Chapter 12 Connectivity CHAPTER OUTLINE TEACHING SUGGESTIONS

advertisement
Instructor: Prof. Michael P. Harris
ITSC 1405 – Intro to PC Operating Systems
Chapter 12
Connectivity
Chapter 12
Connectivity
LECTURE NOTES
CHAPTER OUTLINE
TEACHING SUGGESTIONS
 Slides 2-8
The basic concepts of networking and the
terminology used in networking will be
 Chapter Overview duplicated in PowerPoint
introduced.
slides.
Will learn how to create network connections to  After completion of lecture, suggest to
share resources.
students that they review Objectives and
Will look at command line utilities to gather
Outcomes found on first page of chapter as a
information about your network and perform
check to see if they have mastered concepts.
other network-related tasks.
How to map a drive on a network will be
discussed and then a drive will be mapped.
Will be introduced to the basic protocols of the
Internet.
How command line utilities can be used to
troubleshoot and diagnosis problems will be
discussed.
Will learn how to connect to and navigate the
Internet.
Chapter Overview







NETWORKS (LANS AND WANS)
 Networks (LANs and WANs)
 LANs (local area network) – connected
computers.
 Network has servers and clients.
 Server.
 Provides shared resources to
network users.
 Resources such as printer/hard
drive/file, etc.
 Client computer.
 Accesses the shared network
resources provided by server.
 Resources – shared elements.
Carolyn Z. Gillay, Bette A. Peat, Windows XP Command Line
Franklin, Beedle & Associates ©2003 ISBN: 1-887902-82-1
SECTION 12.1 (pp. 634-638)

Slides 9-28
 Advantages of setting up network.
- Share hardware – printer, CD-ROM/Zip
drives.
- All can access files instead of copying
them.
- Update information.
- Set-up local e-mail – send messages to user
on network.
- Notebooks – attached/detach – update info
as needed.
- Can access needed resources when away
from office
Page 1
Instructor: Prof. Michael P. Harris
ITSC 1405 – Intro to PC Operating Systems






Client/Server-based network.
 Serves more than 10 users.
 Security/other network functions
provided by one computer (dedicated
server).
 Function of dedicated server –
provide network resources.
Peer-to-peer network (workgroup).
 Fewer than 10 users.
 Has no dedicated server.
 No hierarchy among the computers.
 Each computer can function as client or
server.
Advantages to setting up network- see right
column.
WAN (wide area network).
 Computers use long-range
telecommunication links
(modems/satellites) to connect
networked computers.
 Internet is a WAN.
All networks need:
 NIC (network interface card) installed
into each computer so that a LAN cable
connecting all computers can be
installed.
 Common network card – Ethernet.
 Older Pc – had ISA
 New PC have personal component
interconnect – may not have ISDA
 Notebook have PCMCIA
 Card must fit bus architecture.
 Card must support type of cable
used to connect computers.
Can choose wireless network.
 No wires dedicated to carrying network
signals

Chapter 12
Connectivity
 ISA – industry standard architecture
PCI – peripheral component interconnect
PCMCIA – Personal Computer Memory
Card International Association
USB – Universal Serial Port
 Popular NOS's are Novell NetWare and
Microsoft NT (being replaced by W2000
Server). Up and coming NOS is Linux
(version of older network OS Unix).
 Beyond scope of book.
- Server-based network beyond scope of
book.
- Selection of topology, network interface
card, and cable.
- Assume topology, type of network interface
card and cable has been made.
 Computer running Windows has built-in
peer-to-peer software to create and
administer a small network.







Each computer has wireless network card

Allows computer to communicate
by radio waves, infrared, power
wires in walls or by phone wires in
home
Carolyn Z. Gillay, Bette A. Peat, Windows XP Command Line
Franklin, Beedle & Associates ©2003 ISBN: 1-887902-82-1

Discussion Question (1) - Define the following
terms: client, server, resources, and LAN.
Discussion Question (2) - Compare and contrast
a client computer and a server computer.
Discussion Question (3) - Compare and contrast
a server-based network and a peer-to-peer
network.
Discussion Question (4) - List and explain three
reasons why you might set up a network.
Discussion Question (5) - Compare and contrast
a LAN and a WAN.
Discussion Question (6) - What is the purpose
and function of a network interface card?
Discussion Question (7) – Compare and contrast
setting up a peer-to-peer network using bus
topology and using star topology.
Discussion Question (8) – Explain the purpose
and function of a hub. Identify one advantage to
using a hub.
Page 2
Instructor: Prof. Michael P. Harris
ITSC 1405 – Intro to PC Operating Systems


Chapter 12
Connectivity
Consider appropriate network design
(topology).
Two common topologies for peer-to-peer
network.
 Bus.
 Uses single coaxial cable.
 Called Thin Ethernet, 10BASE-2,
thinnet.
 Need T-connectors/terminator plugs.

All computers connect to a single
cable.


Advantages to bus topology.
 Easy to install.
 Relatively inexpensive.
 Easy to expand bus network.
 Disadvantage to bus topology.
 If 3 + computers on - but one
segment of cable fails – entire
network fails.
 Becoming less common.
Star topology.
 Common for workgroup
 Uses a hub
 One end connected to hub other
to a computer (Like spoke of bike
wheel).
 Two major Ethernet speeds
 Original – 10 Mbps
 Fast – 100Mbps – most popular
 Advantage.
 Single point of failure.
 One defective cable affects
only computer it connects to
(unless hub affected).
 Each computer works - no
network connection.
 Disadvantages.


More expensive than bus –
purchase additional hardware
(hub).
Expansion of network – may need
additional hub if all connections
Carolyn Z. Gillay, Bette A. Peat, Windows XP Command Line
Franklin, Beedle & Associates ©2003 ISBN: 1-887902-82-1
Page 3
Instructor: Prof. Michael P. Harris
ITSC 1405 – Intro to PC Operating Systems
Chapter 12
Connectivity
used on existing hub.









Wiring can become unwieldy –
especially if you cannot run
cable through walls.
 Can go wireless
 Wireless Ethernet standard –
802.11b
Either topology can use networkable printer
or any resource by connecting it directly to
a cable or to a hub.
 Only computer using printer must be on
 Printer needs network interface card
installed
Most users prefer a hub.
 Get many ports – more than # or
computers/devices
Instead of hub – install switch
 Distributes info faster than hub
May prefer router – combines hub and
small computer providing Internet sharing
Firewall – if using portable hard disks and
video camera
Server-based networks also need NOS
(network operating system).
 Tells computers how to communicate
with one another.
For networking need hardware, software,
and network administrator (system
administrator).
 Decides how hardware and software
will be used.
 Decides who will have access to
what devices and resources on
network.
 Manages day-to-day operation of
hardware, network operating system,
and resources of
the network.
Will use a peer-to-peer LAN with built-in
networking software that comes with
Windows.
Carolyn Z. Gillay, Bette A. Peat, Windows XP Command Line
Franklin, Beedle & Associates ©2003 ISBN: 1-887902-82-1
Page 4
Instructor: Prof. Michael P. Harris
ITSC 1405 – Intro to PC Operating Systems
LOOKING AT YOUR NETWORK
 Looking at Your Network.
 When W2KP installed – detects network
card and installs default components.
 Need to:
 Name computer (unique name).
 Setup program gives cryptic name
for computer.
 May override and name computer
yourself.
 Enter administrator password.
 Secure administrator password,
write it down, and store it in safe
place.
 Allows you to administer your
computer.
 Each user needs log on name and
password.
 My Network Places – map to network.
 Activities that follow based on specific
computer configuration.
 Guide to accomplishing tasks on your
system.
 Need to interpret screen.
 Read through if you do not have
equivalent computer setup.
 See how to manipulate a peerto-peer network.
 Most labs are on a server-based on
peer-to-peer based network.
 May not have hardware, software,
or support staff to allow activities
to be done in lab.
 What you can/cannot do depends on
lab or work environment.
Carolyn Z. Gillay, Bette A. Peat, Windows XP Command Line
Franklin, Beedle & Associates ©2003 ISBN: 1-887902-82-1
Chapter 12
Connectivity
SECTION 12.2 (pp. 638-639)
 Slides 29-32
 Brand of computer – good computer name.
2 computers with same brand name, name
them brand name-1 brand name-2
 Administrative password most important
password in Windows.
 Discuss how to determine logon name and
password.
User name usually first initial and last
name or last name and first initial.
Passwords are case sensitive
 AS EACH ACTIVITY IS REVIEWED IN
CLASS, INFORM STUDENTS WHICH
ONES CAN BE DONE IN SCHOOL’S
LAB ENVIRONMENT. DISCUSS WHY
Page 5
Instructor: Prof. Michael P. Harris
ITSC 1405 – Intro to PC Operating Systems
ACTIVITY – LOOKING AT YOUR
NETWORK
 Looking at your network.
 Necessary software and hardware installed.
 Activity based on specific computer
configuration (simple star topology –
uses hub with 3 computers and 2
printers. Three printers part of
BOOKBIZ workgroup.
First computer identified as
Micron-pc and is running WXP.
Second identified as Dell-czg and
is running W2KP.
Third identified as Dell 8100
(Dell-fp) and is running WMe.
One printer is simple inkjet
printer (HP Deskjet 895 Cse) that cannot
support a network card and is physically
attached to Dell 8100 (Dell-fp).
Other Printer (HP Laser Jet4
Plus) does have a network card and is
attached to hub as well as being
physically attached to Micron-pc
computer.
Your network will be different and thus
display will be different.
 Activity steps.









Click Start
Right -click My Network Places
Click Properties.
Right-click Local Area Connection
Click
 Properties
 Client for Microsoft Networks
 Install then Cancel
 Authentication tab then Advanced tab
 Cancel
Close Network Connection window
Click Start then Control Panel.
Should be in Classic View
Double-Click System icon

Click
Carolyn Z. Gillay, Bette A. Peat, Windows XP Command Line
Franklin, Beedle & Associates ©2003 ISBN: 1-887902-82-1
Chapter 12
Connectivity
SECTION 12.3 (pp. 639-644)


Slide 33
Go over items in Local Area Connection
Properties sheet.
GENERAL TAB –
General information – go over each item.
Three network components that can be installed
Client – allows you to access services on
other computers on network
Service – Work that is provided by a server
Protocol – Set of rules that allows computer
to connect with one another and to exchange
information.
Icons
---Dealing with shared resource
---Representative of a protocol
Computers on network must use same protocol in
order to communicate.
AUTHENTICATION TAB – Process for
verifying entity or object is who or what it claims
to be.
ADVANCED TAB – Choose to use firewall
Firewall – set of programs located at
network gateway server that protects resources of
a private network from users from other
networks
Gateway – network point that acts as an
entrance to another network.
Internet Connection Firewall (ICF)
Internet Connection sharing (ICS)
Browser – tool to search Internet
 Computer name.
Up to 15 characters – no spaces.
 Workgroup name.
Up to 15 characters – no spaces
All computers on network must use same
workgroup name
-----Identical in case and spelling on all
computers
-----Only computers with same
workgroup name can share resources
-----Workgroup name must be different
Page 6
Instructor: Prof. Michael P. Harris
ITSC 1405 – Intro to PC Operating Systems
Chapter 12
Connectivity








from name as the computer.
Computer Name tab then Change
Cancel (twice)
Close Control Panel window
All computers are on
Sit at one computer in this case Micron-pc
Click
 Start then My Network Places
 View workgroup computers then View
 Tiles
Double-click Dell 8100 (Dell-fp)
Close all open windows.
 Address - \\Dell-fp
double backslash – UNC (universal
naming conventions) for locating path to
network resource
format \\compugtername\share name
[optional path] - brackets used for optional
items - not actually included in name
-- All network computers – same name to
share resources.
-- Common error – different workgroup
names on each computer.

Activity completed.

Discussion Question (9) - Why is it important
that all computers in a peer-to-peer network use
the same workgroup name?
SECTION 12.4 (pp. 644-645)
SHARING PRINTERS ON A NETWORK
 Sharing Printers on a Network
 Two parts to sharing.
 Server.
 Computer with resources you wish
to share.
 Client.
 Computer that wishes to access
resources.
 In small network the print server is not
dedicated only to printing.
 If you have more than one printer, each can
be shared.
 To use printer, computer attached to
printer must be turned on.
 Can choose to use printer locally - do not
use the network
ACTIVITY—SHARING PRINTERS ON A
NETWORK
 Sharing Printers on a Network
 Activity based on a specific computer
configuration.
 Activity steps.
Carolyn Z. Gillay, Bette A. Peat, Windows XP Command Line
Franklin, Beedle & Associates ©2003 ISBN: 1-887902-82-1

Slides 34-37
 Common items to share – printer, folder on a
hard drive, and an entire hard drive.
 Share printer – any computer on network can
use printer.
 In large network – one computer dedicated to
handling printing – called print server.

Discussion Question (10) – Explain the
difference between using a printer locally and
using a print server on a network.
SECTION 12.5 (pp. 646-654)
 Slides 38-40

Name shared printer -

Must use same name across network.
Can include password – All need to know it.
Printer shared –shown by hand under printer icon
Printer client – any computer on network
Page 7
Instructor: Prof. Michael P. Harris
ITSC 1405 – Intro to PC Operating Systems






















Use computer with printer physically attached to
it (Ex. Dell8100-fp) running WMe
Can run different OS on different computers
on your network.
Open My Computer/Control Panel/Printers
folder
Right-click printer you want to share (HP
DeskJet895Cse)
Click Sharing/Shared As button
Key in: HP COLOR (or your computer's
printer) then Click OK
Note: may need Windows CD if printer
driver not installed on client computer.
Go to a client computer (here micron-pc).
Open My Computer/Control Panel
Double-click Printers and Faxes
Right-click HP Laser Jet4 Plus
Click Properties/Ports/Cancel
Right-click HP Laser Jet 4 Plus Net icon
Click Properties/Ports/Configure Port (if
possible)/Cancel (twice)/Add a printer/Next/
A network printer or a printer attached to
another computer/Next
Browse for a printer selected
Click Next then Double-click DELL-FP
Select printer
Click Next/No/Next/Finish
Right-click HPCOLOR on Dell-FP Printer
Click Properties/Ports/Cancel
Close Printers window
Chapter 12
Connectivity
that can access shared printer.
Discuss two printer icons
--“Hung Off” network – has own network
card and special software allowing it to be attached
to hub and used by other computers on network
--Local – this printer is physically attached to
Micron-pc
 Port – connection
 Every device on network has to be uniquely
identified.
 If printer is on hub – choose Local printer –
reasons considered a local printer because of
port assignment.
 Network printer icon has printer on a cable.
 Notice format - \\DELLFP\HPCOLOR (network path always
begins with double backslash).
- Format of \\computername\sharename.
Activity completed.
SECTION 12.6 (p. 654)
SHARING A HARD DRIVE AND A FOLDER
 Slides 41-42
ON A NETWORK
 Sharing a Hard Drive and a folder on a
 File server
Network
- On network = a file storage device that
 File server.
stores files.
 Computer with drive that will be shared.
- On large network = sophisticated device
 Large network – often one computer is
that stores and manages and maintains order
file server.
as network users request and modify files.
 Small network – usually no dedicated
 Share drive – allows any other user to have
file server.
full access to computer.
 Peer-to-peer network.
 Any computer can share its drive.
 Drive on server computer shared in
same manner printer is shared.
 Can share entire drive or selected
Carolyn Z. Gillay, Bette A. Peat, Windows XP Command Line
Franklin, Beedle & Associates ©2003 ISBN: 1-887902-82-1
Page 8
Instructor: Prof. Michael P. Harris
ITSC 1405 – Intro to PC Operating Systems
Chapter 12
Connectivity
folders.

Two steps.
 Set up drive of computer to be
shared.
 Client computer accesses shared
drive via My Network
Neighborhood.
PERMISSIONS AND RIGHTS
 Permissions and Rights
 In corporate or lab environment – local
computer part of domain.
 Domain
 Administered by network administrator
as a unit with common rules and
procedures
 Includes access control
--Access control is security measure
 Using NTFS
 Can set permissions on files and folders
–specify level of access for groups/users
 Users can be assigned to groups.

Can assign permissions/rights to group


Object created – owner assigned to it
 Owner of object can change
permissions on that object.
 Objects inherit permissions – file within
a file
Using FAT32 file system
 Can provide some security on folders
when shared on network
 Cannot assign permissions on a file-byfile basis as you can with NTFS
ACTIVITY—SHARING DRIVES ON A
NETWORK
 Sharing Drives on a Network

Activity is based on specific computer
configuration.
Carolyn Z. Gillay, Bette A. Peat, Windows XP Command Line
Franklin, Beedle & Associates ©2003 ISBN: 1-887902-82-1
SECTION 12.7 (p. 655)

Slides 43-45
 Domain – group of computers part of
network and share a common directory
database.
 Access control - process of giving users,
groups and computers ability to access
objects (files, folders, and devices) on
network
Security measure - determines who can
access an object and kinds of access that user
is authorized to perform
 Permission
--Determines, which users can access which
objects and kinds of access users have to those
objects.
--Included change ownership, full control,
modify, read and execute, or read only.
--Permission assigned to object depends on its
type
 Management of network and full discussion
of permissions and rights is beyond scope of
text
SECTION 12.8 (pp. 655-667)
 Slide 46
 Do not see any drives –
Looking at own computer through
network – nothing shared on network
 Flashlight icon indicates Windows looking
for network connection.
 When Simple File Sharing Set Sharing everything on hard drive.
Cannot set more specific permissions on
drive
Page 9
Instructor: Prof. Michael P. Harris
ITSC 1405 – Intro to PC Operating Systems

Chapter 12
Connectivity
--choice not available with FAT32 file
Assumes using NTFS file system.
system
 Administrative Share

Activity steps.





































Go to computer you wish to share (Micron-pc
here)
Click Start/My Network Places/View/
workgroup computers/View/Tiles
Double-click Micron-pc
Click View/Tiles/Back button
Double-click Dell-czg computer icon
Click Back button
Double-click Dell 8100 (Dell-fp) icon
Click View/Tiles
Close My Network Places
Open My Computer
Click View/Tiles
Right-click Drive C
Click Sharing and Security/Cancel/Tools/
Folder Options/View tab
Scroll to bottom of window
Clear Use Simple file sharing (recommended)
Click OK then Right-click Drive C
Click Sharing and Security/New Share/
Permissions/Add button/Advanced
button/Find Now/Cancel (three times)
In Share Name text box key in Micron-C
Click OK (twice) then Close My Computer
Open My Network Places
Click View workgroup computers
Double-click Micron-pc
Close My Network Places
Go to client computer (Dell-czg- uses W2K P
Double-click My Network Places icon/
Computers Near Me/Micron-pc icon
If necessary in Connect as text box, key in
Everyone then Click OK
Double click Micron-C
Click Back button twice
Double-click Dell-czg computer
Close My Network Places
Open My Computer on the Dell
Right-Click Drive C
Click Sharing then New Share
In Share name text box, key in Dell-czg-C
Click OK twice then Close My Computer
Open My Network Places
Double-click Computers Near me/Dell-czg
Carolyn Z. Gillay, Bette A. Peat, Windows XP Command Line
Franklin, Beedle & Associates ©2003 ISBN: 1-887902-82-1
After W2KP all drives automatically
shared using syntax of drive letter$ (D$ or
E$)
Allows administrators to connect to root
directory of a drive over network.
Drives hidden when users connect to
computer remotely.
If user knows computer name, user name,
and password, and is a member of
Administrators, Backup Operators, or Server
Operators group can gain access to your
computer over a network or Internet.
If remove administrative share can
recreate it.
Really don’t need to recreate as every
time reboot - administrative share is always
recreated.
 Naming shared drive “C” – not wise as all
computers have C drive.
 Authenticated Users
Membership controlled by OS or by domain
– if on domain.
Same as Everyone group.
 Space in share name can cause problems in
accessing shared resources.
 Title bar and address tells you what computer




you are accessing.
Can elect to share only a folder.
Depends on Password - you can restrict
specific user to Read-Only or to Full.
Deny permissions takes precedence over
allow entries.
Users who are members of more than one
group – setting up a Deny permission for
Write will effectively bar them from writing
this file to disk.
Page 10
Instructor: Prof. Michael P. Harris
ITSC 1405 – Intro to PC Operating Systems


Close My Network Places
Return to Micron-pc computer


Open My Computer
Right-click Drive C/Sharing and Security/
Sharing tab/down arrow in Share name drop
down list box/Micron-C/Do not share this
folder/Yes/OK/No
Open Drive C
Right-click WUGXP folder
Click Sharing and Security/Share this folder/
Apply/OK
Close all open windows
Open My Network Places
Click View workgroup computers
Open Micron-pc computer
Close all open windows
Open My computer/DriveC/WUGXP folder
Right-click ASTRO.TXT
Click Properties/Security tab/Cancel/Tools/
Folder Options/View
Set Use simple file sharing (Recommended)
Click OK then Close all open windows.














Chapter 12
Connectivity




Discussion Question (11) - List and explain the
steps you need to take in order to share your
drive on a peer-to-peer network.
Discussion Question (12) - Give the syntax of
the network path and explain each part of the
syntax.
Discussion Question (13) - When sharing your
drive with another computer, why is it unwise for
your share name to be C?
Discussion Question (15) - What is an
Administrative share? How can it be used?
Activity completed.
USING NET COMMANDS
SECTION 12.9 (pp. 667-669)
 Using Net Commands
 Slides 47-51
 See list of net command by keying in net
help at the command line.
 For detailed help on a command use syntax
Discussion Question (14) - What are net
commands? Identify two net commands and how
net help command where command is
they can be used and what information they will
specific command of interest.
provide.
 For brief help use net command /?
 Three net commands answer questions
regarding network setup needed when
seeking tech support.
 Most net commands can be used on peer-topeer or domain based network.
 Some only meaningful on a server or
domain based network.

ACTIVITY: GATHERING INFORMATION
WITH THE NET COMMAND ON A DOMAIN
 Gathering Information with NET Command on
a Domain
Carolyn Z. Gillay, Bette A. Peat, Windows XP Command Line
Franklin, Beedle & Associates ©2003 ISBN: 1-887902-82-1
SECTION 12.10 (pp. 669-676)

Slides 52-54
 Gathered information about workstation
Page 11
Instructor: Prof. Michael P. Harris
ITSC 1405 – Intro to PC Operating Systems

DATA disk in Drive A

Activity Steps.



Chapter 12
Connectivity
Short/long names of workstation
Name of current user and OS
Domain workstation belongs to
Domain where logged in

Open Command Prompt window and make
A:\ default drive/directory
Key in









NET CONFIG WORKSTATION
NET CONFIG SERVER
NET LOCALGROUP
NET NAME
NET USER
NEW VIEW
NET ACCOUNTS
NET STATITSTICS WORKSTATION
NET STATISTICS SERVER


Activity Completed.



MAPPING DRIVES AND THE NET USE
COMMAND
 Mapping Drives
 Once drive/folder shared – can map a drive
letter to shared drive or folder.
 Mapped drive.
 Shared Network drive or folder.
 Assigned a local drive letter.
 Mapped drive/folder.
 Appears as drive on client computers in
Explorer/My Computer.
Carolyn Z. Gillay, Bette A. Peat, Windows XP Command Line
Franklin, Beedle & Associates ©2003 ISBN: 1-887902-82-1
No limit to number of users that can be logged
onto network
Function of Net localgroup – reports
“Groups” current user is a member of
NETNAME – returned name of
Workstation/Server on Domain and name of
current user
Can add/delete messaging name at a
computer
---Messaging name is name to which
messages are sent
NET USER – creates and modifies user accounts
on computer
Without switches – lists user accounts for the
computer
NET VIEW – displays list of resources being
shared on computer
without options – displays list of computers
in current Domain.
Allows overview of servers in current
Domain
NET ACCOUNTS – update user accounts
database and modifies password and logon
requirement for all accounts
Without options – displays current settings
for password, log on limitations, and domain
information
Valuable to have hard copy of information when
troubleshooting problems on
workstation/network
Redirect screen display into file and print file
with any text editor
SECTION 12.11 (pp. 676-677)

Slides 55-57
 Most often you will map folders rather than
entire drives.
 Once drive/folder shared – can map a drive
letter to shared drive/folder.

Discussion Question (16) - Explain the purpose
and function of a mapped drive.
Page 12
Instructor: Prof. Michael P. Harris
ITSC 1405 – Intro to PC Operating Systems


Chapter 12
Connectivity
Accessed from My Computer or
command prompt by using assigned or
mapped letter.
NET USE
 Command line utility used to map drives

Can be used at command line or in batch file.

Connects/disconnects computer to shared
resource
 Without options lists computer’s
connections
 Used to set up network printer to act as a
“local” printer
 Drive alias assigned with NETUSE may
or may not be “persistent”
 Connections created may or may not
remain in effect after shutting down
computer.
 Place /YES or /NO at end of command
 /YES - all assignments made will
be persistent
 /NO – Assignment temporary
ACTIVITY—USING THE NET USE
COMMAND
 Mapping Drives on a Network
 Activity based on specific computer
configuration.
 Can this activity be done in your lab?
 Activity steps.















Go to DELL-CZG computer running W2KP
Open My Computer then Right-click Drive C
Click Sharing
In Share name drop down list box select Dellczg-C
Click Remove Share then OK
Go to DELL-FP computer running WMe
Open My Computer then Right-click Drive C
Click sharing then Click Shared As
In Share Name key in DELL-FP-C
Click OK then Return to Micron-PC computer
Open My Network Places
Click View Workgroup Computers
Double-click DELL 8100 (DELL-FP)
Close Dell 8100 (Dell-FP) windows
Open a Command Prompt window
Carolyn Z. Gillay, Bette A. Peat, Windows XP Command Line
Franklin, Beedle & Associates ©2003 ISBN: 1-887902-82-1
SECTION 12.12 (pp. 677-686)




Slides 58-61
Must first map a drive to see any entries and
drives must be shared.
Select drive letter – not actual physical drive
on system.
Drive alias assigned with NET USE command
may or may not be “persistent”
Connections created may or may not remain
in effect after shutting down computer.
Important to know persistent state before issuing
NET USE connection so aware if command will
be permanent or temporary
It is a “from this point forward parameter
Administrative share is shared by default

 Convenient to place drive-mapping
commands into batch files and place
Page 13
Instructor: Prof. Michael P. Harris
ITSC 1405 – Intro to PC Operating Systems
Chapter 12
Connectivity
shortcuts to batch files on Desktop.
 PAUSE command holds batch file for user
intervention.























Key in
 NET USE then NET VIEW
 NET USE T: \\DELL-FP\DELL-FP-C
 NET USE T: then DIR then C
 NET USE T: /DELETE then D
 DIR T: then DIR \\DELL-CZG\C$ /P
Place Data disk in Drive A and change default
to drive A
Key in MD CHAP 12 then CD CHAP 12
Using Command line editor create following
batch files (MAP-T.BAT and UNMAP-T) in
Chap 12 subdirectory on DATA disk
MAP-T.BAT
@ECHOI OFF
NET USE T: \\DELL-FP-C
PAUSE
UNMAP-T.BAT
@ECHO OFF
NET USE T: /DELETE
PAUSE
Minimize Command Prompt window
Open My Computer then drive A then Chap 12
Select and right drag to desktop both MAPT.BAT and UNMAP-T.BAT
Click Create shortcuts here
Double-click Shortcut to MAP-T.BAT
Press any key in Command Prompt window
Open My Computer then Close My Computer
Restore the Command Prompt window
Key in NET USE
Minimize Command Prompt window
Double-click Shortcut to UNMAP-T.BAT icon
Press space bar when you see message that
command was successful
Restore Command Prompt window
Key in NET USE
Close all open windows
Delete shortcuts to MAP-T.BAT and UNMAPT.BAT on desktop
 Ways to use drive letter mappings to shared
devices.
- Make backups of critical data “on the fly” –
map letter to subdirectory on remote
computer and doing a second save to remote
drive.
- Graphic with two CD’s – place one in each
computer, map a drive letter to second
computer, able to access them without
switching disks.
Activity completed.
Carolyn Z. Gillay, Bette A. Peat, Windows XP Command Line
Franklin, Beedle & Associates ©2003 ISBN: 1-887902-82-1
Page 14
Instructor: Prof. Michael P. Harris
ITSC 1405 – Intro to PC Operating Systems
MAPPING DRIVES USING WINDOWS
EXPLORER AND MY COMPUTER
 Mapping drives using Windows Explorer and
My Computer.
 Can map drive by
 Right-clicking My Computer or My
Network Places from Start menu and
choosing Map Network Drive.
 With icons can map drive by rightclicking icons.
 Using Tools menu in My Computer or
Windows Explorer.
ACTIVITY—MAPPING DRIVES WITH
WINDOWS EXPLORER AND MY
COMPUTER
 Activity: Mapping Drives with the NET USE
Command.
 Activity based on a specific computer
network.
 Beginning with DELL-czg computer
(computer with drive you wish to map
running W2KP.
 Activity steps.


















Share Dell Drive C ads Dell-czg-C.
Return to Micron-pc computer
Click Start
Right-click My Network Places
Click Map Network Drive
Key in \\Dell-pczg\Dell-czg-c
Click Finish then Close window
Open My Computer Be in Tiles view
Click
 Tools then Disconnect Network Drive
 Drive Z (Dell-czg) then OK
Close My Computer
Open My Network Places
Click View workgroup computers
Double-click Dell-czg
Open Drive C
Locate and click WUGXP folder
Click Tools then Map Network Drive
Key in \\Dell-czg\Dell-czg-c\WUGXP
Click Finish then Close Drive A window
Carolyn Z. Gillay, Bette A. Peat, Windows XP Command Line
Franklin, Beedle & Associates ©2003 ISBN: 1-887902-82-1
Chapter 12
Connectivity
SECTION 12.13 (pp. 686)

Slide 62
 Can use NET USE to map a drive.

Discussion Question (17) – Identify two ways
you may map a drive.
SECTION 12.14 (pp. 686-692)
 Slide 63
 Can identify network drive by Icon - looks
like regular drive icon connected to a cable
 Can access mapped network drive in same
manner as drive on system.
 Sharing drive – shoring all folder on drive
Page 15
Instructor: Prof. Michael P. Harris
ITSC 1405 – Intro to PC Operating Systems








Chapter 12
Connectivity
My Network Places should be open
Click View workgroup computers
‘Double-click Dell-czg then Dell-czg-C
Click
 Tools then Disconnect Network Drive
 OK
Select WUGXP in window (Drive Z)
Click OK then Yes
Close all open windows.
Activity completed.
THE INTERNET

The Internet
 Part of the Information Superhighway.
 Referred to as cyberspace.
 Used to connect to the World Wide Web.
 Internet used to:
 Communicate with other computer
users around the world.
 Email, chat lines, forums.
 Connect to public and/or private
institutions to gather information, do
research, to learn, or to buy/sell items.
 Provides access to government,
universities, other educational
institutions, and other organizations.
 Web and Internet are not synonymous.
 Web is a collection of standards and
protocols used to access information on
the Internet.
 Internet is actual network used to
transport information.
 Web uses three standards.
 URLs - Uniform Resource Locators.
- Tell location of document.
 HTML – Hypertext Markup Language.
- Programming language with which
Web documents are created.
 HTTP – Hypertext Transfer Protocol.
- Protocol used for information transfer.
 URL’s standard is a means for identifying
location on Internet.
Carolyn Z. Gillay, Bette A. Peat, Windows XP Command Line
Franklin, Beedle & Associates ©2003 ISBN: 1-887902-82-1
SECTION 12.15 (pp. 692-695)
 Slides 64-77
 Web.




- Informal expression for World Wide Web.
- Collection of over 50,000 Web sites.
- Requires browser to view and navigate
through the links.
- - Browsers - Netscape Navigator and
Microsoft Internet Explorer.
World Wide Web is graphical interface
developed in Switzerland by Tim BernersLee as a means for physicists to share papers
and data easily.
HTTP is major protocol used to transfer
information within the World Wide Web.
Home page.
- Gateway that starts you on search through
Web site.
- First page that opens when browser is
launched.
Type of website indicated by dot part of
address.
. COM – commercial
. GOV – government
. EDU – educational
. MIL – military
Page 16
Instructor: Prof. Michael P. Harris
ITSC 1405 – Intro to PC Operating Systems






URL's specify three types of information
needed to retrieve a document.
 Protocol to be used.
 The server address to which to connect.
 The path to the information.
Web site.
 Resides on server.
 Both virtual and physical location of a
person’s or an organization’s Web
pages.
 Has an address (URL).
 Home page – first page of a Web site.
Web page.
 Single screen of text and/or graphics.
 Usually has hypertext links to other
pages.
 Hypertext links are pointers to Web
pages on same/different site.
Search engine.
 Help you find what you want.
 Indexes to indexes.
Many companies/organizations position
themselves as portals.
 Portal – entry to Web.
 Yahoo!/Excite = expanding themselves
to be more than search engines –
positioning themselves as portals.
Connecting to the Internet.
 Online provider.
 Need modem, communication
software, online provider.
 Belong to service as MSN
(Microsoft Network) or AOL
(America Online).
 Both considered portals.
 Probably use preferred browser.
 ISP (Internet service providers).
 Also called IAP (Internet access
providers).
 Provide gateway to Internet for a
fee.
Carolyn Z. Gillay, Bette A. Peat, Windows XP Command Line
Franklin, Beedle & Associates ©2003 ISBN: 1-887902-82-1
Chapter 12
Connectivity
. ORG – nonprofit organization
 Search engines.
See PowerPoint slide #75 for listings.
 Compare and contrast ways to connect to the
Internet.










Discussion Question (18) - What is the purpose
and function of the Internet?
Discussion Question (19) - How can the Internet
be used?
Discussion Question (20) - Compare and
contrast the Internet and the World Wide Web.
Discussion Question (21) - Explain the purpose
of URLs, HTML, and HTTP.
Discussion Question (22) - List the three types
of information a URL needs to retrieve a
document.
Discussion Question (23) - What is a Web site?
Discussion Question (24) - Compare and
contrast a Web site with a Web page.
Discussion Question (25) - The type of Web site
is indicated by its “dot” address. Explain.
Discussion Question (26) - What is a hypertext
link?
Discussion Question (27) - List and explain
three ways a computer user can connect to the
Internet.
Page 17
Instructor: Prof. Michael P. Harris
ITSC 1405 – Intro to PC Operating Systems

Chapter 12
Connectivity
Ex. EarthLink and Concentric.




Choose browser.
 Ex. Netscape Navigator or
Microsoft Internet Explorer.
 Can have a home page.
 With some ISPs can have
Website with home page and 1 +
Web pages.
- may charge for this service.
Direct cable connection.
 Don’t use telephone lines.
 Always connected to Internet.
 Advantage is speed.
ISDN (Integrated Services Digital
Network).
 High-speed digital phone line.
 Phone company lays ISDN lines to
your business.
 Need special modem.
DSL (Digital Subscriber line) – if
available.
 Purchase bandwidth – 10 times
faster than 28.8 kilobits per-second
modem.
 Slower than cable.
 If connection is through a
business/educational institution that
has a T1 or T2 leased line – faster
connection than any of above
choices.
 Special modem.
 Line into house – looks like phone
line.
 DSL may provide network interface
card.
 Some companies will do software
and hardware installation.
 DSL connection – another link on
LAN.
 Company will provide you with
needed IP address.
Carolyn Z. Gillay, Bette A. Peat, Windows XP Command Line
Franklin, Beedle & Associates ©2003 ISBN: 1-887902-82-1
Page 18
Instructor: Prof. Michael P. Harris
ITSC 1405 – Intro to PC Operating Systems
Chapter 12
Connectivity

Satellites.
 High-speed communication.
 Not readily available.

AN OVERVIEW OF TCP/IP

An Overview of TCP/IP
 TCP/IP - Transmission Control
Protocol/Internet Protocol.
 Data transferred over Internet through
TCP/IP.
 On Internet data travels through several
networks before it gets to destination.
 Each network has a router.
 Device that connects networks.
 Data sent across Internet in packets.
 Router transfers packet (unit of
information) to other network when
packet addressed to station outside
its own network.
 Determines best route for data.
 Rules for creating, addressing, and sending
packets are specified by TCP/IP protocols.
 TCP.
 Divides data into packets.
 Numbers each packet so they can be
reassembled at receiving end.
 IP.
 Specifies addresses of sending and
receiving computers.
 Sends packets on their way.
 IP address tells routers where to
route data.
 Data divided into packets so that:
 No large file takes up all network time.
 Data arrives correctly.
 Each packet verified as having been
received correctly.
 If packet corrupt – only corrupted
packet has to be resent.
SECTION 12.16 (pp. 695-698)

 Router decides which network has best route
to send data.
 Data can be file, email or Web page.
 Host defined as any computer that can have










Carolyn Z. Gillay, Bette A. Peat, Windows XP Command Line
Franklin, Beedle & Associates ©2003 ISBN: 1-887902-82-1
Slides 78-91
IP address.
ICANN – (Internet Corporation for Assigned
Names and Numbers).
http://www.icann.org/general/abouticann/htm
ICANN’s functions previously done by US
Government contract by IANA and other
entities.
No Class A network addresses remaining.
Class A network referred to as /8 or just 8.
No Class B network addresses remaining.
Class B referred to as /16 bit.
Class C referred to as /24 bit.
Remind students that in-house business
names not IP addresses for the Internet.
InterNIC (Internet Network Information
Center) – not only organization responsible
for assigning domain names.
A fully qualified domain name must be
resolved into numeric IP address in order to
communicate across Internet.
Discussion Question (28) - Why is TCP/IP
considered the protocol of the Internet?
Discussion Question (29) - What is a router?
Page 19
Instructor: Prof. Michael P. Harris
ITSC 1405 – Intro to PC Operating Systems
Chapter 12
Connectivity





Connecting to Internet.
 Permanent open connection - big
business/college.
 PPP (point-to-point protocol) - provides
temporary connection via dial-up
connection.
 SLIP (serial-line Internet protocol) - full
access to Internet as long as you are on
line.
 Even if using cable modem or DSL
connection do not need to dial-up as
always connected to provider.
 Connection like LAN.
 Each computer on Internet must have
TCP/IP protocols installed as well as
unique IP address.
IP address.
 Address remains static (constant) with
permanent connection.
 Get dynamic (temporary) IP address
with dial-up account.
 Leased address – depends on length
of host server runs leases.
ICANN (non-profit corporation).
 Responsible for IP address space
allocation, protocol parameter
assignment, domain name system
management, and root server system
management.
 Organization applies for IP address –
ICANN assigns range of addresses
appropriate to number of hosts on
asking organization’s network.
IP address.
 Made up of four numbers separated by
periods.
 32 bits long – each of 4 numbers 8 bits.
 8 bit numbers called octets.
 Largest octet is 11111111.
 Decimal notation + 255.
 Largest IP address is 255.255.255.255
Carolyn Z. Gillay, Bette A. Peat, Windows XP Command Line
Franklin, Beedle & Associates ©2003 ISBN: 1-887902-82-1










Discussion Question (30) - Compare and
contrast the purposes and functions of TCP and
IP.
Discussion Question (31) - Data is divided into
packets when it is transferred over the Internet.
Why?
Discussion Question (32) - What is the purpose
of an IP address?
Discussion Question (33) - Compare and
contrast a static versus a dynamic IP address.
Discussion Question (34) - Why is the format of
an IP address called dotted-decimal notation?
Discussion Question (35) - Describe the format
of a Class A, Class B, and Class C IP address.
Discussion Question (36) - What is a loopback
address?
Discussion Question (37) - Explain the purpose
and function of the domain name system.
Discussion Question (38) - What is the purpose
of name resolution?
Discussion Question (39) - Why can computers
have both an IP address and a domain name?
Discussion Question (40) - Define each part of
the following URL:
http://www.amazon.com/books.
Page 20
Instructor: Prof. Michael P. Harris
ITSC 1405 – Intro to PC Operating Systems








Chapter 12
Connectivity
Format called dotted decimal notation
(“dotted quad”).
Originally IP address space divided into
three different address classes (A, B, and C)
 Format of Class A, B, and C - IP
addresses differ in the number of octets
used to denote the network address and
the range of numbers used in the octets.
 Class A.
 Addresses use only first octet to
denote the network.
 Range from 0 to 127.
 Class B.
 Addresses use first two octets to
identify the network.
 First octet range from 128 to 191.
 Second from 0 to 255.
 Class C.
 Uses first three octets to identify
network address.
 First octet 192-254.
 Address 0.0.0.0 unassigned therefore
127.0.0.1 is loopback address.
Class D supports multicasting.
Class E reserved for experimental use.
To not run out of IP addresses large
organizations do not assign a permanent
(static) IP address to a computer but assign
an IP address to be used for current work
session (dynamic IP address).
People remember names better than
numbers.
Computers in organizations named to
distinguish one computer from another.
 These are in-house business names,
not IP addresses for Internet.
Because people remember names better
than numbers Internet divided into domains.
 Domain is general category that
computer on Internet belongs to.
 Domain name – easy to understand
name given to Internet host as opposed
Carolyn Z. Gillay, Bette A. Peat, Windows XP Command Line
Franklin, Beedle & Associates ©2003 ISBN: 1-887902-82-1
Page 21
Instructor: Prof. Michael P. Harris
ITSC 1405 – Intro to PC Operating Systems
Chapter 12
Connectivity
to numerical IP address.





User/organization applies for a domain
name through Internet authority
(InterNIC) – so name is unique.
FQDN (Fully qualified domain names).
 Host name plus domain name.
 Ex. Host name – mail and domain name
fbeedle.com then FQDN would be
mail.fbeedle.com
Fully qualified domain name must be
resolved into numeric IP address in order to
communicate across Internet.
Domain Name System (DNS) provides
name resolution.
 Divided Internet into series of network
called domains.
 Each site attached to Internet belongs to
domain.
 Large domains divided into smaller
domains – each domain responsible for
maintaining unique address in next
lower level domain or sub domain.
 Maintains distributed database, which it
uses when new domain name is
assigned.
When using browser to access a site on
Internet, key in URL.
 Browser program contacts remote server
for copy of requested page.
 Server on remote system returns page tells browser how to display information
and give URL for each item you can
click on the page.
TCP/IP UTILITIES—COMMAND LINE
INTERFACE WITH THE INTERNET

TCP/IP Utilities—Command Line Interface
with the Internet
 Windows provides series of commands
(utility programs) that run at command line.
Carolyn Z. Gillay, Bette A. Peat, Windows XP Command Line
Franklin, Beedle & Associates ©2003 ISBN: 1-887902-82-1
Page 22
Instructor: Prof. Michael P. Harris
ITSC 1405 – Intro to PC Operating Systems



Chapter 12
Connectivity
Utility programs -really TCP/IP commands. SECTION 12.17 (pp. 698-699)
 Set of tools used for troubleshooting
 Slides 92-95
problems.
 Offer connections to computers not
 Firewall – protection software designed to
connected to the web.
protect the network from unauthorized access.
 If in lab environment and going though
a “firewall” some of utilities may not
function.
 Utilities installed when install TCP/IP
network protocol.
See PowerPoint slide #105 for command
and its purpose.
Discussion Question (42) - How can you receive
Help for any of the commands can be
help on the TCP/IP utilities?
accessed by (at the command line) keying in
command name, a space and then /?

IPCONFIG

IPCONFIG
 Displays all current TCP/IP configurations
in one place.
 Used to request a release or renewal of a
DHCP – assigned IP address.
 Have dial-up service – assigned IP address.
 Need address if trying to Telnet into
restricted server.
 Restricted server denies entry to
everyone except those explicitly
permitted into system.
 Administrator of remote system might need
to know IP address to allow you into
system.
SECTION 12.18 (p. 699)

 Telnet.
- Utility that emulates a video display
terminal
- Used to connect to character-based
computers on TCP/IP network (computer
running Unix).
ACTIVITY—USING IPCONFIG
 Using IPCONFIG
 Activity steps.



Open Command Prompt window
Key in: IPCONFIG then IPCONFIG /ALL
Activity completed.
Carolyn Z. Gillay, Bette A. Peat, Windows XP Command Line
Franklin, Beedle & Associates ©2003 ISBN: 1-887902-82-1
Slides 96-97

Discussion Question (41) - Explain the purposes
and functions of two utilities that are
automatically installed when TCP/IP network
protocol is installed.
Page 23
Instructor: Prof. Michael P. Harris
ITSC 1405 – Intro to PC Operating Systems
Chapter 12
Connectivity

PING
 Ping
 PING - Packet InterNet Groper.
 Diagnostic tool used to determine if
computer you are trying to reach is up and
running.
 Can ping IP address or host name of
computer you are trying to reach.
 Sends four packets of data to specified
computer.
 If ping successful – see four packets.
 If ping unsuccessful – See “Request
timed out” message.
 If IP address verified but host name not –
some kind of name resolution problem.
 Can ping yourself using loopback address.
Discussion Question (43) - What is the purpose
and function of IPCONFIG?
SECTION 12.19 (pp. 699-700)

Slide 98
SECTION 12.20 (pp. 700-701)


Slides 99-101
Ping not successful
If any packet did not reach destination.
If any packed returned to your computer.
ACTIVITY—USING PING
 Using Ping
 Logged on to Internet
 Activity steps.





Open Command Prompt window.
Key in: PING FBEEDLE.COM
Key in:
 PING 216.133.197.111
 PING 127.0.0.1
 PING MICROSOFT.COM
 PING SUPPORT.MICROSOFT.COM
Close Command Prompt window.
If you are done with activities, log off the
system.
 Activity completed.
TRACERT

Tracert
 Pronounced: “trace route”.
 Diagnostic utility
 Determines/traces route on which data
is moving to destination computer.
Carolyn Z. Gillay, Bette A. Peat, Windows XP Command Line
Franklin, Beedle & Associates ©2003 ISBN: 1-887902-82-1
 Pings not always reliable.
Some servers do not allow themselves to
be “pinged”.
Wasted time.
Security reasons.

Discussion Question (44) - What is the purpose
and function of ping? Tracert?
SECTION 12.21 (pp. 701-703)



Slide 102
“Pinged” yourself using loopback address
(127.0.1).
Large organizations usually have a number of
servers.
Page 24
Instructor: Prof. Michael P. Harris
ITSC 1405 – Intro to PC Operating Systems

Tracert determines data route by sending
packets containing time values (TTL –
Time to Live).
 Each router along path required to
decrease TTL by 1 before forwarding it.
 TTL is 0 – router sends back message to
originating computer.
 Returns a five-column display.
 Column 1 - hop number (TTL
value).
 Columns 2-4 - round-trip times
in milliseconds.
 Column 5 - host name and IP
address of responding system.
 An *- attempt timed out.
Chapter 12
Connectivity
SECTION 12.22 (p. 703)

 Review ping.
 Tracert uses pings
If server does not allow pinging may not
be able to trace a route.
ACTIVITY—USING TRACERT

Activity: Using Tracert
 You should be logged on.
 Activity steps.



Slides 103-105
Open Command Prompt window.
Key in:
 TRACERT WWW.BOOKBIZ.COM
 TRACERT WWW.FBEEDLE.COM
Close Command Prompt window.

Activity completed.
FTP

FTP
 FTP – (File Transfer Protocol).
 Communications protocol that computer
uses to transfer files.
 Can transfer files in either text or binary
files between a host and your computer.
 First choose mode.
 FTP servers store files that Internet users
can download.
 Can get free software and documents.
 Requires you to log on to the remote
host.
 Many servers let you log on as
SECTION 12.23 (pp. 703-704)

Slide 106
 Go over display when keying in: TRACERT
WWW.BOOKBIZ.COM
SECTION 12.24 (p. 705)
Carolyn Z. Gillay, Bette A. Peat, Windows XP Command Line
Franklin, Beedle & Associates ©2003 ISBN: 1-887902-82-1
Page 25
Instructor: Prof. Michael P. Harris
ITSC 1405 – Intro to PC Operating Systems




anonymous.
Use email address or any word as your
password.
Chapter 12
Connectivity

Slides 107-109
 Text (ASCII) is default.
Advantage of FTP.
 Does not care what operating system is
on the connected computers.
 All computers have TCP/IP.
 Can transfer files to and from computers
running different operating systems.
To get help within FTP, key in
“HELPcommand” – command is name of
command for which you seek help.
For list of commands, key in HELP.
ACTIVITY—USING FTP

Activity: Using FTP
 You should be logged on.
 Activity steps.




Open Command Prompt window
Key in:
 ftp ftp.microsoft.com then anonymous
 aaaa then help then help bye then dir
 cd deskapps then dir
 get readme.txt then bye
 TYPE README.TXT | MORE
 Q then DEL README.TXT
Close Command Prompt window
Activity completed.
TELNET

Telnet
 Connection to remote computer where:
 You become user on remote computer.
 Makes your terminal into a “dumb
terminal” – each time you press key
your computer does nothing except
transmit keystrokes to remote
computer.
 Software runs at remote computer
not yours.
 Your monitor becomes monitor for
remote computer.
 Used for real time exchange of text.
 Technically Telnet is protocol and terminal
handler portion of TCP/IP protocol suite.
Carolyn Z. Gillay, Bette A. Peat, Windows XP Command Line
Franklin, Beedle & Associates ©2003 ISBN: 1-887902-82-1
SECTION 12.25 (pp. 705-709)
 Slides 110-111







Some servers allow anonymous logins.
For syntax – key in “help” plus command name.
ASCII files – extension .txt.
Directories have dr on far left.
Compressed files - .ZIP extensions
- Need utility to unzip.
Command line interface borrows from Unix.
- Key in: get file name – transfer file to default
directory.
- Key in: “get filename –“ – acts like TYPE
command.
Key in ASCII to return to text-file mode.
SECTION 12.26 (p. 709)

Slides 112-116
Page 26
Instructor: Prof. Michael P. Harris
ITSC 1405 – Intro to PC Operating Systems



Tells remote computer how to transfer
commands from local computer (where
you are sitting) to another computer in
remote location.
To use Telnet:
 Both computers must support the telnet
protocol.
 Incoming user must have permission to
use remote computer.
 Provides user name & password.
Telnet used:
 By system administrator (other
professionals) to log on to your
computer and troubleshoot problems on
your computer.
 Most commonly, for connecting to
libraries and other public databases.
Chapter 12
Connectivity
 Telnet is like you are sitting at and keying in
information at remote computer, remote
computer is doing all of the work and results
are displayed on monitor you are looking at.
 Example:
1. You key in 3 + 4.
2. Your computer can do nothing except
transmits your keystrokes to remote
computer.
3. Remote computer receives your keystrokes
and uses its software to do the work.
4. Your monitor then becomes the monitor
for remote computer and results of work are
displayed at terminal you are sitting at.
 Two computers agree on parameters
governing session.
ACTIVITY—USING TELNET
 Using Telnet
 Activity steps.




Open Command Prompt window.
Key in:
 telnet then ?/help
 open antpac.lib.ucl.edu then A
 Babchuk, Nicholas then N then D
 <Enter> then quit
Close all open windows
Activity completed.
SECTION 12.27 (pp. 709-712)


Carolyn Z. Gillay, Bette A. Peat, Windows XP Command Line
Franklin, Beedle & Associates ©2003 ISBN: 1-887902-82-1
Slide 117
Discussion Question (45) - What is the purpose
and function of FTP? Telnet?
Page 27
Instructor: Prof. Michael P. Harris
ITSC 1405 – Intro to PC Operating Systems
Chapter 12
Connectivity
SHARING ONLY A FOLDER ON A HARD DRIVE ON A NETWORK
 Sharing only a Folder on a Hard Drive on a Network
 You do not need to share your entire hard drive.
 You can limit users to accessing a folder or folders.
 Process requires two steps.
 Go to server computer that contains the folder you wish to share.
 Go to client computer and access the shared drive via Network Neighborhood.
SECTION 12.8 (p. 689)
 Slide 45
 Can also access the drive and/or folder by using the command prompt - must know path to the
computer.
ACTIVITY—SHARING A FOLDER ON A NETWORK
 Sharing a Folder on a Network
 Note: Activity is based on specific computer configuration.
 Activity steps.





















Go to the computer on which you wish to share the folder (Dellxps computer here)
Open My Network Places. Click Computers Near Me. Open Dellxps computer.
Close My Network Places. Open My Computer
Right-click Drive C
Click Sharing/down arrow in Share name drop-down list box
Select DellXPS-C. Click Do not share this folder.
Click Yes/Apply/OK
Open My Network Places/Dellxps computer.
Close Dellxps window
Click My Computer window. Open Drive C
Right-click WINDOSBK folder. Click Sharing
Click Share this folder/Apply/OK
Close all open windows
Open My Network Places/Dellxps computer
Close My Network Places. Open My Computer
Right-click Drive C
Click Sharing/Share this folder
If you have New Share button click it then key in Dellxps-C, otherwise in Share name text box key in
Dellxps-C
Click OK/OK
Close My Computer
Activity completed.
SECTION 12.9 (pp. 690-692)
 Slide 46
 Whenever you reboot, the administrative share is recreated.
Carolyn Z. Gillay, Bette A. Peat, Windows XP Command Line
Franklin, Beedle & Associates ©2003 ISBN: 1-887902-82-1
Page 28
Instructor: Prof. Michael P. Harris
ITSC 1405 – Intro to PC Operating Systems
Chapter 12
Connectivity
ACTIVITY—MAPPING DRIVES ON A NETWORK
 Mapping Drives on a Network
 Note: Activity is based on specific computer configuration.
 Activity steps.










Begin with Micron computer (computer with drive you wish to map)
Share Micron drive as Micron-C with full access and then return to Dellxps computer.
Right-click My Network Places
Click My Network Drive
Key in: \\Micron-450\Micron-C. Click Finish
Close window. Open My Computer
In Large Icons view click Drive J/Tools on menu bar/Disconnect Network Drive.
Micron drive selected. Click OK
Close My Computer











Open My Network Places/Computers Near Me/Micron-450 computer/Drive C
Click on the >> the right side of the toolbar then Customize
Under Available toolbar buttons click Map Drive/Add
Under Available toolbar buttons click Disconnect/Add/Close/Map Drive icon
Key in: \\Micron-450\Micron-C\WINDOSBK Click Finish
Close Drive J window
Select WINDOSBK on Micron-450 icon
Click Tools/Disconnect Network Drive/OK
Close all open windows. Open Windows Explorer
Click Tools on menu bar
Close Windows Explorer
Activity completed.
SECTION 12.11 (pp. 692-697)
 Slides 49-50
 Used letter J as this was first available drive letter not assigned to any real device on computer.
 Can recognize network drive by its icon.
 Address format - \\computer name\share name [\optional path]. Brackets – items optional.
UNDERSTANDING DIRECT CABLE CONNECTIONS

Understanding Direct Cable Connections
 Network solution is overkill if all you do is transfer files from notebook to desktop computer.
 Use a cable to connect two computers (use serial or parallel ports) and copy files quickly/easily
from one computer to another.
 If computers have infrared ports – do not need cable.
 W2K Professional supports standard serial null modem (RS-232) cables and following parallel
cables:
 Standard/basic 4-bit parallel cables (includes Laplink and Interlink cables).
 Extended Capabilities Port (ECP) cables.
 Universal Fast Parallel cable.
Carolyn Z. Gillay, Bette A. Peat, Windows XP Command Line
Franklin, Beedle & Associates ©2003 ISBN: 1-887902-82-1
Page 29
Instructor: Prof. Michael P. Harris
ITSC 1405 – Intro to PC Operating Systems


Chapter 12
Connectivity
See PowerPoint slides #55-63 for setting up direct cable connection with Network
Connection Wizard.
Must still run Network Connection Wizard on other computer.
SECTION 12.13 (pp. 703-705)
 Slides 54-63
ECP (Extended Capabilities Port).
- Faster than standard parallel cables.
- Provides fastest performance but requires ECP enabled parallel port on both computers
ABOUT DSL

About DSL
 Refers to both categories of DSL – ADSL and SDSL.
 Both operate over existing telephone lines.
 Both need to be relatively close to central telephone office (within 20,000 feet).
 Both require special modems.
 ADSL (Asymmetrical Digital Subscriber Line).
 Technology allows more data to be sent on existing phone lines.
 Extremely popular.
 SDSL (Symmetrical Digital Subscriber Line).
 Used primarily in Europe.
 Uses high frequency digital pulsing not used by human voice.
 Operates simultaneously with voice on same line.
 DSL.
 Data not required to change to analog and then back to digital at receiving computer.
 Transmitted directly as sent from one computer to another.
 Speed is 50 times greater over 56K modem.

SECTION 12.15 (pp. 708-709)
 Slides 78-81




DSL = Digital Subscriber Line.
Phone - voice sent on analog signal.
Computers – sent digital not analog.
Old modems – digital signals changed into analog signals to transmit and at other end back to
digital for receiving computer.
DSL.
- 45 minutes to upgrade software on 56K modem.
Carolyn Z. Gillay, Bette A. Peat, Windows XP Command Line
Franklin, Beedle & Associates ©2003 ISBN: 1-887902-82-1
Page 30
Instructor: Prof. Michael P. Harris
ITSC 1405 – Intro to PC Operating Systems
Chapter 12
Connectivity
- 2 minutes using DSL for same upgrade.
ACTIVITY—SETTING UP A DSL ACCOUNT
 Setting up a DSL Account
 Note 1: Read-only activity – presented for demonstration purposes.
 Note 2: Assumes TCP/IP protocol added to Network properties.
 Activity steps.







Right-click My Network Places
Click Properties
Close Local Area Connection property sheet for 3Com card
On Local Area Connection property sheet for LNE card, click Internet Protocol (TCP/IP)
Click Properties/OK/OK to start process of implementing changes.
You would be told that you need to reboot computer for changes to take effect.
Activity completed.
SECTION 12.16 (pp. 709-711)
ACTIVITY—A BRIEF LOOK AT INTERNET EXPLORER
 A Brief Look at Internet Explorer
 Activity steps.














Open My Computer/Control Panel/Network/Dial-Up Networking.
Double-click Deltanet. Click Dial/OK
Open your browser (Internet Explorer)
Click File/Open
In Open text box, key in: http://www.yahoo.com
Click OK/Computers & Internet.
Scroll down to Humor@ and click it.
Scroll until all categories displayed.
Click Back button twice.
Click Favorites/Add to Favorites/Cancel then Home button on toolbar.
Select address in Address text box. (Bookbiz.com and key in fbeedle.com)
Press <Enter>
Click Home button then Disconnect
Activity completed.
SECTION 12.17 (pp.711-716)
 Slides 82-83
 If Lab environment connection established, go to browser, key in address shown in Step 6






and then go to Step 8
Connection icon – displayed on status bar.
Right-click icon to disconnect or see status of connection.
Address box shows “home”.
Internet Explorer completes URL address once started (if previously visited site).
To go to index of sites click hypertext link.
Number in parentheses after site name indicates # of entries.
Carolyn Z. Gillay, Bette A. Peat, Windows XP Command Line
Franklin, Beedle & Associates ©2003 ISBN: 1-887902-82-1
Page 31
Instructor: Prof. Michael P. Harris
ITSC 1405 – Intro to PC Operating Systems
Chapter 12
Connectivity
 Adding a page to “Favorites”.
Carolyn Z. Gillay, Bette A. Peat, Windows XP Command Line
Franklin, Beedle & Associates ©2003 ISBN: 1-887902-82-1
Page 32
Download