Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Windows Workgroup Networking - Laboratory Exercise | ECET 4820, Lab Reports of Electrical and Electronics Engineering

Material Type: Lab; Class: Comm Networks & the Internet; Subject: Electrical&Computer Eng Tech; University: Southern Polytechnic State University; Term: Unknown 1989;

Typology: Lab Reports

Pre 2010

Uploaded on 08/03/2009

koofers-user-s1f
koofers-user-s1f 🇺🇸

10 documents

1 / 7

Toggle sidebar

Related documents


Partial preview of the text

Download Windows Workgroup Networking - Laboratory Exercise | ECET 4820 and more Lab Reports Electrical and Electronics Engineering in PDF only on Docsity! Southern Polytechnic State University Electrical and Computer Engineering Technology Department ECET 4820 Laboratory Exercise: Windows Workgroup $etworking Revised 10/08 Objective: The student will examine some characteristics of a Windows Workgroup network which is a type of peer-to-peer network. Introduction: You will log on to computers running the Windows XP professional operating system. These machines are in a workgroup, which is Microsoft’s version of a peer-to-peer network. As such, share access privileges are controlled in a distributed fashion, where the administrator of each workstation can set password access to shares.. The first time you log on, you will log on to the domain and perform some non-administrative tasks. Procedure: Log On to Your Workstations 1. Log on to your workstation and verify workgroup status. a) Log on to your workstation and set the IP configuration to the one specified by your instructor. b) Right click on the My Computer icon and select Properties. Click on the Computer $ame tab of the $etwork Properties box. • Is your computer part of a Workgroup or a Domain? Workgroup or Domain Name: Shared Resources 2. In workgroups, folders can be shared. They are available to users with usernames having accounts on the individual computer or they can be made available for Everyone. There are two types of file sharing, simple and standard. The simple method is to be avoided, except perhaps on home networks, because everyone on the network has read privileges for the shared folders and also write privileges if specified. Only the simple method of sharing is available with the Windows XP Home edition of the operating system. Both methods can be specified in Windows XP Professional, and the standard method is default. With standard sharing, a folder can be shared with Everyone or with users having accounts on the computer. a) To see your workgroup shares and workstations, do the following. i) Double click on the My $etwork Places icon on your desktop. The available shares will be displayed in the My $etwork Places window. ii) Clicking on the View Workgroup Computers will show the workgroup computers. Double clicking on one of the computer icons will display shares available on that computer. Revised 10/08 b) Create a shared folder and permit Everyone to share it as follows. i) Create a folder on your c: drive and call it Testshares. ii) Right click on the folder and select Sharing and Security. iii) In the Shares Properties box, select Share this folder. iv) Click the Permissions button to display the Permissions for Shares box. v) Under Group or user names, add Everyone if it is not already there. To add a user, click on Add and in the Select users or groups box select Advanced. In the next box, click the Find $ow button. In the names that appear at the bottom, select Everyone. vi) Click OK until you return to the Permissions for Shares box. Check the Full Control box under Permissions for Everyone. c) View the shares on other workgroup computers and verify that you can access them. Creating Local Accounts on Your Workstation 3. You will set up an account on your workstation using the Computer Management utility. The account you are supposed to be logged on as at this time is one that is in the local Administrator group. The only accounts that can create other local accounts are either the built-in Administrator account or users that have been placed inthe Power Users or Local Administrators groups. You will add user accounts to your workstation and put them in groups. Groups are used to organize users you want to give the same permissions to. a) Locate the Administrative Tools in the Control Panel and click on it. Then click on Computer Management. The Computer Management window will appear. b) Create a new user and put it in the Power User group by doing the following. i) Double-click Local Users and Groups. Double-click the Users folder and a list of local users will appear. ii) In the menu bar at the top of the window, click Action→$ew User. iii) In the Username field type puser. iv) In the Password and Confirm Password fields type puser. v) Uncheck User Must Change Password then check the box User cannot change password. vi) Click Close button. You will return to the window showing the users. vii) Determine how to add the user to the Power Users group and do that now. • Have your instructor verify your results. c) You will test your new account by logging back in locally and then setting up a new account. Since your new account is in the Power User group, it can set up other accounts. i) Log out and log back in locally as puser. ii) Set up a new account called localuser. Give it the password localuser and make it a member of the Users group (this is the default group). Revised 10/08 The Event Viewer 7. Return to the Computer Management utility of the Administrative Tools. Under Event Viewer, choose the System event log and describe the most recent Error (not a Warning) below. Event ID, Date, Time: Brief Description: The Windows Security Window and Task Manager 8. The Task Manager is a utility providing a number of useful functions. The easiest way to access it is through the Windows Security window. a) Type the Ctrl-Alt-Del keys at the same time to bring up the Windows Security window. b) What does Lock Computer do? c) Return to the Windows Security window and press Task Manager. i) Click on the Applications tab. All running applications will appear in the list. Double click on My Computer on your desktop and observe the Applications list. ii) Click on the Processes tab. All running processes will appear in the list. Which process uses the most memory? Which one has used the most cumulative CPU time? Process with most memory: Process using most cumulative CPU time: iii) Click on the Performance tab. You will see graphs of CPU time and memory usage. iv) Click Help→Task Manager Help Topics on the Task Manager menu bar. When the help window appears, use the Task Manger Overview to find the definitions of the following terms. Hint: look under Performance Fields Overview→Totals. Threads: Processes: Commit charge: Workstation Performance 9. The workstation performance monitoring tool is part of the Administrative Tools. You can use it to display graphs of various workstation performance parameters. Revised 10/08 a) Start the Performance tool. b) In the graph panel of the Performance window select System Monitor and then click the + button. The Add Counters box will appear. c) Add counters to monitor the percentage of hard disk time, the percentage of processor time, and the IP datagrams receive per second. • Have your instructor verify your results. d) Although you will not do this here, you can store customized performance monitoring panels like the one you just created for recall at any time. This is useful because if you monitor more than a few counters at a time, your graph panel gets cluttered. Security Policy 10. The Local Security Policy tool is included in Administrative Tools. It is used to change the following parameters, among others. • Account Policies, including password age and password history • Local Policies, including user rights assignments, security options, and audit policy To change these parameters you must be a local Administrator or a Domain Administrator. Having an account in the Administrators group is not sufficient. If time permits, your instructor will demonstrate this capability. Profiles 11. User profiles are stored for each account so that when a user logs on, he/she has custom settings restored, such as desktop color. The profiles can be local or roaming. Local profiles are stored on each computer and are available when you log on to that computer. Roaming profiles are stored on the Domain Controller server and are available any time you log on to the domain. You can choose between local and roaming if you are logged on to the domain. If you are logged on locally, you do not have access to the roaming profile. Also, accounts in the Administrator group can copy and delete profile files of any other child user account on the computer. When a profile is deleted, the user receives the default profile when they next log on. Their settings are then automatically stored in a new profile file. a) Open the System Properties window by right-clicking on My Computer and selecting Properties. b) Choose the Advanced tab. Under User Profiles, press the Settings button. Identify whether you have a local or roaming profile. Wrap Up 12. a) Remove all shared folders you created. b) Remove all user accounts you created. c) Have your instructor verify your results. Revised 10/08 Questions 1. What local user account group level(s) is required to set up a local workstation account? 2. What is the main advantage of placing user accounts into groups? 3. When you set up the localuser account according to the procedure you were instructed to follow, can localuser change its own account password? Why or why not? 4. Can a Power User change the password of a lower level local user’s account if that user account was created by another Power User or an Administrator? Why or why not? 5. Why is it useful to have a telnet server running on your workstation? 6. What is the value of the Lock Workstation function? Report Each team students should analyze their data and prepare one brief, concise report. Compare and contrast the differences you saw in the permissions granted to the two domain accounts you used. A table may be useful for the comparison. Make meaningful conclusions about what you learned.
Docsity logo



Copyright © 2024 Ladybird Srl - Via Leonardo da Vinci 16, 10126, Torino, Italy - VAT 10816460017 - All rights reserved