Online PC Support

OPS Technical Solutions : +1(833)-522-1003

Welcome

How to Network Computers Using a Hub

Network is a logical or physical arrangement of computer to share data and resources. We need to have some network devices to build a computer network and these devices can be anything like a router, switch or a hub.

A hub is a device which is used to connect multiple computers in one network. The most common type of hub is an Ethernet hub.

Here are some of the simple steps to make a network using an Ethernet hub:

Step 1:

All the computers in the network must be switched off while you try to set up a network using a hub. Now connect the power adapter with the Hub and insert the power cable on the electrical outlet so that the hub can get the power.

Step 2:

Now you need a network cable which has to be connected on the uplink port of the hub. The other end of the same network cable must be connected into the unlink port on the router. This step is necessary if you are going to make the network with internet connection.

Step 3:

Now is the time to switch on all the computers. Now join once end of the straight-through network can on one of the numbered port on the Hub and connect the other end of the same cable on any of the computer in the network. If the setting is correct then you must see a green light on the same port.

Step 4:

You have to repeat the above steps to join all the other computers on the network. After this you need to configure an internet or network connection in the Operating System. Click on Start button and select ‘All programs’. Now go to Accessories and select Communication. Choose the ‘Network Setup Wizard’.

Step 5:

Now you will see a network setup wizard where you need to select the type of network or the connection method. You must endure that all the cables are connected and the network devices and computers are switched on.

Step 6:

Select the option ‘this computer connects through the internet through another computer on my network or through a residential gateway’ if you are using an internet connection. The other option ‘this computer belongs to a network that does not have internet connection’ is for the users who do not have an active internet connection.

Step 7:

Now a new message ‘this computer connects through the internet through another computer on my network or through a residential gateway’ will appear once you click on next for the wired and wireless Ethernet capabilities.

Step 8:

After this, you need to select the computer name for each computer and make the settings so that each computer gets the automatic IP Address and DNS Server address. You must also decide a workgroup name and all the computer in the same network must be under the same workgroup name.

These simple settings can have all the computers in one network and will allow users to share data and resources. Network can also be built even if you do not have any working internet connection.

How to Inter Connect Your Computers Through a Network

Before we go into the details of networking we should first understand why it is important to have a network between the computers at home and what all devices and peripherals are required to set up the network. In simplest terms Network is connecting two or more computers together so that they can share data among each other and also access the shared resources on the network. Example of data can be the songs and movies stored on one computer which can be played on other computers over the network and by sharing common resources I mean devices like printer or scanner. If you have a printer then it can be easily shared on the network and after that all the computers would be able to print through it. Network really helps in many ways. Another reason for creating network is for sharing the internet connection. Every house has one single internet connection and it is by the networking that it can be used on all the computers connected to the network.

Now let us see what devices we would need in order to make a network

1.       First device would be a Wireless Router. We need a wireless router as it serves to both Wired and Wireless connections.

2.       Next we need all computers to have a network interface card. Laptops have inbuilt LAN card and Wireless Cards so don’t worry about them but do check the same on the desktop computers.

3.       LAN Cable (Ethernet cable along with RJ45 connectors)

Steps to set up the network

1.       We will use the Wireless router as the central hub which will manage the entire routing and internet sharing on the network.

2.       Connect the Router’s LAN ports to one of the computers Ethernet Card (LAN Card).

3.       Connect the broadband cable into the WAN port of the Router.

4.       Open Start -> Run and type “CMD”

5.       Run the IPCONFIG command and note down the Default Gateway address

6.       Open Internet Explorer and type the Default Gateway address in the Address Bar of the browser to enter the console.

7.       Once you reach the console, enable DHCP and Wireless modes in the router.

8.       Now give your Wireless Network a name so that it can be identified by computers which would be connecting to it wirelessly.

9.       After making these changes just logout from the console and connect other computers using LAN cable to the LAN ports of the router or connect the Laptops Wirelessly.

Once the connection gets established you will see that all computers would be using the Wireless Router as the central hub and they will get their IP address from the routers DHCP pool.

After making the above mentioned setup it is not necessary that you would be able to share data amongst each other for this make sure that you have taken care of the following key points:

1.       All the computers should be in the same Workgroup.

2.       All computers should be set to get IP from the DHCP server automatically

3.       All computers should have File Sharing enabled

4.       Proper exceptions must be raised in the Firewall (if any).

How to Increase Computer Network Security

Computer network security is a branch of computer technology which individual users and especially large organizations have to deal with regularly. The objective or purpose of computer network security is to protect vital and valuable information from the occurrences of natural disaster, corruption or hacking. At the same time, it involves providing access to specific and limited users for the purpose of sharing information.

It’s an age where computer hackers are always on the lookout for accessing valuable or confidential information for their own benefits or just for the sake of fun. However there are varied steps one may follow to avoid such leakage of their personal files and programs.

The most important and foremost thing people need to do is install an antivirus software which can keep updating itself automatically, whenever new versions of the software are available. Now there are many such programs available which one may not need to run manually. Antivirus programs like Avast, McAfee, Norton, KasperSky and NOD 32 need to be set by the user so that they continuously search for unwanted elements that can access the system. Apart from this, one must ensure that the virus definitions are checked manually to maximise security. Spyware tools can also be run regularly. The difference between the latter and the antivirus programs is that spyware are more manual and do not run in real time. So the users need to manually launch the application and set it up so that it can search for existing unwanted applications.

A computer firewall needs to be enabled so that it can prevent malicious software from accessing the system. The firewall’s database recognizes the data that are safe and only these are allowed to make modifications or updates in the system.

The operating system needs to be updated at regular intervals to make sure that an expired or unavailable version isn’t being used, because otherwise it may make the computer prone to common and emerging threats. An up to date system is very likely to avoid outside third parties from intruding.

Many computer users like to exercise their freedom while downloading information from the Internet. However, it is likely that many games or audio/video files available on some websites may be corrupt. People often check to make sure that such files are free from spam, by performing a virus check through anti-virus programs already there in the system. However, the trouble may be avoided if users rarely install such programs and make their Operating Systems more restrictive.

Another tool that has become quite useful in the network world is a honey pot. It works as a trap which is set to detect and counteract attempts of malicious spam content that attacks a system. It provides bulk spam capture and is a powerful measure to find out the e-mail addresses spammers use.

How to Use Network Attached Storage

Network Attached Storage abbreviated as NAS is file level computer data storage providing an access to the other devices attached on the computer network. The merit of NAS server is, it’s just like a hard disk storage which setup its own network address than being attached to network workstation users. Since NAS unit is a computer connected to network, it is also possible to run other software on the unit technically. A NAS unit runs by stripped down Operating system (OS) and doesn’t require a fully featured OS. NAS unit holds the responsibility of file serving and thus aids to remove it from the server on the network available. It contains more than one hard disk,   seldom arranged logically and thus allowing redundant storage containers to come in action. Since NAS unit prevents it clients with a single protocol but different Operating systems have different protocol attached to them. The Microsoft Windows OS uses SMB (Server message block) or CIFS (Common Internet file system), whilst the NFS is popular on the UNIX OS and AFP is used by the Apple Macintosh.

NAS holds a dominance over DAS ( Direct Attached Storage) in terms  NAS books it own position on the network as its own entity and file sharing on NAS becomes easier and simpler as compares to DAS. Since DAS is only a simple extension on the available network. Moreover data availability is increased potentially on the NAS unit due to its clustering and redundant arrays of independent or inexpensive disks (RAID) capabilities. NAS increases the performance because file serving is mainly done by it and not by the network server which has other responsibilities too.

NAS unit offers flexible network based data storage to home consumer due to which NAS unit devices have seen great fall in prices in recent years as it takes the computer clients to a place with huge amounts of data available for them to choose from. Due to which NAS is more useful than a general centralized storage entity. The NAS market witnesses consumers flocked up towards the multi media data centre mainly. For NAS user there are devices available with single and multiple drives thus allowing higher data protection with greater capacities.

Storage area network (SAN) is often contrasted with NAS. NAS actually emphasizes on a system and storage while the SAN is mainly concerned with block based storage leaving the file system. But , a combo of NAS-SAN is actually aids by providing protocols of block level by SAN and file level by NAS from the same working system.

NAS unit uses are immensely useful since it’s a centralized management it aids by maintaining a back up over the network and the same data stored on NAS can be accessed by a large no. of client’s servers. Above all, with disk space management it reduces the time of client server administration.

Thus, NAS besides providing an instant access to the PCs’ with the same shared files it also aids to store and share all of your data securely by creating a central place for it.

Learn the Amazing Benefits Of Server Virtualization Tools

Server virtualization is not a new technology, but has made news headlines lately due to its intense use these days and the sophisticated tools available. A server is a computer that hosts files, applications and other computing resources on a computer network. Servers have multiple processors in their central processing units with multitasking abilities. Most applications that run on servers need their own dedicated servers to run effectively. The problems here are that, these servers might use only a small fraction of their processing capabilities and as the network grows, more and more servers are needed, taking more physical space.

Concept

Server virtualization provides a solution to the problems associated with servers. A single server can be made to behave like several virtual machines with the help of software. Each virtual server runs independently on its own operating system. Though still a young technology, server virtualization is a hot topic.

Microsoft last month released some tools for users of its Hyper-V virtualization. One of these tools, the Hyper-V Best Practice Analyzer tool is designed to help through the Hyper-V setup while another, the Virtual Machine Servicing Tool 3.0 caters for the various offline virtual computers, virtual hard disks and templates.

Microsoft also released a Linux Integration Service 2.1 solution for Hyper-V and the Microsoft Office 2010 Deployment Kit for App-V.

The tools released by Microsoft are to help users of their Hyper-V virtualization to derive maximum benefits. The Best Practices Analyzer for instance is a server management tool for Windows Server 2008 R2. This tool scans the roles installed on Windows Server 2008 R2 and reports any violations of best practices to the administrator. The scans can be scheduled by the administrator to run automatically, or run them manually when needed.

Services

The Microsoft Virtual Machine offers free services like, analyzed guidance and the automated tools which allow servicing of even the virtual offline machines in the SCVMM library. Now, the system automates the entire servicing of the Windows Server 2008 R2 Hyper-V host clusters and thus powering the live migration. Linux Integration Service allows users to use open source platforms with Hyper-V servers. Operating systems like Open Suse, Ubuntu, Red Hat can now be used with Widows Hyper-V virtual machines. The Microsoft Office 2010 Deployment Kit for App-V helps with sequencing and deployment and connects other system components to instances of Microsoft Office 2010.

Server virtualization tools help deliver better virtualization to firms. Virtualization reduces costs of computing, as firms get only one or two real servers and run virtual machines on them. It also reduces cost of storage for these servers. Servers are ideally stored in cabinets and locked and these cabinets are expensive. Server virtualization helps eliminate these costs. Virtualization can also reduce the physical space needed to store servers, allowing firms with limited office space to also own and host the number of servers they need.

Server Virtualization is now easy to do, with the help of the numerous tools available. Individuals with very little computing knowledge can now manage servers, thanks to server virtualization tools available. Even small scale businesses can take advantage of the benefits of server virtualization since they do not need to spend money to hire well trained personnel.

Call Now: +1 833-522-1003
Call Now: +1 833-522-1003
Call Now: +1 833-522-1003