100% found this document useful (1 vote)
316 views

Computer System Servicing NC Ii: Sta. Isabel College

The document provides information on competency-based learning materials for the Computer System Servicing NC II qualification. It outlines four units of competency covering installing and configuring computer systems, setting up computer networks, setting up computer servers, and maintaining and repairing computer systems and networks. For each unit, it specifies the learning outcomes, methodology, assessment approach, and duration in hours. It then provides more detailed content on installing and configuring computer systems, including assembling computer hardware, installing operating systems and drivers, installing application software, and conducting testing and documentation.

Uploaded by

Jhett
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
316 views

Computer System Servicing NC Ii: Sta. Isabel College

The document provides information on competency-based learning materials for the Computer System Servicing NC II qualification. It outlines four units of competency covering installing and configuring computer systems, setting up computer networks, setting up computer servers, and maintaining and repairing computer systems and networks. For each unit, it specifies the learning outcomes, methodology, assessment approach, and duration in hours. It then provides more detailed content on installing and configuring computer systems, including assembling computer hardware, installing operating systems and drivers, installing application software, and conducting testing and documentation.

Uploaded by

Jhett
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 164

For exclusive use of Sta.

Isabel College
Taft Avenue, Manila, Philippines

COMPUTER SYSTEM SERVICING NC II

COMPETENCY BASED LEARNING MATERIALS

ARMANDO G. HERMOGENO

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

Duration
Unit of Competency Learning Outcome Methodology Assessment Approach
(hours)
1. Install and 1.1. Assemble computer  Lecture  Written  65
configure hardware  Discussion examination
computer 1.2. Install operating system  Demonstration  Practical
systems
and drivers for examination
peripherals/ devices.  Viewing multimedia
1.3. Install the computer
application software
1.4. Conduct testing and
documentation
2. Set-up 2.1. Install network cables  Lecture  Written  50
computer 2.2. Set network configuration examination
 Discussion
networks
2.3. Set router/Wi-Fi/ wireless  Demonstration  Practical
access point/repeater examination
 Viewing multimedia
configuration
2.4. Inspect and test the
configured computer
networks
3. Set-up 3.1. Set-up user access  Lecture  Written  15
Computer 3.2. Configure network examination
 Discussion
Servers services  Demonstration  Practical
3.3. Perform testing, examination
 Viewing multimedia
documentation and pre-
deployment practices
4. Maintain and 4.1. Plan and prepare for  Lecture  Written  30
repair computer maintenance and repair examination
 Discussion
systems and 4.2. Maintain computer  Demonstration  Practical
networks
systems and networks examination
 Viewing multimedia
4.3. Diagnose faults of
computer systems
4.4. Rectify/correct defects in
computer systems
4.5. Inspect and test the
computer systems and
networks

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines
SECTOR ELECTRONICS SECTOR
UNIT OF COMPETENCY INSTALL AND CONFIGURE COMPUTER SYSTEMS
MODULE TITLE INSTALLING AND CONFIGURING COMPUTER SYSTEMS
MODULE DESCRIPTOR
This module covers the outcomes required in installing and configuring desktop and workstation computers systems.
It consists of competencies to assemble computer hardware, install operating system and drivers for
peripherals/devices, and install application software as well as to conduct testing and documentation
NOMINAL DURATION 65 HOURS
QUALIFICATION LEVEL NC II
PREREQUISITE
SUMMARY OF LEARNING OUTCOMES:
Upon completion of this module, the trainee/student must be able to:
LO 1. Assemble computer hardware
LO 2. Prepare installer
LO 3. Install operating system and drivers for peripherals/devices
LO 4. Install application software
LO 5. Conduct testing and documentation

LO 1. ASSEMBLE COMPUTER HARDWARE


ASSESSMENT CRITERIA
1. Unit assembly is planned and prepared to ensure OH&S policies and procedures are followed in
accordance with systems requirements
2. Materials necessary to complete the work are identified and obtained in accordance with established
procedures and checked against systems requirements
3. Tools, equipment and testing devices needed to carry out the installation work are obtained in accordance
with established procedures and checked for correct operation and safety
4. Computer hardware is assembled in accordance with established procedures and systems requirements
5. Basic-input-output-system (BIOS) configuration is performed in accordance with hardware requirements.

CONTENTS
1. Assemble computer hardware
2. Install operating system and drivers for peripheral devices
3. Installed application software
4. Conduct testing and documentation

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

Introduction to Computer Studies (Basic input and output devices)

(1) Keyboard: Keyboard is used in the input phase of a computer-based information system. Keyboard


is most common input device is used today. The data and instructions are input by typing on the
keyboard. The message typed on the keyboard reaches the memory unit of a computer. It’s
connected to a computer via a cable. Apart from alphabet and numeral keys, it has other function
keys for performing different functions.

(2) Mouse: It’s a pointing device. The mouse is rolled over the mouse pad, which in turn controls the
movement of the cursor in the screen. We can click, double click or drag the mouse. Most of the mouse’s
have a ball beneath them, which rotates when the mouse in moved. The ball has 2 wheels of the sides,
which in turn mousse with the movement of the ball. The sensor notifies the speed of its movements to the
computer, which in turn moves the cursor/pointer on the screen.

(3) Scanner: Scanners are used to enter information directly in to the computer’s memory. This device
works like a Xerox machine. The scanner converts any type of printed or written information including
photographs into digital pulses, which can be manipulated by the computer.

(4) Track Ball: Track ball is similar to the upside- down design of the mouse. The user moves the ball
directly, while the device itself remains stationary. The user spins the ball in various directions to effect the
screen movements.

(5) Light Pen: This is an input device which is used to draw lines or figures on a computer screen. It’s
touched to the CRT screen where it can detect raster on the screen as it passes.

(6) Optical Character Rader: It’s a device which detects alpha numeric characters printed or written on a
paper. The text which is to be scanned is illuminated by a low frequency light source. The light is absorbed
by the dark areas but reflected from the bright areas. The reflected light is received by the photocells.

(7) Bar Code Reader: This device reads bar codes and coverts them into electric pulses to be processed by
a computer. A bar code is nothing but data coded in form of light and dark bars.

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

(8) Voice Input Systems: This devices converts spoken words to M/C language form. A micro phone is
used to convert human speech into electric signals. The signal pattern is then transmitted to a computer
when it’s compared to a dictionary of patterns that have been previously placed in a storage unit of
computer. When a close match is found, the word is recognized.

(9) Plotter: Plotter is an O/P device that is used to produce graphical O/P on papers. It uses single color or
multi-color pens to draw pictures as blue print etc.

(10) Digital Camera: It converts graphics directly into digital form. It looks like an ordinary camera, but no
film is used therein, instead a CCD (changed coupled Divide) Electronic chip in used. When light falls, on
the chip though the lens, it converts light waves into electrical waves.

Materials, Tools and Equipment Needed


EQUIPMENT TOOLS MATERIALS
Mother board Crimping tools
Hard disk LAN tester
Video card Antistatic wrist wrap
Sound card Sharp pointed tweezers
Optical disk drives RS 232 pin insertion/extraction
tool
Memory modules Mirror
Power supply IC insertions/extraction tool
Cables and cords Flash light
Printer Allen wrench
Scanner Desoldering iron
Interface cards Soldering iron
Screw drivers
Pliers
Wire stripper with bolt cutter
Digital multi meter
Protective eyewear

The Occupational Health and Safety Procedures (OHSP)

OHS or Occupational Health and Safety refers to the legislation, policies, procedures and activities that aim
to protect the health, safety and welfare of all people at the workplace.

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines
1. Do not work alone so that there's someone who can take care of you in case of emergency.
2. Always power off the computer and unplug the computer before working on it.
3. Take away any liquid near your working area to avoid getting electrocuted or accidentally
damaging computer parts.
4. Be careful with tools that may cause short circuit.
5. Always ground or discharge yourself before touching any part of the computer.
6. Do not use excessive force if things don't quite slip into place.
7. Clean the area before and after using it to maintain sanitation and prevent accidents.
8. Hold the components on the edges and do not touch the Integrated Circuit (IC) parts.
9. Always wear personal protective equipment (PPE) in accordance with the organization's OHS
procedures and practices.
10. Make sure that the pins are properly aligned when connecting a cable connector.
11. Contingency measures during workplace accidents, fire and other emergencies are recognized.
12. Use brush, compressed air or blower in cleaning the computer system.

Procedure in Assembly Disassembly of the System Unit

Before You Begin


                       
1. Have a pen and paper ready. Documentation is real important.
2. Make sure you have the tools you need and they're all close by and handy.
3. Be sure to have a container to keep the screws in.
4. Make sure you have the resource material, drivers or software that you may need.
5. If possible, enter the CMOS setup and record the information available.
6. Disassembly is major surgery, do a full backup of the system.

How to Remove the System Unit Cover

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines
The standard way of removing mini-tower cases used to be to undo 4-6 screws on the back of the case,
slide the cover back about an inch and lift it off. If there is no manual, then a little time taken for careful
inspection may be in order. Here are some things to remember:

1. Don't Force Anything. If it has to be forced, it will probably break. If there are no screws on the back
of the case for the cover, check the plastic face-plate on the front. Some pry off to reveal screws or
release levers (remember, careful inspection). If everything on the front has its own bezel around it
(including the LEDs) then maybe the plastic front pops off (or maybe the case slides off the front).
2. Make sure any screws removed are for the cover. You don't want to unscrew the power supply by
accident and have it fall inside your computer. That's a bad thing.
3. After the case is removed, place it in a safe place, where it won't get knocked of a table, kicked or
stepped on and bent.

4. How to Remove Adapter Cards

5.
6. Again, documentation is very important. Since some of the module cards have a specific
configuration, like for example a 16-bit ISA card will probably work in any 16-bit ISA slot, but there
may be a reason it's in that particular one. Document the type of card and which slot it comes from.
7. Check the card for any cables or wires that might be attached and decide if it would be easier to
remove them before or after you remove the card.
8. Undo the screw that holds the card in place.
9. Grab the card by its edges, front and back, and gently rock it lengthwise to release it. Do not wiggle
it side to side as you can break the card, the slot, or the solder. Sometimes it helps to grasp the
inside corner of the card with one hand and place a finger from the other hand under the
associated port out the back of the computer to pry up the one end of the card.
10. Once the card is removed, you may want to record any jumper settings you see, just in case one is
accidentally dislodged. Try to store the card in an antistatic bag. If you don't plan on replacing the
card then a cover should be installed over the slot opening.

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines
11. How to Remove Drives From System Unit Bay

12.
13. Removing drives is not that difficult. They usually have a power connector and a data cable
attached from the device to a controller card or a connector on the motherboard. CD-ROMs may
have an analog cable connected to the sound card.
14. The power will be attached using one of two connectors, a large Molex connector or a
smaller Berg connector for the floppy drive. The Molex connector may need to be wiggled slightly
from side to side while applying gentle pressure outwards. The Berg connector may just pull
straight out or it may have a small tab that has to be lifted with a tiny flat screwdriver.
15. The data cables need to be documented. Remember the pin one rule. Know where each one goes
before you pull it out and record its orientation (which side is the stripe on, where is pin 1?).
Pull data cables gently and carefully.
16. Can the entire drive bay be removed? Does the drive come out the back of the bay or does it slide
out the front. If a bay is removable, you may have to remove some screws or unclip a lever then
slide the bay back and off. If the bay is not removable, there should be access ports on the other
side of the case that allow for access to those screws.

17. How to Remove Memory Module

18.
19. Memory modules are one of the chips that can be damaged by as little as 30 volts. Be careful of
ESD and handle them only by the edges. SIMMs and DIMMs are removed differently:
20. SIMM - gently push back the metal tabs holding the SIMM in the socket. Tilt the SIMM away from
the tabs to about a 45% angle. It should now lift out. Put each SIMM in its own protective bag.

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines
21. DIMM- There are plastic tabs on the end of the DIMM socket. Push the tabs down and away from
the socket. The DIMM should lift slightly. Now you can grab it by the edges and place it in a
separate antistatic bag.

22. How to Remove Internal Power Supply

23.
24. Make sure it's unplugged.
25. All power connectors should be removed, including the connection to the motherboard and any
auxiliary fans. Watch the little plastic tabs on ATX connectors (you’d rather not break them). AT
power supplies have a two piece power connector that may be labeled P-8 and P-9. Make note of
the orientation. The black wires should be in the middle, black to black.
26. Remove the connection to the remote power switch at the front of the case. Orientation of the
colored wires at this switch is critical. Make sure you document well, and during re-assembly plug
the computer into a fused surge protector before turning it on (this could save your motherboard
and components from melting if you've reconnected improperly). If you're putting the same power
supply back, it's better to remove the entire switch and leave the connectors intact. The remote
switch on an ATX form factor attaches to the motherboard.
27. Remove the four screws at the back of the case and gently slide the power supply out of the case.
While removing these screws, hold onto the power supply. You don't want it falling into the case.
28. How to Remove Mother Board

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines
29. Document and remove all wire attachments to the motherboard. (Some of these have Pin
1 designations also.)
30. Most cases have a removable panel that the motherboard is attached to. By removing a couple of
screws the panel can be taken off and you can gain much better access to the motherboard. Again,
a little investigation can save a lot of trouble.
31. There is usually 2 or 3 screws holding down newer motherboards. Make sure you've got the right
ones and remove them.
32. Motherboards sit on plastic or brass standoffs that keep the traces and solder from touching.
33. Assembling system units and peripherals is exact opposite of its disassembly process.
34. Checking the BIOS and setting up Boot Priority

Using BIOS Setup Utility Menu Items

You can access BIOS Setup utility screens from the following interfaces:

 Use a USB keyboard, mouse, and VGA monitor connected directly to the server.
 Use a terminal (or terminal emulator connected to a computer) through the serial port on the back
panel of the server.
 Connect to the server using the Sun ILOM Remote Console.

To access BIOS configuration screens and to change the system’s parameters, complete the following
steps:
1. Power on or power cycle the server.
2. To enter the BIOS Setup utility, press the F2 key while the system is performing the power-on self-
test
Press F2 to Run Setup Prompt

When BIOS is started, the main BIOS Setup utility top-level screen appears. This screen provides
seven menu options across the top of the screen.

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

BIOS Setup Utility - Main Screen

3. Use the left and right arrow keys to select the different menu options.

As you select each menu option, the top-level screen for that menu option appears.

4. To select an option on a top-level screen, use the up and down arrow keys to scroll up and down the
options presented.

Only options that can be modified are highlighted when you press the up and down arrow keys.

If a field can be modified, as you select the option, user instructions for modifying the option appear
in the right column of the screen.
If a field is a link to a sub-screen, instructions to press the Enter key to access the sub screen
appear in the right column.

5. Modify the setup field and press the Esc key to save the changes and exit the screen.

Some screens present a confirmation dialog box that enables unwanted changes to be retracted.

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines
6. On sub-screens that only provide configuration information and cannot be modified, press the Esc
key to exit the screen.

7. To continue modifying other setup parameters, repeat Step 3 through Step 6. Otherwise, go to Step


8.

8. Press and release the right arrow key until the Exit menu screen appears.

9. Follow the instructions on the Exit menu screen to save or discard your changes and exit the BIOS
Setup utility.

BIOS Setup Screens Overview

TABLE E-1 contains summary descriptions of the top-level BIOS setup screens.

TABLE E-1 BIOS Setup Screens Summary

Screen Description See This Section


Main General product information, including BIOS type, processor, BIOS Main Menu
memory, and time/date. Screens
Advanced Configuration information for the CPU, memory, IDE, Super IO, BIOS Advanced Menu
trusted computing, USB, PCI, MPS and other information. Screens
PCI Configure the server to clear NVRAM during system boot. BIOS PCI Menu
Screens
Boot Configure the boot device priority (storage drives and the DVD- BIOS Setup Utility: Boot
ROM drive). - Boot Settings
Security Set or change the user and supervisor passwords. BIOS Security Menu
Screens
Chipset View the configuration of server chipsets. BIOS Chipset Menu
Screens
Exit Save changes and exit, discard changes and exit, discard BIOS Exit Menu
changes, or load optimal or fail-safe defaults. Screens

BIOS Boot Menu Screens

The BIOS Boot screens enable you to configure the boot device priority (storage drives and the DVD-ROM
drive).

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

BIOS Setup Utility: Boot - Boot Settings

BIOS Setup Utility: Boot - Boot Settings Configuration

 
BIOS Setup Utility: Boot - Boot Device Priority

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

BIOS Setup Utility: Boot - Option ROM Configuration

 
BIOS Setup Utility: Boot - Wake on LAN Configuration

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

Press F10 to save and exit

LO 2. PREPARE INSTALLER

ASSESSMENT CRITERIA
1. Portable bootable devices are created in accordance with software manufacturer instruction
2. Customized installers are prepared in accordance with software utilization guide and end user agreement
3. Installation of portable applications are carried out in accordance with software user guide and software
license

EQUIPMENT TOOLS MATERIALS


Personal Computer Flash Disk OS - Windows
Laptop CD Windows 2007
Network server DVD Windows 2008 R2
Driver Installer

Creating System Image applicable procedure for Windows 2008 R2 and Windows 7

This describes a process to create a bootable USB drive which can be used to install the operating system
onto your system. Transferring the installation files to a USB drive makes loading the operating system
faster (21 Mb/s vs 480 Mb/s) and gives you the ability to load the operating system on devices like tablets
that support USB but don’t support optical media.

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines
You will need the installation media of the operating system you want to install, a USB drive, and
administrative rights on the system used to create the bootable media. Image 1 shows the installation files
for Windows Server which will be copied to the bootable drive.
Image 1

The following steps guide you on how to make the USB drive bootable and get the contents onto the drive.
1. Insert the USB drive.
2. Open a CMD prompt using the Run as Administrator option.
3. Start the DISKPART tool by typing Diskpart and press ENTER.
4. List all disks recognized by the system by typing list disk and pressing ENTER.
Image 2

5. Select your USB drive from the list returned (Disk 2 in this example) by typing Select Disk 2 and pressing
ENTER.
Image 3

6. Remove all data from the disk by typing clean (Note: This will destroy all of the data on the USB drive)
and pressing ENTER.
Image 4

7. Create a primary partition by typing create partition primary and pressing ENTER.


Image 5

8. Create a bootable partition by typing active and pressing ENTER.


Image 6

 
9. List all volumes recognized by the system by typing list volume and pressing ENTER.
Image 7

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

10. Select your volume from the list (Volume 3 in this example) by typing: select volume 3 and pressing
ENTER.
Image 8

11. Quick format the disk using Fat32 by typing format fs=fat32 quick and pressing ENTER.
Image 9

12. Insert your desired operating system media or mount your ISO.
13. Copy the entire contents of the installation media from the installation media to your USB drive.
14. In the root of the USB drive, open the \efi\Microsoft\boot directory.
15. Copy the directory contents up one level so the files also reside under \efi\boot.
16. Copy the bootmgfw.efi file from the root directory of the ISO or disc to the \efi\boot directory, and
rename it to bootx64.efi.
You’re now ready to use the USB drive as UEFI installation media on your system Just boot to the USB
drive and setup will begin, or just insert the USB drive and allow setup to auto run, or open setup from a file
explorer window.
Note: There are several methods and application programs that can be utilized to create this image.
Example: xboot, power iso, Windows image creator, etc.

Creating Portable USB Bootable Drive using Rufus application

1. Rufus requires an account with admin access in order to make the necessary changes to
hardware. After authenticating, insert the USB flash drive and launch Rufus. It will detect the drive
almost immediately. Since Rufus can handle various partition schemes and file structures, ensure that

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

the correct settings are set that match the UFD you're going to build

2. Click the optical drive button next to the Create a bootable disk using checkbox, and you'll be
prompted to search for the ISO image to use.

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

3. When using ISO images, Rufus will automatically modify the settings to best match it. Once
everything is set correctly, click the Start button to begin the process. You'll be prompted with a
warning that all data on the UFD will be destroyed. Click OK to proceed with the creation process
Figure C

4. Depending on the ISO image size, the process may take several minutes to complete. For the log
readout of each step in the process, click the Log button to open a side window and save the output

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

details

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

5. The longest part of the entire process is the file copy portion. This is typically the last step and
varies depending on file size/number of files to copy

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

6. When complete, double-check the external drive to verify the files were copied

With the process completed, simply eject the UFD, insert it into the device you wish to install the OS on,
and boot as you normally would. The days of carrying multiple CD/DVDs with you and dealing with lagging
installs are drawing to a close with the ubiquitous use of USB drives—and the storage capacity can't be
beat.

LO 3. INSTALL OPERATING SYSTEM AND DRIVERS FOR PERIPHERALS/ DEVICES

ASSESSMENT CRITERIA
1. Operating system (OS) is installed in accordance with established installation procedures and to comply
with end-user requirements
2. Peripherals/devices drivers are installed and configured in accordance with manufacturer’s instructions
and/or OS installation procedures.
3. OS and drivers updates/patches are accessed and installed in accordance with manufacturer’s
recommendations and requirements
4. On-going checks of the quality of the work are undertaken in accordance with established procedures

Installation of Windows 2008 R2 (Step by Step Procedure)

How to Install Windows Server 2008 R2

A Basic Install

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines
After booting up from your install disk, you will arrive at a language and preferences screen. Once you have
chosen those options, you get to the Operating System Selection page. Depending on your license and the
purpose of your server, there are a variety of options to choose from. For our purpose today, we are going
to choose the Enterprise (Full Installation) version.

We get to read the standard End User License Agreement.

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

Since we’re doing a base install and not an upgrade, so we choose the Custom (advanced) option.

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines
We’ve got a blank 24 GB disk, so we’re just going to install it there. If you want to create a partition out of
the available drive space or reformat a drive, then choose Drive options (advanced).

Windows will take a little while with your install, and reboot a few times.

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

Once the install is finished, we’re prompted to change our password before logging in.

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines
Windows requires that you have a strong password, seven characters long with at least three of the four
following: uppercase letter, lowercase letter, numeral, or symbol. You’ll want to make sure you write it down
somewhere for now, because if you forget it later, the entire install will have to be re-done.

The Initial Configuration Tasks window pops up as soon as you logon. You could also type in Oobe.exe in
the Command Prompt to arrive here.

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

One of the first things we want to correct is the time, so choose  Set time zone. Make sure that you set the
time zone first, because the date and time will shift after.

Installation of Windows 7 is quite similar to the process you encountered with Windows 2008 R2.

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

Next we want to choose Configure Networking. The first server installed in a network needs to be a Domain
Controller, and since they require a static IP, we are going to need to set one up now. Double-click
on Local Area Connection, and once the information box pops up, click on Properties.

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

Click on Internet Protocol Version 4 in the Networking box, then click Properties. Change the radial button
to Use the following IP address: and then enter the settings for your specific server and network IP
addresses. When you’re finished, click OK to save those settings.

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

Installation of Software

Install the following


1. Windows 7
2. Drivers and printer
3. Multimedia
4. Etc...

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines
SECTOR ELECTRONICS SECTOR
UNIT OF COMPETENCY SET-UP COMPUTER NETWORKS
MODULE TITLE SETTING-UP COMPUTER NETWORKS
MODULE DESCRIPTOR
This module covers the outcomes required in setting-up computers networks for LANs and small-office home-office
(SOHO) systems. It consists of competencies to install network cables, set network configuration, set router/Wi-Fi/
wireless access point/repeater configuration as well as to inspect and test the configured computer networks
NOMINAL DURATION 50 HOURS
QUALIFICATION LEVEL NC II
PREREQUISITE INSTALLED AND CONFIGURED COMPUTER SYSTEMS
SUMMARY OF LEARNING OUTCOMES:
Upon completion of this module, the trainee/student must be able to:
LO 1. Install network cables
LO 2. Set network configuration
LO 3. Set router/Wi-Fi/ wireless access point/repeater configuration
LO 4. Inspect and test the configured computer networks

LO 1. INSTALL NETWORK CABLES

ASSESSMENT CRITERIA
1. Cable routes are determined and planned in accordance with network design and actual installation site.
2. Network materials necessary to complete the work are identified and obtained in accordance with
established procedures and checked against systems requirements
3. Tools, equipment and testing devices needed to carry out the installation work are obtained in accordance
with established procedures and checked for correct operation and safety
4. Appropriate personal protective equipment is used and OHS policies and procedures are followed
5. Copper cable splicing is performed based on Electronic Industries Alliance/Telecommunications Industry
Association (EIA/TIA) standards
6. Network cables and cable raceway are installed in accordance with established procedures and installation
requirements
7. Installation work is performed and is checked to ensure no unnecessary damage has occurred and complies
with requirements
8. OHS standards and 5S principles are followed according to enterprise requirements
9. Excess components and materials are disposed of based on WEEE directives and 3Rs waste management
program

CONTENTS
1. Install network cables
2. Set network configuration
3. Set router/Wi-Fi/ wireless access point/ repeater configuration

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines
4. Inspect and test the configured computer networks

Tools, Materials and Equipment needed


The students/trainees must be provided with the following
1. Network Materials
a. Cables (fiber optics)
b. Terminals
c. Cable raceway/duct
d. Clamps
e. Fasteners
f. Insulators
g. Terminal box
2. Tools, equipment and testing devices
a. Protective eyewear
b. Digital Multi Meter
c. Wire stripper with bolt cutter
d. Pliers (assorted)
e. Screw drivers (assorted)
f. LAN tester
g. Crimping tools
3. Personal Protective Equipment
a. Gloves
b. Goggles
c. Working clothes
4. Network cables
a. Copper cable
b. Fiber optic cable (terminated)
5. Cable raceway
a. Slotted PVC
b. Metallic raceway
c. Flexible conduit
6. Client device
a. Laptop
b. Desktop
c. Network storage
d. Network printer

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

Network cable and Set – up

This is a simple network cable management necessary to finish the task. Using the necessary
tools, materials and equipment design your own data and cabling easement to create and establish
connection with your client (Windows 7) and your server (Windows 2008 R2)

A simple diagram on how patch panel and switch hub connects.

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines
A connection from patch panel to switch (i/o) from patch panel.

The expected output to transmit data from client to server and server to client

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines
Steps in preparing RJ 45 straight connection

What you will need:

1. Cat5e Ethernet cable - I recommend purchasing a box of Cat5e cable. You will save money by
purchasing your cable in bulk.
2. RJ-45 connectors
3. Crimper Tool - capable of crimping 8 wire (RJ-45) and 6 wire (RJ-11). Most tools have built in
cutters too.
4. Stripper Tool
5. Scissors - I prefer using a scissors  
6. Cable Tester - For testing that your cable connections are good and there are not any open or
crossed wires
A scissors, a crimping tool, and a stripping tool 

Cable testers 

 Cat5E Ethernet cable and RJ-45 connectors

 
Steps to make a straight through Ethernet cable:

1. Cut a piece of cable to the length you will need. Give a little extra to make room for mistakes.

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

2. Strip a half inch to an inch of the outer jacket away from the cable. If you use strippers make
sure not to nick the wire pairs and expose the copper, this could introduce crosstalk onto your wires. I
prefer to use a scissor and my fingers to tear away the jacket. Then I cut with the scissors to clean up
the edge.

    

3. Now you need to untwist the wire pairs (not too much, only undo one or two twists) so you can
align them according to the EIA-TIA568B wire color sequence. I use my fingers to straighten the
wires by bending them back and forth, straightening them as they warm up. 

EIA-TIA 568B Standard

1 2 3 4 5 6 7 8

white/orange orange white/green blue white/blue green white/brown brown

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

4. Trim the ends of the wires so they line up and create a straight edge.

     

5. Now holding an RJ-45 connector with the tab side facing down, push the 8 wires into the
connector, sliding each wire into a groove. While holding the connector tab side down the
white/orange wire should be on the far left and the brown wire should be on the far right. It is very
important that the wires push all the way up and into the connector so that when the pins are pushed
down during crimping they will make contact with the wires. The sleeve or jacket of the cable (light
blue below) should also be pushed in as far as it can go so it will be held in place once crimped. You
may want to pull the wires out and put them back in to make sure they are sliding in correctly, this will
also further straighten the wires.

Notice the tab make sure it is facing down             push the wires and sleave into the connector

                       

6. Before crimping, examine the cable and connector from the side. Did the wires slide all the way up
in to the proper grooves? Are the colors in the proper order when observed from tab side down? Did
the jacket slide all the way into the connector? If not, you may need pull the cable out of the
connector, trim the wires or the jacket accordingly, and reinsert.

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

7. If everything looks good, using your crimper tool insert the connector and cable into the 8 wire slot
and press down tightly. This will cause a piece of plastic in the connector to press down on the jacket
and hold the cable in the connector preventing it from accidentally pulling out. Crimping also forces
copper pins in the connector to push down and make contact with the separate wires.

8. You are now finished terminating one end of the cable. Repeat the process on the other end of the
cable and when you are done, insert the cable into a cable tester and run a wire test to make sure
that none of the wires are accidentally crossed, by not being in the right order, or open by not
touching the connector pins. Depending on the cable tester you may need to read the manual to
understand the device output.

   

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

9. Lastly, test your cable by using it on your network. Attach the cable to your computer's NIC and the
other end to your switch. Do you see green lights? Open the Network Connections dialogue box in
Windows, does it show a properly enabled and active connection on the NIC. You can also look for
the status in your system tray network connections icon. If you have an internet connection, can you
browse the web? If not can you ping your gateway from a command prompt?
10. Remember follow the diagram on how to create standard straight thru cable as for the patch panel
look for the T568B label and follow also the diagram in punching on it

Diagram of T568B for modular socket and at back of patch panel

LO 3. SET ROUTER/WI-FI/WIRELESS ACCESS POINT/REPEATER CONFIGURATION

ASSESSMENT CRITERIA
1. Client Device systems settings are configured in accordance with manufacturers’ instructions and end-user
preferences
2. Local area network (LAN) port is configured in accordance with manufacturers’ instructions and network
design
3. Wide area network (WAN) port is configured in accordance with manufacturers’ instructions and network
design
4. Wireless settings are configured in accordance manufacturers’ instructions, network design and end-user
preferences
5. Security/Firewall/Advance settings are configured in accordance with manufacturers’ instructions and end-
user preferences

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

Configuring and connecting network hardware

The standard networking technology is Ethernet. Ethernet works by means of adapters known as Network
Interface Cards (NICs) in each computer. The NICs are connected with cables which vary depending on
the cabling option chosen. Many recent computers have built-in (motherboard) network capability.

Ethernet comes in two flavors. Fast Ethernet operates at 100 Megabits per second (Mbps) and is overkill
for a SOHO. Regular or original Ethernet operates at 10 Mbps which is fast enough for a small LAN. NICs
can be purchased to fit into an EISA card slot or a PCI slot and can also be found to fit a laptop PCMCIA
slot.

There are two different Ethernet cabling options one of which will be usually used in any given LAN. NICs
can be purchased with any of these interface connectors or even with two connectors. If the NIC has more
than one connector a jumper plug or software configuration is usually used to select which connector is in
use. NICs cost as little as $20 each.

The coax interface, also known as 10-base-2, or "thin", or "BNC" Ethernet works with a coaxial bayonet
"BNC" connector on the NIC. Computers are connected together in a "daisy chain" using BNC "T" adapters
plugged into each NIC. A coaxial 50 ohm cable connects each "T" to the "T" on the next computer. The first
and last computers will have a terminator resistor plugged into the unoccupied arm of the "T". Coax is only
available in 10 megabit speed. Hubs and NICs that provide coax are harder to find and BNC cards are now
largely obsolete.

The twisted pair interface, also known as "UTP" or 10-base-T or "RJ-45" has an RJ-45 jack on the NIC. The
RJ-45 connectors look similar to the standard telephone RJ-11 jack (but are somewhat larger) and are
used with cables that look similar to standard telephone twisted pair cables to connect the NICs to a "hub",
high speed modem, or router. The hub has between 4 and 32 RJ-45 jacks. New office buildings are

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines
sometimes wired with RJ-45 jacks in the walls to facilitate setting up 10-base-T LANs. Hubs plug into a
power line and cost $60 and up. Some hubs provide a BNC connector as well as the RJ-45 jacks. Motels
are increasingly providing RJ-45 connections for laptops. Newer systems can support 100 Mbps or more.

The coax 10-base-2 approach is simpler since no hub is required. Larger LANs almost universally use 10-
base-T because in-wall wiring is neater and the network is not disrupted by someone connecting or
disconnecting their computer. Routers and newer computers that come with Ethernet capability usually use
10-base-T.

Virtually all new computers come with built-in RJ-45 wired internet capability and most have wireless Wi-Fi
capability.

Setting up network software

Ethernet transmits data by means of packets and automatically adjusts to addition of computers to a net.
NICs all have a unique address built in at the factory to facilitate this.

When the network is completed you can specify specific drives or directories to be shared with other
computers on your LAN under "sharing" which will appear under the pull-down "file" menu. You can share
individual directories or entire drives for read-only access or access with a password. You can also specify
printers to be shared. When directories, drives, or devices are shared you will see a hand symbol attached
to the icon for that item. Modern printers often have built-in wireless capability and can be shared with any
wireless-equipped device in range.

Protocols are formats and procedures for transfer of data. The IPX protocol (originally developed by Novell)
is used by many applications programs including games such as Duke Nukem 3D.

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

Groupware

Although you can share files so that any computer on the LAN can open the same file on the same drive
there is a complication in that if more than one computer tries to open and change the same file
simultaneously the changes from one person will be lost. Many applications such as Microsoft Word will not
open a file that is already open on someone else’s computer. Applications specifically designed for
collaboration ("groupware" or "work group applications") avoid this problem.

Email is the ultimate "poor man’s" groupware application since you can accomplish many group functions
such as adding to or modifying other people’s text, setting up meetings, etc. using email, especially if you
have a more sophisticated email client.

Peer and Server Networks

Networks of computers all of which are used as work stations are commonly known as "peer" networks. A
server network requires an additional dedicated server machine, usually running expensive "server"
software and therefore may be less attractive in a SOHO context. When investigating groupware
applications make sure to understand if a server and specific server software is required or if the
application can run on a peer network.

How to set up a TCP/IP network

You may want set up a local network for the Internet protocol TCP/IP (in addition to IPX) to allow use of
applications which use TCP/IP and TCP/IP only games like Quake on your network. In addition you may
want to set up TCP/IP to allow computers on your LAN to access the Internet as described below. To do

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines
this set up the TCP/IP protocol in Windows networking and bind it to your Ethernet adapter. Each computer
on the LAN needs to have its own address. The addresses in the ranges 10.10.10.0 to 10.10.10.255 and
192.168.0.0 to 192.168.0.255 have been reserved for local networks so no site on the Internet will have
addresses in these ranges. Therefore you should give each computer on your LAN a different address
within this range such as 10.10.10.1, 10.10.10.2, etc. Don’t use 10.10.10.0 or 10.10.10.255 as these have
special uses. Set the network mask to 255.255.255.0 on each computer. You may be able to use the
network connection wizard to automatically set up your network.

Connecting your local network to the Internet

You can usually connect multiple computers to a network that also includes a cable modem or DSL modem
to allow all the computers Internet access. Inexpensive router boxes can be used to connect a single
modem to multiple computers. Cable or DSL modems may have built-in routers, even wireless routers.

Cable and DSL "always on" services normally semi-permanently assign an IP address and Internet name
to your account. This can have privacy implications.

Voice over IP Services

Inexpensive router boxes are now available to support voice over IP (VOIP) services provided by Vonage
or other Internet based telephone service. These units connect to the Internet via RJ-45 cable connecting
to your cable or DSL modem and typically provide two RJ-11 phone connectors and three RJ-45 Ethernet
connectors. The Ethernet connectors can be connected directly to up to three computers. The phone
connectors can be connected to ordinary phones to provide up to two lines of phone service. The phone
lines can be routed to many phones via standard building phone lines. However, these small VOIP boxes
may not be able to drive as many ringers as a typical telephone company line. If you are using more than
one phone on each line, check with the box vendor to see how many phones each line can handle. A

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines
major advantage of Vonage or other non-locality based VOIP provider is that by taking the little box with
you and plugging it in to local Internet, you can be reached on your local number wherever you go. Callers
have no way of knowing you are not in your office. Careful, if someone should happen to dial 911 while in
the remote location, the fire trucks are going to go to the wrong address!

The quality of the VOIP service is mostly dependent on the quality of the underlying Internet service. For
example, if you are having problems with Vonage it is more likely that the actual problem is with your cable
or DSL supplier. If you are using a separate router (e.g. wireless router) the VOIP box should be connected
to the modem and the router connected to the VOIP box. This way the VOIP box will have priority over the
computer's access and voice quality will be better during times when your computers are accessing the
Internet.

Be advised that fax machines typically do not work well with VOIP. This is because any momentary delay,
slowdown, or dropped packets, which do not cause any problem with the computer Internet connection,
and only cause a click on the voice line, can interfere with the operation of the analog modem in the fax
causing a dropped fax error. If you are having problems faxing, try setting the fax's modem to operate at a
slower speed (2400 baud) instead of the normal 14,400 baud. If the fax's instruction manual does not say
how to do this (they frequently do not), try searching on the Internet. Unfortunately, if it works today it still
might not work tomorrow when if the Internet is busier.

Many people report they are totally unable to obtain reliable fax operation through VOIP. It is futile to look
to the VOIP service for a solution and your Internet provider is likely to blame the VOIP provider. An
obvious solution that eliminates the need to even have a fax machine is to have capability for receiving
faxes as an email attachment and for sending faxes from a scanned or PDF document file uploaded to the
VOIP provider. This would allow you to send and receive faxes at your laptop in the field as well as at your
SOHO and also allows you to store faxes on your hard drive as opposed to paper file. For some unknown
reason, Vonage does not provide this capability although they do provide the capability for receiving voice
mail messages as email attached audio files. You may obtain fax capability from myfax.com, which allows
faxes to be sent by sending an email with or without attachment to 13015552525@myfax.com, allows

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines
receipt of faxes by email, and provides incoming fax numbers matching your area code. They have a
cheaper service in which you cannot specify area code for your incoming fax number.

Dynamic Host Configuration Protocol (DHCP)

All the participating devices (computers, routers, etc.) in an Internet network need certain configuration data
to operate including the Internet Protocol (IP) address to be used by the device, IP address of the upstream
gateway, mask defining the size of the local network, and name server addresses. Modern software and
hardware can use DHCP to get this information automatically from the upstream side at startup and avoid
the need for manual entry. However, you need to initialize the boxes in a particular order for this to work. If
you first turn on the cable or DSL modem, the modem will get its information from the Internet service
provider company. Then you can turn on your router box, which will get its information from the modem.
Then turn on computers so they can get their configuration data from the router box. If power fails
frequently in your area you may want to use a small uninterruptible power supply (UPS). To power the
modem and router boxes to avoid having to go through this sequence later.

Using ISDN with a local network

See Using ISDN. In the U.S. ISDN is largely replaced with DSL (over phone line) or cable high speed
Internet access.

Wireless

Inexpensive wireless routers are now available that connect to a cable or DSL modem and provide a local
wireless Internet "hot spot" in addition to providing typically three RJ-45 connections for wired service.
Modern laptops, netbooks, and smart phones typically come with built-in wireless capability. Small wireless
adapters that plug into a USB port can be used to connect an older desktop machine to the wireless

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines
network. Wireless typically has more "glitches" than wired and may be somewhat slower, so if a computer
is semi-permanently in the same room as the router, use a wired connection. More on Wireless Networks.

Typical Small Office Network with Internet Capability

Here is a description of a typical Internet enabled small office network for a small company "SmallCo":

Five PC type computers running Windows or MacOS are connected via NICs to an Ethernet using 10-base-
T RJ-45 wiring and an 8 port hub. PCs are configured to use TCP/IP protocol and to use file and printer
sharing over the IPX/SPX protocol so all employees can use all the printers and can use a common file
areas or drives on the PCs. A stand-alone router is used to connect to the Internet via DSL, cable, or
analog modem using an Internet access provider and single user account. The company, has a web site at
www.smallco.com hosted elsewhere by an ISP or web site developer. (Some DSL and cable providers
object to users running web sites from their DSL or cable accounts.) Each employee has an email address
such as tom@smallco.com, Fred@smallco.com, etc. The web site provider furnishes POP email mail
boxes for each employee. Alternately, the web site provider can supply aliases to route mail from
"tom@smallco.com" to an access provider mail box such as "tom3344@ibm.net". Email clients on the
employee computers access the POP mail boxes to receive mail and send mail via an access provider
SMTP server. See Mail Note for return address considerations.

Managing Modems and Routers

Cable modems, DSL modems, and routers usually have a built-in web server that displays administrative
pages. By entering the proper numerical IP address in your browser, you can contact this web server and
configure the operation of the device. Modems also usually display diagnostic information including
incoming signal strength, etc. This information is very useful when talking to your provider about any
problem. Modems, routers, and your individual computers all can be configured to act as firewalls. This
can cause confusion if, for example, you are trying to alter the firewall to allow some new service. Also see
DHCP above.

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines
Note: After this procedure check whether a Wi-Fi, and all other workstation have an internet connections.
Using LAN tester for wired computer station and the Wi-Fi connectivity for wireless devices

SECTOR ELECTRONICS SECTOR

UNIT OF COMPETENCY SET-UP COMPUTER SERVERS

MODULE TITLE SETTING-UP COMPUTER SERVERS

MODULE DESCRIPTOR

This module covers the outcomes required in setting-up computers networks for LANs and small-office home-office
(SOHO) systems. It consists of competencies to install network cables, set network configuration, set router/Wi-Fi/
wireless access point/repeater configuration as well as to inspect and test the configured computer networks

NOMINAL DURATION 15 HOURS

QUALIFICATION LEVEL NC II

PREREQUISITE SET-UP COMPUTER NETWORKS

SUMMARY OF LEARNING OUTCOMES:

Upon completion of this module, the trainee/student must be able to:

LO 1. Set – up user access


LO 2. Configure network services
LO 3. Perform testing, documentations and pre deployment procedures

LO 1. SET – UP USER ACCESS

ASSESSMENT CRITERIA
1. User folder is created in accordance with network operating system (NOS) features
2. User access level is configured based on NOS features and established network access policies/end-user
requirements
3. Security check is performed in accordance with established network access policies/end-user requirements

CONTENTS
1. Set – up user access
2. Configure network services
3. Performed testing, documentation and pre deployment procedures

Setting up your Windows Server 2008 R2 for the first time.

Active Directory Domain Services


COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO
For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

Minimum: Single processor with 1.4 GHz (x64 processor) or 1.3GHz (Dual Core)

Minimum: 512 MB RAM

Minimum: 32 GB or greater

 The first step is to assign an IP to the server that you going to deploy the AD. It’s necessary to
install it as DNS server too. So it’s better to have fixed ip it doesn't mean you cannot install AD
without fixed IP address but it will solve lot of issues if you used fixed IP.

In here the server ip is 10.0.0.14. Since we going to make it as DNS server too you should use the same ip
as the preferred DNS server.

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

 Next step is to install the Active directory roles. Unlikely the older version of windows servers
Microsoft highly recommend to use server manager option to install roles before you run dcpromo.

 Click on start menu and select the Server Manager

 Select the roles from the right hand panel and click on add roles option.

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

 From the roles list select the "Active Directory Domain Services" role and Click "Next"

 Review the confirmation and click on "Next"

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

 Review the installation confirmation and click on "Next"

 It will take few minutes to complete and when it’s done you will get this confirmation. And then click
on "Close"

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

After that you will need to do a reboot.

 After reboot please open up the "server Manager" again. And then click on "Roles" there you will
see the "Active Directory Domain Services" is successfully installed in there. Click on it then you
will get a window like below.

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

In their please pay attention to the message

So please click on that link and it will start the DCPROMO wizard.

 So next step to go through the DC promo wizard.


 To start the installation click on "Next"

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

 Click on "Next"

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

 Since we going to install New domain Controller in new forest please select the option "Create a
new domain in new forest" option and click on "Next"

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

 Now we have to provide the name for our domain controller. It must be FQDN. In our case I used
rebeladmin.com as the domain. Please click "Next" after it.

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

 In this window it will ask to select forest function level. If you going to add server 2003 domain
controller to your forest later don't select the function level as server 2008. If you going to use full
features of 2008 Ad you must select forest function level as server 2008. In my case I used server
2008. Click on "Next" after the select.

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

 In next window since it's the first DC we should make it as DNS server too. Leave the default
selection and click on "Next"

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

 If the wizard cannot create a delegation for the DNS server, it displays a message to indicate that
you can create the delegation manually. To continue, click "Yes"

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

 In next window it will show up the database location. It it’s going to be bigger AD its good if you can
keep NTDS database in different partition. Click on "Next" after changes.

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

 In next window it’s asking to define a restore mode password. It’s more important if you had to do a
restore from backup in a server crash. Click on "Next" after filling it.

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

 Next window is giving you a brief of the installation. Click on "Next"

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

 Then it will start the installation of the AD. It will take some time to complete. After complete of the
installation perform a server reboot.

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

 After the reboot now you can login to the domain. Please use the login as following example

User name: your domain\administrator

Password: XXXXXXXX

 Now it’s done and you can view the active directory options on administrative tools menu

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

Dynamic Host Computer Protocol

To start first need to log in to the server with administrator privileges. Then start the “server Manager” by
clicking on “Server Manager” icon on task bar. Then go to “Roles”

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

Then click on “Add Roles” option to open Add roles Wizard.

Then it will load the Roles Wizard and select the “DHCP Server” From the list and click next to continue.

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

Then it will give description about the role. Click next to continue.

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

Next window is asking to use which interface to serve DHCP clients. If server has multiple NIC with multiple
IP you can add them also to serve DHCP clients.

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

In next window it will give opportunity to add DNS settings that should apply for DHCP clients.

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

Next window is to define the WINS server details.

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

In next window we can add the scope, the Starting IP, End IP of the DHCP range, subnet mask, default
gateway, leased time etc.

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

In next Window it can configure to support IPv6 as well.

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

Then it will give the confirmation window before begin the install. Click on “Install”

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

Once installation finishes DHCP server interface can open from Start > Administrative Tools > DHCP

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

Using the DHCP it is possible to even configure multiple Scopes configurations to the network. In a network
there can be different network segments. It is waste to setup different DHCP servers for each segment.
Instead of that it is possible to create different Scopes to issue DHCP for them.

File Services

To perform this procedure, you must be a member of the Administrators group on the local computer.
1. On Content-01, click Start, point to Administrative Tools, and then click Server Manager.
2. In Roles Summary, click Add Roles.
3. In the Add Roles Wizard, on the Before You Begin page, click Next.
4. On the Select Server Roles page, select File Services, and then click Next.

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

5. On the File Services page, click Next.


6. On the Select Role Services page, in Role Services, ensure that File Server is selected. Also
select Branch Cache for network files, and then click Next.

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

7. On the Confirm Installation Selections page, confirm your selections, and then click Install.
8. On the Installation Results page, confirm that your installation of the File Services role and required
role services completed successfully, and then click Close.

Enabling Windows Server 2008 R2 File Sharing

File sharing in Windows Server 2008 R2 is managed from the Network and Sharing Center, accessed by
selecting Start -> Network and clicking on the Network and Sharing Center button located in the toolbar of
the Network dialog. Once invoked, the Network and Sharing Center will list the current file sharing
configuration and options as illustrated in the following figure:

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

To enable public file sharing, begin by clicking on the Change advanced sharing settings link located near
the top left hand corner of the dialog. This will display the Advanced sharing settings screen as illustrated in
the following figure:

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

For each network environment in which the system operates a different profile is created by Windows
Server 2008 R2. This is a feature that is primarily of use in Windows versions that are more frequently used

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

on laptops such as Windows 7. Regardless, this feature is still present in Windows Server 2008 R2. Be
sure to select correct the profile by clicking on the up and down arrows to fold and unfold the different
profiles (if you are unsure of which profile to use, the currently active profile is marked as “current profile”).
Once the settings for the required profile are unfolded, the various settings are displayed and made
available for modification. These settings are as follows:

 Network discovery – Makes the system visible to other computers on the network and also allows
this computer to see other computers on the network. This must be turned on to enable resource
sharing.

 File and printer sharing – Allows select file and printer resources on the local system to be
accessed by other computers on the network. Once this setting has been enabled, these resources
must be individually configured to be shared before they will accessible.

 Public folder sharing – Controls whether or not the contents of the %System Drive
%\Users\Public folder is accessible to users on other computers on the network.

 'Password protected sharing – When enabled, resources on the local system are only accessible to
users on remote computers that also have login accounts on the local computer. To allow any users on
the network to access shared resources simply disable this setting

Creating Shared Folders with Windows Explorer

Shared folders can be configured using Windows Explorer, simply by navigating to the folder to be shared,
right clicking on the folder and selecting Properties from the menu. In the properties dialog, click on
the Sharing tab to display and modify the current shared folder settings as illustrated in the following figure:

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

Within the sharing property panel, click on the Share... button to access the File Sharing dialog. Within this
dialog, the users who may access this shared folder are specified. If file sharing has been restricted to
users with local accounts and passwords, a list of users can be obtained by clicking on the down arrow. In
this situation, select and add users, or select Everyone if access is to be made available to all users with
local accounts: Note: I recommend to type in the box the word domain users then check names once
underlined click apply and ok.

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

Once these settings are complete, click on the Share button to initiate the file sharing process. Once this
initial phase of the share setup is complete a dialog will appear announcing this fact, listing the full
Universal Naming Convention (UNC) path to the shared folder and providing the option to email users to
notify them of this fact:

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

Having specified which users will have access to the folder the next step is to enable the sharing of the
folder, specify share permissions and configure a Share Name by which the folder will be referenced and
accessed. In addition caching of shared files can be configured. Caching allows users to maintain local
copies of shared files so that they can be accessed off-line (for example when the server hosting the files is
not available to the user's local system). With caching configured, local copies of shared files are stored on
the user's local system so that they can be accessed without a connection to the server. When a
connection is re-established, any changes made to the local copy of the file are synchronized with the
original copy on the server.
To configure these settings, click on the Advanced Sharing button to display the following dialog:

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

In this dialog, set the Share this folder option to enable the sharing of the folder. Once this has been
selected the Share name field and associated button will activate enabling a share name to be entered. By
default the name of the folder being shared will be displayed, although this may be changed to another
name if desired. If the number of concurrent users accessing a shared folder is of concern, modify the
number of simultaneous users accordingly. Enter optional comments about the share before clicking on
Caching to configure the off-line file settings. This will invoke the Offline Settings dialog where a number of
options are available including allowing each user to specify which files they would like to be able to access
off-line, only having files that users actually access available off-line and disabling off-line sharing
altogether:

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

The final step in the folder sharing setup is to click on Permissions to configure the share permissions,
details of which are covered in a later section of this chapter.

Creating Shared Folders on Remote Servers with Computer Management

Windows Explorer provides an excellent mechanism for configuring shares on the local system. This
approach falls a little short in terms of convenience, however, when it is necessary to configure shares on a
remote server. Fortunately Windows Server 2008 R2 addresses this need by allowing shares to be
configured from the Computer Management tool. One point to note is that while this section will focus on
the remote configuration of file shares, the steps outlined here may equally be used to share files on a local
server. In fact, the Create a Shared Folder Wizard can be invoked on a local machine either from Computer
Management or by entering shrpubw at the command prompt or in a Run dialog.
After starting Computer Management on the local system, right click on Computer Management in the left
panel tree and select Connect to another computer... In the resulting dialog box either enter the name of
the remote computer or click on Browse and then Advanced... to search the network or domain for the
remote system. Once a connection has been established to the remote server the Computer Management
interface will refresh and the Computer Management link in the tree will also display the name of the
selected remote server.

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

Once Computer Management is configured to administer a remote server, the next step is to begin the
folder sharing process. Begin by unfolding the System Tools, then Shared Folders branches of the tree in
the left panel. Select Shares to obtain a list of current shares configured on the remote system. The
following figure illustrates Computer Management with a list of shares configured on a remote system
named WINSERVER-2:

The creation of a new shared folder on the remote server (although as previously mentioned this can also
be used on local computers) involves the use of something called the Create a Shared Folder Wizard,
which, as the name suggests provides a user friendly way of configuring shared folders. To invoke this
wizard, simply right click on New Share..., then click on Next on the wizard's welcome screen. In the
resulting Folder Path screen, either type in the path of the folder to be shared, or browse the file systems to
locate it. With the required folder path selected click on Next to configure the name and description
settings. On this screen, specify the share name by which the folder will be accessed from remote
computers together with an optional description of the shared folder. Next, configure the off-line file settings
for the folder contents by clicking on Change.
Once these settings are configured, click on Next once again to configure the share permissions for the
selected folder. Either select one of the pre-configured options or select Customize permissions and click
on Custom to configure share permissions on a per user basis. Finally, click on finish to complete the
sharing process. If the configuration is successful a summary screen similar to the one illustration in the
following figure will be displayed:

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

Creating Users and Computers

First, you can use the new Server Manager tool and Browse to Roles | Active Directory Domain Services |
Active Directory Users and Computer. Figure A below shows you this tool in the context of Server Manager.

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines
Figure A

Active Directory Users and Computers through Server Manager

The second method is to start Active Directory Users and Computers directly, which is how the tool was
used in previous versions of Windows. To do so, click Start | All Programs | Administrative Tools | Active
Directory Users and Computers. When you do, you'll see the screen shown in Figure B. This article uses
this method to manage Active Directory Users and Computers.

Figure B

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines
Active Directory Users and Computers

If you've ever worked with Microsoft Management Console (MMC) before, the layout should be familiar.
Across the top notice the set of pull-down menus. Beneath the menu bar is a button bar that provides quick
access to frequently used procedures. Finally, you'll see two panes. The left pane provides a tree view of
your Active Directory structure. The right pane shows the objects for containers highlighted in the left pane.

Menu choices

Pull-down menus you can access include:

 File: In the File menu lies the Options menu, which allows you to clean up console information. You
can also quit Active Directory Users and Computers by clicking Exit.
 Action: This menu allows you to perform different actions depending on which container object
you've selected. For example, if you select the Users container, you might see the Delegate Control
menu option and options that allow you to create new users and groups, but if you select a particular
User object, you'll see actions about what you can do to a user, such as resetting passwords and
disabling accounts. When the domain object is selected, this menu contains options to raise the
domain functional level and to modify the servers that are considered operations masters, such as the
PDC emulator and the schema master.
 View: This menu choice allows you to customize the appearance of Active Directory Users and
Computers. You can change how objects appear, how many columns Active Directory Users and
Computers displays, and filter out objects you don't want to appear.
 Window: This menu choice allows you to display multiple MMC windows and control how those
windows appear on your server.
 Help: As would be expected, this choice allows you to access Active Directory Users and
Computers Help files.

The button bar

As in most MMCs, the button bar in Active Directory Users and Computers closely resembles a Web
browser. Like browser buttons, these buttons are relatively self-explanatory. Left to right, these buttons are:

 Back to previous selection

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

 Forward to next selection (if you previously used Back)


 Move up one level in the Active Directory hierarchy
 Show/Hide console tree
 Paste
 Get properties for current object
 Refresh
 Export List
 Help
 Show/Hide action pane
 Create a new user object in the current container
 Create a new group in the current container
 Create a new organizational unit in the current container
 Create a filter to see only specific types of objects
 Find objects
 Add selected objects to a group

You'll notice that as you go from container to container in the left pane, buttons sometimes will become
unavailable. For example, if you go to the Computers container, you can't use the Create New
Organizational Unit button.

Take special note of the Show/Hide action pane button. In most of their new products, Microsoft has moved
to a screen layout that includes what they call an action pane. The action pane provides quick access to all
of the functions available with regard to a particular object.

In Figure C below, note that the user object named Administrator is selected. In the Action pane on the
right, there are two More Actions options. One is below the Users heading and provides shortcut access to
the same options that would be available if you right-clicked Users container. Likewise, underneath the
Administrator heading, the More Actions button provides quick access to the options that would be
available if you were to right-click the Administrator user.

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines
Figure C

The Action Pane provides quick access to the functions available to an object.

Before you proceed through the rest of this article, make sure you are looking at the Advanced view, which
gives you a look at many  more objects and containers. Of course, the more access you have, the easier it
is to make a mistake, so be careful, too. Figure C above was taken when the Advanced view was active. To
enable Advanced mode, choose View | Advanced Features.

The Console Tree

The left pane is called the Console Tree. This tree displays all of the container objects for Active Directory.
Navigate through the Console Tree by clicking the plus signs to expand the various options/containers. As
you expand the tree, you'll start to get to Active Directory objects. The default objects you'll find in Windows
Server 2008's Console Tree are:

 Saved Queries: Allows you to store queries that perform actions on groups of objects. Saved
queries give you a way to quickly access objects that you need to manage on a relatively regular basis.
 Domain: In your own environment, the name of your Active Directory domain is listed here. This
object is the main container for your Active Directory environment and contains all of the other
container and organizational unit objects.
 Built-in: Contains all of the default security groups that come with Windows Server 2008, which are
listed below. The descriptions of what each group allows/denies is right from Active Directory Users
and Computers:
COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO
For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

o Account Operators: Members can administer domain user and group accounts
o Administrators: Administrators have complete and unrestricted access to the
computer/domain
o Backup Operators: Backup Operators can override security restrictions for the sole
purpose of backing up or restoring files
o Certificate Service DCOM Access: Members of this group are allowed to connect to
Certification Authorities in the enterprise
o Cryptographic Operators: Members are authorized to perform cryptographic operations.
o Distributed COM Users: Members are allowed to launch, activate and use Distributed
COM objects on this machine.
o Event Log Readers: Members of this group can read event logs from local machine
o Guests: Guests have the same access as members of the Users group by default, except
for the Guest account which is further restricted
o IIS_IUSRS: Built-in group used by Internet Information Services.
o Incoming Forest Trust Builders: Members of this group can create incoming one-way trusts
to this forest
o Network Configuration Operators: Members in this group can have some administrative
privileges to manage configuration of networking features
o Performance Log Users: Members of this group may schedule logging of performance
counters, enable trace providers, and collect event traces both locally and via remote access to
this computer
o Performance Monitor Users: Members of this group can access performance counter data
locally and remotely
o Pre-Windows 2000 Compatible Access: A backward compatibility group which allows read
access on all users and groups in the domain
o Print Operators: Members can administer domain printers
o Remote Desktop Users: Members in this group are granted the right to logon remotely
o Replicator: Supports file replication in a domain
o Server Operators: Members can administer domain servers

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

o Terminal Server License Servers: Members of this group can update user accounts in
Active Directory with information about license issuance, for the purpose of tracking and reporting
TS Per User CAL usage
o Users: Users are prevented from making accidental or intentional system-wide changes
and can run most applications
o Windows Authorization Access Group: Members of this group have access to the
computed token Groups Global And Universal attribute on User objects
 Computers: Contains all of the workstations and member server objects in your Active Directory.
 Domain Controllers: Contains all of the domain controllers used in your Active Directory domain.
 Foreign Security Principals: The container holds security identifiers associated with objects from
external, trusted domains.
 Lost And Found: Here you'll find the objects that were supposed to replicate across the directory
but couldn't for some reason. Objects will appear here if they were created at the same time the
container that holds them was deleted. This will probably only happen where you have multiple network
administrators working in Active Directory.
 Program Data: Contains object information pertaining to network applications, specifically data
stored directly into Active Directory.
 System: Contains additional containers that store system information for Active Directory such as
Group Policies, DNS, IPSec, and DFS Configurations.
 Users: This is the default container for Active Directory users.
 NTDS Quotas: Stores quota objects, which restrict the number of objects a user can create in a
container.
 Additional organizational units: Your Active Directory hierarchy can be structured to reflect your
organizational structure. You're not limited to placing every single user object into the Users container,
for example. You can create additional containers as necessary to meet your goals. Additional
containers can contain objects beyond users, such as groups, printers, shared folders, or even other
Organizational Units.

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines
Common Active Directory objects

Within each container reside Active Directory objects, which represent every resource that has been added
to your Active Directory hierarchy. As you look through the various containers discussed above, you'll see
the objects appear in the right pane.

Microsoft has done a pretty good job of giving the objects meaningful names. You can usually quickly
guess what an object does by its name. For example, the DHCP Users object is a group object containing
members that have read-only access to DHCP. Even if you can't discern an object's purpose by its name,
Microsoft has included a Description column that tells you what each default object does. And, if worse
comes to worse, there's always Google!

Each object is made up of a group of properties, which describe the object and what it can do. View the
properties for an object by right-clicking the object and, from the resulting shortcut menu, selecting
Properties. In this article, you will learn about the properties for the following kinds of objects:

 Computers
 Groups
 Users

Only the default tabs for each object will be discussed here. If you have added applications that extend
Active Directory's schema, such as Exchange, there may be additional tabs on some kinds of objects.

Computer Objects

The Computer object describes computers that have rights on the network. It can describe domain
controllers, member servers, or workstations. You'll find domain controllers in the Domain Controllers
container. Member servers and workstations will appear in the Computers container. When you right-click a
Computer object and select Properties, you'll see the screen shown in Figure D.

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines
Figure D

The Properties page for the computer named VISTA32.

As with most Properties pages, you'll find tabs with further information. Tabs on the Computer Properties
page include:

 General: This tab provides basic information about the object, including both its NetBIOS name, its
DNS name, type, Active Directory site and description.
 Operating System: This tab will show you the operating system running on the computer and what
service packs, if any, have been applied to it.
 Member Of: Here, you can view the computer's group memberships and make any necessary
adjustments. By default, all new computers are added to the group named Domain Computers.

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

 Delegation: In older versions of Windows Server, this information was located on the General tab.
Select one of the 'trust' options if you want the computer to be able to request services from another
computer.
 Password Replication: The Password Replication tab holds a list of the Read-Only Domain
Controllers that store cached versions of the directory.
 Location: Enter details describing the computer's physical location.
 Managed By: Provide information regarding the staff person responsible for the computer. You can
quickly assign someone by selecting their information directly from Active Directory.
 Object: This tab displays information about the object including its name, when it was created,
when it was last updated, and the Update Sequence Numbers for it. Update Sequence Numbers are
critical components when it comes to handling Active Directory updates and keep things in check. On
this tab, you can also indicate that the object should be protected from accidental deletion.
 Security: This tab controls the Active Directory rights other objects have to this object. The  Group
or user names box lists the objects with rights and the Permissions box describes the permissions the
selected user or group has been granted or denied.
 Dial-in: Decide whether or not users can remotely access the computer, whether by dial-up or
VPN. You can also set callback options for extra security.
 Attribute Editor (new tab in Windows Server 2008): In Windows Server 2008, Microsoft has
borrowed from the ADSI Edit utility and added this tab, which allows you to directly manipulate all of the
attributes associated with the selected object.

Group Objects

There are a couple of kinds of group objects that can be created in Active Directory. The first kind, the
security distribution group, provide a way to manage access rights for multiple users (or other objects) all at
once. Rather than assign individual permissions to a file share, for example, you can give rights to the
security group and then add and remove group members as needed. Security groups can also be used as
email distribution groups. The second kind of group, called a distribution group, is used solely as an email
distribution list. This article focuses on security groups.

If you right click a Group object, you'll see the screen shown in Figure E.

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines
Figure E

The Properties page for the Domain Admins group object.

Tabs on the Group object include:

 General: This tab displays information about the object. You can view, but not change Group
Scope and Group Type for Groups. You can change all other fields on this page.
 Member: Here you can add and remove group members. By clicking the Add button, you can add
individual objects or select multiple objects.
 Member Of: This tab lists the groups that the object belongs to. You can add or delete group
membership here.
 Managed By: Here you can enter information about who's in charge of the computer. You can
quickly assign someone by selecting their information directly from Active Directory.

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

 Object: This tab displays information about the object including its name, when it was created,
when it was last updated, and the Update Sequence Numbers for it. On this tab, you can also indicate
that the object should be protected from accidental deletion.
 Security: This tab controls the Active Directory rights other objects have to this object. The  Group
or users box lists the objects with rights and the Permissions box describes the permissions the
selected object has.
 Attribute Editor (new tab in Windows Server 2008): In Windows Server 2008, Microsoft has
borrowed from the ADSI Edit utility and added this tab, which allows you to directly manipulate all of the
attributes associated with the selected object.

User Objects

User objects are, well, users! Users, after all, are the foundation of your organization.

When you right-click a User object and select Properties, you'll see the screen shown in Figure F.

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines
Figure F

The Properties page for a user object.

Tabs on User objects include:

 General: Displays general descriptive information about the user, including name, email address
and primary telephone number.
 Address: This tab displays postal addresses for the selected user.
 Account: The Account tab holds detailed account information for the user, including the logon
name for the user and, via the Logon Hours button on this tab, account restrictions. The Account
options section gives you a way to force users to change their password at next logon, prevent them

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

from changing passwords, require a Smart Card for logon, and enable delegation for the account.
You'll also use this page if the account gets locked out due to logon failures. Microsoft has made is
easy to unlock accounts by adding an "Unlock account" option to this tab.
 Profile: The Profile tab holds fields that specify the paths to any logon scripts the user needs to
access. You can also specify a path to the user's profile and home folder here.
 Telephones: This tab serves as a repository for any telephone numbers you have for the user,
including pagers, cell phones, and IP telephone numbers.
 Organization: Don't confuse this tab with Active Directory's Organizational Unit object. Here, you'll
place information about the user's company, including job title, department, and company name. You
can also link the user to his or her manager's Active Directory object.
 Terminal Services Profile: This tab is similar to the Profile tab, but this only controls profile
information for the Terminal Services session, including home folder location.
 COM+: You can assign the user to be part of a COM+ partition set here. COM+ partition sets allow
users in a domain to access COM+ applications throughout the domain.
 Attribute Editor (new tab in Windows Server 2008): In Windows Server 2008, Microsoft has
borrowed from the ADSI Edit utility and added this tab, which allows you to directly manipulate all of the
attributes associated with the selected object.
 Security: This tab controls the Active Directory rights other objects have to this object. The  Group
or users box lists the objects with rights and the Permissions box describes the permissions of the
selected object.
 Environment: This tab controls the Terminal Services startup environment for the user.
 Sessions: The information on the Sessions tab helps you control how the user interacts with
Terminal Services, including how long a session stays connected and what happens if she disconnect
from the server.
 Remote Control: This tab indicates whether a user's Terminal Server session can be remotely
controlled. You can set options that allow you to establish view-only sessions or that allow interaction.
 Published Certificates: This tab allows you to associate X.509 security certificates with the user.
 Member Of: This tab lists the groups to which the user belongs. You can add or delete group
membership here.

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

 Password Replication (new tab in Windows Server 2008): The Password Replication tab holds a
list of the Read-Only Domain Controllers that store cached versions of the user directory.
 Dial-in: On the Dial-in tab, you'll decide whether or not users can remotely access the network,
whether by dial-up or VPN. You can also set callback options for extra security.
 Object: This tab displays information about the object including its name, when it was created,
when it was last updated, and the Update Sequence Numbers for it. On this tab, you can also indicate
that the object should be protected from accidental deletion.

Accomplishing common tasks with Active Directory Users and Computers

Now that you know your way around Active Directory Users and Computers, it's time to find out how to
accomplish common administration tasks.

Create a new user

Right-click the container where you want the new user object to reside. Click New | User. Follow the
prompts in the New Object - User screen to add information about the user such as logon name and user
name. Click Next to see additional screens and enter appropriate information.

Create a new group

Right-click the container where you want the new group object to reside. Click New | Group. Follow the
prompts in the New Object - Group screen to add information about the group such as group name and
group type. For most groups you create, you'll create a Global Security group. Click OK to create the group.

Create a new container object

Right-click the domain or container where you want the new container object to reside. Click New |
Organizational Unit. In the New Object - Organizational Unit screen, enter a unique name for your
container. Click OK to create the container.

Make a user a member of a group

Right-click the user object. Select Add To A Group. When the Select Group window appears, type the
name of the group in the Enter the Object Name to Select box and click Check Names. If you don't know

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

the name, click advanced. Click Find Now to display all groups. Select the group you want the user to
belong to and click OK. Click OK again to close the Select Group window and finish.

Change a password

Right-click the user object. Select Reset Password. When the Reset Password screen appears, type the
new password in the appropriate fields. To force a user to change a password immediately, select Users
Must Change Password. Click OK.

Unlock an account

Right-click the user object. Select Properties. Click the Account tab. Remove the check from the Account Is
locked Out box.

Disable an account

Right-click the user object. Select Disable Account. Re-enable by right-clicking the user object and
selecting Enable Account.

Move a user

Drag and drop the user to the target container.

Restrict logon times

Right-click the user object. Select Properties. Click the Account tab. Click Logon Hours. When the Logon
Hours screen appears, select Logon Denied and click the time blocks when you don't want the user to log
on.

Delete a group

Right-click the group object. Select Delete.

Delegate authority

Right-click the container object where you want to delegate tasks. Select Delegate Control. The Delegation
of Control Wizard appears. Follow the prompts on screen to add users or groups that you want to give
control to and what powers you want to grant to those users or groups.

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines
Allow users to use VPN

Right-click the user object. Select Properties. Click the Dial-in tab. Select Allow Access (or, if you have
implemented Windows Server 2008's Network Access Protection, click Control access through NPS
Network Policy. Click OK to close.

Make a change to a specific attribute for an object

Right-click the object. Select Properties. Click the Attribute Editor tab. Select the attribute that you want to
modify. Click the Edit button. Make your change and click OK

Configuring Folder Redirection


Simple Step: Configure Folder Redirection in Window Server
2008 R2
As a Server Admin, you can use GPOs to deploy scripts to users and computers.

You also can redirect folders that are included in the user’s profile to a File Server. These features enable
you to configure the users’ desktop settings more easily and, where desirable, to create a standardized
desktop environment that meets your organization’s needs.

So, what is Folder Redirection? 

You can use the Folder Redirection to manage data effectively and, if you choose, to back up data.

By redirecting folders, you can ensure user access to data regardless of the computers from which a user
logs in.

So in this post, let’s go through a simple step on how to configure Folder Redirection…

1 – 1st, make sure that you have share folder for this step, for this demo, I had my shared folder created
previously (MCT Docs – OSI Branch 01)…

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

2 – Next, we need to create a new GPO and link it to the IT OU (you can use any OU you prefer)…

– On the Group Policy Management console, right click IT OU and then click Create a GPO in this domain
and Link it here…

3 – In the Name box, type MCT Folder Redirection, and then click OK…

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

4 – Next, expand IT OU, right-click MCT Folder Redirection, and then click Edit…

5 – In the Group Policy Management Editor, under User Configuration, expand Policies, expand
Windows Settings, and then expand Folder Redirection…

– Next, right-click Documents, and then click Properties…

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

6 – In the Document Properties dialog box, on the Target tab, next to Setting, click the drop-down
arrow, and then select Basic – Redirect everyone’s folder to the same location…

– Ensure the Target folder location box is set to create a folder for each user under the root path…

– In the Root Path box, type \\dc01\MCT Docs – OSI Branch 01, and then click OK…

7 – In the Warning dialog box, click Yes…

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

8 – Next, let’s try test the folder redirection settings, switch to your client PC and log in as any of your
domain user, right-click the desktop, and then click Personalize…

9 – In the navigation pane, click Change desktop icons…

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

10 – In Desktop Icon Settings, select the User’s Files check box, and then click OK…

11 – On the desktop, double-click Steve Winfield folder…

– Right-click Documents, and then click Properties…

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

12 – In the Document Properties dialog box, verify that the location of the folder is now the network
share in a subfolder named for the user…

COMPUTER SYSTEM SERVICING NC II ARMANDO G. HERMOGENO


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines
Joining Server and Client

The appearance of Windows 2008 R2 after the installation

 
For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

 In the Computer Name property page, click Change...


 Accept or change the name of the server
 

 Click OK
 A dialog box will ask you to restart your computer. Click OK
 
For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

 Click Close
 Click Restart Now

Click that message and click "Turn on network discovery and file sharing":
For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

You should receive a message box presenting you two options:


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

a. Right-click Network and click Properties


 

b. Click Local Area Connection


c. Click Details. Make note (on a piece of paper) of the address on the right side of IPv4 Address:
For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

 
Click Close
d. In the Local Area Connection Status dialog box, click Properties
e. In the checked list box, click Internet Protocol Version 4 (TCP/IPv4)
 
For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

f. Click Properties
g. Click Use the Following IP Address
h. Provide the Preferred DNS server address (we use 127.0.0.1 for our example) and the Alternate DNS Server address
(we leave ours empty)
 
For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

i. Click Advanced to check the values that were put in the IP Settings and DNS property pages
j. Click OK
k. Click OK
l. Click Close
m. Click Close
a.  
For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

b. Click Next
c. In the third page of the wizard, titled DNS Server, read the text and click Next
d. Click Install
i. A small window will come up:
 
For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

A wizard will start:


a.

In the first page of the wizard, read the text and click Next
 
For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

b. In the second page of the wizard, read the text and click Next
 

 
For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

c. In the third page of the wizard, click Create a New Domain In a New Forest
 
For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

d. Click Next
e. The next page asks you to create a fully-qualified domain name (FQDN). Enter a
Just have to decide and keep the scheme in mind.
For our example, we are using functionx.local
For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

f. After specifying the FQDN, click Next. A window will start some operations:
 

g. When a dialog box comes up, read its text and click Next
 
For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

h. On the next page, read the text and click Next. A window will come and start performing some operations:
 
For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

i. Click Next
 
For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

j. Click Next. If you didn't create (assign) an IP address on (to) the server, a dialog box will come up, about IP address
assignment:
 
For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

 
In you didn't assign an IP address to the server, it means you plan to use a DHCP server that will automatically assign IP
addresses to the computers of the network. In this case, click Yes, ...
k. A dialog box comes up
 

l. Read the text and click Yes


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

m. In the next page of the wizard, click Nest


 

n. The next page asks you to specify the administrator's password. Click the Password text box and type the password
o. Click the Confirm Password text box and type the same password
 
For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

p. After specifying the password, click Next


 
For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

q. Click Next. A new dialog box will startperforming an operation:


 
For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

 
This may take a while
 
For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

r. Click Finish
s. A new dialog box will ask you to reboot:
 

Therefore, click Restart Now


t. When the computer comes up, press CTRL + ALT + DELETE and log in
Configuration Tools
For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

Click Start
a. Right-click Network and click Properties
 

b. Click Local Area Connection


c. Click Details. Make note (on a piece of paper) of the address on the right side of IPv4 Address:
For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

 
(For our example, we are building a small network and we will just use a small range of IP addresses. In the real world or
for a large network, you would need to actually know TCP/IP, design a range of IP addresses you plan to use, then
assign those IP addresses, or design a way to assign the IP addresses to the computers)
d. Click Close
e. In the Local Area Connection Status dialog box, click Properties
f. In the checked list box, click Internet Protocol Version 4 (TCP/IPv4)
 
For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

g. Click Properties
h. Click Use the Following IP Address
i. Type the IP address you want the server to use (for our example, and based on the above dialog box, we type
192.168.001.102) and press Tab
Type the subnet mask (normally, it should be added automatically when you press Tab from the previous IP address text
box)
k. Type the default gateway address (use the first and the second octets of the IP address you had provided (such as
192.168) and use 001.001 for the other two bytes)
. Provide the Preferred DNS server address (we use 127.0.0.1 for our example) and the Alternate DNS Server address
(we leave ours empty)
 
For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

m. Click OK
n. Click Close
o. Click Close

Creating User Account


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

a. Click Next
b. In the next page of the wizard, type the password as Password1
c. Press Tab and type the same password. Here is an example:

d. Click Next
For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

e. Click Finish
a.  

b. Make sure Administrators is selected and underlined.


 
For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

Click OK
c. Click OK
For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

en click OK. After creating an account for a computer, you can add it to the domain. Actually, primarily creating an account
for a computer is not required.

Checking the Computer Name and Domain


Always make sure you know the name of each computer on your network and the name of the domain it belongs to.
To check the name of the computer and its domain on a workstation:
a. Click Start
b. Right-click Computer and click Properties
To check the name of the server, in the Initial Configuration Tasks, look on the right side of Full computer Name
To check the name of the document of the server, look on the right side of Domain
For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

Joining a Domain

Preparing a Workstation
a. Click Start -> Control Panel
b. Click View Network Status and Tasks (or click Network and Internet, then Network and Sharing Center)
c. Click Local Area Connection
d. Click Properties
e. In the Networking tab of the Local Area Connection Properties, in the checked list box, click Internet Protocol Version 4 (TCP/IPv4)
 
For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

f. Click Properties
g. Click Use the Following IP Address
Type the IP address you want the server to use. For example, add 2 (bits) to the last byte of the IP address you gave to the server and pres
i. Type the subnet mask (it should be added automatically when you press Tab from the previous text box)
Type the default gateway address (use the first and the second bytes of the IP address you had provided (such as 192.168) and use 001.00
the other two bytes)
k. For the Preferred DNS Server, type the same IP address as the server
 
For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

l. Click OK
m. Click Close
For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

n. Click Close
Joining the Domain
For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

a. Click Change Settings


b. In the System Properties dialog box, click the Computer Name tab and click the Change... button.
If the computer is running Microsoft Windows 7 Home Premium, the Domain radio button would be disabled, indicating that the computer ca
join a domain:

. In the Computer Name text box, enter the desired name of the computer. If you had already created an account in the domain for this comp
type that name
d. In the Member Of section, click the Domain radio button
e. Click the Domain text box and enter the name of the domain
For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

f. After specifying the name of the computer and the domain to join, click OK
g. You would then be asked to provide a user name and a password for a user who has the permissions to let a computer join a domain.
Type the name of the domain, followed by \ and followed by the user name of an account that can allow a computer to join a domain and p
Tab
h. Type the account's password
For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines
For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines
SECTOR ELECTRONICS SECTOR
UNIT OF COMPETENCY MAINTAIN AND REPAIR COMPUTER SYSTEMS AND NETWORKS
MODULE TITLE MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS
MODULE DESCRIPTOR
This unit covers the knowledge, skills and attitudes needed to maintain and service computer systems and networks.
NOMINAL DURATION 30 HOURS
QUALIFICATION LEVEL NC II
SUMMARY OF LEARNING OUTCOMES:
Upon completion of this module, the trainee/student must be able to:

LO 1. Plan and prepare for maintenance and repair

LO 2. Maintain computer systems and networks

LO 3. Diagnose faults of computer systems and networks

LO 4. Rectify/correct defects in computer system and network

LO 5. Inspect and test the computer systems and networks

LO 1. PLAN AND PREPARE FOR MAINTENANCE

ASSESSMENT CRITERIA

1. Maintenance and/or Diagnosis of faults is planned and prepared in line with job requirements
2. Tools, equipment and testing devices needed for the maintenance are obtained and checked for correct
operation and safety
3. Materials necessary to complete the work are obtained in accordance with established procedures and
checked against job requirements.
4. OHS policies and procedures are followed in line with job requirements.
5. Computer systems and networks for maintenance are checked against job/service order or instructions and
specifications.

CONTENTS

1. Plan and prepare for maintenance and repair


2. Maintain computer system and network
For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines
3. Diagnosed faults and computer systems
4. Rectify/correct defects in computer systems and networks
5. Inspect and test the computer systems and networks

CONDITIONS

The students must be provided with the following:

1. Pliers
2. Screw drivers
3. Special tools
4. Soldering iron/gun
5. Wrenches
6. Utility knife/stripper
7. Hot air soldering station
8. LAN tester
9. Crimping tools
10. Maintenance bench
11. Power supply equipment
12. Multi meter
13. Calibrators
14. Signal generator
15. Oscilloscope
16. Appropriate software
17. Disk
18. Connectors
19. Adaptors
20. Wires and cables
21. Appropriate software
22. Computer storage media
23. Desktop computer
24. Googles/glasses
25. Mask
26. Gloves
27. Anti-static wrist wrap
28. Cables and connectors
Back – up

Windows Server 2008 R2 Backup and Restore


For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

Every admin should make backups. That’s just a fact. But what backup software should we use? Many
administrators look for a third-party backup solution, however Windows Server ships with a solid and built-
in solution – Windows Server Backup (the entirely new face of NT Backup).

To install backup functionality in Windows Server 2008 R2, go to Server Manager – Features, and select
Windows Server Backup Features with additional components – Windows Server Backup (core files for
backup functionality) and Command-Line tools (for PowerShell support scripts).

Select features screen – select all the Windows Server Backup features available.
For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

Screen indicating successfull installation


After the installation of Backup features we can access them through the Start , in Administrative Tools
under “Windows Server Backup”.
For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

Inside the Windows Server Backup Management console, we can create a backup schedule, perform one-
time backup, recover data that was previously configured for a backup, or configure performance settings.

Windows Server Backup Console


In this walk-through we will create a scheduled job for backing up an entire operating system (including the
registry), so we’ll go ahead and click on Backup Schedule option.

Note If you only wish to backup SQL Server please take a look at the SQL Server Backup Script
During the backup schedule plan creation, we can select what to backup (single files from our server,
system state, folders, volumes or the entire server), as well as when and how often backups should occur,
and finally where to store the backups. Before Windows Server 2008 R2, we could only keep our backups
on a dedicated volume, which was a serious maintenance cost for system administrators who had become
accustomed to the NTBackup tool from Windows Server 2003, which allowed backups to any storage
(including local folders).

During the setup of a Backup Schedule job, we will have to decide what to backup. We can obviously select
individual volumes, folders or files, but since Windows Server 2008 R2 we also have additional backup
options:
Continues…
For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

Windows Server 2008 R2 Backup and Restore

 Bare Metal Recovery – backup an entire operating system. This is not the same as full backup,
which also backs-up your data.

 System State – generally this option will backup all system-related settings, like registry, COM+
class registration database, Boot files (including system files), certificates, Active Directory Services,
SYSVOL folder, IIS Meta-Directory, etc.
For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

Select backup Items windows


After we select data to backup, we can specify file types to exclude in the backup (such as mp3 files or
temp files), and choose additional VSS settings. To do this, we click on the Advanced Settings button.

It is advisable to exclude certain files from the backups that are not necessary to restore. For example,
when you manually create Full Server backup and store it locally on one of your volumes, you should
perform that backup every day, because it will surely take lot of disk space and impact server performance.
Instead consider a less regular Full Server backup and more regular backups of the data which changes
more frequently.
For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

Specific files excluded from the backup.


In the VSS Settings screen, we can choose what type of Volume Shadow Copy we want to create.
Available options are VSS Full Backup, and VSS copy Backup. Normally we will want to use the VSS full
back up when we do not use third party tools for backups.
For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

VSS Settings window


On the next step of scheduled backup configuration, we need to decide when to perform the backups. This
is a crucial step, since we have to choose a time when the server load is low and when performance isn’t
the most important. For this reason, backup jobs are usually run during the night.

We can choose to backup once a day (and select an exact time when), or choose to perform backups more
than once, then we can choose more than one hour for a backup.
For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

Backup Time Schedule Window


In the next step we will decide where we’d like to store the backups. In previous version of Windows Server
2008, when I tried to configure backups as I am used to with NetBackup, I’ve encountered issues because
Windows Server Backup wasn’t able to back up my data to local folders. I was forced to purchase a
dedicated hard drive for backups despite space being available on existing data volumes. It was a real
relief to see the Windows Server Backup in Windows Server 2008 R2 re-introduces this functionality!
For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

Select Backup Destination window


In our example, I’ve used one of my local volumes to store my backups.
For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

Select Destination Window with local D: Volume added


The final step is the summary, where we can review our settings and Finish the Backup Wizard. After a
successful setup, we’ll see our newly added backup job on the Windows Server Backup console.
For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

Windows Server Backup console with newly added backup job.


If we decide to perform the backup right now, out of schedule, we should use Backup Once option in right
pane. Then in the Backup Once Wizard screen, we can choose either one of our scheduled backups, or we
can configure entirely new one.
For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

Backup Once Setup Window


Keep in mind, that when you create a backup of volumes hosting Virtual Hard Disk files (VHD), these files
will be automatically excluded from the backup, as if they were mounted at the time backup was created.

So far so good, but what about Recovery? To configure recovery go back to Windows Server Backup
Console and select the Recovery option from the right pane.
We can use this option to recover specific files, entire volumes or the system state components from a
backup we setup earlier. We will need to specify where our backup file is located, it can be either on a
Local Server, or remote location (which is the normal and recommended location for any backup).
For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

Recovery Wizard Screen


The last interesting option in our Windows Server Backup console are the Optimizations options. These
options only apply to backups where we include entire volumes in our backup. We can choose Normal
Backup, which is best for servers under heavy loads. Faster Backup is usually good when we perform
backups at night or at close to zero server usage. We can also customize these settings for each volume
on a server.
For exclusive use of Sta. Isabel College
Taft Avenue, Manila, Philippines

Optimization Options screen


With Windows Server 2008 R2 we once again have a great, in-built tool to back up our data. I know many
Sys Admins prefer third party tools for backup, but with an appropriate setup Windows Server Backup is
now a viable option

You might also like