Professional Documents
Culture Documents
FIELD OF APPLICATION
- Booting system for storage media
- File management
- For single user systems only
- Network client (NetBEUI, IPX/SPX, TCP/IP)
- Batch processing
STRUCTURE INFORMATION
- 16-bit Single tasking operating system, (formerly 8-bit)
- Command interpreter for internal and external commands
- External driver software imbedding for periphery devices possible
Page 1
SYSTEM ENVIRONMENT
- Minimum: 512 kb RAM, 5 mb hard disk storage (depends on version for full installation)
- FAT file system
- Executable with every x86 compatible CPU
- Low RAM and fixed storage disk needs
SLIET, LONGOWAL
VERSION
VERSION
1981 Aug.
MS-DOS 1.0, formerly QDOS/86-DOS, can use at maximum 128 kb RAM, FAT
established
1982 Aug.
1983 March
MS-DOS 2.0, support for IBM 10 mb hard disk, directory and DD 5.25" floppy
disk drives with up to 360 kb
1983 Dec.
1984 Aug.
MS-DOS 3.0, support for high density floppy disk drives with 1.2 mb and hard disk
devices with 32 mb capacity
1984
1987 April
MS-DOS 3.3, extended for IBM's PS/2 computer, supports now bigger 3.5" hard
disk Drives and floppy disk drives, multiple partitions, character sets for different
languages
1988 July
MS-DOS 4.0, XMS support, partitions with up to 2 gbyte, graphical shell, bug fixes
1988 Nov.
MS-DOS 4.01, supports multiple partitions bigger than 32 mb, bug fixes
1991 June
1992
1993 Aug.
1993 Nov.
1994 March
MS-DOS 6.21, because of law conflict with Stac Electronics Double Space is
removed from MS DOS
1994 May
MS-DOS 6.22, Microsoft licenses double disk of VertiSoft Systems and designates it
in DriveSpace, last official standalone version
1995 Aug.
MS-DOS 7.0, MS-DOS component for Windows 95, LFS support through VFAT,
more DOS programs are delivered on the Setup CD-ROM in the "oldmsdos"
directory
1996 Aug.
MS-DOS 7.10, MS-DOS component for Windows 95 B and higher, supports the
first time FAT 32 hard disks
2000
MS-DOS 8.0, MS-DOS component for Windows ME, last MS-DOS version
Page 2
DATE
SLIET, LONGOWAL
Page 3
Options
SLIET, LONGOWAL
d:path filename-SPECIFY] the drive letter, path name, or file name when you wish
to obtain a directory listing of files that are not in the current directory.
/P- Tells DOS to pause when the screen has been filled. To see the next screen of file
names you have to press any key.
/W- Displays a directory showing only file name in a wide format-five names across
each line.
/S- Displays the files from the subdirectories also.
Displaying the contents of a file-Type
TYPE displays a file's content on the screen. This command continuously
scrolls the file on the screen. To freeze the text use pause key. To stop the TYPE
command press Ctrl-C. The contents of binary files and Exe files will be meaningless.
Only files which are in ASCII format can be typed.
Syntax: Type [ d: ] [path] filename
Page 4
SLIET, LONGOWAL
Syn-: MD[d:]path
d: -Specifies the drive in which you wish to create the new subdirectory.
Path - Specifies path of directory names, including the name of the sub-directory to be
created. The entire path name must not exceed 63 characters, including the backslashes.
Removing directories- RMDIR ( RD)
Only empty directories may be removed. First you have to remove all the files
in the directory using DEL or Erase command. You cannot delete the root directory.
Syntax: RMDIR [d:] path or RD [d:] path
EXTERNAL COMMANDS
All external commands can be preceded by a drive name and path at which it is
available.
Formatting Disks- Format
Prepares a disk by rearranging random magnetic impulses into a series of
tracks and sectors so that is it addressable by DOS.
Syntax: [d : ] [path] FORMAT fd: (Is] [ l u] [14]
Page 5
SLIET, LONGOWAL
DOS INSTALLATION
Page 6
Run Z:\INSTALL
Read Copyright agreement
Click on OK
Choose the hard drive on which you want to install the program and
click on NEXT
Choose the directory (Default \BIBLE) and click on NEXT
Click on INSTALL DATA FILES TO HARD DRIVE and click on NEXT
Click on MS-DOS and click on NEXT
Click on each versions you wish to install, ensuring that it is
highlighted. Click on the right-hand arrow and repeat procedure for
each version you wish to install. Use the scroll bar on the right to view
all available versions. Please note that you are restricted to a maximum
of nine versions under DOS. When you have completed your choices,
click on NEXT
Repeat the above procedure with the Notes. You are restricted to eight
Notes under DOS. When you have completed your choices, click on
NEXT
Repeat the procedure for the Topics. When you have completed your
choices, click on NEXT
SLIET, LONGOWAL
Page 7
SLIET, LONGOWAL
MOTHERBOARD
If the CPU is the heart of the system the motherboard is its circulatory
system. The CPU has to be fitted on the socket on the Board. The board has
input output ports, ram, PCI slots, IDE port, chipset, Power connector, AGP
slot, other expansion slots, floppy port.
There are primarily two types of motherboards, AT motherboard, and
ATX motherboard. AT motherboards are older and not commonly used. The AT
and ATX motherboards differ in the form factor. Full AT is 12" wide x 13.8"
deep, and Baby AT is 8.57" wide x 13.04" deep. Full-ATX is 12" wide x 9.6"
deep and Mini-ATX is 11.2" wide x 8.2" deep. Other major differences include
power supply connector, and keyboard connector. AT has 5-pin large keyboard
connector, where as ATX has 6-pin mini connector. Similarly, AT has single row
two connectors +/-5V, and +/-12V, whereas ATX motherboard has double row
single connector providing +/-5V, +/-12V, and +3.3V.
Typical ATX PC
motherboard with
constituent
components.
2.
USB
3.
Parallel port
4.
CPU Chip
5.
6.
Page 8
1.
RAM slots
Floppy controller
SLIET, LONGOWAL
7.
IDE controller
8.
PCI slot
9.
ISA slot
10.
CMOS Battery
11.
AGP slot
12.
CPU slot
13.
2. USB (Universal serial bus): USB is the General-purpose connection for PC.
You can find USB versions of many different devices, such as
mice, keyboards, scanners, cameras, and even printers. a USB
connector's distinctive rectangular shape makes it easily
recognizable.
USB has a number of features that makes it particularly popular
on PCs. First, USB devices are hot swappable. You can insert or remove them
without restarting your system.
Page 9
SLIET, LONGOWAL
Memory module).
6. Floppy controller: The floppy drive connects to the computer via a 34-pin
ribbon cable, which in turn connects to the motherboard. A floppy controller is
one that is used to control the floppy drive.
7. IDE controller: Industry standards define two common types of hard drives:
EIDE and SCSI. Majority of the PCs use EIDE drives. SCSI drives show up in
high end PCs such as network servers or graphical workstations. The
EIDE drive connects to the hard drive via a 2-inch-wide, 40-pin ribbon cable,
which in turn connects to the motherboard. IDE controller is responsible for
controlling the hard drive.
Page 10
SLIET, LONGOWAL
a
a
13. Power supply plug in: The Power supply, as its name implies, provides the
necessary electrical power to make the pc
operate. the power supply takes standard
110-V AC power and converts into +/12-Volt, +/-5-Volt, and 3.3-Volt DC
power.
Page 11
SLIET, LONGOWAL
CHIPSET
Page 12
SLIET, LONGOWAL
The North Bridge Handles data for the graphics port whether that be
AGP or PCI express and the main memory which includes the FSB (Front side
bus). Although both chips are required for the PC to work the North Bridge
handles most of the very important tasks such as the connection between the
CPU and main memory bank. The South Bridge handles data from the PCI x1
slots and can also have integrated components such as Audio and/or onboard
graphics.
Page 13
The North and South bridges will have different chip names even
though they are very often paired with the same opposite bridge to come under
the collective name of the chipset.
SLIET, LONGOWAL
MICROPROCESSOR
The brain or engine of the PC is the
processor
(sometimes
called
microprocessor), or central processing unit
(CPU). Microprocessors are regarded as one
of the most important devices in our
everyday machines called computers. Before
we start, we need to understand what exactly
microprocessors are and their appropriate
implementations. Microprocessor is an
electronic circuit that functions as the
central processing unit (CPU) of a computer, providing computational control.
Microprocessors are also used in other advanced electronic systems, such as
computer printers, automobiles, and jet airliners.
The CPU performs the systems calculating and processing. The
processor is easily the most expensive single component in the system, costing
up to four or more times greater than the
motherboard it plugs into. Intel is generally
credited with creating the first microprocessor in
The
si mp l i fi ed
1971 with the introduction of a chip called the
mod
el of th e
4004. Today Intel still has control over the
c en tral
processor market, at least for PC s ystems. This
p roc essin g
means that all PC-compatible s ystems use either
u ni t.
Intel processors or Intel-compatible processors
from a handful of competitors (such as AMD or
Cyrix).
As there are a great many
variations in architecture between the
different kinds of CPU, we shall begin my
looking at a simplified model of the
structure. The model to be used can be
seen on the right of this page, and is a good basis on
which to build your knowledge of the workings of a
microprocessor. The simplified model consists of five
parts, which are:
ARITHMETIC & LOGIC UNIT (ALU)
Page 14
SLIET, LONGOWAL
register contains a number of individual bits that are used to store information
about the last operation carried out by the ALU. More on these registers can be
found in the register array section.
You can look at the ALU as comprising many subcomponents for each
specific task that it is required to perform. Some of these tasks and their
appropriate subcomponents are:
Logical tests
Further logic gates are used within the ALU to perform a number of
different logical tests, including seeing if an operation produces a result of
zero. Most of these logical tests are used to then change the values stored in the
flag register, so that they may be checked later by separate operations or
instructions. Others produce a result which is then stored, and used later in
further processing.
Page 15
Comparison
Comparison operations compare values in order to determine such
things as whether one number is greater than, less than or equal to another.
These operations can be performed by subtraction of one of the numbers from
the other, and as such can be handled by the aforementioned logic gates.
However, it is not strictly necessary for the result of the calculation to be stored
in this instance.. the amount by which the values differ is not required. Instead,
the appropriate status flags in the flag register are set and checked to determine
the result of the operation.
Bit shifting
SLIET, LONGOWAL
Shifting operations move bits left or right within a word, with different
operations filling the gaps created in different ways. This is accomplished via
the use of a shift register, which uses pulses from the clock within the control
unit to trigger a chain reaction of movement across the bits that make up the
word. Again, this is a quite complicated logical procedure, and further reading
may aid your understanding.
THE CONTROL UNIT
The control unit is arguably the most complicated
this model CPU, and is responsible for controlling much of
operation of the rest of the processor. It does this by issuing
signals to the other areas of the processor, instructing them
on what should be performed next.
Similarly to the ALU, the CU can be broken down
further. As such, the three main elements of the control unit
are as follows :
part of
the
control
Decoder
Timer or clock
The timer or clock ensures that all processes and instructions are
carried out and completed at the right time. Pulses are sent to the other areas of
the CPU at regular intervals (related to the processor clock speed), and actions
only occur when a pulse is detected. This ensures that the actions themselves
also occur at these same regular intervals, meaning that the operations of the
CPU are synchronized.
The control logic circuits are used to create the control signals
themselves, which are then sent around the processor. These signals inform the
arithmetic and logic unit and the register array what they actions and steps they
should be performing, what data they should be using to perform said actions,
and what should be done with the results.
SLIET, LONGOWAL
REGISTER
A register is a memory location within the CPU
itself, designed to be quickly accessed for purposes of fast
data retrieval. Processors normally contain a register array,
which houses many such registers. These contain
instructions, data and other values that may need to be
quickly accessed during the execution of a program. Many
different types of registers are common between most
microprocessor designs. These are:
This register is used to hold the memory address of the next instruction
that has to execute in a program. This is to ensure the CPU knows at all times
where it has reached, that is able to resume following an execution at the
correct point, and that the program is executed correctly.
SLIET, LONGOWAL
These registers have no specific purpose, but are generally used for the
quick storage of pieces of data that are required later in the program execution.
In the model used here these are assigned the names A and B, with suffixes of L
and U indicating the lower and upper sections of the register respectively.
SYSTEM BUS
The system bus is a cable which carries data
communication between the major components of the
computer, including the microprocessor. Not all of
communication that uses the bus involves the CPU,
although naturally the examples used in this tutorial
centre on such instances.
the
will
Control Bus
The control bus carries the signals relating to the control and coordination of the various activities across the computer, which can be sent from
the control unit within the CPU. Different architectures result in differing
number of lines of wire within the control bus, as each line is used to perform a
specific task. For instance, different, specific lines are used for each of read,
write and reset requests.
Page 18
Data Bus
This is used for the exchange of data between the processor, memory
and peripherals, and is bi-directional so that it allows data flow in both
directions along the wires. Again, the number of wires used in the data bus
(sometimes known as the 'width') can differ. Each wire is used for the transfer
SLIET, LONGOWAL
Address Bus
The address bus contains the connections between the microprocessor
and memory that carry the signals relating to the addresses which the CPU is
processing at that time, such as the locations that the CPU is reading from or
writing to. The width of the address bus corresponds to the maximum addressing
capacity of the bus, or the largest address within memory that the bus can work
with. The addresses are transferred in binary format, with each line of the
address bus carrying a single binary digit. Therefore the maximum address
capacity is equal to two to the power of the number of lines present (2^lines).
CLASSIFICATION OF MICROPROCESSORS
4-BIT MICROPROCESSORS
Page 19
INTEL 4004
Introduced in 1971.
It was the first microprocessor by Intel.
It was a 4-bit P.
Its clock speed was 740 KHz.
It had 2,300 transistors.
It
could
execute
around
60,000
instructions per second.
16-pin DIP
INTEL 4040
4-bit microprocessor
Program memory expanded to 8 KB
24-pin DIP
Its clock speed was 740 KHz.
It could execute around 60,000
instructions per second
18-pin DIP
8-BIT MICROPROCESSORS
SLIET, LONGOWAL
INTEL 8008
Introduced in 1972.
It was first 8-bit P.
Its clock speed was 500 KHz.
Could execute 50,000
Instructions per second.
Intel 8080
Introduced in 1974.
It was also 8-bit P.
Its clock speed was 2 MHz
It had 6,000 transistors.
Was 10 times faster than 8008.
Could execute 5,00,000 Instructions per
second.
INTEL 8085
Introduced in 1976.
It was also 8-bit P.
Its clock speed was 3 MHz
Its data bus is 8-bit and address bus is
16-bit.
It had 6,500 transistors.
Could execute 7, 69,230 instructions
per second.
It could access 64 KB of memory.
It had 246 instructions.
40-pin DIP
16-BIT MICROPROCESSORS
Page 20
Intel 8086
Introduced in 1978.
It was first 16-bit P.
Its clock speed is 4.77 MHz, 8 MHz and 10
MHz, depending on the version.
Its data bus is 16-bit and address bus is 20-bit.
It had 29,000 transistors.
Could execute 2.5 million instructions per
second.
It could access 1 MB of memory.
It had 22,000 instructions.
It had Multiply and Divide instructions.
Intel 8088
SLIET, LONGOWAL
Introduced in 1979.
It was also 16-bit P.
It was created as a cheaper version of
Intels 8086.
It was a 16-bit processor with an 8-bit
external bus.
Could execute 2.5 million instructions per second.
This chip became the most popular in the computer industry when IBM
used it for its first PC.
32-BIT MICROPROCESSORS
INTEL 80386
Introduced in 1985.
It had 2,75,000 transistors.
It could address 4 GB of memory.
Its data bus is 32-bit and address bus is 32-bit.
Its clock speed varied from 16 MHz to 33 MHz
depending upon the various versions.
132-pin PGA (Pin Grid Array)
Page 21
INTEL 80486
Introduced in 1989.
It was first 32-bit P.
It had 1.2 million transistors.
It could address 4 GB of memory.
Its data bus is 32-bit and address bus is 32-bit.
Its clock speed varied from 16 MHz to 100 MHz
depending upon the various versions.
68-pin PGA (Pin Grid Array)
INTEL PENTIUM
SLIET, LONGOWAL
Introduced in 1993.
It was also 32-bit P.
It was originally named 80586.
Its clock speed was 66 MHz.
Its data bus is 32-bit and Address bus is 32-bit.
It could address 4 GB of memory.
Could execute 110 million instructions per
second.
Cache memory:
8 KB for instructions.
8 KB for data.
273-pin PGA (Pin Grid Array) use socket 7.
INTEL PENTIUM II
Introduced in 1997.
Its clock speed was 233 MHz to 500 MHz.
Could execute 333 million instructions
second.
MMX technology was supported.
L2 cache & processor were on one circuit.
per
Page 22
INTEL PENTIUM IV
Introduced in 2000.
Its clock speed was from 1.3 GHz to 3.8 GHz.
L1 cache was of 32 KB & L2 cache of 256
KB.
It had 42 million transistors.
All internal connections were made from
aluminium to copper.
INTEL DUAL CORE
SLIET, LONGOWAL
Page 23
Introduced in 2006.
It has two cores.
Both the cores have their own internal bus and L1
cache, but share the external bus and L2 cache
(Next Slide).
It
supported
SMT
(Simultaneously
MultiThreading) technology.
E.g.: Adobe Photoshop supported SMT.
SLIET, LONGOWAL
64-BIT MICROPROCESSORS
INTEL CORE 2
Introduced in 2006.
Its clock speed is from 1.2 GHz to 3 GHz.
It has 291 million transistors.
It has 64 KB of L1 cache per core and 4 MB of
L2 cache.
It is launched in three different versions:
o Intel Core 2 Duo
o Intel Core 2 Quad
o Intel Core 2 Extreme
INTEL CORE I3
Introduced in 2010.
It has 2 physical cores.
Its clock speed is from 2.93 GHz to 3.33 GHz.
It has 781 million transistors.
It has 64 KB of L1 cache per core, 512 KB of L2
cache and 4 MB of L3cache.
INTEL CORE I5
Introduced in 2009.
It has 4 physical cores.
Its clock speed is from 2.40 GHz to 3.60 GHz.
It has 781 million transistors.
It has 64 KB of L1 cache per core, 256 KB of L2
cache and 8 MB of L3 cache. 30
INTEL CORE I7
Introduced in 2008.
It has 4 physical cores.
Its clock speed is from 2.66 GHz to 3.33 GHz.
It has 781 million transistors.
It has 64 KB of L1 cache per core, 256 KB of L2
cache and 8 MB of L3 cache.
Page 24
RISC processor
[Reduced Instruction Set Computer], computer arithmetic-logic
unit
that uses a minimal instruction set, emphasizing the instructions used most
often and optimizing them for the fastest possible execution. Software for
RISC processors must handle more operations than traditional CISC
[Complex Instruction Set Computer] processors, but RISC processors have
SLIET, LONGOWAL
RISC
Instruction Set
Complex (8 to 20)
Addressing Modes
Simple (4 or less)
Specialized
Instruction Format
Simple
Variable
Code Lengths
Fixed
Variable
Execution Cycles
Higher
Lower
Compilation
Simplifies
Processor design
Complicates
Software
Page 25
Processor design
SLIET, LONGOWAL
BIOS
The BIOS program runs as soon as the PC is
switched on. It initializes and checks the PC's hardware
(especially on-board chips on the motherboard) and boots
the main operating system from disk.
What is CMOS?
In order for the BIOS to control PC hardware it needs information
about settings for attached devices, e.g. which hard disk to boot from,
whether on-board sound is enabled, or whether to reserve specific IRQs for
particular devices.
These settings are stored in non-volatile BIOS memory . This memory
chip was traditionally battery powered (to keep it from forgetting settings
when the main power is switched off) and thus used CMOS (Complementary
Metal Oxide Semiconductor) static RAM circuit designs, known for their low
power requirements and ability to run on a range of voltages.
The name "CMOS memory" stuck and we still refer to the settings as
"the CMOS" even though all ICs in a modern PC are made using CMOS
technology.
BATTERIES
RTC / CMOS batteries come in a variety of shapes and sizes. The most
common type is the lithium CR2032 cell. These are widely available and
easily replaced. In some machines, however, these cells come in a package
that is directly soldered into the
PCB.
Page 26
SLIET, LONGOWAL
CMOS Settings
Gaining access
to the BIOS Setup /
CMOS
Settings
program is not as eas y
as it appears. Many
BIOS writers require
you
to
press
a
particular key within
the first few seconds
after power-on:
Some very old equipment (e.g. IBM PS/2) needed a special setup
program from disk.
The increasing use of custom boot displays may require you to
press Tab or Esc before pressing the appropriate setup key.
Main settings
The main settings typically
allow you to alter s ystem date and
time and disk drives.
There is usually a 'default'
option that restores all CMOS
settings back to their factory state.
Hard drives
Page 27
The BIOS needs to know the hard drive size and drive settings
(including number of sectors, cylinders and heads) to be able to boot
correctly. This information is usually auto-detected; the setup screen
will display the drive name and capacity. On older systems this autodetection may need to be manually triggered.
IDE hard drives have the ability to lie about the number of sectors,
cylinders and heads. This started when the number of cylinders and
sectors grew too big for normal BIOS parameters. LBA (logical block
addressing) and CHS / Large mode are two common translation
methods.
SLIET, LONGOWAL
Boot sequence
Usually you can specify a specific order but some BIOSes restrict you
to only a few options.
Floppy drive
Hard drive(s) IDE or SCSI (note that SATA drives are often
classed as SCSI by the BIOS)
CD or DVD drive(s)
Network used by thin clients
USB
Advanced settings
Motherboard FSB speed
CPU speed and core voltage often auto-detected
Dynamic RAM speed, timing and voltage
PCI PnP (plug'n'play) settings
Peripherals
Parallel port (IRQ & I/O address; enable, SPP / ECP / EPP)
Serial ports (IRQ & I/O address; enable)
USB, FireWire and IrDA (enable)
On-board devices, e.g. audio, video, network card (enable)
Security
You can specify two levels of BIOS password: a user password that is
required at power-on, and a supervisor password that is required to access
CMOS settings.
Clearing a BIOS password can usually be achieved by shorting the "clear
CMOS" jumpers on the motherboard. However, this is not always practical or
possible. Technicians often have special boot floppies (or bootable CDs)
containing a CMOS clearing utility such as Kill CMOS. Removing the
battery for a period may clear older CMOS memories but modern
motherboards use EEPROM or Flash ROM instead.
Page 28
SLIET, LONGOWAL
Page 29
SLIET, LONGOWAL
Page 30
The disk platters are spun at high speed that spins the air contained in
the disk unit around with it. The read/write head is aerodynamically shaped
and uses the movement of air over the platter to enable it to float at a very
precise distance from the surface of the platter. This distance is very small,
much smaller than the diameter of a human hair.
SLIET, LONGOWAL
Page 31
Page 32
SLIET, LONGOWAL
INSTALLATIION OF WINDOWS 7
When installing on a physical computer insert your Windows 7 DVD media into your
DVD drive and reboot your computer. If you're asked to press a key to boot from DVD or
CD, press any key. A black window will appear momentarily while the DVD content is
read.
Next, a Starting Windows screen will appear.
will boot directly into the Graphical User Interface (GUI) mode.
After a few moments you will see the first prompt:
Click "Next" unless you want to change some regional settings for the installation
process.
Click on the "Install now" button.
Next, accept the license terms and click on "Next".
Next, unless you're upgrading an existing Windows installation, press the Custom
Page 33
SLIET, LONGOWAL
The next phase is to pick the installation partition. Since this computer has a new hard
disk that hasn't been formatted before, you will only have the option to create a new
partition on it.
If you want to create, extend, delete, or format a partition, click Drive options (advanced),
click the option you want, and then follow the instructions.
The setup process will now begin to copy files from the installation DVD media to the
hard disk.
Process could take a while depending on the type of hardware your computer uses.
The computer will reboot, and the next thing you'll see is the prompt to set the user's and
computer's name. By default, the computer's name will be username-PC, where username
Page 34
SLIET, LONGOWAL
Enter the user's password. Remember this password, as it will be the ONLY user on the
system, and unless you create an additional user or enable the built-in administrator
account, if you forget this password you'll need to crack it to gain access to the system.
The best option would be to choose a complex password made of at least 7 characters or
more (something like Pssw0rd or MYpa$$w0rd). You must also enter a password hint.
Click on "Next".
Next, type in your product key. If you do not have the product key at hand you can still
click "Next", and proceed with the installation. You will be asked to enter the product key
Page 35
Choose what sort of protection your computer gets. The recommended settings are best
for someone that doesn't plan to hide their computer behind a corporate firewall.
SLIET, LONGOWAL
Select your network location type. This setting can be changed later, but do note that
choosing a profile will have effect on the Windows Firewall and sharing settings. Click on
"Next".
Windows will finalize the settings and your desktop will appear.
This concludes the Windows 7 installation. Next, you would probably want to update
Page 36
your computer with the latest hotfixes and/or patches from Microsoft.
SLIET, LONGOWAL
INTERFACE STANDARD
IDE (ATA)
Short
for Integrated
Drive
Electronics or IBM
Disc
Electronics, IDEis
more
commonly
known
as ATA or Parallel
ATA (PATA) and is a
standard interface for IBM
compatible hard drives.
IDE is different from the
Small Computer Systems
Interface
(SCSI)
and
Enhanced Small Device
Interface (ESDI) because
its controllers are on each
drive, meaning the drive
can connect directly to the motherboard or controller. IDE and its updated
successor, Enhanced IDE (EIDE), are the
most common drive interfaces found in IBM
compatible computers today. Below, is a
picture of the IDE connector on the back of
a hard drive, a picture of what an IDE cable
looks like, and the IDE channels it connects
to on the motherboard.
Page 37
SLIET, LONGOWAL
Page 38
SLIET, LONGOWAL
Page 39
Different color wire from SMPS with the voltage they have
SLIET, LONGOWAL
NETWORKING
Networking is interconnection of various devices like as pc, scanner,
printer etc. located at different places. In computer network two or more
computers are linked together with a medium and data
communication devices for the purpose of communication of data
and sharing of resources. The computer that provides resources to
other computers on a network is known as server. In the network the
individual computers, which access shared network resources, are known as
client.
APPLICATIONS
Page 40
Sharing of hardware
Computer hardware resources
Disks
Printers
Sharing of software
Multiple single user licenses are more expensive than multi-user
license.
Eas y maintenance of software
Sharing of information
Several individuals can interact with each other
Working in groups can be formed
E-MAIL
Communication
E-mail
Internet telephony
Audio conferencing
Video conferencing
Scalability
Individual subsystems can be created and combine it into a main
system to enhance the overall performance.
Distributed systems
In a networked environment computers can distribute the work load
among themselves keeping transparency to the end user.
SLIET, LONGOWAL
HU
SERVER
TYPES
OF NETWORKING
Page 41
SLIET, LONGOWAL
Page 42
MAN
SLIET, LONGOWAL
Page 43
SLIET, LONGOWAL
domain
is
This is a
the
NETWORKING TOPOLOGIES
Page 44
BUS
In a bus topology all devices are connected to the transmission
medium as backbone. There must be a terminator at each end of the bus
to avoid signal reflections, which may distort the original signal.
Signal is sent in both directions, but some buses are unidirectional.
Good for small networks. Can be used for 10BASE5 (thick net),
10BASE2 (thin net) or 10BROAD36 (broad band) co-axial bus
standards.
The main problem with the bus topology is failure of the medium
will seriously affect the whole network. Any small break in the media
the signal will reflect back and cause errors. The whole network must
be shutdown and repaired. In such situations it is difficult to
troubleshoot and locate where the break in the cable is or which
machine is causing the fault; when one device fails the rest of the LAN
fails.
STAR
SLIET, LONGOWAL
In a star
topology
each
station
is
connected to a
central node. The
central node can
be either a hub or
a switch. The star
topology does not
have the problem
as seen in bus
topology.
The
failure of a media
does not affect
the
entire
network.
Other
stations can continue to operate until the damaged segment is repaired.
Commonly used for 10BASE5, 10BASE-T or 100BASE-TX types.
The advantages are cabling is inexpensive, easy to wire, more
reliable and easier to manage because of the use of hubs which allow
defective cable segments to be routed around; locating and repairing
bad cables is easier because of the concentrators; network growth is
easier.
The disadvantages are all nodes receive the same signal therefore
dividing bandwidth; Maximum computers are 1,024 on a LAN.
Maximum UTP (Unshielded twisted pair) length is 100 meters;
distance between computers is 2.5 meters.
This topology is the dominant physical topology today.
Page 45
RING
Each device has a transceiver which behaves like a repeater
which moves the signal
around the ring; ideal
for token passing access
methods.
In this topology
signal degeneration is
FLOW OF MESSAGE
low; only the device
that holds the token can
transmit which reduces
collisions.
Messages
travel around the ring,
with each node reading
those
messages
addressed to it. One of
SLIET, LONGOWAL
the advantages of ring networks is that they can span larger distance
than other types of networks, such as bus networks, because each node
regenerates messages as they pass through it.
If you see its negative aspect it is difficult to locate a problem
cable segment; expensive hardware.
MESH
A mesh physical topology is when every device on the network is
connected to every device on the network; most commonly used in
WAN configurations.
Helps find the quickest route on the network; provides
redundancy. It is very expensive and not eas y to set up.
Page 46
HYBRID
A hybrid topology is a combination of any two or more network
topologies in such a way that the resulting network does not have one
of the standard forms. For example, a tree network connected to a tree
network is still a tree network, but two star networks connected
together exhibit hybrid network topologies. A hybrid topology is
SLIET, LONGOWAL
Page 47
SLIET, LONGOWAL
TRANSMISSION MEDIA
The means through which data is transformed from one place to another
is called transmission or communication media. There are two categories of
transmission media used in computer communications.
GUIDED MEDIA
Guided media are the physical links through which signals are
confined to narrow path. It is made up of an external conductor
(Usually Copper) bounded by jacket material. Guided media are great
for LABS because they offer high speed, good security and low cast.
However, some time they cannot be used due distance communication.
Three common types of these media are used of the data transmission.
Page 48
COAXIAL CABLE
Coaxial cable is very common & widely used commutation
media. For example TV wire is usually coaxial.
Coaxial cable gets its name because it contains two conductors
that are parallel to each other. The center conductor in the cable is
usually copper. The copper can be either a solid wire
or stranded martial.
Outside this central Conductor
is a non-conductive material. It is
usually white, plastic material
used to separate the inner
Conductor form the outer
Conductor.
The
other
Conductor is a fine mesh made
from Copper. Outside the
copper mesh is the final
protective cover.
The actual data travels through the center conductor in the cable.
EMI interference is caught by outer copper mesh. There are different
types of coaxial cable vary by gauge & impedance.
Gauge is the measure of the cable thickness. It is measured by
the Radio grade measurement, or RG number. The high the RG number,
the thinner is the central conductor core, the lower the number the
thicker the core.
COAXIAL STANDARD
50-Ohm RG-7 or RG-11 : used with thick Ethernet.
50-Ohm RG-58 : used with thin Ethernet
75-Ohm RG-59 : used with cable television
93-Ohm RG-62 : used with ARCNET.
SLIET, LONGOWAL
CHARACTERISTICS OF
COAXIAL CABLE
Low cost & Eas y to install
Up to 10Mbps capacity
Medium immunity form EMI
Medium of attenuation
ADVANTAGES COAXIAL CABLE
Inexpensive
Eas y to wire
Eas y to expand
Moderate
level
of
EMI
immunity
DISADVANTAGE COAXIAL CABLE
Single cable failure can take down an entire network
Page 49
Category 2
These cables can support up to 4 mps implementation.
SLIET, LONGOWAL
Category 3
These cable supports up to 16 mps
are mostly used in 10 mbps.
Category 4
These are used for large distance and
high speed. It can support 20mps.
Category 5
This is the highest rating for UTP
cable and can support up to 100mps.
Advantages of UTP
low cost
eas y to install
High speed capacity
High attenuation
Effective to EMI
100 meter limit
Disadvantages of UTP
Short distance due to attenuation
and
Page 50
ADVANTAGES OF STP
Medium cost & Easy to install
Higher capacity than UTP
Higher attenuation, but same as UTP
Medium immunity from EMI
SLIET, LONGOWAL
DISADVANTAGES OF STP:
More expensive than UTP and coaxial
More difficult installation
High attenuation rate
OPTICAL FIBRE
Fiber optic cable uses electrical signals to transmit data. It uses
light. In fiber optic cable light only moves in one direction for two way
communication to take place a second connection must be
made between the two devices. It is
actually two stands of cable. Each
stand
is
responsible
for one
direction
of
communication. A laser at one device sends pulse
of
light through this cable to other device. These
pulses translated into 1s and 0s at the
other end.
In the center of fiber cable is a
glass stand or core. The light from the
laser moves through this glass to the
other device around the internal core is a reflective material
known as CLADDING. No light escapes the glass core because
of this reflective cladding.
Fiber optic cable has bandwidth more than 2 gbps (Gigabytes per
Second)
Page 51
UNGUIDED MEDIA
Unguided or wireless media
doesn't use any physical connectors between
the two devices communicating. These mainly consists of
electromagnetic wave. Signals are normally broadcast through the air
and thus are available to any one who has the device capable of
receiving them. Wireless media is used when a physical obstruction or
distance blocks are used with normal cable media.
SLIET, LONGOWAL
of
unguided
media are:
HIGH POWER, SINGLE FREQUENCY:This is similar to low power single frequency. These devices can
communicate over greater distances.
CHARACTERISTICS
o Moderate cost
o Easier to install than low power single frequency
SLIET, LONGOWAL
MICROWAVE
Microwave transmission is line of sight transmission. The
Transmit station must be in visible contact with the receive station.
This sets a limit on the distance between stations depending on the
local geography. Typically the line of sight due to the Earth's curvature
is only 50 km to the horizon. Repeater stations must be placed so the
data signal can hop, skip and jump across the country. The distance
covered by microwave signals is based upon the height of the antenna.
In order to increase this coverage each antenna has a built-in repeater
that regenerates the signal before passing it on to the next antenna in
line. The placement of the antenna to do this is approximately 25 miles.
The main drawback of microwave signals is that they can be
affected by weather, especially rain.
Following are the types of Micro waves.
Terrestrial Micro waves:Terrestrial Micro waves are used are used to transmit wireless
signals across a few miles. Terrestrial s ystem requires that direct
parabolic antennas can be pointed to each other. These systems operate
in a low Giga Hertz range.
Page 53
SLIET, LONGOWAL
Page 54
INFRARED
Infrared frequencies are just below visible light. These high
frequencies allow high sped data transmission. This technology is
similar to the use of a remote control for a TV. Infrared transmission
can be affected by objects obstructing sender or receiver. Infrared (IR)
light is electromagnetic radiation with longer wavelengths than those of
visible light, extending from the nominal red edge of the visible
spectrum at 0.74 micrometres (m) to 300 m. This range of
wavelengths corresponds to a frequency range of approximately 1 to
400 THz and includes most of the thermal radiation emitted by objects
near room temperature.
These transmissions fall into two categories .
Point to Point:Point to point infrared transmission signal directly between two
systems. Many lap top system use point to pint transmission. These
systems require direct alignment between many devices.
Characteristics of Point to point: Wide range of cost
Moderately eas y installation.
100 k bps to 16 Mb of capacity.
Variable attenuation.
High immunity to EMI
Broad Cast:These infrared transmission use sprayed signal, one broad cast in
all directions instead of direct beam. This help to reduce the problems
of proper alignment and abstraction. It also allows multiple receiver of
signal
Characteristics of Broad Cast:
SLIET, LONGOWAL
Inexpensive.
Single installation.
1M bps capacity.
Variable attenuation.
Page 55
SLIET, LONGOWAL
NETWORK DEVICES
The hardware which is required to establish a network connection is
network devices. These are,
HUB
Hubs act as junction boxes, linking cables from several computers
on a network. Hubs are usually sold with 4, 8, 16 or 24 ports. Some
hubs allow connection of more than one kind of cabling, such as UTP
and coax. Hubs also repeat (reconstruct and strengthen) incoming
signals. This is important since all signals become weaker with
distance. The maximum LAN segment distance for a cable can therefore
be extended using hubs.
Page 56
NIC CARD
Network interface cards (NIC), also called network cards and
network adapters include a cable socket allowing computers to be
connected to the network. All NICs have a unique address (sometimes
called a MAC address), placed in them by their manufacturer.
Before sending data onto the
network, the network card also
organizes data into frames and then
sends them out on the network.
Notebook computers often use NICs
that are plugged into the PCMCIA
port.
Wireless LAN adapters are needed
for WLANs.
NIC card functions:
Monitoring activity on the communication medium.
Providing each workstation/server with a
unique
identification address (MAC).
Recognizing and receiving data transmitted
to the computer.
Creating (building) the frames needed to
transmit data on the communication
medium.
Controlling LAN transmission speed.
Transmission error detection and recovery.
SLIET, LONGOWAL
Page 57
In general use Hub can be referred to any connecting device and can
be considered as multipoint repeater. Hubs can be used to
create
tree structure like topology (Technically it is bus topology).
Network
point
of
view it is a logical
device and does not
have an address. The
added
benefit
of
using Hub is it removes
the
length
restriction
100 meters in 10BaseT.
SWITCH
A
Switch
is
more
sophisticated
than hub and can remember
and check node addresses.
In fact this phenomenon can
affect
logical
topology of the network! They
physically
resemble
hubs and like hubs, they vary in number of ports, stand-alone vs.
stackable, and managed vs. unmanaged.
While a hub broadcasts data frames to all ports, the switch reads the
destination address of the data frame and only sends it to the
corresponding port. The effect is to turn the network into a group of
point-to-point circuits and thus changes the logical topology of the
network from a bus to a star.
When a switch is first turned on, its internal forwarding table is
empty. It then learns which ports correspond to which computers by
reading the source addresses of the incoming frames along with the
port number that the frame arrived on. If the switchs forwarding table
does not have the destination address of the data frame, it broadcasts
the frame to all ports.
Thus, a switch starts by working like a hub and then works more and
more as a switch as it fills its forwarding table. Thus they work at
machine address level.
SLIET, LONGOWAL
BRIDGE
A bridge is a device that allows you to segment a large network into
two smaller, more efficient networks. If you are adding to an older
wiring scheme and want the new network to be up-to-date, a bridge can
connect the two.
A bridge monitors the information traffic on both sides of the
network so that it can pass packets of information to the correct
location. Most bridges can "listen" to the network and automatically
figure out the address of each computer on both sides of the bridge.
The bridge can inspect each message and, if necessary, broadcast it on
the other side of the network.
The bridge manages the traffic to maintain optimum performance on
both sides of the network. You might say that the bridge is like a traffic
cop at a busy intersection during rush hour. It keeps information
flowing on both sides of the network, but it does not allow unnecessary
traffic through. Bridges can be used to connect different types of
cabling, or physical
topologies.
They
must, however, be
used
between
networks with the
same protocol.
REPEATER
Since a signal loses strength as it passes along a cable, it is often
necessary to boost the signal with a device called a repeater. The
repeater electrically amplifies the signal it receives and rebroadcasts it.
Repeaters can be separate devices or they can be incorporated into a
concentrator.
They are used when the total length of your network
cable
exceeds the standards set for the type of cable being used.
A good example of the use of repeaters would be in a
local
area network using a star topology with unshielded
twisted-pair cabling. The length limit for unshielded
twisted-pair cable is 100 meters. The most
common
configuration
is
for
each
workstation to be connected by twisted-pair
cable to a multi-port active concentrator.
The concentrator amplifies all the signals
that pass through it allowing for the total length of
cable on the network to exceed the 100 meter limit
Page 58
ROUTER
SLIET, LONGOWAL
Page 59
SLIET, LONGOWAL
Page 60
CONFIGURATION
SLIET, LONGOWAL
Page 61
CROSSOVER CABLING
SLIET, LONGOWAL
Page 62
ROLLOVER CABLING
Rollover wired cables most commonly called rollover cables, have
opposite Pin assignments on each end of the cable or in other words it
is "rolled over". Pin 1 of connector A would be connected to Pin 8 of
connector B. Pin 2 of connector A would be connected to Pin 7 of
connector B and so on. Rollover cables, sometimes referred to as Yost
cables are most commonly used to connect to a devices console port to
make programming changes to the device. Unlike crossover and
straight-wired cables, rollover cables are not intended to carry data but
instead create an interface with the device.
SLIET, LONGOWAL
PROTOCOL
A protocol is a set of rules that governs the communications between
computers on a network. These rules include guidelines that regulate the
following characteristics of a network: access method, allowed physical
topologies, types of cabling, and speed of data transfer. Protocols specify
interactions between the communicating entities. Sometimes protocol is
called language for communication that means both Tx & Rx end should have
same protocol.
On the basis of connection of protocol it is of two types
Connection oriented
Connection-Oriented means that when devices communicate, they
perform handshaking to set up an end-to-end connection.
Connection-Oriented systems can only work in bi-directional
communications environments. To negotiate a connection, both sides
must be able to communicate with each other. This will not work in
a unidirectional environment.
Example: TCP
Connection less
A Connectionless Protocol is a data communication method in
which communication occurs between hosts with no previous setup.
The device at one end of the communication transmits data to the
other, without first ensuring that the recipient is available and ready
to receive the data. The device sending a message simply sends it
addressed to the intended recipient.
Example: IP, UDP, ICMP, DNS and SNMP
NOTE
ROUTABLE PROTOCOL: A communication protocol that contains
a network address as well as a device address is routable protocol. It allows
packets to be forwarded from one network to another. It can cross the
router.
Exa mples: TCP/IP, IPX, AppleTalk, SNA, XNS and DECnet.
Page 63
SLIET, LONGOWAL
TCP/IP
The Internet protocols consist of a suite of communication protocols, of
which the two best known are the Transmission Control Protocol (TCP) and
the Internet Protocol (IP). Internet protocols were rst developed in the mid1970s, when the Defense Advanced Research Projects Agency (DARPA)
became interested in establishing a packet-switched network that would
facilitate communication between dissimilar computer systems at research
institutions
Transmission Control Protocol (TCP), which uses a set of rules to
exchange messages with other Internet points at the information packet level.
Internet Protocol (IP), which uses a set of rules to send and receive messages
at the Internet address level.
Features of TCP/IP:
It is open standard
Specially designed for LAN & WAN
Support both connection oriented & connectionless protocol
It is routable protocol
It uses manual configuration
It is divided into four layers
Page 64
TCP/IP architecture omits some features found under the OSI model,
combines the features of some adjacent OSI layers and splits other layers
apart. The 4-layer structure of TCP/IP is built as information is passed down
from applications to the physical network layer. When data is sent, each layer
treats all of the information it receives from the upper layer as data, adds
control information (header) to the front of that data and then passes it to the
lower layer. When data is received, the opposite procedure takes place as
each layer processes and removes its header before passing the data to the
upper layer.
SLIET, LONGOWAL
The TCP/IP 4-layer model and the key functions of each layer are
described below:
Application Layer
The Application Layer in TCP/IP groups the functions of OSI
Application, Presentation Layer and Session Layer. Therefore any process
above the transport layer is called an Application in the TCP/IP architecture.
In TCP/IP socket and port are used to describe the path over which
applications communicate. Most application level protocols are associated
with one or more port number.
Transport Layer
In TCP/IP architecture, there are two Transport Layer protocols. The
Transmission Control Protocol (TCP) guarantees information transmission.
The User Datagram Protocol (UDP) transports datagram without end-to-end
reliability checking. Both protocols are useful for different applications.
Network Layer
The Internet Protocol (IP) is the primary protocol in the TCP/IP Network
Layer. All upper and lower layer communications must travel through IP as
they are passed through the TCP/IP protocol stack. In addition, there are
many supporting protocols in the Network Layer, such as ICMP, to facilitate
and manage the routing process.
Page 65
SLIET, LONGOWAL
PROTOCOL
DESCRIPTION
SNMP
Simpl
e
for
manage
DHCP
(Dynamic
Host
Configuration
Protocol ):
automatically sends IP address to DHCP client.
&
It
connection
SLIET, LONGOWAL
Page 67
SLIET, LONGOWAL
IP ADDRESSING
As with any other network-layer protocol, the IP addressing scheme is
integral to the process of routing IP datagram through an internetwork. Each
IP address has specific components and follows a basic format. These IP
addresses can be subdivided and used to create addresses for sub networks.
Each host on a TCP/IP network is assigned a unique 32-bit logical
address that is divided into two main parts: the network number and the host
number. The network number identifies a network and must be assigned by
the Internet Network Information Center (Inter NIC) if the network is to be
part of the Internet. An Internet Service Provider (ISP) can obtain blocks of
network addresses from the Inter NIC and can itself assign address space as
necessary. The host number identifies a host on a network and is assigned by
the local network administrator.
IP ADDRESS FORMAT
The 32-bit IP address is grouped eight bits at a time, separated by dots,
and represented in decimal format (known as dotted decimal notation). Each
bit in the octet has a binary weight (128, 64, 32, 16, 8, 4, 2, 1). The minimum
value for an octet is 0, and the maximum value for an octet is 255.
IP ADDRESS CLASS
IP addressing supports five different address classes: A, B, C, D, and E
in which only classes A, B, and C are available for commercial use. The leftmost (high-order) bits indicate the network class.
CLAS
N/W
Host
MAX.
RANGE
S
A
Page 68
B
C
D
E
Purpose
ID
ID
Host
1. 0 . 0. 0
F EW L A R G E
8 BIT
2 4 B IT
24
- 2
1 2 6 . 0. 0 . 0
1 2 8. 1 . 0. 0
O R G A N I ZATI O N S
M E D I UM - S I ZE
1 6 B IT
1 6 B IT
216 - 2
1 9 1 . 2 5 4. 0 . 0
1 9 2. 0 . 1. 0
O R G A N I ZATI O N S
R E L ATI V E LY SM A L L
2 4 B IT
8 BIT
28 - 2
2 2 3 . 2 5 5. 2 5 4 . 0
2 2 4. 0 . 0. 0
O R G A N I ZATI O N S
N/A
N/A
N/A
M ULTI C A S T
N/A
N/A
N/A
RESEARCH
2 3 9 . 2 5 5. 2 5 5 . 2 5 5
2 4 0. 0 . 0. 0
2 5 4 . 2 5 5. 2 5 5 . 2 5 5
SLIET, LONGOWAL
One address is reserved for broadcast address & one is reserved for network
address.
N/A Not Available for comme rcial use.
METHOD:
Switch on all the PCs and devices.
Give IP address to PC1 as 192.168.1.1 and to PC2 1 9 2 .1 6 8 .
192.168.1.5
Run ping command from each PC so that we confirm each PC
is responding to each other.
Syntax: Ping <IP address of the PC>
If there is no response check for the firewall setting.
Page 69
SLIET, LONGOWAL
NETWORK PRINTING
It is basically the connection of a network printer with number
of PC. It is mainly used in large organization where there is large
demand of printing from different members. It is cumbersome of
providing an individual printer to each member of the organization
so this type of configuration is required. In this configuration if a
member want to give a print command then it is required to be
authorized by the server to pass the command to the printer.
REQUIREMENTS:
Network printer & a PC
Connecting media
A switch
Page 70
METHODS:
Press the green button on the printer for a while.
We get a window for the IP address of the printer on PC
Provide the IP address
Run ping command from PC so that we confirm it is
responding to the network.
Syntax: Ping <IP address of the PC>
Open Internet Explorer with address
http://IP address of the printer
Under network button we give the IP address
We can also give the subnet mask if we are working in office
range
Change the PC IP address to previous IP address & load the
driver
SLIET, LONGOWAL
Page 71
Insert the Windows Server 2003 CD-ROM into your computer's CDROM or DVD-ROM drive.
Click Start, click Run, and then type dcpromo.
Click OK to start the Active Directory Installation Wizard, and then
click Next.
Click Domain controller for a new domain , and then click Next.
Click
Domain
in
a
new
forest
,
and
then
click
Next.
Specify
the
full DNS
name
for
the
new
domain.
Note
that
because
this
SLIET, LONGOWAL
Page 72
SLIET, LONGOWAL
Type a new password, confirm the password, and then click to select
one of the following check boxes:
Users must change password at next logon (recommended for
most users)
User cannot change password
Page 73
SLIET, LONGOWAL
Page 74
SLIET, LONGOWAL
Page 75
SLIET, LONGOWAL
DHCP SERVER
"Dynamic Host Configuration Protocol (DHCP) is an IP standard
designed to reduce the complexity of administering IP address
configurations." A DHCP server would be set up with the appropriate settings
for a given network. Such settings would include a set of fundamental
parameters such as the gateway, DNS, subnet masks, and a range of IP
addresses. Using DHCP on a network means administrators don't need to
configure these settings individually for each client on the network. The
DHCP would automatically distribute them to the clients itself.
The DHCP server assigns a client an IP address taken from a predefined
scope for a given amount of time. If an IP address is required for longer than
the lease has been set for, the client must request
an extension before the lease expires. If the client
has not requested an extension on the lease time,
the IP address will be considered free and can be
assigned to another client. If the user wishes to
change IP address then they can do so by typing
"ipconfig /release", followed by "ipconfig /renew" in the command
prompt. This will remove the current IP address and request a new one.
Reservations can be defined on the DHCP server to allow certain clients to
have their own IP address. Addresses can be reserved for a MAC address or a
host name so these clients will have a fixed IP address that is configured
automatically. Most Internet Service Providers use DHCP to assign new IP
addresses to client computers when a customer connects to the internet.
The DHCP Server itself contains an IP Address Database which holds
all the IP addresses available for distribution. If the client (a member of the
network with a Windows 2000 Professional/XP operating system, for
example) has "obtain an IP address automatically" enabled in TCP/IP settings,
then it is able to receive an IP address from the DHCP server.
After you have installed the DHCP service and started it, you must
create a scope, which is a range of valid IP addresses that are available for
lease to the DHCP client computers on the network. Microsoft recommends
that each DHCP server in your environment have at least one scope that does
not overlap with any other DHCP server scope in your environment. In
Windows Server 2003, DHCP servers in an Active Directory-based domain
must be authorized to prevent rogue DHCP servers from coming online. Any
Windows Server 2003 DHCP Server that determines itself to be unauthorized
will not manage clients.
Page 76
SLIET, LONGOWAL
In the New Scope Wizard, click Next, and then type a name and
description for the scope. Click Next.
Type the range of addresses that can be leased as part of this scope (for
example, use a range of IP addresses from a starting IP address of
192.168.100.1 to an ending address of 192.168.100.100). Because these
addresses are given to clients, they must all be valid addresses for your
network and not currently in use. If you want to use a different subnet
mask, type the new subnet mask. Click Next.
Type any IP addresses that you want to exclude from the range that you
entered. Click Next.
Page 77
SLIET, LONGOWAL
Type the number of days, hours, and minutes before an IP address lease
from this scope expires. This determines how long a client can hold a
leased address without renewing it. Click Next, and then click Yes, I want
to configure these options now to extend the wizard to include settings
for the most common DHCP options. Click Next.
Type the IP address for the default gateway that should be used by clients
that obtain an IP address from this scope. Click Add to add the default
gateway address in the list, and then click Next.
If you are using DNS servers on your network, type your organization's
domain name in the Parent domain box. Type the name of your DNS
server, and then click Resolve to make sure that your DHCP server can
contact the DNS server and determine its address. Click Add to include
that server in the list of DNS servers that are assigned to the DHCP
clients. Click Next, and then follow the same steps if you are using a
Windows Internet Naming Service (WINS) server, by adding its name and
IP address. Click Next.
Page 78
SLIET, LONGOWAL
Click Yes, I want to activate this scope now to activate the scope and
allow clients to obtain leases from it, and then click Next.
Click Finish.
In the console tree, click the server name, and then click Authorize on the
Action menu.
Page 79
SLIET, LONGOWAL
IP SHARING
It is a Microsoft Windows technology that allows computers on a
network to access online services through a single Internet connection. To use
Internet Connection Sharing to share your Internet connection, the host
computer must have one network adapter that is configured to connect to the
internal network and one network adapter or
modem that is configured
to connect to the Internet.
SERVER/HOST CONFIGURATION:
NIC1- Automatic IP
NIC2- IP (192.168.0.1)
Page 80
SLIET, LONGOWAL
Page 81
When you now start Microsoft Internet Explorer, the client computer
will try to connect to the Internet by using the host computer's shared
Internet connection.
SLIET, LONGOWAL