🎧 New: AI-Generated Podcasts Turn your study notes into engaging audio conversations. Learn more

Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

Transcript

Computer Systems Servicing NC-II Module 2: Configure Computer Server Computer Systems Servicing NC-II Alternative Delivery Mode Module 2: Configure Computer Server First Edition, 2020 Republic Act 8293, section 176 states that: No copyright shall subsist in any work of the Gov...

Computer Systems Servicing NC-II Module 2: Configure Computer Server Computer Systems Servicing NC-II Alternative Delivery Mode Module 2: Configure Computer Server First Edition, 2020 Republic Act 8293, section 176 states that: No copyright shall subsist in any work of the Government of the Philippines. However, prior approval of the government agency or office wherein the work is created shall be necessary for exploitation of such work for profit. Such agency or office may, among other things, impose as a condition the payment of royalties. Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names, trademarks, etc.) included in this book are owned by their respective copyright holders. Every effort has been exerted to locate and seek permission to use these materials from their respective copyright owners. The publisher and authors do not represent nor claim ownership over them. Published by the Department of Education Secretary: Leonor Magtolis Briones Undersecretary: Diosdado M. San Antonio Development Team of the Module Authors: Phebe S. Campeña Editors: Raymar C. Francia Reviewers: Miel M. Pineda and Susan J. Maaño Illustrator: Ma. Crezia D. Gutierrez Layout Artist: Name Management Team: Name of Regional Director Name of CLMD Chief Name of Regional EPS In Charge of LRMS Name of Regional ADM Coordinator Name of CID Chief Name of Division EPS In Charge of LRMS Name of Division ADM Coordinator Printed in the Philippines by ________________________ Department of Education – Region IVA CALABARZON Office Address: Gate 2, Karangalan Village, Cainta, Rizal, Philippines Telefax: 647-7487, 684-4914, 682-5773 E-mail Address: [email protected] Computer Systems Servicing Module 2: Configure Computer Server Introductory Message For the facilitator: Welcome to the Computer Systems Servicing NC-II for Grade 12 Alternative Delivery Mode (ADM) module on Configure Computer Server! This module was collaboratively designed, developed, and reviewed by educators both from public and private institutions to assist you, the teacher or facilitator in helping the learners meet the standards set by the K to 12 Curriculum while overcoming their personal, social, and economic constraints in schooling. This learning resource hopes to engage the learners into guided and independent learning activities at their own pace and time. Furthermore, this also aims to help learners acquire the needed 21st - century skills while taking into consideration their needs and circumstances. In addition to the material in the main text, you will also see this box in the body of the module: Notes to the Teacher This contains helpful tips or strategies that will help you in guiding the learners. As a facilitator, you are expected to orient the learners on how to use this module. You also need to keep track of the learners' progress while allowing them to manage their own learning. Furthermore, you are expected to encourage and assist the learners as they do the tasks included in the module. For the learner: Welcome to the Computer Systems Servicing NC-II Alternative Delivery Mode (ADM) Module on Configure Computer Server! The hand is one of the most symbolized parts of the human body. It is often used to depict skill, action, and purpose. Through our hands, we may learn, create, and accomplish. Hence, the hand in this learning resource signifies that you as a learner is capable and empowered to successfully achieve the relevant competencies and skills at your own pace and time. Your academic success lies in your own hands! This module was designed to provide you with fun and meaningful opportunities for guided and independent learning at your own pace and time. You will be enabled to process the contents of the learning resource while being an active learner. 2 This module has the following parts and corresponding icons: What I Need to Know This will give you an idea of the skills or competencies you are expected to learn in the module. What I Know This part includes an activity that aims to check what you already know about the lesson to take. If you get all the answers correct (100%), you may decide to skip this module. What’s In This is a brief drill or review to help you link the current lesson with the previous one. What’s New In this portion, the new lesson will be introduced to you in various ways such as a story, a song, a poem, a problem opener, an activity or a situation. What is It This section provides a brief discussion of the lesson. This aims to help you discover and understand new concepts and skills. What’s More This comprises activities for independent practice to solidify your understanding and skills of the topic. You may check the answers to the exercises using the Answer Key at the end of the module. What I Have Learned This includes questions or blank sentence/paragraph to be filled in to process what you learned from the lesson. What I Can Do This section provides an activity which will help you transfer your new knowledge or skill into real life situations or concerns. Assessment This is a task which aims to evaluate your level of mastery in achieving the learning competency. Additional Activities In this portion, another activity will be given to you to enrich your knowledge or skill of the lesson learned. This also tends retention of learned concepts. Answer Key This contains answers to all activities in the module. 3 At the end of this module you will also find: References This is a list of all sources used in developing this module. The following are some reminders in using this module: 1. Use the module with care. Do not put unnecessary mark/s on any part of the module. Use a separate sheet of paper in answering the exercises. 2. Don’t forget to answer What I Know before moving on to the other activities included in the module. 3. Read the instruction carefully before doing each task. 4. Observe honesty and integrity in doing the tasks and checking your answers. 5. Finish the task at hand before proceeding to the next. 6. Return this module to your teacher/facilitator once you are through with it. If you encounter any difficulty in answering the tasks in this module, do not hesitate to consult your teacher or facilitator. Always bear in mind that you are not alone. We hope that through this material, you will experience meaningful learning and gain deep understanding of the relevant competencies. You can do it! 4 What I Need to Know This module was designed and written with you in mind. It is here to help you master the nature of Computer Systems Servicing NC-II. The scope of this module permits it to be used in many different learning situations. The language used recognizes the diverse vocabulary level of students. The lessons are arranged to follow the standard sequence of the course. But the order in which you read them can be changed to correspond with the textbook you are now using. The module is composed of one lesson with the following contents: 1. Configure server function 2. Server modules and add-ons 3. Network services and its operation 4. Procedures in respond to unplanned events and condition 5. Domain Name Server (DNS) 6. Domain controller (active directory) 7. File server 8. Dynamic Host Configuration Protocol (DHCP) server 9. Printer server 10. Web applications/technologies 11. Setting up client/user access and security 12. Setting up and configuring servers 13. Installing and configuring modules/add-ons After going through this module, you are expected to: 1. configure Network Services: (TLE_IACSS912SUCS-IIIf-jIVa-j-38) a. check normal server function in accordance with manufacturer’s instructions; b. install and update required modules/add-ons on NOS installation procedures; c. confirm network services based on user/system requirements; d. check operation of network services based on user/system requirements; and e. Respond to unplanned events or conditions in accordance with established procedures. 5 What I Know Multiple Choice. Choose the letter of the best answer that describes the statement. Write your answer in CAPITAL LETTER in your answer sheet. 1. Networks are classified into two principal groups based on how they share information, what are they? A. Peer – to – peer networks and share-based networks B. Client network and server network C. Peer – to – peer networks and sever – based networks D. None of the above 2. What protocol automatically configures IP configuration for a client? A. DNS B. DHCP C. DHPC D. DC promo 3. After you install DHCP servers and configure and activate a scope, what is the last step in installing DHCP server? A. Register the server C. Authorize the server B. Register the client D. Register the client 4. Why do we network computers together? A. so they can share files and resources B. to have sole use of the machine and avoid bandwidth limitations C. a and b D. none of the above. 5. Which of the following statements about Windows Server 2012 Dynamic DNS (DDNS) is true? A. DDNS requires a Microsoft DHCP server to work. B. The Windows Server 2012 DDNS server can inter-operate with recent versions of BIND. C. DDNS clients may not register their own addresses. D. DDNS works only with Microsoft clients and server. 6. _______ allows an administrator to point a number of a special folders, such as documents, music, and downloads to location of your choice. A. Folder Redirection B. Group Policy C. Domain D. DCPromo 7. When the DHCP server finds a final unicast to the client that includes the IP information, the client will use _________. A. Offering B. Acknowledge C. DORA D. Request 8. What is a private range of addresses that automatically assigned by a host that cannot connect to DHCP server? A. SONET B. DNS server address C. APIPA D. Private IP address 9. Domain Name System (DNS) is worldwide service that resolves hostnames to IP addresses, what is the main purpose of DNS? A. Routing and remote access service of computer. B. Maintain a directory of domain names and translate them to IP Addresses. C. Connect to internet and find the devices. D. Convert human meaningful name to computer meaningful name. 6 10. Dynamic Host Configuration Protocol (DHCP) is a protocol for assigning dynamic IP address to device on a network. The following are the benefits of using DHCP, which does not belong? A. Safe and reliable configuration. B. Reduce configuration management. C. Assure that the client configuration is updated. D. None of the above 11. When does the DHCP server sends out a unicast of an IP address to the client computer? A. Offering B. Acknowledge C. Discovery D. Request 12. A coworker ask for help in analyzing a problem with DHCP server. The server’s scope has been created and the IP range appears to be valid. Yet, no client is obtaining IP addresses. Which of the following could be the reason for this? A. The server was not authorized. B. The scope was not activated. C. The scope was not authorized. D. The server was down. 13. You want to set up a computer to acquire an IP address from a newly configured DHCP server. Which of the following is the best command to use? A. Ping – n B. IPConfig/renew C. IPConfig/release D. Ping – new 14. If your system is infected by a virus, how will you recover the data? A. You need to install another hard disk with the latest anti – virus software, and an O.S. with latest patches. B. Copy the files into the system. C. Use an internet connection to connect the hardware and software of computer D. Install the firewall to hardware and install the latest anti – virus. 15. You would like to access local drives on the remote computer in the Remote Desktop Connection options, how would you do this service? a. Go to General settings and press Enter. b. Go to Display and you will see remote computer. c. Go to Local Resources, from network tab, look for remote. d. Go to Advanced tab and select remote computer. 7 Lesson 1 Configure Computer Server N etwork service configuration is a process of setting a network’s controls, flow and operation to support the network communication of an organization and/or network owner. This broad term incorporates multiple configuration and setup processes on network hardware, software, and other supporting devices and components.1 Network configuration can reduce downtime by allowing system administrations to rapidly identify changes being made in the network. It also helps ensure that software versions and hardware components are up to date and comply with the licensing agreement. This module will provide you information and skills in computer server configuration and on how to explore its various functions and services. Turn to the next page to start learning this module. What’s In Now, let’s first review our previous module that you have submitted. Just follow the steps you are tasked to do inside the laboratory if given an offline session. This can also be done using simulator called virtual box. You can download this online or you can ask your teacher for a copy of this application. There are guide questions in every step for you to answer and be able to fully refresh your knowledge. Are you excited? Of course, you are! Let’s get started. Don’t forget to fill out the table just like in the previous activities you have done. Use a separate sheet in answering this activity. Step 1 – Change IP address of both computers to static class. Guide Question -: How do IP classes differ? Step 2 – Change the computer name (PC001) and (PC002) and workgroup (ICT). Guide Question: What happened after changing the computer name and workgroup? Step 3 – Did the computer restarted? Why and why not configure network security settings. Do you remember how to do this? You can always go back to the previous module if not. Step 4 – Create a folder in documents with the filename (sample) inside the folder, then create a text file. 1 "What Is Network Configuration? - Definition From Techopedia", Techopedia.Com, 2020, https://www.techopedia.com/definition/25766/network-configuration. 8 Guide Question: Are you able to create the files? How would you know that it is in the correct path? Step 5 – Share this folder to all users with all permission. Guide Question: What are the types of permission you have checked? Where do you find them? Step 6 – Install any printer and share it to the network. Guide Question: How many printer brands have you seen? How did you share the printer? Step 7 – Change IP address of both computers to static class. Guide Question -: How do IP classes differ? STEP Successfully Problems encountered Remarks done? YES NO One Two Three Four Five Six Comments ____________________________________________________________________ After reading the introduction and carefully answering the pre - assessment test, you might have ideas of what you will be dealing with in this module. Now prepare to set yourself to answer the activity below. Write your answer on a piece of paper. 9 What’s New Supposed you entered a laboratory with the following materials: a. Network Switch b. UTP Cable 50m c. 100 pcs RJ 45 d. Crimping Tool e. LAN Tester f. 2” Desktop PC (Win7 / Winserver) g. Printer h. Patch Panel With these available materials, draw a network layout for 2 computers and connect them using how many meters of UTP cable, and indicate how many RJ 45 will be needed. Show where the printer, hub, and patch panel will be located. Use the laboratory layout below as your background. You will be graded according to the following rubrics and can get a highest score of 45 in this. Indicators Excellent Good Fair Score 20 15 10 Skill Level Advance skill level Very good skill Basic skill level is is evident. level is evident. evident. Layout/ 15 10 5 Format All the Most format Layout do not requirements and layout relate to the related to format related topics. Some and layout were requirements format and layout strictly followed. were met all. related requirements were met. 10 Personal 10 8 6 reflection/ Personal reflection Personal Personal Individual was well written reflection was reflection was with all required well written all addressed one or components. components two required Individual work were present. tasks. Complete was complete as Did not some assigned assigned. complete all tasks. assigned task. TOTAL Answer the following questions based on the layout you have drawn above. 1. What type of IP address should you use with client and server settings? 2. Can you differentiate the domain from the workgroup? Use your own words. 3. What things have you considered at the distance of two computers? Give at least 2. 4. Can the distance of network cable affect the integrity of the network? Why and why not give justification. 5. How is peer to peer different from server-based network? After reading the introduction and carefully answering the assessment test, you might have ideas of what you will be dealing with in this module. Now prepare yourself to answer the matrix lists of configuration skills that expected you to master. Check the appropriate column which describes the level of your confidence with the given skills. Write your answer on a piece of paper. I can do it I can do it but I am not Configuration Skills confidently with confident 1 3 assistance 2 1. I can set up computer name, date, time and configure IP address. 2. I can add roles in server PC. 3. I can manage and work the domain name services. 4. I can test the functionality of the computer (client/server). 5. I can assign and configure IP address. 6. I can execute the ipconfig command properly. 7. I can manage remote desktop connection. 8. I can configure Network Interface Card using DHCP. 11 9. I can enable firewall 10. I can configure file and printer sharing. TOTAL GRAND TOTAL Note: Add all the scores to get the grand total and then divide it by the total number of items. Refer to the verbal interpretation to determine your initial configuration ability. Numerical and Verbal interpretation Numerical Value Verbal Interpretation 2.51 – 3.00 Confident 1.76- 2.50 Confident but needs assistance 1.00 – 1.75 Not yet Confident What is It Network configuration allows a system administrator to set up a network to meet communication objectives. The process involves the following tasks: a. Router configuration: Specifies the correct IP address and router settings, etc. b. Host configuration: Sets up a network connection on a host computer/laptop by logging the default network settings, such as IP addressing, proxy, network name, and ID/password, to enable network connection and communication. c. Software configuration: Any network – based software, like an intrusion detection system (IDS), is allowed access and provide with appropriate credentials to monitor network traffic. Moreover, network configuration includes internet/network sharing, software/application installation and firewall installation configuration. 2 A. Configure Server Function The server is a computer program that provides a service to other computer programs and their users. A physical computer which runs a server program is frequently refer to as a SERVER. Servers perform various essential tasks and activities that are very crucial thing in any organization's IT infrastructure. The many complex processes that take place during an activity, for example, a security and authentication to billing and orders, the purchase could not take place without several powerful servers handling the load hence servers are very much important for any organization. 2 Dave Bourgeois and David Bourgeois, "Chapter 5: Networking And Communication", Bus206.Pressbooks.Com, 2020, https://bus206.pressbooks.com/chapter/chapter-5-networking-and- communication/. 12 1. Functions of Server The main and important function of a server is to listen in on a port for incoming network requests, and a good demonstration of this is the interaction between a Web server and browser. For a user the process is instantaneous, but when he clicks a link while surfing on the Web, several things are taking place behind the scenes like the request for the Web page is transmitted to the corresponding web server, and the server fetches and assembles the Web page and retransmits it using a protocol like HTTP, and, the user's browser receives the data, converts it, and displays the page. 2. Types of Servers There are mainly three types of Server Hardware are as given below: 2.1 Tower server It is a computer intended for use as a server built in an upright cabinet that stands alone. The cabinet is called a tower that is similar in size and shape to the cabinet for a tower-style personal computer. 2.2 Rack server A rack server is a rack-mounted server and a computer dedicated server to use as a server and designed to be installed in a framework called a rack. The rack contains multiple mounting slots, each designed to hold a hardware unit secured in place with screws. 2.3 Blade server A Blade server is a server architecture that houses multiple server modules in a single chassis. It is widely used to improve system management and either self-standing or rack-mounted, the chassis provides the power supply, and each blade has its own CPU, RAM, and storage. 1. Set Up Computer Name, Date, Time and IP Address (Server PC) There are plenty of reasons to change your computer’s name, date, time and IP address -especially if you bought it directly from a manufacturer and named something generic like “windows – user – pc”. If you want to connect computers through a home group, or just be able to recognize, which computer networks are you on network. 1.1 Set computer name as SERVER 1.2 Set your date and time zone (+8) 13 2. Configure IP Address (Use IP address with the same network ID of your WAP 192.168.0.1) B. Server modules and addons 1. Adding Roles (Server PC) Adding roles is a powerful tools that allows you to install and initialize the features and roles that the OS provide, as well as “ snap – in” functions to the server that would normally take a long series of commands in a terminal or powershell. Adding roles and feature wizard was first introduced in Windows Server 2008 R2 and has since become a main feature of the OS, allowing most users to easily install roles and features. Active Directory Domain Services (ADDS) 1.1 Click server manager 14 1.2 Click Roles 1.3 Click Next 1.4 Click the check box under the Active Directory and Domain Server and click next. 15 1.5 Click Next. 1.6 Click Install 1.7 Click Close 16 C. Network services and its operation In computer networking, a network service is an application running at the network application layer and above, that provides data storage, manipulation, presentation or other capability which is often implemented using a client – server or peer – to – peer architecture based on application layer network. There are four types of network services: 1. User management 2. Email 3. Printing 4. And system administration In a network environment the desktop is known as client computers or workstation. 1. What are the two types of network operating systems? There are two basic types of network operating systems, the peer – to – peer NOS and the client server NOS: Peer – to – peer operating systems allow users to share network resources saved in a common accessible network location. What are the four types of network? 1. LAN ( Local Area Network) 2. PAN (Personal Area Network) 3. MAN (Metropolitan Area Network) 4. WAN (Wide Area Network) 2. Advantages of Network Operating System Highly stable centralized servers. Security concerns are handled through servers. New technologies and hardware up – gradation are easily integrated to the system. Server access are possible remotely from different locations and types of systems. D. Procedures in Respond to Unplanned Events and Condition It is essential to maintain safe working conditions to prevent accidents and injury to any person or damage to any object in a work area. New staff and visitors must be informed of the appropriate safety procedures. Any transgression of the procedures must be reported. As an aspiring computer technician, you should be aware of all possible dangers in the workplace. It is a must to follow proper procedures for handling computer equipment. Failure to follow the prescribed safety procedures could result in fines, criminal convictions, and damage to equipment, claims for damage from the owner of the property and data, injury, or death. A safe work space is clean, organized, and well-lit. The disposal or recycling of hazardous computer components must be done properly. Make sure to follow regulations that govern how to dispose specific items. When an organization violates these regulations, there can be legal consequences. To keep you safe, this module provides the general and fire safety guidelines that protects the technician and the equipment. 3 3 Wrla.Org, 2020, https://www.wrla.org/sites/wrla_01/files/health_and_safety_manual_sample.pdf. 17 E. Domain Name Server (DNS) 1. Domain Name System (DNS) Microsoft defines the Domain Name System (DNS) as a hierarchical distributed database that contains mappings of fully qualified domain names (FQDNs) to IP addresses. DNS enables finding the locations of computers and services through user-friendly names and also enables the discovery of other types of records used for additional resources (which we will discuss later) in the DNS database. A much broader definition comes from the original Request for Comment (RFC), which was first released way back in November of 1983. RFC 882 ( http:// tools.ietf.org/html/rfc882 ) describes DNS conceptually, explaining how various components (domain name space, name servers, resolvers) come together to provide a domain name system. As you can imagine, a number of changes have been made to the original RFC. In fact, there have been three major RFC releases since the original debuted 25 years ago: RFC 883, RFC 1034, and RFC 1035. 1.1 Press Windows + R and type “dcpromo” and click “OK”. 1.2 Click Next. 18 1.3 Click Next. 1.3 Select create a New Domain in a forest and click Next. 1.4 Create a domain name (glimmers.com) and click Next. 19 1.5 Select Windows Server R2 and click Next 1.6 Click Next. 1.7 Click Yes. 20 1.8 Click Next. 1.9 Create a Password and click Next. 2.0 Click Next. 21 2.1 Select a reboot on a computer (automatically restart). F. Domain Controller (Active Directory) A domain controller (DC) is a server that responds to security authentication requests within a Windows Server Domain. It is the centerpiece of Windows Active Directory services. It authenticates users. Stores user account information and enforces security policy for a windows domain. 1. How to set – up Domain Controller? As the domain controller is vital for the functioning of Active Directory, configuration should be done carefully to avoid any errors. Follow the steps below to make sure your domain controller is set up perfectly. Before you begin, ensure you assign static IP address to your Domain Controller to help Active Directory objects locate the Domain Controller easily. Step 1: Install Active Directory Domain Services (ADDS) 1. Log into your Active Directory Server with administrative credentials. 2. Open Server Manager → Roles Summary → Add roles and features 22 3. The "Before you begin" screen, which pops up next, is purely for an informational purpose. You may read through it and click "next". 4. Select the installation type. If you're going to deploy your DC in a virtual machine, choose Remote Desktop Services installation. Else, choose Role- based or Feature-based installation. 5. Now, select the destination server on which the role will be installed. Make sure the IP address points to the selected server. Else, close the server manager and retry. 6. Select the roles you want to install on this server. The basic requirements to promote this server into a domain controller is Active Directory Domain Services. 23 7. The basic features required for proper functioning of this role are selected by default. Click next to install them. 8. Confirm your installation selections. It is recommended to select the "Restart the destination server automatically if required" button. Select "Install" and once installation is complete, close the window. 24 Step 2: Promote the server into a domain controller 1. Once the ADDS role is installed in this server, you will see a notification flag next to the Manage menu. Select "Promote this server into a domain controller" 2. Select “Add a new forest” and enter Root domain name. This domain name will also be the forest name. 3. Select a forest functional level and a domain functional level of your choice. Ensure that the domain functional level is equal to or higher than the forest functional leave. Since this is the first domain controller, it automatically becomes the DNS server and also the Global Catalog (GC). Enter a unique Active Directory Restore Mode password used to retrieve Active Directory data. 4. Since a DNS Server is being configured as part of our efforts, you’ll be warned that a delegation for this DNS server cannot be created. This can be safely ignored. 25 5. Enter a NetBIOS name for your domain. It is preferable to match the NetBIOS name with the root domain name. 6. Select the folder where your database, log files, and SYSVOL will be stored. It is recommended to stick to the default settings. 7. Review your options and click Next. A prerequisites check will be done by Active Directory. Once it is completed, click Install. 8. Your system will be rebooted automatically for the changes to take effect. Verify the health of the domain controller by running the command dcdiag /v from the command line. 26 G. File server In computing, a file server is a computer connected to a network which has the main objective of providing a place for shared storage of computer files (such as documents, sound files, photos, movies, pictures, databases, etc.) that can be accessed by the work they are connected to the computer network. 1. Technology — Models of file servers File servers have different purposes, some of them are: backup, information sharing, remote storage, among others. Each file server has different approaches about what comes to be a. Three of these models are widely used, which are: a. When a server has the file structure, and appoint some or all records with a unique key and can write, read, join, extend, remove, and many other operations; b. When the server does not have the internal structure of the files. Thus, the file server is not able to solve complex operations on them, but only reading and writing; c. When the server has a hierarchy, treating the files as a tree. This model is the most common of all because, apart from allowing such a hierarchy, it may have the internal structure of files, allowing complex operations and transfers. 2. File Servers – Management attributes File servers must allocate and manage at least two attributes to each file: a name or identifier and size, to know where and how much memory will take up such a file. However, in most file servers, there are more attributes, forming a set of attributes or a list of attributes. The form to which these attributes are treated also varies from server to server. Some commonly used attributes are – the access control, which determines how and which user can access the file – the hidden file, which determines whether the file is visible or not – the qualifications that says the file quality – the type of file, that says if the file is a song or a text document for example. 3. File Protection All file servers should somehow protect and control access to your files. The simplest and least reliable is to consider all client machines as trustworthy and just run all the applications that arrive. Another method, somewhat more reliable, is protection based on capabilities, with a bit map to indicate the permitted operations (Tanenbaum, Andrew S., Computer Networks), where there are passwords for a particular type of access and / or operations. 4. Connection between Client and Server Clients and servers communicate through protocols, as well as two or more network computers. The use of networked computers and, of course, the Internet, requires that each machine has a handle that is differentiated from others. Therefore, it is necessary, among other things that each computer has an address, somehow to be found. It is here that kicks in our main protocol called TCP / IP (Transmission Control Protocol / Internet Protocol). 27 H. Dynamic Host Configuration Protocol (DHCP) server 1. Dynamic Host Configuration Protocol (DHCP) Dynamic Host Configuration Protocol (DHCP) is a protocol for assigning dynamic IP addresses to devices on a network. With dynamic addressing, a device can have a different IP address every time it connects to the network. In some systems, the device’s IP address can even change while it is still connected. The basic flow that a DHCP server hands out configuring data, based on the administrator’s policy, to a requesting client. Common network parameters (sometimes referred to as “DHCP Options”) requested include subnet mask, router, domain name server, hostname, and domain name. The DHCP service brings thee key values: 1. Operation tasks are reduced: the network administrator no longer needs to manually configure each client before it can use the network 2. The IP addressing plan is optimized: addresses no longer being used are freed up and made available to new client connecting 3. User mobility is easily managed: the administrator doesn’t need to manually reconfigure a client when its network access point change. 1.1 Before adding DHCP roles, double check your DNS IP address. 1.2 Set your DNS Server must be the same with your IP address. (close all the active windows) 28 1.3 Open server manager. 1.4 Click Next. 1.5 Select DHCP server and click Next. 29 1.6 Click Next. 1.7 Click Next. 1.8 Click Validate (your preferred DNS MUST BE VALID) and click Next. 30 1.9 Click Next. 2.0 Click Add and set your Scope Name, Starting IP address and Ending IP address and click OK. Note: for your scope Use the same network ID with your WAP default IP address for your starting IP address and ending IP address. 2.1 Click Next. 31 2.2 Disable DHCPv6 and click Next. 2.3 Click Install. 2.4 Click Close. 32 I. Printer Server A print server, or printer server, is a device that connects printers to client computers over a network. It accepts print jobs from the computers and sends the jobs to the appropriate printers, queuing the jobs locally to accommodate the fact that work may arrive more quickly than the printer can actually handle. Ancillary functions include the ability to inspect the queue of jobs to be processed, the ability to reorder or delete waiting print jobs, or the ability to do various kinds of accounting (such as counting pages, which may involve reading data generated by the printer(s)). Print servers may be used to enforce administration policies, such as color printing quotas, user/department authentication, or watermarking printed documents. Print servers may support a variety of industry-standard or proprietary printing protocols including Internet Printing Protocol, Line Printer Daemon protocol, NetWare, NetBIOS/NetBEUI, or Jet Direct. A print server may be a networked computer with one or more shared printers. Alternatively, a print server may be a dedicated device on the network, with connections to the LAN and one or more printers. Dedicated server appliances tend to be fairly simple in both configuration and features. Print server functionality may be integrated with other devices such as a wireless router, a firewall, or both. A printer may have a built-in print server. J. Setting up client/user access and security In many cases, you will need to change the permissions that a certain group or individual user has to a file or folder. For example, you can designate a special folder on the W: drive within your department's area called "Incoming" as a place where students can turn in their work. To do this, you would first need to create a new folder on the W: drive. By default, the new folder will have the same permissions as the parent folder, which would not allow students to submit their work, and may not allow students to even access the folder. You would then need to allow students access to the new folder, and set permissions for the folder. When you set permissions, you are specifying what level of access students have to the folder and its files and what students can do within that folder such as save, delete, or read files. 1. Create a New Folder In many cases you will need to create a new folder. If you are using an existing folder and do not wish to create a new folder, continue with Accessing the Properties Dialog Box. 1.1 Click on the Start menu. 1.2 Click Computer. 1.3 From the Computer window, select the shared drive for your area or department (S Drive or W Drive). 1.4 Navigate to the location you want the new folder to appear (e.g., within one of your existing folders). On the menu bar, select New Folder. OR Right click » select New » select Folder. 33 A new folder is created which inherits the security permissions of its "parent." 1.5 In the newly created folder, type the desired folder name. 1.6 Press [Enter] or click off of the folder. 2. Accessing the Properties Dialog Box When working with permissions in Windows 7, you are required to work from the Properties dialog box. This dialog box for the file or folder you are working with can be accessed in a few steps. 2.1 Click on the Start menu. 2.2 Click Computer. 2.3 Select the folder or file you wish to adjust/view permissions for. 2.4 Right-click the folder or file. 2.5 Select Properties. The Properties dialog box appears. 3. Granting Access to a File or Folder After creating a new folder, or even if you will use an existing folder, you will need to determine who will have access to it. Also, keep in mind that by default the same persons who have access to the "parent" (original) folder also have access to the new folder, and vice versa. This may not be ideal. It is a simple process to grant access to specific users for any folder you have created. 3.1 Access the Properties dialog box 3.2 Select the Security tab. 3.3 Click Edit. The security tab opens in a new window 34 3.4 Click Add... The Select Users, Computers, or Groups dialog box appears. 3.5 In the Enter the object names to select text box, type the name of the user or group that will have access to the folder (e.g., 2125.engl.498.001 or [email protected]). HINT: You may type the beginning of the name and then click Check Names. The name will either be resolved or a list of users beginning with those characters will display for you to select from. 3.6 Click OK. The Properties dialog box reappears. 3.7 Click OK on the Security window. 3.8 Continue with Setting Permissions below. 4. Setting Permissions Once you have granted a group or individual user access to a folder, you will need to set permissions for the new user(s). When you set permissions, you are specifying what level of access a user(s) has to the folder and the files within it. Be careful about checking Deny for any permissions, as the Deny permission overrides any other related to Allow permissions. Folder permissions can be changed only by the owner of the folder (i.e., the creator) or by someone who has been granted permission by the owner. If you are not the owner of the folder or have not been granted permission by the owner, all checkboxes will be gray. Therefore, you will not be able to make any changes until the owner grants you permission. 4.1 Access the Properties dialog box. 4.2 Select the Security tab. The top portion of the dialog box lists the users and/or groups that have access to the file or folder. 35 4.3 Click Edit 4.4 In the Group or user name section, select the user(s) you wish to set permissions for 4.5 In the Permissions section, use the checkboxes to select the appropriate permission level 4.6 Click Apply 4.7 Click Okay The new permissions are added to the file or folder. 5. Advanced Folder Level Permissions When you set permissions, you specify what users are allowed to do within that folder, such as save and delete files or create a new folder. You are not limited to choosing one of the standard permissions settings (Full Control, Modify, Read & Execute, List Folder Contents, Read, or Write). Instead of choosing one of these settings, you may set your own unique permissions based on what you would like users to be able to do. For an understanding of how options can be combined, refer to Permission Types: An Overview. Remember, folder permissions can only be changed by the owner of the folder (i.e., the creator) or by someone who has been granted permission by the owner. If you are not the owner of the folder or have not been granted permission by the owner, the checkboxes will be grayed out. Therefore, you will not be able to make any changes until the owner grants you permission. 5.1 Access the Properties dialog box 5.2 Select the Security tab Near the bottom right of the Properties dialog box, click Advanced The Advanced Security Settings dialog box appears. 36 5.3 Optional) If you do not want the new folder to have the same permissions as the "parent" (original) folder and wish to set unique permissions for the new folder, click the Change Permission button near the bottom. This will bring up a similar window. a. Uncheck the Include inheritable permissions from this object's parent checkbox A Windows Security warning dialog box will appear. b. Click Remove if you want someone removed from permission all together NOTE: Read the instructions carefully and choose the action you wish to have taken for permissions. 5.4 Click the Change Permissions button 5.5 Select the appropriate user OR Click Add and enter the name of the user or group that will have access to the folder. 5.6 Click Edit... The Permissions Entry dialog box appears. 37 5.7 In the Permissions section, use the checkboxes to set the appropriate permissions NOTE: If you are not the owner of the folder or have not been granted permission by the owner, all checkboxes will be gray. Therefore, you will not be able to make any changes until the owner grants you permission to do so. 5.8 From the Apply to: pull-down list, select what level you wish to apply these permissions to Click OK 5.9 In the Advanced Security Setting dialog box, click OK 5.10 Click OK from the duplicate Advanced Security Settings 5.11 In the Properties dialog box, click OK The new folder permissions are added for your specified user(s). K. Setting up and Configuring Servers Sometimes, it’s better to assign a PC it’s own IP address rather than letting your router assign one automatically. Join us as we take a look at assigning a static IP address in Windows. a.1 Static vs. Automatic IP Addressing Right now, the IP addresses for your PCs and other devices are probably assigned automatically by your router using a procotol known as Dynamic Host Configuration Protocol (DHCP). It’s a handy way for devices to connect to your network more easily, because you don’t have to configure IP addressing for each new device yourself. The downside to automatic addressing is that it’s possible for a device’s IP address to change from time to time. Mostly, that’s not a big deal, but there are times that you might want a device to have a static, unchanging IP address. For example: 38 1. You have a device (like a home media server, say) that you want to be able to find reliably and you (or other devices) prefer to locate it by IP address. Using IP addresses is often much handier when troubleshooting your network, for example. 2. You have certain apps that can only connect to network devices using their IP address. In particular, many older networking apps suffer this limitation. 3. You forward ports through your router to devices on your network. Some routers play nice with port forwarding and dynamic IP addresses; others do not. Whatever your reason, assigning static IP addresses to devices is not difficult, but you do have a choice to make—whether to do it from the router or on the device itself. a.2 Assign Static IP Addresses Via Your Router While this article covers assigning static IP addresses to PCs within Windows itself, there is another way to go about it. Many routers allow you to assign a pool of IP addresses that are handed out to specific devices (based on the device’s physical, or MAC address). This method offers a couple of significant advantages: IP addresses are still managed by the router, meaning that you won’t have to make (and keep up with) changes on each individual device. It’s easier to assign addresses within the same IP address pool your router uses. This article is about assigning static IP addresses directly to PCs running Windows. We’ve already got a great guide on How to Set Static IP Addresses On Your Router, so if that’s the way you want to go, be sure to give it a read. With all that in mind, though, let’s take a look at how to assign static IP addresses within Windows XP, Vista, 7, 8, and 10. a.3 Set a Static IP Address in Windows 7, 8, or 10 To change the computer’s IP address in Windows, you’ll need to open the “Network Connections” window. Hit Windows+R, type “ncpa.cpl” into the Run box, and then hit Enter. 39 In the “Network Connections” window, right-click the adapter for which you want to set a static IP address, and then select the “Properties” command. In the properties window for the adapter, select “Internet Protocol Version 4 (TCP/IPv4)” and then click the “Properties” button. Select the “Use the following IP address” option, and then type in the IP address, subnet mask, and default gateway that corresponds with your network setup. Next, type in your preferred and alternate DNS server addresses. Finally, select the “Validate settings upon exit” option so that Windows immediately checks your new IP address and corresponding information to ensure that it works. When you’re ready, click the “OK” button. 40 And then close out of the network adapter’s properties window. Windows automatically runs network diagnostics to verify that the connection is good. If there are problems, Windows will give you the option of running the Network troubleshooting wizard. However, if you do run into trouble, the wizard likely won’t do you too much good. It’s better to check that your settings are valid and try again. 41 b.1 Sharing with the Network Using Advanced Sharing As you will see, this way of sharing is rather old-school but also very powerful. It allows for detailed customization of what you are sharing, but it does have limitations in what you can share. Those limitations will also be covered in this lesson. But first you will learn how to enable “Advanced Sharing” and then learn how to use it to share resources with the network and the Homegroup. During this process you will also learn how to limit the number of users that can connect to what you are sharing. Next, you will see how to change the share name of a shared folder or drive and use multiple share names for the same resource. Last, but not least, we will explain how to stop sharing a folder or a drive with “Advanced Sharing” and how to limit access to a specific user account or group while still sharing it with others. What is Advanced Sharing in Windows? Advanced Sharing is one way of sharing resources in Windows. It allows for detailed customization of the way you are sharing and it has the following characteristics: a. You can use it to share folders, external hard drives and internal drives (your partitions, Blu-Ray or DVD drives). b. You can use it to deny access to a specific resource for a specific user account or user group. c. You can use it to limit the number of simultaneous users accessing a shared resource. d. You can use it to share resources with one or more share names. e. You cannot use “Advanced Sharing” for sharing libraries or printers. How to Enable Advanced Sharing in Windows? “Advanced Sharing” is enabled by default when you share devices like external hard drives or your computer’s Blu-Ray or DVD drive. It is disabled by default when you share folders. If you want to use it for sharing folders as a replacement for the “Sharing Wizard”, then you need to disable the “Sharing Wizard”. Open File Explorer in Windows 8.x or Windows Explorer in Windows 7. In Windows 8.x, expand the “View” tab on the ribbon and press the “Options” button on the far right. 42 The “Folder Options” window, where you can enable “Advanced Sharing”, is now open. In Windows 7, click the “Organize” button on the Explorer toolbar and then “Folder and search options”. In the “Folder Options” window, go to the “View” tab. In the “Advanced Settings” section you will find lots of configuration options for Windows/File Explorer. 43 Scroll to the bottom of the list and you will find an option that says “Use Sharing Wizard (Recommended)”. To enable the “Advanced Sharing”, clear this option and press “OK”. Then, close the “Folder Options” window. “Advanced Sharing” is now enabled also for sharing folders. How to Access Advanced Sharing for a Folder or Drive? After “Advanced Sharing” is enabled in Windows, you can start using it for sharing folders and drives. In order to start using “Advanced Sharing” for sharing a folder, you need to first select it in File Explorer (in Windows 8.x) or Windows Explorer (in Windows 7). Once you select the folder in Windows 8, expand the “Share” tab on the ribbon. In the “Share with” section you will find only one option which says “Advanced Sharing”. 44 A click or tap on it opens the folder’s Properties window, directly at the “Sharing” tab. There you have two sections: Network File and Folder Sharing – this indicates whether the folder is shared or not. If the folder is shared, you will also see the network path to that folder. The network path is the path used by other computers or devices to access that folder. Advanced Sharing – this section only includes the “Advanced Sharing” button that starts the wizard for sharing with the network. Password Protection – this informs you whether others need to have a user account and password for your computer in order to access the folders you are sharing with the network. To start sharing with others, press the “Advanced Sharing” button. 45 Once you select the folder in Windows 7, click “Share with” on the toolbar and then “Advanced sharing settings”. This opens the folder’s Properties window, directly at the “Sharing” tab, just like in Windows 8.x. The sections and options displayed are the same in Windows 7 and Windows 8.x. Another way to start “Advanced Sharing” is to right-click the folder that you want to share with the network. On the menu, select “Share with” and then “Advanced sharing”. 46 L. Configuration of Network Services 1. Conduct Testing (Client PC) Client testing verify the server operations of a client application independently, without relying on the application under test. Testing the concurrency features of a client/server application. Testing the intercommunication capabilities of networked application. Test your network connection (client to server) Go to your client PC NOTE: Sometimes after successfully installing your DHCP server the Q network location window will appear automatically. 1.1 Go to Network Sharing Center (Right Click your Local are Network and Client Network Client Sharing. 47 1.2 Click change adapter setting. 1.3 Right click your Local Area Connection and Click Disable. 1.4 Right click Local Area Connection, click Enable and Close. 48 1.5 Go to run and type CMD. 1.6 Ping the IP address of your server. - Troubleshoot if necessary 2. Join the Domain (Client PC) 2.1 Right click the computer properties and click change. 49 2.2 Type the domain name (glimmer.com) and click OK. 2.3 Log on as administration account and click Ok. 2.4 Click ok and close (restart the pc to take effect. 50 3. Creating Organizational Unit and User Account (Server PC) 3.1 Click start, Administrative Tools and select Active Directory Users and Computers. 3.2 Double click the domain name. 3.3 Click New and select New and Organizational Unit (OU). 51 3.4 Type your organizational name, uncheck protect container from accidental deletion and click OK. 3.5 Right click under your organizational unit, click new and select User. 3.6 Type your first name, logon name, and click Next. 52 3.7 Type your password, check user cannot change password, password never expires and click Next. 3.8 Click finish. 4. Folder Redirection (Server PC) Folder redirection allows you as an administrator to point a number of special folders, such as documents, music and downloads, to locations of your choice. The most common use of this is to locate folders such as My documents on a network share so that it can be centrally backed up. As of Windows Serve 2008 R2, the folder you can redirect are as follow: video, music, desktop, searches, documents, favorites, appdata (roaming), pictures, links, contacts, saved games, start menu, and downloads. a. Setting - up Folder Redirection Method 1 Folder Sharing 53 a.1 (Create folder) Right click, click new and select folder. a.2 Type folder name and press Enter. a.3 Right click folder. 54 a.4 Click advance sharing. a.5 Click share these folders and click permission. a.6 Select full control. 55 a.7 Click apply and click OK. a.8 Click apply and click OK. a.9 Click share 56 a.10 Click the dropdown button. a.11 Select everyone. a.12 Click the dropdown button on everyone. 57 a.13 Select read and write and click share. a.14 Click done. a.15 Click close. 58 b. Creating Group Policy Object b.1 Click start, administrative tools and group policy Management. b.2 Double click the forest (domain name). b.3 Double click domains. 59 b.4 Double click your domain (glimmers.com). b.5 Right click under your organizational unit and select create a GPO in the domain, and link here. b.6 Type your redirection name and click ok. 60 b.7 Double check your organizational unit and right click your GPO and select edit. b.8 Double click policies (under user configuration). b.9 Double click windows setting. 61 b.10 Double click folder redirection. b.11 Right click, (desktop, documents, picture & etc.) and select properties. b.12 Click settings. 62 b.13 Select basic – redirected everyone’s folder for the same location, copy your network path from your shared folder, paste it to the root path and click apply. b.14 Click Yes. b.15Click OK. 63 b.16 Go to run, type “ gpupdate/force” and press Enter. b.17 Log in your User Account to the client computer. b.18 Check if the GPO is working. - Go to your shared account. - The user account name folder will appear. - If the shared folder is still empty. - Try to run the “gpupdate” again and log off/restart your client pc 64 c. Method 3 Taking Ownership c.1 Double click your redirected folder ?(desktop, etc.) and double click again (desktop, etc). c.2 Click continue. c.3 Click advance. 65 c.4 Go to the owner tab. c.5 Click edit. c.6 Click administrator, check replace owner of sub containers and objectives and click apply. 66 c.7 Click yes. c.8 Click ok c.9 Click ok and close. 67 c.10 Right click (redirected folder desktop, documents, etc.) and select properties. c.11 Go to the security tab. c.12 Click edit. 68 c.13 Click add. c.14 Type “au” and click check names. c.15 Click ok. 69 c.16 Select full control. c.17 Click apply and click ok. 5. Remote Desktop Connection (Client PC) Remote Desktop Services, is known as terminal Services in Windows Server 2008 and earlier, is one of the components of Microsoft Windows that allow a user to take control of a remote computer or virtual machine over a network connection. How to remote desktop connection for client PC? 5.1 Click start, right click computer and click properties. 70 5.2 Click Remote setting (log in Administrator Account). 5.3 Click allow remote assistance to this computer. Click allow connections from computer etc. and click apply and Ok. 5.4 Click start and control panel. 71 5.5 Click system and security. 5.6 Click windows firewall. 5.7 Click turn windows firewall on or off (log in as “Administrator” account). 72 5.8 Turn off Windows Firewall (not recommended). Click Ok and close. a. Conduct Testing a.1 Click start and select Programs. a.2 Click accessories. 73 a.3 Click Remote Desktop Connection. a.4 Type the IP address/computer name of your server and click Ok. a.5 Log in administrator account. 74 a.6 Click Yes. 75 What’s More Independent Activity 1: Word Search Now that you are ready and more knowledgeable, let’s have an activity that tests your memory and ability. You’re going to find the word which is describe from the statement/clues below by encircling them in the puzzle. You can encircle words horizontally, vertically, or diagonally. A N N N E T W O R K D E S I G N N O I T A R U G I F N O C P I A T O O B E F A S B E E R O A R L D F D B R O W S E F G G H D U E T T E L N E T R W S D D F D I Z R G W S U B M A S K H A D R H R W C O M P U T E R C K U P E F O W E R R R P I N G Z H I E S M T A T C H M E E R T E N B U S D V 1. Refers to the planning of the implementation of a computer network structure. 2. Connects network devices in such a way that personal workstations can share data, tools, programs. 3. It is a numerical label assigned to each device connected to a computer network that uses the internet protocol for communication. 4. __________________ is a logical division of an IP network. 5. It indicates the network portion of an IP address. 6. A computer network administrator software utility used to test the reachability of a host on an Internet Protocol network. 7. It is a command used to find out the IP address of a certain network you are connected to. 8. It is the primary method used to manage network devices at the command level. 9. An electronic machine that can store and work with large amounts of information. 10. A special program called a browser to find and look at the information on the internet. 76 Independent Assessment 1: I know you! After finding the words that are part of our lesson, here is another assessment that tests your mastery in configuring network systems, read each statement, and identify if the statement is true or false. Write True if statement is correct and write False if the statement is incorrect. 1. Folder redirection allows saving data regardless of storage, location, and separate user data from profile data. 2. The system can reduce downtime by allowing system administrations to rapidly identify changes being made in the network. 3. Adding roles and feature wizard was first introduced in Windows Server 2008 R2. 4. Another way to start Advanced Sharing is to right-click the folder that you want to share with the network. 5. Web technology gives way to interact with the hypertext information. 6. The configuration is a public or private sharing of computer data or space in network with various levels of access privilege. 7. In P2P network, each peer is an end – user’s computer connected to each other peer via the internet. 8. File servers must allocate and manage at least two attributes to each file. 9. A safe work space is clean, organized, and well-lit. 10. LAN allows detailed customization of what you are sharing, but it does have limitations in what you can share. Independent Activity 2: Follow me After identifying some related topics in configure network systems, now let’s have another activity. This activity will teach you how to create a new user account for Windows 7. Just follow the easy steps below. After following the easy steps in creating new user account in windows 7, kindly answer the following questions that will help you to deepen your thoughts and skills in dealing with the said competency, thus ,will help you provide a wider knowledge in assessing yourself and mastery of the content. 1. Click the start button, the bottom at your left. Guide Question: What is the user account? 2. Go and type in the search box control panel. Guide Question: What happens after you open the box control panel? 77 3. Make sure that your View is by category. Click the link "'Add or remove user accounts'" under the heading link User Accounts and Family Safety. Guide Question: Is it easy for you to find the link? What problems did you encounter in finding the link? 4. Create a new account Guide Question: What difficulties did you meet in creating new user account? 5. Type the name for the account Guide Question: Are you able to create the user account in Windows 7? How would you know if you are in the correct path? 6. Choose the account type i.e. Standard user or Administrator. Guide Question: What happens after you choose the account type? 78 7. Click on the "Create Account" button and the account will be created. Guide Question: After clicking the creating account, is there any changes that happen in your computer/device? 8. Click on start button and click "log off". Guide Question: What will happen after logging off your devices? 9. You will see the new account at login screen. You can select the account and login to that created account. Guide Question: How do you feel about the activity? 79 Independent Assessment 2: Lets fill it How was the activity? Let’s try another assessment that will help you to understand further. Fill out the blanks by selecting the word(s) inside the box below. Installation Configured Network Operation Compatible 1. Network software installation takes place along with the ______________ of the operating system software. 2. Group Policy contains settings that can be ___________ to control what’s happening with users and computer. 3. If you want to connect computers through a home group, or just be able to recognize, which computer networks are you on ____________. 4. Client testing verifies the server ___________ of a client application independently, without relying on the application under test. 5. All printers with the right type of connector are _______________ with all print servers. Independent Activity 3. Setup User Access After creating a new user account, let’s try another assessment. I hope you enjoy this one! Now that you are ready and well equipped in configuring network system, here is the activity for you to test your memory, knowledge, and skills from our previous lesson. Read the instruction below. Direction: Install windows server 2008 and windows 7 on virtual box application. After installing windows server 2008 you have to configure few things before you get started. You will be graded using the rubrics below. You can have the highest possible score of 50 for this assessment. Try your best to get 80% in this activity, this will be the passing rate. Initial Configuration Task - Go to Start>run>type OOBE 1. Set Time Zone -Change time zone into “Taipei” 2. Configure network -Click properties>Click Use following IP address IP address-192.168.0.2 Subnet – 255.255.255.0 Default gateway – 192.168.0.2 3. Provide Computer name and domain - Click Changes> Computer name: CSS >Click ok 4. Enable remote desktop - Select Allow connections from computers running any version of remote desktop 5. Installing Active Directory Domain Server - Run the “dcpromo” > 80 Next >select Create new domain in a new forest > Next> type css.com > Select windows server 2008 R2>next>click “yes” > Create a password: @passw0rd > check reboot. - Log-in account using the password you created 6. Installing DHCP - click role>add role> select DHCP server > click “validate” 192.168.0.2 > click add > Add scope Scope name: LAN_DHCP_LAB1 Starting IP : 192.168.0.100 Ending IP : 192.168.0.120 Subnet : 255.255.255.0 Default gateway: 192.168.0.2 Disable ipv6 stateless mode> click install 7. Joining client (windows 7) to domain (windows server 2008) Note: You must be in Windows 7 operating system. -verify first if the windows7 has an IP address assigned from the server. -To verify just type CMD in the search menu or press winkey+R the command prompt will be display Type “ipconfig” the IP address will be display and it should be like this: Connection –specific DNS suffix…. : ict.com Ipv4 address……………………………….. : 192.168.0.100 Subnet mask……………………………….. : 255.255.255.0 Default gateway………………………….. : 192.168.0.2 Note: if there is no IP address appeared on cmd command prompt it means there is something wrong in your configuration. If you already verify the network connection and there is an IP address assigned from server then proceed to the next step. Go to start menu>all program> right click “computer”> the system window will be display Click “change setting” change the computer name : “PC1” select domain and type “ict.com” 81 A windows Security from the server will be display User name : Administrator Password : @password Windows 7 is now connected to the widows’ domain server 8.Creating active directory client user – note: you must be in windows server OS. Go to server manager>roles> Active domain services > Active Directory Users and computer>click css.com> Create Organizational Unit css.com > right click > new > organizational unit Name: CSSLAB > OK 82 Now windows 7 has already a user account from the server You can now login to the user client using the account you created from the server. User : User1 Pass.: @password 9. print management services – click roles > add roles> select print services and file services> 10. Configuring folder redirection - Create a folder with a file name “redirection”> Right Click folder>properties > click sharing > click everyone > permission level “co-owner”> done 83 -after the folder was shared, we will proceed to create a Group Policy Management. Go to start > administrative tools >Group Policy Management Right click the css.com Domain>Organizational unit> create Org. Unit named CSSLAB. Under CSSLAB right click and create GPO in this domain name it “redirection 84 Your Policy is there we have to configure this one just right click on it and click edit. On edit you have this new Page, under the User Configuration click User Configuration> policies> Windows settings> Folder redirection> you Can redirect all the folders 85 Folder Redirection example 1. Right click the desktop folder and click properties 2. Desktop properties will appear 3. Click the drop down menu and select “basic redirect’s everyone to the same location” Folder Redirection example 5. Just copy the network path link of the folder redirection that you created on the desktop. 6. Paste the path link of your redirection folder on the root path. 7. Click on settings and check or select the “move the contents of the desktop to the new location” and “also apply the policy..etc” settings then ok. 8. Go to your Windows 7 and execute the CMD command and type on the command prompt “gpupdate /force” we need to update to grab the settings from the server that we recently created. 86 Performance Rubrics Criteria Excellent Good Pair Score 20 15 10 All steps for Some of the Few of the Proper configuration steps for steps for configuration was properly configuration configuration done. was properly was properly done. done. 20 15 10 The specified job Some Other / few was done by specified job specified job following the was done by was done by Adherence to the procedures. following the following the Procedures Safety measures procedures. procedures. were observed Safety Safety during the measures measures were activity. were observed observed during the during the activity. activity. Quality of work 10 8 6 The device was The device Not yet already install and was not yet configure install and properly. configure properly. TOTAL Independent Assessment 3. Setup User Access In this part, here is another assessment for you, to sum up your learnings from the three activities you’ve done. What you need to do is to accomplish the graphic organizer below by comparing and differentiating the three options in configure network services. Put 2 similarities and differences of each (configuration network services, folder redirection, adding roles, DHCP, set up servers and clients) you will have a total of 20 points in this assessment if you answered them all completely.Use a separate sheet in answering this assessment. Use a VENN diagram as your graphic organizer. 87 What I Have Learned Configure network services is utilized to the purpose of overseeing the operation of a computer network using specialized management software tools. It is critical for debugging and security compliance in all networked environments. In this module, we learn how to deal with computers which are in demand these days. I learn things such as: 1. IP address of each network interface every machine. 2. Configure security and IP addressing. 3. Set up sharing and control. 4. Set up user accounts. 5. How DHCP operates based on client to server model. 6. Proper network setting and configuration 7. What are the purpose and function of folder redirection. 8. How to deal with different troubleshooting and problems usually encountered in laboratory. 9. Dealing and setting up client and user access and security. 10. And to learn how to work under pressure and any circumstances. Learning is fun, learning is enjoyable, learning can take away from you. 88 What I Can Do Direction. Pretend that you are a network engineer in a starting small office business. You are to create a server with 3 users: a. Juan Pineda, b. Julius Babao, c. and Mark Dizon. Configure the following: 1. Use @password1 to all users and administrators. 2. Share printers to all users and administrator privileges. 3. Use Class C IP address for both computers 4. Change domain to ICTTECH 5. Organizational unit to ICTOU 6. With an IP pool for 25 computers. ***Other settings not given are for you to set on your own. You will be graded to the following rubrics. You can have a highest possible score of 100 for this assessment. Try your best to get 80% in this activity, this will be the passing rate. Scores Performance / Output Indicator Student’s 10 7 5 Score Student did not Student Student identify and A. Prepared and correctly identified and prepare all the identified the identified and prepared all the needed material / needed prepared all the needed material devices for material/devices needed material / devices for Server/Client for Server/Client / devices for Server/Client Network without Network Server/Client Network with supervision and Network. minimal errors. assistance. 20 18 16 Student Student successfully Student did not successfully changed the successfully changed the computer server change the B. Set up user computer server name, IP computer server access name, IP Address, sharing name, IP Address, 1. Configured Address, sharing properties, and sharing properties, computer properties, and firewall and firewall server firewall independently independently independently according to end according to end according to end user user requirements user requirements without supervision requirements. but with few and assistance. errors. 20 18 16 Student Student Student did not 2. Added Roles successfully successfully successfully added and features added ADDS, added ADDS, ADDS, DNS, and DNS, and DHCP DNS, and DHCP DHCP server roles server roles and server roles and and all features all features all features needed according 89 needed needed to end user according to end according to end requirements user user without supervision requirements. requirements and assistance. but with errors 20 18 16 Student successfully Student did not Student connected the successfully successfully 3. Connected client to the connect the client connected the the server to server computer to the server client to the the client using user computer using server computer computer access user access using user configurations configurations access made with made without configurations minimal supervision and made. supervision and guidance assistance. 20 18 16 Student successfully Student did not Student redirected successfully successfully folder/files of redirected redirected the 4. Performed the client folder/files of the folder/files of folder computer to the client computer to the client redirection server computer the server computer to the using the end computer using the server computer user end user using the end requirements requirements user with minimal without supervision requirements. supervision and and guidance assistance. 10 7 5 Student successfully Student did not Student used remote successfully use successfully 5. Remote desktop function remote desktop used remote Desktop thru a server function thru a desktop function and client server and client thru a server computer with computer without and client minimal supervision and computer. supervision and guidance assistance 10 7 5 D. Time Finished the Finished the Finished the Task Management Task ahead of Task on the but extended on the given time. given time. the given time. Total Points 100 80 60 90 Assessment Multiple Choice. Choose the letter of the best answer that describes the statement. Write your answer in CAPITAL LETTER in your answer sheet. 1. A single point of failure (SPF) is _____. a. A client that can crash and bring down the network b. A lone link in a network that can bring down the whole network if it fails c. A web of servers where all servers must fail for the network to fail d. A web of clients on a network where all clients must fail for the network to fail 2. What is a server? a. A computer that hosts data and other resources for clients b. A network where data is hosted and pulled by clients c. A computer that does all of the work for another computing, serving its every need d. A satellite computer that requests data from a central computer in a network 3. What is a network client? a. A computer that sends data but does not receive it b. A computer that receives data but does not send it c. A computer that connects to a server in order to use and share resources with it d. A computer that provides communications with other clients without an intermediary computer 4. What does a server store? a. Client data b. Software and client data c. Software d. Back up files 5. Why is a client reliant on a server? a. The client might get abducted without the server b. Client retrieves saved data and software from the server c. The clients do not power on without the server d. The server prevents the client from breaking down 6. Which is an advantage of client-server networks? a. Files/Internet connection/hardware can be shared b. The network is always fast and reliable c. A client's data is backed up every minute d. The network never stops functioning 7. Which best describes a peer to peer network? a. To peers connected together b. To piers connected together c. Devices connected together - without a server d. Two devices connected together - without a client 8. How often are GPO’s refreshed on a client computer? a. Instantly b. 4 minutes c. 90 minutes d. 90 minutes +/- 30 minutes 91 9. How are you going to enter group policy settings contained in Active Directory? a. Go to Group Policy Management Console b. Go to Group Policy Objects c. Under the directory \Windows\system32\GPS on the domain controller d. Go to SYSDATA folder of the domain controller 10. How can you do to speed up performance when you have multiple sites and only one Global Catalog Server? a. Create addition Site Link Bridges b. Create addition Site Bridges c. Add additional domain controllers at each site d. Create at least one global catalog server at each site 11. To create a site inside your server, what will you do? a. Enter Users Group b. Enter Administrators Group c. Enter Enterprise Admins Group d. Enter Group Policy 12. How can you delegate a DNS zone? a. Delete all DNS zone records. b. Ask for authority from a Master DNS server. c. Give authority to a sub zone. d. Take authority away from a sub zone. 13. Why are we using security groups? a. For logging in only. b. Send e-mail. c. Grant or Deny Rights and Permissions to groups of users and computers. Used to send e-mail messages as well. d. Grant or Deny Rights and Permissions to groups of users and computers. 14. If one of the users forgot his password, how are you going to change the password from a client-server configuration? a. Reset the password by logging in as administrator and go to users and computers b. Reset the password by logging in any user and click forgot password c. Reset the password by formatting the computer server d. Reset the password by removing the client to the domain 15. You setup a server-client configuration, you followed all the steps in doing so, upon performing a remote desktop process, the computer cannot access another computer, why is this so? a. Maybe the computer has no password set, assign a password b. Maybe there have been a problem in the DHCP c. Maybe the DNS is not correct d. Maybe the server is not functioning 92 Additional Activities In this activity, you will share a printer, connecting client to server printer, and print a test page from the remote computer. You can have a highest possible score of 40 for this assessment. Try your best to get 80% in this activity, this will be the passing rate. Recommended Equipment Two computers directly connected or connected through a switch Windows 8 installed on both computers A printer installed on one of the computers, e.g. Epson Printer Step 1: Share the printer.(Server PC) 1. Click Start and select Devices and Printer 2. Right click your printer (ex. Epson L120). 93 3. Click printer properties. 4. Click sharing. 5. Click share this printer, click apply, Ok and Close. 94 Step 2.Connecting Client to Server Printer ( Client PC) 1. Go to run type\\SERVER then press Enter. 2. Right click Epson printer click connect and wait to finish installation and close. 3. Conduct testing 4. Click start and select devices and printers Step 3 Print Test (Client PC) Right Click (Epson) Printer Select Printer Properties 95 Click Print Test Page Indicators Excellent Good Fair Score 20 15 10 Manual Student correctly Student Student is found all the correctly found lacking 1-2 information all the information in needed and its information the features needed specification table Content 15 10 5 The system The system The specification has specification specification in complete contents has complete incomplete and with estimated contents with incomplete prices are errors in pricing is seem reasonable and pricing feasible Format 10 8 6 The output is well The output is The output is made and neat, well made and made just to easy to follow for easy to follow comply with the customer who

Tags

computer systems server configuration educational module
Use Quizgecko on...
Browser
Browser