Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Locating a Resource - Client Configuration and Resource Sharing - Lecture Slides, Slides of Computer Networks

This lecture is from Computer networking. This topic came in section Client Configuration and Resource Sharing. Key points in this lecture are Locating a Resource, Resource Sharing Principles, Finding a Computer, Locating a Resource on a Peer Computer, Resource Holder, Soft Resource, Access Control Options, Steps to Finding a Resource, Find Option

Typology: Slides

2013/2014

Uploaded on 01/29/2014

jamil
jamil 🇮🇳

4

(12)

141 documents

1 / 33

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
Resource Sharing Principles
and Locating a Resource
docsity.com
pf3
pf4
pf5
pf8
pf9
pfa
pfd
pfe
pff
pf12
pf13
pf14
pf15
pf16
pf17
pf18
pf19
pf1a
pf1b
pf1c
pf1d
pf1e
pf1f
pf20
pf21

Partial preview of the text

Download Locating a Resource - Client Configuration and Resource Sharing - Lecture Slides and more Slides Computer Networks in PDF only on Docsity!

Resource Sharing Principles

and Locating a Resource

Chapter Objectives

 Describe the resource sharing principles centered around privileges and permissions  Classify the resources into two categories for sharing purpose — Soft and hard resource  Outline methods of exploring the network for computers and resources

MODULE

Resource Sharing Principles

Module Objectives

 Basic peer-to-peer sharing  The process of peer-to-peer sharing  Resource classification for sharing  Sharing and resource types  Access control options

Peer-to-Peer Sharing: The Two

Step Process

 Resource holder — Places the resource on the network — Gives the other users the appropriate privileges to use the resource  Resource’s intended user — Gains access to the resource — Uses the resource in compliance with the privileges given

The Sharing Process

Resource Access privilege Resource holder Network user Security

Sharing and Resource Types

Soft resource on the network Share as any local logical resource Hard resource (device) on the network Install as a local logical device Share the logical device

Access Control Options

Resource Read-Only Full Password dependant. Read-Only Full

MODULE

Exploring the Network: Finding a Computer

Module Objectives

 The peer-to-peer network neighborhood  Steps to finding a resource  Locating a computer through the Explorer — Steps and demonstration  Locating a computer using the Find feature — Steps and demonstration

Steps to Finding a Resource

 Locating the computer is the first step — Through explorer, in general — If not found through the explorer, use the find option  Locating the resource on the computer is the next step

Locating a Computer on the

Network: Through the Explorer

Explorer Network Neighborhood Locate the computer (US)

Locating a Computer Using the

Find Feature

Start Find/ Computer Computer name (US)/ Find Now

Locating a Computer Using the

Find Feature: Demonstration