Home Operation and Maintenance Windows Operation and Maintenance What are the main ways to implement the network functions of Windows?

What are the main ways to implement the network functions of Windows?

Oct 28, 2020 pm 02:06 PM
windows

The network functions of Windows are mainly realized through "Network Neighborhood". Network Neighborhood uses NETBIOS; Netbios is an interface standard for accessing network services. It provides a set of methods for network programs to communicate with each other and transmit data.

What are the main ways to implement the network functions of Windows?

The network functions of windows are mainly realized through "Network Neighborhood".

Network Neighborhood, computer terminology, function is used to access other computers on the LAN. Today, with the rapid development of computers, online office work has become possible, and the establishment and management of local area networks have also become a simple mode for office workers in work units to communicate with each other and share resources. The most commonly used tool for resource sharing in a local area network is "Network Neighborhood".

Working principle

NETBIOS

Network Neighborhood uses NETBIOS. Netbois (Network Basic Input/Output System) was originally developed by mm, Sytek as an API to enable user software to use LAN resources. Since its inception, Netbois has become the basis for many other network applications. Strictly speaking, Netbios is an interface standard for accessing network services. It provides a set of methods for network programs to communicate with each other and transmit data. How do we see the content in Network Neighborhood? By using Netbios's datagram or broadcast method, PCs on the Netbios LAN establish sessions to communicate with each other.

NetBIOS can contain up to 16 alphanumeric letters. The combination of letters must be unique throughout the resource routing network. Before a PC using NetBIOS can fully operate on the network, the PC must first register a NetBIOS name. When a computer is turned on, it works according to the following steps. When client A is active, client A broadcasts its name. When it successfully broadcasts itself and no one else has the same name as it, the client registers successfully. The registration process is as follows:

(1) On login, Client A broadcasts itself and its NetBIOS information 6 to 10 times everywhere to ensure that other network members receive the information. (If a machine does not receive it, then the client A will be invisible in the network neighborhood of the machine)

(2) If another client B has already used this name, another client B will publish it. Its own broadcast, including the name it is using. Client A requesting login stops registration.

(3) If no other client objects to registration, client A that requested login completes the registration process. If there is an available name server, the name server will make a note in its database that the name of a certain machine is A and the IP address is XXX. XXX. XXX. XXX.

(4) When machine A shuts down normally, it will re-broadcast to release the name just registered. After receiving it, computers on the same network segment will delete the name in Network Neighborhood.

Browse list

The browse list is in the Microsoft network. Users can see all the computers on the entire network in the browse list. When you open the entire network through the Network Places window, you will see a list of workgroups, and then open a workgroup and you will see a list of computers in it. A workgroup is essentially a group of computers that share a browsing list, and all workgroups are peers. The browsing list is provided by the browsing master server through broadcast query. The browsing master server is the most important computer in the work group. It is responsible for maintaining the browsing list in this work group and specifying the master server list of other work groups. It provides services for other computers in this work group and other computers visiting this work group. Computers provide browsing services. Each workgroup selects a browsing master server for each transport protocol. Its identification contains the msbrowse field.

Network browsing process

When a PC enters the network, if it has file and printer sharing enabled, it will broadcast its presence to the network, and browsing The master server will obtain this announcement and put it into the browse list it maintains; computers that are not bound to file and printer sharing on the corresponding protocol will not announce it, and therefore will not appear in Network Neighborhood. When the client computer wants to obtain the required network resource list, it will first broadcast a browsing request. After the browsing master server receives the request, if the request is for the browsing list of this group, it will directly send back the resource list required by the client; If the request is for the browsing list of another workgroup, the browsing master server will find the master browser of the corresponding workgroup based on the records in its own Browsing List and return it to the user. From there, the user can get the browsing list he wants.

Basic conditions for mutual visits

There are four basic conditions for Windows "Network Neighborhood" to realize mutual visits:

1. The computers on both sides realize network interconnection, and set different computer names, correctly set the computer's IP address, and subnet mask, and they are in the same network segment.

2. Both computers have their firewalls turned off, or there is no policy in the firewall policy to prevent Network Neighbors from accessing each other.

3. Both the accessing and accessed computers are open, and network shared resources are set up.

4. The "Microsoft Network File and Print Sharing" service has been added to the computers of both the visiting and the visited parties.

The above is the detailed content of What are the main ways to implement the network functions of Windows?. For more information, please follow other related articles on the PHP Chinese website!

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

Can I install mysql on Windows 7 Can I install mysql on Windows 7 Apr 08, 2025 pm 03:21 PM

Yes, MySQL can be installed on Windows 7, and although Microsoft has stopped supporting Windows 7, MySQL is still compatible with it. However, the following points should be noted during the installation process: Download the MySQL installer for Windows. Select the appropriate version of MySQL (community or enterprise). Select the appropriate installation directory and character set during the installation process. Set the root user password and keep it properly. Connect to the database for testing. Note the compatibility and security issues on Windows 7, and it is recommended to upgrade to a supported operating system.

How to solve mysql cannot connect to local host How to solve mysql cannot connect to local host Apr 08, 2025 pm 02:24 PM

The MySQL connection may be due to the following reasons: MySQL service is not started, the firewall intercepts the connection, the port number is incorrect, the user name or password is incorrect, the listening address in my.cnf is improperly configured, etc. The troubleshooting steps include: 1. Check whether the MySQL service is running; 2. Adjust the firewall settings to allow MySQL to listen to port 3306; 3. Confirm that the port number is consistent with the actual port number; 4. Check whether the user name and password are correct; 5. Make sure the bind-address settings in my.cnf are correct.

MySQL can't be installed after downloading MySQL can't be installed after downloading Apr 08, 2025 am 11:24 AM

The main reasons for MySQL installation failure are: 1. Permission issues, you need to run as an administrator or use the sudo command; 2. Dependencies are missing, and you need to install relevant development packages; 3. Port conflicts, you need to close the program that occupies port 3306 or modify the configuration file; 4. The installation package is corrupt, you need to download and verify the integrity; 5. The environment variable is incorrectly configured, and the environment variables must be correctly configured according to the operating system. Solve these problems and carefully check each step to successfully install MySQL.

Solutions to the errors reported by MySQL on a specific system version Solutions to the errors reported by MySQL on a specific system version Apr 08, 2025 am 11:54 AM

The solution to MySQL installation error is: 1. Carefully check the system environment to ensure that the MySQL dependency library requirements are met. Different operating systems and version requirements are different; 2. Carefully read the error message and take corresponding measures according to prompts (such as missing library files or insufficient permissions), such as installing dependencies or using sudo commands; 3. If necessary, try to install the source code and carefully check the compilation log, but this requires a certain amount of Linux knowledge and experience. The key to ultimately solving the problem is to carefully check the system environment and error information, and refer to the official documents.

Unable to access mysql from terminal Unable to access mysql from terminal Apr 08, 2025 pm 04:57 PM

Unable to access MySQL from the terminal may be due to: MySQL service not running; connection command error; insufficient permissions; firewall blocks connection; MySQL configuration file error.

How to copy and paste mysql How to copy and paste mysql Apr 08, 2025 pm 07:18 PM

Copy and paste in MySQL includes the following steps: select the data, copy with Ctrl C (Windows) or Cmd C (Mac); right-click at the target location, select Paste or use Ctrl V (Windows) or Cmd V (Mac); the copied data is inserted into the target location, or replace existing data (depending on whether the data already exists at the target location).

Can vs code run in Windows 8 Can vs code run in Windows 8 Apr 15, 2025 pm 07:24 PM

VS Code can run on Windows 8, but the experience may not be great. First make sure the system has been updated to the latest patch, then download the VS Code installation package that matches the system architecture and install it as prompted. After installation, be aware that some extensions may be incompatible with Windows 8 and need to look for alternative extensions or use newer Windows systems in a virtual machine. Install the necessary extensions to check whether they work properly. Although VS Code is feasible on Windows 8, it is recommended to upgrade to a newer Windows system for a better development experience and security.

Can mysql run on Windows Can mysql run on Windows Apr 08, 2025 pm 01:54 PM

Running MySQL on Windows is feasible, but challenges such as port conflicts, permission issues, and environment variable settings need to be considered. Installation issues can be solved by customizing configuration files, adjusting user permissions, and setting environment variables correctly. Additionally, the appropriate storage engine should be selected, tweaked configuration files, and SSDs should be used to optimize performance.

See all articles