActivity 3: Internet Café Software InstallationActivity 4: Building a Network using 4 switch (Use Packet Tracer)
TOPIC A: TYPES OF WORKGROUPS
Workgroup
A group of computers that are connected on a network and share resources, such as printers and files. When you set up a network, Windows automatically creates a
69 Prepared by: MTGuillermo
DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology Department
workgroup and gives it a name.
TYPES OF WORKGROUP
1. Direct Cable ConnectionA Direct Cable Connection (DCC) is not really a workgroup configuration in the true sense of the word, but it does bear mentioning here because it is a quick and easy method to connect two computers together.
Using a DCC, you can establish a connection between a Windows XP computer and any other Microsoft Windows computer that supports DCC connections.
2. EthernetEthernet is a networking standard and the most popular kind of network in usetoday. When you think of a network with a typical wired configuration, you aregenerally thinking of Ethernet.
3. HomePNAHomePNA is another type of network topology that is designed for home use, but itworks well in small offices too. HomePNA networks use typical PCI or USB NICs,but each NIC connects to a standard phone jack in the home or small office using astandard RJ-11 phone cable. Rather than using a hub and having wiring runningeverywhere, you simply use existing phone lines as the network.
4. Wireless Networks
Major Type of Wireless Network
1. Infrared—Infrared wireless uses an infrared beam to transmit data from one device to the next, and is most often used in PC devices.
2. Wireless Personal Area Networks (WPANs)—A WPAN is a personal areanetwork, meaning it resides in one generalized space, such as a room.
3. Wireless Local Area Networks (WLANs)—A WLAN is a wireless network that exists within one geographic location, such as in a home, office building, school, or other such structure.
70 Prepared by: MTGuillermo
DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology Department
4. Wireless Metropolitan Area Networks (WMANs)—WMANs allow communicationbetween different locations within a single metropolitan area.
5. Wireless Wide Area Networks (WWANs)—A WWAN connects WLANs that are separated over wide geographic areas.
TOPIC B: Setting up a Workgroup
71 Prepared by: MTGuillermo
DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology Department
Creating a workgroup
A. 1ST Method
1. Click the Start button and then click Control Panel
2. Double click System icon of control panel
A view of System Properties
3. Click the Computer Name Tab
72 Prepared by: MTGuillermo
DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology Department
4. Click button to change current computer name and workgroup
5. To join an existing workgroup, type the name of the workgroup that you want to join, andthen click OK.
6. To create a new workgroup, type the name of the workgroup that you want to create, andthen click OK.
Notes Assign each computer a
different, meaningful name. Assign each computer to the
same workgroup.
7. Click OK
8. To restart your computer click YES.
9. You have successfully created or joined a workgroup.
73 Prepared by: MTGuillermo
DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology Department
B. 2ND Method
1. Right-click my computer icon and choose properties.
2. Click COMPUTER NAME TAB THEN CLICK CHANGE BUTTON
Type Computer Name.
Example : Station1
Click Workgroup
Type the Workgroup name
Example: Networking
3. Click Ok
74 Prepared by: MTGuillermo
DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology Department
Files and Folders Sharing
Network users can access the files and folders that are shared. Resources that are not set up for sharing remain private. For example, you can enable the following resources for sharing:
Folders Drives Printers Internet access
Sharing files and folders
1. Locate the file and folder which you want to share
2. Right-click the file that you want to share, and then click Sharing and Security to view additional settings.
3. Remote access is turned off by default. Click the Security warning message:If you understand the security risks but want to share files without running the wizard, click here.
75 Prepared by: MTGuillermo
DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology Department
4. Select Just enable file sharing and click OK
5. Click Share this folder on the network, and then type a share name. You can use this name later to access the data. You can Allow network users to change files by enabling it.Click OK
Notes: The share name and the folder name do not have to be the same.
6. The shared folder will appear like this (with a hand under the folder)
76 Prepared by: MTGuillermo
DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology Department
7. You have successfully shared a folder.
Name: ________________________________________________ Section: _______________
Activity 2: Building a Switch Based Network
Objectives
Design and build a simple peer-to-peer network using a straight through cable supplied by the instructor.Verify connectivity between the peers using the ping command.File and Printer Sharing
Background / Preparation
In this hands-on lab, you will plan and build a simple network using switch, PCs and an Ethernet straight through cable.
The following resources are required:
Four Window XP Professional PCs, each with an installed and functional Network Interface Card (NIC)An Ethernet straight through cableSwitch
Diagram:
77 Prepared by: MTGuillermo
DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology Department
Procedure:
1. Connect PCs to a SWITCH as shown in the diagram. What cable type is used?
2. How would you know if you have connectivity?
3. If you do not have connectivity check the following:d. Switch/PC powered on?
e. Correct cables used?
4. From your command prompt, ping the IP address of another PC.
a. Are pings between other PC’s also seen? ___________________________________
b. What is the average time for a ping? ______________________________________
78 Prepared by: MTGuillermo
DR. FILEMON C. AGUILAR INFORMATION TECHNOLOGY TRAINING INSTITUTE
Computer and Networking Technology Department
c. Which is faster hub or switch? ___________________________________________
5. Can you ping the switch? Why not? ________________________________________________________________________
6. Connect and share the printer in PC 1
7. Create a document, share and print.
79 Prepared by: MTGuillermo