|
Windows 95 provides connectivity to
mobile users who wish to exchange data remotely. Of all the
functionality within Windows, one that interests us is dialup
networking, which lets us turn our workstation into a dialup client
or server. This section
covers some of the connectivity tools that Windows 95 provides to
mobile users. Dialup networking server capabilities are available
only if you install Microsoft Plus! for Windows 95, and can
accommodate only one modem.
Windows 95 provides many tools to
enhance and increase mobile users' productivity:
- Remote mail-Mobile users
can remotely exchange e-mail messages with an MS Exchange server
by using client software such as MS Outlook.
- Direct cable connection-Using
a parallel or null modem cable or infrared devices, this tool
allows you to set up a two-node, peer-to-peer network using
Internetwork Packet Exchange/Sequenced Packet Exchange (IPX/SPX)
or NetBEUI protocols.
- Windows 95 Briefcase-This
tool helps keep your files synchronized when you use two
computers.
- Deferred printing-When your
laptop is not connected either to a printer or to the network,
deferred printing saves the print information until your printer
is reconnected, at which time the printing will happen
automatically.
- Support for other vendors'
tolls for dialup-It is possible to use Windows 95 Dial-Up
Networking to dial in to other remote access servers such as
Windows NT, Shiva, and NetWare.
The issues that you
should consider when working with Windows 95 Dial-Up Networking
include hardware requirements, network design and security
requirements, and configuration requirements.
The required hardware follows:
-
One or more
compatible modems, or an ISDN adapter
-
2 to 3 MB of
hard-disk space to install Dial-Up Networking
The issues to resolve include the following:
-
Considering what
type of remote-access server that the remote users connect to
and which connection protocol to use
-
Deciding what type
of LAN protocol to install on dialup client and server: TCP/IP,
IPX, or NetBEUI
-
Determining what
security is required
Finally, configuration includes the following components:
|