Sunteți pe pagina 1din 57

Advanced Communications & Networking Lab

Advanced Communications & Networking Lab

COMPUTER HARDWARE & NETWORKING LAB PRACTICE

2. To Identify and note down mother board, Components and Chips

Motherboard is the backbone of a computer. The components of the motherboard


provide basic services needed for the machine to operate and provide a platform for devices
such as the processor, memory, disk drives, and expansion devices. For this objective, you
should study the types of motherboards, their ports and memory, the types of CPU sockets,
and the types of expansion slots. The spine of the computer is the system board, or
motherboard. This component is made of green or brown fiberglass and is placed in the
bottom or side of the case. It‘s the most important component in the computer because it
connects all the other components of a PC together a typical PC system board, as seen from
above. On the system board you‘ll find the CPU, underlying circuitry, expansion slots, video
components, RAM slots, and a variety of other chips.
System Board Components
Motherboards include components that provide basic functionality to the computer.
The following components are found on a typical motherboard:
Expansion slots (AGP, PCI, etc.)
Memory (RAM) slots
CPU slot or socket
Power connector
Floppy and IDE drive connector
Keyboard and mouse connector
Peripheral port connectors (COM, LPT, USB)
BIOS chip
Battery
Advanced Communications & Networking Lab

COMPUTER HARDWARE & NETWORKING LAB PRACTICE

North Bridge:

a. It is also called as controller


b. It converts electronic signals to
binary
values and binary values to electronic
signals
c. It is nearby socket 478
d. It placed middle of the mother board

South Bridge:
a. It is controls major components
mother board and it back bone of the
input out devices
b. It is communicates PCI slots, IDE-
1, IDE-2, floppy connecter, BIOS
chip. c. It near by CMOS battery

CMOS Battery:
a. Computer is using a coin shape
battery
b. It generates the clock signal and it
manage system continues time

BIOS Chip :
a. BIOS controls how the operating
system and hardware wok together
b. BIOS identification is BIOS name
is available on chip or mother board
Advanced Communications & Networking Lab

COMPUTER HARDWARE & NETWORKING LAB PRACTICE

3. To identify various Internal and External slots in the mother board and clean them
with blower/ Brush

Internal slots:

Primary & Secondary(IDE-1 & IDE-2) :

a. It is also called as IDE-1, IDE-2.


b. It used to connecting Hard Disk
Dive, CD ROM, DVD ROM.

Input & Output ports :

. IO ports are used to connecting IO device


such as key boards, mouse, monitor, printer,
scanner, speakers etc...

AGP Slot & AGP Card :


a. AGP Slot is used install the AGP card.
b. AGP back view same as VGA port(15-
female pins) and used to connecting the
monitors
c. This slot is above PCI slots and its color
is Black or Brown

CI Slots &PCI(Expansion) Cards :


a. PCI slots are used to install the PCI
cards such as
i. LAN (Ethernet) Card---Back view
Ethernet port.
ii. Sound Card--- Back view Audio
pin connectors).
iii. TV Tuner(Internal) Card - Dish
Pin connecter
b. PCI Slots are white or yellow color
c. PCI Card has Single gap only
Advanced Communications & Networking Lab

COMPUTER HARDWARE & NETWORKING LAB PRACTICE

External slots

Parallel port (LPT parallel port):

As shown in the diagram parallel port with 25-pins can be used to connect a parallel
port printer. Previously dot matrix, ink jet, bubble jet printers etc were connected to parallel
port. Nowadays-parallel port is used to connect Dot-Matrix printers.

Serial port:
As shown in the diagram serial ports with 9-pins protruding outwards can be used to
connect modem but it can also be used for connecting mouse, provided serial port mouse is
available.

VGA Port: VGA port which has 15-pins is used to connect a monitor.

PS/2 Port:
Two 6-pin PS/2 ports are there, one is violet to which keyboard is connected
and other is Light green to which mouse is connected.
Advanced Communications & Networking Lab

COMPUTER HARDWARE & NETWORKING LAB PRACTICE

USB Port:
Connecting a USB device to a computer is simple
You find the USB connector on the back of your machine and plug the USB
connector into it.
USB ports are used to connect to Inkjet printers, Web Cams, Scanners etc.

Ethernet Port:
Ethernet port is used to connect a computer on network through RJ-45 connector
.
Game Port:
Game Port is used to connect joystick, which is usually used in video games

Three more ports:


Are available for multimedia connections. Green port is used connect speakers, blue
port is used to connect headphones and light Orange is used to connect microphone.

2. Identify various Internal and External slots in the mother board and
clean them with blower/ Brush

An expansion slot is a socket on the motherboard that is used to insert an expansion card
(or circuit board), which provides additional features to a computer such as video, sound,
advanced graphics, Ethernet or memory.

If the CPU is the brain of a computer, the motherboard is the body because it
connects all the components of the computer together. Most motherboards come
with built-in functionality for audio, video and networking. If you need
additional functionality, motherboards include slots to install expansion cards.
The slots on a motherboard are either designed for a specific component, such
as memory or storage, or designed for general expansion. Typical general
expansion slots use either the peripheral component interconnect standard or the
PCI Express standard.

Memory Slots
Most motherboards contain one or more slots to install random access memory. The memory
you install must be the type and speed that the motherboard supports. Motherboards with four
or more memory slots typically require you to install memory modules in pairs, and each pair
of slots is color-coded differently. To install memory, line up the notches on the bottom of the
memory with the grooves on the memory slot and press down firmly until you hear a click.
Advanced Communications & Networking Lab

PCI Slots

While the PCI standard is the predecessor to the PCIe standard, the two standards are not
interchangeable. If you have a PCI card, you must install it in a PCI slot. PCI slots look very
similar to PCIe slots, but the PCI slot has a notch at about three-quarters of the length,
measuring from the outer edge of the motherboard, while a PCIe slot has a notch at about
one-quarter of the length. Older motherboards and motherboards that provide for backward
capability with older expansion cards might have PCI slots.

Hard Drive Slots

To connect hard drives to your computer, you might find a group of small
rectangular slots, called serial advanced technology attachment slots. Some SATA slots
might be capable of higher speeds and are usually colored differently. Connect solid-state
drives to the high-speed SATA slots and mechanical disk drives to the lower-speed slots.
Older motherboards might have parallel advanced technology attachment slots. PATA slots
resemble PCI and PCIe slots more than they resemble SATA slots. PATA slots connect to
disk drives as well as CD and DVD recorders and players using a ribbon cable.
Advanced Communications & Networking Lab

COMPUTER HARDWARE & NETWORKING LAB PRACTICE

4. To Practice Inserting and Removing RAM with care

INSERTING RAM
Before you install a memory module, consult the motherboard documentation
or website of the manufacturer to ensure that the RAM is compatible with the
motherboard.

RAM provides temporary data storage for the CPU while the computer is
operating. RAM is volatile memory, which means that its contents are lost when the
computer is shut down.
Typically, more RAM will enhance the performance of your computer.
Follow these steps for RAM installation:

Step 1. Align the notches on the RAM module with the keys in the slot and press
down
until the side tabs click into place.

Step 2. Make sure that the side tabs have locked the RAM module. Visually check
for exposed contacts. Repeat these steps for additional RAM modules.

REMOVING RAM:
For this computer, you can replace memory in RAM slot. Replacing
memory in your computer requires up to nine basic steps:
Turn off the computer.
Open the computer.
Remove the heat shield.

Remove the processor module (if replacing RAM in the lower RAM slot).
Remove the RAM you are replacing.
Install the replacement RAM.
Replace the processor module (for lower RAM replacement only).
Replace the heat shield.
Close the computer
Advanced Communications & Networking Lab

COMPUTER HARDWARE & NETWORKING LAB PRACTICE

5. TO MEASURE THE OUTPUT VOLTAGES OF SMPS.


Study of SMPS and measuring the various Output Voltages and identifying the
cards/Components/Systems to which they are connected.

Switch mains power off before removing expansion cards.

The SMPS converts main AC electricity to the DC voltages required by chips, motors and
circuits in the PC. SMPS contain potentially lethal mains voltages. Unless specially trained,
you must not dismantle a SMPS while it is powered. In addition, with power removed some
internal components store enough electrical charge to give a very painful shock.

The switch mode SMPS used in PC‘s work by switching larger voltages on and off
rapidly to give a lower average voltage. These circuits rely upon feedback loops and are
therefore difficult to fault-find without expert knowledge.
Using a Multimeter in a PC
A number of test instruments can help you isolate computer hardware problems.One
of the most basic pieces of electronic troubleshooting equipment is the multimeter. These test
instruments are available in both analog and digital readout form and can be used to directly
measure electrical values of voltage (V), current in milliamperes (mA) or amperes (A), and
resistance in ohms. Therefore, these devices are referred to as VOMs (volt-
ohmmilliammeters) for analog types, or DMMs (digital multimeters) for digital types.

Voltages:
There are five main DC voltages produced by SMPSs:+3.3V,+5V,-5V,+12V and -12V.The
SMPS also provide the main system ground those current returns along.

1. 3.3V is used by the processor.


2. 5Vis used by system board IC‘s expansion cards and disk drives.
3. 12V levels typically power expansion cards and disk drive motors.
Advanced Communications & Networking Lab

COMPUTER HARDWARE & NETWORKING LAB PRACTICE

Some SMPSs allow main power to be passed through to the display screen.

AT
The older supply used by AT Systems has two 6-pin connectors (labeled P8 & P9)that
connect to the system board.It is possible to connect P8 & P9 round the wrong way -if this
happens then the system board will fry!

ATX
ATX Style SMPSs use a single 20-pin adaptor, but may also sport auxiliary connectors
for system boards requiring higher currents,
Some companies like DELL use their own custom design for SMPS connection.
Voltages:
The main connector carries 12V, 5V and 3.3V supplies.

Soft Power
The main difference between AT and ATX Systems is that ATX is designed to be
switched on and off by software control.
To enable this, some parts of the system board are powered continuously, so that
components can sense a wake-up signal (such as the power button at the front of the case).
Therefore, switch mains power off before removing expansion cards.
Advanced Communications & Networking Lab

COMPUTER HARDWARE & NETWORKING LAB PRACTICE

6. To disassemble the PC

Steps for Dissembling

Switch of the power supply


Disconnect the power supply cable from monitor.
Disconnect the power supply cable from CPU.
Disconnect the LAN cable to NIC in CPU.
Disconnect the other devices in CPU such as printers.
Disconnect the mouse cable from CPU.
Disconnect the keyboard cable from CPU.
Disconnect data cable of monitor from CPU.
Remove the doors of cabinet.
Place the cabinet such that motherboard faces the ceiling.

Disconnect the NIC and other cards from mother board by removing from slots and
unscrewing from cabinet.
Disconnect the wires of speakers from mother board.
Remove power supply cables from HDD, FDD, CD-ROM drive etc.

Disconnect the HDD, FDD, CD-ROM drive from mother board by removing flat ribbon cable.
Remove CR-ROM from cabinet.
Remove the FDD from cabinet by unscrewing it.
Remove the HDD from cabinet by unscrewing it.
Removing RAM cards from slots on mother board.
Disconnect the power cables from processor fan.
Remove the processor fan by unlocking clips on it.
Disconnect the power cables from SMPS on power cabinet.
Remove mother board from cabinet by unscrewing it.
Remove the SMPS from cabinet of PC by unscrewing it.
Advanced Communications & Networking Lab

COMPUTER HARDWARE & NETWORKING LAB PRACTICE

7. To assemble the PC and test.

The first step to building a computer is acquiring the parts. This guide will start with
a quick explanation of essential parts and elaborate on them further on.
A computer is made up of a case (or chassis) which houses several important internal
components, and provides places to connect the external components, including non-
peripherals. Inside the case go the following internal parts:
Power Supply/PSU – power supply unit, converts outlet power, which is alternating
current (AC), to direct current (DC) which is required by internal components, as well
as providing appropriate voltages and currents for these internal components.

Motherboard/main board – As the name indicates, this is the electronic centerpiece of the
computer: everything else connects to the motherboard.

Processor/CPU – central processing unit, the "brain" of the computer, most actual
computation takes place here.

RAM – random access memory, the "short-term memory" of a computer, used by the
CPU to store program instructions and data upon which it is currently operating. Data in
RAM is lost when the computer is powered off, thus necessitating a hard drive.
Optional components follow: (Components that depend on the function that will be
given to the machine)

Hard Drive/Hard Disk – the "long-term memory" of the computer, used for persistent
storage – i.e. the things stored on it remain even when the computer is powered
down. The operating system, and all your programs and data are stored here.

Optical Drive – device for reading/writing optical disks. May read CDs, DVDs, or
other optical media, depending on the type. It is essential for installing many
operating systems and programs. It may be able to write some of these discs, as well.
Some people like to have two such drives for copying disks.

Video Card/Graphics Card/GPU – does processing relating to video output. Some


motherboards have an "onboard" GPU built in so you don‘t need (but may add) a
separate video card. Otherwise, you will need a video card. These plug into a slot
on the motherboard and provide a place to connect a monitor to your computer.

Sound card On top of the internal components listed above, you will also need these
external components:

Keyboard – for typing on. Many motherboards won't even boot without a keyboard
attached.

Mouse – for pointing and clicking. Unless you chose a text-based operating system, you
will likely want one of these.

Monitor – This is where the pretty pictures go. They come in many forms, the most
common being CRT and LCD.
Advanced Communications & Networking Lab

COMPUTER HARDWARE & NETWORKING LAB PRACTICE

These are the parts that a standard PC will use. We are not considering such esoteric
as headless, touch screen, or voice-controlled systems. You might want to make a check list
(perhaps using a spreadsheet) of parts to use as you go about your process of research and
selection. That way you won‘t find yourself sitting down with a pile of brand new hardware
only to find that you forgot an essential component.
Advanced Communications & Networking Lab

COMPUTER HARDWARE & NETWORKING LAB PRACTICE

8. To change CMOS Setup

STARTING SETUP

The Award BIOS is immediately activated when you first turn on the computer. The
BIOS reads system configuration information in CMOS RAM and begins the process of
checking out the system and configuring it through the power-on self test (POST).
When these preliminaries are finished, the BIOS seeks an operating system on one of
the data storage devices (hard drive, floppy drive, etc.). The BIOS launches the operating
system and hands control of system operations to it. During POST, you can start the Setup
program in one of two ways:
1. By pressing immediately after switching the system on, or
2. By pressing the key or by simultaneously pressing and keys when the following
message appears briefly at the bottom of the screen during POST:

TO ENTER SETUP BEFORE BOOT PRESS CTRL-ALT-ESC OR DEL KEY


If the message disappears before you respond and you still wish to enter Setup,
restart the system to try again by turning it OFF then ON or pressing the RESET button on
the system case. You may also restart by simultaneously pressing , , and keys. If you do not
press the keys at the correct time and the system does not boot, an error message appears and
you are again asked
to PRESS F1 TO CONTINUE, CTRL-ALT-ESC OR DEL TO ENTER SETUP
Advanced Communications & Networking Lab

COMPUTER HARDWARE & NETWORKING LAB PRACTICE


Advanced Communications & Networking Lab

COMPUTER HARDWARE & NETWORKING LAB PRACTICE

9. To Install Operating system Windows


In order to install your copy of the Windows 7 operating system please make sure to have the following
items:

-Windows 7 Installation disk


-Drivers CD: * Use after installation process if needed.
Enter your computer's BIOS. Turn off the computer that you want to install Windows on
then turn it back on. When the BIOS screen appears or you are prompted to do so, press
Del, Esc, F2, F10, or F9 (depending on your computer’s motherboard) to enter the system
BIOS.

*NOTE: Please make sure to back up all of your important data before proceeding with this installation.

Step 1. Insert the Windows 7 operating system disk into your DVD drive, and then restart your computer

Step 2. You will see a prompt that says ‘Press any key to continue’ after the ZT logo disappears. When you see
this press any key immediately.

*NOTE: The following screen shots may differ from what you may see during your installation. (i.e. Win7
version, HDD disk space etc..)
Advanced Communications & Networking Lab

Fig.1
Step 3‘Starting Windows
’ with the Windows7 logo will appear.

Fig.2

Step 4. Language options, by default English will be set along with “time and currency format” and “keyboard or
input method”
Advanced Communications & Networking Lab

Fig.3
Step 5. Click “Install Now”

Fig. 4 Step
6. End User License Agreement (E.U.L.A.), check the box to accept, and click “Next”
Advanced Communications & Networking Lab

Fig. 5
Step 7. “Which type of installation?” window will appear. Upgrade will be greyed out; the only option you should
be able to choose is Custom (advanced).

Fig.6 Step
8. “Where do you want to install windows?” Make sure the partition is highlighted.
Step 9. Delete the partition by clicking on Drive options (advanced) on the bottom right corner of the field. Make
sure the partition is highlighted and click on Delete. If drive advanced options is greyed out, then the partition will
not have to be deleted.

*NOTE: Deleting the partitions will erase all data on the system
Advanced Communications & Networking Lab

Fig. 7
Step 10. Disk 0 Unallocated Space should be the only listing at this point. If it is press next, If not please proceed to
delete any additional partitions that may be listed.

Fig. 12 Step 16. This


screen will allow you to choose your local time zone and also adjust the date and time.
Advanced Communications & Networking Lab

Fig. 13 Step
17. Click on the appropriate location of your computer to enable Windows 7 to apply the correct network settings.

Fig. 14

The installation is done! You have successfully installed Windows 7 on your ZT computer.
Advanced Communications & Networking Lab

COMPUTER HARDWARE & NETWORKING LAB PRACTICE

13. To verify the function of control panel settings.

To access a control panel go through the following steps below Go to settings select
control panel Figure below shows the options available in control panel.

Action Center
The Action Center helps you resolve basic system issues. It can help troubleshoot security,
maintenance and performance issues. In the Action Center, you have four options: Review
your computer’s status and solve issues, Change User Account Control (UAC) settings,
Troubleshoot common computer problems, and Restore your computer to an earlier time.
Accessibility Options: You find keyboard, sound, display, mouse, and general settings
available. Using this you can change the behavior of keyboard, mouse, sound, display and
mouse.
Add New Hardware: With this feature you can add new hardware to your computer.
Add / Remove Software: With this feature you can add new software and remove existing
ones.
Network: With this feature you can add and remove Network Interface Card settings i.e
TCP/IP number, Domain name etc.
Printer: With this feature you can add new printer software.
System: This is one of the most important features in the control panel. This contains
information about the whole computer. Software, Hardware etc. You can also find if all the
hardware devises are fit properly through the Device Manager option.
Advanced Communications & Networking Lab

COMPUTER HARDWARE & NETWORKING LAB PRACTICE

14. To Partition and format Hard disks.

Hard Disk Partitions


This procedure explains how to setup a new hard disk. Before a new hard disk can be
used it needs to be setup. This involves partitioning and formatting the hard disk.
The Windows 7 Disk Management tool provides a simple interface for managing partitions and volumes.

Here’s an easy way to create a new partition on your disk.

1. Open the Disk Management console by typing diskmgmt.msc at an elevated command prompt.

2. In Disk Management’s Graphical view, right-click an unallocated or free area, and then click New
Simple Volume. This starts the New Simple Volume Wizard. (Note: If you need to create unallocated
space, see the Tip Easily Shrink a Volume on a Windows 7 Disk for information on how to do this.)

3. Read the Welcome page and then click Next.

4. The Specify Volume Size page specifies the minimum and maximum size for the volume in megabytes
and lets you size the volume within these limits. Size the partition in megabytes using the Simple
Volume Size field and then click Next.
Advanced Communications & Networking Lab

5. On the Assign Drive Letter Or Path page, specify whether you want to assign a drive letter or path and
then click Next. The available options are as follows:

Assign The Following Drive Letter Select an available drive letter in the selection list provided. By
default, Windows 7 selects the lowest available drive letter and excludes reserved drive letters as well
as those assigned to local disks or network drives.
Mount In The Following Empty NTFS Folder Choose this option to mount the partition in an empty
NTFS folder. You must then type the path to an existing folder or click Browse to search for or create a
folder to use.
Do Not Assign A Drive Letter Or Drive Path Choose this option if you want to create the partition
without assigning a drive letter or path. Later, if you want the partition to be available for storage, you
can assign a drive letter or path at that time.

6. Use the Format Partition page to determine whether and how the volume should be formatted. If you
want to format the volume, choose Format This Volume With The Following Settings, and then
configure the following options:
Advanced Communications & Networking Lab

File System Sets the file system type as FAT, FAT32, or NTFS. NTFS is selected by default in most
cases. If you create a file system as FAT or FAT32, you can later convert it to NTFS by using the
Convert utility. You can’t, however, convert NTFS partitions to FAT or FAT32.
Allocation Unit Size Sets the cluster size for the file system. This is the basic unit in which disk space
is allocated. The default allocation unit size is based on the size of the volume and, by default, is set
dynamically prior to formatting. To override this feature, you can set the allocation unit size to a
specific value. If you use many small files, you might want to use a smaller cluster size, such as 512 or
1,024 bytes. With these settings, small files use less disk space.
Volume Label Sets a text label for the partition. This label is the partition’s volume name and by
default is set to New Volume. You can change the volume label at any time by right-clicking the
volume in Windows Explorer, choosing Properties, and typing a new value in the Label field provided
on the General tab.
Perform A Quick Format Tells Windows 7 to format without checking the partition for errors. With
large partitions, this option can save you a few minutes. However, it’s usually better to check for errors,
which enables Disk Management to mark bad sectors on the disk and lock them out.
Enable File And Folder Compression Turns on compression for the disk. Built-in compression is
available only for NTFS. Under NTFS, compression is transparent to users and compressed files can be
accessed just like regular files. If you select this option, files and directories on this drive are
compressed automatically.

7. Click Next, confirm your options, and then click Finish.


Advanced Communications & Networking Lab

The Windows 7 Disk Management tool will now show the space configured as a new partition.
Advanced Communications & Networking Lab

COMPUTER HARDWARE & NETWORKING LAB PRACTICE

15. To identify and note down


a) The specifications of various networking devices & Cables, Jacks , Connectors, tools
etc used in local area networks
An expansion board that is used to connect a computer or computing device to a
network. LAN adapter is the most common and generic alternate name for a Network
Interface Card (NIC). However, many similar products, such as a Wireless USB LAN
Adapter is also called a LAN adapter.

Wireless USB LAN adapter:-

A high-speed wireless network card that is used to access a network through a USB
port on a computer or laptop. Most wireless USB LAN adapters look like small USB flash
drives and usually are based on the 802.11g standard which provides a data rate up to 54-
Mbps in a wireless LAN environment. Some wireless USB LAN adapters may also support
the 802.11b standard. A wireless USB LAN adapter basically enables you to share files,
folders, printers, other network resources and Internet access.

Network Hub:-
Definition: In computer networking, a hub is a small, simple, inexpensive device that
joins multiple computers together. Many network hubs available today support the Ethernet
standard. Other types including USB hubs also exist, but Ethernet is the type traditionally
used in home networking. Technically speaking, two different types of hubs exist:

passive
active
Advanced Communications & Networking Lab

COMPUTER HARDWARE & NETWORKING LAB PRACTICE

Passive hubs do not amplify the electrical signal of incoming packets before broadcasting
them out to the network. Active hubs, on the other hand, do perform this amplification, as
does a different type of dedicated network device called a repeater. Some people use the
terms concentrator when referring to a passive hub and multiport repeater when referring
to an active hub.

Network switch:-

A network switch (sometimes known as a switching hub) is a computer networking


device that is used to connect devices together on a computer network. A switch is considered
more advanced than a hub because a switch will only send a message to the device that needs or
requests it, rather than broadcasting the same message out of each of its ports.
A switch is a multi-port network bridge that processes and forwards data at the data
link layer (layer 2) of the OSI model. Some switches have additional features, including the
ability to route packets. These switches are commonly known as layer-3 or multilayer
switches.

Router:-
Router: Routers are devices (computers) containing software that help in determining
the best path out of the available paths, for a particular transmission. They consist of a
combination of hardware and software. The hardware includes the physical interfaces to the
various networks in the internet work. The two main pieces of software in a router are the
operating system and the routing protocol.
Routers use logical and physical addressing to connect two or more logically separate
networks. They accomplish this connection by organizing the large network into logical
network segments or sub-networks. Each of these sub networks is given a logical address.
This allows the networks to be separate but still access each other and exchange data when
necessary. Data is grouped into packets, or blocks of data. Each packet, in addition to having
a physical device address, has a logical network address.
Routers are frequently used to interconnect identical networks as well as to
interconnect networks with different types of hardware.
Advanced Communications & Networking Lab

COMPUTER HARDWARE & NETWORKING LAB PRACTICE

Crimping tool
A crimping tool is a tool designed to crimp or connect a connector to the end of a
cable. For example, network cables and phone cables are created using a crimping tool to
connect the RJ-45 and RJ-11 connectors to the end of the cable. In the example below picture,
this crimper is capable of crimping a RJ-11 (6-Pin) and RJ-45 (8-Pin) connectors and also
includes a wire cutter near the handles that can be used to cut phone or CAT5 cable.

RJ-45 Connecter The RJ-45 connector is a form of telephone connector. It sees its
most frequent use as a local-area network connector, and is frequently referred to simply as
an Ethernet connector.
Advanced Communications & Networking Lab

COMPUTER HARDWARE & NETWORKING LAB PRACTICE

b) To Prepare the UTP cable for cross and direct connections using crimping tool

A straight through network cable acts as an extension enabling a device with a


network interface card to be attached to a network. A common form of network media is
the UTP Cat5 (Unshielded Twisted Pair Category 5) cable.

The cables should have their sleeving trimmed back at each end by
approximately 13mm in order to expose the wires for sorting. The wires should then be
flattened out and sorted into the following order from left to right; White/Orange, Orange,
White/Green, Blue, White/Blue, Green, White/Brown, Brown. At this point it is best to make
sure that the wires are the same length and trim them as necessary. It‘s a good idea to check
the order of the wires before moving onto the next stage to make sure that orange and brown
have not been mixed up as some white wires don‘t have their markings colored clearly.
Once the wires are confirmed to be in the correct order then it is time to attach the RJ-45
connectors. This is a simple case of pushing the wires in as far as they will go and then using
a crimping tool to secure them into place. Once one end is done simply repeat the process for
the second end, after that be sure to test the cable with an appropriate device before using it in
your network. RJ-45 connectors are the most common form of connectors used on UTP Cat5
cables. The RJ simply means Registered Jack and the 45 designation specifies the pin
numbering scheme. The cable itself contains 4 twisted pairs of wires making a total of 8
wires.
Roll Over:
Crossover wired cables (commonly called crossover cables) are very much like Straight-
Through cables with the exception that TX and RX lines are crossed (they are at opposite
positions on either end of the cable. Using the 568-B standard as an example below you will
see that Pin 1 on connector A goes to Pin 3 on connector B. Pin 2 on connector A goes to Pin
6 on connector B etc. Crossover cables are most commonly used to connect two hosts
directly connecting a computer directly to another computer, connecting a switch directly to
another switch, or connecting a router to a router.
Advanced Communications & Networking Lab

COMPUTER HARDWARE & NETWORKING LAB PRACTICE

Cross Over: Crossover wired cables (commonly called crossover cables) are very much like
Straight-Through cables with the exception that TX and RX lines are crossed (they are at
opposite positions on either end of the cable. Using the 568-B standard as an example below
you will see that Pin 1 on connector A goes to Pin 3 on connector B. Pin 2 on connector A
goes to Pin 6 on connector B etc. Crossover cables are most commonly used to connect two
hosts directly. Examples would be connecting a computer directly to another computer,
connecting a switch directly to another switch, or connecting a router to a router.

Cable & RJ-45 Jack outlet installation Do not strip the insulation off of the individual paired
wires. Just remove about 40mm of the jacket as shown below photo 1. The way the stripper
tool works is the cable is inserted into the stripper and then the stripper is rotated a couple of
times allowing the tools cutting blade to score the cable‗s outer jacket only. BE CAREFUL
NOT TO CUT THROUGH ANY COLOURED WIRES. Untwist the twisted paired wires.
Advanced Communications & Networking Lab

COMPUTER HARDWARE & NETWORKING LAB PRACTICE

Then arrange them in the correct order. Use guide below to arranging the wire colours in the
proper order Diagram c. Get the eight wires arranged in the proper order and pressing the
eight wires FLAT between your thumb and index fingers is an important step to get the wires
setup to slide into the RJ45 connector. Once the wires are FLAT and in the right order cut
them so they are 13mm long as shown in the photo 4 Insert the flattened wire into the the
RJ45 connector as shown photo 5. Put your RJ45 crimping tool to work. Read the directions
for your tool. Drawing B below shows what the crimp tool is doing. The crimp tool presses in
the gold plated electrical contact down such that they pierce through insulation of all eight
wire and make contact with the copper conductor. This is called insulation displacement
hence no need to strip the insulation off of the individual wires. The crimp tool presses down
on a hinged tab that grips onto the cables outer jacket to provide a strain relief action and
helps to keep the cable and the connector intact. See diagrams A and B

PIN COLOUR PAIR NAME


Transmit Data
1 Orange/White 2
+
Transmit Data
2 Orange 2
-
Receive Data
3 white/Green 3
+
Not Used-
4 Blue 1
POE
Not Used-
5 White/Blue 1
POE
Receive Data
6 Green 3
-
Not Used-
7 White/ Brown 4
POE
Not Used-
8 Brown 4
POE

1. Fit Boot - Expose 40mm Wires 2. Straighten Wires Put in Order


Advanced Communications & Networking Lab

COMPUTER HARDWARE & NETWORKING LAB PRACTICE

3. Use Crimper to Trim Wires 4. Trim to 13mm

5. Insert into RJ45 Connector 6. Crimp Cable to RJ45 Connector

7. Completed Connection
Advanced Communications & Networking Lab

COMPUTER HARDWARE & NETWORKING LAB PRACTICE

(Action Of Crimping Tool)

UTP Implementation: Straight-Through vs. Crossover


Advanced Communications & Networking Lab

COMPUTER HARDWARE & NETWORKING LAB PRACTICE

16. a) To Transfer files between systems in LAN

If you lack access to a network, and need to transfer files or establish a connection between
two computers, you can connect the computers to one another using a crossover Ethernet
cable. After connecting your computers together with an Ethernet cable, you will be required
to modify the network settings on one of the computers to establish the cable connection. You
will then have the ability to transfer or share files, and play network games between both
computers.

Step 1 – Creating A Physical Connection


Now the first thing what you’ll need to do is to connect each end of your LAN cable into both of
your computer’s Ethernet Port to connect both computers with each other. If you’re using
a modem or router switch then make sure everything is connected properly.

And if you are trying to share thing like transferring some files from your laptop to some another
laptop, then you can also use your laptop’s Wi-Fi to share your files wirelessly. To do that, both
of the WIFI enabled devices needed to connect to some WIFI router, and the rest of the whole
procedure is the same as for others.

Step 2 –LAN Connection Setting


After connecting everything now it’s time to setup an IP address in both your computers to make
your computer to identify the connection. You’ll just need to follow this same procedure in both
of your computers or maybe laptops.
Advanced Communications & Networking Lab

 Open your Windows Control Panel, or you can search for “Network and Sharing
Center” in the Start Menu.
 Select the Network and Sharing Center option.
 From the left sidebar, click on “Change Adapter Settings” option.

 After that, open your “Local Area Connection” or Ethernet Adaptor’sproperties.

 Now select the “Internet Protocol Version 4 (TCP/IPv4)” option and then click on
its “Properties” button.
Advanced Communications & Networking Lab

 Now when the “Internet Protocol Version 4 (TCP/IPv4) properties” windows get
popped up. Enter the IP address manually as shown in the picture given below and
click on the “Ok” button after entering it.

This IP address given the picture is only going to works when you connected both of your
computers via crossover cable.

If you have a modem or WIFI router, then you’ll have to add the gateway IP as well. In that
case, your IP should need to look like this –
Advanced Communications & Networking Lab

Step 3 – Change Default Sharing Setting

After entering the IP Address in both of your computers, now you’ll need to change the sharing
setting of your computers to permit access rights for another computer.

To do that, first, you’ll again have to go back to the Network and Sharing Center settings page of
your Windows and then select the “Advanced sharing settings” option to see all your computers
network sharing setting.

After when the sharing setting window gets opened, now you’ll need to change your
network setting to those options as shown listed below:

 Turn on network discovery


 Turn on file and printer sharing
 Allow windows to manage homegroup connection (recommended)
 Turn on sharing so anyone with network access can read and write files in the public
folders
 Use 128-bit encryption to help protect files sharing connections (recommended)
 Turn off password protected sharing

Make these changes in all network profiles;


Advanced Communications & Networking Lab

Step 4 – Change Default Workgroup Setting


By the use of this setting, you can create the same workgroup for both computers to starts
sharing, by connected both of them in the same workgroup. Workgroup settingmust be
same in both your computers but the computer’s name should be different to identify both.

 First, you’ll have to press Windows + Pause Break Key on your keyboard to open
your system’s properties window. After that, click on “Change setting” in workgroup
settings category as shown in the picture given below.
Advanced Communications & Networking Lab

 Now in the System properties, you’ll need to click on the change button, and then you
will able to see the other options for changing your Computer’s Name. So first, click
on the “Change” button then type “WORKGROUP” in the ‘Workgroup:’ options
and then click on “ok”. After that, you’ll have to do the same thing again on your
different computer which you wanted to connect(or maybe on all computers of your
LAN sharing computers). And that’s how your computer can communicate to each
other by working on same LAN Workgroup;

 After that click on “Network ID” and do this manual setting as given in the picture
given below:

 After that click on Finish and restart both of your computers.


Advanced Communications & Networking Lab

Step 5- At Last, Turn On Drive Sharing


Now you will able to see your both computer in your windows network place location and to
share your drive via network you’ll just need to Turn On the drive sharing by making some
changes in that drive’s properties.

Here’s the list of some steps what you can follow to turn on the drive sharing in your
computer or laptop:

 Right click on your drive and select Properties.


 Then, select “Sharing”.
 Then, click on “Advanced Sharing”.
 Then, tick the “Share this folder”.
 Then, click on “Permissions”.
 Then, tick on “Full control”.
 Then, click on “OK”.
 At last, click on “OK” again and that’s it.
Advanced Communications & Networking Lab

If you having some problem with your Local Area Network (LAN), like your computer
won’t able to open the shared folder, files and drive on the network place or it ask for any
permission like something.

In that case, you don’t have to worry it, because with the help of my another tutorial I will
going to show you, how you can give your computer permission to read and writethe files and
folder on the shared drive on the network place.

DVR & Dr.HS MIC COLLEGE OF TECHNOLOGY


Advanced Communications & Networking Lab

COMPUTER HARARE & NETWORKING LAB PRACTICE


19.To Test the Network using ipconfig, ping / tracert and Netstat utilities and debug the
network issues.

Using the PING command to check an address


Before you assign a static IP address, you should make sure that the address isn't already in
use or reserved for use with DHCP. With the PING command, you can check to see whether
an address is in use. Open a command prompt and type ping, followed by the IP address
you want to check.
To test the IPv4 address 10.0.10.12, you would use the following command:
ping 10.0.10.12
To test the IPv6 address fec0::02bc:ff:becb:fe4f:961d, you would use the
following command:
ping fec0::02bc:ff:becb:fe4f:961d
If you receive a successful reply from the ping test, the IP address is in use and you should try
another one. If no current host on the network uses this IP address, the PING command
output should be similar to the following:
pinging 192.168.1.100 with 32 bytes of data:

request timed out.


Request timed out.
Request timed out.
Request timed out.

Ping statistics for 192.168.1.100:


packets: sent = 4, received = 0, lost = 4 (100% loss)
You can then use the IP address.
Note Pinging an IP address will work as long as all the hosts are active and reachable on
the network at the time you ping the address. However, a firewall could be blocking your
ping request. More important is to plan the assignment of static addresses to machines on
your network carefully.
Advanced Communications & Networking Lab

COMPUTER HARDWARE & NETWORKING LAB PRACTICE

20. To Install and configure Network Devices: Switch

Basic Switch Configuration

Switches are one of the most numerous devices installed onto the corporate network
infrastructure. Configuring them can be fun and challenging. Knowing how
switches normally boot and load an operating system is also important.

Switch Boot Sequence

After a Cisco switch is powered on, it goes through the following boot sequence:

Step 1. First, the switch loads a power-on self-test (POST) program stored in ROM. POST
checks the CPU subsystem. It tests the CPU, DRAM, and the portion of the flash device
that makes up the flash file system.

Step 2. Next, the switch loads the boot loader software. The boot loader is a small program
stored in ROM and is run immediately after POST successfully completes.

Step 3. The boot loader performs low-level CPU initialization. It initializes the CPU registers
that control where physical memory is mapped, the quantity of memory, and memory speed.

Step 4. The boot loader initializes the flash file system on the system board.

Step 5. Finally, the boot loader locates and loads a default IOS operating system
software image into memory and hands control of the switch over to the IOS.

The boot loader finds the Cisco IOS image on the switch using the following process: The
switch attempts to automatically boot by using information in the BOOT environment
variable. If this variable is not set, the switch attempts to load and execute the first executable
file it can by performing a recursive, depth-first search throughout the flash file system. In a
depth-first search of a directory, each encountered subdirectory is completely searched before
continuing the search in the original directory. On Catalyst 2960 Series switches, the image
file is normally contained in a directory that has the same name as the image file (excluding
the .bin file extension).

The IOS operating system then initializes the interfaces using the Cisco IOS commands
found in the configuration file, startup configuration, which is stored in NVRAM.
Advanced Communications & Networking Lab

COMPUTER HARDWARE & NETWORKING LAB PRACTICE

21. To Configure Host IP, Subnet Mask and Default Gateway in a system in
LAN (TCP/IP Configuration).

a) To Configure DNS to establish interconnection between systems

CONFIGURING TCP/IP NETWORKING


A local area connection is created automatically if a computer has a network adapter
and is connected to a network. If a computer has multiple network adapters and is connected
to a network, you'll have one local area connection for each adapter. If no network connection
is available, you should connect the computer to the network or create a different type of
connection, as explained in "Managing Network Connections" on page 671.
Computers use IP addresses to communicate over TCP/IP. Windows Server 2008 provides
the following ways to configure IP addressing:

Manually IP addresses that are assigned manually are called static IP addresses.
Static IP addresses are fixed and don't change unless you change them. You'll usually
assign static IP addresses to Windows Servers, and when you do this, you'll need to
configure additional information to help the server navigate the network.
Dynamically A DHCP server (if one is installed on the network) assigns dynamic IP
addresses at startup, and the addresses might change over time. Dynamic IP
addressing is the default configuration.
Alternatively (IPv4 only) When a computer is configured to use DHCPv4 and no
DHCPv4 server is available, Windows Server 2008 assigns an alternate private IP
address automatically. By default, the alternate IPv4 address is in the range from
169.254.0.1 to 169.254.255.254 with a subnet mask of 255.255.0.0. You can also
specify a user-configured alternate IPv4 address, which is particularly useful for
laptop users.

Note Unless an IP address is specifically reserved, DHCP servers assign IP addresses


for a specific period of time, known as an IP address lease. If this lease expires and cannot be
renewed, then the client assigns itself an automatic private IP address.

Note To perform most TCP/IP configuration tasks, you must be a member of the
Administrators group.

Configuring static IP addresses


When you assign a static IP address, you need to tell the computer the IP address you
want to use, the subnet mask for this IP address, and, if necessary, the default gateway to use
for internetwork communications. An IP address is a numeric identifier for a computer. Ip
addressing schemes vary according to how your network is configured, but they're normally
assigned based on a particular network segment.
IPv6 addresses and IPv4 addresses are very different. With IPv6, the first 64 bits
represent the network id and the remaining 64 bits represent the network interface. With
IPv4, a variable number of the initial bits represent the network id and the rest of the bits
represent the host id. For example, if you're working with IPv4 and a computer on the
network segment 192.168.10.0 with a subnet mask of 255.255.255.0, the first 24 bits
represent the network id and the address range you have available for computer hosts is from
192.168.10.1 to 192.168.10.254. In this range, the address 192.168.10.255 is reserved for
network broadcasts.
Advanced Communications & Networking Lab

COMPUTER HARDWARE & NETWORKING LAB PRACTICE

If you're on a private network that is indirectly connected to the internet, you should
use private IPv6 addresses. Link-local unicast addresses are private IPv6 addresses. All link-
local unicast addresses begin with FE80.
If you're on a private network that is indirectly connected to the internet, you should
use private IPv4 addresses. Table 21-1 summarizes private network IPv4 addresses.
Table 21-1 Private IPv4 network addressing

All other IPv4 network addresses are public and must be leased or purchased. If the
network is connected directly to the internet and you've obtained a range of IPv4 addresses
from your internet service provider, you can use the IPv4 addresses you've been assigned.
Using the PING command to check an address
Before you assign a static IP address, you should make sure that the address isn't
already in use or reserved for use with DHCP. With the PING command, you can check to
see whether an address is in use. Open a command prompt and type ping, followed by the IP
address you want to check.
To test the IPv4 address 10.0.10.12, you would use the following command:
ping 10.0.10.12
To test the IPv6 address fec0::02bc:ff:becb:fe4f:961d, you would use the following
command:
ping fec0::02bc:ff:becb:fe4f:961d
If you receive a successful reply from the ping test, the IP address is in use and you should
try another one. If no current host on the network uses this IP address, the PING command
output should be similar to the following: pinging 192.168.1.100 with 32 bytes of data:

request timed out.


Request timed out.
Request timed out.
Request timed out.

Ping statistics for 192.168.1.100:


packets: sent = 4, received = 0, lost = 4 (100% loss)
You can then use the IP address.
Note Pinging an IP address will work as long as all the hosts are active and reachable
on the network at the time you ping the address. However, a firewall could be blocking your
ping request. More important is to plan the assignment of static addresses to machines on
your network carefully.

Configuring a static IPv4 or IPv6 address


One local area network (lan) connection is available for each network adapter
installed. These connections are created automatically. To configure static IP addresses for a
particular connection, follow these steps:
Click Start and then click Network. In Network Explorer, click Network and Sharing
Center on the toolbar.
In Network and Sharing Center, click Manage Network Connections. In Network
Connections, right-click the connection you want to work with and then select Properties.
Advanced Communications & Networking Lab

COMPUTER HARDWARE & NETWORKING LAB PRACTICE

Double-click Internet Protocol Version 6 (TCP/IPv6) or internet protocol version 4


(TCP/IPv4) as appropriate for the type of IP address you are configuring.
For an IPv6 address, do the following:
Select Use The Following IPv6 Address and then type the IPv6 address in the IPv6
Address text box. The IPv6 address you assign to the computer must not be used anywhere
else on the network.
Press the Tab key. The Subnet Prefix Length field ensures that the computer
communicates over the network properly. Windows Server 2008 should insert a default value
for the subnet prefix into the Subnet Prefix Length text box. If the network doesn't use
variable-length subnetting, the default value should suffice. If your network does use
variable-length subnets, you'll need to change this value as appropriate for your network.
For an IPv4 address, do the following:
Select Use The Following IP Address and then type the IPv4 address in the IP
Address text box. The IPv4 address you assign to the computer must not be used anywhere
else on the network.
Press the Tab key. The Subnet Mask field ensures that the computer communicates
over the network properly. Windows Server 2008 should insert a default value for the subnet
prefix into the Subnet Mask text box. If the network doesn't use variable-length subnetting,
the default value should suffice. If your network does use variable-length subnets, you'll need
to change this value as appropriate for your network.
If the computer needs to access other TCP/IP networks, the internet, or other subnets,
you must specify a default gateway. Type the IP address of the network's default router in the
Default Gateway text box.
DNS is needed for domain name resolution. Select Use The Following DNS Server
Addresses and then type a preferred address and an alternate DNS server address in the text
boxes provided.
When you're finished, click OK three times to save your changes. Repeat this process
for other network adapters and IP protocols you want to configure.

Configuring DNS resolution


DNS is a host name resolution service that you can use to determine the IP address of
a computer from its host name. This lets users work with host names, such as
http://www.msn.com or http://www.microsoft.com, rather than an IP address, such as
192.168.5.102 or 192.168.12.68. Dns is the primary name service for Windows Server 2008
and the internet.
As with gateways, the best way to configure DNS depends on the configuration of
your network. If computers use DHCP, you'll probably want to configure DNS through
settings on the DHCP server. If computers use static IP addresses or you want to configure
DNS specifically for an individual user or system, you'll want to configure DNS manually.
Basic DNS settings
You can configure basic DNS settings by following these steps:
Click Start and then click Network. In Network Explorer, click Network and Sharing
Center on the toolbar.
In Network and Sharing Center, click Manage Network Connections. In Network
Connections, right-click the connection you want to work with and then select Properties.
Double-click Internet Protocol Version 6 (TCP/IPv6) or internet protocol version 4
(TCP/IPv4) as appropriate for the type of IP address you are configuring.
If the computer is using DHCP and you want DHCP to specify the DNS server
address, select Obtain DNS Server Address Automatically. Otherwise, select Use The
Advanced Communications & Networking Lab

COMPUTER HARDWARE & NETWORKING LAB PRACTICE

Following DNS Server Addresses and then type primary and alternate DNS server addresses
in the text boxes provided.
Click OK three times to save your changes.
Advanced DNS settings
You configure advanced DNS settings on the DNS tab of the Advanced TCP/IP
Settings dialog box, shown in Figure 21-3. You use the fields of the DNS tab as follows:
DNS server addresses, in order of use Use this area to specify the IP address of each
DNS server that is used for domain name resolution. Click Add if you want to add a server IP
address to the list. Click Remove to remove a selected server address from the list. Click Edit
to edit the selected entry. You can specify multiple servers for DNS resolution. Their priority
is determined by the order. If the first server isn't available to respond to a host name
resolution request, the next DNS server in the list is accessed, and so on. To change the
position of a server in the list box, select it and then click the up or down arrow button.
Append primary and connection specific DNS suffixes Normally, this option is
selected by default. Select this option to resolve unqualified computer names in the primary
domain. For example, if the computer name gandolf is used and the parent domain is
microsoft.com, the computer name would resolve to gandolf.microsoft.com. If the fully
qualified computer name doesn't exist in the parent domain, the query fails. The parent
domain used is the one set in the System Properties dialog box, on the Computer Name tab.
(Click System And Maintenance\System in Control Panel, then click Change Settings and
view the Computer Name tab to check the settings.)
Append parent suffixes of the primary DNS suffix This option is selected by default.
Select this check box to resolve unqualified computer names using the parent/child domain
hierarchy. If a query fails in the immediate parent domain, the suffix for the parent of the
parent domain is used to try to resolve the query. This process continues until the top of the
DNS domain hierarchy is reached. For example, if the computer name gandolf is used in the
dev.microsoft.com domain, DNS would attempt to resolve the computer name to
gandolf.dev.microsoft.com. If this didn't work, DNS would attempt to resolve the computer
name to gandolf.microsoft.com.
Append these DNS suffixes (in order) Select this option to set specific DNS suffixes
to use rather than resolving through the parent domain. Click Add if you want to add a
domain suffix to the list. Click Remove to remove a selected domain suffix from the list.
Click Edit to edit the selected entry. You can specify multiple domain suffixes, which are
used in order. If the first suffix doesn't resolve properly, DNS attempts to use the next suffix
in the list. If this fails, the next suffix is used, and so on. To change the order of the domain
suffixes, select the suffix and then click the up or down arrow button to change its position.
DNS suffix for this connection This option sets a specific DNS suffix for the
connection that overrides DNS names already configured for use on this connection. You'll
usually set the DNS domain name through the System Properties dialog box, on the
Computer Name tab.
Register this connection's addresses in DNS Select this check box if you want all IP
addresses for this connection to be registered in DNS under the computer's fully qualified
domain name. This option is selected by default.
Note Dynamic DNS updates are used in conjunction with DHCP to enable a client to
update its a (host address) record if its IP address changes, and to enable the DHCP server to
update the ptr (pointer) record for the client on the DNS server. You can also configure
DHCP servers to update both the a and ptr records on the client's behalf. Dynamic DNS
updates are supported only by bind 5.1 or higher DNS servers as well as server editions of
microsoft windows.
Advanced Communications & Networking Lab

COMPUTER HARDWARE & NETWORKING LAB PRACTICE

Use this connection's DNS suffix in DNS registration select this check box if you
want all IP addresses for this connection to be registered in DNS under the parent domain.

Configure advanced DNS settings on the DNS tab of the Advanced TCP/IP Settings
dialog box.
Advanced Communications & Networking Lab

COMPUTER HARDWARE & NETWORKING LAB PRACTICE

a) To install Print server in a LAN and share the printer in a network

Instructions for Installing “File and Printer Sharing”

From the desktop on your PC, go to the Start Menu and right click on My Network
Places and select Properties:

(If you do not have this screen, go to the Control Panel and selected
Network Connection.) You should have a screen similar to the following:
Advanced Communications & Networking Lab

COMPUTER HARDWARE & NETWORKING LAB PRACTICE

Select Local Area Connection and right click and select Properties. In

In the next diagram File and Printer Sharing for Microsoft Networks has
already been installed, on your screen it should not be listed, if it is, it is already installed.
Now hit the Install button.
Advanced Communications & Networking Lab

COMPUTER HARDWARE & NETWORKING LAB PRACTICE

Now select Service form the list of component types and hit OK. On

On the next screen select File and Printer Sharing for Microsoft Networks and hit
OK.
Advanced Communications & Networking Lab

COMPUTER HARDWARE & NETWORKING LAB PRACTICE

File and Printer Sharing for Microsoft Networks should now be added to the list.
Hit Close to exit. Reboot your

Reboot your computer.


Advanced Communications & Networking Lab

COMPUTER HARDWARE & NETWORKING LAB PRACTICE

23. To Install and Configure Wireless NIC and transfer files between systems

in LAN and Wireless LAN

1. In the start menu, click the Control Panel shortcut.

2. In the Control Panel window, click Switch to Classic View. If the text reads Switch
to Category

View, then you are already in Classic View and can skip to the next step.
3. In the Control Panel window, double‐ click the Network Connections shortcut.
Advanced Communications & Networking Lab

COMPUTER HARDWARE & NETWORKING LAB PRACTICE

4. In the Network Connections window, right‐ click on the appropriate wireless network connection, and select View Available Wireless Networks.

In the Wireless Network Connection window, select EGR Wi‐ Fi or EGR Wi‐ Fi WPA2 and then click Connect.
The password for connecting to EGR Wi‐ Fi WPA2 is engineering.

6. In the Wireless Network Connection warning dialog, click Connect Anyway.

7. The Wireless Network Connection window will first indicate a status of Acquiring Network Address for EGR Wi‐ Fi and a few seconds later will indicate a status of
Connected. You are now connected to EGR Wi‐ Fi and can close the window by clicking the red X in the upper right‐ hand corner.

8. First time users will need to follow the instructions for Network Bouncer to register for
full Internet access.
Advanced Communications & Networking Lab

COMPUTER HARDWARE & NETWORKING LAB PRACTICE

Cloud Storage Services

Microsoft once offered a remote file-fetching solution that allowed you to access a
PC‘s files over the Internet as part of the Windows Live Mesh application. They discontinued
that product in favor of SkyDrive, now known as OneDrive.

Like Dropbox and Google Drive, OneDrive is a cloud file storage solution that
provides you with a special folder on your PC. Files and folders you place into this folder are
uploaded to your cloud storage account online and synced to all your PCs. You can run the
client on all your PCs to sync files, or you can access the service via your browser or mobile
app to download individual files you need.

Microsoft discontinued Windows Live Mesh because they believe a cloud storage
service is the ideal way for an average user to access their files. You don‘t have to leave your
PC online, install server software, or use a dedicated device. You can‘t access any file you
want on your PC — you‘ll have to sync the files you care about and access them.

This may not be the ideal solution for power users, but it is the simplest solution for
the average user who wants to access their personal documents from anywhere. It gives you
an online backup, too.

We recommend using either TeamViewer (if you want to access files stored on your
PC) or a cloud storage service (if you‘re happy syncing your files online). If you have a
dedicated NAS device at home, that device may help you set up access to its files over the
Internet. If you have a larger network with multiple file shares — such as a business network
— you may want to set up a VPN Server.

Don‘t set up a VPN server, SSH server, or FTP server unless you know what you‘re
doing. Configure the software incorrectly or use insecure server software and your computer
could be compromised by port-scanning bots that scan for open servers and attempt to
compromise them.
Advanced Communications & Networking Lab

COMPUTER HARDWARE & NETWORKING LAB


PRACTICE

8) Resultant Set of Polices (RSoP)—Addressing another Win2K shortcoming, Windows


Server 2003 includes a new RSoP feature that lets you study the net effect of policy
settings on users and computers. RSoP can be a powerful aid in debugging policies,
particularly because the new planning mode lets you see the effects of new policies
before you deploy them.

9) Active Directory Domain Rename—AD's unforgiving nature has always been a big
drawback to setting up AD on Win2K. Windows Server 2003 adds some friendliness by
letting you change a domain's DNS and NetBIOS names, thereby eliminating the need
to create a new domain, then migrate old domain objects to the new domain.Microsoft
Volume Shadow Copy Service (VSS)—One of the coolest Windows Server 2003 gems
is its VSS feature. A volume shadow copy is a point-in-time copy of a given storage
location. You use either the Microsoft Management Console (MMC) Disk Management
snap-in or the MMC Shared Folders snap-in to enable VSS. This feature provides a
better file-backup structure, in which administrators and users can easily recover
previous file versions from network shares.

S-ar putea să vă placă și