+44(0) 1234 567 890 info@domainname.com
Showing posts with label Networking. Show all posts
Showing posts with label Networking. Show all posts

Tuesday, 29 January 2013

What is Active Directory and its Logical Structure





Active Directory

The Active Directory directory service is a distributed database that stores and manages information about network resources, as well as application-specific data from directory-enabled applications. Active Directory allows administrators to organize objects of a network (such as users, computers, and devices) into a hierarchical collection of containers known as the logical structure. The top-level logical container in this hierarchy is the forest. Within a forest are domain containers, and within domains are organizational units.

Benefits of Logical Structure
  • Increased network security. The logical structure can provide security measures such as autonomy for individual groups or complete isolation of specific resources.
  • Simplified network management. The hierarchical nature of the logical structure simplifies configuration, control, and administration of the network, including managing user and group accounts and all network resources. 
  • Simplified resource sharing. The logical structure of domains and forests and the relationships established between them can simplify the sharing of resources across an organization.
  • Low total cost of ownership. The reduced administration costs for network management and the reduced load on network resources that can be achieved with the Active Directory logical structure can significantly lower the total cost of ownership. 
Domain

Domains are container objects. Domains are a collection of administratively defined objects that share a common directory database, security policies, and trust relationships with other domains. In this way, each domain is an administrative boundary for objects. A single domain can span multiple physical locations or sites and can contain millions of objects.

Domain Tree




Domain trees are collections of domains that are grouped together in hierarchical structures. When you add a domain to a tree, it becomes a child of the tree root domain. The domain to which a child domain is attached is called the parent domain.
A child domain might in turn have its own child domain. The name of a child domain is combined with the name of its parent domain to form its own unique Domain Name System (DNS) name such as software.pcprompt.net. In this manner, a tree has a contiguous namespace.

Forest




A forest is a complete instance of Active Directory. Each forest acts as a top-level container in that it houses all domain containers for that particular Active Directory instance. A forest can contain one or more domain container objects, all of which share a common logical structure, global catalog, directory schema, and directory configuration, as well as automatic two-way transitive trust relationships. The first domain in the forest is called the forest root domain. The name of that domain refers to the forest, such as pcprompt.net. By default, information in Active Directory is shared only within the forest. In this way, the forest is a security boundary for the information that is contained in that instance of Active Directory.

OU




Organizational units are container objects. You use these container objects to arrange other objects in a manner that supports your administrative purposes. By arranging objects in organizational units, you make it easier to locate and manage them. You can also delegate the authority to manage an organizational unit. Organizational units can be nested in other organizational units.
You can arrange objects that have similar administrative and security requirements into organizational units. Organizational units provide multiple levels of administrative authority, so that you can apply Group Policy settings and delegate administrative control. This delegation simplifies the task of managing these objects and enables you to structure Active Directory to fit your organization’s requirements.
No comments

Friday, 7 December 2012

What is Ad hoc and Infrastructure Mode




Adhoc Mode




ad-hoc mode is a method for wireless devices to directly communicate with each other. Operating in ad-hoc mode allows all wireless devices within range of each other to discover and communicate in peer-to-peer fashion without involving central access points (including those built in to broadband wireless Routers).



Infrastructure Mode





Infrastructure mode is one of the two methods for connecting to wireless networks with Wi-Fi enabled devices such as laptops, Pda’s I-phone etc. These devices are connected to wireless network with the help of Access point (AP). Wireless Access Points are usually routers or switches which are connected to internet by Ethernet port.

Wireless Access points are always required for infrastructure mode of wireless networking. It is necessary to use SSID while configuring AP, this SSID should be known to clients for their computers to connect WLAN. SSID is basically security key which help prevent UN authorized access to WLAN.  The Access point is then connected to wire network (Internet) to provide wireless internet connectivity to clients. Multiple access points can be added in the WLAN, this increases the reach of infrastructure for supporting many number of wireless clients.
No comments

Thursday, 6 December 2012

How to configure ip address in windows




The process is actually quite simple:

Step1.

         Type in Start menu , ncpa.cpl
         or 
         Start--> Run---> ncpa.cpl



Step2.

         RIght Click on the Nic(Network Interface Card) and take Properties



Step3.

         Click continue if the UAC(User Account Control) warning prompt comes up

Step4.

         Double Click on Internet Protocol Version4(TCP/IPv4)



Step5.

        Set the new IP Address: 192.168.56.100 (In Our Example)



Step6.

        Click OK Twise

Step7.

          Right Click the NIC and take Status



Step8.

         Click Details Button



Step9.

         The IPv4 IP Address should be the new System IP.




No comments

Sunday, 2 December 2012

How to Setup Wi-Fi HoSpot in Windows 8



1. Go to Control Panel> Network and Sharing Center > Change adapter settings.
2. You can see Microsoft Virtual WiFi Miniport Adapter and Local Area Connection.
wifi3 How to Setup Your Own Wi Fi HotSpot in Windows 8
3. Open your local area connection properties and enable Internet sharing on your internet connected network card. Select the Microsoft virtual Wifi as home networking connection.
wifi 4 How to Setup Your Own Wi Fi HotSpot in Windows 8
4. Open Microsoft Virtual WiFi Miniport adapter properties and uncheck all except IPv4
wifi 5 How to Setup Your Own Wi Fi HotSpot in Windows 8

5. Now open command prompt in administrator mode ( Search CMD and instead of hitting the Enter key, use Ctrl+Shift + Enter )
6. For configures a Wi-Fi network with SSID “cybervally” and protected with the key “pcprompt.net” . Type this code in commad prompt netsh wlan set hostednetwork mode=allow ssid=cybervally key=pcprompt.net
7. Now you can enable your network with enter this code in cmd netsh wlan start hostednetwork
Yep! now your HotSpot is started and you can connect your mobile or ipod to this network.
wifi 2 How to Setup Your Own Wi Fi HotSpot in Windows 8
8. If you want to stop this network, at the command prompt type netsh wlan stop hostednetwork
9. You can also Disable this Microsoft Virtual WiFi Miniport adapter using command netsh wlan set hostednetwork mode=disallow ssid=itgeekdiary key=typepassword
No comments

Sunday, 3 June 2012

Difference Between Hub,Switch and Router





Hub


A common connection point for devices in a network. Hubs are commonly used to connect segments of a LAN. A hub contains multiple ports. When a packet arrives at one port, it is copied to the other ports so that all segments of the LAN can see all packets.



There are three main points to remember about hubs:
  • Many kinds of nodes can be connected to the hub with networking cable.
  • All hubs can be uplinked together, either with straight-through cable or cross-over cable, depending on whether or not the hub has an uplink port.
  • Performance will decrease as the number of users is increased.


When choosing a hub, the main consideration should be performance. If the hub is 100Mbps and there are five users, each user will receive only 20Mbps of bandwidth. If the hub is intended for a small network with very little traffic, this should not be a problem. However, if the network is large or expected to expand, a switch is a better option in the end.
When considering a hub, always remember that the network may expand in the future. Try to buy a hub that has enough ports to allow expansion without more hardware purchases. If expansion is not an immediate concern, remember that in the future you can add more hubs.
The standard hub is great for starting a small network, or providing a network to one department. There are two basic types: 10baseT, which will support a speed of 10Mbps; and 100baseTX, which supports 100Mbps. A standard 10baseT hub cannot connect to hardware that runs at 100Mbps unless a switch or hub with auto-sensing capabilities is used between them. If your network is small and will not require expansion in the near future, a standard hub is the perfect solution.



Switch


In networks, a device that filters and forwards packets between LAN segments. Switches operate at the data link layer (layer 2) and sometimes the network layer(layer 3) of the OSI Reference Model and therefore support any packet protocol. LANs that use switches to join segments are called switched LANs or, in the case of Ethernet networks, switched Ethernet LANs.


e



Switches also run in full duplex mode, which allows data to be sent and received across the network at the same time. Switches effectively double the speed of the network when compared to hubs, which only support half duplex mode.
A 10/100Mbps switch can also support hardware running at either 10Mbps or 100Mbps, allowing the continued use of older technology and delaying replacement.
Switches will increase the speed and efficiency of networks in any of the following situations:
  • Any network that calls for a 10/100 hub will benefit from a 10/100Mbps switch. The switch will increase available bandwidth, drastically increasing the speed that the network is running at.
  • Any network that requires enhanced performance for file servers, workstations, Web servers, etc. Any critical components should be connected directly to a 10/100Mbps switch.
  • Any network that uses high-speed applications including multimedia and video. Any workstation or file server using the intensive applications should be connected directly to a 10/100Mbps switch.
  • Any network that uses Fiber optic cabling should use a 10/100Mbps switch rather than a hub. A hub will not take full advantage of the speed possible with Fiber optic cabling.



Router


device that forwards data packets along networks. A router is connected to at least two networks, commonly two LANs or WANs or a LAN and its ISP.s network. Routers are located at gateways, the places where two or more networks connect. Routers use headers and forwarding tables to determine the best path for forwarding the packets, and they use protocols such as ICMP to communicate with each other and configure the best route between any two hosts



No comments

Saturday, 19 May 2012

What is DNS, and its Working?




Introduction

A key component of the Internet and how it works revolves around the Domain Name System, otherwise known as DNS. The underlying technology behind the Internet, is that when a computer needs to talk to another computer on the Internet, they communicate via the computer's IP Address. The IP Address is a unique set of numbers associated with a particular machine, which will be discussed in a separate article. An example of an IP Address is 216.213.19.27, which is the IP Address that corresponds to www.pcprompt.net.

As the predecessor of the Internet, ARPANET, grew larger, connecting to remote machines by their IP Address grew cumbersome. It became more and more difficult for people to remember the IP Addresses associated with the machines they were trying to reach that a system was created to translate easier to remember symbolic names to their equivalent numerical IP Address. Thus the Domain Name System was born.

Domain Name System
The Domain Name System is the system used on the Internet for the mapping of names, such as www.google.com, to IP Addresses such as 216.239.51.99. Every time a new domain, like pcprompt.net, is registered, that domain is entered into one of the 13 Root Servers spread throughout the world and overseen by an organization called ICANN. Because your domain is in one of these servers, it can be reached and understood by the rest of the users on the Internet.

Another key element of the Domain Name System are DNS Servers run by Companies and Internet Service Providers. Every time you connect to a site, you are asking your ISP's DNS Server to resolve, or convert, the hostname such as www.google.com to a an ip address such as 216.239.51.99. If your ISP's name server is not working or can not be reached, then you will not be able to traverse the Internet using hostnames, but instead would have to use their IP Address equivalent.

Any time you connect to a site, your ISP DNS Server must find out what name server has the information about the domain for the site you are trying to reach. Your ISP's DNS Server will connect to a Root Server and ask it who the name server is that knows the information about the site you are trying to reach. The Root Server will tell your ISP's DNS Server what server they should next contact for information. Next your ISP's DNS Server will then contact the server that the Root Server told it to contact, where it will be given the IP Address associated with the site you are trying to reach.

Real Life Example
A lot of what has been discussed may be a bit confusing, so lets do a real life example. In the flowchart below labeled Figure 1, you will see a computer trying to connect to www.google.com and the steps it takes.
How DNS Works Image

We will discuss these steps below:
  1. A User opens a web browser and tries to connect to www.google.com. The operating system not knowing the IP Address for www.google.com, asks the ISP's DNS Server for this information.
  2. The ISP's DNS Server does not know this information, so it connects to a Root Server to find out what name server, running somewhere in the world, know the information about google.com.
  3. The Root Server tells the ISP's DNS Server to contact a particular name server that knows the information about google.com.
  4. The ISP's DNS Server connects to Google's DNS server and asks for the IP Address for www.google.com.
  5. Google's DNS Server responds to the ISP's DNS server with the appropriate IP Address.
  6. The ISP's DNS Server tells the User's operating system the IP Address for google.com.
  7. The operating system tells the Web Browser the IP Address for www.google.com.
  8. The web browser connects and starts communication with www.google.com.


Conclusion
As you can see, the Domain Name System is essential in the use of the Internet. Without it, you would not be able to type in names, but would have to remember the numerical IP Addresses in order to get anywhere on the Internet.

Reference: Internet
2 comments

Wednesday, 16 May 2012

How DHCP Works



Dynamic Host Configuration Protocol (DHCP) is a client/server protocol that automatically provides an 
Internet Protocol (IP) host with its IP address and other related configuration information such as the subnet mask and default gateway. RFCs 2131 and 2132 define DHCP as an Internet Engineering Task Force (IETF) standard based on Bootstrap Protocol (BOOTP), a protocol with which DHCP shares many implementation details. DHCP allows hosts to obtain necessary TCP/IP configuration information from a DHCP server.

Benefits of DHCP
  • Reliable IP Address configuration
  • Reduced Network Administration
How DHCP Works




1.DHCP DISCOVER: The Dynamic Host Configuration Protocol (DHCP) client broadcasts a DHCP discover message on the network containing its MAC address and NetBIOS destined for UDP port 68 (used by BOOTP and Dynamic Host Configuration Protocol (DHCP) servers). This first datagram is known as a DHCPDISCOVER message, which is a request to any DHCP server that receives the datagram for configuration information.
2.DHCP OFFER: Each DHCP server on the network that receives the request responds with a DHCP offer message as broadcast (UDP port 67) to the computer that issued the DHCPDISCOVER. An offered the IP address and subnet mask is also included in the message. If the DHCP client device received multiple DHCPOFFER, the DHCP client accepts the first DHCP offer that arrives.
3.DHCP REQUEST: The Dynamic Host Configuration Protocol (DHCP) client accepts an offer and broadcasts a DHCPREQUEST datagram. The DHCPREQUEST datagram contains the IP address of the server that issued the offer and the physical address of the DHCP client. DHCPREQUEST message requests the selected DHCP server to assign the DHCP client an IP address and other TCP/IP configuration settings. DHCPREQUEST message also notifies all other DHCP servers that their offers were not accepted by the DHCP client.
4.DHCP ACK: When the DHCP server from which the offer was selected receives the DHCPREQUEST datagram, it constructs a DHCPACK datagram. This datagram is known as a DHCPACK (DHCP ACKNOWLEDGEMENT). The DHCPACK includes an IP address and subnet mask for the DHCP client. It may include other TCP/IP configuration information like IP addresses for the default gateway, IP addresses for DNS servers, IP addresses for WINS servers etc.




    DHCP Terms and Definitions


    TermDefinition
    DHCP serverA computer running the DHCP Server service that holds information about available IP addresses and related configuration information as defined by the DHCP administrator and responds to requests from DHCP clients.
    DHCP clientA computer that gets its IP configuration information by using DHCP.
    ScopeA range of IP addresses that are available to be leased to DHCP clients by the DHCP Server service.
    LeaseThe length of time for which a DHCP client can use a DHCP-assigned IP address configuration.
    ReservationA specific IP address within a scope permanently set aside for leased use by a specific DHCP client. Client reservations are made in the DHCP database using the DHCP snap-in and are based on a unique client device identifier for each reserved entry.
    ExclusionrangeOne or more IP addresses within a DHCP scope that are not allocated by the DHCP Server service. Exclusions ensure that the specified IP addresses will not be offered to clients by the DHCP server as part of the general address pool.
    APIPAA TCP/IP feature in Windows XP and Windows Server 2003 that automatically configures a unique IP address from the range 169.254.0.1 through 169.254.255.254 with a subnet mask of 255.255.0.0 when the TCP/IP protocol is configured for automatic addressing, the Automatic private IP address alternate configuration setting is selected, and a DHCP server is not available. The APIPA range of IP addresses is reserved by the Internet Assigned Numbers Authority (IANA) for use on a single subnet, and IP addresses within this range are not used on the Internet.
    SuperscopeA configuration that allows a DHCP server to provide leases from more than one scope to clients on a single physical network segment.
    Multicast IPMulticast IP addresses allow multiple clients to receive data that is sent to a single IP address, enabling point-to-multipoint communication. This type of transmission is often used for streaming media transmissions, such as video conferencing.
    Multicast ScopeA range of multicast IP addresses that can be assigned to DHCP clients. A multicast scope allows dynamic allocation of multicast IP addresses for use on the network by using the MADCAP protocol, as defined in RFC 2730.
    BOOTPAn older protocol with similar functionality; DHCP is based on BOOTP. BOOTP is an established protocol standard used for configuring IP hosts. BOOTP was originally designed to enable boot configuration for diskless workstations. Most DHCP servers, including those running Windows Server 2003, can be configured to respond to both BOOTP requests and DHCP requests.




    1 comment

    Monday, 12 March 2012

    TCP And UDP Ports


     Introduction
    Concept of Ports and how they work with IP addresses. If you have not read our article on IP addresses and need a brush up, you can find the article here. If you understand the concepts of IP addresses, then lets move on to TCP and UDP ports and how they work.
    The devices and comptuers connected to the Internet use a protocol called TCP/IP to communicate with each other. When a computer in India wants to send a piece of data to a computer in England, it must know the destination IP address that it woud like to send the information to. That information is sent most often via two methods, UDP and TCP.

    The two Internet workhorses: UDP and TCP

    UDP? TCP?  Getting confused, but I promise I will explain this in very basic terms so that you can understand this concept.

    TCP stands for Transmission Control Protocol. Using this method,
    The computer sending the data connects directly to the computer it is sending the data it to, and stays connected for the duration of the transfer. With this method, the two computers can guarantee that the data has arrived safely and correctly, and then they disconnect the connection. This method of transferring data tends to be quicker and more reliable, but puts a higher load on the computer as it has to monitor the connection and the data going across it. A real life comparison to this method would be to pick up the phone and call a friend. You have a conversation and when it is over, you both hang up, releasing the connection.

    UDP stands for User Datagram Protocol.
    Using this method, the computer sending the data packages the information into a nice little package and releases it into the network with the hopes that it will get to the right place. What this means is that UDP does not connect directly to the receiving computer like TCP does, but rather sends the data out and relies on the devices in between the sending computer and the receiving computer to get the data where it is supposed to go properly. This method of transmission does not provide any guarantee that the data you send will ever reach its destination. On the other hand, this method of transmission has a very low overhead and is therefore very popular to use for services that are not that important to work on the first try. A comparison you can use for this method is the plain old US Postal Service. You place your mail in the mailbox and hope the Postal Service will get it to the proper location. Most of the time they do, but sometimes it gets lost along the way.


    Now that you understand what TCP and UDP are, 
    Then start discussing TCP and UDP ports in detail. Lets move on to the next section where we can describe the concept of ports better.

    TCP and UDP Ports

    As you know every computer or device on the Internet must have a unique number assigned to it called the IP address. This IP address is used to recognize your particular computer out of the millions of other computers connected to the Internet. When information is sent over the Internet to your computer how does your computer accept that information? It accepts that information by using TCP or UDP ports.
    An easy way to understand ports is to imagine your IP address is a cable box and the ports are the different channels on that cable box. The cable company knows how to send cable to your cable box based upon a unique serial number associated with that box (IP Address), and then you receive the individual shows on different channels (Ports).
    Ports work the same way. You have an IP address, and then many ports on that IP address. When I say many, I mean many. You can have a total of 65,535 TCP Ports and another 65,535 UDP ports.
    When a program on your computer sends or receives data over the Internet it sends that data to an ip address and a specific port on the remote computer, and receives the data on a usually random port on its own computer. 
    If it uses the TCP protocol to send and receive the data then it will connect and bind itself to a TCP port. If it uses the UDP protocol to send and receive data, it will use a UDP port. Figure 1, below, is a represenation of an IP address split into its many TCP and UDP ports. Note that once an application binds itself to a particular port, that port can not be used by any other application. It is first come, first served.

    <-------------------- 192.168.1.10 -------------------->
    012345................6553165532655336553465535
    Figure 1. IP address with Ports

    This all probably still feels confusing to you, and there is nothing wrong with that, as this is a complicated concept to grasp. Therefore, I will give you an example of how this works in real life so you can have a better understanding. We will use web servers in our example as you all know that a web server is a computer running an application that allows other computers to connect to it and retrieve the web pages stored there.

    In order for a web server to accept connections from remote computers, such as yourself, it must bind the web server application to a local port. It will then use this port to listen for and accept connections from remote computers. Web servers typically bind to the TCP port 80, which is what the http protocol uses by default, and then will wait and listen for connections from remote devices. Once a device is connected, it will send the requested web pages to the remote device, and when done disconnect the connection.

    On the other hand, if you are the remote user connecting to a web server it would work in reverse. Your web browser would pick a random TCP port from a certain range of port numbers, and attempt to connect to port 80 on the IP address of the web server. When the connection is established, the web browser will send the request for a particular web page and receive it from the web server. Then both computers will disconnect the connection.
    Now, what if you wanted to run an FTP server, which is a server that allows you to transfer and receive files from remote computers, on the same web server. FTP servers use TCP ports 20 and 21 to send and receive information, so you won't have any conflicts with the web server running on TCP port 80. Therefore, the FTP server application when it starts will bind itself to TCP ports 20 and 21, and wait for connections in order to send and receive data.

    Most major applications have a specific port that they listen on and they register this information with an organization called IANA. You can see a list of applications and the ports they use at the IANA Registry. With developers registering the ports their applications use with IANA, the chances of two programs attempting to use the same port, and therefore causing a conflict, will be diminished.

    Major Differents Between TCP & UDP

     

    1 comment

    Saturday, 28 January 2012

    Remote Support with Windows Remote Assistance

     


    Before to Using Windows Remote Assistance

    First of all, Windows Remote Assistance requires two parties: one to request help via this tool and another who will accept to provide it. In order for this to work, the party receiving assistance needs to have Windows Remote Assistance enabled in System Properties. How to view if this is enabled is shown here: Enabling Remote Desktop Connections in Windows 7.
    The party in need of help, first has to request it via Windows Remote Assistance.



    Windows Remote Assistance

    To request help, one can either send an invitation file (using any of the first two options: "Save this invitation as a file" or "Use e-mail to send an invitation") or use Easy Connect.

    Windows Remote Assistance

    If any of the two parties involved is using a slow or unstable Internet connection, it is best to use one of the first two options. If both parties have a good Internet connection and they both use Windows 7, then Easy Connect is a good choice. This connection feature uses Microsoft’s Peer Name Resolution Protocol (PNRP) and it works only for Windows 7 and above.
    Even if you have previously connected to it, you cannot connect to another computer via Windows Remote Assistance if it has not requested help and is waiting for an incoming connection.

    How to Request Help via Windows Remote Assistance

    First, you need to start Windows Remote Assistance. The fastest way to do this, is to type the word "remote" in the Start menu search box. Then, click on the Windows Remote Assistance shortcut.

    Windows Remote Assistance

    Another way is to run the msra.exe file found in the "C:\Windows\system32" folder.
    Click on "Invite someone you trust to help you".

    Windows Remote Assistance

    Select the way you want to connect with the person who will help.

    Windows Remote Assistance

    If you send an invitation, make sure the person receives it and knows about it. The invitation is stored as a file with the ".msrcIncident" extension, which is opened only by Windows Remote Assistance.
    If you use Easy Connect, you will first see a list with people who have helped you in the past (only if you received help).

    Windows Remote Assistance

    No matter how you send the request for help, once sent, Windows Remote Assistance shows a long password and starts waiting for incoming connection. Make sure the person who is about to connect to your computer knows the password, otherwise the connection won’t work.

    Windows Remote Assistance

    How to Provide Help via Windows Remote Assistance

    Start Windows Remote Assistance using any of the methods presented in the previous section. Then, select "Help someone who has invited you".

    Windows Remote Assistance

    Now you need to choose the connection method. If you received an invitation, download it to your computer, click "Use an invitation file" and select that invitation file.
    If you will "Use Easy Connect", Windows Remote Assistance will start searching for the other party. This process can take a while, especially if you are not part of the same network or one of the two connections is slow (or not very stable).

    Windows Remote Assistance

    Once the other computer is found and the connection is about to be established, you are asked for the connection password. Get the connection password from the other party, type it and press OK.

    Windows Remote Assistance

    The remote party will be asked to approve the connection. Your computer will wait until the approval is given.

    Windows Remote Assistance

    You are now connected to the other computer via Windows Remote Assistance and you can see its desktop.

    Windows Remote Assistance

    In order to take control and use the mouse and keyboard on the remote computer, you need to first press the Request control button and wait for the other party’s approval.

    Windows Remote Assistance

    A good recommendation is for the remote party to check the box which says "Allow... to respond to User Account Control prompts", especially if you will need to install applications or configure important aspects of the operating system.

    Windows Remote Assistance

    Available Configuration Options

    On the top of the Windows Remote Assistance window, there is a toolbar with several buttons. Their number varies depending on the party involved. For example, Request control and Actual size/Fit to Screen are available only to the computer providing help.

    Windows Remote Assistance

    Both parties can access the Chat feature and use it to communicate.

    Windows Remote Assistance

    On the computer which receives assistance, you can configure, in the Settings window, the way bandwidth is used. If the connection works poorly, don’t hesitate to move the Bandwidth usage slider to Low.

    Windows Remote Assistance

    Unfortunately the computer who provides assistance cannot configure this. It has only two configuration options available.

    Windows Remote Assistance

    The Help button is pretty self-explanatory and loads help information related to using Windows Remote Assistance.
    If the connection cannot be established, the party receiving help has a Troubleshoot button available, which can be used to start a troubleshooting wizard which helps identify where the problem is and how to fix it.

    Windows Remote Assistance
    No comments