APIPA address, range of APIPA address.


APIPA ADDRESS (Automatically private IP addressing)

It is also called as free of cost IP address which is used to create temporary network when we use alternative IP address from DHCP server but suddenly DHCP server do not respond to clients computer then Microsoft windows and other applications automatically assign an APIPA address for temporary connectivity.

Range of APIPA address       
169.254.0.0 to 169.254.255.255
How to share data in WIN 7, Vista, XP
  • ·         Firstly set IP address on both the computers of class.
  • ·         Create a folder/It can be any folder
  • ·         R/c on the folder
  • ·         Properties
  • ·         Now a wizard will open go to sharing
  • ·         Make a check on share this folder
  • ·         Now go to advance sharing (in this option we can give full control to second computer also by checking on full control or else by default it is read only)
  • ·         OK
  • ·         Apply
  • ·         OK
How to access the shared folder
  • ·         Check physical and logical connectivity by using Ping command.
  • ·         Go to START>RUN>CMD>OK
                  Or
  • ·         Press win key and R together
  • ·         Then Ping 10.0.0.1
  • ·         Ok (if it will ping means 100% connectivity)
  • ·         Now, START>RUN>\\10.0.0.1 (this will show all the shared folder on this computer)
  • ·         Now Ping the other computer IP address on the first computer.
  • An authentication wizard will open which will ask username and password of the computer if we know the password then folder can be accessed.


REMOTE DESKTOP
You can use Remote Desktop Connection (RDC) to connect to a remote computer on your network or the Internet and use the remote computer as if you were physically in front of it. Before you can connect toa remote computer, it needs to be turned on (available for a network connection). It also has to be set up to allow users to connect to it remotely. You can allow anyone to connect to the remote computer, or you can specify users with a password. After the remote computer is set up, you can use RDC to connect to it. When the RDC dialog box opens, you need to have the name or IP (Internet Protocol) address of the remote computer and, if required, the username and password specified on the remote computer for security purposes. In the RDC dialog box, you can also customize settings for the remote connection, which include the display size and color depth, when to use local or remote resources, and what programs to use and options to allow. Once you connect to the remote computer, the remote desktop appears on your screen and is ready to use.

If you don’t have a username on your network to obtain remote access, read through

  • ·         In the Control Panel window, click the System and Security link
  •  
  • ·         Click the Allow remote access link under System, then click Yes, if necessary, to grant
  •              Permission to access the dialog box
  •  
  • ·         Click the Allow connections only from computers running Remote Desktop with
  •              Network Level Authentication (more secure) option button, and then click OK if necessary in
  •              The Remote Desktop dialog box regarding sleep mode
  •  
  • ·         Click Select Users
  •  
  • ·         Click Add
  •  
  • ·         Enter a username in the Enter the object names to select box as indicated by your
  •              Network administrator, clicks Check Names, then click OK
  •  
  • ·         Click the username, click Remove, then click OK to close the Remote Desktop Users
  •              Dialog box
  •  
  • ·         Click the option that was previously selected before following the steps to set up a remote  computer or click the Don’t allow connections to this computer option button, then click OK


File System
File system is a way of organizing files on a storage device like a hard disk drive, pen drive, memory card, DVD writer, DVD drive, CD ROM and other removable devices.

Types of file system
1)   FAT (File allocation table)
·         It is 32-bit file system
·         FAT provides user level security
·         No security like in NTFS
·         FAT supports drives upto 2TB

2)   NTFS (New technology file system)
·         It is 32 & 64 bit file system
·         NTFS provides data level security such as data compression, data encryption, data (disk) quota
·         NTFS supports high level authentication protocol for managing the logical server OS.
·         Shadow copies feature utility is also provide in NTFS in server OS only.
·         Disk quota reserves the space in the server to user in a particular day.
 Soft quota (we can set a warning eg.100MB for 1GB)
Hard quota (in this quota the system stops working eg. At 1024MB we can set hard quota)

No comments:

Post a Comment