Guide to Networking Essentials, Fifth Edition Chapter 11 Supporting a Small Business Network At a Glance Instructor’s Manual Table of Contents Overview Objectives Teaching Tips Quick Quizzes Class Discussion Topics Additional Projects Additional Resources Key Terms Technical Notes for Hands-On Projects 11-1 Guide to Networking Essentials, Fifth Edition 11-2 Lecture Notes Overview Chapter 11 teaches the basics of how to support a small business network. Students learn to identify small business network and application requirements. They also learn about the issues regarding how to support a small business. Objectives Address the needs of a small business network Identify small business network equipment requirements Identify small business application requirements Describe the issues of supporting a small business Teaching Tips Addressing the Needs of Small Business Networks 1. Explain what constitutes a small business, both formally and as studied in this chapter. Teaching Tip For more information on small businesses, visit: http://en.wikipedia.org/wiki/Small_business. 2. Explain that most small businesses don’t require a complex, highly restrictive security policy, data encryption, or advanced WAN technologies. Data and Application Sharing in a Small Business 1. Explain whether it is recommended to use a server-based or peer-to-peer network in a small business. 2. Stress that it is recommended to designate as few computers as possible as file-sharing computers. Note that a typical practice is having one or more common folders that the entire company has access to or perhaps departmental folders shared among members of a department. 3. Explain that applications can also be shared across a network. Guide to Networking Essentials, Fifth Edition 11-3 4. Configuring Simple File Sharing in a Windows XP Network. Note that by default, on a Windows XP Professional computer, file and printer sharing are disabled. You can run the Network Setup Wizard or go to the Sharing tab in a folder’s Properties dialog box to enable file and printer sharing. Use Figures 11-1 and 11-2 to briefly describe how to configure simple file sharing in a Windows XP network. Explain that to share additional folders, you must simply right-click a new or existing folder, select Sharing and Security, and then click the Share this folder on the network check box. Stress that simple file sharing is best used in a small peer-to-peer network with a fairly open security policy that requires little network administration. Teaching Tip For more information on Windows XP simple file sharing, visit: www.practicallynetworked.com/sharing/xp/filesharing.htm. 5. Configuring Advanced File Sharing in a Windows XP Network. Explain that most networks, large or small, often benefit from the advanced file-sharing options available in Windows XP. Use Figure 11-3 to explain that by disabling simple file sharing, an administrator has more control over users’ permissions to files in shared folders. Use Figure 11-4 to explain how to configure advanced file sharing in a Windows XP network. Explain that the Everyone group is a special Windows group that specifies all users. Before Windows XP Service Pack 2 (SP2), the Everyone group was assigned the Full Control permission to new shares. Use Figure 11-5 to explain that if the shared folder is on an NTFS volume, you can use the Security tab to fine-tune permissions more than you can in the Sharing tab. Teaching Tip For more information on Windows XP advanced file sharing, visit: www.practicallynetworked.com/sharing/xp_filesharing/index.htm. 6. Sharing Files in a Windows Domain Environment. Explain that if more than one computer is required to share files, using a file server with a centralized user database is the best way to go. Briefly describe how to do this in a Windows domain environment. 7. Sharing Files in a Linux Environment. Explain that typically, you have two choices for sharing files in a Linux environment: using Samba or using NFS. Make sure students understand in which kinds of situations it is more convenient to use one method or the other. Use Figure 11-6 to explain how to share files in a Linux environment (Fedora Core 4 Linux) using Samba. Teaching Tip For more information on Linux file and printer sharing, visit: www.tldp.org/HOWTO/Networking-Overview-HOWTO-5.html. Guide to Networking Essentials, Fifth Edition 11-4 Equipment Sharing in a Small Business 1. Briefly describe how printers, scanners, and other devices (e.g., hard drives and card readers) can be shared in a network. Communicating on a Small Business Network 1. Explain that common network communication methods are e-mail, IM, calendar sharing, whiteboard sharing, and video conferencing. 2. Explain that a small business can use the e-mail accounts provided by its ISP or use an in-house system. Briefly describe the following e-mail in-house systems: Microsoft Small Business Server, Novell’s Small Business Suite, and sendmail. Equipping Small Business Networks 1. Explain that a typical small business environment might consist of one or two servers, some workstations, a few switches, and a router to connect to the Internet. Servers and Desktops 1. Explain that vendors usually have small business solution centers that sell computer and networking equipment specifically tailored for small businesses. 2. Provide some tips on what to look for when purchasing a server for a small business. 3. Note that business desktop computers emphasize productivity software and manageability. Teaching Tip For a feature comparison of Windows XP Professional and Windows XP Home Edition, see: www.microsoft.com/windowsxp/pro/howtobuy/choosing2.mspx. Networking Equipment 1. Provide some tips on where to locate networking equipment in a small business network (i.e., an existing locking cabinet with adequate ventilation). 2. Making a Wired Connection. Explain why it is not advisable to run cable from the back of the computer directly to the hub or switch. Note that you should have network jacks at the work area wired to a patch panel in the wiring closet. Stress that you should use Category 5 or 6 cabling with switches instead of hubs. Explain that when buying a switch, you should consider its speed, if it is managed or unmanaged, and whether it has support for multiple media types. Stress that you should always keep in mind the company’s security policy. Guide to Networking Essentials, Fifth Edition 11-5 3. Making a Wireless Connection. Describe the situations in which it is convenient to use a wireless network instead of (or together with) a wired network. Use Figure 11-7 to explain what a combination of a wireless and wired infrastructure looks like. Explain why working with a wireless network involves special considerations not present in a wired network. Explain that when selecting wireless equipment, one of the most important considerations is the security standard supported. Communicating with the Outside World 1. In addition to Internet connections, many businesses need employees to be able to access the company network from home or while away on business. 2. Accessing the Internet. Use Figure 11-8 to explain that for 10 to 20 computers, a broadband cable or DSL connection is likely sufficient. Explain that in this setting, the router usually also serves as firewall, DHCP server, and network address translator. Figure 11-9 is a screen shot of the DHCP configuration page of a typical router used in a small business environment. Use Figure 11-10 to explain the role of port forwarding. Stress that the company security policy should be taken into account when configuring access to the outside world because that type of connection is where most trouble originates. 3. Dial-up Remote Access. Explain that if occasional remote access to the company network is required, a dial-up connection using modems and a phone line might be adequate. Note that Windows Server 2003, with Routing and Remote Access Service (RRAS), can serve as a dial-up remote access server and offers a number of advanced features for managing and securing dial-up connections. Provide some tips on how to make dial-up networking secure. Figure 11-11 shows the Dial-in tab of a user account’s Properties dialog box in Windows Server 2003. Stress that when several employees frequently use remote access, dial-up might not be the best solution. 4. VPN Remote Access. Explain that a VPN remote access connection can be made as long as both parties are connected to the Internet. Briefly describe the two VPN modes: gateway-to-gateway and client-to-gateway. Provide some tips on how to buy a router with VPN support. Read more about remote VPN access at: Teaching www.cisco.com/en/US/netsol/ns340/ns394/ns171/ns125/networking_solutions_sub_ Tip solution_home.html. Guide to Networking Essentials, Fifth Edition 11-6 Quick Quiz 1 1. In Linux, ____________________ provides file sharing compatibility with a Windows environment. Answer: Samba 2. In Linux, ____________________ (NFS) might be a good choice if the environment consists of mostly Linux computers. Answer: Network File System 3. A general rule of thumb when purchasing a server for a network is to buy as much hardware as the budget allows to meet the company’s estimated needs for the next ____________________ years. Answer: two to three 4. To make dial-up networking secure, the phone number for the connection should be ____________________. Answer: unlisted Identifying Requirements for Small Business Applications 1. Explain that multiple user and licensing requirements should be considered when purchasing applications for small businesses. Introduce the term end user licensing agreement (EULA). Small Business Accounting Software 1. Explain that a network technician/administrator’s job is not to support the function of business accounting software, but to help ensure that the network is set up to run it adequately and to be sure data is backed up. Sales and Contact Management Software 1. Explain that today’s sales and contact management software offers features that are leaps and bounds ahead of a rolodex. 2. Introduce the term customer relationship management (CRM). Teaching Tip For more information on customer relationship management, visit: http://en.wikipedia.org/wiki/Customer_relationship_management. 3. Note that CRM software has some of the same support issues you might encounter with accounting software. Is Linux a Viable Desktop Alternative to Windows? Guide to Networking Essentials, Fifth Edition 11-7 1. Explain that when considering Linux for desktop computers, you must consider the total cost of ownership (TCO) and the application support. Teaching Tip For more information on total cost of ownership, visit: http://en.wikipedia.org/wiki/Total_cost_of_ownership. 2. Note that support for industry-specific applications is lacking in Linux, but explain that there are solutions for running Windows applications in Linux. Supporting a Small Business 1. Explain why the job of supporting small businesses can be more difficult than supporting a large business. Entrepreneurs Wanted 1. Explain that if you decide you want to specialize in working with small businesses, you need to understand their needs and be able to enlighten them as to what technology can do for them. 2. Getting the Job. Explain that before developing a proposal, you must listen to requirements from the owner, manager, and other staff. Stress the importance of being customer friendly and responsive. Explain that in the proposal, you must be detailed about what’s included in the price you are quoting. Note that it is important to provide multiple quotes when appropriate, and spell out the advantages of the higher-priced option. Securing a Small Business Network 1. Explain that you should not neglect security in your proposal. For more information on securing small business, read: http://download.microsoft.com/ Teaching download/3/a/2/3a208c3c-f355-43ce-bab4-890db267899b/ Tip Security_Guide_for_Small_Business.pdf and visit: http://sbc.nist.gov/general.html. 2. Passwords and Backup. Note that not all businesses need password policies that require frequent changes and complex passwords. Stress that as long as you explain the ramifications of an open security policy, and that’s what the business wants, you need only carry it out. Stress that every business needs backup. Note that the process should be clear and concise so that any one of the business’s users can do it. Guide to Networking Essentials, Fifth Edition 11-8 3. Security from the Outside World. Explain how to secure a small business network from the outside world; i.e., using antivirus and spyware software, installing a software or hardware (preferable) firewall, and securing the wireless LAN (if there is one set up). Managing a Small Business Network 1. Explain that even though it is preferable to have on-site visits when managing a small business network, sometimes it is convenient to be able to remotely access the network to manage it. 2. Briefly describe the different remote access alternatives: VPN, dial-up, Telnet, and Windows Remote Assistance. Stress that however remote access to the network is accomplished, it must be done securely. Quick Quiz 2 1. The ____________________ (EULA) should be consulted before purchasing any software for use by multiple users. Answer: end user license agreement 2. What is TCO? Answer: Total cost of ownership (TCO) is the cost when you factor in intangibles such as support costs and productivity gain or loss. 3. What is Telnet? Answer: Telnet is one way to gain command-line access to a computer or network device. It should be used when a secure connection has already been established, such as through a VPN. Telnet is not a secure protocol, so user names and passwords are sent across the network in plain unencrypted text. Telnet is best used to access Linux or UNIX systems and command-line based routers and switches. 4. For user help, Window’s built-in ____________________ is an option that doesn’t require a VPN, as access to the user’s computer is by invitation only. Answer: Remote Assistance Class Discussion Topics 1. Do students have any experience with remote network access? If so, ask them to discuss their experiences. 2. Do students have any experience working at or with small businesses? If so, ask them to discuss, from their experience, the kind of network services that small businesses want. Guide to Networking Essentials, Fifth Edition 11-9 Additional Projects 1. Ask students to develop a proposal for a small business network. The proposal should include equipment, software, installation, and management costs. You may provide a small fictitious case study or ask them to visit a real small business to determine the requirements before developing the proposal. 2. Ask students to do some research on the price of servers for small businesses. They should compile a table with the server characteristics and prices. Additional Resources 1. Small Business: http://en.wikipedia.org/wiki/Small_business 2. Windows XP Simple File Sharing: www.practicallynetworked.com/sharing/xp/filesharing.htm 3. Windows XP Professional File Sharing: www.practicallynetworked.com/sharing/xp_filesharing/index.htm 4. How to configure file sharing in Windows XP: http://support.microsoft.com/kb/304040/ 5. The Linux Networking Overview HOWTO: File Sharing and Printing: www.tldp.org/HOWTO/Networking-Overview-HOWTO-5.html 6. Security Guide for Small Business: http://download.microsoft.com/download/3/a/2/3a208c3c-f355-43ce-bab4890db267899b/Security_Guide_for_Small_Business.pdf 7. The Small Business Corner, by the Computer Security Division at NIST: http://sbc.nist.gov/general.html 8. Port Forwarding: http://en.wikipedia.org/wiki/Port_forwarding 9. How Virtual Private Networks Work: Remote-Access VPN: http://computer.howstuffworks.com/vpn2.htm 10. Remote Access VPN Solution: www.cisco.com/en/US/netsol/ns340/ns394/ns171/ns125/networking_solutions_sub_sol ution_home.html 11. Customer Relationship Management: http://en.wikipedia.org/wiki/Customer_relationship_management 12. Total Cost of Ownership: Guide to Networking Essentials, Fifth Edition 11-10 http://en.wikipedia.org/wiki/Total_cost_of_ownership Key Terms client-to-gateway VPN mode — This VPN mode establishes a VPN connection between a single client computer and a VPN device. customer relationship management (CRM) — A class of software designed to help businesses manage their customers and prospects. end user license agreement (EULA) — The license that governs how an application can be used. The EULA specifies how many users are allowed to use an application, how many times it can be installed, and whether the software can be copied, among other things. gateway-to-gateway VPN mode — This VPN mode establishes a connection between two routers that support VPN. port forwarding — The process by which a router forwards a request for a particular TCP or UDP port on to a specified computer. total cost of ownership (TCO) — The cost of a product or service when intangibles such as support costs and productivity gain or loss are factored in. Technical Notes for Hands-On Projects Hands-On Project 11-1: In this project, students use Windows XP’s Windows Explorer. Hands-On Project 11-2: In this project, students use Windows XP’s Windows Explorer. Hands-On Project 11-3: In this project, students use Windows XP’s Windows Explorer. Hands-On Project 11-4: This project requires a working version of Fedora Core 4 with Samba installed on a computer that’s on the same network as the classroom computers running Windows XP.