Guide to Networking Essentials, Fifth Edition

advertisement
Guide to Networking Essentials, Fifth Edition
Chapter 11
Supporting a Small Business Network
At a Glance
Instructor’s Manual Table of Contents

Overview

Objectives

Teaching Tips

Quick Quizzes

Class Discussion Topics

Additional Projects

Additional Resources

Key Terms

Technical Notes for Hands-On Projects
11-1
Guide to Networking Essentials, Fifth Edition
11-2
Lecture Notes
Overview
Chapter 11 teaches the basics of how to support a small business network. Students
learn to identify small business network and application requirements. They also learn
about the issues regarding how to support a small business.
Objectives




Address the needs of a small business network
Identify small business network equipment requirements
Identify small business application requirements
Describe the issues of supporting a small business
Teaching Tips
Addressing the Needs of Small Business Networks
1. Explain what constitutes a small business, both formally and as studied in this chapter.
Teaching
Tip
For more information on small businesses, visit:
http://en.wikipedia.org/wiki/Small_business.
2. Explain that most small businesses don’t require a complex, highly restrictive security
policy, data encryption, or advanced WAN technologies.
Data and Application Sharing in a Small Business
1. Explain whether it is recommended to use a server-based or peer-to-peer network in a
small business.
2. Stress that it is recommended to designate as few computers as possible as file-sharing
computers. Note that a typical practice is having one or more common folders that the
entire company has access to or perhaps departmental folders shared among members of
a department.
3. Explain that applications can also be shared across a network.
Guide to Networking Essentials, Fifth Edition
11-3
4. Configuring Simple File Sharing in a Windows XP Network. Note that by default, on a
Windows XP Professional computer, file and printer sharing are disabled. You can run
the Network Setup Wizard or go to the Sharing tab in a folder’s Properties dialog box to
enable file and printer sharing. Use Figures 11-1 and 11-2 to briefly describe how to
configure simple file sharing in a Windows XP network. Explain that to share additional
folders, you must simply right-click a new or existing folder, select Sharing and
Security, and then click the Share this folder on the network check box. Stress that
simple file sharing is best used in a small peer-to-peer network with a fairly open
security policy that requires little network administration.
Teaching
Tip
For more information on Windows XP simple file sharing, visit:
www.practicallynetworked.com/sharing/xp/filesharing.htm.
5. Configuring Advanced File Sharing in a Windows XP Network. Explain that most
networks, large or small, often benefit from the advanced file-sharing options available
in Windows XP. Use Figure 11-3 to explain that by disabling simple file sharing, an
administrator has more control over users’ permissions to files in shared folders. Use
Figure 11-4 to explain how to configure advanced file sharing in a Windows XP
network. Explain that the Everyone group is a special Windows group that specifies all
users. Before Windows XP Service Pack 2 (SP2), the Everyone group was assigned the
Full Control permission to new shares. Use Figure 11-5 to explain that if the shared
folder is on an NTFS volume, you can use the Security tab to fine-tune permissions
more than you can in the Sharing tab.
Teaching
Tip
For more information on Windows XP advanced file sharing, visit:
www.practicallynetworked.com/sharing/xp_filesharing/index.htm.
6. Sharing Files in a Windows Domain Environment. Explain that if more than one
computer is required to share files, using a file server with a centralized user database is
the best way to go. Briefly describe how to do this in a Windows domain environment.
7. Sharing Files in a Linux Environment. Explain that typically, you have two choices for
sharing files in a Linux environment: using Samba or using NFS. Make sure students
understand in which kinds of situations it is more convenient to use one method or the
other. Use Figure 11-6 to explain how to share files in a Linux environment (Fedora
Core 4 Linux) using Samba.
Teaching
Tip
For more information on Linux file and printer sharing, visit:
www.tldp.org/HOWTO/Networking-Overview-HOWTO-5.html.
Guide to Networking Essentials, Fifth Edition
11-4
Equipment Sharing in a Small Business
1. Briefly describe how printers, scanners, and other devices (e.g., hard drives and card
readers) can be shared in a network.
Communicating on a Small Business Network
1. Explain that common network communication methods are e-mail, IM, calendar
sharing, whiteboard sharing, and video conferencing.
2. Explain that a small business can use the e-mail accounts provided by its ISP or use an
in-house system. Briefly describe the following e-mail in-house systems: Microsoft
Small Business Server, Novell’s Small Business Suite, and sendmail.
Equipping Small Business Networks
1. Explain that a typical small business environment might consist of one or two servers,
some workstations, a few switches, and a router to connect to the Internet.
Servers and Desktops
1. Explain that vendors usually have small business solution centers that sell computer and
networking equipment specifically tailored for small businesses.
2. Provide some tips on what to look for when purchasing a server for a small business.
3. Note that business desktop computers emphasize productivity software and
manageability.
Teaching
Tip
For a feature comparison of Windows XP Professional and Windows XP Home
Edition, see: www.microsoft.com/windowsxp/pro/howtobuy/choosing2.mspx.
Networking Equipment
1. Provide some tips on where to locate networking equipment in a small business network
(i.e., an existing locking cabinet with adequate ventilation).
2. Making a Wired Connection. Explain why it is not advisable to run cable from the back
of the computer directly to the hub or switch. Note that you should have network jacks
at the work area wired to a patch panel in the wiring closet. Stress that you should use
Category 5 or 6 cabling with switches instead of hubs. Explain that when buying a
switch, you should consider its speed, if it is managed or unmanaged, and whether it has
support for multiple media types. Stress that you should always keep in mind the
company’s security policy.
Guide to Networking Essentials, Fifth Edition
11-5
3. Making a Wireless Connection. Describe the situations in which it is convenient to use a
wireless network instead of (or together with) a wired network. Use Figure 11-7 to
explain what a combination of a wireless and wired infrastructure looks like. Explain
why working with a wireless network involves special considerations not present in a
wired network. Explain that when selecting wireless equipment, one of the most
important considerations is the security standard supported.
Communicating with the Outside World
1. In addition to Internet connections, many businesses need employees to be able to
access the company network from home or while away on business.
2. Accessing the Internet. Use Figure 11-8 to explain that for 10 to 20 computers, a
broadband cable or DSL connection is likely sufficient. Explain that in this setting, the
router usually also serves as firewall, DHCP server, and network address translator.
Figure 11-9 is a screen shot of the DHCP configuration page of a typical router used in
a small business environment. Use Figure 11-10 to explain the role of port forwarding.
Stress that the company security policy should be taken into account when configuring
access to the outside world because that type of connection is where most trouble
originates.
3. Dial-up Remote Access. Explain that if occasional remote access to the company
network is required, a dial-up connection using modems and a phone line might be
adequate. Note that Windows Server 2003, with Routing and Remote Access Service
(RRAS), can serve as a dial-up remote access server and offers a number of advanced
features for managing and securing dial-up connections. Provide some tips on how to
make dial-up networking secure. Figure 11-11 shows the Dial-in tab of a user account’s
Properties dialog box in Windows Server 2003. Stress that when several employees
frequently use remote access, dial-up might not be the best solution.
4. VPN Remote Access. Explain that a VPN remote access connection can be made as long
as both parties are connected to the Internet. Briefly describe the two VPN modes:
gateway-to-gateway and client-to-gateway. Provide some tips on how to buy a router
with VPN support.
Read more about remote VPN access at:
Teaching
www.cisco.com/en/US/netsol/ns340/ns394/ns171/ns125/networking_solutions_sub_
Tip
solution_home.html.
Guide to Networking Essentials, Fifth Edition
11-6
Quick Quiz 1
1. In Linux, ____________________ provides file sharing compatibility with a Windows
environment.
Answer: Samba
2. In Linux, ____________________ (NFS) might be a good choice if the environment
consists of mostly Linux computers.
Answer: Network File System
3. A general rule of thumb when purchasing a server for a network is to buy as much
hardware as the budget allows to meet the company’s estimated needs for the next
____________________ years.
Answer: two to three
4. To make dial-up networking secure, the phone number for the connection should be
____________________.
Answer: unlisted
Identifying Requirements for Small Business Applications
1. Explain that multiple user and licensing requirements should be considered when
purchasing applications for small businesses. Introduce the term end user licensing
agreement (EULA).
Small Business Accounting Software
1. Explain that a network technician/administrator’s job is not to support the function of
business accounting software, but to help ensure that the network is set up to run it
adequately and to be sure data is backed up.
Sales and Contact Management Software
1. Explain that today’s sales and contact management software offers features that are
leaps and bounds ahead of a rolodex.
2. Introduce the term customer relationship management (CRM).
Teaching
Tip
For more information on customer relationship management, visit:
http://en.wikipedia.org/wiki/Customer_relationship_management.
3. Note that CRM software has some of the same support issues you might encounter with
accounting software.
Is Linux a Viable Desktop Alternative to Windows?
Guide to Networking Essentials, Fifth Edition
11-7
1. Explain that when considering Linux for desktop computers, you must consider the
total cost of ownership (TCO) and the application support.
Teaching
Tip
For more information on total cost of ownership, visit:
http://en.wikipedia.org/wiki/Total_cost_of_ownership.
2. Note that support for industry-specific applications is lacking in Linux, but explain that
there are solutions for running Windows applications in Linux.
Supporting a Small Business
1. Explain why the job of supporting small businesses can be more difficult than
supporting a large business.
Entrepreneurs Wanted
1. Explain that if you decide you want to specialize in working with small businesses, you
need to understand their needs and be able to enlighten them as to what technology can
do for them.
2. Getting the Job. Explain that before developing a proposal, you must listen to
requirements from the owner, manager, and other staff. Stress the importance of being
customer friendly and responsive. Explain that in the proposal, you must be detailed
about what’s included in the price you are quoting. Note that it is important to provide
multiple quotes when appropriate, and spell out the advantages of the higher-priced
option.
Securing a Small Business Network
1. Explain that you should not neglect security in your proposal.
For more information on securing small business, read: http://download.microsoft.com/
Teaching
download/3/a/2/3a208c3c-f355-43ce-bab4-890db267899b/
Tip
Security_Guide_for_Small_Business.pdf and visit: http://sbc.nist.gov/general.html.
2. Passwords and Backup. Note that not all businesses need password policies that require
frequent changes and complex passwords. Stress that as long as you explain the
ramifications of an open security policy, and that’s what the business wants, you need
only carry it out. Stress that every business needs backup. Note that the process should
be clear and concise so that any one of the business’s users can do it.
Guide to Networking Essentials, Fifth Edition
11-8
3. Security from the Outside World. Explain how to secure a small business network from
the outside world; i.e., using antivirus and spyware software, installing a software or
hardware (preferable) firewall, and securing the wireless LAN (if there is one set up).
Managing a Small Business Network
1. Explain that even though it is preferable to have on-site visits when managing a small
business network, sometimes it is convenient to be able to remotely access the network
to manage it.
2. Briefly describe the different remote access alternatives: VPN, dial-up, Telnet, and
Windows Remote Assistance. Stress that however remote access to the network is
accomplished, it must be done securely.
Quick Quiz 2
1. The ____________________ (EULA) should be consulted before purchasing any
software for use by multiple users.
Answer: end user license agreement
2. What is TCO?
Answer: Total cost of ownership (TCO) is the cost when you factor in intangibles such
as support costs and productivity gain or loss.
3. What is Telnet?
Answer: Telnet is one way to gain command-line access to a computer or network
device. It should be used when a secure connection has already been established, such
as through a VPN. Telnet is not a secure protocol, so user names and passwords are sent
across the network in plain unencrypted text. Telnet is best used to access Linux or
UNIX systems and command-line based routers and switches.
4. For user help, Window’s built-in ____________________ is an option that doesn’t
require a VPN, as access to the user’s computer is by invitation only.
Answer: Remote Assistance
Class Discussion Topics
1. Do students have any experience with remote network access? If so, ask them to discuss
their experiences.
2. Do students have any experience working at or with small businesses? If so, ask them to
discuss, from their experience, the kind of network services that small businesses want.
Guide to Networking Essentials, Fifth Edition
11-9
Additional Projects
1. Ask students to develop a proposal for a small business network. The proposal should
include equipment, software, installation, and management costs. You may provide a
small fictitious case study or ask them to visit a real small business to determine the
requirements before developing the proposal.
2. Ask students to do some research on the price of servers for small businesses. They
should compile a table with the server characteristics and prices.
Additional Resources
1. Small Business:
http://en.wikipedia.org/wiki/Small_business
2. Windows XP Simple File Sharing:
www.practicallynetworked.com/sharing/xp/filesharing.htm
3. Windows XP Professional File Sharing:
www.practicallynetworked.com/sharing/xp_filesharing/index.htm
4. How to configure file sharing in Windows XP:
http://support.microsoft.com/kb/304040/
5. The Linux Networking Overview HOWTO: File Sharing and Printing:
www.tldp.org/HOWTO/Networking-Overview-HOWTO-5.html
6. Security Guide for Small Business:
http://download.microsoft.com/download/3/a/2/3a208c3c-f355-43ce-bab4890db267899b/Security_Guide_for_Small_Business.pdf
7. The Small Business Corner, by the Computer Security Division at NIST:
http://sbc.nist.gov/general.html
8. Port Forwarding:
http://en.wikipedia.org/wiki/Port_forwarding
9. How Virtual Private Networks Work: Remote-Access VPN:
http://computer.howstuffworks.com/vpn2.htm
10. Remote Access VPN Solution:
www.cisco.com/en/US/netsol/ns340/ns394/ns171/ns125/networking_solutions_sub_sol
ution_home.html
11. Customer Relationship Management:
http://en.wikipedia.org/wiki/Customer_relationship_management
12. Total Cost of Ownership:
Guide to Networking Essentials, Fifth Edition
11-10
http://en.wikipedia.org/wiki/Total_cost_of_ownership
Key Terms
 client-to-gateway VPN mode — This VPN mode establishes a VPN connection
between a single client computer and a VPN device.
 customer relationship management (CRM) — A class of software designed to help
businesses manage their customers and prospects.
 end user license agreement (EULA) — The license that governs how an application
can be used. The EULA specifies how many users are allowed to use an application,
how many times it can be installed, and whether the software can be copied, among
other things.
 gateway-to-gateway VPN mode — This VPN mode establishes a connection between
two routers that support VPN.
 port forwarding — The process by which a router forwards a request for a particular
TCP or UDP port on to a specified computer.
 total cost of ownership (TCO) — The cost of a product or service when intangibles
such as support costs and productivity gain or loss are factored in.
Technical Notes for Hands-On Projects
Hands-On Project 11-1: In this project, students use Windows XP’s Windows Explorer.
Hands-On Project 11-2: In this project, students use Windows XP’s Windows Explorer.
Hands-On Project 11-3: In this project, students use Windows XP’s Windows Explorer.
Hands-On Project 11-4: This project requires a working version of Fedora Core 4 with Samba
installed on a computer that’s on the same network as the classroom computers running
Windows XP.
Download