Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

Linux peer-to-peer LAN's

Posted on 1997-02-22
1
581 Views
Last Modified: 2006-11-17
I am a newcomer to Linux and would like to inquire about
the possibility of establishing a peer-to-peer LAN with Linux
machines.  Is it possible?  And how to establish such a LAN with NICs and cables and in summary how to define
the shared resources along the same lines as in peer-to-peer LAN with win95?
0
Comment
Question by:mmhamze
1 Comment
 
LVL 1

Accepted Solution

by:
ping0621 earned 150 total points
ID: 1584058
It's perfectly possible to setup a mixed network (Linux/wfw/W95)
Hardware : NIC (3com or NE2000), COAX-cables, Terminators and T's.
Software : You can use samba to share disk and printer devices.

You can also share modems, create a networkfax, central backups,
and share you PPP-connection.
0

Featured Post

NFR key for Veeam Backup for Microsoft Office 365

Veeam is happy to provide a free NFR license (for 1 year, up to 10 users). This license allows for the non‑production use of Veeam Backup for Microsoft Office 365 in your home lab without any feature limitations.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I have seen several blogs and forum entries elsewhere state that because NTFS volumes do not support linux ownership or permissions, they cannot be used for anonymous ftp upload through the vsftpd program.   IT can be done and here's how to get i…
Note: for this to work properly you need to use a Cross-Over network cable. 1. Connect both servers S1 and S2 on the second network slots respectively. Note that you can use the 1st slots but usually these would be occupied by the Service Provide…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

808 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question