Computer Networks Lab

Size: px
Start display at page:

Download "Computer Networks Lab"

Transcription

1 Computer Networks Lab Room: BB 219 Additional Information: 1. Practical Training: Network planning and installation of a file server 2. Practical Training: Web server installation and dynamic Web pages 3. Practical Training: Installation and configuration of a Firewall 4. Practical Training: Installation of a VPN for the connection of two networks 5. Practical Training: Programming attempt; Client/Server connection over Sockets 6. Practical Training: Network Monitoring Name: Matriculation No.: Supervisor Signature: Contact: Joachim Zumbrägel BB 320 Tel: 0203/ joachim.zumbraegel@uni-due.de Equipment for each group: - 1 Server computer (OS: Windows Server 2016 Standard, virtual machine) - 1 Client computer (OS: Windows 7, virtual machine) - 1 Computer as Router / Gateway (OS: Linux) - 1 Switch and network cables Hint: We are using virtual computers for our client and our server operating system. The Software which is running on our physical computer (so called Host-System) is VMware Workstation 12 Player. It has to be considered that each machine (virtual and physical computer) has a specific IP address. 1. Introduction Computers in small companies without much space or those in households are commonly connected to form a network in order to share resources (e.g. printer, Internet, files). The setup of a (simple) network with current operating systems is relatively trivial. For networks with up to ten computers a Peer to Peer network is suitable. Peer to Peer implies that computers in such a network are considered equal and thus a central Server for administrating data traffic is not required. In the Windows OS environment a Peer to Peer network structure is called Workgroup and is based on the same principle. For larger networks, however, at least one Server should be used to centrally administrate network resources. This type of structure is called Domain in the Windows OS environment. 2. Network basics In this practical training both models are to be successively carried out. Before configuring your computers for the network, the physical connections have to be created. All computers in the laboratory are equipped with a network card and a network cable. In addition, each group is provided with a SWITCH. The STAR configuration will be physically implemented (see Fig. 1.2). In order to exchange data in a network, computers must speak the same language, which is the role of Network Protocols. They specify the 1 2

2 common language in each case. Usually, in local networks the TCP/IP protocol is used, upon which the Internet is also based. In Windows Server 2016, TCP/IP is installed with the operating system and remains active after the installation. We just have to configure it. Before we do that, we need to enter some general information (e.g. Computer Name and Workgroup or Domain Name). Question 1: What is the Computer Name for? Computer Name and ClientN respectively and the Workgroup as WorkgroupN, where N represents your network number (you will be informed of your network number in the beginning of the practical training). Workgroup Server Client Question 2: What is the difference between Workgroup and Domain? 2.1 The Workgroup Model Each computer in your network needs to have a Name and has to belong to a Workgroup (workgroups are protocol independent). The Name of each computer must be unique, thus it cannot occur more than once in a network. To change the settings mentioned above you need to proceed as follows: On Windows 7 and Windows Server 2016 Go to start Control Panel System and security System and choose Change settings under the Computer name, domain, and workgroup settings field Click on Change after which the dialogue box in Fig should appear Fill the Computer Name and Workgroup fields and confirm your entries with OK Exercise 1: Set up the Computer Name and Workgroup, and complete the table below. Designate the computers in your network as ServerN Fig : Computer name and Workgroup or Domain 2.2 TCP/IP, IP addressing, IP address classes Communication between the individual computers in our LAN (as well as in the Internet) can be established by using the TCP/IP protocol and its IP addresses. IP addresses consist of 4 octets (bytes), which are normally represented in decimal form and separated by dots (dotted decimal notation). Example:

3 This form of representation is used only for the input and/or display of IP addresses on the computer. Internally, however, the computer always works with the binary representation of IP addresses. Example: (the computer does not set the dots between the individual octets. They were used here only to facilitate and/or to distinguish between the individual values of the binary representation of the "dotted decimal notation"). IP addresses consist of two parts: Network address Host address These two parts are identified through the subnet mask. By definition the network part of an IP address is represented by 1s and the host part by 0s. The network part identifies the network address, where the computer (associated with its IP address) is located. The host part identifies the computer address within that network. This structure allows TCP/IP to be defined as a routing protocol. Example: IP Address: Subnet mask: The first 3 bytes represent the Network address (1s) and the last byte represents the Host address (0s) Network classes In former times IP addresses were divided into classes in order to set up a network addressing architecture. There were 5 different classes of available IP ranges: Class A, Class B, Class C, Class D and Class E, where classes A, B and C were most commonly used. The table below lists the ranges of IP addresses for the 3 main classes: Address class (Name) Values of the first bits (Definition) Remaining values of the first byte (decimal) Network (N)/ Host (H) Part Number of available addresses (per network) Class A 0xxx xxxx N.H.H.H Class B 10xx xxxx N.N.H.H Class C 110x xxxx N.N.N.H 256 Table With the introduction of CIDR (Classless Inter-Domain-Routing) in 1993 the concept of the network classes plays nowadays in practice only a limited role (e.g. default subnet mask which is a proposed value when you set up an IP address manually). Every network has two addresses reserved: network address and broadcast address. A broadcast address is characterised by 1s in the host part and a network address is characterised by 0s in the host part. The result of a logical AND operation (multiplication) between any valid IP address from a certain network and the subnet mask of that network is the network address. Due to an exponential increase of users and computers connected to the Internet, the number of unused IP addresses decreases considerably. A new version IPv6 (IP version 6) was designated in 1998 as the successor of version 4. Due to the IPv4 shortage, private addresses were reserved. These are never assigned in the Internet and are never routed. They are intended for private network use only. The private addresses range is listed below: 10.x.x.x from x.x to x.x x.x Table = a Class A address = 16 Class B addresses = 256 Class C addresses 5 6

4 The address : The address plays a special role - by definition it always addresses the local computer. It generally holds the name "local host". According to standard, the use of the network 127.x.x.x is inadmissible ("An address with 127.x.x.x should never be part of a network!"). The can only be used to examine the configuration of the particular computer (ISO Layers 3 to 7)! Network division and subnets creation Creating subnets (or subnetting) is used to divide networks into smaller portions (subnets). With the help of subnet masks, networks can be masked out bit by bit, by setting some of the subnet mask section bits to a different value. This makes the definition of subnets possible. For example for the subnet mask (with binary representation: ) only the last seven bits are available for host addressing. This way a Class C network is divided into two subnets with 126 hosts each. With the creation of such subnets, network administration can be simplified tremendously. broadcast address, is passed on automatically to each host in the corresponding network. As a result of the sent ARP Signal (ARP = Address Resolution Protocol), the target host, which is addressed by its IP address, announces its MAC address. By use of MAC addresses the computers in a network are capable of exchanging data packages on the physical layer level. The mapping of IP addresses to MAC addresses is done by the Address Resolution Protocol (ARP). A MAC address has a length of 6 bytes three bytes to identify the manufacturer and three bytes representing a sequential number. Each MAC address is unique and usually burned into the network card. Nevertheless, it is possible to assign MAC addresses manually. Question 3: What helps distinguish one IP address class from another? Question 4: What is the use of the subnet mask? Example of a network division: Class C Network Network mask st half 2-nd half Network address Broadcast address IP Range (126) (254) Table Question 5: What is a Gateway? Question 6: What does the abbreviation DNS stand for? What is its use? Network division must always be achieved in a symmetric manner, i.e. a Class C network for example can be divided into 2 subnets, both of which can be further divided in another 2 subnets Broadcasting and Address Resolution Protocol As already described above, the second reserved address in a network is the broadcast address. A message (broadcast), which is sent to the 7 8

5 Question 7: What is the difference between private and public IP addresses? The following scheme describes the structure of a group s network: Internet Question 8: What does the abbreviation NAT stand for? What is its use? Switch Exercise 2: Network parameters setup. For the network setup in our laboratory a private network is to be established with IP address N.xxx where N represents your network number. The following guidelines hold for all groups: - The Gateway (router/firewall) got already the highest usable IP address from the range. - The switch (router/firewall) got already the lowest usable IP address from the range. - The host-operating system of the server got already the second lowest IP address from the range. - The host-operating system of the client got already the third lowest IP address from the range. Hint: keep in mind that we are using virtual machines for our client and as well for our server. For that reason also the hosts machines (the host machines are the machines where the virtual machines are running on) need IPaddresses. Firewall N/ Router N Switch N Workgroup X Fill in the table the IP-Addresses of your network: IP-Address Switch Host Operating system (server) Host Operating system (client) Gateway Table Server N Client N Workgroup N Fig : Network in the laboratory Workgroup Y 9 10

6 To setup your network with Windows Server 2016/Windows 7, proceed as follows: On Windows 7 navigate to Start Control Panel Network and Internet Network and sharing centre local area connection) On Windows Server 2016 navigate to Start Control Panel Network and Sharing Centre Click on Ethernet Open the Local Area Connection (or Ethernet) corresponding to your NIC (Network Interface Card). The dialogue box in Fig should appear. Select the Properties button after which the dialogue box in Fig should appear. In the list of items the connection uses choose Properties for Internet Protocol Version 4 (TCP/IPv4) The dialogue box in Fig should appear. Change the network settings on the machines in your group and fill in the table below: Fig : Local Area Connection Fig : LAN Properties Server Client IP-Address Subnet mask: Gateway: 1. DNS: DNS: Not necessary Not necessary Table Exercise 3: Test your TCP/IP set up. To test your network connection setup, proceed as follows: Navigate to Start Run and type cmd in the field to open the DOS command prompt window Press ENTER to confirm and the command prompt consol should appear As shown in Fig with the instruction line ipconfig /all you can look at the configuration of all network adapters in your system 11 12

7 Fig : ipconfig /all on the Command Prompt Console Compare the output of the console with the configuration you entered earlier in Table To check if the computers (ServerN, ClientN, and Gateway) are communicating with each other use the command line Ping <followed by the IP address> - e.g.: ping <press enter> As a result of the ping command line you should get four answers from the computer you pinged. Repeat the same command for all computers you configured. Ping the localhost, your local IP address and the IP addresses in your network. Fig : IPv4 Properties 3. User Administration A user account contains unique information about a user and allows him to register and get access to the domain, in order to take advantages of the different network resources. Through an account a user can also gain access to a specific computer s resources. Everybody who regularly uses the network should have a user account. Windows Server 2016 has 3 types of user accounts: 1. Domain user accounts 2. Predefined user accounts 3. Local user accounts We will cover Domain user accounts later in the practical training. The predefined user account administrator, has already been used in the first part of this practical training, when we set up the network configurations. The predefined user account guest (with very restricted rights), is intended for temporal network access. The local user accounts allow access to the local computer and its resources

8 If the users of all computers in a local network (not a domain) require access to different resources, then a user account must be created on each computer for every user. When the network holds many computers (more than 10) the setup and maintenance of such a system gets very complex and time consuming. That is why the domain model is recommended for larger networks. A domain user account identifies a person who uses a computer within the domain. This account can then be given access to resources in the network. The user account and the shared resources reside on a server computer configures as domain controller, centralizing administration and security. A user account created on the domain controller applies to all computers within that domain. Before user accounts are created, guidelines should be specified for them, e.g. name conventions, password guidelines, account options. In this practical training these guidelines are not taken into account. Fig. 3.1: Local Users and Groups in Computer Management Usernames in Windows Server 2016 must be unique for the network, are not case-sensitive and cannot be more than 20 characters long. To create a user account in Windows Server 2016/Windows7, proceed as follows: Navigate to Start Control Panel Open Administrative Tools Computer Management Extend Local Users and Groups located on the left part of the window. Right click on Users and select New User as illustrated in Fig. 3.1 The New User dialogue box should pop out. Enter the properties for the desired user and click on Create as shown in Fig When you are done, click on Close. Fig. 3.2: New User dialogue box 15 16

9 Description of the properties for a new user account: User name the unique registration name of the user based on the naming convention, you defined. Full name the user s complete name. Description additional user information (i.e. his department, duties). This field is optional. Now you are able to log on to the computer with the newly created user account. Access to resources from that user account depends on the granted rights. User rights are usually set for a group of users. Predefined groups, like predefined user accounts, also exist. The four most important user groups are: 1. Administrators 2. Users 3. Power Users 4. Backup Operators Administrator group members are allowed to implement all of the operating system support functions. The group Users is the safest environment for program execution. The Power Users group possesses most administrative powers with some restrictions. The users with Backup Operators rights can save and change files no matter if they are authorized or not. An exact explanation of the rights of these groups is out of the scope of this practical training. Further information is available on the Windows 2016 Help and Support. It is also possible to create new user groups and assign rights to them or prevent new groups from receiving undesired rights. Exercise 4: User Accounts and User Groups. Create a user account for each member of your team. Create a group for your team and add the previously created users to that group. To Log On with another user, you first need to Log Off by going to start Sign out as illustrated in Fig. 3.3 below. Fig. 3.3: Log Off on Windows Server 2016 Don t use alt + Ctrl + Delete (German keyboard: AltGr + Strg +Entf) for the log on. This only applies to the host machine. Use alt + Ctrl + Insert (German keyboard: AltGr + Strg+ Eingf) for the log on virtual machine. Log On to the system with the newly created users and try to access and modify the properties of the internet protocol TCP/IP. Is it possible? If not, what changes should be made so that the newly created user account can do those changes? Access to various computers in the network could be granted by creating user accounts for that user on the corresponding machines. This type of user accounts administration can be extremely simplified by introducing the domain model to the network. 4. Domains and Active Directory The corner stone of a domain is the domain controller. A domain controller is a server, which stores a copy of the Active Directory (AD) 17 18

10 data base and thus user rights, which will govern their access to resources within the domain. Installing AD on a server turns it into a domain controller. AD requires a DNS server to function correctly and that is why Windows Server 2016 installs a DNS server when building the domain controller. Exercise 5: Active Directory (AD) and DNS. Install the Active Directory Domain Service on the Server computer. Log On as Administrator and proceed as follows: Navigate to Start Server Manager Extend Manage and select Add Roles and Features The windows shows Before you begin Click on Next Select the Installation type Role-based or featurebased Installation Select a server from the server pool Select the Active Directory Domain Services and DNS- Server roles and click on Next. Don t select roles for feature and install the AD and DNS tools. After the installation is complete we need to configure our domain controller. Click on promote this server to a domain controller Select Add an new forest by deployment operation Name the new domain - DomainN.local - where N is the number of your network. Select Windows Server 2016 for the functional level of the new forest and root domain. Type the DSRM-Password (Tip: use the same password for user BB219 ). Don t change the location in next steps. Restart your computer after Installation Remark: It is important to add all Client computers to the Domain in order to administrate them through the domain controller. Each computer must have a user account to access the Domain with. Exercise 6: Joining the Domain. To add computers to a domain, proceed as follows: On the Client computer: Log On as administrator and navigate to Computer Name Changes as described in chapter 2.1, Fig In the section Member of select Domain and enter the name of your domain (DomainN or DomainN.local). Click OK and follow the OS instructions Your network now corresponds to a domain model. All components of the network (user, computer, etc.) will be administrated from the active directory, e.g. a user account created on the domain controller (in the AD) is valid throughout the domain. Exercise 7: Users in the Domain. As in exercise 4, create a user account for all your team members and a local security group. Add all users to that group and try to log on to both the domain controller and the client computers. On a domain controller the users and groups will no longer be managed by the Computer Management, but rather by the Active Directory. To add a user to the AD, proceed as follows: Open Start Administrative Tools Active Directory Users and Computer Extend to DomainN, where N is your network number Right click on Users and select New, then you can choose either User or Group depending on what you want to create 19 20

11 5. File Server A file server provides location for shared space and files, making them available to clients connected to the network. We can share files and folders in several different ways in a Microsoft network. One way would be to share data by copying it to the Public Folder, meaning that you do not make any access restrictions. Everyone with a user account on the server has access to the Public Folder. Another method for sharing files and folders is to share them directly from their current location. We will use this type of sharing because it gives us more control on user rights and files. User rights determine the type of access to a specific folder. There are two types of access rights: Share Permissions o Full Control o Change o Read Right click on the folder you would like to share and select Sharing on properties The folder properties dialogue box with selected Sharing tab should appear as shown in Fig. 5.1 Click on Advanced Sharing The advanced sharing dialogue box should come up. Check the Share this folder check box as shown in Fig. 5.2 Type in the name of your shared folder and click on the Permissions button to define user rights To add a user account or a group to the permissions list, click on the Add button (Fig. 5.4) and as illustrated in Fig. 5.3 type the user account name you would like to define the rights for. Check by pressing Check Names and confirm with OK To change permission for an account/group, select it from the list as shown in Fig. 5.4 and tick the desired access rights below NTFS Permissions o Full Control o Modify o Read and Execute o Read o Write The ultimate user rights are obtained through a combination of the two types. NTFS rights define user access to folders and files regardless of them being on the local machine or a remote one. The share permissions will be effective only when the user is accessing the folders or files over the network. In this case a combination of the two kinds of access rights applies. The most restrictive one of the two is used. Follow these steps to share a folder on the network: 21 22

12 Fig. 5.1: Folder sharing properties ig. 5.2: Advanced Sharing dialogue box Once you have defined the Share permissions, you need to allow NTFS permissions for the same user accounts. To change the NTFS permissions: Right click on the folder and select Properties Select the Security tab and click on Edit To add a user account to the list, proceed as explained in the share permissions steps above. Share permissions are usually not used to govern access because the files and folders already have NTFS permissions. It is preferable to set shares so that domain users have full control and then use NTFS permissions to restrict actual levels of access to the data. After sharing a folder and setting up the access permissions, all user accounts with rights should be able to access the shared data. To access network resources proceed as follows: Navigate to Start All Programs Accessories and open Windows Explorer (or press keyboard shortcut Win Key + E) In the Address Bar type two back slashes (\\) and the name of the Server or the server s IP address as shown in Fig. 5.5 e.g. \\Server1, \\ Navigate through the browser to the shared folder Fig. 5.3: Add users, computer, groups Fig. 5.4: Sharing permissions Fig

13 Exercise 8: Sharing resources Create a folder on the domain controller (Server computer). Give two of the previously created user accounts the NTFS permission Modify and the other two the NTFS permission Read. Create a text file in the newly created folder. Share the folder with Share permission Full control for the group created in Exercise 7. Try now to access the text file from the Client computer with all user accounts. Try to change the file and save the changes. Does it work for all four users? Which work and which do not? Change the Share permission of the group to Read and try once again to access the text file from the Client computer using the four users. Try to make some changes to the text file and save changes them. Could you save the changes? Why? 6. DHCP Server As we learned in the beginning of this practical training it is possible to manually setup the IP address of each computer in the network. However, in the case of larger networks an automatic distribution of IP addresses is highly recommended. This is where the DHCP Server comes into place (though it can achieve more). DHCP stands for Dynamic Host Configuration Protocol. It is a TCP/IP standard and its goal is to alleviate the complexity of IP addressing management (including other configuration details that come with it) by centralizing it through a Server on the network. Exercise 9: DHCP Server Install a DHCP Server for your network configuration. To install a DHCP Server Role on Windows Server 2016 proceed as follows: Navigate to Start Server Manager Extend Manage and select Add Roles and Features The windows shows Before you begin Click on Next Select the Installation type Role-based or featurebased Installation Select a server from the server pool Select DHCP-Server role and click on Next for installation. Authorize the DCHP Server with the current credentials Add a new scope of the IP addresses in your network. For that navigate to: Start Administrative tools DHCP Right Click on the IPv4 under ServerN.domainN.local and select new scope Type the name and description for the scope Enter the range of Client-addresses that the scope distributes. (Please pay attention to the used IP address of the physical and virtual machines). Set 8 days as a Duration for scope leases. Add an IP address for a router (Gateway) and click on Add. Enter your Server name and resolve an add your Server-IP address for a WINS Servers Activate the scope After the installation it is possible to reconfigure different parameters in the DHCP console like Gateway, DNS, WINS, etc. To reconfigure your DHCP Server navigate to: Start Administrative Tools DHCP Expand the Server and the IPv4 to reconfigure if needed

14 Notes: Log On as administrator on the Client computer and change the TCP/IP configuration to Obtain an IP address automatically and Obtain DNS server address automatically Verify with ipconfig/ all that the Client computer got a correct TCP/IP configuration from the DHCP Server. Using the command ping make sure that the Client computer can communicate with the other computers. 27

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 8 Networking Essentials

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 8 Networking Essentials A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e Chapter 8 Networking Essentials Objectives Learn about the protocols and standards Windows uses for networking Learn how to connect

More information

Supporting Networked Computers

Supporting Networked Computers CHAPTER 7 Supporting Networked Computers After completing this chapter, you will be able to: Define the main concepts of networking, including the roles of TCP/IP, IP addresses, and subnet masks. Set up

More information

Configure DHCP for Failover Step-by-Step.

Configure DHCP for Failover Step-by-Step. Configure DHCP for Failover Step-by-Step https://technet.microsoft.com/en-us/library/hh831385.aspx Dynamic Host Configuration Protocol (DHCP) failover in Windows Server 2012 is a new method for ensuring

More information

A+ Certification Guide. Chapter 16 (Part B) Networking

A+ Certification Guide. Chapter 16 (Part B) Networking A+ Certification Guide Chapter 16 (Part B) Networking Chapter 16 (Part B) Objectives Installing and Configuring Network Interface Cards Networking Configuration for Small Network Switches and Routers Setting

More information

Chapter 3 - Implement an IP Addressing Scheme and IP Services to Meet Network Requirements for a Small Branch Office

Chapter 3 - Implement an IP Addressing Scheme and IP Services to Meet Network Requirements for a Small Branch Office ExamForce.com 640-822 CCNA ICND Study Guide 31 Chapter 3 - Implement an IP Addressing Scheme and IP Services to Meet Network Requirements for a Small Branch Office Describe the need and role of addressing

More information

Local Area Networks (LAN s)

Local Area Networks (LAN s) Local Area Networks (LAN s) Local area networks are computers connected together in a single location. They vary in size from two computers connected together to share a printer, to hundreds of computers

More information

Introduction to TCP/IP

Introduction to TCP/IP Introduction to TCP/IP Properties and characteristics of TCP/IP IPv4 IPv6 Public vs private vs APIPA/link local Static vs dynamic Client-side DNS settings Client-side DHCP Subnet mask vs CIDR Gateway TCP/IP

More information

Networking Fundamentals Tom Brett

Networking Fundamentals Tom Brett Networking Fundamentals Tom Brett Data Before we look at networking, it is important for us to understand what Data is and how it is stored and represented Data According to Webopedia, data is distinct

More information

8.9.2 Lab: Configure an Ethernet NIC to use DHCP in Windows Vista

8.9.2 Lab: Configure an Ethernet NIC to use DHCP in Windows Vista 8.9.2 Lab: Configure an Ethernet NIC to use DHCP in Windows Vista Introduction If Vista is not available in your classroom, you may complete this lab by viewing the figures in this document. Print and

More information

Shaw Business Hitron Modem (CGNM-2250) Configuration User Guide

Shaw Business Hitron Modem (CGNM-2250) Configuration User Guide Shaw Business Hitron Modem (CGNM-2250) Configuration User Guide Contents 1. How to Login to your Hitron Modem... 3 2. SmartWiFi and Local Area Network (LAN) set up...4 a. LAN Setting -Private Gateway IP

More information

Networking and IP Addressing TELECOMMUNICATIONS AND NETWORKING

Networking and IP Addressing TELECOMMUNICATIONS AND NETWORKING Networking and IP Addressing TELECOMMUNICATIONS AND NETWORKING Addressing Schemes FLAT 1.Used by Intranetworks 2.Used by Layer 2 3.Used in MAC address 4.Is assigned statically based on next available number

More information

IP addresses and Subnetting

IP addresses and Subnetting Page 1 of 14 Safepipe Centre > Self-test courses > IP addresses and Subnetting IP addresses and Subnetting IP addresses & subnetting - an overview IP addresses What is an IP address? Classes of IP addresses

More information

Unit C - Network Addressing Objectives Purpose of an IP Address and Subnet Mask Purpose of an IP Address and Subnet Mask

Unit C - Network Addressing Objectives Purpose of an IP Address and Subnet Mask Purpose of an IP Address and Subnet Mask 1 2 3 4 5 6 7 8 9 10 Unit C - Network Addressing Objectives Describe the purpose of an IP address and Subnet Mask and how they are used on the Internet. Describe the types of IP Addresses available. Describe

More information

Lab - Configure a NIC to Use DHCP in Windows

Lab - Configure a NIC to Use DHCP in Windows Introduction In this lab, you will configure an Ethernet NIC to use DHCP to obtain an IP address and test connectivity between two computers. Recommended Equipment Wireless router Two computers running

More information

Game100 Networking Lab 4. Part 1 (5.1.4) Using the Windows Calculator with Network Addresses

Game100 Networking Lab 4. Part 1 (5.1.4) Using the Windows Calculator with Network Addresses Game100 Networking Lab 4 Name: Part 1 (5.1.4) Using the Windows Calculator with Network Addresses Objectives Switch between the two Windows Calculator modes. Use Windows Calculator to convert between decimal,

More information

Frequently Asked Questions. Scan to an SMB Share

Frequently Asked Questions. Scan to an SMB Share Frequently Asked Questions Scan to an SMB Share Abstract Image Access scanners are not only a peripheral, like other scanners and printers, they also include a Linux PC which can actively send data to

More information

Chapter 18 and 22. IPv4 Address. Data Communications and Networking

Chapter 18 and 22. IPv4 Address. Data Communications and Networking University of Human Development College of Science and Technology Department of Information Technology Chapter 18 and 22 Data Communications and Networking IPv4 Address 1 Lecture Outline IPv4 Addressing

More information

Network Technology 1 4th - Subnet.! Mario Lombardo -

Network Technology 1 4th - Subnet.! Mario Lombardo - Network Technology 1 4th - Subnet Mario Lombardo - lombardo@informatik.dhbw-stuttgart.de 1 logical networks An IP address is divided into: - network address part - host address part - both parts together

More information

CNBK Communications and Networks Lab Book: Purpose of Hardware and Protocols Associated with Networking Computer Systems

CNBK Communications and Networks Lab Book: Purpose of Hardware and Protocols Associated with Networking Computer Systems Lab Book: Purpose of Hardware and Protocols Associated with Networking Computer Systems Contents Purpose of Hardware and Protocols Associated with Computer Networks... 3 Lab Objectives... 3 Lab Resources...

More information

INTRODUCTORY INFORMATION TECHNOLOGY COMMUNICATING OVER NETWORKS. Faramarz Hendessi

INTRODUCTORY INFORMATION TECHNOLOGY COMMUNICATING OVER NETWORKS. Faramarz Hendessi INTRODUCTORY INFORMATION TECHNOLOGY COMMUNICATING OVER NETWORKS Faramarz Hendessi INTRODUCTORY INFORMATION TECHNOLOGY Lecture 6 Fall 2010 Isfahan University of technology Dr. Faramarz Hendessi Overview

More information

Step-by-Step Configuration

Step-by-Step Configuration Step-by-Step Configuration Kerio Technologies C 2001-2004 Kerio Technologies. All Rights Reserved. Printing Date: April 25, 2004 This guide provides detailed description on configuration of the local network

More information

A specific IP with specific Ports and Protocols uses a dedicated WAN (Load Balance Policy).

A specific IP with specific Ports and Protocols uses a dedicated WAN (Load Balance Policy). 21. Multiple WAN Vigor 3300Bplus has three WAN interfaces, while Vigor 3300 and Vigor 3300V both have four WAN interfaces. With the Load Balance feature, you can use multiple WAN links simultaneously.

More information

Lab Viewing Wireless and Wired NIC Information

Lab Viewing Wireless and Wired NIC Information Objectives Part 1: Identify and Work with PC NICs Part 2: Identify and Use the System Tray Network Icons Background / Scenario This lab requires you to determine the availability and status of the network

More information

Network+ Guide to Networks 6 th Edition. Chapter 4 Introduction to TCP/IP Protocols

Network+ Guide to Networks 6 th Edition. Chapter 4 Introduction to TCP/IP Protocols Network+ Guide to Networks 6 th Edition Chapter 4 Introduction to TCP/IP Protocols Objectives Identify and explain the functions of the core TCP/IP protocols Explain the TCP/IP model and how it corresponds

More information

DHCP in. Introduction. Step 1 router. In this lab, you. computer. Page 1 of 7

DHCP in. Introduction. Step 1 router. In this lab, you. computer. Page 1 of 7 Essentials 5.0 6.3.2.7 Lab - Configure a NIC to Use DHCP in Windows 7 Introduction Print and complete this lab. In this lab, you will configure an Ethernet NIC to use DHCP to obtain an IP address and testt

More information

Table of Contents. HotSpot Installation. Windows 7, 8.1 and 10. Windows Server OS. DNS Web Filter Setup. Windows Configuration. Antamedia HotSpot?

Table of Contents. HotSpot Installation. Windows 7, 8.1 and 10. Windows Server OS. DNS Web Filter Setup. Windows Configuration. Antamedia HotSpot? Contents Table of Contents Part 1 1 Part 2 1 2 3 1 Introduction 1 What is... Antamedia HotSpot? 2 Requirements... 3 Pre-installation Steps... 4 Network Adapters Setup... 9 Network Topology Examples Part

More information

Network Administration Test 6

Network Administration Test 6 Name: Date: Quiz 6: VPN, RRAS, DHCP, Virus Protection, RAID, Setting up Groups, Print and File Servers, DNS, ICS, Subnetting, Security Policies, Predefined Groups and Adding Administrators to a Windows

More information

Lab 8 (IP Addressing)

Lab 8 (IP Addressing) Islamic University of Gaza Faculty of engineering Computer Department. Computer Network Lab ECOM 4121 Prepared by : Eng. Eman Al- Kurdi Lab 8 (IP Addressing) Introduction: Each device on a network must

More information

Vodafone MachineLink. VRRP Configuration Guide

Vodafone MachineLink. VRRP Configuration Guide Vodafone MachineLink VRRP Configuration Guide Document History This guide covers the following products: Vodafone MachineLink 3G (NWL-10) Vodafone MachineLink 3G Plus (NWL-12) Vodafone MachineLink 4G (NWL-22)

More information

Thermal Printer Configuration (EPSON)

Thermal Printer Configuration (EPSON) Thermal Printer Configuration (EPSON) STEP A : IDENTIFY THE THERMAL PRINTER MODEL Check for your EPSON printer model by finding the label on the printer. Figure 1.1 For the example above (Figure 1.1),

More information

Lab Configuring the PIX Security Appliance as a DHCP Server

Lab Configuring the PIX Security Appliance as a DHCP Server Lab 8.5.3 Configuring the PIX Security Appliance as a DHCP Server Objective Scenario Topology Estimated Time: 15 minutes Number of Team Members: Two teams with four students per team. In this lab, students

More information

6.6 Subnetting and Variable Length Subnet Masks (VLSMs)

6.6 Subnetting and Variable Length Subnet Masks (VLSMs) 6.6 Subnetting and Variable Length Subnet Masks (VLSMs) The subnetting is a process of dividing a single network into subnets as known from previous sections. There are many reasons behind that: 1. Reduced

More information

Lab 1.3.2: Review of Concepts from Exploration 1 - Challenge

Lab 1.3.2: Review of Concepts from Exploration 1 - Challenge Lab 1.3.2: Review of Concepts from Exploration 1 - Challenge Topology Diagram Learning Objectives Upon completion of this lab, you will be able to: Create a logical topology given network requirements

More information

Chapter 8: Subnetting IP Networks

Chapter 8: Subnetting IP Networks Chapter 8: Subnetting IP Networks Designing, implementing and managing an effective IP addressing plan ensures that networks can operate effectively and efficiently. This is especially true as the number

More information

Chapter 2: Configuring Network Protocols

Chapter 2: Configuring Network Protocols Guide to MCSE 70-291, Enhanced 2-1 Chapter 2: Configuring Network Protocols Objectives After reading the chapter and completing the exercises, students should be able to: Understand TCP/IP addressing Define

More information

Lab - Connect to a Router for the First Time

Lab - Connect to a Router for the First Time Introduction In this lab, you will configure basic settings on a wireless router. Recommended Equipment A computer with Windows installed An Ethernet NIC installed Wireless router Ethernet patch cable

More information

ASTi ACE Studio VM Quick Start Guide. Document: DOC-01-ASVM-QSG-4

ASTi ACE Studio VM Quick Start Guide. Document: DOC-01-ASVM-QSG-4 500 A Huntmar Park Drive ASTi ACE Studio VM Quick Start Guide Document: DOC-01-ASVM-QSG-4 Advanced Simulation Technology inc. 500A Huntmar Park Drive, Herndon, Virginia, 20170 USA Revision L (September

More information

Before you start the lab exercises see the lab administrator or EEE3080F tutor to get assigned to your routers.

Before you start the lab exercises see the lab administrator or EEE3080F tutor to get assigned to your routers. EEE00F Lab Basics of the Network Lab Student Lab Manual Before you start the lab exercises see the lab administrator or EEE00F tutor to get assigned to your routers. Contents. Resources used in the labs...

More information

MOC 20410C: Installing and Configuring Windows Server 2012

MOC 20410C: Installing and Configuring Windows Server 2012 MOC 20410C: Installing and Configuring Windows Server 2012 Course Overview This course provides students with the knowledge and skills to implement a core Windows Server 2012 infrastructure in an existing

More information

MOC 6420A: Fundamentals of Windows Server 2008 Network and Applications Infrastructure

MOC 6420A: Fundamentals of Windows Server 2008 Network and Applications Infrastructure MOC 6420A: Fundamentals of Windows Server 2008 Network and Applications Infrastructure Course Number: 6420A Length: 5 Day(s) Certification Exam This course is associated with Exam 70-642 TS: Windows Server

More information

Step-by-Step Configuration

Step-by-Step Configuration Step-by-Step Configuration Kerio Technologies C 2001-2006 Kerio Technologies. All Rights Reserved. Printing Date: May 3, 2006 This guide provides detailed description on configuration of the local network

More information

Step-by-Step Configuration

Step-by-Step Configuration Step-by-Step Configuration Kerio Technologies Kerio Technologies. All Rights Reserved. Release Date: March 16, 2007 This guide provides detailed description on configuration of the local network which

More information

The Internet Protocol. IP Addresses Address Resolution Protocol: IP datagram format and forwarding: IP fragmentation and reassembly

The Internet Protocol. IP Addresses Address Resolution Protocol: IP datagram format and forwarding: IP fragmentation and reassembly The Internet Protocol IP Addresses Address Resolution Protocol: IP datagram format and forwarding: IP fragmentation and reassembly IP Addresses IP Addresses are 32 bit. Written in dotted decimal format:

More information

IT220 Network Standards & Protocols. Unit 8: Chapter 8 The Internet Protocol (IP)

IT220 Network Standards & Protocols. Unit 8: Chapter 8 The Internet Protocol (IP) IT220 Network Standards & Protocols Unit 8: Chapter 8 The Internet Protocol (IP) IT220 Network Standards & Protocols REMINDER Student Evaluations 4 Objectives Identify the major needs and stakeholders

More information

CS 3201 Computer Networks 2014/2015 Handout: Lab 4

CS 3201 Computer Networks 2014/2015 Handout: Lab 4 CS 3201 Computer Networks 2014/2015 Handout: Lab 4 Lab Content: - IP Addressing - IP Ports TCP/IP Fundamentals TCP/IP Settings - TCP/IP is a protocol that requires a little bit of knowledge to configure

More information

1/18/13. Network+ Guide to Networks 5 th Edition. Objectives. Chapter 10 In-Depth TCP/IP Networking

1/18/13. Network+ Guide to Networks 5 th Edition. Objectives. Chapter 10 In-Depth TCP/IP Networking Network+ Guide to Networks 5 th Edition Chapter 10 In-Depth TCP/IP Networking Objectives Understand methods of network design unique to TCP/IP networks, including subnetting, CIDR, and address translation

More information

Configuring IP addressing

Configuring IP addressing Contents Configuring IP addressing 1 Overview 1 IP address classes 1 Special IP addresses 2 Subnetting and masking 2 Assigning an IP address to an interface 3 Configuration guidelines 3 Configuration procedure

More information

Computer to Network Connection

Computer to Network Connection Computer to Network Connection Network Installation Steps Having a clear understanding of all the steps required to physically building a network improves the success of a project. You may need to install

More information

Network+ Guide to Networks 5 th Edition. Chapter 10 In-Depth TCP/IP Networking

Network+ Guide to Networks 5 th Edition. Chapter 10 In-Depth TCP/IP Networking Network+ Guide to Networks 5 th Edition Chapter 10 In-Depth TCP/IP Networking Objectives Understand methods of network design unique to TCP/IP networks, including subnetting, CIDR, and address translation

More information

Internet Protocol Addressing and Routing. Redes TCP/IP

Internet Protocol Addressing and Routing. Redes TCP/IP Internet Protocol Addressing and Routing Redes TCP/IP Internet Topology Internet - WAN Gateway or router Physical Network (LAN) internet LAN LAN LAN Dotted Decimal Notation 2 7 2 6 2 5 2 4 2 3 2 2 2 1

More information

INF204x Module 1 Lab 1: Configuring and Troubleshooting Networking Part 1

INF204x Module 1 Lab 1: Configuring and Troubleshooting Networking Part 1 INF204x Module 1 Lab 1: Configuring and Troubleshooting Networking Part 1 Estimated Time: 90 minutes Your organization plans to implement IPv6 in their existing Active Directory environment including Windows

More information

Full file at

Full file at ch02 True/False Indicate whether the statement is true or false. 1. IP addresses have links to domain names to make it possible for users to identify and access resources on a network. 2. As a frame moves

More information

Chapter 3 LAN Configuration

Chapter 3 LAN Configuration Chapter 3 LAN Configuration This chapter describes how to configure the advanced LAN features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. This chapter contains the following sections

More information

Module 1: Allocating IP Addressing by Using Dynamic Host Configuration Protocol

Module 1: Allocating IP Addressing by Using Dynamic Host Configuration Protocol Contents Module 1: Allocating IP Addressing by Using Dynamic Host Configuration Protocol Overview 1 Multimedia: The Role of DHCP in the Network Infrastructure 2 Lesson: Adding and Authorizing the DHCP

More information

Network+ Guide to Networks

Network+ Guide to Networks Yarmouk University Providing Fundamental ICT Skills for Syrian Refugees (PFISR) Network+ Guide to Networks Dr. Mohammad A. Al-Jarrah jarrah@yu.edu.jo In-Depth TCP/IP Networking Understand methods of network

More information

I m InTouch Installation Guide for the DSL/Cable environment with a Linksys router Models: BEFSRU31, BEFSR41 V.2, BEFSR11

I m InTouch Installation Guide for the DSL/Cable environment with a Linksys router Models: BEFSRU31, BEFSR41 V.2, BEFSR11 I m InTouch router configuration p. 1 I m InTouch Installation Guide for the DSL/Cable environment with a Linksys router Models: BEFSRU31, BEFSR41 V.2, BEFSR11 Note: Different models may vary slightly

More information

Port Forwarding Setup (NB7)

Port Forwarding Setup (NB7) Port Forwarding Setup (NB7) Port Forwarding Port forwarding enables programs or devices running on your LAN to communicate with the internet as if they were directly connected. This is most commonly used

More information

CCNA Semester 1 labs. Part 2 of 2 Labs for chapters 8 11

CCNA Semester 1 labs. Part 2 of 2 Labs for chapters 8 11 CCNA Semester 1 labs Part 2 of 2 Labs for chapters 8 11 8.1.4.6 Lab - Calculating IPv4 Subnets 8.1.4.8 Lab - Designing and Implementing a Subnetted IPv4 Addressing Scheme 8.2.1.5 Lab - Designing and Implementing

More information

TEEAL. TEEAL Configuration and Setup. Configuration & network setup for new TEEAL machines. Written By: The TEEAL Team

TEEAL. TEEAL Configuration and Setup. Configuration & network setup for new TEEAL machines. Written By: The TEEAL Team TEEAL TEEAL Configuration and Setup Configuration & network setup for new TEEAL machines Written By: The TEEAL Team INTRODUCTION This guide will walk you through the steps to configure TEEAL. Before proceeding

More information

IT Department. Basic WIFI Troubleshooting on ACC SSID. October 2017

IT Department. Basic WIFI Troubleshooting on ACC SSID. October 2017 October 2017 IT Department Basic WIFI Troubleshooting on ACC SSID Many times WIFI issues can be solved with a few simple fixes. Some of the most common example are below: Symptom 1 Desired Wireless network

More information

Computer Networking Fundamentals

Computer Networking Fundamentals Job Ready Assessment Blueprint Computer Networking Fundamentals Test Code: 4414 / Version: 01 Measuring What Matters Specific Competencies and Skills Tested in this Assessment: PC Principles Identify physical

More information

The flow of transferring the machining programs of the server PC and starting an automatic operation is as below.

The flow of transferring the machining programs of the server PC and starting an automatic operation is as below. CONTENTS 1 OUTLINE... 1 2 OVERALL FLOW... 1 3 NETWORK CONNECTION... 1 4 SETTING EXAMPLE... 1 5 SET SERVER PC... 2 5.1 Windows 7... 2 5.1.1 Install IIS... 2 5.1.2 Set IIS... 4 5.1.3 Set firewall... 9 5.1.4

More information

Selected Sections of Applied Informatics

Selected Sections of Applied Informatics Selected Sections of Applied Informatics M.Sc. Marcin Koniak koniakm@wt.pw.edu.pl http://www2.wt.pw.edu.pl/~a.czerepicki Based on lecture: Dr inż. Andrzej Czerepicki a.czerepicki@wt.pw.edu.pl 2018 Lecture

More information

LAB 8 ANSWER KEY CONFIGURING A WINDOWS SERVER 2008 MACHINE

LAB 8 ANSWER KEY CONFIGURING A WINDOWS SERVER 2008 MACHINE LAB 8 ANSWER KEY CONFIGURING A WINDOWS SERVER 2008 MACHINE This lab contains the following exercises: Exercise 8.1 Exercise 8.2 Exercise 8.3 Installing Active Directory Creating Users and Groups Joining

More information

Computer Networks/DV2 Lab

Computer Networks/DV2 Lab Computer Networks/DV2 Lab Room: BB 219 Additional Information: http://ti.uni-due.de/ti/en/education/teaching/ss18/netlab 1. Practical Training: Network planning and installation of a file server 2. Practical

More information

Guidelines of Ethernet for Using a Star Dvice. - Windows - Rev. 2.0

Guidelines of Ethernet for Using a Star Dvice. - Windows - Rev. 2.0 Guidelines of Ethernet for Using a Star Dvice - Windows - Rev. 2.0 Guidelines for Using a Star Ethernet Device on Windows The star dvice s IP address must be set in advance to use a star device that supports

More information

Networking Basics. Crystal Printer Network Installation Guidelines

Networking Basics. Crystal Printer Network Installation Guidelines Networking Basics & Crystal Printer Network Installation Guidelines 1. Overview This guide is intended to provide the necessary basic knowledge of wireless networking needed to enable the Crystal printer

More information

The identifier used in the IP layer of the TCP/IP protocol suite to identify each device connected to the Internet is called the Internet address or

The identifier used in the IP layer of the TCP/IP protocol suite to identify each device connected to the Internet is called the Internet address or CBCN4103 The identifier used in the IP layer of the TCP/IP protocol suite to identify each device connected to the Internet is called the Internet address or IP address. An IP address is a 32-bit address

More information

DeploymentManager Ver6.5

DeploymentManager Ver6.5 DeploymentManager Ver6.5 Tool Reference Guide - Second Edition - Rev.001 Contents Introduction... 4 Target Audience and Purpose... 4 Document Structure... 4 Documentation Guidelines for DeploymentManager

More information

Yong Peng High School System Documentation PC Section

Yong Peng High School System Documentation PC Section Yong Peng High School System Documentation PC Section Kent Ong Date: 26 May 2008 System Engineer Revision 1 Liew Toh Seng System Consultant Table of Contents Preface...1 Network Configuration (Manual Configuration)...1

More information

TCP/IP Fundamentals. Introduction. Practice Practice : Name. Date Period

TCP/IP Fundamentals. Introduction. Practice Practice : Name. Date Period Name Date Period TCP/IP Fundamentals Introduction For the Network+ Certification exam, you should be able to identify the class of an IP address, an APIPA IP address, and a private IP address as well as

More information

TCP/IP CONFIGURATION 3-6

TCP/IP CONFIGURATION 3-6 TCP/IP CONFIGURATION 3. Type IPCONFIG /RENEW and press the Enter key. Verify that your IP Address is now 192.168.2.xxx, your Subnet Mask is 255.255.255.0 and your Default Gateway is 192.168.2.1. These

More information

Chapter 3 LAN Configuration

Chapter 3 LAN Configuration Chapter 3 LAN Configuration This chapter describes how to configure LAN Setup, LAN Groups and Routing (Static IP) features of your ProSafe VPN Firewall 50. These features can be found under the Network

More information

Kaseya 2. User Guide. Version 1.0

Kaseya 2. User Guide. Version 1.0 Kaseya 2 Imaging & Deployment User Guide Version 1.0 August 16, 2011 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations.

More information

MOC 20410B: Installing and Configuring Windows Server 2012

MOC 20410B: Installing and Configuring Windows Server 2012 MOC 20410B: Installing and Configuring Windows Server 2012 Course Overview This course is part one of a three-part series that provides the skills and knowledge necessary to implement a core Windows Server

More information

Setting up RadioSky Spectrograph (RSS) Software to Stream Data

Setting up RadioSky Spectrograph (RSS) Software to Stream Data Setting up RadioSky Spectrograph (RSS) Software to Stream Data There are several configurations of Modems and Routers they may be separate boxes, or both located in a single box. They reside between the

More information

Create a Dual Stack Virtual Private Cloud (VPC) in AWS

Create a Dual Stack Virtual Private Cloud (VPC) in AWS Create a Dual Stack Virtual Private Cloud (VPC) in AWS Lawrence E. Hughes 5 November 2017 This recipe assumes you already have an AWS account. If you don t there is a lot of information online (including

More information

Top-Down Network Design

Top-Down Network Design Top-Down Network Design Chapter Six Designing Models for Addressing and Naming Copyright 2010 Cisco Press & Priscilla Oppenheimer Guidelines for Addressing and Naming Use a structured model for addressing

More information

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols Guide to Networking Essentials, 6 th Edition Chapter 5: Network Protocols Objectives Describe the purpose of a network protocol, the layers in the TCP/IP architecture, and the protocols in each TCP/IP

More information

Lab DHCP Client Setup

Lab DHCP Client Setup Lab 9.3.5 DHCP Client Setup Objective The purpose of this lab is to introduce Dynamic Host Configuration Protocol (DHCP) and the process for setting up a network computer as a DHCP client to use DHCP services.

More information

Lab 2.8.2: Challenge Static Route Configuration

Lab 2.8.2: Challenge Static Route Configuration Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway BRANCH HQ ISP PC1 PC2 Web Server Fa0/0 S0/0/0 Fa0/0 S0/0/0 S0/0/1 209.165.201.2 255.255.255.252 Fa0/0 209.165.200.225

More information

Port Forwarding Setup (RTA1025W Rev2)

Port Forwarding Setup (RTA1025W Rev2) Port Forwarding Setup (RTA1025W Rev2) Port Forwarding Port forwarding enables programs or devices running on your LAN to communicate with the internet as if they were directly connected. This is most commonly

More information

Application Note Startup Tool - Getting Started Guide

Application Note Startup Tool - Getting Started Guide Application Note Startup Tool - Getting Started Guide 07 July 2008 Startup Tool Table of Contents 1 INGATE STARTUP TOOL...1 2 STARTUP TOOL INSTALLATION...2 3 CONNECTING THE INGATE FIREWALL/SIPARATOR...5

More information

Binary Octet to Decimal Format Conversion

Binary Octet to Decimal Format Conversion IP Address An IP (Internet Protocol) address is a unique address that different computers on a computer network use to identify and communicate with one another. An IP address is used as an identifier

More information

Lesson 1: Preparing for Installation

Lesson 1: Preparing for Installation 2-2 Chapter 2 Installing Windows XP Professional Lesson 1: Preparing for Installation When you install Windows XP Professional, the Windows XP Professional Setup program allows you to specify how to install

More information

WA2342 NoSQL Systems Comparison. Lab Server VM Setup Guide. Web Age Solutions Inc. Copyright Web Age Solutions Inc. 1

WA2342 NoSQL Systems Comparison. Lab Server VM Setup Guide. Web Age Solutions Inc. Copyright Web Age Solutions Inc. 1 WA2342 NoSQL Systems Comparison Lab Server VM Setup Guide Web Age Solutions Inc. Copyright Web Age Solutions Inc. 1 Table of Contents Part 1 - Minimum Hardware Requirements...3 Part 2 - Minimum Software

More information

8 Administering Groups

8 Administering Groups 8 Administering Groups Exam Objectives in this Chapter: Plan a security group hierarchy based on delegation requirements. Plan a security group strategy. Why This Chapter Matters As an administrator, you

More information

Windows Server 2003 { Domain Controller Installation and Configuration}

Windows Server 2003 { Domain Controller Installation and Configuration} Windows Server 2003 { Domain Controller Installation and } Benedikt Riedel MCSE + Messaging www.go-unified.com www.siemens.com/open Benedikt.riedel@siemens.com Start up the prepared Windows Server 2003

More information

FIGURE 3. Two-Level Internet Address Structure. FIGURE 4. Principle Classful IP Address Formats

FIGURE 3. Two-Level Internet Address Structure. FIGURE 4. Principle Classful IP Address Formats Classful IP Addressing When IP was first standardized in September 1981, the specification required that each system attached to an IP-based Internet be assigned a unique, 32-bit Internet address value.

More information

Network+ Guide to Networks 7 th Edition

Network+ Guide to Networks 7 th Edition Network+ Guide to Networks 7 th Edition Chapter 10 Network Segmentation and Virtualization 2016 Cengage Learning. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in

More information

Computer Networks/DV2 Lab

Computer Networks/DV2 Lab Computer Networks/DV2 Lab Room: BB 219 Additional Information: http://www.fb9dv.uni-duisburg.de/ti/en/education/teaching/ss18/netlab 1. Practical Training: Network planning and installation of a file server

More information

User Guide NAS 3.0 Adapter (NAS30U2)

User Guide NAS 3.0 Adapter (NAS30U2) T E C H N O L O G I E S User Guide NAS 3.0 Adapter (NAS30U2) www.addonics.com v5.1.11 Technical Support If you need any assistance to get your unit functioning properly, please have your product information

More information

CS 356 Lab #1: Basic LAN Setup & Packet capture/analysis using Ethereal

CS 356 Lab #1: Basic LAN Setup & Packet capture/analysis using Ethereal CS 356 Lab #1: Basic LAN Setup & Packet capture/analysis using Ethereal Tasks: Time: 2:00 hrs (Task 1-6 should take 45 min; the rest of the time is for Ethereal) 1 - Verify that TCP/IP is installed on

More information

Evolution 2.0 & Affiniti AOS 1.5 Network Share Direct Connect

Evolution 2.0 & Affiniti AOS 1.5 Network Share Direct Connect Evolution.0 & Affiniti AOS. Network Share Direct Connect QuickGuide Create a folder anywhere on the computer, including the desktop. Creating a Shared Folder on a PC Only the shared folder will be accessible

More information

Application Note 3Com VCX Connect with SIP Trunking - Configuration Guide

Application Note 3Com VCX Connect with SIP Trunking - Configuration Guide Application Note 3Com VCX Connect with SIP Trunking - Configuration Guide 28 May 2009 3Com VCX Connect Solution SIP Trunking Table of Contents 1 3COM VCX CONNECT AND INGATE... 1 1.1 SIP TRUNKING SUPPORT...

More information

HP LeftHand SAN Solutions

HP LeftHand SAN Solutions HP LeftHand SAN Solutions Support Document Installation Manuals VSA 8.0 Quick Start - Demo Version Legal Notices Warranty The only warranties for HP products and services are set forth in the express warranty

More information

Chapter 8: Subnetting IP Networks CCENT Routing and Switching Introduction to Networks v6.0

Chapter 8: Subnetting IP Networks CCENT Routing and Switching Introduction to Networks v6.0 Chapter 8: Subnetting IP Networks CCENT Routing and Switching Introduction to Networks v6.0 CCNET v6 13 Chapter 8 - Sections & Objectives 8.1 Subnetting an IPv4 Network Explain how subnetting segments

More information

The Interconnection Structure of. The Internet. EECC694 - Shaaban

The Interconnection Structure of. The Internet. EECC694 - Shaaban The Internet Evolved from the ARPANET (the Advanced Research Projects Agency Network), a project funded by The U.S. Department of Defense (DOD) in 1969. ARPANET's purpose was to provide the U.S. Defense

More information

Linux System Administration

Linux System Administration IP Addressing Subnetting Objective At the conclusion of this module, the student will be able to: Describe how packets are routed from one network to another Describe the parts and classes of IPv4 address

More information

Deployment Guide: Routing Mode with No DMZ

Deployment Guide: Routing Mode with No DMZ Deployment Guide: Routing Mode with No DMZ March 15, 2007 Deployment and Task Overview Description Follow the tasks in this guide to deploy the appliance as a router-firewall device on your network with

More information