Wednesday 18 March 2020

how the lan manager is working?

MaxCmds actually serves the same purpose as the MaxMpxCt on the Fileserver. Not surprisingly these two parameters have a special relationship. It’s like this: whenever an SMB session is setup (i.e. a shared file is accessed), the SMB session is negotiated. During this negotiation the Fileserver passes down the value of MaxMpxCt to the client (a Terminal server for example). The client then compares this value to his own MaxCmds value. The lower of the two values then is used to set a maximum on the number of outstanding client requests to the File server.

Possible values: 1-65535

MaxThreads
The MaxThreads specifies how many threads are allowed to run at once. (Each thread allows one outstanding operation.) By increasing this you can increase the amount of simultaneous work. Each extra execution thread will take 1 Kbyte of additional NonPaged pool memory.

Possible values: 1-255

MaxCollectionCount
Specifies the amount of data that must be present in the buffer of the redirector to trigger a write operation. If the amount of data in the buffer meets or exceeds this value, then it is written immediately. Otherwise, it is retained in the buffer until either more data is added or the value of the CollectionTime entry expires.

Possible values: 1-65535

Monitoring
Problems stemming from poor fileserving performance can sometimes be a bit tricky to pinpoint. One way to make sure is by using good ol’ perfmon. The problem with interpreting perfmon counters is that you can never know what the "right" value is unless you have baselined your environment properly. So what to monitor and how to interpret those values is entirely up to you. However, there are some counters you can monitor that I can give some basic tips on. Configure perfmon to monitor the following counters:

Physical Disk
You can measure this on the Terminal Server as well, but you should start at the file server. If the queue length is more than one for a sustained period of time, then your disks are hyperventilating. Give them some air: up your I/O throughput. Look on the software-side: are you paging a lot? (that'll kill your I/O throughput right there) or is your system disk heavily fragmented? Or on the hardware side: buy faster disks (15K SCSI) or upgrade your RAID controller.

know more : ms lan manager

Tuesday 17 March 2020

Security And Information Assurance

Security and information assurance refers to policy and technical elements that protect information systems by ensuring their availability, integrity, authentication, and appropriate levels of confidentiality. Information security concepts occur in many areas of computer science, including operating systems, computer networks, databases, and software.

Operating system security involves protection from outside attacks by malicious software that interferes with the system’s completion of ordinary tasks. Network security provides protection of entire networks from attacks by outsiders. Information in databases is especially vulnerable to being stolen, destroyed, or modified maliciously when the database server is accessible to multiple users over a network. The first line of defense is to allow access to a computer only to authorized users by authenticating those users by a password or similar mechanism.

However, clever programmers (known as hackers) have learned how to evade such mechanisms by designing computer viruses, programs that replicate themselves, spread among the computers in a network, and “infect” systems by destroying resident files and applications. Data can be stolen by using devices such as “Trojan horses,” programs that carry out a useful task but also contain hidden malicious code, or simply by eavesdropping on network communications. The need to protect sensitive data (e.g., to protect national security or individual privacy) has led to advances in cryptography and the development of encryption standards that provide a high level of confidence that the data is safe from decoding by even the most clever attacks.

find more : lm security

Friday 13 March 2020

Uninstall Local Area Connection

Before we start haphazardly changing our Local Area Connection Properties, let's see what is the difference between enabling or uninstalling the connection properties.

Disable a Property Item:
Disabling a property item means it's no longer binded to the connection you're adjusting. This is the preferred method as opposed to full uninstallation since you can easily re-enable a property item if it's needed in the future - such as; you install a local network to share files from one PC to another and need File and Print Sharing enabled. If you just use your PC to access the Internet and never intend to create or join a network, consider uninstalling some items.

Uninstall a Property Item:
If you fully uninstall a Property item, the Windows queue will be reduced while accessing Internet routines. Admittedly, the speed increases of uninstallation versus disabling will be negligible. However, a property item may act as a filter or longer path for each Internet action, so there has to be something said for less computation (less error risk) while moving data to and from the Internet and your PC.

Find more information : lanman server

Thursday 12 March 2020

Disable or Uninstall Local Area Connection Properties

Before we start haphazardly changing our Local Area Connection Properties, let's see what is the difference between enabling or uninstalling the connection properties.

Disable a Property Item:
Disabling a property item means it's no longer binded to the connection you're adjusting. This is the preferred method as opposed to full uninstallation since you can easily re-enable a property item if it's needed in the future - such as; you install a local network to share files from one PC to another and need File and Print Sharing enabled. If you just use your PC to access the Internet and never intend to create or join a network, consider uninstalling some items.

Uninstall a Property Item:
If you fully uninstall a Property item, the Windows queue will be reduced while accessing Internet routines. Admittedly, the speed increases of uninstallation versus disabling will be negligible. However, a property item may act as a filter or longer path for each Internet action, so there has to be something said for less computation (less error risk) while moving data to and from the Internet and your PC.

Find more information : lanman server

Wednesday 11 March 2020

How to Set Up LAN Network

A local area network, or LAN, is used to connect different devices within a home or office to each other and to connect them to the internet. The advantages of LAN networking are that it allows the devices to talk to each other without having to connect them individually to the internet with their own modems and wired or wireless connections. Figure out which devices need to be connected and how they need to be connected, gather the equipment you need and get to work.

Plan Your LAN
To begin your local area network setup process, begin by planning out which devices need to be on the network. For example, you may need to connect laptops, tablets, printers, smart TVs and other equipment. Take a look at the devices' documentation to figure out how they can be connected, such as whether they require wired or wireless connections or work with either.

Then, consider where the devices will be located. If they're going to all be in a small area and wirelessly connected, you may be able to use a single wireless router and access point, but if they're going to be dispersed over a wider area, you may need more access points or a wireless repeater to get good signal.

Also read : ms lan manager

Tuesday 10 March 2020

How to Find My Security Key for My Router

Wireless and grounded Internet connections offer quick Internet service for a consumer and their family. To protect their service from any intruders attempting to steal Internet, many people set up security keys for their routers. Unfortunately, security keys can sometimes be easily forgotten, restraining you from connecting to your own router. Gain entry to it by finding your original security key and recording it later in a safe place.

Step 1
Ensure that the connections on your router are all correct and secured. Make sure that your computer indicates it is connected to the router.

Step 2
Open the folder containing the network connections for your computer. For Windows users, click the "Start button," then click "Control Panel," and then select "Network Connections." Right-click on the icon for your router and click on "Status." Click the "Support" tab. Write down the number given as the default gateway. This will be an eight digit number with periods after the third, sixth and seventh digits.

Step 3
Open a web browser window.

Step 4
Type the default gateway number into the address bar of your browser window and hit "Enter." You may or may not use the prefix "http://," either way will work. This will bring you to the router configuration page. Search through the router settings listed for an entry titled "Security Key" or something similar. This will reveal the security key for that router.

Step 5
Contact the customer support number for your router's manufacturer if you still cannot locate your security key. Ask a customer service representative for any options you have for security key retrieval. In many cases, it may be easier to restore the factory settings on your router and set up the network again.

find more : network security level

Router Role in Networking

  The Quick Definition: Route redistribution is a process that allows a network to use a routing protocol to dynamically route traffic based...