Share resources on wins server

Assignment Help Computer Networking
Reference no: EM1376971

Your friend has a small design shop with Windows NT 4.0, Windows 2000, and Windows XP workstations. He has one older Windows NT computer acting as a file server and a Linux computer running as a firewall on the DSL line. Previous to the current network setup, your friend's shop used what he assumed was the default Windows scheme- NetBIOS over NetBEUI. Now a new client wants your friend's shop to log on to its WINS server so they can share resources more directly. With security in mind, what do you tell your friend to do? Why? What are his (and his client's) alternatives?

Verified Expert

Reference no: EM1376971

Questions Cloud

Job opportunities in greece : Assume you had to write a paper on job chances in Greece. Conduct an Internet search on the topic. Which search engine and website did you use?
Snmp security : SNMPv1 is the most commonly used version of SNMP even though it provides little support for security. Why not change to another version of SNMP?
Discussion on criminal behavior : Discuss some recent support for the idea of criminal career pathways was put forward by Sheila Royo Maxwell and Christopher Maxwell in their study of the career paths of young female offenders.
Discussion on health services programs : Determine the current and unmet requires of children and child abuse explain the possible obstacles that are preventing resolution of the problem
Share resources on wins server : Client wants your friend's shop to log on to its WINS server so they can share resources more directly. With security in mind, what do you tell your friend to do? Why?
Presentation on a safety unit : Strat discussing, planning and researching a Safety Unit Presentation - work as a Safety Unit for an industrial company and create a strategy for implementing, maintaining,
What is mm capital structure theory : What is MM capital structure theory without taxes and bankruptcy costs and what is the break-even EBIT? How to find the break-even point?
Implementation of theoretical approach : Suppose you are a human services employer at a shelter for houseless women and their children. The targets of the shelter are to give food and shelter on a temporary basis to women & their children,
Implement bounded partial queue by using signaling mechanism : Implement the same using a signaling mechanism that signals to all waiting dequeuers and do a performance comparison using timing analysis. Which works faster?

Reviews

Write a Review

Computer Networking Questions & Answers

  Design ip addressing scheme for five departments

You are hired to design an IP addressing scheme for five departments that will give security and access to Internet. Each department requires between 1,500 - 2,000 IP addresses.

  Does rule list any particular oddities-protocol makes unique

Does rule list any particular oddities or protocol(s) or anything which makes it unique (such as messages)? If so, list these. If not, what must be included?

  Processor execute between receipt of message

Assume that we are working on a workstation with an instruction rate of 500 MIPS. How many instructions can the processor execute between the receipt of each individual bit of the message?

  Describing status of 3g and 4g network technologies

Describe in scholarly detail status of 3G and 4G network technologies and even challenge yourself to find out any research on future of 5G technology.

  How to assign ip addresses to various subnets

Suppose the university has the 128.100.xxx.xxx address range on the Internet. How would you assign the IP addresses to the various subnets?

  Explaining bus collision avoidance protocol

Some network designers used alternative bus collision avoidance protocol known as the token bus protocol.

  How many bits delivered to network-layer ptotocol

The destination network has a maximum packet size of 1240 bits. How many bits,including headers,are delivered to the network-layer ptotocol at the destination?

  Wireless technologies to access various network resources

The following are the four main wireless technologies used to access various network resources: Radio wave, Infrared. Explain three advantages and three disadvantages of each of these wireless technologies.

  Acknowledge technoogy-s polypotency

Richard Sclove argues that we must do more to acknowledge technoogy's 'polypotency.' What does this term mean, why does Sclove think that it is significant to acknowledge this characteristic of technology?

  Draw potential network architecture of data network

Draw the potential network architecture of the data network for secondary campus to main campus of university (Detail and describe the function of each component in the network.

  What frames are in sender-s window range

Then the sender learns of acknowledgment of 0,1,2,5. What frames are in sender's window range just after this event?

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd