If you want to create a small network (less than ten computers), and you do not need the added security and features provided by a network server, you can create a peer-to-peer network using Windows 2000 Professional. Like client/server networks, peer-to-peer networks let you use many of the networking tools and features in Windows 2000 to share files and hardware resources such as printers and CD-ROMs.
In order to establish a peer-to-peer network, you need to have special hardware installed on each of your computers and you must install and configure certain protocols and services. After the network is set up, you can share network resources and set security policies to protect them.
Each computer that you want to be part of the network must have a standard network adapter installed. A network adapter is installed on your computer's motherboard and is used to access a network. When you install a network adapter, Windows 2000 creates a local area network (LAN) connection for you. It appears, like all other connection types, in the Network and Dial-up Connections folder in Control Panel. Each time you start your computer, Windows 2000 detects your network adapter and automatically starts the local area connection.
You must also decide the physical layout of the computers and what kind of cabling to use to connect them. A standard network configuration uses cables to connect each computer to a centralized component called a hub. Hubs serve as distribution points for the entire network. One of the primary advantages to using a hub is that a failure in a single cable or computer affects only the computer using that cable; the rest of the network will keep functioning. Many different types of hubs are available and the type you choose will depend on the network type and cabling used. However, your hub must simply have enough ports to connect all of your computers.
Once you have installed the necessary hardware and connected the computers, you need to configure each computer with the appropriate protocols and services.
One of the main reasons for establishing a network is to enable users to share resources and information. Windows 2000 includes the basic services that provide this functionality. However, you must also ensure that each computer has the necessary network protocol installed. Protocols provide a communications link between your computer and the network.
TCP/IP is installed as the default network protocol when Windows 2000 initially detected your network adapter. TCP/IP is the most popular protocol for network enterprises and serves as the basis for the Internet.
After the necessary networking components have been installed, you must give each computer on the network a unique name and join it to the workgroup.
Windows 2000 provides a workgroup model that organizes computers in a peer-to-peer network into groups. These groupings help users easily find other computers on the network. You must identify each computer with a unique name and join it to the workgroup in order for other users to access it on the network. The computer name is displayed to other users when they browse the network. Many people use their name to identify their computer, but any meaningful name will work.
For information about naming a computer and joining a workgroup, see Related Topics.
After all of the necessary network components are installed, users can designate documents and resources on their computers as shared resources, which can then be accessed by other network users. Windows 2000 provides several methods for users to find shared resources, including browsing the network, mapping a network drive, or using the Run command. For information about sharing network resources, see Related Topics.
Now that users can freely access shared resources on the network, you should also ensure that the data on each computer and the network is protected. Windows 2000 provides a security infrastructure that allows you to determine the proper safeguards for your data and applications. These features help you to identify the people on the network, restrict access to resources, and set policies for how people can use them.
For information about configuring security features, see Related Topics.