Chapter 9: Establishing Network Shares and Accounts

Lesson 1: Creating Network Shares

Exercise 9.1: Case Study Problem

Your task in this exercise is to designate shares in a peer-to-peer network configuration.

For this configuration, assume that the company to be networked is small, numbering 20 employees, only 10 of which have computers. These computers are running compatible operating systems. Employees include the managing director, three people in the Sales Department, two in the Accounting Department, two in the Product Design Department, and two in the Shipping Department. There are two laser printers available; one is connected directly to the managing director's computer, and the other is connected directly to the lead accountant's computer.

In this exercise you will:

Configure all computers to share folders.

Configure the Managing Director's computer and the lead accountant's computer to share their printers with names MANAGE and ACCOUNT respectively.

Configure all computers except the Managing Director's to print to the ACCOUNT printer. The MANAGE printer will be used by the Managing Director, but will be available to others should the ACCOUNT printer fail.

Create one folder in each of the computers for exchanging files. Share each folder as PUBLIC.

Set sharing for the PUBLIC folder so that all users have full rights within the folder.

Users will be able to make files in their PUBLIC folders available to others, and will have the option of copying files to the other PUBLIC folders if that is more convenient.

Lesson 2: Establishing and Managing Network Accounts

Exercise 9.2: Case Study Problem

For this exercise we will return to the same 20-employee company that was the subject of Exercise 9.1 in Lesson 1. Your job is to design user and group accounts for the 10-computer server-based network. To do this, you should determine what kinds of groups are appropriate to the company and its work. You will also need to establish a password policy and a personnel policy that takes into account what will happen when an employee departs from the company.

After you have established the account policies, create the appropriate user and group accounts and set whatever restrictions will be necessary for each of the groups. These should include the days and hours during which groups can log on to the network. Assign printing rights to the groups as needed and, finally, add the users to the appropriate groups.

Account policies—Create groups that correspond to the working methods of�the company. Set each user's account so that passwords must be changed every 30 days. Allow users to change their own passwords. If an employee leaves the company, all users should change their passwords, and the departed employee's account should be disabled or, better, deleted.

Accounts—Create an account for each user on the server. Create a group account on the server for the Managing Director, and one group each for the sales, accounting, design and shipping employees. Add the Managing Director to the DIRECTOR group. Add the three sales employees to the SALES group. Add the two accounting employees to the ACCOUNT group. Add the�two product designers to the DESIGN group. Add the two shipping department employees to the SHIPPING group.

Account restrictions—Restrictions must follow the working methods of the company. The Managing Director and the accountant may need access during the evening or very early morning, or weekends. Restrict their accounts accordingly. The other employees are likely to work regular hours. Their accounts can be restricted to whatever their workgroup agrees upon.

Printing—Configure all computers except the Managing Director's to print to the ACCOUNT printer. The MANAGE printer will be used by the Managing Director, but will be available to others should the ACCOUNT printer fail.

Chapter Review

  1. Two computers running the MS-DOS operating system can be connected and information can be shared. (Yes or No).
  2. Yes

  3. Connecting two computers with a communications cable is called _____________ - ____________ ____________________.
  4. Direct-cable connection

  5. Sharing on a peer-to-peer network takes place at the _____________ level.
  6. folder

  7. The first person to log on to a Windows NT network uses the ______________________ account.
  8. administrator

  9. The user account contains information that defines a user to the network's ___________________ system.
  10. security

  11. Most network account-management utilities offer an account _____________ feature with which an administrator can create a template user with certain characteristics and parameters that are common among multiple users.
  12. copying

  13. A Windows NT administrator can use a _____________ to configure and maintain a user's logon environment.
  14. profile

  15. Two key pieces of information that should be entered when creating a user account are account name and ___________________.
  16. password

  17. The ____________ account is for people who do not have a valid user account but need temporary access to the network.
  18. Guest

  19. An administrator can create a ______________ account in order to simplify administrative tasks when dealing with a large numbers of users.
  20. group

  21. A global group is used across an entire ________________.
  22. domain

  23. Groups are used to give users ______________ to perform system tasks such as backing up and restoring files.
  24. rights

  25. The network administrator assigns ____________________ to groups to access resources, such as files, directories, and printers.
  26. permissions

  27. After being deleted, a user can no longer use the network, because the network __________________ database will contain record or description of the user.
  28. security


Chapter 10: Ensuring Network Security

Lesson 1: Making Networks Secure

Lesson Checkup

  1. Describe two common ways by which unauthorized users can gain access to a�network; for each, describe how unauthorized access can be prevented.
  2. Unauthorized users can gain access to most peer-to-peer networks by typing in a unique username and password at any of the networked computers. The best preventative measures include making the networked computers physically inaccessible by locking the area that contains them, or to enable BIOS security which allows the user to set a computer access name and password.

    Unauthorized users can also access a server-based network by using someone else's name and password. The best way to prevent this is to have an enforced password policy in which passwords are not written down and are changed regularly.

  3. Describe the differences between password-protected shares and access permissions.
  4. Password-protected shares require that a password be assigned to each shared resource. Access to the shared resource is granted when a user enters the correct password. Access-permission security involves assigning certain rights on a user-by-user basis. A user types a password when logging on to the network. The server validates this user name and password combination and uses it to grant or deny access to shared resources.

  5. Define data encryption and DES.
  6. Data encryption is the scrambling of data to make it inaccessible to unauthorized persons. In a network environment, data can be encrypted before being sent onto the network. This makes the data unreadable, even by someone who taps the cable and attempts to read the data as it passes over the network. When the data arrives at the proper computer, the code for deciphering encrypted data decodes the bits, translating them into understandable information.

    The Data Encryption Standard (DES) was developed by IBM and adopted as a specification for encryption by the government of the United States. DES describes how data should be encrypted and provides the specifications for the key to decryption. Both the sender and the receiver need to have access to the decryption key. Because the only way to get the�key from one location to another is to physically or electronically transmit it, DES is vulnerable to unauthorized interception.

  7. Identify four common types of computer viruses and describe how they are transmitted; describe three ways to help protect computers in a network against viruses.
  8. Four types of computer virus are called companion, macro, polymorphic and stealth. Each is a kind of file infector virus. They can be transmitted by any physical means such as CDs, floppy disks or a direct cable connection between computers, and by electronic means such as e-mail and internet downloads. Three means of protection against a computer virus are the installation of current anti-virus software, write-protection of disks, and disabling macro capabilities in vulnerable software.

Lesson 2: Maintaining a Healthy Network Environment

Lesson Checkup

  1. Describe the ways in which heat, humidity, dust, and smoke can each have an adverse effect on computer health. For each, describe preventive measures that can be taken to protect computers in such environments.
  2. If the room temperature in which the equipment is located is too high, a computer's cooling fan and ventilation slots will be unable to maintain the correct operating temperature and components will begin to overheat and fail.

    High humidity promotes corrosion. Corroded contacts on cable connections and expansion cards will cause intermittent failures. Corrosion can�also increase the resistance of electrical components, leading to a temperature increase that can be followed by component failure or fire.

    Dust is electrostatically attracted to electronic equipment. It acts as an insulator that affects the cooling of components, causing them to overheat. Excessive dust on electronic equipment can cause electrical shorts and catastrophic equipment failure.

    Smoke coats the surfaces of electronic components, acting as both insulator and conductor. Smoke residue also enhances the accumulation of dust.

    Because electronic equipment is designed to operate within the same range of temperature and humidity that feels comfortable to human beings, the best preventative measure is to provide the computers with just such an environment.

  3. Identify some of the human factors that can unintentionally alter a computer's operating environment. Describe the consequences to a computer of these factors, and suggest some preventive measures for each.
  4. Because few employees have any awareness of the ventilation requirements for computer equipment, they impede the natural flow of air in and around the equipment. Once this happens, maintaining the proper temperature is impossible and failures begin. The spilling of liquid refreshment takes a toll on keyboards and computers. When it gets cold outside, space heaters are used in under-heated offices and are usually placed under the desk, often in close proximity to computers. This can present two problems: the computer becomes overheated, and the space heaters can overload power outlets, tripping circuit breakers or even causing fires. Humans can spill liquids such as coffee on computers, impede the flow of the computer's cooling air, and overheat computers with space heaters. The liquids can destroy the computer's internal circuitry and make keyboards unusable. Blocked air flow can cause a computer to overheat and burn out electronic components. The best preventative measure is to make computer users aware of the consequences of such behaviors.

  5. Identify the principal hidden and industrial factors that can affect a�network's health. Include out-of-view network equipment in both an office, and a manufacturing environment. Discuss what precautions can be taken, or what changes might need to be made, for each of these hidden and industrial factors.
  6. Hidden factors include network wiring that runs through an attic, within walls or is otherwise invisible can be damaged during repairs to other objects in those spaces. Insects and rodents can use network materials for construction purposes of their own.

    Industrial factors include noise, electromagnetic interference (EMI), vibration, corrosive and explosive environments, and untrained and unskilled workers.

    These factors can be addressed by installing the networking equipment in separate enclosures with outside ventilation by using fiber-optic cabling to reduce electrical interference and corrosion problems with the cable by making sure that all equipment is properly grounded and by providing proper training to all employees that need to use the equipment.

Exercise 10.1: Case Study Problem

A small organization recently suffered security breaches in its peer-to-peer network. The intruder stole valuable business data. The organization's need for�security became apparent, and now a modest-sized, but more secure,
server-based network is in place.

The organization is located in a small California community that experiences frequent earthquakes and power outages. Your job is to plan how to avoid breaches of security and plan for disaster recovery at the same time. In this exercise, examine preventive measures the organization can take to avoid data loss due to human activities and natural disasters such as earthquakes.

List the categories of things that can put the organization's data at risk. Discuss the preventive measures and recovery plans appropriate for each kind of�data loss.

An organization's data can be put at risk by:

An organization can take the following preventive measures to avoid data loss due to human activities and natural disasters:

Disaster-recovery success is only as good as the disaster prevention and preparedness measures taken beforehand.

The only protection from a data-loss disaster is to implement one or more of the methods described earlier to back up data. Store your backups in a secure place, such as a bank safe deposit box, away from the network site. To fully recover from any disaster you will need to:

Chapter Review

  1. The first consideration in keeping data safe is to ensure the security of the network __________________.
  2. hardware

  3. Another term for access permissions is __________ - _____________ _________________.
  4. user-level security

  5. Implementing password-protected shares involves assigning a password to each shared _________________.
  6. resource

  7. If a share is set up as ___________ - ___________, users can look at the documents or copy them to their machines, but they cannot change the original documents.
  8. read-only

  9. Access permission security involves assigning certain ______________ on a user-by-user basis.
  10. rights

  11. The most efficient way to assign permissions is through the use of ______________.
  12. groups

  13. Through auditing, selected types of events are recorded in the _________________ __________ of a server in order to track network activities by user accounts.
  14. security logs

  15. A data- __________________ utility scrambles data before it goes out onto the network.
  16. encryption

  17. The Commercial COMSEC Endorsement Program (CCEP) authorizes manufacturers to incorporate classified ________________ into the communication systems they sell.
  18. algorithms

  19. Diskless computers communicate with the server and log on through the use of a special ROM boot chip installed on the computer ________________ _________________ ___________.
  20. network interface card

  21. The two most important environmental conditions to monitor are _____________________ and __________________.
  22. temperature, humidity

  23. Proper ____________________ is required to prevent a computer from overheating.
  24. ventilation

  25. The potential for ESD increases as the humidity ______________.
  26. drops

  27. True or False: If network cables are installed in the walls and in the ceilings, they will be safe from all damage.
  28. False

  29. A ___________ atmosphere with high __________ will most certainly destroy any computer equipment in a matter of days or months.
  30. corrosive, humidity

  31. The first line of defense against loss of data is usually a ___________ ________________ system.
  32. tape backup

  33. It is important to have a regular ______________ for backing up data.
  34. schedule

  35. Maintaining a __________ of all backups is important for later file recovery.
  36. log

  37. When backing up across a network, network traffic can be reduced by placing the backup computer on an isolated _______________.
  38. segment

  39. Fault-tolerant systems protect data by duplicating data or placing data in different _______________ sources.
  40. physical

  41. RAID level 0, called ____________ _______________, divides data into 64K blocks and spreads it equally in a fixed rate and order among all disks in�an array.
  42. disk striping

  43. Level 0 disk striping does not offer data ___________________.
  44. protection

  45. Disk __________________ duplicates a partition and moves the duplication onto another physical disk so that there are always two copies of the data.
  46. mirroring

  47. Duplexing is intended to protect against disk ___________________ failures, as well as media failures.
  48. controller

  49. Writing complete blocks of data to each disk in the array is known as disk ________________.
  50. striping

  51. In Windows NT Server, the ___________ _____________________ program is used to configure Windows�NT Server fault tolerance.
  52. Disk Administrator

  53. In RAID level 10, data that is contained on a physical drive in one array is __________________ on a drive in the second array.
  54. mirrored

  55. "Clustering" is the term applied to a group of ___________________ systems working together as a single system.
  56. independent


Chapter 11: Printing on a Network

Lesson 1: Network Printing

Exercise 11.1: Term Definition Review

In this exercise, a list of terms is given in the left column. For each term listed, fill in the definition in the space given in the column to the right.

Term Definition
Redirection The direction of a request for services from the local computer out onto the network.
Print spooler Software that intercepts a print job and sends it to a print queue.
Print queue A buffer in which the print job is held until the printer is ready to print it.
Print-sharing utility A utility that helps the network administrator manage all the functions of a print server.
Share name The network name of a shared resource.
Printer driver Software that allows the printer to work with the print server.
Print Manager A Windows NT print-sharing utility.

Lesson 2: Managing a Shared Printer

Lesson Checkup

  1. Identify and describe four tasks required for routine printer maintenance.
  2. Printer maintenance includes supplying the printer with paper and toner, clearing the printer if there is a paper jam, and monitoring the printer's output to ensure that print jobs do not back up and overflow the printer's output bin. Other tasks are monitoring the printer's performance and notifying a technician if a serious problem develops, as well as routinely cleaning the printer in accordance with the manufacturer's instructions.

  3. Describe how a network administrator can allocate a single printer's resources among several workstations.
  4. The best means of allocating a single printer's resources is to share the printer on a network. Then give users network permission to use the shared printer.

  5. Define PDLs and describe their function in printing.
  6. PDLs are page-description languages that tell a printer how printed output should look. The printer uses the PDL to construct text and graphics to create the page image.

Lesson 3: Sharing Fax Modems

Lesson Checkup

  1. How does a fax server compare with a shared printer? What are the roles of�each?
  2. A shared fax server does for fax communication what a shared printer does for printing: it makes fax capabilities available to all users on the network. A shared fax server allows anyone on the network to send a fax; a shared printer allows anyone on the network to access that printer's resources.

  3. Define the function of a fax server.
  4. A fax server gives users the ability to send a fax without having to leave their desks. Some fax servers allow an administrator to monitor incoming faxes and to route them to the intended recipients, while discarding others, such as advertisements.

  5. Describe three enhancements that can be added to a fax server.
  6. Some fax-enhancement software allows users to send faxes from word-processing packages, databases, spreadsheets, and e-mail. Some even provide diagnostic utilities, error reporting, and accounting features to make fax servers easy to administer.

Chapter Review

  1. When network users want to print data on a shared network printer, the data is�sent to a _____________ that feeds the data to the printer.
  2. server

  3. Each network print job must be ________________ away from a computer's local printer port and onto the network cable.
  4. redirected

  5. The memory buffer in the print server's RAM that holds the print job until the printer is ready is called a ______________.
  6. spooler

  7. In order for users to access a shared printer, they must have a way to ________________ the printer.
  8. identify

  9. The printer uses the _________ to construct text and graphics to create the page image.
  10. PDL

  11. Managing users who access printing over a computer network includes assigning _________________, as with any other shared network resource.
  12. permissions

  13. One task an administrator can accomplish from a remote location is to ______________ print jobs in the queue.
  14. reorder

  15. Most current network operating systems allow an administrator to manage a network printer with a ____________ - _______________ ______________.
  16. print-sharing utility

  17. A good fax server service allows an administrator to ________________ incoming faxes and to ____________ the appropriate one to the proper person.
  18. monitor, route

  19. Fax-server enhancements that allow users to send faxes from ______________, _________________, and ____________ are available.
  20. databases, spreadsheets, e-mail


NEXT

Hosted by www.Geocities.ws

1