106
SETTING UP, DESIGN AND IMPLEMENTATION OF A LOCAL AREA NETWORK - LAN CASE STUDY: UGANDA TECHNICAL COLLEGE - KICHWAMBA. BY MWESIGWA JIMMY IUKOYO BCS/475613 1/PU. A GRADUATION PROECT REPORT SUBMITTED TO THE SCHOOL OF COMPUTER STUDIES FOR APPROVAL IN PARTIAL FULFILLMENT OF THE REQUIREMENTS OF THE AWARD OF A BACHELLOR’S DEGREE IN COMPUTER SCIENCE OF KAMPALA INTERNATIONAL UNIVERSITY. JUNE 2009

A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

SETTING UP, DESIGN AND IMPLEMENTATION OF

A LOCAL AREA NETWORK - LAN

CASE STUDY: UGANDA TECHNICAL COLLEGE - KICHWAMBA.

BY

MWESIGWA JIMMY IUKOYO

BCS/475613 1/PU.

A GRADUATION PROECT REPORT

SUBMITTED TO THE SCHOOL OF COMPUTER STUDIES FOR APPROVAL

IN PARTIAL FULFILLMENT OF THE REQUIREMENTS OF THE AWARD OF

A BACHELLOR’S DEGREE IN COMPUTER SCIENCE OF

KAMPALA INTERNATIONAL UNIVERSITY.

JUNE 2009

Page 2: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

DECLARATION:

I Mwesigwa Jimmy Kikoyo do hereby declare to the best of my knowledge that this is my

original Graduation Project Report and has never been submitted to any University or Higher

Institution of learning for the same case. It is the original work done and submitted by me to the

School of Computer Studies of Kampala International University for the award of a Bachelor’s

Degree in Computer Science as a requirement by Kampala International University.

The information from other peoples’ works has been fully and dully referenced and

acknowledged in the text of this book for better notes and bibliography.

Name: ~. ~jf

Regno:~Signature ~

DateS fL

School of Computer Studies:

Supervisor:

Name: ol~:~3J.E: MSignature:~

Date W~ .~. fr~Dean:

Name

Signature

DateS

Page 3: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

ACKNOWLEDGEMENT

First and foremost, I thank God for enabling and being with me in life of study since the

first year to the last year because it was not easy with out Him.

I am greatly thankful to my parents, Mr. and Mrs. Patrick Bujara, who have seen me

through the school life, and worked tirelessly through their prayers as parents to ensure

that I become a responsible and well educated person.

I am also very thankful to the management of Madhvani and group of Companies for the

support they gave me to complete my studies when I had failed to raise my tuition for a

year and a semester.

Great thanks also go to the Administration and Management of different organizations

like the Ministry of Information and Communications Technology (MoICT), Action on

Disability and Development (ADD), Kamwenge District Local Government and

Kamwenge District Union of the Disabled (KADUDI) for allowing me carry out my

Internship training with them for various times.

Finally, I extend my thanks to various people who assisted me in one way or the other

without getting tired of me to ensure that I am successful in my studies which led me to

acquiring my Bachelor’s Degree in Computer Science.

111

Page 4: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

DEDICATION

This report is dedicated to my parents Mr. and Mrs. Patrick Bujara whom I have been

wishing to see me succeed in life. This also goes to my Wife Jackie, Brothers and Sisters

— Francis, Gad, Prudence, Medias, Justine (In - Law) and Christine.

Specially, this is also dedicated to my Children Joel, Job and Jordan whom I wish and

pray to God to have the same like me.

May the Good Lord Bless You All!

iv

Page 5: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

LIST OF ABBREVEATIONSRegNo: Registration Number.

MoICT: Ministry of Information and Communications Technology

ADD: Action on Disability and Development.

TCP: Transmission Control Protocol

IF: Internet Protocol

IT: Information Technology

LAN: Local Area Network

WAN: Wide Area Network

NIC: Network Interface Card

RJ: Registered Jack

CLNS Connectionless Network Service

CONS Connection-Oriented Network Service

NSAPs Network Service Access Points

NETs: Network Entity Titles

UTC Uganda Technical College

NOS Network Operating System

FDDI Fiber Data Distributed Interface

E-mail Electronic mail

CAD Computer Aided Design

CAM Computer Aided Manufacturing

MRI Magnetic Response Imaging

CAT Computerized Axial Tomography

GoS Grade of Service

VPIs Virtual Path Identifiers

ATM Asynchronous Transfer Model

RAM Random Access Memory

CPU Central Processing UnitNIC Network Interface CardDRCN Design of Reliable Communication NetworkHTTP Hypertext Transfer ProtocolFPT File Transfer Protocol

v

Page 6: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

LIST OF FIGURESFig. 1. The Organizational Structure of UTC Kichwamba

Fig.2. A typical bus topology.

Fig.3. Star Topology.

Fig.4. Typical Ring Topology

Fig.5. Mesh Topology

Fig 6. Star Bus Topology

Fig. 7. Star-Ring topology

Fig. 8. Department Relational diagram

Fig 9. Unshielded Twisted Pair (UTP)

Fig. 10. RJ-45 connector

Figure 11: Kichwamba with Hubs or Switches

Figure 12: Kichwamba (Bridge) with Multiple Server Farms

Figure 13: Kichwamba (Bridge) with a Router and Server Clusters

Figure 14: Wiring the Network

Figure 31: Computer to be connected on the Network.

Figure 15: Computer and Wireless Router connection

Figure. 16: Network Setup Wizard to run the networkFigure. 17: Network Setup Wizard to checklist for creating a network.

Figure. 18: Network Setup Wizard to confirm use of shared connection.

Figure. 19: Network Setup Wizard to select a network connection method

Figure. 20: Network Setup Wizard for other Internet Connection methods.

vi

Page 7: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

Figure. 21: Network Setup Wizard to describe and name the computer.

Figure. 22: Network Setup Wizard for naming the network.

Figure. 23: Network Setup Wizard for Resource sharing

Figure. 24: Network Setup Wizard to indicate whether the computer is ready to network

settings.

Figure. 25: Network Setup Wizard for configuring the computer for home or small office

networking.

Figure. 26: Network Setup Wizard to run the network setup wizard.

Figure. 27: Network Setup Wizard for selecting the drive to use in creating a network setup

drive.

Figure. 28: Network Setup Wizard showing the drive selected.

Figure. 29: Network Setup Wizard for running the wizard with the network setup disk.

Figure. 30: Network Setup Wizard for completing the network setup wizard.

Figure. 31: Network Setup Wizard showing the user what to do for the new setup to take

effect.

Figure. 32: Network Setup Wizard showing how to run the computer on this wizard.

Figure. 33: Network Setup Wizard for Reviewing the checklist for creating the network.

Figure. 34: Network Setup Wizard for other shared connection.

Figure. 35: Network Setup Wizard for naming and describing computers in case of shared

connection.

Figure. 36: Network Setup Wizard for naming the network to specify the workgroup.

vii

Page 8: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

Figure. 37: Network Setup Wizard for applying network settings.

Figure. 38: Network Setup Wizard to run the network setup disk

Figure. 39: Network Setup Wizard completing the setup wizard in case of shared

Figure. 40: Shows which computers are available and/or which files or folders have been

shared

Figure. 41: Showing how to add a new hardware using the wizard

Figure. 42: Add new hardware Wizard to select the type of hardware to install.

Figure. 43: Showing the network adapters that match with the hardware selected.

Figure. 43: Adding the TCP/IP Protocol Stack

Fig. 44: Configuring the TCP/IP Protocol

Fig. 45: Server Installation

Fig. 46: Managing Your Server

Fig. 47: Steps taken to configure a server

Fig 48: To set up a server to perform one or more specific roles.

Fig 49: Summery of Selections

Fig 50: The Active Directory Installation Wizard

Fig 51: The Active Directory Installation Wizard showing the operating system

compatibility.

Fig 52: The Active Directory Installation Wizard showing the Domain controller type

Fig 53: The Active Directory Installation Wizard for creating new domain.

Fig 54: The Active Directory Installation Wizard showing the full DNS name for new

domain.

viii

Page 9: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

Fig 55: The Active Directory Installation Wizard showing Domain NetBios Name for the

new domain.

Fig 56: The Active Directory Installation Wizard showing Active Directory information

storage.

Fig 57: The Active Directory Installation Wizard showing shared system volume

Fig 58: The Active Directory Installation Wizard showing DNS Registration Diagnostics.

Fig 59: The Active Directory Installation Wizard showing permissions for user and group

objects.

Fig 60: The Active Directory Installation Wizard to create a password used to start the

server in HRestore Mode”..

Fig 61: The Active Directory Installation Wizard displaying a summary of your

selections.

Fig 62: The Active Directory Installation Wizard for creating and configuring Active

Directory

Fig 63: The Active Directory Installation Wizard configuring the components.

Fig 64: The Active Directory Installation Wizard is completed.

Fig 65: The Active Directory Installation Wizard for restarting the computer for the

installation to take effect

Fig 66: Dialog box titled Configure Your Server showing successful installation of Active

Directory.

Fig. 67 Regional and Language Setup Options dialog box

ix

Page 10: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

Tab~e of Contents

DECLARATIONS jj

ACKNOWLEDGEMENT iii

DEDICATION iv

LIST OF ABBREVEATIONS v

LIST OF FIGURES vi

Table of Contents x

DEFII’JITION OF TERMS xiii

CHAPTER ONE I

GENERAL INTRODUCTION 1

BACKGROUND TO THE STUDY~ 1

DEPARMENTS AND COURSES 2

PROBLEM STATEMENT 3

AIMS AND OBJECTIVES OF THE STUDY 3

General Objectives 3

Specific Objectives~ 3

Organizational StructureS 5

CHAPTER TWO 5JUSTIFICATION 5

LITERATURE REVIEW 7

INTRODUCTION 7

INFORMATION TECHNOLOGY 7

Role of Information Technology Today 8

Objectives of IT Architecture~ 9

CHAPTER THREE~ 10

RESEARCH METHODOLOGY 10

VARIOUS TYPES OF NETWORKS 11

x

Page 11: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

Standard NetworkTopo1ogies~~11

Reasons for Networking 18

Advantages of setting up and Installing a College Network 19

Disadvantages off setting up and Installing a College Network 20

CHAPTER FOUR 21

NETWORK PLANNING AND DESIGN 21

Department Relational Diagram 22

NETWORK PLANNING METHODOLOGY 22

NETWORK FORECASTING 24

The role of forecasting 24

NETWORK DIMENSIONING 24

TRAFFIC ENGINEERING 25

NETWORK SURVIVABILITY 26

NETWORK SERVERS 26

Server Requirements 26

NETWORK DESIGN ESSENTIALS~ 27

NETWORK MEDIA: 27

DIFFERENT TYPES OF CABLES 27

TWISTED PAIR CABLE 28

Advantages 29

Disadvantages 30

NETWORK MONITORING AND TROUBLESHOOTTNG 30

OSI MODEL: 30

NETWORK OPERATIONS AND MANAGEMENT 32

CHAPTER FIVE: 34

NETWORK IMPLEMENTATION 34

NETWORK IMPLEMENTATION 34

NETWORK SECURITY 36

ATTRIBUTES OF A SECURE NETWORK 36

SECURITY MANAGEMENT 37

xi

Page 12: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

GUIDES .38

Choosing IP Addresses for Network Machines 38

Configuring TCP/IP on Windows NT 38

Configuring TCP/IP on Windows 95 39

Testing the TCP/IP Connection 40

Wiring the Network 40

Connecting and setting up a Wireless Network - LAN 41

Network Setup on First Computer 43

Network Setup on Additional Computers 51

Viewing Network Connections 56

Setting up a Win9x Local Area Network 57

Adding Your Network Adapter 58

Adding the TCP/IP Protocol Stack 59

Configuring the TCP/IP Protocol 60

Server Installation Necessary Hardware and Software 61

Installing the Server Operating System 64

Software Installations - Workstation Operating Systems 78

Performing a New Installation of Windows XP 79

NETWORK MANAGEMENT 90

NETWORK MANAGEMENT WITH WINDOWS SERVER 2003 91

The Microsoft Management Console 94

REFERENCES~ 97

xii

Page 13: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

DEFINITION OF TERMS:

Bus topology: This connects each computer (nodes) to a single segment trunk called a

communication line by the help of communication medium called cable e.g. coaxial cables.

Computer: This is an electronic machine that takes in data and instructions (input), works with

the data (processing) and puts out information (output). It is also taken as a device that accepts

information (in the form of digitalized data) and manipulates it for some result based on a

program or sequence of instructions on how the data is to be processed.

Computer science is the study and the science of the theoretical foundations of information and

computation and their implementation and application in computer systems.

Data Flow diagrams: Tools that depict the flow of data through the system and then work or

FDDI: Specifies a 100-Mbps token-passing, dual-ring LAN using fiber-optic cable. FDDI is

frequently used as high-speed backbone technology because of its support for high bandwidth

and greater distances than copper.

Information Technology: This is the capability to electronically input, process, store, output,

transmit, and receive data and information, including text, graphics, sound, and video, as well as

the ability to control machines of all kinds electronically.

Local Area Network: This is a group of computers and other devices typically connected by a

cable.

Mesh network: This is a local area network (LAN) that employs one or two connection

arrangements.

Network: This is an interconnection of three or more communicating entities. It is also an

interconnection of usually passive electronic components that performs a specific function

(which is usually limited in scope).

Networking is the practice of linking two or more computing devices together for the purpose of

sharing data.

xiii

Page 14: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

Network topology: The specific physical, i.e., real, or logical, i.e., virtual, arrangement of the

elements of a network.

Operating System: This is a computer software that manages the resources of the computer

system.

Personal Computer: Computers that can run easy to use programs like Ms Office.

Relationships: Representation of an event that links the entities or merely a logical affinity that

exists between the entities.

Ring network: This is a network topology in which each node connects to exactly two other

nodes, forming a circular pathway for signals.

Terminal: Any input / output device that uses a key board to input and a monitor to output.

processing by that system.

Workgroup: This is a group of computers connected with a networking hardware and software

that users can share resources e.g. files and databases

xiv

Page 15: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

CHAPTER ONE

GENERAL INTRODUCTION:As the spectacular success UTC Kichwamba is likely to rely on a series of Information and

Communication Technology services as they are widely known and acknowledged globally,

Success in particular shall be witnessed in deployment, Design and Implementation of Local

Area Network — LAN that will globally expose the College resources and services leading to an

efficient and effective service delivery institution.

The project shall focus on setting up, designing and implementing of a Local Area Network —

LAN for UTC Kichwamba in Fort Portal where the survey was taken from following a study that

was made from the college by the designer with the help of various methods that are related to

data collection and analysis.

In the world of computers, and according to Todd Lammie and Kevin Hales in their book of

CCNP Support, Study Guide; in particular, Networking is taken to be the practice of linking

two or more computing devices together for the purpose of sharing data. Networks are built with

a mix of computer hardware and computer software. Also Williams Sawyer Hutchinson in his

book of Using Information Technology defines Networking as a sub-discipline of

telecommunications, Computer Science, information technology and / or computer engineering.

Computer science (or computing science) is the study and the science of the theoretical

foundations of information and computation and their implementation and application in

computer systems.

BACKGROUND TO THE STUDY:UTC — Kichwamba is a Government Aided Technical College found in Kabarole District. It is

located along Kabarole — Bundibudyo Road approximately 15 km from Fort Portal Town —

Kabarole District heading to Bundibudyo District. It was founded in 1979 as a Technical

Institute offering only Certificate Courses.

It lies at the foot hills of the Rwenzori Mountains at the borders of Kabarole and Bundibudyo

Districts along the Western Rift valley. Since it was started, it had been headed by a number of

1

Page 16: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

Principals and more than 100,000 students have passed through the same college and are now

champions in exploring the world and doing some recommendable work out there.

Presently, it has over 700 students of which 5% are females and the rest are male students. The

college has both teaching and non teaching staff as the major beneficiaries.

DEPARMENTS AND COURSES:The College has various departments which house different courses which lead students getting

both ordinary and advanced diplomas and Certificates respectively at the end of their studies.

Department of Civil Engineering:

• Civil Engineering.

o Land Survey.

o Brick Laying and Concrete Practice.

o Carpentry and Joinery

Department of Electrical Engineering:

• Electrical Engineering

o Electrical Installation.

o Electronics

o Refrigeration

• Motor rewinding

Department of Mechanical Engineering:

o Mechanical Engineering

o Agricultural Engineering.

o Motor Vehicle Technology.

o Agricultural Technology.

Computer Science and Information Technology

o Computer Engineering.

• Computer Science

o Software Engineering

o Computer Applications

2

Page 17: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

So, the Networking aspect of the College shall help the administration of UTC in the purpose of

resource sharing in terms of information and peripherals. This will be done by connecting

different departments where each of the above mentioned courses lies for better service delivery.

PROBLEM STATEMENT:UTC Kichwamba like any other un networked enterprise most of the time used computers for

traditional activities like word processing of documents, traditional information storage which is

static in a sense that that data could only accessed at particular locations of storage. To access

certain information, the college staff could move from office to office in search for the required

information which was time consuming; and in case that information was urgently needed, it

used to delay the services. This could have been reduced by peripheral / device sharing but due

to lack of networking facilities, there was no peripheral / device sharing like printers, etc. This

led the college to spending much in buying various peripherals for different staffs in the same

location leading to financial crisis.

Therefore, the establishment of a LAN at the college to provide a Networked environment

helped a lot in curbing down most of the problems that are related to a non networked

environment.

AIMS AND OBJECTIVES OF THE STUDY:

General Objectives:

To have an efficient and effective management tool of the college’s resources by establishing a

LAN for advanced related activities that shall be result oriented.

Specific Objectives:

To Study the current Network connectivity of the college to find means of solving most

of the related problems:

The Researcher first studied the networking environment of the college under which the

activities of the college were being performed. Due to the fact that the college have no

networked environment, the college staff used to move from office to office in search for the

required information which was time consuming; and in case that information is urgently

3

Page 18: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

needed, it used to delay the services, the researcher after finding out the problems related to

that, designed a network to solve such problems.

To design a network that addresses the current connectivity related problems of the

college.

Under this, the researcher came out with plans and designs of how the environment of UTC

Kichwamba would look like after setting up the Local Area Network while solving problems

that are related to a non networked environment. These designs and plans were handed over

to the concerned staff for approval who later gave him a go ahead to implementing the plan.

This was done because it was one way to solve problems that related to data and information

sharing and storage in a non networked environment.

o To implement the designed network to ensure that it meets the users’ needs.

The researcher implemented his designed network in phases by carrying out various activities

in relation to the set LAN. These activities included the following:

o Surveying of different sites, creating suitable Network designs, and Identifying and

setting up locations for network components. These covered the first phase took a

period of 30 days.

o In the second Phase, the Researcher carried out other activities as part of

implementation to ensure that the LAN is in place. These included the following:

Installation of conduits / tunnels for ports, testing of all ports, replacement and repair

of faulty ports, and then reporting about all the proceeding s in this phase. This took

37 days to reach to completion.

o The third phase consisted of activities like, Connection of all components together,

testing the connectivity of the components and then reporting on the proceedings of

the phase. This took 22 days before completion.

o In the last phase, the Researcher carried various activities and it took him 48 days to

complete. These activities includes: ISP Connection and testing, , LAN Testing, User

Training, Report on Phase Four, and then Launching the Network,

4

Page 19: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

Organizational Structure:

This is the mostly hierarchical concept of subordination of the college’s administrative bodies

that collaborate and contribute to serve one common purpose of making it the best learning

institution. This allows better and easy allocation of responsibilities and functions to different

departments of the college.

JUSTIFICATION:The LAN of UTC Kichwamba is in position to help the college’s beneficiaries get the required

information and services effectively and efficiently hence uplifling the academic performance to

the required standards.

Most of the services include but not limited to the following:

• Data Sharing:

This permits groups of users to exchange information routinely and to route data from one

individual to another as work flow demands. Data sharing also usually means that master

copies of data files reside some place in special on another computer elsewhere on the

network and that users can access the master copy in order to do their work.

o Also in a networked environment, UTC Kichwamba shall be permitted to messages,

documents and other college files that have to circulate among users. This improves human

communication substantially. Here the emails shall be used as the most popular networked

applications because it makes individuals communicate between themselves easily and

Figure 1: Organizational Structure of Kichwamba

5

Page 20: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

effectively, which was a problem for the college before thinking of implementing a LAN for

the college.

o Peripheral I device sharing in the college shall let groups of users take the advantage of

peripherals e.g. printers, scanners, faxes etc attached to correctly to the network or generally

available.

o Proper and Secure filing systems for the college in that college files shall be kept and

backed up using the network.

6

Page 21: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

CHAPTER TWO:

LITERATURE REVIEW

INTRODUCTION:This chapter focuses on the concept and magnitude of Local Area Networks as a component with

in the Information and Communications Technology Industry and computer science at large, the

structure and effects of Local Area Networks in relation to global and national perspective as it

addresses the challenges faced in designing a LAN in UTC — Kichwamba.

Therefore, Literature Review means becoming familiar with ones research topic. It gives an

insight by suggesting a research design for dealing with the research problem.

INFORMATION TECHNOLOGY:According to Williams Sawyer Hutchnison in his Using Information Technology; Information

Technology (IT) also known as Information and Communications Technology (ICT) is

concerned with the use of technology in managing and processing information, especially in

large organizations. In particular, IT deals with the use of electronic computers and computer

software to convert, store, protect, process, transmit, and retrieve information.

Information Technology is also taken as the study, design, development, implementation,

support or management of computer-based information systems, particularly software

applications and computer hardware (Jeffrey L. Whitten and Lonnie D. Bentley in Systems

Analysis and Design Methods).

Encompassing the computer and information systems industries, information technology is the

capability to electronically input, process, store, output, transmit, and receive data and

information, including text, graphics, sound, and video, as well as the ability to control machines

of all kinds electronically (defined by the Information Technology Association of America -

ITAA).

From the above definitions and statements therefore, Information Technology is taken to be the

means by which information is acquired, organized, stored, manipulated and transmitted

electronically.

7

Page 22: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

Role of Information Technology Today

According to the information retrieved from the internet (outlined by www.answers.com),

Information Technology in today’s world has various roles in making this world a global village

in both sectors. These include the following:

o Computers in Business:

Computers are used in keeping and managing business and financial records. Most large

companies keep the employment records of all their workers in large databases that are

managed by computer programs. Similar programs and databases are used in such business

functions as billing customers; tracking payments received and payments to be made; and

tracking supplies needed and items produced, stored, shipped, and sold.

• Computers in Medicine:

Information technology plays an important role in medicine. For example, a scanner takes a

series of pictures of the body by means of Computerized Axial Tomography (CAT) or

Magnetic Resonance Imaging (MRI). A computer then combines the pictures to produce

detailed three-dimensional images of the body~s organs. In addition, the MRI produces

images that show changes in body chemistry and blood flow.

o Computers in Science and Engineering:

Using supercomputers, meteorologists predict future weather by using a combination of

observations of weather conditions from many sources, a mathematical representation of the

behavior of the atmosphere, and geographic data.

Computer-aided design and computer-aided manufacturing programs, often called

CAD/CAM, have led to improved products in many fields, especially where designs tend to

be very detailed. Computer programs make it possible for engineers to analyze designs of

complex structures such as power plants and space stations.

8

Page 23: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

o Integrated Information Systems:

With today’s sophisticated hardware, software, and communications technologies, it is often

difficult to classify a system as belonging uniquely to one specific application program.

Organizations increasingly are consolidating their information needs into a single, integrated

information system.

o Information Technology Architecture:

The IT Architecture is an organized set of consensus decisions on policies & principles,

services & common solutions, standards & guidelines as well as specific vendor products

used by IT providers both inside and outside the organization trying to integrate the use of

Information Technology within its operations.

Objectives of IT Architecture:

The IT Architecture is guided by the following objectives, which help make decisions for

establishing individual standards:

o Architectural decisions should serve the Organization’s mission.

• The architecture serves heterogeneous environments.

o The greater the consensus achieved for individual architectural decisions, the greater the

benefit.

• The architecture should identify areas of stability without impeding essential innovation.

e Architectural decisions should describe the tangible results of conformance and non

conformance with the architecture.

• Architectural decisions should provide sufficient documentation to assess the compliance of

a specific implementation.

9

Page 24: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

CHAPTER THREE:

RESEARCH METHODOLOGY:These are the techniques or methods the designer used to collect data to facilitate the design and

implementation of the Local Area network for UTC — Kichwamba.

In this case, the designer collected all the necessary information using methods like observing all

the activities done and consulting various documents of UTC — Kichwamba. Other methods

included Questionnaires designed by the researcher and distributed for filling to the College staff

and students to enable him get the required information to support his research.

Project Area:

The report reflects what took place at UTC — Kichwamba from where the Case Study was done.

The College is located in Kabarole District approximately 15 km along Bundibudyo Road at the

footsteps of Rwenzori Mountains.

Project Population:

The Project only targets College Administration, Tutors I Lecturers, Departmental Heads,

Teaching and Non - teaching Staffs and Students’ Information.

Procedure:

Accessing the college for research, information was through the designer being given

introductory letter from the Executive Director Industrial Training and Research. Copies of the

letter were distributed to all the above said personnel to prepare for the exercise.

Documentary Evidence:

Extraction of results was facilitated through consultations made through different documents e.g.

files, records, college manuals, admission forms, financial statements, etc.

Observations:

The project designer spent much of the time watching individuals working out certain activities

from different college departments taking one at a time. This was aimed at generating new

information structures and improve on the existing procedures with in the college. The designer

then observed and identified the work flow patterns within the college e.g. how documents move

from one office / department to the other.

Merits

• Cheap method.

• No interruption of work / activities and schedules.

10

Page 25: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

o Provides enough access to various key departments since the designer was acting like a staff

member allowed document view of various activities and procedures with in the college.

Demerits:

o The method was time consuming for substantiating results.

• Respondents were not comfortable being watched while working.

VARIOUS TYPES OF NETWORKS:During the research, the researcher took much concern and focus on different types of networks

that any networked environment may be having for it to support and solve certain problems that

are network related. In reference to various authors of different books and retrieved information

fro the Internet, the Researcher came out with various definitions of the following types of

networks as: (http://www.en.wikipedia.org/wiki/networks, Networking Complete, 2nd Edition,

etc).

• Local Area Network - LAN is a group of computers and other devices typically connectedby a cable. It is contained in a company or department and located in a single geographicalarea, usually a building.

o Wide area network (WAN) that is usually a larger network that covers a large geographicarea.

o Wireless LANs and WANs (WLAN & WWAN) are the wireless equivalent of the LAN

and WAN.

The Researcher went ahead and found out that a variety of different kinds of media, including

twisted-pair copper wire cable, coaxial cable, optical fiber, and various wireless technologies are

used to interconnect various networks components to allow communication between them. The

components can be separated by a few meters (e.g. via Bluetooth for wireless) or nearly

unlimited distances (e.g. via the interconnections of the Internet).

Standard Network Topologies:

According to John Swartz and Todd Lammle in their Study Guide of Cisco CertifiedInternetwork Expert for Routing and Switching exam 350-001, a Network Topology isdefined as a specific physical and virtual arrangement of network components / elements.

11

Page 26: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

Bus Topology

A bus topology connects each computer (nodes) to a single segment trunk called a

communication line by the help of communication medium called cable e.g. coaxial cables.

This is also called Linear Bus Topology which is the simplest and most common method for

connecting computers. It is simple but a single cable break can halt the entire network. All

components of the bus topology via a back bone, a single cable segment that (theoretically)

interconnects all the computers in a straight line.

F~g~2. A typica~ bus topollogy~

A bus topology connects each computer (nodes) to a single segment trunk (a communication

line, typically coax cable that is referred to as the ‘bus’. The signal travels from one end of the

bus to the other. A terminator is required at each to absorb the signal so as it does not reflect

back across the bus. A media access method called CSMAIMA is used to handle the collision

that occur when two signals placed on the wire at the same time

Advantages:

o Failure of one of the station does not affect others.

o Good compromise over the other two topologies as it allows relatively high rate of data

transmission.

• Well suited for temporary networks that must be set up in a hurry.

Easy to implement and extend.

12

Page 27: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

Disadvantage:

• Require a network to detect when two nodes are transmitting at the same time.

o Does not cope well with heavy traffic rates

o Difficult to administer/troubleshoot.

e Limited cable length and number of stations.

o A cable brake can disable the entire network; no redundancy.

o Maintenance cost may be higher in the long run.

o Performance degrades as additional computers are added.

Star Topology

A bus topology connects each computer (nodes) to a single segment trunk called a

communication line by the help of communication medium called cable e.g. coaxial cables In the

Star Topology there is a central connection point called the hub which is a computer hub or

sometimes just a switch. In a Star Network the best advantage is when there is a failure in cable

then only one computer might get affected and not the entire network.

In a Star Network the entire network is dependant on the hub so if the entire network is not

working then there could be a problem with the hub. This feature makes it easy to troubleshoot

by offering a single point for error connection ad at the same time the dependency is also very

high on that single point.

Fig.3. Star Topology.

Centra’ Hub

13

Page 28: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

Advantages

• A Star Network Topology is very easy to manage because of its simplicity in functionality.

o The problems can be easily located logically in a Star Topology and therefore is easy to

troubleshoot also.

o The Star Topology is very simple in format so it is very easy to expand on the Star Topology.

Disadvantages

o The Star Topology is fully dependant on the hub and the entire working of the network depends

on the hub or the switch.

• If there are many nodes and the cable is long then the network may slow down.

Since all the computers on the network have independent control of their networks and only

dependant on the central hub computer, the failures in transmission and other possible problems

in this area are less likely. Also if the hub is safe then every computer in the network is safe. This

type of network also offers more privacy than any other network.

If one computer fails in the network it does not affect any other computer in the network and the

tasks of this computer can be easily switched very to the next computer easily using the hub

controls. In a Star Network Topology it is possible to have all the important data back ups on the

hub in a private folder and this way if the computer fails you can still use your data using the

next computer in the network and accessing the backup files on the hub.

Ring Topology:

A ring network is a network topology in which each node connects to exactly two other nodes,

forming a circular pathway for signals - a ring. Data travels from node to node, with each node

handling every packet.(www.wikipedia.org/wiki/network_topology)

Because a ring topology provides only one pathway between any two nodes, ring networks may

be disrupted by the failure of a single link. A node failure or cable break might isolate every

node attached to the ring. FDDI - Fiber Distributed Data Interface networks overcome this

vulnerability by sending data on a clockwise and a counterclockwise ring.

14

Page 29: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

Fig.4. Typical Ring Topology

Advantages

o Very orderly network where every device has access to the token and the opportunity to

transmit

o Performs better than a star topology under heavy network load

o Can create much larger network using Token Ring

o Does not require network server to manage the connectivity between the computers

Disadvantages

o One malfunctioning workstation or bad port in the MAU can create problems for the entire

network

o Moves, adds and changes of devices can affect the network

o Network adapter cards and MAU’s are much more expensive than Ethernet cards and hubs

o Much slower than an Ethernet network under normal load

Mesh Topology:A mesh network is a local area network (LAN) that employs one or two connection

arrangements. In this network, all the nodes are connected to each other. Mesh network topology

therefore is one of the key network architectures in which devices are connected with many

redundant interconnections between network nodes such as routers and switches to enable the

activity of communication between nodes becomes simple and easy.

15

Page 30: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

Star - Bus Topology

This is a combination of the bus and the Star Topology, it is implemented when a bus backbone

interconnects two or more hubs. The star configures firm minimizes any single computer failures

which affects the network.

Fig 6. Star Bus Topology

A Star Bus Topology suits best when the network is widely spread and vastly divided into many

branches. Like any other topologies, the Star Bus Topology has its advantages and

disadvantages. A Tree Network may not suit small networks and it may be a waste of cable to

use it for small networks. Tree Topology has some limitations and the configuration should suit

those limitations.

Benefits

o A Star Bus Topology is supported by many network vendors ad even hardware vendors.

A point to point connection is possible with Star Bus Networks.

Fig.5. Mesh Topology

16

Page 31: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

All the computers have access to the larger and their immediate networks.

• Best topology for branched out networks.

Limitations

o In a Network Topology the length of the network depends on the type of cable that is

being used.

e The Star Bus Topology network is entirely dependant on the trunk which is the main

backbone of the network. If that has to fail then the entire network would fail.

Since the Star Bus Topology network is big it is difficult to configure and can get

complicated after a certain point.

Star - Ring Topology:

In the Star-Ring topology, the computers are connected to a central component as in a star

network. These components, however, are wired to form a ring network.

Like the star-bus topology, if a single computer fails, it will not affect the rest of the network. By

using token passing, each computer in a star-ring topology has an equal chance of

communicating. This allows for greater network traffic between segments than in a star-bus

topology.

Fig. 7. Star-Ring topology

17

Page 32: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

Reasons for Networking:

Basing on the need for networked environment, the setting, designing and implementation of a

LAN — Local Area Network at UTC Kichwamba uplift the standards of the college both

effectively and efficiently through having the following in place:

Software Sharing:

The ability to share both a software application and the files it creates amongst all of your

computers is the primary reason for setting up a network. This does not only increase in

productivity, but an increase in the organization of their computer files as well. Opening files

on a computer across your office will be as simple if they were stored on your own machine.

o Printers and other peripheral sharing:

Sometimes the printer and other peripherals shall be connected together to increase the

capabilities of other devices in the networked environment. Instead of college staff moving

from office to office searching for certain peripherals, the networked environment shall make

this easy by sharing them. on a network.

• Internet Access.

Most of the employees in your office, including yourself, can increase their productivity with

access to the Internet. Using a technology such as Cable/DSL router combined with a

network allows multiple computers to share the same Internet account simultaneously.

Advantages of setting up and Installing a College Network

o Speed: Networks provide a very rapid method for sharing and transferring files. Without a

network, files are shared by copying them to floppy disks, then carrying or sending the disks

from one computer to another which is very time-consuming.

Cost: Networkable versions of many popular software programs are available at considerable

savings when compared to buying individually licensed copies. Besides monetary savings,

sharing a program on a network allows for easier upgrading of the program.

• Security: Files and programs on a network can be designated as “copy inhibit,” so that you

do not have to worry about illegal copying of programs. Also, passwords can be established

for specific directories to restrict access to authorized users.

18

Page 33: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

o Centralized Software Management: One of the greatest benefits of installing a network at a

school / Institution like Kichwamba is the fact that all of the software can be loaded on one

computer (the file server). This eliminates that need to spend time and energy installing

updates and tracking files on independent computers throughout the building.

o Resource Sharing: Sharing resources is another area in which a network exceeds stand

alone computers. Most institutions can not afford peripherals like laser printers, fax

machines, modems, scanners, and CD-ROM players for each computer. However, if these or

similar peripherals are added to a network, they can be shared by many users.

Electronic Mail: The presence of a network provides the hardware necessary to install an e

mail system. E-mail aids in personal and professional communication for all school

personnel, and it facilitates the dissemination of general information to the entire school staff.

Electronic mail on a LAN can enable students to communicate with teachers and peers at

their own school. If the LAN is connected to the Internet, students can communicate with

others throughout the world.

o Flexible Access: School networks allow students to access their files from computers

throughout the college. Students can begin an assignment in their classroom, save part of it

on a public access area of the network, then go to the media center after school to finish their

work. Students can also work cooperatively through the network.

o Workgroup Computing: Workgroup software (such as Microsoft BackOffice) allows many

users to work on a document or project concurrently.

Disadvantages off setting up and Installing a College Network

o Expensive to Install. Although a network will generally save money over time, the initial

costs of installation can be prohibitive. Cables, network cards, and software are expensive,

and the installation may require the services of a technician.

o Requires Administrative Time. Proper maintenance of a network requires considerable

time and expertise. Many enterprises have installed a network, only to find that they did not

budget for the necessary administrative support.

19

Page 34: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

o File Server May Fail. Although a file server is no more susceptible to failure than any other

computer, when the files server “goes down,” the entire network may come to a halt. When

this happens, the entire college may lose access to necessary programs and files.

Cables May Break. Some of the configurations are designed to minimize the inconvenience

of a broken cable; with other configurations, one broken cable can stop the entire network.

NETWORK OPERATING SYSTEM:

For any communication within a Network to happen, the Researcher decided to have an

Operating system to support such communication of computers over a network. A network

operating system (NOS) is a computer operating system that is designed primarily to support

workstation, personal computer, and, in some instances, older terminal that are connected on a

local area network (LAN). A network operating system provides printer sharing, common file

system and database sharing, application sharing, and the ability to manage a network name

directory, security, and other housekeeping aspects of a network.

20

Page 35: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

CHAPTER FOUR:

NETWORK PLANNING AND DESIGNThe researcher used different applications and techniques in designing the network. Someof the applications used include Ms Access for drawing relational diagrams to show howdifferent departments from different buildings at the college shall be connected to supportan interactive environment, Ms Office Project for drawing a work plan to show the periodthe work was to be finished.

During planning of the Network and how different departments should be connected tofacilitate communication, the researcher used Relational Diagrams to explain them.

Various departments included:

Department of Civil Engineering:

o Civil Engineering.

o Land Survey.

o Brick Laying and Concrete Practice.

o Carpentry and Joinery

Department of Electrical Engineering:

o Electrical Engineering

o Electrical Installation.

o Electronics

o Refrigeration

o Motor rewinding

Department of Mechanical Engineering:

o Mechanical Engineering

o Agricultural Engineering.

• Motor Vehicle Technology.

• Agricultural Technology.

Computer Science and Information Technology

o Computer Engineering.

o Computer Science

o Software Engineering

o Computer Applications

21

Page 36: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

Department Relational Diagram

Network planning and design is an iterative process, encompassing topological design,

network-synthesis, and network-realization, and is aimed at ensuring that a new network or

service meets the needs of the subscriber and operator.~’1 The process can be tailored according

to each new network or service. This is an extremely important process which must be performed

before the establishment of a new telecommunications network or service.

NETWORK PLANNING METHODOLOGY

Planning being the most essential in every activity, the Researcher drew plans of how the

network should operate to ensure that the network meets the required standards and.

Traditionally, network planning methodology involves

Long-term and medium-term network planning where results / out comes should be

experienced either through a long or medium term basis.

e Short-term network planning: this is where the researched was thinking of in case the

network could last for s very short time and needs readjustments due to un avoidable

circumstances.

Fig. 8. Department Relational diagram

22

Page 37: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

o Operations and maintenance: This is where the researcher focused on the full operation of the

network after fully trouble shoot and maintained. Here the end users are able to us the

network for information and peripheral sharing i.e. operation of the network on a daily basis.

The network planning process begins with the acquisition of external information. This includes:

forecasts of how the new network/service will operate;

the economic information concerning costs;

o The technical details of the network’s capabilities.

It should be considered that planning a new network/service involves implementing the new

system across the first four layers of the OSI Reference Model. This means that even before the

network planning process begins, choices must be made, involving protocols and transmission

technologies.

Once the initial decisions have been made, the network planning process involves three main

steps:

o Topological design: This stage involves determining where to place the components and

how to connect them. The (topological) optimization methods that can be used in this stage

come from an area of mathematics called Graph Theory. These methods involve determining

the costs of transmission and the cost of switching, and thereby determining the optimum

connection matrix and location of switches and concentrators.

• Network-synthesis: This stage involves determining the size of the components used,

subject to performance criteria such as the Grade of Service (G0S). The method used is

known as “Nonlinear Optimization”, and involves determining the topology, required GoS,

cost of transmission, etc., and using this information to calculate a routing plan, and the size

of the components.

• Network realization: This stage involves determining how to meet capacity requirements,

and ensure reliability within the network. The method used is known as “Multicommodity

23

Page 38: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

Flow Optimization”, and involves determining all information relating to demand, costs and

reliability, and then using this information to calculate an actual physical circuit plan.

These steps are interrelated and are therefore performed iteratively, and in parallel with one

another. The planning process is highly complex, meaning that at each iteration, an analyst must

increase his planning horizons, and in so doing, he must generate plans for the various layers

outlined above.

NETWORK FORECASTING:

In order to eliminate Network Traffic, the Researcher also put into considerations the estimation

of the expected traffic intensity and thus the traffic load that the network must support. In case a

similar network exists, the researcher put up measures to take traffic measurements of such a

network and use that data to calculate the exact traffic load which is likely to happen in most

instances when a similar network is not found.

The role of forecasting

The forecasting process involves several steps as follows:

o Definition of problem;

o Data acquisition;

o Choice of forecasting method;

• Analysis / Forecasting;

o Documentation and analysis of results.

NETWORK DIMENSIONING

In addition to forecasting, the Researcher also focused on Network Dimensioning. The purpose

of dimensioning a new network / service is to determine the minimum capacity requirements that

will still allow the Teletraffic Grade of Service (GoS) requirements to be met. Here the

Researcher decided to plan for peak-hour traffic, i.e. that hour during the day during which

traffic intensity is at its peak so as to meet the users’ needs.

24

Page 39: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

The dimensioning process involves determining the network’s topology, routing plan, traffic

matrix, and GoS requirements, and using this information to determine the maximum call

handling capacity of the switches, and the maximum number of channels required between the

switches. This process requires a complex model that simulates the behavior of the network

equipment and routing protocols.

A dimensioning rule is that the Researcher must ensure that the traffic load should never

approach a load of 100 percent. To calculate the correct dimensioning to comply with the above

rule, the researcher must take on-going measurements of the network’s traffic, and continuously

maintain and upgrade resources to meet the changing requirements. Another reason for “over

provisioning” is to make sure that traffic can be rerouted in case a failure occurs in the network.

TRAFFIC ENGINEERING

Comparing to network engineering which adds resource, such as link, router, switch into the

network, traffic engineering targets to change traffic path on the existing network to alleviate

traffic congestion or accommodate more traffic demand, the researcher also put into

consideration Traffic Engineering as a necessity while planning and implementation of a LAN of

UTC Kichwamba.

This technology is critical when the cost of expanding network expansion is prohibitively high

and network load is not optimally balanced. The available technologies for traffic engineering

include MPLS and ATM for current Internet backbone. For example, MPLS allows carriers to

provision LSPs with dynamic or explicit routes. The dynamic route is controlled by CSPF while

the explicit routes are optimized in an offline tool or through a Path Computation Element which

is under study by IETF. End-to-end protection is an alternative resilient approach. It provides a

backup route for each primary route. Preplanning enough bandwidth for these backup routes is

one of the active topics for survivable network design.

25

Page 40: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

NETWORK SURVIVABILITY

In addition to the above planning methodologies, the Researcher focused on how the planned

network should last longer and meet users’ requirements. He termed this as Network

Survivability.

This is a situation where the network maintains maximum network connectivity and quality of

service under failure conditions. As one of the critical requirements in network planning and

design, It involves design requirements on topology, protocol, bandwidth allocation, etc..

Topology requirement can be maintaining a minimum two-connected network against any failure

of a single link or node. Protocol requirements include using dynamic routing protocol to reroute

traffic against network dynamics during the transition of network dimensioning or equipment

failures. Bandwidth allocation requirements pro-actively allocate extra bandwidth to avoid traffic

loss under failure conditions.

NETWORK SERVERS.Fro any network to stand and operate under any condition, there has to be a communication

driver facilitating it. This the Researcher termed it as a Network Server.

A network server therefore is a computer designed to process requests and deliver data to other

computers / clients with a specialized operating system over a local network or the Internet.

Examples of network servers include Web servers, proxy servers, and FTP servers.

Server Requirements:

Wherever a machine functions as a server on a server based or peer to peer network, handling

service requests across a network invariably adds to a machine’s processing load. The higher the

load, the more important it is to purchase computers with additional power to handle demands

for network resources.

Considering the above Network Planning Methodologies to ensure hat the LAN in UTC

Kichwamba operates to the maximum and meets the users’ requirements, it shall have the servers

with the following specifications as listed in the table below.

26

Page 41: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

Item Windows NT Server Windows 2000 Server

RAM 16(128 +)MB 128(256+)MB

Disk type EIDE (SCSI) EIDE(SCSI)

~ Disk space 124 (2000) MB 1000 (3000)MB

CPU types 80486 + (Pentium +) Pentium (Pentium II +)

CPU Count 1(2or4) 1 (2or4)

NIC Type EISA (PCI) PCI

NETWORK DESIGN ESSENTIALS:Network Based Design plays an integral part in its operation and performance. The topology of a

network dictates the media used the type of channel access and the speed at which the network

operates.

Network Topology: This is a physical layout of the network. It refers not only to the physical

layout of its computers, cables and other resources, but also how those components communicate

with each other. The network topology has significant effect on its performance as well as

growth potential of a network.

NETWORK MEDIA:Network media is the actual path over which an electrical signal travels as it moves from one

component to another (Networking Essentials Plus; Academic Learning Series; 3~1 Edition).

Most networks today use cables to interconnect various devices employing signaling techniques,

network cables transfer signals between computers, allowing them to communicate with each

other.

There are different kinds to be used to build networks each with its own distinguishing set of

signal — carrying characteristics.

Not all computers or networked devices attach to networks by cables; a growing portion of the

networking population uses wireless technologies, either because physical obstructions or

distance limitations make cable unsuitable or because users are mobile.

27

Page 42: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

DIFFERENT TYPES OF CABLES:A Cable is the medium through which information usually moves from one network device to

another. There are several types of cable which are commonly used with LANs. In some cases, a

network will utilize only one type of cable, other networks will use a variety of cable types. The

type of cable chosen for a network is related to the network’s topology, protocol, and size.

Understanding the characteristics of different types of cable and how they relate to other aspects

of a network is necessary for the development of a successful network.

TWISTED PAIR CABLE:This is a form of wiring in which two conductors (two halves of a single circuit) are wound

together for the purposes of canceling out electromagnetic interference (EMI) from external

sources; for instance, electromagnetic radiation from unshielded twisted pair (UTP) cables,

and crosstalk between neighboring pairs.

Twisting wires decreases interference because the ioop area between the wires (which

determines the magnetic coupling into the signal) is reduced. In balanced pair operation, the

two wires typically carry equal and opposite signals (differential mode) which are combined

by addition at the destination. The twist rate (also called pitch of the twist, usually defined in

twists per meter) makes up part of the specification for a given type of cable. Where pairs are

not twisted, one member of the pair may be closer to the source than the other, and thus

exposed to slightly different induced electromotive force (EMF).

In planning for the network, the researcher also considered the connectivity of the network

components to by use of twisted pair cables due to that fact that they have the following

advantages.

o Cancels out / prevents electromagnetic interference (EMI) from external sources

o Has less or no crosstalk experienced in the network during device communication.

28

Page 43: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

Fig 9. Unshielded Twisted Pair (UTP)

Unshielded Twisted Pair Connector

The standard connector for unshielded twisted pair cabling is an RJ-45 connector. This is a

plastic connector that looks like a large telephone-style connector. A slot allows the RJ-45 to be

inserted only one way. RJ stands for Registered Jack, implying that the connector follows a

standard borrowed from the telephone industry. This standard designates which wire goes with

each pin inside the connector.

Fig. 10. RJ-45 connector

STP cabling, also known as Screened Fully shielded Twisted Pair (S/FTP), is both individually

shielded (like STP cabling) and also has an outer metal shielding covering the entire group of

shielded copper pairs (like S/UTP). This type of cabling offers the best protection from

interference from external sources, and also eliminates alien crosstalk.

Advantages

o It is a thin, flexible cable that is easy to string between walls.

o Because UTP is small, it does not quickly fill up wiring ducts.

o UTP costs less per foot than any other type of LAN cable.

29

Page 44: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

Disadvantages

o Twisted pair’s susceptibility to electromagnetic interference greatly depends on the pair

twisting schemes (usually patented by the manufacturers) staying intact during the

installation. As a result, twisted pair cables usually have stringent requirements for

maximum pulling tension as well as minimum bend radius. This relative fragility of

twisted pair cables makes the installation practices an important part of ensuring the

cable’s performance.

Therefore, the Researcher in setting up the LAN decided to use the UTP cable and RJ 45

Connectors because they are easy to use both in terms of cost and availability in the today’s

market.

NETWORK MONITORING AND TROUBLESHOOTING:

For easy monitoring and troubleshooting of the network, the Researcher set up methods one

should use to ensure that the network is well monitored for proper operation and in case of any

problem, also measures were set to carryout a Troubleshooting exercise.

051 MODEL:

This is a seven layered model set by the Researcher to help him identify which layer to deal with

during either monitoring or troubleshooting the Network of UTC Kichwamba.

OSI MOdel

7 Application Layer

6 Presentation Layer

5 Session Layer

4 Transport Layer

30

Page 45: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

3 Network Layer

2 Data Link Layer

o LLC sub layero MAC sub layer

1 Physical Layer

Table 2: OSI Reference Model

The Open Systems Interconnection Basic Reference Model (OSI Reference Model or 051

Model) is an abstract description for layered communications and computer network protocol

design. In its most basic form, it divides network architecture into seven layers which, from top

to bottom, are the Application, Presentation, Session, Transport, Network, Data-Link, and

Physical Layers. It is therefore often referred to as the OSI Seven Layer Model.

A layer is a collection of conceptually similar functions that provide services to the layer above

it and receives service from the layer below it. For example, a layer that provides error-free

communications across a network provides the path needed by applications above it, while it

calls the next lower layer to send and receive packets that make up the contents of the path.

In order to understand fully what each layer is composed of and where to tackle during the

exercise of troubleshooting and monitoring, the researcher decided to table up these layers

explaining briefly functions of each. This shall help whoever wants to do the troubleshooting and

monitoring of the Network of Kichwamba.

31

Page 46: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

Table 3: Description of each OSI layers.

OSI Model

Data unit Layer Function

7. Application Network process to application

Data 6. Presentation Data representation and encryptionHost layers

5. Session Inter-host communication

Segment / Datagram 4. Transport End-to-end connections and reliability

Packet 3. Network Path determination and logical addressing

Media layers Frame 2. Data Link Physical addressing (MAC & LLC)

Bit 1. Physical Media, signal and binary transmission

NETWORK OPERATIONS AND MANAGEMENT.In Network Management and operations, the researcher put more emphasis on how Control

should be passed from one layer to the next, starting at the application layer in one station, and

proceeding to the bottom layer, over the channel to the next station and back up the hierarchy.

To manage the network properly leading to satisfactory operation of the network, the researcher

identified the major significant architectural entities found in the OSI supported network for easy

management and operation. In this, the researcher should deal with one at a time hence proper

network management.

The architectural entities focused on in an OSI network include hosts, areas, a backbone, and a

domain. A domain is any portion of an OSI network that is under common administrative

authority. Within any OSI domain, one or more areas can be defined. An area is a logical entity

formed by a set of contiguous routers and the data links that connect them. All routers in the

32

Page 47: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

same area exchange information about all of the hosts that they can reach. The areas are

connected to form a backbone. All routers on the backbone know how to reach all areas. The

term end system (ES) refers to any non routing host or node; intermediate system (IS) refers to a

router.

Therefore, the above architectural entities were set to help the researcher which network

component and part of the network infrastructure to deal with while monitoring, troubleshooting

and even during management of the Kichwamba network.

33

Page 48: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

CHAPTER FIVE:

NETWORK IMPLEMENTATION

This involves several of the configuration options that the researcher used to implement the UTC

Kichwamba LAN. The Implementation exercise focuses on each of the network components,

their connectivity and operations. This is done to prove whether there is direct communication

between them and the server.

In addition to connectivity, the researcher also focused on how the Kichwamba Bridge

communicates with various servers to enable packet movements through different network

components. In doing this the work of network implementation should be seen as to as simple as

possible.

NETWORK IMPLEMENTATION

UTC Kichwamba uses directed or dispatch mode to appear to the client as if they are

communicating directly with a real server. If the client and server are on the same network

segment, the response from the server bypasses Kichwamba Bridge, and the traffic will not be

load balanced. All traffic must pass through the Bridge and be directed to the real servers.

Kichwamba Bridge serves as a transparent learning bridge to forward data packets between its

interfaces. Because of its bridge capability, the Bridge must not be installed on the network

parallel to another bridge. Only use Kichwamba Bridge to connect to servers allowing a single

way in or out to the network through Kichwamba Bridge.

The connectivity of the LAN Components the researcher used Hubs or Switches to connect two

or more components together for example in one department. These facilitate easy

communication of these components with in a network.

If there is another path from the network to your servers, a bridge loop is created and

Kichwamba Bridge does not work properly. Kichwamba Bridge automatically detects a bridge

loop and tries to recover. SYSLOG messages are generated to indicate there is a bridge loop, and

virtual and real servers have intermittent failures.

34

Page 49: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

If the real servers have two single-attached interfaces (for example, they are dual-homed), make

sure that load-balanced traffic cannot bypass Kichwamba Bridge. Kichwamba Bridge must be

between the real servers and the Internet cloud that contains the clients. It must see all the

packets coming from the clients to the virtual server and all the traffic that comes back in

response to the client-to-virtual packets.

In addition, packets from the clients must come in on one interface and go out to the real servers

on a different interface. If these rules are not followed, Kichwamba Bridge cannot perform load

balancing.

Figure 11: Kichwamba with Hubs or Switches

Ser~e~ A

Segment Segment 2

_-i~ —- ..• —~

lub or ~icIi~vni~ba 1-Itib orSwitch Bridge Switch

While connecting multiple departments, the researcher also used the same method of using the

hub / switch to ensure that these departments are well connected and facilitate proper

communication of all the network components in these departments.

Figure 12: Kichwamba (Bridge) with Multiple Server Farms

Segment

Segment ,.T~’-jI

Bridge ,. 1L...Dept Hub

_________ I Switch

t~ C1~riI~ ~ _______ Dept Hub

I Switch .~ .,

Dept Hub .~ . JJ I 1

I Switch -~

..*~i._

Segment 3 .,

35

Page 50: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

Figure 13: Kichwamba (Bridge) with a Router and Server Clusters

Dept Hub i /11 S~r~r I

Cr i Switch /~ — S~rvsr2

Sur’,ur 3

_~ $~wier4

Dept Hub I Ser~er!~Switch

Server 6

NETWORK SECURITY

Here the researcher put up the preventive measures attempt to secure the access to individual

computers in the Kichwamba network thereby protecting the computers and other shared

resources such as printers, network-attached storage connected by the network. Network

security therefore consists of the provisions made in an underlying computer network

infrastructure, policies adopted by the network administrator to protect the network and the

network-accessible resources from unauthorized access and consistent and continuous

monitoring and measurement of its effectiveness (or lack) combined together.

ATTRIBUTES OF A SECURE NETWORK

Network security starts from authenticating any user, most likely a username and a password.

Once authenticated, the researcher configured a stateful firewall to enforce access policies such

as what services are allowed to be accessed by the network users.

In case of failure to prevent unauthorized access, and the components fail to check potentially

harmful contents such as computer worms being transmitted over the network, the researcher put

up An Intrusion Prevention System (IPS) to help detect and prevent harmful contents. IPS also

monitors for suspicious network traffic for contents, volume and anomalies to protect the

Kichwamba(Brid~e~

Dept Hub /Switch

36

Page 51: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

network of Kichwamba from attacks such as denial of service. Communication between two

hosts using the network could be encrypted to maintain privacy. Individual events occurring on

the network could be tracked for audit purposes and for a later high level analysis.

SECURITY MANAGEMENT

Security Management for networks is different for all kinds of situations. UTC Kichwamba for

this matter as requirement needed basic security for high maintenance and advanced software

and hardware to prevent malicious attacks from hacking and spamming. The following are the

requirements needed for the college to have a secure network.

o An adjustable firewall and proxy to allow authorized users access from the outside and

inside.

o Strong Antivirus software and Internet Security Software packages.

o Students’ Internet Protection Act compliance.

• Supervision of network to guarantee updates and changes based on popular site usage.

• Constant supervision by College ICT Department and administrators to guarantee protection

against attacks by both internet and sneaker net sources.

To enhance effective implementation of the LAN at UTC Kichwamba, the researcher

decided to use the Networking Guides to help in the networking process as they play a big

role in the exercise.

The Networking guides indicate what the Researcher did while implementing the network

especially during installation and configuration of the network of UTC Kichwamba.

The screen shots in the guides are some of the wizards followed since the procedures are easy

to use and follow in the sense that the computer tells the network administrator what to do.

Therefore, the guides with respect to networking helped the researcher a lot in setting up and

implementation of the Network as it is a click and play procedure.

37

Page 52: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

GUIDES

ONE:

Choosing IP Addresses for Network Machines

For simplicity, class B IP addresses are used for a peer-to-peer network. The specifications for class B

IP addresses are as follows:

o The first digit of the IP address must be between 128 to 191 inclusively.

o The subnet mask is: 255.25 5.0.0

o The first two digits of the IP address must match on both machines. For example:

machind: 150.100.100.10

machine2: 150.100.250.20

Here’s a good example of a set of IP address to use:

Macintosh: 150.100.100.10PC Running Windows NTor Windows 95: 150.100.100.20

Configuring TCP/IP on Windows NT

1. Go to the Network control panel.

2. From the Installed Network Software list box, select TCP/IP Protocol, and click

Configure.

3. Make sure the Enable Automatic DHCP Configuration is deselected, and enter the

following:

IP Address: 150.100.100.20

Subnet Mask: 255.255.0.0

4. Make sure the Default Gateway and the Primary / Secondary WINS Server entries are

blank.

5. Click DNS, and ensure everything is blank except for the Host Name, which contains the

name of your Windows NT machine. Click OK.

38

Page 53: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

6. Click Advanced, and ensure that Enable LMHOSTS Lookup is selected. Everything else

should be either blank or deselected. Click OK.

7. Close the Network control panel, and restart Windows NT.

8. Find the file name in the \Winnt\System32\Drivers directory. Make a copy and name it

Hosts, leaving it in the same directory.

9. Edit the Hosts file, and add the following line at the bottom:

150.100.100.10 as the IP Address.

10. From the File menu, choose Save. You are now ready to test the connection.

Configuring TCP/IP on Windows 95

1. From the Network control panel, select TCP/IP, and click Properties.

2. Go to WINS Configuration, and select Disable WINS resolution.

3. Go to the IP Address, select Specify an IP Address, and enter:

IP Address: 150.100.100.20

Subnet Mask: 255.255.0.0

4. Go to Gateway, and make sure it is empty.

5. Go to DNS configuration, and select Disable DNS.

6. Click OK, and close out the Network control panel. Restart Windows 95.

7. In the main Windows directory, usually C:\Windows, find the file name. Copy the file,

and Rename it. Place the file in the main Windows directory.

8. Edit the Hosts file, and add the following line at the bottom:

150.100.100.10 as its IP address.

9. From the File menu, choose Save. You are now ready to test the connection.

NOTE: If the MSN login dialog box appears when you are connecting, click Cancel to continue. To

disable this behavior, run the Internet applet from the control panel and clear the UseAutoDial option

in the AutoDial Tab.

39

Page 54: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

Testing the TCP/IP Connection

To test the network connection, use the Ping command line utility on the PC. Open an MS..

DOS/Command window and type one of the following:

C:\>ping Computer Name or IP address

-or

C:\>ping 150.100.100.10

Replace 150.100.100.10 and Computer name with whatever you set in the Hosts file. Using my

Computer name causes the TCP/IP service to look up the name in the Hosts file to resolve it to

an IP address. The expected output from Ping looks like the following:

C:\>ping 150.100.100.10

Pinging 150.100.100.10 with 32 bytes of data:

Reply from 150.100.100.10: bytes32 timel0ms TTL=254

Reply from 150.100.100.10: bytes32 time<lOms TTL=254

Reply from 150.100.100.10: bytes32 time<lOms TTL=254

Reply from 150.100.100.10: bytes~32 time<lOms TTL=254

If you receive a Bad IP address error, you need to check your Hosts file entry to ensure that the IP

address and name match what is set on the Macintosh.

If you receive a Request timed out error, you need to check the physical network connection and

ensure that the IP address in the Hosts file matches what is set on the Macintosh.

TWO:

Network Setup (Peer-To-Peer)

Wiring the Network

1. Shut down all computers and the router (if necessary)

2. Turn on one computer you will use to setup the router

3. You router should have come equipped with a piece of paper or a brochure ofjust a few

pages that lists the instructions to follow to setup the router. One of the early instructions

may ask you to insert the CD that came with the router, in the CD drive and wait for the

instructions. Follow these instructions faithfully

40

Page 55: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

4. After setting up and configuring the router, turn it off and turn off the computer you used to

set it up (this step is optional)

5. Connect each of the other computers to the router using an RJ-45 cable for each connection:

-I

Figure 14: Wiring the Network

If you had turned off some of the machines, first turn on the router. Then, after a few seconds, turn on

the computers. If you receive some messages indicating that a network was detected, fine. If not, don’t

worry, we will check the network later.

THREE

Connecting and setting up a Wireless Network - LAN

1. Start the computer you will use to setup the router (you should turn the others off):

Figure 14: Computer to be connected on the Network,

2. Most, if not all, wireless routers come with very easy to follow instructions. Most of them

usually ask you to first insert the CD that accompanies the router, that is, before physically

installing the router. Consult the documentation (usually just one or a few pieces of paper or a

small brochure) and faithfully follow its CD’s instructions. At one time, the instructions would

indicate to you when to connect the computer and the wireless router. To do this, you will use a

41

Page 56: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

cable (usually supplied to you) to connect one end to the computer and another end to the router:

3. Because the steps to perform depend on the router (or the manufacturer), we will let you perform

as described by their documentation

4. After installing and setting up the wireless router, turn it off and turn the computer off

5. If you didn’t yet, install the wireless network card(s) on the other computer(s).

For any computer that doesn’t have a wireless network card but has a wired network card,

connect it to a port of the wireless router using an RJ-45 cable. The computers that have a

network card will not need a physical connection to the wireless router:

6. Turn on the router. After a few seconds, turn on the computers one by one.

You may not need to check whether they work at this time or not.

Figure 15: Computer and Wireless Router connection

42

Page 57: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

Network Connections

Network Setup on First Computer

After establishing the physical or wireless connections of the computers, you can electronically

connect them, test or check that they can “seet’ each other. Microsoft Windows XP makes networking

ridiculously easy. In fact, when writing these lessons, after physically connecting the computers to the

router and turning everything on, the whole network had been built and there was no particularly

necessary configuration to perform: everything was ready.

To “virtually” connect the network, Microsoft Windows XP provides the Network Setup Wizard,

which is a series of dialog boxes that can guide you in this process. To start this wizard:

FOUR

Wirelessly Connecting a Network

1. On one of the computers that runs either Microsoft Windows XP, click Start, Programs,

Accessories, Communications, Network Setup Wizard.

2. The first page of the wizard will present a message and a bulleted list but nothing to choose:

Figure. 16: Network Setup Wizard to run the network.

3. Read the text and click Next

4. The second page of the wizard also displays a message:

Welcome to the Network SetupWizard

Thre wizard will help you set up this computer to run on yournetwork. With a network you can:

• Share an Internet connection• Set up Windows Fitawail

Share files and foldersShare a printer

To continua. ctck Neat.

Ne~J [ Cancel J

43

Page 58: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

Betore you continue...

Betore you continue, review theioheckttstlog~~j,mpF~

Then, complete the toltowing steps:

• Instat the network cards, modems, and cabtes,• Turn on alt computers, printers, end ersternet modems.• Connect to the tnternei

When you click Neot, the wizard wilt search tore shored Internet connection on your network

[ <Bock ir Ne~ >j [~~et

Figure. 17: Network Setup Wizard to checklist for creating a network.

5. Read the lines of text and click Next

6. In the third page of the wizard, if you have already created a connection to the Internet, you

can accept the first radio button. If you haven’t gotten or configured a connection to the

Internet, as is the case for the computers in our series of lessons so far, click the second radio

button:

Do you want to use the shated connection?

The wizard tound a shored tnternet connection on the computer “Unknown tnternet ConrrectronSharing device’

Do you went to use the eeioring shared connection tor this computer’s Internet access?

()‘r’es. use the eeisting shored connection br this computer’s tnternet access Irecommendedl

® No. tet me choose another way to connect to the Internet

[ <Back j~ Nent> j Cancel J

Figure. 18: Network Setup Wizard to confirm use of shared connection.

7. Click Next

44

Page 59: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

8. In the fourth page of the wizard, as we are not dealing with the Internet at this time, click the

Other radio button

Select a connection method.

Select the statement that best descebes this computer:

QThis computer connects directly to the lnternei The other computers on my network connectto the Internet through this coreputer.View en eeems1e.

0 This computer connects to the Internet through a residential gateway or through anothercomputer on my network.View art eoemple.

ØOther

Learn more about home or sm~t ottice network corrrrguronons.

<Sack Neat> J [ Cancel

Figure, 19: Network Setup Wizard to select a network connection method

9. Click Next

10. In the fifth page of the wizard, read the options of the three radio buttons. Because we are not

setting up, or concerned with, the Internet right now, click the This Computer Belongs To A

Network That That Does Not Have An Internet Connection radio button

Other Internet connection methods~.

Seteot the statement that best describes this computer:

O This computer connects to the tnternet directly or through a network hub. Other computerson my network also connect to the tnternet directly or through a hub.View an eeamote.

()This computer connects direotty to the Internet. t do not have a network yet.View en eeamcle.

® This computer belongs to a network that does not have en Internet connection.Vi~m an erramote.

Learn more about horn~ or small ottice network contiouralions.

<Back Neet> J [ Can~~]

Figure. 20: Network Setup Wizard for other Internet Connection methods.

11. Click Next

45

Page 60: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

12. In the sixth page of the wizard, in the Computer Description text box, type a short

description such as the role or the position of the computer. There are no real rules to follow

for this text, only suggestions. For example, because this description will show in Windows

Explorer or other windows, don’t make it too long. You can also include any characters you

want

13. In the Computer Name text box, type a name for the computer. For this name, there are

rules you must follow:

Give this computer a description and name.I~I

Donnetion From Seat ot LifeExamples: Famify Room Computer or Monicas Computer

~

Figure. 21: Network Setup Wizard to describe and name the computer.

14. After entering the description and the name of the computer, click Next

15. In its seventh page, the wizard prompts you to enter the name of your network. It suggests

MSHOME. You can accept this name or change it:

Computer description:

Computer name:

Eeamplee FAMILY or MONICA

The current computer names CENTRAL.

Some Internet Service Providers (ISPs) require that you use a specific computer name. This isoften true for computers with a cable modem.

If this is the case for your computer, do not change the computer name provided by your ISP.

Learn reore about computer names and descriptions.

[ <Sack 1L~~2~1 r Cancel

46

Page 61: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

Name your network.

Name your network by specityirrg a workgroup name below, At computers on your networkshould have the same workgroup name,

Workgroup name: FUNCTIONX

Examples: HOME or OFFICE

<Back Next> j F~~cel I

Figure. 22: Network Setup Wizard for naming the network.

16. After typing a name for the network (you can still change the name later), click Next

17. In the eighth page of the wizard, read the text:

File and printer sharing

~ Turning on tile and printer sharing makes the Shared Documents folder available toeveryone on your network. It also gives everyone access to a shored prerter rf one oavailable.

What do you want to do?

0 Turn on tile and printer sharingWindows Fbewat wilt be configured to allow file and printer sharing en your network

QTurn ott tile and printer sharingWindows Firewall wilt block tile and printer sharing on your network. It you currently haveshared tiles or printers, they will no longer be shared

[i~k ~j[ Next> ] _________

Figure. 23: Network Setup Wizard for Resource sharing

For our project, accept the Turn On File And Printer Sharing radio button and click Next

47

Page 62: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

18. In the ninth page of the wizard, read the text:

Ready to apply network sellingo...

The wixard wilt apply the tollowing settings. This process may take a tew mi-rules to completeand cannot be interrupted.

SettplgcInternet connectbn settings:

Internet connectinre Locat Area Connection

Network settings:

Computer description: Donnation From Seat ot kiteComputer name: CENTRALWorkgroup name: FUNCTIONX

To apply these settings, click Next.

[~<Sack J[ Next> j [ Carrcet

Figure. 24: Network Setup Wizard to indicate whether the computer is ready to network settings.

Click Next

19. Afier clicking Next, the wizard will start creating the files used to setup a network, based

on your previous selections:

Please wail...

Please wait while the wizard contigures this computer br home or smut ottice networking. Tinsprocess may take a low minutes.

Figure. 25: Network Setup Wizard for configuring the computer for home or small office networking.

When it has created the files, it would present a new page of the wizard.

In the tenth page of the wizard, read the text. Normally, you should create a setup disk:

48

Page 63: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

You~re almoct done...

You need to run the Network Setup Wizard once on each ot the computers en yournetwork. To run the wizard on computers that are not running Windows XP, you can usethe Windows XP Cl) or a Network Setup Disk.

What do you want to do?

C) Create a Network Setup Disk

C) Use the Network Setup Disk I already have

C) Use my WindowsXP CD

O Just tinish the wizard; I doM need to run the wizard on other computers

T Nest> j

Figure. 26: Network Setup Wizard to run the network setup wizard.

To create a setup disk, you will need either a floppy drive or a flash drive (also called a jump

drive) (or any portable drive that the computer allows).

For our lessons and if your computer has a 3.5 floppy drive, accept the Create A Network Setup

Disk radio button. Click Next

20. In the eleventh page of the wizard, you may be presented with the only portable medium

available. If your computer found more than one medium, such as a floppy drive and a flash

drive, you would be presented with the option to choose which one you would use. Here is an

example:

Select a disk drive...

Select the drive you want to use to create a Network Setup Dirk:

Removable disk drives;

Removable 3NFteppy(A;Ji. Dirk(E;l

Figure. 27: Network Setup Wizard for selecting the drive to use in creating a network setup drive.

If necessary, select the drive you would use and click Next. If you select the floppy drive,

make sure you insert a floppy disk in the drive. The following page would ask you whether

49

Page 64: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

you want to format it, which you should do:

Cepacey:

Insert the disk you want to use. F~e system

Atocatbn unit Size

Insert a disk the into the totowiny disk drive. and the

31f floppy (A:) Vokieie label

It you want to tormel the disk, dick Format Disk.

rFormal Di~ Format cçoons

cE~~fl

L ~xet

Figure. 28: Network Setup Wizard showing the drive selected.

click Next

21. After clicking Next, the wizard would copy the necessary files in the medium (flash drive or

floppy). After copying the files, it would give you instructions on what to do next:

To run the wizard with the Network Setup Dick...

Complete the wizard and rectart this computer. Then, use the Network Setup Dick to runthe Network Setup Wizard once on each di the other computers on your network.

Here’s how:

1. Insert the Network Setup Dick into the neet computer you want to network.2. Open My Computer and then open the Network Setup Disk.3. Doublecick “netsetup.”

<Sack IL Ned>

Figure. 29: Network Setup Wizard for running the wizard with the network setup disk.

After reading the instructions, remove the disk and click Next

50

Page 65: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

22. In the last page, read the text:

Completing the Network SetupWizard

You hove successftrlly set up this computer br home or smelloffice networking.

For help with home or small office networking, see thefollowing topics in Help and Support Center:

• ~~tt~g 1e1~ledDocumenbfolder

To see other computers on your network, click Start. end thenclick My Network Places.

To close thin r-r~sL-d. cF-k Frith

--~---~

Figure. 30: Network Setup Wizard for completing the network setup wizard.

Click Finish

23. Afier clicking Finish, a message box will ask you whether you want to restart the computer:

~tttTh ~bJijp::!~;rstiwt.

~ ‘lou reust I estott ~our computer beforo the riert sottirris ill bim effect.

- Do ‘cu rt.ent to restart your corrrputer nor-?

No

Figure. 31: Network Setup Wizard showing the user what to do for the new setup to take effect.

Click Yes

FIVE:

Network Setup on Additional Computers

~fter setting up the network on one computer, went on to the next computer.

~o setup the network on the other computer(s) that will be part of your network:

ractical Learning: Connecting Additional Computers

51

Page 66: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

1. On the next computer, click Start -> Network Places

2. Under Network Tasks, click Set Up A Home Or Office Network

3. In the first page of the wizard, read the text and click Next

Figure. 32: Network Setup Wizard showing how to run the computer on this wizard.

In the second page of the wizard, read the text and click Next

Figure. 33: Network Setup Wizard for Reviewing the checklist for creating the network.

Welcome to the Network SetupWizard

Thrs wizard will help you set up this computer to uo on yournetwork. Witha network you can:

• Share an Internet cpnnectionSet up Whidows Fkewall

• Shore tiles and tolders• Shareaprinter

To continue. ctick Next.

~ [Next> f Cancel

Ueiore you continue...

BeIme you contrnue reerew the hhe~.kst or prpat op rpytwyr~

Ttren, complete the tolloxukig steps:

Install the network cord modems and nobleTurn on alt computers prerters and external modemsConned to the Internet

When you dtck Next, the wizard wS search tm a shared Internet connection on your network

~ackj[j~ext> j Cerrcet

52

Page 67: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

In the third page of the wizard, accept the first radio button and click Next

Do you want to use the shared connection?

The wizard found a shared Internet connect ion on the comput er “Unknown Internet ConnectionSIrarinp device.

Do you want to use the eoisting shared connection for this computers Internet access?

()Yes, use the eoistiny shared connection for this computers Internet access (recommended)

Q No, let me choose another way to connect to the Internet

<Sack II Neo~J F Cance~J

Figure. 34: Network Setup Wizard for other shared connection.

In the fourth page of the wizard, in the Computer Description text box, type a short

description that can define or indicate what this computer is used for

4. In the Computer Name text box, type a name that will distinguish this computer in the

network. One of the rules you must observe is that the name must be unique in the

network. This means that you cannot use the same name you have already given to

another computer in the same network:

Give this computer a description and name,

Computer description: Common Station

Eoamples: Family Room Computer or Monica’s Coreputer

Computer neree: CMNSTATION

Exemples: F~NtLY or MONICA

The curtent computer name is SUZANNE.

Learn more about comouter names and descrictions.

[ <8ack j[ Neot >~,J Cancel

53

Page 68: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

Figure. 35: Network Setup Wizard for naming and describing computers in case of shared connection.

After entering the description and the name of the computer, click Next

In the fifth page of the wizard, it is somewhat important (but it is not a requirement) that you

enter the same name you specified for the network of the first computer:

Name your network.

Name your network by spec~ying a workgroup name bebw. Ag computers on your networkshouki have the came workgroup name.

Workgroup name FIJNCTtONX —~

Eoamc~es: HOME or OFFtCE

r <Back j[ Nerrt>j [ Cancet

Figure. 36: Network Setup Wizard for naming the network to specify the workgroup.

If you specify a different name, you will end up with various networks, which can be annoying

or confusing but would work fine

5. After entering the name of the network, click Next

6. The wizard will try to check if that name was already specified for another computer of

the same network. If it finds that another computer is using that name, then it would

allow this computer to 11join” the network. If it finds out that no other computer is using

that name, then it would create it.

54

Page 69: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

After checking the name, the wizard will present you with a summary page:

Ready to apply network setting:...Rs,r~ I

The wizard will apply the tollowing settings. This pieces: may take a tow minutes to completeand cannot be interrupted.

teternet connection setting::

Connecting via CS through: Unknown Internet Corrnecticn Sharingdevice

Network settings:

Computer descdption: Common StaticsComputer name: CtdNSTATION

To apply these settings, click Nest.

f <Back j[~~~> ,,j Cancel

Figure. 37: Network Setup Wizard for applying network settings.After reading it, click Next

7. The wizard will then create the necessary files to make this computer part of the network.

After creating the files, it would present a page giving you to option to create a setup

disk. This time, decline by clicking the last radio button

8. Click Next

To run the wizard with the Network Setup Disk...

Complete the wtzard and restart this computer Then u e the Network Setup Drsk to runthe Network Setup Wizard once on each ot the other computers on your network.

Here: how:

1. Insert the Network Setup Disk into the fleet computer you want to network.2. Open My Computer and than open the Network Setup Disk,3, Doubtedick netsetup.”

<Back Next> ]

Figure. 38: Network Setup Wizard to run the network setup disk

55

Page 70: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

9. Click Finish

To dose ho dzasd. dck Fdsh.

Figure. 39: Network Setup Wizard completing the setup wizard in case of shared

10. You will be asked whether you want to restart the computer or not. Click Yes

As an alternative, and as instructed when creating the setup disk:

1. On the other computer, put the setup disk in the drive

2. Using Windows Explorer, My Computer or another file utility or viewer, access the drive

that contains the disk you created and double-click the file it contains

3. Follow the instructions on the screen. They are pretty much self-explanatory

4. When asked to restart the computer, do so

SIX:

Viewing Network Connections

My Network Places

Once you have built a computer network, from time to time, you will need to check what

computers are available and/or what files or folders have been shared. To assist you with this,

Microsoft Windows XP provides a window named My Network Places.

To view the available connected computers:

Practical Learning: Viewing the Connected Computers

Completing the Network SetupWizard

You hove succeso~dT set up No computer for hymn or orrryttoffice networking.

For he~ rich home m cord office nnfwmkhg. see thefotowksg typico km Hetp end Support Centec

• Using the Shored Documents foktorShy

To see other computers cm your network, dick Stud, end thendick My Network Places.

<If k Fork

56

Page 71: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

1. On one of the computers, click Start -> My Network Places.

If you don’t see that option in the right column of the Start menu, depending of your

configuration, click Start -> Settings -> Network Connections. Then, under Other Places,

click My Network Places.

As an alternative, you can click Start -> Control Panel or Start -> Settings -> Control

Panel. Under Other Places, click My Network Places.

2. Under Network Tasks, click View Workgroup Computers

F~e £ Gew Fav es Teds Hdp

B~ok So ch Fdd ro

‘ FuncUonx Go

D orn Ted d ISo Coreoon S~oTon (Cnssstotion)

- - 1 F.~ £005 10,bde WokGotioe

01111 £1.

-i

Octodo

runctirnix

Figure. 40: Shows which computers are available and/or which files or folders have been shared

SEVEN:

Setting up a Win9x Local Area Network

Hardware You Will Need

1. At least two computers

2. Network adapters for each computer. The cost should be approximately $20-$50.

3 .If you have a 1 OBase-T adapters, and only two computers, you can directly connect one

computer to the other. You will need to modify the cable by connecting connect pins: l--3, 2--6,

3--i, 6--2, pins 4,5,7 and 8 are unused, but are normally connected straight through.

57

Page 72: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

If you have more than two computers, you will need a 1 OBase-T hub or router to connect them. The

cost will be approximately $50-$ 100.

EIGHT:

Adding Your Network Adapter

1. Adding Your Network Adapter

(If it is not there already

2. Click on Add New Hardware

3. Click the Next button

4. You can either have Windows9x search for the adapter by selecting YES

or select NO to manually enter the adapter

5. Click the Next button

6. If you selected NO, you will need to manually select an adapter

Figure. 41: Showing how to add a new hardware using the wizard

58

Page 73: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

Select the iype ci hardware you want to install,

ftardware typec

3co~aoM controllers1 Display adapters

C~ Floppy disk controllersHard disk controllers

~Keyboard~>Memory Technoto~y Drivers IMIDsI~Modem~)Mouse

~) Multiiuncterr adapters

Bob CerelWs Windows Page <gack l~~>

Figure. 42: Add New hardware Wizard to select the type of hardware to install.

~ Click the Network adapters that matches your hardware, and then ctck OK.~t~ll1j~ llyou don’t know whrch modelyou have, click OKJ1 you have an installation

disk for his device, click Have Disk,

Manulacturerc Mqdels

colon —j 3CornEtherbnkll orlITPli8 orlS-brk)(3C503)alvanced Micro Devices (t 3Com Etherlink III Flus’Master PCI Ethernet AdaptsrlliedTetasyn 3Com EtharLinklil EISA t3CtiTSlAaResearch ,.{ 3CamEtherLinkllIElSA(3Cti79•TP) ‘l

j~f4 I ~

HaveDr&. j

Cab Cerellis Windows Page OK J Cancel

Figure. 43: Showing the network adapters that match with the hardware selected.

Reboot if requested

NINE:

Adding the TCP/IP Protocol Stack

(If it is not there already)

Given how much the Internet is being

1. Open the Control Panel

2. Double-click on the Network icon

3. From your network adapter detection in previous table, you should see something like the

Client for Microsoft Networks, Client for Netware, your Network Adapter, IPX and

NetBEUI already installed.

4. There may or may not be IPX and NetBEUI. Just depends on what changes have been made.

5. If you want to add TCP/IP, click on the Add button.

59

Page 74: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

6. Click on Protocol

7. Click on Microsoft

8. Click on TCP/IP

9. Then delete IPX and NetBEUI

10. Other than the adapter(s), it should look pretty much like the following screenshot.

l1-~xj

I~oI~i.~e~jor1 1 do ihcotcr Ac~De~.; CoiFroI

TIfo~)Inoootr,~:k nornpc ,en.:. ~re nct~IIed:

~ Den! For F i:cro.~oft 2tr:orieWSMC EtII~rLdrd D.telF LilFia (i~21G. i~21~C, ~21~T)4 TCPIP

Primary Fle~ “on. logrni

Li ent For ii ~,ro: oft ttci.c 1 .1]

Eie and F tnt Sh.~nnrig

Description

- Bob Cerell is kVlridon.c3 Paije

~,rceI

Figure. 43: Adding the FCP/IP Protocol Stack

TEN:

Configuring the TCP/IP Protocol

IP Address

o Click on TCP/IP

o Select IP Address:

o If you have a DHCP serviced subnet, select Obtain an IP Address Automatically

If not, enter your IP address, Subnet Mask, DNS and Gateway IP address information.

60

Page 75: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

Adv~c~d ~ OHS~G~w~ Scuc&i~n IPMd~

MIP add~e~ c~ ~ ~L~f~C*~~~ kd~e’~ no~ a~o~l~* ~n 5’ ~d&esses.~a~k

yow n~w ko owoHa~c~ f~ oo ow~ thon typo ~kthOW0C0b~~

r Qbi~ioon 5’

—P ~ec~Podthe~$~—

IPMci~~~~ j~4~~6.OOD

StHa~o

Bob Cerefli~ Wbidows Page [~~1 ~!~~LJ

Fig. 44: configuring the Tcp/Ip Protocol

ELEVEN:

Configuring the Network

1. Under Control Panel / Network / Identification make sure each Computer has a unique name.

2. Make sure that the Workgroup name is the same for all computers

3. Do not have any spaces in either the Computer or Workgroup names. Keep them simple.

4. Select different IP address for each computer. Use the same subnet mask. If you are

connecting to the Internet, enter in the Gateway and DNS IP addresses

5. Click on the File and Print Sharing button and check off whether you want share Files or

Printers

TWELVE:

Server Installation Necessary Hardware and Software

Server Machines

In Lesson 1, we saw that a server was another computer that can participate in a client/server network,

as opposed to a peer-to-peer network. A server is used to hold resources and items that other

computers would need:

61

Page 76: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

Fig. 45: Server Installation

A server is primarily a regular computer. For a small network, identify the computer that you will use

as the server. You can use an existing computer or purchase a new one. Before starting to acquire the

necessary hardware for your network, when planning a server, you may fit one or the following

descriptions:

• I will purchase a server from the Internet: If you haven’t bought a server but are planning

to purchase a computer for it,.

o I already have the/a computer and it has an operating system: If you plan to use one of

your (existing) computers as the server, check its hardware and make sure it meets the

following requirements:

o A processor with 133-MHz or higher speed; 550-MHz recommended; up to eight processors

supported on one server

o 128 MB of RAM minimum required; 256 MB or more recommended; 32 GB

maximum

o 1.25 to 2 GB of available hard disk space

o CD-ROM or DVD-ROM drive

o VGA or hardware that supports console redirection required; Super VGA supporting

800 x 600 or higher-resolution monitor recommended

If necessary, you can purchase additional items to meet these requirements.

If you have a computer that doesn’t have any operating system and you are

planning to use it as the server of your network, make sure it meets the

62

Page 77: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

following requirements:

A processor with 133-MHz or higher speed; 550-MHz recommended; up to

eight processors supported on one server

128 MB of RAM minimum required; 256 MB or more recommended; 32 GB

maximum

1.25 to 2 GB of available hard disk space

CD-ROM or DVD-ROM drive

VGA or hardware that supports console redirection required; Super VGA

supporting 800 x 600 or higher-resolution monitor recommended

Monitor

You will also need a monitor attached to the server. If you will not work closely with the server, that

is, if you will not “watchtt the server all day long, the type of monitor you connect to it may not

be important.

Server Operating System

As its name implies, the role of a server is to serve. To perform this job, it must be loaded with a

special operating system. On this site, we cover a network that deals with a Microsoft-based

network. The company publishes a server operating system named Microsoft Windows Server

2003.

Before acquiring the operating system, a brand new computer, to use as a server, can be

purchased from a manufacturer on the Internet.. When choosing the machine, make sure it meets

the following requirements:

~ 133-MHz processor required; 550-MHz recommended; up to eight processors supported on

one server

128 MB of RAM minimum required; 256 MB or more recommended; 32 GB maximum

1.25 to 2 GB of available hard disk space

CD-ROM or DVD-ROM drive

63

Page 78: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

VGA or hardware that supports console redirection required; Super VGA supporting 800

x 600 or higher-resolution monitor recommended

o Besides these requirements, if your budget permits, change or add the following items:

o Tape Backup and Tape Software: This can help to perform regular backup of files.

o Floppy Drive: This drive cannot be completely ruled out yet. Get it just in case (you

never know).

o DVD Drive: The web site or company may suggest a CD drive. In most cases this can be

enough. Still, try to get a DVD drive instead of a simple CD drive

o Second Network Card: This can be valuable if you are building a small network and

plan to give access to your computers to the Internet. This second can help you with

Internet connection and security

o Extended Warranty: No matter what its price and what else, get it (even if you think

you will never need it).

Installations and Connections

New Installation

After acquiring a computer, you may have one that is ready but doesn’t have an operating. You may

have a computer with an operating system but that OS cannot be upgraded into Microsoft Windows

Server 2003. In one of these cases, you would need to perform a new installation.

THIRTEEN:

Installing the Server Operating System

1. If the computer doesn’t have an operating system but it meets all the requirements and it

can boot from the CD, start the computer. You may receive a message stating operating

system missing or something like that. Open the CD drive, put the CD in the drive, and

close it. Restart the computer. You should receive a message stating Press Any Key To

Boot From CD (or something like that)

64

Page 79: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

2. Press any key to start the installation.

If your computer already has an operating system, start it. Open the CD drive, put the CD

in it, and close its door. If the operating system cannot be upgraded, a message box and

display and let you know. Accept to perform a new installation and click Next

3. When the installation starts, it will display a blue screen with Windows Setup on top and

some messages on the status bar (bottom of screen).

After a while, the screen will change and display a new title based on the version of

operating system you are installing. For example, if you are installing Microsoft

Windows Server 2003 Enterprise Edition, the title would display

Windows Server 2003, Enterprise Edition Setup

The body of the screen will present options to you. To continue the installation, press

Enter

4. The next screen will show the Windows Licensing Agreement. Read it. Since it is long,

to navigate up and down, you can press Page Up or Page Down. After reading it, if you

accept the terms of the license, press F8. If you don’t like what it says, press ESC and

stop the installation.

5. The next screen asks you to select the partition you want to use to install the operating

system

o If you have only one partition and it looks small, such as less than 8 GB, simply select it

o If you have only one partition and that, regardless of its size, you want to use it wholly to

install the OS, select it

o If you have only one partition but it is large and you want to create various partitions,

first make sure it is selected it. Then, press C to partition it. The next screen would ask

how much space you want to use for the new partition. By default, it will propose the

total space for it. To reduce it, first press Backspace a few times to delete the numbers,

then type the desired number of megabytes, and press Enter. Press the down arrow key to

select the Unpartitioned Space option and press C. Continue in the same way until you

have created the desired partitions

If you have many partitions already, to specify which one will be used to hold the operating system,

65

Page 80: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

use the up and down arrow keys to select it

6. After selecting the partition you will use, press Enter to install the OS in it

7. The next screen will ask you to format the selected partition and specify the type of file

system you want to use. Select the Format The Partition Using The NTFS File System

option and press Enter

8. In the next screen, the partition will get formatted. This may take a few minutes.

Once the formatting is over, the installation will continue by copying files.

After a while, a wizard, titled Windows Setup, will come up. Its first page presents you

with two options.

The first choice consists of changing the Regional and Language Options. The default

options will be selected depending on your version of the CD. For example, if you bought

the OS intended for a US use, the US English would be selected. If you want to change

the language, click the Customize button. Another dialog box, titled Regional and

Language Options, would come up with English (United States) selected. You can then

click the arrow of its combo box to change the language. After making your selection,

you can click OK. If you don’t intend to change anything, you can click Cancel.

The second option consists of making changes to the way the keyboard will interpret text.

Once again, if you are installing the OS intended for a US audience, the US English is

selected by default. If you want to change it, click Details. This would open the Text

Services and Input Languages dialog box. You can change the language by clicking the

arrow of the combo box. After making the change, you can click OK. To ignore any

change, you can click Cancel or press Esc.

After dealing with the Windows Setup dialog box, click Next

9. The next screen requests that you enter your name or the name of the primary person who

will be using the computer. You must type a name other than Administrator or Guest

10. The other text box, Organization, expects the name of the company. Make sure that you

provide this information

11. After entering the name and the organization, click Next or press Enter

12. The next page of the wizard requests the Product Key, which you must enter

13. After typing the product key, click Next

66

Page 81: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

14. The next page of the wizard shows the options available for licensing. You should accept

the Per Server option and click Next

15. The next page of the wizard, expects you to type the computer name. It also suggests a

default, based on the company name you would have entered previously as the

Organization. You can accept the suggested name, which you can still change later on, or

you can type a new name

16. We haven’t mentioned “user accounts” yet but during installation, a user object is created

and it is named Administrator. When setting up the operating system, you must give a

password to this account. Obviously the password should not be too easy. Fortunately

you can give it temporary password and change it later on as your network, skills, and

concerned improve. You must enter the password in the Administrator Password text box

and type it again in the Confirm Password text box. Make sure you remember this

password because you will need it just after the installation

17. After specifying the password, click Next

18. The next page of the wizard allows you to set the date, the time, and the time zone that

the server will use. Most of the time, the computer finds out the right date and the right

time and it selects them. On the other hand, you should adjust the time zone if the default

is not the right one. This page of the wizard also allows you the let the computer adjust its

clock when daylight time is switched during the year. The option to change this is

selected by default. If you don’t want the computer to take care of that, you can remove

the check mark on the check box.

After changing the options or making sure that they are right, click Next

19. After clicking next, the wizard is closed and the installation continues copying files.

After a few minutes, a new wizard, titled Windows Setup, comes up. This time, it will

ask you to accept or change the network settings of the server. The first option allows you

to let the installation take care of networking details. The second option allows you to

manually set them.

Because we will review the details of this wizard in later lessons, accept the Typical

Settings option and click Next

20. The next page of the wizard allows you to actually make this computer into a server.

Accept the first option not to “join” a domain.

67

Page 82: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

The wizard suggests WORKGROUP as the name of the “domain”. If you don’t like that

name, change it. If you can’t come up with a domain, you can use the one we will use.

For our lessons, our domain will be called Neptune. In this case, in the top text box, type

Neptune

21. After entering the name of the domain, click Next

22. After clicking Next, the wizard will start copying the files, again.

Once the installation has finished copying the files, the computer will start. When the

computer comes back, you will be asked to log in.

Press Ctrl + Alt + Delete to log in

23. Accept the User Name as Administrator.

In the Password text box, type the password you entered during the installation

24. Click OK.If you see a window titled Manage Your Server, congratulations: you have finishedinstalled Microsoft Windows Server 2003

The Role of a Server

After you have installed Microsoft Windows Server 2003 as we did above, it is primarily a regular

computer. To use it as a server, you must properly transform. Fortunately, this is an easy process.

When the computer comes up and displays the desktop, the first window you see, titled Manage

Your Server, allows you define the “role” of the computer. A convenient link is available in the

middle of the window

Fig. 46: Managing Your Server

~a Adding Roles to Your Server~4l M ~*.t bsrnf....kt.*..ft.

q, Managieg Your Server Roles~•

VI—,

I—,——I—

68

Page 83: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

Practical Learning: Configuring Active Directory

Read the text in the window and click Add Or Remove A Role

2. The first page of the wizard presents a summary of the actions you must have taken

before continuing:

Pr,rl.orin.ry Siei,oY,. ., ca’c._’e that pan ccetoloty cc’.;_ C y ,c’ r En ca — * - to j -cpa cc

a’ ‘‘oc’ ~ c — ‘t’fr3c’ -c’tc.r’cc

O Att’cha .:~tarycoUOO.

a IF y~-’o o ace tEas oerve~for tolerant ocanecoalty, coornect to the Iraernnt nnnr.

o IcOn Oil aS perdhnrolo, roth an p00tern and enternat drinen.

o lone poor Woldawo Srrver 2003 SnOop CO avnFohl~, or koonon yarn network Eddat0000, pnth.

When porn ctnkrpeot, the odeard nod nenech For nnta,orkcc,nnen000n.

Cawet~ -~

Fig. 47: Steps taken to configure a server

Read it and click Next

3. A dialog box will display briefly and then display a list of the roles you can assign to the

server.

In the list, click Domain Controller (Active Directory)

Server RoleYnncanroetnprt[o “n~ top_” core roe ‘.“rc’~OIFyO. tton_J _ett’ one

‘‘Intl ,rw_’, pa c_or otEno net a.

Select a role. IF the rote ban not born added, you can oddS. IF S han already been added, poor canreoeove S. IF the role you want to add or remove in nnt holed, open Pole ci Pronoun Pr~cOnp,-~-..op~~çpp~pJeOd Domain C OS oTter (Anti

FOe server NO Dorec oryPrfrmtnervrr NoApptcotbo server (Its, ASP.FWT) No Ocanain cc,ntrotern store dreotney dataMad nerner (POPS, STRIP) No nod rnaeapo once layco procennen andTeeennol server No dinecicey renechon.‘ternote octets lylE server No~ Reed adrenal deavele cwtrelern

ONS server NoOIICP serner NoStreaccoog rondra stenee NoWINS corner No

Wear the Cc.rdiwae Ypor S~rnPr ho.

<T(ank 1500012.1 can~J Help

Fig 48: To set up a server to perform one or more specific roles,

69

Page 84: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

4. Click Next2iI

Somn~oey of ITOt000 r~r~Tow Tod ow&m the oooyoo hoee oeNoted. []~j

RTo the ToTe Ceco000y IrotoTotive Woord to vet op ft-or ecroco oe odevoow rororeter

To thorTe yore releeterno rib Bock Too000doOe ye t~-rop.et ttor rote okkt4eet.

<yek ~j c~J ~J

Fig 49: Summery of Selections

5. Click Next to Run The Active Directory Installation Wizard

6. Another wizard, titled Active Directory Installation Wizard, comes up. Read its text and

click Next

Welcome to the Active DirectoryInstallation WizardTier tozord help: you htrtoftAckve Obectoty tevvr000 voN:server. tookig the rervet o demote controfet.

die to the flit thee you hove htotofedthctt-oe Dbectcvy. totecoomoeeded thot peso bet rood the ovotoiew bs~y5yo

To ccrvtbrue etch Noel

c~etI

Fig 50: The Active Directory Installation Wizard

70

Page 85: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

7. In the second page of the wizard, read the text again, and click Next

Operating Spetem Compatibilitytrrçconed cecreity oetttene teWndowe Server 2003 effect older veretorno otWicrwo.

Detente cordrcbe iuretrrg Wordowo Server 200 nctemerrt encroty eetttego tiredrewire dee-do end ottrer cervern to noenreurocete nOb thece denote, controffero era moreeec000 wayThe toffonerry oldet versiorro mt Werdotve neroret oreet Itto cow teqroteeeeretr

• Wordovno000 WerdcmwcNT 4OSP3oreediee

Ity dnled. cooterutete mere-Org thoenvereronced Wordowe 0 trot ha thIn to kg ore oAtho domain cetetroffer rrrrrr*0 Windowe Server 2003 ret occeesdoectee r000ro000

For more frdcrmgticer. ceo Ccercmetbfftv Odin

~ I

Fig 51: The Active Directory Installation Wizard showing the operating system compatibility.

8. In the third page of the wizard, you must specify whether this is the first or an additional

domain controller. As this is the first, accept the first radio button and click Next

Domain Cootmollem TypeSpecity the rote yen went tin server to have.

(to you went tide oetvem to boceree a cidrereer ccettreffom lore now &nreme em oreode &rol doorole corrttolem lot ore edetfrrg ontO,?

tSetect tide eplisme to creete arrow chad &eeahe now dooeetetreo. or new tormentTide eomver nIl boctaree the tool donocrrre cenhcdom or the now throcot

C ~ddtorrrai dceeednooteltcIlnm for err erdetoeg detente

~ Ptocoodhtg Oh thin optisre miff doteffe at local occoroelo on tIde oorvet.

At ceptogredsic keys wIl bedelelod end shccdd be eopoetod beloro

Al ecom0eddaia~ ouch an EFS-emeoyptod fine or ar-meT ehould be decryptedbolero cooloetriro3 ct nIl be pomoeoreootis etocceedde

Oock [j~i> j ceecct_J

Fig 52: The Active Directory Installation Wizard showing the Domain controller type

71

Page 86: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

9. In the fourth page of the wizard, accept the first radio button and click Next

Create New DomainSelect which type ci domain to emote.

Cmeole anew

CP ~mr~s4

Select tide option if ttis is the itt domain is pow ctyathatmn or you want thre reamdomain to be completety independent ci pow current terest

C ~hlddomaisrmooeeoistinttdOmaintreeIt you want the new domeosto be a chid ot an ecistiny domain. select Fat option.For coomple. you coutd create a new domain namedheadquarteraeearrmytembOsetLeOm as a chOt domain of the domaineeompleJeicrOsett~corft

C Domdinbeein0000istintifr005tttyou daM went the new domain to be a ciotd cml en erdoting domain, select tineoption. TIde vet create a now domairettee that a separate 1mm any eontmny trees.

Fig 53: The Active Directory Installation Wizard for creating new domain.

In the fifth page, you must enter the name of the domain. The name should be followed by an

Internet domain name (.com, .net, .org, .us, etc). If you have a domain in mind, type it. If you

don’t have a domain in mind, for our lessons, type netconsulting.com

2t1

New Domain NameSpecify a name tot the new domarre.

Tpoe the ltd ONS name lot the new domainIfor coample. headquatteto.eeerripfe.ftdCt000ft.COrel

fuif DNS name lot new drxaahi

<gack Lt!~~J Cancel

Fig 54: The Active Directory Installation Wizard showing the full DNS name for new domain.

10. Click Next

In the next page of the wizard, a suggested NetBIOS name displays, intended for earlier

versions of Windows”:

72

Page 87: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

NeIBIOS Domain NameSpecty aNeiBtOS name tar the new domain

mists the name that users at carter versions ot Wedows tad use to idsntfy the nowolaraain Cick Nets to accept the name *rswn. 04 typO .s new name.

~eeaie NetBtPtS names [~NSULTIN~

Fig 55: The Active Directory Installation Wizard showing Domain NetBios Name for the new domain.

Accept it and click Next

11. The next page allows you to specify where the Active Directory information would be

stored:2~i

Database and Log FoldersSpecity the loldets to contain the Active Ditectory database and tog Nec

Fort best petfomrance and tecovetability, store the database and the log on separatehard disks,

Where do you want to store the Active Dkectottr database?

tiatebase folder:~INDOWS~TDS

Where do you want to store the Active Ditectoty tog?

j~og bidet: _________________

~ock F Nest>

Fig 56: The Active Directory Installation Wizard showing Active Directory information storage.

12. Accept the default and click Next

13. The next page specifies where the domain’s public files would be stored:

73

Page 88: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

Shared Sjrotem VolumeSpecify the folder to be ohared an the nyofere volume.

The SYSVOL feloferctcrev the nerverlu ccp~ ef the domuirn pubIc flee. The corOentoof the SYSYOL folder are rcpic.nted to aS dceeeirr noel retern do the doreen.

The SYSVDL folder mont be boated en err tdTFS ec&rere.

Enter a heroine for the SYSVOL teflon.

tolder bcatinroC.\WINOOWS\SYSVfJL Erorone

flack [~~> j Cancel

Fig 57: The Active Directory Installation Wizard showing shared system volume

Accept the default and click Next

14. Afier a few seconds, the next page allows you to install DNS.

Read the options:

x

DNS Re~jiohalion ObunanticoVerfy 055 cupped er moral OtiS an the computer

Diagnoetic Reaulto

The regerratinro dluganorb han been rue S tone

Sane of the OtiS nervern ned by tin cerepater renpornded orytlu the tdeeauteternal

Fer nero efenenrian. i~tndmey of epo to correct fin problem. ceo

DetaftaThe 50th query for hfnp_tcp do rnndcn netceeordtrng cern to fled the prienry

I have corrected the prefleern fleetore the OtiS dinpuectic tent agam

te<faf and cconfrynre the tINS never an the computer, and cot thin computer leonethis [tflf5 never an to entered ONS never.

I r’ftmprrect the confine toter by cent iparduj OtiS mun000fth (Odvanced)

<flock [ fleet> Cannot

Fig 58: The Active Directory Installation Wizard showing DNS Registration Diagnostics.

Accept the suggested second radio button and click Next

15. The next page allows you to set the default permissions:

74

Page 89: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

x

PermissionsSe Oct detaub per tissicns icr user end group obiocts

Some server programs. such esWirsdows NT Remote Access Serene, read irdorrearisrrstored on domain ccctsoters.

Pesoisrions compatible with pre’Wmndoars 2000 server oporaling syotemsSelect this option iyou run server programs err pro-Windows 2000 server operatingsystems or on Wrodows 2008 or Wrrsdows Servos 2003 operating systems that aremerobers ci pre.Wir-ioowo 2000 domains.

-~ Armyomooss users can read intooeatiorr on thir domain.

Ptiroisrinns compatible opty nih Windows 2000 or Windows Server 2003~;operatin~systemsSelect thin option iyou run server programs ode on Wirrdows 21)1)0 or WrsdovrrServer 2003 operating systems that are roembers otActive Directory domains. Ctetrerrthontioated mccc can road estormatrsrs on too dooroir-c

<hack Nes~~J Cancel

Fig 59: The Active Directory Installation Wizard showing permissions for user and group objects.

Accept the suggested second radio button and click Next

16. The next page prompts you to create a password used to start the server in ‘Restore

Mode”. Enter a password in both text boxes:

x

Directoep Seevirserm Roetore Meeter Administrator PasewardThis password is need when yor.r otart the computer in Directory Services RestoreMode. ______

Type and conuirro the password you wont to asrigrr to the Admiristmatot account usedwhon this servos i~ started in Directory Services Restore Mode.

The restore mode Administrator account is drffemoet bore the domain Aderinistratoraccoorru. The passwords for the accounts eight be ddterent. so be core to rememberboth

Restore tiodoPas.wmd: ~~ooneea

Contirm password 0*600*00

For more irstmrrration ahor.t Directory Services Rostcte Mode, see A’rE rsfr’j

<Bach Cancet

Fig 60: The Active Directory Installation Wizard to create a password used to start the server in “Restore Mode’..

Click Next

17. The next page displays a summary of your selections:

75

Page 90: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

x

SummaryReview and coefom the options you selected.

You chose toContigure this server as the lost domain controter in a new finest ot domain trees.

The new domain name is netconsuhirrgoom. This is also the name ot the newtmest.

The NetfitOS name ot the domain is NETCONSULTING

Database totder: C:WrIINDOWSflIJTDSLog ho letder. C~\WtNDOWS\NTOSSYSVOL totdoc C:\WINDCtWS\SYSVOL

The DNS service alt be installed and configured on this computer. This computerwit be contrgured to use this DNS server us its prelesred DNS server.

To change an option, click Each. To begin the oporatioa click Nook

<Rack Cancet

Fig 61: The Active Directory Installation Wizard displaying a summary of your selections.

Read the text and click Next

18. The wizard will start creating and configuring Active Directory:

The wizard in configuring Active Directory. This process can take severat minutes orconnidorabtr longer, depending on the options you hove selected.

Starting..

Fig 62: The Active Directory Installation Wizard for creating and configuring Active Directory

After a while, if you don’t have the Microsoft Windows Server 2003 CD in the drive, you may

be prompted to supply it:

76

Page 91: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

x

Configwirrçj CcrnrponenteSetup is rnakipa the cur ounce changes you requested, K%1

Fleeoewt ovhde Setup contigures the components, This may take

x

Please insert the Compact Disc tubelod W’nidoe,sServer 2003. Enterpise Edison CD-ROM tirtu your br=rrr’——

CD-ROM drive (lt:J and then ctck OK. Cancet

You can don dick OK it you want tiles to be copiedborn en alternate location, ouch as a ttoppy disk rn anetwrnk server,

~anc&

Fig 63: The Active Directory Installation Wizard configuring the components.

After a few seconds, you may receive a message box informing you that your computer has a

static IP address. Click OK

When the dialog box comes up, simply click OK

Another message box will come up. Click it and click OK. The wizard will continue copying

files.

Afier a few seconds, the last page of the wizard will display. Read its summary and click

Finish

x

Completing the Active DirectoryInstallation Wizard

Active Directory is now instetled on this computer tot thedornaic netconsubtucjcoca

Tics domain controter is assigned to the siteDetault-Fest-Site-Neme, Sites are managed with theActive Directory Sites and Services adrrnnrstratrve tool

To close this wizard, click Finish.

Frnish ]

Fig 64: The Active Directory Installation Wizard is completed.

19. You will be asked to restart the computer:

77

Page 92: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

Wiedows much be restarted betore the changes made by the SctirceDirectory Installation wizard take efteci

Restart Now j Don R~stoft Now

Fig 65: The Active Directory Installation Wizard for restarting the computer for the installation to take effect

If you have a CD in the CD drive, remove it and click Restart New

20. When the computer comes up, click the Options button and make sure that the name of

the domain is selected in the Log On To text box.

Make sure that Administrator is specified in the User Name text box.

Enter your administratorrs password

21. Click OK

After the computer displays the desktop, a dialog box titled Configure Your Server will let you know

whether the installation of Active Directory was successful:

This Server is Now a Domain Controller

You have mccovvtaS,r set up the server as a darrahe controter. Ta cod orrervave anather rot., roe the CcdCsc Poor Server Wizard apace

For a revved of 5aar rhannes, see ttoeTo dora tha cc card, chat Ftrsh,

Fob

Fig 66: Dialog box titled Confgure Your Server showing successful installation of Active Director).

Then Click Finish

FOURTEEN:

Software Installations - Workstation Operating Systems

Introduction

When you are planning to use a computer as a workstation is a network, you should make sure that

computer meets the necessary requirements. In some cases, it may only meet the hardware

requirements without any software. In some cases, something could be missing

78

Page 93: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

In case you are using a computer without an operating system, and you receive a message

stating “Missing Operating System’, or “Strike Fl to retry boot, F2 for setup utility”, don’t

worry about it at this time

2. Put the Microsoft Windows XP Professional CD in the CD drive and restart the computer

(you can press Ctrl + Alt ± Delete to restart)

o After a while, as soon as the computer starts, a message will notify you that the computer

will boot from the CD and install the operating system (the message may display “Press

any key to boot from CD”).

If a message of installing the operating system doesn’t come up, you should restart the

computer. Then, as soon as the black screen of the computer restarting appears, press a key

such as F2 or F8 to access the BIOS. Access the Boot Sequence and check the list. If the

CD (or DVD) drive is not on top and if the instructions allow it, move the CD (or DVD)

drive to the top of the sequence. If you cannot move the CD (or DVD) drive to the top, then

disable the drives, such as floppy or hard drive, that come above it. In some cases, you can

select the drive and press the Space bar to remove the check mark from the selected item.

In this case, make sure that only the CD (or DVD) drive has a check mark next to it. After

making changes in the BIOS to make the computer boot from the CD drive, save and exit

the BIOS. Then restart the computer and follow the instructions on the screen to install the

operating system.

o If a message of installation still doesn’t come up, make sure the CD drive is installed

appropriately. You could try to find out from somebody to get the Microsoft Windows 98

boot disk (it is a floppy disk that would first install the (driver for the) CD drive). (If you

have access to the Internet, you can also check the following site:

http://www.bootdisk.com/ for a boot disk). Put that disk in the floppy drive and restart the

computer. After a while, a list of options will come up and ask you whether you want to

start the computer with or without the CD drive. Select the option that states “without” the

CD. After the CD drive has been installed, make sure you remember the drive letter

assigned to it. Switch to that drive by typing it followed by and press Enter. Then, at the

prompt, type setup.cxe and press Enter. For example, if the CD drive is D, after typing D:

and pressing Enter, type D:\setup.exe and press Enter

80

Page 94: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

* If the computer still doesn’t boot from the CD and if you have access to the Internet, check

the following article from Microsoft: http://support.microsofl.con-i/?kbjd~3 10994

As stated above, when the installation starts, you may see a “Boot From CD” message. In

this case, press Enter.

After a while, you should see a blue screen titled Windows XP Professional Setup and

Welcome to Setup, To Set Up Windows XP Now, Press Enter. To continue, press Enter

3. The next screen will present to you the License Agreement. Read it. If you don’t agree with

it, press Esc and stop the installation.

if you agree with the license agreement, press F8 (or the appropriate key)

4. The next screen asks you to select the partition you want to use to install the operating

system:

o if you have only one partition and it looks small, such as less than 5 GB, simply select it

o If you have only one partition and that, regardless of its size, you want to use it wholly to

install the OS, select it

o if you have only one partition but it is large and you want to create various partitions,

first make sure it is selected. Then, press C to partition it. The next screen would ask how

much space you want to use for the new partition. By default, it will propose the total

space for it. To reduce it, first press Backspace a few times to delete the numbers, then

type the desired number of megabytes, and press Enter. Press the down arrow key to

select the Unpartitioned Space option and press C. Continue the same way until you

have created the desired partitions.

A small partition of 8MB will be created by Windows. Don’t touch and don’t delete it

If you have many partitions already, to specify which one will be used to hold the operating

system, use the up and down arrow keys to select it

5. After selecting the partition you will use, press Enter to install the OS in it

6. The next screen will ask you to format the selected partition and specify the type of file

system you want to use. Select the Format The Partition Using The NTFS File System

option and press Enter

81

Page 95: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

7. In the next screen, the installation will start formatting the partition. This may take a few

minutes.

Once the formatting is over, the installation will start loading files. This may take a few

minutes

A wizard, titled Windows XP Professional Setup, will come up. Its first page presents you

with two options.

The first choice consists of changing the Regional and Language Options. If you click

Customize, the Regional and Language Setup Options dialog box will come up:

Rervorrd Options nn~n.o

5~nioord~ and ~vrrosrr

This option offect, boor n-once provrmos ~orm-ot cruncher,, currencie,,dote,, c-nd bmw

Salecc err item to match it, prererences, or ctckCu,tcnrzc cv chanceyour own Formats:

* Cu ton a

Somplrm

Nuorcer: 123406759XrO

Currency: $123,456,709.00

Time: 15556011

Short date: ioj30/2004

Loog dote: Saturday, October 30 2004

Location

To help services provide you with local inFormation, such as news andweather, select your present oration:

United States

L °~

Fig. 67 Regional and Language Setup Options dialog box

8. The default options will be selected depending on your version of the CD. For example, if

you bought the OS intended for a US use, the US English would be selected. If you want to

change the language, click the Customize button. Another dialog box, titled Regional and

Language Options, would come up with English (United States) selected. You can then

click the arrow of its combo box to change the language. Afler making your selection, you

can click OK. If you don1t intend to change anything, you can click Cancel.

The bottom option consists of making changes to the way the keyboard will interpret text.

Once again, if you are installing the OS intended for a US audience, the US English is

selected by default. If you want to change it, click Details. This would open the Text

82

Page 96: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

Services and Input Languages dialog box. You can change the language by clicking the

alTow of the combo box. After making the change, you can click OK. To ignore any

rhange, you can click Cancel or press Esc.

After dealing with the Windows Setup dialog box, click Next

9 The next screen requests that you enter your name or the name of the primary person who

will he using the computer. You must type a name other than Administrator or Guest

10. The other text box, Organization. expects the name of the company. Make sure that you

provide this information

I I. After entering the name and the organization. click Next or press Enter

12. The next nage of the wizard reouests the Product Key, which you must enter

13. After tyning the product key. click Next

14, The next Page of the wizard, eYpects you to tyne the computer name It also suggests a

default based on the organization you entered. You can accept the suagested name, which

you can still change later on. or you can type a new name

15, The dialog box also requests a password for the administrator. This password will he stored

locally, on the comouter. Type a semi-difficult password in the Administrator Password

text box, such as P~sSwOrd8

16. Type the exact same password in the Confirm Password text box

17 Press Enter

18. The next page of the wizard allows you accept or change the current time. the date, and the

time zone of the computer. After making your selection, click Next

19. The installation will start/continue copying files

After a while, a dialog box titled Windows XP Professional Setup will prompt you for

Network Settings. Accept Typical Settings and click Next

20. The next page of the wizard will prompt you to specify the name of the network or to join a

domain. Accept the default of WORKGROUP and press Fnter

The installation will continue copying the files

21. When the installation finishes copying the files, the computer will reboot. When it comes

up a Welcome to Microsoft Windows message will display. Click Next

22. In the next screen. accept the ‘Yes, this computer will connect through a local area network

or home network” radio button and click Next

83

Page 97: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

73, En th~ ~~xt scr~en ~li~k lhe “No not at this time” radio button

24 ~

75 The ~ex1 screen uromuts you to enter at least on~ name. Enter a name that is neither

Administrator nor Guest, nor the name of the comnuter

2~. Click Next

27. The next screen disnlavs Thank You and Congratulations

~ick Firisli

Tl~e computer will displ2v Welcome for a few seconds and change to the d~sktnn

Un~rad e

If your comoliter already has an operating svsfem installed, insfrad of nerfhrmin~ a new installation

you can ungrade the existing one. This would nreser”e the existing files and other items, such n~

the comnuter name. the password. the name of the network etc and would only install th~ r~c~vr

features and other imurovements.

To nerform an uro’rad”~

Start the comnuter as you usually do

2 Onen the CD drive Put the CD (or DVD) that contains Microsoft Windows YP

Professinnal in the drive and close its door. A window will di~nlav and oresent you some

cuntjnn C

3. ~lirk Instal1 ‘Vindow~ NP,

Another window will come un with a dialog box on top of it. Th~ dialog box will present

you the option of performing a new installation or upgrading. To choose, click the arrow

of the Installation Type combo box and select your desired option

Keep in mind that if you perform a new installation, all existing files will he lost. When

in doubt. accept to upgnude

4 After making your selection in the dialog box, click Next

5. You will be presented with the License Agreement. Read it. If you agme with it, click tl~

I ~ccept This Agreement radio button and click Next. If you donut agree with it. click the

second radio button and click Next to stop the installation

84

Page 98: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

‘f’~ou agr~ed with the Lcense Agreem~nt and clicked the first radio button, c1ick Next

7 The next screen will request the Product Key Fnter it

o r” ~0. ~ ICi~ ~

9. In the next scmen, if you (already) have an Internet connection, accept the first radio

button so the installation would check updates en the Microsoft web site. ~ don’t

have an Internet connection or you don’t want to check the updates 1siuce ~ou ‘jan do this

later on ~~nvway), ~lick the second radio button

10. Ciic’N :~

11 Continue the installation, At one time, the computer will reboot (itself~. Some time to

time th~ computer will go blank fbr one secow1 or haifa second Don’t worry about that

It will orlv he a good sign. Let it flow until it prompts you for something. Don’t evpect

this quiet (and perhaps boring) installation to take less than 30 minutes ~in fact mm’e than

thafi Meanwhile if you have nothing else to do, the installation wi1l present (~omewhat

advertising~ messages that ‘ou can read or admire to keep ~‘ourself busy

1 ~ \Vh~n the installation i~ over and the computer has rebooted, a Welcome to Microsoft

Windows will display with Thank You For Purchasing Microsoft Windows XP Ket~s

Sneud ~ Few Minutes S’~ttin~ TJp Your Computer

Clic1 N~x

13 The next screen will ask you whether you want to register online. Click the No Not A~

This Time radio button (unless you want to register at this time, in which case you would

cbck the first radio button)

14. Click Mcxt

15 The next ~Arindow titled Let’s get On The Internet, would promnt you to setup the Internet

at this thye,

Click th~ Do Not Set ‘Ip An Internet Connection At This Time radio button

16, Clicl’NTcxt

17 A Thai,k You message will show Congratulations, You’re Ready T0 Go!

Click Finish

You may he presented with a (blank) window with only one or two icons including

Recycle Bin. This would simnly indicate that the installation was fine. Congratulations

Q5

Page 99: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

The Computer Name

After performing an installation of the operating system, you can perform some routine

operations to check or change things.

To check the name of a computer, open Control Panel and double-click System. Alternatively,you can right-click My Computer and click Properties. In the System Properties dialog box, clickthe Computer Name tab.

Joining the Network

Joining a Domain

Creating a Computer Account

After creating a domain, you can add client computers to it. In our examples, we will add

workstations that run Microsoft Windows XP Professional. There are two actions to adding a

client to a Microsoft Windows Server 2003 domain but only one is required.

Before physically or electronically adding a client to a domain, you can first create a computer

account for it. To create a computer account, you have various alternatives:

o If using the Manage Your Server window, you can click Manage Users And Computers

In Active Directory

o You can also click Start -> Administrative Tools -> Active Directory Users And

Computers

o You can also click Start -> Control Panel -> Administrative Tools -> Active Directory

Users And Computers

Any of these actions would open the Active Directory Users and Computers window. In

the left frame, expand the name of the domain. Then you can right-click the name of the

domain -> New -> Computer. This would open the New Object - Computer dialog box.

In the Computer Name text box, enter the name of the computer. The operating systems

before Windows 2000 don’t use very long names. Therefore, when naming a computer,

Page 100: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

keep this in mind and give a name made of fewer than 15 characters. After naming the

computer, click Next twice and click Finish.

Instead of right-clicking the name of the domain, in the Active Directory Users And

Computers, you can expand the name of the domain, right-click the Computers node ->

New -> Computer. As mentioned already, in the first page of the New Object - Computer

wizard, you can type a name for the computer. Here is an example:

x

Create ii: rrntconoattiog.com/Ccnopoterc

Compote, cpromcentrot

Computer nacm (gme-Werdomom 2000L

CENTRAL

The totmnirmg ace, or grmap coo ci,, tide computer to a domain,tine, or group:Tefauit: DoroairAdorioo Change...

Ancign Ida computer accooct on a preWindomen 213Pm] computm

Aooipg INn computer account on a backup domain ceetretter

Then click Next, Next, and Finish.

Joining a Domain

After creating an account for a computer, you can add it to the domain. This is referred to

as joining a domain. Normally, primarily creating an account for a computer is not

required although it’s a good idea. When joining a domain, if the computer you are

adding doesn’t have one already, an account would be created for it.

To join a domain using Microsoft Windows XP Professional:

1. First display the System Properties dialog box. To do this,

o You can right-click My Computer and click Properties...

o You can display Control Panel and double-click System

2. In the System Properties, click Computer Name

87

Page 101: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

3. Click Change...

4. In the Computer Name text box, enter the desired name of the computer. If you

had already created an account in the domain for this computer, type that name

5. In the Member Of section, click the Domain radio button

6. Click the Domain text box and enter the name of the domain

7. Afier specifying the name of the computer and the domain to join, click OK

You can change the name and the membership of thiscomputer. Changes may affect access to network resources.

Computer name:CENTRAL

Full computer name:CENTRAL

More..

Domain:netconsulting

Workgroup:

OK H Cancel

8. You would then be asked to asked to provide a user name and a password for a

user who has the permissions to join let a computer join a domain

88

Page 102: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

Reroute

‘?ou eon chapue &m moron orut rue mer’percutp ~ Advancedcompurer Changes map c””

Computer rarnor

CENTRAL

Rut computer r000mCENTRAL RoUse the rrmoe and paucucod uP am 00000cr unth pnnmncon

to rAn the doma,o,

User name: ~ town

Domain’ Password:rmtcmcuutiog

Wmkrpocp (cure

OK Caccet

OK Cancel

9. After entering a user and a password, click OK. If you have the right to add

computers to the domain, you would receive a Welcome message and click OK:

Remote

AdvancedYou cam change the macno and thm morobrnruh:p ot INncomputer, Changeu map alloct accean to network resourceu,

computer

Computer come:

CENTRAL4arpu

Full computer name:CENTRAL

Welcome Eo The netconnutting domain,

Domalo: OK

nelcOnTttftelganoge. -

Workgroup:

OK Cancel

OK Cancel

89

Page 103: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

Remote

You eon otrureto the name ned thu nreretoerehtpet otto Advoeoedcomputer. Chungeo rruy ailed atones to network r0000roes. corrputnr

Computer name:CENTRAL

Frdeceopurer none.CENTRAL.

~ You mu t ol 4 Au omprrte IA hur~ats t tutu, Etc I

Domuto

netoorrouttieg

Workgroup:

OK H Cuocet

OK Currant

10. Once you click OK, you will be asked to restart the computer, which you should

do. Therefore, in the System Properties dialog box, click OK

11. When asked whether you want to restart the computer, click Yes

12. After the computer has restarted, when it displays the Log On To Windows dialog

box, click the arrow of the Log On To combo box and select the name of the

domain

13. If necessary, change the User Name in the top text box.

In the Password text box, enter the password associated with the user name

14. Click OK

NETWORK MANAGEMENTManagement Overview

Introduction

As a network administrator, you will perform various tasks to keep the network up and running. These

include computers, users (the people who use the network), the peripherals (the other machines

attached either to the computers or directly to the network. To make this possible, both Microsoft

Windows XP Professional and Windows Server 2003 provide the various tools you will need. If you

are managing a peer-to-peer network, the former provides local and possibly small network tools to

manage workstations. For a client/server network, Microsoft Windows Server 2003 provides all the

tools you need to locally or remotely manage the servers or the clients.

Network Management with Windows XP

90

Page 104: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

Most of the tools used to locally manage a Microsoft Windows XP Professional or a peer-to-

peer network are listed in the Administrative Tools window. To open it, you can open Control

Panel and double-click Administrative Tools:

Ftc Edt Vana FCvantee mdv ttn~e

Sad. Vnarth FaLters

Vdnvrdtentrne Teats Ga

Canapaneent CORVSCr Onto SenEca Event EVeaverSerntvna Menegeanat aLTEC)

Load Sngsty Fedonranrce SenVaeaPot a

As you install more software or libraries to your computer, the tools may increase in

sophistication and number. Here is an example:

-~ x

See Ond Fdde TOnan C ~ ~ [~] ~j

Vthe Plane S ~

To use a tool, you can double-click it.

NETWORK MANAGEMENT WITH WINDOWS SERVER 2003

Like Microsoft Windows XP Professional, Windows Server 2003 groups its administration

routines under an ensemble referred to as Administrative Tools. Unlike the former, the later

provides various ways of accessing the tools.

91

Page 105: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

A~M~ Dfr~dory D~mN~ ~nd T~u~M

~ 4~t~e O~to~y ~d

Pztr~, cNe~ y UM~ ~ Copo~er~

M~n~ Ym~rM,r~,r My Co~ ;J Ce~t&&~ Aoth~y

ck~M~ Ndrn~,tr~to

~omn~md Pro~WL • C~pX~r~~

A&n~ ~W~ndo,’~~ E~pb~ ~Yoo~ 5~r~r W~d

Prr~~ ~Ø/ C~b-b~t~d FN~ 5~tern

)~cP~y5hNpProNeIp~ ~ tNt5

N O~~n Con~ro~ 5~~Ny Po~yot~p~d

[~J Nv~nt VN~o,

Mar~ Vo~ 5erv~

~ N~ro~oft NET E~r~ork Toe

I ~Z M~rc.oft.NETF~anooo,rk1~WEoodo0000 500reoT (CONE)(~ 040000000 bed Be0rnorr~ TToe~,r

Notroo 0000000y bNere ee~d )~j~-.~ Con~rotoro Rorrebe Derkoopo

~. p00,000 end 00,000 AnroorVrkodewn Condo0 ~

Wrrdpoo U~d0k0 ~ T~rr0rr00 Snovor boomnop

Arennen ~ ~( Terrkred Terekor Cothporekon

Tended 0040,4000

J000 0004wero r

Otertop

4000004 Expkooer

OokN,’prenn

0000000 000r000rCe

You can also click Start -> Control Panel -> Administrative Tools.

With any of these previous teclmiques, to use a tool, simply click it from the menu.

The Microsoft Management Console

Introduction

If you have some experience with Windows Explorer of Microsoft Windows 9X and later, you may be

aware that, in that same window, you can open your folders, view your files, open Control Panel,

or even view a web page. In the same way, to make computer and network management easy,

Microsoft Windows XP and Windows Server 2003 provide a common window named Microsoft

Management Console or MMC. This makes it possible for all routine operations to be performed

in a window that primary looks the same regardless of the task being performed. You can

perform all routines operations without formally being aware that you are using the MMC.

Practical Learning: Introducing the MMC

o To view examples of administrative applications that share an interface:

If you are using Microsoft Windows XP Professional, click open Control Panel, double-

94

Page 106: A LOCAL AREA NETWORK LAN CASE STUDY: UGANDA …

REFERENCES:1. Networking Essentials Plus. Academic Learning Series. 3~’ Edition.

2. CCNP Support. Study Guide. By Todd Lammie and Kevin Hales.

3. Networking Lab Manual for Network + Guide to Networks. 3~’ Edition. By Michael Grice.

4. CCNA Self Study. CCNA Intro. Exam Certification Guide.

5. CCIE — Cisco Certified Internetwork Expert. Study Guide; Routing and Switching Exam

350-001. By John Swartz and Todd Lammie.

6. Networking Complete. 2nd Edition.

7. Using Information technology. 3~’ Edition. By Williams Sawyer Hutchinson.

8. Computers, Communications and information. User’s Introduction. By Sarah E. Hutchinson

Stacey C. Sawyer.

9. http://www.google.com/

10. http://www.answers.com!

97