Share resources on wins server

Assignment Help Computer Networking
Reference no: EM1376971

Your friend has a small design shop with Windows NT 4.0, Windows 2000, and Windows XP workstations. He has one older Windows NT computer acting as a file server and a Linux computer running as a firewall on the DSL line. Previous to the current network setup, your friend's shop used what he assumed was the default Windows scheme- NetBIOS over NetBEUI. Now a new client wants your friend's shop to log on to its WINS server so they can share resources more directly. With security in mind, what do you tell your friend to do? Why? What are his (and his client's) alternatives?

Verified Expert

Reference no: EM1376971

Questions Cloud

Job opportunities in greece : Assume you had to write a paper on job chances in Greece. Conduct an Internet search on the topic. Which search engine and website did you use?
Snmp security : SNMPv1 is the most commonly used version of SNMP even though it provides little support for security. Why not change to another version of SNMP?
Discussion on criminal behavior : Discuss some recent support for the idea of criminal career pathways was put forward by Sheila Royo Maxwell and Christopher Maxwell in their study of the career paths of young female offenders.
Discussion on health services programs : Determine the current and unmet requires of children and child abuse explain the possible obstacles that are preventing resolution of the problem
Share resources on wins server : Client wants your friend's shop to log on to its WINS server so they can share resources more directly. With security in mind, what do you tell your friend to do? Why?
Presentation on a safety unit : Strat discussing, planning and researching a Safety Unit Presentation - work as a Safety Unit for an industrial company and create a strategy for implementing, maintaining,
What is mm capital structure theory : What is MM capital structure theory without taxes and bankruptcy costs and what is the break-even EBIT? How to find the break-even point?
Implementation of theoretical approach : Suppose you are a human services employer at a shelter for houseless women and their children. The targets of the shelter are to give food and shelter on a temporary basis to women & their children,
Implement bounded partial queue by using signaling mechanism : Implement the same using a signaling mechanism that signals to all waiting dequeuers and do a performance comparison using timing analysis. Which works faster?

Reviews

Write a Review

Computer Networking Questions & Answers

  Explain benefits of providing synchronization tool

Using a FIFO policy, slim reader-writer locks favor neither readers nor writers, nor are waiting threads ordered in a FIFO queue. Explain the benefits of providing such a synchronization tool.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Explaining bayesian belief networks

A quality control manager has used algorithm C4.5 to come up with rules that classify items based on several input factors. The output has two classes -- Accept and Reject. An item classified as Reject is actually good?

  Outline a new network security design

Utilize the following information to outline a new network security design. Employee breakdown; 2 partners, 28 accountants, 5 administrative assistants, 2 technology specialists, 1 human resources manager.

  Distinguish between any web pages or web servers

Suppose the role of IT consultant to new nonprofit organization, Free Flu, which gives flu shots to elderly. Distinguish between any Web pages or Web servers you would use for this task.

  Design network to integrate wireless-existing wired network

Design a network that will integrate a wireless network into an existing wired network. The wired network consists of five departments in a two-story building.

  Explain nefarious computer activities

Write a short description of what they are and include your assessment of whether this activity is something to worry about or not.

  Describing status of 3g and 4g network technologies

Describe in scholarly detail status of 3G and 4G network technologies and even challenge yourself to find out any research on future of 5G technology.

  Explain use of windows server network operating system

It has already decided to use Windows Server 2003 network operating system. What type of LAN will your team design for this company?

  Make arrangement of subnet masks to form subnets

Organization owns network 200.1.1.0/24 and wants to form subnets for 4 departments. Write a possible arrangement of subnet masks to make this possible.

  Explaining client-server environment

You are administrator of a client-server environment. What type of network would you install and how would pieces and components of this network relate to each other?

  Determining the size of data in frame

How many fram need to sent? Determine the size of data in each frame?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd