data communication and computer network practical


                                                         Experiment: - 01
Object: -     Identification of networking device- Switch & Hub
Switch: - A switch is a device in a computer network that connects together other devices. Multiple data cables are plugged into a switch to enable communication between different networked devices. Switches manage the flow of data across a network by transmitting a received network packet only to the one or more devices for which the packet is intended. Each networked device connected to a switch can be identified by its network address, allowing the switch to direct the flow of traffic maximizing the security and efficiency of the network.

 
A switch is more intelligent than an Ethernet hub, which simply retransmits packets out of every port of the hub except the port on which the packet was received, unable to distinguish different recipients, and achieving an overall lower network efficiency.
An Ethernet switch operates at the data link layer (layer 2) of the OSI model to create a separate collision domain for each switch port. Each device connected to a switch port can transfer data to any of the other ports at any time and the transmissions will not interfere.[a] Because broadcasts are still being forwarded to all connected devices by the switch, the newly formed network segment continues to be a broadcast domain. Switches may also operate at higher layers of the OSI model, including the network layer and above. A device that also operates at these higher layers is known as a multilayer switch.
Segmentation involves the use of a switch to split a larger collision domain into smaller ones in order to reduce collision probability, and to improve overall network throughput. In the extreme case (i.e. micro-segmentation), each device is located on a dedicated switch port. In contrast to an Ethernet hub, there is a separate collision domain on each of the switch ports. This allows computers to have dedicated bandwidth on point-to-point connections to the network and also to run in full-duplex mode. Full-duplex mode has only one transmitter and one receiver per collision domain, making collisions impossible.
The network switch plays an integral role in most modern Ethernet local area networks (LANs). Mid-to-large sized LANs contain a number of linked managed switches. Small office/home office (SOHO) applications typically use a single switch, or an all-purpose device such as a residential gateway to access small office/home broadband services such as DSL or cable Internet. In most of these cases, the end-user device contains a router and components that interface to the particular physical
broadband technology. User devices may also include a telephone interface for Voice over IP (VoIP).
2. Hub:-   A hub, also called a network hub, is a common connection point for devices in a network. Hubs are devices commonly used to connect segments of a LAN. The hub contains multiple ports. When a packet arrives at one port, it is copied to the other ports so that all segments of the LAN can see all packets.

What Hubs Do

Hubs and switches serve as a central connection for all of your network equipment and handles a data type known as frames. Frames carry your data. When a frame is received, it is amplified and then transmitted on to the port of the destination PC. 


Image: Hub and wireless hub network icons
In a hub, a frame is passed along or "broadcast" to every one of its ports. It doesn't matter that the frame is only destined for one port. The hub has no way of distinguishing which port a frame should be sent to. Passing it along to every port ensures that it will reach its intended destination. This places a lot of traffic on the network and can lead to poor network response times.
Compared to a standard switch, the hub is slower as it can send or receive information just not at the same time, but typically costs more than a hub. 

Passive, Intelligent and Switching Hubs

passive hub serves simply as a conduit for the data, enabling it to go from one device (or segment) to another. So-called intelligent hubs include additional features that enables an administrator to monitor the traffic passing through the hub and to configure each port in the hub. Intelligent hubs are also called manageable hubs.
A third type of hub, called a switching hub, actually reads the destination address of each packet and then forwards the packet to the correct port.

 


                                                              Experiment: - 02

Object:-Sketch Wiring Diagram Of Network Cabling Consider

                A Computer Lab of 10 System

 



Local area network (LAN). Computer and Network Examples

A local area network (LAN) is a devices network that connect with each other in the scope of a home, school, laboratory, or office. Usually, a LAN comprise computers and peripheral devices linked to a local domain server. All network appliances can use a shared printers or disk storage. A local area network serve for many hundreds of users. Typically, LAN includes many wires and cables that demand a previously designed network diagram. They are used by IT professionals to visually document the LANs physical structure and arrangement.
The Network Logical Structure Diagram is designed to show the logical organization of a network. Shows the basic network components, network structure, and determines the interaction of all network devices. The diagram displays basic devices and zones: Internet, DMZ, LAN, and group. Clarifies what network equipment is connected, describes the major nodes in the network, gives an understanding of the logical structure of the network as well as the type of interaction within the network.
Local Area Network Diagrams visualize the communication schemes of LAN, and the networks arrangement in houses, offices and buildings. They are used by IT professionals to visually document the LANs physical structure and arrangement.

How to draw Local Area Network Diagram

Concept Draw has 1004 vector stencils in the 40 libraries that helps you to start using software for designing your own Local Area Network Diagrams. You can use the appropriate templates and stencils from Computer and Network Diagrams objects library.
·        Computer Network library, contains 29 icon symbols of devices and equipment. Use these shapes for drawing LAN, MAN and WAN diagrams at physical and logical levels, network architecture, topology, wiring and layout schematic and plans.
·        Computer peripheral devices library, contains 20 icon symbols of computer peripheral devices. Use these equipment shapes for drawing network diagrams.
·        Computers and network isometric library, contains 56 3D icon symbols of computer and network devices. Use these equipment shapes for drawing diagrams of computer and telecommunication networks, LAN, MAN and WAN architecture, physical and logical topology, wiring schematic and cabling layout plans.
·        External digital devices library, contains 15 icon symbols. Use these equipment shapes for drawing computer network diagrams.
·        Internet symbols library, contains 11 icons of equipment symbols. Use these Web shapes for drawing computer network diagrams.
·        Logical network diagram library, contains 16 icon symbols. Use these shapes for drawing logical computer network topology diagrams.
·        Logical symbols library, contains 38 icons of logical symbols. Use these shapes for drawing logical computer network topology diagrams.
·        Network hardware library, contains 27 icon symbols of network hardware. Use these shapes for drawing computer network diagrams.

 

 

 


 



                                                             Experiment:-3

Object:-Establishing a Local Area Network

 

 

To establish a local Area Network consisting of three personal computers running the Linux operating system, and a hub.

1.       Physically connect computers
2.       Configure IP addresses using ifconfig
3.       Manipulate routing table using route

Background Reading


Knowledge of network addressing standards and Linux system administration relating to Local Area Networks is necessary for this lab.

Required Equipment


1.       Three PCs (with Linux OS)
2.       PC’s should be equipped with Network Interface Cards
3.       One hub/switch
4.       Cables

Exercises

Students will perform the following tasks and explain:
a.       How they did them.
b.       Why they were/weren’t successful.
c.         What they observed.

                                     1.-Setup a physical LAN
a.       \First, determine which cables are necessary for the available hardware
b.       Insert one end of the cable into the Hub/Switch and the other end of the cable into the host computer.
c.        Connect all host computers to the Hub/Switch as in the figure below



192.168.1.1                  192.168.1.2                          192.168.1.3
1
3
2
 





HUB/Switch
                               



………………………………………………………………………………………………

1.       Host set-up (e.g. IP address and netmask) using ifconfig
a.       If config command usage for this part of the lab will be to configure network interface devices.  This includes adding the IP address and the netmask for the host.
b.       Boot each host machine and log on with your user-name.
c.        .Open a new terminal on each host and log on as root.
$ su -
# password

d.             Check network interface settings using ifconfig
# ifconfig –a

e.             Verify that eth0 exists on each host by checking the output from above

f.             Set the ethernet interface at each host using ifconfig
This will assign an ip address and network mask to the host. The following is a sample.

For host 1:            # if config eth0 192.168.1.1 netmask 255.255.255.0

g.     Verify communication among the machines by using the ping command. 

On host 1 ping the other two hosts.

# ping 192.168.1.2
--------output------
# ping 192.168.1.3
                                --------output------

                                On host A run traceroute to the other hosts

                                #traceroute 192.168.1.2
                                ---------output---------
                                #traceroute 192.168.1.3
                                ---------output---------
h.     Changes using ifconfig at this point are not permanent and will be lost on reboot.  To make the configuration effective on reboot you need to edit the file /etc/sysconfig/networks-scripts/ifcfg-eth0 to have the following settings.
# contents of ifcfg-eth0

DEVICE = eth0
BROADCAST = 192.168.1.255
IPADDR = 192.168.1.1
NETMASK = 255.255.255.0
NETWORK = 192.168.1.0
ONBOOT = yes
BOOTPROTO = none

i.              Check that the network script has been added to the default init levels.

# chkconfig --list

j.              If the network script is not on add it using chkconfig.  This command adds the network script to the current run level.

# chkconfig --add  network


 


1.       ____             Manipulate routing tables using route

a.     The route command is used to look at the hosts routing table and can be used to add or delete routes from the table.  It has the following syntax:
     route add|del  –net|-host  target [gateway] [metric] [device]

route manipulates the kernel's IP routing table. Its primary use is to set up static routes to specific hosts or networks via an interface after it has been configured with the ifconfig command.  The command route with no arguments displays the routing table.

b.     After the steps from part 2 the route to the network 192.168.1.0 will be in the routing table.  Verify the network is in the routing table using the route command. 
# route
---output---

To illustrate the use and functionality of the command route, we will delete an entry        and add an entry to the table. Delete the network 192.168.1.0 using the route command.
# route del –net 192.168.1.0 netmask 255.255.255.0
               
Check the routing table and verify that the network has been removed from the routing table.
# route

Verify the deleted network is no longer reachable.
# ping 192.168.1.3

Add individual hosts to the routing table to allow communication.
# route add –host 192.168.1.2  dev eth0
# route add –host 192.168.1.3  dev eth0

a.       Verify these hosts are in the routing table.
# route

b.       Use the ping command to verify communication among the machines has been restored.
# ping 192.168.1.2
# ping 192.168.1.3

c.        Notice the machines were reachable when either the network or the individual host was in the routing table.  Note also that the exercise manipulating the routing table was unnecessary since the ifconfig command places the network in the routing table for us.


……………………………………………………………………

 


                                                       Experiment: - 04
Object:-use of protocol in establishing LAN.
What is a Local Area Network (LAN)?

A LAN is a collection of computers, workstations, printers, and other devices that are connected over a relatively small geographic area. A good example of a LAN would be a small office with three or four computers, a shared printer, and a file server. The advantages of a LAN offer users increased efficiency through such things as email, shared printers and file exchange. The following figure shows three common LAN Protocols and their typologies.
How do LAN Protocols Relate to the OSI Reference Model?

As discussed in the Networking I technical note, the first two OSI Reference Model layers are the Physical and Data Link Layers. The Physical layer represents the medium, i.e. cabling/hardware, by which data is transmitted. The Data Link layer is split into two sublayers: Logical Link Control (LLC) and Media Access Control (MAC). Typically, LAN protocols operate at these two layers of the OSI Reference layers. The following figure maps several of the more popular LAN protocols to the OSI Reference Model layers.
Media Access Methods

A LAN protocol must have a standard for which it gains access to the network. If there were no rules or standards governing network access, collisions and failures would bring the network to a grinding halt. There are two basic media access methods used by LAN protocols: token passing and carrier sense multiple access collision detect, or CSMA/CD.
In CSMA/CD, the LAN protocol first checks for another node transmitting data. If there is, it waits for a specified time and then rechecks. If the network is free, it sends the data across the network physical medium. Occasionally there will be a collision of packets sent from two different nodes. If this happens, the LAN protocol senses the collision, initiates a backoff algorithm, and resends the data. Each node in the system will have a different backoff algorithm so that the packets will not immediately collide again.
The second major media access method is token passing. Possession of a "token" enables a node on the network to transmit data. Only one node at a time can have control of the token. After the transmission is completed, the sending node passes the token to the next node on the network. If a node that receives the token has data to transmit, it seizes the token and begins to transmit across the network. If the receiving node has nothing to transmit, it immediately passes the token to the next node.
Transmission Methods

Each LAN protocol has a particular method of transmitting data across the network. The three basic types of transmission methods are: unicast, multicast, and broadcast.
In unicast transmissions, a node sends a single packet to another specific node on the network. Multicast transmissions consist of a single packet that is copied and sent to specific nodes on the network. LAN protocols that use broadcast transmission send a single packet to all the nodes on a network. Nodes that are not intended to receive the packet ignore the transmission.
Popular LAN Protocols

There are many LAN protocols in use today. Some of the more common ones are Ethernet, Asynchronous Transfer Mode (ATM), Token Ring and Fiber Distributed Data Interface (FDDI). Ethernet is a common LAN protocol that can be found in most organizations. ATM is gaining popularity. The quality of service and class of service make ATM a very reliable LAN protocol that can handle voice and video more efficiently than other protocols. Token Ring is a well-established protocol originally developed by IBM in the 1970's. FDDI is a high bandwidth protocol that utilizes fiber optic cable as its physical medium of transmission. FDDI is less popular due to it's high cost of implementation.
The information required to cover each protocol is out of the scope of this technical note. Because it has been implemented to such a large degree, Ethernet and its specifications will be discussed.



 Experiment:-  05             
Object:- Troubleshooting of networks.
Introduction:-
Troubleshooting or dépanneuring is a form of problem solving, often applied to repair failed products or processes on a machine or a system. It is a logical, systematic search for the source of a problem in order to solve it, and make the product or process operational again. Troubleshooting is needed to identify the symptoms. Determining the most likely cause is a process of elimination—eliminating potential causes of a problem. Finally, troubleshooting requires confirmation that the solution restores the product or process to its working state.

Basic network troubleshooting


Because of the variety of network hardware, network configurations, operating systems, and setups, not all of the below information may apply to your network or operating system.

Adapter resources

Verify that the network adapter is properly installed and detected by the computer with no conflicts. In Microsoft Windows, open the Device Manager and verify there are no errors. "Network adapters" should be present for each network adapter installed in the computer, similar to the example on the right.
If conflicts exist or the network adapter is being detected as an "Other device", the network card has likely not been properly installed in the computer. Try letting Windows re-detect and install the network card by removing the network adapter and any other conflict devices from Device Manager and then rebooting the computer. If Windows re-detects the card but does not find the drivers, download the latest network card drivers from the computer manufacturer's website or the network card manufacturer's website.

Verify connections


Wired Network:-
If this is a wired network, verify that the network cable is properly connected and make sure the LEDs next to the network jack are properly illuminated. For example, a network card with a solid green LED or light usually indicates that the card is either connected or receiving a signal. If the green light is flashing, this is an indication of data being sent or received. The picture to the right is an example of a LAN port with two LED indicators next to the RJ-45 port. With this port, one LED will light up if connected properly and the other will flash when transmitting data.
If there are no lights or the lights are orange or red, the card may be bad, not connected properly, or may not be receiving a signal from the network. If you are on a small or local network and have the capability of checking a hubswitch, or router, verify that the cables are properly connected and that it has power. If after checking the connections, the LED indicators appear bad, the network adapter, port, or cable may be defective.
Wireless Network:- If you're using a laptop with a wireless network, look for the laptop's Wi-Fi button and make sure it is turned on. Many laptops have a Wi-Fi button that allows the wireless network to be turned on and off. The Wi-Fi button is often located just above the keyboard or on the front edge of the laptop, but it also may be integrated with a F key as well. The pictures to the right are examples of a Wi-Fi button and Wi-Fi indicator on a F key that are enabled.
If the button is turned on, make sure you're using the correct Wi-Fi hotspot by right-clicking on the Network icon in the Windows Notification Area and clicking "Connect to a network". Usually, the network with the strongest connection (the most bars) will be your wireless router.
Finally, when connecting to most wireless networks, you need to enter the proper SSID password to connect to the network. If the incorrect password has been entered, you will not be able to access the network.

Adapter functionality

Verify that the network card is capable of pinging itself by using the ping command. Windows users can ping the computer from a Windows command line. Unix and Linux users can ping from the shell.
To ping the card or the localhost, type either of the following commands:
ping 127.0.0.1
or
ping localhost
Executing either of the above commands should get replies from the network card. If you receive an error, or the transmission fails, the network card is not physically installed into the computer correctly, has the incorrect or outdated drivers installed, or is defective.
Make sure the network card is physically installed in the computer correctly by removing it and re-inserting it again. Check the network card manufacturer's website for the latest drivers and install those drivers. If the network card is defective, it needs to be replaced.

Connect to the router

If all of the above steps have been checked, and your network has a router, make sure the computer can connect to the router by performing the below commands.

                                                                                                                                           

Determine the routers address
Using the ipconfig command (or ifconfig command for Linux), determine the router's address by looking at the Gateway address. Below are the steps for Microsoft Windows users. Linux users can substitute ipconfig for ifconfig.
2.       At the command prompt, type ipconfig and press Enter. You should see output similar to the example below.
Ethernet adapter Local Area Connection:
Connection-specific DNS Suffix . : computerhope.com.
IP Address. . . . . . . . . . . . : 192.168.1.103
Subnet Mask . . . . . . . . . . . : 255.255.255.0
Default Gateway . . . . . . . . . : 192.168.1.1
The Default Gateway is the address of your router. Most home routers have a gateway address that starts with 192.168, like the address shown above. Assuming your gateway address is 192.168.1.1, attempt to ping the router to see if it can send and receive information by running the below command.
ping 192.168.1.1
If you get replies back from the router, the connection between your router and computer are good, and you can skip to the next step.
If you do not receive any replies back from the router, either the router is not set up properly, or your connection between the router and the computer is not correct. Reset your router to make sure it is not a problem with your router by following the steps below.
1.       Turn off the power to the computer and leave it off.
2.       Unplug the power to your router and cable modem or DSL modem.
3.       Leave the power cables disconnected for 10-15 seconds and then plug in your modem and then your router again.
4.       Finally, turn on your computer again and repeat this step to see if you can ping your router.
If you have a wireless network and followed the above steps, but cannot ping the router, turn the computer off again and connect the computer to the router using a network cable instead of wirelessly. If a wire also does not work, contact the manufacturer of the router for additional support or replacement.

Firewall

If your computer network utilizes a firewall, make sure all required ports are open, especially port 80, which is the HTTP port. If possible, disable the firewall software or disconnect the computer from the firewall to make sure it is not causing the network problems.


The Internet is not working

If you're able to ping the router, but are still unable to connect to the Internet, either your router is improperly configured, or the ISP is having issues.
Note: Some ISPs, such as Comcast, require special software to be installed. Make sure any software included with your Modem or other hardware has been installed on at least one computer if you are setting up a new Internet connection.
If your Internet has been working but recently stopped working, give it a few minutes to make sure it is not a temporary outage. If after waiting a few minutes, you still have problems, and you have not already disconnected the power to your router and modem, follow the steps below.
1.       Turn off the power to the computer and leave it off.
2.       Unplug the power cable to your router and cable modem or DSL modem.
3.       Leave the power cables disconnected for 10-15 seconds, plug in your modem again, and then plug in your router again.
4.       Finally, turn on your computer and see if you can ping your router.
If after following the above steps, the Internet is still not working, open the Windows command line and run the below command.
ping google.com
Running the above command should get a reply from Google. If you get a reply, this is an indication that the Internet is working, but you may be encountering a problem with the Internet browser you are using to browse the Internet. Try an alternative browser, such as Firefox or Chrome.
If you're getting no reply from Google, your router or modem is not reaching the Internet. If you have a router, make sure your router has DHCP enabled and that the WAN or Gateway address is the proper ISP address.
Finally, if trying the above steps has not helped, contact your ISP to make sure there is no problem on their end and to assist you further with any special configurations.

Additional troubleshooting

Another method of determining network issues is to use the tracert command if you are a Windows user or the traceroute command if you are a Linux or Unix variant user. This command gives you an overview of each of the devices (routers) a packet travels (hops) over a network. It can also give you an idea of where a problem exists in your network or outside of your network.
To use this command, you must be at the command line and type one of the below commands, depending on your operating system.
tracert google.com                                                                                                     
or
traceroute google.com
                                   


  Experiment: - 05
Object:-  Installation of network Device Drivers.

Installation of Network Card Driver

 
On a Windows 2000 / XP system, you need to logon as "Administrator" for this step.

Once you installed a new network card (PC-card/PCMCIA in a notebook or PCI-card in a
desktop), Windows will detect the card , it will first display a message like:
"PCI Ethernet Card detected" and then it depends, whether your version of Windows knows
already the type of network card:
Windows identified the Network card
an has a driver for it in its own library:

it will start installing immediately the driver and
other network components (if the 
Windows
setup-files are NOT stored on your disk
,
it will 
prompt you for the Windows CD-ROM)

Windows could NOT identify the network card and does NOT have a driver for it:

You are prompted to provide the floppy disk/CD-ROM provided by the manufacturer of the
network card. Please verify the path in "Copy manufacturer's files from" to point to the
location of the network drivers. If your Windows Setup-files are NOT stored on the harddisk,
you will also be prompted for the Windows CD-ROM:


Insert your CD-ROM, wait a few seconds (to allow the CD-ROM to spin up) and then click OK.
If you get the window "Copying Files",
then you need to verify, that the path for
"Copy files from" is correct and pointing
to the location of the Windows SETUP-files
(either on the CD-ROM or on your harddisk).

You will also get this message when inserting
the Windows Setup CD-ROM and you clicked
too quickly on OK, the CD-ROM drive was not
yet ready, click again on "OK".
Once Windows has copied the files, you will be prompted to restart your system:

Please, select "Yes", otherwise the network drivers will not be loaded and become activ.

Once the system has rebooted, check that the device driver for the network card has been
installed and is properly working:

 In the "Control-Panel", start the "System" Applet, select the tab: "Device Manager":

Look at "Network Adapters", click on the "+" to display all installed adapters:
- does it show as symbol the   ?
- display for the Network card the "Properties"
- does it show as "Device status ": "This device is working properly" ?

If there is no yellow mark or red-cross on the adapter icon and if the device is listed as
"working properly", you are ready to continue to 
configure your network.

 
In the "Control-Panel":
start the "System" Applet
select the tab: "Hardware",
then click in the section
"Device Manager" on the
button "Device Manager":
Look at "Network Adapters",
click on the "+" to display all
installed adapters:
- does it show as symbol the   ?
- display for the Network card
via right-click the "Properties"
tab: General

does it show as "Device status ":
"This device is working properly" ?

If there is no yellow mark or
red-cross on the adapter icon
and if the device is listed as
"working properly", you are ready
to continue to
configure your network.

However, if the "Device status" shows anythink like:

then you need to start 
Trouble-Shooting the Device-Manager problem :
- verify the error code (see 
Device Manager Codes ).




                                                                            Experiment:-07
Object:- installation of network(peer networking client server interconnection )
Installations and Connections

New Installation
After acquiring a computer, you may have one that is ready but doesn't have an operating system. You may have a computer with an operating system but that OS cannot be upgraded into Microsoft Windows Server 2003. In one of these cases, you would need to perform a new installation.
 Practical Learning: Installing the Server Operating System
1.       If the computer doesn't have an operating system but it meets all the requirements and it can boot from the CD, start the computer. You may receive a message stating "Operating system missing" or something like that. Open the CD drive, put the CD in the drive, and close it. Restart the computer. You should receive a message stating Press Any Key To Boot From CD (or something like that)
Press any key to start the installation.
If your computer already has an operating system, start it. Open the CD drive, put the CD in it, and close its door. If the operating system cannot be upgraded, a message box and display and let you know. Accept to perform a new installation and click Next
2.       When the installation starts, it will display a blue screen with Windows Setup on top and some messages on the status bar (bottom of screen).
After a while, the screen will change and display a new title based on the version of operating system you are installing. For example, if you are installing Microsoft Windows Server 2003 Enterprise Edition, the title would display
Windows Server 2003, Enterprise Edition Setup
The body of the screen will present options to you. To continue the installation, press Enter
3.       The next screen will show the Windows Licensing Agreement. Read it. Since it is long, to navigate up and down, you can press Page Up or Page Down. After reading it, if you accept the terms of the license, press F8. If you don't like what it says, press ESC and stop the installation.
4.       The next screen asks you to select the partition you want to use to install the operating system:
 
o    If you have only one partition and it looks small, such as less than 8 GB, simply select it
o    If you have only one partition and that, regardless of its size, you want to use it wholly to install the OS, select it
o    If you have only one partition but it is large and you want to create various partitions, first make sure it is selected it. Then, press C to partition it. The next screen would ask how much space you want to use for the new partition. By default, it will propose the total space for it. To reduce it, first press Backspace a few times to delete the numbers, then type the desired number of megabytes, and press Enter. Press the down arrow key to select the Unpartitioned Space option and press C. Continue in the same way until you have created the desired partitions
o    If you have many partitions already, to specify which one will be used to hold the operating system, use the up and down arrow keys to select it
5.       After selecting the partition you will use, press Enter to install the OS in it
6.       The next screen will ask you to format the selected partition and specify the type of file system you want to use. Select the Format The Partition Using The NTFS File Systemoption and press Enter
7.       In the next screen, the partition will get formatted. This may take a few minutes.
Once the formatting is over, the installation will continue by copying files.
After a while, a wizard, titled Windows Setup, will come up. Its first page presents you with two options.
The first choice consists of changing the Regional and Language Options. The default options will be selected depending on your version of the CD. For example, if you bought the OS intended for a US use, the US English would be selected. If you want to change the language, click the Customize button. Another dialog box, titled Regional and Language Options, would come up with English (United States) selected. You can then click the arrow of its combo box to change the language. After making your selection, you can click OK. If you don't intend to change anything, you can click Cancel.
The second option consists of making changes to the way the keyboard will interpret text. Once again, if you are installing the OS intended for a US audience, the US English is selected by default. If you want to change it, click Details. This would open the Text Services and Input Languages dialog box. You can change the language by clicking the arrow of the combo box. After making the change, you can click OK. To ignore any change, you can click Cancel or press Esc.
After dealing with the Windows Setup dialog box, click Next
8.       The next screen request that you enter your name or the name of the primary person who will be using the computer. You must type a name other than Administrator or Guest
9.       The other text box, Organization, expects the name of the company. Make sure that you provide this information
10.    After entering the name and the organization, click Next or press Enter
11.    The next page of the wizard requests the Product Key, which you must enter
12.    After typing the product key, click Next
13.    The next page of the wizard shows the options available for licensing. You should accept the Per Server option and click Next
14.    The next page of the wizard, expects you to type the computer name. It also suggests a default, based on the company name you would have entered previously as the Organization. You can accept the suggested name, which you can still change later on, or you can type a new name
15.    We haven't mentioned "user accounts" yet but during installation, a user object is created and it is named Administrator. When setting up the operating system, you must give a password to this account. Obviously the password should not be too easy. Fortunately you can give it temporary password and change it later on as your network, skills, and concerned improve. You must enter the password in the Administrator Password text box and type it again in the Confirm Password text box. Make sure you remember this password because you will need it just after the installation
16.    After specifying the password, click Next
17.    The next page of the wizard allows you to set the date, the time, and the time zone that the server will use. Most of the time, the computer finds out the right date and the right time and it selects them. On the other hand, you should adjust the time zone if the default is not the right one. This page of the wizard also allows you the let the computer adjust its clock when daylight time is switched during the year. The option to change this is selected by default. If you don't want the computer to take care of that, you can remove the check mark on the check box.
After changing the options or making sure that they are right, click Next
18.    After clicking next, the wizard is closed and the installation continues copying files.
After a few minutes, a new wizard, titled Windows Setup, comes up. This time, it will ask you to accept or change the network settings of the server. The first option allows you to let the installation take care of networking details. The second option allows you to manually set them.
Because we will review the details of this wizard in later lessons, accept the Typical Settings option and click Next
19.    The next page of the wizard allows you to actually make this computer into a server.
Accept the first option not to "join" a domain.
The wizard suggests WORKGROUP as the name of the "domain". If you don't like that name, change it. If you can't come up with a domain, you can use the one we will use. For our lessons, our domain will be called Neptune. In this case, in the top text box, type NEPTUNE
20.    After entering the name of the domain, click Next
21.    After clicking Next, the wizard will start copying the files, again.
Once the installation has finished copying the files, the computer will start. When the computer comes back, you will be asked to log in.
Press Ctrl + Alt + Delete to log in
22.    Accept the User Name as Administrator.
In the Password text box, type the password you entered during the installation
23.    Click OK.
If you see a window titled Manage Your Server, congratulations: you have finished installed Microsoft Windows Server 2003
The Role of a Server
After you have installed Microsoft Windows Server 2003 as we did above, it is primarily a regular computer. To use it as a server, you must properly transform it. Fortunately, this is an easy process. When the computer comes up and displays the desktop, the first window you see, titled Manage Your Server, allows you define the "role" of the computer. A convenient link is available in the middle of the window.

 Practical Learning: Configuring Active Directory

1.       Read the text in the window and click Add Or Remove A Role
2.       The first page of the wizard presents a summary of the actions you must have taken before continuing:



Read it and click Next
3.       A dialog box will display briefly and then display a list of the roles you can assign to the server.
In the list, click Domain Controller (Active Directory)

4.       Click Next

5.       Click Next to Run The Active Directory Installation Wizard
6.       Another wizard, titled Active Directory Installation Wizard, comes up. Read its text and click Next

7.       In the second page of the wizard, read the text again, and click Next

8.       In the third page of the wizard, you must specify whether this is the first or an additional domain controller. As this is the first, accept the first radio button and click Next

9.       In the fourth page of the wizard, accept the first radio button and click Next

10.    In the fifth page, you must enter the name of the domain. The name should be followed by an Internet domain name (.com.net.org.us, etc). If you have a domain in mind, type it. If you don't have a domain in mind, for our lessons, type netconsulting.com

11.    Click Next
12.    In the next page of the wizard, a suggested NetBIOS name displays, intended for earlier versions of Windows":



Accept it and click Next
13.    The next page allows you to specify where the Active Directory information would be stored:



Accept the default and click Next
14.    The next page specifies where the domain's public files would be stored:



Accept the default and click Next
15.    After a few seconds, the next page allows you to install DNS.
Read the options:



Accept the suggested second radio button and click Next
16.    The next page allows you to set the default permissions:



Accept the suggested second radio button and click Next
17.    The next page prompts you to create a password used to start the server in "Restore Mode". Enter a password in both text boxes:

18.    Click Next
19.    The next page displays a summary of your selections:



Read the text and click Next
20.    The wizard will start creating and configuring Active Directory:



After a while, if you don't have the Microsoft Windows Server 2003 CD in the drive, you may be be prompted to supply it:



Do so
After a few seconds, you may receive a message box informing you that your computer has a static IP address. Click OK
When the dialog box comes up, simply click OK
Another message box will come up. Click it and click OK. The wizard will continue copying files.
After a few seconds, the last page of the wizard will display. Read its summary and click Finish

21.    You will be asked to restart the computer:



If you have a CD in the CD drive, remove it and click Restart New
22.                When the computer comes up, click the Options button and make sure that the name of the domain is selected in the Log On To text box.
Make sure that Administrator is specified in the User Name text box.
Enter your administrator's password
23.    Click OK
24.    After the computer displays the desktop, a dialog box titled Configure Your Server will let you know whether the installation of Active Directory was successful:



Click Finish


Post a Comment

0 Comments