Home  >  Article  >  Operation and Maintenance  >  What are the main ways to implement the network functions of Windows?

What are the main ways to implement the network functions of Windows?

青灯夜游
青灯夜游Original
2020-10-28 14:06:045655browse

The network functions of Windows are mainly realized through "Network Neighborhood". Network Neighborhood uses NETBIOS; Netbios is an interface standard for accessing network services. It provides a set of methods for network programs to communicate with each other and transmit data.

What are the main ways to implement the network functions of Windows?

The network functions of windows are mainly realized through "Network Neighborhood".

Network Neighborhood, computer terminology, function is used to access other computers on the LAN. Today, with the rapid development of computers, online office work has become possible, and the establishment and management of local area networks have also become a simple mode for office workers in work units to communicate with each other and share resources. The most commonly used tool for resource sharing in a local area network is "Network Neighborhood".

Working principle

NETBIOS

Network Neighborhood uses NETBIOS. Netbois (Network Basic Input/Output System) was originally developed by mm, Sytek as an API to enable user software to use LAN resources. Since its inception, Netbois has become the basis for many other network applications. Strictly speaking, Netbios is an interface standard for accessing network services. It provides a set of methods for network programs to communicate with each other and transmit data. How do we see the content in Network Neighborhood? By using Netbios's datagram or broadcast method, PCs on the Netbios LAN establish sessions to communicate with each other.

NetBIOS can contain up to 16 alphanumeric letters. The combination of letters must be unique throughout the resource routing network. Before a PC using NetBIOS can fully operate on the network, the PC must first register a NetBIOS name. When a computer is turned on, it works according to the following steps. When client A is active, client A broadcasts its name. When it successfully broadcasts itself and no one else has the same name as it, the client registers successfully. The registration process is as follows:

(1) On login, Client A broadcasts itself and its NetBIOS information 6 to 10 times everywhere to ensure that other network members receive the information. (If a machine does not receive it, then the client A will be invisible in the network neighborhood of the machine)

(2) If another client B has already used this name, another client B will publish it. Its own broadcast, including the name it is using. Client A requesting login stops registration.

(3) If no other client objects to registration, client A that requested login completes the registration process. If there is an available name server, the name server will make a note in its database that the name of a certain machine is A and the IP address is XXX. XXX. XXX. XXX.

(4) When machine A shuts down normally, it will re-broadcast to release the name just registered. After receiving it, computers on the same network segment will delete the name in Network Neighborhood.

Browse list

The browse list is in the Microsoft network. Users can see all the computers on the entire network in the browse list. When you open the entire network through the Network Places window, you will see a list of workgroups, and then open a workgroup and you will see a list of computers in it. A workgroup is essentially a group of computers that share a browsing list, and all workgroups are peers. The browsing list is provided by the browsing master server through broadcast query. The browsing master server is the most important computer in the work group. It is responsible for maintaining the browsing list in this work group and specifying the master server list of other work groups. It provides services for other computers in this work group and other computers visiting this work group. Computers provide browsing services. Each workgroup selects a browsing master server for each transport protocol. Its identification contains the msbrowse field.

Network browsing process

When a PC enters the network, if it has file and printer sharing enabled, it will broadcast its presence to the network, and browsing The master server will obtain this announcement and put it into the browse list it maintains; computers that are not bound to file and printer sharing on the corresponding protocol will not announce it, and therefore will not appear in Network Neighborhood. When the client computer wants to obtain the required network resource list, it will first broadcast a browsing request. After the browsing master server receives the request, if the request is for the browsing list of this group, it will directly send back the resource list required by the client; If the request is for the browsing list of another workgroup, the browsing master server will find the master browser of the corresponding workgroup based on the records in its own Browsing List and return it to the user. From there, the user can get the browsing list he wants.

Basic conditions for mutual visits

There are four basic conditions for Windows "Network Neighborhood" to realize mutual visits:

1. The computers on both sides realize network interconnection, and set different computer names, correctly set the computer's IP address, and subnet mask, and they are in the same network segment.

2. Both computers have their firewalls turned off, or there is no policy in the firewall policy to prevent Network Neighbors from accessing each other.

3. Both the accessing and accessed computers are open, and network shared resources are set up.

4. The "Microsoft Network File and Print Sharing" service has been added to the computers of both the visiting and the visited parties.

The above is the detailed content of What are the main ways to implement the network functions of Windows?. For more information, please follow other related articles on the PHP Chinese website!

Statement:
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn