Home
        Part II: Building Your Own Network
         Contents
1.                aS  Figure 18 10   Manually  sharing a    folder  OK   cona   Ao                     Advanced Sharing x    M Share this folder           Limit the number of simultaneous users to    w777    Figure 18 11  JE     Setting the    share name   x  ce   roo                     Chapter 18  Managing Network Storage 2 13      If you want to specify permissions now  click the Permissions button     This brings up a dialog box that lets you create permissions for  the share  For more information  see the next section     Granting  permissions          Click OK     The folder is now shared     Granting permissions    When you first create a file share  all users are granted read only access to  the share  If you want to allow users to modify files in the share or allow them  to create new files  you need to add additional permissions  Here   s how to do  this via the Share and Storage Management console     1     Choose Start gt Administrative Tools gt Share and Storage Management     The Share and Storage Management console appears       Right click the share you want to set permissions for  choose    Properties  and then click the Permissions tab     The dialog box  as shown in Figure 18 12  appears  This dialog box lets  you set the permissions for the share itself or the NTFS permissions for  the folder being shared       Click the Share Permissions button     The dialog box  as shown in Figure 18 13  appears  This dialog box lists  all the users and groups to whom you 
2.               2 14 Part Ill  Getting Connected    Figure 12 10   The HR Web  site appears  in the IIS  Manager   eS       6  In the Host Header text box  enter the exact DNS name you want to  use for the site     For example  enter hr  lowewriter pri     7  Click OK     The newly created Web site appears beneath the Sites node in the IIS  Manager  as shown in Figure 12 10     8  Close the IIS Manager     9  Create a Web page to display in the folder you created in Step 1     For this example  I used Notepad to create a text file named default   htm  with the following text      lt HTML gt    lt BODY gt      lt H1l gt Welcome to the HR Web Site  lt  H1 gt      lt  BODY gt    lt  HTML gt        10     Choose Start gt Administrative Tools gt DNS     This brings up the DNS Manager  as shown in Figure 12 11     11     In this example  I navigated to LoweWriter pri          Inthrnet Information Services  11S  Manager    In the navigation pane  navigate to the node for your domain                                         Go      gt  senvenot  gt  sites  gt  HR  gt   Die View Hep  C   HR Home    83 O e paa ika H   B  Sites      4    Default web site ms    om 2 tal  E   D a o    Authentication Compression Default Directory  Document Browsing      es  4  8  amp  F  Frroe Pages Handler HTTP ISAPI Filters  Mappings Respo     i JE F  a  Logging MIME Types Modules Output  Caching Rules  SSL Settings      aj Eej  Ready  frstart            E internet information          Bvt    Browse Web Sit
3.             cscccssssssesseesscesscssscesscenscessecssesssesseesneesaness 229    Using a Virtual Private Network  0         cccceccccesssscsseeeeeeeeneecseeesseeessneessaees 231    Table of Contents xiii       Part IV  Network Management For Dummies                  233    Chapter 16  Welcome to Network Management                   235  What a Network Administrator Does             cccccecesseeseeeeseeeeeeeeeeeeeeseeneeaees 235  Picking a Part Time Administrator   and Providing the Right Resources            ecceeseceseeeeseeeeeeeeesneessneeeeseeees 237  Documenting the Network  ssi  s 00  i00s erie kiden he sedaeseeiviieaiide tees 238  Performing Routine Chores          ccccceccesceseesesseeeeceeceeeeseeseeseceeeeeeeeseeseeaeens 239  Maniasing Network US6rs iii sissescscetscsssscesseesoeedovevsasasesancdansesiiansendersecouecesctees 240  Acquiring Software Tools for Network Administrators               c c008 241  Building a LIDKANy sveisecsscisvcssvacesssseciissecnedsanegidysseestoestiers RAS EGRE 243  Pursuing Certification         cccccccecscssesssesseceeeessessecssecssecseeceseesseeseeeseeeseees 244   Chapter 17  Managing Windows User Accounts                  245  Understanding Windows User ACCOUNMS            ccsccceseeeseeeesseeseeeeseneessnees 245   Local accounts versus domain ACCOUMS          ceseeseceseeeteeteeeeneeees 245  User AC COUNE Properties x  si 2  0cs2eseeses esectcewsncvdeesteedaeenadedoutesecsgsoneceaee 246  Creating a New Usel ovseint ennie oeer r E E
4.        Networking    Learn to        Get More and Do More at Dummies com     Start with FREE Cheat Sheets    cee Cheat Sheets include  Ge e Checklists  e Charts   Common Instructions  e And Other Good Stuff     To access the Cheat Sheet created specifically for this book  go to  www dummies com cheatsheet networking       Get Smart at Dummies com  Dummies com makes your life easier with 1 000s   of answers on everything from removing wallpaper  to using the latest version of Windows     Check out our  e Videos  e Illustrated Articles  e Step by Step Instructions        Plus  each month you can win valuable prizes by entering  our Dummies com sweepstakes       Want a weekly dose of Dummies  Sign up for Newsletters on    Digital Photography  e Microsoft Windows  amp  Office  e Personal Finance  amp  Investing  e Health  amp  Wellness  e Computing  iPods  amp  Cell Phones  e eBay  e Internet  e Food  Home  amp  Garden    Find out    HOW    at Dummies com     Sweepstakes not currently available in all countries  visit Dummies com for official rules     Networking    FOR    DUMMIES    OTH EDITION       by Doug Lowe    Wiley Publishing  Inc     Networking For Dummies    9th Edition  Published by   Wiley Publishing  Inc    111 River Street   Hoboken  NJ 07030 5774    www wiley com   Copyright    2010 by Wiley Publishing  Inc   Indianapolis  Indiana  Published by Wiley Publishing  Inc   Indianapolis  Indiana  Published simultaneously in Canada    No part of this publication may be re
5.       ceeecceseeeseeeseceeeeseeeseeeeeeeeeeeneesnes 116   Understanding Network Address Translation                 cecceseesseseeeeeeeeeeees 116   Configuring Your Network for DHCP            ccceceesseseeeeeseeeeeeeeeeeeeeeseseeneeaes 117  Understanding DHCP esinte ae tances aR aR ies ETEEN 117  DHCP SeryerS ooieoe r E E R ied eaeedeeaecne 118  Understanding SCOP  S   sesceisi iesenii eieiaeo sieuas piisi 119  Feeling excluded  siisii sepeser erroreren esisi ii 120  Reservations suggested 0 0    eeccecesccesseeceseeceseeeseneeseseesseeeseeeneeess 120  How long to lease  scence aser ca e R 121   Managing a Windows Server 2008 DHCP Servel           c cccccssesseesteeseeees 122   Configuring a Windows DHCP Client            cccceesceseeeseeseesseeseeeeseeeeeeseeees 124   USINE DNS sssrin eneee E les tdae udder casadestactcasrsuaecsteasanePeetdzaveaate 125  Domains and domain NAMES sissien iii i 125  Fully qualified domain naMes           ce eeesseeseeseceneceneeeseeeseeeeeenneesaes 127   Working with the Windows DNS Servel            c cescesesseeseeeeeeeeeseeeeseeseeeees 128   Configuring a Windows DNS Client             cccccesceeseeseeeeeseeeeeeeeeeeeeeeeeeaeeaes 129   Chapter 7  Setting Up a Server              0 00c eee e eee eee eee 131   Network Operating System Features            cccceceeseeseeseeseeeeeeeeeeeeseeseeeeaeees 131  Network  SUPPOFt ssi  fesseis  detect cszacesdesachedeeeetacetedescncncdeseevadedenve stench these 132  Pile Sharing S CVICES scrissi ireset s
6.     7  Click OK     The group is created     Adding a member to a group    Groups are collections of objects  called members  The members of a group  can be user accounts or other groups  When you create a group  it has   no members  As a result  the group isn   t useful until you add at least one  member     Follow these steps to add a member to a group     1  Log on as an administrator     You must have administrator privileges to perform this procedure     Chapter 17  Managing Windows User Accounts 2 5 7       2  Choose Start gt Administrative Tools   Active Directory Users and  Computers     The Active Directory Users and Computers management console  appears     3  Open the folder that contains the group to which you want to add  members and then double click the group     The Group Properties dialog box appears   4  Click the Members tab     The members of the group are displayed  as shown in Figure 17 9        fis rroveries TE    General Members   Member Of   Managed By                  es  Figure 17 9   Adding  members to  a group  Lx   aa   Aah     e  5  Type the name of a user or other group that you want to add to this  group and then click Add   The member is added to the list   6  Repeat Step 5 for each user or group that you want to add   Keep going until you   ve added everyone   7  Click OK   That   s all there is to it   ar    The Group Properties dialog box also has a Member Of tab that lists each  group that the current group is a member of     258 Part IV 
7.     File sharing o Of    When file sharing is on  files and printers that you have shared from this computer can be  accessed by people on the network       Turn on file sharing      Turn off fije sharing    Seeako l    Apply    2 Opt Public folder charing     Printer shanng w       ar    Ea  Figure 3 4   Enabling file  and printer  sharing in  Windows 7     Chapter 3  More Ways to Use Your Network 45    Enabling File and Printer Shaving   Windows 7     Here are the steps to enable file and printer sharing     1  Click the Start button  type Advanced Sharing Settings  and press  Enter     This step opens the Advanced Sharing Settings page  which lists net   work settings for each of the networks you   re connected to  For a home  computer  two networks are listed  Home or Work  and Public  For   a computer connected to a domain network  a third network named  Domain is listed     2  Click the down arrow next to the network you want to enable file and  printer sharing for     For a home computer  click the down arrow next to Home or Work  For a  computer connected to a domain network  click the down arrow next to  Domain     Figure 3 4 shows the settings for a Domain network  The settings for a  Home or Work network are the same     Do not enable file or printer sharing for the Public network        fore teal      yi    e    Network and Sharing Center    Advanced sharing settings    4g     Search Contrat Pane pl       Change sharing options for different network profiles    Wi
8.     Share   Cancel       Chapter 3  More Ways to Use Your Network 4 9    5  Click the arrow in the drop down list  choose Everyone  and then  click Add     This action designates that anyone on your network can access the  shared folder     If you prefer  you can limit access to just certain users  To do so  select  each person you want to grant access to and then click Add     6  Select the level of access you want to grant each user     You can use the drop down list in the Permission Level column to  choose from three levels of access     e Reader  A reader can open files but can   t modify or create new files  or folders     e Contributor  A contributor can add files to the share but can change  or delete only her own files     e Co Owner  A co owner has full access to the shared folder  He can  create  change  or delete any file in the folder     7  Click Share     A confirmation dialog box appears to confirm that the folder has been  shared     Using the Public Folder in Windows  Vista and Windows 7    Windows Vista and Windows 7 include an alternative method of sharing files  on the network  the Public folder  The Public folder is simply a folder that   s  designated for public access  Files you save in this folder can be accessed by  other users on the network and by any user who logs on to your computer     Before you can use the Public folder  you must enable it  In Windows 7    just follow the steps listed in the section    Enabling File and Printer Sharing   Windo
9.     ear   lier in this chapter     2  After you   re sure that all users have logged off  shut down the net   work server     Behave like a good citizen if possible     decently and in order  For  Windows servers  choose the Start   Shut Down command     298 Part IV  Network Management For Dummies    ar    RY    NING        Windows Server doesn   t let you shut down the server without providing  a reason for the shutdown  When you press Ctrl Alt Delete  a dialog box  appears requiring you to provide the reason for the shutdown     3  Reboot the server computer  or turn it off and then on again   Watch the server start up  to make sure that no error messages appear   4  Tell everyone to log back on and make sure that everyone can now  access the network     Remember this advice when you consider restarting the network server     Restarting the network server is more drastic than restarting a client  computer  Make sure that everyone saves their work and logs off the  network before you do it  You can cause major problems if you blindly  turn off the server computer while users are logged on     Obviously  restarting a network server is a major inconvenience to every  network user  Offer treats     Looking at Event Logs    One of the most useful troubleshooting techniques for diagnosing network  problems is to review the network operating system   s built in event logs   These logs contain information about interesting and potentially troublesome  events that occur during the d
10.    A detailed inventory of your computer equipment  Table 16 1 provides  a sample checklist you can use to keep track of your computer equipment     A System Information printout for each computer  Choose Start  All Programs   dAccessories   System Tools   System Information     A detailed list of network shares and standard drive assignments   Don   t just list the name of each network share  provide a brief descrip   tion of each share   s purpose as well     Any other information that you think may be useful  Give details about  how you must configure a particular application program to work with the  network and copies of every network component   s original invoice     just  in case something breaks and you need to seek warranty service    Backup schedules  Include a schedule of when each server is backed up   NNG  and an explanation of the tape rotation schedule     Never put passwords in the binder     Chapter 16  Welcome to Network Management 239       Table 16 1 Computer Equipment Checklist       Computer location        User        Manufacturer        Model number        Serial number        Date purchased   CPU type and speed   Memory              Hard drive size   Video type   Printer type              Other equipment        Operating system version        Application software and version   Network card type   MAC address           aS Even if you keep track of the information in your network binder by using    a spreadsheet or database program  keep a printed copy
11.    Network performance problems are among the most difficult network prob   lems to track down and solve  If a user simply can   t access the network  it  usually doesn   t take long to figure out why  The cable is unplugged  a net   work card is malfunctioning  or the user doesn   t have permission to access  the resource  for example  After you do a little investigating  the problem usu   ally reveals itself  and you fix it and move on to the next problem     2 78 Part IV  Network Management For Dummies       Unfortunately  performance problems are messier  Here are just a few  reasons that network administrators hate performance problems     Performance problems are difficult to quantify  Exactly how much  slower is the network now than it was a week ago  a month ago  or even  a year ago  Sometimes the network just feels slow  but you can   t quite  define exactly how slow it really is     Performance problems usually develop gradually  Sometimes a net   work slows down suddenly and drastically  More often  though  the  network gradually gets slower  a little bit at a time  until one day its  users notice that the network is slow     Performance problems often go unreported  Users gripe about the  problem to each other around the water cooler  but they don   t for   mally contact you to let you know that the network seems 10 percent  slower than usual  As long as they can still access the network  they just  assume that the problem is temporary or that they   re imagining 
12.    au     v  Fie Server  Distributed File System    _  DFS Namespaces   C  DES Replication   File Server Resource Manager  vices for Network File System  ows Search Service               _  File Replication Service  LJ Indexing Service          indaws Server 2003 File Services    Description     manages shared folders  and enables users to access files on    this computer from the network         lt  Previous   Next  gt    instal   Cancel         150 Partit  Building Your Own Network       5  Select the services you want to install     Again  you can select each service to see a brief text description of the  service  For example  if you select the File Server service  the following  text is displayed     File Server manages shared folders and enables users  to access files on this computer from the  network     6  Click Next     A confirmation page appears  listing the roles and services you   ve  selected     7  Click Install     Windows installs the server role and its services  A progress screen  is displayed during the installation so you can gauge the installation   s  progress  When the installation finishes  a final results page is displayed     8  Click OK     You   re done     Chapter 8    Configuring Windows XP   Vista  and 7 Clients    In This Chapter    Configuring network connections for Windows clients  Setting the computer name  description  and workgroup  Joining a domain    Setting logon options    Be  your network setup is complete  you must configure the n
13.    s notice  By break  I don   t neces   sarily mean to physically break in two  Although some broken cables look  like someone took pruning shears to the cable  most cable problems aren   t  visible to the naked eye     You can quickly tell whether the cable connection to the network is good   by looking at the back of your computer  Look for a small light located near  the spot where the cable plugs in  if this light is glowing steadily  the cable is  good  If the light is dark or it   s flashing intermittently  you have a cable prob   lem  or a problem with the network card or the hub or switch that the other  end of the cable is plugged into      Chapter 20  Solving Network Problems 29      If the light isn   t glowing steadily  try removing the cable from your computer  and reinserting it  This action may cure the weak connection     Hopefully  your network is wired so that each computer is connected  to the network with a short  six feet or so  patch cable  One end of the  patch cable plugs into the computer  and the other end plugs into a  cable connector mounted on the wall  Try quickly disconnecting and  reconnecting the patch cable  If that doesn   t do the trick  try to find a  spare patch cable that you can use     1  Switches are prone to having cable problems  too     especially switches  that are wired in a    professional manner    involving a rat   s nest of patch  cables  Be careful whenever you enter the lair of the rat   s nest  If you  need to replace a p
14.   1     Make sure that your computer and all devices attached to it are  plugged in     Computer geeks love it when a user calls for help and they get to tell  that person that the computer isn   t plugged in or that the power strip  it   s plugged into is turned off  They write it down in their geek logs so  that they can tell their geek friends about it later  They may even want  to take your picture so that they can show it to their geek friends   Most     accidents    involving computer geeks are a direct result of this kind of  behavior  Try to be tactful when you ask a user whether he   s sure that  the computer is turned on      2  Make sure that your computer is properly connected to the network     3  Note any error messages that appear on the screen     4  Check the free disk space on your computer and on the server     When a computer runs out of disk space or comes close to it  strange  things can happen  Sometimes you get a clear error message indicating  such a situation  but not always  Sometimes the computer just grinds toa  halt  operations that used to take a few seconds now take a few minutes       Do a little experimenting to find out whether the problem is indeed a    network problem or just a problem with the computer itself     See the section     Time to Experiment     later in this chapter  for some  simple things that you can do to isolate a network problem       Try restarting the computer     An amazing number of computer problems are cleared up by
15.   All that changed a few years ago when cellular providers began adding data  capabilities to their networks  Now  cellphones can have complete mobile  Internet access  This has resulted in sophisticated PDA features being added  to mobile phones and phone features being added to PDAs so that the dis   tinctions are now blurred     The term mobile device is used to describe a wide assortment of devices that  you can hold in one hand and that are connected through a wireless network   The term handheld is a similar generic name for such devices  The following  list describes some of the more common specifics of mobile devices     Mobile phone  A mobile phone  or cellphone  is a mobile device whose  primary purpose is to enable phone service  Most mobile phones  include features such as text messaging  address books  appointment  calendars  games  and may provide Internet access     Smartphone  A smartphone is a mobile phone with advanced features  that aren   t typically found on mobile phones  There   s no clearly drawn  line between mobile phones and smartphones  One distinction is  whether the phone can provide integrated access to corporate e mail   The screen on a smartphone is typically bigger than the screen on a  traditional cellphone  but the device still resembles a cellphone with a  keyboard located beneath the screen     Personal Digital Assistant  PDA   A PDA is a handheld device whose  main function is to provide Personal Information Management  PIM   application
16.   In most cases  you   re better off using a  dedicated firewall router because these devices provide better security fea   tures than the built in Windows firewall does  Still  the built in firewall is suit   able for home networks or very small office networks     Here are the steps that activate the built in firewall in Windows XP or Vista     1  Choose Start gt Control Panel   The Control Panel appears   2  Click the Windows Firewall icon     This step opens the Windows Firewall dialog box  Figure 10 2 shows the  Windows Vista version     3  Select the On  Recommended  option   This option enables the firewall    4  Click OK   That   s all there is to it        MP Windows Firewall Settings xe    General   Exceptions   Advanced    Windows Frewal can help prevent hackers or malicous software from gaining  access to your Computer through the Internet or a network     vu    On  recommended   This setting blocks al outside sources from connecting to this  computer  except for those unblocked on the Exceptions tab   Block all incoming connections  Select this opton when you Connect to less secure networks  Al    exceptions wil be ignored and you wil not be notified when  Windows Firewall blocks programs     X  Off  not recommended     Avoid using ths setting  Turning off Windows Firewall wil make this  computer more vulnerable to hackers or malicous software     iW           1      Tellme more about these sermos    Ca  Cons             For Windows 7  the procedure is a bit diff
17.   Lets the user access her Exchange mailbox  from a Web browser rather than from an Outlook client  With this fea   ture enabled  the user can read e mail from any computer that has an  Internet connection      POP3  Enables Internet e mail using the POP3 protocol   1     IMAP4  Enables Internet e mail using the IMAP4 protocol        Herter   Caen   Creare   Seni   a    ee ie      Garsas   Aeiteas   tecocerd   Profle   Teiphorea   Cigencotce    Ema Adder d l a a a          Feb  Ta  F  i  Ee a   ra dim   d7 Ure inba hieman Erabied  f misd Roiorara Enabled  J Putas  iP adc be Crab amg peaa chal meu  a POP Ernabksj aisy prakanana  aP Eval  uira rakini hed il  aay      pa  Figure 11 3  bia  The brimi igang a p r ie prepre  Exchange  Features  tab              The Exchange Advanced tab    The Exchange Advanced tab  as shown in Figure 11 4  lets you configure vari   ous advanced features of Exchange  The following list describes these features     Simple Display Name  Lets you specify a display name that   s used by  computers that can   t display the full display name  You probably won   t  have to mess with this unless you have computers that can   t display  ASCII characters    Hide from Exchange Address Lists  Select this option to prevent this  user from appearing in address lists  This option is useful for mailboxes  that you don   t want to be widely known     Downgrade High Priority Mail Bound for X 400  This option is compat   ible with the original X 400 standard  which w
18.   Pause Printing  Choose the same command again to release  the job from its state of frustration and print it out  already     a Chapter 2  Life on the Network 39    To delete a print job  Select the job and choose Document   Cancel  Printing     To stop the printer  Choose Printer   Pause Printing  To resume  choose  the command again     To delete all print jobs  Choose Printer   Purge Print Documents     To cut to the front of the line  Drag to the top of the list the print job  that you want to print     All these tips apply to your print jobs only  Unfortunately  you can   t capri   ciously delete other people   s print jobs     The best thing about Windows printer management is that it shelters you  from the details of working with different network operating systems   Whether you print on a NetWare printer  a Windows 2003 network printer   or a shared Windows printer  the Printer window icon manages all print  jobs in the same way     Logging Off the Network    MBER  we   amp     After you finish using the network  log off  Logging off the network makes the  network drives and printers unavailable  Your computer is still physically  connected to the network  unless you cut the network cable with pruning  shears  it   s a bad idea     don   t do it    but the network and its resources are  unavailable to you     Here are a few other tips to keep in mind when you log off     After you turn off your computer  you   re automatically logged off the  network  After you star
19.   Public network location settings  v    Turn on Windows Firewall  Block all incoming connections  including those in the list of allowed programs    V  Notify me when Windows Firewall blocks a new program   x  Tum off Windows Firewall  not recommended   PCS  Figure 10 3   Activating  the  firewall in  Windows 7  E n  geGancetos   E            92 Part Ill  Getting Connected       I also recommend you leave the Notify Me When Windows Firewall  Blocks a New Program option enabled  That way you ll be notified when  the firewall blocks a suspicious program     6  Click OK     The firewall is enabled     Note that the firewalls included with Windows Vista and Windows 7 have  additional options you can configure  However  I recommend against fiddling  with those options unless you   ve taken an upper division college course in  computer security     Do not enable the Windows Internet firewall if you   re using a separate firewall  router to protect your network  Because the other computers on the network  are connected directly to the router and not to your computer  the firewall  doesn   t protect the rest of the network  Additionally  as an unwanted side  effect  the rest of the network will lose the capability of accessing your  computer     Beginning with Windows XP Service Pack 2  the firewall is turned on by  default  If your computer is already behind a firewall  disable the Windows  firewall that   s enabled by Service Pack 2     Chapter 11    Managing E Mail with  Exchange
20.   Terminal Services Profle   come      General   Address   Account   Profile   Telephones   Orpanizaton      P  Teodore Oever           CS          Last name   Geaver    Display name  theodore Cleaver             OK   ance   Apply   Help      The following sections describe some of the administrative tasks that you  can perform via the various tabs of the User Properties dialog box     Changing the user   s contact information    Several tabs of the User Properties dialog box contain contact information for    the user     1     Address  Lets you change the user   s street address  post office box  city     state  zip code  and so on     Telephones  Lets you specify the user   s phone numbers     Organization  Lets you record the user   s job title and the name of his    boss     Setting account options    The Account tab of the User Properties dialog box  as shown in Figure 17 6   features a variety of interesting options that you can set for the user  From  this dialog box  you can change the user   s logon name  In addition  you can  change the password options that you set when you created the account and    set an expiration date for the account     Chapter 17  Managing Windows User Accounts 2 5            eaoreCeaver onertice TE  MemberOf   Diolin       Environment   Sessions    Remote control    TemmnalServicesProiie   come    General   Address Account   Profle   Telephones   Organization       LoweWriter pri 7   User logan name  pre Windaws 2000     LOWEWRITERS tcloav
21.   The Physical Layer doesn   t define any particular meaning  for those signals other than the basic binary values 0 and 1  The higher levels  of the OSI model must assign meanings to the bits transmitted at the Physical  Layer     One type of Physical Layer device commonly used in networks is a repeater   A repeater is used to regenerate signals when you need to exceed the cable  length allowed by the Physical Layer standard or when you need to redis   tribute a signal from one cable onto two or more cables     An old style 10BaseT hub is also a Physical Layer device  Technically  a hub  is a multi port repeater because its purpose is to regenerate every signal  received on any port on all the hub   s other ports  Repeaters and hubs don   t  examine the contents of the signals that they regenerate  If they did  they   d  be working at the Data Link Layer  not at the Physical Layer  Which leads me  io DE    Layer 2  The Data Link Layer    The Data Link Layer is the lowest layer at which meaning is assigned to   the bits that are transmitted over the network  Data link protocols address  things  such as the size of each packet of data to be sent  a means of address   ing each packet so that it   s delivered to the intended recipient  and a way to  ensure that two or more nodes don   t try to transmit data on the network at  the same time        as  Figure 30 1   Displaying  the MAC  address   of your  network  adapter        Chapter 30  Layers of the OSI Model 39 7    The Data
22.   This part is all about network security  backing up your data  protecting  your network from evil people who want to break your network   s back  and  hardening your network against threats  such as viruses and spyware     Part VI  Beyond Windows    There   s more to networking than Windows  That   s why this part focuses on  the two most popular alternatives  Linux and Macintosh     Part VII  The Part of Tens    This wouldn   t be a For Dummies book without a collection of lists of interest   ing snippets  ten networking commandments  ten things you should keep in  your closet  ten big network mistakes  and more     Icons Used in This Book       MBER    C     Re    NING           Those nifty little pictures in the margin aren   t there just to pretty up the  place  They also have practical functions     Hold it     technical details lurk just around the corner  Read on only if you  have a pocket protector     Pay special attention to this icon  it lets you know that some particularly  useful tidbit is at hand     perhaps a shortcut or a little used command that  pays off big     Did I tell you about the memory course   took     Danger  Will Robinson  This icon highlights information that may help you  avoid disaster     5    6 Networking For Dummies  9th Edition       Where to Go from Here    Yes  you can get there from here  With this book in hand  you   re ready to  plow right through the rugged networking terrain  Browse through the Table  of Contents and decide where y
23.   an exclusion  range lets you punch a hole in a scope  The IP addresses that fall within the  hole aren   t assigned     Here are a couple of reasons to exclude IP addresses from a scope     The computer that runs the DHCP service itself must usually have  a static IP address assignment  As a result  the address of the DHCP  server should be listed as an exclusion     You may want to assign static IP addresses to your other servers  In  that case  each server IP address should be listed as an exclusion     Reservations are often a better solution to this problem  as I describe in  the next section     Reservations suggested    In some cases  you may want to assign a specific IP address to a particular   host  One way to do this is to configure the host with a static IP address so  that the host doesn   t use DHCP to obtain its IP configuration  However  two  major disadvantages to that approach exist     TCP IP configuration supplies more than just the IP address  If you  use static configuration  you must manually specify the subnet mask   default gateway address  DNS server address  and other configuration  information required by the host  If this information changes  you have  to change it not only at the DHCP server but also at each host that you  configured statically     ar    ar    Chapter 6  Dealing with TCP IP   2      You must remember to exclude the static IP address from the DHCP  server   s scope  Otherwise  the DHCP server doesn   t know about the  static addr
24.   and E   Each of the first three classes  A through C  uses a different size for the net   work ID and host ID portion of the address  Class D is for a special type of  address called a multicast address  Class E is an experimental address class  that isn   t used     The first four bits of the IP address are used to determine into which class a  particular address fits   If the first bit is a zero  the address is a Class A address     If the first bit is one and the second bit is zero  the address is a Class B  address     If the first two bits are both one and the third bit is zero  the address is a  Class C address     If the first three bits are all one and the fourth bit is zero  the address is  a Class D address     If the first four bits are all one  the address is a Class E address     170 Partit  Building Your Own Network       Because Class D and E addresses are reserved for special purposes  I focus  the rest of this discussion on Class A  B  and C addresses  Table 6 1 summa     rizes the details of each address class              Table 6 1 IP Address Classes  Class Address Starting Length of Number of Number of  Range Bits Network ID Networks Hosts  1 126 x y z 0 8 126 16 777 214  B 128 191 x y z 10 16 16 384 65 534  C 192 223 x y z 110 24 2 097 152 254    Class A addresses    Class A addresses are designed for very large networks  In a Class A address   the first octet of the address is the network ID  and the remaining three  octets are the host ID  Because onl
25.   confidential files  322  configuration settings   troubleshooting  292  Confirm Installation Selections page   208 209  Connect To dialog box  163  connections  checking  290 291  connectors  89 90  97  99  contact information  user  250  330  contributor permission level  49  co owner permission level  49  copy backups  314  cordless phones  171  counters  performance  285  Create Samba Share dialog box  370  crimp tool  87  89 90  crossover cables  91  CSMA CD  carrier sense multiple access  with collision detection   170  custom attributes  197  cycles per second  167 168    Index 403       e    o    daily backups  310  314  daisy chaining  91  94 96  DAT  digital audio tape   310  data encryption  135  Data Link Layer  OSI model  396 397  data theft  322  database servers  71  Datacenter version   Windows Server 2008  136  decimal system  106  dedicated line  187  default gateway address  120  default Web site  210 211  deleting files  18  delivery options  194  delivery restrictions  194  Dell PowerVault NF500  260  desktop  GNOME  359  Device Manager  66  DHCP  Dynamic Host Configuration  Protocol   configuring for WAP  179  DNS client  configuring  129  exclusions  120  lease duration  121 122  overview  117 118  reservations  120 121  scopes  119 120  servers  118 119  123  Windows client  124  for Windows Server 2008  122 124  DHCP Client service  296  DHCP management console  123 124  DHCP options  118  diagnostic commands  241 242  diagram  network  72 73  238  d
26.   dedicated versus peer to peer servers  69  diagrams  drawing  72 73  infrastructure  71 72  inventory of current computers  65 68  need for network  analyzing  64 65  NOS  choosing  71  overview  63 64  sample plans  73 78  server types  69 71  plenum cable  85  PocketPC  222  pointer  PTR  record  128  POP3 protocol  196  ports  94  339 340  power management  154  PowerQuest PartitionMagic program  356  PowerVault NF500  Dell  260  prefabricated cables  86  Preferred Networks section  Properties  dialog box  180  Presentation Layer  OSI model  399  Print command  34  Print dialog box  37  print queue  37 39  print servers  70    print spooling  34  279  Printer Sharing option  Network and  Sharing Center  43  printers  34 39  50 53  66  374  Printers and Faxes folder  51 52  Printers folder  35  52  printouts  System Information  238  private IP address  116 117  processor  65  280  Product Activation feature  Microsoft  146  product key  141  144  profile  user  252 253  programs  See also specific programs by name  browsing network from  29 30  inventory  68  licenses  390  Linux  352  manuals  302  memory leak  286  sharing  13 14  properties  user account  246  Properties dialog box  folder  271 273  hard drive size  66 67  Mobile Services  223 224  network protocols  66  Offline Files tab  60  scope  123  sharing folders  46 48  sharing printers  51 53  TCP IP  124  129  User  193 196  249 253  Windows network connections   152 156  158  wireless peer 180 181  protoco
27.   ing procedures show you how to work with a DHCP server in Windows Server  2008  The procedures for other operating systems are similar     If you haven   t already installed the DHCP server on the server  open the Manage  Your Server application  choose Start   Administrative Tools  Manage Your  Server   click Add or Remove a Role  select DHCP Server from the list of roles   click Next  and then complete the New Scope Wizard to create the first scope  for the DHCP server  This wizard asks you to enter a name and description for  the scope  Then it asks for the basic IP address range information for the  scope  as shown in Figure 6 2     Add Scope x     A scopeis arange of possible IP addresses for a network  The DHCP server cannot  fully distribute IP addresses to clients until a scope is created     Scope Name  ffice   Starting IP Address   pasim  Ending IP Address  fisz  168 250  Subnet Mask   255 255 2550    Defauit Gateway  optional   fisz         0tt         i     S  Subnet Type   Wired  lease duration willbe 6 days      IV fActivate thes scope        Coax J u               After you enter the starting and ending IP addresses for the range and the  subnet mask used for your network  click OK  The wizard then asks for any  IP addresses you want to exclude from the scope  the lease duration  the  default is 8 days   the IP address of your gateway router  the domain name  for your network  and the IP addresses for the DNS servers you want the    Chapter 6  Dealing with TC
28.   ingenious network managers at large companies figured out that  although the Web is interesting for distributing public information to the  world  the Web is even better for distributing private information within   a company  Thus  the idea of intranets was born  An intranet is a network  that   s built by using the same tools and protocols that are used by the global  Internet but applied instead to an organization   s internal network     204 Part Ill  Getting Connected       ar Think of an intranet as a small  private version of the World Wide Web  Anyone  who connects to your local area network  LAN  can access your intranet  The  intranet is accessed by using a Web browser  such as Internet Explorer or  Firefox  However  users don   t need an Internet connection because the  information on the intranet is stored on the company   s server computers  rather than on a computer that must be accessed from the Internet     The intranet is analogous to a closed circuit television system  which can be  viewed only by people within the organization that owns the system  In con   trast  the Internet is more like cable television in that anyone who   s willing to  pay  20 or so per month can watch     Here are two interesting but contradictory points of view about the signifi   cance of intranets     1  Some computer industry pundits say that intranets are more popular  than the Internet  For example  many companies that sell Web develop   ment tools make more money selling soft
29.   network should be able to connect to your cabled network     Figure 9 3 shows how an access point acts as a central connection point for  wireless computers and how it bridges your wireless network to your wired  network     Infrastructure mode    When you set up a wireless network with an access point  you   re creating an  infrastructure mode network  It   s called infrastructure mode because the access  point provides a permanent infrastructure for the network  The access points  are installed at fixed physical locations  so the network has relatively stable  boundaries  Whenever a mobile computer wanders into the range of one of the  access points  it has come into the sphere of the network and can connect        Notebook E    rer   II T 1 1 1 L NEI                                        Wireless 10BaseT  R E Access Switch  Point          Notebook       Computer    Wireless Network 10BaseT Network    Chapter 9  Wireless Networking 1 15       An access point and all the wireless computers that are connected to it are  referred to as a Basic Service Set  or BSS  Each BSS is identified by a Service  Set Identifier  or SSID  When you configure an access point  you specify the  SSID that you want to use  The SSID is often a generic name such as wireless   or it can be a name that you create  Some access points use the MAC address  of the WAP as the SSID     Multifunction WAPs    ay  Wireless access points often include other built in features  For example  some  access point
30.   new user   Sa    2  Right click the domain that you want to add the user to and then  choose New   User     This summons the New Object     User Wizard  as shown in Figure 17 2   3  Type the user   s first name  middle initial  and last name     As you type the name  the New Object     User Wizard automatically fills  in the Full Name field       Active Directory Users and Computers let x  Fle Action View Help  es Alm CORI ocslbmsanrae    Active Directory Users and Comput   Name                   Description  Duilt in account for admini       E D  Saved Queries   E j LoweWriter pri   Members in this group can        E Bult   Members of this group are     5  Computers      Members in this group can       Members who have admini       Members who have view         DNS Administrators Group     DNS cients who are permi       Designated administrators       All workstations and serve        All domain controllers in th       Al domain guests     All domain users     Designated administrators       Members of this group are       Members in this group can     Built in account for guest     Buft n account for anony       Servers in this group can        Members of this group are       Designated administrators               SSS  a  sarj   5m  amp     Active Directory iser  eRe Bt 9 18PM          New Object   User    2 Create in  LoweWnter pn Users       User logon name       Lowe Writer pri v  User logon name  pre Windows 2000     JLOWEWRITER             24 8 Part IV  Network Mana
31.   such as the operating system folders or  installed program folders  You can then back up those folders on a less regu   lar basis  The drives and folders that you select for a backup operation are  collectively called the backup selection     Table 22 1 How Backup Types Use the Archive Bit                   Backup Type Selects Files Based Resets Archive Bits  on Archive Bit  after Backing Up    Normal No Yes   Copy No No   Daily No  No   Incremental Yes Yes   Differential Yes No     Selects files based on the Last Modified date     Chapter 22  Backing Up Your Data 3 13       The archive bit would   ve made a good Abbott and Costello routine      All right   I wanna know who modified the archive bit        What        Who        No  what        Wait  a minute       just tell me what   s the name of the guy who modified the archive  bit        Right         Normal backups    A normal backup  or a full backup  is the most basic type of backup  Ina  normal backup  all files in the backup selection are backed up     regardless  of whether the archive bit has been set  In other words  the files are backed  up even if they haven   t been modified since the last time they were backed  up  When each file is backed up  its archive bit is reset  so backups that  select files based on the archive bit setting won   t back up the files     When a normal backup finishes  none of the files in the backup selection will  have their archive bits set  As a result  if you immediately follow a n
32.   this one is tough  You don   t want to pick  something obvious  like Password  Administrator  or your last name  On  the other hand  you don   t want to type something random that you ll  later forget because you ll be in a big pickle if you forget the administra   tor password     ai  Make up a complex password consisting of a mix of uppercase and  lowercase letters  some numerals  and a special symbol or two  then  write it down and keep it in a secure location where you know that it  won t get lost     Networking protocols  You almost always need to install the TCP IP pro   tocol  the Microsoft network client protocol  and file and printer sharing   Depending on how the server will be used  you may want to install other  protocols as well     TCP IP configuration  You need to know which IP address to use for the  server  Even if your network has a DHCP server to dynamically assign IP  addresses to clients  most servers use static IP addresses     Domain name  You need to know the domain name for the network     Making Final Preparations    Before you begin the installation  take a few more steps     Clean up the server   s disk by uninstalling any software that you don   t  need and removing any old data that   s no longer needed  This step is  especially important if you   re converting a computer that   s been in use  as a client computer to a server  You probably don   t need Microsoft  Office or a bunch of games on the computer after it becomes a server     Do acompl
33.   upgraded  network                     24 port 10BaseT Hub             Chapter 5    Oh  What a Tangled Web We  Weave  Cables  Adapters   and Other Stuff    In This Chapter  Getting a whiff of Ethernet  Checking out the different types of network cable  Installing twisted pair cable  Working with hubs and switches  Installing network interface cards    Mulling over other devices  such as repeaters  bridges  and routers       able is the plumbing of your network  In fact  working with network   cable is a lot like working with pipe  You have to use the right pipe   cable   the right valves and connectors  switches and routers   and the right  fixtures  network interface cards      Network cables have one more advantage over pipes  You don   t get wet when  they leak        This chapter tells you far more about network cables than you probably need  to know  I introduce you to Ethernet  the most common system of network  cabling for small networks  Then you find out how to work with the cables  used to wire an Ethernet network  You also find out how to install a network  interface card  which enables you to connect the cables to your computer     What Is Ethernet     Ethernet is a standardized way of connecting computers to create a network        Part Il  Building Your Own Network       L STY   Rs ky   gt     Worthless filler about network topology    A networking book wouldn t be complete  without the usual textbook description of the  three basic network topologies  One type
34.   work administration  If you have more than a few dozen computers on your  network  consider investing in server based software that   s designed to  simplify the process  For example  Lumension  www  lumension com  is   a server based program that collects software patches from a variety of  manufacturers and lets you create distributions that are automatically  pushed out to client computers  With software like Lumension  you don   t  have to rely on end users to download and install patches  and you don   t  have to visit each computer individually to install patches     348 Part V  Protecting Your Network       Part VI  Beyond Windows       The 5th Wave By Rich Tennant                   Ironically  he went out there looking for  a    hot spot        In this part       A Ithough Bill Gates might be reluctant to admit it     Windows isn   t the only operating system now used  on personal computers  The two chapters in this part  introduce you to the basics of networking with the two  most popular alternatives to Windows  Linux and  Macintosh        Chapter 25  Networking with Linux       In This Chapter    Finding out about Linux and how it differs from Windows    Choosing which version of Linux to use for your server    Installing Linux as well as configuring network settings and user accounts    Using Samba to create a file server    ar    Lin the free operating system based on Unix  is a popular alternative to  Windows Server  especially for specific applications such a
35.  2007       In This Chapter  Creating user mailboxes  Configuring Outlook to work with Exchange  Viewing a different mailbox    A Ithough not strictly a part of Windows Server 2008  Exchange Server  2007 is the mail server software that   s used on most Windows net   works  Yes  I know Microsoft doesn   t call Exchange Server a mail server    It   s a messaging and collaboration server  But the basic reason for Exchange  Server   s existence is e mail  The other messaging and collaboration features  are just icing on the cake     In this chapter  you discover how to perform the most commonly requested  maintenance chores for Exchange Server  such as how to create a new mailbox   grant a user access to an additional mailbox  and deal with mailbox size limits     Managing Mailboxes    When you create a new user by using the Add User Wizard from the Server  Management Console  an Exchange mailbox is automatically created for the  new user  As a result  you don   t usually have to create Exchange mailboxes  separately  But on occasion  you may need to modify some aspect of a user   s  Exchange configuration     Several tabs of the user account Properties dialog box let you manage basic  mailbox settings  To summon this dialog box  choose Start   Administrative  Tools   Active Directory Users and Computers  Then  drill down to the user      9h Part Ill  Getting Connected    eS  Figure 11 1   The  Exchange  General tab   pe uI        account you need to modify and double click it  
36.  225  IPSec  232  IPv6  Internet Protocol version 6   112  ISP  Internet Service Provider   185    oK o    key Windows Services  296 297  keyhole saw  88    efe    labels  cable  86 87  LAN  local area network   11 12  103  lease duration  119  121 122  LED indicators  94  library  network administrator  302 303  licenses  13  14  141  Link indicator light  94  linking drives  31 34  Linux  See also Samba  command shell  360  GNOME  358 359  installing  355 356  logging off  358  logging on  356 358  network configuration  362 365  overview  137  351  selecting distribution  354 355  shutting down  358  user accounts  managing  360 362  versus Windows  351 353  Linux Mandriva  354  List Folder Contents permission  261  Local Area Connection properties  dialog box  42   43  local area network  LAN   11 12  103  local backups  316 317  local drives  26  local printer  35  local resources  21 22  local user accounts  163  245 246  locks  physical  324  log files  285  logging off  39  358  logical addressing  398  logical AND operation  114  logical map  72  logical operations  107  logon  24 25  146  162 163  331  356 358  logon scripts  252 253  258  334 335  Lumension progam  347    ele    MAC  Media Access Control  address   102  121  397  Mac OS X Server  137  372    406    Networking For Dummies  9th Edition    Macintosh networking  configuring Mac  373  files  sharing  374  Mac OS X Server  372  network printer  accessing  374  overview  371  with PCs  375 376  protocols 
37.  371 372  shared files  accessing  375  magazines  network related  243  303  mail servers  70  mailboxes  Exchange 2007  193 194   199 202  mainframe computers  17 18  Manage Your Server application  122  128  manuals  141  302  mapping network drives  31 34  55  Media Access Control  MAC  address  102   121  397  members  adding to groups  256 257  memory  66  280  286  Microsoft Office  53 58  Microsoft Office Resource Kit  53  Microsoft Outlook  197 199  201 202  Microsoft Product Activation feature  146  Microsoft System Information program  67  Microsoft TechNet Web site  53  Microsoft Visio  72 73  238  Microsoft Windows  See specific entries  beginning with Windows  migration path  236  mirrors  133  mobile devices  221 227  Modify permission  261  monitor  computer  290  monitoring programs  284  motherboard  16  mount point  353  multiboot installation  138 139  142  multicast address  109  multifunction routers  103  118  multifunction wireless access points   175 177  multi port repeater  396  multitasking  133  multiuser operating system  352  My Computer window  4  My Network Places  29 30    eNe    NAS  Network Attached Storage   260  NAT  network address translation    116 117          NetBoot  372  NetScout Systems Sniffer program  242  NetWare  155  347  376  network address translation  NAT    116 117  network administrator  certification  pursuing  244  documentation  238 239  facing difficult situations  304 305  finding advice  304  keeping up with indus
38.  Addresses tab    The E mail Addresses tab of the User Properties dialog box  as shown in  Figure 11 2  displays the e mail addresses that are associated with a user  account  If an e mail address has been incorrectly assigned  you can use this  dialog box to change it  Just select the incorrect e mail address  click the Edit  button  and enter the correct e mail address  You can also add or remove an    e mail address from this dialog box         Figure 11 2   The E mail  Addresses  tab    SSS S           Hest   Can   Demi   Sedo   fleece corel    ee ee   Eai l  Eades   bpeann   bhard      Eh ead hier ipp ha are deel iy ben Ta gharg the  diei Hiki mi n ba lee  eed bean kh Daar Peres       Harr parij ee k orn  raip teeth bral  Ka cee  See gee eet Cegerereds as mha    CE   news a     FF dsiaaboaip upih eral echo ered on reopen pete       Ce  eea   i jo l    The Exchange Features tab    Figure 11 3 shows the Exchange Features tab of the user Properties dialog  box  which lets you configure optional Exchange features for the user  The  following paragraphs describe these features     Outlook Mobile Access  Lets the user access Exchange data from a  mobile device  such as a cellphone or PDA     1  User Initiated Synchronization  Lets the user start a synchronization  operation  which updates the mobile device   s data from the data on the    Exchange server   Up to Date Notifications  Enables automatic synchronizations       96 Part Ill  Getting Connected       Outlook Web Access
39.  B Download and install updates Checked for Updates  Never  Installed Updates  Never     Customize This Server P  Customizing your server  Add roles Roles  None Mal  TF Donat show this window at logon Cose      start    3       Gi Initial Configuration Tasks Ril 10 17PM          145      G   Partit  Building Your Own Network       Life after Setup    After the Setup program completes its duty  you still have several tasks to  complete before your server is ready to use  The following sections describe  these post installation chores     Logging on    After the Setup program restarts your computer for the last time  you must  log on to the server by using the Administrator account     1  Press Ctrl Alt Delete to open the Log On to Windows dialog box     2  Type the password you created for the Administrator account during  setup     3  Click OK to log on     Windows grinds and whirs for a moment while it starts up and then dis   plays the familiar Windows desktop     Activating Windows    The Microsoft Product Activation feature is designed to prevent you from  installing an illegal copy of Windows or other Microsoft software products   After you install a product  you have 30 days to activate it  If you don   t acti   vate the product within 30 days  it stops working  To prevent that from hap   pening  activate the software immediately after installing it     Fortunately  activating a Windows server operating system is easy to do  if you have a working Internet connection  Wi
40.  Connect using different credentials       Cancel         32    Part I  Let s Network      SEs  Figure 2 6   Browsing  for the  folder   to map   aaa       3   Optional  Change the drive letter in the Drive drop down list     You probably don   t have to change the drive letter that Windows selects   in Figure 2 5  drive Z   If you   re picky  though  you can select the drive  letter from the Drive drop down list     4  Click the Browse button     This step summons the dialog box  as shown in Figure 2 6                 Browse For Folder eS    Select a shared network folder             Gu Network    Ml DOUGES10    4 pM SERVEROL     netlogon      Project      sysvol  jm WK09 001          5  Use the Browse for Folder dialog box to find and select the shared    folder you want to use     You can navigate to any shared folder on any computer in the network       Click OK     The Browse for Folder dialog box is dismissed  and you return to the  Map Network Drive dialog box  refer to Figure 2 5         Optional  If you want this network drive to be automatically mapped    each time you log on to the network  select the Reconnect at Logon  check box     If you leave the Reconnect at Logon check box deselected  the drive  letter is available only until you shut down Windows or log off the net   work  If you select this option  the network drive reconnects automati   cally each time you log on to the network     Be sure to select the Reconnect at Logon check box if you use the net   wo
41.  FOr   0       eececeeeeceecceceeseeseeseeeeeeeeeseeseeneeaees 204   What You Need to Set Up an Intranet           cccceececsseeseeesseseeeseesseeseeeseees 205   How to Set Up an IIS Web Servet              ccsccsssssssessecseessesssecssesssesseesseessnees 205   How to Create a Simple Intranet Page  0        c ccc eescesecssecsseceeesseeseeeseeeseees 210   Creating Web Sites              cccssssssesssssssesscescessecsseessesssesssesssessesseeseesseeesaeeaes 212  Chapter 13  Is It a Phone or a Computer   Or  Understanding   VoIP and Convergence                cccee ence een eee e eens 217   Understanding VOIP sic sistecesescecesdecssciea enik erison rinner vised RnS VETRE E E Etana 217   Advantages  Of VOIP iroitti i E ETS EEEE EANES 219   Disadvantages Of VOIP  3s   lt 3 ssascscecsnesissiveeesncestebeses vasdsesseaadesseatieasSausesveoadeavenaie 220   Popular VolP Providers isco seeecis oes sis snes cossctvesstovetsacdesesenswecsseaseessdscteseeveereets 220   Chapter 14  Dealing with Mobile Devices                        221   The Many Types of Mobile Devices  0          cccccscsssceeeseceeseeesseeesseeessneensnees 221   Configuring Exchange for iPhone and Windows Mobile Devices            223   Configuring BlackBerry Devices             cccesessesseeceeseeeeeseeseeeeseeeeeeseeseeneeaes 225   Considering Security for Mobile Devices             cceseeseesseeseeseeeseeeteesseeees 226   Chapter 15  Connecting from Home                   0000ee eee 229   Using Outlook Web ACCESS 
42.  Folders y  I Saved Games   J sysvol   gt  E Searches  lt           Chapter 2  Life on the Network 3      available on your network  You can then click one of the computers to access  its shared drives and folders     Mapping Network Drives           ag  Figure 2 5   The Map  Network  Drive   dialog box         S way    If you often access a particular shared folder  you may want to use the spe   cial trick known as mapping to access the shared folder more efficiently   Mapping assigns a drive letter to a shared folder  Then you can use the drive  letter to access the shared folder as though it were a local drive  In this way   you can access the shared folder from any Windows program without having  to browse the network     For example  you can map a shared folder named Data on the server named  SERVERO1 Files to drive K on your computer  Then  to access files stored in  the shared Data folder  you look on drive K     To map a shared folder to a drive letter in Windows 7 or Windows Vista   follow these steps   1  Choose StartComputer   The Computer window opens   2  Click the Map Network Drive button located on the toolbar     This action summons the Map Network Drive dialog box  as shown in  Figure 2 5               amp  Q  Map Network Drive    What network folder would you like to map     Specify the drive letter for the connection and the folder that you want to connect to     Drive  Z vj          Folder    Browse        xample    server share    V  Reconnect at logon   
43.  For  example  Figure 2 10 shows the Print dialog box for WordPad     the free text   editing program that comes with Windows  The available printers are listed  near the top of this dialog box  Choose the network printer from this list and  then click OK to print your document  That   s all there is to it        cmePint aa  General   Select Printer   RP Xerox Phaser 6200N on SCRVEROL       m      Status Ready Print to fle  Preferences    Location   r  Comment Find Printer  j    Page Range      A Number of copies  1  Pages  1 65535 ol   Fnter either a single page number or a single 1   page range  For example  5 12    2 3  4 3        Bit    Conees    Playing with the print queue    After you send your document to a network printer  you usually don   t have  to worry about it  You just go to the network printer and     voila      your  printed document is waiting for you     38 Part I  Let s Network     SSS  Figure 2 11   Managing a  print queue    Dn       That   s what happens in the ideal world  In the real world  where you and I  live  all sorts of things can happen to your print job between the time you  send it to the network printer and the time it prints     1  You discover that someone else already sent a 50 trillion page report  ahead of you that isn   t expected to finish printing until the national debt  is paid off     1     The price of a framis valve suddenly goes up by  2  rendering foolish the  recommendations you made in your report     Your boss calls and te
44.  HCL for short  You can  check the HCL for your specific server by going to the Microsoft Web site at  www microsoft com whdc hcl default mspx  You can also test your  computer   s compatibility by running the Check System Compatibility option  from the Windows distribution disc     The server operating system    You also need a server operating system to install  You need either the distri   bution discs or access to a copy of them over the network  In addition to the  discs  you need these items     The product key  The installation program asks you to enter the prod   uct key during the installation to prove that you have a legal copy of the  ar  software     If you have the actual CD ROM discs  the product key should be ona  sticker attached to the case     Manuals  If the operating system came with printed manuals  keep them  handy     A startup diskette  If you   re installing on a brand new server  you need  some way to boot the computer  Depending on the NOS version you   re  installing and the capabilities of the server computer  you may be able  to boot the computer directly from the distribution disc  If not  you need  a floppy disk from which to boot the server     Your license type  You can purchase Microsoft operating systems on  a per server or per user basis  You need to know which plan you have  when you install the NOS   y Check the CD ROM distribution disc for product documentation and addi   tional last minute information  For example  Windows servers have
45.  However  rather than connect to the public telephone  network  your phones connect directly to the Internet  The main benefit is    2 18 Part Ill  Getting Connected    ar       reduced cost  especially if you make a lot of long distance phone calls  Most  VoIP services charge a single flat monthly rate  usually in the neighborhood  of  25  35     When you use a normal phone to make a long distance call  your voice is  transmitted  usually in digital form  over the public switched telephone net   work  or PSTN  Along the way  you   re charged by the minute fees by your long  distance service provider     When you use VoIP  your voice is still converted into digital form  However   rather than be sent over private networks owned by telephone companies  it  is sent over the Internet  Because the Internet uses the IP protocol  the digital  data that represents your voice must be converted into packets that can be  sent reliably over IP     hence the name Voice Over IP  or VoIP     Carrying telephone conversations over the Internet isn   t new  In fact  the  technology has been around for many years  Only recently has the technology  become inexpensive enough to catch on for residential service  That   s why you  may not have heard of VoIP until now     There are two basic approaches to setting up VoIP     1     Software only VoIP systems  These run on your computer and enable  you to talk free with anyone else anywhere in the world provided they   re  using the same software you
46.  I suggest  you disable the Guest account     1  Service accounts  Some network users aren   t actual people  I don   t mean  that some of your users are subhuman  Rather  some users are actually  software processes that require access to secure resources  and there   fore  require user accounts  These user accounts are usually created  automatically for you when you install or configure server software     For example  when you install Microsoft   s Web server  IIS   an Internet  user account called IUSR is created  The complete name for this account  is LUSR_ lt servername gt   So if the server is named WEBI  the account is  named ITUSR_WEB1  IIS uses this account to allow anonymous Internet  users to access the files of your Web site     Don   t mess with these accounts unless you know what you re doing   For example  if you delete or rename the IUSR account  you must recon   figure IIS to use the changed account  If you don   t  IIS will deny access  to anyone trying to reach your site   Assuming that you do know what  you re doing  renaming these accounts can increase your network   s  security  However  don   t start playing with these accounts until you   ve  researched the ramifications      User rights    User accounts and passwords are the front line of defense in the game of net   work security  After a user accesses the network by typing a valid user ID and  password  the second line of security defense     rights     comes into play     In the harsh realities of 
47.  IIS  Internet Information Services  is a free component of Windows Server  2003 and 2008  but it isn   t installed by default  After you   ve completed the  installation of Windows Server  you must add the Web Server role to enable    206    Part Ill  Getting Connected       IIS  The following procedure is for Windows Server 2008  but the procedure  for Windows Server 2003 is similar   1  Choose StartAdministrative ToolsServer Manager   The Server Manager comes to life   2  Choose Roles in the navigation pane   The roles configured for the server are displayed   3  Click Add Roles   This launches the Welcome page of the Add Roles Wizard   4  Click Next   The Select Server Roles page appears  as shown in Figure 12 1   5  Check the Web Server  IS  role and then click Next   The Web Server  IIS  page appears  as shown in Figure 12 2   6  Click Next     The Select Role Services page appears  as shown in Figure 12 3  This  page lists a variety of optional services that can be configured for IIS              x  Actve Directory Certificate Services  eave Ose in Services  G demon nsbortins setae     T TORES  L Active Directory Federation Services  Installation Results  _  Active Directory Lightweight Directory Services   L  Active Directory Rights Management Services   C Application Server  J Fax Server     C  Network Policy and Access Services   C  Print Services  C Terminal Services  e  C UDOT Services  7 C Web Server  is   Figure 12 1    windows Deployment Services  The Select ae
48.  Let s Network     ar    ar       That being said  many software manufacturers sell their software with a con   current usage license  which means that you can install the software on as  many computers as you want  but only a certain number of people can use the  software at any given time  Usually  special licensing software that runs on one  of the network   s server computers keeps track of how many people are cur   rently using the software  This type of license is frequently used with more  specialized  and expensive  software  such as accounting systems or com   puter drafting systems     Another benefit of networking is that networks enable computer users to com   municate with one another over the network  The most obvious way networks  allow computer users to communicate is by passing messages back and forth   using e mail or instant messaging programs  Networks also offer other ways to  communicate  For example  you can hold online meetings over the network   Network users who have inexpensive video cameras  Webcams  attached   to their computers can have videoconferences  You can even play a friendly  game of Hearts over a network     during your lunch break  of course     Servers and Clients    The network computer that contains the hard drives  printers  and other  resources that are shared with other network computers is a server  This  term comes up repeatedly  so you have to remember it  Write it on the back  of your left hand     Any computer that   s not a 
49.  Link Layer also provides basic error detection and correction to  ensure that the data sent is the same as the data received  If an uncorrect   able error occurs  the data link standard must specify how the node is to be  informed of the error so it can retransmit the data     At the Data Link Layer  each device on the network has an address known as  the Media Access Control address  or MAC address  This is the actual hardware  address  assigned to the device at the factory     You can see the MAC address for a computer   s network adapter by opening  a command window and running the ipconfig  all command  as shown  in Figure 30 1  In this example  the MAC address  identified as the physical  address in the output  of the network card is 00 50 BA 84 39 11            SY G  WINDOWS System32 cmd exe   0  x   perem fall    induws IP Cunf iyurat iun  Host Wane    u areco    6 coeno o o   Heug  Primary Dns Suffix                Node Type      a   6    ooo Unknown  IP Routing Enabled          5 Noe  WINS Proxy Enabled                No     Ethernet adapter Local rca Connection     Connection epecific DNS Suffix     wei client2 atthi con  Description                       D Link DFE S30TX  PCI Adapter  2  Physical Address      a o oua    o   00 50 BA 84 39 11   Dhep Enabled es   Autoconf iguration Enabled       Yes   IP Address        2 2 2 ee ee 192 168 1 1608   Subnet Mask    gt o      so             S4 255_ 255 H    Default Gateway 192 168 1 1  DHCP Server     192 168 1 1  DNE S
50.  Linux system  instead  you must find a similar program that   s  written specifically for Linux  Many Linux distributions come with an  office suite called StarOffice  which provides word processing  spread   sheet  presentation  graphics  database  e mail  calendar  and scheduling  software  Thousands of other programs are available for Linux     Windows emulator programs     the best known is Wine     can run  some Windows programs on Linux  But the emulators run only some  Windows programs  and they run them slower than they would run  on a Windows system     Linux doesn   t do Plug and Play the way Windows does  Major Linux  distributions come with configuration programs that can automatically  detect and configure the most common hardware components  but  Linux doesn   t have built in support for Plug and Play hardware devices   You re more likely to run into a hardware configuration problem with  Linux than with Windows        Chapter 25  Networking with Linux 353    Linux uses a different system for accessing disk drives and files than  Windows does  For an explanation of how the Linux file system works   see the    I can   t see my C drive     sidebar that   s coming up in this chapter     Linux runs better on older hardware than the current incarnations of       Windows do  Linux is an ideal operating system for an older Pentium       computer with at least 32MB of RAM and 2GB of hard drive space     If you   re fond of antiques  Linux can run well on even a 486 com
51.  Managemert   Securty   Device Settings  Yau can share this pnnter with other users on ynur network  The    T  printer will not be available when the computer is sleeping or turned  off     Share this printer       Drivers  If this printer is shared with users running different versions of  Windows  you may want to install additional drivers  so that the       A users do not have to find the print driver when they connect to the  Figure 3 9  shared printer   Sharing a  Faen   printer in  MORONE     PC       Using Microsoft Office on a Network    Microsoft Office is far and away the most popular suite of application pro   grams used on personal computers  and it includes the most common  types of application programs used in an office  a word processing pro   gram  Word   a spreadsheet program  Excel   a presentation program   PowerPoint   and an excellent e mail program  Outlook   Depending on  the version of Office you purchase  you may also get a database program   Access   a desktop publishing program  Publisher   a set of Ginsu knives   KnifePoint   and a slicer and dicer  ActiveSalsa      This section describes the networking features of Microsoft Office System  2007  the latest and greatest version of Office  Most of these features also  work with previous versions of Office     ay  To get the most from using Office on a network  you should purchase the  Microsoft Office Resource Kit  The Office Resource Kit  also known as ORK   contains information about installing and
52.  Mbps Voice only   2 4 Mbps 4 Mbps Token Ring   3 16 Mbps 10BaseT Ethernet   4 20 Mbps 16 Mbps Token Ring   5 100 Mbps  2 pair  100BaseT Ethernet   1000 Mbps  4 pair  1000BaseTX   5e 1000 Mbps  2 pair  1000BaseT   6 1000 Mbps  2 pair  1000BaseT and faster broadband  applications   6a 10000 Mbps  2 pair  Future standard that will provide for  10 Gbps Ethernet    What   s with the pairs     Most twisted pair cable has four pairs of wires  for a total of eight wires   Standard Ethernet uses only two of the pairs  so the other two pairs are  unused  You may be tempted to save money by purchasing cable with just  two pairs of wires  but that   s a bad idea  If a network cable develops a prob   lem  you can sometimes fix it by switching over to one of the extra pairs  If  you use two pair cable  though  you don   t have any spare pairs to use     Don   t use the extra pairs for some other purpose  such as a voice line or a  second data line  The electrical    noise    in the extra wires can interfere with  your network     To shield or not to shield    Unshielded twisted pair cable  or UTP  is designed for normal office environ   ments  When you use UTP cable  you must be careful not to route cable close  to fluorescent light fixtures  air conditioners  or electric motors  such as  automatic door motors or elevator motors   UTP is the least expensive type  of cable     In environments that have a lot of electrical interference  such as factories    you may want to use shielded twis
53.  Network Management For Dummies       Creating a Logon Script    ar    A logon script is a batch file that   s run automatically whenever a user logs  on  The most common reason for using a logon script is to map the network  shares that the user needs access to  For example  here   s a simple logon  script that maps three network shares     echo off   net use m    serverl shares admin  net use n    serverl shares mktg  net use o    server2 archives    Here  two shares on serverl are mapped to drives M and N  and a share on  server2 is mapped as drive O     Scripts should be saved in the Scripts folder  which is buried deep in the  bowels of the SYSVOL folder     typically  c    windows SYSVOL Sysvol   domainname Scripts  where domainname is your domain name  Because  you frequently need to access this folder  I suggest creating a shortcut to it on  your desktop     After you   ve created a logon script  you can assign it to a user by using the  Profile tab of the User Properties dialog box  For more information  see the  section    Setting the user   s profile information     earlier in this chapter     Chapter 18  Managing Network Storage    In This Chapter    Understanding network storage       Setting permissions  Sharing folders    Configuring and managing a file server    Q  key purpose of most computer networks is to provide shared access  to disk storage  In this chapter  you find out about several ways that a  network can provide shared disk storage  Then you discove
54.  Printers icon   2  Click the Add a Printer button on the toolbar   This step starts the Add Printer Wizard  as shown in Figure 2 8        P   AAN         ep Add Printer  What type of printer do you want to install      gt  Add a local printer  Use this option only if you don t have a USB printer   Windows automatically installs USB printers  when you plug them in        Add a network  wireless or Bluetooth printer  Make sure that your computer is connected to the network  or that your Bluetooth or wireless  printer is turned on        Cancel j       36 Part I  Let s Network     a  Figure 2 9   The Add  Printer  Wizard asks  you to pick a  printer   T    EN       3  Select the Add a Network  Wireless or Bluetooth Printer option     The wizard searches the network for available printers and displays a  list of the printers it finds  as shown in Figure 2 9        z        E  ma Add Printer    Searching for available printers       Printer Nome Address  192 168 1102       Phaser 6125N  Xerox         Stop      Ihe printer that  want isn t listed    Next Cancel       4  Click the printer you want to use     If you can   t find the printer you want to use  ask your network adminis   trator for the printer   s UNC path  which is the name used to identify the  printer on the network  or its IP address  Then click The Printer That I  Want Isn   t Listed and enter the UNC or IP address for the printer when  prompted     5  Click Next to add the printer     The wizard copies to your com
55.  These glitches  aren   t significant enough to merit a new version of the software  but they   re  important enough to require fixing  Most of the patches correct security flaws  that computer hackers have uncovered in their relentless attempts to prove  that they are smarter than the security programmers at Microsoft or Novell     Periodically  all the recently released patches are combined into a service  pack  Although the most diligent network administrators apply all patches  when they   re released  many administrators just wait for the service packs     For all versions of Windows  you can use the Windows Update Web site  to apply patches to keep your operating system and other Microsoft  software up to date  Windows Update scans your computer   s software  and creates a list of software patches and other components that you  can download and install  You can either    e Find Windows Update in the Start menu     e Fire up Internet Explorer and go to windowsupdate micro  soft com     Chapter 24  Hardening Your Network 34 7       ar    You can configure Windows Update to automatically notify you of  updates so you don   t have to remember to check for new patches        Novell periodically posts patches and updates to NetWare on its  product support Web site  support  novell com      You can subscribe to a service that automatically sends you e mail to  let you know of new patches and updates     Keeping a large network patched can be one of the major challenges of net 
56.  This type of network is an ad hoc mode network     Amore complex type of network is an infrastructure mode network  All  this really means is that a group of wireless computers can be con   nected not only to each other but also an existing cabled network via a  device called a wireless access point  or WAP   I tell you more about ad  hoc and infrastructure networks later in this chapter      A Little High School Electronics    I was a real nerd in high school  I took three years of electronics  The elec   tronics class at my school was right next door to the auto shop  Of course   all the cool kids took auto shop  and only nerds like me took electronics  We  hung in there  though  and found out all about capacitors and diodes while  the cool kids were learning how to raise their cars and install 2 gigawatt  stereo systems     It turns out that a little of that high school electronics information proves  useful when it comes to wireless networking     not much  but a little     Chapter 9  Wireless Networking       ar    You ll understand wireless networking much better if you know the meanings  of some basic radio terms     Waves and frequencies    For starters  radio consists of electromagnetic waves that are sent through  the atmosphere  You can   t see or hear them  but radio receivers can pick  them up and convert them into sounds  images  or     in the case of wireless  networks     data     Radio waves are cyclical waves of electromagnetic energy that repeat at a  part
57.  To find out  the exact name of the network interface  right click Computer in the  Start Menu and choose Properties  then click Device Manager  This  action opens the Device Manager dialog box  which lists the name of the  computer   s network interface     The Device Manager is also useful for tracking down other hardware  devices attached to the computer or for checking which device drivers  are being used for the computer   s devices     The network protocols that are in use  To determine this informa   tion in Windows XP  open the Control Panel  double click the Network  Connections icon to open the Network Connections dialog box  and  then right click the network connection and choose the Properties com   mand  In Windows Vista or Windows 7  click the Start button and type     Network Connections     then right click Local Area Connection and  choose Properties     The kind of printer  if any  that   s attached to the computer  Usually   you can tell just by looking at the printer itself  You can also tell by  examining the Devices and Printers window     Any other devices connected to the computer  A CD  DVD  or CD RW  drive  Scanner  Zip or Jaz drive  Tape drive  Video camera  Battle  droid  Hot tub     Whether driver and installation disks are available  Hopefully  you can  locate the disks or CDs required by hardware devices  such as the net   work card  printers  and scanners  If not  you may be able to locate the  drivers on the Internet     E  Figure 4 1   The  P
58.  ZAD Pin 2   Orange White     a A    Sn  Pin 3   White Green    YN Pin 6   Green White       Chapter 5  Cables  Adapters  and Other Stuff 9      Crossover cables    A crossover cable can directly connect two devices without a hub or switch   You can use a crossover cable to connect two computers directly to each  other  but crossover cables are more often used to daisy chain hubs and  switches to each other     If you want to create your own crossover cable  you must reverse the wires  on one end of the cable  as shown in Table 5 3  This table shows how you  should wire both ends of the cable to create a crossover cable  Connect one  of the ends according to the Connector A column and the other according to  the Connector B column     Note that you don   t need to use a crossover cable if one of the switches or  hubs that you want to connect has a crossover port  usually labeled Uplink or  Daisy chain  If the hub or switch has an Uplink port  you can daisy chain it by  using a normal network cable  For more information about daisy chaining hubs  and switches  see the section     Hubs and Switches     later in this chapter     If you study Table 5 3 long enough and then compare it with Table 5 2  you  may notice that a crossover cable is a cable that   s wired according to the 568A  standard on one end and the 568B standard on the other end                                Table 5 3 Creating a Crossover Cable   Pin Connector A Connector B  1 White Green White orange  2 Green Ora
59.  a  docs  folder that contains several files that have useful setup information     Other software    In most cases  the installation program should be able to automatically  configure your server   s hardware devices and install appropriate drivers   Just in case  though  dig out the driver discs that came with your devices   such as network interface cards  SCSI devices  CD ROM drives  printers  and  scanners     142 Partit  Building Your Own Network       A working Internet connection    This item isn   t an absolute requirement  but the installation goes much more  smoothly if you have a working Internet connection before you start  The  installation process may use this Internet connection for several tasks     Downloading late breaking updates or fixes to the operating system   This can eliminate the need to install a service pack after you finish  installing the NOS     Locating drivers for nonstandard devices  This one can be a big plus if  you can   t find the driver disk for your obscure SCSI card     Activating the product after you complete the installation  for  Microsoft operating systems   For more information  see the section     Activating Windows     later in this chapter     A good book    You spend lots of time watching progress bars during installation  so you  may as well have something to do while you wait     Making Informed Decisions    WING   RY    When you install an NOS  you have to make some decisions about how you  want the operating system and i
60.  also routinely backs up the contents  of the network server   s disk to tape   Yes  tape     see Chapter 22 for details    That way  if something happens to the network server  the data can be recov   ered from the backup tapes     Chapter 2  Life on the Network 29    Oh  the Network Places Vou ll Go    ee  Figure 2 2   Browsing the  network in  Windows 7   SS    Windows enables you to access network resources  such as shared folders   by browsing the network  In Windows XP  you do this by double clicking  the My Network Places icon that resides on your desktop  In Windows Vista  and Windows 7  choose Network from the Start menu  Figure 2 2 shows the  Windows 7 version of the network browser     The network shown in Figure 2 2 consists of just three computers  named  WK09 001  DOUGE510  and SERVERO1  and a router named WRT54G  You can  open either of the computers by double clicking their icons to reveal a list of  shared resources available on the computer  For example  Figure 2 3 shows  the resources shared by the SERVERO1 computer     You can also browse the network from any Windows application program  For  example  you may be working with Microsoft Word 2007 and want to open a  document file that   s stored in a shared folder on your network  All you have to  do is use the Open command to bring up the dialog box   In Office 2003  this  command is on the File menu  In Office 2007  you ll find it by clicking the Office  button   Choose Network in the list that appears in 
61.  and freeing up server disk space  Much of the task of network  administration involves making sure that things keep working  by finding  and correcting problems before users notice that something is wrong  In  this sense  network administration can be a thankless job     Gather  organize  and track the entire network   s software inventory  You  never know when something will go haywire on the ancient Windows 95  computer that Joe in Marketing uses  and you have to reinstall that old  copy of Lotus Approach  Do you have any idea where the installation  disks are     Chapter 16  Welcome to Network Management 23 7       Picking a Part Time Administrator and  Providing the Right Resources    The larger the network  the more technical support it needs  Small networks      with just one or two dozen computers     can manage with just a part time  network administrator  Ideally  this person should be a closet computer geek   someone who has a secret interest in computers but doesn   t like to admit it   someone who will take home books to read over the weekend  and someone  who enjoys solving computer problems just for the sake of solving them     MBER The job of managing a network requires some computer skills  but it isn   t  entirely a technical job  Much of the work is routine housework  Basically  the  network administrator does the electronic equivalent of dusting  vacuuming   and mopping the network periodically  to keep it from becoming a mess     Here are some resources t
62.  any  real measure of security because your neighbor could secretly switch  back to your channel and listen in on your network  You still need to  secure your network as described in Chapter 10     WEP     Mandatory or Disable  Lets you use a security protocol called  wired equivalent privacy     Chapter 9  Wireless Networking   19       ar    p    Figure 9 5   Configuring  DHCP for   a Linksys  wireless  access  point router   NE    DHCP configuration    You can configure most multifunction access points to operate as a DHCP  server  For small networks  its common for the access point also to be the  DHCP server for the entire network  In that case  you need to configure   the access point   s DHCP server  Figure 9 5 shows the DHCP configuration  page for the Linksys WAP router  To enable DHCP  select the Enable option  and then specify the other configuration options to use for the DHCP server     Larger networks that have more demanding DHCP requirements are likely to  have a separate DHCP server running on another computer  In that case  you  can defer to the existing server by disabling the DHCP server in the access  point           hap 1492 168 4 DHCP hin   Windows Intenet Explorer Jag   OG  Emio   z  44  x p     We S Bhtip 192 168 1 DHCP him a    E    Dinev eg Po    an configure tt to act as a DHCP    LUET    Enable    Disable  SOC 192 168 1  100    Number of  DHCP Users     Client Lease Time  Hi minutes  0 means one day     ONS 1           Configuring Windows XP for  
63.  anything else  it   s this  After you hook up your personal computer   PC  to a network  it   s not a    personal    computer anymore  You   re now part  of a network of computers  and in a way  you   ve given up one of the key con   cepts that made PCs so successful in the first place  independence     I got my start in computers back in the days when mainframe computers  ruled the roost  Mainframe computers are big  complex machines that used to  fill entire rooms and had to be cooled with chilled water  My first computer  was a water cooled Binford Hex Core Model 2000  Argh  argh  argh   I   m not  making up the part about the water  A plumber was often required to install a  mainframe computer  In fact  the really big ones were cooled by liquid nitro   gen  I am making up the part about the Binford 2000      Mainframe computers required staffs of programmers and operators in white  lab coats just to keep them going  The mainframes had to be carefully man   aged  A whole bureaucracy grew up around managing them     Mainframe computers used to be the dominant computers in the workplace   Personal computers changed all that  They took the computing power out  of the big computer room and put it on the user   s desktop  where it belongs   PCs severed the tie to the centralized control of the mainframe computer     18    Part I  Let s Network        With a PC  a user could look at the computer and say     This is mine     all  mine     Mainframes still exist  but they   re no
64.  ar       Ten base what     The IEEE  in its infinite wisdom  has decreed  that the following names shall be used to desig   nate the various types of cable used with 802 3  networks  in other words  with Ethernet      1    10Base5  Old fashioned thick coaxial cable   the yellow stuff      The number 5 in 10Base5 is the maximum  length of a yellow cable segment  500  meters     Y 10Base2  Thin coaxial cable  Thinnet      The number 2 in 10Base2 stands for 200  meters  which is about the 185 meter maxi   mum segment length for Thinnet cable   For  engineers  the IEEE is an odd bunch    didn   t  know that the word about could be part of  an engineer s vocabulary      YY 10BaseT  Unshielded twisted pair cable   UTP      The letter Tin 10BaseT stands for twisted     In each name  the number 70 means that the  cable operates at 10 Mbps  and Base means  that the cable is used for baseband networks  as opposed to broadband networks   Don   t ask    Of these three official monikers  10BaseT is the  only one used frequently  10Base5 and 10Base2  are usually just called thick and thin  respec   tively     Fast Ethernet running over 10BaseT cabling  uses the designation 100BaseT     You can get around this rule by using stackable switches  switches with a spe   cial cable connector that connects two or more switches so that they function  as a single switch   Stackable switches are a must for large networks     If your building is prewired and has a network jack near each desk  you can
65.  are     The best known software only VoIP system is Skype  www  skype   com   The main advantage of Skype is that it   s free  Software only VoIP  has two major drawbacks     e You can only use it from your computer  You can   t just pick up a  phone  dial a number  and make a call via Skype     e The other person must use Skype  You can   t just call anyone     e However  you can sign up for a fee based program that lets you call  regular phone numbers from Skype for about  0 02 per minute     Note that Skype does offer mobile phone versions that can work on sev   eral different types of mobile phones     VoIP services  such as Vonage and AT amp T CallVantage  These services  don   t require a computer  They use an Analog Telephone Adapter  ATA   that connects a normal telephone to the Internet  The adapter lets you  use VoIP pretty much as though it were a regular telephone  You just  pick up the phone and dial a number  The fact that the call is routed  over the Internet rather than over the public phone network is  for the  most part  transparent     Chapter 13  Is It a Phone or a Computer  2   9       Advantages of VolP    VolP service has several compelling advantages over traditional telephone  service  Here are a few     Long distance calls over VoIP are cheaper than they are over tradi   tional phone service  With VoIP  you typically pay a fixed monthly rate  of  25  35 for unlimited calls     long distance or not  If your phone bill  now runs more than  35 per mont
66.  are  available elsewhere in OWA  If you can   t find a feature  look in the Options page   which you can reach by clicking Options at the bottom left of the window  Figure  15 2 shows the Options page  As you can see  this page lets you create an Out of  Office reply  set your signature  and change a variety of other options        IB Microsoft Outlook Web Access   Windows Internet Explorer Sor x   Go     We Bt  Microvoh Outiock Web Access f  Go th yop ager OD took                   Outlook Web Access E Options    Save and Close   Clone L Logott  Long uate stye  Moncay  January UL  AJ    Moncay  December 31  AW     TI  Corda Teme Style LOLAM  ILS9PM v  a gj Contacts  1  2    a  G  Deleted Items  097  Qurrent Time Zone   GMT 08 00  Pacific Time  US  amp  Canada   Tousna    JA atts  3 t  peun Cotender Options   ay Inadent Reports   Week begins on  Sunday    Se beeratents   ay start te  imom    JA ourna   ig Ark E mad Day end tme  SOPH v  ig  Notes Fest week of year  Do not daplay week numbers v  I Outbox  a CJ Sort Rows Reminder Options    i rc en To view reminders  you must use Microsoft Internet Exciorer 5 or later        Enable reminders for Calendar tems   J Enable reminders for Task tena   4  Play a sound when a reminder is due  Defaut remnder  ISmeutes v    Figure 15 2  reee D A    Setting   rues       Sew tems to wew and recover nems that were recenity empted fam your Deleted Items flier  Recovered tems ml be moved badk to your Deleted  OWA a  Options   f  hee 19 remnse
67.  are combined  one of these DHCP servers will have to be  disabled     In addition  both networks had their own Internet connections  With the  networks bridged  CCD can eliminate the DSL  Users in both buildings  can get their Internet access by using the shared T1 connection     1     The network administrator also has to determine how to handle directory  services for the network  Previously  each network had its own domain   With the networks bridged  CCD may opt to keep these domains separate   or it may decide to merge them into a single domain   Doing so requires  considerable work  so it will probably leave the domains separate      Chapter 4  Planning Your Network 7 4    Dave Y  Brenda M  Deborah Q  Julie D  ChrisE  Alice M     The Internet       Building A       Emily D  SarahL  Toby S  Juan S  Richard O  Elias H     Wireless Access Point         Gaa Wireless Access Point  TS    Figure 4 6     a  The Creative Buading B  Course  Develop   ment wire   less network     solution  Andrew T   ee          Improving network performance   DCH Accounting    DCH Accounting is an accounting firm that has grown in two years from 15 to  35 employees  all located in one building  Here   s the lowdown on the existing  network     1     The network consists of 35 client computers and three servers running  Windows 2000 Server   1  The 35 client computers all run Windows XP Professional     The client computers all have 10 100 Mbps Ethernet interfaces  a few  have 10 100 1000 interfa
68.  available addresses  Just for the  fun of it  here   s the number of unique Internet  addresses provided by IPv6     340 282 366 920 938 463 463 374 607 431 768   211 456    This number is so large that it defies under   standing  If the IANA had been around at the  creation of the universe and started handing  out IPv6 addresses at a rate of one per millisec   ond  it would now  15 billion years later  have  not yet allocated even 1 percent of the available  addresses     Unfortunately  the transition from IPv4 to IPv6  has been a slow one  Thus  the Internet will  continue to be driven by IPv4 for at least a few  more years     Subnetting is a technique that lets network administrators use the 32 bits  available in an IP address more efficiently by creating networks that aren   t       limited to the scales provided by Class A  B  and C IP addresses  With subnet   ting  you can create networks with more realistic host limits     Subnetting provides a more flexible way to designate which portion of an IP  address represents the network ID and which portion represents the host ID   With standard IP address classes  only three possible network ID sizes exist   8 bits for Class A  16 bits for Class B  and 24 bits for Class C  Subnetting lets  you select an arbitrary number of bits to use for the network ID     Two reasons compel me to use subnetting  The first is to allocate the lim   ited IP address space more efficiently  If the Internet were limited to Class   A  B  or C ad
69.  better do so soon     1  Regularly back up your data  If a virus hits you and your antivirus soft   ware can   t repair the damage  you may need the backup to recover your  data  Make sure that you restore from a backup that was created before  you were infected by the virus     346 Part V  Protecting Your Network       If you buy software from a store and discover that the seal has been  broken on the disk package  take the software back  Don   t try to install  it on your computer  You don   t hear about tainted software as often as  you hear about tainted beef  but if you buy software that   s been opened   it may well be laced with a virus infection     Use your antivirus software to scan your disk for virus infection after  your computer has been to a repair shop or worked on by a consultant   These guys don   t intend harm  but they occasionally spread viruses  accidentally  simply because they work on so many strange computers     Don   t open e mail attachments from people you don   t know or attachments  you weren t expecting     Use your antivirus software to scan any floppy disk or CD ROM that  doesn   t belong to you before you access any of its files     Patching Things Up    One of the annoyances that every network manager faces is applying software  patches to keep the operating system and other software up to date  A soft   ware patch is a minor update that fixes the small glitches that crop up from  time to time  such as minor security or performance issues 
70.  box that lets you set the workgroup  name  which must match the workgroup or domain name you want the  Samba server to belong to  and a description for the server  as well as some  basic security settings that control how users can access the Samba server     You can set four basic types of security for your Samba server     Domain  Configures the Samba server to use a Windows domain control   ler to verify the user  If you specify this option  you must    e Provide the domain controller   s name in the Authentication Server  field     e Set Encrypted Passwords to Yes  if you use Domain mode         Chapter 25  Networking with Linux 369       v  Samba Server Configuration   x  Eile Preferences Help      f 0o 8B    Add Properties Delete Help    Brecon    __Jsrar rare  remissions  pescas O      home doug Share Share Read Wnite    Figure 25 8   Using the  Samba  Server  Configur   ation tool   in   a       1  Server  Configures Samba to use another Samba server to authenticate  users     ay  If you have more than one Samba server  this feature lets you set up  user accounts on just one of the servers  Then  in the Authentication  Server field  specify the name of the Samba server that should perform  the authentication     1  Share  Authorizes users separately for each share they attempt to  access     User  Requires that users provide a valid username and password when  they first connect to a Samba server  That authentication then grants  them access to all shares on the serv
71.  cables have been used with  Ethernet networks  Almost all networks are now built with twisted pair cable   In this type of cable  pairs of wires are twisted around each other to reduce  electrical interference   You almost need a PhD in physics to understand why  twisting the wires helps to reduce interference  so don   t feel bad if this con   cept doesn   t make sense      You may encounter other types of cable in an existing network  for example   on older networks  you may encounter two types of coaxial cable  also  known as coax  pronounced    COE ax      The first type resembles televi    sion cable and is known as RG 58 cable  The second type is a thick  yellow  cable that used to be the only type of cable used for Ethernet  You may also  encounter fiber optic cables that span long distances at high speeds or thick  twisted pair bundles that carry multiple sets of twisted pair cable between  wiring closets in a large building  Most networks  however  use simple  twisted pair cable     Twisted pair cable is sometimes called UTP   The U stands for unshielded   but    twisted pair    is the standard name   Figure 5 1 shows a twisted pair  cable        When you use UTP cable to construct an Ethernet network  you connect the  computers in a star arrangement  as Figure 5 2 illustrates  In the center of  this star is a device called a hub or switch  Depending on the model  Ethernet    Figure 5 2   A network  cabled with  twisted pair  cable     ar    Chapter 5  Cables  Adapt
72.  call waiting  call forwarding  caller ID  5 way calling  and voice  mail  usually don   t cost extra with VoIP     Modern VoIP audio quality is as good as traditional phone service   Sometimes  it   s better     VoIP services have additional features that you can use if you connect  a computer to the ATA device  For example  some services can send your  voice mail messages to an e mail account as attachments  Then you can  use Microsoft Outlook or another mail program to listen to your  voice mail     220 Part Ill  Getting Connected       Disadvantages of VoIP    You have to consider a few disadvantages before you switch your phone ser   vice over to VoIP  Here are the most important ones       You must have a reliable broadband Internet connection  If your  Internet connection goes down  so will your VoIP connection     The ATA requires electrical power to work  As a result  you can   t use  your VoIP phone during a power outage unless you connect it to an  Uninterruptible Power Supply  UPS   In contrast  traditional telephones  draw their power directly from the phone lines  That   s why traditional  phones continue to work even during power outages     VoIP isn   t really mobile in the same sense as a cellphone  You probably  need a cellphone  too     Calls to the 911 emergency system are problematic with VoIP services   The basic problem is that the 911 system is designed to contact local  emergency dispatchers  Because VoIP services aren   t tied to a particular  locati
73.  can be purchased online for  3 or  4 each     Cable Ties    Cable ties     those little plastic zip things that you wrap around a group of  cables and pull to tighten     can go a long way toward helping keep your net   work cables neat and organized  You can buy them in bags of 1 000 at big box  home improvement stores     Twinkies    If left sealed in their little individually wrapped packages  Twinkies keep for  years  In fact  they   ll probably outlast the network itself  You can bequeath   em to future network geeks  ensuring continued network support for genera   tions to come     Chapter 29  Ten Things You Should Keep in Your Closet 393       Extra Network Cards    Ideally  nearly all your computers will have network interfaces built directly  into the motherboard  However  you will occasionally find that the network  interface goes bad  Rather than replace the entire motherboard  you can  often fix the problem by adding a cheap  under  20  network card to use  instead of the on board network interface     Cheap Network Switches    It   s a good idea to keep a couple of cheap  about  20  four  or eight port net   work switches on hand  You don   t want to use them for your main network  infrastructure  But they come in handy when you need to add a computer or  printer somewhere and you don   t have an available network jack  For exam   ple  suppose one of your users has a short term need for a second computer   but there   s only one network jack in the user   s offi
74.  cccccsccesesesees 389  VI  Thou Shalt Schedule Downtime   before Working upon Thy Network             c ccccssccssceesseeeeeeeesseesseeeeeeees 389  VII  Thou Shalt Keep an Adequate Supply of Spare Parts              cce 389  VIII  Thou Shalt Not Steal Thy Neighbor   s Program   WIthOUt a LICENS Cis  cesses ichisse sc speskesechdecvesads ie a EE NARA 390  IX  Thou Shalt Train Thy Users in the Ways of the Network                   390  X  Thou Shalt Write Down Thy Network Configuration   upon  Tablets oi Stone via ieee ae easiest ones lied desea 390   Chapter 29  Ten Things You Should Keep in Your Closet           391  Duct Tape isesdsstecsctatiaad erties zis akae Ee EARE Ea EREE ER OEN EE EAE EENI EE anise 391  MOUS ena EE aust E E O A ONS 392  Patel Caples is an e E R E AE ETAR 392  Cable Tiesnese kaani 392     UE WinkieS so  esene tonee sinner r E E SA E E E aE iiias 392  Extra Network Card i2  iscsscecsaccccesss neiaie E EEn arei 393  Cheap Network Swit hes    ssiscssscissccsvecssecssscdeceusscastevsdesuavesssvstedecsecesseiase coves 393  The Complete Documentation of the Network on Tablets of Stone     393  The Network Manuals and Disks                 cccsscsssssssesseesseessecsseessesssesseeestens 394  Ten Copies of This BOOK    0   c cscscsseccscsscceecescseeesseveondensestcbecesesaeastodeasessnnest 394   Chapter 30  Layers of the OSI Model                     0 0000 395  Layer 1  The Physical Layer sccctestaccecsiictestiecoenhbesivtesteleciscsstiaeatcedevess 396  Laye
75.  cece eee eeeeaee 21  Distinguishing between Local Resources and Network Resources          2l  Whatsina Name  sicisenoneroni anonn E O Eee 22    Logging On to the Network           ccccccceesseseesceeeeeeeeseeseeaeceeeeeeseeeeeseseeeeeeeeeaes 24    Vill Networking For Dummies  9th Edition       Understanding Shared Folders            cccccecscsssesscesseeseceeeeseeeseeeeeeseeeseeeseessees 26  Four Good Uses for a Shared Folder            cccecccsceseeseeseceeeeeeeseeseeeeseeneeneeees 26  Store files that everybody Needs           cccccsscsseeseesseesseeseceseeseeeseeenes 27  Store VOUr OWN MES scsi   sscesessseesdhcssiesscdsseeesevsete sais onesocecvedeecdacesneeeditiale 27  Make a pit stop for files on their way to other users             eeeeee 28   Back up your local hard drives  icccnulannicancindihdeiaineiae 28   Oh  the Network Places You ll Go         cccccccccsccessscesseeesssecessecessecesseeessesesaes 29  Mapping Network Drives esiet casteseuvctecstactsaalocessasss  eastdineds davaviecvetvaeees 31  Using a Network Printers   casescssseccesadeseesiisaeviudesvsoscvieetessastansseusseassnierspeneeeas 34  Adding a network Print Diss isc  csccsccseeessastvenccseerscaseces sasesaseasneeneesreatesses 35  Printing toa network PTiNter c   cesccss segestdsncesplansessdoenesysavecassodoeseetesees 37  Playing with the print Queue     c sdaceesccisctetgessasszcacceastievecgtecvssanereesbeees 37  Logging Off the  NetWork nuuese ns eke eet ar Ei 39  Chapter 3  More Ways to Use Yo
76.  comes at a price   Application gateways are more expensive than packet filters  both in terms of  their purchase price and in the cost of configuring and maintaining them  In  addition  application gateways slow down the network performance because  they do more detailed checking of packets before allowing them to pass     The Built In Windows Firewall    All versions of Windows since Windows XP come with a built in packet   filtering firewall  If you don   t have a separate firewall router  you can use this  built in firewall to provide a basic level of protection  Refer to Chapter 10 for  the steps to follow to configure the Windows Firewall     Chapter 24  Hardening Your Network 343       NING   RY    Do not enable the Windows Firewall if you   re using a separate firewall router  to protect your network  Because the other computers on the network are  connected directly to the router and not to your computer  the firewall won   t  protect the rest of the network  Additionally  as an unwanted side effect  the  rest of the network will lose the ability to access your computer     Virus Protection    Viruses are one of the most misunderstood computer phenomena around  these days  What is a virus  How does it work  How does it spread from  computer to computer  I   m glad you asked     What is a virus     Make no mistake     viruses are real  Now that most people are connected to  the Internet  viruses have really taken off  Every computer user is susceptible  to attacks by 
77.  confused  that it can   t even move  It just sits there  like a deer staring at oncoming  headlights  It doesn   t move  no matter how hard you press the Esc key or the  Enter key  You can move the mouse all over your desktop  or you can even  throw it across the room  but the mouse pointer on the screen stays per   fectly still     When a computer starts acting strangely  you need to reboot  If you must  reboot  do so as cleanly as possible  I know that this procedure may seem  elementary  but the technique for safely restarting a client computer is worth  repeating  even if it   s basic     1  Save your work if you can     Use the File gt Save command  if you can  to save any documents or files  that you were editing when things started to go haywire  If you can   t use  the menus  try clicking the Save button on the toolbar  If that doesn   t  work  try pressing Ctrl S     the standard keyboard shortcut for the Save  command     2  Close any running programs if you can     Choose the FileExit command or click the Close button in the upper   right corner of the program window  Or press Alt F4     3  Shut down the computer     For Windows XP  choose Start   Turn Off Computer  For Windows Vista  or Windows 7  click the Start button  click the right arrow that appears  next to the padlock icon  and choose Shut Down     The Shut Down Windows dialog box appears   4  Select the Restart option and then click OK     Your computer restarts itself     If restarting your computer doe
78.  don   t have to worry about the nosy guy down in Accounting  who likes to poke around in other people   s files     Don   t overuse the network drive  Remember that other users have  probably filled up their own hard drives  so they want to use the space  on the network drive  too     Before you store personal files on a network drive  make sure that you  have permission  A note from your mom will do     On domain networks  a drive  typically drive H  is commonly mapped  to a user   s home folder  The home folder is a network folder that   s  unique for each user  You can think of it as a network version of My  Documents  If your network is set up with a home folder  use it rather  than My Documents for any important work related files  That   s because  the home folder is usually included in the network   s daily backup sched   ule  In contrast  most networks do not back up data you store in My  Documents     28    Part I  Let s Network     ar       Make a pit stop for files on  their way to other users       Hey  Wally  could you send me a copy of last month   s baseball stats           Sure  Beav     But how  If the baseball stats file resides on Wally   s local drive   how does Wally send a copy of the file to Beaver   s computer  Wally can do it  by copying the file to a network folder  Then Beaver can copy the file to his  local hard drive     Here are some tips to keep in mind when you use a network drive to  exchange files with other network users     Remember to del
79.  each octet of a subnet mask  including  counting 0   For your reference  these values are listed in Table 6 3                 Table 6 3 The Eight Subnet Octet Values   Binary Octet Decimal Binary Octet Decimal  00000000 0 11111000 248  10000000 128 11111100 252  11000000 192 11111110 254  11100000 224 11111111 255       11110000 240    115      16 Partit  Building Your Own Network       Private and public addresses    Any host with a direct connection to the Internet must have a globally unique  IP address  However  not all hosts are connected directly to the Internet   Some are on networks that aren   t connected to the Internet  Some hosts are  hidden behind firewalls  so their Internet connection is indirect     Several blocks of IP addresses are set aside just for this purpose     for use on  private networks that aren   t connected to the Internet or to use on networks  hidden behind a firewall  Three such ranges of addresses exist  as summa   rized in Table 6 4  Whenever you create a private TCP IP network  use IP  addresses from one of these ranges           Table 6 4 Private Address Spaces  CIDR Subnet Mask Address Range  10 0 0 0 8 255 0 0 0 10 0 0 1   10 255 255 254  172 16 0 0 12 255 255 240 0 172 16 1 1 172 31 255 254  192 168 0 0 16 255 255 0 0 192 168 0 1 192 168 255 254    Understanding Network  Address Translation    Many firewalls use a technique called network address translation  or NAT  to  hide the actual IP address of a host from the outside world  When
80.  handling all the work  your network will throw at them  Don   t cut corners by using a bottom of the   line computer that you bought at a discount computer store     The following list describes the four most important components of your  server hardware     Processor  Your server should have a powerful processor  Any proces   sor that   s available in a  500 computer from a low cost general appli   ance store is generally not a processor that you want to see in your file  server  In other words  avoid processors designed for consumer grade  home computers         Memory  You can   t have too much memory  Memory is cheap  so  don   t skimp  Don   t even think about running a server with fewer than  AGB of RAM     Disk  Don   t mess around with inexpensive IDE hard drives  To have a  respectable system  you should have nothing but SCSI drives     1  Network card  A  9 95 network card may be fine for your home network   but don   t use one in a file server that supports 100 users and expect  to be happy with the server   s performance  Remember that the server  computer uses the network more often than any clients do  Equip your  servers with good network cards     The server s configuration options    All network operating systems have options that you can configure  Some of   these options can make the difference between a pokey network and a zippy   network  Unfortunately  no hard and fast rules exist for setting these options   Otherwise  you wouldn   t have options     Th
81.  i      Hub    Modular  wall jacks    Connecting a twisted pair cable to a wall jack or a patch panel is similar to  connecting it to an RJ 45 plug  However  you don   t usually need any special  tools  Instead  the back of the jack has a set of slots that you lay each wire  across  You then snap a removable cap over the top of the slots and press  it down  This action forces the wires into the slots  where little metal blades  pierce the insulation and establish the electrical contact     When you connect the wire to a jack or a patch panel  be sure to untwist as  little of the wire as possible  If you untwist too much of the wire  the signals  that pass through the wire may become unreliable     Chapter 5  Cables  Adapters  and Other Stuff 93    Hubs and Switches    MBER  KV   amp        When you use twisted pair cable to wire a network  you don   t plug the com   puters into each other  Instead  each computer plugs into a separate device  called a hub  Years ago  hubs were expensive devices     expensive enough  that most do it yourself networkers who were building small networks opted  for coax cable rather than twisted pair because networks wired with coax  cable don   t require hubs     Nowadays  the cost of hubs has dropped so much that the advantages of  using twisted pair cabling outweigh the hassle and cost of using hubs  With  twisted pair cabling  you can more easily add new computers to the network   move computers  find and correct cable problems  and service th
82.  in this book     Logon Script  This is the name of the user   s logon script  A logon script  is a batch file that   s run whenever the user logs on  The main purpose    Chapter 17  Managing Windows User Accounts 2 5 3       of the logon script is to map the network shares that the user requires  access to  Logon scripts are a carryover from the early versions of  Windows NT Server  In Windows Server 2008  profiles are the preferred  way to configure the user   s computer when the user logs on  includ   ing setting up network shares  However  many administrators still like  the simplicity of logon scripts  For more information  see the section     Creating a Logon Script     later in this chapter     Home Folder  This is where you specify the default storage location for  the user     Resetting User Passwords    By some estimates  the single most time consuming task of most network  administrators is resetting user passwords  It   s easy to just think users   are forgetful idiots  but put yourself in their shoes  You insist that they set  their passwords to something incomprehensible  such as 94kD82leL384K   that they change it a week later to something more unmemorable  such as  dJUQ63DWd8331  and that they don   t write it down  Then you get mad when  they forget their passwords     So when a user calls and says she forgot her password  the least you can do  is be cheerful when you reset it for them  After all  they   ve probably already  spent 15 minutes trying to remembe
83.  install BlackBerry Enterprise Server  or  BES  on a server computer  For small organizations  you can install BES on  the same physical server as Exchange  But if you have more than a few dozen  BlackBerry users  you   re better off using a separate server dedicated to BES     After you   ve installed BES  you can use it to manage your BlackBerry users   Figure 14 3 shows the BlackBerry Manager application  which you use to  manage your BES administration  From this page  you can configure new  BlackBerry users  modify or delete existing users  and perform other tasks  required to manage your BlackBerry environment     226 Part Ill  Getting Connected             BlackBerry Manager Security Administrator Authority       Ele Edt Too view Hep                                  Eeer vew   4  Refresh es  Cxplorer View x   Server Configuration Users   UsersPendngDekte    I   Black  erry Doman Name oo Emal address N  4     amp  Servers  G tay sws ooo IT Policy    A D weso  mos cs 1  User Groups Erir fo EPOP Gn  BD Local Ports  Device Managemnt  A aac 300 Page Eea  tele ta   Name PIN Status Last Contact Time  Doug Lowe 83383383 Running 11416 2007 3 19 10 PM   P andy mork BIBIS Running 114162007 3 17 22 PM  Alan an UIII Running 11 16 2007 3 20 11 PM  Dari More AIGR3I3A3 Running 11 16 2007 3 17 51 PM  No user has been selected  E    T Account       Figure 14 3     The K  gt  Lisers  S   gt  Find User  BlackBerry  Manager  application        J   aaia  x p  EE 4          Considering Secur
84.  is to  share access to a printer rather than sharing files   Even if you don   t use  passwords  imposing basic security precautions  like limiting access that  certain users have to certain network directories  is still possible  Just  remember that if passwords aren   t used  nothing prevents a user from  signing on by using someone else   s username      Generating passwords For Dummies    How do you come up with passwords that no one can guess but that you  can remember  Most security experts say that the best passwords don   t  correspond to any words in the English language but consist of a random  sequence of letters  numbers  and special characters  Yet  how in the heck  are you supposed to memorize a password like Dks4 DJ2  Especially when  you have to change it three weeks later to something like 3pQ amp X  d8        Chapter 23  Securing Your Network    327    328 Part V  Protecting Your Network    ar     lt P       Here   s a compromise solution that enables you to create passwords that con   sist of two four letter words back to back  Take your favorite book  if it   s this  one  you need to get a life  and turn to any page at random  Find the first four   or five letter words on the page  Suppose that word is When  Then repeat the  process to find another four  or five letter word  say you pick the word Most  the second time  Now combine the words to make your password  WhenMost   I think you ll agree that WhenMost is easier to remember than 3PQ amp X  D8 and  i
85.  must  be located between your network and the Internet  as shown in Figure 24 1   Here  one end of the firewall is connected to a network hub  which is  in turn   connected to the other computers on the network  The other end of the fire   wall is connected to the Internet  As a result  all traffic from the LAN to the  Internet and vice versa must travel through the firewall                    Switch                      N  N  N  N  N  N  N                Chapter 24  Hardening Your Network 339       ANG   O    The term perimeter is sometimes used to describe the location of a firewall  on your network  In short  a firewall is like a perimeter fence that completely  surrounds your property and forces all visitors to enter through the front gate     In large networks     especially campus wide or even metropolitan networks      it   s sometimes hard to figure out exactly where the perimeter is located  If  your network has two or more WAN connections  make sure that every one of  those connections connects to a firewall and not directly to the network  You  can do this by providing a separate firewall for each WAN connection or by  using a firewall with more than one WAN port     The Many Types of Firewalls    Firewalls employ four basic techniques to keep unwelcome visitors out of  your network  The following sections describe these basic firewall techniques     Packet filtering    A packet filtering firewall examines each packet that crosses the firewall and  tests the packe
86.  name         Al Excel Flee                  To access a file that resides on a network volume that   s mapped to a drive  letter  all you have to do is use the drop down list at the top of the dialog  box to select the network drive  If the network volume isn   t mapped to a  drive  click Folders near the lower left corner of the Open dialog box  select  Network  and then browse to the file you want to open     You can map a network drive directly from the Open dialog box by navigat   ing to the folder you want to map  right clicking the folder  and choosing Map  Network Drive     If you try to open a file that another network user has opened already  Office  tells you that the file is already in use and offers to let you open a read only  version of the file  You can read and edit the read only version  but Office  doesn   t let you overwrite the existing version of the file  Instead  you have to  use the Save As command to save your changes to a new file     Using workgroup templates    Although an occasional sacrifice to the Office gods may make your computing  life a bit easier  a template isn   t a place of worship  Rather  a template is a special  type of document file that holds formatting information  boilerplate text  and  other customized settings that you can use as the basis for new documents     Four Office programs     Word  Excel  Access  and PowerPoint     enable you  to specify a template whenever you create a new document  When you create  anew document in 
87.  need to restart the  computer  click OK and then restart the computer     The computer is added to the domain or workgroup     Configuring Network Logon    ar    Every user who wants to access a domain based network must log on to the  domain by using a valid user account  The user account is created on the  domain controller     not on the client computer     Network logon isn   t required to access workgroup resources  Instead  work   group resources can be password protected to restrict access     Chapter 8  Configuring Windows XP  Vista  and 7 Clients   63    When you start a Windows computer that   s been configured to join a domain   which I describe in the section    Configuring Client Computer Identification      earlier in this chapter  the Log On to Windows dialog box displays  The user  can use this dialog box to log on to a domain by entering a domain username  and password and then selecting the domain that she wants to log on to   from the Log On To drop down list      ay  You can create local user accounts in Windows that allow users to access  resources on the local computer  To log on to the local computer  the user  selects This Computer from the Log On To drop down list and enters the user   name and password for a local user account  When a user logs on by using a  local account  he isn   t connected to a network domain  To log on to a domain   the user must select the domain from the Log On To drop down list     If the computer isn   t part of a domain  
88.  network  nothing beats a well thought out schedule  of backups followed religiously   If this were an actual network Bible  a foot   note here would refer you to related verses in Chapter 22      388 Part vit  The Part of Tens    II  Thou Shalt Protect Thy  Network from Infidels    Do you remember Colonel Flagg from M A S H  who hid in trashcans look   ing for Commies  I don   t recommend that you actually become him  but on  the other hand  you don   t want to ignore the possibility of getting zapped by  a virus  your network being invaded by hackers  or your data being compro   mised by an unscrupulous user  Make sure that your Internet connection is  properly secured with a firewall and don   t allow any Internet access that cir   cumvents your security        To counter virus threats  use network aware antivirus software to ensure that  every user on your network has up to date virus protection  And teach your  users so they know how to avoid those virus threats that manage to sneak  past your virus protection     Ill  Thou Shalt Keepeth Thy Network  Drive Pure and Cleanse It of Old Files    Don   t wait until your 500GB network drive is down to just 1GB of free space  before you think about cleaning it up  Set up a routine schedule for disk  housekeeping  where you wade through the files and directories on the net   work disk to remove old junk     IV  Thou Shalt Not Tinker with Thine    Network Configuration Unless Thou  Knowest What Thou Art Doing    Networks are fini
89.  of  network topology is a bus  in which network  nodes  that is  computers  are strung together  in a line  like this              Oe    ee ee       A bus is the simplest type of topology  but it has  some drawbacks  If the cable breaks some   where in the middle  the whole network breaks     A second type of topology is the ring     A ring is very much like a bus except with no  end to the line  The last node on the line is  connected to the first node  forming an end   less loop     A third type of topology is a star     In a star network  all the nodes are connected  to a central hub  In effect  each node has an  independent connection to the network  so a  break in one cable doesn   t affect the others     Ethernet networks are based on a bus design   However  fancy cabling tricks make an Ethernet  network appear to be wired like a star when  twisted pair cable is used     You can think of Ethernet as a kind of municipal building code for networks   It specifies what kind of cables to use  how to connect the cables  how long  the cables can be  how computers transmit data to one another by using the    cables  and more        Chapter 5  Cables  Adapters  and Other Stuff 8      Although Ethernet is now the overwhelming choice for networking  that wasn   t  always the case  In ye olde days  Ethernet had two significant competitors        Token Ring  This IBM standard for networking is still in some organiza   tions  especially where IBM mainframe or midrange systems are in
90.  of tedious con   figuration work     In this section  you discover the ins and outs of DHCP  what it is  how it  works  and how to set it up     Understanding DHCP    DHCP allows individual computers on a TCP IP network to obtain their con   figuration information     in particular  their IP addresses     from a server   The DHCP server keeps track of which IP addresses have already been  assigned so that when a computer requests an IP address  the DHCP servers  offer it an IP address that isn   t already in use     778 Partit  Building Your Own Network       The alternative to DHCP is to assign each computer on your network a static  IP address     1  Static IP addresses are okay for networks with a handful of computers     NING  For networks with more than a few computers  using static IP addresses   v is a huge mistake  Eventually  some poor  harried administrator  guess  who  will make the mistake of assigning two computers the same IP  address  Then you have to manually check each computer   s IP address  to find the conflict  DHCP is a must for any but the smallest networks     Although the primary job of DHCP is to assign IP addresses  DHCP provides  more configuration information than just the IP address to its clients  The  additional configuration information is referred to as DHCP options  The fol   lowing list describes some common DHCP options that can be configured by  the server     Router address  also known as the default gateway address  Expiration time for
91.  of the information  on hand     If your network is large  you may want to invest in a network discovery pro   gram  such as NetworkView Software   s NetworkView  www networkview   com   This program can gather the network documentation automatically  It  scans the network carefully for every computer  printer  router  and other  device it can find and then builds a database of information  The program  then automatically draws a pretty diagram and chugs out helpful reports     Performing Routine Chores    Much of the network manager   s job is routine stuff     the equivalent of vacu   uming  dusting  and mopping  or changing your car   s oil and rotating the tires     24 0 Part IV  Network Management For Dummies       These tasks are boring  but they have to be done     Create backups  The network manager must ensure that the network  is properly backed up  If something goes wrong and the network isn   t  backed up  guess who gets the blame  On the other hand  if disaster  strikes yet you   re able to recover everything from yesterday   s backup  with only a small amount of work lost  who gets the pat on the back  the  fat bonus  and the vacation in the Bahamas  Chapter 22 describes the  options for network backups  Read it soon     Provide security  Another major task for a network administrator is  sheltering the network from the evils of the outside world  These evils  come in many forms  including hackers trying to break into your net   work and virus programs arriving 
92.  offer higher  capacity and faster backup speed than Travan drives but for more  money  of course  DAT  digital audio tape  units can back up as much  as 80GB on a single tape  and DLT  digital linear tape  drives can store  up to 200GB on one tape  DAT and DLT drives can cost  1 000 or more   depending on the capacity     If you   re really up the backup creek with hundreds of gigabytes to back  up  you can get robotic tape backup units that automatically fetch and  load tape cartridges from a library  so you can do complete backups  without having to load tapes manually  Naturally  these units aren   t  cheap  The small ones  which have a library of about eight tapes and a  total backup capacity of over 5 000GB  start at about  4 000     Chapter 22  Backing Up Your Data 3           Backup Software    All versions of Windows come with a built in backup program  In addition   most tape drives come with backup programs that are often faster or more  flexible than the standard Windows backup     You can also purchase sophisticated backup programs that are specially  designed for networks that have multiple servers with data that must be  backed up  For a basic Windows file server  you can use the backup program  that comes with Windows Server  Server versions of Windows come with a  decent backup program that can run scheduled  unattended tape backups     Backup programs do more than just copy data from your hard drive to   tape  Backup programs use special compression techniqu
93.  operating system must support a wide variety of networking  protocols to meet the needs of its users     A large network typically consists of a mixture of various versions   of Windows  as well as Macintosh and Linux computers  As a result   the server may need to simultaneously support TCP IP  NetBIOS  and  AppleTalk protocols     Many servers have more than one network interface installed  In that  case  the NOS must be able to support multiple network connections     e Ideally  the NOS should be able to balance the network load among  its network interfaces     e If one of the connections fails  the NOS should be able to seam   lessly switch to another connection     Most network operating systems include a built in capability to function  as a router that connects two networks     The NOS router functions should also include firewall features to keep  unauthorized packets from entering the local network     File sharing services    One of the most important functions of a network operating system is to  share resources with other network users  The most common resource that   s  shared is the server   s file system     organized disk space that a network  server must be able to share  in whole or in part  with other users  In effect   those users can treat the server   s disk space as an extension of their own  computers    disk space     The NOS allows the system administrator to determine which portions of the  server   s file system to share     Although an entire ha
94.  or a firewall computer  the firewall must  be located between your network and the Internet  as shown in Figure 10 1   Here  one end of the firewall is connected to a network hub  which is  in turn   connected to the other computers on the network  The other end of the fire   wall is connected to the Internet  As a result  all traffic from the LAN to the  Internet  and vice versa  must travel through the firewall                                 Hub                      The term perimeter is sometimes used to describe the location of a firewall on  your network  In short  a firewall is like a perimeter fence that completely sur   rounds your property and forces all visitors to enter through the front gate     In large networks  it   s sometimes hard to figure out exactly where the perimeter  is located  If your network has two or more Internet connections  make sure  that every one of those connections connects to a firewall and not directly to  the network  You can do this by providing a separate firewall for each Internet  connection or by using a firewall with more than one Internet port     Some firewall routers can also enforce virus protection for your network  For  more information about virus protection  see Chapter 23     190    Part Ill  Getting Connected    Figure 10 2   The  Windows  Vista  Firewall  dialog box   aS       The built in Windows firewall    Both Windows XP and Vista include a built in firewall that provides basic  packet filtering firewall protection
95.  other network users can  and often  should  find out your username     1     Password  A secret word that must be entered in order to gain access  to the account  You can set up Windows so that it enforces password  policies  such as the minimum length of the password  whether the pass   word must contain a mixture of letters and numerals  and how long the  password remains current before the user must change it     Group membership  The group or groups to which the user account  belongs  Group memberships are the key to granting access rights to  users so that they can access various network resources  such as file  shares or printers or to perform certain network tasks  such as creating  new user accounts or backing up the server     Many other account properties record information about the user  such as  the user   s contact information  whether the user is allowed to access the  system only at certain times or from certain computers  and so on  I describe  some of these features in later sections of this chapter     Creating a New User    To create a new domain user account in Windows Server 2008  follow these  steps     1  Choose StartAdministrative Tools   Active Directory Users and  Computers     This fires up the Active Directory Users and Computers management  console  as shown in Figure 17 1     Chapter 17  Managing Windows User Accounts 2 4 7       Figure 17 1   The Active  Directory  Users and  Computers  management  console   SSS    SS  Figure 17 2   Creating a
96.  overloaded  281 282    410    Networking For Dummies  9th Edition    servers  continued   overview  14 15  41 42  print  70  restarting  288  297 298  Web  70  205  Service accounts  331  Service Configuration window   363 365  368  A network restart command   36  service packs  146 147  192  346  service set identifier  SSID   166  175  177  services  132 135  148 150  295 297  376  Session Layer  OSI model  399  setup script  139  Share and Storage Management console   264  273 275  share name  47  263  shared resources  12 13  18  23  shares  238  262 263  366  370  sharing  File and Printer Sharing feature  42   46  files  12  132 133  374  folders  26 28  31 34  46 49  271 273  Internet connections  187  overview  41   42  printers  50 53  programs  13 14  shielded twisted pair  STP  cable  84 85  shredding trash  325  shutdown  332  358  simple display name  196  Skype  218  Slackware  354  Sleep feature  289  smart card  251  smartphone  222  SMB  Server Message Block   366  smbd daemon  367  sneakernet  10  Sniffer program  NetScout Systems  242  software  17  67  205  236  238  solid cable  85 86  special permissions  262  special shares  263  spectrums  169  SPI  stateful packet inspection   341  splitting databases  Access  58  spooling  print  279  spyware  286  SSID  service set identifier   166  175  177       stackable switches  96   standard drive assignments lists  238   Standard version  Windows Server 2008   136  140   standards  wireless  170 171   star t
97.  s security features     336 Part V  Protecting Your Network       Chapter 24  Hardening Your Network    In This Chapter    Understanding what firewalls do       Examining the different types of firewalls  Using the built in Windows firewall  Looking at virus protection   Patching your computers    f your network is connected to the Internet  a whole host of security  issues bubble to the surface  You probably connected your network  to the Internet so that your network   s users could get out to the Internet   Unfortunately  however  your Internet connection is a two way street  Not  only does it enable your network   s users to step outside the bounds of your  network to access the Internet  but it also enables others to step in and  access your network     And step in they will  The world is filled with hackers who are looking for  networks like yours to break into  They may do it just for the fun of it  or  they may do it to steal your customer   s credit card numbers or to coerce  your mail server into sending thousands of spam messages on their behalf   Whatever their motive  rest assured that your network will be broken into if  you leave it unprotected     This chapter presents an overview of three basic techniques for securing your  network   s Internet connection  controlling access via a firewall  detecting  viruses with antivirus software  and fixing security flaws with software patches     Firewalls    A firewall is a security conscious router that sits between t
98.  shares     folders that have  been designated as publicly accessible via the network  You can see a list   of the current shares available from a file server by firing up the File Server  Manager and clicking Shares in the console tree  The Share and Storage  Management console displays the share name  description  and network path  for each share that you   ve already created     To create additional shares  use the Provision a Shared Folder Wizard  as I  describe in the following procedure     1  In the Share and Storage Management console  choose Provision  Share     The opening screen of the Provision a Shared Folder Wizard appears  as  shown in Figure 18 2  Here  the wizard asks you what folder you want to  share           G  Provision a Shared Folder Wizard   Tete    faa Shared Folder Locaton    Steps   ape  Specify the folder that you want to share  On a volume with appropnate charactenstics  Shared Folder Location and space  select an existing folder or create a new one  If an appropriate volume does    NTFS Permissions    Share Protocole   z T  pra Settings and Create  C Wata Shares Marketing  Browse       Confirmation             Indexing  Unknown  Highly available server Volume is not chisterad             266 Part IV  Network Management For Dummies    Figure 18 3   The wizard  asks if you  want to set   the NTFS  permissions        2  Type the path of the folder that you want to share over the network    and then click Next     If you aren   t sure of the path  y
99.  simply  restarting the computer  Of course  in many cases the problem recurs   so you have to eventually isolate the cause and fix the problem  Some  problems are only intermittent  and a simple reboot is all that   s needed       Try restarting the network server     See the section     How to Restart a Network Server     later in this chapter     Chapter 20  Solving Network Problems 289    How to Fix Dead Computers    If a computer seems dead  here are some items to check     The plug  Is the computer plugged in     The surge protector  If the computer is plugged into a surge protector  or a power strip  make sure that the surge protector or power strip is  plugged in and turned on  If the surge protector or power strip has a  light  it should be glowing     1     The On Off switch  Make sure that the computer   s On Off switch is  turned on  This advice sounds too basic to even include here  but some  computers are set up so that the computer   s power switch is always left  in the On position and the computer is turned on or off by means of the  switch on the surge protector or power strip  Many computer users are  surprised to find out that their computers have On Off switches on the  backs of the cases     To complicate matters  newer computers have a Sleep feature  in which  they appear to be turned off but are really just sleeping  All you have   to do to wake this type of computer is jiggle the mouse a little   I used  to have an uncle like that   You can easily ass
100.  system  Asking    How does it work when a network works if a network works for me       Say what    Assessing how networks change computing life  Identifying  and offering sympathy to  the network administrator  Comparing servers to clients  What have they got that you don   t got       omputer networks get a bad rap in the movies  In the Terminator   movies  Skynet  a computer network of the future  takes over the  planet  builds deadly terminator robots  and sends them back through time  to kill everyone unfortunate enough to have the name Sarah Connor  In The  Matrix movies  a vast and powerful computer network enslaves humans and  keeps them trapped in a simulation of the real world  And in one of Matthew  Broderick   s first movies  War Games  a computer whiz kid nearly starts World  War III by connecting to a Defense Department network and playing the game  Global Thermonuclear War     Fear not  These bad networks exist only in the dreams of science fiction  writers  Real world networks are much more calm and predictable  They  don   t think for themselves  they can   t evolve into something you don   t want  them to be  and they won   t hurt you     even if your name is Sarah Connor     10    Part I  Let s Network        Now that you   re over your fear of networks  you   re ready to breeze through  this chapter  It   s a gentle  even superficial  introduction to computer net   works  with a slant toward the concepts that can help you use a computer  that   s attached
101.  system on a single com   puter  Of course  only one of these operating  systems can be running at any time  When you  boot the computer  a menu appears with each  of the installed operating systems listed  You  can choose which operating system to boot  from this menu     Multiboot is most useful for software develop   ers or network managers who want to make  sure that software is compatible with a wide  variety of operating systems  Rather than set up  a bunch of separate computers with different  operating system versions  you can install sev   eral operating systems on a single PC and use  that one PC to test the software  For production  network servers  however  you probably don   t  need to have more than one operating system  installed     If you still insist on loading two or more oper   ating systems on a network server  be sure to    install each operating system into its own disk  partition  Although most network operating  systems let you install two  or more  operat   ing systems into a single partition  doing so is  not a good idea  To support two operating sys   tems in a single partition  the operating systems  have to play a risky shell game with key system  files     moving or renaming them each time you  restart the computer  Unfortunately  things can  go wrong  For example  if lightning strikes and  the power goes out just as the NOS is switch   ing around the startup files  you may find your   self with a server that can   t boot to any of its  installe
102.  that   s the  case  the NAT device must use a globally unique IP to represent the host to  the Internet  behind the firewall  however  the host can use any IP address it  wants  As packets cross the firewall  the NAT device translates the private IP  address to the public IP address  and vice versa     One of the benefits of NAT is that it helps to slow down the rate at which the  IP address space is assigned  That   s because a NAT device can use a single  public IP address for more than one host  It does this by keeping track of out   going packets so that it can match up incoming packets with the correct host   To understand how this process works  consider this sequence of steps     1  A host whose private address is 192 168 1 100 sends a request to  216 239 57 99  which happens to be www  google com  The NAT  device changes the source IP address of the packet to 208 23 110 22   the IP address of the firewall  That way  Google will send its reply back  to the firewall router  The NAT records that 192 168 1 100 sent a  request to 216 239 57 99     Chapter 6  Dealing with TCP IP    2  Now another host  at address 192 168 1 107  sends a request to  207 46 134 190  which happens to be www microsoft com  The  NAT device changes the source of this request to 208 23 110 22s0  that Microsoft will reply to the firewall router  The NAT records that  192 168 1 107 sent a request to 207 46 134 190     3  A few seconds later  the firewall receives a reply from 216 239 57 99   The des
103.  that net   work backups have on the rest of the network  consider using a 1 000  Mbps switch rather than a normal 100 Mbps switch to connect the serv   ers and the backup client  That way  network traffic between the server  and the backup client won   t bog down the rest of the network     1  Any files that are open while the backups are running won   t get backed  up  That   s usually not a problem because backups are run at off hours  when people have gone home for the day  However  if someone leaves  his or her computer on with a Word document open  that Word docu   ment won   t be backed up  One way to solve this problem is to set up the  server so that it automatically logs everyone off the network before the  backups begin     1     Some backup programs have special features that enable them to back  up open files  For example  the Windows Server 2003 backup does  this by creating a snapshot of the volume when it begins  thus making  temporary copies of any files that are modified during the backup  The  backup backs up the temporary copies rather than the versions being  modified  When the backup finishes  the temporary copies are deleted     How Many Sets of Backups  Should Vou Keep     Don   t try to cut costs by purchasing one backup tape and reusing it every  day  What happens if you accidentally delete an important file on Tuesday  and don   t discover your mistake until Thursday  Because the file didn   t exist  on Wednesday  it won   t be on Wednesday   s back
104.  the backup over  the network from a client computer or a dedicated backup server  you ll  flood the network with gigabytes of data being backed up  Your users will  then complain that the entire network has slowed to a snail   s pace     Network performance is one of the main reasons you should try to run your  backups during off hours  when other users aren   t accessing the network   Another reason to do this is so that you can perform a more thorough  backup  If you run your backup while other users are accessing files  the  backup program is likely to skip over any files that are being accessed by  users at the time the backup runs  As a result  your backup won   t include  those files  Ironically  the files most likely to get left out of the backup are  often the files that need backing up the most because they   re the files that  are being used and modified     Chapter 22  Backing Up Your Data 3 1 7       Here are some extra thoughts on client and server backups       You may think that backing up directly from the server would be more  efficient than backing up from a client because data doesn   t have to  travel over the network  Actually  this assumption doesn   t always hold  because the network may well be faster than the tape drive  The net   work probably won   t slow down backups unless you back up during the  busiest time of the day  when hordes of network users are storming the  network gates     ay  To improve network backup speed and to minimize the effect
105.  the configuration information   Domain name   1  DNS server address   1  WINS server address    DHCP servers    A DHCP server can be a server computer located on the TCP IP network   Fortunately  all modern server operating systems have a built in DHCP  server capability  To set up DHCP on a network server  all you have to do is  enable the server   s DHCP function and configure its settings  In the section      Managing a Windows Server 2008 DHCP Server     later in this chapter  I show  you how to configure a DHCP server for Windows 2008     A server computer running DHCP doesn   t have to be devoted entirely to  DHCP unless the network is very large  For most networks  a file server can  share duty as a DHCP server  especially if you provide long leases for your IP  addresses   I explain the idea of leases later in this chapter      Many multifunction routers also have built in DHCP servers  So  if you don   t  want to burden one of your network servers with the DHCP function  you  can enable the router   s built in DHCP server  An advantage of allowing the  router to be your network   s DHCP server is that you rarely need to power  down a router  In contrast  you occasionally need to restart or power down a  file server to perform system maintenance  to apply upgrades  or to do some  needed troubleshooting     ar    Chapter 6  Dealing with TCP IP   1 9    Most networks require only one DHCP server  Setting up two or more servers  on the same network requires that you car
106.  the folder you share contains other folders  network users can  access files in those folders  too      anne  Don   t share an entire hard drive  unless you want to grant everyone on the net   D work the freedom to sneak a peek at every file on your hard drive  Instead  you  should share just the folder or folders containing the specific documents that  you want others to be able to access  For example  if you store all your Word  documents in the My Documents folder  you can share your My Documents  folder so that other network users can access your Word documents     Sharing a folder in Windows XP    To share a folder on a Windows XP computer  follow these steps     1  Double click the My Computer icon on your desktop   The My Computer window comes to center stage   2  Select the folder that you want to share     Click the icon for the drive that contains the folder you want to share   and then find the folder itself and click it     3  Choose FileSharing and Security     The Properties dialog box for the folder that you want to share appears   Notice that the sharing options are grayed out     4  Select the Share This Folder on the Network option     After you select this option  the rest of the sharing options come alive   as shown in Figure 3 5     Chapter 3  More Ways to Use Your Network 4 7          yP           D If you prefer  you can skip Steps 2 4  Instead  just right click the folder  you want to share and then choose Sharing and Security from the  pop up menu th
107.  the smallest networks benefit  from having a separate  dedicated server computer     Here are a few points to ponder regarding dedicated versus nondedicated  servers     Using a dedicated server computer makes the network faster  easier to  work with  and more reliable  Consider what happens when the user of  a server computer  which doubles as a workstation  decides to turn off  the computer  not realizing that someone else is accessing files on her  hard drive     You don   t necessarily have to use your biggest and fastest computer as  your server computer  I   ve seen networks where the slowest computer  on the network is the server  This is especially true when the server is  mostly used to share a printer or to store a small number of shared files   If you need to buy a computer for your network  consider promoting one  of your older computers to be the server and using the new computer as  a client     Looking at Different Types of Servers    Assuming that your network will require one or more dedicated servers   consider which types of servers the network needs  In some cases  a single  server computer can fill one or more of these roles  Whenever possible  try  to limit each server computer to a single server function     File servers    File servers provide centralized disk storage that can be conveniently shared  by client computers on the network  The most common task of a file server  is to store shared files and programs  For example  the members of a small  wo
108.  this taldar      No  do not change NTFS permissions     Yes  change NTIS permissions    To change NTFS permissions  click Edit Permissions        For more information about sharing and permissions  see Managing Permissions  for Shared Folders     crean  ies  es            Chapter 18  Managing Network Storage 26 7               Provision a Shared Folder Wiz  rd _  5  x  Share Protocols  22  Steps   Select each protocol over which users can access thes shared folder   Shared Folder Location  NTFS Permissions W smg  Share Protocole Shore nome   SMB Settings arketing   SMB Pemissons Share path     DFS Namespace Publishing  CSERVEROI Marketing    Review Settings and Create  Share F NFS     Contemation Share name       Share patt                A NFS  not installed on this server   E  Figure 18 4   Specifying  the share    name   lt Previous    Neas   Conca               4  Type the name that you want to use for the share in the Share  Name box     The default name is the name of the folder being shared  If the folder  name is long  you can use a more succinct name here     Windows Server 2008 includes the ability to share files using the Unix  NFS file protocol  If you   ve enabled NFS sharing on this computer  this  dialog box also lets you set the sharing information for NFS     5  Click Next        The dialog box  as shown in Figure 18 5  appears   6  Enter a description for the share and then click Next     The dialog box  as shown in Figure 18 6  appears     268 Part IV  Net
109.  to a network  This chapter goes easy on the details  the  detailed and boring stuff comes later     What Is a Network     A network is nothing more than two or more computers connected by a cable   or in some cases  by radio connection  so that they can exchange information     Of course  computers can exchange information in ways other than networks   Most of us have used what computer nerds call the sneakernet  That   s where  you copy a file to a CD or DVD disk or a removable flash drive and then walk  the data over to someone else   s computer   The term sneakernet is typical of  computer nerds    feeble attempts at humor      The whole problem with the sneakernet is that it   s slow     plus  it wears a  trail in your carpet  One day  some penny pinching computer geeks discov   ered that connecting computers with cables was cheaper than replacing the  carpet every six months  Thus  the modern computer network was born     You can create a computer network by hooking together all the computers in  your office with cables and using the computer   s network interface  an elec   tronic circuit that resides inside your computer and has a special jack on the  computer   s backside   Then you set up your computer   s operating system  software to make the network work  and     voila     you have a working net   work  That   s all there is to it     If you don   t want to mess with cables  you can create a wireless network  instead  In a wireless network  each computer is equip
110.  to other network variables        Write down the results of each test so that you have an accurate record  of the effect that each change makes on your network   s performance     Be sure to change only one aspect of the network each time you run  the benchmark  If you make several changes  you don   t know which  one caused the change  One change may improve performance  but the  other change may worsen performance so that the changes cancel each  other out     kind of like offsetting penalties in a football game     If possible  conduct the baseline test during normal working hours   when the network is undergoing its normal workload     To establish the network   s baseline performance  run the benchmark  test two or three times to make sure that the results are repeatable     284 Part IV  Network Management For Dummies       Monitor Network Performance    Figure 19 1   Monitoring  performance  in Windows  Server   a    One way to monitor network performance is to use a stopwatch to see how  long it takes to complete common network tasks  such as opening documents  or printing reports  If you choose to monitor your network by using the stop   watch technique  you may want to get a clipboard  baseball cap  and gray  sweat suit  to complete the ensemble     A more high tech approach to monitoring network performance is to use a  monitor program that automatically gathers network statistics for you  After  you set up the monitor  it plugs away  silently spying on your networ
111.  to the appropriate seg   ment  However  a bridge can   t look inside the message to see what type of  information is being sent  A router can  As a result  routers work at a higher  level than bridges  Thus  routers can perform additional tasks  such as filter   ing packets based on their content   Many routers also have built in bridging  functions  so routers are often used as bridges      You can configure a network with several routers that can work cooperatively  together  For example  some routers can monitor the network to determine  the most efficient path for sending a message to its ultimate destination  If a  part of the network is extremely busy  a router can automatically route mes   sages along a less busy route  In this respect  the router is kind of like a traffic  reporter flying in a helicopter  The router knows that the 101 is bumper to  bumper all the way through Sunnyvale  so it sends the message on the 280  instead     Chapter 5  Cables  Adapters  and Other Stuff   03    Here   s some additional information about routers     Routers used to be expensive and used only on large networks   However  the price of small routers has dropped substantially in recent  years  so they   re now becoming common even on small networks     The functional distinctions between bridges and routers     and switches  and hubs  for that matter     get blurrier all the time  Multifunction routers   which combine the functions of routers  bridges  hubs  and switches   are ofte
112.  training process painless for you and your  users     1    Write a summary of what your users need to know about the network      on one page  if possible  Include everyone   s user IDs  the names of the  servers  network drive assignments and printers  and the procedure for  logging on to the network  Everyone needs a copy of this Network Cheat  Sheet     Emphasize the etiquette of network life  Make sure that everyone  understands that not all free space on the network drive is personal  space     it   s shared  and it should be used sparingly  Explain the impor   tance of treating other people   s files with respect  Ask users to check  with their fellow users before sending a three hour print job to the  printer        Don   t bluff your way through your role as network manager  If you   re  not a computer genius  don   t pretend to be one just because you know  a little more than everyone else  Tell users that everyone is in this  together and that you will do your best to try to solve any network prob   lems that may come up     Organize a Library    As the network manager  every network user expects you to be an expert at  every computer program he uses  That task is manageable when you have  only two network users and they only use Microsoft Word  But if you have  a gaggle of users who use a bevy of programs  being an expert in all them is  next to impossible     The only solution is a well stocked computer library that has all the informa   tion you may need to solv
113.  translates into roughly 1 2  million bytes per second  In practice  Ethernet can   t move information  that fast because data must be transmitted in packages of no more than  1 500 bytes  called packets  So  150KB of information has to be split into  100 packets     Ethernet   s transmission speed has nothing to do with how fast electri   cal signals move on the cable  The electrical signals travel at about 70  percent of the speed of light  or as Captain Kirk would say     Warp factor  point seven oh           1  A newer version of Ethernet  called Fast Ethernet  or 100 Mbps Ethernet   moves data ten times as fast as normal Ethernet  Because Fast Ethernet  moves data at a whopping 100 Mbps and uses twisted pair cabling  it   s  often called 100BaseT  and sometimes 100BaseTX      1  An even faster version of Ethernet  known as Gigabit Ethernet  is also  available  Gigabit Ethernet is now the most common type used for new  networks  but plenty of existing networks in place still run at 100 Mbps     S2 Partit  Building Your Own Network       Most networking components that you can buy these days support all  three network speeds     10 Mbps  100 Mbps  and 1 000 Mbps  These  components are called 10 100 1000 Mbps components     All about Cable    Figure 5 1   Twisted pair  cable   SS    Although you can use wireless technology to create networks without   cables  most networks still use cables to physically connect each computer  to the network  Over the years  various types of
114.  two at a users     group meeting     You can probably convince your boss to pay your fees to join the group     If you can   t find a real life guru  try to find an online guru  Check out    the various computing newsgroups on the Internet  Subscribe to online  newsletters that are automatically delivered to you by e mail     Spew Helpful Bluffs and Excuses    As a network administrator  sometimes you just can   t solve a problem  immediately  You can do two things in this situation     Chapter 21  How to Stay on Top of Your Network 305    The first solution is to explain that the problem is particularly difficult and  are that you   ll have a solution as soon as possible     The second solution is to look the user in the eye and try a phony explanation     1  It was the version of your software      Oh  they fixed that with version 39       1  It was those cheap  imported memory chips   1  It was those Democrats  Or Republicans     1    The problem was caused by stray static electricity  Those types of prob   lems are difficult to track down  Users who don   t properly discharge  themselves before using their computers can cause all kinds of problems     You need more memory    You need a bigger disk    You need a dual core processor to do that    Jar Jar Binks did it    You should upgrade to Windows 7    You didn   t upgrade to Windows 7  did you   It could be a virus    Or sunspots     All work and no beer makes Homer something  something  something         306 Part IV  N
115.  up to form an ad hoc network  For example  if you and a few of your friends all  have notebook computers with 802 11b g wireless network adapters  you can  meet anywhere and form an ad hoc network     All the computers within range of each other in an ad hoc network are called  an Independent Basic Service Set  or IBSS     Configuring a Wireless Access Point    The physical setup for a wireless access point is pretty simple  You take it  out of the box  put it on a shelf or on top of a bookcase near a network jack  and a power outlet  plug in the power cable  and plug in the network cable     Chapter 9  Wireless Networking 1 7 1       ar    NING   RY    The software configuration for an access point is a little more involved but  still not complicated  It   s usually done by using a Web interface  To get to the  configuration page for the access point  you need to know the access point   s  IP address  Then you just type that address into the address bar of a browser  from any computer on the network     Multifunction access points usually provide DHCP and NAT services for the  networks and double as the network   s gateway router  As a result  they typi   cally have a private IP address that   s at the beginning of one of the Internet   s  private IP address ranges  such as 192 168 0 1 0r10 0 0 1  Consult the  documentation that came with the access point to find out more     If you use a multifunction access point that is both your wireless access point  and your Internet 
116.  use      ARCnet  This standard is still commonly used for industrial network  applications  such as building automation and factory robot control     But these older networks are now pretty much obsolete  so you don   t need to  worry about them  Ethernet is now the only real choice for new networks      small or large     Here are a few tidbits you   re likely to run into at parties where the conversa   tion is about Ethernet standards     Ethernet is a set of standards for the infrastructure on which a network  is built  All the network operating systems that I discuss in this book      including all versions of Windows  NetWare  Linux  and Macintosh OS X      can operate on an Ethernet network  If you build your network on a solid  Ethernet base  you can change network operating systems later     Ethernet is often referred to by network gurus as 802 3  pronounced     eight oh two dot three      which is the official designation used by the  IEEE  pronounced    eye triple e     not    aieeee       a group of electrical engi   neers who wear bow ties and have nothing better to do than argue all  day long about things like inductance and cross talk     and it   s a good  thing they do  If not for them  you couldn   t mix and match Ethernet com   ponents made by different companies        The original vintage Ethernet transmits data at a rate of 10 million bits  per second  or 10 Mbps   Mbps is usually pronounced    megabits per  second      Because 8 bits are in a byte  that
117.  use    a small hub or switch to connect two or more computers to the network by  using a single jack  Just use one cable to plug the daisy chain port of the hub  into the wall jack and then plug each computer into one of the hub   s ports     Network Interface Cards    Every computer that connects to your network must have a network inter   face  Most new computers come with a built in network interface  But you  may need to add a separate network interface card to older computers that  don   t have built in interfaces  The following sections show you what you  need to know to purchase and install a network interface card        Chapter 5  Cables  Adapters  and Other Stuff 9 7    Picking a network interface card    You can buy inexpensive network interface cards at any computer supply  store  and most large office supply stores also carry them  The following  pointers should help you pick the right card for your system     1     The network interface cards that you use must have a connector that  matches the type of cable you use  If you plan on wiring your network  with Thinnet cable  make sure that the network cards have a BNC con   nector  For twisted pair wiring  make sure that the cards have an RJ 45  connector     Some network cards provide two or three connectors  I see them in  every combination  BNC and AUI  RJ 45 and AUI  BNC and RJ 45  and all  three  AUI connectors are pretty much obsolete  As for BNC connec   tors  get them only if your network has existing coax
118.  users only  here   s the scoop on networks  how  to use one  and how it makes life easier    e Getting started     find out how to plana network and what  hardware and software you need to set one up    e More techie stuff     what network builders need to know about  TCP IP  DHCP  and DNS    e l Il be your server     learn about setting up a server  configuring  Windows clients  and going wireless       Hooking up     connect your network to the Internet and set up a  firewall          Going mobile     explore the unique factors that affect network  access via iPhones  BlackBerry   devices  and other smartphones       Network management     learn to keep your network secure and A  your users happy Go to Dummies com      for videos  step by step examples        Those other guys     discover how to network Macs and PCs or set how to articles  or to shop   i      up a Linux   network    For Dummies    A Branded Imprint of    WILEY     24 99 US    29 99 CN     17 99 UK    TSBN AOU at Oost Fase     Doug Lowe       
119.  using Office on a network and comes  with a CD that has valuable tools  If you don   t want to purchase the ORK  you  can view it online and download the ORK tools from the Microsoft TechNet  Web site  www microsoft com technet   Nanoo nanoo  earthling     54    Part I  Let s Network     Ni  RY    NG       Installing Office on a network      some options    You need to make some basic decisions when you prepare to install  Microsoft Office on a network  In particular  here are some possible  approaches to installing Microsoft Office on your network clients       You can simply ignore the fact that you have a network and purchase  a separate copy of Office for each user on the network  Then you can  install Office from the CD on each computer  This option works well if    e Your network is small     e Each computer has ample disk space to hold the necessary  Office files     e Each computer has its own CD ROM drive   If the computer doesn   t  have a CD ROM drive  you can share a CD ROM drive on another  computer and install the software from the shared drive      1  On a larger network  you can use the Office Setup program in  Administrative Setup mode  This option lets you create a special type  of setup on a network server disk from which you can install Office on  network computers  Administrative Setup enables you to control the  custom features selected for each network computer and reduce the  amount of user interaction required to install Office on each computer     I
120.  want to add       Type the name of the mailbox you want to add and then click OK     The mailbox is added to the list box in the Microsoft Exchange dialog box        202 Part Ill  Getting Connected    Figure 11 9   The  Advanced  tab   PCS    6  Click OK    You re returned to the Change E mail Account dialog box   7  Click Next and then click Finish    You   re done  You can now view the Support mailbox     To actually view the mailbox  you need to open the Folder List window in  Outlook  by choosing View   Folder List   Then  you can double click the    Support mailbox in the list to open it     Chapter 12  Creating an Intranet       In This Chapter  Getting acquainted with intranets  Finding good uses for intranets  Figuring out what you need to set up an intranet  Setting up an IIS Web server  Setting up a simple intranet  Managing IIS    N o  I m not mispronouncing Internet  The term intranet has gained  popularity in recent years  It   s similar to the Internet  but with a twist   Rather than connect your computer to millions of other computers around  the world  an intranet connects your computer to other computers in your  company or organization  How is an intranet different from your ordinary   run of the mill network  Read on  and I ll explain     What Is an Intranet     Everyone knows that the Internet  and especially the World Wide Web  has  become a phenomenon  Millions of computer users worldwide surf the Web   and many join the bandwagon every day     Recently
121.  weren   t designed primarily to be network servers     If you dedicate a computer to the task of being a full time server  use a  special network operating system rather than the standard Windows  operating system  A network operating system  also known as a NOS  is  specially designed to handle networking functions efficiently     e The most commonly used network operating systems are the  server versions of Windows     At the time I wrote this chapter  the current server version of  Windows was Windows Server 2008  However  many companies  still use the previous version  Windows Server 2003   and a few  even use its predecessor  Windows 2000 Server     16    Part I  Let s Network     ai        e Other network operating systems include Linux and Novell  NetWare     1     Many networks are both peer to peer and dedicated server networks at  the same time  These networks have    e At least one server computer that runs a NOS  such as Windows  Server 2008     e Client computers that use the server features of Windows to share  their resources with the network     Besides being dedicated  your servers should also be sincere     What Makes a Network Tick     ar       To use a network  you don   t really have to know much about how it works   Still  you may feel a little bit better about using the network if you realize that  it doesn   t work by voodoo  A network may seem like magic  but it isn   t  The  following list describes the inner workings of a typical network     Networ
122.  wiring  If it doesn   t   cards that have just RJ 45 connectors are adequate     Most newer network cards are designated as 10 100 1000 Mbps cards   which means that they work at 10 Mbps  100 Mbps  or 1000 Mbps  These  cards automatically detect the network speed and switch accordingly   Ah  progress     1     When you purchase a network card  make sure that you get one that   s  compatible with your computer  Many older computers can accommo   date cards designed for the standard 16 bit ISA bus  Newer computers  can accommodate cards that use the PCI bus  If your computer supports  PCI  purchase a PCI card  PCI cards are not only faster than ISA cards  but are also easier to configure  Use ISA cards only for older computers  that can   t accommodate PCI cards     Network cards can be a bit tricky to set up  Each different card has its  own nuances  You can simplify your life a bit if you use the same card  for every computer in your network  Try not to mix and match network  cards     1  Some computers come with network interfaces built in  In that case  you  don   t have to worry about adding a network card     Installing a network card    Installing a network interface card is a manageable task  but you have to be  willing to roll up your sleeves  If you   ve installed one adapter card  you   ve  installed them all  In other words  installing a network interface card is just  like installing a modem  a new video controller card  a sound card  or any  other type of card  I
123.  you   re  picky about the diagrams  you can even purchase stencil sets that have  accurate drawings of specific devices  such as Cisco routers or IBM  mainframe computers         You can add information to each computer or device in the diagram   such as the serial number or physical location  Then you can quickly  print an inventory that lists this information for each device in the  diagram     You can easily create large diagrams that span multiple pages     Sample Network Plans    In what   s left of this chapter  I present some network plans drawn from real   life situations  These examples illustrate many of the network design issues   I cover earlier in this chapter  The stories you   re about to read are true  The  names have been changed to protect the innocent     Building a small network  California  Sport Surface  Inc     California Sport Surface  Inc   CSS  is a small company specializing in the  installation of outdoor sports surfaces  such as tennis courts  running tracks   and football fields  CSS has an administrative staff of just four employees who  work out of a home office  The company has three computers     A brand new Dell desktop computer running Windows 7 Home Basic  Edition  shared by the president  Mark  and vice president  Mary  to  prepare proposals and marketing brochures  handle correspondence   and do other miscellaneous chores  This computer has a built in  10 100 1000 Mbps Ethernet network port     An older Dell computer running Windows XP 
124.  your computer   s monitor     1  Most network operating systems enable you to set an expiration time  for passwords  For example  you can specify that passwords expire after  30 days  When a user   s password expires  the user must change it  Your  users may consider this process a hassle  but it helps to limit the risk of  someone swiping a password and then trying to break into your  computer system later     You can configure user accounts so that when they change passwords   they can   t reuse a recent password  For example  you can specify that  the new password can   t be identical to any of the user   s past three  passwords     You can also configure security policies so that passwords must include  a mixture of uppercase letters  lowercase letters  numerals  and special    symbols  Thus  passwords like DIMWIT or DUFUS are out  Passwords like       87d0IM wit or duF39 amp US are in     Some administrators of small networks opt against passwords altogether    because they feel that security isn   t an issue on their network  Or short of    that  they choose obvious passwords  assign every user the same pass   word  or print the passwords on giant posters and hang them throughout  the building  Ignoring basic password security is rarely a good idea  even  in small networks  You should consider not using passwords only if your  network is very small  say  two or three computers   if you don   t keep  sensitive data on a file server  or if the main reason for the network
125. 0 World Wide Web  HTTP    110 Post Office Protocol  POP3    119 Network News Transfer Protocol  NNTP    137 NetBIOS Name Service   138 NetBIOS Datagram Service   139 NetBIOS Session Service   143 Internet Message Access Protocol  IMAP    161 Simple Network Management Protocol  SNMP   194 Internet Relay Chat  IRC    389 Lightweight Directory Access Protocol  LDAP   396 NetWare over IP   443 HTTP over TLS SSL  HTTPS     The rules that you set up for the packet filter either permit or deny packets  that specify certain IP addresses or ports  For example  you may permit packets  that are intended for your mail server or your Web server and deny all other  packets  Or  you may set up a rule that specifically denies packets that are  heading for the ports used by NetBIOS  This rule keeps Internet hackers from  trying to access NetBIOS server resources  such as files or printers     One of the biggest weaknesses of packet filtering is that it pretty much trusts  that the packets themselves are telling the truth when they say who they   re  from and who they   re going to  Hackers exploit this weakness by using a  hacking technique called  P spoofing  in which they insert fake IP addresses in  packets that they send to your network     Another weakness of packet filtering is that it examines each packet in isolation   without considering what packets have gone through the firewall before and  what packets may follow  In other words  packet filtering is stateless  Rest  assured that h
126. 02 11g networks operate on the same radio frequency as many cordless  phones  2 4 GHz  If you set up an 802 11b or 802 11g network in your home  and you also have a 2 4 GHz cordless phone  the network and phone may  occasionally interfere with each other  The only way to completely avoid the  interference is to switch to a 900 MHz phone or use more expensive 802 11n  network components  which transmit at 5 GHz rather than at 2 4 GHz     Home on the Range    The maximum range of an 802 11g wireless device indoors is about 300 feet   This range can have an interesting effect when you get a bunch of wireless  computers together     such that some of them are in range of each other  but others are not  Suppose that Wally  Ward  and the Beaver all have wire   less notebooks  Wally   s computer is 200 feet away from Ward   s computer   and Ward   s computer is 200 feet away from Beaver   s in the opposite direc   tion  see Figure 9 2   In this case  Ward can access both Wally   s computer  and Beaver   s computer  but Wally can access only Ward   s computer  and  Beaver can access only Ward   s computer  In other words  Wally and Beaver  can   t access each other   s computers because they   re outside the 300 feet  range limit   This is starting to sound suspiciously like an algebra problem   Now suppose that Wally starts walking toward Ward at 2 miles per hour and  Beaver starts running toward Ward at 4 miles per hour            171    172 Partit  Building Your Own Network       
127. 1    Cane Manager Provides se    Manual Local ae  The 4  Cryptographic Ser    Provides fo    Started Automatic Network S   Services     n    tool       Extended    Standard    SSS        Table 20 1 Key Windows Services          Service What It Does  Computer Maintains a list of computers on the network that can be  Browser accessed  If this service is disabled  the computer cannot use    browsing services  such as My Network Places        DHCP Client Enables the computer to obtain its IP address from a DHCP server   If this service is disabled  the computer s IP address isn t config   ured properly        DNS Client Allows the computer to access a DNS server to resolve DNS  names  If this service is disabled  the computer cannot handle  DNS names  including Internet addresses and Active Directory  names        Server Provides basic file and printer sharing services for the server  If  this service is stopped  clients cannot connect to the server to  access files or printers        Workstation Enables the computer to establish client connections with other  servers  lf this service is disabled  the computer cannot connect  to other servers     NING     Chapter 20  Solving Network Problems 29 7    Key services usually stop for a reason  so simply restarting a stopped service  probably won t solve your network   s problem     at least  not for long  Review  the system log to look for any error messages that may explain why the ser   vice stopped in the first place     If you   r
128. 192  337 343  345  388  fish tape  88  fixes  NOS  142  floppy drive  disabling  324  folders  permissions  261 262  Public  49 50  shared  26 28  31 34  46 49  271 273  forward slash characters  353       Foundation version  Windows Server 2008     fractional T1 line  187   fractional T3 line  187  frequencies  167 168   full backup  313   Full control permission  261   full installation  NOS  137 138  full name  Linux account  361  fully qualified domain names  127    eGo    General tab  Exhange Properties dialog box  223  Properties dialog box  152 153  User Properties dialog box  249 250  generations  backup  318  Gigabit Ethernet  81  GNOME  358 359  graphical user interface  GUD  352  group accounts  255 257  332 333  361  group memberships  246  330  Group Properties dialog box  257  Guest account  331  GUI  graphical user interface   352    e H o    hackers  322  340  hard drive  13  46  65 67  242    See also partitions  hard drive  hardening network  See network hardening  hardware  140 141  352  Hardware Compatibility List  HCL   141  hertz  Hz   167  hidden shares  263  hierarchical naming system  DNS  127  high speed private lines  187  home directory  330  361  home folder  27  253  host ID  in IP address  108 112  115  Hotfix Checker program  242  HTTP  HyperText Transfer Protocol   400  hub  10 11  17  82 83  282  286  325  396  HyperText Transfer Protocol  HTTP   400  Hz  hertz   167    ojo    IBSS  Independent Basic Service Set   176  icons used in book  5  
129. 23  automated installation  NOS  139 140  automatic logon  25    e Bo    backbone speed  282  Background Printing  enabling  374  backup selection  312 313  backups   local  316 317   network  316 317   network administrator tasks  240   before NOS installation  143   number of sets to keep  317 318   overview  309   schedules  238  286   security  320   software for  311   tape  310  318 320  325   types of  312 316   user rights  332   virus threats  345  bands  radio spectrum  169  bandwidth  83  169  BarracudaWare Yosemite Backup  311  baseline  283  Baseline Security Analyzer program  242  Basic Service Set  BSS   175  benchmark  283  binary system  105 107    402    Networking For Dummies  9th Edition       binder  network administration   238  302  390   bits  106  109  115  312 313   BlackBerry devices  222  225 226   BNC connector  101   boot levels  Linux  368   boot partition  355   bottlenecks  278 282   bridges  101 102  176   bringing computer up  11   broadband connections  186   broadcast  SSID  178   broadcast domain  113   Browse for Folder dialog box  32   browser  accessing OWA from  230   browsing network  29 30   BSS  Basic Service Set   175   bus topology  80    oC o    cable   categories of  83 84   checking connections  290 291   crossover  91   infrastructure plan  71 72   installation guidelines  86 87   overview  16 17  82 83   patch panels  91 92   plenum  85   repeaters  99 101   RJ 45 connectors  89 90   shielding  84 85   solid  85 86   strande
130. 24  network protocols  66  132  143  154 155   281  292  371 372  network discovery program  239  networks  components of  16 17  disadvantages of  17 19  overview  1 6  9 12  purpose of  12  14  NetworkView program  239  New dialog box  55 56  New Host dialog box  128 129  New Object     Group dialog box  255 256  New Object     User Wizard  247 249  New Resource Record dialog box  215 216  New Scope Wizard  122 123  newsletters  e mail  303 304  NIC  network interface card   16  96 99  280  911  VoIP calls to  220  nmbd daemon  367  No Locks method  Access  58  node  11  normal backups  313 314  NOS  See network operating system   Windows Server 2008  NOT operation  107  Novell  NetWare  347  NTFS permissions  266  NTFS volumes  332  NWLink IPX SPX NetBIOS Compatible  Transport Protocol  154    ede    octets  108  115   Office  Microsoft  53 58  Office Resource Kit  ORK   53  offline computer  11   offline files  58 60   on the network  11   100 Mbps Ethernet  81  89 90  100BaseT  81  89 90  99 100  online computer  11    On Off switch  computer  289   Open dialog box  54 55   Open System Interconnection  OSI  model   395 400   Open Transport  372   open door approach to security  323 324   opened software packages  346   operating systems  66 67  71  See also  network operating system   Options page  OWA  231   OR operation  107   Organization tab  User Properties  dialog box  250   organizational skills  network  administrator  19  237   ORK  Office Resource Kit   53   OS
131. 252  accounts  See user accounts  Active Directory  134 135  Active Directory Users and Computers  tool  134 135  223 225  246 247   253 257  ad hoc networks  166  176  adapters  wireless networking  172 173  Add E mail Account dialog box  198 199  Add Printer Wizard  35 36  Add Roles Wizard  148  206 208  Add Web Site dialog box  212 214  Address Leases   DHCP management console  124  Address Pool   DHCP management console  124  Address tab  User Properties  dialog box  250  addresses  See IP addresses  Admin Permissions dialog box  273 274  Administrative Setup mode  54  administrator  See network administrator  Administrator account  146  330  Advanced Sharing dialog box  271 272  Advanced Sharing Settings page  45   46  Advanced tab  Microsoft Exchange dialog box  201 202  Properties dialog box  153 154  AFP  AppleTalk Filing Protocol   373  alias  194  All Records method  Access  58  Alohanet  170  Analog Telephone Adapter  ATA   218 220  AND operation  107  antennas  167 168  antivirus programs  344 346  388  Apache Web server  372    Apple  See Macintosh networking  Apple iPhone  223 225  AppleTalk  372 373  AppleTalk Filing Protocol  AFP   373  application gateway  342  Application Layer  OSI model  400  applications  See programs  APs  access points     See wireless access point  archive bit  312 313  ARCnet standard  81  AT amp T 258A  88 89  AT amp T CallVantage  218  ATA  Analog Telephone Adapter   218 220  attachments  e mail  344  346  authorizing DHCP server  1
132. 318   router address  for scope  120   routers  102 103  118  132  187 189  232  398  routine chores  performing  239 240  routing  Network Layer  398    eSe    safe computing  345 346  Samba  installing  366 367  overview  365 366    Samba Server Configuration tool  368 370  starting  367 368  stopping  367 368  scheduled tasks  286  scopes  119 120  security  Access database  58  administrator account  328 329  built in accounts  330 331  closed door approach  323 324  groups  332 333  IPSec  232  logon scripts  334 335  mobile devices  226 227  network administrator tasks  240  open door approach  323 324  overview  18  321 323  passwords  326 328  permissions  332  physical  324 325  policy  network  335  Samba server  368 369  services  NOS  134 135  spyware  286  user accounts  329 330  user profiles  334  user rights  331 332  usernames  325 326  virus protection  388  WAP  383 384  segments  cable  100  282  Select Role Services page  206 207  Select Server Roles page  148 149  206  Select Users  Computers  or Groups  dialog box  200  275  Server Core  136  Server Manager page  147 148  Server Message Block  SMB   366  server roles  147 150  263 264  Server service  296  servers  See also file servers  sharing  configuration options  280 281  database  71  dedicated  15 16  69  DHCP  118 119  123  firewalls  188 189  hardware  280  IIS Web  205 209  intranets  205  loss of privacy on computer used as  18  mail  70  NOS requirements  140 141  operating system  71  141 
133. 7     Planning the Infrastructure    You also need to plan the details of how you ll connect the computers in the  network  You have to determine which network topology the network will  use  which type of cable will be used  where the cable will be routed  and  which other devices     most likely  network switches and perhaps a router      will be needed     Although you have many cabling options to choose from  you ll probably use  Cat5e or better for most     if not all     of the desktop client computers on  the network  However  you have many questions to answer beyond this basic  choice     Where will you place workgroup switches     on a desktop somewhere  within the group or in a central wiring closet     How many client computers will you place on each switch  and how  many switches will you need     If you need more than one switch  which type of cabling will you use to  connect the switches to one another     12    Part Il  Building Your Own Network    ar       For more information about network cabling  see Chapter 5     If you   re installing new network cable  don   t scrimp on the cable itself   Because installing network cable is a labor intensive task  the cost of the cable  itself is a small part of the total cable installation cost  And  if you spend a  little extra to install higher grade cable now  you don   t have to replace the  cable in a few years when it   s time to upgrade the network     Drawing Diagrams    T  Figure 4 4   Using Visio   to create  
134. 9  Choose File    gt Exit to close Outlook and then restart Outlook     The mailbox is configured     Viewing Another Mailbox    Sometimes  you want to set up Outlook so that in addition to the user   s main  mailbox  he has access to another user   s mailbox  For example  suppose you  create a user named Support so that your customers can send e mail to    200 Part Ill  Getting Connected    nay  Figure 11 7   The Mailbox  Rights tab   D          Support YourCompany  com to ask technical support questions  If you don   t  set up at least one of your users so that he can read the Support mailbox   any mail sent to Support YourCompany  com will languish unanswered   Assuming that   s not what you want  you can set up one or more of your users  to access the Support mailbox so that they can read and respond to the mail     First  you must configure the Support user account   s mailbox so that it grants  access rights to the user that you want to have access to the account  To do  that  follow these steps     1  On the server  choose Start   Active Directory Users and Computers   and then find and double click the e mail account you want to access  from another user   s Outlook     The Properties dialog box appears     2  Click the Exchange Advanced tab and then click the Mailbox Rights  button     The Permissions for Support dialog box appears  as shown in Figure 11 7   3  Click the Add button    This brings up a Select Users  Computers  or Groups dialog box   4  Type the name o
135. 96  thin coaxial cable  96  three letter acronym  TLA   11  Time to Live  129  Time Warner Cable Digital Phone  220  TLA  three letter acronym   11  Token Ring standard  81  top level domains  125  topology  network  80  tracking log  299 300  training  network  240  transaction applications  204 205  Transmission Control Protocol Internet  Protocol  See TCP IP  transmission speed  Ethernet  81  Transport Layer  OSI model  398 399  trash  shredding  325  Travan drives  310  Trojan horse programs  322 323  344  Troubleshoot button  Properties  dialog box  153  troubleshooting  client computer  restarting  293 295  computers  fixing  289 290  connection  checking  290 291  documenting  299 300  error messages  291  event logs  298 299  experimenting  292 293  network server  restarting  297 298  network services  restarting  295 297  network settings  292  overview  287 288  tuning network  283  twisted pair cable  16  82 84  88 89  99 101    o  f o    UNC path  36  understudy  network administrator  237  Uninterruptible Power Supply  UPS   143  Unix  137  unshielded twisted pair  UTP  cable  82 84  up computer state  11  updates  142  286  upgrades  137 138  236  uplink port  91  94  UPS  Uninterruptible Power Supply   143  Up to Date Notifications  195  USB adapter  wireless  173  user accounts  administrator  328 329  built in  330 331  creating  246 249  deleting  254 255  disabling  254  domain  245 246  enabling  254  groups  255 257  Linux  356  360 362  local  245 246  
136. Analyzer  If you prefer GUI based tools  check out this  program  which you can download for free from the Microsoft Web site   To find it  go to www microsoft comand search for Microsoft Baseline  Security Analyzer     A third party utility  Get one of those 100 in 1 utility programs  such as  Symantec   s Norton Utilities  It has invaluable utilities for repairing dam   aged hard drives  rearranging the directory structure of your hard drive   and gathering information about your computer and its equipment     Never use a hard drive repair program that isn   t designed to work with  the operating system or version that your computer uses or the file  system you installed  Anytime you upgrade to a newer version of your  operating system  also upgrade your hard drive repair program to a ver   sion that supports the new operating system version     Protocol analyzer  A protocol analyzer  or packet sniffer  can monitor  and log the individual packets that travel along your network  You can  configure the protocol analyzer to filter specific types of packets  watch  for specific types of problems  and provide statistical analysis of the  captured packets     Most network administrators agree that Sniffer  by NetScout Systems   Inc   www netscout com  is the best protocol analyzer available  How   ever  it   s also one of the most expensive  If you prefer a free alternative   check out Ethereal  which you can download for free from www   ethereal com        Network Monitor  Windo
137. Browse to the alias address you just created     For this example  I browsed to hr  lowewriter pri  Figure 12 13  shows the resulting page     2 16 Part Ill  Getting Connected          eS  Figure 12 12   Creating   a CNAME  record   aS       C  HR Web Sile Defaull htm   Windows Internet Explorer    ah  G  FE          internet Explorer canna A ia R     Welcome to the IIR Web Site          Figure 12 13   Viewing a  Web site              Chapter 13    Is Ita Phone or a Computer    Or  Understanding VolP and  Convergence        In This Chapter  How VoIP works  Advantages of VoIP  Disadvantages of VoIP  Some popular VoIP providers    O  of the newest trends in networking is the convergence of two distinct  but similar types of networks  computer networks and telephone net   works  Both types of networks can be either cabled or wireless  and both can  carry voice and data  In other words  the distinction between computer  networks and telephone networks is getting blurry     This chapter gives you a brief introduction to VoJP  a technology that lets you  send voice data over your computer network  In other words  VolP attempts  to make your phone cables obsolete by having the computer network handle  voice traffic    ar  This chapter isn   t a complete guide to VoIP  For that  check out VoIP For  Dummies  written by Timothy V  Kelly and published by Wiley     Understanding VolP    VoIP  which stands for Voice Over IP  Internet Protocol   works much the same  as a regular telephone 
138. Connection  dialog box  With this dialog box  you can choose the network that you want  to join  if more than one network is listed  and then click Connect to join the  selected network     Connecting to a Wireless Network with  Windows Vista or Windows 7    Wireless networking in Windows Vista or Windows 7 is easier than in  Windows XP  When Windows Vista or Windows 7 detects that a wireless net   work is within range  a balloon notification appears on the screen to indicate         82 Part Il  Building Your Own Network    that one or more wireless networks are available  You can double click this  balloon to summon the dialog box shown in Figure 9 8  Then  you can double     click the network you want to connect to        Select a network to connect to  Show  All      My linksys Unsecured network                                   Figure 9 8   Connecting  to a wireless  network   Eee                   Part Ill  Getting Connected       The 5th Wave By Rich Tennant  RICATENN ANT          at   s it  We   re getting a wireless network  for the house        In this part       A fter you build your network  the chapters in this part    show you how to connect it to the outside world   You ll figure out how to connect your network to the Internet   set up and manage an e mail server  set up a corporate  intranet  use your network as a telephone system  and  connect to your network from home  Whew  You ll be  more connected than a Hollywood talent agent        Chapter 10    Connecti
139. Data               Chapter 19  Network Performance Anxiety 285       The Windows Performance Monitor lets you keep track of several different  aspects of system performance at a time  You track each performance aspect  by setting up a counter  You can choose from dozens of different counters   Table 19 1 describes some of the most commonly used counters  Note that  each counter refers to a server object  such as physical disk  memory  or  processor              Table 19 1 Commonly Used Performance Counters   Object Counter What It Indicates   Physical   Free Space The percentage of free space on the server s   Disk physical disks  The free space should measure  at least 15 percent    Physical Average Queue How many disk operations are waiting while the   Disk Length disk is busy servicing other disk operations  The    number of operations should be two or fewer        Memory Pages Second The number of pages retrieved from the vir   tual memory page files per second  A typical  threshold is about 2 500 pages per second        Processor   Processor Time The percentage of the processor s time that  itis doing work rather than sitting idle  The  amount of time should be 85 percent or less     Here are a few more things to consider about performance monitoring     Performance Monitor enables you to view real time data or to view  data that you can save in a log file  Real time data gives you an idea  about what   s happening with the network at a particular moment  but  the more u
140. Explorer       E SUED          k S hipan    making  ion  please see the    Host Name    Domain Name    Firmware Version   LAN IP Address  E           eN      Enable    Disable  Figure 9 4  ssp   linksys  The main hoor Shia  configura  WEP  O Mandatory    Disable  _WEPKey Semng  tion page EEE inc adress  00 208A24 30 11  for a typical      wireless  access  point router   SSW  SSID Broadcast  Disables the access point   s periodic broadcast of the SSID   Normally  the access point regularly broadcasts its SSID so that wireless    i  devices that come within range can detect the network and join in   For a more secure network  you can disable this function  Then a wire   less client must already know the network   s SSID to join the network   Channel  Lets you select one of 11 channels on which to broadcast  All  the access points and computers in the wireless network should use the  same channel   ar    If you find that your network frequently loses connections  try switching  to another channel  You may be experiencing interference from a cord   less phone or other wireless device operating on the same channel     Switching channels is also a friendly way for neighbors with wireless net   works to stay out of each other   s way  For example  if you share a build   ing with another tenant who also has a wireless network  you can agree  to use separate channels so that your wireless networks don   t interfere  with each other  Keep in mind that this agreement doesn   t give you
141. For the complete lowdown on networking cables  refer to Chapter 5     Chapter 1  Networks Will Not Take Over the World  and Other Network Basics   7    ar    You can do away with network cable by creating a wireless network   although that option has some challenges of its own  For more informa   tion about wireless networking  see Chapter 9        Network switch  Networks built with twisted pair cabling require one  or more switches  A switch is a box with a bunch of cable connectors   Each computer on the network is connected by cable to the switch  The  switch  in turn  connects all the computers to each other     In the early days of twisted pair networking  devices known as hubs were  used rather than switches  The term hub is sometimes used to refer to  switches  but true hubs went out of style sometime around the turn of  the century        Network software  Of course  the software makes the network work  To  make any network work  a whole bunch of software has to be set up just  right  For peer to peer networking with Windows  you have to play with  the Control Panel to get networking to work  And  a network operating  system  such as Windows Server 2008  requires a substantial amount of     i  tweaking to get it to work just right     For more information about choosing which network software to use for  your network  refer to Chapter 7     It   s Not a Personal Computer Anymore     If I had to choose one point that I want you to remember from this chapter  more than
142. HIS  WORK AND SPECIFICALLY DISCLAIM ALL WARRANTIES  INCLUDING WITHOUT LIMITATION WARRANTIES  OF FITNESS FOR A PARTICULAR PURPOSE  NO WARRANTY MAY BE CREATED OR EXTENDED BY SALES OR  PROMOTIONAL MATERIALS  THE ADVICE AND STRATEGIES CONTAINED HEREIN MAY NOT BE SUITABLE FOR  EVERY SITUATION  THIS WORK IS SOLD WITH THE UNDERSTANDING THAT THE PUBLISHER IS NOT ENGAGED  IN RENDERING LEGAL  ACCOUNTING  OR OTHER PROFESSIONAL SERVICES  IF PROFESSIONAL ASSISTANCE  IS REQUIRED  THE SERVICES OF A COMPETENT PROFESSIONAL PERSON SHOULD BE SOUGHT  NEITHER THE  PUBLISHER NOR THE AUTHOR SHALL BE LIABLE FOR DAMAGES ARISING HEREFROM  THE FACT THAT AN  ORGANIZATION OR WEBSITE IS REFERRED TO IN THIS WORK AS A CITATION AND OR A POTENTIAL SOURCE  OF FURTHER INFORMATION DOES NOT MEAN THAT THE AUTHOR OR THE PUBLISHER ENDORSES THE INFOR   MATION THE ORGANIZATION OR WEBSITE MAY PROVIDE OR RECOMMENDATIONS IT MAY MAKE  FURTHER   READERS SHOULD BE AWARE THAT INTERNET WEBSITES LISTED IN THIS WORK MAY HAVE CHANGED OR  DISAPPEARED BETWEEN WHEN THIS WORK WAS WRITTEN AND WHEN IT IS READ        For general information on our other products and services  please contact our Customer Care  Department within the U S  at 877 762 2974  outside the U S  at 317 572 3993  or fax 317 572 4002     For technical support  please visit www wiley com techsupport     Wiley also publishes its books in a variety of electronic formats  Some content that appears in print may  not be available in electronic books     Library of Congr
143. Home Edition  used by  the bookkeeper  Erin   who uses QuickBooks to handle the company   s  accounting needs  This computer also has a built in network port  but it  is just a 10 100 port     it does not support Gigabit speed     74 Partit  Building Your Own Network       A notebook that runs Windows Vista Ultimate Edition  used by the com   pany   s chief engineer  Daniel   who often takes it to job sites to help  with engineering needs  This computer has a built in 10 100 1000 Mbps  Ethernet port     The company owns just one printer  a moderately priced inkjet printer that   s  connected to Erin   s computer  The computers aren   t networked  so when   ever Mark  Julie  or Daniel needs to print something  that person must copy  the file to a diskette and give it to Erin  who then prints the document  The  computer shared by Mark and Julie is connected to the Internet by using a  residential DSL connection     The company wants to install a network to support these three computers   Here are the primary goals of the network     1  Provide shared access to the printer so that users don   t have to  exchange diskettes to print their documents     Provide shared access to the Internet connection so that users can  access the Internet from any of the computers     Allow for the addition of another desktop computer  which the company  expects to purchase within the next six months  and potentially another  notebook computer   If business is good  the company hopes to hire  anot
144. I  Open System Interconnection  model   395 400   Outlook  197 199  201 202   Outlook Mobile Access  195  223   Outlook Web Access  196  229 231   ownership  file  332    eo po    packet filtering  339 341  packet sniffer  242  packets  81  93  parent domain  125  PartitionMagic program  PowerQuest  356  partitions  hard drive  65 66  1  142  144  355  password generators  328  passwords  account options  251  administrator  143  329  logging on with  24 25  Mac  373  NOS policies  134  security  326 328  user account  246  253 254  329  patch cables  85  95  291  patch panels  91 92  patches  346 347  path  share  263  Pause key  291  Pause Printing command  38 39  PC card  wireless  173  PC user groups  304  PCI card  wireless  172 173  PCI slots  98  PCs  networking Macs with  375 376  PDAs  Personal Digital Assistants   222    408    Networking For Dummies  9th Edition       peer to peer network  15 16  69  performance  backups  316  bottlenecks  278 282  monitoring  284 285  overview  277  problems  277 278  tips  286  tuning  283  performance counters  285  Performance Monitor tool  284 285  perimeter  189  339  permissions  granting  273 275  model  323 324  network storage  260 262  overview  332  share  263  troubleshooting  292  user  49  Permissions for Support dialog box  200  Personal Digital Assistants  PDAs   222  phones  cordless  171  Physical Layer  OSI model  396  physical map  72  physical security  324 325  ping command  147  pins  88 90  planning network
145. IEEE 802 11 standards  170 173    Index 4 05       IIS  Internet Information Services   Manager  212 213  IIS  Internet Information Services  Web  servers  205 209  ILS  Internet Locator Service   197  IMAP4 protocol  196  incremental backups  314 315  Independent Basic Service Set  IBSS   176  infrastructure  71 72  282  infrastructure mode  166  174 175  Initial Configuration Tasks page  145   147 148  Installation program  Linux  362  Installation Results page   Add Roles Wizard  208 209  interference  sources of  86  Internet  cable connections  186  connecting LAN to through router  103  DSL connections  186  firewalls  188 192  337 338  high speed private lines  187  overview  12  185  password generators  328  research on  244  sharing connection  187  VoIP service  220  Internet Information Services  IIS   Manager  212 213  Internet Information Services  IIS  Web  servers  205 209  Internet Locator Service  ILS   197  Internet Protocol  IP  addresses  108 111   128  177  See also TCP IP  Internet Protocol  TCP IP  item  Properties  dialog box  154  Internet Protocol version 6  IPv6   112  Internet Service Provider  ISP   185  intranets  IIS Web servers  setting up  205 209  overview  203 204  pages  creating  210 212  requirements  205  uses for  204 205  Web sites  creating  212 216  inventory  65 68  238 239  IP  Internet Protocol  addresses  108 111   128  177  See also TCP IP  IP spoofing  340  ipconfig  all command  147  397  iPhone  configuring Exchange for  223
146. L aL aL ab  2550 255R 240  0    Don   t confuse a subnet mask with an IP address  A subnet mask doesn   t repre   sent any device or network on the Internet  It   s just a way of indicating which  portion of an IP address should be used to determine the network ID   You can  spot a subnet mask right away because the first octet is always 255  and 255  isn   t a valid first octet for any class of IP address      The great subnet roundup    You should know about a few additional restrictions that are placed on  subnet masks     in particular     The minimum number of network ID bits is eight  As a result  the first  octet of a subnet mask is always 255     vw The maximum number of network ID bits is 30  You have to leave at least  two bits for the host ID portion of the address  to allow for at least two  hosts  If you used all 32 bits for the network ID  that would leave no bits  for the host ID  Obviously  that doesn   t work  Leaving just one bit for  the host ID doesn   t work  either  That   s because a host ID of all ones is  reserved for a broadcast address     and all zeros refers to the network  itself  Thus  if you used 31 bits for the network ID and left only one for  the host ID  host ID 1 would be used for the broadcast address and host  ID 0 would be the network itself  leaving no room for actual hosts  That   s  why the maximum network ID size is 30 bits     Because the network ID is always composed of consecutive bits set to 1   only nine values are possible for
147. NG     Here are some other threats to physical security that you may not have  considered     The nightly cleaning crew probably has complete access to your facility   How do you know that the person who vacuums your office every night  doesn   t really work for your chief competitor or doesn   t consider com   puter hacking to be a sideline hobby  You don   t  so consider the clean   ing crew to be a threat     What about your trash  Paper shredders aren   t just for Enron accoun   tants  Your trash can contain all sorts of useful information  sales reports   security logs  printed copies of the company   s security policy  even  hand written passwords  For the best security  every piece of paper that  leaves your building via the trash bin should first go through a shredder     1  Where do you store your backup tapes  Don   t just stack them up next  to the server  Not only does that make them easy to steal  it also defeats  one of the main purposes of backing up your data in the first place   securing your server from physical threats  such as fires  If a fire burns  down your computer room and the backup tapes are sitting unprotected  next to the server  your company may go out of business and you   ll cer   tainly be out of a job  Store the backup tapes securely in a fireproof safe  and keep a copy off site  too     4 I   ve seen some networks in which the servers are in a locked computer  room  but the hubs or switches are in an unsecured closet  Remember  that every un
148. NT 3 1 and NetWare  3 x   each server computer maintained its own directory database     a file that  contained an organized list of the resources available just on that server  The  problem with that approach was that network administrators had to maintain  each directory database separately  That wasn   t too bad for networks with  just a few servers  but maintaining the directory on a network with dozens or  even hundreds of servers was next to impossible     In addition  early directory services  programs that made the directory data   bases usable  were application specific  For example  a server had one direc   tory database for user logons  another for file sharing  and yet another for  e mail addresses  Each directory had its own tools for adding  updating  and  deleting directory entries     The most popular modern directory service is Active Directory  which is  standard with Windows based server operating systems  Active Directory  provides a single directory of all network resources  It drops the old style  15 character domain and computer names that were used by Windows NT  Server in favor of Internet style DNS style names  such as Marketing   MyCompany com or Sales  YourCompany com  Figure 7 1 shows the Active  Directory Users and Computers tool  which manages Active Directory user  and computer accounts on Windows Server 2008     Security services    All network operating systems must provide some measure of security to  protect the network from unauthorized ac
149. O 100 VE Network Conne    This connection uses the following tems     Chent for Microsoft Networks  ca B detemrestic Network Enhancer  M  E VMware Bridge Protocol    SB  Fie and Printer Shanna for Microsoft Networks y   lt   gt       Install Uninstal Properties    Description          Figure 3 1  Allows your computer to access resources on a Microsoft  The Local asai  Area  E  Show icon n notification arca when connected  Connection     Z  Notiy me when this connection has imted orno connectivity  Properties  Ceglar Co Core   j    Enabling File and Printer Sharing   Windows Vista     To enable file and printer sharing in Windows Vista  follow these steps     1  Choose Start   Network    This step opens the Network folder   2  Click the Network and Sharing Center button on the toolbar    This step opens the Network and Sharing Center  as shown in Figure 3 2   3  Click File Sharing     This step reveals the controls that enable you to activate file sharing  as  shown in Figure 3 3     4  Select the Turn On File Sharing option and then click Apply     This file sharing feature is activated     on      Select the Printer Sharing option   This step reveals the controls that enable you to activate printer sharing   6  Select the Turn On Printer Sharing option and then click Apply     This file sharing feature is activated     a       Close the Network and Sharing Center folder     You re done  you can now share your files and printers   y y    4 4 Part I  Let s Network     E   Figu
150. P IP   23    client computers to use  After you complete the wizard  the DHCP server is  properly configured  It doesn   t start running  however  until you authorize it   as I describe in the next section     After you set up a DHCP server  you can manage it from the DHCP manage   ment console by choosing StartAdministrative Tools  DHCP or by clicking  Manage This DHCP Server from the Manage Your Server application  Either  way  the DHCP management console appears  as shown in Figure 6 3         iojxj    ble aton wew Hep  e   mxs nreo  DHCP   scope  192 168 1 0  office  H  2  web1 mydomain com  207 126    a Nre     2 Address Pool  G Address Leases  E GA Reservatives  G   Scope Options  C Server Options                      SI  Figure 6 3   The DHCP   manage   ment  console    PC                From the DHCP console  you have complete control over the DHCP server   s  configuration and operation  The following paragraphs summarize some of  the things you can do from the DHCP console     Authorize the DHCP server  which allows it to begin assigning  client IP addresses  To authorize a server  select the server  choose  Action   Manage Authorized Servers  and click Authorize     Add another scope  Right click the server in the tree and choose the  New Scope command from the menu that appears  This action opens the  New Scope Wizard so that you can create a new scope     Activate or deactivate a scope  Right click the scope in the tree and  choose the Activate or Deactivate comm
151. PC  and you either have a network or you   re thinking about get   ting one  I hope that you know  and are on speaking terms with  someone  who knows more about computers than you do  My goal is to decrease your  reliance on that person  but don   t throw away his or her phone number yet     Is this book useful for Macintosh users  Absolutely  Although the bulk of this  book is devoted to showing you how to link Windows based computers to  form a network  you can find information about how to network Macintosh  computers as well     Windows 7  Gotcha covered  You   ll find plenty of information about how to  network with the latest and greatest Microsoft operating system     How This Book Is Organized    Inside this book  you find chapters arranged in seven parts  Each chapter breaks  down into sections that cover various aspects of the chapter   s main subject     4 Networking For Dummies  9th Edition       The chapters are in a logical sequence  so reading them in order  if you want to  read the whole thing  makes sense  But the book is modular enough that you  can pick it up and start reading at any point     Here   s the lowdown on what   s in each of the seven parts     Part     Let   s Network     The chapters in this part present a layperson   s introduction to what network   ing is all about  This part is a good place to start if you   re clueless about what  a network is and why you   re suddenly expected to use one  It   s also a great  place to start if you   re a 
152. Ra 246  Setting User Properties              ccccccsccsssessssssessssessessscesseesecessecssesseesseesseeesnees 249  Changing the user   s contact information              ccscceseeseeteeeeeeees 250  Setting account OPTIONS 0 0    cece eessessceeseeeseeeeeesecesecesecsseeeeeenseesaes 250  Setting the user   s profile information              ccesccsceseeeseeeeeseeeeees 252  Resetting User Passwords           ccccccsssesssseesseeeesneesseeeesseeenseecsseeesseeeseseessaees 253  Disabling and Enabling User ACCOUNTS           cei eeseeeeeeneeeeeceeeeteeeeeeeeneeaeees 254  Deleting A SOY iss tis tasadeaas cas cotheesassndevevevesdaonbatebades teens ts ET EEE EA RARs 254  Working with Groups sensensa as eE E EEE 255  Creating a SY OUP amiert sates see EEEE TAEAE 255  Adding a m  mber to     POU    c ccsccesssacescscssecsssscssecssceecstescsazicsnssnass 256  Creating a Logon SCript seroit eR N E N REE 258   Chapter 18  Managing Network Storage                    0055 259   Understanding Network Storage            ccccscccsseesseessceseessecseeceseesseeseeeseeeseees 259  File SCY VMS vsesiedscescs testsdasesveenscstedescatees ssecveistadeeards tosds atiaraeiate deans ents 259  Storage appliances            cescssscssscsssesssessscsssescessesseesssessaeeseeeseeessessees 260   Understanding Permissions      i c    00  steiasn tase ccndieseeieatieeee 260   Understanding Shares            cccccsscssscsssesssessessssesesssecsscesseessecssesssesseesseessness 262   Configuring the File Serv
153. TLA  which stands for extended three letter  acronym   After all  it just wouldn   t be right if the acronym for four letter  acronym had only three letters      On the network  Every computer connected to the network is said to  be on the network  The technical term  which you can forget  for a com   puter that   s on the network is a node     Online  When a computer is turned on and can access the network  the  computer is said to be online  When a computer can   t access the network   it   s offline  A computer can be offline for several reasons  The computer  can be turned off  the user may have disabled the network connection  the  computer may be broken  the cable that connects it to the network can be  unplugged  or a wad of gum can be jammed into the disk drive     Up  When a computer is turned on and working properly  it   s said to be  up  When a computer is turned off  broken  or being serviced  it   s said  to be down  Turning off a computer is sometimes called taking it down   Turning it back on is sometimes called bringing it up     11    12    Part I  Let s Network     ar       Don   t confuse local area networks with the Internet  The  nfernet is a huge  amalgamation of computer networks strewn about the entire planet   Networking the computers in your home or office so that they can share infor   mation with one another and connecting your computer to the worldwide  Internet are two separate  but related  tasks  If you want to use your local area  network to 
154. This brings up the Properties  dialog box  The following sections describe the Exchange features that are  available from the various tabs of this dialog box     The Exchange General tab    The Exchange General tab  as shown in Figure 11 1  lets you set the following  options     1  Alias  The default is the user   s name  but you can change it if you want     1    Delivery Restrictions  This button brings up a dialog box that lets you  set a message size limit for incoming and outgoing messages  You can  also specify who the user can receive messages from     1     Delivery Options  This button brings up a dialog box that lets you  create a forwarding address and grant permission to other users to send  on behalf of this account     1  Storage Limits  This button brings up a dialog box that lets you set  the storage limits for the user   s mailbox  You can specify that a warn   ing message should be sent when the mailbox reaches a specified size   Then  you can specify another size after which the user won   t be allowed  to send or receive mail           Hes   Dan   Croma   Semi   Pam coed    Eom ddderes   EechergeFesum   Peto choc    Jeera Serco    TB Extn Jere  biia pire     HA Ter Tiga Coca ation Sore AT   Air     a    D aiji aije Poy a irata a  Dibia dele pani i a O e    heapinj zkien    hira        Tope ip Pe hbi ae wg  nel herd  cab Sia    aed hee beng On er  ected ere         _   _twet  __   L       Chapter 11  Managing E Mail with Exchange 2007   95       The E mail
155. This service is running       lt 4 auditd    Description   al avahi daemon _  NetworkManager is a tool for easily managing network    connections     8      bluetooth  E cpuspeed    4 crond      lt   cups       cups config daemon     amp  dnsmasq     amp  firstboor     lt  fuse    9   lt    haldaemon     amp  httpd     4 ip6tables  a    Bluetooth services    run cron daemon    The CUPS scheduler    Start and stop fuse        start and stop Apache      U  start and stop ip6table v    55                    t3  S Serice             Chapter 25  Networking with Linux 365       2  Select the NetworkManager service   You ll have to scroll down the list of services to find it   3  Click the Restart button     The service is stopped and then started again  When it   s finished  a small  dialog box displaying the message Network Restart Successful is displayed     4  Click OK   You re returned to the Service Configuration program   5  Close the Service Configuration program   If you prefer working in a command shell  you can restart the network by    entering the command service network restart  Doing so results ina  display like this     Shutting down interface eth0    OK    Shutting down loopback interface  ne    Setting network parameters    x l  Bringing up loopback interface    OK    Bringing up interface eth0    OK      Doing the Samba Dance    Until now  you probably thought of Samba as an intricate Brazilian dance  with fun rhythms  But in the Linux world  Samba refers to a fil
156. VERO1    lt     This folder ia online     V  Aways avaiable offie    You can keep a copy of this network faldar an your computer  so you Can acvess ils files when the server is not avaiable        Seno       Figure 3 12  Low do affine files wok   Offline file  properties             E  ox     Employers love the offline files feature because it encourages their  employees to work at home during evenings and weekends  In fact   every time you use the offline files feature to work at home  your boss  sends Bill Gates a nickel  That   s how he got so rich     Part Il  Building Your  Own Network    The 5 Wave By Rich Tennant     TROUBLE ON THE SET         RICHTENNA NT    All the software in the world  won t make this a great film   Only you can  Rusty  Only you  and the guts and determination  to be the finest Frisbee catching    dog in this dirty little town   Now come on Rusty  it   s nari tine       In this part       ou discover how to build a network yourself  which   includes planning it and installing it  And you find  out what choices are available for cable types  network  operating systems  and all the other bits and pieces that    you have to contend with     Yes  some technical information is included in these chap   ters  Fear not  I bring you tidings of great joy  Lo  a work   ing network is at hand  and you     yea  even you     can  design it and install it yourself        Chapter 4  Planning Your Network    In This Chapter  Creating a network plan  Working with a 
157. Windows can display a friendly logon  screen that displays an icon for each of the computer   s local users  The user  can log on simply by clicking the appropriate icon and entering a password    This feature isn   t available for computers that have joined a domain      Note that if the user logs on by using a local computer account rather than   a domain account  she can still access domain resources  A Connect To  dialog box appears whenever the user attempts to access a domain resource   Then the user can enter a domain username and password to connect to the  domain     164  Partit  Building Your Own Network       Chapter 9  Wireless Networking    In This Chapter  Looking at wireless network standards  Reviewing some basic radio terms  Considering infrastructure and ad hoc networks  Working with a wireless access point  Configuring Windows for wireless networking    W  wireless networking  you don   t need cables to connect your  computers  Instead  wireless networks use radio waves to send and    receive network signals  As a result  a computer can connect to a wireless    network at any location in your home or office   4  Wireless networks are especially useful for notebook computers  After all  the  main benefit of a notebook computer is that you can move it     This chapter introduces the ins and outs of using a wireless network     Diving into Wireless Networking    A wireless network is a network that uses radio signals rather than direct  cable connections to ex
158. Wireless Networking    The first step in configuring Windows XP for wireless networking is to  install the appropriate device driver for your wireless network adapter     180 Partii  Building Your Own Network    ar    T  Figure 9 6   Configuring  wireless  networking  in Windows  XP   SS       To do that  you need the installation CD that came with the adapter  Follow  the instructions that came with the adapter to install the drivers     Windows XP has some nice built in features for working with wireless net   works  Follow these steps to access the features   1  Open the Network Connections folder     Choose Start   Control Panel and then double click the Network  Connections icon     2  Right click the wireless network connection and then choose  Properties to open the Properties dialog box     3  Click the Wireless Networks tab     The wireless networking options are displayed  as shown in Figure 9 6        lL Wireless Network Connection Properties DB  General  Wireless Networks   Advanced          Available networks  To connect to an available network  click Configure     Q inksys Configuie     C Retrech      Prefened networks     Automatically connect to available networks in the order listed         q inksys  Add    Remove Properties  paelan tting up wireless network EE      Cm  cea                 Each time you connect to a wireless network  Windows XP adds that net   work to this dialog box  Then you can juggle the order of the networks in the  Preferred Networks se
159. Word  Excel  or PowerPoint by choosing File  New  you  see a dialog box that lets you choose a template for the new document     56    Part I  Let s Network        Office comes with a set of templates for the most common types of docu   ments  These templates are grouped under the various tabs that appear  across the top of the New dialog box     In addition to the templates that come with Office  you can create your own  templates in Word  Excel  and PowerPoint  Creating your own templates is  especially useful if you want to establish a consistent look for documents  prepared by your network users  For example  you can create a Letter tem   plate that includes your company   s letterhead  or a Proposal template that  includes a company logo     Office enables you to store templates in two locations  Where you put them  depends on what you want to do with them     The User Templates folder on each user   s local disk drive  If a particu   lar user needs a specialized template  put it here     The Workgroup Templates folder on a shared network drive  If you  have templates that you want to make available to all network users on  the network server  put them here  This arrangement still allows each  user to create templates that aren   t available to other network users     When you use both a User Templates folder and a Workgroup Templates  folder  Office combines the templates from both folders and lists them in  alphabetical order in the New dialog box  For example  the Use
160. a  problem         Many performance problems are intermittent  Sometimes a user calls you  and complains that a certain network operation has become slower than  molasses  and by the time you get to that person   s desk  the operation  performs in a snap  Sometimes you can find a pattern to the intermittent  behavior  such as it   s slower in the morning than in the afternoon or it   s  slow only while backups are running or while the printer is working  At  other times  you can   t find a pattern  Sometimes the operation is slow   and sometimes it isn   t     Performance tuning isn   t an exact science  Improving performance  sometimes involves educated guesswork  Will upgrading all users from  100 Mbps to 1 Gbps improve performance  Probably  Will segmenting  the network improve performance  Maybe  Will adding another 4GB of  RAM to the server improve performance  Hopefully     The solution to a performance problem is sometimes a hard sell  If a  user can   t access the network because of a malfunctioning component   the purchase of a replacement is usually undeniably justified  However   if the network is slow and you think that you can fix it by upgrading the  entire network to gigabit Ethernet  you may have trouble selling manage   ment on the upgrade     What Exactly Is a Bottleneck     The term bottleneck doesn   t refer in any way to the physique of the typical com   puter geek  Rather  computer geeks coined the phrase when they discovered    Chapter 19  Network Perfo
161. a class  Buy  each one a copy of this book  and tell them to read it during the lunch  hour  Hold their hands  Just don   t treat them like idiots     Chapter 16  Welcome to Network Management 24         Create a network cheat sheet  It should contain everything users need  to know about using the network     on one page  Everyone needs a copy     Be as responsive as possible  If you don   t quickly fix a network user   s  problem  he may try to fix it  You don   t want that to happen     av  The better you understand the psychology of network users  the more pre   pared you are for the strangeness they often serve up  Toward that end  I  recommend that you read the Diagnostic and Statistical Manual of Mental  Disorders  also known as DSM IV  from cover to cover     Acquiring Software Tools for  Network Administrators    Network managers need certain tools to get their jobs done  Managers of big   complicated  expensive networks need big  complicated  expensive tools   Managers of small networks need small tools     Some of the tools that a manager needs are hardware tools  such as screw   drivers  cable crimpers  and hammers  The tools I   m talking about  however   are software tools  I mention a couple of them earlier in this chapter  Visio   to help you draw network diagrams  and a network discovery tool to help  you map your network  Here are a few others     Built in TCP IP commands  Many of the software tools that you need  in order to manage a network come with the ne
162. a network  diagram     One of the most helpful techniques for creating a network plan is to draw a  picture of it  The diagram can be a detailed floor plan  showing the actual  location of each network component  This type of diagram is sometimes  called a physical map  If you prefer  the diagram can be a logical map  which  is more abstract and Picasso like  Anytime you change the network layout   update the diagram  Also include a detailed description of the change  the  date that the change was made  and the reason for the change     You can diagram very small networks on the back of a napkin  but if the net   work has more than a few computers  use a drawing program to help you  create the diagram  One of the best programs for this purpose is Microsoft  Visio  as shown in Figure 4 4        4 Microsoft Visio    fg020108 vsd Page 1      El  Ee Edt yew Insert Format Jools Shape Window Help  8x  nt D SUGA SRY i PBS o  RREA Gl    OW    Normal   A a acme    x      ee  1S GEIS TS         Normal    Shapes                Chapter 4  Planning Your Network 13    Here   s a rundown of some of the features that make Visio useful     1  Smart shapes and connectors maintain the connections you draw  between network components  even if you rearrange the layout of the  components on the page     Stencils provide dozens of useful shapes for common network  components     not just client and server computers  but also routers   hubs  switches  and just about anything else you can imagine  If
163. ackers have figured out how to exploit the stateless nature of  packet filtering to get through firewalls     Chapter 24  Hardening Your Network 34         In spite of these weaknesses  packet filter firewalls have several advantages  that explain why they   re commonly used     Y Packet filters are very efficient  They hold up each inbound and out   bound packet for only a few milliseconds while they look inside the  packet to determine the destination and source ports and addresses   After these addresses and ports have been determined  the packet filter  quickly applies its rules and either sends the packet along or rejects it   In contrast  other firewall techniques have a more noticeable perfor   mance overhead     Y Packet filters are almost completely transparent to users  The only  time a user will be aware that a packet filter firewall is being used is  when the firewall rejects packets  Other firewall techniques require that  clients and or servers be specially configured to work with the firewall     Y Packet filters are inexpensive  Most routers include built in packet  filtering     Stateful packet inspection  SP1     Stateful packet inspection  also known as SPI  is a step up in intelligence from  simple packet filtering  A firewall with SPI looks at packets in groups rather  than individually  It keeps track of which packets have passed through the  firewall and can detect patterns that indicate unauthorized access  In some  cases  the firewall may hold on to p
164. ackets as they arrive until the firewall has  gathered enough information to make a decision about whether the packets  should be authorized or rejected     Stateful packet inspection was once found only on expensive  enterprise   level routers  Now  however  SPI firewalls are affordable enough for small  or  medium sized networks to use     Circuit level gateway    A circuit level gateway manages connections between clients and servers based  on TCP IP addresses and port numbers  After the connection is established   the gateway doesn   t interfere with packets flowing between the systems     For example  you could use a Telnet circuit level gateway to allow Telnet  connections  port 23  to a particular server and prohibit other types of con   nections to that server  After the connection is established  the circuit level  gateway allows packets to flow freely over the connection  As a result  the  circuit level gateway can   t prevent a Telnet user from running specific  programs or using specific commands     34 2 Part V  Protecting Your Network       Application gateway    An application gateway is a firewall system that   s more intelligent than a  packet filtering  stateful packet inspection  or circuit level gateway firewall   Packet filters treat all TCP IP packets the same  In contrast  application gate   ways know the details about the applications that generate the packets that  pass through the firewall  For example  a Web application gateway is aware  of the deta
165. adapter   s Properties dialog  box  the network connection   s Properties dialog box closes  Select  the Change Settings of This Connection option again to continue the  procedure       Make sure that the network items your client requires are listed in the  network connection Properties dialog box     The following list describes the items you commonly see listed here   Note that not all networks need all these items     e Client for Microsoft Networks  This item is required if you want to  access a Microsoft Windows network  It should always be present     e File and Printer Sharing for Microsoft Networks  This item allows  your computer to share its files or printers with other computers  on the network     This option is usually used with peer to peer networks  but you  can use it even if your network has dedicated servers  However   if you don   t plan to share files or printers on the client computer   you should disable this item     e Internet Protocol  TCP IP   This item enables the client computer to  communicate by using the TCP IP protocol     If all servers on the network support TCP IP  this protocol should  be the only one installed on the client     e NWLink IPX SPX NetBIOS Compatible Transport Protocol  This pro   tocol is required only if your network needs to connect to an older  NetWare network that uses the IPX SPX protocol     ar    6     10     Chapter 8  Configuring Windows XP  Vista  and 7 Clients    If a protocol that you need isn   t listed  click t
166. add other records  such as MX or CNAME records  in the same way     Configuring a Windows DNS Client    Client computers don   t need much configuration to work properly with DNS   The client must have the address of at least one DNS server  Usually  this  address is supplied by DHCP  so if the client is configured to obtain its IP  address from a DHCP server  it also obtains the DNS server address from  DHCP     To configure a client computer to obtain the DNS server location from   DHCP  open the Network Properties dialog box by choosing Network or  Network Connections in the Control Panel  depending on which version of  Windows the client is running   Then select the TCP IP protocol and click the  Properties button  This action summons the TCP IP Properties dialog box   which was shown back in Figure 6 4  To configure the computer to use DHCP   select the Obtain an IP Address Automatically and the Obtain DNS Server  Address Automatically options  Click OK and you   re done     130 Part it  Building Your Own Network       Chapter 7  Setting Up a Server    In This Chapter    Getting a handle on network operating system features   Discovering Windows Server and other server options   Thinking about the different ways to install a network operating system  Getting ready for the installation   Installing a network operating system   Figuring out what to do after you install the network operating system  Configuring your server roles    0 ne of the basic choices that you must ma
167. address automatically    O Use the tollawing IP address       Obtain DNS server address automatically     Use the following DNS server addresses       Preferred DNS server 192   168  1 10  Akemate DNS server  85   255 112  61          Configuring Windows Vista and  Windows 7 network connections    The procedures for configuring a network connection on Windows Vista  and Windows 7 are similar to the procedure for Windows XP  With Windows  Vista and Windows 7  Microsoft decided to make the network adapter  Properties dialog box harder to find  But after you find it  the configuration  steps are the same     To find the settings you need  follow these steps     1  Choose Start   Control Panel   The Control Panel appears     2  Choose View Network Status and Tasks under the Network and  Internet heading     This step opens the Network and Sharing Center  Figure 8 5 shows the  Windows 7 version  the Windows Vista version is similar     3a  For Windows 7  click Change Adapter Settings   3b  For Windows Vista  click Manage Network Connections     Either way  the Network Connections folder appears  Figure 8 6 shows  the Windows 7 version     SSF  Figure 8 5   The Network  and Sharing  Center   Windows 7         Figure 8 6   The Network  Connections  folder   Windows 7      Coy   e SE    Network and Internet    Network and Sharing Center   l  Search ControtPanet      Chapter 8  Configuring Windows XP  Vista  and 7 Clients   5 7    fon       Control Panel Ho r       5  n View your basi
168. aily operation of your network  Ordinarily   these logs run in the background  quietly gathering information about net   work events  When something goes wrong  you can check the logs to see  whether the problem generated a noteworthy event  In many cases  the event  logs contain an entry that pinpoints the exact cause of the problem and sug   gests a solution     To display the event logs in a Windows server  use Event Viewer  which   is available from the Administrative Tools menu  For example  Figure 20 2  shows an Event Viewer from a Windows Server 2008 system  The tree listing  on the left side of Event Viewer lists five categories of events that are tracked   Application  Security  System  Directory Service  and File Replication Service  events  Select one of these options to see the log that you want to view  For  details about a particular event  double click the event to display a dialog box  with detailed information about the event     Chapter 20  Solving Network Problems 299                                              ox  ble   action wew Hel  le  gt    Olm Ss ARA      system 399 event s   5 29 2005 10 90 12    Lsadrv  Directory Service sien MO Heed  jti  Fle Replication Service Waning 123  10 39 12 Leasy  Warming 5 29 2003 10 33 16    LsaSrv  warning 5 29 2005 10 33 16    LsaSrv  G information 5 29 2005 10 33 17    SMTPSVC   Dinformation sizvizvus 10 34 39    Service C   D information  sjzgjzuus 10 34 39    Service Ciy  Warning 5 29 2005 10 35 05    Dnsapi  A  I
169. allowing any computer  to be both server and client at the same time     Dedicated Servers and Peers    EMBER    In some networks  a server computer is a server computer and nothing else   It   s dedicated to the sole task of providing shared resources  such as hard  drives and printers  to be accessed by the network client computers  This  type of server is a dedicated server because it can perform no other task than  network services     Some smaller networks take an alternative approach by enabling any com   puter on the network to function as both a client and a server  Thus  any  computer can share its printers and hard drives with other computers on the  network  And  while a computer is working as a server  you can still use that  same computer for other functions  such as word processing  This type of  network is a peer to peer network because all the computers are thought of as  peers  or equals     Here are some points to ponder concerning the differences between dedi   cated server networks and peer to peer networks while you   re walking the  dog tomorrow morning     Peer to peer networking features are built into Windows  Thus  if your  computer runs Windows  you don   t have to buy any additional software  to turn your computer into a server  All you have to do is enable the  Windows server features     The network server features that are built into desktop versions of  Windows  such as Windows XP and Vista  aren   t efficient because these  versions of Windows
170. and     v Change scope settings  Right click the scope and choose the Properties  command  This action opens the Scope Properties dialog box  which lets  you change the scope   s starting and ending IP addresses  subnet mask   and DNS configuration     124 Partit  Building Your Own Network       Change the scope exclusions  Click Address Pool under the scope in  the tree  This action lists each range of addresses that   s included in the  scope  You can add or delete a range by right clicking the range and  choosing the Delete command from the menu that appears  You can also  add a new exclusion range by right clicking Address Pool in the tree and  choosing Add New Exclusion from the pop up menu     View or change reservations  Click Reservations in the tree        View a list of the addresses that are currently assigned  Click Address  Leases in the tree     Configuring a Windows DHCP Client    eej  Figure 6 4   Configuring  a Windows  client to use  DHOP   E    Configuring a Windows client for DHCP is easy  The DHCP client is included  automatically when you install the TCP IP protocol  so all you have to do   is configure TCP IP to use DHCP  To do this  open the Network Properties  dialog box by choosing Network or Network Connections in the Control Panel   depending on which version of Windows the client is running   Then select  the TCP IP protocol and click the Properties button  This action opens the  TCP IP Properties dialog box  as shown in Figure 6 4  To configure t
171. anels  use cable ties   hooks  or clamps to secure the cable to the ceiling or to the metal frame  that supports the ceiling tiles  Don   t just lay the cable on top of the  panels     The tools you need  Of course  to do a job right  you must have the right tools     Start with a basic set of computer tools  which you can get for about   15 from any computer store and most office supply stores  These kits  include socket wrenches and screwdrivers to open your computers and  insert adapter cards     The computer tool kit probably contains everything you need if  e All your computers are in the same room   e You   re running the cables along the floor   ay  e You   re using prefabricated cables     If you don   t have a computer tool kit  make sure that you have several  flat head and Phillips screwdrivers of various sizes     If you   re using bulk cable and plan on attaching your own connectors  you  also need the following tools in addition to the basic computer tool kit     e Wire cutters  You need big ones for coax  smaller ones work for  twisted pair cable  For yellow cable  you need the Jaws of Life     e A crimp tool  You need the crimp tool to attach the connectors  to the cable  Don   t use a cheap  25 crimp tool  A good crimp tool    BE   we costs  100 and will save you many headaches in the long run         D  When you crimp  you mustn   t scrimp     e Wire stripper  You need this tool only if the crimp tool doesn   t  include a wire stripper     gE Partit  Buildin
172. ar    No matter how much you know about computers  plenty of people know  more than you do  This rule seems to apply at every rung of the ladder of  computer experience  I   m sure that a top rung exists somewhere  occupied  by the world   s best computer guru  I   m not sitting on that rung  and neither  are you   Not even Bill Gates is sitting on that rung  Bill Gates got where he is  by hiring people on higher rungs      As the local computer guru  one of your most valuable assets can be a friend  who   s a notch or two above you  That way  when you run into a real stumper   you have a friend you can call for advice  Here are some tips for handling  your own guru     In dealing with your own guru  don   t forget the Computer Geek   s    Golden Rule     Do unto your guru as you would have your own users  do unto you     Don   t pester your guru with simple stuff that you just  haven   t spent the time to think through  If you have thought it through  and can   t come up with a solution  however  give your guru a call  Most  computer experts welcome the opportunity to tackle an unusual com   puter problem  It   s a genetic defect     If you don   t already know someone who knows more about computers    than you do  consider joining your local PC users    group  The group  may have a subgroup that specializes in your networking software     or  may be devoted entirely to local folks who use the same networking soft   ware that you use  Odds are  that you   ll make a friend or
173. ar  Although the normal range for 802 11g is 300 feet  the useful range may be less  in actual practice    1  Obstacles  such as solid walls  bad weather  cordless phones  micro   wave ovens  and backyard nuclear reactors can all conspire to reduce  the effective range of a wireless adapter  If you   re having trouble con   necting to the network  sometimes just adjusting the antenna helps       Wireless networks tend to slow down when the distance increases  The  802 11g network devices claim to operate at 11 Mbps  but they usually  achieve that speed only at ranges of 100 feet or less  At 300 feet  they  often slow down to 1 Mbps    At the edge of the wireless device   s range  you   re more likely to  suddenly lose your connection because of bad weather    Beeee  Figure 9 2   Ward   Wally  and  Beaver  playing   with their  wireless  network   SSS       Wireless Network Adapters    Each computer that will connect to your wireless network needs a wireless  network adapter  The wireless network adapter is similar to the network inter   face card  NIC  that   s used for a standard Ethernet connection  However   rather than have a cable connector on the back  a wireless network adapter  has an antenna     You can get several basic types of wireless network adapters  depending  on your needs and the type of computer you will use it with      Awireless PCI card is a wireless network adapter that you install into an  available slot inside a desktop computer     Chapter 9  Wireles
174. are  Rather  the OSI Model is a framework into which the  various networking standards can fit  The OSI Model specifies what aspects  of a network   s operation can be addressed by various network standards  So   in a sense  the OSI Model is sort of a standard   s standard     The first three layers are sometimes called the lower layers  They deal with  the mechanics of how information is sent from one computer to another over  a network  Layers 4 7 are sometimes called the upper layers  They deal with  how applications relate to the network through application programming  interfaces     396 Part VII  The Part of Tens    MBER  KV   amp        Yes  I know the OSI Model has seven layers  not ten  The Part of Tens consists  of chapters that present approximately ten topics worth knowing about  In this  case  seven is close enough     Layer 1  The Physical Layer    The bottom layer of the OSI Model is the Physical Layer  It addresses the  physical characteristics of the network  such as the types of cables used to  connect devices  the types of connectors used  how long the cables can be   and so on  For example  the Ethernet standard for 100BaseT cable specifies  the electrical characteristics of the twisted pair cables  the size and shape of  the connectors  the maximum length of the cables  and so on     Another aspect of the Physical Layer is that it specifies the electrical charac   teristics of the signals used to transmit data over cables from one network  node to another
175. are  inexpensive     ranging from  25  100     and are well worth the small cost     The following are some of the more popular Linux distributions     Fedora is one of the popular Linux distributions  At one time  Fedora  was an inexpensive distribution offered by Red Hat  But Red Hat recently  changed its distribution strategy by announcing that its inexpensive  distribution would become a community project known as Fedora so  that it could focus on its more expensive Enterprise editions  You can   t  purchase Fedora  but you can download it free from http     fedora  project org  You can also obtain it by buying a book that includes the  Fedora distribution on DVD or CD ROM     All the examples in this book are based on Fedora 11      Linux Mandriva is another popular Linux distribution  one that   s often  recommended as the easiest for first time Linux users to install  Go to  www mandriva com for more information     SuSE  pronounced    Soo zuh     like the famous composer of marches  is a  popular Linux distribution that comes on six CD ROM disks and includes  more than 1 500 Linux application programs and utilities  including  everything you need to set up a network  Web  e mail  or electronic  commerce server  You can find more information at www novel  com   linux     Slackware  one of the oldest Linux distributions  is still popular      especially among Linux old timers  A full installation of Slackware gives  you all the tools you need to set up a network or Inte
176. as first released in 1984     Chapter 11  Managing E Mail with Exchange 2007   9 7       If you exchange mail with old style X 400 systems  you may need to use  this option     Y Custom Attributes  This button leads to a dialog box that lets you track  up to 15 different custom attributes for a user  You can safely ignore this  option     ILS Settings  If you have an Internet Locator Service server installed  you  can click this button to configure it  ILS lets online users find each other   It   s used by applications like NetMeeting     Mailbox Rights  Of all the features on the Exchange Advanced tab  this  is the one you ll probably use most  It lets you grant access to this user   s  mailbox to other users  For more information  see the section     Viewing  Another Mailbox     later in this chapter        Herter   Can   Creare   Seni   a    eo    Ema Adore Cecharge Fes Caha Acherced   Sangin denis rae      7 iets ce iaag siia Keats   I eagra high pa  eal oral tor 5    Coige bere ded ad eek             Im rime keg tree     Hertha thee tc H aiem 9 grr   gt   Figure 11 4   The  Exchange  Advanced    cree  e  e    EEE    Configuring Outlook for Exchange    When you create an Active Directory user  the user is automatically set up  with a mailbox  However  you must still configure that user   s Outlook client  software to connect to the user   s account  The following procedure describes      IS Part Ill  Getting Connected    P    Figure 11 5   The  Account  Settings  dialog b
177. at appears    Doug Properties  General  Sharing Customize  Local sharing and security  To share this folder with other users of this computer  e  igs only  drag it to the Shared Documents folder   Figure 3 5  ay tyes pms eh  The Sharing  options Network sharing and security   come tolife    gi ginea es   when you Eadie   eh  E  Share this folder on the network      Shan D  Share This at  Folder o    E Allow network users to change my files   the Network   check box   in Windows Leam mote about Sharing and secui    ai C   p    5   Optional  Change the share name if you don   t like the name that  Windows proposes   The share name is the name that other network users use to access the  shared folder  You can give it any name you want  but the name can be  no more than 12 characters long  Uppercase and lowercase letters are  treated the same in a share name  so the name My Documents is the  same as MY DOCUMENTS    ai  Windows proposes a share name for you  based on the actual folder    name  If the folder name has 12 or fewer characters  the proposed share  name is the same as the folder name  If the folder name is longer than  12 characters  however  Windows abbreviates it  For example  the name  Multimedia Files becomes MULTIMEDIA F        If the name that Windows chooses doesn   t make sense or seems cryp   tic  you can change the share name to something better  For example  I  would probably use MEDIA FILES rather than MULTIMEDIA F        6   Optional  If you want to allow o
178. ata sent over   the network from one type of representation to another  For example  the  Presentation Layer can apply sophisticated compression techniques so fewer  bytes of data are required to represent the information when it   s sent over  the network  At the other end of the transmission  the Transport Layer then  uncompresses the data     The Presentation Layer also can scramble the data before it   s transmitted  and then unscramble it at the other end  using a sophisticated encryption  technique that even Sherlock Holmes would have trouble breaking     LOO Part Vil  The Part of Tens       Layer 7  The Application Layer    The highest layer of the OSI model  the Application Layer  deals with the tech   niques that application programs use to communicate with the network  The  name of this layer is a little confusing because application programs  such   as Excel or Word  aren   t actually part of the layer  Rather  the Application  Layer represents the level at which application programs interact with the net   work  using programming interfaces to request network services  One of the  most commonly used application layer protocols is HTTP  which stands for  HyperText Transfer Protocol  HTTP is the basis of the World Wide Web     Index    eAe    absolute name  127  Access Control List  ACL   261  Access databases  networking  57 58  access points  APs    See wireless access point  Account Settings dialog box  198 199  201  Account tab  User Properties  dialog box  250 
179. atch cable  be very careful when you disconnect the  suspected bad cable and reconnect the good cable in its place     A Bunch of Error Messages Just Flew By     ar    Are error messages displayed when your computer boots  If so  they can pro   vide invaluable clues to determine the source of the problem     If you see error messages when you start up your computer  keep these points  in mind     1  Don   t panic if you see a lot of error messages  Sometimes a simple prob   lem that   s easy to correct can cause a plethora of error messages when  you start your computer  The messages may look as though your com   puter is falling to pieces  but the fix may be very simple     If the messages fly by so fast that you can   t see them  press your com   puter   s Pause key  Your computer comes to a screeching halt  giving  you a chance to catch up on your error message reading  After you read  enough of them  press the Pause key again to get things moving   On  computers that don   t have a Pause key  press Ctrl Num Lock or Ctrl S  to do the same thing      If you missed the error messages the first time  restart the computer and  watch them again     Better yet  press F8 when you see the message Starting Windows   This action displays a menu from which you can select from several  startup options  including one that processes each line of your CONFIG   SYS file separately so that you can see the messages displayed by each  command before proceeding to the next command     292 Par
180. ate any filenames  that violate the rules of the system being used into a form that is acceptable  to both Windows and the Macintosh  doing so sometimes leads to cryptic or  ambiguous filenames  But hey  network administration is as much an art as a  science     Part Vil  The Part of Tens    The 5th Wave By Rich Tennant             Sanni  FEM RRRURER SS                       scares me to death        In this part       f you keep this book in the bathroom  the chapters in    this section are the ones that you ll read the most   Each chapter consists of ten  more or less  things that are  worth knowing about various aspects of networking   Without further ado  here they are  direct from the home  office in sunny Fresno  California        Chapter 27    More Than Ten Big  Network Mistakes       In This Chapter  Saving on cable  Turning off or restarting a server when users are logged on  Deleting important files that live on the server  Copying a file from the server  changing it  and copying it back  Sending something to the printer for a second time  Assuming a server is safely backed up  Connect to the Internet without factoring in security issues  Plugging in a WAP without permission  Thinking you can   t work when the server   s down  Running out of space on a network server  Blaming the network    ust about the time you figure out how to avoid the most embarrassing   computer mistakes  such as using your CD drive   s tray as a cup holder    the network lands on your comput
181. ation  information flows in both directions  Not  only does the user request information from the intranet system  but the  intranet system itself also requests information from the user     What Vou Need to Set Up an Intranet    To properly set up an intranet  you need the right tools  Here   s a list of  requirements     A network  An intranet doesn   t require its own cabling  it can operate on  your existing network     A server computer that   s dedicated to the intranet  Make sure that this  computer has plenty of RAM  at least 4GB  and gigabytes of disk space   at least 100GB   Of course  the more users your network has and the  more information you intend to place on the server  the more RAM and  disk storage you need         Windows Server or a Linux operating system  Web server software  requires one or the other     1     Web server software for the server computer  You need to install a Web  server  such as IIS  for Windows servers  or Apache  for Linux servers      Programs to help you create Web pages  If you   re the type who dreams  in binary  you can create Web pages by typing HTML codes directly  into text files  In that case  the only program you need is Notepad   Alternatively  you can use a program designed specifically for creating  Web pages  such as Microsoft FrontPage  or perhaps something fancier   such as Adobe Dreamweaver  If you   re going to develop transaction   based applications  you need additional tools     How to Set Up an IIS Web Server   
182. ation Services  IIS  Web  server  7 0      Built in virtualization tools that let you create and run more than one  instance of the server operating system on a single server     Windows Server 2008 comes in several editions  The most common are    1     Windows Server 2008  Standard  This is the basic version of Windows  Server 2008  If you   re using Windows Server 2008 as a file server or to  provide other basic network services  this version is the one you use   Standard Edition can support servers with up to four processors and  4GB of RAM  82GB on 64 bit systems      1     Windows Web Server 2008  This version of Windows Server 2008 is  optimized for use as a Web server     1  Windows Server 2008  Foundation  A general purpose version designed  for smaller networks     1     Windows Server 2008  Enterprise  Designed for larger networks  this  version can support servers with up to eight processors  64GB of RAM   server clusters  and advanced features designed for high performance  and reliability     Windows Server 2008  Datacenter  This is the most powerful version  of Windows Server 2008  with support for servers with 64 processors   2 terabytes of RAM  that   s 2 048GB   and server clusters  as well as  advanced fault tolerance features designed to keep the server running  for mission critical applications     Other Server Operating Systems    Although Windows Server 2008 is the most popular choice for network oper   ating systems  it isn   t the only available choic
183. bbed section labeled Justification  In  your     inch network binder  file the description under Purpose     When you consider the reasons why you need a network  you may conclude  that you don   t need a network after all  That   s okay  You can always use the  binder for your stamp collection     Taking Stock    One of the most challenging parts of planning a network is figuring out how  to work with the computers you already have     how do you get from here  to there  Before you can plan how to get    there     you have to know where     here    is  Take a thorough inventory of your current computers     What you need to know    You need to know the following information about each of your computers     The processor type and  if possible  its clock speed  Hope that all your  computers are 2GHz Pentium 4s or better  But in most cases  you find  a mixture of computers     some new  some old  some borrowed  some  blue  You may even find a few archaic pre Pentium computers  which  should be converted to beehives as soon as possible     You can   t usually tell what kind of processor a computer has just by look   ing at the computer   s case  Most computers  however  display the proces   sor type when you turn them on or reboot them  If the information on the  startup screen scrolls too quickly for you to read it  try pressing the Pause  key to freeze the information  After you finish reading it  press the Pause  key again so that your computer can continue booting     The si
184. been assigned the  Class B address 144 28 0 0  All the devices on this network must share the  same broadcast domain        Before subnetting        _ EN  144 28 0 0 C    144 28 0 0       After subnetting         144 28 16 0  pana  144 28 32 0    144 28 0 0          1 74  Partit  Building Your Own Network       In the second network  the first four bits of the host ID are used to divide   the network into two small networks  identified as subnets 16 and 32  To the  outside world  that is  on the other side of the router   these two networks  still appear to be a single network identified as 144 28 0 0  For example   the outside world considers the device at 144 28 16 22 to belong to the  144 28 0 0 network  As a result  a packet sent to this device is delivered to  the router at 144 28 0 0  The router then considers the subnet portion of  the host ID to decide whether to route the packet to subnet 16 or subnet 32     Subnet masks    For subnetting to work  the router must be told which portion of the host ID  to use for the subnet   s network ID  This little sleight of hand is accomplished  by using another 32 bit number  known as a subnet mask  Those IP address  bits that represent the network ID are represented by a 1 in the mask  and  those bits that represent the host ID appear as a 0 in the mask  As a result  a  subnet mask always has a consecutive string of ones on the left  followed by  a string of zeros     For example  the subnet mask for the subnet  as shown in Figu
185. ble contains nuggets like these     What is Ethernet    All about cable   To shield or not to shield     Wall jacks and patch panels  Hubs and switches    You don   t have to memorize anything in this book  It   s a need to know   book  You pick it up when you need to know something  Need to know what  100BaseT is  Pick up the book  Need to know how to create good passwords   Pick up the book  Otherwise  put it down and get on with your life     How to Use This Book    This book works like a reference  Start with the topic you want to find out  about  Look for it in the Table of Contents or in the index to get going  The  Table of Contents is detailed enough that you should be able to find most  of the topics you   re looking for  If not  turn to the index  where you can find  even more detail     After you find your topic in the Table of Contents or the index  turn to the  area of interest and read as much as you need or want  Then close the book  and get on with it     Of course  this book is loaded with information  so if you want to take a brief  excursion into your topic  you   re more than welcome  If you want to know the  big security picture  read the whole chapter on security  If you just want to  know how to create a decent password  read just the section on passwords   You get the idea     If you need to type something  you see the text you need to type like this   Type this stuff  In this example  you type Type this stuff at the keyboard and  then press Enter  An 
186. ble up to date notifications   IV Enable notifications to user specified SMTP addresses                Outlook Mobile Access       T Enable Outlook Mobile Access    Figure 14 1   Enabling  Outlook  Mobile  Access     Cancel   ogy    Help                     9  Expand the domain and locate the user you want to enable mobile  access for     10  Right click the user and choose Properties   11  Click the Exchange Features tab     The Exchange Features options are displayed  as shown in Figure 14 2        Member Of   Distin   Environment   Sessions   Remote control    Terminal Services Profile   Exchange General    General   Address   Account   Profie   Telephones   Organization  F mal Addresses Exchange Featues   Fuchange Advanced             Features    7 Mobile Services    Status          f Outlook Mobile Access Enabled  i r Inibated Synchroniz Enabled  fiy Up to date Notifications Enabled   3    Protocols    Outlook Web Access Enabled  using protucul defaults   ci POP3 Enabled  using protucul defaults   ar IMAP4 Enabled  using protocol defaults          eT CS Properties  Figure 14 2  Desc  Enabling Allows the user to synchronize the mailbox with wireless devices   mobile  access fora             user     ee ce             Chapter 14  Dealing with Mobile Devices 225       12  Enable all three options listed under Outlook Mobile Access     If the options are not already enabled  right click each option and  choose Enable     13  Click OK     14  Repeat Steps 10 13 for any other 
187. c network information and set up connections    Change adapter settings Le   te See full map    Change advanced sharing WIN  Network ui  d  This computer   View your active networks Connect or disconnect    Network Access type  Internet  Public network Connections    Local Ares Connection    Change your networking settings  i Set up a new connection or network  Set up a wireless  broadband  dial up  ed hoc  or VPN connection  or set up a router or access  point   Connect to    network  Connect or reconnect to 2 wireless  wired  dial up  or VPN network connection     Choose homegroup and sharing options    Sre eba Access files and printers located on other network computers  or change sharing settings     HomeGroup    Internet Options Troubleshoot problems  Windows Firewall Diagnose and repair network problems  or get troubleshooting information               a fon    e    j   Fe Network and Internet    Network Connections    W   Organze v g  Oo      Local Area Connection  Network    AZ VMware Accelerated AMD PCNet                   158 Part it  Building Your Own Network    Se    Figure 8 7   The  Properties  dialog box  fora  network  connection   Windows 7    EEE       4  Right click the connection that you want to configure and then choose  Properties from the menu that appears     The Properties dialog box for the network connection appears  as shown  in Figure 8 7  If you compare this dialog box with the dialog box in Figure  8 2  you see that they   re the same        Lo
188. cal Area Connection Properties    Networking      Connect using     gt  VMware Accelerated AMD PCNet Adapter    This connection uses the following items        mi Ras Packet Scheduler    Z  dE  File and Printer Sharing for Microsoft Networks        Intemet Protocol Version 6  TCP IP v6    4  Internet Protocol Version 4  TCP IPy4    4 Link Layet Topology Discovery Mapper 1 0 Driver  4  Link Layet Topology Discovery Responder    ERA            Instal     Uninstall    Description    Allows your computer to access resources on a Microsoft  network              5  Click Configure to configure the network connection     From this point  the steps for configuring the network connection are  the same as they are for Windows XP  As a result  you can continue with  Step 4 in the preceding section     Configuring Windows XP network  connections        Configuring Client Computer  Identification    Every client computer must identify itself to participate in the network   The computer identification consists of the computer   s name  an optional  description  and the name of either the workgroup or the domain to which  the computer belongs     The computer name must follow the rules for NetBIOS names  it may be 1  to 15 characters long and may contain letters  numbers  or hyphens but no  spaces or periods  For small networks  it   s common to make the computer    Chapter 8  Configuring Windows XP  Vista  and 7 Clients 159    name the same as the username  For larger networks  you may wan
189. can do so by running    264 Part IV  Network Management For Dummies       Manage Your Server  choose Start   Administrative Tools  Manage Your  Server   Then  choose Add or Remove a Role and select the File Server  role  In Windows Server 2008  choose StartAdministrative Tools gt Server  Management  choose Roles  and then enable the File Services role     Managing Vour File Server    Figure 18 1   The Share  and Storage  Manage   ment  console     Windows Server 2008 includes a useful new management console called  Share and Storage Management  as shown in Figure 18 1  From this con   sole  you can easily create new shares  set up the permissions for a share   remove a share  and so on  To summon the File Server Manager  choose  Start Administrative Tools  Share and Storage Management     The following sections describe some of the more common procedures that  you ll use when managing your file server           Nerver Manager       ble Acton yew Help       SAE             Provision Storage     a Provision Share          al  She   Prae   Lo     Quota   FleSceening   Shado Manage Sessions   ogi    Protocol  SMB  7 items  Manage Open Files     a   View  gt   a    G Refresh  E r                      Wila 9 59PM             C        MUOCNCCCOGihaatptter 18  Managing Network Storage 265    Figure 18 2   The  Provision   a Shared  Folder asks  what folder  you want to  share   SESE    Using the Provision a Shared  Folder Wizard    To be useful  a file server should offer one or more
190. ce  Rather than pulling a  new cable to the user   s office  just plug a cheap switch into the existing jack  and then plug both of the computers into the switch     The Complete Documentation of the  Network on Tablets of Stone    ANG   P      ar    I   ve mentioned several times in this book the importance of documenting  your network  Don   t spend hours documenting your network and then hide  the documentation under a pile of old magazines behind your desk  Put the  binder in the closet with the other network supplies so that you and every   one else always know where to find it  And keep backup copies of the Word   Excel  Visio  or other documents that make up the network binder in a fire   proof safe or at another site     Don   t you dare chisel passwords into the network documentation  though   Shame on you for even thinking about it     If you decide to chisel the network documentation onto actual stone tablets   consider using sandstone  It   s attractive  inexpensive  and easy to update  just  rub out the old info and chisel in the new   Keep in mind  however  that sand   stone is subject to erosion from spilled Diet Coke  Oh  and make sure that you  store it on a reinforced shelf     394  Part Vil  The Part of Tens  The Network Manuals and Disks    In the Land of Oz  a common lament of the Network Scarecrow is    If I only  had the manual     True  the manual probably isn   t a Pulitzer Prize candidate   but that doesn   t mean you should toss it in a landfill  ei
191. ce shown in  Figure 8 3 is an Intel Pro 100 VE Network Connection   It   s installed  in slot 3 of the computer   s PCI bus      Chapter 8  Configuring Windows XP  Vista  and 7 Clients 153          Local Area Connection Properties    we       Connect using  E Intel R  PRO 100 VE Network Conne    This connection uses the following tems   v eli crosoft Network   M  E Hia and Panter Shaning tor Miemsatt Networks  M  EnS Packet Schedar   M E  intemet Protocol  TCP IP               D     ovat   _urestat_   C Properes  Figure 8 2     Eae   Description  The Allows your computer to access resources on a Microsoft  Properties sas  dialog  C Show icon in notification area when connected  box for a  Z  Notify me when this connection has limited or no connectivity  network  ea aD Ga  es             Intel R  PRO 100 VE Network Connection Properties GE       ear  General   Advanced   Driver   Resources   Power Management      Beh intei  PRO 100 VE Network Connection    Device type  Network adaptera  Manufacturer  Intel    Location PCI bus 3  device 8  function 0  Device etatue  This device is working properly  F you are having problems with this device  cick Troubleshoot to  Figure 8 3  start the troubleshooter  The  Properties  a  dialog  Troubleshoot     box for a Device ueage                network     Use tis devic able  ly  adapter   ae Co Come   ay  If you   re having trouble with the adapter  you can click the    Troubleshoot button to open the Windows XP Hardware  Troubleshooter  Y
192. ceccescesseseeeseeeeeeeeceeeeeseeaeens 324  Securing User ACCOUMHS            ccsscssscsssesssesesseesssessecsscessesssecssesssesseesseessness 325  Obfuscating your Usernames nssrsessssisriisresii ires 325  Using passwords Wisely sss ivseiesctencessesesedeiaceuieioee ive daviaeneveedeerned 326  Generating passwords For DUMMIES                cccesccesseeseeeseeeeeeeeeeeees 327  Secure the Administrator account             cecceceeseeseeseeeeeeeeeneeeeeseeaeens 328  Managing User Security          ccccccsccssesssesssesseeseeesseeeseeseeeseeseeeeseseeeeseesseenes 329  User AC COUMUS soere eesosa as E tay E Ain decaatat edits 329  Built in AC COUN 23243 62ers naea neon ra eeke Pp e TIARE 330   User TIGHUS seee fran EE EE EEE VEEE ERV Eaa 331  Permissions  who gets what           csccscssesscesseeeseceaeceaeeeeeeeeeeeeeesees 332  Group theraps iseinean s eiei E AES 332   User Profle S iesene E RAES 334   LO SONSCHIPUS P E T evvaransncaneeanvavees 334  Securing Yo  r USerS  sirere nerriet aer eiee ER AECE AERAN EAEE RERS 335  Chapter 24  Hardening Your Network          aaaea 337  Firewalls neosensgi eie A E E E EE RESES 337  The Many Types Of Firewall S esserscsceoneii rrei nsn is 339  Packet fItering sinrserenr ndis neironi dnain Ese EEE 339  Stateful packet inspection  SPD         esessssssessseserssssesrsesssersessesnssssesess 341  Circuit level gateway             ccsccssccsscsscssscsssesecessesssessaessaeeseeesneessessnes 341  Application gateway ii aiinanidadiia nnn baiintii
193. ces     1     The servers have 10 100 Mbps cards     All offices in the building are wired with Cat5 wiring to a central wiring  closet  where a small equipment rack holds two 24 port 10 100 Mbps  switches     78 PartI  Building Your Own Network       1  Internet access is provided through a T1 connection with a Cisco 1700  router     Lately  network performance has been noticeably slow  particularly Internet  access and large file transfers between client computers and the servers   Users have started to complain that sometimes the network seems to crawl     The problem is twofold     1  The network has outgrown the old 100 Mbps switches  All network  traffic must flow through them  and they   re limited to the speed of 100  Mbps  As a result  the new computers with the gigabit networking ports  are connecting to the network at 100 Mbps  not 1000 Mbps     1  The network has outgrown the capabilities of Windows 2000 Server   The server computers themselves are old  and the operating system is  outdated     The performance of this network can be dramatically improved in two steps     1  Upgrade the network infrastructure     Replace the old network hubs with three 24 port 10 100 1000 Mbps  switches     2  Replace the aging servers with faster servers running Windows Server  2007     The network is reconfigured  as shown in Figure 4 7        P The Internet  cow Egy       24 port 10 1000 Switch                            24 port 10BaseT Hub  aay  Figure 4 7   The DCH  Accounting
194. cess  Hacking seems to be the  national pastime these days  With most computer networks connected to  the Internet  anyone anywhere in the world can     and probably will     try to  break into your network     The most basic type of security is handled through user accounts  which grant  individual users the right to access the network resources and govern which  resources the user can access  User accounts are secured by passwords   therefore  good password policy is a cornerstone of any security system   Most network operating systems give you some standard tools for maintain   ing network security     Establish password policies  such as requiring that passwords have a  minimum length and include a mix of letters and numerals     1     Set passwords to expire after a certain number of days  Doing so forces  network users to change their passwords frequently     Chapter 7  Setting Up a Server 135    Encrypt network data  A data encryption capability scrambles data  before it   s sent over the network or saved on disk  making unauthorized  use a lot more difficult                             ake         p Good encryption is the key to setting up a virtual private network  or  VPN  which enables network users to securely access a network from a  remote location by using an Internet connection    1  Issue digital certificates  These special codes are used to ensure that  users are who they say they are and files are what they claim to be   I Active Directory Users and Compute
195. ch as hard drives  printers  and    22    Part I  Let s Network        CD ROM or DVD drives  that are connected directly to your computer  You  can use local resources whether you   re connected to the network or not   Network resources  on the other hand  are the hard drives  printers  optical  drives  and other devices that are connected to the network   s server comput   ers  You can use network resources only after your computer is connected to  the network     The whole trick to using a computer network is to know which resources are  local resources  they belong to you  and which are network resources  they  belong to the network   In most networks  your C drive is a local drive  as is  your My Documents folder  If a printer is sitting next to your PC  it   s probably  a local printer  You can do anything you want with these resources without  affecting the network or other users on the network  as long as the local  resources aren   t shared on the network      You can   t tell just by looking at a resource whether it   s a local resource  or a network resource  The printer that sits right next to your com   puter is probably your local printer  but then again  it may be a network  printer  The same statement is true for hard drives  The hard drive in  your PC is probably your own  but it may be a network drive  which can  be used by others on the network     Because dedicated network servers are full of resources  you may say  that they   re not only dedicated  and si
196. change information     A computer with a wireless network connection is like a cellphone  Just as you  don   t have to be connected to a phone line to use a cellphone  you don   t have  to be connected to a network cable to use a wireless networked computer     JO   Partii  Building Your Own Network             The following list summarizes some key concepts and terms that you need to  understand to set up and use a basic wireless network     1  A wireless network is often referred to as a WLAN  for wireless local area  network     Some people prefer to switch the acronym around to local area wireless  network  or LAWN     The term Wi Fi is often used to describe wireless networks  although  it technically refers to just one form of wireless networks  the 802 11b  standard  See the section    Eight Oh Two Dot Eleventy Something   Or   Understanding Wireless Standards      later in this chapter  for more  information     1     wireless network has a name  known as an SSID  SSID stands for Service  Set Identifier   Wouldn   t that make a great Jeopardy  question  I ll take  obscure four letter acronyms for  400  please      All the computers that belong to a single wireless network must have  the same SSID     1  Wireless networks can transmit over any of several channels     For computers to talk to each other  they must be configured to transmit  on the same channel     The simplest type of wireless network consists of two or more computers  with wireless network adapters    
197. cky things  After yours is up and running  don   t mess with  it unless you know what you   re doing  You may be tempted to log on to your  firewall router to see whether you can tweak some of its settings to squeeze  another ounce of performance out of it  But unless you know what you   re  doing  be careful   Be especially careful if you think you know what you   re  doing  It   s the people who think they know what they   re doing who get them   selves into trouble      Chapter 28  Ten Networking Commandments 389    V  Thou Shalt Not Covet  Thy Neighbor   s Network    Network envy is a common malady among network managers  If your net   work users are humming along fine at 100 Mbps  don   t covet your neighbor   s  Gigabit network  If your network users are happy with Windows XP  resist the  urge to upgrade to Vista or Windows 7 unless you have a really good reason   And if you run Windows Server 2003  fantasizing about Windows Server 2008  is a venial sin        You re especially susceptible to network envy if you   re a gadget freak   There   s always a better switch to be had or some fancy network protocol  gizmo to lust after  Don   t give in to these base urges  Resist the devil  and he  will flee     V1  Thou Shalt Schedule Downtime  before Working upon Thy Network    As a courtesy  try to give your users plenty of advance notice before you  take down the network to work on it  Obviously  you can   t predict when  random problems strike  But if you know you   re goin
198. computer viruses  and using a network increases your vulner   ability because it exposes all network users to the risk of being infected by a  virus that lands on any one network user   s computer     Viruses don   t just spontaneously appear out of nowhere  Viruses are computer  programs that are created by malicious programmers who   ve lost a few  screws and should be locked up     What makes a virus a virus is its capability to make copies of itself that can  be spread to other computers  These copies  in turn  make still more copies  that spread to still more computers  and so on  ad nauseam     Then  the virus waits patiently until something triggers it     perhaps when  you type a particular command or press a certain key  when a certain date  arrives  or when the virus creator sends the virus a message  What the virus  does when it strikes also depends on what the virus creator wants the virus  to do  Some viruses harmlessly display a    gotcha    message  Some send e mail  to everyone it finds in your address book  Some wipe out all the data on your  hard drive  Ouch     A few years back  viruses moved from one computer to another by latching  themselves onto floppy disks  Whenever you borrowed a floppy disk from a  buddy  you ran the risk of infecting your own computer with a virus that may  have stowed away on the disk     344 Part V  Protecting Your Network       Nowadays  virus programmers have discovered that e mail is a much more  efficient method to spread the
199. connect your computers to the Internet  you can consult Chapter  10 for instructions     Why Bother with a Network     Frankly  computer networks are a bit of a pain to set up  So  why bother   Because the benefits of having a network outweigh the difficulties of setting  up one     You don   t have to be a PhD to understand the benefits of networking  In fact   you learned everything you need to know in kindergarten  Networks are all  about sharing  Specifically  networks are about sharing three things  files   resources  and programs     Shaving files    Networks enable you to share information with other computers on the net   work  Depending on how you set up your network  you can share files with  your network friends in several different ways  You can send a file from your  computer directly to a friend   s computer by attaching the file to an e mail  message and then mailing it  Or  you can let your friend access your com   puter over the network so that your friend can retrieve the file directly from  your hard drive  Yet another method is to copy the file to a disk on another  computer and then tell your friend where you put the file so that he can  retrieve it later  One way or the other  the data travels to your friend   s com   puter over the network cable  and not on a CD or DVD disk or flash drive as it  would in a sneakernet     Shaving resources    You can set up certain computer resources     such as hard drives or printers      so that all computers on the n
200. ction to indicate which network you prefer to join if  you find yourself within range of two or more networks at the same time  You  can use the Move Up and Move Down buttons next to the Preferred Networks  list to change your preferences     To add a network that you haven   t yet joined  click the Add button  This  action opens the dialog box shown in Figure 9 7  Here  you can type the  SSID value for the network that you want to add  You can also specify other    Chapter 9  Wireless Networking 18 1       E  Figure 9 7   Adding a  wireless  network in  Windows  XP     information  such as whether to use data encryption  how to authenticate  yourself  and whether the network is an ad hoc rather than an infrastructure  network     Guan ERIE     Wireless network properties we       Network name  SSID   Wireless network key  WEP   This network requires a key tor the tollovang   L  Data encryption  WEP enabled   C Network Authentication  Shared mode        L The key it provided for me automatically    C This is a computer to computer  ad hoc  network  wireless  access points are not used             Cx   cre        When your computer comes within range of a wireless network  a pop up  balloon appears on the taskbar  indicating that a network is available  If one  of your preferred networks is within range  clicking the balloon automati   cally connects you to that network  If Windows XP doesn   t recognize any of  the networks  clicking the balloon displays the Wireless Network 
201. ctive Directory Users and Computers management console  appears     3  Click Users in the console tree     4  In the Details pane  right click the user that you want to enable or  disable  and then choose either Enable Account or Disable Account  to enable or disable the user     Deleting a User    Deleting a user account is surprisingly easy  Just follow these steps     1  Log on as an administrator     You must have administrator privileges in order to perform this  procedure     2  Choose Start Administrative Tools   Active Directory Users and  Computers     The Active Directory Users and Computers management console  appears     Chapter 17  Managing Windows User Accounts 2 5 5       3  Click Users in the console tree     4  In the Details pane  right click the user that you want to delete and  then choose Delete     Windows asks whether you really want to delete the user  just in case  you re kidding     5  Click Yes     Poof  The user account is deleted     Working with Groups    A group is a special type of account that represents a set of users who have  common network access needs  Using groups can dramatically simplify the  task of assigning network access rights to users  Rather than assigning access  rights to each user individually  groups let you assign rights to the group  itself  Then  those rights automatically extend to any user that you add to   the group     The following sections describe some of the key concepts that you need to  understand in order to us
202. d     e An incremental backup on each other normal business day  for  example  Tuesday  Wednesday  Thursday  and Friday      1    When you use incremental backups  the complete backup consists of  the full backup tapes and all the incremental backup tapes that you   ve  made since you did the full backup     If the hard drive crashes and you have to restore the data onto a new  drive  you first restore Monday   s normal backup and then you restore  each of the subsequent incremental backups     Incremental backups complicate the task of restoring individual files  because the most recent copy of the file may be on the full backup tape  or on any of the incremental backups     Backup programs keep track of the location of the most recent version  of each file in order to simplify the process     1    When you use incremental backups  you can choose whether you want to  e Store each incremental backup on its own tape   e Append each backup to the end of an existing tape     Often  you can use a single tape for a week of incremental backups     Differential backups    A differential backup is similar to an incremental backup except that it doesn   t  reset the archive bit when files are backed up  As a result  each differential  backup represents the difference between the last normal backup and the  current state of the hard drive     3   6 Part V  Protecting Your Network    ar       To do a full restore from a differential backup  you first restore the last  normal backup and 
203. d  85 86   tools  87 88   wall jacks  91 92  cable Internet connections  186  cable ties  87  CallVantage  AT amp T  218  Cancel Printing command  39  carrier sense multiple access with collision   detection  CSMA CD   170   categories  cable  83 84  cellphone  222  certificates  digital  135  certification  network administrator  244  Change E mail Account dialog box  201  channels  wireless network  166  178  cheat sheets  network  241  302  chkconfig command  367 368  circuit level gateway  341  classes  IP address  108 111    classless IP addresses  108  cleanup  network server  240  Client for Microsoft Networks  154  clients  14 16  41 42  293 295  324   See also Windows clients  configuring  clock speed  65  closed door approach to security  323 324  coaxial cable  82  96  99 101  collision indicator  94  Comcast Digital Voice  220  command shell  Linux  360  commands  TCP IP  241 242  communication over network  14  compare after backup feature  319  compression methods  311  Computer Browser service  296  Computer folder  31 33  48  computer identification  158 162  computer industry  keeping up with  303  computer magazines  303  computer name  23  143  158 159  292  Computer Name Changes  dialog box  159 160  Computer Name Domain Changes  dialog box  161 162  computer tools  87  392  computers  See also servers  components  reinstalling internal  290  equipment inventory  238  mainframe  17 18  network plan  65 67  concurrent usage license  14  Cone of Silence  324
204. d  For example  if a user retrieves a record in a form  that allows the record to be updated  Access locks the record  while the user edits it so that other users can   t edit the record  until the first record is finished     e No Locks  This method doesn   t really mean that the record isn   t  locked  Instead  No Locks means that the record isn   t locked until  a user writes a change to the database  This method can be con   fusing to users because it enables one user to overwrite changes  made by another user     e All Records  All Records locks an entire table whenever a user edits  any record in the table     Access lets you split a database so that the forms  queries  and reports  are stored on each user   s local disk drive  but the data itself is stored on  a network drive  This feature can make the database run more efficiently  on a network  but it   s a little more difficult to set up   To split a data   base  choose Tools   Database UtilitiesDatabase Splitter      Access includes built in security features that you should use if you  share an Access database from a Windows client computer  such as one  running Windows XP or Windows Vista  If you store the database on a  domain server  you can use the server   s security features to protect the  database     Access automatically refreshes forms and datasheets every 60 seconds   That way  if one user opens a form or datasheet and another user  changes the data a few seconds later  the first user sees the changes  
205. d  as always  thanks to all the behind the scenes people who chipped in  with help I   m not even aware of     Publisher   s Acknowledgments    We   re proud of this book  please send us your comments at http    dummies custhelp com   For other comments  please contact our Customer Care Department within the U S  at 877 762 2974   outside the U S  at 317 572 3993  or fax 317 572 4002     Some of the people who helped bring this book to market include the following     Acquisitions  Editorial  and Media Composition Services   Development Project Coordinator  Sheree Montgomery  Project Editor  Nicole Sholly Layout and Graphics  Ashley Chamberlain   Executive Editor  Amy Fandrei Joyce Haughey  Copy Editor  Jennifer Riggs Proofreader  Evelyn C  Gibson  Technical Editor  Lee Musick Indexer  BIM Indexing  amp  Proofreading Services    Editorial Manager  Kevin Kirschner  Editorial Assistant  Amanda Graham  Sr  Editorial Assistant  Cherie Case    Cartoons  Rich Tennant   www  the5thwave com     Publishing and Editorial for Technology Dummies  Richard Swadley  Vice President and Executive Group Publisher  Andy Cummings  Vice President and Publisher  Mary Bednarek  Executive Acquisitions Director  Mary C  Corder  Editorial Director  Publishing for Consumer Dummies  Diane Graves Steele  Vice President and Publisher  Composition Services    Debbie Stailey  Director of Composition Services    Contents at a Glance    Introduction    cccccccccccccccccccccccccccccccccccccccecececccccccccccec
206. d computer networks  sometimes act as though they   re held together by baling wire  chewing gum   and duct tape     To make matters worse  networks breed suspicion  After your computer is  attached to a network  users begin to blame the network every time some   thing goes wrong  regardless of whether the problem has anything to do with  the network  You can   t get columns to line up in a Word document  Must be  the network  Your spreadsheet doesn   t add up  The       network is acting    The worst thing about network failures is that sometimes they can shut down  an entire company  It   s not so bad if just one user can   t access a particular  shared folder on a file server  If a critical server goes down  however  your  network users may be locked out of their files  their applications  their e mail   and everything else they need to conduct business as usual  When that hap   pens  they beat down your doors and don   t stop until you get the network  back up and running     In this chapter  I describe some of the most likely causes of network trouble  and suggest some basic troubleshooting techniques that you can employ  when your network goes on the fritz     288 Part IV  Network Management For Dummies       When Bad Things Happen  to Good Computers    The following basic troubleshooting steps specify what you should examine  at the first sign of network trouble  In many  if not most  of the cases  one of  the following steps can get your network back up and running   
207. d enable access for UNIX client  computers     4  Click Next        Depending on the role or roles you select  an additional page may be dis   played asking you to select the role services you want to install  For exam   ple  Figure 7 5 shows the Role Services page for the File Services role        pM   Figure 7 4   The Select  Server   Roles page   pee E     zs  Figure 7 5   The Role  Services  page   PCS    Chapter 7  Setting Up a Server 14 g       Add Roles Wizard    Before You Begin   Server Roles   Hle Services  Robe Services   Confirmation   Progress   Resulls            Select Server Roles    Select ane or mare roles to instal nn this server        Roles             i    ISOOOOoOoL    Ino       Active Directory Certificate Services  Active Directory Domain Services   Active Directory Federaton Services  Active Direct       Apniication Server   DHCP Server   DNS Server   Fax Server   File Services   Network Policy and Access Services  Print Services   Termine  Services   UDDI Services   Web Server  15    indows Deployment Services  Windows SharePoint Services           y Lightweight Directory Services  Active Directory Rights Management Services    x    Description     ae provides technologies  that help you manage storage  enable  file replication  manage shared  folders  ensure fast file searching  and  enable access tor LINTX client  computers      pee  wees  e   coe                  Select the role services to install for File Services        Role services        8 
208. d file manage   ment for the unicycle  and there you are     Although multitasking creates the appearance that two or more programs  execute on the computer at the same time  in reality  a computer with a single  processor can execute only one program at a time  The operating system  switches the CPU from one program to another to create the appearance that  several programs execute simultaneously  but at any given moment  only one  of the programs processes commands  The others are patiently waiting their  turns   However  if the computer has more than one CPU  the CPUs can exe   cute programs simultaneously     but that   s another kettle of fish      Directory services    Directories are everywhere     and were  even in the days when they were  all hard copy  When you needed to make a phone call  you looked up the  number in a phone directory  When you needed to find the address of a  client  you looked her up in your Rolodex  And then there were the nonbook  versions  When you needed to find the Sam Goody store at a shopping mall   for example   you looked for the mall directory     usually  a lighted sign  showing what was where     134 Partit  Building Your Own Network       Networks have directories  too  providing information about the resources  that are available on the network     such as users  computers  printers   shared folders  and files  Directories are an essential part of any network  operating system     In early network operating systems  such as Windows 
209. d from     2  windows Aut    Security Group     Members of this group ha     Figure 7 1   Active  Directory  Users and  4  gt    Computers  f    N E start    m       Active Directory User  e git 8 40PM             Understanding Windows  Server 2008 Versions    The current version of Windows for network servers is Windows Server 2008   Windows Server 2008 builds on Windows Server 2003  with many new fea   tures  Here are just a few of its new features     1  Even more enhancements to Active Directory  including the ability to  manage digital certificates  a new type of domain controller called a  read only domain controller  and the ability to stop and restart Active  Directory services without shutting down the entire server     136 Parti  Building Your Own Network       Anew graphical user interface based on Windows Vista  including a new  all in one management tool called the Server Manager     Anew version of the operating system called Server Core  which doesn   t  have a graphical user interface  Server Core is run entirely from the  command line or by a remote computer that connects to the server via  Microsoft Management Console  Server Core provides efficient file serv   ers  domain controllers  or DNS and DHCP servers     Remote connection enhancements that enable computers to establish  Web based connections to the server with the HTTPS protocol without  having to establish a virtual private network  VPN  connection     Yet another new version of the Internet Inform
210. d inthe  var directory would be stored  in the third partition     The directory where a drive mounts is the  drive   s mount point     Notice that Linux uses regular forward slash  characters     to separate directory names  rather than the backward slash characters      used by Windows  Typing backslashes instead  of regular slashes is one of the most common  mistakes made by new Linux users     While we re on the subject  Linux uses a dif   ferent convention for naming files  too  In  Windows  filenames end in a three letter  extension that   s separated from the rest of the  filename by a period  The extension is used to  indicate the file type  For example  files that end  in   exe are program files  but files that end in   doc are word processing documents     Linux doesn t use filename extensions  but peri   ods are often used in Linux filenames to sepa   rate different parts of the name     and the last  part often indicates the file type  For example   ldap conf and pine  conf are both con   figuration files           354 Part VI  Beyond Windows       Choosing a Linux Distribution    Because the kernel  that is  the core operating functions  of the Linux operat   ing system is free  several companies have created their own distributions of  Linux  which include the Linux operating system along with a bundle of pack   ages to go along with it  such as administration tools  Web servers  and other  useful utilities  as well as printed documentation  These distributions 
211. d operating systems     The best way to set up a multiboot system is to  install each operating system into its own parti   tion  Then you can use a boot manager program  to choose the partition you want to boot from  when you start the computer        If you   re going to install the NOS on more than one server  you can save time  by first copying the distribution CD to a shared hard drive  That   s because  even the fastest CD ROM drives are slower than the network  Even with a  basic 10 100 Mbps network  access to hard drive data over the network is  much faster than access to a local CD ROM drive        Automated and remote installations    In case you find yourself in the unenviable position of installing an NOS on  several servers  you can use a few tricks to streamline the process       Automated setup  Lets you create a setup script that provides answers  to all the questions asked by the installation program  After you create  the script  you can start the automated setup  leave  and come back     P when the installation is finished     Creating the setup script is a bit of work  so automated setup makes  sense only if you have more than a few servers to install     140 Partit  Building Your Own Network    ar       Remote Installation Services  RIS   The Microsoft feature that lets you  install Windows Server from a remote network location without even  going to the server computer     This feature is tricky to set up  so it   s worth it only if you have to install  
212. d reports from the sales  system in Building B to keep track of sales  and employees frequently go  to the other building to follow up on important sales or to look into sales  trends     Although several solutions to this problem exist  the easiest is to bridge the  networks with a pair of wireless switches  To do this  CCD will purchase two  wireless access points  one to be plugged into the switch in Building A and  the other to be plugged into the switch in Building B  After the access points  are configured  the two networks will function as a single network  Figure 4 6  shows a logical diagram for the completed network     Although the wireless solution to this problem sounds simple  a number of  complications still need to be dealt with     specifically     Depending on the environment  the wireless access points may have  trouble establishing a link between the buildings  It may be necessary  to locate the devices on the roof  In that case  CCD will have to spend a  little extra money for weatherproof enclosures     Because the wireless access point in Building A will be connected to a  switch rather than to a hub  the switch will provide some degree of iso   lation between the networks  As a result  overall network performance  shouldn   t be affected     Before the networks were connected  each network had its own DHCP  server to assign IP addresses to users as needed  Unfortunately  both  DHCP servers have the same local IP address  192 168 0 1   When the  networks
213. d this computer  thing figured out  someone popped into your office  hooked up a cable  and  said     Happy networking     Makes you want to scream     Either way  you ve found the right book  Help is here  within these humble  pages     This book talks about networks in everyday     and often irreverent     terms   The language is friendly  you don   t need a graduate education to get through  it  And the occasional potshot helps unseat the hallowed and sacred tradi   tions of networkdon   bringing just a bit of fun to an otherwise dry subject   The goal is to bring the lofty precepts of networking down to earth  where  you can touch them and squeeze them and say     What   s the big deal  I can  do this        About This Book    This isn   t the kind of book you pick up and read from start to finish  as if it  were a cheap novel  If I ever see you reading it at the beach  lll kick sand in  your face  This book is more like a reference  the kind of book you can pick  up  turn to just about any page  and start reading  It has 30 chapters  each  one covering a specific aspect of networking     such as printing on the net   work  hooking up network cables  or setting up security so that bad guys  can   t break in  Just turn to the chapter you   re interested in and start reading     2 Networking For Dummies  9th Edition       Each chapter is divided into self contained chunks  all related to the major  theme of the chapter  For example  the chapter on hooking up the network  ca
214. dI22UR3xdkL  you can  find random password generators on the Internet  Just go to a search  engine  such as Google  www  google com   and search for Password  Generator  You   ll find Web pages that generate random passwords  based on criteria that you specify  such as how long the password  should be  whether it should include letters  numbers  punctuation   uppercase and lowercase letters  and so on     Secure the Administrator account    It stands to reason that at least one network user must have the authority  to use the network without any of the restrictions imposed on other users   This user is the administrator  The administrator is responsible for setting up    Chapter 23  Securing Your Network 329       NING   s    NING   RY    the network   s security system  To do that  the administrator must be exempt  from all security restrictions     Many networks automatically create an administrator user account when   you install the network software  The username and password for this initial  administrator are published in the network   s documentation and are the   same for all networks that use the same network operating system  One of   the first things that you must do after getting your network up and running is  to change the password for this standard administrator account  Otherwise   your elaborate security precautions are a complete waste of time  Anyone  who knows the default administrator username and password can access your  system with full administrator r
215. dband connections  for technical reasons you don   t really want to know     Cable Internet access works over the same cable that brings 40 billion TV  channels into your home  whereas DSL is a digital phone service that works  over a standard phone line  Both offer three major advantages over normal  dialup connections     Cable and DSL are much faster than dialup connections     A cable connection can be anywhere from 10 to 200 times faster than  a dialup connection  depending on the service you get  And the speed  of a DSL line is comparable to cable   Although DSL is a dedicated con   nection  cable connections are shared among several subscribers  The  speed of a cable connection may slow down when several subscribers  use the connection simultaneously      4    With cable and DSL  you   re always connected to the Internet     You don   t have to connect and disconnect each time you want to go  online  No more waiting for the modem to dial your service provider and  listening to the annoying modem shriek while it attempts to establish a  connection     Cable and DSL don   t tie up a phone line while you   re online     With cable  your Internet connection works over TV cables rather than  over phone cables  With DSL  the phone company installs a separate  phone line for the DSL service  so your regular phone line isn   t affected     Unfortunately  there   s no such thing as a free lunch  and the high speed   always on connections offered by cable and DSL don   t come wi
216. disabled account     Smart Card is Required for Interactive Logon  If the user   s computer  has a smart card reader to automatically read security cards  select this  option to require the user to use it     252 Part IV  Network Management For Dummies       Account is Trusted for Delegation  This option indicates that the  account is trustworthy and can set up delegations  This is an advanced  feature that   s usually reserved for administrator accounts     Account is Sensitive and Cannot be Delegated  Prevents other users  from impersonating this account     Use DES Encryption Types for This Account  Beefs up the encryption  for applications that require extra security     Do Not Require Kerberos Preauthentication  Select this option if you  use a different implementation of the Kerberos protocol     Setting the user   s profile information    The Profile tab  as shown in Figure 17 7  lets you configure the user   s profile  information  This dialog box lets you configure three bits of information  related to the user   s profile         incodore leaver Properties ET   MemberOf    Dialin   Environment   Sessions  Renale contol   Teminal Services Profile    COMe  General   Address   Accoun Profle   Telephones   Organization      User profile      aa                       TE  Figure 17 7   The Profile    tab  ox   oa   soy _  Hed               Profile Path  This field relates to a feature called roaming  Because  roaming profiles aren   t frequently used  I don   t cover them
217. down your network     Hubs  Because switches are inexpensive now  you can affordably solve  many performance problems by replacing old  outdated hubs with  switches  Using switches rather than hubs reduces the overall load on  your network     1  Segment sizes  Keep the number of computers and other devices on  each network segment to a reasonable number  About 20 devices is usu   ally the right number   Note that if you replace your hubs with switches   you instantly cut the size of each segment because each port on a switch  constitutes a separate segment      The network   s speed  If you have a really old network  you may discover  that many     if not all     of your users are still working at 10 Mbps   Upgrading to 100 Mbps speeds up the network dramatically  Upgrading  to 1 Gbps speeds it up even more     The backbone speed  If your network uses a backbone to connect seg   ments  consider upgrading the backbone to 1 Gbps     The hardest part about improving the performance of a network is determin   ing where the bottlenecks are  With sophisticated test equipment and years  of experience  network gurus can make good educated guesses  Without the  equipment and experience  you can still make good uneducated guesses     Malfunctioning components    Sometimes a malfunctioning network card or other component slows down  the network  For example  a switch may malfunction intermittently  occasion   ally letting packets through but dropping enough of them to slow down the  ne
218. dresses  every network would be allocated 254  65 000  or 16  million IP addresses for host devices  Although many networks with more  than 254 devices exist  few  if any  exist with 65 000  let alone 16 million   Unfortunately  any network with more than 254 devices would need a Class B  allocation and probably waste tens of thousands of IP addresses      gt a  Figure 6 1   A network  before and  after sub   netting   PCS    Chapter 6  Dealing with TCP IP   13    The second reason for subnetting is that even if a single organization has  thousands of network devices  operating all those devices with the same  network ID would slow the network to a crawl  The way TCP IP works dic   tates that all the computers with the same network ID must be on the same  physical network  The physical network comprises a single broadcast domain   which means that a single network medium must carry all the traffic for the  network  For performance reasons  networks are usually segmented into  broadcast domains that are smaller than even Class C addresses provide     Subnets    A subnet is a network that falls within another  Class A  B  or C  network   Subnets are created by using one or more of the Class A  B  or C host bits to  extend the network ID  Thus  rather than the standard 8   16   or 24 bit net   work ID  subnets can have network IDs of any length     Figure 6 1 shows an example of a network before and after subnetting has  been applied  In the unsubnetted network  the network has 
219. e    rg Drowse hr lowewriter pri on   60  o             Chapter 12  Creating an Intranet 2 15                          1et x   Fic Acton View Help  Selo JERE a  Poll eke N   amp  ONS Name Type Data Timestamp  B  j Leve   _msdes     D  Forward Lookup Zones BD sites  E EI _medce LoweWriter pri E tp  T op     ee asics E vomainvnszones        pies E Forestunszones    a yi El  same as parent tnider  Start nf Authority  SOA   63   server 1lowewriter p    static  i    Domainonszones   E  same as parent tolder  Name Server  NS  lservern 1 lowewriter pri  static  i   E Forestonszones   E  came as parent folder  Host  A  192 168 253 128 static  y Reverse Lookup Zones E h osmbavwuexe Host  A  192  168 1 10 4 23 2007 9 00 00  w E  Conditional Forwarders   Eliservero1 Hoet  A  192 169 253 128 11 3 2007 enon     fi  Global Logs fe  vistao1 Hoet  A  192  168  1 120 4 23 2007 10 00 00  SSS  Figure 12 11   The DNS  Manager  4 tle i  Console   start  m      Sj internet information ser        HRWeb Site I   DNS Manager    ii 2 10PM          12  Choose Action  New Alias  CNAME     The New Resource Record dialog box appears  as shown in Figure 12 12   13  Enter the alias name you want to use in the Alias Name text box    For example  enter an alias name such as hr     14  Enter the computer name of your Web server in the Target Host  text box     For example  enter a server name like 1server01   15  Click OK   The DNS alias is created   16  Close the DNS Manager   17  Open a browser window   18  
220. e  The following sections briefly  describe two other server choices  Linux and Macintosh OS X Server     Chapter 7  Setting Up a Server 13 7    Linux    Perhaps the most interesting operating system now available is Linux  The  free Linux operating system is based on Unix  a powerful network operating  system often used on large networks  Linux was started by Linus Torvalds   who thought it   d be fun to write a version of Unix in his free time     as a  hobby  He enlisted help from hundreds of programmers throughout the  world  who volunteered their time and efforts via the Internet  Today  Linux  is a full featured version of Unix  its users consider it to be as good as or  better than Windows  In fact  almost as many people now use Linux as use  Macintosh computers     Linux offers the same networking benefits of Unix and can be an excellent  choice as a server operating system     Apple Mac OS X Server    All the other server operating systems I describe in this chapter run on Intel   based PCs with Pentium or Pentium compatible processors  But what about  Macintosh computers  After all  Macintosh users need networks  too  For  Macintosh networks  Apple offers a special network server operating system  known as Mac OS X Server  Mac OS X Server has all the features you expect in  a server operating system  file and printer sharing  Internet features  e mail   and others     The Many Ways to Install a  Network Operating System    Regardless of which network operating syste
221. e  and printer   sharing program that allows Linux to mimic a Windows file and print server  so Windows computers can use shared Linux directories and printers  If you  want to use Linux as a file or print server in a Windows network  you have to  know how to dance the Samba     Understanding Samba    Because Linux and Windows have such different file systems  you can   t  create a Linux file server simply by granting Windows users access to Linux  directories  Windows client computers couldn   t access files in the Linux  directories  There are just too many differences between the file systems      these  for example     366    Part VI  Beyond Windows    ar          Linux filenames are case sensitive  Windows filenames aren   t  For exam   ple  in Windows  Filel txt and file1 txt are the same file  In Linux   they   re different files     Linux filenames can contain periods  In Windows  only one period is  allowed     and it separates the filename from the file extension     Windows has file attributes  such as Read only and Archive  Linux  doesn   t have these     More fundamentally  Windows networking uses a protocol called SMB  which  stands for Server Message Block  to manage the exchange of file data between  file servers and clients  Linux doesn   t have SMB support built in  That   s why  Samba is required     Samba is a program that mimics the behavior of a Windows based file server  by implementing the SMB protocol  When you run Samba on a Linux server   Windows co
222. e Home icon lets you access your home directory   The Computer icon is similar to the Windows My Computer icon  And  the Trash icon is similar to the Recycle Bin in Windows     1  The panel at the top of the desktop area includes several menus and  icons  The Applications menu lists applications you can run  and the  Actions menu lists actions you can perform     1     Workspaces  you ask  A workspace is like a separate desktop where you  can keep windows open to reduce the clutter on your screen  The panel  beneath the desktop area contains a tool     the Workspace Switcher      which lets you switch active workspaces by clicking one of the rect   angles in the grid         F  Applications Places System  o   Doug Lowe Sun jul 5  1 59 PM iD          Unsaved Document 1   gedit  File Edit View Search Tools Documents Help    Be  dje    New Open Save Print       _  Unsaved Document 1               a Ln 1  Coll  Figure 25 2   A typical  GNOME          360 Part vi  Beyond Windows       Getting to a Command Shell    There are two basic ways to get to a command shell  the program that pro   vides the command line  when you need to run Linux commands directly     Press Ctrl Alt Fx  that is  one of the function keys  to switch to one of  the virtual consoles   There are 12 virtual consoles  one for each func   tion key   Then you can log on and run commands to your heart   s con   tent  When you   re done  press Ctrl Alt F7 to return to GNOME   Virtual  console 7 is the one that GNOME 
223. e comput   ers that you need to remove from the network temporarily     Hubs or switches     A switch is simply a more sophisticated type of hub     Because the cost of switches has come down dramatically in the past few  years  new networks are built with switches rather than hubs   You probably  have to find a hub at a garage sale or on eBay   If you have an older network  that uses hubs and seems to run slowly  you can probably improve the net   work   s speed by replacing the older hubs with newer switches     Switches are more efficient than hubs  but not just because they   re faster     1  Inahub  every packet that arrives at the hub on any of its ports is auto   matically sent out on every other port  The hub has to do this because it  doesn   t keep track of which computer is connected to each port     Suppose that Wally   s computer is connected to Port 1 on an 8 port hub  and Ward   s computer is connected to Port 5  If Ward   s computer sends a  packet of information to Wally   s computer  the hub receives the packet  on Port 1 and then sends it out on Ports 2 through 8  All the computers  connected to the hub get to see the packet and determine whether the  packet was intended for them     A switch keeps track of which computer is connected to each port     If Wally   s computer on Port 1 sends a packet to Ward   s computer on  Port 5  the switch receives the packet on Port 1 and then sends the  packet out only on Port 5  This system is faster and also improves t
224. e following important tuning options are available for most servers     Chapter 19  Network Performance Anxiety 28         NING     Virtual memory options  Virtual memory refers to disk paging files that  the server uses when it doesn   t have enough real memory to do its work   Few servers ever have enough real memory  so virtual memory is always  an important server feature  You can specify the size and location of the  virtual memory paging files     For the best performance  provide at least 1 2 times the amount of real  memory  For example  if you have 4GB of real memory  allocate at least  6GB of virtual memory  If necessary  you can increase this size later     Disk striping  Use the disk defragmenter to optimize the data storage on  your server   s disks     If the server has more than one hard drive  you can increase perfor   mance by creating striped volumes  which allow disk I O operations to  run concurrently on each of the drives in the stripe set     Network protocols  Make sure that your network protocols are config   ured correctly and remove any protocols that aren   t necessary     1  Free disk space on the server  Servers like to have plenty of breathing  room on their disks     If the amount of free disk space on your server drops precipitously low   the server chokes up and slows to a crawl  Make sure that your server  has plenty of space     a few gigabytes of unused disk space provides a  healthy buffer     Servers that do too much    One common source 
225. e groups and some of the most common proce   dures you ll employ when setting up groups for your server     Creating a group    If none of the built in groups meets your needs  you can create your own  group by following these steps   1  Log on as an administrator   You must have administrator privileges to perform this procedure     2  Choose Start gt Administrative Tools   Active Directory Users and  Computers     The Active Directory Users and Computers management console  appears     3  Right click the domain to which you want to add the group and then  choose New   Group     The New Object     Group dialog box appears  as shown in Figure 17 8     256 Part IV  Network Management For Dummies    ey  Figure 17 8   Creating a  new group   Sa       New Object   Group xi    Rw Create in    LoweWriter prifUsers       Group name   Group name  pre Windowes 2000     Group scope      Group type 4  F Domain local    Security      Global C pDstnbubon   C Ur              lt          4  Type the name for the new group   Enter the name in both text boxes   5  Choose the group scope     The choices are Domain Local  Global  and Universal  For groups that  will be granted access rights to network resources  choose Domain    Local  Use Global for groups to which you   ll add users and Domain Local  groups  Use Universal groups only if you have a large network with mul     tiple domains   6  Choose the group type     The choices are Security and Distribution  In most cases  choose  Security 
226. e hackers  can   t get into your network via a wireless computer located in the parking lot  or across the street        If you think that   s unlikely  think again  Several underground Web sites on the  Internet actually display maps of unsecured wireless networks in major cities   For more information about securing a wireless network  see Chapter 9     Thinking Vou Can   t Work Just  Because the Network Is Down    A few years back  I realized that I can   t do my job without electricity  Should  a power failure occur and I find myself without electricity  I can   t even light a  candle and work with pencil and paper because the only pencil sharpener I  have is electric     Some people have the same attitude about the network  They figure that if the  network goes down  they may as well go home  That   s not always the case  Just  because your computer is attached to a network doesn   t mean that it won   t  work when the network is down  True     if the wind flies out of the network  sails  you can   t access any network devices  You can   t get files from network  drives  and you can   t print on network printers  But you can still use your com   puter for local work     accessing files and programs on your local hard drive  and printing on your local printer  if you   re lucky enough to have one      Running Out of Space on a Server    One of the most disastrous mistakes to make on a network server is to let it  run out of disk space  When you buy a new server with hundr
227. e network with bad packets     Daisy chaining switches    If a single switch doesn   t have enough ports for your entire network  you  can connect switches by daisy chaining them  as shown in Figure 5 5  If one  of the switches has an uplink port  you can use a normal patch cable to con   nect the uplink port to one of the regular ports on the other hub or switch   If neither device has an uplink port  use a crossover cable to connect them    For instructions on making a crossover cable  see the section     Crossover  cables     earlier in this chapter      Chapter 5  Cables  Adapters  and Other Stuff 95                 gt a  Figure 5 5   You can  daisy chain  hubs or  switches  together                       On many newer switches  each port on the switch can automatically detect  whether it   s connected to another switch  In that case  you don   t have to use  special uplink ports or crossover cables  You can use a standard patch cable  to connect the switches by using any available port     You can often increase the overall performance of your network by using  two  or more  connections between switches  For example  you may use two  patch cables to create two connections between a pair of switches     The number of switches that you can chain together is limited     1  For 10 Mbps networks  don   t connect more than three switches  together     For 100 Mbps or 1000 Mbps  you can chain only two switches together     96    Part Il  Building Your Own Network          ar   
228. e problem  along with an indication of whether those steps were     undone    when they didn   t help solve the problem     The date the problem was finally resolved     Chapter 21    How to Stay on Top of Your  Network and Keep Its  Users Off Your Back       In This Chapter    Training your users  Organizing a library  Finding sources for help    Coming up with great excuses    A network manager has a rotten deal  Users come to you whenever any   thing goes wrong  regardless of whether the problem has anything to  do with the network  They knock on your door if they can   t log on  if they lost  a file  or if they can   t remember how to use the microwave     This chapter shows a few basic rules to simplify your life as a network  manager     Train Vour Users    After you first get your network up and running  invite all the network users   to Network Obedience School so that you can teach them how to behave on  the network  Show them the basics of accessing the network  make sure that  they understand how to share files  and explain the rules to them     A great way to prepare your users for this session is to ask them to read the  first three chapters of this book  I wrote those chapters with the network  user in mind  so they explain the basic facts of network life  If your users read  those chapters first  they   re in a much better position to ask good questions  during obedience school     302 Part IV  Network Management For Dummies       Here are more ways to make the
229. e problems that come up  When a user bugs you  with a new bug  you can say with confidence     I ll get back to you on that one        Your library should include these items     A copy of your network binder  All the information you need about  the configuration of your network should be in this binder   Don   t put  the original copy of the network binder in the library  Keep the original  under lock and key in your office  And keep an extra copy off site in a  safe place      A copy of the manuals for every program used on the network  Most  users ignore the manuals  so they don   t mind if you    borrow    them for  the library  If a user won   t part with a manual  at least make a note of the  manual   s location so that you know where to find it     Chapter 21  How to Stay on Top of Your Network 303    1    A copy of the Windows Resource Kit for every version of Windows  in use on your network  You can get the Windows Resource Kit at any  bookstore that has a well stocked section of computer books     A copy of the network software manual or manuals     At least 20 copies of this book   Hey  I have bills to pay   Seriously  your  library should contain books appropriate to your level of expertise  Of  course  For Dummies books are available on just about every major com   puter subject  Devoting an entire shelf to these yellow and black books  isn   t a bad idea     Keep Up with the Computer Industry    The computer business changes fast  and your users probably expect 
230. e same disastrous effect     Chapter 27  More Than Ten Big Network Mistakes 38         If your network is set up with a dedicated file server  you probably won   t be  tempted to turn it off or restart it  But if your network is set up as a true peer   to peer network  where each of the workstation computers     including your  own     also doubles as a server computer  be careful about the impulsive  urge to turn off or restart your computer  Someone may be accessing a file or  printer on your computer at that very moment     Before you turn off or restart a server computer  find out whether anyone is  logged on  If so  politely ask him or her to log off     Also  remember that many server problems don   t require a server reboot   Instead  you can often correct the problem just by restarting the particular  service that   s affected     Deleting Important Files on the Server     NG        Without a network  you can do anything you want to your computer  and the  only person you can hurt is yourself   Kind of like the old    victimless crime     debate   Put your computer on a network  though  and you take on a certain  amount of responsibility  You must find out how to live like a responsible  member of the network society     Therefore  you can   t capriciously delete files from a network server just  because you don   t need them  They may not be yours  You wouldn   t want  someone deleting your files  would you     Be especially careful about files that are required to k
231. e sure all the wires are slipped into the correct  pinholes       Insert the plug and wire into the crimping portion of the tool and then    squeeze the handles to crimp the plug     Squeeze it tight       Remove the plug from the tool and double check the connection     You re done     Here are a few other points to remember when dealing with RJ 45 connectors  and twisted pair cable     1  The pins on the RJ 45 connectors aren   t numbered     You can tell which is Pin 1 by holding the connector so that the metal  conductors are facing up  as shown in Figure 5 3  Pin 1 is on the left     1     Some people wire 10BaseT cable differently     using the green and white    pair for Pins 1 and 2  and the orange and white pair for Pins 3 and 6   Doing it this way doesn   t affect the operation of the network  the net   work is color blind  as long as the connectors on both ends of the cable  are wired the same way     If you re installing cable for a Fast Ethernet system  be extra careful to    follow the rules of Category 5  or better  cabling  Among other things   make sure that you use Category 5 components throughout  The cable  and all the connectors must be up to Category 5 specs  When you attach  the connectors  don   t untwist more than half an inch of cable  And  don   t  try to stretch the cable runs beyond the 100 meter maximum  When in  doubt  have cable for a 100 Mbps Ethernet system professionally installed           12345508 Pin connections   WK Pin 1   White Orange 
232. e to everyone who can  access the network     If you choose the closed door approach  you set up each user so that he or  she has access to nothing  Then  you grant each user access only to those  specific files or folders that he or she needs     The closed door approach results in tighter security but can lead to the Cone  of Silence Syndrome  Like Max and the Chief who can   t hear each other talk  while they   re under the Cone of Silence  your network users will constantly  complain that they can   t access the information that they need  As a result   you ll find yourself often adjusting users    access rights  Choose the closed   door approach only if your network contains a lot of sensitive information   and only if you   re willing to invest time administrating your network   s  security policy     You can think of the open door approach as an entitlement model  in which the  basic assumption is that users are entitled to network access  In contrast   the closed door policy is a permissions model  in which the basic assumption    324 Part V  Protecting Your Network       is that users aren   t entitled to anything but must get permissions for every  network resource that they access    P   gt  If you   ve never heard of the Cone of Silence  go to YouTube  www  youtube   com  and search for Cone of Silence  You ll find several clips from the original  Get Smart series     Physical Security  Locking Vour Doors    The first level of security in any computer network is p
233. e using Windows 2000 Server  Windows Server 2003  or Windows  Server 2008  you can double click a service to display a dialog box that  describes the service  This information can come in handy if you   re not  certain what a particular service does     How to Restart a Network Server    NING     RY    ar    Sometimes  the only way to flush out a network problem is to restart the net   work server that   s experiencing trouble     Restarting a network server is an action you should take only as a last resort   Network operating systems are designed to run for months or even years at a  time without rebooting  Restarting a server invariably results in a temporary  shutdown of the network  If you must restart a server  try to do it during off  hours     Before you restart a server  check to see whether a specific service that   s  required has been paused or stopped  You may be able to just restart the  individual service rather than the entire server  For more information  see the  section     How to Restart Network Services     earlier in this chapter     Here   s the basic procedure for restarting a network server     1  Make sure that everyone is logged off the server     The easiest way to do that is to restart the server after normal business  hours  when everyone has gone home for the day  Then you can just  shut down the server and let the shutdown process forcibly log off any  remaining users     To find out who   s logged on  refer to the section     Who   s on First 
234. e using a surge protector that is more  than two or three years old  replace it with a new one     1    The monitor  The monitor has a separate power cord and switch  Make  sure that the monitor is plugged in and turned on   The monitor has two  cables that must be plugged in  One runs from the back of the monitor  to the back of the computer  the other is a power cord that comes from  the back of the monitor and must be plugged into an electrical outlet         Cables  Your keyboard  monitor  mouse  and printer are all connected to  the back of your computer by cables  Make sure that these cables are all  plugged in securely     Make sure that the other ends of the monitor and printer cables are  plugged in properly  too     Monitor adjustment  Some monitors have knobs that you can use to  adjust the contrast and brightness of the monitor   s display  If the com   puter is running but the screen is dark  try adjusting these knobs  They  may have been turned down all the way     Internal components  If you   re reasonably competent and daring  try  turning off the computer  unplugging it  opening the case  and carefully  removing and then reseating components  such as memory and video  cards  These components often come unseated from their sockets   Removing and reinstalling them can often revive a dead computer     Ways to Check a Network Connection     lt r    The cables that connect client computers to the rest of the network are  finicky beasts  They can break at a moment
235. ease duration  The  default value is eight days  which is appropriate in many cases  However   you may encounter situations in which a longer or shorter interval may be  appropriate     1    The more stable your network  the longer the lease duration can safely  exist  If you only periodically add new computers to your network  or  replace existing computers   you can safely increase the lease duration  past eight days     The more volatile the network  the shorter the lease duration should be   For example  you may have a wireless network in a university library   used by students who bring their laptop computers into the library to  work for a few hours at a time  For this network  a duration as short as  one hour may be appropriate     J22 Partit  Building Your Own Network    NING   RY       Don   t configure your network to allow leases of infinite duration  Although  some administrators feel that this duration cuts down the workload for the  DHCP server on stable networks  no network is permanently stable  Whenever  you find a DHCP server that   s configured with infinite leases  look at the active  leases  I guarantee that you ll find IP leases assigned to computers that no  longer exist     Managing a Windows Server  2008 DHCP Server    Ey  Figure 6 2   Specifying   the scope   s  address  range and  subnet  mask     EEE    The exact steps to follow when you configure and manage a DHCP server  depend on the network operating system or router you   re using  The follow 
236. eate Share  Steps   To provision a shared folder wah the following settings  click Create  LORS  Shared Folder Location these setting  click Previous or elect the appropriate page in the orientation pane   NTFS Permissions  Share Protocols Share folder eettinge   SMB Settings  Share location  C  Data Shares Marketing  SMB Pennissions NTFS permissions  NT SERVICE  Truetedinetaller   Allow Full Control  nherted   DFS Namespace Publishing NT SERVICE Trustedinstaller   Alow  inhemted   NT AUTHORITY SYSTEM   Allow Full Control  inherited   center comme S NT AUTHORITY SYSTEM   Allow    rihented   BUILTIN Administrators   Allow  Full Control  ritverited   r BUILTIN Administrators   Allow   nherted   BUILTIN Users   Alow Read  amp  Execute   List Folder Contents   F  BUILTIN Users   Mlow Create Folders   Append Data  inherited   BUILTIN Users   Alow Create Files   Wnte Data  inhented   CREATOR OWNER   Allow  frherted   Share over SMR  Marketing  Share palh   WLSERVERO1 Marketing  User imt  Maamum allowed  Offline setting  Selected files and programs available offline  SMB permissions   Everyone   Allow Change   Read  BUILTIN  Administrators   Allow Full Control  Fa  emon  C  ces            Chapter 18  Managing Network Storage 2 7                  Ta  Confirmation  Stepe   Shared Folder Location V  You have eucceeefully completed the Provision a Shared Folder Wizard   NTFS Pemissions    Share Protocols Talo  SMB Settinas jemal  SMD Pemissions eak l l  O shae over SMB Success  DFS Name
237. eate custom share permissions       All users and groups have only Read access   Administrators have Full Control  al other users and groups have only Read access    g Administratore have Full Control  all other usere and groupe have only Read access  and Wnte access    Users and groups have custom share permissions     Fenmissions    For more information about sharing end permissions  see Meneuing Permissions  for Shared Folders    Previous    Neas   Cancet_           Chapter 18  Managing Network Storage 269    7  Select the sharing permissions you want to impose   You have four choices   e All Users and Groups have Read Only Access  Use this option to    share information that you want everyone to have access to  but  you don   t want to allow anyone to change the information     e Administrators Have Full Control  All Other Users and Groups Have  Only Read Access     e Administrators Have Full Control  All Other Users and Groups Have  Only Read Access and Write Access     e Users and Groups Have Custom Share Permissions  When you select  this option  you can then click the Permissions button to set  custom permissions     8  Click Next     The dialog box  as shown in Figure 18 7  appears        Op Provision a Shated Folder Wizard a  oj xj    DFS Namespace Publishing      You can publish an SMB share to a DFS namespace by specilying an existing  Shared Folder Location namespace and the folders you want to create in the namespace  The last folder in the    namespace path wil
238. eaverc1  Or  you may  use the first letter of your first name followed by your complete last  name  Then Wally   s username is wcleaver  and Beaver   s is bcleaver    In most networks  capitalization doesn   t matter in usernames  Thus   bcleaver is the same as BCleaver         Every computer on the network must have a unique computer name     You don   t have to know the names of all the computers on the network   but it helps if you know your own computer   s name and the names of  any server computers you need to access     The computer   s name is sometimes the same as the username of the person  who uses the computer  but that   s usually a bad idea because in many com   panies  people come and go more often than computers  Sometimes the  names indicate the physical location of the computer  such as of fice 12  or back room  Server computers often have names that reflect the group  that uses the server most  like acctng server or cad server     Some network nerds like to assign techie sounding names  like BL3K5   87a  And some like to use names from science fiction movies     HAL   Colossus  M5  and Data come to mind  Cute names like Herbie  aren   t allowed   However  Tigger and Pooh are entirely acceptable      recommended  in fact  Networks are what Tiggers like the best         Usually  the sensible approach to computer naming is to use names that  have numbers  such as computer001 or computer002     Network resources  such as shared disk folders and printers  have  
239. ecee      Part I  Lets Network  ccce l    Chapter 1  Networks Will Not Take Over the World  and Other Network Basics       9  Chapter 2  Life on the Network            c ccccccsssessecsseesseeseeeseceseesseceseessecseeeseeseeesseeeeeeeeessees 21  Chapter 3  More Ways to Use Your Network            cccccsscsssessseessesseeseeeseeseeeseeeseeeeessees 41  Part Il  Building Vour Own Network    cccccccccsccccseccssccese 67  Chapter 4  Planning Your Network          ccccceccccsscssssessceseessecesecesecsseeeeeeseesseeeseeeseeseessees 63  Chapter 5  Oh  What a Tangled Web We Weave    Cables  Adapters  and Other Stuff             cccsessssscescsssessscssscssseseessesssesseeesseeseessnesees 79  Chapter 6  Dealing with TEPIP oireen pere eere E EEE EEAS 105  Chapter 7  Setting Up a Server            csccsscssscsssesssesssesseesecessecssecssessseessesssesseessessaeesaeeans 131  Chapter 8  Configuring Windows XP  Vista  and 7 Clients             cccccceesceseeseeeeeees 151  Chapter 9  Wireless Networking            ccccescessessscesecesecesecsseessecsseeseeeseeseeseseeeseeeseesseeeas 165  Part Ill  Getting Connected occse 183  Chapter 10  Connecting Your Network to the Internet             ccceeseeseeseeseeeseeeeees 185  Chapter 11  Managing E Mail with Exchange 2007           c ccscccscesssessessseeseeeseeeseesseeees 193  Chapter 12  Creating an Intranets  sccciiesececdveecevsscanteds caetedaatceessantecdoibetesacdedenncts EEES 203  Chapter 13  Is It a Phone or a Computer   Or  Understand
240. eck     the process requires two  forms of identification     Your username  The name by which the network knows you     Your username is usually some variation of your real name  like Beav for  the Beaver  Everyone who uses the network must have a username     Your password  A secret word that only you and the network know  If  you type the correct password  the network believes that you are who  you Say you are     Every user has a different password  and the password should be a secret     In the early days of computer networking  you had to type a logon command  at a stark MS DOS prompt and then supply your user ID and password   Nowadays  the glory of Windows is that you get to log on to the network  through a special network logon screen  Figure 2 1 shows the Windows 7  version of this dialog box     Here are some more logon points to ponder     The terms user JD and logon name are sometimes used instead of user   name  They mean the same thing     As long as we re talking about words that mean the same thing  log in  and log on mean the same thing  as do  respectively  log out and log off  as ways of saying     I   m outta here     Although you see both out there in  the world  this book uses log on and log off throughout     and if there   s  any exception  the book says why and grouses about it a bit     As far as the network   s concerned  you and your computer aren   t the  same thing  Your username refers to you  not to your computer  That   s  why you have a user
241. ed acceca 183    Chapter 10  Connecting Your Network to the Internet              185   Connecting to the Internet           ccc cccesccesceeseesccceseeeseeseeeseesseeeseeeseesseenseenes 185   Connecting with cable or DSL    eeesesesssesseesscessessneesseesseessessees 186   Connecting with high speed private lines  T1 and T3                 187   Sharing an Internet CONNECTION            cee cccesscesseeseeeseeeeesseeeeeenseeeees 187   Securing Your Connection with a Firewall            cccceesesseeessesteeseeeseeeeees 188   Using a fre walls sccisss sands dodves dessaveceises staddensansuaveds s Eni N As 188   The built in Windows firewall           ccccccccescceeseeeseeeseeeeeseesseeeeeeeess 190   Chapter 11  Managing E Mail with Exchange 2007                193   Managing MailDOx S vecssicssesducdedessenevesectedsaiesnesssceesauectvaneueredd thevscpaaeevdoasivvsiees 193   The Exchange General tabuen 194   The E mail Addresses tab             ccccscsscssseeeeeseeeeeseeneeeeceeeeeeeneeeesseeaeees 195   The Exchange Features taDt nri 195   The Exchange Advanced tab          cecccessccesecesseeeseeeseeeesseesseeesseeees 196   Configuring Outlook for Exchange             ccccccscessseeseesseeseesseeeseceseeeseesseenes 197   Viewing Another Mailbox             cccccceesccesseeceseeeeseeesscecsseeessneesseeeeseeesseeenaes 199   Chapter 12  Creating an Intranet                   00  e eee eee ee 203   What Isan Intranet  soeia iE daaeve cena R ets 203   What Do You Use an Intranet
242. ed network folders are available  you may wonder  what you   re supposed to do with them  This section describes four good uses  for a network folder     Chapter 2  Life on the Network 2 7    Store files that everybody needs    A shared network folder is a good place to store files that more than one  user needs to access  Without a network  you have to store a copy of the file  on everyone   s computer  and you have to worry about keeping the copies  synchronized  which you can   t do  no matter how hard you try   Or  you can  keep the file on a disk and pass it around  Or  you can keep the file on one  computer and play musical chairs     whenever someone needs to use the  file  he goes to the computer that contains the file     On a network  you can keep one copy of the file in a shared folder on the net   work  and everyone can access it     Store your own files    You can also use a shared network folder as an extension of your own hard  drive storage  For example  if you filled up all the free space on your hard  drive with pictures  sounds  and movies that you downloaded from the  Internet but the network server has billions and billions of gigabytes of free  space  you have all the drive space you need  Just store your files on the net   work drive     Here are a few guidelines for storing files on network drives     Using the network drive for your own files works best if the network  drive is set up for private storage that other users can   t access  That  way  you
243. eds of gigabytes  of disk space  you might think you ll never run out of space  But it   s amazing  how quickly an entire network full of users can run through a few hundred  gigabytes of disk space     Unfortunately  bad things begin to happen when you get down to a few giga   bytes of free space on a server  Windows begins to perform poorly and may  even slow to a crawl  Errors start popping up  And  when you finally run out  of space completely  users line up at your door demanding an immediate fix     1  The best way to avoid this unhappy situation is to monitor the free disk  space on your servers on a daily basis  It   s also a good idea to keep track  of free disk space on a weekly basis so you can look for project trends     Chapter 27  More Than Ten Big Network Mistakes 385       For example  if your file server has 100GB of free space and your users  chew up about 5GB of space per week  you know you   ll most likely run  out of disk space in 20 weeks  With that knowledge in hand  you can for   mulate a plan     Adding additional disk storage to your servers isn   t always the best solu   tion to the problem of running out of disk space  Before you buy more  disks  you should    e Look for old and unnecessary files that can be removed     e Consider using disk quotas to limit the amount of network disk  space your users can consume     Always Blaming the Network    Some people treat the network kind of like the village idiot who can be  blamed whenever anything goes 
244. eep the network run   ning  For example  some versions of Windows use a folder named wgpo0000  to hold e mail  If you delete this folder  your e mail is history  Look before you  delete     The first time you accidentally delete an important file from a network share   you may be unpleasantly surprised to discover that the Recycle Bin does not  work for network files  The Recycle Bin saves copies of files you   ve deleted  from your computer   s local hard disk  but it does not save copies of files you  delete from network shares  As a result  you can   t undelete a file you   ve acci   dentally deleted from the network     382 Part vit  the Part of Tens       Copying a File from the Server  Changing  It  and Then Copying It Back    Sometimes working on a network file is easier if you first copy the file to your  local hard drive  Then you can access it from your application program more  efficiently because you don   t have to use the network  This is especially true   for large database files that have to be sorted to print reports     You re asking for trouble  though  if you copy the file to your PC   s local hard  drive  make changes to the file  and then copy the updated version of the file  back to the server  Why  Because somebody else may be trying the same  thing at the same time  If that happens  the updates made by one of you      whoever copies the file back to the server first     are lost     Copying a file to a local drive is rarely a good idea     Sending Som
245. efore you can access the network from your Mac  you must configure your  Mac for networking  Activate AppleTalk and assign your network name and  password     Activating AppleTalk    After all the cables are in place  you have to activate AppleTalk  Here   s how     1  Choose the Chooser desk accessory from the Apple menu   2  Click the Active button   3  Close the Chooser     Assigning your name and password    After you activate AppleTalk  you   re ready to assign an owner name  a pass   word  and a name for your computer  This process allows other network  users to access your Mac  Here   s how     1  Choose the File Sharing control panel from the Apple menu  Apple gt   Control Panels   File Sharing     2  Type your name in the Owner Name field    3  Type a password in the Owner Password field   Don   t forget what the password is    4  Type a descriptive name for your computer in the Computer Name field   Other network users will know your computer by this name    5  Click the Close button     3 14 Part VI  Beyond Windows       Accessing a network printer    Accessing a network printer with AppleTalk is no different than accessing a  printer when you don   t have a network  If more than one printer is available  on the network  you use the Chooser to select the printer you want to use   Chooser displays all the available network printers     just pick the one you  want to use  And keep the following points in mind     Be sure to enable Background Printing for the network 
246. efully coordinate the IP address  ranges  known as scopes  for which each server is responsible  If you acciden   tally set up two DHCP servers for the same scope  you may end up with dupli   cate address assignments if the servers attempt to assign the same IP address  to two different hosts  To prevent this situation from happening  set up just  one DHCP server unless your network is so large that one server can   t handle  the workload     Understanding scopes    A scope is simply a range of IP addresses that a DHCP server is configured  to distribute  In the simplest case  in which a single DHCP server oversees  IP configuration for an entire subnet  the scope corresponds to the subnet   However  if you set up two DHCP servers for a subnet  you can configure  each one with a scope that allocates only one part of the complete subnet  range  In addition  a single DHCP server can serve more than one scope     You must create a scope before you can enable a DHCP server  When you  create a scope  you can provide it with these properties      Ascope name  which helps you to identify the scope and its purpose      Ascope description  which lets you provide additional details about the  scope and its purpose     1    A starting IP address for the scope   An ending IP address for the scope     A subnet mask for the scope  You can specify the subnet mask with  dotted decimal notation or with Classless Inter Domain Routing  CIDR   notation     One or more ranges of excluded addresse
247. ement console  Here  you can perform common administrative tasks    such as adding additional zones  changing zone settings  or adding A or MX   records to an existing zone  The DNS management console hides the details  of the resource records from you  thus allowing you to work with a friendly   graphical user interface instead     To add anew host  that is  an A record  to a zone  right click the zone in the  DNS management console and choose the Add New Host command  This  action opens the New Host dialog box  as shown in Figure 6 6        x  Name  uses parent domain name if blank    PrinterO1    Fully qualified domain name  FQDN      Pnnteroi Lowewniter on    TP address      192  168  168  201    T Create associated pointer  PTR  record   I Allow any authenticated user to update DNS records with the  some owner name    ttinx    cme                  This dialog box lets you specify the following information     Name  The host name for the new host   1    IP Address  The host   s IP address     Create Associated Pointer  PTR  Record  Automatically creates a PTR  record in the reverse lookup zone file  Select this option if you want to  allow reverse lookups for the host     Chapter 6  Dealing with TCP IP   29    Allow Any Authenticated User to Update  Select this option if you want  to allow other users to update this record or other records with the  same host name  You should usually leave this option deselected     Time to Live  The TTL value for this record     You can 
248. ength and antennas is  cesesisccecscevesedeasicatrdanceseivenetvdaescavdneseavainse 167  Spectrums and the FCC oy ccssedcaseeds sooo en ctees tons jevisevadidecds Mkasioeeeeeess 169  Eight Oh Two Dot Eleventy Something     Or  Understanding Wireless Standards               csccscesceeseeteeseeteeseeeeeees 170  Home onthe RANG 33 44 cseencaed sac esedesscsuecvensedetsnice EE TEE TRA NEO a Erana 171  Wireless Network Adapters          cccccccscccesseceseeessseeesseesseeeeeeeeseeesseeesseeesees 172  Wireless  ACCESS POINtS wis icisisiestisssectcenicsitens ales vedevess Acsaneesuageceabedatetei sanese 173   Infrastructure MOE  ciies  cic cccdossenscedssvscvaevescnesvesectgecsecsbdavienyscsevaescnaes 174  Multifunction  WAP wcss  s ccicdesdsatesscs cies ccacsezesndacs cenecdacuaaasnds tear ecacaneedeess 175  ROAMING esse e e aar E SEEE EE ESEE Ries howe 175  Wireless    brid ging sisca eerta EEA 176  Ad KOC MEtWOTKS seisein iona aE EEA TANNER rare eC aae Erai 176  Configuring a Wireless Access Point    issesesisresesesreresrorioreverrnrevisssresesries 176  Basic Configuration Options           ececeesesseeseeeeeceneceeeeseseeeeeeeeneesaes 177  DHCP configuration aaneen e E Gahan eesdiaes 179  Configuring Windows XP for Wireless Networking                cccceseeees 179    Connecting to a Wireless Network with  Windows Vista Or WiNdOWS 7            ccsssceesseeesseeeseeeeceeesceesseeeeeeeesseeenses 181    Ki    xii Networking For Dummies  9th Edition       Part Ill  Getting Connect
249. ential security problems by restricting the backup  user ID to a certain client and a certain time of the day  If you   re really  clever  and paranoid   you can probably set up the backup user   s  account so that the only program it can run is the backup program        Use encryption to protect the contents of your backup tapes     Secure the backup tapes in a safe location  such as  um  a safe    Preferably one that is fireproof      Speaking of fireproof safes  I don   t trust them  Even better than a  fireproof safe is a safe deposit box at a nearby bank     Chapter 23  Securing Your Network       In This Chapter    Assessing the risk for security    Determining your basic security philosophy    Physically securing your network equipment    User account security    Other network security techniques    Making sure your users are secure    ar    B efore you had a network  computer security was easy  You simply  locked your door when you left work for the day  You could rest easy   secure in the knowledge that the bad guys would have to break down the  door to get to your computer     The network changes all that  Now  anyone with access to any computer on  the network can break into the network and steal your files  Not only do you  have to lock your door  but you have to make sure that other people lock  their doors  too     Fortunately  network operating systems have built in provisions for network  security  This situation makes it difficult for someone to steal your fi
250. enum cable is required only if the air conditioning and heating systems  aren   t ducted  When in doubt  have the local inspector look at your facility  before you install cable     Sometimes solid  sometimes stranded    The actual copper wire that comprises the cable comes in two varieties  solid  and stranded  Your network will have some of each     In stranded cable  each conductor is made from a bunch of very small  wires that are twisted together  Stranded cable is more flexible than  solid cable  so it doesn   t break as easily  However  stranded cable is  more expensive than solid cable and isn   t very good at transmitting  signals over long distances  Stranded cable is best used for patch cables   such as patch panels to hubs and switches      Strictly speaking  the cable that connects your computer to the wall jack  is a station cable     not a patch cable     but it   s an appropriate use for  stranded cable   It   s not technically correct  but most people refer to the  cable that connects a computer to a wall jack as a patch cable      86    Part Il  Building Your Own Network    ANG   so       In solid cable  each conductor is a single  solid strand of wire  Solid cable  is less expensive than stranded cable and carries signals farther  but it  isn   t very flexible  If you bend it too many times  it breaks  Normally you  find solid cable in use as permanent wiring within the walls and ceilings  of a building     Installation guidelines    The hardest part of ins
251. epace Publiching  Review Settings and Create  Stare  Confiemation  ree  Figure 18 9   You re  done   E             Sharing a folder without the wizard    If you think wizards should be confined to Harry Potter movies  you can set up  a share without bothering with the wizard  Just follow these steps     1  Open a Windows Explorer window and navigate to the folder that you  want to share   2  Right click the folder and choose Properties   This action brings up the Properties dialog box for the folder   3  Click the Sharing tab   The Sharing tab comes to the front  as shown in Figure 18 10   4  Click the Advanced Sharing button   The dialog box  as shown in Figure 18 11  appears   5  Select the Share This Folder option to designate the folder as shared     The rest of the controls on this dialog box will be unavailable until you  check this box     2 72 Part IV  Network Management For Dummies       6  Type the name that you want to use for the share in the Share Name  box and type a description of the share in the Comments box     The default name is the name of the folder being shared  If the folder  name is long  you can use a more succinct name here     The description is strictly optional but can sometimes help users deter   mine the intended contents of the folder        General Sharing   Securty   Previous Versions   Customize      Network Fle and Folder Sharing    eee    Network Path   Not Shared     Advanced Shanna  advanced sharing options        GP Advanced Sharing   
252. ept that Windows  does all the copying automatically  Windows also uses smoke and mirrors to  make it look like the copies are actually on the network  even though you   re  not connected to the network  For example  if you map a drive  drive M  for  example  and make it available offline  you can still access the offline copies  of the file on the M drive  That   s because Windows knows that when you  aren   t connected to the network  it should redirect drive M to its local copy  of the drive M files     The main complication of working with offline files  of course  is what hap   pens when two or more users want to access the same offline files  Windows  can attempt to straighten that mess out for you  but it doesn   t do a great   job of it  Your best bet is to not use the offline files feature with network  resources that other users may want available offline too  In other words  it   s  okay to make your home drive available offline because that drive is acces   sible only to you  But I don   t recommend making shared network resources  available offline  unless they   re read only resources that don   t contain files  you intend to modify     Using the offline files feature is easy     In Windows Vista or Windows 7  open the Computer folder  right click  the mapped network drive you want to make available offline  and then  choose Always Available Offline     In Windows XP  open My Computer  right click the mapped drive  and  choose Make Available Offline     If you d
253. equires at least a little technical know how  the organizational skills are  more important     What Have They Got That Vou Don   t Got     With all this technical stuff to worry about  you may begin to wonder whether  you re smart enough to use your computer after it   s attached to the network   Let me assure you that you are  If you   re smart enough to buy this book    20    Part I  Let s Network     Oj  Figure 1 2   Your   official CND  certificate           because you know that you need a network  you   re more than smart enough  to use the network after it   s put in  You   re also smart enough to install and  manage a network yourself  It isn   t rocket science     I know people who use networks all the time  They   re no smarter than you  are  but they do have one thing that you don   t have  a certificate  And so   by the powers vested in me by the International Society for the Computer  Impaired  I present you with the certificate in Figure 1 2  confirming that  you ve earned the coveted title Certified Network Dummy  better known as  CND  This title is considered much more prestigious in certain circles than  the more stodgy CNE or MCSE badges worn by real network experts     Congratulations  and go in peace     Certificate of Network Dumminess    This certifies that       has ascended to the Holy Order of  CERTIFIED NETWORK DUMMY  and is hereby entitled to    all the rights and privileges therein    headaches and frustrations hitherto   and Pizza and Jolt Cola w
254. er  Logon Hours    Log On To                   I Unlock account        T User must change password at next logon  T User cannot change password                         Password never expires  T Store password using reversible encryption xl  D  Account expires  Figure 17 6  os  The E  Account  tab   Cancel Ano Help  SRi Ce eej ae       The following account options are available in the Account Options list box     User Must Change Password at Next Logon  This option  which is  selected by default  allows you to create a one time only password that  can get the user started with the network  The first time the user logs on  to the network  he   s asked to change the password     User Cannot Change Password  Use this option if you don   t want to  allow users to change their passwords   Obviously  you can   t use this  option and the preceding one at the same time      Password Never Expires  Use this option if you want to bypass the pass   word expiration policy for this user so that the user will never have to  change her password     Store Password using Reversible Encryption  This option stores pass   words using an encryption scheme that hackers can easily break  so you  should avoid it like the plague     Account is Disabled  This option allows you to create an account that  you don   t yet need  As long as the account remains disabled  the user  can   t log on  See the section    Disabling and Enabling User Accounts      later in this chapter  to find out how to enable a 
255. er  Now you have a whole new list of dumb  things you can do  mistakes that can give your average computer geek a belly  laugh because they seem so basic to him  Well  that   s because he   s a com   puter geek  Nobody had to tell him not to fold the floppy disk     he was born  with an extra gene that gave him an instinctive knowledge of such things     Here   s a list of some of the most common mistakes made by network novices   Avoid these mistakes and you deprive your local computer geek of the plea   sure of a good laugh at your expense     380 Part Vil  The Part of Tens       Skimping on Cable    If your network consists of more than a few computers or has computers  located in different rooms  invest in a professional quality cable installation   complete with wall mounted jacks  patch panels  and high quality network  switches  It   s tempting to cut costs by using cheap switches and by stringing  inexpensive cable directly from the hubs to each computer on the network   But in the long run  that approach actually proves to be more expensive than  investing in a good cable installation in the first place     Here are just a few of the reasons it pays to do the cabling right in the first place     A good cable installation lasts much longer than the computers it ser   vices  A good cable installation can last 10 or 15 years  long after the  computers on your network have been placed on display in a computer  history museum     Installing cable is hard work  No one enjo
256. er  subject to the restrictions of the  account they   re authorized under     User mode is the default        For each network user who needs to access the Samba server  you must    1  Create a Linux user account for each user   2  Create a separate Samba user account     The Samba user account maps to an existing Linux user account  so you  must create the Linux user account first        To create a Samba user account  choose Preferences  Samba Users  from the Samba Server Configuration window  This brings up the Samba  Users dialog box  as shown in Figure 25 9  You can use this dialog box to  add  edit  or delete users     370    Part VI  Beyond Windows    Figure 25 9   The Samba  Users dialog  box lists  your Samba  users   E    Figure 25 10   The Create  Samba  Share dialog  box   pa    ar          v Samba Users   x    C   Ate user    Edit User                Delete User       To be useful  a file server should offer one or more shares     directories that  have been designated as publicly accessible via the network  Again  you use  the Samba Server Configuration program to manage your shares  To add a  share  click the Add button in the Samba Server Configuration program   s  toolbar  This brings up the Create Samba Share dialog box  as shown in  Figure 25 10  You can then    Enter the path for the directory you want to share   Enter a description for the share     1  Select whether to allow either read only or read write access     Click the Access tab if you want to s
257. er Role              cscccsccssssssessscssscssseessesseesseesaeesaeeees 263   Managing Your File Server           cccsccesessseseeseeseeeeeeceeeeseeaeeaeceeeeeeeeneeeaeeaeens 264  Using the Provision a Shared Folder Wizard               cccscseseeee 265  Sharing a folder without the wizard              cccecceseseeeeeeeeeseeeeeseeseens 271  Granting permissions eosina NE aE RTE NEE NES 273   Chapter 19  Network Performance Anxiety                     5 277  Why Administrators Hate Performance ProblemS        eeeseeseeseseesese 277    What Exactly Is a Bottlene  k   isci scc vstivsczasserveacieesaneestezeonetsavenceccouecventees 278    XIV Networking For Dummies  9th Edition       The Five Most Common Network Bottlenecks               ccceeseeseeseeteeteeteees 280  The hardware inside your servers           cccscceesseeeseeeeseeessneeeseeeeeeees 280   The server   s configuration Options             c cccscesescsesseeesseesseeesteeees 280  Servers  that do t00 MUCH vis    scssseiees vecvdsscecsceees esedeteanedsasresaence dees 281   WHE NEtWOrKAMMAS tLUCtULe 335 52  f sseicei veel cscs tees ceabcees da veseeSstaees cet cvaess 282  Malfunctioning COMPONENtS wis    1s c   cessscscedescestcecseescecsssteescaeseeecacee 282  Tune Your Network the Compulsive Way              ccccescssesseeeeeeeeeeeeeeeeaeens 283  Monitor Network Performance              cccccccsssceessecsseeeesseeesseeceeeeseeeessneessnees 284  More Performan e Vip issisetsscecssesvesieesceondadteansesteetdeveesades
258. er is a gizmo that gives your network signals a boost so that the sig   nals can travel farther  It   s kind of like the Gatorade stations in a marathon   As the signals travel past the repeater  they pick up a cup of Gatorade  take a  sip  splash the rest of it on their heads  toss the cup  and hop in a cab when  they re sure that no one   s looking     You need a repeater when the total length of a single span of network cable is  larger than the maximum allowed for your cable type    Cable Maximum Length   10Base2  coaxial  185 meters or 606 feet   10 100BaseT  twisted pair  100 meters or 328 feet    100 Partii  Building Your Own Network    aS   Figure 5 7   Using a  repeater   ESS        For coaxial cable  the cable lengths given here apply to cable segments     not  to individual lengths of cable  A segment is the entire run of cable from one  terminator to another and may include more than one computer  In other  words  if you connect ten computers with 25 foot lengths of thin coaxial  cable  the total length of the segment is 225 feet   Made you look  Only nine  cables are required to connect ten computers     that   s why it   s not 250 feet      For 10BaseT or 100BaseT cable  the 100 meter length limit applies to the  cable that connects a computer to the hub or the cable that connects hubs  to each other when hubs are daisy chained with twisted pair cable  In other  words  you can connect each computer to the hub with no more than 100  meters of cable  and you can c
259. erae eaen ase e iioa 132  Multitasking encsi ir ena ER ARA 133  Directory SCIVICES scepsis ara EE EE Er 133  Security Services uses sre nren stdednedeguodecoceadeceaideceaheCetitss 134   Understanding Windows Server 2008 Versions            ccscccseecseseesreeseeees 135   Other Server Operating Systems             cccsceeseseeeeseeseeseceeceeeeeeeseeaeeseeaeeaes 136  MANNS E E ina spat oes Mextusecs A testes ccs sdoc AE AE 137  Apple Mat OS  X Server  sincan ra ERCE 137   The Many Ways to Install a Network Operating System                   006 137  Full installation versus UPgrade         ceeeceeceseeseeeneeeeeeneeeeeeeneennees 137  Installation over the network              cescceseeeseeeseeesseeeeseesseeeseeees 138  Automated and remote installations    cee eeeeseeseeeseeeneeeneeaes 139   Gathering Y Our Stuff orur n n R E E E ERNES 140  A capable server Computer            ccccccsceeescessseeeeseeesseeceseeesseeesseessaees 140  The server Operating SYSTEM            ccceesseceseceseeeeseeeseeeessneesseeeeeseeees 141  Other SoftWare shinni s 141  A working Internet connection     ss esriisssresrirsoissirseererisssresresssisscei 142    Pr DOO l BLOND  SEEI AN E PA A AE E E 142    Table of Contents       Making Informed Decisions   0 0 0 0    ceseeseeseesseceeeeeeeeeeeeceeeeeseeeeeeeeeaeeeaeeees 142  Making Final Pr  paration Sessien ierni nenia 143  Installing Windows Server 2008            ccccscssesseeseeceeseeseeeceeceeeeeeeseeseeeeaeees 144  Life ALCOR SOUP essorer crs 
260. erent     1  Choose Start   Control Panel   The Control Panel appears   2  Click the System and Security link   The System and Security page appears   3  Click the Windows Firewall link   The Windows Firewall page appears   4  Click the Turn Windows Firewall On or Off link   The page shown in Figure 10 3 appears   5  Click the Turn On Windows Firewall option     Note that you can independently turn the firewall on or off for public  network     that is  for your connection to the Internet     and for your  home or work network     that is  if you have a network that connects  other computers in your home or office  I recommend you either turn  the firewall on for both or turn it off for both  Turn the firewall off if  you   re using a separate firewall built into the router that connects your    Chapter 10  Connecting Your Network to the Internet   9      computer or home or work network to the Internet  Turn the firewall on    if you don   t have a separate firewall           GO     Window Firewall    Custurnize Settings X           Seurch Contrat Panel    Customize settings for each type of network    You cen modify the firewall settings for each type of network location that you use   What are network locatinns   Home or work  private  network location settings  3    Tum on Windows Firewall  E Block all incoming connections  including those in the list of allowed programs  J  Notify me when Windows Firewall blocks a new program  D Tum off Windows Firewall  not recommended 
261. ers  and Other Stuff 83    hubs and switches enable you to connect from 4 to 48 computers  or more   by using twisted pair cable   For more information about the differences  between hubs and switches  see the section    Hubs or switches     later in this    chapter           June s computer        Beaver   s computer    Ward s computer  Twisted pair cable    In the UTP star arrangement  if one cable goes bad  only the computer  attached to that cable is affected  The rest of the network continues to chug    along     Cable categories    Twisted pair cable comes in various grades called categories  These cat   egories are specified by the ANSI EIA Standard 568   ANSI stands for  American National Standards Institute  EIA stands for Electronic Industries  Association   The standards indicate the data capacity     or bandwidth     of  the cable  Table 5 1 lists the various categories of twisted pair cable     Although higher category cables are more expensive  the real cost of install   ing Ethernet cabling is the labor required to pull the cables through the walls   You should never install anything less than Category 5e cable  And  if at all  possible  invest in Category 6 cable  to allow for future upgrades to your    network     To sound like the cool kids  say    Cat 6    rather than    Category 6        S4 Part it  Building Your Own Network    NING   RY                                  Table 5 1 Twisted Pair Cable Categories   Category Maximum Data Rate Intended Use   1 1
262. ervers      e s e o o    amp  204 127 198 19  63 240 76 19  Lease Obtained                   Sunday  June 13  2004 8 28 14 PM  Lease Expires                 Monday  June 14  2004 8 28 14 PM    pe        xl             One of the most import functions of the Data Link Layer is to provide a way for  packets to be sent safely over the physical media without interference from  other nodes attempting to send packets at the same time  Ethernet uses a  CSMA CD technique to accomplish this     Switches are the most commonly used Data Link Layer devices in most  networks  A switch is similar to a hub  but instead of regenerating incoming  signals of every port  a switch examines the MAC address of every incoming  packet to determine which port to send the packet to     398 Part Vil  The Part of Tens  Layer 3  The Network Layer    The Network Layer handles the task of routing network messages from one  computer to another  The two most popular Layer 3 protocols are IP  which  is usually paired with TCP  and IPX  normally paired with SPX for use with  Novell and Windows networks         One important function of the Network Layer is logical addressing  As you  know  every network device has a physical address called a MAC address   which is assigned to the device at the factory  When you buy a network inter   face card to install in a computer  the MAC address of that card is fixed and  can   t be changed  But what if you want to use some other addressing scheme  to refer to the compute
263. es to squeeze your  data so that you can cram more data onto fewer tapes  Compression factors   of 2 1 are common  so you can usually squeeze 100GB of data onto a tape that  would hold only 50GB of data without compression   Tape drive manufacturers  tend to state the capacity of their drives by using compressed data  assuming  a 2 1 compression ratio  So a 200GB tape has an uncompressed capacity of  100GB      Whether you achieve a compression factor of 2 1 depends on the nature of the  data you   re backing up     If your network is used primarily by Office applications and is filled with  Word and Excel documents  you ll probably get better than 2 1  compression     If your network data consists primarily of graphic image files  you prob   ably won   t get much compression  Most graphic image file formats are  compressed already  so they can   t be compressed much more by the  backup software   s compression methods     Backup programs also help you keep track of which data has been backed up  and which hasn   t  They also offer options  such as incremental or differential  backups that can streamline the backup process  as I describe in the next  section     MBER If your network has more than one server  invest in good backup software   The most popular is Yosemite Backup  made by BarracudaWare  See www   barracudaware com  Besides being able to handle multiple servers  one of  the main advantages of backup software  such as Yosemite Backup  is that it  can properly back 
264. eseeseeeeeeeeees 4  Part V  Protecting Your Network             cscssccssssscsssesssesssssseeseeeseeesnees 5  Part VI  Beyond Windows            cecceseesesssesecesceseeseeseeseceeeeeeeeeeeeseeaeeatenes 5  Part VI The Part Of Tens iss3  assesses sersvtbonssts oi Gdladveis rE E 5  Icons Used in This Book              ccccsccsscssseessecsseesscsseesseessceseeesseessesssessneesseesseses 5  Where to Go frome Her er ssosiiciectes caeasseesaeeeestasenan E TN AEON 6    Part     Lets Network  cocccccccccccccccccccccccccccccccccccccccccccccecee 7    Chapter 1  Networks Will Not Take Over the World     and Other Network Basics                  ccc cece eee eens 9  What Isa NetWork ssc R E ai 10   Why Bother with  a N  twork  iccisscsssccecetivsczassersenssseeaedssnedeneecteasteeteneeceectenees 12  Sharing MES aeneae raees a E E EEE ETIE EAEE AE 12   Sharin FESOUPCES trr AEAT A 12   SHAVING Programi S sisser E E T E iE 13   Servers ali  CEMS heraa o EE A ES 14  Dedicated Servers and Peers     isisscssses iscvescescausesacucescastceacesassedetdasectesstedecvacs 15  What Makes aiNetwork TICK      scc  ec de dcussessbcsseiecevstbescsubdde tekseeibebs ri a 16   It   s Not a Personal Computer Anymore              cccccseesseeseeeeesseesseeseeeseessees 17   The Network  Administrator a jececc sesecsesdecsssevcceesteccesidedvseasceseeieviveniesetecansiess 19  What Have They Got That You Don   t Got          ccccesceesessseeseeeeesseesseenes 19  Chapter 2  Life on the Network                0 2
265. ess Control Number  2009940275  ISBN  978 0 470 53405 2   Manufactured in the United States of America  100987654321    WILEY    About the Author    Doug Lowe has written enough computer books to line all the birdcages in  California  His other books include Networking All in One Desk Reference For  Dummies  PowerPoint 2007 For Dummies  Java All in One Desk Reference For  Dummies  and Microsoft Word 2007 All in One For Dummies     Although Doug has yet to win a Pulitzer Prize  he remains cautiously optimis   tic  He is hopeful that Ken Burns will pick up the film rights to this book and  produce a documentary on computer networking for PBS  while PBS still has  a budget     Doug lives in sunny Fresno  California  where the motto is    Turn On the  Water     with his wife  Debbie  one of his three daughters  Bethany   anda  couple of crazy dogs     Dedication    This one is for mom  I will miss you so     Author   s Acknowledgments    I d like to thank project editor Nicole Sholly  who did a great job of manag   ing all the editorial work that was required to put this book together in spite  of a short schedule and oft missed deadlines  and Amy Fandrei  who made  the whole project possible  I d also like to thank Lee Musick who gave the  entire manuscript a thorough technical review  tested every line of code  and  offered many excellent suggestions  as well as copy editor Jennifer Riggs who  made sure the i   s were crossed and the t   s were dotted  oops  reverse that     An
266. ess and may assign it to another host  Then comes the prob   lem  You have two hosts with the same address on your network     A better way to assign a fixed IP address to a particular host is to create a  DHCP reservation  A reservation simply indicates that whenever a particular  host requests an IP address from the DHCP server  the server should provide  it the address that you specify in the reservation  The host doesn   t receive the  IP address until the host requests it from the DHCP server  but whenever the  host does request IP configuration  it always receives the same address     To create a reservation  you associate the IP address that you want assigned  to the host with the host   s MAC address  Accordingly  you need to get the  MAC address from the host before you create the reservation     Usually  you can get the MAC address by running the command  ipconfig  all from acommand prompt     If TCP IP has not yet been configured on the computer  you can get the  MAC address by choosing the System Information command     Choose Start   All Programs   Accessories   System Tools   System  Information     If you set up more than one DHCP server  be sure to specify the same reserva   tions on each server  If you forget to repeat a reservation on one of the serv   ers  that server may assign the address to another host     How long to lease     One of the most important decisions that you make when you configure   a DHCP server is the length of time to specify for the l
267. ess hours  such as at night when no one is in the  office  These jobs tend to slow down the network by hogging the serv   er   s hard drives     Sometimes  faulty application programs can degrade performance   For example  some programs develop a memory leak  They use memory  but then forget to release the memory after they finish  Programs  with memory leaks can slowly eat up all the memory on a server  until  the server runs out and grinds to a halt  If you think a program has a  memory leak  contact the manufacturer of the program to see whether a  fix is available     1    Spyware can slow a system to a crawl  A common source of performance  problems on client computers is spyware  those annoying programs that  you almost can   t help but pick up when you surf the Internet  Fortunately   you can remove spyware with a variety of free or inexpensive spyware  removal tools  For more information  use Google or another search engine  to search for spyware removal     Chapter 20  Solving Network Problems       In This Chapter  Checking the obvious things  Fixing computers that have expired  Pinpointing the cause of trouble  Restarting client and server computers  Reviewing network event logs    Keeping a record of network woes    fe it  Networks are prone to breaking     They have too many parts  Cables  Connectors  Cards  Switches  Routers  All  these parts must be held together in a delicate balance  the network equilib   rium is all too easy to disturb  Even the best designe
268. est desk in charge of the network    gt     Don   t warn anyone in advance  or else everyone may mess up their  desks intentionally the night before the inspection     238 Part IV  Network Management For Dummies       Is assertive and willing to irritate people to get the job done  A good  network administrator should ensure that backups are working before a  disk fails and that everyone is following good antivirus practices before a  virus wipes out the entire network     Knows how to install the software  Usually  the person who installs the  network is also the network administrator  This is appropriate because  no one understands the network better than the person who designs  and installs it     Documenting the Network    One of the network administrator   s main jobs is to keep the network docu   mentation up to date  I suggest that you keep all important information about  your network in a three ring binder  Give this binder a clever name  such as  The Network Binder  Here are some items it should include     An up to date diagram of the network  This diagram can be a detailed  floor plan showing the location of each computer or a more abstract and  Picasso like depiction  Anytime you change the network layout  update  the diagram  Include a detailed description of the change  the date that   lt P the change was made  and the reason for the change     Microsoft sells the Visio program  which is specially designed for creating  network diagrams  I highly recommend it  
269. et limits on access  for example  to  specific users         v Create Samba Share jox      Directory  Browse                           Share name   Description     Basic Permissions       Read only       Read   Write             z z  R Cancel     2 oK       When you create a new share using the Samba Configuration program  the  share should be immediately visible to network users  If not  try restarting  the Samba server  as I describe in the section     Starting and stopping Samba      in this chapter     Chapter 26  Macintosh Networking       In This Chapter  Hooking up a Macintosh network  Using a Macintosh network  Mixing Macs and PCs    J  book dwells on networking Windows based computers  as if Microsoft  were the only game in town   Hah  They wish   To be politically correct   I should at least acknowledge the existence of a different breed of computer   the Apple Macintosh     This chapter presents what you need to know to hook up a Macintosh net   work  use a Macintosh network  and mix Macintoshes and Windows PCs on  the same network  This chapter isn   t a comprehensive tome on Macintoshes   but it   s enough to start     What Vou Need to Know to Hook  Up a Macintosh Network    The following sections present some key things you should know about net   working Macintosh computers before you start plugging in cables     Mac networking protocols    Every Macintosh ever built  even an original 1984 model  includes networking  support  Of course  newer Macintosh computer
270. ete backup of the computer  Operating system setup pro   grams are almost flawless  so the chances of losing data during instal   lation are minimal  But you still face the chance that something may go  wrong     1  If the computer is connected to an Uninterruptible Power Supply  UPS   that has a serial or USB connection to the computer  unplug the serial  or USB connection  In some cases  this control connection can confuse  the operating system   s Setup program when it tries to determine which  devices are attached to the computer     Light some votive candles  take two Tylenol  and put on a pot of coffee     144 Partit  Building Your Own Network    Installing Windows Server 2008    After you   ve planned your installation and prepared the computer  you   re  ready to run the Setup program  The following procedure describes the steps  that you must follow in order to install Windows Server 2008 on a new com   puter that has a bootable DVD drive        1  Insert the distribution CD in the DVD drive and restart the computer   After a few moments  the Windows Setup Wizard fires up   2  Click Install Now to start the installation     The wizard next asks for the product key  which is printed on a sticker  attached to the CD case     3  Enter the 25 character product key and then click Next     Because the key is so long  it   s easy to make a mistake  If Setup com   plains that the product key is invalid  don   t panic  Just try again     After you input the correct product ke
271. ete files that you saved to the network folder after  they   re picked up  Otherwise  the network folder quickly fills up with  unnecessary files     Create a folder on the network drive specifically intended for holding  files en route to other users  Name this folder PITSTOP or something  similar to suggest its function     In many cases  it   s easier to send files to other network users by e mail than by  using a network folder  Just send a message to the other network user and  attach the file you want to share  The advantage of sending a file by e mail is  that you don   t have to worry about details like where to leave the file on the  server and who   s responsible for deleting the file     Back up your local hard drive    If enough drive space is available on the file server  you can use it to store  backup copies of the files on your hard drive  Just copy the files that you  want to back up to a shared network folder     Obviously  if you copy all your data files to the network drive     and every   body else follows suit     it can fill up quickly  Check with the network man   ager before you start storing backup copies of your files on the server  The  manager may have already set up a special network drive that   s designed just  for backups  And  if you   re lucky  your network manager may be able to set  up an automatic backup schedule for your important data so that you don   t  have to remember to back it up manually     I hope that your network administrator
272. ething to the Printer  Again Just Because It Didn t  Print the First Time    NING   RY    What do you do if you send something to the printer and nothing happens     Right answer  Find out why nothing happened and fix it   Wrong answer  Send it again and see whether it works this time     Some users keep sending it over and over again  hoping that one of  these days  it ll take  The result is rather embarrassing when someone  finally clears the paper jam and then watches 30 copies of the same  letter print  Or when 30 copies of your document print on a different  printer because you had the wrong printer selected     Assuming That the Server  Is Safely Backed Up    Some users make the unfortunate assumption that the network somehow rep   resents an efficient and organized bureaucracy worthy of their trust  Far from  the truth  Never assume that the network jocks are doing their jobs backing  up the network data every day  even if they are  Check up on them  Conduct    Chapter 27  More Than Ten Big Network Mistakes 383       a surprise inspection one day  Burst into the computer room wearing white  gloves and demand to see the backup tapes  Check the tape rotation to make  sure that more than one day   s worth of backups is available     If you   re not impressed with your network   s backup procedures  take it upon  yourself to make sure that you never lose any of your data  Back up your  most valued files to a CD RW drive or a flash drive     Connecting to the Internet witho
273. etwork   s  client computers  In particular  you have to configure each client   s net   work interface card so that it works properly  and you have to install the right  protocols so that the clients can communicate with other computers on the  network     Fortunately  the task of configuring client computers for the network is  child   s play in Windows  For starters  Windows automatically recognizes your  network interface card when you start your computer  All that remains is to  make sure that Windows properly installed the network protocols and client  software     With each version of Windows  Microsoft has simplified the process of config   uring client network support  In this chapter  I describe the steps for config   uring networking for Windows XP  Windows Vista  and Windows 7     Configuring Network Connections    Windows automatically detects the presence of a network adapter  normally   you don   t have to install device drivers manually for the adapter  When  Windows detects a network adapter  it automatically creates a network con   nection and configures it to support basic networking protocols  However   you may need to change the configuration of a network connection manually   I describe the procedures for Windows XP  Vista  and 7 in the following sections        152 Part it  Building Your Own Network    Configuring Windows XP  network connections    The following steps show how to configure your network connection on a  Windows XP system   1  Choose Star
274. etwork Management For Dummies       Part V    Protecting Your  Network    The 5th Wave By Rich Tennant                         Oh  Arthur is very careful about security on the  Web  He never goes online in the same room on  consecutive days        In this part       Q  of the major annoyances of running a network is  keeping the network safe  The world is full of crazy  people who get their kicks from trying to bring innocent  networks like yours to their knees     The chapters in this part describe the most important  things you can do as a network administrator to keep  your network safe  You   ll read about backing up critical  data  protecting your network from viruses and other  threats  and hardening your Internet connection to keep  intruders at bay        Chapter 22  Backing Up Your Data       In This Chapter    Understanding the need for backups    Working with tape drives and other backup media    Understanding the different types of backups    Determining how many backups to keep    Mastering tape rotation    Cleaning the heads    Backing up securely    f you   re the hapless network manager  the safety of the data on your   network is your responsibility  In fact  it   s your primary responsibility   You get paid to lie awake at night worrying about your data  Will it be there  tomorrow  If it   s not  can you get it back  And     most importantly     if you  can   t get it back  will you be there tomorrow     This chapter covers the ins and outs of being a good  
275. etwork can access them  For example  the laser  printer attached to Ward   s computer in Figure 1 1 is a shared resource  which  means that anyone on the network can use it  Without the network  June   Wally  and the Beaver would have to buy their own laser printers     Chapter 1  Networks Will Not Take Over the World  and Other Network Basics 13    ar    NING     RY    Hard drives can be shared resources  too  In fact  you must set up a hard  drive as a shared resource to share files with other users  Suppose that Wally  wants to share a file with the Beaver  and a shared hard drive has been set  up on June   s computer  All Wally has to do is copy his file to the shared hard  drive in June   s computer and tell the Beaver where he put it  Then when the  Beaver gets around to it  he can copy the file from June   s computer to his  own  unless  of course  Eddie Haskell deletes the file first      You can share other resources  too  such as an Internet connection  In fact   sharing an Internet connection is one of the main reasons many networks are  set up     Shaving programs    Rather than keep separate copies of programs on each person   s computer   putting programs on a drive that everyone shares is sometimes best  For  example  if ten computer users all use a particular program  you can pur   chase and install ten copies of the program     one for each computer  Or   you can purchase a ten user license for the program and then install just one  copy of the program on a s
276. eusers crg Hells  1 am an Outlook  and You Are   Feb  8  2007  Thu 2 8 2007     30 AM ae   B Yisdmnbdeng  com Yosemite Backup  Actvity Log for Restore Fie Thu 2 8 2007 9 26 AM i    Ge Steghen Geez Fi  Plot trading Software   Phone conversation on Friday Thu 2 8 2007 6 10 AM ve     Yiadmingbct engrcom Yosemite Backup  Activity Log for Wednesday Diffe  Wed 2 7 2007 11 19 PM sw   a inlo  neweggcom Auto Notification from Newegg com Wed 2 7 2007 7 53 PH 6w   d Las Gonzaler WORD a sti acting funny     stap n when you can Wed 2 7 2007 1 19 PM 4a   I Frandsco Magos OCF Templates Wed 2 7 2007 12 50 PM Li       Corde Quale ARCHIVE PROJECT Wed 2 7 2007 11 40 AM ss     Atks Bortner IP address for swatch Wed 2 7 2007 11 05 aM sa   D Scottie RE  Desabiing Internet Wed 2 7 2007 10 44 AM wes  d Adam Fears RE  Rado Wed 2 7 2007 20 28 AM s Yi   d Lus Gonrsier Never Mag Wed 2 7 2007 10 20 AM  0  Sus Gonse  1 camat open any Word Docs     I need help Wed 2 7 2007 20 28 AM se  S Youhave 19 remnder s     pP    Internet   Protected Mode  On kios               Chapter 15  Connecting from Home 23         If you   re familiar with Outlook  you ll have no trouble using OWA  Almost all  Outlook   s features are available  including your Inbox  calendar  contacts   tasks  reminders  and even public folders  You can even set up an Out of  Office reply     One difference between OWA and Outlook is that there   s no menu bar across  the top  However  most of the functions that are available from the menu bar
277. executive with the company sold his old BlackBerry  on eBay a few months after he left the firm  He had assumed that because he  had removed the battery  everything on the BlackBerry had been erased     The point of this true story is that mobile devices such as BlackBerrys pose  anew Set of challenges for network administrators and that even administra   tors of small networks are facing these challenges  For example  just a few  years ago  only large companies had BlackBerrys or other mobile devices  that integrated with Exchange e mail  But now it isn   t uncommon for compa   nies with just a few employees to have mobile devices     This chapter is a brief introduction to mobile devices and the operating sys   tems they run  with an emphasis on Windows Mobile and BlackBerry devices   You   ll find out more about how these devices can interact with Exchange  e mail and the steps you can take to ensure their security     The Many Types of Mobile Devices    Once upon a time  there were mobile phones and PDAs  A mobile phone was  just that     a handheld telephone you could take with you  The good ones  had nice features such as a call log  an address book  and perhaps a crude    222 Part Ill  Getting Connected       game  but not much else  PDAs     Personal Digital Assistants     were hand   held computers that were designed to replace the old fashioned Day Timer  books people used to carry around with them to keep track of their appoint   ment calendars and address books   
278. explanation usually follows  just in case you   re scratch   ing your head and grunting     Huh        Whenever I describe a message or information that you see on the screen  I  present it this way     A message from your friendly network    Introduction 3       This book rarely directs you elsewhere for information     just about every   thing that you need to know about networks is right here  If you find the  need for additional information  plenty of other For Dummies books can  help  If you have a networking question that isn   t covered in this book  allow  me to suggest my own Networking All in One Desk Reference For Dummies   3rd Edition  Wiley      this much expanded reference book goes deeper into  specific network operating systems and TCP IP protocols  You can also find  plenty of other For Dummies books that cover just about every operating  system and application program known to humanity     What Vou Don   t Need to Read    Aside from the topics you can use right away  much of this book is skippable   I carefully placed extra technical information in self contained sidebars and  clearly marked them so that you can steer clear of them  Don   t read this stuff  unless you re really into technical explanations and want to know a little of  what   s going on behind the scenes  Don   t worry  My feelings won   t be hurt if  you don   t read every word     Foolish Assumptions    I   m making only two assumptions about who you are  You   re someone who  works with a 
279. ey won   t  line up at your door to ask you to print their documents for them     Shaving a printer in Windows XP    The following procedure shows you how to share a printer in Windows XP     1  From the Start menu  choose Printers and Faxes     The Printers and Faxes folder appears  as shown in Figure 3 8  In this  example  the Printers folder lists a single printer  named HP PSC 750         Printers and Faxes  Die Edt View favorites Tools Liep    O      P ph  p gt  Folders F     Printer Lasks      Add a printer   gt  Set up faxing    Other Places      Control panel   Sy Scanners and Camoras     My Documents   Gy Mr Pictures       2  Select the printer that you want to share   Click the icon for the printer to select the printer   3  Choose File   Sharing     You re right  This command doesn   t make sense  You   re sharing a  printer  not a file  but the Sharing command is on the File menu  Go  figure    When you choose File   Sharing  the Properties dialog box for the printer  appears     4  Select the Share This Printer option     52    Part I  Let s Network        5   Optional  Change the share name if you don   t like the name sug     gested by Windows     Other computers use the share name to identify the shared printer  so  choose a meaningful or descriptive name       Click OK     You return to the Printers folder  where a hand is added to the printer  icon to show that the printer is now a shared network printer     To take your shared printer off the network so tha
280. f the user you want to grant access to and then click OK     You re returned to the Permissions for Support dialog box  The user you  added will be selected in the list of users with access to the mailbox        Pid Pagrus          Ge AEs wooo  Daan binira  eects Aachen  Cine Hitech bikti tipan Seine     fromm a    Beda a a ad  Ti mabe iH    Fima   peer ss ore    Adios Dearie  B Oo      m    Cika e B oO  B oO  B  5   Oo Oo    T ah cera pi  Ful maba ahi  Sree mie aoe          Chapter 11  Managing E Mail with Exchange 2007 20         Figure 11 8   The Change  E mail  Account  dialog box   SEs    5  Select the Allow check box for the Full Mailbox Access option to grant    the user full access to the mailbox and then click OK     The Mailbox Rights dialog box is dismissed     6  Click OK     The user Properties dialog box is dismissed     After you   ve granted access to the account  you can configure the user   s  Outlook to read the Support account  Follow these steps     1     On the user   s computer  start Outlook and choose Tools   Account     The Account Settings dialog box is displayed       Select your main e mail account and then click Change     The Change E mail Account dialog box appears  as shown in Figure 11 8       Click the More Settings button and then click the Advanced tab     The Advanced tab of the Microsoft Exchange dialog box appears  as  shown in Figure 11 9       Click the Add button     A dialog box appears to prompt you for the name of the mailbox you 
281. f you   ve ever installed one of these cards  you can prob   ably install a network interface card blindfolded        Q Partl  Building Your Own Network    Here   s the step by step procedure for installing a network interface card     1  Shut down Windows and then turn off the computer and unplug it     Rud Never work in your computer   s insides with the power on or the power  2D cord plugged in     2  Remove the cover from your computer     Figure 5 6 shows the screws that you must typically remove to open the  cover  Put the screws someplace where they won   t wander off     Remove these screws          EE  Figure 5 6   Removing  your com   puter   s  cover   Ee                                            3  Find an unused expansion slot inside the computer     The expansion slots are lined up in a neat row near the back of the  computer  you can   t miss    em   e Most newer computers have at least two slots known as PCI slots     These are the slots you   re looking for to install your network  card into     e Some computers have other types of slots  which are designed for  video cards or for older interface cards  Your network card won   t  fit into these other slots  so don   t try to force it     4  When you find the right type of slot that doesn   t have a card in it   remove the metal slot protector from the back of the computer   s  chassis     a  If a small retaining screw holds the slot protector in place  remove  the screw and keep it in a safe place     b  Pul
282. f you choose to use Administrative Setup  you can use the Network  Installation Wizard  which comes with the Office Resource Kit  The  Network Installation Wizard lets you customize settings for installing  Office on client computers  For example  you can choose which Office  components to install  provide default answers to yes no questions  that Setup asks the user while installing Office  and select the amount  of interaction you want the Setup program to have with the user while  installing Office     No matter which option you choose for installing Office on your network  you  must purchase either a copy of Office or a license to install Office for every  computer that uses Office  Purchasing a single copy of Office and installing it  on more than one computer is illegal     Accessing network files    Opening a file that resides on a network drive is almost as easy as opening a  file on a local drive  All Office programs use File Open to summon the Open  dialog box  as shown in its Excel incarnation in Figure 3 10   The Open dialog  box is nearly identical in other Office programs      Sse  Figure 3 10   The Open  dialog box in  Excel 2007     ar    55    Chapter 3  More Ways to Use Your Network       FX  Open     A  S       4    Search p     Gore    Douglowe    Documents       Date modified Type Size Tags    E Documents This folder is empty   HE Desktop   el Recent Places   pt Computer   EB Pictures   R Music     Recently Changed  B Searches    J Pubic    Folders a  Fle
283. full backup  That   s  a few more disks than most people want to keep in the closet  You could use   DVDs  but you   ll need about a dozen of them  and it will take an hour or so to  fill each one  So you   ll have to devote a Saturday to creating your backup     Because of the limitations of CDs and DVDs  most network administrators  back up network data to tape  Depending on the make and model of the tape  drive  you can copy as much as 800GB of data onto a single tape     One of the benefits of tape backup is that you can run it unattended  In fact   you can schedule tape backup to run automatically during off hours  when no  one   s using the network  In order for unattended backups to work  you must  ensure that you have enough tape capacity to back up your entire network  server   s hard drive without having to manually switch tapes  If your network  server has only 100GB of data  you can easily back it up onto a single tape   However  if you have 1 000GB of data  invest in a tape drive that features a  magazine changer that can hold several tapes and automatically cycle them  in and out of the drive  That way  you can run your backups unattended     Here are some additional thoughts concerning tape backups     A popular style of tape backup for small servers is Travan drives   Travan drives come in a variety of models with tape capacities ranging  from 20GB to 40GB  You can purchase a 20GB drive for under  200     For larger networks  you can get tape backup units that
284. g Your Own Network    NING   s    ANG  ot       If you plan on running cables through walls  you need these additional  tools     e A hammer     e A keyhole saw  This one is useful if you plan on cutting holes  through walls to route your cable     e A flashlight   e A ladder   e Someone to hold the ladder     e Possibly a fish tape  A fish tape is a coiled up length of stiff metal  tape  To use it  you feed the tape into one wall opening and fish it  toward the other opening  where a partner is ready to grab it when  the tape arrives  Next  your partner attaches the cable to the fish  tape and yells something like    Let    er rip     or    Bombs away     Then  you reel in the fish tape and the cable along with it   You can find  fish tape in the electrical section of most well stocked hardware  stores      If you plan on routing cable through a concrete subfloor  you need to rent a  jackhammer and a backhoe and hire someone to hold a yellow flag while you  work  Better yet  find some other route for the cable     Pinouts for twisted pair cables    Each pair of wires in a twisted pair cable is one of four colors  orange  green   blue  or brown  The two wires that make up each pair are complementary   one is white with a colored stripe  the other is colored with a white stripe   For example  the orange pair has an orange wire with a white stripe  the  orange wire  and a white wire with an orange stripe  the white orange wire    Likewise  the blue pair has a blue wire with a w
285. g to patch the server  on Thursday morning  you earn points if you tell everyone about the incon   venience two days before rather than two minutes before   You ll earn even  more points if you patch the server Saturday morning  Tell your boss you ll  take next Thursday morning off to make it up      VII  Thou Shalt Keep an Adequate  Supply of Spare Parts    There   s no reason that your network should be down for two days just  because a cable breaks  Always make sure that you have at least a minimal  supply of network spare parts on hand   As luck would have it  Chapter 29  suggests ten things you should keep in your closet      390 Part Vit  The Part of Tens    VIII  Thou Shalt Not Steal Thy Neighbor s  Program without a License    How would you like it if Inspector Clouseau barged into your office  looked  over your shoulder as you ran Excel from a network server  and asked     Do  you have a liesaunce              A liesaunce     you reply  puzzled        Yes of course  a liesaunce  that is what I said  The law specifically prohibits  the playing of a computer program on a network without a proper liesaunce        You don   t want to get in trouble with Inspector Clouseau  do you  Then make  sure you have the correct licenses for the applications you run on your network     IX  Thou Shalt Train Thy Users  in the Ways of the Network    Don   t blame the users if they don   t know how to use the network  It   s not  their fault  If you   re the network administrator  your 
286. gement For Dummies    ar    SS  Figure 17 3   Setting the  user s  password   SSSR       4   Optional  Change the Full Name field if you want it to appear differ     ently than proposed     For example  you may want to reverse the first and last names so the  last name appears first       Type the user logon name     This name must be unique within the domain     Pick a naming scheme to follow when creating user logon names  For  example  use the first letter of the first name followed by the complete  last name  the complete first name followed by the first letter of the last  name  or any other scheme that suits your fancy       Click Next     The second page of the New Object     User Wizard appears  as shown in  Figure 17 3        New Object   User x      Grate in  LoweWnter pa Users    Password  e   Corin password  e    IV User must change password at next logon  T User cannot change paeeword   I Password never expires   I  Account is disabled       ste  Tie  s         7  Type the password twice     You re asked to type the password twice  so type it correctly  If you don   t  type it identically in both boxes  you   re asked to correct your mistake     8  Specify the password options that you want to apply     The following password options are available   e User Must Change Password at Next Logon  e User Cannot Change Password  e Password Never Expires    e Account is Disabled       Chapter 17  Managing Windows User Accounts 2 4 9    For more information about these op
287. gin  with a backslash  such as System32 dns  uses the current folder as its  starting point  If the current folder happens to be  Windows   Windows    System32 dns and System32 dns refer to the same location     In many cases  relative and fully qualified domain names are interchangeable  because the software that interprets them always interprets relative names in  the context of the root domain  That   s why  for example  you can type www   wiley com    without the trailing dot     rather than www wiley com  to   go to the Wiley home page in a Web browser  Some applications  such as DNS  servers  may interpret relative names in the context of a domain other than  the root     128 Partl  Building Your Own Network       Working with the Windows DNS Server    EEE  Figure 6 6   The New  Host   dialog box   SSS    The procedure for installing and managing a DNS server depends on the net   work operating system you   re using  This section is specific to working with  a DNS server in Windows 2008  Working with BIND in a Linux or Unix environ   ment is similar but without the help of a graphical user interface     You can install the DNS server on Windows Server 2008 from the Manage  Your Server application   Choose Start   Administrative Tools  Manage Your  Server   Click the Add or Remove a Role link  select DNS Server from the list  of server roles  and then click Next to install the DNS server     After you set up a DNS server  you can manage the DNS server from the DNS  manag
288. gned   However  new techniques for working with IP addresses have helped to alle   viate this problem  and a new standard for 128 bit IP addresses  known as  IPv6  is on the verge of winning acceptance     Networks and hosts    IP stands for Internet Protocol  and its primary purpose is to enable commu   nications between networks  As a result  a 32 bit IP address consists of two  parts     The network ID  or network address   Identifies the network on which a  host computer can be found        The host ID  or host address   Identifies a specific device on the net   work indicated by the network ID     Most of the complexity of working with IP addresses has to do with figuring  out which part of the complete 32 bit IP address is the network ID and which  part is the host ID  The original IP specification uses the address classes  system to determine which part of the IP address is the network ID and  which part is the host ID  A newer system  known as classless IP addresses  is  rapidly taking over the address classes system  You come to grips with both  systems later in this chapter     The dotted decimal dance    IP addresses are usually represented in a format known as dotted decimal  notation  In dotted decimal notation  each group of eight bits  known as an  octet  is represented by its decimal equivalent  For example  consider the fol   lowing binary IP address     11000000101010001000100000011100    Chapter 6  Dealing with TCP IP   09    The dotted decimal equivalent t
289. guring  computer identification  158 162  network connections  152 158  network logon  162 163  overview  151  Windows DHCP client  configuring  124  Windows DNS client  configuring  129  Windows Firewall  190 192  342 343  Windows Mobile  222 225  Windows Performance Monitor tool   284 285  Windows Resource Kit  303  Windows Server 2008  activating  146  creating accounts  246 249  DHCP server  122 124  DNS server  128 129  IIS Web Server  206  installing  144 145  logged on users  finding  293  logging on  146  overview  15    service packs  146 147   testing installation  147   versions  135 136  Windows Setup Wizard  144  Windows Storage Server  260  Windows Update Web site  346 347  Windows user accounts  See user accounts  Windows Vista   Add Printer Wizard  35 36   browsing network  29   computer identification  160 162   connections  configuring  156 158   domain name  25   File and Printer Sharing feature  43   44   Firewall settings  190   logging off network  39   mapping network  31 33   offline files  59   Public folder  49 50   sharing folders in  48   49   sharing printer in  52 53   wireless networking  181 182  Windows Web Server 2008  136  Windows XP   browsing network  29   computer identification  159 160   configuring connections  152 156   File and Printer Sharing feature  42   43   Firewall settings  190   logging off network  39   Logon dialog box  24 25   mapping network  33   offline files  59   Service Pack 2  192   sharing folders in  46 48   shari
290. h  you may want to consider VolP     You can take your ATA device with you on the road and use it any   where that you can plug into the Internet  For example  you can go  on vacation and take your ATA with you  Then you can plug into the  Internet and receive or make calls by using your home phone number    Of course  you don   t have to take your ATA with you  After all  avoiding  calls from your in laws may be the reason yov   re going on vacation in  the first place      Because calls are carried over the Internet and not over the public  switched telephone network  your phone isn   t tied to a specific area  code  In fact  VoIP lets you choose any area code you want  For example   if your small company is located in Fresno  you can get a VoIP service  with a 415 area code so that your customers will think you   re in San  Francisco      lt P An enterprising small business in Fresno can set up two VolP lines with  a 415 area code and a 212 area code  Your customers will think that you  have offices in San Francisco and New York  even though both numbers  ring phones in sunny Fresno      lt  Choosing a local area code saves on phone charges  Suppose that  your office is in Fresno  but nearly all your clients are in San Francisco   Setting up a 415 VoIP number lets your clients dial your number as a  local call  Choosing an area code other than your real area code isn   t  always just for looks     VoIP services have more features in the standard package  Features   such as
291. hapless network user who doesn   t give a whit about     optimizing network performance    but you want to know what the network is  and how to get the most out of it     The best thing about this part is that it focuses on how to use a network with   out getting into the technical details of setting up a network or maintaining a  network server  In other words  this part is aimed at ordinary network users  who have to know how to get along with a network     Part Il  Building Vour Own Network    Uh oh  The boss just gave you an ultimatum  Get a network up and running  by Friday or pack your things  The chapters in this section cover everything  you need to know to build a network  from picking the network operating  system to installing the cable     Part Ill  Getting Connected    After you get a basic network up and running  the chapters in this part show  you how to connect it to the world  You find out all about safely connecting  your network to the Internet  setting up an e mail server  dealing with mobile  devices  and connecting your network to computers at home and on the road     Part IV  Network Management  For Dummies    I hope that the job of managing the network doesn   t fall on your shoulders   but in case it does  the chapters in this part can help you out  You find out all  about backup  security  performance  dusting  mopping  changing the oil  and  all the other stuff that network managers have to do     Introduction       Part V  Protecting Your Network  
292. hapter 2 of your book during this time     Saar  Figure 7 2   The Initial  Configura   tion Tasks   page   eS    Chapter 7  Setting Up a Server    When Setup finishes installing drivers  it displays the Initial Configuration  Tasks page  as shown in Figure 7 2  You can use this page to perform  additional configuration tasks that are required to make your server  usable     In particular  the Initial Configuration Tasks page provides the following  capabilities     e Set the Administrator password    e Set the time zone    e Configure networking    e Provide the computer name and domain   e Enable automatic updating    e Download and install updates    e Add additional server roles and features   e Enable remote desktop access    e Configure the Windows Firewall     You ll want to work your way through each of these steps  The steps are  pretty self explanatory  and simple wizards help guide you through each task                  EY Initial Configuration Tasks                  ii Perform the following tasks to intialy configure this server B Windows Server   Code Name    Longhorn     T  Provide Computer Information  A Set the Administrator password Administrator Account  Administrator  Password  Not Set     m   Set time zone Time Zone  GMT 08 00  Pacific Time  US Canada  ES Configure networking Network Adapters   A Provido computer name and Full Computer Name  LH 36  domain Workgroup  WO  2  Update Ihis Server  2 Fnable automatic  updating and Updates   feedback Feedback  ga 
293. hared drive  Each of the ten users can then access  the program from the shared hard drive     In most cases  however  running a shared copy of a program over the net   work is unacceptably slow  A more common way of using a network to share  programs is to copy the program   s installation disks or CDs to a shared net   work drive  Then you can use that copy to install a separate copy of the pro   gram on each user   s local hard drive  For example  Microsoft Office enables  you to do this if you purchase a license from Microsoft for each computer on  which you install Office     The advantage of installing Office from a shared network drive is that you  don   t have to lug around the installation disks or CDs to each user   s com   puter  And  the system administrator can customize the network installa   tion so that the software is installed the same way on each user   s computer    However  these benefits are significant only for larger networks  If your  network has fewer than about ten computers  you   re probably better off  installing the program separately on each computer directly from the  installation disks or CDs      Remember that purchasing a single user copy of a program and then putting  it on a shared network drive     so that everyone on the network can access  it     is illegal  If five people use the program  you need to either purchase five  copies of the program or purchase a network license that specifically allows  five or more users     14    Part I 
294. hat   s similar to the way folders are organized hierarchically  on a Windows computer  Instead of folders  however  DNS organizes its  names into domains  Each domain includes all the names that appear directly  beneath it in the DNS hierarchy     For example  Figure 6 5 shows a small portion of the DNS domain tree  At the  top of the tree is the root domain  which is the anchor point for all domains   Directly beneath the root domain are four top level domains  named edu  com   org  and gov     In reality  many more top level domains than this exist in the Internet   s root  domain  In fact  at the time I wrote this  there were more than 87 million of  them     Beneath the com domain in Figure 6 5 is another domain named LoweWriter   which happens to be my own  personal domain   Pretty clever  eh   To  completely identify this domain  you have to combine it with the name of   its parent domain  in this case  com  to create the complete domain name   LoweWriter com  Notice that the parts of the domain name are separated  from each other by periods  which are pronounced    dot     As a result  when  you read this domain name  you should pronounce it    LoweWriter dot com        125    126 Partit  Building Your Own Network          SSS  Figure 6 5   DNS names           LoweWriter com domain         server1 LoweWriter com           Beneath the LoweWriter node are four host nodes  named doug  debbie   server1  and printer1  These nodes correspond to three computers  and a printe
295. hat  the same security precautions you use with your company network are in use  with any computer that you let connect to the network via a VPN  You must  therefore ensure that the computer has  at minimum  adequate antivirus pro   tection in place     In most networks  the VPN is implemented by the firewall router that con   nects the network to the Internet  Thus  if you plan to provide VPN capability  for your network users  you should make sure that the router you use to con   nect to the Internet has VPN support built in     The office network side of the VPN is provided by the firewall router  The  other side of the VPN     the remote computers     is provided by software  that must be installed on the computers themselves  Send a copy of this  software home with each user who wants to use the VPN  along with detailed  instructions on how to install and configure it  Either that  or you   ll have to  visit each person   s home to install and configure the software yourself   I  wrote instructions for installing VPN software for a user who has a vacation  home in Monterey  California  Unfortunately  the instructions were clear  enough that he was able to install the VPN software himself  so I didn   t have  to make a house call  Next time  I   m writing the instructions in Latin      After a remote user has used a VPN to connect to your network  the user can  access any of the network   s shared resources  For example  the user can map  network drives and access shared 
296. he  security of the system because other computers aren   t shown packets  that aren   t meant for them     Q4 Parti  Building Your Own Network       Working with switches    You need to know only a few details when working with switches  Here  they are     Installing a switch is usually very simple  Just plug in the power cord  and then plug in patch cables to connect the network     Each port on the switch has an RJ 45 jack and a single LED indicator   labeled Link  that lights up when a connection is made on the port     ay  If you plug one end of a cable into the port and the other end into a  computer or other network device  the Link light should come on  If it  doesn   t  something is wrong with the cable  the hub or switch port  or  the device on the other end of the cable     Each port may have an LED indicator that flashes to indicate network     P activity     If you stare at a switch for a while  you can find out who uses the net   work most by noting which activity indicators flash the most        The ports may also have a collision indicator that flashes whenever a  Rud packet collision occurs on the port     It   s perfectly acceptable for the collision indicator to flash now and then   but if it flashes a lot  you may have a problem with the network     e Usually  the flashing means that the network is overloaded and  should be segmented with a switch to improve performance     e In some cases  the flashing may be caused by a faulty network  node that clogs th
297. he Install button to add  the needed protocol     A dialog box appears  asking whether you want to add a network client   protocol  or service  Click Protocol and then click Add  A list of available  protocols appears  Select the one you want to add and then click OK    You may be asked to insert a disk or the Windows CD        Make sure that the network client that you want to use appears in the    list of network resources     For a Windows based network  make sure that Client for Microsoft  Networks is listed  For a NetWare network  make sure that Client Service  for NetWare appears  If your network uses both types of servers  you  can choose both clients     If you have NetWare servers  use the NetWare client software that  comes with NetWare rather than the client supplied by Microsoft with  Windows       If the client that you need isn   t listed  click the Install button to add    the client that you need  click Client  and then click Add  Then choose  the client that you want to add and click OK     The client you selected is added to the network connection   s Properties  dialog box       To remove a network item that you don   t need  such as File and    Printer Sharing for Microsoft Networks   select the item and click the  Uninstall button     For security reasons  make it a point to remove any clients  protocols  or  services that you don   t need     To configure TCP IP settings  click Internet Protocol  TCP IP  and then  click Properties to display the TCP IP P
298. he Internet and  your network with a single minded task  preventing them from getting to us   The firewall acts as a security guard between the Internet and your local area    338 Part V  Protecting Your Network    NING     Figure 24 1   A firewall  router  creates a  secure link  between a  network and  the Internet   PCS       network  LAN   All network traffic into and out of the LAN must pass through  the firewall  which prevents unauthorized access to the network     Some type of firewall is a must have if your network has a connection to the  Internet  whether that connection is broadband  cable modem or DSL   T1  or  some other high speed connection  Without it  sooner or later a hacker will  discover your unprotected network and tell his friends about it  Within a few  hours your network will be toast     You can set up a firewall using two basic ways  The easiest way is to pur   chase a firewall appliance  which is basically a self contained router with  built in firewall features  Most firewall appliances include a Web based inter   face that enables you to connect to the firewall from any computer on your  network using a browser  You can then customize the firewall settings to suit  your needs     Alternatively  you can set up a server computer to function as a firewall com   puter  The server can run just about any network operating system  but most  dedicated firewall systems run Linux     Whether you use a firewall appliance or a firewall computer  the firewall
299. he com   puter to use DHCP  select the Obtain an IP Address Automatically and Obtain  DNS Server Address Automatically options  Click OK and you   re done           Internet Protocol Version 4  TCP IPv4  Properties esl     General   Akernate Configuration     Yuu can yet IP settings assigned oulumatically if your network supports   this capability  Otherwise  you need to ask your network administrator   for the appropriate IP settings        Obtain an TP address automatically  Use Ure following IP address        Obtain DNS server address automatically  Use the Following DNS server addresses     Ge       Chapter 6  Dealing with TCP IP    Using DNS    DNS  which stands for domain name system  is the TCP IP facility that lets you  use names rather than numbers to refer to host computers  Without DNS   you d buy books from 207 171 182 16 rather than from www  amazon   com  you   d sell your used furniture at 66 135 192 87 rather than on www   ebay com  and you   d search the Web at 216 239 51 100 rather than at  www google com     Understanding how DNS works and how to set up a DNS server is crucial to  setting up and administering a TCP IP network  The rest of this chapter intro   duces you to the basics of DNS  including how the DNS naming system works  and how to set up a DNS server     Domains and domain names    To provide a unique DNS name for every host computer on the Internet  DNS  uses a time tested technique  divide and conquer  DNS uses a hierarchical  naming system t
300. he document faster is  to replace the slow printer with a faster one     Here are some other  random thoughts about bottlenecks     A computer system always has a bottleneck  Suppose that you decide  that the bottleneck on your file server is a slow 10 000 RPM SCSI disk  drive  so you replace it with a fast 15 000 RPM drive  Now the hard drive  is no longer the bottleneck  The drive can process information faster  than the controller card to which the disk is connected  You didn   t really  eliminate the bottleneck     you just moved it from the hard drive to the  disk controller  No matter what you do  the computer will always have a  component that limits the overall performance of the system     One way to limit the effect of a bottleneck is to avoid waiting for the  bottleneck  For example  print spooling lets you avoid waiting for a slow  printer  Although spooling doesn   t speed up the printer  it frees you to  do other work while the printer chugs along  Similarly  disk caching lets  you avoid waiting for a slow hard drive     One reason that computer geeks switched from Jolt cola to Snapple is that  Snapple bottles have wider necks     280 Part IV  Network Management For Dummies       The Five Most Common  Network Bottlenecks    Direct from the home office in sunny Fresno  California  here are the ten      oops  five     most common network bottlenecks  in no particular order     The hardware inside your servers    Your servers should be powerful computers capable of
301. he network   But in most cases  you can   t access the entire drive  Instead  you can access  only certain folders  directories  in old MS DOS lingo  on the network drives   Either way  the shared drives or folders are known in Windows terminology  as shared folders  A shared folder is commonly referred to as a network drive  because the shared folder can be accessed as though it were a separate  drive  complete with its own drive letter     Shared folders can be set up with restrictions on how you can use them  For  example  you may be granted full access to some shared folders so that you  can copy files to or from them  delete files on them  or create or remove fold   ers on them  On other shared folders  your access may be limited in certain  ways  For example  you may be able to copy files to or from the shared folder  but not delete files  edit files  or create new folders  You may also be asked  to enter a password before you can access a protected folder  The amount of  disk space you   re allowed to use on a shared folder may also be limited  For  more information about file sharing restrictions  refer to Chapter 18     In addition to accessing shared folders that reside on other people   s comput   ers  you can designate your computer as a server to enable other network  users to access folders that you share  To find out how to share folders on  your computer with other network users  see Chapter 3     Four Good Uses for a Shared Folder    After you know which shar
302. he network administrator needs     Allow enough time for network administration  For a small network   mo more than 20 or so computers   an hour or two each week is enough  time to do the job  More time is needed upfront while the network  administrator settles into the job and discovers the ins and outs of the  network  After an initial settling in period  network administration for a  small office network doesn   t take more than an hour or two per week    Larger networks take more time      Give the position some teeth  You need to make sure that everyone  knows who the network administrator is and that he has the authority  to make decisions about the network  such as which access rights each  user has  which files can and can   t be stored on the server  and how  often backups are done     Provide backup  The network administrator needs an understudy      someone who knows almost as much about the network  is eager to  make a mark  and smiles when the worst network jobs are    delegated        Supply a job title and a job description  The network manager should  have some sort of official title  such as Network Boss  Network Czar   Vice President in Charge of Network Operations  or Dr  Net  A badge  a  personalized pocket protector  or a set of Spock ears helps  too     Here are some suggestions for picking a part time network administrator   Make sure that the person you choose    Is organized  Conduct a surprise office inspection and place the person  ane with the neat
303. her engineer      1     The network should be intuitive to the users and shouldn   t require any  extensive upkeep     CSS   s networking needs can be met with the simple peer to peer network dia   grammed in Figure 4 5     Here   s what the network requires     A Gigabit network adapter card for the Windows XP computer  which is  the only computer that doesn   t support Gigabit networking   A better  alternative would be to replace this computer with a newer computer  that runs Windows 7 and has built in high speed networking      1  A combination DSL router and 4 port 10 100 1000 Mbps switch  The  company may outgrow this device when it adds a laptop  but if and  when that happens  another 4  or 8 port switch can be added then     The firewall features of the DSL router need to be enabled to protect the  network from Internet hackers     File and Printer Sharing needs to be activated on Erin   s computer  and  the printer needs to be shared     PCS  Figure 4 5   The  California  Sport  Surface  peer   to peer  network           Chapter 4  Planning Your Network 15    Printer    DSL router   10 1000Mbps switch    DSL modem    The Internet    Connecting two networks  Creative  Course Development  Inc     Creative Course Development  Inc   CCD  is a small educational publisher  located in central California that specializes in integrated math and science  curriculums for primary and secondary grades  The company publishes a  variety of course materials  including textbooks  puz
304. herever    So let it be written  so let it be done     Official  CND    Insignia Doug Lowe  Chairman  International Society of Certified  Network Dummies          Chapter 2  Life on the Network    In This Chapter  Using local resources and network resources  Playing the name game  Logging on to a network  Using shared folders  Going places with networks  Mapping your network drives  Using a network printer    Logging off the network    A fter you hook up your PC to a network  it   s not an island any more      separated from the rest of the world like some kind of isolationist  fanatic waving a    Don   t tread on me    flag  The network connection changes  your PC forever  Now your computer is part of a system  connected to other  computers on the network  You have to worry about annoying network  details  such as using local and shared resources  logging on and accessing  network drives  using network printers  logging off  and who knows what else     Oh  bother   This chapter brings you up to speed on what living with a computer network    is like  Unfortunately  this chapter gets a little technical at times  so you may  need your pocket protector     Distinguishing between Local Resources  and Network Resources    In case you don   t catch this statement in Chapter 1  one of the most impor   tant differences between using an isolated computer and using a network  computer lies in the distinction between local resources and network  resources  Local resources are items  su
305. hite stripe  the blue wire  and  a white wire with a blue stripe  the white blue wire      When you attach a twisted pair cable to a modular connector or jack  you  must match up the right wires to the right pins  It   s harder than it sounds   you can use any of several different standards to wire the connectors  To  confuse matters further  you can use one of the two popular standard ways  of hooking up the wires  EIA TIA 568A or EIA TIA 568B  also known as AT amp T  258A  Both of these wiring schemes are shown in Table 5 2     It doesn   t matter which of these wiring schemes you use  but pick one and  stick with it  If you use one wiring standard on one end of a cable and the  other standard on the other end  the cable doesn   t work     Chapter 5  Cables  Adapters  and Other Stuff 89                            Table 5 2 Pin Connections for Twisted Pair Cable   Pin Function EIA TIA 568A EIA TIA568B  AT amp T 258A   1 Transmit   White Green White orange wire   2 Transmit  Green Orange wire   3 Receive   White Orange White green wire   4 Unused Blue Blue wire   5 Unused White Blue White blue wire   6 Receive   Orange Green wire   7 Unused White Brown White brown wire   8 Unused Brown Brown wire    The 10BaseT and 100BaseT standards use only two of the four pairs  connected  to Pins 1  2  3  and 6  One pair transmits data  the other receives data  The only  difference between the two wiring standards is which pair transmits and which  receives  In the EIA TIA 568A standard  
306. hysical security  m  amazed when I walk into the reception area of an accounting firm and see an  unattended computer sitting on the receptionist   s desk  Often  the receptionist  has logged on to the system and then walked away from the desk  leaving the  computer unattended     Physical security is important for workstations but vital for servers  Any  good hacker can quickly defeat all but the most paranoid security measures  if they can gain physical access to a server  To protect the server  follow  these guidelines    Lock the computer room    1  Give the key only to people you trust    Keep track of who has the keys    Mount the servers on cases or racks that have locks    Disable the floppy drive on the server     A common hacking technique is to boot the server from a floppy  thus  bypassing the security features of the network operating system     Keep atrained guard dog in the computer room and feed it only enough  eMBER to keep it hungry and mad   Just kidding    There   s a big difference between a door with a lock and a locked door  Locks  are worthless if you don   t use them   Client computers should be physically secure   Instruct users to not leave their computers unattended while they   re  logged on     In high traffic areas  such as the receptionist   s desk   users should  secure their computers with the keylock  if the computer has one        Users should lock their office doors when they leave     Chapter 23  Securing Your Network 325       Ni  RY    
307. ial in permissions  330  differential backups  315 316  digital audio tape  DAT   310  digital certificates  135  digital linear tape  DLT   310  directories  26  directory database  134  directory services  133 134  disk management  NOS  132 133  disk space  281  288  disk striping  281  384 385  DLT  digital linear tape   310    DNS  Domain Name System   125 129     155 156    DNS Client service  296   DNS management console  128   DNS Manager  214 215   documentation  network  238 239   documents  accessing  18   dollar sign      263   domain account  159  163  245 246   Domain Name System  DNS   125 129   155 156    domain names  23 25  120  125 127  143   domain networks  23 25   domains  125 127  159  162   dotted decimal notation  108 109   down computer state  11   drive letters  31 34  353   Driver tab  Properties dialog box  154   drivers  142   DSL Internet connections  186   Dynamic Host Configuration Protocol   See DHCP    efe    Edited Record method  Access  58   EIA TIA 568A  88 89   EIA TIA 568B  88 89   802 3  79 83  96  99 101  170 171   See also cable   802 11 standards  170 173   electrical outlet  289   e mail  28  70  303 304  344  346   E Mail Accounts Wizard  Outlook  198 199   emergency phone calls  220   encryption  135  232   Enterprise version  Windows Server 2008   136    entitlement model  323   error messages  291   ESS  Extended Service Set   176   Ethereal program  242   Ethernet  79 83  96  99 101  170 171   See also cable   Ethernet Device w
308. icular rate  or frequency  Figure 9 1 shows two frequencies of radio waves   The first is one cycle per second  the second is two cycles per second   Real  radio doesn   t operate at a frequency that low  but I figured one and two  cycles per second is easier to draw than 680 000 cycles per second or 2 4 mil   lion cycles per second      The measure of a frequency is cycles per second  which indicates how many  complete cycles the wave makes in one second   Duh   In honor of Heinrich  Hertz  who did not invent catsup but rather was the first person to successfully  send and receive radio waves  it happened in the 1880s   cycles per second is  usually referred to as hertz  abbreviated Hz  Thus  1 Hz is one cycle per second   Incidentally  when the prefix k  for kilo  or 1 000   M  for mega  1 million   or G   for giga  1 billion  is added to the front of Hz  the His still capitalized  Thus   2 4 MHz  not 2 4 Mhz  is correct     The beauty of radio frequencies is that transmitters can be tuned to broadcast  radio waves at a precise frequency  Likewise  receivers can be tuned to receive  radio waves at a precise frequency and ignore waves at other frequencies   That   s why you can tune the radio in your car to listen to dozens of different  radio stations  Each station broadcasts at its own frequency     Wavelength and antennas    A term related to frequency is wavelength  Radio waves travel at the speed of  light  The term wavelength refers to how far the radio signal travels 
309. if both values are 1  the  result is 0     NOT  The NOT operation doesn   t compare two values  Instead  it simply  changes the value of a single binary value  If the original value is 1  NOT  returns Q  If the original value is 0  NOT returns 1     Logical operations are applied to binary numbers that have more than  one binary digit by applying the operation one bit at a time  The easiest  way to do this manually is to    1  Line one of the two binary numbers on top of the other   2  Write the result of the operation beneath each binary digit     The following example shows how you calculate 10010100 AND  11001101     10010100  AND 11001101  10010100    As you can see  the result is 10010100     JOS Partili  Building Your Own Network       Introducing IP Addresses    An IP address is a number that uniquely identifies every host on an IP net   work  IP addresses operate at the Network layer of the TCP IP protocol stack   so they   re independent of lower level addresses  such as MAC addresses   MAC stands for Media Access Control      IP addresses are 32 bit binary numbers  which means that  theoretically    a maximum of something in the neighborhood of 4 billion unique host  addresses can exist throughout the Internet  You   d think that   d be enough   but TCP IP places certain restrictions on how IP addresses are allocated   These restrictions severely limit the total number of usable IP addresses   and about half of the total available IP addresses have already been assi
310. ight Oh Two Dot Eleventy Something    Or  Understanding Wireless Standards     The most popular standards for wireless networks are the IEEE 802 11 stan   dards  These essential wireless Ethernet standards use many of the same  networking techniques that the cabled Ethernet standards  in other words   802 3  use  Most notably  802 11 networks use the same CSMA CD technique  as cabled Ethernet to recover from network collisions     The 802 11 standards address the bottom two layers of the IEEE seven layer  model  the Physical layer and the Media Access Control  MAC  layer  Note  that TCP IP protocols apply to higher layers of the model  As a result  TCP IP  runs just fine on 802 11 networks     The original 802 11 standard was adopted in 1997  Two additions to the  standard  802 11a and 802 11b  were adopted in 1999  The latest and  greatest version is 802 11n     Table 9 2 summarizes the basic characteristics of the three variants of 802 11     Chapter 9  Wireless Networking       NING   RY                   Table 9 2 802 11 Variations   Standard Speeds Frequency Typical Range   Indoors    802 11a Up to 54 Mbps 5 GHz 150 feet   802 11b Up to 11 Mbps 2 4 GHz 300 feet   802 119 Up to 54 Mbps 2 4 GHz 300 feet   802 11n Up to 144 Mbps 5 GHz  gt  300 feet    Most wireless networks are now based on the 802 11b or the newer 802 11g  standard  The new 802 11n standard offers faster speeds and greater range   but 802 11n devices are more expensive than 802 11b or 802 11g devices     8
311. ights and privileges  thus bypassing the secu   rity restrictions that you so carefully set up     Don   t forget the password for the administrator account  If a network user  forgets his or her password  you can log on as the supervisor and change that  user   s password  If you forget the administrator   s password  though    you re stuck     Managing User Security    User accounts are the backbone of network security administration  Through  the use of user accounts  you can determine who can access your network  as well as what network resources each user can and can   t access  You can  restrict access to the network to just specific computers or to certain hours  of the day  In addition  you can lock out users who no longer need to access  your network  The following sections describe the basics of setting up user  security for your network     User accounts    Every user who accesses a network must have a user account  User accounts  allow the network administrator to determine who can access the network  and what network resources each user can access  In addition  the user  account can be customized to provide many convenience features for users   such as a personalized Start menu or a display of recently used documents     Every user account is associated with a username  sometimes called a user  ID   which the user must enter when logging on to the network  Each account  also has other information associated with it  In particular     The user   s password  This a
312. ils of HTTP packets  As a result  it can examine more than just the  source and destination addresses and ports to determine whether the pack   ets should be allowed to pass through the firewall     In addition  application gateways work as proxy servers  Simply put  a proxy  server is a server that sits between a client computer and a real server  The  proxy server intercepts packets that are intended for the real server and pro   cesses them  The proxy server can examine the packet and decide to pass it  on to the real server  or it can reject the packet  Or the proxy server may be  able to respond to the packet itself  without involving the real server at all     For example  Web proxies often store copies of commonly used Web pages in  a local cache  When a user requests a Web page from a remote Web server   the proxy server intercepts the request and checks to see whether it already  has a copy of the page in its cache  If so  the Web proxy returns the page  directly to the user  If not  the proxy passes the request on to the real server     Application gateways are aware of the details of how various types of TCP IP  servers handle sequences of TCP IP packets  so they can make more intelligent  decisions about whether an incoming packet is legitimate or is part of an  attack  As a result  application gateways are more secure than simple packet   filtering firewalls  which can deal with only one packet at a time     The improved security of application gateways  however 
313. in what it can do  In particu   lar  all its pages must be static  their content is  fixed   For dynamic content  which users inter   act with  you need to set up a Web server     7  Select the services you want to configure for IIS     If you want  you can study this list and try to anticipate which features  you think you ll need  Or you can just leave the default options selected     You can always return to the Add Roles Wizard to add features you    leave out here   8  Click Next        The Confirm Installation Selections page appears  as shown in Figure 12 4   9  Click Install     The features you selected are installed  This may take a few minutes  so  now would be a good time to take a walk     When the installation finishes  the Installation Results page displays  as  shown in Figure 12 5     Click Close     IIS is now installed and ready to use     10     Chapter 12  Creating an Intranet 2 0 9          Figure 12 4   The Confirm  Installation  Selections  page of the  Add Roles  Wizard        PCs  Figure 12 5   The  Installation  Results  page of the  Add Roles  Wizard              Windows automatic updating is not enabled  To install the latest updates  use Windows Update  Control Panel to check for updates        2 10 Part Ill  Getting Connected       How to Create a Simple Intranet Page    Initially  IIS is configured with a single Web site  called the default Web site   You can test that IIS is up and running by opening a browser window on  the server and typing 
314. indaa 342   The Built In Windows Firewall          ce ceceesceseeeseeeeceseeeeeeeeeceeeeeeeeneeeneeeanees 342  Virus Prote CUM ce  isise srenti e E R RER 343  Whatisa Virus  eieiei rE e e e a a 343  Antivirus PFO Sr AIMS a n A ERN EEN E 344  Saf  coMPUtNE aneri teaser a EER e ENE EE Er Aan Enin Aass 345  Patching Things Up ai sccssdesstescssvctsdasaatoccaveansvaacbets sveeseasebeettuasedeosereieaacecevees 346    Part VI  Beyond Windows   ccccccccscccsecessccsscsssccsccsscssees BOY    Chapter 25  Networking with Linux                  00eee sees 351  Comparing Linux with WindOWS            cccccscssccssseseessceseeesseeseseseceseesseeees 351  Choosing a Linux Distribution             cc ecccesseseceseeseeeeeseeseeeeeeeeeeeeeesseeaeeaes 354    Installing Vim Ux ccs ccestessccctesesetedssnceesscatevdsesree dies ER eget NEA ENE 355    KU    XVI Networking For Dummies  9th Edition       Om Again  Off Agai eieren iaiia e otaae See 356  Logging on  oris that im     i    ssesssciess  ce tascsencdecscncsecharsccea teased cnsedetecs 356   LO GOIN GOFF sien e A EEEE 358  Shutting doweinst aner oe e EEr eE E r a EENES 358  Using GNOME a ssgssccses sti ccndeacecsesateaxased lasdede tats A a E ES 358  Getting toa Command Shells sisne nssnssirniseo eisses inas 360  Managing User ACCOUNTS sieiserrireriies iate ridere aeea neiti Raia anesini eaaa 360  Network Configuratio Narie EEAS 362  Using the Network Configuration Program       ssessssssesesesrereresesese 362  Restarting your NetWork   c
315. indow  363 364   etiquette  302   ETLA  extended three letter acronym   11   event logs  298 299   Event Viewer  147  298 299   Exchange ActiveSync  223 225   Exchange Advanced tab  User Properties  dialog box  200   Exchange Features tab  User Properties  dialog box  224    406    Networking For Dummies  9th Edition    Exchange Server 2007  mailboxes  193 197  199 202  Outlook  configuring for  197 199  overview  193  User Properties dialog box  194 197  exclusions  DHCP  119 120  124  expansion slots  computer  98 99  expiration time  password  327  Extended Service Set  ESS   176  extended three letter acronym  ETLA   11    efo    F8 key  291  fan  computer  289  Fast Ethernet  81  89 90  Federal Communications Commission   FCC   169  Fedora  354  File and Printer Sharing feature  42   46  File and Printer Sharing for Microsoft  Networks  154  File Locations dialog box  56 57  file server role  configuring  263 264  file servers  folders  sharing without wizard  271 273  overview  69 70  259 260  264  permissions  granting  273 275  Provision a Shared Folder Wizard   265 271  File Sharing dialog box  48 49  File Sharing option  Network and Sharing  Center  43  filenames  353  376  files  accessing with Microsoft Office  54 55  deleting  18  locking  by file server  70  offline  58 60  permissions  261 262  saving  18  sharing  12  132 133  374  storing in shared folders  27  transferring through shared folders  28  firewall router  VPN connection  232  firewalls  132  188 
316. indow  as shown in Figure  8 9  Notice the section that lists the computer name  domain  and work   group settings     2  Click the Change Settings link     If a dialog box appears and asks for your permission to continue  click  Continue  The System Properties dialog box then appears  as shown in  Figure 8 10     Chapter 8  Configuring Windows XP  Vista  and 7 Clients   6              gt  Control Panel    System and Security  gt  System E   s   Search Control Panel  Control Panel Home   os    View basic information about your computer       Device Manager  e Remnte settings    Windows edition  Windows 7 Ultimate    e System protection Copyright    2009 Microsoft Corporation  All rights reserved        Advanced system settings    m          System    Rating  m Your Windows Experience Index needs to be refreshed  Processor  Intel R  Pentium R  4 CPU 3 00GHz 3 00 GHz   e Installed memory  RAM   2 00 GD  3 System type  32 bit Operating System  Figure 8 9  Pen and Touch  No Pen or Touch Input is available for this Disp   Soe en and Touch  jo Pen or Touch Input is available for this Display  The System     Action Center Computer name  domain  and workgroup settings  information  ind Windows Update Computer name  WIN7   Change settings    window Patama Information and Full computer name WIN    Windows 7   n Computer description  L  p                    Computer Name   Hardware   Advanced   System Protection   Remote     g Windows uses the following information to identily your comp
317. ing VoIP and   GONVEL GENCE  es sesesfvgncsics asestcasea lashes cavtanndasthcecasderthe sa E E E E ERE AR 217  Chapter 14  Dealing with Mobile Devices   0        cccecceesseesseeseceseeseeeseesseeeseeeseeeseesseenss 221  Chapter 15  Connecting from Home            cccccecsseesseesseeeeeseessecsseeseeeseesseeeseeeseeeaeesseenss 229  Part IV  Network Management For Dummies                233  Chapter 16  Welcome to Network Management              ccccccssccseesseesseeseeeseceseeeeenseeees 235  Chapter 17  Managing Windows User Accounts           cccesceessseseesseeseeeseeeseeeseeeeesseeees 245  Chapter 18  Managing Network Storage         cccccccsscsseessesseeeseeeseeseeeseesseeeseceseeeeesseeeas 259  Chapter 19  Network Performance Anxiety          cccccsccsseesscesseeseeseeeseeeseeeseesseeeseesseeees 277  Chapter 20  Solving Network Problems              c cccsssescesseeeeeeeeceeeeeseeseeeeeeeeeeeeesseeaeeaes 287    Chapter 21  How to Stay on Top of Your Network  and Keep Its Users Off Your Back          cceccescsssssseesscessesseessecesecsseesesceseeseeeeeeeseeeseees 301    Part V  Protecting Vour Network occcccccccccccccsctcccccccccce 307    Chapter 22  Backing Up Your Data sisisi asat iiris 309  Chapter 23  Securing Your Network             csscssscsssssssesssessccsessseesscsssessscsseesseesseesaeenes 321  Chapter 24  Hardening Your Network          cccccccccsscssscesseeseeeseceseesseeseeseeeeseeeseeeeesseeees 337  Part VI  Beyond Window assesses 349  Chapter 25  Networki
318. ing department to access files in the server   s  ACCTG directory   Permissions can also enable some users to read certain files but not modify  or delete them     Each network operating system manages permissions in a different way   Whatever the details  the effect is that you can give permission to each user  to access certain files  folders  or drives in certain ways  For example  you  might grant a user full access to some files but grant read only access to  other files     Any permissions you specify for a folder apply automatically to any of that  folder   s subfolders  unless you explicitly specify different permissions for the  subfolder     You can use Windows permissions only for files or folders that are created  on drives formatted as NTFS volumes  If you insist on using FAT or FAT32 for  your Windows shared drives  you can   t protect individual files or folders on  the drives  This is one of the main reasons for using NTFS for your Windows  servers     Group therapy    A group account is an account that doesn   t represent an individual user  Instead   it represents a group of users who use the network in a similar way  Instead   of granting access rights to each of these users individually  you can grant the  rights to the group and then assign individual users to the group  When you  assign a user to a group  that user inherits the rights specified for the group        Chapter 23  Securing Your Network 333          Network rights we want to see    The networ
319. inistrative Tools gt Internet Information Services  CIS  Manager     The IIS Manager springs to life  as shown in Figure 12 8   3  Right click Sites and then choose Add Web Site   The Add Web Site dialog box appears  as shown in Figure 12 9     Chapter 12  Creating an Intranet 2 13                                                             Internet Infomation Services  TIS  Manager  go    gt  LSERVEROI  gt  Sites  gt  a   1    Fie View Help  amons O O  pa oF Sites   E Add Web site     lo Sy AEN ar ages aa TENN a Set Web Site Defaults      lt m Name   D Web Site St      iip  B Default Web Site Defadt Web Site 1 Started   80  http  Onine Help  Sq  R   j  Figure 12 8       The IIS lal  nf FEiteotres vien Ji Content vew  Manager      k      Psar    a  e    Ry internet Infor   wwnroot   Tidefeutthtm  Not      htto  owewriter      Ey 1 59PM  4  Enter a name for the Web site in the Web Site Name text box   For example  use a name like HR if you   ve created an Intranet page for  the Human Resources department   5  Click the Browse button  browse to the folder you created in Step 1   and then click OK   For example  browse to C   HR Web Site   Add Web Site 2  xd   Web site name  Application pool   r  Content Directory  Physical path     E  Pass through authentication  Connect as       ee  Type  1P address  Port   h Husie  gt   foo  Host header   a    Figure 12 9  Examole  www contoso com or marketng contoso com  The Add  Web Site      strtwebstemmedtely  dialog box  concel_         
320. inistrator  already        Certification doesn   t guarantee that you really know how to administer a net   work  That ability comes from real world experience     not from exam crams     However  certification is important in today   s competitive job market  So  you  may want to pursue certification     not just to improve your skills but also to  improve your r  sum    Certification is an expensive proposition  Its tests can  cost several hundred dollars each  and depending on your technical skills   you may need to buy books to study or enroll in training courses before you  take the tests     You can pursue two basic types of certification  vendor specific and vendor   neutral  The major networking vendors  such as Microsoft  Novell  and Cisco    provide certification programs for their own equipment and software  Comp   TIA  a nonprofit industry trade association  provides the best known vendor   neutral certification     Chapter 17  Managing Windows User Accounts    In This Chapter    Understanding user accounts       Creating user accounts   Setting account options  Resetting passwords   Disabling and enabling accounts  Deleting users   Working with groups   Creating a logon script    Fees user who accesses a network must have a user account  User  accounts let you control who can access the network and who can   t  In  addition  user accounts let you specify what network resources each user  can use  Without user accounts  all your resources would be open to anyone  
321. ious server roles  special shared  resources are created to support those roles  Don   t disturb these special  shares unless you know what you   re doing  Table 18 3 lists some of the more  common special shares                          Table 18 3 Special Shares   Share Name Description   drives The root directory of a drive   ADMINS Used for remote administration of a computer and points to  the operating system folder  usually  C    Windows    IPCs Used by named pipes  a programming feature that lets  processes communicate with one another   NETLOGON Required for domain controllers to function   SYSVOL A required domain controller share   PRINTS Used for remote administration of printers   FAXS Used by fax clients    Some special shares end with a dollar sign      These hidden shares aren t vis   ible to users  However  you can still access them by typing the complete share  name  including the dollar sign  when the share is needed  For example  the  special share C  is created to allow you to connect to the root directory of the  C  drive from a network client  You wouldn   t want your users to see this share   would you   Of course  shares such as C  are also protected by privileges so  that if an ordinary user finds out that C  is the root directory of the server   s   C  drive  he still can   t access it      Configuring the File Server Role    To use Windows Server 2003 or 2008 as a file server  you must first enable  the file server role  In Windows Server 2003  you 
322. ir ACLs to be inher   ited by the objects they contain  As a result  if you specify permissions  for a folder  those permissions extend to the files and child folders that  appear within it     Table 18 1 describes the six types of permissions that can be applied to  files and folders on an NTFS volume           Table 18 1 File and Folder Permissions   Permission Description   Full control Grants unrestricted access to the file or folder    Modify Grants the right to read the file or folder  delete the file or    folder  change the contents of the file or folder  or change  the attributes of the file or folder  Allows you to create  new files or subfolders within the folder     Read  amp  Execute Grants the right to read or execute the file and grants the  right to list the contents of the folder or to read or execute  any of the files in the folder           List Folder Contents Applies only to folders and grants the right to list the con   tents of the folder   Write Grants the right to change the contents of a file or its attri     butes  Grants the right to create new files and subfolders  within the folder     Read Grants the right to read the contents of a file or folder        262 Part IV  Network Management For Dummies       a  The six file and folder permissions are composed of various combina   tions of special permissions that grant more detailed access to files or  folders  Table 18 2 lists the special permissions that apply to each of the  six file and folder per
323. ir own user accounts under which to  run  The following sections describe the characteristics of these accounts     The Administrator account  The Administrator account is the King  of the Network  This user account isn   t subject to any of the account  restrictions to which mere mortal accounts must succumb  If you log on  as the administrator  you can do anything  For this reason  avoid using  the Administrator account for routine tasks  Log in as the Administrator  only when you really need to     Because the Administrator account has unlimited access to your net   work  it   s imperative that you secure it immediately after you install the  server  When the NOS Setup program asks for a password for the  Administrator account  start with a good random mix of uppercase and  lowercase letters  numbers  and symbols  Don   t pick some easy to   remember password to get started  thinking you   ll change it to some   thing more cryptic later  You ll forget  and in the meantime  someone  will break in and reformat the server   s C  drive or steal your customer   s  credit card numbers     Chapter 23  Securing Your Network 33         ar    4 The Guest account  Another commonly created default account is the  Guest account  This account is set up with a blank password and     if  any     access rights  The Guest account is designed to allow anyone  to step up to a computer and log on  but after they do  it then prevents  them from doing anything  Sounds like a waste of time to me 
324. ir viruses  Typically  a virus masquerades as a  useful or interesting e mail attachment  such as instructions on how to make   1 000 000 in your spare time  pictures of naked celebrities  or a Valentine   s  Day greeting from your long lost sweetheart  When a curious but unsuspecting  user double clicks the attachment  the virus springs to life  copying itself  onto the user   s computer and  in some cases  sending copies of itself to all  the names in the user   s address book     After the virus has worked its way onto a networked computer  the virus can  then figure out how to spread itself to other computers on the network     Here are some more tidbits about protecting your network from virus  attacks     The term virus is often used to refer not only to true virus programs   which can replicate themselves  but also to any other type of program  that   s designed to harm your computer  These programs include so   called Trojan horse programs that usually look like games but are  in  reality  hard drive formatters     1  A worm is similar to a virus  but it doesn   t actually infect other files   Instead  it just copies itself onto other computers on a network  After a  worm has copied itself onto your computer  there   s no telling what it  may do there  For example  a worm may scan your hard drive for inter   esting information  such as passwords or credit card numbers  and then  e mail them to the worm   s author     Computer virus experts have identified several thou
325. ired two tapes  After we removed this data from the cycle of nightly  backups  the backups could squeeze onto a single tape again     3   4 Part V  Protecting Your Network       If you remove static data from the nightly backup  make sure that you have a  secure backup of the static data  either on tape  CD RW  or some other media     Copy backups    A copy backup is similar to a normal backup  except that the archive bit isn   t  reset when each file is copied  As a result  copy backups don   t disrupt the  cycle of normal and incremental or differential backups     Copy backups are usually not incorporated into regular  scheduled backups   Instead  you use a copy backup when you want to do an occasional one    shot backup  For example  if you   re about to perform an operating system  upgrade  you should back up the server before proceeding  If you do a full  backup  the archive bits are reset  and your regular backups are disrupted   However  if you do a copy backup  the archive bits of any modified files  remain unchanged  As a result  your regular normal and incremental or differ   ential backups are unaffected     If you don   t incorporate incremental or differential backups into your backup  routine  the difference between a copy backup and a normal backup is moot     Daily backups    A daily backup backs up just those files that have been changed the same day  that the backup is performed  A daily backup examines the modification date  stored with each file   s direc
326. ity for Mobile Devices    As a network administrator  one of your main responsibilities regarding  mobile devices is to keep them secure  Unfortunately  this is a significant  challenge  Here are some of the reasons why     Mobile devices connect to your network via other networks that are  out of your control  You can go to great lengths to set up firewalls  encryp   tion  and a host of other security features  But mobile devices connect via  public networks whose administrators may not be as conscientious as you     1    Mobile devices are easy to lose  A user might leave his or her  BlackBerry at a restaurant or hotel  or it might fall out of his pocket on  the subway        Chapter 14  Dealing with Mobile Devices 22 7       Mobile devices run operating systems that aren   t as security conscious  as Windows    Users who wouldn   t dare install renegade software on their desktop  computers will think nothing of downloading free games or ring tones  to their handhelds  Who knows what kinds of viruses or Trojans these  downloads carry    Inevitably  someone will buy his own handheld device and connect it  to your network without your knowledge or permission     Here are some recommendations for beefing up security for your mobile  devices   Establish clear and consistent policies for mobile devices and enforce them     4 Make sure employees understand that they are not allowed to bring  their own devices into your network  Allow only company owned  devices to connect    Trai
327. ives in the RAID system fails  no  data is lost  The disk drive that failed can be removed and repaired  and the  data that was on it can be reconstructed from the other drives     Most of this chapter is devoted to showing you how to configure Windows  Server 2008 to run as a file server     Storage appliances    A storage appliance is a device specifically designed for providing shared  network storage  Also known as NAS  or Network Attached Storage  it   s a self   contained file server that   s preconfigured and ready to run  All you have to  do to set it up is take it out of the box  plug it in  and turn it on  Storage appli   ances are easy to set up and configure  easy to maintain  and less expensive  than traditional file servers     A typical entry level storage appliance is the Dell PowerVault NF500  This  self contained file server is built into a small rack mount chassis  It supports  up to six hard drives with a total capacity of up to six terabytes  or 6 000GB    The NF500 has a dual processor motherboard that can hold up to 8GB of  memory and up to four gigabit network ports     The Dell NF500 runs a special version of Windows Server called Windows  Storage Server  This version of Windows  designed specifically for NAS  devices  allows you to configure the network storage from any computer on  the network by using a Web browser     Note that some storage appliances use customized versions of Linux rather  than Windows Storage Server  Also  in some systems  the 
328. job is to provide training  so the network users know how to use the network     X  Thou Shalt Write Down Thy Network  Configuration upon Tablets of Stone    Network documentation should be written down  If you cross the River  Jordan  who else will know diddly squat about the network if you don   t  write it down somewhere  Write down everything  put it in an official binder  labeled Network Bible  and protect the binder as if it were sacred     Your hope should be that 2 000 years from now  when archeologists are  exploring caves in your area  they find your network documentation hidden  in a jar and marvel at how meticulously the people of our time recorded their  network configurations     They   ll probably draw ridiculous conclusions  such as we offered sacrifices  of burnt data packets to a deity named TCP IP and confessed our transgres   sions in a ritual known as    logging     but that makes it all the more fun     Chapter 29    Ten Things You Should  Keep in Your Closet       In This Chapter  Duct tape  Tools  Patch cables  Cable ties  Twinkies  An extra network card  A few cheap network switches  Complete documentation of the network on tablets of stone  The network manuals and disks  Ten copies of this book    W  you first network your office computers  you need to find a  closet where you can stash some network goodies  If you can   t find a  whole closet  shoot for a shelf  a drawer  or at least a sturdy cardboard box     Here   s a list of what stuff to keep o
329. k and  recording in performance logs the activity it sees  You can then review those  performance logs to see how your network is doing     For large networks  you can purchase sophisticated monitoring programs  that run on their own  dedicated servers  For small  and medium size net   works  you can probably use the built in monitoring facilities that come   with the network operating system  For example  Figure 19 1 shows the  Performance Monitor tool that comes with Windows Server  Other operating  systems come with similar tools        B Computer Management     Action View Help    a    5  GG   gt       So                                           Computer Management  Local m      Actions    System T   Resource Overview       4     System Tools a Relisbility and Performance  lt      Task Scheduler cpu 100  Disk 100 KB  Network  5 Kbps Memory 100 Hard  ak e   Event Viewer More Actions  RO Shared Folders  B   Local Users and Groups    Rehabeity and Performs   gt  Device Manager   a E3 Storage  jaf Disk Management Seconds _O  9 o   fly Services and Applications      cpu mio J 100  Maximum Frequency ie  Disk mM 2 kosec HB 1  Highest Active Time  e   Network Mop  E 0  Network Utilization  amp         Memory BB O Hard Faumts sec MB 31  Used Physical Memory  gt   zl  Learn More SH    Resource View Help   Create a Data Collector Set and Diagnosis Report      Performance Monitor Help   Monitor System Activity with Performance Monitor      Data Collection Help   Schedule and Manage 
330. k interface card  Inside any computer attached to a network is  a special electronic circuit card  the network interface card  The TLA for  network interface card is NIC     Using your network late into the evening isn   t the same as watching  NIC at night  If the network is set up to use that time to update soft   ware and back up data  the NIC has to be robust enough to handle all   day all night use     Although you can also use an external network interface that connects  to the computer by using the computer   s USB port  most networked  computers use a built in network interface card     Nearly all computers built these days have a network interface built into  the computer   s motherboard  the main circuit board that is home to  the computer   s processor  memory  and other vital components   This  network interface is still commonly called the NIC  even though it isn   t  technically a separate card        Network cable  The network cable physically connects the computers  It  plugs into the network interface card on the back of your computer     Nearly all networks now use a type of cable that looks something like  telephone cable  However  appearances can be deceiving  Most phone  systems are wired using a lower grade of cable that doesn   t work for net   works  For a computer network  each pair of wires in the cable must be  twisted in a certain way  That   s why this type of cable is called twisted   pair cable   Standard phone cable doesn   t do the twist      
331. k rights allowed by most network   Set pay  Grants you special access to the    operating systems are pretty boring  Here are payroll system so that you can give yourself   a few rights   wish would be allowed  a pay raise    Cheat  Provides a special option that   Sue  In America  everyone has the right to  enables you to see what cards the other sue  So this right should be granted auto   players are holding when you re playing matically to all users    REINS Fire  Wouldn t it be great if the network   1  Spy  Eavesdrops on other users    Internet could grant you the right to play Donald  sessions so you can find out what Web Trump and fire your annoying co workers     sites they re viewing     Complain  Automatically sends e mail mes   sages to other users that explain how busy   tired  or upset you are           For example  suppose that you create a group named Accounting for the  accounting staff and then allow members of the Accounting group access to  the network   s accounting files and applications  Then  instead of granting  each accounting user access to those files and applications  you simply make  each accounting user a member of the Accounting group     Here are a few additional details about groups     Groups are one of the keys to network management nirvana  As much  as possible  avoid managing network users individually  Instead  clump  them into groups and manage the groups  When all 50 users in the  accounting department need access to a new file share  w
332. ke before you proceed any  further in building your network is to decide which network operating  system  NOS  to use as the foundation for your network  This chapter begins  with a description of several important features found in all network operat   ing systems  Next  it provides an overview of the advantages and disadvan   tages of the most popular network operating systems     Of course  your work doesn   t end with the selection of an NOS  You must  then install and configure the operating system to get it working  This chap   ter provides an overview of what   s involved with installing and configuring  the most popular network operating system choice  Windows Server 2008     Network Operating System Features    All network operating systems must provide certain core functions  such   as connecting to other computers on the network  sharing files and other  resources  and providing for security  In the following sections  I describe  some core NOS features in general terms     132 Part it  Building Your Own Network    ar       Network support    It goes without saying that a network operating system should support net   works   I can picture Mike Myers in his classic Saturday Night Live role as  Linda Richman  host of Coffee Talk  saying    I   m getting a little verklempt     talk amongst yourselves       I ll give you a topic  Network operating systems  do not network  nor do they operate  Discuss         That requires a range of technical capabilities      Anetwork
333. l address is baMiller Mydomain com  do not use  baMiller as the user   s account name  Use a more obscure name     Do not rely on obfuscation to keep people out of your network  Security   by obfuscation doesn   t work  A resourceful hacker can discover the most  obscure names  Obfuscation can s ow intruders  not stop them  If you slow  intruders down  you   re more likely to discover them before they crack your  network     Using passwords wisely    One of the most important aspects of network security is the use of  passwords     Usernames aren   t usually considered secret  Even if you use obscure names   even casual hackers will eventually figure them out     Passwords  on the other hand  are top secret  Your network password is the  one thing that keeps an impostor from logging on to the network by using  your username and therefore receiving the same access rights that you ordi   narily have  Guard your password with your life     Here are some tips for creating good passwords     1  Don   t use obvious passwords  such as your last name  your kid   s name   or your dog   s name     Don   t pick passwords based on your hobbies  A friend of mine is a  boater  and his password is the name of his boat  Anyone who knows  him can quickly guess his password  Five lashes for naming your pass   word after your boat        NING    NING   RY    1  Store your password in your head     not on paper     Especially bad  Writing your password down on a sticky note and stick   ing it on
334. l analyzer  242  protocols  network  66  132  143  154 155   281  292  371 372  Provision a Shared Folder Wizard  265 271  proxy server  342  PTR  pointer  record  128  Public folder  49 50  public IP address  116 117  public switched telephone network   PSTN   218  publishing applications  204 205  Purge Print Documents command  39  PVC cable  85    ede    QuickTime Streaming Server  372    Index 409       eRe    radio waves  167 169   RAID  Redundant Array of Inexpensive  Disks  system  260   range  171 172   Read  amp  Execute permission  261   Read permission  261   reader permission level  49   read only files  55   real time data  285   rebooting  293 294   Reconnect at Logon option  32  34   records  locking in Access  58   Recycle Bin  381   Redundant Array of Inexpensive Disks   RAID  system  260   refresh rate  Access  58   relative names  127   remote connections  Windows Server 2008     remote installation  NOS  139 140  Remote Installation Services  RIS   140  repeaters  99 101  396   reports  scheduling  286   reservations  DHCP  119 121  124  Reset button  295   residential gateway  175   resources  21 22  See also sharing  Resources tab  Properties dialog box  154  restarting  288  297 298  363 365  restoring backups  332   restrictions  26  330   RG 58 cable  82   ring topology  80   RIS  Remote Installation Services   140  RJ 45 connectors  89 90   roaming  175 176  252   Role Services page  148 150   root domain  125   root partition  355   rotation  tape  
335. l have the new share as a folder target   NTFS Permissions    Share Protocols r  SMB Settings Publish the SMB share to a DFS namespace    SMB Pennissions Parent folder in namespace    DFS Nameepace Publiching   Dee    Example    Domairi Name Folder   Review Settings and Create   Share    Confirmation    New folder name     OEE   Example  Name or NewFulder Name    Preview of namespace path     Figure 18 7   Joining a  Distributed  File System  network   ey    For more information about creating namespace  see Create a Namespace     cPevaus    Nees  Cored _           2 70 Part IV  Network Management For Dummies    Figure 18 8   The Review  Settings  dialog box     9  If you have set up a Distributed File System  DFS  namespace and want  to connect this share to it  select the Publish the SMB Share to a DFS    Namespace check box     DFS is a system that lets you combine two or more separate file shares  under a single name  Its purpose is to simplify the management of large  file server networks  so it is typically used only on networks that have a       large number of file servers     If you   ve never heard of DFS until now  skip this step     10  Click Next     The dialog box  as shown in Figure 18 8  appears     11  Verify that all the settings are correct and then click Create     The share is created  and a final confirmation dialog box is displayed  as    shown in Figure 18 9                            E Provision a Shared Folder Wizard _ 5  x  fal Review Sethngs and Cr
336. l out the slot protector   c  Put the slot protector in a box with all your other old slot    ar protectors     After a while  you collect a whole bunch of slot protectors  Keep them as  souvenirs or use them as Christmas tree ornaments     NING  RY       Chapter 5  Cables  Adapters  and Other Stuff 99    5  Insert the network interface card into the slot     Line up the connectors on the bottom of the card with the connectors in  the expansion slot and then press the card straight down  Sometimes you  have to press uncomfortably hard to get the card to slide into the slot     6  Secure the network interface card with the screw you remove in Step 4   7  Put the computer   s case back together     Watch out for the loose cables inside the computer  You don   t want to  pinch them with the case as you slide it back on     Secure the case with the screws you remove in Step 2   8  Turn the computer back on     If you   re using a Plug and Play card with Windows  the card is configured  automatically after you start the computer again     If you   re working with an older computer or an older network interface  card  you may need to run an additional software installation program   See the installation instructions that come with the network interface  card for details     Other Network Devices    In addition to network interface cards  cables  and hubs or switches  some  networks may require one or more of the devices described in the following  sections     Repeaters    A repeat
337. lder     Chapter 26  Macintosh Networking 3 15       Accessing shared files    To access files on another Macintosh  follow this procedure     1   2   3     7     Choose the Chooser from the Apple menu   Click the AppleShare icon from the Chooser window     Click the name of the computer you want to access   If your network  has zones  you must first click the zone you want to access        Click OK     A logon screen appears       If you have a user account on the computer  click the Registered User    button and enter your username and password  Otherwise  click the  Guest button and then click OK     A list of shared folders and disks appears       Click the folders and disks you want to access     A check box appears next to each item  If you check this box  you con   nect to the corresponding folder or disk automatically when you start  your computer     Click OK       i  With Mac OS 8 5 and later  you can also use the Network Browser  found in the  Apple menu  to access network drives or folders  Just open the Network Browser  from the Apple menu  double click the server that contains the shared disk or  folder  and then double click the drive or folder you want to use     What Vou Need to Know to Network  Macintoshes with PCs    Life would be too boring if Macs really lived on one side of the tracks and PCs  lived on the other  If your organization has a mix of both Macs and PCs  odds  are you eventually want to network them together  Fortunately  you have  several way
338. les  even  if he does break down the door  All modern network operating systems have  security features that are more than adequate for all but the most paranoid  users     When I say more than adequate  I mean it  Most networks have security features  that would make even Maxwell Smart happy  Using all these security features is  kind of like Smart insisting that the Chief lower the    Cone of Silence     The Cone  of Silence worked so well that Max and the Chief couldn   t hear each other   Don   t make your system so secure that even the good guys can   t get their  work done     322 Part V  Protecting Your Network    NING   RY       If any of the computers on your network are connected to the Internet  you  must harden your network against intrusion via the Internet  For more infor   mation  see Chapter 24  Also  if your network supports wireless devices  you  have wireless security issues  For information about security for wireless net   works  see Chapter 9     Do Vou Need Security     Most small networks are in small businesses or departments where everyone  knows and trusts everyone else  Folks don   t lock up their desks when they  take a coffee break  and although everyone knows where the petty cash box  is  money never disappears     Network security isn   t necessary in an idyllic setting like this one  is it  You  bet it is  Here   s why any network should be set up with at least some concern  for security     Even in the friendliest office environment  some inf
339. lete may restart your computer     If Ctrl Alt Delete doesn   t do anything  you reached the last resort  The  only thing left to do is press the Reset button on your computer     Pressing the Reset button is a drastic action that you should take only  after your computer becomes completely unresponsive  Any work you  haven   t saved to disk is lost   Sniff    If your computer doesn   t have a  Reset button  turn off the computer  wait a few moments  and then turn  on the computer again      If at all possible  save your work before restarting your computer  Any  work you haven   t saved is lost  Unfortunately  if your computer is totally  tied up in knots  you probably can   t save your work  In that case  you  have no choice other than to push your computer off the digital cliff     How to Restart Network Services    Once in a while  the network operating system  NOS  service which supports  the task that   s causing you trouble inexplicably stops or gets stuck  If users  can   t access a server  it may be because one of the key network services has  stopped or is stuck     You can review the status of services by using the Services tool  as shown  in Figure 20 1  To display it  choose Services from the Administrative Tools  menu  Review this list to make sure that all key services are running  If a key  service is paused or stopped  restart it     Which service qualifies as a Rey service depends on which roles you defined  for the server  Table 20 1 lists a few key service
340. lick Advanced  This action brings up a  dialog box that lets you search for users by name     6  Check the appropriate Allow or Deny check boxes to specify which  permissions to allow for the user or group     Chapter 18  Managing Network Storage 2 15       ax  Select thia object type   un    Uses Gowns  or Ban sccutyomceds    Oea ipes    Figure 18 14    tromthis oration   The Select    lwsWiterps Locations     Users    Enterthe object names to select examples    Computers       or Groups    dialog box        e  mk  coun                     7  Repeat Steps 3 6 for any other permissions that you want to add     ae 8  When you re done  click OK     Here are a few other thoughts to ponder concerning adding permissions     If you want to grant full access to everyone for this folder  don   t bother  adding another permission  Instead  select the Everyone group and then  check the Allow box for each permission type         You can remove a permission by selecting the permission and then  clicking Remove     1  If you d rather not fuss with the Share and Storage Management console   you can set the permissions from My Computer  Right click the shared  folder  choose Sharing and Security  and then click Permissions  You can  then follow the preceding procedure  picking up at Step 4     MBER 1     The permissions assigned in this procedure apply only to the share  itself  The underlying folder can also have permissions assigned to it  If  that   s the case  whichever of the restricti
341. lls you that his brother in law will be attending the  meeting  so won   t you please print an extra copy of the proposal for him   Oh  and a photocopy won   t do  Originals only  please     You decide to take lunch  so you don   t want the output to print until you  get back     Fortunately  your print job isn   t totally beyond your control just because  you already sent it to the network printer  You can easily change the status  of jobs that you already sent  You can change the order in which jobs print   hold a job so that it doesn   t print until you say so  or cancel a job     You can probably make your network print jobs do other tricks  too     such  as shake hands  roll over  and play dead  But the basic tricks     hold  cancel   and change the print order     are enough to get you started     To play with the printer queue  open the Control Panel  choose Start  Control Panel  and click Printers  Then double click the icon for the printer  that you want to manage  A window similar to the one shown in Figure 2 11  appears  You can see that just one document has been sent to the printer              Xerox Phaser 6200N on SERVERO1    Printer Document View       Document Name Status Owner Pages Size Sul    E Important Report Spooling dlowe 4 149 KB 8 3        4 document s  in qucuc       To manipulate the print jobs that appear in the print queue or in the printer  itself  use these tricks     To temporarily stop a job from printing  Select the job and choose  Document 
342. localhost in the address bar  You can also reach this  page by entering your local domain name in the address bar  For example   lowewriter pri  Figure 12 6 shows the standard welcome page that appears  when you browse to the default site     The actual files that make up the default Web site are stored on the server   s C   drive in a folder named  inetpub wwwroot  When you browse to the default  Web site without requesting a specific file  for example  by entering simply  localhost in the address bar   IIS looks for the following files  in this order    1    default htm   1    default asp    1  index htm    7     gt   a  Page        internet information services    E  Figure 12 6   The default   Web site              Chapter 12  Creating an Intranet 21         1     index html  1  iisstart htm    1    default aspx    Initially  c    inetpub wwwroot contains just two files  iisstart htm and  welcome png  The iisstart htm file is the file that   s displayed when you  browse to the Web site  it contains the HTML markup necessary to display  the image contained in the welcome  png file  which is the image you actu   ally see on the page     You can preempt the standard page for the default Web site by providing  your own file with one of the preceding names  For example  you can follow  these steps to create a simple default  htm file that displays the words     Hello World     as the start page for the default Web site     1  Open an Explorer window and browse to c   inetpub w
343. logon scripts  creating  258  NOS  1  overview  245  passwords  resetting  253 254  properties  246  249 253  Samba  368 369  security  329 330  User Initiated Synchronization  195  User Manager  361 362  User Properties dialog box  193 196   249 253  User Templates folder  56 57  useradd command  361  username  22 25  246  325 326  329  361  users  240 241  301 302  331 332  334   See also user accounts  UTP  unshielded twisted pair  cable  82 84    o    o      virtual memory  281   virtual private network  VPN   135  231 232  viruses  18  189  232  343 347   Visio  Microsoft  72 73  238   Voice over Internet Protocol  VoIP   217 220  Vonage  218  220   VPN  virtual private network   135  231 232    412    Networking For Dummies  9th Edition       ee    wall jacks  91 92  WAP  wireless access point   166  173 179  wavelength  167 168  Web servers  70  205 207  Web sites  210 216  WebObjects  372  WEP  wired equivalent privacy   178  Wi Fi  166  Windows  See also specific entries beginning  with Windows  versus Linux  351 353  networking Macs with  375 376  Windows 7  Add Printer Wizard  35 36  browsing network  29  computer identification  160 162  connections  configuring  156 158  domain name  25  File and Printer Sharing feature  45   46  Firewall settings  191 192  mapping network  31 33  offline files  59  Public folder  49 50  sharing folders in  48 49  sharing printer in  52 53  wireless networking  181 182  Windows 95  30 31  Windows 98  30 31  Windows clients  confi
344. lso includes the password policy  such as  how often the user has to change his or her password  how complicated  the password must be  and so on     330 Part V  Protecting Your Network    ar    ar       The user   s contact information  This includes full name  phone number   e mail address  mailing address  and other related information       Account restrictions  This includes restrictions that allow the user to  log on only during certain times of the day  This feature can restrict your  users to normal working hours so that they can   t sneak in at 2 a m  to do  unauthorized work  This feature also discourages your users from work   ing overtime because they can   t access the network after hours  so use it  judiciously  You can also specify that the user can log on only at certain  computers     Account status  You can temporarily disable a user account so the user  can   t log on     1     Home directory  This specifies a shared network folder where the user  can store documents      Dial in permissions  These authorize the user to access the network  remotely via a dialup connection     Group memberships  These grant the user certain rights based on  groups to which she belongs     For more information  see the section     Group therapy     later in this  chapter     Guilt in accounts    Most network operating systems come preconfigured with two built in  accounts  Administrator and Guest  In addition  some server services  such  as Web or database servers  create the
345. lthough multiboot installation may sound like a good idea  it   s fraught  y with peril  I suggest that you avoid the multiboot option unless you have  a specific reason to use it  For more information about multiboot setups   see the nearby sidebar    Giving multiboot the boot        You can   t upgrade a client version of Windows to a server version   Instead  you must perform either    e A full installation  which deletes the existing Windows operating  system     e A multiboot installation  which leaves the existing client Windows  intact     Either way  you can preserve existing data on the Windows computer  when you install the server version     Installation over the network    Normally  you install the NOS directly from the distribution discs on the serv   er   s CD ROM drive  However  you can also install the operating system from  a shared drive located on another computer  if the server computer already  has access to the network  You can either use a shared CD ROM drive or  copy the entire contents of the distribution disc onto a shared hard drive     Obviously  the server computer must have network access for this technique  to work  If the server already has an operating system installed  it probably  already has access to the network  If not  you can boot the computer from a  floppy that has basic network support        ar    Chapter 7  Setting Up a Server 139       Giving multiboot the boot    Multiboot installations enable you to have more  than one operating
346. lumbing to pick up the phone  for a price check  Network printing can be like that  If someone sends a  two hour print job to the printer before you send your half page memo   you have to wait     Sa  Figure 2 8   The Add  Printer  Wizard  comes to  life   PCS    Chapter 2  Life on the Network 35    You may have access to a local printer and several network printers   Before you were forced to use the network  your computer probably had  just one printer attached to it  You may want to print some documents  on your cheap  oops  I mean local  inkjet printer but use the network  laser printer for important stuff  To do that  you have to find out how to  use your programs    functions for switching printers     Adding a network printer    Before you can print to a network printer  you have to configure your com   puter to access the network printer that you want to use  From the Start  menu  open the Control Panel and then double click the Printers icon  If your  computer is already configured to work with a network printer  an icon for  the network printer appears in the Printers folder  You can tell a network  printer from a local printer by the shape of the printer icon  Network printer  icons have a pipe attached to the bottom of the printer     If you don   t have a network printer configured for your computer  you can  add one by using the Add Printer Wizard  Just follow these steps for Windows  Vista or Windows 7   1  Choose Start   Control Panel and then double click the
347. m you choose to use for your  network servers  you can use any of several common ways to install the NOS  software on the server computer  The following sections describe these  alternatives     Full installation versus upgrade    One of your basic NOS installation choices is whether you want to perform a  full installation or an upgrade installation  In some cases  you may be better  off performing a full installation even if you   re installing the NOS on a com   puter that already has an earlier version of the NOS installed  Here are your  choices     138 Parti  Building Your Own Network       1  If you re installing the NOS on a brand new server  you   re performing a  full installation that installs the operating system and configures it with  default settings     1  If you   re installing the NOS on a server computer that already has a  server operating system installed  you can perform an upgrade installa   tion that replaces the existing operating system with the new one but  retains as many of the settings as possible from the existing operating  system     You can also perform a full installation on a computer that already has  an operating system installed  In that case  you have these two options     e Delete the existing operating system     e Perform a multiboot installation  which installs the new server oper   ating system alongside the existing operating system  When you  restart the computer  you can choose which operating system you  want to run     NING  A
348. mands without accidentally deleting or corrupting  a needed system file     On Again  Off Again    Any user who accesses a Linux system  whether locally or over a network   must be authenticated by a valid user account on the system  The following  sections lay out the whys  hows  and wherefores of logging on and logging off  a Linux system     and how to shut down the system     Logging on and logging off is the same thing as  respectively  logging in  and logging out  Nobody has decided which term should dominate  so lots  of people still argue about whether they   re logging in or         MBER  et   amp     Logging on  or is that in      When Linux boots up  it displays a series of startup messages while it starts  the various services that comprise a working Linux system  Assuming you  selected X server when you installed Linux  you   re eventually greeted by the  screen  as shown in Figure 25 1  To log on to Linux  click your user ID if it is    Chapter 25  Networking with Linux 357       D   Figure 25 1   Logging   in  on   whatever    to Linux   pi     EN    displayed  If your user ID isn   t displayed  click Other and then enter your  user ID  Then  when prompted  type your password and press Enter        localhost localdomain    A Doug Lowe               Restart      Shut Down             As a part of the installation process  the Setup Agent created a user account  for you  Use this user account rather than the root user account whenever  possible  Use the root acco
349. missions     You should assign permissions to groups rather than to individual  users  Then  if a particular user needs access to a particular resource   add that user to a group that has permission to use the resource        Table 18 2 Special Permissions  Special Full Modify Read amp   ListFolder Read Write  Permission Control Execute Contents    Traverse Folder  w vw wv 1A  Execute File       ListFolder Read vy v v o    o    Data    Read Extended w 1A 1  wv yA  Attributes    Create Files Write vw vw w  Data    Create Folders  wv vw wv  Append Data    Write Attributes    Write Extended  Attributes    Delete Subfolders vw  and Files    Delete                       IN   IN  YX              IN    Read Permissions       VINX    Change  Permissions             Take Ownership    Synchronize                              Understanding Shares    A share is simply a folder that   s made available to other users using the net   work  Each share has the following elements     ar    Chapter 18  Managing Network Storage 263    1    Share name  The name by which the share is known over the network  To  make the names compatible on older computers  stick to eight character  share names whenever possible     Path  The path to the folder on the local computer that   s being shared   such as C   Accounting     Description  A one line description of the share        Permissions  A list of users or groups that have been granted access to  the share     When you install Windows and configure var
350. mited storage space  If you copy a 600MB database  file to a server   s drive  you may get calls later from angry co workers  complaining that no room is left on the server   s drive for their important  files     Your files can become infected from viruses given to you by some   one over the network  You may then accidentally infect other network  users     You have to be careful about saving sensitive files on the server  If you  write an angry note about your boss and save it on the server   s hard  drive  your boss may find the memo and read it     The server computer must be up and running at all times  For example   if you turn Ward   s computer into a server computer  Ward can   t turn his  computer off when he   s out of the office  If he does  you can   t access the  files stored on his computer     If your computer is a server  you can   t just turn it off when you re fin   ished using it  Someone else may be accessing a file on your hard drive  or printing on your printer     Chapter 1  Networks Will Not Take Over the World  and Other Network Basics   9    Why does Ward always get the best printer  If Leave It to Beaver were made  today  I   d bet that the good printer would be on June   s computer     The Network Administrator    Because so much can go wrong     even with a simple network     designating  one person as the network administrator is important  This way  someone is  responsible for making sure that the network doesn   t fall apart or get out of  cont
351. mple  can hold 2   values   Because 2   is 256  an 8 bit number can have any of 256 different values      which is why a byte  which is eight bits  can have 256 different values     are    Chapter 6  Dealing with TCP IP   0 7    1  This powers of two concept is why computers don   t use nice  even   round numbers in measuring such values as memory or disk space  A  value of 1K  for example  isn   t an even 1 000 bytes     it   s 1 024 bytes  because 1 024 is 2     Similarly  1MB isn   t an even 1 000 000 bytes but  rather is 1 048 576 bytes  which happens to be 2        Doing the logic thing    One of the great things about binary is that it   s very efficient at handling spe   cial operations called logical operations  Four basic logical operations exist   although additional operations are derived from the basic four operations   Three of the operations     AND  OR  and XOR     compare two binary digits   bits   The fourth  NOT  works on just a single bit     The following list summarizes the basic logical operations   1  AND  An AND operation compares two binary values  If both values are 1     the result of the AND operation is 1  If one or both of the values are 0  the  result is 0        or  An OR operation compares two binary values  If at least one of the  values is 1  the result of the OR operation is 1  If both values are 0  the  result is 0      XOR  An XOR operation compares two binary values  If exactly one of  them is 1  the result is 1  If both values are 0 or 
352. mputer that   s on the other side     1Q2 Part it  Building Your Own Network    ar       This key feature enables bridges to partition a large network into two smaller   more efficient networks  Bridges work best in networks that are highly seg   regated  For example  your network may consist of two distinct groups of  users  the Marketing department and the Accounting department  each with  its own servers     A bridge lets you partition this network so that the Marketing side of the net   work isn   t bogged down by Accounting  and vice versa  The bridge automati   cally learns which computers are on each side of the bridge and forwards  messages from the one side to the other only when necessary  The overall  performance of both networks improves  although the performance of any  network operation that has to travel over the bridge slows down a bit     Here are a few additional thoughts to consider about bridges     Some bridges can translate the messages from one format to another     For example  if the Marketing folks build their network with Ethernet and  the accountants use Token Ring  a bridge can tie the two together     You can get a basic bridge to partition two Ethernet networks for about   500  More sophisticated bridges can cost  5 000 or more     Routers    A router is like a bridge  but with a key difference  Bridges use actual hard   ware addresses  known as MAC addresses  to tell which network node each  message is sent to so that it can forward the message
353. mputers on your network see the Linux server as if it were a  Windows server     Like a Windows server  Samba works by creating and designating certain  directories as shares  A share is simply a directory that   s made available to  other users via the network  Each share has the following elements     1    Share name  The name by which the share is known over the network   Share names should be eight characters whenever possible     Path  The path to the directory on the Linux computer that   s being  shared  such as  Users Doug     Description  A one line description of the share     Access  A list of users or groups that have been granted access to the  share     Samba includes a client program that lets a Linux computer access Windows  files servers     Why did Samba   s developers choose to call their program Samba  Simply  because the protocol that Windows file and print servers use to communicate  with one another is called SMB  which stands for Server Message Block  Add a  couple of vowels to SMB and you get Samba     Installing Samba    If you didn   t install Samba when you installed Linux  you have to install it  now  The easiest way to do that is to use Fedora   s GNOME based package  management tool to install Samba  Just insert the Fedora distribution CD    Chapter 25  Networking with Linux 36 7       NING   RY    in the CD drive and then click Yes when you   re asked whether you want to  run the autorun program  Then  when the Package Management window  appear
354. n 2 million networks     The problem with Class C networks is that they   re too small  Although few  organizations need the tens of thousands of host addresses provided by a  Class B address  many organizations need more than a few hundred  The large  discrepancy between Class B networks and Class C networks led to the devel   opment of subnetting  which I describe in the next section          1  2 Partit  Building Your Own Network          What about IPv6     Most of the current Internetis based on version  4 of the Internet Protocol  also known as  Pv4   IPv4 has served the Internet well for more than  20 years  However  the growth of the Internet  has put a lot of pressure on IPv4   s limited 32 bit  address space  This chapter describes how  IPv4 has evolved to make the best possible  use of 32 bit addresses  but eventually all the  addresses will be assigned     the IPv4 address  space will be filled to capacity  When that hap   pens  the Internet will have to migrate to the  next version of IP  known as IPv6     IPv6 is also called  P next generation  or IPng   in honor of the favorite television show of most  Internet gurus  Star Trek  The Next Generation     IPv6 offers several advantages over  Pv4  but  the most important is that it uses 128 bits for  Internet addresses rather than 32 bits  The  number of host addresses possible with 128    Subnetting    bits is a number so large that it would make  Carl Sagan proud  It doesn   t just double or triple  the number of
355. n and use a Linux computer at the same time     e Two or more users can log on to a Linux computer from the  same keyboard and monitor by using virtual consoles  which let  you switch from one user session to another with a special key  combination     e Users can log on to the Linux computer from a terminal window  running on another computer on the network     Most versions of Windows are single user systems  Only one user at a  time can log on to a Windows computer and run commands   Windows  2003 can be configured as a multiuser system with terminal services      Linux doesn   t have a built in graphical user interface  GUI  as  Windows does  Instead  the GUI in Linux is provided by an optional  component called X Window System  You can run Linux without X  Window  in which case you interact with Linux by typing commands  If  you prefer to use a GUI  you must install and run X Window     X Window is split into two parts     e A server component  X server  manages multiple windows and  provides graphics services for application programs     e A user interface component  window manager  provides user inter   face features  such as menus  buttons  toolbars  and a taskbar     Several window managers are available  each with a different look and  feel  With Windows  you   re stuck with the user interface that Microsoft  designed  With Linux  you can use the user interface of your choosing     Linux can   t run Windows programs  Therefore  you can   t run Microsoft  Office on a
356. n cave iesdeden ce e N iiae einai 146  WOO GING OM cencciedee  eee R e S EEE Eea EV EE rS EERE 146  Activating  WINdOWSorssscriprnert en ir a teins esir ia aerea SEE SEES 146  Downloading service Packs            ecescessesseeeseceeeeeeceseceaeseneeeeeenneesaes 146  Testing the installati  n   f siccedssiceeddarcessatecsesslocecescavedshidveds ieeseavdeseesvess 147  Configuring Server Roles            ccccsccesseseesseseeseeeceeeeeeeeeesesseeeeeseeeeeeeaeeaeeaes 147  Chapter 8  Configuring Windows XP  Vista  and 7 Clients           151  Configuring Network Connections             ccceceseeeeseeeeseeeeeeeeeeeeseeaeeseeneeaes 151  Configuring Windows XP network connections               cceseeee 152  Configuring Windows Vista and Windows 7  network CONNECTIONS           ecceceeceeseeseeseeceeceeeeesceseeseceeeeeeeneeeseeaeens 156  Configuring Client Computer Identification   0 0 0    eeeeeeseeseeseeteeteeteeees 158  Configuring Windows XP computer identification                 6 159  Configuring Windows Vista and Windows 7  computer identification nenni ereere isseire 160  Configuring N  etWOrK LOSON  niesi ae a a T EEE Er EEEIEE 162  Chapter 9  Wireless Networking                  00cceeeeeeees 165  Diving into Wireless Networking               cccsceseeseeseeseeseeeeseceeeeseeseeseeseeaeees 165  A Little High School Electronics       esssessersorsciresssisresirscrororecrerorosssrsresases 166  Waves and frequencies    ic cessceescsdissevecaseseesesecaued esre enn a 167  Wavel
357. n hand     Duct Tape    Duct tape helped get the crew of Apollo 13 back from their near disastrous  moon voyage  You won   t actually use it much to maintain your network   but it serves the symbolic purpose of demonstrating that you realize things  sometimes go wrong and you   re willing to improvise to get your network up  and running     If you don   t like duct tape  a little baling wire and some chewing gum serve  the same symbolic purpose     392  PartVil  The Part of Tens    Tools       Make sure that you have at least a basic computer toolkit  the kind you can pick  up for  15 from just about any office supply store  You also should have wire cut   ters  wire strippers  and cable crimpers for assembling RJ 45 connectors     Patch Cables    ar    Keep a good supply of patch cables on hand  You ll use them often  when  you move users around from one office to another  when you add computers  to your network  or when you need to rearrange things at the patch panels   assuming you wired your network using patch panels      When you buy patch cables  buy them in a variety of lengths and colors  One  good way to quickly make a mess of your patch panels is to use 15  cables  when 3  cables will do the job  And having a variety of colors can help you  sort out a mass of cables     The last place you should buy patch cables is from one of those big box office  supply or consumer electronics stores  Instead  get them online  Cables that sell  for  15 or  20 each at chain stores
358. n used to handle some chores that used to require separate  devices     Some routers are nothing more than computers with delusions of gran   deur     along with several network interface cards and special software  to perform the router functions     1  Routers can also connect networks that are geographically distant from  each other by using a phone line  using modems  or ISDN     One of the main reasons for using routers is to connect a LAN to the  Internet  Figure 5 8 shows a router used for this purpose                                               SEE  Figure 5 8   Using a  router to  connect a  LAN to the  Internet   es    Router             104 Partit  Building Your Own Network       Chapter 6  Dealing with TCP IP    In This Chapter    Getting a handle  or two  on the binary system    Digging into IP addresses    Finding out how subnetting works    Understanding private and public IP addresses    Looking at network address translation  Finding out how DHCP works  Understanding how DNS works    ING   RY    i CP IP is the basic protocol by which computers on a network talk to each  other  Without TCP IP  networks wouldn   t work  In this chapter  I intro   duce you to the most important concepts of TCP IP     This chapter is far and away the most technical chapter in this book  It helps  you examine the binary system  the details of how IP addresses are con   structed  how subnetting works  and how two of the most important TCP IP  services     DHCP and DNS     work  Y
359. n your users in the security risks associated with using mobile  devices     Implement antivirus protection for your mobile devices     228 Part Ill  Getting Connected       Chapter 15  Connecting from Home    In This Chapter    Accessing your e mail with Outlook Web Access       Using a virtual private network    A typical computer user takes work home to work on in the evening or  over the weekend and bring back to the office the following weekday   This arrangement can work okay  except that exchanging information between  your home computer and your office computer isn   t easy     One way to exchange files is to mark them for offline access  as described in  Chapter 3  However  this approach has its drawbacks  What if someone goes  to the office on Saturday and modifies the same file you   re working on at home   What if you get home and discover that the file you need is on a folder you didn   t  mark for offline access     What about e mail  Offline access doesn   t give you access to your company  e mail account  so you can   t check whether you have mail in your Inbox or  send mail from your company e mail account     This chapter introduces two features that can alleviate these problems  The  first is Internet based access to your e mail via Outlook Web Access  OWA  in  Microsoft Exchange  The second is the virtual private network  VPN   which  lets you connect to your network from home as though you were at work so  that you can safely access all your network resou
360. name  and your computer has a computer name   You can log on to the network by using your username from any com   puter that   s attached to the network  Other users can log on at your  computer by using their own usernames     When others log on at your computer by using their own usernames   they can   t access any of your network files that are protected by your  password  However  they can access any local files that you haven   t pro   tected  Be careful which people you allow to use your computer     If you   re logging on to a domain network  the Windows XP Logon dialog  box has a field in which you can enter the domain name you want to log    Chapter 2  Life on the Network 25    on to  Normally  a suitable default value appears for the domain name   so you can safely ignore this field  If not  your network administrator will  be happy to tell you how to enter this information     1     Windows Vista and Windows 7 don   t include a field in which you can  enter the domain name  Instead  you must type the domain name before  your username  separated from it by a backslash  For example     lowewriter dlowe    Here  the domain name is lowewriter  and the username is dlowe     Note that Windows Vista and Windows 7 remember the domain and  username from your last login  so all you have to enter is your pass   word  To log on to a different domain or as a different user  you must  click Switch User  Then  you can click the Other User icon and enter a  different domain name a
361. names  For example  a network server may have two printers  named  laser and inkjet  to indicate the type of printer   and two shared disk  folders  named AccountingData and MarketingData         Server based networks have a username for the network administrator     If you log on using the administrator   s username  you can do anything  you want  add new users  define new network resources  change Wally   s  password     anything  The administrator   s username is usually some   thing clever  such as Administrator     The network itself has a name   The Windows world has two basic types of networks     e Domain networks are the norm for large corporate environments  that have dedicated servers with IT staff to maintain them     e Workgroup networks are more common in homes or in small offices  that don   t have dedicated servers or IT staff     A domain network is known by     you guessed it     a domain name  And  a workgroup network is identified by     drum roll  please     a workgroup  name  Regardless of which type of network you use  you need to know  this name to gain access to the network     2 4 Part I  Let s Network        Logging On to the Network    ar    To use network resources  you must connect your computer to the network   and you must go through the supersecret process of logging on  The purpose  of logging on is to let the network know who you are so that it can decide  whether you   re one of the good guys     Logging on is a little bit like cashing a ch
362. ncere  but also resourceful   Groan   Sorry  this is yet another in a tireless series of bad computer nerd puns      What   s in a Name     Just about everything on a computer network has a name  The computers  themselves have names  the people that use the computers have names  the  hard drives and printers that can be shared on the network have names  and  the network itself has a name  Knowing all the names used on your network  isn   t essential  but you do need to know some of them     Here are some additional details about network names     Every person who can use the network has a username  sometimes  called a user ID   You need to know your username to log on to the net   work  You also need to know the usernames of your buddies  especially  if you want to steal their files or send them nasty notes     You can find more information about usernames and logging on in the  section     Logging On to the Network     later in this chapter     Letting folks on the network use their first names as their usernames  is tempting but not a good idea  Even in a small office  you eventually  run into a conflict   And  what about Mrs  McCave     made famous by  Dr  Seuss     who had 23 children and named them all Dave      ar    MBER  D    ar    SMEER    Re    Chapter 2  Life on the Network    Create a consistent way of creating usernames  For example  you may  use your first name plus the first two letters of your last name  Then  Wally   s username is wallycl  and Beaver   s is b
363. nd that requirement annoying  just be thankful that you don   t have to restart  the entire computer  Simply restarting the network services is sufficient     You can restart the network services from a GNOME desktop  Follow  these steps     1  From the desktop  choose Main Menu   System Settings     Server Settings   Services     The Service Configuration window appears  as shown in Figure 25 7     364  Parti  Beyond Windows    Figure 25 6   The  Ethernet  Device  window is  where you  configure  basic TCP   IP settings     Figure 25 7   The Service  Configur   ation  window   pe        Ethernet Device    Boute H    Nickname       D Controlled by NetworkManager   O Activate device when computer starts   O Allow all users to enable and disable the device    O Enable IPv6 configuration for this interface       Automatically obtain IP address settings with    dhcp     DHCP Settings       Hostname  optional     a       M Automatically obtain DNS information from provider    D Statically set IP addresses     O set MTU fo  1500                        2 Applications Places system  o    Service Configuration       Program service Help     ie      Disable Customize Stop Restart Help  Name Remarks    The NetworkManager service is started once  usually when    the system is booted  runs in the background and wakes up  when needed       This service is enabled      d  NetworkManager start and stop Netwo         anacron run left over cron jobs       ma  atd Starts stop the  at  de  lt l 
364. nd username along with the password for the  user you want to log on as     Your computer may be set up so that it logs you on automatically when   ever you turn it on  In that case  you don   t have to type your username  and password  This setup makes the task of logging on more convenient  but takes the sport out of it  And  it   s a terrible idea if you   re the least bit  worried about bad guys getting into your network or personal files     Y Guard your password with your life  I   d tell you mine  but then I   d have  to shoot you     E  j  Figure 2 1   You have to  enter your  user ID and Switch User  password to  access the  network        i  Windows 7 Ultimate       2 6 Part I  Let s Network        Understanding Shared Folders    ar    Long ago  in the days Before Network  B N    your computer probably had  just one hard drive  known as C  drive  Maybe it had two     C  and D   The  second drive might be another hard disk  or possibly a CD ROM or DVD   ROM drive  Even to this day  the descendants of those drives are physically  located inside your PC  They   re your local drives     Now that you   re on a network  however  you probably have access to drives  that aren   t located inside your PC but are located instead in one of the other  computers on the network  These network drives can be located on a dedi   cated server computer or  in the case of a peer to peer network  on another  client computer     In some cases  you can access an entire network drive over t
365. ndows creates a separate network profile for cach network you use  You can choose specific options for    each profile    Home vr Work  v   Public v   Domain  current profile  A 1    Network discovery    When network discovery is on  this computer can see other network computers and devices and is  visible to other network computers  What   s network discovery        Tum on network discovery  Tum off network discovery    File and printer sharing    When file and printer sharing is on  files and printers that you have shared from this computer can  be accessed by people on the network        Turn on file end printer sharing  Turn off file and printer sharing    Public folder shanng    When Public folder shanng ts on  people on the network  including homegroup members  can    arr ess Giles in the Publir folders What are the Disblir  frstrlers   Cancel       4 6 Part I  Let s Network        3  Select the Turn On File and Printer Sharing option   4  Click Save Changes     This action saves your changes and closes the Advanced Sharing  Settings page     Sharing a Folder    To enable other network users to access files that reside on your hard drive   you must designate a folder on the drive as a shared folder  Note that you can  also share an entire drive  if you so desire  If you share an entire drive  other  network users can access all the files and folders on the drive  If you share   a folder  network users can access only those files that reside in the folder  you share   If
366. ndows displays a pop up  reminder in the notification area  in the right corner of the taskbar   Just  click this bubble to start the Activation Wizard     Downloading service packs    Service packs are maintenance updates to an operating system that con    tain minor enhancements and bug fixes  Most of the fixes in a service pack  address security problems that have been discovered since the operating  system was first released  The usual way to get service packs is by download   ing them from the operating system vendor   s Web site     Depending on the operating system version you installed  you may or may  not need to apply a service pack immediately after installing the operating    Chapter 7  Setting Up a Server 14 7    system  The Windows Server 2008 Setup program automatically checks for  updates before it installs the operating system  so you shouldn   t normally  have to install a service pack after running Setup  However  you may need to  do so with other operating systems     Unfortunately  applying service packs is something you have to do through   out the life of the server  Microsoft and other operating system vendors  periodically release new service packs to correct problems as they arise     Testing the installation    After Setup finishes  check to make sure that your server is up and running   Here are some simple checks you can perform to make sure that your server  has been installed properly     Check the Event Viewer to see whether it contains any err
367. network folders and can also use network   printers  And  she can use Outlook to access her e mail     Part IV    Network  Management  For Dummies       The 5th Wave By Rich Tennant    RNS  FWY          We found where the security breach in the  WLAN was originating  It was coming in through  another rogue robot vac  This is the third  one this month  Must have gotten away from  its owner  like all the rest        In this part       ou discover that there   s more to networking than   installing the hardware and software  After you get  your network up and running  you have to keep it up and  running  That   s called network management     The chapters in this part show you how to set up your  network   s security system  improve your network   s per   formance  and protect your network from disaster  At  times  things may get a bit technical  but no one said that  life is easy        Chapter 16    Welcome to Network  Management       In This Chapter  Exploring the many jobs of the network administrator  Documenting the network  Dusting  vacuuming  and mopping  Managing network users  Choosing the right tools  Building your library  Getting certified    He  wanted  Network administrator to help small business get control of  a network run amok  Must have sound organizational and management  skills  Only moderate computer experience required  Part time only     Does this sound like an ad that your company should run  Every network  needs a network administrator  whether the ne
368. network life  all users are created equal  but some  users are more equal than others  The Preamble to the Declaration of  Network Independence contains the statement    We hold these truths to be  self evident  that some users are endowed by the network administrator with  certain inalienable rights             The rights that you can assign to network users depend on which network  operating system you use  These are some of the possible user rights for  Windows servers     Log on locally  The user can log on to the server computer directly from  the server   s keyboard     Change system time  The user can change the time and date registered  by the server     332 Part V  Protecting Your Network    ar          Shut down the system  The user can perform an orderly shutdown of  the server     Back up files and directories  The user can perform a backup of files  and directories on the server     Restore files and directories  The user can restore backed up files     Take ownership of files and other objects  The user can take over files  and other network resources that belong to other users     NetWare has a similar set of user rights     Permissions  who gets what     User rights control what a user can do on a network wide basis  Permissions  enable you to fine tune your network security by controlling access to spe   cific network resources  such as files or printers  for individual users or  groups  For example  you can set up permissions to allow users into the  account
369. nformation     To join a domain  select the Domain radio button and type the domain  name into the appropriate text box  To join a workgroup  select the  Workgroup radio button and type the workgroup name in the corre   sponding text box     5  Click OK     6  If you   re prompted  enter the username and password for an  Administrator account     JOQ  Partit  Building Your Own Network       You re asked to provide this information only if a computer account  hasn   t already been created for the client computer     7  When a dialog box appears  informing you that you need to restart the  computer  click OK and then restart the computer     You re done     Computer Name Changes we       You can change the name and the membership of this  computer  Changes may affect access to network resources     Computer name   DOUGES10     Full computer name   DOUGES510 office Jowewriter com    ees    Figure 8 8   The Member of      Domain     omputer  C P office lowewriter com    Name  Changes O Workgroup   dialog box   Windows    XP                     Configuring Windows Vista and Windows 7  computer identification    The procedure for changing the computer identification is the same in both  Windows Vista and Windows 7  The figures in this section are taken from a  Windows 7 system  but the screens in Windows Vista are almost identical   Here are the steps     1  Choose the Start button  and then right click Computer and choose  Properties     This step displays the System information w
370. ng Your Network  to the Internet       In This Chapter  Looking at DSL and cable  Examining T1 and T3 connections  Using a router  Securing your connection with a firewall  Using the firewall that comes with Windows    Ss  you decided to connect your network to the Internet  All you have to  do is run to the local computer discount store  buy a cable modem  and  plug it in  right  Wrong  Unfortunately  connecting to the Internet involves  more than just installing a modem  For starters  you have to make sure that  a modem is the right way to connect     other methods are faster but more  expensive  Then you have to select and configure the software you use to  access the Internet  Finally  you have to lie awake at night worrying whether  hackers are breaking into your network via its Internet connection     Connecting to the Internet    Connecting to the Internet isn   t free  For starters  you have to purchase the  computer equipment necessary to make the connection  Then you have to  obtain a connection from an Internet Service Provider  or ISP  The ISP charges  you a monthly fee that depends on the speed and capacity of the connection     The following sections describe the most commonly used methods of con   necting network users to the Internet       86 Part Ill  Getting Connected       Connecting with cable or DSL    For small and home offices  the two most popular methods of connecting to  the Internet are cable and DSL  Cable and DSL connections are often called  broa
371. ng a firewall    A firewall is a security conscious router that sits between the Internet and  your network with a single minded task  preventing them from getting to us   The firewall acts as a security guard between the Internet and your LAN  All  network traffic into and out of the LAN must pass through the firewall  which  prevents unauthorized access to the network     Some type of firewall is a must have if your network has a connection to the  Internet  whether that connection is broadband  cable modem or DSL   T1  or  some other high speed connection  Without it  sooner or later a hacker will  discover your unprotected network and tell his friends about it  and within a  few hours your network will be toast     You can set up a firewall in two basic ways   Firewall appliance  The easiest way  It   s basically a self contained    router with built in firewall features     Most firewall appliances include Web based interfaces that enable you  to connect to the firewall from any computer on your network by using  a browser  You can then customize the firewall settings to suit your  needs     1  Server computer  Can be set up to function as a firewall computer     The server can run just about any network operating system  but most  dedicated firewall systems run Linux     Chapter 10  Connecting Your Network to the Internet   89       Figure 10 1   A firewall  router  creates a  secure link  between a  network and  the Internet   rj    Whether you use a firewall appliance
372. ng cabled network  For example  you may  work at an office with 15 computers all cabled up nicely  and you just want   to add a couple of wireless notebook computers to the network  Or  suppose  that you have two computers in your den connected to each other with net   work cable but you want to link up a computer in your bedroom without pull   ing cable through the attic     That   s where a wireless access point  or WAP  comes in  A WAP performs two  functions     The WAP acts as a central connection point for all your computers  Ra that have wireless network adapters    lt     In effect  the WAP performs essentially the same function that a hub or  switch performs for a wired network     1 74 Partit  Building Your Own Network    ar     a  Figure 9 3   A wireless  access  point  connects   a wireless  network to   a cabled  network           The WAP links your wireless network to your existing wired network  so that your wired computer and your wireless computers get along  like one big  happy family   Sounds like the makings of a Dr  Seuss  story     Now the wireless sneetches had hubs without wires  But the  twisted pair sneetches had cables to thires               Wireless access points are sometimes just called access points  or APs  An  access point is a box that has an antenna  or  often  a pair of antennae  and an  RJ 45 Ethernet port  You just plug the access point into a network cable and  then plug the other end of the cable into a hub or switch  and your wireless
373. ng printer in  51 52   wireless networking  179 181  wire cutters  87  wire stripper  87  wired equivalent privacy  WEP   178  wireless access point  WAP   166  173 179  wireless bridging  176  wireless local area network  WLAN   166  wireless networking   adapters  172 173   antennas  167 168   FCC  169   frequencies  167   overview  10  165 166   radio waves  167   range  171 172   roaming  175 176   spectrums  169    Index 4 13       standards  170 171  wavelength  167 168  Windows Vista or Windows 7  181 182  Windows XP  configuring for  179 181  wireless access points  173 179  wiring schemes  88 89  WLAN  wireless local area network   166  Word Options dialog box  56  workgroup networks  23  159  162  workgroup templates  55 57  Workstation service  296  worms  344  Write permission  261    eXe  X Window System  352    X 400 standard  196 197  XOR operation  107    eV e    Yosemite Backup  BarracudaWare  311    4 14 Networking For Dummies  9th Edition       Computers Networking General    Need to build a network  or use one  No idea  where to start  Start here  Open the book and find     So you want to use a network     or worse  someone wants  you to set up one  Here   s just what you need to know in   a language you can understand  even if you don   t own a  pocket protector  Find out what a network is  how to take  advantage of what it offers  what you need to build and  manage one  and how to keep your network  and the stuff  on it  safe     e Just the facts     for
374. ng set of steps starting at Step 3     Assigning a drive letter to a network drive is called mapping the  drive  or linking the drive  by network nerds     Drive H is mapped to a  network drive     they say     Network drive letters don   t have to be assigned the same way for  every computer on the network  For example  a network drive that   s  assigned drive letter H on your computer may be assigned drive letter  Q on someone else   s computer  In that case  your drive H and the other  computer   s drive Q refer to the same data  This arrangement can be  confusing  If your network is set up this way  put pepper in your network  administrator   s coffee     3 4 Part I  Let s Network        Accessing a shared network folder through a mapped network drive  is much faster than accessing the same folder by browsing the net   work  That   s because Windows has to browse the entire network to list  all available computers whenever you browse the network  In contrast   Windows doesn   t have to browse the network to access a mapped net   work drive     If you select the Reconnect at Logon option for a mapped drive  you  receive a warning message if the drive isn   t available when you log  on  In most cases  the problem is that the server computer isn   t turned  on  Sometimes  however  this message is caused by a broken network  connection  For more information about fixing network problems such  as this one  refer to Chapter 20     Using a Network Printer    Using a network prin
375. ng with LinuX           s ssessessesoesoesessossessessessessessessessesoessesoeseesessesse 351  Chapter 26  Macintosh Networking s src niisiis 371  Part VII  The Part of Tens    cccccccccccccsccscccsscctccccseccscece 377  Chapter 27  More Than Ten Big Network Mistakes              ccccsccssessessteesseesseeseesseeees 379  Chapter 28  Ten Networking Commandments               ccccsccssscsseesseesseeseeeseeeseeeeesseeess 387  Chapter 29  Ten Things You Should Keep in Your Closet             ccccssesseeseeseeeseeees 391  Chapter 30  Layers of the OSI Model               c csccsssssssssssessecssecsscesscessessecsssesseesseesaeenes 395      ndeg x csccissitessiacucwsstssAdsseaateccastesuebatsieuceascuosesddasearcersnacclO      Table of Contents      ntroduction    ccccccccccccccccccccccccccccccccccccccccccececccccccccccececee i     About This BOOK osni cestiss siooeesteceoss ie RRE EE ER 1  How to Use This BOOK  iseinean tanar an E T 2  What You Don t N    d to Redd urnsas onssas E E 3  Foolish AssS  UMmPtioNS oshere eeaeee rrer E A E E TEETE ETNE EEEE 3  How This Book Is Organized               cccsscssscsssesscessesssesscesceeseeesseensessnesssesseeees 3  Part I Let s Network ic ciscesesescesdelisecivecsvis  secvanesuisssccasuaeaes n 4  Part II  Building Your Own Network            c ccccccesscseesseesseeseeeeeeseensees 4  Part III  Getting Connected              cccssssccsscesseessessscsssesseessessaeeseeeseeessees 4  Part IV  Network Management For Dummies                  esc
376. nge   3 White Orange White green  4 Blue Blue   5 White Blue White blue   6 Orange Green   7 White Brown White brown  8 Brown Brown    Wall jacks and patch panels    If you want  you can run a single length of cable from a network hub or switch  in a wiring closet through a hole in the wall  up the wall to the space above  the ceiling  through the ceiling space to the wall in an office  down the wall   through a hole  and all the way to a desktop computer  That   s not a good  idea  For example  every time someone moves the computer or even cleans    J2    Part Il  Building Your Own Network    rey  Figure 5 4   Using wall  jacks   and patch  panels        ar       behind it  the cable will get moved a little bit  Eventually  the connection will  fail and the RJ 45 plug will have to be replaced  Then the cables in the wiring  closet will quickly become a tangled mess     The alternative is to put a wall jack in the wall at the user   s end of the cable  and connect the other end of the cable to a patch panel  Then the cable itself  is completely contained within the walls and ceiling spaces  To connect a  computer to the network  you plug one end of a patch cable  properly called  a station cable  into the wall jack and plug the other end into the computer   s  network interface  In the wiring closet  you use a patch cable to connect the  wall jack to the network hubs or switches  Figure 5 4 shows how this arrange   ment works                                   Patch panel    E
377. nmbd daemons are  running     To configure Samba to start automatically when you start Linux  use this  command     chkconfig  level 35 smb on    368 Part VI  Beyond Windows       To make sure the chkconfig command worked right  enter this command   chkconfig  list smb   You should see output similar to the following   Smb QSO Leowe Agorc Jsem AJO Seon OLORE    Services can be independently configured to start automatically for each   of the six boot levels of Linux  Boot level 3 is normal operation without an X  server  level 5 is normal operation with an X server  Thus  setting smb to start  for levels 3 and 5 makes smb available whether or not you   re using a graphical  user interface     You can also start and stop Samba with the Service Configuration tool  as  shown in Figure 25 6  Scroll down the list of services until you find the smb  service  You can use the three buttons in the toolbar at the top of the window  to start  stop  or restart a service     Using the Samba Server Configuration tool    Fedora includes a handy GNOME based configuration tool that simplifies  the task of configuring Samba  To start it  go to the desktop and choose  Main Menu System Settings   Server Settings  Samba Server  When you do   the Samba Server Configuration window appears  as shown in Figure 25 8   This tool lets you configure basic server settings and manage shares     To make your Samba server visible on the network  choose Preferences     Server Settings  This brings up a dialog
378. nt to log out  Click OK     In a command shell  you can log out in three ways     Enter the logout command   1  Enter the exit command   Press Ctrl D     Shutting down    Like any operating system  you shouldn   t turn off the power to a Linux server  without shutting down the system  There are three ways to shut down Linux     Press Ctrl Alt Delete     1  From GNOME  click the main menu and choose Log Out  When the con   firmation dialog box appears  select Shut Down or Restart  and then  click OK     vy From a command shell  enter the halt command     Using GNOME    Although you can do all your Linux configuration chores from the command  line  Fedora includes a number of GNOME based configuration tools for many  configuration tasks  Although you can do most of your Linux configuration  from GNOME  you do need to use a command line once in a while     Figure 25 2 shows a typical GNOME desktop with the Text Editor applica   tion open  As you can see  the GNOME desktop looks a lot like Microsoft  Windows  In fact  many of the basic skills for working with Windows     such    Chapter 25  Networking with Linux 359       as moving or resizing windows  minimizing or maximizing windows  and  using drag and drop to move items between windows     work almost exactly  the same in GNOME  So you should feel right at home     The following list describes some key features of the GNOME desktop     On the desktop itself  you   ll find several icons that let you access  common features  Th
379. ntarmation 5 29 2005 10 35 78     Service Ce  D Information     5 79 2003 10 35 78    Service Ci                A warning 5 29 2005 10 36 03    LeaSrv  D Information 5 29 2005 10 36 35    Service Ce  Figure 20 2  Dinformation 5 29 2005 10 36 36    Service Ci  5 29 2005 10 39 21     W3SVC  Event    Viewer     ee                 Document Vour Trials and Tribulations    For a large network  consider investing in problem management software that  tracks each problem through the entire process of troubleshooting  from ini   tial report to final resolution  For small  and medium size networks  compiling  preprinted forms in a three ring binder is probably sufficient  Or  record your  log in a Word document or Excel spreadsheet     Regardless of how you track your network problems  the tracking log should  include this information     1    The real name and the network username of the person reporting the  problem   1     The date the problem was first reported     1     An indication of the severity of the problem  Is it merely an inconve   nience  or is a user unable to complete her work because of the prob   lem  Does a workaround exist     1     The name of the person assigned to resolve the problem     1  A description of the problem     300 Part IV  Network Management For Dummies       A list of the software involved  including version numbers   A description of the steps taken to solve the problem     A description of any intermediate steps that were taken to try to solve  th
380. number  you multiply each bit by its corre   sponding power of two and then add the results  The decimal value of binary  10101  for example  is calculated as follows     ix  seix ie il  2 Ox 2eOx Qe 0    i  B  ie as 4     Ox P O0x Be 0   amp  x De il x 1G   G   21    Fortunately  a computer is good at converting a number between binary   and decimal     so good  in fact  that you   re unlikely ever to need to do any  conversions yourself  The point of knowing binary isn   t to be able to look at   a number  such as 1110110110110  and say instantly     Ah  Decimal 7 606      lf  you could do that  Barbara Walters would probably interview you  and they  would even make a movie about you     starring Dustin Hoffman and a vintage  Buick      Instead  the point is to have a basic understanding of how computers store  information and     most important     to understand how the hexadecimal  counting system works  which I describe in the following section      Here are some of the more interesting characteristics of binary and how the  system is similar to and differs from the decimal system     The number of bits allotted for a binary number determines how large  that number can be  If you allot eight bits  the largest value that number  can store is 11111111  which happens to be 255 in decimal     ay  To quickly determine how many different values you can store ina  binary number of a given length  use the number of bits as an exponent  of two  An eight bit binary number  for exa
381. o  create computer interfaces that are intuitively easy to use     Configuring Exchange for iPhone and  Windows Mobile Devices    Many mobile devices run a special version of Windows known as Windows  Mobile  Windows Mobile includes a mobile version of Outlook known as  Outlook Mobile that has the ability to synchronize in real time with Exchange   The features that accomplish this synchronization are called Outlook Mobile  Access and Exchange ActiveSync  and they are easy to configure     iPhones also use Exchange ActiveSync to connect to e mail accounts  So  whether you   re using a Windows Mobile device or an iPhone  you can follow  these steps to enable e mail access     1  Log in to the Exchange server with an Exchange administrator  account   2  Choose Start gt Administrative Tools gt Exchange System Manager   3  In the navigation pane  expand the Global Settings node   4  Right click Mobile Services  then choose Properties   The dialog box shown in Figure 14 1 appears   5  Select all of the check boxes on the General tab     This enables all the capabilities of Outlook Mobile Access and Exchange  ActiveSync     6  Click OK   7  Close Exchange System Manager     8  Choose Start   Administrative Tools   Active Directory Users and  Computers     The Active Directory Users and Computers console opens     224 Part Ill  Getting Connected          Mohile Services Properties    thxd  General   Details      a Mobile Services    Exchange ActiveSync   IV Enable user jniti   I Ena
382. o this address is  197 168 136  23    Here  192 represents the first eight bits  11000000   168  the second set of  eight bits  10101000   136  the third set of eight bits  10001000   and 28  the  last set of eight bits  00011100   This is the format in which you usually see  IP addresses represented     Classifying IP Addresses    When the original designers of the IP protocol created the IP addressing  scheme  they could have assigned an arbitrary number of IP address bits for  the network ID  The remaining bits would then be used for the host ID  For  example  the designers may have decided that half of the address  16 bits   would be used for the network and the remaining 16 bits would be used for  the host ID  The result of that scheme would be that the Internet could have a  total of 65 536 networks and each of those networks could have 65 536 hosts     In the early days of the Internet  this scheme probably seemed like several  orders of magnitude more than would ever be needed  However  the IP  designers realized from the start that few networks would actually have tens  of thousands of hosts  Suppose that a network of 1 000 computers joins the  Internet and is assigned one of these hypothetical network IDs  Because that  network uses only 1 000 of its 65 536 host addresses  more than 64 000 IP  addresses would be wasted     As a solution to this problem  the idea of IP address classes was introduced   The IP protocol defines five different address classes  A  B  C  D
383. oblem  it   s often useful to find out  who is logged on to a network server  For example  if a user cannot access   a file on the server  you can check to see whether he is logged on  If so  you  know that the user   s account is valid  although he may not have permission  to access the particular file or folder he wants  On the other hand  if the user  isn   t logged on  the problem may lie in the account itself or in the way the  user is attempting to connect to the server     Another useful technique is to find out who   s logged on if you need to restart  the server  For more information about restarting a server  see the section      How to Restart a Network Server     later in this chapter     To find out who is logged on to a Windows Server 2008 server  follow these  steps     1  Open the Computer Management window by choosing Start  Administrative Tools  Computer Management     2  Open System Tools in the tree list  open Shared Folders  and select  Sessions     A list of users who are logged on appears     You can select Open Files to find out which files are being used by net   work users     How to Restart a Client Computer    Sometimes trouble gets a computer so tied up in knots that the only thing  you can do is reboot  In some cases  the computer just starts acting weird     294 Part IV  Network Management For Dummies    ar       Strange characters appear on the screen  or Windows goes haywire and  doesn   t let you close programs  Sometimes the computer gets so
384. of network performance problems is a server over   loaded with too many duties  Just because a modern network operating  system comes equipped with dozens of different types of services doesn   t  mean that you should enable and use them all on a single server  If a single  server is bogged down because of too much work  add a second server to  relieve the first server of some of its chores  Remember the old saying     Many  hands make light work        For example  if your network needs more disk space  consider adding a  second file server rather than adding another drive to the server that already  has four nearly full drives  Better yet  purchase a file server appliance dedi   cated to the task of serving files     As a side benefit  your network will be easier to administer and more reliable  if you place separate functions on separate servers  For example  if a single  server doubles as a file server and a mail server  you lose both services if  you have to take down the server to perform an upgrade or repair a failed    282 Part IV  Network Management For Dummies    MBER    EN       component  However  if you have separate file and mail server computers   only one of the services is interrupted if you have to take down one of the  servers     The network infrastructure    The infrastructure consists of the cables and any switches  hubs  routers   and other components that sit between your clients and your servers     The following network infrastructure items can slow 
385. ok once in a while  Problem is  they don   t always tell you when  they   re not working  A tape drive     especially the less expensive Travan    Chapter 22  Backing Up Your Data 3   9       drives     can spin along for hours  pretending to back up your data  when   in reality  your data isn   t being written reliably to the tape  In other words  a  tape drive can trick you into thinking that your backups are working just fine   but when disaster strikes and you need your backup tapes  you may just  discover that the tapes are worthless     ay  Don   t panic  You have a simple way to assure yourself that your tape drive is  working  Just activate the    compare after backup    feature of your backup soft   ware  Then  as soon as your backup program finishes backing up your data  it  rewinds the tape  reads each backed up file  and compares it with the original  version on the hard drive  If all files compare  you know your backups are  trustworthy     Here are some additional thoughts about the reliability of tapes     1    The    compare after backup    feature doubles the time required to doa  backup  but that doesn   t matter if your entire backup fits on one tape   You can just run the backup after hours  Whether the backup and repair  operation takes one hour or ten doesn   t matter  as long as it   s finished  by the time the network users arrive at work the next morning     If your backups require more than one tape  you may not want to run  the    compare after back
386. on   17 Apple Computer  Inc  48 Prudential Securities Inc    18 MIT 54 Merck and Co   Inc    19 Ford Motor Company 56 U S  Postal Service    Class B addresses    In a Class B address  the first two octets of the IP address are used as the  network ID  and the second two octets are used as the host ID  Thus  a Class  B address comes close to my hypothetical scheme of splitting the address  down the middle  using half for the network ID and half for the host ID  It isn   t  identical to this scheme  however  because the first two bits of the first octet  are required to be 10  to indicate that the address is a Class B address  Thus   a total of 16 384 Class B networks can exist  All Class B addresses fall within  the range 128 x y zto191 x y z  Each Class B address can accommo   date more than 65 000 hosts     The problem with Class B networks is that even though they   re much smaller  than Class A networks  they still allocate far too many host IDs  Very few net   works have tens of thousands of hosts  Thus  the careless assignment of Class  B addresses can lead to a large percentage of the available host addresses  being wasted on organizations that don   t need them        Class C addresses    In a Class C address  the first three octets are used for the network ID  and  the fourth octet is used for the host ID  With only eight bits for the host ID   each Class C network can accommodate only 254 hosts  However  with 24   network ID bits  Class C addresses allow for more tha
387. on   t want to designate an entire mapped drive for offline access  you  can designate individual folders within a mapped drive by using the same  technique  Right click the folder  and then choose Always Available Offline   Windows Vista or Windows 7  or Make Available Offline  Windows XP      When you first designate a drive or folder as available offline  Windows  copies all the files on the drive or folder to local storage  Depending on how  many files are involved  this process can take awhile  so plan accordingly     6 0 Part I  Let s Network        After you designate a drive as available offline  Windows takes care of the  rest  Each time you log on or off the network  Windows synchronizes your  offline files  Windows compares the time stamp on each file on both the  server and the local copy and then copies any files that have changed     Here are a few other thoughts to consider about offline files     If you want  you can force Windows to synchronize your offline files by  right clicking the drive or folder and choosing Sync     4 Make sure that no files in the folder are currently open at the time you  set the Make Available Offline option  If any files are open  you ll receive  an error message  You ll have to close the open files before you can des   ignate the folder for offline access     The Properties dialog box for mapped drives includes an Offline Files  tab  as shown in Figure 3 12           iy Project   1   Z  Properties    Project        Location    SER
388. on  you must notify your VoIP provider of your location for 911 to  work  If you take your VoIP ATA with you on a trip and then forget to  notify your provider of your new location before dialing 911  you   re  connected to emergency services in your hometown  not in your  present location     Popular VoIP Providers    If you   re thinking of switching to VoIP  investigate these services     1  Vonage  One of the oldest and most popular VoIP providers  A residential  customer can get unlimited access for  24 99 per month  Or  you can get  a 500 minute plan for  17 99 per month  See www  vonage  com        Comcast Digital Voice  If Comcast has cable service in your area  you  can subscribe to its VoIP plan for about  20 per month     Time Warner Cable Digital Phone  Time Warner provides digital phone  service for about  20 per month  For more information  check out www   buytimewarnercable com telephone aspx     Chapter 14  Dealing with Mobile Devices       In This Chapter  Looking at mobile devices  Configuring Windows Mobile devices for Exchange access  Examining BlackBerrys and BlackBerry Enterprise Server  BES   Considering security implications    n August 2003  a computer consultant purchased a used BlackBerry device  on eBay for  15 50  When he put in a new battery and turned the device  on  he discovered that it contained confidential e mails and personal contact   information for executives of a well known financial institution     Oops     It turns out that a former 
389. on which radio  can operate  In the United States  the Federal Communications Commission   FCC  regulates not only how much of Janet Jackson can be shown at the  Super Bowl but also how various portions of the radio spectrum can be used   Essentially  the FCC has divided the radio spectrum into dozens of small ranges  called bands and restricted certain uses to certain bands  For example  AM radio  operates in the band from 535 kHz to 1 700 kHz     Table 9 1 lists some of the most popular bands  Note that some of these bands  are wide     for example  UHF television begins at 470 MHz and ends at 806  MHz  but other bands are restricted to a specific frequency  The difference  between the lowest and highest frequency within a band is the bandwidth                                               Table 9 1 Popular Bands of the Radio Spectrum   Band What It s Used For   535 kHz   1 700 kHz AM radio   5 9 MHz    26 1 MHz Short wave radio   26 96 MHz   27 41 MHz Citizens Band  CB  radio   54 MHz 88 MHz Television  VHF channels 2 through 6    88 MHz   108 MHz FM radio   174 MHz 220 MHz Television  VHF channels 7 through 13    470 MHz 806 MHz Television  UHF channels    806 MHz 890 MHz Cellular networks   900 MHz Cordless phones   1850 MHz   1990 MHz PCS Cellular   2 4 GHz    2 4835 GHz Cordless phones and wireless networks   802 11b and 802 11g    4 GHz 5 GHz Large dish satellite TV   5 GHz Wireless networks  802 11a    11 7 GHz 12 7 GHz Small disk satellite TV    Two of the bands in 
390. onday 4  Now  tack up a calendar  on the wall near the computer and number all the Mondays in the year   1  2  3  4  1  2  3  4  and so on     On Tuesday through Friday  you use the appropriate daily backup tape   When you do a full backup on Monday  you consult the calendar to  decide which Monday tape to use  With this scheme  you always have  four weeks    worth of Monday backup tapes  plus individual backup  tapes for the rest of the week     If bookkeeping data lives on the network  make a backup copy of all your    files  or at least all your accounting files  immediately before closing the  books each month  then retain those backups for each month of the year   Does that mean you should purchase 12 additional tapes  Not necessarily   If you back up just your accounting files  you can probably fit all 12 months  on a single tape  Just make sure that you back up with the    append to  tape    option rather than the    erase tape    option so that the previous con   tents of the tape aren   t destroyed  Also  treat this accounting backup as  completely separate from your normal daily backup routine     You should also keep at least one recent full backup at another location     That way  if your office should fall victim to an errant Scud missile or a rogue  asteroid  you can re create your data from the backup copy that you stored    off site     A Word about Tape Reliability    From experience  I   ve found that although tape drives are very reliable  they    do run am
391. onnect hubs to each other with no more than  100 meters of cable     Figure 5 7 shows how you can use a repeater to connect two groups of com   puters that are too far apart to be strung on a single segment  When you use  a repeater like this  the repeater divides the cable into two segments  The  cable length limit still applies to the cable on each side of the repeater                                      BSS   A    Hub                                                         Repeater                   Chapter 5  Cables  Adapters  and Other Stuff   0      Ponder these points when you lie awake tonight thinking about repeaters     1  Repeaters are used only with Ethernet networks wired with coaxial  cable  twisted pair networks don   t use repeaters     Actually  that   s not quite true  twisted pair does use repeaters  It   s just  that the repeater isn   t a separate device  In a twisted pair network  the  switch is a multiport repeater  That   s why the cable used to attach each  computer to the switch is considered a separate segment        Some 10 100BaseT switches have a BNC connector on the back  This  BNC connector is a Thinnet repeater that enables you to attach a full  185 meter Thinnet segment  The segment can attach other computers   10BaseT hubs  or a combination of both     A basic rule of Ethernet life is that a signal can   t pass through more than  three repeaters on its way from one node to another     You can have more than three repeaters or switches  If y
392. ons dialog box   You return to the Word Options dialog box    7  Click OK again   The Word Options dialog box is dismissed     Although the User Templates and Workgroup Templates settings affect Word   Excel  and PowerPoint  you can change these settings only from Word  The  Options dialog boxes in Excel and PowerPoint don   t show the User Templates  or Workgroup Templates options     When you install Office  the standard templates that come with Office   are copied into a folder on the computer   s local disk drive  and the User  Templates option is set to this folder  The Workgroup Templates option is  left blank  You can set the Workgroup Templates folder to a shared network  folder by clicking Network Templates  clicking the Modify button  and speci   fying a shared network folder that contains your workgroup templates     Networking an Access database    If you want to share a Microsoft Access database among several network  users  be aware of a few special considerations  Here are the more important  ones     5 8 Part I  Let s Network        1  When you share a database  more than one user may try to access the  same record at the same time  This situation can lead to problems if two  or more users try to update the record  To handle this potential traffic  snarl  Access locks the record so that only one user at a time can update  it  Access uses one of three methods to lock records     e Edited Record  This method locks a record whenever a user begins  to edit a recor
393. ons ee  Server  Roles page  of the  More about server roles  Add Roles  Wizard   T             Figure 12 2   The Web  Server  IIS   page of the  Add Roles  Wizard   j    Figure 12 3   The Select  Role  Services  page of the  Add Roles  Wizard    O E         naa roire pean iii    x    eg Web Server  IIS                 Before You Begin Introduction to Web Server  IIS   Select Server Roles The Web Server  IIS  role enables sharing of information on the Internet  an intranet  or an extranet  Itis a  unified Web platform that integrates IIS 7 0 ASP NET  Windows Communication   and Windows    eb Server  II SharePoint Services  IIS 7 0 aiso features enhanced security  simplified dagnostics  and delegated   Role Services  Confirm Installation Selections Things to Note   I fon Pronress i_ Using Windows System Resource Management  WSRM  can help ensure equitable servicing of web server  eee ld traffic especialy when there are multiple roles or workloads on this computer    Installation Results    lt Previous  Ora  Insia   Carel     Add Roles Wizard x        Description    Web Server provides support for HIML  Web sites and optional support for  ASP NET  ASP  and Web server  extensions  You con use the Web  Server to host an internal or external  Web site or to provide an environment  for developers to create Web based  applications        5 E peor AAS i    Installation Results       Bu repctonDevlepman  ASP NET  a INET Extensibility  ASP  CGI  C  ISAPI Extensions  C ISAPI Faters  C se
394. ons is more restrictive always  applies  For example  if the Share Permissions grant a user Full Control  permission but the folder permission grants the user only Read permis   sion  the user has only Read permission for the folder     2 76 Part IV  Network Management For Dummies       Chapter 19  Network Performance Anxiety       In This Chapter  Understanding performance problems  Looking at bottlenecks  Developing a procedure for solving performance problems  Monitoring performance  Implementing other tips for speeding up your network    J term network performance refers to how efficiently the network  responds to users    needs  Obviously  any access to resources that  involves the network is slower than similar access that doesn   t involve the  network  For example  opening a Word document that resides on a network  file server takes longer than opening a similar document that resides on the  user   s local hard drive  However  it shouldn   t take much longer  If it does  you  have a network performance problem     This chapter is a general introduction to the practice of tuning your network  so that it performs as well as possible  Keep in mind that many specific bits  of network tuning advice are scattered throughout this book  In this chapter   you can find some specific techniques for analyzing your network   s perfor   mance  taking corrective action when a performance problem develops  and  charting your progress     Why Administrators Hate  Performance Problems 
395. operating system  resides on a separate hard drive that   s isolated from the shared disks so  users are prevented from inadvertently damaging the operating system     Understanding Permissions    One key concept for managing network storage is permissions  Permissions  allow users to access shared resources on a network  Simply sharing a disk  doesn   t guarantee that a given user can access the data it contains  Windows  makes this decision based on the permissions that have been assigned   to various groups for the resource and group memberships of the user  If    Chapter 18  Managing Network Storage 26      the user belongs to a group that   s been granted permission to access the  resource  the access is allowed  If not  access is denied     In theory  the permissions concept sounds simple  In practice  however  it  can get quite complicated  This list explains some of the nuances of how  access control and permissions work     1  Every object     that is  every file and folder     on an NTFS volume has  a set of permissions called the Access Control List  or ACL  associated  with it     1  The ACL identifies the users and groups that can access the object and  specifies which level of access each user or group has  For example  a  folder   s ACL may specify that one group of users can read files in the  folder  another group can read and write files in the folder  and a third  group is denied access to the folder     Container objects     files and volumes     allow the
396. operating systems on a lot of servers   RIS can also install client operat   ing systems      Gathering Vour Stuff    ING     Before you install a network operating system  gather up everything you need  so that you don   t have to look for something in the middle of the setup  The  following sections describe the items you   re most likely to need     A capable server computer    Obviously  you have to have a server computer on which to install the NOS   Each NOS has a list of the minimum hardware requirements supported by  the operating system  Table 7 1 lists two kinds of minimum requirements for  Windows Server 2008 Standard     Microsoft   s extremely inadequate published requirements      Your author   s realistic recommendations for acceptable performance    Table 7 1 Windows Server 2008 Hardware Requirements             Hardware Microsoft s Published Doug s Realistic  Minimum Minimum   CPU 1 GHz single core x86 pro  2 GHz dual core x86  cessor  for example  Intel processor  for example   Pentium  Intel Core 2 Duo    RAM 512MB 4GB   Free disk space 10GB 80GB    Computer components are inexpensive enough that you shouldn   t scrimp on  hardware costs     Also check your server hardware against the list of compatible hardware  published by the maker of your NOS  For example  Microsoft publishes a    Chapter 7  Setting Up a Server 14      list of hardware that it has tested and certified as compatible with Windows  servers  This list is the Hardware Compatibility List  or
397. opology  80  82 83   StarOffice  352   startup diskette  NOS  141   stateful packet inspection  SPJ   341   static data  313 314   static IP address  118  120 121   station cable  85  92   stencils  Visio  73   storage  18  194  259 264   See also file servers   STP  shielded twisted pair  cable  84 85   stranded cable  85 86   striped volumes  281   subdomain  126   subnet masks  114 115  119   subnets  113 114   subnetting  112 116   surge protector  289 290   SuSE  354   swap partition  355   switches  17  82 83  93 96  286  291  325  397   Sync command  60   System Information program  68  160 161   238 239  242   System Properties dialog box  159 161   system time  331   System window  66 67    o fo    T1 lines  187  T3 lines  187  taking computer down  11  tape  310  318 320  See also backups  tasks  scheduled  286  TCP IP  Transmission Control Protocol   Internet Protocol   binary system  105 107  commands  241 242  DHCP  117 124  DNS  125 129  IP addresses  108 111  ipconfig  all command  147  network address translation  116 117  NOS setup  configuration for  143    Index 4           overview  105  ports  339 340  settings  checking  292  subnetting  112 116  o dialog box  124  129   156  telephones  cordless  171  Telephones tab  User Properties  dialog box  250  Telnet circuit level gateway  341  10 100 1000 Mbps components  82  97  10Base2 cable  96  10Base5 cable  96  10BaseT  89 90  96  99 100  Terminal window  Linux  360  theft  data  322  thick coaxial cable  
398. or example   experiment to narrow the possibilities  Design your  experiments to answer one basic question  Is it a network problem or a local  computer problem     Here are some ways you can narrow the cause of the problem     Try performing the same operation on someone else   s computer  If no  one on the network can access a network drive or printer  something is  probably wrong with the network  On the other hand  if the error occurs  on only one computer  the problem is likely on that computer  The way   ward computer may not be communicating reliably with the network or  configured properly for the network  or the problem may have nothing  to do with the network     Chapter 20  Solving Network Problems 293    If you can perform the operation on another computer without prob   lems  try using your own username to log on to the network on another  computer  Then see whether you can perform the operation without  error  If you can  the problem is probably on your computer  If you can   t   the problem may be with the way your user account is configured     If you can   t log on at another computer  try waiting for a bit  Your  account may be temporarily locked out  This problem can happen for a  variety of reasons     the most common of which is trying to log on with  the wrong password several times in a row  If you   re still locked out an  hour later  call the network administrator and offer a doughnut     Who   s on First    ar    When you troubleshoot a networking pr
399. or messages  related to installation or startup  Depending on the Windows server  version you   re using  you can open the Event Viewer by choosing  Start   Administrative ToolsEvent Viewer or Start   Program Files     Administrative ToolsEvent Viewer   Non Windows server operating  systems have similar features that allow you to view event logs      Check your TCP IP settings by running the command ipconfig  all  from a command prompt  This command tells you whether TCP IP is  running and shows you the host name  IP address  and other useful TCP   IP information     To make sure that you can reach the server over the network  open a  command prompt at a client computer and attempt to ping the server by  entering the command ping hostname where hostname is the name  displayed by the ipconfig command for the server     Configuring Server Roles    Server roles refer to the roles that your server can play on your network      roles such as a file server  a Web server  or a DHCP or DNS server  Features  refer to additional capabilities of the Windows operating system itself  such  as the  NET Framework or the Windows Backup  Truthfully  the distinctions  between roles and features are a bit arbitrary  For example  the Web server is  considered a role  but the telnet server is a feature  Go figure     The Initial Configuration Tasks page shown in Figure 7 2 lets you add additional  roles or features to your server  After you   ve finished with the initial configu   ration of your 
400. ormal  backup with an incremental backup or a differential backup  no files will be  selected for backup by the incremental or differential backup because no  files will have their archive bits set     The easiest backup scheme is to simply schedule a normal backup every  night  That way  all your data is backed up on a daily basis  So if the need  arises  you can restore files from a single tape or set of tapes  Restoring files  is more complicated when other types of backups are involved     Do normal backups nightly if you have the tape capacity to do them  unattended     that is  without having to swap tapes  If you can   t do an  unattended normal backup because the amount of data to be backed up  is greater than the capacity of your tape drive or drives  you ll have to  use other types of backups in combination with normal backups     If you can   t get a normal backup on a single tape and you can   t afford a second  tape drive or a tape changer  take a hard look at the data that   s being included  in the backup selection  I recently worked on a network that was having trou   ble backing up onto a single tape  When I examined the data that was being  backed up  I discovered a large amount of static data that was essentially an  online archive of old projects  This data was necessary because network users  needed it for research purposes  but the data was read only  Even though the  data never changed  it was being backed up to tape every night  and the back   ups requ
401. ormation is and  should be confidential  If this information is stored on the network  you  want to store it in a directory that   s available only to authorized users     Not all security breaches are malicious  A network user may be rou   tinely scanning through his or her files and come across a filename that  isn   t familiar  The user may then call up the file  only to discover that it  contains confidential personnel information  juicy office gossip  or your  r  sum    Curiosity  rather than malice  is often the source of security  breaches     Sure  everyone at the office is trustworthy now  However  what if some   one becomes disgruntled  a screw pops loose  and he or she decides to  trash the network files before jumping out the window  What if someone  decides to print a few  1 000 checks before packing off to Tahiti     Sometimes the mere opportunity for fraud or theft can be too much for  some people to resist  Give people free access to the payroll files  and  they may decide to vote themselves a raise when no one is looking     If you think that your network doesn   t contain any data that   s worth  stealing  think again  For example  your personnel records probably  contain more than enough information for an identity thief  names   addresses  phone numbers  social security numbers  and so on  Also   your customer files may contain your customers    credit card numbers     Hackers who break into your network may be looking to plant a Trojan  horse program on y
402. ou can also disable the device if it   s preventing  other components of the computer from working properly     e Advanced  This tab lets you set a variety of device specific param   eters that affect the operation of the NIC  For example  some cards  allow you to set the speed parameter  typically at 10 Mbps or 100  Mbps  or the number of buffers the card should use     154 Partit  Building Your Own Network    MBER  KO   amp        ar    ar       Consult the manual that came with the card before you play  around with any of those settings     e Driver  This tab displays information about the device driver that   s  bound to the NIC and lets you update the driver to a newer ver   sion  roll back the driver to a previously working version  or unin   stall the driver     e Resources  With this tab  you can use manual settings to limit the  system resources used by the card     including the memory range   I O range  IRQ  and DMA channels     In the old days  before Plug and Play cards  you had to configure  these settings whenever you installed a card  and it was easy to  create resource conflicts  Windows configures these settings auto   matically so that you rarely need to fiddle with them     e Power Management  This tab lets you set power management  options  You can specify that the network card be shut down  whenever the computer goes into sleep mode     and that the  computer wakes up periodically to refresh its network state     When you click OK to dismiss the network 
403. ou can click Browse  This action calls up  a dialog box that lets you search the server   s hard drive for a folder to  share  You can also create a new folder from this dialog box if the folder  that you want to share doesn   t yet exist  After you   ve selected or created  the folder to share  click OK to return to the wizard     The dialog box  as shown in Figure 18 3  appears       Change the NTFS Permissions if you want and then click Next     The NTFS permissions are the permissions that are applied to the folder  that you   re sharing  not to the share itself  If you want to change the  underlying NTFS permissions for the folder you   re sharing  select the  Yes  Change NTFS Permissions radio button  click the Edit Permissions  button  and set the permissions the way you want  Otherwise  click  Next to proceed to the next step  The wizard displays the dialog box     as shown in Figure 18 4  which lets you set the name this share will be  known by              ez  NIES Permissions  22  Steps   Specify NTFS pemissons to control how individual users and groups access this folder  Shared Folder Location locally  For network access to a shared folder  the more restrictive of the NTTS  permissions and the share permissions configured for the share protocol determine the  NTFS Permissions level of access granted to users and groups   Share Protocole  Review Settings and Create  Share Path   Confemation  CNDataShares Marketing    Do you want to change the N TES permissions for
404. ou do  you have  to carefully plan the network cabling so that the three repeater rule isn   t  violated        1  Atwo port 10Base2 repeater costs about  200   Sheesh  I guess that   s  one of the reasons few people use coaxial cable anymore      Repeaters are legitimate components of a by the book Ethernet network   They don   t extend the maximum length of a single segment  they just  enable you to tie two segments together     WING  Beware of the little black boxes that claim to extend the segment  limit beyond the 185 meter limit for Thinnet or the 100 meter limit for  10 100BaseT cable  These products usually work  but playing by the  rules is better     e     Bridges    A bridge is a device that connects two networks  Bridges are used to partition  one large network into two smaller networks for performance reasons      lt  Think of a bridge as a kind of smart repeater  Repeaters listen to signals  coming down one network cable  amplify them  and send them down the other  cable  They do this blindly  paying no attention to the content of the messages  they repeat     In contrast  a bridge is a little smarter about the messages that come down  the pike  For starters  most bridges can listen to the network and automati   cally figure out the address of each computer on both sides of the bridge   Then the bridge can inspect each message that comes from one side of the  bridge and broadcast it on the other side of the bridge  but only if the mes   sage is intended for a co
405. ou don   t need to understand every detail  in this chapter to set up a simple TCP IP network  However  the more you  understand the information in this chapter  the more TCP IP will start to make  sense  Be brave     Understanding Binary    Before you can understand the details of how TCP IP     in particular  IP      addressing works  you need to understand how the binary numbering  system works because binary is the basis of IP addressing  If you already  understand binary  please skip right over this section to the next main sec   tion     Introducing IP Addresses     I don   t want to bore you with stuff that   s  too basic     106 Partit  Building Your Own Network       Counting by ones    The binary counting system uses only two numerals  0 and 1  In the deci   mal system to which most people are accustomed  you use ten numerals  0  through 9  In an ordinary decimal number  such as 3 482  the rightmost digit  represents ones  the next digit to the left  tens  the next  hundreds  the next   thousands  and so on  These digits represent powers of ten  first 10    which  is 1   next  10   10   then 10   100   then 10    1 000   and so on     In binary  you have only two numerals rather than ten  which is why binary  numbers look somewhat monotonous  as in 110011  101111  and 100001     The positions in a binary number  called bits rather than digits  represent  powers of two rather than powers of ten  1  2  4  8  16  32  and so on  To figure  the decimal value of a binary 
406. ou probably know  networks consist of two types of computers  client  computers and server computers  In the economy of computer networks   client computers are the consumers     the ones that use network resources   such as shared printers and disk drives  Servers are the providers     the ones  that offer their own printers and hard drives to the network so that the client  computers can use them     This chapter shows you how to turn your humble Windows client computer  into a server computer so that other computers on your network can use  your printer and any folders that you decide you want to share  In effect   your computer functions as both a client and a server at the same time  A  couple of examples show how     42    Part I  Let s Network        It   s aclient when you send a print job to a network printer or when you  access a file stored on another server   s hard drive     It   s a server when someone else sends a print job to your printer or  accesses a file stored on your computer   s hard drive     Enabling File and Printer Shaving   Windows XP     Before you can share your files or your printer with other network users  you  must set up a Windows File and Printer Sharing feature  Without this feature  installed  your computer can be a network client but not a server  This section  shows you how to enable this feature for Windows XP  For Windows Vista   refer to the next section     Enabling File and Printer Sharing  Windows Vista         If you   re lucky  
407. ou want to start  Be bold  Be courageous  Be  adventurous  Above all  have fun     PartI  Lets Network     The 5th Wave By Rich Tennant                Oh look  this must be one of those PCs that are    assembled by prison inmates  It came bundled  with a homemade shank in the mousepad        In this part       ne day the Network Thugs barge into your office and   shove a gun in your face     Don   t move until we hook  you up to the network     one of them says while the other  one connects one end of a suspicious looking cable to the  back of your computer and shoves the other end into a  hole in the wall     It   s done     they say as they start to leave      Now  don   t you say nuttin    to nobody     or we ll be back        If this has happened to you  you ll appreciate the chapters  in this part  They provide a gentle introduction to com   puter networks written especially for the reluctant net   work user     What if you don   t have a network yet and you   re the one  who   s supposed to do the installing  Then the chapters in  this part clue you in to what a network is all about  That  way  youre prepared for the  unfortunately more techni   cal  chapters in Parts II and beyond        Chapter 1    Networks Will Not Take  Over the World  and  Other Network Basics    In This Chapter  Getting a handle on networks  Considering why networking is useful  and is everywhere   Telling the difference between servers and clients  Looking under the hood at the network operating
408. ould you  rather update 50 user accounts or just 1 group account      Auser can belong to more than one group  Then  the user inherits  the rights of each group  For example  you can have groups set up for  Accounting  Sales  Marketing  and Finance  A user who needs to access  both Accounting and Finance information can be made a member of  both groups  Likewise  a user who needs access to both Sales and  Marketing information can be made a member of both the Sales and  Marketing groups       You can grant or revoke specific rights to individual users to override  the group settings  For example  you may grant a few extra permissions  for the manager of the accounting department  You may also impose a  few extra restrictions on certain users        334 Part V  Protecting Your Network    User profiles    User profiles are a Windows feature that keeps track of an individual user   s  preferences for his or her Windows configuration  For a non networked com   puter  profiles enable two or more users to use the same computer  each  with his or her own desktop settings  such as wallpaper  colors  Start menu  options  and so on     The real benefit of user profiles becomes apparent when profiles are used on  a network  A user   s profile can be stored on a server computer and accessed  whenever that user logs on to the network from any Windows computer on  the network     The following are some of the elements of Windows that are governed by  settings in the user profile     Deskto
409. oup you want to add users to  This brings up  the Group Properties dialog box  Click the Group Users tab and then check  off the users you want to belong to the group     362 Part Vi  Beyond Windows    Mm   Figure 25 4   The User  Manager   ESS           User Manager    File Edit Help    ox ae  Ry t  Add User Add Group Refresh Help    Search filter  Apply titer    Users   Groups  UserName UseriDv Primary Group Full Name  Login Shell Home Directory  Doug 500 Doug Doug Lowe bin bash  nome Doug    Network Configuration    ar    In many cases  configuring a Linux server for networking is a snap  When you  install Linux  the Installation program automatically detects your network  adapters and installs the appropriate drivers  Then you   re prompted for  basic network configuration information  such as the computer   s IP address   hostname  and so on     However  you may need to manually change your network settings after  installation  Or you may need to configure advanced networking features that  aren   t configured during installation  In the following sections  you get a look  at the basic procedures for configuring Linux networking services     Using the Network Configuration Program    Before you can use a network interface to access a network  you have to con   figure the interface   s basic TCP IP options  such as its IP address  hostname   DNS servers  and so on  In this section  I show you how to do that by using  Fedora   s Network Configuration program  You can acces
410. our net   work plan     Don   t rush the plan  The most costly networking mistakes are the ones  you make before you install the network  Think things through and con   sider alternatives        Write down the network plan  The plan doesn   t have to be a fancy  500   page document  If you want to make it look good  pick up a    inch three   ring binder     big enough to hold your network plan with room to spare     Ask someone else to read your network plan before you buy anything   Preferably  ask someone who knows more about computers than you do     Keep the plan up to date  If you add to the network  dig up the plan   dust it off  and update it     ay     The best laid schemes of mice and men gang oft agley  and leave us not but  grief and pain for promised joy     Robert Burns lived a couple hundred years  before computer networks  but his famous words ring true  A network plan  isn   t chiseled in stone  If you discover that something doesn   t work the way  you thought it would  that   s okay  You can always adjust your plan for unfore   seen circumstances     Being Purposeful    One of the first steps in planning your network is making sure that you under   stand why you want the network in the first place  Here are some of the more  common reasons for needing a network  all of them quite valid     1  My co worker and I exchange files using a flash drive just about every  day  With a network  we could trade files without using the flash drive       don   t want to bu
411. our server  which enables them to use your server  for their own purposes  For example  someone may use your server to    Chapter 23  Securing Your Network 323       send thousands of unsolicited spam e mail messages  The spam won t  be traced back to the hackers  it   ll be traced back to you     Not everyone on the network knows enough about how Windows and  the network work to be trusted with full access to your network   s data  and systems  A careless mouse click can wipe out a directory of network  files  One of the best reasons for activating your network   s security fea   tures is to protect the network from mistakes made by users who don   t  know what they   re doing     Two Approaches to Security    When you re planning how to implement security on your network  first con   sider which of two basic approaches to security you ll take     An open door type of security  in which you grant everyone access to  everything by default and then place restrictions just on those resources  to which you want to limit access     A closed door type of security  in which you begin by denying access to  everything and then grant specific users access to the specific resources  that they need     In most cases  the open door policy is easier to implement  Typically  only a  small portion of the data on a network really needs security  such as confi   dential employee records  or secrets  such as the Coke recipe  The rest of the  information on a network can be safely made availabl
412. ox           how to do that with Outlook 2007  the procedure for other versions  of Outlook is similar      1     Start Outlook on the user   s computer     There   s usually an icon for Outlook near the top of the Start menu       Choose Tools   Account Settings     The Account Settings dialog box appears  as shown in Figure 11 5       Click the New button     An Add E mail Account dialog box appears  Do not enter your e mail  address as prompted in this dialog box  Instead  proceed to Step 4       Click the Manually Configure Server Settings or Additional Server    Types option  and then click Next     This brings up a dialog box that asks you what type of e mail account  you want to create  The choices are Internet E mail  Microsoft Exchange   and Other       Select the Microsoft Exchange option and then click Next     The dialog box shown in Figure 11 6 appears     Chapter 11  Managing E Mail with Exchange 2007   99       Figure 11 6   You must  identify the  Exchange  server and  provide a  username   re    6  Enter the name of the Exchange server and the username in the  appropriate text boxes  and then click Next     The dialog box with the following message appears     The E Mail account you have just added will not  start until you choose Exit from the File menu   and then restart Microsoft Outlook     7  Click OK     The message dialog box disappears  and the last page of the E Mail  Accounts Wizard appears     8  Click the Finish button   The wizard is dismissed   
413. p settings from the Display Properties dialog box  including wall   paper  screen savers  and color schemes     Start menu programs and Windows toolbar options     Favorites  which provide easy access to the files and folders that the  user accesses often     Network settings  including drive mappings  network printers  and  recently visited network locations     Application settings  such as option settings for Microsoft Word     The My Documents folder     Logon scripts    A logon script is a batch file that runs automatically whenever a user logs on   Logon scripts can perform several important logon tasks for you  such as  mapping network drives  starting applications  synchronizing the client  computer   s time of day clock  and so on  Logon scripts reside on the server   Each user account can specify whether to use a logon script and which script  to use     This sample logon script maps a few network drives and synchronizes the  time     net use m    MYSERVER Acct  net use n    MYSERVER Admin  net use o    MYSERVER Dev  net time   MYSERVER  set  yes       Chapter 23  Securing Your Network 335       Logon scripts are a little out of vogue because most of what a logon script  does can be done via user profiles  Still  many administrators prefer the sim   plicity of logon scripts  so they   re still used even on Windows Server 2003  systems     Securing Vour Users    Security techniques  such as physical security  user account security  server  security  and locking down 
414. ped with a special  wireless network adapter that has little rabbit ear antennas  Thus  the com   puters can communicate with each other without the need for cables     Figure 1 1 shows a typical network with four computers  You can see that  all four computers are connected by a network cable to a central network  device  the hub  You can also see that Ward   s computer has a fancy laser  printer attached to it  Because of the network  June  Wally  and the Beaver  can also use this laser printer   Also  you can see that the Beaver stuck yes   terday   s bubble gum to the back of his computer  Although the bubble gum  isn   t recommended  it shouldn   t adversely affect the network      Chapter 1  Networks Will Not Take Over the World  and Other Network Basics    June s computer Wally s computer                     Beaver s gum    SSS  Figure 1 1   Atypical    network   n Ward s laser printer    Computer networking has its own strange vocabulary  Although you don   t  have to know every esoteric networking term  it helps to be acquainted with  a few of the basic buzzwords     1  LAN  Networks are often called LANs  The acronym LAN stands for  local area network  It   s the first TLA  or three letter acronym  that you see  in this book  You don   t really need to remember it  or any of the many  TLAs that follow  In fact  the only three letter acronym you need to  remember is TLA     FLA  You may guess that a four letter acronym is an FLA  Wrong  A  four letter acronym is an E
415. printer  If you  don   t  your Mac is tied up until the printer finishes your job     that can  be a long time if someone else sent a 500 page report to the printer just  before you  When you enable Background Printing  your printer output  is captured to a disk file and then sent to the printer later while you con   tinue with other work     To enable Background Printing  1  Choose Apple   Chooser desk accessory   2  Select the printer you want to use from the Chooser   3  Click the Background Printing On button     Don   t enable Background Printing if a dedicated print server has been  set up  In that case  print data is spooled automatically to the print  server   s disk so your Mac doesn   t have to wait for the printer to become  available     Shaving files with other users    To share files on your Mac with other network users  you set up a shared  resource  You can share a disk or just individual folders and restrict access  to certain users     Before you can share files with other users  you must activate the AppleTalk  file sharing feature  Here   s how     1  Choose the File Sharing control panel from the Apple Menu   2  Click the Start button in the File Sharing section of the control panel   3  Click the Close button   To share a file or folder  click the file or folder once  Then open the File  menu  choose Get Info  and choose Sharing from the submenu that appears     You can also use the Sharing section of the Info window to restrict access to  the file or fo
416. produced  stored in a retrieval system or transmitted in any form or  by any means  electronic  mechanical  photocopying  recording  scanning or otherwise  except as permit   ted under Sections 107 or 108 of the 1976 United States Copyright Act  without either the prior written  permission of the Publisher  or authorization through payment of the appropriate per copy fee to the  Copyright Clearance Center  222 Rosewood Drive  Danvers  MA 01923   978  750 8400  fax  978  646 8600   Requests to the Publisher for permission should be addressed to the Permissions Department  John Wiley   amp  Sons  Inc   111 River Street  Hoboken  NJ 07030   201  748 6011  fax  201  748 6008  or online at   http    www wiley com go permissions     Trademarks  Wiley  the Wiley Publishing logo  For Dummies  the Dummies Man logo  A Reference for the  Rest of Us   The Dummies Way  Dummies Daily  The Fun and Easy Way  Dummies com  Making Everything  Easier  and related trade dress are trademarks or registered trademarks of John Wiley  amp  Sons  Inc  and   or its affiliates in the United States and other countries  and may not be used without written permission   All other trademarks are the property of their respective owners  Wiley Publishing  Inc   is not associated  with any product or vendor mentioned in this book        LIMIT OF LIABILITY DISCLAIMER OF WARRANTY  THE PUBLISHER AND THE AUTHOR MAKE NO REPRESENTA   TIONS OR WARRANTIES WITH RESPECT TO THE ACCURACY OR COMPLETENESS OF THE CONTENTS OF T
417. purpose  Taking stock of your computer stock  Making sure that you know why you need a network  Looking at different server types  Choosing your server operating system  Planning the infrastructure and drawing diagrams  Looking at a sample network    O  so you   re convinced that you need to network your computers   What now  Do you stop by Computers R Us on the way to work  install  the network before morning coffee  and expect the network to be fully opera   tional by noon     I don   t think so     Networking your computers is just like any other worthwhile endeavor  To  do it right requires a bit of planning  This chapter helps you think through  your network before you start spending money  It shows you how to come  up with a networking plan that   s every bit as good as the plan that a network  consultant would charge  1 000 for     This book is already saving you money     Making a Network Plan    Before you begin any networking project  whether it   s a new network instal   lation or an upgrade of an existing network  first make a detailed plan  If you  make technical decisions too quickly  before studying all the issues that  affect the project  you ll regret it  You ll discover too late that a key applica   tion doesn   t run over the network  that the network has unacceptably slow  performance  or that key components of the network don   t work together     O   Partit  Building Your Own Network       Here are some general thoughts to keep in mind while you create y
418. puter  with as little as 4MB of RAM and a few hundred MB of disk space          can t see my C drive     Well  no  but that   s normal  Linux and Windows  have completely different ways of referring to  your computer s disk drives and partitions  The  differences can take some getting used to for  experienced Windows users     Windows uses a separate letter for each drive  and partition on your system  For example  if  you have a single drive formatted into three  partitions  Windows identifies the partitions as  drives C  D  and E  Each of these drives has its  own root directory  which can in turn contain  additional directories used to organize your  files  As far as Windows is concerned  drives C   D  and E are completely separate drives  even  though the drives are actually just partitions on  a single drive     Linux doesn   t use drive letters  Instead  Linux  combines all the drives and partitions into a  single directory hierarchy  In Linux  one of the  partitions is designated as the root partition   The root is roughly analogous to the C drive  on a Windows system  Then  the other parti   tions can be mounted on the root partition  and treated as if they were directories on the  root partition  For example  you might des   ignate the first partition as the root partition  and then mount the second partition as  user  and the third partition as  var  Then any files    stored in the  user directory would actu   ally be stored in the second partition  and files  store
419. puter the correct printer driver for the  network printer   You may be prompted to confirm that you want to add  the driver  If so  click Install Driver to proceed      The Add Printer Wizard displays a screen that shows the printer   s name  and asks whether you want to designate the printer as your default  printer     6   Optional  Designate the printer as your default printer   7  Click Next to continue    A final confirmation dialog box is displayed   8  Click Finish     You re done     ar    ey  Figure 2 10   Atypical  Print   dialog box   Sa    Chapter 2  Life on the Network 3 7    Many network printers  especially newer ones  are connected directly to the  network by using a built in Ethernet card  Setting up these printers can be  tricky  You may need to ask the network administrator for help in setting up  this type of printer   Some printers that are connected directly to the network  have their own Web addresses  such as Printer CleaverFamily com  If  that   s the case  you can often set up the printer in a click or two  Use your  Web browser to go to the printer   s Web page and then click a link that enables  you to install the printer      Printing to a network printer    After you install the network printer in Windows  printing to the network  printer is a snap  You can print to the network printer from any Windows  program by using the Print command to summon the Print dialog box  found  under the File menu in Office 2003 or the Office button in Office 2007 
420. puters     The Mac OS X Server includes the following features     Apache Web server  which also runs on Windows and Linux systems     NetBoot  a feature that simplifies the task of managing network client  computers    File services using AFP  WebObjects  a high end tool for creating Web sites      QuickTime Streaming Server  which lets the server broadcast  multimedia programs over the network    What Vou Need to Know to Use  a Macintosh Network    The following questions often come up after you install the network cable   Note that the following sections assume that you   re working with AppleTalk  networking using Mac OS X  The procedures may vary somewhat if you   re  using Open Transport networking or an earlier version of the Macintosh  operating system     Chapter 26  Macintosh Networking 3 13          Who s winning in the AFP West     AFP is not a division of the NFL but an abbrevia    Windows 95 use AFP to support Macintoshes  tion for AppleTalk Filing Protocol  It s the part in their networks    of AppleTalk that governs how files are stored  and accessed on the network  AFP allows files  to be shared with non Macintosh computers   You can integrate Macintoshes into any net   work operating system that recognizes AFP   NetWare and all versions of Windows since    In case you re interested  and you shouldn t  be   AFP is a Presentation Layer protocol   See  Chapter 30 if you don   t have a clue what l m  talking about            Configuring a Mac for networking    B
421. r 2  The Data Link Layer           cccecsessseesseesseceesneeesseeceseeeseeeeseneensnees 396  Layer 3  The Network Layer senserint eE E NS 398  Layer 4  The Transport Layer     omiensa ie ra ar neir As 398  Layer 4a  The Lemon Pudding Layer              cccccceseesesseeteeeeeeeeeeeeseeeeeseeaeens 399  Layer 5  The Session Layer          ccccsccssessseseesesseeseceseeseeseeseeaeceeeeeeseeseeseeaeens 399  Layer 6  The Presentation Layer         cccccccccsssecesseeeeteceseecseeesseeessesesaees 399  Layer 7  The Application Layer ics     iiss cccceicse civ  cetecaedeas cdeseteseecacistetessis bode 400    lido cee eT eT NE ee a 7      XVIII Networking For Dummies  9th Edition       Introduction    Uo  to the ninth edition of Networking For Dummies  the book  that   s written especially for people who have this nagging feeling in  the back of their minds that they should network their computers but haven   t  a clue about how to start or where to begin     Do you often burn a spreadsheet file to a CD R disc just so you can give it to  someone else in your office  Are you frustrated because you can   t use the  fancy color laser printer that   s on the financial secretary   s computer  Do you  wait in line to use the computer that has the customer database  You need a  network     Or maybe you already have a network  but you have just one problem  They  promised that the network would make your life easier  but instead it has  turned your computing life upside down  Just when you ha
422. r Network                   0 eeeeeeeaee 63  Making a Network Plan oncion i eei aiid nmin ds 63  Being PUrpOs Chl sssrini anr a aie 64  Taking StOCK seses eie nars ern sas sn aii aas loves 65   What you need to kN  W            ccsccssesssessesscessccssesssessseseessseseeeseeesaeens 65  Programs that gather information fOr YOU            eeeeseeseeeeeeteeeeeeees 68  To Dedicate  or Not to Dedicate  That Is the Question                eeeeee 69  Looking at Different Types of Servers          ccccccessseessceeeeseeseeeeeeeseeeeeneeeaes 69  FIE SEV ONS    sccccs5edeczsessdetencteevsGeseestdexeasedesbenasevseades 0h saeesdoeedes esdeestonaaess 69    Print SOF VETS nanana EE seis seed ease esate 70    Table of Contents       WED Server Serene e Mes oxcbans ede re E EEE EE ERE EE 70  WENES aa e S E A E ieeicanieieunc 70  Database SErVer Soie aeae EEEE 71  Choosing a Server Operating SySteM           ccccccsccsecsseeseeesseeseeeseeeseeeseesnees 71  Planning the Infrastructure              cccccccsscesscecesseeeseeeesneeeseeecsseeeseeseneeeeseeees 71  Drawing Diagrams onise aporioita EEE EP E E EAV E EEE hee T2  Sample Network Plah Su iiseonieerrneriiearisanossce nieste ieies raS E EEPE EEES Eea i 73  Building a small network  California Sport Surface  Inc                   73  Connecting two networks  Creative Course Development  Inc       75  Improving network performance  DCH Accounting                ee 77   Chapter 5  Oh  What a Tangled Web We Weave    Cables  Adapters  and Othe
423. r Stuff                   0 cee eee eaee 79  What Is Ethernet  sscs fccstes sicecavctess ocicaeteenaiteeea i daastitial canon eotis 79  PAM ABOUT CAD Css 230s isessesscesadecbastetevevedest cp usesereideroesadestoukstasaeetestavutesvendsieeetecs 82   CaDle CatedorieS aaraa e a E eee 83  What s with the Pairs  3  sesisiesadeisearsctts sitesi cederioeneceivencavisacavivGoeseiesei 84  To shield or not to Shield oo    cece cecceseesseesseeseeeseceecseceeceseeseeeseeenes 84  When to use plenum Cable             ccccscessccsscessccssesssesssesssesssesseeseeesasens 85  Sometimes solid  sometimes stranded            ccccceesscscesesssceeesseeseeees 85  Installation guidelines s src ission eai 86  The tools yOu need oopis iie oeaean eto oeras dev eencie hae fssceasees dns 87  Pinouts for twisted pair cables       c 0  cc0 sies ceissceeacic austen 88  RJ 45 connetto Sours cackcssassedediesacesscaaccseueaedseenivaasessssouseavianssasindsavsvevets 89  Crossover CADE Snte Na TR 9   Wall jacks and patch panels             cccccccsscessseeeseeeseeeeeeesseeeseeeenseeees 91  Hups and SWEET 93  H  bsSOrsSwWitCNeS  Aee EEEE A E EEE 93  Working with switches sosesc anera i 94  D  isy ch  aining switcheS crsninceniiinssninernen ri ninn 94  Network Interface Card          ccccccscsssesssescecsseesecesecesecsseeeseesseeseesseeeseeeeesaees 96  Picking a network interface Card           ccccccccceesseesseeeesceeeseeesseeesseennes 97  Installing  a network Card     eccccccicsec eiccdccecess coveecvese
424. r Templates  folder may contain templates named Blank Document and Web Page  and   the Workgroup Templates folder may contain a template named Company  Letterhead  In this case  three templates appear in the New dialog box  in this  order  Blank Document  Company Letterhead  and Web Page     To set the location of the User Templates and Workgroup Templates folders   follow these steps in Microsoft Word   1  Click the Office button and then click Word Options   The Word Options dialog box opens   2  Click the Advanced tab   The Advanced options appear     3  Scroll down to the General section and then click the File Locations  button     The File Locations dialog box appears  as shown in Figure 3 11   4  Double click the Workgroup Templates item     This step opens a dialog box that lets you browse to the location of your  template files     5  Browse to the template files and then click OK     You return to the File Locations dialog box     Figure 3 11   Setting the  file loca   tions in  Word 2007     Chapter 3  More Ways to Use Your Network 5 7                            File Locations Lo   File Locations    Fie types  Location   ocuments C  Users  diowe Documents  Clipart pictures  User templates C      Roaming  Microsoft Templates  Workgroup templates   LSERVERO1 Templates   AutoRecover files C      Roaming Microsott Word  Tools C     Wecrosoft Office  ffice 12  Startup C2     Waerosoft Word s1 AR TL         loa  flae                 6  Click OK to dismiss the File Locati
425. r a small network can be had for under   100  Routers suitable for larger networks will  naturally  cost a bit more     Because all communications between your network and the Internet must  go through the router  the router is a natural place to provide the security  measures necessary to keep your network safe from the many perils of the  Internet  As a result  a router used for Internet connections often doubles as  a firewall  as described in the section    Using a firewall     later in this chapter       SS Part Ill  Getting Connected       Securing Vour Connection with a Firewall     NG   on    If your network is connected to the Internet  a whole host of security issues  bubble to the surface  You probably connected your network to the Internet  so that your network   s users could get out to the Internet  Unfortunately   however  your Internet connection is a two way street  It not only enables  your network   s users to step outside the bounds of your network to access  the Internet  but it also enables others to step in and access your network     And step in they will  The world is filled with hackers who are looking for  networks like yours to break into  They may do it just for the fun of it  or they  may do it to steal your customers    credit card numbers or to coerce your  mail server into sending thousands of spam messages on behalf of the bad  guys  Whatever their motive  rest assured that your network will be broken  into if you leave it unprotected     Usi
426. r how to config   ure Windows Server 2008 to operate as a file server     Understanding Network Storage    Many network servers exist solely for the purpose of making disk space avail   able to network users  As networks grow to support more users and as users   require more disk space  network administrators are continually finding ways  to add more storage to their networks  The following sections describe some   key concepts for providing network storage     File servers    A file server is simply a network server whose primary role is to share its disk  drives  It   s the most common way to provide shared network storage     A file server can be anything from a simple desktop computer that has been  pressed into service as a file server to an expensive   25 000 or more  server  with redundant components so that the server can continue to run when a  component fails  A file server can even consist of advanced disk subsystems  with racks of disk drives that can be replaced without shutting down the  server     260 Part IV  Network Management For Dummies       One of the most common advanced disk subsystems for file servers is RAID   or Redundant Array of Inexpensive Disks  A RAID system  which is a type of  disk storage that hardly ever fails  works by lumping together several disk  drives and treating them as though they   re a single humongous drive  RAID  uses some fancy techniques devised by computer nerds at Berkeley  These  techniques ensure that if one of the disk dr
427. r it before they finally gave up and admit   ted failure     Here   s the procedure to reset the password for a user domain account     1  Log on as an administrator     You must have administrator privileges in order to perform this  procedure     2  Choose Start gt Administrative Tools   Active Directory Users and  Computers     The Active Directory Users and Computers management console  appears     3  Click Users in the console tree     4  In the Details pane  right click the user who forgot his password and  choose Reset Password     5  Type the new password in both password boxes     You have to type the password twice to ensure that you type it correctly     254 Part IV  Network Management For Dummies       6   Optional  Select the User Must Change Password at Next Logon  option     If you select this option  the password that you assign will work for only  one logon  As soon as the user logs on  he   ll be required to change the  password     7  Click OK     That   s all there is to it  The user   s password is now reset     Disabling and Enabling User Accounts    If you want to temporarily prevent a user from accessing the network  you  can disable her account  Then you can enable the account later  when you   re  ready to restore the user to full access  Here   s the procedure   1  Log on as an administrator   You must have administrator privileges to perform this procedure     2  Choose Start gt Administrative Tools   Active Directory Users and  Computers     The A
428. r on my home network  You can combine the host name with  the domain name to get the complete DNS name for each of my network   s  hosts  For example  the complete DNS name for my server is server1   LoweWriter com  Likewise  my printer is printerl  LoweWriter com     Here are a few additional details that you need to remember about DNS  names     DNS names aren t case sensitive  As a result  LoweWriter and   Lowewriter are treated as the same name  as are LOWEWRITER    LOWEwriter  and LoWeWrItEr  When you use a domain name  you can  use Capitalization to make the name easier to read  but DNS ignores the  difference between capital and lowercase letters    1  The name of each DNS node can be up to 63 characters long  not includ   ing the dot  and can include letters  numbers  and hyphens  No other  special characters are allowed    A subdomain is a domain that   s beneath an existing domain  For exam   ple  the com domain is a subdomain of the root domain  Likewise   LoweWriter is a subdomain of the com domain        Chapter 6  Dealing with TCP IP   2 7    ar 1  DNS is a hierarchical naming system that   s similar to the hierarchical  folder system used by Windows  However  one crucial difference exists  between DNS and the Windows naming convention  When you construct  a complete DNS name  you start at the bottom of the tree and work your  way up to the root  Thus  doug is the lowest node in the name doug   LoweWriter com  In contrast  Windows paths are the opposite  They  s
429. ransport Layer    The Transport Layer is the basic layer at which one network computer commu   nicates with another network computer  The Transport Layer is where you ll  find one of the most popular networking protocols  TCP  The main purpose of  the Transport Layer is to ensure that packets move over the network reliably    Chapter 30  Layers of the OSI Model 399       and without errors  The Transport Layer does this by establishing connections  between network devices  acknowledging the receipt of packets  and resending  packets that aren   t received or are corrupted when they arrive     In many cases  the Transport Layer protocol divides large messages into smaller  packets that can be sent over the network efficiently  The Transport Layer proto   col reassembles the message on the receiving end  making sure that all packets  contained in a single transmission are received and no data is lost     Layer ha  The Lemon Pudding Layer    The Lemon Pudding Layer is squeezed in between the rather dry and taste   less Transport and Session Layers to add flavor and moistness     Layer 5  The Session Layer    The Session Layer establishes sessions  instances of communication and data  exchange  between network nodes  A session must be established before  data can be transmitted over the network  The Session Layer makes sure that  these sessions are properly established and maintained     Layer 6  The Presentation Layer    The Presentation Layer is responsible for converting the d
430. rces as though you were  locally connected to the network     Using Outlook Web Access    Most people who connect to their office networks from home really just  need their e mail  If the only reason for accessing the office network is to get  e mail  Outlook Web Access is a simple  easy tool     Outlook Web Access  OWA  is a Microsoft Exchange Server feature that can  access your company e mail from any computer that has an Internet    230 Part Ill  Getting Connected       Figure 15 1   OWA looks  a lot like  Outlook           connection  The remote computer just needs a Web browser and an  Internet connection  no VPN or other special configuration is required     The best part is that you don   t have to do anything special to enable OWA   it   s enabled by default when you install Microsoft Exchange  Although you  can configure plenty of options to improve its use  OWA is functional right  out of the box     To access OWA from any Web browser  just browse to the address that   s des   ignated for your organization   s OWA  The default address is the DNS name of  your mail server  followed by  exchange  For example  for the mail server  smtp  lowewriter com  the OWA address is smtp  lowewriter com   exchange     The connection must use the secure version of the normal HTTP Web protocol   You must type https    before the OWA address  The complete address will be  something like https    smtp lowewriter com exchange     When you browse to your OWA address  you   re prompted 
431. rd drive can be shared  it isn   t commonly done  Instead   individual folders are shared  The administrator can control which users are  allowed to access each shared folder     Chapter 7  Setting Up a Server 133    Because file sharing is the reason many network servers exist  network oper   ating systems have more sophisticated disk management features than are  found in desktop operating systems  For example  most network operating  systems can manage two or more hard drives as though they were a single  drive  In addition  most can create a mirror     an automatic backup copy of a  drive     on a second drive     Multitasking    Only one user at a time uses a desktop computer  however  multiple users  simultaneously use server computers  As a result  a network operating  system must provide support for multiple users who access the server  remotely via the network     At the heart of multiuser support is multitasking     a technique that slices  processing time microthin and juggles the pieces lightning fast among run   ning programs  It   s how an operating system can execute more than one  program  a fask or a process  at a time  Multitasking operating systems are  like the guy who used to spin plates balanced on sticks on the old Ed Sullivan  Show  He   d run from plate to plate  trying to keep them all spinning so that  they wouldn   t fall off the sticks  To make it challenging  he   d do it blindfolded  or riding on a unicycle  Substitute programs for the plates an
432. rdware Resources   Components  or Software Environment   If you want  you can print this infor   mation and include it with your network notes            Pix Saia  File Edit View Help   y y Item     Hardware Resources OS Name      Camponents Version   D Software Cnvironment Other OS Description  OS Manufacturer  System Name  System Manufacturer  System Model  System Type  Processor  BIOS Version Date  SMBIOS Version  Windows Directory  System Directory  Boot Device        Find what   Search selected category only          Value   Microsoft Windows 7 Ultimate   6 1 7100 Build 7100   Not Available   Microsoft Corporation   WIN    VMware  Inc    VMware Virtual Platform   X86 based PC   Intel R  Pentium R  4 CPU 3 00GHz  299   Phoenix Technologies LTD 6 00  4 17 2   2 31   C  Windows   C  Windows system32    Device larddiskVolume1 X  r    Find Cluse Find    Search category names only    Chapter 4  Planning Your Network 69    To Dedicate  or Not to Dedicate   That Is the Question    One of the most basic questions that a network plan must answer is whether  the network will have one or more dedicated servers or whether it will rely  completely on peer to peer networking  with no single computer acting as a  dedicated server  If the only reason for purchasing your network is to share a  printer and exchange an occasional file  you may not need a dedicated server  computer  In that case  you can create a peer to peer network by using the  computers you already have  However  all but
433. re 3 2   The  Network   and Sharing  Center   SSS    E  Figure 3 3   Activating   the file shar    ing feature    M           t gt o  5    Network and Internet    Network and Sharing Center X    s    Search Control Panet o           Gv     l Panel Hi i i j j  oetik Panel ani View your basic network information and set up connections    Change adapter settings A Jo te See full map    Seat ard etait WKO9 001 lowewnter com Internet  settin  s  ss  This computer   View your active networks Connect or disconnect  lowewriter com Access type  Internet  Domain network Connections     Local Area Connection  Change your networking settings  Set up a new connection or network  Set up a wireless  broadband  dial up  ad hoc  or VPN connection  or set up a router or access  point   Connect to a network  Connect or reconnect to a wireless  wired  dial up  or VPN network connection   Choose homegroup end sharing options  Access tiles and printers located on other network computers  or change sharing settings   See also Troubleshoot problems  HomeGroup Diaynose and repair network problems  of get troubleshooting information   Internet Options    Windows Firewall              gt  Control Panel    Network and Sharing Center  Network and Sharing Center    A     F    WwKo7 001 office lowewniter com   This computer     Vrew full map    ES olficeJowewriter com  Domain network  Customize  Access Local and Internet  Connection Local Area Connection     B Sharing and Discovery  Network discovery    On
434. re 6 1  in which  the network ID consists of the 16 bit network ID plus an additional 4 bit  subnet ID  would look like this     WAIL LALLA iL ILA OOOO COOCMOOOC    In other words  the first 20 bits are ones  the remaining 12 bits are zeros   Thus  the complete network ID is 20 bits in length  and the actual host ID por   tion of the subnetted address is 12 bits in length     To determine the network ID of an IP address  the router must have both  the IP address and the subnet mask  The router then performs a bitwise  operation called a logical AND on the IP address to extract the network ID   To perform a logical AND  each bit in the IP address is compared to the cor   responding bit in the subnet mask  If both bits are 1  the resulting bit in the  network ID is set to 1  If either of the bits is 0  the resulting bit is set to 0     For example  here   s how the network address is extracted from an IP address  using the 20 bit subnet mask from the previous example     144   AS  le 17y  IP address  10010000 00011100 00100000 00001001  Subnet mask  11111111 11111111 11110000 00000000  Network ID  10010000 00011100 00100000 00000000  144   AS    E s 0          Thus  the network ID for this subnet is 144 28 16 0     Chapter 6  Dealing with TCP IP    The subnet mask itself is usually represented in dotted decimal notation  As  a result  the 20 bit subnet mask used in the previous example would be repre   sented as 255 255 240 0     SuUbnercimask IAAL ALL LALLA LAE LL ae  LLL aL a
435. responsible  trustwor   thy network manager  They don   t give out merit badges for this stuff  but  they should     Backing Up Vour Data    EMBER  D    Having data backed up is the cornerstone of any disaster recovery plan   Without backups  a simple hard drive failure can set your company back  days or even weeks while it tries to reconstruct lost data  In fact  without  backups  your company   s very existence is in jeopardy     The main goal of backups is simple  Keep a spare copy of your network   s  critical data so that  no matter what happens  you never lose more than one  day   s work  The stock market may crash  hanging chads may factor into  another presidential election  and George Lucas may decide to make a pre   prequel  However  you never lose more than one day   s work if you stay on  top of your backups     3   0 Part V  Protecting Your Network       The way to do this  naturally  is to make sure that data is backed up ona  daily basis  In many networks  it   s feasible to back up all the network hard  drives every night  However  even if full nightly backups aren   t possible  you  can still use techniques that can ensure that every file on the network has a  backup copy that   s no more than one day old     All about Tapes and Tape Drives    ar    If you plan on backing up the data on your network server   s hard drives  you  need something to back up the data to  You can copy the data onto CDs  but   a 500GB hard drive would need more than 750 CDs to do a 
436. rk drive often       Click OK     You return to the Computer folder  as shown in Figure 2 7  Here  you can  see the newly mapped network drive     A  Figure 2 7   The  Computer  folder  shows a  mapped net   work drive   e     Chapter 2  Life on the Network 33       fa    loes  GO  W    Computer    X       Search Computer p   Organize v Properties System properties Uninstall or change a program Map network drive    a   Of     Tr Favorites 4 Hard Disk Drives  1   EE Desktop Local Disk  C    J   Downloads _    90 GH free of 158 GB  E  Recent Places    4 Devices with Removable Storage  2     Dy Libraries   M  CD Drive  D    D Docuit    al Floppy Disk Drive  A     GRCLCULFRER_EN_DVD        0 bytes free of 235 GB    Music  be Pictures 4 Network Location  1   E Videos   Project    SERVERO1   Z    Sf       243 GB free of 31 9 GB  j  Computer  Ge Network  Project    SERVERO1   Z   Space used  Sl Total size  31 9 GB  Network Drive Space free  24 3 GB File systern  NTFS       Your network administrator may have already set up your computer with one  or more mapped network drives  If so  you can ask her to tell you which net   work drives have been mapped  Or  you can just open the Computer folder   My Computer on Windows XP  and have a look     Here are a few additional tips     If you   re using Windows XP  the procedure for mapping a network  drive is similar to the one for Windows Vista  Start by opening My  Computer and choosing Tools   Map Network Drive  Then follow the pre   cedi
437. rkgroup can use disk space on a file server to store their Microsoft Office  documents     10    Part Il  Building Your Own Network       File servers must ensure that two users don   t try to update the same file at  the same time  The file servers do this by locking a file while a user updates  the file so that other users can   t access the file until the first user finishes   For document files  for example  word processing or spreadsheet files   the  whole file is locked  For database files  the lock can be applied just to the por   tion of the file that contains the record or records being updated     Print servers    Sharing printers is one of the main reasons that many small networks exist   Although it isn   t often necessary to do so  you can dedicate a server com   puter for use as a print server  whose sole purpose is to collect information  being sent to a shared printer by client computers and print it in an orderly  fashion     A single computer may double as both a file server and a print server   but performance is better if you use separate print and file server  computers     1  With an inexpensive inkjet printer running about  100 or less  just giving  each user his own printer is tempting  However  you get what you pay  for  Rather than buy a cheap inkjet printer for each user  you may be  better off buying one good laser printer and sharing it     Web servers    A Web server is a server computer that runs software that enables the  computer to host an In
438. rmance Anxiety 2 19       that the tapered shape of a bottle of Jolt cola limited the rate at which they could  consume the beverage     Hey     a computer geek said one day     the gently tapered  narrowness of this bottle   s neck imposes a distinct limiting effect upon the rate  at which I can consume the tasty caffeine laden beverage contained within  This  observation draws to mind a hitherto undiscovered yet obvious analogy to the  limiting effect that a single slow component of a computer system can have upon  the performance of the system as a whole           Fascinating     replied all the other computer geeks  who were fortunate  enough to be present at that historic moment     The term stuck and is used to this day to draw attention to the simple fact  that a computer system is only as fast as its slowest component  It   s the  computer equivalent of the old truism that a chain is only as strong as its  weakest link     For a simple demonstration of this concept  consider what happens when you  print a word processing document on a slow printer  Your word processing  program reads the data from disk and sends it to the printer  Then you sit  and wait while the printer prints the document     Would buying a faster CPU or adding more memory make the document   print faster  No  The CPU is already much faster than the printer  and your  computer already has more than enough memory to print the document  The  printer itself is the bottleneck  so the only way to print t
439. rnet server  See  www slackware com for more information     All distributions of Linux include the same core components     the Linux kernel   an X server  popular windows managers  such as GNOME and KDE   compilers   and Internet programs  such as Apache and Sendmail   However  not all Linux  distributions are created equal  The manufacturer of each distribution creates its  own installation and configuration programs to install and configure Linux     The installation program is what makes or breaks a Linux distribution  All  the distributions I list in this section have easy to use installation programs  that automatically detect the hardware present on your computer and con   figure Linux to work with that hardware  eliminating most  if not all  manual    Chapter 25  Networking with Linux 355       configuration chores  The installation programs also let you select the Linux  packages you want to install and let you set up one or more user accounts  besides the root account     Installing Linux    ar    ar    All the Linux distributions I describe in the section     Choosing a Linux  Distribution     earlier in this chapter  include an installation program that  simplifies the task of installing Linux on your computer  The installation pro   gram asks you a series of questions about your hardware  what components  of Linux you want to install  and how you want to configure certain features   Then it copies the appropriate files to your hard drive and configures your  Lin
440. rol     The network administrator doesn   t have to be a technical genius  In fact   some of the best network administrators are complete idiots when it comes  to technical stuff  What   s important is that the administrator is organized   That person   s job is to make sure that plenty of space is available on the file  server  that the file server is backed up regularly  that new employees can  access the network  and other tasks     The network administrator   s job also includes solving basic problems that  the users themselves can   t solve     and knowing when to call in an expert  when something really bad happens  It   s a tough job  but somebody   s got to  do it  Here are a few tips that might help     Part IV of this book is devoted entirely to the hapless network adminis   trator  So  if you   re nominated  read the chapters in that part  If you   re  lucky enough that someone else is nominated  celebrate by buying her a  copy of this book     In small companies  picking the network administrator by drawing  straws is common  The person who draws the shortest straw loses and  becomes administrator     1  Of course  the network administrator can   t be a complete technical idiot   I was lying about that   For those of you in Congress  the word is testify   ing     exaggerated to make the point that organizational skills are more  important than technical skills  The network administrator needs to  know how to do various maintenance tasks  Although this knowledge  r
441. roperties  dialog box  for a hard  drive shows  the drive s  total capac   ity and the  amount of  free space  available on  the drive   PC    ss  Figure 4 2   The System  window for  a computer  running  Windows 7  with 2GB   of RAM   TE    Chapter 4  Planning Your Network    1     Which software is used on the computer  Microsoft Office  QuickBooks   AutoCAD  Make a complete list and include version numbers                          Type Local Disk  File system    NTFS    Drive        I  Compress this drive to save disk space    IF  Allow files on this drive to have content   file properties              Ey Used space  74771001124 bytes BGE  E Sree space  9 000 909 12 bytes 0 94 GD  Capacity  17 072 910 335 byles 15 8 GB    Disk Cleanup    s indexed in adcition to              aK  tonat                Control Panel Home           Device Manager    3 Remote settings      System protection     Advanced system settings    See alco  Action Center  Windows Update    Performance Information and  Tools          Control Panel    System and Security    System       View basic information about your computer    Windows edition  Windows 7 Ultimate  Copyright    2009 Microsoft Corporation  All rights reserved     System  Rating  0   Windows Experience Index  Processor Intel R  Pentium R  4 CPU 4 00GH7 3 00 GHz  Installed memory  RAM   2 00 GB  System type  32 bit Operating System  Pen and Touch  No Pen or Touch Input is available tor this Display    Computer name  domain  and workgroup 
442. roperties dialog box  Adjust  the settings and then click OK     The TCP IP Properties dialog box  as shown in Figure 8 4  lets you  choose from these options     e Obtain an IP Address Automatically  Choose this option if your  network has a DHCP server that assigns IP addresses automati   cally  Choosing this option drastically simplifies the administering  of TCP IP on your network   See Chapter 6 for more information  about DHCP      Use the Following IP Address  If your computer must have a specific  IP address  choose this option and then type the computer   s IP  address  subnet mask  and default gateway address   For more  information about these settings  see Chapter 6      Obtain DNS Server Address Automatically  The DHCP server can also  provide the address of the Domain Name System  DNS  server that  the computer should use  Choose this option if your network has a  DHCP server   See Chapter 6 for more information about DNS      155      56 Partit  Building Your Own Network    aay  Figure 8 4   Configuring  TCP IP   Ee       e Use the Following DNS Server Addresses  Choose this option if a DNS  server isn   t available  Then type the IP address of the primary and  secondary DNS servers         internet Protocol  CPAP  Properties wey  General   Atemate Configuration  You can get IP settings assigned aitomaticaly it your network supports    this capability  Otherwise  you need to ask your network administrator for  the appropriate IP settings           Dbtoin an IP 
443. router and you can   t remember the IP address  run the IP  CONFIG command at a command prompt from any computer on the network   The default gateway IP address should be the IP address of the access point     Basic configuration options    Figure 9 4 shows the main configuration screen for a typical wireless access  point router  I called up this configuration page by entering 192 168 1 1  in the address bar of a Web browser and then supplying the logon password  when I was prompted     This configuration page offers the following configuration options that are  related to the wireless access point functions of the device  Although these  options are specific to this particular device  most access points have similar  configuration options      Enable Disable  Enables or disables the device   s wireless access point  functions     1  SSID  The Service Set Identifier used to identify the network  Most  access points have well known defaults     You can talk yourself into thinking that your network is more secure  by changing the SSID from the default to something more obscure  but  in reality that protects you only from first grade hackers  By the time  most hackers get into the second grade  they know that even the most  obscure SSID is easy to get around  I recommend that you leave the  SSID at the default and apply better security measures  as described in  Chapter 10        178 Partit  Building Your Own Network       o   5   Le       hepp 1192 168 1 1    Windows Internet 
444. rs and other devices on your network  This is where  the concept of logical addressing comes in  a logical address gives a network  device a place where it can be accessed on the network     using an address  that you assign     Logical addresses are created and used by Network Layer protocols  such as   IP or IPX  The Network Layer protocol translates logical addresses to MAC  addresses  For example  if you use IP as the Network Layer protocol  devices on  the network are assigned IP addresses  such as 207 120 67 30  Because the IP pro   tocol must use a Data Link Layer protocol to actually send packets to devices    IP must know how to translate the IP address of a device into the correct MAC  address for the device  You can use the ipconfig command to see the IP  address of your computer  The IP address shown in that figure is 192 168 1 100     Another important function of the Network layer is routing     finding an  appropriate path through the network  Routing comes into play when a  computer on one network needs to send a packet to a computer on another  network  In this case  a Network Layer device called a router forwards the  packet to the destination network  An important feature of routers is that  they can be used to connect networks that use different Layer 2 protocols   For example  a router can be used to connect a local area network that uses  Ethernet to a wide area network that runs on a different set of low level pro   tocols  such as T1     Layer 4  The T
445. rs lel x   Action View Help  ep Alm FORKED cslibRiSearae  Active Directory Users and Comput   Name Type Description l  E D  Saved Queries SB  Account Ope    Security Group    Members can administer d     E Fj LoweWriter pri Rauminisuators Seusity Group    Admin  strators have compl     ag uit     R  Backup Oper    Security Group    Backup Operators can ov     ic GR Certificate S    Security Group    Members of this group are     Ss Sa teen Contes SR  cryptographi    Secunty Group     Members are authorized t     a   PEA   R bismibuted C    seaunty Group    Members are allowed to la     i z K   Fvent log Re    Searity Group     Members of this group ca      amp   Guests Senrity Group    Guests have the same arr     Sns_tusrs Security Group     Built in group used by Int     BR  Incoming For    Security Group     Members of this group ca     SR  Network Con    Security Group     Members in thie group can     BR Performance     Security Group     Members of this group ma     BR  Performance     Security Group     Members of this group ca     BR  Pre Windows    Security Group    A backward compatibility      B2  Print Operators Security Group     Members can administer d     BW Remote Desk    Seusity Group    Members in this group are     BR Repicator Seusily Group    Supports file replication in      BA server Oper    Security Group    Members can administer d         Terminal Ser    Security Group    Members of this group ca     a S    users seasity Group     Users are prevente
446. rt     venies e        Z   internet   Protected Mode  On Rix  gt     SS    Using a Virtual Private Network    The term virtual private network  or VPN  refers to several different types of  secure forms of Internet communication  In this chapter  a VPN is a secure  channel between a remote computer and a local network  This type of VPN  enables you to log on to your company network from your home computer   Then you can access any resource on your company network as though    232 Part Ill  Getting Connected          you were using a computer that   s physically connected to the company net   work  In other words  the VPN extends the reach of the company network to  include your home computer     The security mechanism that makes this magic work is the Internet protocol  known as IPSec  The details of how IPSec works are way beyond the scope   of this humble little book  Suffice it to say that IPSec encrypts all the Internet  traffic related to the VPN  This encryption effectively creates a secret tunnel  between the office network and your home computer  Thus  the VPN connec   tion is secure     Although the VPN connection itself is secure  the computer that the VPN con   nects to may not be  Using a VPN with your home computer is analogous to  taking your computer to work and plugging it in to the network  If your com   puter is already infected with a virus  you run the very real risk of letting that  virus loose on your corporate network  As a result  you must be certain t
447. rtitions and indicate the mount point for each partition   For  more information about disk partitions  see the sidebar     I can   t see my  C drive      earlier in this chapter      356    Part VI  Beyond Windows       ar Linux is happy to share your hard drive with another operating system   such as Windows  However  you may have to repartition your disk to  install Linux without erasing your existing operating system  If you need  to repartition your hard drive  I recommend you pick up a copy of  PowerQuest   s PartitionMagic  www  symantec com norton partition  magic  or a similar partitioning program  which will allow you to juggle  your partitions without losing your existing operating system     Decide which optional Linux packages to install along with the  Linux kernel     ay  e If you have enough drive space  install all the packages that come  with your distribution  That way  if you decide you need to use a  package  you won t have to figure out how to install the package  outside of the installation program     e If you   re tight on space  make sure that you at least install the  basic network and Internet server packages  including Apache   Sendmail  FTP  and Samba     Set the password for the root account     In most distributions  you choose whether to create at least one user  account     ay  Create at least one user account during installation so you can log on to  Linux as a user  not with the root account   As a user  you can experi   ment with Linux com
448. run cable across the floor where people walk  cover the  cable so no one trips over it  Cable protectors are available at most  hardware stores     When running cables through walls  label each cable at both ends  Most  electrical supply stores carry pads of cable labels that are perfect for  the job  These pads contain 50 sheets or so of precut labels with letters  and numbers  They look much more professional than wrapping a loop  of masking tape around the cable and writing on the tape with a marker     Alternatively  you can just write directly on the label with a permanent  marker     Chapter 5  Cables  Adapters  and Other Stuff 8 7    ar If you   re installing cable in new construction  label each end of the cable  at least three times  leaving about a foot of space between the labels   The drywallers or painters will probably spray mud or paint all over  your cables  making the labels difficult to find     1    When several cables come together  tie them with plastic cable ties   Avoid masking tape if you can  the tape doesn   t last  but the sticky glue  stuff does  It   s a mess a year later  Cable ties are available at electrical  supply stores     ay  Cable ties have all sorts of useful purposes  Once  on a backpacking trip   I used a pair of cable ties to attach an unsuspecting buddy   s hat toa  high tree limb  He wasn   t impressed with my innovative use of the cable  ties  but my other hiking companions were     1    When you run cable above suspended ceiling p
449. runs in      Open a command shell directly in GNOME by choosing Main Menu  System ToolsTerminal  This opens a command shell in a window on  the GNOME desktop  as shown in Figure 25 3  Because this shell runs  within the user account GNOME is logged in as  you don   t have to log  on  You just start typing commands  When you   re done  type Exit to  close the window     Doug localhost      File Edit View Terminal Tabs Help   Doug localhost     F    Figure 25 3   Using a  Terminal  window to  run Linux  commands        Managing User Accounts    One of the most common network administration tasks is adding a user  account  The Setup program may create a single user account for you when  you first install Linux  But you ll probably need to create more Linux user  accounts     Chapter 25  Networking with Linux 36         Each Linux user account has the following information associated with it     1     Username  The name the user types to log on to the Linux system   Full name  The user   s full name     Home directory  The directory in which the user will be placed when  he or she logs in  In Fedora Linux  the default home directory is  home   username  For example  if the username is blowe  the home directory is   home blowe     Shell  The program used to process Linux commands  Several shell  programs are available  In most distributions  the default shell is  bin   bash     Group  You can create group accounts  which make it easy to apply  identical access rights to groups of 
450. rver side indudes   i  E  Health and Diagnostics   V  HTTP Logana      Logaing Tools   V  Request Monitor  C Trading  Custom Logging       08   Loagna zi           Chapter 12  Creating an Intranet 20 7             208 Part Ill  Getting Connected       are       A Webless intranet    The correct way to set up a proper intranet  is to set up a Windows based server running  IIS or a Linux based server running Apache  or some other Web server  However  you can  create a rudimentary intranet without going to  the trouble of setting up an actual Web server   Here   s how     1  Setup a share on a file server that will hold  the HTML files that make up your intranet     2  Create an HTML file for the home page of  your intranet and save the file in the loca   tion you create in Step 1       recommend that you name it index   html     3  Create any other HTML files that your  intranet needs     The index html  file should include links  to these pages     4  Point your Web browser to the index   htm1 file at the shared network location     For example  if the server is named  iserver and the share is named  intranet  enter this information into  your browser s address box   Viserver   intranet index html  Voil        you have an  instant intranet without the fuss of a Web  server     This rudimentary intranet works without a Web  server because a Web browser can display  HTML files directly  without the need for a Web  server  However  without a Web server  your  intranet is limited 
451. s     1  If your network has an OS X Server  you can use the Windows client soft     ware that comes with OS X Server to connect any version of Windows to  the server  Doing so enables Windows users to access the files and  printers on the Macintosh server     3 76 Part VI  Beyond Windows    ING   s    ar       The server versions of Windows include a feature called Services for  Macintosh that allows Macintosh computers to access files and printers  managed by the Windows servers without installing special client  software on the Macintosh computers     If you use NetWare  you must purchase separate NetWare client software  for your Macintosh computers  After you install this client software  the  Macs can access files and printers managed by your NetWare servers     The biggest complication that occurs when you mix Macintosh and Windows  computers on the same network is that the Mac OS and Windows have slightly  different rules for naming files  For example     Macintosh filenames are limited to 31 characters  but Windows file   names can be up to 255 characters     Although a Macintosh filename can include any characters other than  a colon  Windows filenames can   t include backslashes  greater than or  less than signs  and a few other oddball characters     The best way to avoid filename problems is to stick with short names  under 31  characters  and limit your filenames to letters  numbers  and common symbols   such as the hyphen or pound sign   Although you can transl
452. s  These addresses aren   t  assigned to clients   For more information  see the section     Feeling  excluded      later in this chapter      One or more reserved addresses  These addresses are always assigned  to particular host devices   For more information  see the section      Reservations suggested     later in this chapter      1    The lease duration  which indicates how long the host is allowed to use  the IP address  The client attempts to renew the lease when half of the  lease duration has elapsed  For example  if you specify a lease duration  of eight days  the client attempts to renew the lease after four days have  passed  The host then has plenty of time to renew the lease before the  address is reassigned to some other host     120 Part it  Building Your Own Network    ar       The router address for the subnet   This value is also known as the default gateway address     The domain name and the IP address of the network   s DNS servers and  WINS servers     Feeling excluded     Everyone feels excluded once in a while  With a wife and three daughters  I  know how that feels  Sometimes  however  being excluded is a good thing    In the case of DHCP scopes  exclusions can help you to prevent IP address  conflicts and can enable you to divide the DHCP workload for a single subnet  among two or more DHCP servers     An exclusion is a range of addresses not included in a scope but falling within  the range of the scope   s starting and ending addresses  In effect
453. s  c c escesscsesns essdedecaveevsneseseeedeevanasceseneeaneeveee 363  Doing th   Samba  Dance  c  e2s  scvcssaderscseacessdes cguecea r AE Ene EE rI Erast 365  Understanding Sam D  ri oriin EERE RS ASEE EENE 365  Installing Samba sisien a a a n es 366  Starting and stopping Samba          ccceccecsseescesseesseeseceseeeseeeeeesseesees 367  Using the Samba Server Configuration toOl           cccccseeseeseeeteeeees 368  Chapter 26  Macintosh Networking                    00eee eee 371  What You Need to Know to Hook Up a Macintosh Network                   371  Mac networking protocols ss  cise   sciccciiiestssetiedscetaescseas ecascdeoscatienscavae 371   Mac OS X Servet seiorn oeeo sieeaisactuiveseecvtelexevavisxecteictens 372  What You Need to Know to Use a Macintosh Network         ce eeeeeeeees 372  Configuring a Mac for networking             cecceceeseeseeseeeeeeeeeeeeeeeseeseens 373  ACCeSSing a NetWork PViNteN eis  ce  stevescsocssiccdseeseseseeeseieeveessnciecteceree   s 374  Sharing files with other US   YS            c ccscssccssesseeseeeeeceeeeeceseeeeeseeaeens 374  Accessing shared files i  3 ciescscseteseiticatetcseavteneseeteons eticssceseavtaeseavs 375  What You Need to Know to Network Macintoshes with PCs                  375    Part VII  The Part of Tens    ccccccccccccccccssctscccseeccseccseece 377    Chapter 27  More Than Ten Big Network Mistakes                379  SKIMPIN GON CADIS miraire ae aaee E E E a EE EEEIEE ERAS 380  Turning Off or Restarting a Ser
454. s  select the Windows File Server group  which installs the Samba  packages for you     One sure way to render a Samba installation absolutely useless is to enable the  default Linux firewall settings on the computer that runs Samba  The Linux  firewall is designed to prevent users from accessing network services  such  as Samba  It   s designed to be used between the Internet and your local net   work  not between Samba and your local network  Although it   s possible to  configure the firewall to allow access to Samba only to your Internal network   a much better option is to run the firewall on a separate computer  That way  the firewall computer can concentrate on being a firewall  and the file server  computer can concentrate on serving up files     Starting and stopping Samba  Before you can use Samba  you must start its two daemons  smbd and nmbd   Both can be started at once by starting the smb service   Daemon is a Linux  term that   s equivalent to a Windows service   From a command shell  use this  command    service smb start  Whenever you make a configuration change  such as adding a new share or  a creating a new Samba user  you should stop and restart the service with  these commands    service smb restart    If you prefer  you can stop and start the service with separate commands     service smb stop  service smb start    If you   re not sure that Samba is running  enter this command   service smb status    You ll get a message indicating whether the smbd and 
455. s Networking   13       ANG   O To install this type of card  you need to take your computer apart  so    use this type of card only if you have the expertise and the nerves to dig  into your computer   s guts     1  A wireless USB adapter is a separate box that plugs into a USB port on  your computer  Because the USB adapter is a separate device  it takes  up extra desk space  However  you can install it without taking apart  your computer     1  A wireless PC card is designed to slide into the PC card slot found in    MBER  RY most notebook computers   x    This card is the type to get if you want to network your notebook     You can purchase a combination 802 11b g PCI adapter for under  50  USB  versions cost about  10 more     ay  At first  you may think that wireless network adapters are prohibitively  expensive  After all  you can buy a regular Ethernet adapter for as little as  20   However  when you consider that you don   t have to purchase and install cable  to use a wireless adapter  the price of wireless networking becomes more pal   atable  And  if you shop around  you can sometimes find wireless adapters for  as little as  19 95     Wireless Access Points    Unlike cabled networks  wireless networks don   t need a hub or switch  If all  you want to do is network a group of wireless computers  you just purchase  a wireless adapter for each computer  put them all within 300 feet of each  other  and voila      instant network     What if you already have an existi
456. s Web serv   ers or e mail servers  Linux can also be used as a firewall or as a file and print  server on your local area network     Linux was created in 1991 by Linus Torvalds  who was at the time an under   graduate student at the University of Helsinki in Finland  Linus thought it   d be  fun to create his own operating system based on Unix for his brand new PC   In the nearly two decades since Linux was first conceived  Linux has become  a full featured operating system that is fast and reliable     This chapter shows the basics of setting up a Linux server on your network  and using it as a file server  as a Web server for the Internet or an intranet  as  an e mail server  and as a router and firewall to help connect your network to  the Internet     Linux is a complicated operating system  Understanding how to use it can   be a daunting task  especially if your only prior computer experience is with  Windows  Wiley Publishing  Inc   has For Dummies books that make Linux less  painful  Check out Linux For Dummies  9th Edition  by Richard Blum  Wiley      Comparing Linux with Windows    If your only computer experience is with Windows  you   re in for a steep  learning curve when you first get into Linux  There are many fundamental  differences between the Linux operating system and Windows  Here are some  of the more important differences     352             Part VI  Beyond Windows       1  Linux is a multiuser operating system  Therefore  more than one user  can log o
457. s done  the  tape   s ejected  The whole thing takes about 30 seconds     Because the maintenance requirements of each drive differ  check the drive   s  user   s manual to find out how and how often to clean the drive  As a general  rule  clean the drives once a week     The most annoying aspect of tape drive cleaning is that the cleaning cartridges  have a limited lifespan  Unfortunately  if you insert a used up cleaning car   tridge  the drive accepts it and pretends to clean the drive  For this reason   keep track of the number of times you   ve used the cleaning cartridge and  replace it when you   ve exceeded the number of uses recommended by the  manufacturer     Backup Security    Backups create an often overlooked security exposure for your network  No  matter how carefully you set up user accounts and enforce password policies   if any user  including a guest  can perform a backup of the system  that user  may make an unauthorized backup  In addition  your backup tapes themselves  are vulnerable to theft  As a result  you should make sure that your backup  policies and procedures are secure by taking the following measures     Set up a user account for the user who does backups  Because this user  account has backup permission for the entire server  guard its password  carefully  Anyone who knows the username and password of the backup  account can log on and bypass any security restrictions that you place  on that user   s normal user ID         You can counter pot
458. s double as Ethernet hubs or switches  In that case  the access  point will have more than one RJ 45 port  In addition  some access points  include broadband cable or DSL firewall routers that enable you to connect to  the Internet     An 802 11b wireless access point that lets me connect a notebook com   puter and a computer located on the other side of the house because I  didn   t want to run cable through the attic     A 4port 10 100 MHz switch to which I can connect up to four computers  by using twisted pair cable     1  A DSL cable router that I connect to my cable modem  This enables  all the computers on the network  cabled and wireless  to access the  Internet   w  A multifunction access point that   s designed to serve as an Internet gateway  for home networks sometimes is a residential gateway     Roaming    You can use two or more wireless access points to create a large wireless  network in which computer users can roam from area to area and stay con   nected to the wireless network  As the user moves out of the range of one  access point  another access point automatically picks up the user and takes  over without interrupting the user   s network service     To set up two or more access points for roaming  you must carefully place  the WAPs so that all areas of the office or building that are being networked  are in range of at least one of the WAPs  Then just make sure that all the com   puters and the access points use the same SSID and channel     176 Parti
459. s have better built in network   ing features than older Macintosh computers  The newest Macs include built   in gigabit Ethernet adapters and sophisticated networking support built in   to the operating system     similar to the networking features that come with  Windows  Network support is built in  so you don   t have to fuss with installing  and configuring the network     3 72 Part VI  Beyond Windows       Originally  Macintosh computers used a set of networking protocols collec   tively known as AppleTalk  In the mid 1990   s  AppleTalk was supplanted by a  networking scheme called Open Transport     The current generation of Macintosh computers use industry standard TCP   IP networking  The only protocol left over from the AppleTalk days that is  still in widespread use is AFP  used to enable file sharing  For a brief explana   tion of this protocol  see the sidebar    Who   s winning in the AFP West        Mac OS X Server    Apple offers a dedicated network operating system known as Mac OS   X Server  the X is pronounced    Ten     not    Ex      which is designed for  PowerMac G3 or later computers  Mac OS X Server is based on a Unix  operating system kernel known as Mach  Mac OS X Server can handle many  network server tasks as efficiently as any other network operating system   including Windows 2000  NetWare  and Unix     Mac OS X Server is the server version of the Mac OS X operating system  which  is the current operating system version for client Macintosh com
460. s probably just about as hard to guess  I probably wouldn   t want the folks at  the Los Alamos Nuclear Laboratory using this scheme  but it   s good enough  for most of us     Here are additional thoughts on concocting passwords from your favorite book     If the words end up being the same  pick another word  And pick  different words if the combination seems too commonplace  such  as WestWind or FootBall     For an interesting variation  insert a couple of numerals or special char   acters between the words  You end up with passwords like into cat   bal13 and  or tree47wing  If you want  use the page number of the  second word as a separator  For example  if the words are know and  click and the second word comes from page 435  use know435click     To further confuse your friends and enemies  use medieval passwords by  picking words from Chaucer   s Canterbury Tales  Chaucer is a great source  for passwords because he lived before the days of word processors with  spell checkers  He wrote seyd instead of said  gret instead of great  welk  instead of walked  litel instead of little  And he used lots of seven letter  and eight letter words suitable for passwords  such as glofenye  gluttony    benygne  benign   and opynyoun  opinion   And he got A   s in English     If you use any of these password schemes and someone breaks into your  network  don   t blame me  You   re the one who   s too lazy to memorize  D ScSh4 bb3xaz5     If you do decide to go with passwords  such as K
461. s such as contact lists  appointment calendars  and e mail  A  typical PDA has a full  albeit small  QWERTY keyboard and a relatively  large display  PDAs can also have phone capabilities     PocketPC  A PocketPC is a very specific type of handheld that meets  a set of specifications published by Microsoft  PocketPCs use a touch  screen  so they often do not include a separate keyboard  PocketPCs run  the mobile version of Windows  known as Windows Mobile     BlackBerry  BlackBerry devices are sophisticated PDAs made by Research  In Motion  RIM  with cellphone capabilities  The most distinctive feature  of BlackBerrys is their ability to synchronize with Exchange e mail servers  to provide instant access to your corporate e mail  Typically  this synchro   nization requires a special server called BlackBerry Enterprise Server  BES   running on the corporate network  BlackBerry devices use a proprietary  operating system developed by RIM     Chapter 14  Dealing with Mobile Devices 223       iPhone  iPhone devices are made by Apple and  at least for now  oper   ate only with ATT wireless networks  Like a BlackBerry  an iPhone is an  advanced PDA device  However  iPhones have two distinguishing fea   tures that set them apart from other mobile devices  First  they have no  keyboard  Instead  they rely on a touch sensitive screen for input  And  second  the iPhone has a remarkably easy to use interface designed by  the gurus at Apple  who seem to know better than anyone else how t
462. s that are common to most  Windows network operating systems  However  many servers require other  services        296 Part IV  Network Management For Dummies                        File Action View Help   9     cs hm  gt   gt  aun    Sh Services  Local    Services  Local    Select an item to view its descriptinn  Name s Description Status Startup Type LogOnAs      ActiveX Installer      Provides Us   Manual Local Syste     _   lt  Adaptive Brightness Monitors a    Manual Local Service  Gh Application Experi   Processes a   Started Manual Local Syste     Application Identity Determines     Manual Local Service      Application Intor   Facilitates t    Started Manual Local Syste   4  Application Layer    Provides su    Manual Local Service    Application Mana    Processes in    Manuel Local Syste       Background Intelli   Transfers fil    Manual Local Syste          Base Filtering Engi    The Base Fil    Started Automatic Local Service    BitLocker Drive En    BDESVC hos  Manual Local Syste     Sh Block Level Backu    The WBENG    Manual Local Syste        Bluetooth Support    The Bluetoo   Manual Local Service   BranchCache This service w Manual Network S         Certificate Propag    Copies user     Manual Local Syste     s CNG Key kolation The CNG ke  Manual Local Syste    COM  Event Syst    Supports Sy   Started Automatic Local Service  es O COM gt  System Ap    Manages th    Manual Local Syste       Computer Browser Maintains a   Started Manual Local Syste     Figure 20 
463. s this program by  choosing Main Menu   System Settings   Network     Most other Linux distributions have similar programs     Chapter 25  Networking with Linux 363       The Network Configuration program lets you configure the basic TCP IP  settings for a network interface by pointing and clicking your way through  tabbed windows  You can call up this program by choosing System     Administration  Network  Figure 25 5 shows the Network Configuration  program in action     S Network Configuration  fle Profle Help    Q dy  New tdit Copy Activate Deactivate    Devices Hardware DNS Hosts    J4  You may configure network devices associated with  a     physical hardware here  Multiple logical devices can    be associated with a single piece of hardware                 Profile Status Device Nickname Type  n  amp  Inactive W pano pano Ethernet  Figure 25 5   The  Network  Configur   ation  program   m  AC UVE Profile  Common       Notice that the main window of the Network Configuration lists all the network  interfaces installed in your computer  You can select any of the interfaces and  click Edit to bring up a window similar to the one shown in Figure 25 6  This  window lets you set the configuration options for the network interface  such  as its IP address and other TCP IP configuration information     Restarting your network    Whenever you make a configuration change to your network  you must  restart the Linux networking services before the change can take effect  If you  fi
464. s to justify the expense of an entire T1 or T3  line  you can lease just a portion of the line  With a fractional TI line  you can  get connections with speeds of 128 Kbps to 768 Kbps  and with a fractional T3  line  you can choose speeds ranging from 4 6 Mbps to 32 Mbps     Setting up a T1 or T3 connection to the Internet is stuff best left to profes   sionals  Getting this type of connection to work is far more complicated than  setting up a basic LAN  local area network      You may be wondering whether T1 or T3 lines are really any faster than cable   or DSL connections  After all  T1 runs at 1 544 Mbps and T3 runs at 44 184 Mbps   and cable and DSL claim to run at comparable speeds  But there are many dif   ferences that justify the substantial extra cost of a T1 or T3 line  In particular  a  T1 or T3 line is a dedicated line     not shared by any other users  T1 and T3 are  higher quality connections  so you actually get the 1 544 or 44 184 connection  speeds  In contrast  both cable and DSL connections usually run at substantially  less than their advertised maximum speeds because of poor quality connections  and because the connections are often shared with other users     Shaving an Internet connection    After you choose a method to connect to the Internet  you can turn your  attention to setting up the connection so that more than one user on your  network can share it  The best way to do that is by using a separate device  called a router  An inexpensive router fo
465. s writers are constantly developing new viruses   your antivirus software is next to worthless unless you keep it up to date by  downloading the latest updates     The following are several approaches to deploying antivirus protection on  your network     You can install antivirus software on each network user   s computer   This technique would be the most effective if you could count on all  your users to keep their antivirus software up to date  Because that   s an  unlikely proposition  you may want to adopt a more reliable approach to  virus protection     Managed antivirus services place antivirus client software on each client  computer in your network  Then  an antivirus server automatically  updates the clients on a regular basis to make sure that they   re kept  up to date     1  Server based antivirus software protects your network servers from  viruses  For example  you can install antivirus software on your mail  server to scan all incoming mail for viruses and remove them before  your network users ever see them     Some firewall appliances include antivirus enforcement checks that don   t  allow your users to access the Internet unless their antivirus software is  up to date  This type of firewall provides the best antivirus protection  available     Safe computing    Besides using an antivirus program  you can take a few additional precau   tions to ensure virus free computing  If you haven   t talked to your kids about  these safe computing practices  you had
466. sand    strains    of  viruses  Many of them have colorful names  such as the I Love You virus   the Stoned virus  and the Michelangelo virus     Antivirus programs can recognize known viruses and remove them from  your system  and they can spot the telltale signs of unknown viruses   Unfortunately  the idiots who write viruses aren   t idiots  in the intellectual  sense   so they   re constantly developing new techniques to evade detection  by antivirus programs  New viruses are frequently discovered  and anti   virus programs are periodically updated to detect and remove them     Antivirus programs    The best way to protect your network from virus infection is to use an anti   virus program  These programs have a catalog of several thousand known  viruses that they can detect and remove  In addition  they can spot the types  of changes that viruses typically make to your computer   s files  thus decreas   ing the likelihood that some previously unknown virus will go undetected     Chapter 24  Hardening Your Network 345       Itd be nice if Windows came with built in antivirus software  but alas  it does  not  So you have to purchase a program on your own  The three best known  antivirus programs for Windows are Norton AntiVirus by Symantec  McAfee   s  VirusScan  and Trend Micro   s OfficeScan     The people who make antivirus programs have their fingers on the pulse of  the virus world and often release updates to their software to combat the  latest viruses  Because viru
467. seful information comes from the logs       You can schedule logging to occur at certain times of the day and for  certain intervals  For example  you may schedule the log to gather data  every 15 seconds from 9 00 to 9 30 every morning and then again from  3 00 to 3 30 every afternoon     Even if you don   t have a performance problem now  you should set up  performance logging and let it run for a few weeks to gather baseline  data  If you develop a problem  this baseline data will prove invaluable  while you research the problem     Don   t leave performance logging on all the time  Gathering perfor   mance data slows down your server  Use it only occasionally to gather  baseline data or when you   re experiencing a performance problem     286 Part IV  Network Management For Dummies       More Performance Tips    Here are a few last minute performance tips that barely made it in     You can often find the source of a slow network by staring at the net   work hubs or switches for a few minutes  These devices have colorful  arrays of green and red lights  The green lights flash whenever data is  transmitted  the red lights flash when a collision occurs  An occasional  red flash is normal  but if one or more of the red lights is flashing  repeatedly  the network interface card  NIC  connected to that port  may be faulty     Check for scheduled tasks  such as backups  batched database  updates  or report jobs  If at all possible  schedule these tasks to run  after normal busin
468. server  you can choose Start   Administrative Tools   Server  Manager to bring up the Server Manager page  as shown in Figure 7 3  As you  can see  this page also provides links that let you add roles or features     148 Partit  Building Your Own Network    T   Figure 7 3   The Server   Manager  page                           Eserver manager n    e acion view Hep    1         esmu    DES  g Features  E ja Discnostcs A Vien the health of the roles installed on your server and add or remove roles and features      gid Configuration d  m E3 storace    Roles Summary 2l Roles Summer y Help  A  Roles  0 of 17 installed B   Add Roles  iS Remove Roles  4 mal C    Last Refresh  12 10 2007 8 45 47 PM Configure refresh    The following procedure describes how to install server roles  The procedure  for installing server features is similar     1  Click the Add Roles link either on the Server Manager page or the  Initial Server Configuration Tasks page   Either way  the Add Roles Wizard appears    2  Click Next     The Select Server Roles page  as shown in Figure 7 4  appears  This page  lets you select one or more roles to add to your server     3  Select one or more roles to install     You can click each role to display a brief description of the role  For exam   ple  if you click the File Services role  the following text is displayed     File Services provides technologies that help you  manage storage  enable file replication   manage shared folders  ensure fast file  searching  an
469. server is a client  You have to remember this term   too  Write it on the back of your right hand     Only two kinds of computers are on a network  servers and clients  Look at  your left hand and then look at your right hand  Don   t wash your hands until  you memorize these terms     The distinction between servers and clients in a network has parallels in  sociology     in effect  a sort of class distinction between the    haves    and     have nots    of computer resources     Usually  the most powerful and expensive computers in a network are  the servers  There   s a good technical reason  Every user on the network  shares the server   s resources     The cheaper and less powerful computers in a network are the clients   Clients are the computers used by individual users for everyday work   Because clients    resources don   t have to be shared  they don   t have to  be as fancy     Most networks have more clients than servers  For example  a network  with ten clients can probably get by with one server     Chapter 1  Networks Will Not Take Over the World  and Other Network Basics    In many networks  a clean line of demarcation exists between servers  and clients  In other words  a computer functions as either a server or a  client  and not both  For the sake of an efficient network  a server can   t  become a client  nor can a client become a server     Other  usually smaller  networks can be more evenhanded by allowing  any computer in the network to be a server and 
470. settings    Computer name  WINT  Full computer name  WIN7  Computer description         ss    seor Control Panet   pl             m            Change settings       68    Part Il  Building Your Own Network    e   Figure 4 3   Displaying   system  information    EE       Programs that gather information for you    Gathering information about your computers is a lot of work if you have more  than a few computers to network  Fortunately  several available software  programs can automatically gather the information for you  These programs  inspect various aspects of a computer  such as the CPU type and speed   amount of RAM  and size of the computer   s hard drives  Then they show the  information on the screen and give you the option of saving the information    to a hard drive file or printing it     Windows comes with just such a program  Microsoft System Information   This program gathers and prints information about your computer  You can  start Microsoft System Information by choosing Start   All Programs  Accessories   System Tools   System Information     When you fire up Microsoft System Information  you see the window shown  in Figure 4 3  which displays basic information about your computer  such  as your version of Microsoft Windows  the processor type  the amount of  memory on the computer  and the free space on each of the computer   s  hard drives  You can obtain more detailed information by clicking any of   the following options on the left side of the window  Ha
471. sn   t seem to fix the problem  you may need to  turn your computer off all the way and then turn it on again  To do so  follow  Steps 1 3 in the previous steps  Choose the Shut Down option rather than the  Restart option  and then click OK  Depending on your computer  Windows  either turns off your computer or displays a message stating that you can  now Safely turn off your computer  If Windows doesn   t turn off the computer  for you  flip the On Off switch to turn off your computer  Wait a minute or so  and then turn the computer back on     Most newer computers don   t immediately shut themselves off when you press  the power button  Instead  you must hold down the power button for a few  seconds to turn off the power  This precaution is designed to prevent you  from accidentally powering down your computer     NING   RY    RY    NING     Chapter 20  Solving Network Problems 295    Here are a few techniques to try if you have trouble restarting your  computer     If your computer refuses to respond to the Start   Shut Down command   try pressing Ctrl Alt Delete     the    three finger salute     It   s appropriate  to say    Queueue    while you do it     When you press Ctrl Alt Delete  Windows 9x and later versions attempt  to display a dialog box from which you can close any running pro   grams or shut down your computer entirely  Unfortunately  sometimes  Windows 9x becomes so confused that it can   t display the Restart dialog  box  in which case pressing Ctrl Alt De
472. sssiicasonsessteasesvetioe 286  Chapter 20  Solving Network Problems                     0055 287  When Bad Things Happen to Good ComputeVS             scesseeceeseeteeteereeeees 288  How to Fix De  d Computers  sristi rae r ina rii er e raia 289  Ways to Check a Network Connection          cccecscesseeseeeeeeeeseesseeseeeeees 290  A Bunch of Error Messages Just Flew By  0    eeceseeseceteceteeeteeeeeeeneeanees 291  Double Check Your Network Settings            cccccccssesssesssesseceseeseeseeeseeeeees 292  Time to Experiments   e 0 s   fesdadscdacecssicanciysieter dle setae erti dedi due sednade aereas 292  WHO S Oni PUTS oe ccccc vege tazc dada ce shee E a 293  How to Restart a Client Computer           eee eeceseceseeseeeeeenseeseeeseeeseeeseees 293  How to Restart Network Services            ccscsssssesseeseeseeseeseeseceeeeeseeseeaeeaeens 295  How to Restart a Network Server            c ccscessesseeeeeseeseeseeseceeeeceseeeeeseeaeeas 297  Looking at Event LOGS 35  seesinane eei i i eris 298  Document Your Trials and Tribulations              cccesceesseceseesseeeeeessnees 299    Chapter 21  How to Stay on Top of Your Network    and Keep Its Users Off Your Back                00ee eee eee 301  Train Your Users oerinoar EE TEASE E TEE 301  Organize a LIDLArY oriire eE EE R 302  Keep Up with the Computer INdUSI Y   iesiisesiisrrisiraisrin rrisni 303  Remember That the Guru Needs a Guru     ssssssssseesssesesesersrsssersrsessrsssrssse 304  Spew Helpful Bluffs and EXCUSES si
473. sssissiosiisasscrnisissrsrrsirirrirns 304    Part V  Protecting Vour NetWork  3OT    Chapter 22  Backing Up Your Data                 0 20eeeeeeeee 309  Backing Up Y Our Data    eacee esinen an Eein aa EE 309   All about Tapes and Tape Drive  00      eeeceeseeseeseeseeeeeeeeeceseeteeeeeeenneeaeees 310  BACKUP SOL Wal Serien toen n E A AT COTAS oud Soe 311   Wy P srOb BaCk ups assisterenden a aae R E E E Eni a RiR 312  Normal   ackups seeria ccceessagaae eeaeee aaea EARE EKRE REEERE RE 313   Copy DACKUPS iasi csses scesdeessceiesyseics rniii teiner ns ieir ERSS 314   Daly Dackups errien ea epee o PESE neeesa 314  Incremental DACKUpS eisecss54550554 onone n N R 314    Differential DACKUPS              ccsccssccsscssesssesssesseseesesessaessaeessessneessessnes 315    Table of Contents       Local versus Network Backup6             cccccccsseesseeeeseeeeseeeeseeceseeesseeesssessnees 316  How Many Sets of Backups Should You Keep             ccccccesesseesseeseeseees 317  A Word about Tape Reliability    ccc ccececeessceeeseeeesneeeseeeseessseeesaes 318  About Cleaning the Heads si  sicessecssecissvescessdedeeeescdueassasveredsteavecsdeedacesaeeetives 319  Backup SQCUrity sser E E ET n S Eea Seliokoteaveetass 320  Chapter 23  Securing Your Network               0 00 eeeeeeee 321  Do  You  Need  Security erian nar EE E E EENE 322  Two Approaches to S CUYLILY            cc ccssssscsssseeseesseesseesscessecsscssnesseesseeesness 323  Physical Security  Locking Your Doors             c 
474. t   Control Panel   The Control Panel appears   2  Double click the Network Connections icon     The Network Connections folder appears  as shown in Figure 8 1        W Network Connections ggg  File Edit View Favorites Tools Advanced Help ae  Q       P Ph  roses Fy  Address    network Connections  vy  Eo  E A Name Type Status Device Name  8 LAN or High Speed Internet  haat bh  1394 Connecton LAN of High speed Inter    Connected  Hrewaled 1394 Net Adapter     Change Windows bloc  Area Connection LAN or High Speed Inter    Connected  Frewaled Intel R  PRO 100 VE Net     Firewall settings  See Also a  D i  Network  v Troubleshooter  Figure 8 1   Other Places a  The g  Control Panel  Network E My Network Places  Connections      nets  yg My Computer  folder  3 vig  Bi  n 2             3  Right click the connection that you want to configure and then choose  a  Properties from the menu that appears     You can also select the network connection and click Change Settings of  This Connection in the task pane     Either way  the Properties dialog box for the network connection  appears  as shown in Figure 8 2     4  To configure the network adapter card settings  click Configure     This action summons the Properties dialog box for the network adapter   as shown in Figure 8 3  This dialog box has five tabs that let you config   ure the network interface card  NIC      e General  This tab shows basic information about the NIC  such  as the device type and status  For example  the devi
475. t  Building Your Own Network       Two or more access points joined for the purposes of roaming  along with  all the wireless computers connected to any of the access points  form an  Extended Service Set  or ESS  The access points in the ESS are usually con   nected to a wired network     One current limitation of roaming is that each access point in an ESS must be  on the same TCP IP subnet  That way  a computer that roams from one access  point to another within the ESS retains the same IP address  If the access  points had a different subnet  a roaming computer would have to change IP  addresses when it moved from one access point to another        Wireless bridging    Another use for wireless access points is to bridge separate subnets that  can   t easily be connected by cable  For example  two office buildings may be  only about 50 feet apart  To run cable from one building to the other  you   d  have to bury conduit     a potentially expensive job  Because the buildings  are so close  though  you can probably connect them with a pair of wireless  access points that function as a wireless bridge between the two networks   Connect one of the access points to the first network and the other access  point to the second network  Then configure both access points to use the  same SSID and channel     Ad hoc networks    A wireless access point isn   t necessary to set up a wireless network  Anytime  two or more wireless devices come within range of each other  they can link 
476. t IV  Network Management For Dummies       Double Check Vour Network Settings    Time    I swear that little green men sneak into offices at night  turn on computers   and mess up TCP IP configuration settings just for kicks  These little green  men are affectionately known as networchons     Remarkably  network configuration settings sometimes get inadvertently  changed so that a computer  which enjoyed the network for months or even  years  one day can   t access the network  One of the first things you do  after  making sure that the computers are turned on and that the cables aren   t  broken  is a basic review of the computer   s network settings  Check these  items     TCP IP settings  At a command prompt  run ipconfig to make  sure that TCP IP is up and running on the computer and that the IP  addresses  subnet masks  and default gateway settings look right     Protocols  Call up the network connection   s Properties dialog box and  make sure that the necessary protocols are installed correctly     Computer name  Open the System Properties dialog box  double click  the System icon in the Control Panel   and check the Computer Name  tab  Make sure that the computer name is unique and that the domain or  workgroup name is spelled properly     Permissions  Double check the user account to make sure that the user  has permission to access the resources she needs     to Experiment    If you can   t find an obvious explanation for your troubles  the computer is  unplugged  f
477. t according to a set of rules that you set up  If the packet  passes the test  it   s allowed to pass  If the packet doesn   t pass  it   s rejected     Packet filters are the least expensive type of firewall  As a result  packet   filtering firewalls are very common  However  packet filtering has a number  of flaws that knowledgeable hackers can exploit  As a result  packet filtering  by itself doesn   t make for a fully effective firewall     Packet filters work by inspecting the source and destination IP and port  addresses contained in each TCP IP packet  TCP IP ports are numbers that are  assigned to specific services that help to identify for which service each packet  is intended  For example  the port number for the HTTP protocol is 80  As a  result  any incoming packets headed for an HTTP server will specify port 80  as the destination port     Port numbers are often specified with a colon following an IP address  For  example  the HTTP service on a server whose IP address is 192 168 10 133  would be 192 168 10 133 80     Literally thousands of established ports are in use  Table 24 1 lists a few of  the most popular ports     34 0 Part V  Protecting Your Network                                                                Table 24 1 Some Well Known TCP IP Ports  Port Description   20 File Transfer Protocol  FTP    21 File Transfer Protocol  FTP    22 Secure Shell Protocol  SSH    23 Telnet   25 Simple Mail Transfer Protocol  SMTP    53 Domain Name Server  DNS    8
478. t nearly as popular as they  once were     Networks are changing everything all over again  In a way  it   s a change back  to the mainframe computer way of thinking  central location  distributed  resources  True  the network isn   t housed in the basement and doesn   t have  to be installed by a plumber  But you can no longer think of    your    PC as  your own  You   re part of a network     and  like the mainframe  the network  has to be carefully managed     Here are several ways in which a network robs you of your independence       You can   t just indiscriminately delete files from the network  They  may not be yours     You re forced to be concerned about network security  For example  a  server computer has to know who you are before it allows you to access  its files  So  you have to know your user ID and password to access the  network  This precaution prevents some 15 year old kid from hacking  his way into your office network by using its Internet connection and  stealing all your computer games        You may have to wait for shared resources  Just because Wally sends  something to Ward   s printer doesn   t mean that it immediately starts to  print  The Beav may have sent a two hour print job before that  Wally  just has to wait       You may have to wait for access to documents  You may try to retrieve  an Excel spreadsheet file from a network drive  only to discover that  someone else is using it  Like Wally  you just have to wait       You don   t have unli
479. t other network users can   t  access it  follow Steps 1 3 in the preceding set of steps to open the Printer  Properties dialog box  Select the Do Not Share This Printer option and then  click OK  The hand disappears from the printer icon  to indicate that the  printer is no longer shared     Shaving a printer in Windows Vista  or Windows 7    To share a printer in Windows Vista or Windows 7  follow these steps     1     Click the Start button  type Printers  and press Enter     The Printers folder appears       Right click the printer that you want to share and choose Printer    Properties     The Properties dialog box for the printer appears       Click the Sharing tab     The Sharing tab appears  as shown in Figure 3 9  Notice that the options  for sharing the printer are disabled     4  Select the Share This Printer option     5   Optional  Change the share name if you don   t like the name sug     gested by Windows     Because other computers will use the share name to identify the shared  printer  pick a descriptive name       Click OK     You return to the Printers folder  The icon for the printer is modified to  indicate that it has been shared     To take your shared printer off the network so that other network users can   t  access it  follow Steps 1 7 in the preceding set of steps  Deselect the Share  This Printer check box and then click OK     Chapter 3  More Ways to Use Your Network 53       6    lis  wT Pinte  amp  eee   General  Shamo  Pote   Advanced   Color
480. t to develop  a naming scheme that identifies the computer   s location  For example  a   name such as C 305 1 may be assigned to the first computer in Room 305 of  Building C  Or MKTGO10 may be a computer in the Marketing department     If the computer will join a domain  you need to have access to an Administrator  account on the domain unless the administrator has already created a com   puter account on the domain  Note that only Windows 2000  Windows XP   and Windows Server  NT  2000  and 2003  computers can join a domain    Windows 98 or 95 users can access the domain   s resources by logging on to  the domain as users  but domain computer accounts for Windows 9x clients  aren   t required      When you install Windows on the client system  the Setup program asks for  the computer name and workstation or domain information  You can change  this information later  if you want  The procedure varies depending on  whether you   re using Windows XP  Windows Vista  or Windows 7     Configuring Windows XP  computer identification  To change the computer identification in Windows XP  follow these steps   1  Open the Control Panel and double click the System icon to open the  System Properties dialog box   2  Click the Computer Name tab   The computer identification information is displayed   3  Click the Change button     This step displays the Computer Name Changes dialog box  as shown in  Figure 8 8     4  Type the new computer name and then specify the workgroup or  domain i
481. t your computer  you have to log on again     Logging off the network is a good idea if you   re going to leave your  computer unattended for a while  As long as your computer is logged in  to the network  anyone can use it to access the network  And  because  unauthorized users can access it under your user ID  you get the blame  for any damage they do     In Windows  you can log off the network by clicking the Start button and  choosing the Log Off command  This process logs you off the network  without restarting Windows     e In Windows XP  you can reach this command directly from the  Start menu     e In Windows Vista  click Start and then click the right facing arrow  that appears next to the little padlock icon     4 0 Part I  Let s Network        Chapter 3  More Ways to Use Your Network    In This Chapter    Transforming your computer into a network server   Sharing folders with network users   Working in the Public Folder in Windows Vista and Windows 7  Sharing your printer   Using Office on a network   Working with files offline      hapter 2 introduces you to the basics of using a network  logging on   accessing data on shared network folders  printing  and logging off    In this chapter  I go beyond these basics  You   ll find out how to turn your   computer into a server that shares its own files and printers  how to use one   of the most popular network computer applications     e mail     and how to   work with Office on a network     Sharing Vour Stuff    As y
482. talling network cable is the physical task of pulling the  cable through ceilings  walls  and floors  This job is just tricky enough that I  recommend you don   t attempt it yourself  except for small offices  For large  jobs  hire a professional cable installer  You may even want to hire a profes   sional for small jobs if the ceiling and wall spaces are difficult to access     Keep these pointers in mind if you install cable yourself     You can purchase twisted pair cable in prefabricated lengths  such as  50 feet  75 feet  and 100 feet  You can also special order prefabricated  cables in any length you need  But attaching connectors to bulk cable  isn   t very difficult     Use prefabricated cables only for very small networks and only when  you don   t need to route the cable through walls or ceilings     Always use a bit more cable than you need  especially if you   re running  cable through walls  For example  when you run a cable up a wall  leave  a few feet of slack in the ceiling above the wall  That way  you have  plenty of cable if you need to make a repair later     1    When running cable  avoid sources of interference  such as fluorescent  lights  big motors  and X ray machines     Fluorescent lights are the most common source of interference for  cables behind ceiling panels  Give light fixtures a wide berth  Three feet  should do it     1     The maximum allowable cable length between the hub and the com   puter is 100 meters  about 328 feet      If you must 
483. tart at the root and work their way down  For example  in the path   Windows System32 dns  dns is the lowest node     1     The DNS tree can be up to 127 levels deep  However  in practice  the  DNS tree is pretty shallow  Most DNS names have just three levels  not  counting the root   and although you sometimes see names with four or  five levels  you rarely see more levels than that     Although the DNS tree is shallow  it   s very broad  In other words  each of  the top level domains has a huge number of second level domains imme   diately beneath it  For example  at the time I wrote this book  the com  domain had more than two million second level domains beneath it     Fully qualified domain names    If a domain name ends with a trailing dot  that trailing dot represents the   root domain  and the domain name is said to be a fully qualified domain name   also known as an FQDN   A fully qualified domain name is also called an  absolute name  A fully qualified domain name is unambiguous because it iden   tifies itself all the way back to the root domain  In contrast  if a domain name  doesn   t end with a trailing dot  the name may be interpreted in the context of  some other domain  Thus  DNS names that don   t end with a trailing dot are  relative names     This concept is similar to the way relative and absolute paths work in  Windows  For example  if a path begins with a backslash  such as  Windows    System32 dns  the path is absolute  However  a path that doesn   t be
484. ted pair cable  also known as STP  Because  STP can be as much as three times more expensive than regular UTP  you don   t  want to use STP unless you have to  With a little care  UTP can withstand the  amount of electrical interference found in a normal office environment     NING     RY    ar    Chapter 5  Cables  Adapters  and Other Stuff 85    Most STP cable is shielded by a layer of aluminum foil  For buildings with  unusually high amounts of electrical interference  the more expensive  braided copper shielding offers even more protection     When to use plenum cable    The outer sheath of shielded and unshielded twisted pair cable comes in  two kinds     1     PVC cable is the most common and least expensive type        Plenum cable is a special type of fire retardant cable designed for use  in the plenum space  definition coming right up  of a building  Plenum  cable has a special Teflon coating that not only resists heat but also  gives off fewer toxic fumes if it does burn  Unfortunately  plenum cable  costs more than twice as much as ordinary PVC cable     Most local building codes require plenum cable when the wiring is installed in  the building   s plenum space  a compartment that   s part of the building   s air   distribution system  usually the space above a suspended ceiling or under a  raised floor      The area above a suspended ceiling is not a plenum space if both the deliv   ery and return lines of the air conditioning and heating systems are ducted   Pl
485. ter is much like using a network hard drive  You can  print to a network printer from any Windows program by choosing the Print  command to call up a Print dialog box from any program and choosing a net   work printer from the list of available printers   In Office XP  this command  is under the File menu  In Office 2007  you can reach it by clicking the Office  button      Keep in mind  however  that printing on a network printer isn   t exactly the  same as printing on a local printer     you have to take turns  When you print  on a local printer  you   re the only one using it  When you print to a network  printer  however  you are  in effect  standing in line behind other network  users  waiting to share the printer  This line complicates the situation in  several ways     If several users print to the network printer at the same time  the net   work has to keep the print jobs separate from one another  If it didn   t   the result would be a jumbled mess  with your 168 page report getting  mixed in with the payroll checks  That would be bad  Fortunately  the  network takes care of this situation by using the fancy print spooling  feature     Network printing works on a first come  first served basis  unless you  know some of the tricks that I discuss in Chapter 3   Invariably  when  I get in line at the hardware store  the person in front of me is trying to  buy something that doesn   t have a product code on it  I end up standing  there for hours waiting for someone in P
486. ternet Web site  The two most popular Web server  programs are Microsoft IIS  Internet Information Services  and Apache   an open source Web server program managed by the Apache Software  Foundation     Mail servers    A mail server is a server computer that handles the network   s e mail needs   It   s configured with e mail server software  such as Microsoft Exchange  Server  Your mail server software must be compatible with your e mail  program  Exchange Server  for example  is designed to work with Microsoft  Outlook  the e mail client software that comes with Microsoft Office     Chapter 4  Planning Your Network 7      Database servers    A database server is a server computer that runs database software  such as  Microsoft SQL Server 2005  Database servers are usually used along with cus   tomized business applications  such as accounting or marketing systems     Choosing a Server Operating System    If you determine that your network needs one or more dedicated servers   the next step is to determine what network operating system  NOS  those  servers should use  If possible  all the servers should use the same NOS so  you don   t find yourself awash in the conflicting requirements of different  operating systems     Although you can choose from many network operating systems  from a  practical point of view  your choices are limited to the following     1     Windows Server 2008    Novell NetWare    Linux or another version of Unix    For more information  see Chapter 
487. the File and Printer Sharing feature is already set up on your  computer  To find out  double click the My Computer icon on your desktop   Select the icon for your C drive and then click File on the menu bar to reveal  the File menu  If the menu includes a Sharing command  File and Printer  Sharing is already set up  so you can skip the rest of this section  If you can   t  find a Sharing command on the File menu  you have to install File and Printer  Sharing before you can share a file or printer with other network users     To enable File and Printer Sharing on a Windows XP system  follow these  steps   This action summons the File and Print Sharing dialog box   1  From the Start menu  choose Settings   Control Panel   The Control Panel comes to life   2  Double click the Network Connections icon   The Network Connections window appears   3  Right click Local Area Connection and choose Properties     The Local Area Connection properties dialog box appears  as shown in  Figure 3 1     4  Make sure the File and Print Sharing for Microsoft Networks option is  checked     5  Click OK   While you   re working in the Network dialog box  don   t mess around with any    of the other network settings  You can safely change the File and Print Sharing  options  but leave the rest of the settings in the Network dialog box alone     Chapter 3  More Ways to Use Your Network 43    4  Local Area Connection Properties     General   Authentication   Advanced  Connect using     Ep Intel R  PR
488. the green pair is used for transmit and  the orange pair is used for receive  In the EIA TIA 568B and AT amp T 258A stan   dards  the orange pair is used for transmit and the green pair for receive     If you want  you can get away with connecting only Pins 1  2  3  and 6   However  I suggest that you connect all four pairs  as indicated in Table 5 2     RJ 45 connectors    RJ 45 connectors for twisted pair cables aren   t too difficult to attach if you  have the right crimping tool  The only trick is making sure that you attach  each wire to the correct pin and then press the tool hard enough to ensure a  good connection     Here   s the procedure for attaching an RJ 45 connector     1  Cut the end of the cable to the desired length   Make sure that you make a square cut     not a diagonal cut     2  Insert the cable into the stripper portion of the crimp tool so that the  end of the cable is against the stop     Squeeze the handles and slowly pull out the cable  keeping it square   This strips off the correct length of outer insulation without puncturing  the insulation on the inner wires     3  Arrange the wires so that they lie flat and line up according to Table 5 2     90    Part Il  Building Your Own Network    ar    eu   Figure 5 3   Attaching  an RJ 45  connector  to twisted   pair cable   as       You have to play with the wires a little bit to get them to lay out in the  right sequence       Slide the wires into the pinholes on the connector     Double check to mak
489. the pane on the left side of  the Open dialog box to browse the network  as shown in Figure 2 4        ooe  OW   Gu    Network    X    4    Search Network p   Organize v Search Active Directory Network and Sharing Center Adda printer    z  OF       W Favorites 4 Computer  3     E Desktop   B Downloads   DOUGES10 f A SERVEROL       Recent Places         JJ libranes A Van       Documents    4 Network Intrastructure  1   J Music  fee Pictures EA  z WI  E Videos    7  j Computer  Ge Network       4 items       3 0 Part I  Let s Network     E  Figure 2 3   The  resources  available   on a server  computer    EEE     E  Figure 2 4   Browsing  the network  in Office  2007   E    EN          Organize v Search active directory    Tr Favorites  E Desktop       a Downloads    W Recent Places J    DW Libranes      Documents  a Music  E Pictures  H Videos   L Computer    Ge Network    i    l 4 items    GOs  gt  Network    SERVEROL         4     Search SERVEROL    Network and Sharing Center View remote printers      phasser    sysvol  Share          Favorite Links  W Templates  IE Documents    E Desktop    IB Videos  b Ji Public      i Computer  a Ca Network  b p LSERVEROL     paa WKO7 001     GR Content Vanal       J       File name  F       If yov   re using Windows 95 or Windows 98  My Network Places is referred to  as Network Neighborhood  When you call up the Network Neighborhood in  Windows 95 or Windows 98  you   re immediately greeted by a list of computers    More    J netiogen   
490. the spectrum are allocated for use by wireless networks   2 4 GHz and 5 GHz  Note that these bands aren   t devoted exclusively to wire   less networks  In particular  the 2 4 GHz band shares its space with cordless  phones  As a result  cordless phones can sometimes interfere with wireless  networks     170 Partit  Building Your Own Network          And now  a word from the irony department      was an English literature major in college  so    like to use literary devices  such as irony  Of  course  irony doesn t come up much in com   puter books  So  when it does    like to jump on  it like a hog out of the water     Here s my juicy bit of irony for today  The first  Ethernet system was a wireless network   Ethernet traces its roots back to a network  developed at the University of Hawaii in 1970   the Alohanet  This network transmitted its data  by using small radios  If two computers tried to  broadcast data at the same time  the computers    detected the collision and tried again after a  short  random delay  This technique was the  inspiration for the basic technique of Ethernet   now called carrier sense multiple access with  collision detection  CSMA CD   The wireless  Alohanet network inspired Robert Metcalfe to  develop his cabled network  Ethernet  as his  doctoral thesis at Harvard in 1973     For the next 20 years or so  Ethernet was pretty  much a cable only network  It wasn   t until the  mid 1990s that Ethernet finally returned to its  wireless roots        E
491. then you restore the most recent differential backup     For example  suppose that you do a normal backup on Monday and dif   ferential backups on Tuesday  Wednesday  and Thursday  and your hard  drive crashes Friday morning  Friday afternoon  you install a new hard drive   Then  to restore the data  you first restore the normal backup from Monday   Then  you restore the differential backup from Thursday  The Tuesday and  Wednesday differential backups aren   t needed     The main difference between incremental and differential backups is that    Incremental backups result in smaller and faster backups   Differential backups are easier to restore     If your users often ask you to restore individual files  consider  differential backups     Local versus Network Backups    When you back up network data  you have two basic approaches to running  the backup software  You can perform a local backup in which the backup  software runs on the file server itself and backs up data to a tape drive that   s  installed in the server  or you can perform a network backup in which you use  one network computer to back up data from another network computer  In   a network backup  the data has to travel over the network to get to the com   puter that   s running the backup     If you run the backups from the file server  you ll tie up the server while the  backup is running  Your users will complain that their access to the server  has slowed to a snail   s pace  On the other hand  if you run
492. ther        Ro  SS     Put the manuals and disks for all the software you use on your network where  they belong     in the closet with all the other network tools and artifacts     Ten Copies of This Book    Obviously  you want to keep an adequate supply of this book on hand to dis   tribute to all your network users  The more they know  the more they stay off  your back     Sheesh  10 copies may not be enough     20 may be closer to what you need     Chapter 30  Layers of the OSI Model    In This Chapter  The Physical Layer  The Data Link Layer  The Network Layer       The Transport Layer  The Session Layer   The Presentation Layer  The Application Layer    0 SI sounds like the name of a top secret government agency you hear  about only in Tom Clancy novels  What it really stands for  as far as  this book is concerned  is Open System Interconnection  as in the Open System  Interconnection Reference Model  also known as the OSI Reference Model or  OSI Model  depending on how pressed for time you are      The OSI Model breaks the various aspects of a computer network into seven  distinct layers  These layers are kind of like the layers of an onion  Each suc   cessive layer envelops the layer beneath it  hiding its details from the levels  above   The OSI Model is also like an onion in that if you start to peel it apart  to have a look inside  you   re bound to shed a few tears      The OSI Model isn   t itself a networking standard in the same sense that  Ethernet and TCP IP 
493. ther network users to change the  files in this folder  select the Allow Network Users to Change My Files  check box     If you leave this option deselected  other network users can open your  files  but they can   t save any changes they make     4 8 Part I  Let s Network     D   Figure 3 6   The File  Sharing  dialog box   Windows  Vista and  Windows 7    EE       7  Click OK   The Properties dialog box vanishes  and a hand is added to the icon for  the folder to show that the folder is shared     If you change your mind and decide that you want to stop sharing a folder   double click the My Computer icon  select the folder or drive that you want to  stop sharing  and choose File  Sharing to summon the Properties dialog box   Deselect the Share This Folder on the Network check box and then click OK     Sharing a folder in Windows Vista  or Windows 7    To share a folder in Windows Vista or Windows 7  follow these steps     1  Choose Start gt Computer   The Computer folder comes to center stage    2  Navigate to the folder you want to share    3  Right click the folder you want to share and choose Properties   The Properties dialog box appears    4  Click the Sharing tab and then click the Share button     The File Sharing dialog box appears  as shown in Figure 3 6        teaa  P    tw a File Sharing    Choose people on your network to share with    Type a name and then click Add  or click the arrow to find someone                  Name Permission Level       Doug Lowe Owner
494. thout a price   For starters  you can expect to pay a higher monthly access fee for cable or  DSL  In most areas of the United States  cable runs about  50 per month for  residential users  business users can expect to pay more  especially if more  than one user will be connected to the Internet via the cable     The cost for DSL service depends on the access speed you choose  In some  areas  residential users can get a relatively slow DSL connection for as little  as  30 per month  For higher access speeds or for business users  DSL can  cost substantially more     Cable and DSL access aren   t available everywhere  If you live in an area  where cable or DSL isn   t available  you can still get high speed Internet  access by using a satellite hookup     Chapter 10  Connecting Your Network to the Internet   8 7       Connecting with high speed  private lines  T1 and T3    If your network is large and high speed Internet access is a high priority   contact your local phone company  or companies  about installing a dedi   cated high speed digital line  These lines can cost you plenty  on the order of  hundreds of dollars per month   so they   re best suited for large networks in  which 20 or more users are accessing the Internet simultaneously     A T1 line has a connection speed of up to 1 544 Mbps  A T3 line is faster yet   It transmits data at an amazing 44 184 Mbps  Of course  T3 lines are also con   siderably more expensive than T1 lines     If you don   t have enough user
495. through e mail  Chapter 23 describes  this task in more detail     Cleanup  Users think that the network server is like the attic  They want  to throw files up there and leave them forever  No matter how much  disk storage your network has  your users will fill it up sooner than you  think  so the network manager gets the fun job of cleaning up the attic  once in a while  The best advice I can offer is to continually complain  about how messy it is up there and warn your users that spring cleaning  is on the to do list     Managing Network Users    Managing network technology is the easiest part of network management   Computer technology can be confusing at first  but computers aren   t as con   fusing as people  The real challenge of managing a network is managing the  network   s users     The difference between managing technology and managing users is obvious   You can figure out computers  but who can ever really figure out people   The people who use the network are much less predictable than the network  itself  Here are some tips for dealing with users     Make user training a key part of the network manager   s job  Make sure  that everyone who uses the network understands how it works and how  to use it  If the network users don   t understand how the network works   they may unintentionally do all kinds of weird things to it     Treat network users respectfully  If users don   t understand how to use  the network  it   s not their fault  Explain it to them  Offer 
496. tination address in the reply is 208 23 110 22  the address  of the firewall  To determine to whom to forward the reply  the  firewall checks its records to see who   s waiting for a reply from  216 239 57 99  It discovers that 192 168 1 100 is waiting for that  reply  so it changes the destination address to 192 168 1 100 and  sends the packet on     Actually  the process is a little more complicated than that because it   s very  likely that two or more users may have pending requests from the same  public IP  In that case  the NAT device uses other techniques to figure out to  which user each incoming packet should be delivered     Configuring Vour Network for DHCP    Every host on a TCP IP network must have a unique IP address  Each host  must be properly configured so that it knows its IP address  When a new host  comes online  it must be assigned an IP address within the correct range of  addresses for the subnet     one that   s not already in use  Although you can  manually assign IP addresses to each computer on your network  that task  quickly becomes overwhelming if the network has more than a few computers     That   s where DHCP  the Dynamic Host Configuration Protocol  comes into  play  DHCP automatically configures the IP address for every host on a net   work  thus ensuring that each host has a valid  unique IP address  DHCP even  automatically reconfigures IP addresses as hosts come and go  As you can  imagine  DHCP can save a network administrator many hours
497. tions  see the section    Setting  account options     later in this chapter     9  Click Next     You re taken to the final page of the New Object     User Wizard  as  shown in Figure 17 4        New Object   User eS xj    NA Create in  LoweWnter pri Users    When you click Finish  the following object will be created     a  Figure 17 4   Verifying   the user     account    information  Cancel                     10  Verify that the information is correct and then click Finish to create  the account     If the account information isn   t correct  click the Back button and cor   rect the error     You re done  Now you can customize the user   s account settings  At a mini   mum  you ll probably want to add the user to one or more groups  You may  also want to add contact information for the user or set up other account  options     Setting User Properties    After you   ve created a user account  you can set additional properties for the  user by right clicking the new user and choosing Properties  This brings up  the User Properties dialog box  which has about a million tabs that you can  use to set various properties for the user  Figure 17 5 shows the General tab   which lists basic information about the user  such as the user   s name  office  location  phone number  and so on     250 Part IV  Network Management For Dummies    Sa  Figure 17 5   The General  tab   SaaS          theatre Cleaver Properties TES  MemberOF   Dihin       Environment    Sessons    Remote control 
498. to enter a name  and password  Use your regular network logon name and password  OWA  will appear in the browser window  as in Figure 15 1                 I Microsoft Outlook Web Access   Windows Intenet Explores 5 2 Sea  60   Se A    Microrott Outiook Web Access M Do rh Bge   G Toos     4  Outlook Web Access BF Inbox   rs  iNew    ai A bid MA  gt  Help Ljtogot  OOO E S  l Y   r Patchlink Update Server Not    PLUS Notification from buiphet  New Vulnerability A  Sun 2 11 2007 1 40 PM 7       Yitadmingbcf engr com Yosemite Backup Activity Log for Friday Diferential Fri 2 9 2007 11 24 PM 17   O webservicerequests ikon c_ Online Equipment Service Request   WSR12261538 Fri 2 9 2007 4 48 PM SKB   B knSchedt RE  Merge letters Fri 2 9 2007 3 18 PM 138        ste AutoCAD Error Aborting Fri 2 9 2007 2 13 PM Ra   B PetchUnk Update Server Notifika    PLUS Notification from befir  New Vuln ability Announce    Fri 2 9 2007 1 40 PM 338   A Offlceusers org A Very Cool Use of Paste Special with Excel  Feb  9  2007  Fri 2 9 2007 7 26 AM 78   J YBadmingbct engr com Yosemite Backup  Activity Log for Thursday Diere The 2 8 2007 11 22 PM 17w   J Patchlink Update Server Not  PLUS Notification from bcfplnk  New Vulnerability A  Thu 2 8 2007 1 40 PH 17   i Swanmy31272 cs com Men s Reweat 2007 Thu 2 8 2007 10 47 AM 15   A bclex010bcf engr com NIC Agents  NIC Connectivity Restored    Tho 2 8 2007 9 47 AM 1   a bdex0iebd engr com NIC Agents  NIC Connectivity Restored    Thu 2 8 2007 9 35 AM axe   d Offc
499. tory entry to determine whether a file should be  backed up  Daily backups don   t reset the archive bit     I   m not a big fan of this option because of the small possibility that some  files may slip through the cracks  Someone may be working late one night  and modify a file after the evening   s backups have completed  but before  midnight  Those files won   t be included in the following night   s backups   Incremental or differential backups  which rely on the archive bit rather than  the modification date  are more reliable     Incremental backups    An incremental backup backs up only those files that you   ve modified since  the last time you did a backup  Incremental backups are a lot faster than full  backups because your network users probably modify only a small portion    Chapter 22  Backing Up Your Data 3 15       ar       of the files on the server in any given day  As a result  if a full backup takes  three tapes  you can probably fit an entire week   s worth of incremental back   ups on a single tape     When an incremental backup copies each file  it resets the file   s archive bit   That way  the file will be backed up again before your next normal backup  only when a user modifies the file again     Here are some thoughts about using incremental backups     1    The easiest way to use incremental backups is  e A normal backup every Monday     If your full backup takes more than 12 hours  you may want to do it  on Friday so that it can run over the weeken
500. try  303  library  organizing  302 303  overview  19  235  part time  selecting  237 238  password  143  recommended reading for  243 244  resources  237 238  responsibilities of  235 236  routine chores  performing  239 240  software tools  acquiring  241 242  training users  301 302  username  23  users  managing  240 241  Network and Sharing Center  43   44   156 158  Network Attached Storage  NAS   260  Network Browser  375  network cable  See cable  Network Configuration program  362 363  Network Connections folder  42  152   156 158  180  Network dialog box  42  network drive  26  31 34  network envy  389  network hardening  firewalls  337 343  overview  337  patches  346 347  virus protection  343 346  network ID  in IP address  108 112  114 115  Network Installation Wizard  Office  54  network interface  10  66  network interface card  NIC   16  96 99  280  Network Layer  OSI model  398  Network Monitor program  242  Network Neighborhood  30 31  network operating system  NOS     See also Windows Server 2008  Apple Mac OS X Server  137  choosing  71  configuration decisions  142 143  dedicated servers  15 16  directory services  133 134  file sharing services  132 133       Index 40 7       final setup preparations  143  installing  137 142  Linux  137  multitasking  133  network support  132  overview  71  131  136  post installation chores  146 147  security services  134 135  server roles  configuring  147 150  Network Places  29 31  Network Properties dialog box  1
501. ts servers to be configured  Most of these  decisions aren   t cast in stone  so don   t worry if you   re not 100 percent sure  how you want everything configured  You can always go back and reconfig   ure things  However  you can save yourself time if you make the right deci   sions up front rather than just guess when the Setup program starts asking  you questions     The following list details most of the decisions that you need to make     The existing operating system  If you want to retain the existing oper   ating system  the installation program can perform a multiboot setup   which allows you to choose which operating system to boot to each  time you start the computer     This is rarely a good idea for server computers  I recommend that you  delete the existing operating system     Partition structure  Most of the time  you want to treat the entire server  disk as a single partition  However  if you want to divide the disk into  two or more partitions  do so during setup   Unlike most of the other  setup decisions  this one is hard to change later      So Chapter 7  Setting Up a Server 143    Computer name  During the operating system setup  you   re asked to  provide the computer name used to identify the server on the network     p If your network has only a few servers  you can just pick a name  such    as Server01 or MyServer  If your network has more than a few servers   follow an established guideline for creating server names     Administrator password  Okay
502. tvcasiecanteheeaessscaseeys 97  Other Network Devices wis   isisciisetisccdicssaievnceseceadesusieietevacbsseenaecesceseceouteescevands 99  Rep    t  f S secere e e Ea E AEE Ao E EEES EE 99  IBYLA GOS  sas cea suthacsasatevsasdayiesvetueesaeeveeat ENARA SE TNE EEE ANE 101  ROTET S 55051205002 ses307s eaa e R AE E EERS 102   Chapter 6  Dealing with TCP IP                   ccc cece eee eee 105   Understanding Biman yc cscisieces c ctesctseess igssbsessaeceesansthestannvecsaacastivassyuneveeeniass 105  COUNTING Dy OMES     4 c0cccessascseesessresnedeerssesesanseerdoncesesaeneivsavscdoaeesesvoness 106  DOING the logic thing ssseeiess cedesacescdaseesaschecscoseess a evesstaecetpreeeedvnecceetess 107   Introducing IP AGAreSSES eri ciecasevessidesceonseseesaneavedesessestseseasaueavsanseseaoasesventie 108  IN tWOrks and NOSIS  narisee E eE E E S 108    The dotted decimal dance            ccessesccessssscceessnsccessssccesseesecesseeees 108    IX    x    Networking For Dummies  9th Edition       Classifying IP Addresses           ccccesscsssessseessceseeeseceseceseesseeeseeseseseeeseeeneeeneeses 109  Class A Addresses criin ninrin n fassecteaeeeeeeds 110  Class B   ddi  SSES iirinn decries celessedvieaes adeateenees 111  Class C AAdrESSES ii snn enin aieiaa 111   RO  01510 1 0 Fee eames Se ne ge 112  UDMOES siirsin n E EES AEE deviescenanevees ES 113  S  pnet maskSnrane iraan a AEE ENAR SEEE EEA 114  The great subnet round  D psaseon enenu enir 115  Private and public addresses    
503. twork  After you identify the faulty component  replacing it restores the  network to its original speed     Chapter 19  Network Performance Anxiety 283       Tune Vour Network the Compulsive Way    You can tune your network in one of two ways  The first is to think about it  a bit  take a guess at an approach that may improve performance  try that  approach  and see whether the network seems to run faster  This strategy is  the way most people go about tuning the network     You can also try the compulsive way  which is suitable for people who orga   nize their sock drawers by color and their food cupboards alphabetically by  food group  The compulsive approach to tuning a network goes something  like this     1  Establish a method for objectively testing the performance of some  aspect of the network     In this method  you create a benchmark  The result of your benchmark is  a baseline     2  Change one variable of your network configuration and rerun the test     For example  you may think that increasing the size of the disk cache  can improve performance  Change the cache size  restart the server  and  run the benchmark test  Note whether performance improves  stays the  same  or becomes worse     3  Repeat Step 2 for each variable that you want to test     Here are some salient points to keep in mind if you decide to tune your net   work the compulsive way     If possible  test each variable separately  In other words  before pro   ceeding  reverse the changes you made
504. twork has 2 computers or  2 000  Of course  managing a 2 000 computer network is a full time job   whereas managing a 2 computer network isn   t  At least  it shouldn   t be     This chapter introduces you to the boring job of network administration   Oops     you   re probably reading this chapter because you   ve been elected to  be the network manager  so I   d better rephrase that     This chapter introduces you to the wonderful  exciting world of network manage   ment  Oh  boy  This is going to be fun     What a Network Administrator Does    A network administrator    administers    a network  Installing  configuring   expanding  protecting  upgrading  tuning  and repairing the network     236 Part IV  Network Management For Dummies    MBER  KV   amp        A network administrator takes care of the network hardware  such as cables   hubs  switches  routers  servers  and clients  and the network software  such  as network operating systems  e mail servers  backup software  database  servers  and application software   Most important  the administrator takes  care of network users by answering their questions  listening to their trou   bles  and solving their problems     On a big network  these responsibilities constitute a full time job  Large  networks tend to be volatile  Users come and go  equipment fails  software  chokes  and life in general seems to be one crisis after another     Smaller networks are much more stable  After you get your network up and  running  yo
505. twork itself  As the net   work manager  you should read through the manuals that come with  your network software to see which management tools are available  For  example  Windows includes anet diag command that you can use to  make sure that all the computers on a network can communicate with  each other   You can run net diag from an MS DOS prompt   For TCP   IP networks  you can use the TCP IP diagnostic commands that I summa   rize in Table 16 2                 Table 16 2 TCP IP Diagnostic Commands   Command What It Displays   arp Address resolution information used by the Address  Resolution Protocol  ARP    hostname Your computer s host name   ipconfig Current TCP IP settings   nbtstat The status of NetBIOS over TCP IP connections        continued     24 2 Part IV  Network Management For Dummies    ANG  RS    ar          Table 16 2  continued                       Command What It Displays   netstat Statistics for TCP IP   nslookup DNS information   ping Verification that a specified computer can be reached  route The PC s routing tables   tracert The route from your computer to a specified host    1    System Information  This program  which comes with Windows  is a  useful utility for network managers     Hotfix Checker  This handy tool from Microsoft scans your computers  to see which patches need to be applied  You can download the Hotfix  Checker for free from the Microsoft Web site  Just go to www micro  soft com and search for hfnetchk exe     Baseline Security 
506. u can use these subfolders if you want  or you can create your own  subfolders to help organize the data in your Public folder     To access the Public folder of another computer  use the techniques that I  describe in Chapter 2 to either browse to the Public folder or map it to a net   work drive     Sharing a Printer    Sharing a printer is much more traumatic than sharing a hard drive  When  you share a hard drive  other network users access your files from time to  time  When they do  you hear your drive click a few times  and your com   puter may hesitate for a half second or so  The interruptions caused by other  users accessing your drive are sometimes noticeable  but rarely annoying     When you share a printer  you get to see Murphy   s Law in action  Your co   worker down the hall is liable to send a 140 page report to your printer just  moments before you try to print a 1 page memo that has to be on the boss   s  desk in two minutes  The printer may run out of paper or  worse  jam during  someone else   s print job     and you   re expected to attend to the problem     SSS   Figure 3 8   The Printers  and Faxes  folder   PC    Chapter 3  More Ways to Use Your Network 5      Although these interruptions can be annoying  sharing your printer makes  a lot of sense in some situations  If you have the only decent printer in your  office or workgroup  everyone will bug you to let them use it anyway  You  may as well share the printer on the network  At least this way  th
507. u probably won   t have to spend much time managing its hardware  and software  An occasional problem may pop up  but with only a few com   puters on the network  problems should be few and far between     Regardless of the network   s size  the administrator attends to common chores     Get involved in every decision to purchase new computers  printers   or other equipment     Put on the pocket protector whenever a new computer is added to the  network  The network administrator   s job includes considering changes in  the cabling configuration  assigning a computer name to the new computer   integrating the new user into the security system  and granting user rights     1    Whenever a software vendor releases a new version of its software   read about the new version and decide whether its new features war   rant an upgrade  In most cases  the hardest part of upgrading to new  software is determining the migration path     that is  upgrading your  entire network to the new version while disrupting the network and its  users as little as possible  This statement is especially true if the soft   ware in question happens to be your network operating system because  any change to the network operating system can potentially impact the  entire network     Between upgrades  software vendors periodically release patches  and service packs that fix minor problems  For more information  see  Chapter 24     Perform routine chores  such as backing up the servers  archiving old  data 
508. ume that the computer is  turned off  press the power button  wonder why nothing happened  and  then press the power button and hold it down  hoping that something  will happen  If you hold down the power button long enough  the com   puter will turn itself off  Then  when you turn the computer back on   you see a message saying that the computer wasn   t shut down properly   Arghhh  The moral of the story is to jiggle the mouse if the computer  seems to have nodded off     ay  The fan  If you think that the computer isn   t plugged in but it looks like it  is  listen for the fan  If the fan is running  the computer is getting power  and the problem is more serious than an unplugged power cord   If the  fan isn   t running but the computer is plugged in and the power is on  the  fan may be out to lunch      1    The electrical outlet  If the computer is plugged in  turned on  and still  not running  plug a lamp into the outlet to make sure that power is  getting to the outlet  You may need to reset a tripped circuit breaker  or replace a bad surge protector  Or  you may need to call the power  company   If you live in California  don   t bother  It probably won   t do  any good      290 Part IV  Network Management For Dummies    ar       Surge protectors have a limited life span  After a few years of use  many  surge protectors continue to provide electrical power for your com   puter  but the components that protect your computer from power  surges no longer work  If you   r
509. unt only when you   re making major changes to  the system   s configuration  When you   re doing routine work  log on as an ordi   nary user to avoid accidentally corrupting your system     When you log  ah  in  Linux grinds its gears for a moment and then displays  the GNOME desktop  which I describe later in this chapter     If you didn   t install X server  you see a text mode login prompt that resem   bles this     Fedora release 10  Cambridge   Kernel 2 6 27 5 117 fc10 0686 on an i686    localhost login     The login prompt displays the Linux version  Fedora release 10   the kernel  version it   s based on  2 6 27 bla bla bla   the CPU architecture  i686   and the  server   s hostname  localhost   To log in  type your user ID  press Enter  type  the password  and press Enter again     When you ve successfully logged in  you   re greeted by a semifriendly prompt  similar to this     LAS logims  Swa gull 5 20 00 56 oa s0   doug localhost doug      358 Part VI  Beyond Windows       The prompt character in the standard Linux shell is a dollar sign     rather  than a greater than sign   gt   as it is in MS DOS or Windows  Also  notice that  prompt indicates your username and server  doug LSERVER  as well as the  name of the current directory  doug      Logging off    After you log on  you probably want to know how to log off  If you logged on to  GNOME  you can log off by clicking the main menu and choosing the Log Out  command  A dialog box asks whether you   re sure you wa
510. up    feature every day  However  be sure to run  it periodically to check that your tape drive is working     If your backup program reports errors  throw away the tape and use a  new tape     Actually  you should ignore that last comment about waiting for your  backup program to report errors  You should discard tapes before your  backup program reports errors  Most experts recommend that you  should use a tape only about 20 times before discarding it  If you use the  same tape every day  replace it monthly  If you have tapes for each day  of the week  replace them twice a year  If you have more tapes than that   figure out a cycle that replaces tapes after about 20 uses     About Cleaning the Heads    An important aspect of backup reliability is proper maintenance of your tape  drives  Every time you back up to tape  little bits and specks of the tape rub  off onto the read and write heads inside the tape drive  Eventually  the heads  become too dirty to reliably read or write data     To counteract this problem  clean the tape heads regularly  The easiest way  to clean them is to use a special tape cleaning cartridge  To clean the heads  with a tape cleaning cartridge  insert the cartridge into the tape drive  The    320 Part V  Protecting Your Network       drive automatically recognizes that you   ve inserted a cleaning cartridge and  performs a special routine that wipes the special cleaning tape back and  forth over the heads to clean them  When the cleaning routine i
511. up Microsoft Exchange server data     3   2 Part V  Protecting Your Network       Types of Backups    You can perform five different types of backups  Many backup schemes rely  on full backups daily  but for some networks  it   s more practical to use a  scheme that relies on two or more of these backup types     The differences among the fives types of backup involve a little technical  detail known as the archive bit  The archive bit indicates whether a file has  been modified since the last time it was backed up  The archive bit is a little  flag that   s stored along with the filename  creation date  and other directory  information  Any time that a program modifies a file  the archive bit is set  to the On position  That way  backup programs know that the file has been  modified and needs to be backed up     The differences among the various types of backups center around whether  they use the archive bit to determine which files to back up  and whether they  flip the archive bit to the Off position after they back up a file  Table 22 1 sum   marizes these differences  and they   re explained in the following sections     Backup programs allow you to select any combination of drives and folders to  back up  As a result  you can customize the file selection for a backup opera   tion to suit your needs  For example  you can set up one backup plan that  backs up all a server   s shared folders and drives plus its mail server stores but  leaves out folders that rarely change
512. up tape  If you have only one  tape that   s reused every day  you   re outta luck     The safest scheme is to use a new backup tape every day and keep all your  old tapes in a vault  Pretty soon  though  your tape vault can start looking  like the warehouse where they stored the Ark of the Covenant at the end of  Raiders of the Lost Ark     3   8 Part V  Protecting Your Network    ar       As a compromise between these two extremes  most users purchase several  tapes and rotate them  That way  you always have several backup tapes to fall  back on  just in case the file you need isn   t on the most recent backup tape   This technique is fape rotation  and several variations are commonly used     1  The simplest approach is to purchase three tapes and label them A  B     and C  You use the tapes on a daily basis in sequence  A the first day  B  the second day  C the third day  then A the fourth day  B the fifth day  C  the sixth day  and so on  On any given day  you have three generations of  backups  today   s  yesterday   s  and the day before yesterday   s  Computer  geeks like to call these the grandfather  father  and son tapes     Another simple approach is to purchase five tapes and use one each day    of the workweek     A variation of this scheme is to buy eight tapes  Take four of them and    write Tuesday on one label  Wednesday on the second  Thursday on   the third  and Friday on the fourth label  On the other four tapes  write  Monday 1  Monday 2  Monday 3  and M
513. ur Network                       41  Sharing Your Stuffer eers e Ea Ep EEEE IE ES 41  Enabling File and Printer Sharing  Windows XP        s ssseesessseseesee 42  Enabling File and Printer Sharing  Windows Vista                   008 43  Enabling File and Printer Sharing  Windows 7              csseeseeeereerees 45  Sharing a Folder  eocen nA s E tens E arire Er SEa sini 46  Sharing a folder in Windows XP           cccccscesssssseesseesscesseessceseeseeesseenes 46  Sharing a folder in Windows Vista or Windows 7            cceseserees 48  Using the Public Folder in Windows Vista and Windows 7             cc08 49  Sharing a Printer  sornione rera EE A EE EO a ER IN 50  Sharing a printer in Windows XP           ccsesesceeeeeseeeeeseeeeseeeeeeeeeeeesees 51  Sharing a printer in Windows Vista or Windows 7       sssseseseseseeeee 52  Using Microsoft Office on a Network        sssssssesssesssssessrsesrrsrsesrrsrssernssssesresee 53  Installing Office on a network     some options         sssssssssssessesesesee 54  Accessing network file             cccccsccsscsssecsscessccssecsscsssesseesseesseeseeesaeens 54  Using workgroup templates                ccsscssscssscessessseseesesseesseeseeesseeees 55  Networking an Access database           ccccccssccessessseeeeseeeeseeesseeesseesnes 57  Working with Offline Files               cccccscssscssscsssessessscsssesseesseeseeeseessneeseessneeees 58    Part I   Building Vour Own Network    cccccccccsccccseccesceeee 67    Chapter 4  Planning You
514. used port on a hub or a switch represents an open door  to your network  The hubs and switches should be secured just like the  servers     Securing User Accounts    Next to physical security  the careful use of user accounts is the most impor   tant type of security for your network  Properly configured user accounts can  prevent unauthorized users from accessing the network  even if they gain  physical access to the network  The following sections describe some of the  steps that you can take to strengthen your network   s use of user accounts     Obfuscating your usernames    Huh  When it comes to security  obfuscation simply means picking obscure  usernames  For example  most network administrators assign usernames  based on some combination of the user   s first and last name  such as BarnyM       326    Part V  Protecting Your Network    ANG   O    MBER  N       or baMiller  However  a hacker can easily guess such a user ID if he or she  knows the name of at least one employee  After the hacker knows a user   name  he or she can focus on breaking the password     You can slow down a hacker by using names that are more obscure  Here are  some suggestions on how to do that     1     Add a random three digit number to the end of the name  For example   BarnyM320 or baMiller977     1     Throw a number or two into the middle of the name  For example   Bar6nyM or ba9Miller2     1  Make sure that usernames are different from e mail addresses  For example   if a user   s e mai
515. users     User ID  The internal identifier for the user     You can add a new user by using the useradd command  For example  to  create a user account named slowe and use default values for the other  account information  open a Terminal window  or switch to a virtual console   and type this command       useradd slowe    The useradd command has many optional parameters you can use to set  account information  such as the user   s home directory and shell     Fortunately  most Linux distributions come with special programs that sim   plify routine system management tasks  Fedora is no exception  It comes with  a program called User Manager  as shown in Figure 25 4  To start this pro   gram  choose System   Administration   Users and Groups     To create a user account with User Manager  click the Add User button  This  brings up a dialog box that asks for the username  password  and other infor   mation  Fill out this dialog box and then click OK     The User Manager also lets you create groups  You can simplify the task of  administering users by applying access rights to groups rather than individual  users  Then  when a user needs access to a resource  you can add the user to  the group that has the needed access     To create a group  click the Add Group button  A dialog box appears  asking  for the name of the new group  Type the name you want and then click OK     To add a user to a group  click the Groups tab in the User Manager  Then   double click the name of the gr
516. users you want to enable mobile  access for     15  Close Active Directory Users and Computer     That   s all there is to it  After you have enabled these features  any users run   ning Windows Mobile can synchronize their handhelds with their Exchange  mailboxes     Configuring BlackBerry Devices    Unfortunately  configuring BlackBerry devices is considerably more difficult  than configuring Windows Mobile devices  That   s because Microsoft includes  support for Windows Mobile devices in Exchange server  but you must use  additional software to support BlackBerry devices     If you have just a few BlackBerry users  you can synchronize their hand   helds with Exchange by using a service called BlackBerry Internet Service  or  BIS  BIS is a Web site you log in to and to which you provide the Exchange  account information for each of your BlackBerry users  BIS then handles the  synchronization for you  In a nutshell  BIS masquerades as an Office Web  Access  OWA  user to access the user   s Exchange data  It then forwards the  data it retrieves via OWA to the BlackBerry   Your service provider     such  as AT amp T  Sprint  Verizon  and so on     will give you the correct address of  the BIS Web site that will work with your BlackBerry      BIS works surprisingly well  but it isn   t instantaneous  The delay between  when an e mail appears in the user   s Exchange inbox and when it shows up  on the BlackBerry is often 15 minutes or more     For more timely access  you should
517. ut  Considering Security Issues    ANG        ar    If you connect a non networked computer to the Internet and then pick up  a virus or get yourself hacked into  only that one computer is affected  But  if you connect a networked computer to the Internet  the entire network  becomes vulnerable     Beware  Never connect a networked computer to the Internet without first  considering the security issues   How will you protect yourself and the network from viruses     1  How will you ensure that the sensitive files located on your file server  don   t suddenly become accessible to the entire world     How can you prevent evil hackers from sneaking into your network   stealing your customer file  and selling your customer   s credit card data  on the black market     For answers to these and other Internet security questions  see Chapter 23     Plugging In a Wireless Access Point  without Asking    For that matter  plugging any device into your network without first getting  permission from the network administrator is a big no no  But wireless  access points  WAPs  are particularly insidious  Many users fall for the mar   keting line that wireless networking is as easy as plugging in one of these  devices to the network  Then  your wireless notebook PC or handheld device  can instantly join the network     384  Part vi  The Part of Tens    The trouble is  so can anyone else within about one quarter mile of the WAP   Therefore  you must employ extra security measures to make sur
518. uter  on the network           Computer desenphor   For example     Kitchen Computer    or  Mary s  Computer     Full computer name  WIN    Workgroup  WORKGROUP    To use a wizard to jon a doman or workgroup  click  N D Network ID       T this computer or change ite doman  Teens ot s o Change       Figure 8 10   The System  Properties  dialog box   Windows 7                     3  Click the Change button     This step displays the Computer Name Domain Changes dialog box  as  shown in Figure 8 11     162  Partit  Building Your Own Network    E  Figure 8 11   The  Computer  Name   Domain  Changes  dialog box   Windows 7     gt a           Pecmputer Name Dumain Changes      You can change the name and the membership ot ther  computer  Changes might affect eocess tu network resuurces   More information    Computer name     WK09 001        Full computer name   WKO3 001         More          Member of     Damar  lowewnter com    Workgroup   WORKGROUP       Co   ance           4  Enter the computer name and the workgroup or domain name     If you want to join a domain  choose the Domain option button and type  the domain name  To join a workgroup  choose the Workgroup option  and type the workgroup name     5  Click OK     6  Enter the username and password for an Administrator account when  prompted     You   re asked to provide this information only if a computer account  hasn   t already been created for the client computer     7  When a dialog box appears  informing you that you
519. ux system     If the thought of installing Linux gives you hives  you can buy computers with  Linux preinstalled  just as you can buy computers with Windows already  installed     Before you begin to install Linux  I recommend several planning steps     Make a list of all the hardware components on your computer and how  they   re configured     Be as specific as you can  Write down each component   s manufacturer  and model number  as well as configuration information  such as the  component   s IRQ and I O address  if appropriate     1  Decide how you want to partition your hard drive for Linux     Although Windows is usually installed into a single disk partition  Linux  installations typically require at least three hard drive partitions     e A boot partition  This should be small     16MB is recommended   The boot partition contains the operating system kernel and is  required to start Linux properly on some computers     e A swap partition  This should be about twice the size of your com   puter   s RAM  For example  if the computer has 2GB of RAM  allo   cate a 4GB swap partition  Linux uses this partition as an extension  of your computer   s RAM     e A root partition  This  in most cases  uses up the remaining free  space on the disk  The root partition contains all the files and  data used by your Linux system     You can also create additional partitions if you wish  The installation  program includes a disk partitioning feature that lets you set up your  disk pa
520. ve granted permission for the  folder  When you select a user or group from the list  the check boxes  at the bottom of the list change to indicate which specific permissions  you ve assigned to each user or group       Click Add     The dialog box  as shown in Figure 18 14  appears       Type the name of the user or group to whom you want to grant    permission and then click OK     You return to the Share Permissions tab  with the new user or group  added     2 14 Part IV  Network Management For Dummies    D  Figure 18 12    Setting  permissions        Figure 18 13   Setting   the Share  Permissions   j       ar          Admin Properties xi    Share pemissions provide a level of access control for a shared folder   NTFS permissions control local access to files and folders  For network  eovess lo a shared folder  the more restrictive of the share and NTFS   permiezione determine the level of access granted to usere and groupe     To set share permissions for users who access this folder over the  network  click Share Permissions     Share Permissions         To set NTFS permissions for users who access this folder locally  chck  NTFS Permissions     NTFS Permissions      For more information about sharing and permissions  see Managing  Permissions for Sh 2                              coo  __    Tvermssonsforadmn eT   Securty     Group or user namea    Permissions for Everyone Aow Deny   Full Control o o   Read a o   C e   acc _           If you   re not sure of the name  c
521. ver Computer   While Users Are Logged OD n       ccscesceseeseesseseceeesseeseeeeesessceseeeseeeesaeeneeaes 380  Deleting Important Files on the Server           ccccceceeseesseseeeeeeeeeeeeeeeeeeseeaeens 381  Copying a File from the Server  Changing It    and Then Copying It BaCk esner r aii 382  Sending Something to the Printer Again Just Because It Didn   t   Print Che First TIME serrie era e E AE TEE ENE EEE EEE ERS 382  Assuming That the Server Is Safely Backed Up          ccccscecssesseeeeeseeeseees 382  Connecting to the Internet without Considering Security Issues           383  Plugging In a Wireless Access Point without Asking          cee eeeeeeenees 383  Thinking You Can   t Work Just Because the Network Is Down                384  Running Out of Space on a Server oisein eioen A 384    Always Blaming the Network           cccccescesesseeseeseeeeceeeeseeseeaeeaeceeeeeeeaeeneeaees 385    Table of Contents xvii       Chapter 28  Ten Networking Commandments                     387  I  Thou Shalt Back Up Thy Hard Drive Religiously              cceseseeeeeee 387  II  Thou Shalt Protect Thy Network from Infidels              ccececeseseteees 388  II  Thou Shalt Keepeth Thy Network Drive Pure   and Cleanse It of Old Files                ccscsssssssessseseesseesscessesssessseessesseeseeeees 388  IV  Thou Shalt Not Tinker with Thine Network   Configuration Unless Thou Knowest What Thou Art Doing                388  V  Thou Shalt Not Covet Thy Neighbor   s Network           
522. ware used for intranets than for  the Internet     On the other hand  other industry pundits think that the intranet phe   nomenon is merely a fad that some other promising new technology  such  as pet rocks or hula hoops  will replace in a few years  Only time will tell     What Do Vou Use an Intranet For     Intranets can distribute just about any type of information within a company   Intranets use two basic types of applications     Publishing application  Information is posted in the form of pages that  you can view from any computer with access to the intranet  This type  of intranet application is commonly used for company newsletters   policy manuals  and price lists  for example     y Publishing applications are simple to set up  In fact  you may be able to    set up one without a lot of outside help from highly paid computer  consultants     Transaction application  Information is gathered from users of the  intranet who file online expense reports  report problems to the help  gn desk  or enroll in employee benefit programs  for example     Expect to spend big bucks on computer consulting to get an intranet  transaction application set up     Chapter 12  Creating an Intranet 205       Here   s the key difference between these two types of intranet applications     Ina publishing application  information flows in one direction  It flows  from the intranet to the user  The user requests some information  and  the intranet system delivers it     Ina transaction applic
523. who casually dropped by your network     Understanding Windows User Accounts    User accounts are one of the basic tools for managing a Windows server  As  a network administrator  you   ll spend a large percentage of your time deal   ing with user accounts     creating new ones  deleting expired ones  resetting  passwords for forgetful users  granting new access rights  and so on  Before I  get into the specific procedures of creating and managing user accounts  this  section presents an overview of user accounts and how they work     Local accounts versus domain accounts    A local account is a user account that   s stored on a particular computer and  applies only to that computer  Typically  each computer on your network will  have a local account for each person that uses that computer        24 6 Part IV  Network Management For Dummies    In contrast  a domain account is a user account that   s stored by Active  Directory and can be accessed from any computer that   s a part of the  domain  Domain accounts are centrally managed  This chapter deals primar   ily with setting up and maintaining domain accounts     User account properties    Every user account has a number of important account properties that specify  the characteristics of the account  The three most important account proper   ties are    Username  A unique name that identifies the account  The user must  enter the username when logging onto the network  The username is  public information  In other words 
524. with each  cycle  For example  because the speed of light is roughly 300 million meters  per second  the wavelength of a 1 Hz radio wave is about 300 million meters   The wavelength of a 2 Hz signal is about 150 million meters     As you can see  the wavelength decreases as the frequency increases  The wave   length of a typical AM radio station broadcasting at 580 kHz is about 500 meters   For a TV station broadcasting at 100 MHz  it   s about 3 meters  For a wireless net   work broadcasting at 2 4 GHz  the wavelength is about 12 centimeters     168    Part Il  Building Your Own Network       It turns out that the shorter the wavelength  the smaller the antenna needs   to be in order to adequately receive the signal  As a result  higher frequency  transmissions need smaller antennas  You may have noticed that AM radio sta   tions usually have huge antennas mounted on top of tall towers  but cellphone  transmitters are much smaller and their towers aren   t nearly as tall  That   s  because cellphones operate on a higher frequency than AM radio stations do   So who decides what type of radio gets to use specific frequencies  That   s  where spectrums and the FCC come in     Cycles per second  1             Time  gt   0 0 1 0    Cycles per second  2       a3  Figure 9 1   Radio   waves  frequently  have  frequency  Time  gt   es l   1 0             Chapter 9  Wireless Networking 1 6 9       Spectrums and the FCC    The term spectrum refers to a continuous range of frequencies 
525. within one minute  If 60 seconds is too long  or too short  an interval   you can change the refresh rate by using the Advanced tab in the  Options dialog box     Working with Offline Files    Desktop computers are by nature stationary beasts  As a result  they   re almost  always connected to their networks  Notebook computers  however  are more  transitory  If you have a notebook computer  you   re likely to tote it around  from place to place  If you have a network at work  you probably connect to  the network when you   re at work  But then you take the notebook computer  home for the weekend  where you aren   t connected to your network     Chapter 3  More Ways to Use Your Network 59    Of course  your boss wants you to spend your weekends working  so you  need a way to access your important network files while you   re away from  the office and disconnected from the network  That   s where the offline files  feature comes in  It lets you access your network files even while you re dis   connected from the network     It sounds like magic  but it isn   t really  Imagine how you   d work away from  the network without this feature  You simply copy the files you need to work  on to your notebook computer   s local hard disk  Then  when you take the  computer home  you work on the local copies  When you get back to the  office  you connect to the network and copy the modified files back to the  network server     That   s essentially how the offline files feature works  exc
526. work Management For Dummies    Figure 18 5   Enter a  description  for the  share   TE    Figure 18 6   Setting   the share  permissions   E                      Steps    Shared Folder Location  NTFS Permissions   Share Protocole   SMB Settings   SMB Permissions   DFS Namespace Publishing  Review Settings and Create  Share    Contiemati        fi Provishen a Shared Folder Wizard  pe SMB Settings  Steps   Specify how this shared folder is to be used by clients accessing t over the SMB  Shared Folder Location protocol  You can use the description to add comments about how the shared folder  is used  You can also control advanced SMB settings including the madmum  NTFS Permissions connections allowed  access based enumeration  and offline avatabitty   Share Protocole  SMB Settings Sue pett  SMB Permissions  NISERVEROI Marketing  DFS Namespace Publishing Description   Review Settings and Create  Share  Confirmation  Advanced settings    User limt   Maximum allowed  Access based enumeration   Enabied  Offine settings   Saanaa fies and pengraens avaliable atine  Ta change these settings  click Advanced Ad j     Ecsite Aa   exes    a SMB Permissions    Specify share permissions for SMB based access to the shared folder  For network  access to a shared folder  the more restrictive of the share permissions and NTFS  permissions determine the level of access granted to users or groups        Share path     ACSERVERDI Marketing   Select one ot the following basic share permissions or cr
527. wrong  Networks cause problems of their  own  but they aren   t the root of all evil     If your monitor displays only capital letters  it   s probably because you  pressed the Caps Lock key   Don   t blame the network    If you spill coffee on the keyboard  well  that   s your fault   Don   t blame the network    If your toddler sticks Play Doh in the floppy drive  kids will be kids     Don   t blame the network     Get the point     386 Part VII  The Part of Tens       Chapter 28  Ten Networking Commandments    In This Chapter    Backing up and cleaning up hard drives       Scheduling downtime for maintenance  Keeping spare parts  Training users    Recording your network configuration    Blessed is the network manager who walks not in the council of the  ignorant  nor stands in the way of the oblivious  nor sits in the seat of the  greenhorn  but delights in the Law of the Network and meditates on this Law  day and night        Networks 1 1    A nd so it came to pass that these Ten Networking Commandments were  handed down from generation to generation  to be worn as frontlets  between the computer geeks    eyes  taped on the bridges of their broken  glasses  and written upon their doorposts with Sharpie markers  Obey these  commandments  and it shall go well with you  with your users  and with your  users    users     I  Thou Shalt Back Up Thy  Hard Drive Religiously    Prayer is a good thing  and I heartily recommend it  But when it comes to pro   tecting the data on your
528. ws 2000 and Windows XP     as well as Windows  2000 Server and Windows Server 2003     include this program  it pro   vides basic protocol analysis and can often help solve pesky network  problems     Chapter 16  Welcome to Network Management 243       Building a Library    Scotty delivered one of his best lines in the original Star Trek series when he  refused to take shore leave so that he could get caught up on his technical  journals     Don   t you ever relax     asked Kirk     I am relaxing     Scotty replied     To bea good network administrator  you need to read computer books     lots  of them  And you need to enjoy doing it  If you   re the type who takes computer  books with you to the beach  you ll make a great network administrator     Read books on a variety of topics  I don   t recommend specific titles  but I do  recommend that you get a good  comprehensive book on each of these topics    Network cabling and hardware   Ethernet   Windows Server 2003   Windows Server 2008   Windows XP Professional   Windows Vista   Windows 7   Exchange   Linux   TCP IP   1  DNS and BIND    SendMail   1  Exchange Server   Security and hacking   Wireless networking  In addition to reading books  you may also want to subscribe to some maga   zines to keep up with what   s happening in the networking industry  Here are  a few you probably should consider  along with their Web addresses    InformationWeek  www  informationweek com   InfoWorld  www infoworld com   Network Computing  
529. ws 7     earlier in this chapter  but choose the Turn On Sharing option  in the Public Sharing Settings section  For Windows Vista  follow the steps  in the earlier section    Enabling File and Printer Sharing  Windows Vista       but choose the Public Sharing option instead of the File Sharing and Printer  Sharing options     After you enable Public folder sharing  you can access the Public folder on  your own computer in Windows Vista by choosing Start   Computer and then  clicking the Public icon in the pane on the left side of the window  To open the  Public folder in Windows 7  choose Start    gt Computer  expand the Libraries item  in the left pane  and then expand the Documents  Music  Pictures  or Videos  items  Figure 3 7 shows an example of a Public folder in Windows 7     50    Part I  Let s Network     pa  Figure 3 7   A Public  folder in  Windows 7   e    ar                i  GO    Libraries    Documents    Public Documents   4    earch Public Document P  Organize v Share with    New folder  r   D      4 Favorites Documents library  E Desktop Public Documents  B Downloads    Recent Places    Arrange by  Folder v  Name Date modified Type    s empty  4 libranes  a    Documents  J My Documents     Public Documents    J Music  ba Pictures  E Videos      Computer    Ga Network    h OQ items State  B   Shared       As you can see  the Public folder includes several predefined subfolders  designed for sharing documents  downloaded files  music  pictures  and  videos  Yo
530. wwroot     2  Choose File gt  New   Text Document  type default htm for the filename   and press Enter     3  Right click the default   htm file you just created and choose Open  With    gt Notepad     4  Enter the following text in the Notepad window      lt HTML gt     lt BODY gt     lt H1 gt Hello World  lt  H1 gt    lt  BODY gt     lt  HTML gt        5  Choose FileSave to save the file and then choose FileExit to quit  Notepad     6  Open a browser window   7  Type localhost in the address bar and press Enter     The page shown in Figure 12 7 appears     2 12 Part Ill  Getting Connected          http    locathost    Windows Internet Explorer            Hello world        j  Figure 12 7  4  Hello World  pae   io  EE localintranet   Protected mode  GFF  Kime e A       User   5    E TE eee Pe Decfostiin n    TEBE zs    Creating Web Sites    IIS has the ability to host multiple Web sites  This is an extremely useful fea   ture not only for Web servers that host public sites  but also for Web servers  that host internal  intranet  sites  For example  you might create a separate  intranet Web site for Human Resources and assign it the Web site name hr   Then  assuming the domain name is lowewriter pri  users can browse to  the Web site by using the address hr  lowewriter pri     Here are the steps   1  In Windows Explorer  create a folder in which you ll save the files for  the new Web site     For this example  I created a folder named c   HR Web Site     2  Choose Start   Adm
531. www  networkcomputing com   Windows IT Pro  www windowsitpro com    1  2600  www 2600 com  a great magazine on computer hacking and security     24 4 Part IV  Network Management For Dummies    ar       The Internet is one of the best sources of technical information for network   administrators  Stock your browser   s Favorites menu with plenty of Web sites  that contain useful networking information  Many Web sites have online news   letters you can subscribe to so that you regularly get fresh information by e mail     Pursuing Certification    Remember the scene near the end of The Wizard of Oz when the Wizard  grants the Scarecrow a diploma  the Cowardly Lion a medal  and the Tin Man  a testimonial     Network certifications are kind of like that  I can picture the scene now     The Wizard     And as for you  my network burdened friend  any geek with  thick glasses can administer a network  Back where I come from  there are  people who do nothing but configure Cisco routers all day long  And they  don   t have any more brains than you do  But they have one thing you don   t  have  certification  And so  by the authority vested in me by the Universita  Committeeatum E Pluribus Unum  I hereby confer upon you the coveted  certification of CND        You     CND      The Wizard     Yes  that   s  uh  Certified Network Dummy        You     The Seven Layers of the OSI Reference Model are equal to the Sum of the  Layers on the Opposite Side  Oh  rapture  I feel like a network adm
532. y  the wizard asks which edition  of the operating system you want to install  The options here depend   on which version you   ve purchased  For the Standard Edition  you can  choose to install the full Standard Edition server operating system or the  Core edition     4  Select the edition you want to install and then click Next     The Setup Wizard displays the License Agreement information  Read it if  you enjoy legalese     5  Click I Accept the License Terms and then click Next     The Setup Wizard then asks whether you want to perform an upgrade  installation or a full installation     6  Click the installation option you want to use     Setup continues by displaying the computer   s current partition infor   mation  Here  you can select the partition that you want to use for the  installation  If necessary  you can reconfigure your partitions from this  screen by deleting existing partitions or creating new ones  I assume  here that you want to create a single partition that uses all available  space on the drive     7  Select the partition on which you want to install Windows and then  click Next     Setup now formats the drive and then copies files to the newly format   ted drive  This step usually takes awhile  I suggest you bring along your  favorite book  Start reading at Chapter 1     After all the files have been copied  Setup reboots your computer  Then   Setup examines all the devices on the computer and installs any neces   sary device drivers  You can read C
533. y eight bits are allocated to the network  ID and the first of these bits is used to indicate that the address is a Class A  address  only 126 Class A networks can exist in the entire Internet  However   each Class A network can accommodate more than 16 million hosts        Only about 40 Class A addresses are assigned to companies or organizations   The rest are either reserved for use by the IANA  Internet Assigned Numbers  Authority  or are assigned to organizations that manage IP assignments for  geographic regions  such as Europe  Asia  and Latin America     Just for fun  Table 6 2 lists some of the better known Class A networks  You  probably recognize many of them  In case you   re interested  you can find  a complete list of all the Class A address assignments at www  iana org     assignments ipv4 address space                    Table 6 2 Some Well Known Class A Networks  Net Description Net Description   3 General Electric Company 20 Computer Sciences   Corporation  6 Army Information Systems 22  26  Defense Information  Center 29  30 Systems Agency   9 IBM 34 Halliburton Company   11 DoD Intel Information 38 Performance Systems    Systems    International       Chapter 6  Dealing with TCP IP                               Net Description Net Description   12 AT amp T Bell Laboratories 40 Eli Lilly and Company   13 Xerox Corporation 43 Administered by APNIC   15 Hewlett Packard Company 45 Interop Show Network   16 Digital Equipment 4  Bell Northern Research  Corporati
534. y everyone a printer when I know that the one we have  now just sits there taking up space most of the day  Wouldn   t buying a  network be better than buying a printer for every computer     1    want to provide an Internet connection for all my computers  Many net   works  especially smaller ones  exist solely for the purpose of sharing an  Internet connection     Someone figured out that we   re destroying seven trees a day by printing  interoffice memos on paper  so we want to give the rainforest a break by  one  setting up an e mail system and trying to print less of the routine stuff   D    It won   t work  One of the inescapable laws of business is that the more  you try to eliminate paperwork  the more paperwork you end up creating     ar    Chapter 4  Planning Your Network 65    Business is so good that one person typing in orders eight hours each  day can   t keep up  With a network  I can have two people entering  orders  and I don   t have to pay overtime to either person     4 My brother in law just put in a network at his office  and I don   t want him  to think that I   m behind the times     Make sure that you identify all the reasons why you think you need a network  and then write them down  Don   t worry about winning the Pulitzer Prize for  your stunning prose  Just make sure that you write down what you expect a  network to do for you     If you were making a 500 page networking proposal  you   d place the descrip   tion of why a network is needed in a ta
535. you to  be abreast of all the latest trends and developments  They ask     What do you  think about the new version of SkyWriter  Should we upgrade or stick with  Version 23           We need an Intranet Web site  What   s the best Web page editor for  under  200           My kid wants video editing software  Which is better  VideoPro or  MovieNow        The only way to give halfway intelligent answers to questions like these is to  read about the industry  Visit your local newsstand and pick out a few com   puter magazines that appeal to you  Here are some more tips for keeping up     Subscribe to at least one general interest computer magazine and one  magazine specifically written for network users  That way  you can  keep abreast of general trends and the specific stuff that applies just to  networks     Subscribe to e mail newsletters that cover the systems you use     Look for magazines that have a mix of good how to articles and  reviews of new products     Don   t overlook the value of the advertisements in many of the larger  computer magazines  Some people  I   m one of    em  subscribe to certain  magazines to read the ads as much as to read the articles     Most computer magazines are quite technical  Look for magazines  written to your current level of expertise  You may discover that you  outgrow one magazine and are ready to replace it with one that   s more  technical     304 Part IV  Network Management For Dummies       Remember That the Guru Needs a Guru    
536. your servers are child   s play compared to the  most difficult job of network security  securing your network   s users  All the  best laid security plans will go for naught if your users write their passwords  on sticky notes and post them on their computers     The key to securing your network users is to create a written network secu   rity policy and to stick to it  Have a meeting with everyone to go over the  security policy to make sure that everyone understands the rules  Also  make  sure to have consequences when violations occur     Here are some suggestions for some basic security rules that can be incorpo   rated into your security policy     Never write down your password or give it to someone else         Accounts shouldn   t be shared  Never use someone else   s account to  access a resource that you can   t access under your own account  If you  need access to some network resource that isn   t available to you  for   mally request access under your own account     Likewise  never give your account information to a co worker so that he  or she can access a needed resource  Your co worker should instead for   mally request access under his or her own account     Don   t install any software or hardware on your computer without first  obtaining permission  This especially includes wireless access devices  or modems     Don   t enable file and printer sharing on workstations without first getting  permission     1  Never attempt to disable or bypass the network  
537. ys going up in the attic  poking  his or her head up through ceiling panels and wiping fiberglass insula   tion out of his or her hair  or fishing cables through walls  If you   re going  to do it  do it right so you don   t have to do it again in just a few years   Build your cable installation to last     Your network users may be satisfied with 100 Mbps networking now  but  it won t be long before they demand gigahertz speed  And who knows  how fast the next wave of networking will be  If you cut costs by using  plain Cat5 cable instead of more expensive Cat6 cable  you ll have to  replace it later     1  You might be tempted to skip the modular wall jacks and patch cables  and instead just run the cable down the wall  out through a hole  and then  directly to the computer or hub  That   s a bad idea because the connectors  are the point at which cables are most likely to fail  If a connector fails   you have to replace the entire cable     all the way up the wall  through the  ceiling  and back to the switch  By wiring in a wall jack and using a patch  cable  you have to replace only the patch cable when a connector fails     For more information about professional touches for installing cable  see  Chapter 5     Turning Off or Restarting a Server  Computer While Users Are Logged On    The fastest way to blow your network users    accounts to kingdom come is to  turn off a server computer while users are logged on  Restarting it by press   ing its reset button can have th
538. ze of the hard drive and the arrangement of its partitions  In  Windows  you can find out the size of your computer   s hard drive by    66    Part Il  Building Your Own Network    ar       opening the My Computer window  right clicking the drive icon  and  choosing the Properties command from the shortcut menu that appears   Figure 4 1 shows the Properties dialog box for a 15 8GB hard drive that  has 8 94GB of free space     If your computer has more than one hard drive or partition  Windows  lists an icon for each drive or partition in the My Computer window  Jot  down the size and amount of free space available on each of the drives    A partition is a section of a hard drive that   s treated as though it were a  separate drive  But that won   t be on the test      The amount of memory  In Windows  you can find out this informa   tion easily enough by right clicking the My Computer desktop icon and  choosing the Properties command  The amount of memory on your  computer appears in the dialog box that appears  For example  Figure  4 2 shows the System window for a computer running Windows 7 with  2GB of RAM     The version of the operating system that   s installed  You can determine  the version by checking the System dialog box  For example  Figure 4 2  shows the System window for a computer running Windows 7 Ultimate   It   s important that all computers on your network are updated with the  latest service pack     The type of network interface installed in the computer 
539. zle books  and CD ROM  software     CCD leases two adjacent office buildings  separated only by a small court   yard  The creative staff  which consists of a dozen writers and educators   works in Building A  The sales  marketing  and administrative staff     all six  employees of it     works in Building B     The product development and marketing staff has 14 relatively new personal  computers  all running Windows Vista Business  and a server computer run   ning Windows 2003 Server  These computers are networked by a 100 Mbps  UTP network  which utilizes a single 24 port 100 Mbps switch  A fractional T1  line that   s connected to the network through a small Cisco router provides  Internet access     76 _ Partil  Building Your Own Network       The administrative staff has a hodgepodge of computers  some running  Windows Vista  some running Windows XP  and one still running Windows  98  The staff has a small Windows 2000 Server that meets everyone   s needs  but is pretty old  The older computers have 10 100 network cards  the newer  ones have gigabit built in networking  However  the computers are all con   nected to a fairly old 10 100 Mbps Ethernet switch with 12 ports  so the over   all network speed is limited to 100 Mbps  Internet access is provided by a  DSL connection     Both groups are happy with their computers and networks  The problem  is that the networks can   t communicate with each other  For example  the  marketing team in Building A relies on daily printe
    
Download Pdf Manuals
 
 
    
Related Search
    
Related Contents
Samsung WA75U3WEC User Manual  DOMINO 48 XT DOMINO 96 XT - Vals-près  担 架架  SERVO-DRIVE - KOCH Group AG  PINNACLE" - INYOPools.com  Silicon Pyranometer Smart Sensor (Part # S-LIB-M003)  MBS598154 - MyBioSource  Philips Multigroom Grooming kit QG3342/23  Trisa Electronics 9330-44 space heater  Frigidaire FAC085M7A Air Conditioner    Copyright © All rights reserved. 
   Failed to retrieve file