Your Ad Here
Your Ad Here

In Facebook

Popular Topics

ജാലകം

What is NAT and PAT

03 October, 2012




WHAT IS NAT

Network Address Translation (NAT) is simply that – it takes a network address, and “translates” it to another network address.  It is a simple lookup table, where each row is created  by a router command with the two addresses.  The user address is behind the router on the LAN interface, and the Internet address is sent out across the serial interface.

Static NAT
For security - requires n Internet IP addresses -  assign unique, unregistered local IP addresses to all users, and use unique Internet addresses as well.  Users can all use the same port.
Static NAT offers enhanced security - the actual IP address of the user is hidden.  A router running NAT (RFC1631) allows the users to maintain anonymity, because their addresses are not sent out to the world.  Users will typically use addresses from one of three reserved address spaces, the most famous being the “10” Class A address range.
Source
Computer
Source
Computer's
IP Address
NAT Router's
IP Address
A
10.0.0.1
215.37.32.201
B
10.0.0.2
215.37.32.202
C
10.0.0.3
215.37.32.203


Dynamic NAT (NAT & PAT)
for overloading - requires 1 outside Internet IP address - assign unique, unregistered local IP addresses to all users.  Must use unique ports for each user !!!
Dynamic NAT allows overloading - multiple users access the Internet via one IP address.  This is used by Microsoft ICS (Internet Connection Sharing) and by DSL routers that have several home user PC’s connected.  In fact, every Cable/DSL Broadband Router on the market accomplishes its job with NAT.

Source
Computer
Source
Computer's
IP Address
Source
Computer's Port
NAT Router's
IP Address
A
10.0.0.1
400
215.37.32.201
B
10.0.0.2
50
215.37.32.201
C
10.0.0.3
3750
215.37.32.201







Continue Reading | comments

Requirment of Windows 2008 server

30 September, 2012






Component Requirement

Processor: 
Minimum: 1GHz (x86 processor) or 1.4GHz (x64 processor) • Recommended: 2GHz or faster Note: An Intel Itanium 2 processor is required for Windows Server 2008 for Itanium-based Systems

Memory:
Minimum: 512MB RAM • Recommended: 2GB RAM or greater • Maximum (32-bit systems): 4GB (Standard) or 64GB (Enterprise and Datacenter) • Maximum (64-bit systems): 32GB (Standard) or 2TB (Enterprise, Datacenter and Itanium-based Systems)

Disk Space Requirment:
Minimum: 10GB • Recommended: 40GB or greater Note: Computers with more than 16GB of RAM

Display:
Super VGA (800 x 600) or higher-resolution monitor • Keyboard • Microsoft Mouse or compatible pointing device

Upgrade Note

If you are currently running:You can upgrade to:
Windows Server 2003 Standard Edition (R2, Service Pack 1 or Service Pack 2)Full Installation of Windows Server 2008 Standard Edition
Full Installation of Windows Server 2008 Enterprise Edition
Windows Server 2003 Enterprise Edition (R2, Service Pack 1 or Service Pack 2)Full Installation of Windows Server 2008 Enterprise Edition
Windows Server 2003 Datacenter Edition (R2, Service Pack 1 or Service Pack 2)Full Installation of Windows Server 2008 Datacenter Edition
Continue Reading | comments

Difference Between Windows server 2008 and R2

01 September, 2012



 Windows 2008 Server,

Windows Server 2008 (Win2k8) is one of Microsoft Windows' server line of operating systems. Released to manufacturing on February 4, 2008, and officially released on February 27, 2008, it is the successor to Windows Server 2003, released nearly five years earlier.

Windows Server 2008 is built from the same code base as Windows Vista; therefore, it shares much of the same architecture and functionality.

Whats in Windows Server 2008 :
Virtualisation:
Server Core
IIS
Role Based Installation
RODC
NAP
Bit Locker
Powershell
Fail-over Clustering
Self Healing NTFS
System Resource Manager





Windows Server 2008 R2,

Windows Server 2008 R2 is a server operating system produced by Microsoft. It was released to manufacturing on July 22, 2009 and launched on October 22, 2009. According to the Windows Server Team blog, the retail availability was September 14, 2009.[4] It is built on Windows NT 6.1, the same kernel used with the client-oriented Windows 7. It is the first 64-bit-only operating system release from Microsoft.

Whats New in Windows Server 2008 R2:
64-Bit Only
Support for 256 cores
Core Parking
Remote Desktop Services
New Hyper-V
Live Migration
Support .NET Frameworks in Server Core
Powershell 2.0
Remote Server Management
Active Directory Administrative Center
Continue Reading | comments

How Search Engines Works

17 July, 2012

What is search Engine?
Basically, a search engine is a software program that searches for sites based on the words that you designate as search terms. Search engines look through their own databases of information in order to find what it is that you are looking for.
When people use the term search engine in relation to the Web, they are usually referring to the actual search forms that searches through databases of HTML documents, initially gathered by a robot.

There are basically three types of search engines: 

1. powered by robots (called crawlers; ants or spiders)
2. powered by human submissions
3. hybrid of above two



Crawler-based search engines are those that use automated software agents (called crawlers) that visit a Web site, read the information on the actual site, read the site's meta tags and also follow the links that the site connects to performing indexing on all linked Web sites as well. The crawler returns all that information back to a central depository, where the data is indexed. The crawler will periodically return to the sites to check for any information that has changed. The frequency with which this happens is determined by the administrators of the search engine.

Human-powered search engines rely on humans to submit information that is subsequently indexed and catalogued. Only information that is submitted is put into the index.

Continue Reading | comments (1)

4G Technology

13 July, 2012

Fourth Generation Mobiles




4G also called as Fourth-Generation Communications System, is a term used to describe the next step in wireless communications. A 4G system can provide a comprehensive IP solution where voice, data and streamed multimedia can be provided to users on an "Anytime, Anywhere" basis. The data transfer rates are also much higher than previous generations.

The main objectives of 4G are:

1) 4G will be a fully IP-based integrated system.

2) This will be capable of providing 100 Mbit/s and 1 Gbit/s speeds both indoors and outdoors.

3) It can provide premium quality and high security.

4) 4G offer all types of services at an affordable cost.

4G is developed to provide high quality of service (QoS) and rate requirements set by forthcoming applications such as wireless broadband access, Multimedia Messaging, Video Chat, Mobile TV, High definition TV content, DVB, minimal service like voice and data, and other streaming services.

4G technology allow high-quality smooth video transmission. It will enable fast downloading of full-length songs or music pieces in real time.

The business and popularity of 4Gmobiles is predicted to be very vast. This 4Gmobile market will be over $400B and it will dominate the wireless communications, and its converged system will replace most conventional wireless infrastructure.

Data Rates For 4G:

The downloading speed for mobile Internet connections is from 9.6 kbit/s for 2G cellular at present. However, in actual use the data rates are usually slower, especially in crowded areas, or when there is congestion in network.

4G mobile data transmission rates are planned to be up to 20 megabits per second which means that it will be about 10-20 times faster than standard ASDL services.

In terms of connection seeds, 4G will be about 200 times faster than present 2G mobile data rates, and about 10 times faster than 3G broadband mobile. 3G data rates are currently 2Mbit/sec, which is very fast compared to 2G's 9.6Kbit/sec
Continue Reading | comments

Windows Server 2012

12 July, 2012




Windows Server 2012, formerly codenamed Windows Server 8, is the next release of Windows Server currently under development by Microsoft. It is the server version of Windows 8 and the successor to Windows Server 2008 R2. Windows Server 2012 will be the first version of Windows Server to have no support for Itanium-based computers since Windows NT 4.0. A developer preview (a pre-beta release) was released on 9 September 2011 to MSDN subscribers. On March 1, 2012, Microsoft issued a public beta (build 8250). On April 17, 2012, Microsoft announced the product name would be Windows Server 2012.. On May 31, 2012, Microsoft announced the release candidate (RC) for Windows Server 2012

Main Features of Windows server 2012:  

 1. User Interface
 2. Task Manager
 3. Installation option
 4. IP Address management
 5. Active Directory
 6. Hyper-V
 7. Cloud

System Requirement:

Architecture: 64 Bit

CPU- 1.4 Ghz
Memory - 512 MB
Hard disk Space - 32 GB (more if there is 16 GB of RAM or more)

Editions
1. Foundation
2. Essential
3. Standared
4. Datacenter
Continue Reading | comments

Windows 2008 Server Editions


Windows Server 2008 and Windows Server 2008 R2 is a server operating system produced by Microsoft. It was released to manufacturing on July 22, 2009 and launched on October 22, 2009. According to the Windows Server Team blog.
There are seven editions: Foundation, Standard, Enterprise, Datacenter, Web, HPC Server, Itanium and Windows Storage Server 2008 R2(Essentials Edition).

Processor
1.4 GHz x86-64 or Itanium 2 processor
Memory
Minimum:512 MB RAM (may limit performance and some features)
Recommended:2 GB RAM
Maximum: 8 GB RAM (Foundation), 32 GB RAM (Standard), or 2 TB RAM (Enterprise, Datacenter and Itanium-Based Systems)
Display
Super VGA (800 x 600) or higher
Disk Space Requirements
Minimum (editions higher than Foundation): 32 GB or more
Minimum (Foundation edition) 10 GB or more.
Computers with more than 16 GB of RAM require more disk space for paging and dump files.
Other
DVD drive, keyboard and mouse, Internet access (Optional, but required for updates and online activation)

 Edition Comparison Chart:


click  picture to Enlarge



Continue Reading | comments

Difference Between Hub,Switch and Router

03 June, 2012





Hub


A common connection point for devices in a network. Hubs are commonly used to connect segments of a LAN. A hub contains multiple ports. When a packet arrives at one port, it is copied to the other ports so that all segments of the LAN can see all packets.



There are three main points to remember about hubs:
  • Many kinds of nodes can be connected to the hub with networking cable.
  • All hubs can be uplinked together, either with straight-through cable or cross-over cable, depending on whether or not the hub has an uplink port.
  • Performance will decrease as the number of users is increased.


When choosing a hub, the main consideration should be performance. If the hub is 100Mbps and there are five users, each user will receive only 20Mbps of bandwidth. If the hub is intended for a small network with very little traffic, this should not be a problem. However, if the network is large or expected to expand, a switch is a better option in the end.
When considering a hub, always remember that the network may expand in the future. Try to buy a hub that has enough ports to allow expansion without more hardware purchases. If expansion is not an immediate concern, remember that in the future you can add more hubs.
The standard hub is great for starting a small network, or providing a network to one department. There are two basic types: 10baseT, which will support a speed of 10Mbps; and 100baseTX, which supports 100Mbps. A standard 10baseT hub cannot connect to hardware that runs at 100Mbps unless a switch or hub with auto-sensing capabilities is used between them. If your network is small and will not require expansion in the near future, a standard hub is the perfect solution.



Switch


In networks, a device that filters and forwards packets between LAN segments. Switches operate at the data link layer (layer 2) and sometimes the network layer(layer 3) of the OSI Reference Model and therefore support any packet protocol. LANs that use switches to join segments are called switched LANs or, in the case of Ethernet networks, switched Ethernet LANs.


e



Switches also run in full duplex mode, which allows data to be sent and received across the network at the same time. Switches effectively double the speed of the network when compared to hubs, which only support half duplex mode.
A 10/100Mbps switch can also support hardware running at either 10Mbps or 100Mbps, allowing the continued use of older technology and delaying replacement.
Switches will increase the speed and efficiency of networks in any of the following situations:
  • Any network that calls for a 10/100 hub will benefit from a 10/100Mbps switch. The switch will increase available bandwidth, drastically increasing the speed that the network is running at.
  • Any network that requires enhanced performance for file servers, workstations, Web servers, etc. Any critical components should be connected directly to a 10/100Mbps switch.
  • Any network that uses high-speed applications including multimedia and video. Any workstation or file server using the intensive applications should be connected directly to a 10/100Mbps switch.
  • Any network that uses Fiber optic cabling should use a 10/100Mbps switch rather than a hub. A hub will not take full advantage of the speed possible with Fiber optic cabling.



Router


device that forwards data packets along networks. A router is connected to at least two networks, commonly two LANs or WANs or a LAN and its ISP.s network. Routers are located at gateways, the places where two or more networks connect. Routers use headers and forwarding tables to determine the best path for forwarding the packets, and they use protocols such as ICMP to communicate with each other and configure the best route between any two hosts



Continue Reading | comments (1)

What is DNS, and its Working?

19 May, 2012




Introduction

A key component of the Internet and how it works revolves around the Domain Name System, otherwise known as DNS. The underlying technology behind the Internet, is that when a computer needs to talk to another computer on the Internet, they communicate via the computer's IP Address. The IP Address is a unique set of numbers associated with a particular machine, which will be discussed in a separate article. An example of an IP Address is 216.213.19.27, which is the IP Address that corresponds to www.pcprompt.net.

As the predecessor of the Internet, ARPANET, grew larger, connecting to remote machines by their IP Address grew cumbersome. It became more and more difficult for people to remember the IP Addresses associated with the machines they were trying to reach that a system was created to translate easier to remember symbolic names to their equivalent numerical IP Address. Thus the Domain Name System was born.

Domain Name System
The Domain Name System is the system used on the Internet for the mapping of names, such as www.google.com, to IP Addresses such as 216.239.51.99. Every time a new domain, like pcprompt.net, is registered, that domain is entered into one of the 13 Root Servers spread throughout the world and overseen by an organization called ICANN. Because your domain is in one of these servers, it can be reached and understood by the rest of the users on the Internet.

Another key element of the Domain Name System are DNS Servers run by Companies and Internet Service Providers. Every time you connect to a site, you are asking your ISP's DNS Server to resolve, or convert, the hostname such as www.google.com to a an ip address such as 216.239.51.99. If your ISP's name server is not working or can not be reached, then you will not be able to traverse the Internet using hostnames, but instead would have to use their IP Address equivalent.

Any time you connect to a site, your ISP DNS Server must find out what name server has the information about the domain for the site you are trying to reach. Your ISP's DNS Server will connect to a Root Server and ask it who the name server is that knows the information about the site you are trying to reach. The Root Server will tell your ISP's DNS Server what server they should next contact for information. Next your ISP's DNS Server will then contact the server that the Root Server told it to contact, where it will be given the IP Address associated with the site you are trying to reach.

Real Life Example
A lot of what has been discussed may be a bit confusing, so lets do a real life example. In the flowchart below labeled Figure 1, you will see a computer trying to connect to www.google.com and the steps it takes.
How DNS Works Image

We will discuss these steps below:
  1. A User opens a web browser and tries to connect to www.google.com. The operating system not knowing the IP Address for www.google.com, asks the ISP's DNS Server for this information.
  2. The ISP's DNS Server does not know this information, so it connects to a Root Server to find out what name server, running somewhere in the world, know the information about google.com.
  3. The Root Server tells the ISP's DNS Server to contact a particular name server that knows the information about google.com.
  4. The ISP's DNS Server connects to Google's DNS server and asks for the IP Address for www.google.com.
  5. Google's DNS Server responds to the ISP's DNS server with the appropriate IP Address.
  6. The ISP's DNS Server tells the User's operating system the IP Address for google.com.
  7. The operating system tells the Web Browser the IP Address for www.google.com.
  8. The web browser connects and starts communication with www.google.com.


Conclusion
As you can see, the Domain Name System is essential in the use of the Internet. Without it, you would not be able to type in names, but would have to remember the numerical IP Addresses in order to get anywhere on the Internet.

Reference: Internet
Continue Reading | comments (2)

How DHCP Works

17 May, 2012



Dynamic Host Configuration Protocol (DHCP) is a client/server protocol that automatically provides an 
Internet Protocol (IP) host with its IP address and other related configuration information such as the subnet mask and default gateway. RFCs 2131 and 2132 define DHCP as an Internet Engineering Task Force (IETF) standard based on Bootstrap Protocol (BOOTP), a protocol with which DHCP shares many implementation details. DHCP allows hosts to obtain necessary TCP/IP configuration information from a DHCP server.

Benefits of DHCP
  • Reliable IP Address configuration
  • Reduced Network Administration
How DHCP Works




1.DHCP DISCOVER: The Dynamic Host Configuration Protocol (DHCP) client broadcasts a DHCP discover message on the network containing its MAC address and NetBIOS destined for UDP port 68 (used by BOOTP and Dynamic Host Configuration Protocol (DHCP) servers). This first datagram is known as a DHCPDISCOVER message, which is a request to any DHCP server that receives the datagram for configuration information.
2.DHCP OFFER: Each DHCP server on the network that receives the request responds with a DHCP offer message as broadcast (UDP port 67) to the computer that issued the DHCPDISCOVER. An offered the IP address and subnet mask is also included in the message. If the DHCP client device received multiple DHCPOFFER, the DHCP client accepts the first DHCP offer that arrives.
3.DHCP REQUEST: The Dynamic Host Configuration Protocol (DHCP) client accepts an offer and broadcasts a DHCPREQUEST datagram. The DHCPREQUEST datagram contains the IP address of the server that issued the offer and the physical address of the DHCP client. DHCPREQUEST message requests the selected DHCP server to assign the DHCP client an IP address and other TCP/IP configuration settings. DHCPREQUEST message also notifies all other DHCP servers that their offers were not accepted by the DHCP client.
4.DHCP ACK: When the DHCP server from which the offer was selected receives the DHCPREQUEST datagram, it constructs a DHCPACK datagram. This datagram is known as a DHCPACK (DHCP ACKNOWLEDGEMENT). The DHCPACK includes an IP address and subnet mask for the DHCP client. It may include other TCP/IP configuration information like IP addresses for the default gateway, IP addresses for DNS servers, IP addresses for WINS servers etc.




    DHCP Terms and Definitions


    TermDefinition
    DHCP serverA computer running the DHCP Server service that holds information about available IP addresses and related configuration information as defined by the DHCP administrator and responds to requests from DHCP clients.
    DHCP clientA computer that gets its IP configuration information by using DHCP.
    ScopeA range of IP addresses that are available to be leased to DHCP clients by the DHCP Server service.
    LeaseThe length of time for which a DHCP client can use a DHCP-assigned IP address configuration.
    ReservationA specific IP address within a scope permanently set aside for leased use by a specific DHCP client. Client reservations are made in the DHCP database using the DHCP snap-in and are based on a unique client device identifier for each reserved entry.
    ExclusionrangeOne or more IP addresses within a DHCP scope that are not allocated by the DHCP Server service. Exclusions ensure that the specified IP addresses will not be offered to clients by the DHCP server as part of the general address pool.
    APIPAA TCP/IP feature in Windows XP and Windows Server 2003 that automatically configures a unique IP address from the range 169.254.0.1 through 169.254.255.254 with a subnet mask of 255.255.0.0 when the TCP/IP protocol is configured for automatic addressing, the Automatic private IP address alternate configuration setting is selected, and a DHCP server is not available. The APIPA range of IP addresses is reserved by the Internet Assigned Numbers Authority (IANA) for use on a single subnet, and IP addresses within this range are not used on the Internet.
    SuperscopeA configuration that allows a DHCP server to provide leases from more than one scope to clients on a single physical network segment.
    Multicast IPMulticast IP addresses allow multiple clients to receive data that is sent to a single IP address, enabling point-to-multipoint communication. This type of transmission is often used for streaming media transmissions, such as video conferencing.
    Multicast ScopeA range of multicast IP addresses that can be assigned to DHCP clients. A multicast scope allows dynamic allocation of multicast IP addresses for use on the network by using the MADCAP protocol, as defined in RFC 2730.
    BOOTPAn older protocol with similar functionality; DHCP is based on BOOTP. BOOTP is an established protocol standard used for configuring IP hosts. BOOTP was originally designed to enable boot configuration for diskless workstations. Most DHCP servers, including those running Windows Server 2003, can be configured to respond to both BOOTP requests and DHCP requests.




    Continue Reading | comments (1)

    TCP And UDP Ports

    13 March, 2012


     Introduction
    Concept of Ports and how they work with IP addresses. If you have not read our article on IP addresses and need a brush up, you can find the article here. If you understand the concepts of IP addresses, then lets move on to TCP and UDP ports and how they work.
    The devices and comptuers connected to the Internet use a protocol called TCP/IP to communicate with each other. When a computer in India wants to send a piece of data to a computer in England, it must know the destination IP address that it woud like to send the information to. That information is sent most often via two methods, UDP and TCP.

    The two Internet workhorses: UDP and TCP

    UDP? TCP?  Getting confused, but I promise I will explain this in very basic terms so that you can understand this concept.

    TCP stands for Transmission Control Protocol. Using this method,
    The computer sending the data connects directly to the computer it is sending the data it to, and stays connected for the duration of the transfer. With this method, the two computers can guarantee that the data has arrived safely and correctly, and then they disconnect the connection. This method of transferring data tends to be quicker and more reliable, but puts a higher load on the computer as it has to monitor the connection and the data going across it. A real life comparison to this method would be to pick up the phone and call a friend. You have a conversation and when it is over, you both hang up, releasing the connection.

    UDP stands for User Datagram Protocol.
    Using this method, the computer sending the data packages the information into a nice little package and releases it into the network with the hopes that it will get to the right place. What this means is that UDP does not connect directly to the receiving computer like TCP does, but rather sends the data out and relies on the devices in between the sending computer and the receiving computer to get the data where it is supposed to go properly. This method of transmission does not provide any guarantee that the data you send will ever reach its destination. On the other hand, this method of transmission has a very low overhead and is therefore very popular to use for services that are not that important to work on the first try. A comparison you can use for this method is the plain old US Postal Service. You place your mail in the mailbox and hope the Postal Service will get it to the proper location. Most of the time they do, but sometimes it gets lost along the way.


    Now that you understand what TCP and UDP are, 
    Then start discussing TCP and UDP ports in detail. Lets move on to the next section where we can describe the concept of ports better.

    TCP and UDP Ports

    As you know every computer or device on the Internet must have a unique number assigned to it called the IP address. This IP address is used to recognize your particular computer out of the millions of other computers connected to the Internet. When information is sent over the Internet to your computer how does your computer accept that information? It accepts that information by using TCP or UDP ports.
    An easy way to understand ports is to imagine your IP address is a cable box and the ports are the different channels on that cable box. The cable company knows how to send cable to your cable box based upon a unique serial number associated with that box (IP Address), and then you receive the individual shows on different channels (Ports).
    Ports work the same way. You have an IP address, and then many ports on that IP address. When I say many, I mean many. You can have a total of 65,535 TCP Ports and another 65,535 UDP ports.
    When a program on your computer sends or receives data over the Internet it sends that data to an ip address and a specific port on the remote computer, and receives the data on a usually random port on its own computer. 
    If it uses the TCP protocol to send and receive the data then it will connect and bind itself to a TCP port. If it uses the UDP protocol to send and receive data, it will use a UDP port. Figure 1, below, is a represenation of an IP address split into its many TCP and UDP ports. Note that once an application binds itself to a particular port, that port can not be used by any other application. It is first come, first served.

    <-------------------- 192.168.1.10 -------------------->
    012345................6553165532655336553465535
    Figure 1. IP address with Ports

    This all probably still feels confusing to you, and there is nothing wrong with that, as this is a complicated concept to grasp. Therefore, I will give you an example of how this works in real life so you can have a better understanding. We will use web servers in our example as you all know that a web server is a computer running an application that allows other computers to connect to it and retrieve the web pages stored there.

    In order for a web server to accept connections from remote computers, such as yourself, it must bind the web server application to a local port. It will then use this port to listen for and accept connections from remote computers. Web servers typically bind to the TCP port 80, which is what the http protocol uses by default, and then will wait and listen for connections from remote devices. Once a device is connected, it will send the requested web pages to the remote device, and when done disconnect the connection.

    On the other hand, if you are the remote user connecting to a web server it would work in reverse. Your web browser would pick a random TCP port from a certain range of port numbers, and attempt to connect to port 80 on the IP address of the web server. When the connection is established, the web browser will send the request for a particular web page and receive it from the web server. Then both computers will disconnect the connection.
    Now, what if you wanted to run an FTP server, which is a server that allows you to transfer and receive files from remote computers, on the same web server. FTP servers use TCP ports 20 and 21 to send and receive information, so you won't have any conflicts with the web server running on TCP port 80. Therefore, the FTP server application when it starts will bind itself to TCP ports 20 and 21, and wait for connections in order to send and receive data.

    Most major applications have a specific port that they listen on and they register this information with an organization called IANA. You can see a list of applications and the ports they use at the IANA Registry. With developers registering the ports their applications use with IANA, the chances of two programs attempting to use the same port, and therefore causing a conflict, will be diminished.

    Major Differents Between TCP & UDP

     

    Continue Reading | comments (1)

    Remote Support with Windows Remote Assistance

    28 January, 2012

     


    Before to Using Windows Remote Assistance

    First of all, Windows Remote Assistance requires two parties: one to request help via this tool and another who will accept to provide it. In order for this to work, the party receiving assistance needs to have Windows Remote Assistance enabled in System Properties. How to view if this is enabled is shown here: Enabling Remote Desktop Connections in Windows 7.
    The party in need of help, first has to request it via Windows Remote Assistance.



    Windows Remote Assistance

    To request help, one can either send an invitation file (using any of the first two options: "Save this invitation as a file" or "Use e-mail to send an invitation") or use Easy Connect.

    Windows Remote Assistance

    If any of the two parties involved is using a slow or unstable Internet connection, it is best to use one of the first two options. If both parties have a good Internet connection and they both use Windows 7, then Easy Connect is a good choice. This connection feature uses Microsoft’s Peer Name Resolution Protocol (PNRP) and it works only for Windows 7 and above.
    Even if you have previously connected to it, you cannot connect to another computer via Windows Remote Assistance if it has not requested help and is waiting for an incoming connection.

    How to Request Help via Windows Remote Assistance

    First, you need to start Windows Remote Assistance. The fastest way to do this, is to type the word "remote" in the Start menu search box. Then, click on the Windows Remote Assistance shortcut.

    Windows Remote Assistance

    Another way is to run the msra.exe file found in the "C:\Windows\system32" folder.
    Click on "Invite someone you trust to help you".

    Windows Remote Assistance

    Select the way you want to connect with the person who will help.

    Windows Remote Assistance

    If you send an invitation, make sure the person receives it and knows about it. The invitation is stored as a file with the ".msrcIncident" extension, which is opened only by Windows Remote Assistance.
    If you use Easy Connect, you will first see a list with people who have helped you in the past (only if you received help).

    Windows Remote Assistance

    No matter how you send the request for help, once sent, Windows Remote Assistance shows a long password and starts waiting for incoming connection. Make sure the person who is about to connect to your computer knows the password, otherwise the connection won’t work.

    Windows Remote Assistance

    How to Provide Help via Windows Remote Assistance

    Start Windows Remote Assistance using any of the methods presented in the previous section. Then, select "Help someone who has invited you".

    Windows Remote Assistance

    Now you need to choose the connection method. If you received an invitation, download it to your computer, click "Use an invitation file" and select that invitation file.
    If you will "Use Easy Connect", Windows Remote Assistance will start searching for the other party. This process can take a while, especially if you are not part of the same network or one of the two connections is slow (or not very stable).

    Windows Remote Assistance

    Once the other computer is found and the connection is about to be established, you are asked for the connection password. Get the connection password from the other party, type it and press OK.

    Windows Remote Assistance

    The remote party will be asked to approve the connection. Your computer will wait until the approval is given.

    Windows Remote Assistance

    You are now connected to the other computer via Windows Remote Assistance and you can see its desktop.

    Windows Remote Assistance

    In order to take control and use the mouse and keyboard on the remote computer, you need to first press the Request control button and wait for the other party’s approval.

    Windows Remote Assistance

    A good recommendation is for the remote party to check the box which says "Allow... to respond to User Account Control prompts", especially if you will need to install applications or configure important aspects of the operating system.

    Windows Remote Assistance

    Available Configuration Options

    On the top of the Windows Remote Assistance window, there is a toolbar with several buttons. Their number varies depending on the party involved. For example, Request control and Actual size/Fit to Screen are available only to the computer providing help.

    Windows Remote Assistance

    Both parties can access the Chat feature and use it to communicate.

    Windows Remote Assistance

    On the computer which receives assistance, you can configure, in the Settings window, the way bandwidth is used. If the connection works poorly, don’t hesitate to move the Bandwidth usage slider to Low.

    Windows Remote Assistance

    Unfortunately the computer who provides assistance cannot configure this. It has only two configuration options available.

    Windows Remote Assistance

    The Help button is pretty self-explanatory and loads help information related to using Windows Remote Assistance.
    If the connection cannot be established, the party receiving help has a Troubleshoot button available, which can be used to start a troubleshooting wizard which helps identify where the problem is and how to fix it.

    Windows Remote Assistance
    Continue Reading | comments (1)

    How to Use Remote desktop in Windows 7

    20 January, 2012


     
    The Remote Desktop(RDP) utility lets you connect to your work computer from home and access all of your programs, files, and network resources as though you were actually sitting in front of your own computer. Creating the remote desktop connection in Windows 7 is almost the same as in the older versions of Windows. This post will cover the following
    things:

    1. How to enable the remote desktop connection feature on a Windows 7 machine
    2. How to Remotely connect any other Windows based machine from Windows 7

    How To Enable Remote Desktop in Windows 7

    First click the Start button on your desktop, now right click the Computer option from the start menu and select its properties.

    Computer properties 

    Then click the Remote settings option in the next window.

    Remote Settings

    Now make sure to enable the option Allow connections from computers running any version of Remote Desktop in the System Properties dialogue box.

    System Properties

    Click Apply and the remote desktop connections feature will be enabled on your Windows 7 machine.

    How To Establish A Remote Desktop Connection From Windows 7

    Firs of all click Start > All Programs > Accessories > Remote Desktop Connection link.

    Start

    The Remote Desktop dialogue box will be displayed, here specify the IP address of the remote machine to which you are going to connect.


    Remoet Desktop

    Click the Connect button, now it will try to access your specified machine and if the machine is running and remote connections are enabled on it, then it will prompt for the username and password of that machine. I accessed my XP machine from Windows 7 via remote desktop.

    Remote Desktop 


    Remote Desktop

    Done!!!
    Continue Reading | comments (1)
     
    Copyright © 2011. Server Training . All Rights Reserved
    Company Info | Contact Us | Privacy policy | Term of use | Widget | Advertise with Us | Site map