Which TCP IP protocol is used by Windows to share files and printers on a network?

Installing, Configuring as a Server

Graham Speake, in Eleventh Hour Linux+, 2010

Network Printers

Network printers require the IP address or can be found using Simple Network Management Protocol (SNMP) built into CUPS. There are three network protocols supported by CUPS:

AppSocket Protocol, usually associated with HP JetDirect

Internet Printing Protocol (IPP), normally port 631

Line Printer Daemon (LPD) Protocol, port 515

Managing Operation Policies

There are rules built into CUPS to allow the administrator to define a number of policies, such as the user must supply a password, stored in cupsd.conf and are changed via the CUPS interface using the Edit Configuration File on the Administration tab.

Printer Classes

Administrators can group printers together to form a class, allowing users to send a document to this group, and CUPS will decide the best printer to use.

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9781597494977000116

Configuring File and Print Services

Tony Piltzecker, Brien Posey, in The Best Damn Windows Server 2008 Book Period (Second Edition), 2008

Deploying Printer Connections

Installing a network printer on a client Windows computer is relatively easy.Now imagine you need to install a network printer on 500 Windows computers. Fortunately, Windows Server 2008 is all about working smarter rather than harder. You can easily install printers on client workstations by deploying them using Group Policy. In the following Sidebar, we will deploy printer connections.

Configuring & Implementing…

Using the Print Management Utility to Deploy Printer Connections

1

Open Print Management in Server Manager.

2

Expand Print Servers and expand your target server in the left pane.

3

Click on the Printers node to view a list of installed printers, as shown in Figure 7.34.

Which TCP IP protocol is used by Windows to share files and printers on a network?

Figure 7.34. Managing Printers in the Print Servers Console

4

Right-click on the printer you would like to deploy and click the Deploy with Group Policy menu item.

For more information on how to deploy printer connections for Windows Vista and Windows XP clients, visit http://technet2.microsoft.com/windowsserver2008/en/library/8433a76a-0a5d-48f4-893d-35442aa8765e1033.mspx.

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9781597492737000070

General Administrative Tasks

In How to Cheat at Microsoft Vista Administration, 2007

Installing a Network Printer

The procedure for installing network printers is a little different from installing locally attached printers. These printers either are directly connected to a network port or use wireless or Bluetooth printers. For printers that are connected directly to a network port, such as TCP/IP printers or wireless printers, the following steps explain the procedure:

1.

Select Add a Network, Wireless, or a Bluetooth Printer in the Add Printer page. The wizard starts searching for the printer.

2.

The wizard will display a list of available printers. Select your printer and click Finish.

3.

If your printer is not listed, click The Printer That I Want Isn’t Listed.

4.

The Find a printer by name or TCP/IP address page appears, as shown in Figure 5.11.

Which TCP IP protocol is used by Windows to share files and printers on a network?

Figure 5.11. Installing a Network Printer

5.

You can add the printer by browsing the network again, by typing the UNC name of the printer, or by specifying the TCP/IP address of the printer. For this exercise, we will select Add a printer using a TCP/IP address or hostname. Click Next.

6.

The Type a printer hostname or IP address page appears, as shown in Figure 5.12.

Which TCP IP protocol is used by Windows to share files and printers on a network?

Figure 5.12. Adding a TCP/IP Port for the Printer

7.

Select TCP/IP Device in the Device type list. Type the hostname or the IP address of the printer. Notice that Windows automatically adds the port name. Click Next.

8.

The Add Printer Wizard tries to connect to the specified printer. You must make sure that the printer is connected to the network; you have specified a correct TCP/IP address and hostname; and the printer is turned on. If the wizard is not able to connect to the specified port, the Additional Port Information Required page appears, as shown in Figure 5.13.

Which TCP IP protocol is used by Windows to share files and printers on a network?

Figure 5.13. Additional Port Information for the Network Printer

9.

Select the type of network adapter installed in the printer in the Device Type drop-down list. You can also click Custom to specify custom settings for the network printer. Click Next.

10.

From here onward, the procedure is similar to the one explained previously regarding manual installation of a local printer.

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9781597491747500069

Windows Server 2008 R2 file and print services

Dustin Hannifin, ... Joey Alpern, in Microsoft Windows Server 2008 R2, 2010

Installing a network printer on print server

Using the print management console, you can manage all your network printers from one central console. One of the first steps you will want to perform is to install network printers on your print server. This can be done by performing the following steps within the print management console:

1.

Select the Printers node under Print Management | Print Servers | your print server name (see Figure 5.38).

Which TCP IP protocol is used by Windows to share files and printers on a network?

Figure 5.38. Print Server Printers Node.

2.

Right click the Printers node and select the option Add Printer…

3.

You can choose how to locate the printer you want to install including searching the network, using an existing port, or creating a new port. In this exercise, we will choose the option to search the network (see Figure 5.39). Then click Next.

Which TCP IP protocol is used by Windows to share files and printers on a network?

Figure 5.39. Printer port options.

4.

The printer installation wizard will begin searching the local network for printers. After the search is complete, any network printers found are listed in the wizard as seen in Figure 5.40.

Which TCP IP protocol is used by Windows to share files and printers on a network?

Figure 5.40. Searching for Network Printers.

5.

Select the printer you want to install, and then click Next. The wizard will attempt to add a port for the selected printer.

6.

You will next need to give the printer a name and share name (see Figure 5.41). Additionally, you can list location and comments to make it easier for users to find the printer. For example, by using the notation HQ/2nd/Processing Room, users can search for a printer based on its location. When searching Active Directory for printers, a user could enter the search HQ/2nd/* to list all printers on the second floor in the HQ building.

Which TCP IP protocol is used by Windows to share files and printers on a network?

Figure 5.41. Creating Printer Share.

7.

After entering relevant printer information, click Next to continue. Then click Next again to install the printer driver. When the installation is complete you will receive a confirmation page. Click Finish to close the wizard.

Once the printer has been created, you can make the printer more accessible and easier to find by publishing it to Active Directory. To do this, locate the printer in the printer management console and choose properties. Then click the Sharing tab and select the option List in Directory as seen in Figure 5.42. Then click OK.

Which TCP IP protocol is used by Windows to share files and printers on a network?

Figure 5.42. Publishing Shared Printer to Active Directory.

You can now access this printer from a Windows client by entering the UNC path to the printer share (\\Server Name\Printer Share) or by searching Active Directory as seen in Figure 5.43.

Which TCP IP protocol is used by Windows to share files and printers on a network?

Figure 5.43. Searching Active Directory for Published Printer.

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9781597495783000050

Security and Compliance

Bill Holtsnider, Brian D. Jaffe, in IT Manager's Handbook (Third Edition), 2012

Definition of Policies and Procedures

The compliance legislation discussed previously is sufficient reason for establishing policies and procedures. However, even without being compelled by law, it's always wise to define and document policies and procedures for the IT department, as well as the user community.

For example, there may be an informal policy that has determined when personal printers (as opposed to shared network printers) are permitted. However, if this policy is documented and posted, it helps ensure that all employees (both IT and users) are aware of it and that it can be applied consistently. Other examples of policies that can be defined include:

Password requirements (length, frequency of changes, etc.)

Limits on the size of e-mail messages and mailboxes

Retention period for files and messages

Resources and rules in place for spam and virus defense (e.g., the blocking of certain attachment types)

Rules and approvals needed for nonstandard equipment requests (laptops, over-sized monitors, equipment at home)

Requirements for password-protected screen savers

Process for dealing with nonstandard software requests

Policies for disabling/deleting unused accounts

Policies pertaining to IDs and access for nonemployees (temps, consultants, partners, suppliers, etc.)

Provisions for requesting a restore of files

Approval required for accessing the files of a former or unreachable employee

Employee reimbursement for special services (cell phones, broadband connections at home)

Proper use of IT resources (e.g., no personal use of computer equipment, handhelds)

Guidelines for use of social networking sites during working hours and/or on company equipment.

Limitations of support for company equipment at home

Of course, many of these policies should include comment and approval beyond IT before being considered official. In some cases (e.g., file and message retention), Legal should be involved. In other cases (e.g., company equipment at home), it would be wise to involve HR and Finance. Involving other departments not only helps IT establish partnerships with these groups, but it ensures that IT isn't determining policies in a vacuum.

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9780124159495000089

Desktop Delivery Controller – Advanced Configuration Settings

Gareth R. James, in Citrix XenDesktop Implementation, 2010

Citrix Printer Options

Printing is an important consideration as we are changing the physical structure of attaching to our printers. Print job routing is important to consider.

There are three different mechanisms by which Citrix virtual desktops can attach to physical print devices.

1.

Network printers

2.

Session printers

3.

Client autocreated printers

Network Printers

Network printers work exactly the same as they would when using a conventional desktop PC. Network printers are mapped in the conventional way using a login script; the login script could be a simple batch file, .vbs or .kix, for example. The important thing to bear in mind with network printers is the location of the print server, the location of the virtual desktops, and the location of the print device.

The print job will spool on the virtual desktop and traverse the network to the print server, and then to the print device. If your VDI project also includes a centralization aspect, the increase in print traffic needs to be considered. In Figure 5.50, you can see how the print job routes to the physical device.

Which TCP IP protocol is used by Windows to share files and printers on a network?

Figure 5.50. Network printer's job routing.

The print traffic flows outside of the ICA stream and is not able to be compressed as it is outside of the ICA protocol. Physical devices like a Citrix Branch Repeater (or Cisco WAAS/Riverbed, etc.) are the best way to compress this type of traffic.

The print server should always be local to the virtual desktops, and this rule is applicable to all the types of printing. The print device and the user can be remote from the virtual desktop, but the print server should be on the same LAN as the virtual desktop.

Note

The print server and the virtual desktop must have matching drivers. The Windows print server won't load a Citrix universal driver, and consequently the universal drivers can only be used with Client autocreated direct printing.

Client Side Rendering (CSR) is a new “feature” introduced since Windows Vista. This places the load on the client to perform the rendering rather than the server. I would recommend disabling this on a Windows 2008 print server, as it improves the performance of the virtual desktop.

Session Printers

Session printers work in exactly the same way as a network printer. The differentiator is that the management of the printer mappings is managed using Citrix Policies. Session printers require a print server to work; the Citrix Policies only perform a mapping function. A session printer can be created using the standard filtering of policies. The two most commonly used filters would be to map a specific printer to

1.

An Active Directory Group

2.

An IP subnet

Active Directory Groups are routinely used to map network printers; mapping to IP subnets, however, opens interesting possibilities. Depending on which subnet you logon to, you could be mapped a printer in that subnet, which could be useful if your users move around a lot.

Client Autocreated

Client autocreated network printers are created on the virtual desktop, by reading the settings on the client device, and remapping the printers to the virtual desktop. The mechanism works by interrogating the print manager on the end point, and relaying that information to the virtual desktop. In effect, all your printers on the end point are automatically created in your virtual desktop.

Note

Only client autocreated printers can make use of the Citrix universal print driver mechanism. Network printers and session printers must use native drivers.

There are two types of routing that can be used with autocreated client printers: connect directly or connect indirectly.

Connect Directly

Connect directly (Figure 5.51) can only be used with network printers. The virtual desktop reads the connection details and creates its own connection to the print server.

Which TCP IP protocol is used by Windows to share files and printers on a network?

Figure 5.51. Autocreated printers using connect directly.

Connect Indirectly

Connect indirectly (Figure 5.52) means that the print jobs always routes through the client device.

Which TCP IP protocol is used by Windows to share files and printers on a network?

Figure 5.52. Autocreated network printers using connect indirectly.

The print traffic to the client flows within the Citrix ICA session. The traffic is then sent to the print server, and from there to the print device.

This can be useful in scenarios where the print server is on a network that is not visible to the virtual desktop, but is visible to the client device (untrusted domains for example). Additionally, if it is unavoidable that the print server is local to the client device, but not to the virtual desktop, you may achieve better compression and management of the print traffic if it is kept within the Citrix Session.

Locally Attached Devices

Locally attached (Figure 5.53) printers by their very nature always connect indirectly. As the physical device is attached to the client device, the print job will always route through the client device. A local print device could be connected through a USB or LPT port.

Which TCP IP protocol is used by Windows to share files and printers on a network?

Figure 5.53. Autocreated local print devices.

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9781597495820000051

Operating System Security

Jason Andress, in The Basics of Information Security, 2011

Scanners

We can use a large number of scanning tools to assist in detecting various security flaws when we are looking at hosts. Although we discussed this in Chapter 8 from a network perspective, such tools can also be used to enhance the security of our hosts. We can look for open ports and versions of services that are running, examine banners displayed by services for information, examine the information our systems display over the network, and perform a large number of similar tasks.

Earlier in this chapter, when we were discussing hardening, we looked at a very simple example of using Nmap to look at a device over the network in order to discover the ports that had services listening on them. Nmap actually has a very large and broad set of functionality and can give us considerably more information if we ask it to do so. In Figure 9.3, we can see the results of an Nmap scan directed against a network printer. In this case, we asked Nmap to also look for the particular versions of the services it found, and to attempt to identify the operating system running on the device. If we look at port 9220 in the listing, we can see that the service is hp-gsg, which, although a bit cryptic, might give us somewhat of a clue that it is a service specific to HP printers, but if we look at the version information on the same line, we can see very specifically that the service is HP Generic Scan Gateway 1.0. Based on this information, we might have a much better chance of successfully being able to attack the device.

Which TCP IP protocol is used by Windows to share files and printers on a network?

Figure 9.3. Nmap Scan Result

Alert!

Looking closer at the Nmap results in Figure 9.3, you will notice that Nmap told us the device being scanned was a printer, but it also told us it was running Mac OS X as an operating system. Sometimes Nmap’s OS fingerprints can be a little skewed from what is actually on the device, so it is often best to verify the output from Nmap with another tool if something looks odd.

In addition to the many features built into Nmap, we can create custom Nmap functionality of our own, through the use of the Nmap Scripting Engine (NSE).

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9781597496537000098

Managing Files and Directories

In How to Cheat at Windows System Administration Using Command Line Scripts, 2006

Copying Files to and from Devices

You can specify the source and destination in the Copy command as devices such as COM1 and LPT1, instead of as files or folders. In this case, the command either takes the input from a device or writes to it. When copying to and from a device, you must use the Ctrl + Z character to mark the end of the file. This character is shown in the command-line window as ^Z but is not sent to the destination device. The following sections discuss the supported devices you can use with the Copy command.

CON

CON stands for console and refers to the keyboard and the monitor. You can input any file by typing it on the keyboard while the monitor displays the output. When you finish typing, just press Ctrl + Z to indicate the end of the file.

PRN

PRN stands for printer and you can use it only as a destination with the Copy command. You specify the destination of a file as a printer connected to any of the computer's ports. If the computer is using a network printer, the port can be local or networked. When copying a file to the printer, you can insert a Ctrl + L character to print only a part of the file.

LPT

LPT refers to devices that are connected to the system's parallel ports (typically printers), connected to the computer's LPT1 through LPT4 ports. You can specify these devices only as destinations with the Copy command. As with PRN, the port can be either local or networked.

COM

COM refers to devices connected to the computer's communications ports (serial ports), from COM1 through COM4. The devices can be modems, keyboards, a mouse, or even a printer. Unlike with the PRN and LPT ports, you can specify the COM port as both source (input) and destination (output) with the Copy command.

NUL

A NUL device refers to a NULL device. When you use the NUL device as a destination with the Copy command, the command interpreter does not copy the output to any destination. NUL is actually a nonexisting device for the Copy command.

When you use a device as the destination for the Copy command, you should use the /b parameter so that all data is sent to the device in binary mode. All special characters including Ctrl + Z, Ctrl + C, and Ctrl + S are copied to the device. If you omit the /b parameter, the Copy command sends the data in ASCII text mode. In ASCII mode, the Copy command may combine all files at the destination. To avoid this situation, it is best to use the /b parameter with devices (unless you have a reason to use the default ASCII mode).

Swiss Army Knife …

Windows Explorer versus the Command Line

People generally use Windows Explorer to copy, move, rename, or delete files on the computer. But using the command line certainly has its own advantages. For example, you can use the Copy command to copy files to devices such as LPT1 and COM1 in binary format. When you are copying files from a mapped network drive and the connection is lost, you can use the /z parameter to resume the copy operation from the point at which the connection was lost. This is a functionality you do not get with Windows Explorer. The flexibility of the command line makes it extremely useful in batch files.

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9781597491051500080

Architecture Overview

Magnus Olsson, ... Catherine Mulligan, in EPC and 4G Packet Networks (Second Edition), 2013

2.1.9 Optimizations for Small Cells and Local Access

In order to allow for access to content that is physically located close to the base station, alternative solutions for allowing local IP connectivity have been specified in the architecture. One example is a small-sized base station located on a corporation’s premises and being accessed by employees who primarily want to access the corporate Intranet. The 3GPP architecture specifies multiple options for how to realize this, which will be further described in Chapter 14. One option, referred to as LIPA (Local IP Access), means that the base station has a built-in IP GW functionality referred to as L-GW (Local GW), which is a simplified variant of a combined Serving GW + PDN GW. The LIPA feature developed in Release 10 is geared more towards end-user premise function where traffic towards a local network (printers, file storage, etc.) can be sent to/received from. The architecture is shown in Figure 2.20.

Which TCP IP protocol is used by Windows to share files and printers on a network?

Figure 2.20. Network Architecture for Home eNB Support.

Note that the LTE base stations for corporate or home usage are called HeNB – “Home eNB” – in order to distinguish these from the eNBs serving the macro network. Regardless of whether LIPA is used or not, there is an optional HeNB GW in the architecture between the MME and the HeNBs. This GW appears to the MME as one single eNB, and as an MME towards all HeNBs. The HeNB GW relays messages between the MME and the HeNBs while protecting the MME from signaling due to, for example, HeNBs being powered on and off. It also allows for an efficient scaling of the number of HeNBs that can be connected to an MME. In order to protect the signaling and user traffic between the HeNBs and the HeNB GW and/or the MME and SGW, a Security GW is deployed (not shown in the figure).

The concept of “Closed Subscriber Groups” (CSG) is used to control access to specific cells, typically in home or enterprise locations. CSG identifies a group of subscribers as “members” who are permitted to access one or more CSG cells of the PLMN. A CSG manager can add, delete, or modify CSG subscription for a user.

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9780123945952000025

Geeks and Luddites: library culture and communication

Dan Gall, Donna Hirst, in An Overview of the Changing Role of the Systems Librarian, 2010

Role of the systems librarian

Systems staff have counterparts outside the library

Many positions in libraries are unique to libraries: bookstack supervisors, interlibrary loan coordinators and reference manager librarians. The role of systems librarian often integrates tasks and responsibilities from non-library system departments such as database manager, application programmer, desktop support, system administration and network manager. A systems librarian must have knowledge and experience of libraries, but the critical component of the job is systems. A systems librarian must install, upgrade and troubleshoot both hardware and software. The systems librarian must often train library staff in the various technical tools acquired by the library.

Changes in technology have defined the systems librarian

As technical library tools have advanced and as technology within the culture has evolved, the role of systems librarian has been stretched. Software to maintain security in the network and on workstations has become increasingly important in an environment of rampant computer fraud and abuse. Support for digital collections, electronic books, and online databases requires new expertise. Systems librarians find themselves supporting laptops, PDAs, faxes, camcorders, elaborate scanning equipment and high-end network printers. Software functionality continues to change; mobile applications become more important as many library users rely on PDAs for information. The library catalog evolves with new discovery tools and emerging software. The cost of hardware and storage regularly decreases, resulting in the diversification of available technological tools and the creation of serious support issues for the systems librarian. Online problem reporting tools have become sophisticated and management tools have become more effective.

Changes in the needs of users have affected the role of systems librarians

More than in earlier decades, the needs of library users are shaping the role of systems librarians. Users want materials and services now. Users expect a broad range of technical support including customized printing, fax and scanning. They want searching to be not only intuitive but automatic. Document delivery allows faculty and students access without entering the library. Relevance ranking, as with Google, places the system in the position of identifying the best resources. Library users expect the computer to pull disparate but related resources together with link-resolvers like Ex Libris’ SFX or EBSCO’s LinkSource. Recommender services connect library users to other library users who have opinions about resources.

How does the systems librarian fit into the maze of requests and demands? Frequently the needs of library users are not the same as those of library staff, who are hoping for support in doing their day-to-day tasks in the most efficient, automated way possible. Increasingly library administrators are saying that if the library does not offer a service that the users want, then the users will just find other non-library vendors, like Google or Amazon, to meet their needs.

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B978184334598550004X

What protocol does Windows use for file sharing?

The Server Message Block (SMB) Protocol is a network file sharing protocol, and as implemented in Microsoft Windows is known as Microsoft SMB Protocol.

What is the SMB protocol used for?

Feature description. The Server Message Block (SMB) protocol is a network file sharing protocol that allows applications on a computer to read and write to files and to request services from server programs in a computer network.

What does TCP IP mean on a printer?

TCP/IP is the recommended method for network printing if your printer is "TCP/IP Addressable." It is a high-speed method for sending a print job directly to a printer. Printing is the most visible way to judge network performance and reliability.

Is CIFS and SMB same?

CIFS (Common Internet File System) and SMB (Server Message Block) are both Windows file-sharing protocols used in storage systems, such as network-attached systems (NAS). The key difference between CIFS and SMB is that CIFS is a dialect of SMB – a particular implementation of the SMB protocol.