Experiment: - 01
Object:
- Identification of networking
device- Switch & Hub
Switch: - A switch is a device in a computer network that connects together other
devices. Multiple data cables are plugged into a switch to enable communication
between different networked devices. Switches manage the flow of data across a
network by transmitting a received network packet only to the one or more devices
for which the packet is intended. Each networked device connected to a switch
can be identified by its network address, allowing the switch to direct the
flow of traffic maximizing the security and efficiency of the network.
A switch is
more intelligent than an Ethernet hub, which simply retransmits packets
out of every port of the hub except the port on which the packet was received,
unable to distinguish different recipients, and achieving an overall lower
network efficiency.
An
Ethernet switch operates at the data link layer (layer 2) of the OSI
model to create a separate collision domain for each switch port. Each
device connected to a switch port can transfer data to any of the other ports
at any time and the transmissions will not interfere.[a] Because broadcasts are still being forwarded to all connected devices by
the switch, the newly formed network segment
continues to be a broadcast domain. Switches may also operate at
higher layers of the OSI model, including the network layer and above. A device
that also operates at these higher layers is known as a multilayer
switch.
Segmentation
involves the use of a switch to split a larger collision domain into smaller
ones in order to reduce collision probability, and to improve overall network
throughput. In the extreme case (i.e. micro-segmentation), each device is
located on a dedicated switch port. In contrast to an Ethernet hub, there is a
separate collision domain on each of the switch ports. This allows computers to
have dedicated bandwidth on point-to-point connections to the network and also
to run in full-duplex mode. Full-duplex mode has only one transmitter and one
receiver per collision domain, making collisions impossible.
The
network switch plays an integral role in most modern Ethernet local area networks (LANs). Mid-to-large sized LANs contain a number of
linked managed switches. Small office/home office (SOHO) applications typically use a single switch, or
an all-purpose device such as a residential gateway to access small office/home broadband services such as DSL or cable Internet. In most of these cases, the
end-user device contains a router and
components that interface to the particular physical
2. Hub:- A hub, also called a network hub, is a
common connection point for devices in
a network.
Hubs are devices commonly used to connect segments of
a LAN.
The hub contains multiple ports.
When a packet
arrives at one port, it is copied to the other ports so that all segments of
the LAN can see all packets.
What Hubs Do
Hubs and switches serve as a central connection for all of
your network equipment and handles a data type known as frames. Frames carry
your data. When a frame is received, it is amplified and then transmitted on to
the port of the destination PC.
Image: Hub and wireless hub network icons
In a hub, a frame is passed along or "broadcast" to
every one of its ports. It doesn't matter that the frame is only destined for
one port. The hub has no way of distinguishing which port a frame should be
sent to. Passing it along to every port ensures that it will reach its intended
destination. This places a lot of traffic on the network and can lead to poor
network response times.
Compared to a standard switch, the hub is slower as it can
send or receive information just not at the same time, but typically costs more
than a hub.
Passive, Intelligent and Switching Hubs
A passive hub serves
simply as a conduit for the data, enabling it to go from one device (or
segment) to another. So-called intelligent hubs include
additional features that enables an administrator to monitor the traffic
passing through the hub and to configure each port in the hub. Intelligent hubs
are also called manageable hubs.
A third type of hub, called a switching hub, actually reads the destination address of each packet and then forwards
the packet to the correct port.
Experiment: - 02
Object:-Sketch
Wiring Diagram Of Network Cabling Consider
A Computer Lab of 10 System
Local area network (LAN). Computer and
Network Examples
A
local area network (LAN) is a devices network that connect with each other in
the scope of a home, school, laboratory, or office. Usually, a LAN comprise
computers and peripheral devices linked to a local domain server. All network
appliances can use a shared printers or disk storage. A local area network
serve for many hundreds of users. Typically, LAN includes many wires and cables
that demand a previously designed network diagram. They are used by IT
professionals to visually document the LANs physical structure and arrangement.
The
Network Logical Structure Diagram is designed to show the logical organization
of a network. Shows the basic network components, network structure, and
determines the interaction of all network devices. The diagram displays basic
devices and zones: Internet, DMZ, LAN, and group. Clarifies what network
equipment is connected, describes the major nodes in the network, gives an
understanding of the logical structure of the network as well as the type of
interaction within the network.
Local Area Network Diagrams visualize the communication schemes
of LAN, and the networks arrangement in houses, offices and buildings. They are
used by IT professionals to visually document the LANs physical structure and
arrangement.
How to draw Local Area Network Diagram
Concept Draw has 1004 vector stencils in the 40
libraries that helps you to start using software for designing your own Local
Area Network Diagrams. You can use the appropriate templates and stencils
from Computer and Network Diagrams objects library.
·
Computer Network
library, contains 29 icon symbols of devices
and equipment. Use these shapes for drawing LAN, MAN and WAN diagrams at
physical and logical levels, network architecture, topology, wiring and layout
schematic and plans.
·
Computer peripheral
devices library, contains 20 icon symbols
of computer peripheral devices. Use these equipment shapes for drawing network
diagrams.
·
Computers and network
isometric library, contains 56 3D icon symbols
of computer and network devices. Use these equipment shapes for drawing
diagrams of computer and telecommunication networks, LAN, MAN and WAN
architecture, physical and logical topology, wiring schematic and cabling
layout plans.
·
External digital devices
library, contains 15 icon symbols. Use these
equipment shapes for drawing computer network diagrams.
·
Internet symbols
library, contains 11 icons of equipment
symbols. Use these Web shapes for drawing computer network diagrams.
·
Logical network diagram
library, contains 16 icon symbols. Use these
shapes for drawing logical computer network topology diagrams.
·
Logical symbols library, contains 38 icons of logical symbols. Use these shapes for
drawing logical computer network topology diagrams.
·
Network hardware
library, contains 27 icon symbols of network
hardware. Use these shapes for drawing computer network diagrams.
Experiment:-3
Object:-Establishing
a Local Area Network
To
establish a local Area Network consisting of three personal computers running
the Linux operating system, and a hub.
1.
Physically
connect computers
2.
Configure
IP addresses using ifconfig
3.
Manipulate
routing table using route
Background
Reading
Knowledge
of network addressing standards and Linux system administration relating to
Local Area Networks is necessary for this lab.
Required
Equipment
1.
Three
PCs (with Linux OS)
2.
PC’s
should be equipped with Network Interface Cards
3.
One
hub/switch
4.
Cables
Exercises
Students will
perform the following tasks and explain:
a. How they did them.
b. Why they were/weren’t successful.
c.
What they observed.
1.-Setup a
physical LAN
a.
\First,
determine which cables are necessary for the available hardware
b.
Insert
one end of the cable into the Hub/Switch and the other end of the cable into
the host computer.
c.
Connect
all host computers to the Hub/Switch as in the figure below
192.168.1.1 192.168.1.2 192.168.1.3
|
1
|
|
3
|
|
2
|
|
HUB/Switch
|
………………………………………………………………………………………………
1.
Host
set-up (e.g. IP address and netmask) using ifconfig
a. If config command usage for this part of the lab will be to configure network
interface devices. This includes adding
the IP address and the netmask for the host.
b. Boot each host
machine and log on with your user-name.
c.
.Open
a new terminal on each host and log on as root.
$
su -
#
password
d. Check network interface settings
using ifconfig
#
ifconfig –a
e. Verify that eth0 exists on each
host by checking the output from above
f. Set the ethernet interface at each
host using ifconfig
This
will assign an ip address and network mask to the host. The following is a
sample.
For
host 1: # if config eth0 192.168.1.1 netmask
255.255.255.0
g. Verify
communication among the machines by using the ping command.
On host 1 ping the other two hosts.
#
ping 192.168.1.2
--------output------
# ping 192.168.1.3
--------output------
On host A run traceroute to the other hosts
#traceroute 192.168.1.2
---------output---------
#traceroute
192.168.1.3
---------output---------
h. Changes
using ifconfig at this point are not
permanent and will be lost on reboot. To
make the configuration effective on reboot you need to edit the file /etc/sysconfig/networks-scripts/ifcfg-eth0
to have the following settings.
#
contents of ifcfg-eth0
DEVICE
= eth0
BROADCAST
= 192.168.1.255
IPADDR
= 192.168.1.1
NETMASK
= 255.255.255.0
NETWORK
= 192.168.1.0
ONBOOT
= yes
BOOTPROTO
= none
i. Check that the network script has
been added to the default init levels.
#
chkconfig --list
j. If the network script is not on
add it using chkconfig. This command adds the network script to the
current run level.
#
chkconfig --add network
1.
____
Manipulate routing tables
using route
a. The
route command is used to look at the hosts routing
table and can be used to add or delete routes from the table. It has the following syntax:
route
add|del –net|-host target [gateway] [metric] [device]
route
manipulates the kernel's IP routing table. Its primary use is to set up static
routes to specific hosts or networks via an interface after it has been
configured with the ifconfig command.
The command route with no
arguments displays the routing table.
b. After
the steps from part 2 the route to the network 192.168.1.0 will be in the
routing table. Verify the network is in
the routing table using the route
command.
#
route
---output---
To
illustrate the use and functionality of the command route, we will delete an
entry and add an entry to the
table. Delete the network 192.168.1.0 using the route command.
#
route del –net 192.168.1.0 netmask 255.255.255.0
Check the routing table and verify that
the network has been removed from the routing table.
#
route
Verify the deleted network is no longer
reachable.
#
ping 192.168.1.3
Add individual hosts to the routing
table to allow communication.
#
route add –host 192.168.1.2 dev eth0
#
route add –host 192.168.1.3 dev eth0
a.
Verify
these hosts are in the routing table.
#
route
b.
Use
the ping command to verify
communication among the machines has been restored.
#
ping 192.168.1.2
#
ping 192.168.1.3
c.
Notice
the machines were reachable when either the network or the individual host was
in the routing table. Note also that the
exercise manipulating the routing table was unnecessary since the ifconfig command places the network in
the routing table for us.
……………………………………………………………………
Experiment: - 04
Object:-use
of protocol in establishing LAN.
What is a Local Area
Network (LAN)?
A LAN is a collection of
computers, workstations, printers, and other devices that are connected over a
relatively small geographic area. A good example of a LAN would be a small
office with three or four computers, a shared printer, and a file server. The
advantages of a LAN offer users increased efficiency through such things as
email, shared printers and file exchange. The following figure shows three common
LAN Protocols and their typologies.
How do LAN Protocols
Relate to the OSI Reference Model?
As discussed in the
Networking I technical note, the first two OSI Reference Model layers are the
Physical and Data Link Layers. The Physical layer represents the medium, i.e.
cabling/hardware, by which data is transmitted. The Data Link layer is split
into two sublayers: Logical Link Control (LLC) and Media Access Control (MAC).
Typically, LAN protocols operate at these two layers of the OSI Reference
layers. The following figure maps several of the more popular LAN protocols to
the OSI Reference Model layers.
Media Access Methods
A LAN protocol must have
a standard for which it gains access to the network. If there were no rules or
standards governing network access, collisions and failures would bring the
network to a grinding halt. There are two basic media access methods used by
LAN protocols: token passing and carrier sense multiple access collision
detect, or CSMA/CD.
In CSMA/CD, the LAN
protocol first checks for another node transmitting data. If there is, it waits
for a specified time and then rechecks. If the network is free, it sends the
data across the network physical medium. Occasionally there will be a collision
of packets sent from two different nodes. If this happens, the LAN protocol
senses the collision, initiates a backoff algorithm, and resends the data. Each
node in the system will have a different backoff algorithm so that the packets
will not immediately collide again.
The second major media
access method is token passing. Possession of a "token" enables a
node on the network to transmit data. Only one node at a time can have control
of the token. After the transmission is completed, the sending node passes the
token to the next node on the network. If a node that receives the token has
data to transmit, it seizes the token and begins to transmit across the
network. If the receiving node has nothing to transmit, it immediately passes
the token to the next node.
Transmission Methods
Each LAN protocol has a
particular method of transmitting data across the network. The three basic
types of transmission methods are: unicast, multicast, and broadcast.
In unicast
transmissions, a node sends a single packet to another specific node on the
network. Multicast transmissions consist of a single packet that is copied and
sent to specific nodes on the network. LAN protocols that use broadcast
transmission send a single packet to all the nodes on a network. Nodes that are
not intended to receive the packet ignore the transmission.
Popular LAN Protocols
There are many LAN
protocols in use today. Some of the more common ones are Ethernet, Asynchronous
Transfer Mode (ATM), Token Ring and Fiber Distributed Data Interface (FDDI).
Ethernet is a common LAN protocol that can be found in most organizations. ATM
is gaining popularity. The quality of service and class of service make ATM a
very reliable LAN protocol that can handle voice and video more efficiently
than other protocols. Token Ring is a well-established protocol originally
developed by IBM in the 1970's. FDDI is a high bandwidth protocol that utilizes
fiber optic cable as its physical medium of transmission. FDDI is less popular
due to it's high cost of implementation.
The information required
to cover each protocol is out of the scope of this technical note. Because it
has been implemented to such a large degree, Ethernet and its specifications
will be discussed.
Experiment:- 05
Object:-
Troubleshooting of networks.
Introduction:-
Troubleshooting or dépanneuring is a
form of problem
solving, often applied to
repair failed products or processes on a machine or a system. It is a logical,
systematic search for the source of a problem in order to solve it, and make
the product or process operational again. Troubleshooting is needed to identify
the symptoms. Determining the most likely cause is a process
of elimination—eliminating
potential causes of a problem. Finally, troubleshooting requires confirmation
that the solution restores the product or process to its working state.
Basic network troubleshooting
Because of the variety of network hardware, network
configurations, operating systems, and setups, not all of the below information
may apply to your network or operating system.
Adapter resources
Verify that the network adapter is properly installed and
detected by the computer with no conflicts. In Microsoft Windows, open
the Device Manager and verify there
are no errors. "Network adapters" should be present for each network
adapter installed in the computer, similar to the example on the right.
If conflicts exist or the network adapter is being detected
as an "Other device", the network card has likely not been properly
installed in the computer. Try letting Windows re-detect and install the network
card by removing the network adapter and any other conflict devices from Device
Manager and then rebooting the computer. If Windows re-detects the card but
does not find the drivers, download the latest network card drivers from the
computer manufacturer's website or the network card manufacturer's website.
Verify connections
Wired Network:-
If there are no lights or the lights are orange or red, the
card may be bad, not connected properly, or may not be receiving a signal from
the network. If you are on a small or local network and have the capability of
checking a hub, switch, or router, verify that the cables are properly connected
and that it has power. If after checking the connections, the LED indicators
appear bad, the network adapter, port, or cable may be defective.
Wireless Network:- If you're using a laptop with a wireless
network, look for the laptop's Wi-Fi button and make sure it is turned on. Many
laptops have a Wi-Fi button that allows the wireless network to be turned on
and off. The Wi-Fi button is often located just above the keyboard or on the
front edge of the laptop, but it also may be integrated with a F key as well. The
pictures to the right are examples of a Wi-Fi button and Wi-Fi indicator on a F
key that are enabled.
If the button is turned on, make sure you're using the
correct Wi-Fi hotspot by right-clicking
on the Network icon in the Windows Notification
Area and
clicking "Connect to a network". Usually, the network with the
strongest connection (the most bars) will be your wireless router.
Finally, when connecting to most wireless networks, you
need to enter the proper SSID password to connect to the
network. If the incorrect password has been entered, you will not be able to
access the network.
Adapter functionality
Verify that the network card is capable of pinging itself
by using the ping command. Windows users can
ping the computer from a Windows command line. Unix and Linux users
can ping from the shell.
To ping the card or the localhost, type either of the
following commands:
ping 127.0.0.1
or
ping localhost
Executing either of the above commands should get replies
from the network card. If you receive an error, or the transmission fails, the
network card is not physically installed into the computer correctly, has the
incorrect or outdated drivers installed, or is defective.
Make sure the network card is physically installed in the
computer correctly by removing it and re-inserting it again. Check the network
card manufacturer's website for the latest drivers and install those drivers.
If the network card is defective, it needs to be replaced.
Connect to the router
If all of the above steps have been checked, and your
network has a router, make sure the computer can connect to
the router by performing the below commands.
Determine the routers address
Using the ipconfig command (or ifconfig command for Linux),
determine the router's address by looking at the Gateway address. Below are the
steps for Microsoft Windows users. Linux users can substitute ipconfig for
ifconfig.
2.
At the command prompt,
type ipconfig and press Enter. You should see output similar
to the example below.
Ethernet adapter Local Area Connection:
Connection-specific DNS Suffix . : computerhope.com.
IP Address. . . . . . . . . . . . : 192.168.1.103
Subnet Mask . . . . . . . . . . . : 255.255.255.0
Default Gateway . . . . . . . . . : 192.168.1.1
Connection-specific DNS Suffix . : computerhope.com.
IP Address. . . . . . . . . . . . : 192.168.1.103
Subnet Mask . . . . . . . . . . . : 255.255.255.0
Default Gateway . . . . . . . . . : 192.168.1.1
The Default Gateway is the address of your router. Most
home routers have a gateway address that starts with 192.168, like the address
shown above. Assuming your gateway address is 192.168.1.1, attempt to ping the
router to see if it can send and receive information by running the below
command.
ping 192.168.1.1
If you get replies back from the router, the connection
between your router and computer are good, and you can skip to the next step.
If you do not receive any replies back from the router, either
the router is not set up properly, or your connection between the router and
the computer is not correct. Reset your router to make sure it is not a problem
with your router by following the steps below.
1.
Turn off the power to the
computer and leave it off.
3.
Leave the power cables
disconnected for 10-15 seconds and then plug in your modem and then your router
again.
4.
Finally, turn on your
computer again and repeat this step to see if you can ping your router.
If you have a wireless network and followed the above
steps, but cannot ping the router, turn the computer off again and connect the
computer to the router using a network cable instead of wirelessly. If a wire
also does not work, contact the manufacturer of the router for additional
support or replacement.
Firewall
If your computer network utilizes a firewall, make sure all
required ports are open,
especially port 80, which is the HTTP port. If possible, disable the
firewall software or disconnect the computer from the firewall to make sure it
is not causing the network problems.
The Internet is not working
If you're able to ping the router, but are still unable to
connect to the Internet, either your router is improperly configured, or
the ISP is having issues.
Note: Some ISPs, such
as Comcast, require special
software to be installed. Make sure any software included with your Modem or
other hardware has been installed on at least one computer if you are setting
up a new Internet connection.
If your Internet has been working but recently stopped
working, give it a few minutes to make sure it is not a temporary outage. If
after waiting a few minutes, you still have problems, and you have not already
disconnected the power to your router and modem, follow the steps below.
1.
Turn off the power to the
computer and leave it off.
3.
Leave the power cables
disconnected for 10-15 seconds, plug in your modem again, and then plug in your
router again.
4.
Finally, turn on your
computer and see if you can ping your router.
If after following the above steps, the Internet is still
not working, open the Windows command line and run the below
command.
ping google.com
Running the above command should get a reply from Google.
If you get a reply, this is an indication that the Internet is working, but you
may be encountering a problem with the Internet browser you are using to
browse the Internet. Try an alternative browser, such as Firefox or Chrome.
If you're getting no reply from Google, your router or
modem is not reaching the Internet. If you have a router, make sure your router
has DHCP enabled and that
the WAN or Gateway address is the
proper ISP address.
Finally, if trying the above steps has not helped, contact
your ISP to make sure
there is no problem on their end and to assist you further with any special
configurations.
Additional troubleshooting
Another method of determining network issues is to use
the tracert command if you are a
Windows user or the traceroute command if you are a
Linux or Unix variant user. This command gives you an overview of each of the
devices (routers) a packet travels (hops) over a network. It can also give you
an idea of where a problem exists in your network or outside of your network.
To use this command, you must be at the command line and
type one of the below commands, depending on your operating system.
tracert google.com
or
traceroute google.com
Experiment: - 05
Object:- Installation of network Device Drivers.
Installation
of Network Card Driver
|
|
Once you installed a new network card (PC-card/PCMCIA in a notebook or PCI-card in a
desktop), Windows will detect the card , it will first display a message like:
"PCI Ethernet Card detected" and then it depends, whether your version of Windows knows
already the type of network card:
|
|
Windows
identified the Network card
an has a driver for it in its own library: it will start installing immediately the driver and other network components (if the Windows setup-files are NOT stored on your disk, it will prompt you for the Windows CD-ROM) |
Windows could NOT identify the network card and does NOT have a driver for it:
You are prompted to provide the floppy disk/CD-ROM provided by the manufacturer of the
network card. Please verify the path in "Copy manufacturer's files from" to point to the
location of the network drivers. If your Windows Setup-files are NOT stored on the harddisk,
you will also be prompted for the Windows CD-ROM:
Insert your CD-ROM, wait a few seconds (to allow the CD-ROM to spin up) and then click OK.
|
|
If
you get the window "Copying Files",
then you need to verify, that the path for "Copy files from" is correct and pointing to the location of the Windows SETUP-files (either on the CD-ROM or on your harddisk). You will also get this message when inserting the Windows Setup CD-ROM and you clicked too quickly on OK, the CD-ROM drive was not yet ready, click again on "OK". |
Once Windows has copied
the files, you will be prompted to restart your system:
Please, select "Yes", otherwise the network drivers will not be loaded and become activ.
Please, select "Yes", otherwise the network drivers will not be loaded and become activ.
Once
the system has rebooted, check that the device driver for the network card has
been
installed and is properly working:
In the "Control-Panel",
start the "System" Applet, select the tab:
"Device Manager":
Look at "Network Adapters", click on the "+" to display all installed adapters:
- does it show as symbol the
?
- display for the Network card the "Properties"
- does it show as "Device status ": "This device is working properly" ?
If there is no yellow mark or red-cross on the adapter icon and if the device is listed as
"working properly", you are ready to continue to configure your network.
installed and is properly working:
Look at "Network Adapters", click on the "+" to display all installed adapters:
- does it show as symbol the
- display for the Network card the "Properties"
- does it show as "Device status ": "This device is working properly" ?
If there is no yellow mark or red-cross on the adapter icon and if the device is listed as
"working properly", you are ready to continue to configure your network.
|
|
In
the "Control-Panel":
start the "System" Applet |
|
|
select
the tab: "Hardware",
then click in the section "Device Manager" on the button "Device Manager": |
|
|
Look
at "Network Adapters",
click on the "+" to display all installed adapters: - does it show as symbol the - display for the Network card via right-click the "Properties" |
|
|
tab:
General
does it show as "Device status ": "This device is working properly" ? If there is no yellow mark or red-cross on the adapter icon and if the device is listed as "working properly", you are ready to continue to configure your network. |
However, if the
"Device status" shows anythink like:
then you need to start Trouble-Shooting the Device-Manager problem :
- verify the error code (see Device Manager Codes ).
then you need to start Trouble-Shooting the Device-Manager problem :
- verify the error code (see Device Manager Codes ).
Experiment:-07
Object:-
installation of network(peer networking client server interconnection )
After acquiring a
computer, you may have one that is ready but doesn't have an operating
system. You may have a computer with an operating system but that OS cannot
be upgraded into Microsoft Windows Server 2003. In one of these cases, you
would need to perform a new installation.
1.
If the computer doesn't have an operating system but it meets
all the requirements and it can boot from the CD, start the computer. You may
receive a message stating "Operating system missing" or something
like that. Open the CD drive, put the CD in the drive, and close it. Restart
the computer. You should receive a message stating Press Any Key To
Boot From CD (or something like that)
Press any key to start the installation. If your computer already has an operating system, start it. Open the CD drive, put the CD in it, and close its door. If the operating system cannot be upgraded, a message box and display and let you know. Accept to perform a new installation and click Next
2.
When the installation starts, it will display a blue screen
with Windows Setup on top and some messages on the status
bar (bottom of screen).
After a while, the screen will change and display a new title based on the version of operating system you are installing. For example, if you are installing Microsoft Windows Server 2003 Enterprise Edition, the title would display Windows Server 2003, Enterprise Edition Setup The body of the screen will present options to you. To continue the installation, press Enter
3.
The next screen will show the Windows Licensing Agreement. Read
it. Since it is long, to navigate up and down, you can press Page Up or Page
Down. After reading it, if you accept the terms of the license, press F8. If
you don't like what it says, press ESC and stop the installation.
4.
The next screen asks you to select the partition you want to use
to install the operating system:
5.
After selecting the partition you will use, press Enter to
install the OS in it
6.
The next screen will ask you to format the selected partition
and specify the type of file system you want to use. Select the Format
The Partition Using The NTFS File Systemoption and press Enter
7.
In the next screen, the partition will get formatted. This may
take a few minutes.
Once the formatting is over, the installation will continue by copying files. After a while, a wizard, titled Windows Setup, will come up. Its first page presents you with two options. The first choice consists of changing the Regional and Language Options. The default options will be selected depending on your version of the CD. For example, if you bought the OS intended for a US use, the US English would be selected. If you want to change the language, click the Customize button. Another dialog box, titled Regional and Language Options, would come up with English (United States) selected. You can then click the arrow of its combo box to change the language. After making your selection, you can click OK. If you don't intend to change anything, you can click Cancel. The second option consists of making changes to the way the keyboard will interpret text. Once again, if you are installing the OS intended for a US audience, the US English is selected by default. If you want to change it, click Details. This would open the Text Services and Input Languages dialog box. You can change the language by clicking the arrow of the combo box. After making the change, you can click OK. To ignore any change, you can click Cancel or press Esc. After dealing with the Windows Setup dialog box, click Next
8.
The next screen request that you enter your name or the name of
the primary person who will be using the computer. You must type a name other
than Administrator or Guest
9.
The other text box, Organization, expects the name of the
company. Make sure that you provide this information
10.
After entering the name and the organization, click Next or
press Enter
11.
The next page of the wizard requests the Product Key, which you
must enter
12.
After typing the product key, click Next
13.
The next page of the wizard shows the options available for
licensing. You should accept the Per Server option and click Next
14.
The next page of the wizard, expects you to type the computer
name. It also suggests a default, based on the company name you would have
entered previously as the Organization. You can accept the suggested name,
which you can still change later on, or you can type a new name
15.
We haven't mentioned "user accounts" yet but during
installation, a user object is created and it is named Administrator. When
setting up the operating system, you must give a password to this account.
Obviously the password should not be too easy. Fortunately you can give it
temporary password and change it later on as your network, skills, and
concerned improve. You must enter the password in the Administrator Password
text box and type it again in the Confirm Password text box. Make sure you
remember this password because you will need it just after the installation
16.
After specifying the password, click Next
17.
The next page of the wizard allows you to set the date, the
time, and the time zone that the server will use. Most of the time, the
computer finds out the right date and the right time and it selects them. On
the other hand, you should adjust the time zone if the default is not the
right one. This page of the wizard also allows you the let the computer
adjust its clock when daylight time is switched during the year. The option
to change this is selected by default. If you don't want the computer to take
care of that, you can remove the check mark on the check box.
After changing the options or making sure that they are right, click Next
18.
After clicking next, the wizard is closed and the installation
continues copying files.
After a few minutes, a new wizard, titled Windows Setup, comes up. This time, it will ask you to accept or change the network settings of the server. The first option allows you to let the installation take care of networking details. The second option allows you to manually set them. Because we will review the details of this wizard in later lessons, accept the Typical Settings option and click Next
19.
The next page of the wizard allows you to actually make this
computer into a server.
Accept the first option not to "join" a domain. The wizard suggests WORKGROUP as the name of the "domain". If you don't like that name, change it. If you can't come up with a domain, you can use the one we will use. For our lessons, our domain will be called Neptune. In this case, in the top text box, type NEPTUNE
20.
After entering the name of the domain, click Next
21.
After clicking Next, the wizard will start copying the files,
again.
Once the installation has finished copying the files, the computer will start. When the computer comes back, you will be asked to log in. Press Ctrl + Alt + Delete to log in
22.
Accept the User Name as Administrator.
In the Password text box, type the password you entered during the installation
23.
Click OK.
If you see a window titled Manage Your Server, congratulations: you have finished installed Microsoft Windows Server 2003
After you have installed
Microsoft Windows Server 2003 as we did above, it is primarily a regular
computer. To use it as a server, you must properly transform it. Fortunately,
this is an easy process. When the computer comes up and displays the desktop,
the first window you see, titled Manage Your Server, allows you define the
"role" of the computer. A convenient link is available in the
middle of the window.
|
|
|
|
1.
Read the text in the window and click Add Or Remove A Role
2.
The first page of the wizard presents a summary of the actions
you must have taken before continuing:
Read it and click Next
3.
A dialog box will display briefly and then display a list of the
roles you can assign to the server.
In the list, click Domain Controller (Active Directory)
4.
Click Next
5.
Click Next to Run The Active Directory Installation Wizard
6.
Another wizard, titled Active Directory Installation Wizard,
comes up. Read its text and click Next
7.
In the second page of the wizard, read the text again, and click
Next
8.
In the third page of the wizard, you must specify whether this
is the first or an additional domain controller. As this is the first, accept
the first radio button and click Next
9.
In the fourth page of the wizard, accept the first radio button
and click Next
10.
In the fifth page, you must enter the name of the domain. The
name should be followed by an Internet domain name (.com, .net, .org, .us,
etc). If you have a domain in mind, type it. If you don't have a domain in
mind, for our lessons, type netconsulting.com
11.
Click Next
12.
In the next page of the wizard, a suggested NetBIOS name
displays, intended for earlier versions of Windows":
Accept it and click Next
13.
The next page allows you to specify where the Active Directory
information would be stored:
Accept the default and click Next
14.
The next page specifies where the domain's public files would be
stored:
Accept the default and click Next
15.
After a few seconds, the next page allows you to install DNS.
Read the options: Accept the suggested second radio button and click Next
16.
The next page allows you to set the default permissions:
Accept the suggested second radio button and click Next
17.
The next page prompts you to create a password used to start the
server in "Restore Mode". Enter a password in both text boxes:
18.
Click Next
19.
The next page displays a summary of your selections:
Read the text and click Next
20.
The wizard will start creating and configuring Active Directory:
After a while, if you don't have the Microsoft Windows Server 2003 CD in the drive, you may be be prompted to supply it: Do so After a few seconds, you may receive a message box informing you that your computer has a static IP address. Click OK When the dialog box comes up, simply click OK Another message box will come up. Click it and click OK. The wizard will continue copying files. After a few seconds, the last page of the wizard will display. Read its summary and click Finish
21.
You will be asked to restart the computer:
If you have a CD in the CD drive, remove it and click Restart New
22.
When the computer comes up, click the Options button and make
sure that the name of the domain is selected in the Log On To text box.
Make sure that Administrator is specified in the User Name text box. Enter your administrator's password
23.
Click OK
24.
After the computer displays the desktop, a dialog box titled
Configure Your Server will let you know whether the installation of Active
Directory was successful:
Click Finish |
0 Comments