Northern Computer

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Friday, 15 April 2011

Peer to Peer Networking

Posted on 15:00 by Unknown
This is a heavy title for a small article. Anybody in IT, at some point gets called upon to do a small peer to peer network for someone, often family or friends and often with great trepidation. It’s not that peer to peer networks are unreliable. A properly setup peer network is as reliable as any other. The problem is people.


As soon as the second PC rolled off the assembly line, someone wanted to connect it to the first one. This is the core of networking. Early on it was Lantastic, Banyan Vines, Windows for Workgroups and a dozen others. Microsoft dominated the market, and now most peer networking is a component of the Operating system. Peer networking (or P2P) has continued to evolve into a separate existance, with music sharing programs like Itunes, Limewire and such.

So the call comes. Uncle Bob and Aunt May want to network. Originally they had one computer and shared it, until Uncle Bob figured out how to download a Halle Berry Wallpaper. This was the end of ‘sharing the computer.’ Aunt May wanted a computer of her own. In came a new computer for Aunt May (uncle Bob had to keep the old, ‘filthy’ computer) and a router. Each has their own email address, and life was sweet again…Until the pictures start arriving. Turns out that Uncle Bob and Aunt May actually have lives, and interact with different people. Sometimes one gets pictures that the other one wants. They started emailing each other back and forth, but they knew from their very clever nephew who (talks too much) that there was a better way.

Now networking two Windows XP workstations is about the simplest network you can implement. You’d think by now we, as professionals, could agree on a standard. Apparently this is not an option at this point. So, I, Mark Smed, being God of all that I survey, have decided with all my powers to impose upon all of society the ‘correct’ way to network two computers, which are running Windows XP, service Pack 2. Complaints can be sent to the editor.

The basics are pretty simple. Give each machine a unique name, and put them in the same workgroup. TaDaa! Now whose computer do we setup a shared folder on?

Aunt May’s computer is

1. Newer and less likely to fail

2. Has greater capacity since it has a larger hard drive

3. Aunt May is more likely to complete a regular backup since Uncle Bob marches to the beat of a different drummer.

So we setup the shared folder, and tried to access it from Uncle Bob’s computer. It doesn’t work…Wait; Windows XP has a firewall, which prevents these types of intrusions.

This is where we diverge as a profession. Some of us would disable Windows XP’s firewall, since the Router/Firewall will prevent access to the workstations. Another group would create port exceptions in the firewall, which allow the computers to communicate. The really smart group would enable the Peer-to-Peer service in Add/remove Programs, Network services. LOL…ok, that’s a judgement on my part, but as a professional, I need to make decisions about these things. It’s not as simple decision to make. I have a Code of Ethics that I support and underlie all decisions I make.

The first choice is to disable Windows XP’s firewall. Goodness knows, I’ve gone to this as a solution a number of times as time adds up on a service call, and it appears to be a quick solution to a small problem with some odd piece of software. In fact, when Windows first started offering a firewall, I’m sure a lot of us disabled it because of time constraints and ignorance of its potential. I also remember the first time I encountered a network aware virus, which spread to machine with the firewall disabled. Disabling the firewall is not an option anymore, when networking computers, unless it is the only solution available to a unique problem. I have spoken, let all hear and obey.

The second choice sounds good. You still have a firewall enabled, so that will help with things like network aware viruses and the likes. The problem is that peer-to-peer networking is more than open ports. There are a whole series of activities within Windows that are not going to happen if you only enable certain ports. It’s much more complex; See the following;

http://technet.microsoft.com/en-us/library/bb457079.aspx

The last solution is the best solution to offer. It provides the most stable platform for the customer (Uncle Bob and Aunt May). A proper setup, with some training, will ensure that the customers are happy and bring you lots of chocolate chip cookies (or other lesser forms of compensation).

“Now Nephew, I want to start downloading music like I hear people are doing. With this fine network you setup, Aunt May will want to access that as well – When can you set that up?”

“Uncle Bob, music sharing is not really legal. There has been a lot of press related to this and some people have faced some serious charges regarding this. It also exposes you to some potential hazards from the files your downloading”

“Damnations Son! Look over here, I have 1427 LP’s that I purchased in my life. I ain’t stealing music, I’m just downloading what I already own. I promise you that…besides, Aunt May is started her Christmas baking and I have some good currency in the freezer”

Even IT God’s have their challenges.


Mark S, Northern Computer Network Service Technician
Article Originally Published in Network Professional Journal  http://www.npa.org/



Northern Computer - Your Trusted Partner
#1 - 495 Banks Road Kelowna, BC V1X 6A2
Phone: 250.762.7753 Fax: 250.861.1861 Toll-Free: 1.877.257.2896
Email: sales@northerncomputer.ca  or service@northerncomputer.ca
Web: http://www.northerncomputer.ca/
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in Networking | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • What the Heck's in Your Computer - Part 1: The Motherboard
    c The motherboard, also known as the main logic board, has been at the heart of every micro computer since its invention. Its function is si...
  • The Impact of Tablets – 5 Ways Businesses Are Using Them
    From just a few short years ago, tablets have gone from being non-existent to becoming a common device that is being adopted by many busines...
  • Power Protection for Your Computer Hardware - Surge Protectors and UPS'
    It's been said that there are two types of computer users: those who have lost data because of a power problem, and those who are going ...
  • Torture Tests of the Lenovo All-in-One PC
    200 test units, 10 torture tests, 20,000 hours of testing-Lenovo ThinkCentre All-In-One desktops are built tough. Northern Computer - Your T...
  • Office Ergonomics - Keyboard Setup & Usage
    The last area in your work station setup (see our articles on mouse and monitor ergonomics) that can cause injury from improper usage is the...
  • Hey Kelowna - Backup – Disaster Recovery – Are you prepared?
    We all know that we should back up our important data, but maybe we don't know what files we should back up on our systems or we don’t k...
  • Northern Computer and Nidana Networks have Merged
    and News Announcement As Northern Computer continues to grow, we are excited to announce our merger with Nidana Networks. This merger allows...
  • Should I Make the Switch to Windows 7?
    Windows 7 has now been out for a couple of years and yet there are still people who are hesitant to upgrade to it. For the most part this is...
  • 5 Reasons to Consider an All-in-One PC
    If you aren’t already feeling overwhelmed by the consumer devices available on the market today, AIO (All-in-One) PCs are striving for a pie...
  • 7 Reasons why it’s Time to give up on Windows XP Once And For All
    Although businesses have been getting rid of Windows XP for at least the last 3 years, the fact remains that as of March 2013, nearly 39% of...

Categories

  • advertising
  • antivirus
  • application
  • Backup
  • battery
  • Cloud
  • computer
  • CPU
  • data
  • digital signage
  • Email
  • Hard Drive
  • hardware
  • Internet
  • IT
  • Laptop
  • marketing
  • monitor computer video hardware
  • Motherboard
  • Networking
  • Office Ergonomics
  • PC
  • Printers
  • purchase
  • RAM
  • Recovery
  • recycle
  • remote desktop
  • security
  • server
  • Service and Repair
  • signal
  • smart phones
  • Software
  • software server
  • tablets
  • tax
  • Tips
  • TV
  • Virus
  • VOIP
  • warranty
  • web
  • Windows
  • wireless

Blog Archive

  • ►  2013 (23)
    • ►  November (1)
    • ►  October (3)
    • ►  June (2)
    • ►  May (2)
    • ►  April (4)
    • ►  March (3)
    • ►  February (3)
    • ►  January (5)
  • ►  2012 (25)
    • ►  November (2)
    • ►  October (3)
    • ►  September (1)
    • ►  June (2)
    • ►  May (2)
    • ►  April (3)
    • ►  March (5)
    • ►  February (1)
    • ►  January (6)
  • ▼  2011 (56)
    • ►  December (5)
    • ►  November (8)
    • ►  October (3)
    • ►  September (3)
    • ►  August (3)
    • ►  July (7)
    • ►  June (6)
    • ►  May (3)
    • ▼  April (8)
      • What the Heck's in Your Computer - Part 2: CPU
      • What the Heck's in Your Computer - Part 1: The Mot...
      • Peer to Peer Networking
      • Office Ergonomics - Keyboard Setup & Usage
      • How to Compress A File
      • Recovering Lost Icons
      • How to Take a Screenshot with Windows Vista or 7
      • Kelowna - Cloud Computing
    • ►  March (5)
    • ►  February (4)
    • ►  January (1)
  • ►  2010 (29)
    • ►  December (5)
    • ►  November (3)
    • ►  October (4)
    • ►  September (2)
    • ►  August (1)
    • ►  June (1)
    • ►  April (13)
Powered by Blogger.

About Me

Unknown
View my complete profile