Breaking News

Search This Blog

Wednesday 31 October 2012

Print Server in Windows 2000


Setting up Print Server in Windows 2000 ?

What is a Printer?



Printer is a device that prints text, graphics and images on the paper. With regards to quality, graphics, speed there are different types of a printer. The most common types of the printer are Dot matrix, InkJet and Laser printer. In the following sections of this article we will discuss all the common types of printer.

Common Types of Printer
Dye Fusion Thermal
Thermal Dye sublimation or thermal dye transfer is a process that is used by the color printers. A color wax film is moved throughout the page and pigments are heated and deposited on the page.

Inkjet
Inkjet printers use spray and print them on the paper. They produce high quality prints and have better image quality and they are faster as compared to the DOT Matrix printers. Due to low cost, high quality and ease of use, they are most commonly used printers. 

Laser Jet
Laser printers use xerographic printing process, which is a same technique as used by the photocopier machine. In the laser printer, the roller is charged with the electricity and the laser light is used to remove that charge from the roller. Laser printer is very fast and they produce high quality and text, graphics and images.

Dot Matrix
In the Dot Matrix, pins are used to strike the ribbon and dots, characters and images are produced when pin strikes the ribbon. The columns of 8, 9 and 24 pins are used in the Dot matrix. Dot matrix printers have horizontally moving head and pins in the vertical position. Dot matrix printers are mostly cheap and they are used for low to medium quality of printing.
 

LCD/LED
This is a type of printers that uses the liquid and light emitting diodes LED to produce the produce the images on the roller.

Camera Copy
Camera copy printers produce high quality full color output and the laser light is used to write on the film inside the camera. This type of printing process is expensive.

Line Printer
Line printers have horizontal drum that stretch the paper. The drum is made up of 132 thin cylinders and each have a complete set of characters.

Daisy Wheel
Daisy wheel printers work like the typewriters.

What is a Print Server
A print server is a computer or device that is being connected with one more print devices or printers. Print server holds an operating system such as Windows 2000, Windows 2003 and the client computers send print requests to the print server. The print server serves these requests on the first come first serve basis but there are features in the printing software with which the print jobs can be prioritized i.e. you can give preferences to some printing requests. Client computers connect with the print server by using the Microsoft Network Printing Protocol. Dedicated print servers support a large number of the protocols such as TCP/IP, NetBEUI, IPX/SPX, LPD/LPR and NetBIOS.

How to Setup Print Server in Windows 2000/2003

Installation
1. Install the operating system such as Windows 2000 or Windows 2003.
2. Attach printer device with the computer. Normally operating system will automatically detect the printer and if not then you have to manually install the driver of the printer by inserting the CD-ROM. If you don’t have the drivers in the CD then you can download from the vendor’s website or from driverguide.com. You just need to know the model of your printer such as Hewlett Packard LaserJet 2600n, Canon PIXMA™ iP90 InkJet, Lexmark C534N, Canon PIXMA™ MP530 All-In-One Inkjet etc.
3. Install and configure the printer driver in the following steps.
4. Click on Start > Settings > Control Panel > Printer and Faxes.
5. Click on the File Menu > Add printer > Next > Local Printer attached to this computer.
6. Check Automatically Detect and Install My Plug and Play Printer.
7. Click Next.
8. Wizard will automatically detect any attached printer and install the driver for it. If the system doesn’t find the driver then you will be prompted to provide the driver of the printer.
9. After successfully installing the printer driver, you will see a new printer name in the Printer and Faxes inside the control panel.

Server Configurations
1. Right click on the printer name > Properties > Sharing > Share this printer.
2. Provide a shared name for your network printer.
3. This name will be used by all the client computers on the network who want to access this printer.
4. You can also set the color management, priorities, printing preferences, font and other things in the properties tab of the printer.

Client Computer Configuration
If you want to setup the printer at the client computer then you can do this by the following command.
\\computername\printername (printer name is the shared name of the printer)
Second option is the same as you installed the print device on the server i.e. Start > Settings > Control Panel > Printers and Faxes > File Menu > Add Printer.
In this tutorial you have learnt that what is a printer, basic types of the printers and how to setup print server in Windows 2000/2003.

Read more ...

What is GSM ?



What is GSM  ?


Here you will learn about gsm network technology introduction, cellular operators, cdma, voice mail, sim cards, dual band, quad band, communication channel, wireless communication and gprs overview. GSM was first introduced in the Finland in the year of 1991. GSM mobile phones operate on the TDMA systems. In the TDMA (time division multiple access system), multiple users can access single radio frequency without any interference. GSM is now the de facto standard for the mobile communication in the world.   The GSM (Global System for Mobile Communications) is a hugely successful wireless technology in the world. GSM has become the world’s largest growing communication technology and it has been expand in more than 214 countries of the world. The TDMA technology provides the individual time slot within a specific channel for each user. 
GSM leads the world as the fastest growing mobile/wireless digital technology that is most reliable and is available in the marketplace today. GSM provides the integrated high-speed data, fax, voice mail, paging and short messages services features. GSM offers the secure communication, privacy and fraud prevention.
 
After subscribing to the GSM service, you can use your phone at your home, office, across the continent or around the world with the country specific SIM cards. GSM operates on the different frequency levels like 900 MHz, 1800 MHz or 1900 MHz.
1900Mhz is used in the North America and 1800 MHz is for the other locations. Different mobile phone networks around the world operate at different frequencies. If you wish to use your mobile phones outside of your GSM frequency range then you should use a mobile/handset that support multiple frequencies. Before buying a mobile phone, make sure that it is compatible with the different bands of the GSM.
Dual-band – A dual band phone operates at different spectrum like 900 MHz and 1800 MHz. Dual-band GSM works in Europe, Asia, Africa, Australia and Sound America.
Tri-band – A tri band phone operates on the three different frequency levels like 900 MHz, 1800 MHz and 1900 MHz. This means that you can use your mobile phone in Europe, Asia, Australia, Africa and North America.
Quad-band – A quad band GSM capable phone allows you to roam almost everywhere in the world. It covers the different frequency ranges like 850 MHz, 900 MHz, 1800 MHz and 1900 MHz. 99% countries in the world use the GSM standard and it seems that GSM will eventually be the only cell phone standard in the mobile communication world. GSM provides the best voice quality and standard.
Today, there are more than 720 GSM mobile networks across the more than 214 countries. According to the recent statistics, there are more than 2 billion users of the GSM in the world. Major GSM using countries includes China, Russia, United States and India. A mobile phone can be a bewildering affair for a traveler. It is mostly incompatibility with the network of your visiting country, since every country in the world has different frequency band of operation. With a GSM enable mobile phone you can access more than 214 countries around the globe.
GSM is a state of the art technology offering voice, data, fax and SMS capabilities. Most of the mobile phone operators now offers email to SMS service by which you can receive the important news, flight status and other useful information on your mobile phone. Many operators give access to the ISDN services by which fast data transmission is possible. Many other offers GPRS (Global Packet Radio Service) with this service you can connect to the high speed data communication channel like 9600 bps. The two major GSM service providers in the US are the T-mobile and Cingular.
The iPhone 4 is one of the most popular quad band enabled mobile phones currently on the market, it's a good idea to compare prices before you buy. Sites such as Mobile Phone Genie allow you to find the best iPhone deals.

Read more ...

Introduction Home Computer Networking


Here you will get the basic introduction of Home Computer Networking-Basic Setup, wireless access point, lan troubleshooting, lan connectivity, ADSL and DSL internet, gateway device, vpn and wi-fi.
.                   Computer Networks exists for more than 30 years and only recently they have become more popular at home both in forms of wired and wireless networking. Now many computer literate people from all over the world wish to have a computer network at home. There are many advantages and usage of a network, which we have described in the other sections of this website.

Millions of people have adopted the home network and now they are looking for the more advanced technology in the home networking and that is “wireless home networking”.
We will discuss the various basic and advance aspects of the home networking considering that no prior knowledge of the network technology. We will briefly explain the setup, troubleshooting, installation, network devices used and other aspects of the home networking.
Today in the age of Information technology, it’s not difficult for someone to have more than one PCat home. 
If I apply this situation to you (that you have more than one computer at your home) then most probably you would wish to have access on the data and resources like, hard disk, printer, modem of the other PC and you can even access the broadband Internet like DSL or cable modem and you can also play a multi-player network game. All this is possible by just connecting and configuring the two computers at your home. There are several ways to do the home networking but all it depends on budget, security needs and nature of your work

 
Your cable/DSL modem plugs straight into the computer.
The computer is exposed to the public Internet (indicated by the color red). There is no connection for more than one computer. You only have one IP address from your ISP.

If you have a broadband Internet connection at your home like DSL or cable net then you can share your internet connection with more than one PC at your home by installing the network card in each PC and configuring the hub/switch or a router.

If you have two PCs at your home and you want to share your internet connection with the other computer then you can simply share the internet connection by following these steps.

1. Connect two PCs with CAT5 cable and make it a cross over cable. 

2. After connecting both the PCs, assign a different IP addresses by going in the properties of the LAN card like 100.100.100.1 and 100.100.100.2 or you can assign any other IP address. (Please note that these IP addresses that you use for your home networking are the private IP addresses and they have nothing to do with the IP address that are used on the internet (public IP addresses).

3. After assigning the IP addresses install software on the computer one, which will be used for sharing the Internet connection and this will be called proxy software (and your computer one will act as a Proxy Server). The more common proxy software is Wingate, Win Proxy and Internet connection sharing (ICS). ICS is by default installed in Windows operating systems and can be configured separately.
Internet access by using a hardware router/gateway/firewall device
In this situation, you have to install a hardware router, which will be act as a gateway. Your router will be connected with the public IP address, which will be assigned to your by your ISP and hub/switch will be attached to the router. All the other PCs in your home or small network will be directly attached to that hub or switch.

How to setup the Gateway Device-
Gateway device – There are different gateway devices available from different companies like
dlink.com, linksys.com, netgear.com and Cisco systems. Each device has difference setup configurations but the basic purpose of all these devices is the same.
The Gateways have a number of common features and functions such as NAT (Network Address Translation) that translate your public IP address into the private IP address on your network, DHCP server, PPP. Before buying any gateway device, make sure gateway device must have all these features.
Some advance gateways have the following features.
• wireless access point
• VPN
• print server
• DMZ (make one PC available to the Internet but still protect it through the firewall
• multi-port
• Content filtering
Most advance gateways comes with integrated hubs or switches and if your gateway don’t have the functionality of a hub/switch then you will have to buy a hub/switch for your home network. Before buying a hub/switch you should consider the two main things 1. it should support dual
speed i.e 10mbps and 100mbps and 2. it should have maximum available ports.
Cat5 cable – For setting up a home network, you will need a several pieces of the CAT5 Ethernet cables. These cables can be used in the different scenarios like for connecting the two PCs (if you have a two computer network) and if you have more than two computers then each computer will be directly connected with the hub/switch or gateway device. The most commonly used cable for computer networking is Cat5 cable.
Once you have all the required things like cables, hub/switch, LAN cards etc. then install a network card in each PC. You must make sure that each card is properly installed and is not showing any signs of conflict with the other network devices.
How to connect two computers wirelessly
In some recent years, wireless networking solutions have became very popular. There are several wireless technologies exists to support the wireless networking.
These technologies include Wi-Fi, Bluetooth and infrared.
Wi-Fi connections can reach at a greater distance than the other wireless solutions that are mentioned above. Many new PCs and Laptops now have the built-in capability of the Wi-Fi. Wi-Fi can be used with or without network fixture. In the two computers Wi-Fi networking minus a fixture also called ad-hoc Wi-Fi.
Bluetooth technology supports high speed wireless connectivity and communication between the two computers without the need of a network fixture. Bluetooth is commonly used when networking a computer with the consumer’s cell phone or handheld device. Bluetooth works well if both the devices are in the same room or location. While networking among the handheld devices consider the Bluetooth technology solution.
Infrared networking exists before the Wi-Fi or Bluetooth technologies on the Laptops. Infrared wireless connections only work between two computers and do not require a fixture. Infrared networking is relatively fast so consider using it if your computer supports it and you don’t have
the Wi-Fi and Bluetooth features in your computer.
Read more ...

ATM NETWORK TECHNOLOGY



ATM NETWORK TECHNOLOGY--
This tutorial provides the basic introduction to atm network technology, packet switching, cell base, telecommmunication technology, high speed bandwidth usage in this technology. ATM (Asynchronous Transfer Mode) is a high speed network technology that has become the standardized solution for the telecommunication industry, teleconferencing, videoconferencing, telemedicine, HDTV, distance learning and where high speed data transfer is required.   ATM technology integrates voice, data and video at the same time. ATM uses fixed size packets called cells of 55 bytes in length. ATM network is a high speed circuit switched network that is capable of transferring one million signals using ATM protocol. ATM is a connection oriented technology in which logical connections are established for the data communication. ATM is implemented in the WAN and telecommunication sectors. Small data cells are used for communication and ATM is designed for high speed and high traffic networks. ATM cells allow voice, data and video transfer at the same time. ATM operates on the data link layer of the OSI model and it uses UTP/STP, fiber optic or air as a communication medium. 

ATM CELL BASE
It is a small unit of 55 bytes fixed length and it contains the users and signaling information in it. It has a header with very limited functionality to reduce the internal buffer and to provide the high speed transfer. ATM cell identify the cells that belongs to the same virtual channels and perform easy routing.
 

ATM SWITCHING
Various switching technologies have been developed in the past to provide the high speed data transfer and secure communication. ATM switching technology provides high speed data transfer due to the connection oriented technology. ATM switching technology uses the predefined routing table so guarantees the fast data communication.

ATM DEVICES
ATM basically uses two types of devices such as ATM switch and end systems. The function of the switch is to handle the transmission of the cells throughout the network. Switches accept the incoming cells from the ATM end station or another ATM switch. On the other hand, ATM end systems contain the ATM adaptors.

ATM CONNECTIONS
ATM supports two types of connections point to point and point to multi point connections. In the point to point connections, two end systems are connected bi directionally or uni directionally. The point to multi point system connects one source to the number of destinations in uni directional. The source sends the information and switch replicates it to the destinations. Unidirectional network connects two switches. A typical ATM network consists of a set of the switches interconnected by point to point links. Switch support two types of interfaces user network and network node interface. Asynchronous transfer mode technology is designed for the reliability, performance, utilization and QOS and it creates fixed channels and routes when data travels between two points. There are four types of the choice when purchasing a connection.
Constant Bit Rate: It specifies fixed size rate and data is transferred in a steady form. Variable bit rate.
Variable Bit Rate: It provides specified throughput and it is best for videoconferencing.
Available bit rate. It provides guaranteed minimum capacity but high rate is also possible when the network is free.
Unspecified bit rate. It does not provide any fixed throughput level and it is best for the file transfer where delay can occurred.

ATM ADVANTAGES
It provides fixed bandwidth and simple routing is possible due to the connection oriented technology. High bandwidth utilization can be possible so it is the best solution for the telecommunication sector, videoconferencing and QOS. There are some of the disadvantages of this technology such as high cost, cell loss due to the high congestion in the network.
Read more ...

Web Server Works

What is a Web Server?


Learn Web server software overview, how to configure, how it works, apache, tomcat. Web server is a computer including a software package that provides the specific services to the client computers. Web server delivers the web pages. Every web server has an IP address and a domain name. If you sends a request through your browser for this website http://www.networktutorials.info, the request goes to the server whose domain name is networktutorials.info.   The server fetches the index or main page of the website and sends it to your browser. Web-based servers are used for hosting the websites. One web server can hosts thousands for one sites. But in the hosting companies there are number of the web servers for load balancing and sharing the other services.
The web hosting companies offer different types of hostings services including Ecommerce hosting, CPanel hosting, PHP hosting and reseller hosting.
A computer can be act as a web server by installing and configuring the server software and connecting the computer to the Internet. Normally, web server computers have to be turn on (online) for almost all the day.  There are many software applications that are used as the web server like IIS, Apache web server, Tom Cat web server. A web server typically accepts thousands of the concurrent incoming requests for the specific domain, that it hosts.
In case if the server is down for any reason, the websites that are hosted on this server cannot be accessed. So the downtime is a biggest negative thing for the web hosting companies. Many hosting companies have to mention the uptime of their servers for the client’s satisfactions like 99.9 % uptime. You may have seen this percentage on many hosting companies’ websites.
 
The web servers serves the objects in the form of html documents, plain text, images, sounds, video and some other form of the data. Many of the data types may not be placed in the static form but they are shown on the run time by the software programs, that are installed on the web server and the CGI scripts are the most common form of these programs.
Web servers and the browsers such as internet explorer, Firefox, Netscape, Opera etc communicate with the web server by using the HTTP protocols (Hypertext Transfer Protocol). This is very effective method of requesting the data over the Internet. Web servers are in various shapes and sized and run under different operating systems like Windows, Linux, and Unix etc. They are also range differently in prices and working.


Apache Web Server

The Apache web server is the most popular and most commonly used web server today. Apache web server has many features and good functionality that appeals to the users and that’s major cause of its popularity. On the other end, Microsoft’s IIS still is struggling to complete fully with apache web server. IIS is a very good server on the NT platforms and Apache is compatible with the Linux/Unix platforms.
Another big reason for the worldwide acceptance of the Apache web server is its stability. Many big websites on the Internet has chosen Apache web server for their hosting needs.
Additionally, Apache web server is a relatively fast. If your website contents are static then Apache’s working is very efficient and fast and on the other end, if you are using scripts like CGI scripts or others, it usually slows down the speed of the Apache web server.
A Web server is simply a little piece of the software, it takes the file name sent in the GET command, retrieves that files and send it back to the browser.
Most servers implement some level of security on the serving process. For example login/password accessible page requires the proper login and password from the users to accept that page. Web servers have the database and login information of the entire subscriber and only a subscriber of that typical service will be able to see that page. Additionally, while doing secure transactions the web pages allows encrypted transactions between the browsers and the servers such as on the E-commerce websites and other websites where a transaction through a credit card is required.

 
Basic Overview How Web Server Works

A web server performs various tasks on the request from the clients. To understand the working of the web server, it is necessary to first understand that what is client and server and what is their relationship with each other. A client is a program that sends request to a server and server responds to the requests of the clients.
This generic definition covers many types of relationships between client and servers like database server & web server etc. Web server have to be connected to the internet because client computers need to access them for various needs like data, files, graphics, video and html documents access.
The client program such as browsers and typically designed for the purpose of communicating with the web servers. A browser itself has different levels of features and security. To start the communication between the client (browser) and the server, a set of rules or agreed upon way is required and that is called a protocol. To access the web pages from the server HTTP protocol is required and for the file sharing access FTP protocol is required. There are a large number of the web protocols.
A web server is configured and designed in such a way that it responds to the thousands of the concurrent incoming requests from the clients for different things like html documents, graphics, images or video etc.
Rely on cloud server hosting for an efficient and reliable website solutions

Read more ...

The Lost File By Recovery


How to Recover the Lost Files?

In this section you will learn how to how to recover data from the physically damaged hard drives, data recovery tips, files recovery, hard drive crash, physical damage drive and basic recovery methods. Data recovery means retrieving deleted and inaccessible data from the electronic storage media such as hard drives and removable media. There are different causes of the data loss such as Electro-mechanical failure, natural disaster, viruses, sabotage, human error and data corruption. If the problem is not of severe nature than you can recover the data with a good recovery tool.

What data recovery is important?

Over the past few years, hard drives have gotten a lot faster and quieter with the capacity of 350 GB. The downside is that their consistency is far from perfect and they are often burdened with mechanical defects and failures however, this warning has never been mentioned in the vendor’s product specification. From the experience of the past it is shown that the users are divided into the two groups. The first group of the users is well informed about computer, data and may be he/she has experienced the data loss. 
In this scenario, the user will naturally be very careful to back up information such as files, website, emails, pictures and backup of the financial files on the CD/DVD or other media. In the big companies there must be an IT department or a network administrator who take cares of his backups. In this way digital devices can be protected however still a virus attack, hardware failure or simply human error can destroy this asset.
 
The other groups of the users live with the risk, either because they are not aware of the possible horror of the data loss due to any unwanted thing, so they don’t take it seriously. It should be clear that a multifaceted component at any day may fail to provide its services. If that scenario occurs one day then all data stored on the hard disks or any other storage devices may be lost. Study shows that 30 percent of the small businesses admit that they have no formal backup and storage procedures implemented in their organizations.
The majority of the small and big companies take backup of the critical data on the daily basis. But one out of three small businesses still wait until a problem occur before reviewing and implementing their data storage procedures.
Some basic questions before the recovery process starts.
1. What is the data, which needs to be recovered?
2. What happened when the hard drive failed?
3. How much data was on the hard drive?
4. What type of hard drive is it?
5. How fast do you need that data?
Recovering the critical data is a specialized process that requires the right software, hardware and the advanced techniques. In many failure-related cases, the chances of recovering the lost data from a damaged hard drive, ranges from 90% to 100%. If the electronic control panel is only damaged then it can be replaced and the hard disk can be reused. If the defect is of the mechanical nature then data recovery will be little bit tough. If the problem is related to the file system, which has caused the inaccessibility of the data then it can be recovered by using the data recovery software.
Data recovery can sometimes be worked out yourself with the help of good software and some tips. This is usually the situation when the drives are not physically damaged. If they are damaged, then you will need to send the drives to a specialist who will be able to recover the data. There is no foolproof method that where you will have 100% of your data recovered or your hard disk will never crash again. If you suspect any data corruption, data loss, drives corruption the possible symptoms can be.
• Previously accessible data is suddenly nowhere to be seen.
• Error messages will inform you that the device is not recognized
• Computer or hard disk will not function and no booting will start.
• There can be scraping or rattling sound in the hard disks.
• Hard drive may not spin and can be still.
All the above symbols indicate that the drive is corrupted.
Here are some of the good tips on how to recover the lost data.

1. Recovery through software: First try to find some good software, that can recover your lost data, from your technically inclined friends. They may have some good data recovery software.
2. Hardware Crash: If you have detected that your hard drive is crashed then tries the normal shutting down procedures. Just pull out the plug and do not wait. Never try to save or recover the data at this time as you may lose the other saved data as well.
3. Pinpoint the trouble in the hard disk: If you are not sure of the problem listen to your hard disk for any rattling or unusual sounds. If this is the case then you will need data recover service.
4. Determine the health of the drive: If you have determined that the drive is healthy, then you may still be able to recover the data by yourself, try using the software that can recover the data.
5. Slave disks: Try to connect the drive as a slave to another computer. In this way, you might be able to recover all the data. I have practically used this technique and I was successful in recovering the data.
6. Locate the corruption: You should locate the corrupted partition and this can easily be done by booting the system from the floppy drive or using the F disk command.
7. Shop for recovery software: Do an online research in Google for the data recovery software and see what software is ranked best and suits you. Usually the data recovery software is not free so you will have to buy it and it will surely recover your lost data if the problem is not severely mechanical.
8. Server Crash: If you are working on a server and it has been crashed then never to recover the data on the same server.
9. RAID Drive Crash: Replace the RAID data drive that fails and never ever use it again.
10. RAID Drives: Label the multiple drives in the RAID array.
11. Database files: In case of Microsoft Exchange or SQL failure, never try the direct recovery operations on the corrupted database file instead make a copy of the database files and then start recovery on these files.
12. Utilities: Do not try to run the system utilities such as Defragmenters and volume repair utilities.
13. Other utilities: Also avoid using Volume Repair utilities if there has been power outage or if the files system is corrupted.
14. Keep information: Always keep the following information handy.
- The size of the drive
- Operating system (i.e. Windows 98, Windows 2000 or Windows XP, etc.)
- Situation of failure (you must know that what happened just before the drive stopped working)
- Is the drive still recognized by the computer or not
15. Boot drive malfunction: If the corrupted drives also have the Operating systems then things are tricky and you can boot the system from the recovery software and in this way you can find you corrupted data and you can recover it to some safe place.
16. Avoid physical cleaning of drives: Never attempt to shake or clean the data drive at your own this can do harm to your hard drive physically.
17. Do not remove drive covers: Never try to remove the hard drive covers because they have to be used by the specialists for getting the configurations and features of the hard drive.
18. Dropping the hard disks: The hard disks should not be unstuck.
19. Exposure to water: Never try to expose the hard drive to water because there is not dryer to dry the hard disks.
20. Scrutinize the workplace: Pay full attention to the places where you have placed your computer because humid environment, warm places and shaky desk can do harm and can become the cause of the hard drive failure.
21. Firewalls: Make sure that you are well protected from the viruses, adware, malware, Trojan horses. An up to date anti virus and anti spyware should be installed on your computer and you should guard your PC with by putting it behind a firewall.
22. Physically damaged drives: If the drives have been corrupted physically they must be sent to a good laboratory where experts can recover the data.
If you have tried all the normal methods and still have a problem with your data then its best thing that you hunt a good data recovery company. You can find their websites and see the technical features of how to recover data and lost files from the crashed hard disks.
Read more ...

Computer Networking Useful Tips


How to Setup Workgroup and Computer Name in Windows XP-

Computer name is the unique identifier of the computer in the network. If you want to setup the computer name and the workgroup in the Windows XP then follow these steps.
1. My Computer>Right Click>click on Properties>
2. Assign unique computer name.
3. Assign the same workgroup name as of the other computers.
4. You will be prompted to restart the computer.

How to secure your computer network-

Securing a computer networking is the vital part of the administration of the network. There are different security threats of a computer network such as hacking, viruses, unauthorized user access, spywares, adware, Trojan horses and other malicious codes. If you are managing your computer network, it’s your responsibility to secure your network from all above mentioned aspects. Always install up to dated antivirus program such as Norton Antivirus, Trend Micro Antivirus, McAfee or Panda Antivirus. Enable firewall router or firewall software on your network to control the unauthorized access so that no intruder or hacker can access your network.  Filter the internet and monitor all the activities of the users on the internet. Block the risky websites and web applications. Install a network monitoring software and monitor the activities of users. Regularly update your software applications on the server and the client computers.
How to Share Printer and Folders in Windows XP-

If you have two or more computers then a computer network will be formed and there will be necessity to share the files and printers. For sharing the folders, you need to right click the folder > Sharing and Security > Share this folder on the network > give the shared name for this folder. You can set further rights and permissions on this folder for different users.
 
Sharing a printer is the same as sharing a folder on the network. Click start > Control Panel > Printer and Faxes > Right click on the printer name > Properties > sharing > Share this folder (set the shared name for the printer. This same shared name of the printer will be accesses from the other computers on the network to access and share the printer such as \\computename\printername

How to troubleshoot computer network using Ping command-

The PING command is the basic network troubleshooting command. Ping shows the status of the other computer whether it is on the network or not. Let’s say you have three computers in your computer network computer A (IP Address, 10.10.10.1), computer B (IP address 10.10.10.2) and computer C (IP address 10.10.10.3). You are on computer A and you want to check the connectivity of the computer B then you will need to go the Start > Run > type CMD > DOS screen will appear. Now type there ping 10.10.10.2 if you get the reply this means the computer B is connected on the network and if you get the timed out message then there is some problem in the connectivity. This can be due to different reasons like check both the ends of the network cables in the computer and in the Router/Switch, check if the green LED light is blinking in the network card of the computer also check if any software application blocking the network communication such as firewall or antivirus etc.

How to setup Xbox Network Connections-

Following is the simple configuration methods of Xbox network connectivity.
1. Go to the settings of Xbox Dashboard and then network settings. You will see IP address, DNS and some other settings.
2. Click IP settings. You can select to obtain the IP address and other settings automatically from the DHCP server or router.
3. Go to the previous menu and set obtain the DNS settings from the Router or DHCP server automatically.

How to Setup Roaming Profile in Windows 2000/2003-

Roaming profiles are saved on the network server. If you want your users to access their own roaming profiles then you need to open Active directory users and computers, right click on the user, then properties and then profile tab. In the profile tab type the UNC path of the user you made on the server like this \\servername\profiles\%username%. Profiles folder should be in the root of the C Drive. Make sure you have created the profiles folder on the C drive and shared it with the same name as the name of the folder. Next time when the user will log on from the client computer, his/her local profile will be saved in the folder same as the user name and this folder will be created in the profiles folder.

How to Install IIS in Windows XP-

Windows XP Professional edition has the built-in IIS. Internet information server is used to host the website on your own computer and these sites can be accesses from all over the world. IIS has great administrative features but it supports only 10 concurrent connections of the clients at a time.
1. Click start>settings>control panel>Add remove program
2. Click Add remove windows components.
3. Click on Internet information services > Details.
4. In the IIS check the boxes SMTP and World Wide Web and you can also check FTP if you want to setup it.
5. In Windows components selection, make sure that you have selected IIS and you may need to insert the CD of Windows XP Professional during the installation.

How to Setup Roaming Profiles in Windows 2000-

The TCP/IP component in the Windows operating systems is considered a core component so it cannot be easily uninstalled. Using the following commands with the certain switch you can however achieve the same results and by uninstalling and reinstalling the TCP/IP components.
netsh int ip reset [logfile]
Logfile is the name of the file that is used to records the actions by the netsh command.
netsh int ip reset iplog.txt is used to create the iplog.txt in the current directory.
Caution: Be very careful while using these commands because they can directly damage your system.

How to Hide a shared folder in Windows XP-

If you want to hide a shared folder from the network users, right click the folder and click sharing and security and give a shared name of a folder plus $ sign e.g. ebooks$. In this way network users will not be able to see the shared folder on the network. For you to see the hidden shared folder, map the drive and type in the path including the $ sign in the folder box.
Read more ...

Saturday 6 October 2012

Router Commands Overview

-Router Commands Overview-
In this section you will learn about the router commands, configurations, privileged mode commands, routing protocols, cisco labs and network configurations.
There are hundreds of basic and advance level commands of a router. It is not easy to remember all the commands. But some commands are frequently used and can be remembered with some practice. I have provided a list of the most commonly used commands based on their features and usage.
  You will find here some basic terminology of a router.
Routing: Routing is a process of moving the data (packets) through an inter network. Routing performs the two basic tasks. Define the paths for a packet and then forward the packets on the basis of defined paths. Routing can also be defined as the communication between two or more logically and physical networks and this communication (packet transfer) is brought by a router.
First of all you should remember the keyboard shortcuts of a router.
Keyboard Shortcuts
CTRL-N - show next command
CTRL-P - show previous command
SHIFT-CTRL-6 – Break

Configuring the Router:-
You will be able to learn the basic commands for configuring a router.
sh running-config - details the running configuration file (RAM)
sh startup-config - displays the configuration stored in NVRAM
setup - Will start the the automatic setup; the same as when you first boot the router
config t - use to execute configuration commands from the terminal
config mem - executes configuration commands stored in NVRAM; copies startup-config to running-config
 
config net - used to retrieve configuration info from a TFTP server
copy running-config startup-config - copies saved config in running config (RAM) to NVRAM or "write memory" for IOS under ver.11
copy startup-config running-config - copies from non-volatile (NVRAM) to current running config (RAM)
boot system flash - tells router which IOS file in flash to boot from
boot system tftp - tells router which IOS file on the tftp server to boot from
boot system rom - tell router to boot from ROM at next boot
copy flash tftp - Copies flash to tftp server
copy tftp flash - Restores flash from tftp server
copy run tftp - Copies the current running-config to tftp server
copy tftp run - Restores the running-config from tftp server


General Commands
Here is a list of the general commands. These are the basic level commands and most commonly used
no shutdown - (enables the interface)
reload - restarts the router
sh ver - Cisco IOS version, uptime of router, how the router started, where system was loaded from, the interfaces the POST found, and the configuration register
sh clock - shows date and time on router
sh history - shows the history of your commands
sh debug - shows all debugging that is currently enabled
no debug all - turns off all debugging
sh users - shows users connected to router
sh protocols - shows which protocols are configured
banner motd # Your customized message here # - Set/change banner
hostname - use to configure the hostname of the router
clear counters - clear interface counters


Privileged Mode commands of a router
Learn how to work in the privileged mode of a router.
enable - get to privileged mode
disable - get to user mode
enable password - sets privileged mode password
enable secret - sets encrypted privileged mode password
Setting Passwords on router
Here you will be able to learn how to set the password on a router.
enable secret - set encrypted password for privileged access
enable password - set password for privileged access (used when there is no enable secret and when using older software)
Setting the password for console access:
(config)#line console 0
(config-line)#login
(config-line)#password
Set password for virtual terminal (telnet) access (password must be set to access router through telnet):
(config)#line vty 0 4
(config-line)#login
(config-line)#password
Set password for auxiliary (modem) access:
(config)#line aux 0
(config-line)#login
(config-line)#password


Router Processes & Statistics
By these command you can see the statistics and different processes of the router.
sh processes - shows active processes running on router
sh process cpu - shows cpu statistics
sh mem - shows memory statistics
sh flash - describes the flash memory and displays the size of files and the amount of free flash memory
sh buffers - displays statistics for router buffer pools; shows the size of the Small, Middle, Big, Very Big, Large and Huge Buffers
sh stacks - shows reason for last reboot, monitors the stack use of processes and interrupts routines

IP Commands
Here is a list of the IP Commands
Configure IP on an interface:
int serial 0
ip address 157.89.1.3 255.255.0.0
int eth 0
ip address 2008.1.1.4 255.255.255.0

Other IP Commands:
sh ip route - view ip routing table
ip route [administrative_distance] - configure a static IP route
ip route 0.0.0.0 0.0.0.0 - sets default gateway
ip classless - use with static routing to allow packets destined for unrecognized subnets to use the best possible route
sh arp - view arp cache; shows MAC address of connected routers
ip address 2.2.2.2 255.255.255.0 secondary - configure a 2nd ip address on an interface
sh ip protocol

CDP Commands (Cisco Discovery Protocol uses layer 2 multicast over a SNAP-capable link to send data):
sh cdp neighbor - shows directly connected neighbors
sh cdp int - shows which interfaces are running CDP
sh cdp int eth 0/0 - show CDP info for specific interface
sh cdp entry - shows CDP neighbor detail
cdp timer 120 - change how often CDP info is sent (default cdp timer is 60)
cp holdtime 240 - how long to wait before removing a CDP neighbor (default CDP holdtime is 180)
sh cdp run - shows if CDP turned on
no cdp run - turns off CDP for entire router (global config)
no cdp enable - turns off CDP on specific interface


IPX Commands
Enable IPX on router:
ipx routing
Configure IPX + IPX-RIP on an int:
int ser 0
ipx network 4A

Other Commands:
sh ipx route - shows IPX routing table
sh ipx int e0 - shows ipx address on int
sh ipx servers - shows SAP table
sh ipx traffic - view traffic statistics
debug ipx routing activity - debugs IPS RIP packets
debug ipx sap - debugs SAP packets

Routing Protocols
RIP, IGPR and OSPF are the routing protocols and here is a list of the commands for the working on the routing protocols.
Configure RIP:
router rip
network 157.89.0.0
network 208.1.1.0
Other RIP Commands:
debug ip rip - view RIP debugging info
Configure IGRP:
router IGRP 200
network 157.89.0.0
network 208.1.1.0
Other IGRP Commands:
debug ip igrp events - view IGRP debugging info
debug ip igrp transactions - view IGRP debugging info
Access Lists
Here is a list of the Access list command of a router.
sh ip int ser 0 - use to view which IP access lists are applies to which int
sh ipx int ser 0 - use to view which IPX access lists are applies to which int
sh appletalk int ser 0 - use to view which AppleTalk access lists are applies to which int
View access lists:
sh access-lists
sh ip access-lists
sh ipx access-lists
sh appletalk access-lists
Apply standard IP access list to int eth 0:
access-list 1 deny 200.1.1.0 0.0.0.255
access-list 1 permit any
int eth 0
ip access-group 1 in
Apply Extended IP access list to int eth 0:
access-list 100 deny tcp host 1.1.1.1 host 2.2.2.2 eq 23
access-list 100 deny tcp 3.3.3.0 0.0.0.255 any eq 80
int eth 0
ip access-group 100 out
Apply Standard IPX access list to int eth 0:
access-list 800 deny 7a 8000
access-list 800 permit -1
int eth 0
ipx access-group 800 out
Apply Standard IPX access list to int eth 0:
access-list 900 deny sap any 3378 -1
access-list 900 permit sap any all -1
int eth 0
ipx access-group 900 out

WAN Configurations Commands
Networking over WAN is the main functionality of a router. The most common use of a router is for the WAN connectivity. Here is a list of the commands for the different methods of the WAN connectivity.

PPP Configuration
Point to point protocol is a method for the WAN connectivity and you will find here some commands of PPP.
encapsulation pppppp authentication
ppp chap hostname
ppp pap sent-username
sh int ser 0 - use to view encapsulation on the interface


Frame-Relay Configuration
One of the methods for the WAN connectivity is the Frame Relay. Find here some basic commands for the WAN connectivity through Frame Relay.
encapsulation frame-relay ietf - use IETF when setting up a frame-relay network between a Ciscorouter and a non-Cisco router
frame-relay lmi-type ansi - LMI types are Cisco, ANSI, Q933A; Cisco is the default; LMI type is auto-sensed in IOS v11.2 and up
frame-relay map ip 3.3.3.3 100 broadcast - if inverse ARP won't work, map Other IP to Your DLCI # (local)
keep alive 10 - use to set keep alive
sh int ser 0 - use to show DLCI, LMI, and encapsulation info
sh frame-relay pvc - shows the configured DLCI's; shows PVC traffic stats
sh frame-relay map - shows route mapssh frame-relay lmi - shows LMI info

Miscellaneous Commands
In the last but not least here is a list of the some miscellaneous and useful commands
sh controller t1 - shows status of T1 lines
sh controller serial 1 - use to determine if DCE or DTE device
(config-if)#clock rate 6400 - set clock on DCE (bits per second)
(config-if)#bandwidth 64 - set bandwidth (kilobits)
Read more ...

Internet Fax Services

Introduction to Internet Fax Services
Here you will learn internet fax server overview and general introduction to the online faxing methods, how to send a fax and online services. A fax server consists of these things a PC, which is connected to the LAN, Fax server software installed on the PC and a Fax modem or a Fax board. Fax messages can be stored as printable documents, spread sheet, database or graphics. When someone wants to fax the documents, they can print the document to the fax printer then put the recipient information such as name and fax number, select the cover letter, type your message and then send the fax through the faxing software installed on your PC. 
Alternatively, you can send the fax to the email messages and can take the fax number from the outlook express contact’s list. Sending fax through PC typically takes less than 30 seconds.
Alternatively, fax server can also be setup to receive the faxes and after receiving the faxes, these can be sent to the printer machine or can be sent to the specific recipient’s email address to notify them that he/she has received a fax.
There are certain advantages of the PC fax server, which I have discussed as follows.
1. The main feature of the Fax server is that it saves your time and cost and you can send the fax in the same way as you send emails and attached the fax to send to the recipients.
2. Invoicing, purchase orders and requested information can be scheduled to be faxed to the intended recipients. 
3. Fax server will also retry if the recipient number is busy or if there is any error in the number.
4. You can also save the fax numbers of the frequent users.
5. Fax books also make it easy to send the faxes to the groups of people and at the scheduled times.
6. The faxes that are sent directly through the PC are looks better in terms of the resolution.
7. You can also manage the fax server to redirect the receiving faxes to the appropriate recipient so ensuring the security and timely receiving of the faxes.
8. The administrators can automate many functions of the fax server. A fax server can be configured to automatically send the invoices, purchase orders and the promotional newsletters. Additionally, a fax server can work without papers and reduces the overhead of putting and checking the papers again and again. Fax messages can be stored in your PC.
 

What is a Internet Fax
Internet fax is a device that uses IP networks to transmit the faxes instead of the PSTN. Internet fax uses e-mails as the medium for sending the faxes. Internet fax services include email to fax, fax to email and PC to fax (sending faxes from your computer). Internet fax is type of service, which enables you to send and receive the faxes in a timely manner without a fax machine. Only an email accounts is required to setup your Internet fax account.
Subscribers have to monthly fees to the internet fax service providers. Internet fax service providers usually works in a way that when a fax is sent to the subscriber’s number, the fax service receives the fax and send it to the recipient’s email address as an attachment.
All you need is to have the registered email address with the internet fax service providers. You have to write the fax content in the body of the email and type the fax number in the “To” field with a @ sign and a internet fax service name e.g 14545668999@efax.com. In the subject field sender can write the name of the recipient.
There is a small tool bar in the system tray for sending and receiving the faxes and it comes after installing the fax software. Upon receiving the email to the Internet fax service providers the automated programs convert the email messages to the fax format and send the fax to the recipient fax number. On the other, hand the recipient receives the fax on their fax machine normally.
The Internet fax services provide very ease and you assigned a fax number, which has to be active 24 hours so that you account can accept the faxes. On the other hand, the working of the regular fax machine is typically depends on your telephone line, which should be free while sending and receiving the fax. Internet fax service also saves your papers and the need of the fax machine.
Internet fax service is very familiar to the sending and receiving the email messages and it also saves the cost and time so many people are likely to use this service.
Another big advantage is given by the Internet service providers is that it offers the toll free numbers to its subscribers in USA and Canada. So the people from USA and Canada can send faxes for free. Most internet fax services costs $10-20 per month. The communication charges are greatly reduced as opposed to the conventional fax machines, which costs a user per page.
Get a general overview of the best Email to Fax Service reviews here!
Read more ...

Windows 2000 Server Installation


Windows 2000 Server Installation Overview
In this section you will learn the basicss of windows 2000 server installation, how to install window, active directory, domain controllers, system configurations. Being a network administrator or Microsoft Windows 2000  Server support professional, one of your job description tasks is Windows Server Installation. 

Step #1: Planning for your installation
When you run the Windows 2000 Server setup program you must know that how to install the Windows 2000 server. Thorough planning can make you avoid potential problems during the installation process. So, it’s necessary to do some paper work and make a good plan before installing the Windows 2000 server operating system. You must know the needs of your office network, server hardware and software to be installed on your server. 
Without a proper plan Potential problems can occur in the future and work can become more hectic.
There are some important points, which you should take into account before starting the installation process.
1. Check System requirement
2. Check hardware and software compatibility
3. Check the disk partitioning options
4. Select the file systems according to your needs.
5. Decide workgroup or domain installation
6. Complete a pre installation checklist.
Once you are making sure about these things you can start the installation process.
 

Step #2: Starting the installation process
You can install Windows 2000 Server in different ways, all the methods are valid and which method you choose is depends on your needs and limitations. Manual installation process can be divided into different ways as followings.
• Boot from CD- This is a fresh installation and no existing partition is required.
• Boot from the 4 setup disks and then insert the CD, in this way also not existing partition is required.
• Boot from an MS-DOS startup floppy disk, go to the command prompt, create a 4GB FAT32 partition with FDISK command, reboot the computer, format the C partition, you have created and then go to the CD drive, go to the i386 folder and run the Winnt.exe command.
• In the other methods, run an already installed operating system such as Windows NT 4.0 Server and from within the NT 4.0 go to the i386 folder in the Windows 2000 Server installation CD and run the WINNT32.exe command. This will upgrade the  Windows NT Server 4.0 to the Windows 2000 Server.
• Alternatively, if you want to upgrade from Windows 98 into Windows 2000 Professional you can follow the same steps as I have described in the above installation method. But you cannot upgrade Windows 98 into Windows 2000 server.
Additionally, there are other automated installation methods, such as uninstallation method by using an unattended file, using Sysprep, using RIS or running the uninstallation method by the CD itself.
It doesn’t matter that which installation method you use to install Windows 2000 Server or Professional. All methods look alike and the main function is the same.

Step #3: Text based portion of the setup
The setup process starts loading a blue-looking text screen. In this way you will be asked to accept the license agreement EULA and choose a partition on which you want to install Windows 2000 and you will be also asked to format the partition if the partition is new FAT, FAT32 or NTFS. The setup process begins loading a blue-looking text screen (not GUI).
1. Select to boot the computer from CD.
2. At this stage you can press F6 if you need to install the additional SCSI adapters or other storage devices. If you choose it then you will be asked to provide the floppy disk for the drivers.
3. Setup will get all the required drivers and files.
4. Now select to setup Windows 2000. At this point, if you want to fix some problems in the previously installed operating systems then you will have to press R. If not, then just press enter to continue with the fresh installation.
5. If you haven’t made any partition then you will get a warning message to create a partition and delete the old partitions. You can specify the partition size here. If you want to continue then press C.
6. Accept the license agreement and press F8.
• Select or create the partition on which you will install W2K.
• If you hard disk is already partitioned but don’t have enough disk space for the installation, you can create an additional partition from the unpartitioned space. If the hard disk is already partitioned, but has enough unpartitioned disk space, you can create an additional partition in the unpartitioned space. If the hard disk already has a existing partition, you can delete it to create more unpartitioned space for the new partition. By deleting the old partition you will delete all data on that partition.
If you select a new partition during Setup, create and size only the partition on which you will install Windows 2000. After installation, use Disk Management to partition the remaining space on the hard disk.
7. Select the file system like FAT32, NTFS for the installation partition. After you create the partition, select a file system. After selecting the file system, it will ask you to format the disk. Windows 2000 supports FAT, FAT32 and NTFS file system. You can get access to the local data on your hard disk, if it is formatted with the NTFS and if your operating system is Windows Server 2003, Windows XP Professional, Windows 2000 and Windows NT. If you plan to get data on your local hard disk’s drive where Windows 95 or Windows 98 is installed then you will have to use FAT or FAT32 file systems.
8. Setup will then begin copying files after formatting the disk, from the installation point (CD, local i386 or a network share).
9. After copying files step is completed the computer will be restarted in the graphical mode.
Step #4: Graphical user interface (GUI) based setup portion
After the first reboot and copying the necessary installation files the setup comes in the graphical mode.
Next it will load the device drivers based on the hardware it finds in your computer.
At this point, you can change the regional settings if you want.
1. Install the Hebrew language support at this point.
2. Here type your name and organization name.
3. Next type product key.
4. Enter the appropriate license types and the number of the purchased licenses.
5. Here you type the computer name and the password of the local administrator account. The local administrator account is based in the SAM of the computer and is used for the locally administrative tasks
4. Next choose which network or other components to be installed on the system.
5. Next select the date, time and zone settings.
6. Setup now will install the networking components.
Press Next to accept the typical settings option if you have one of the following situations:
• You have DHCP on your network.
• Your computer running Internet Connection Sharing (ICS).
• You are in a workgroup environment and do not plan to have any other servers or Active Directory at all, and all other workgroup members are configured in the same manner.
Otherwise select Custom Settings and press Next to customize your network settings.
7. You should highlight the TCP/IP section and press Properties.
In the following general tab enter the necessary information. You should specify the IP address, and if you don't know what the Subnet Mask entry should be - you can simply place your mouse pointer over the empty area in the Subnet Mask box and click it. The operating system will automatically detect the settings.
If you are a stand alone computer or you don’t have the sufficient rights, leave the default entry selected and press next.
8. In the next stage setup process will finish copying files and configuring the setup.
9. Next the setup process finishes and displays the finish window.
10. Next Windows 2000 reboots and you after reboot you get the CTRL-ALT-DEL window.
11. Congratulations. You are done. Windows 2000 has been installed on you computer.
Read more ...

How to Configure a Network


How to Configure a Network
In this section you will learn how to configure a network, peer to peer, client server, workstation, server, basic data communication.

Peer to Peer network model
Before configuring a computer network, you have to decide that, which networking model you require. There are two main types of network models. Peer to peer and client-server network model. In the peer to peer network model you simply use the same Workgroup for all the computers and a unique name for each computer.
Additionally, you will have to give a unique IP address of the same class A, B, or C for all the computers in your network and its related subnet mask e.g if you decide to use class A IP address for your three computers in your Peer to Peer network then your IP address/Subnet mask settings can be as follows.
Computer Name IP Address Subnet Mask Workgroup
PC1 100.100.100.1 255.0.0.0 Officenetwork
PC2 100.100.100.2 255.0.0.0 Officenetwork
PC3 100.100.100.3 255.0.0.0 Officenetwork
Please note that the above example is for only illustration purpose so you can choose any IP address, computer name and workgroup name of your interest.
For doing this right click on My Computer and then click Properties then go to the Network Identification section and set these.
In a peer to peer network all computers acts as a client because there is not centralized server. Peer to peer network is used where not security is required in the network.
 
If a computer fails to work then all other computers work normally in peer to peer network.

Client/Server Network Model
In the client/server network model a computer plays a centralized role and is known as a server all other computers in the network are known as clients. All client computers access the server simultaneously for files, database, docs, spreadsheets, web pages and resources like hard diver, printer, fax modem, CD/DVD ROM and others. In other words, all the client computes depends on the server and if server fails to respond or crash then networking/communication between the server and the client computes stops.
If you want to configure a client-server network model then first prepare the server. Install Windows 2000 or Windows 2003 Server from the CD on the server computer and make a domain. You can create a domain by this command on the Run “DCPROMO”. You can give this command once you install the server successfully. After you give the DCPROMO command you will be asked for a unique domain name. All the client computers will use the same unique domain name for becoming the part of this domain. This command will install the active directory on the server, DNS and other required things. A step by step wizard will run and will guide you for the rest of the steps. Make sure that a network cable is plugged in the LAN card of the server when you run the DCPROMO.exe command.
When the Active directory is properly installed on the server, restart the server. You can create network users on the server computer and also name/label the network resources like computers/printers etc.
Once you install the server successfully now come to the client computers. Install Windows 2000 professional on your all client computers. Once you install the Windows 2000 professional on the clients the next step is to make this computer (client computer) a part of the network.

Configuration Steps
1. Choose a unique name for each client computer
2. Choose unique IP address for each computer and relevant.
3. Use the same domain name for all client PCs.
Network/System administrators are required to do these administrative tasks on the server and client computers. Any shared resources on the network either on the server or the clients can be access through the My Network Places in the Windows 2000 platform. There is another way to connect to the shared resources by giving this command in the run \\ComputerName\SharedDriveLetter.
Network configurations steps can be implemented by right clicking the My Computer>Properties>
For giving the IP address you will have to right click on the My Network places>properties>Local Area Connection>Properties>Internet Protocols (TCP/IP)>Properties and then give the IP address and subnet mask of the same range and class for all the computers in the network.
Read more ...
Designed By Blogger Templates