Networking behind DSL router

Posted on 2003-03-06
Medium Priority
Last Modified: 2013-11-29
I have a desktop that runs Win2k hooked up to a ActionTec DSL router - Internet runs fine.  I have a Win98 laptop hooked up through a wireless d-link router that is cabled to the ActionTec and that connection works fine.  My problem is trying to get either computer to recognize each other on the network neighborhood.  I've installed TCP/IP and Microsoft Client on the Win98.  I've shared folders on both computers but neither one will see the other one.  I only get one IP address which is managed by the ActionTec and gives a signal to either computer, but I want to transfer files between the two over the connection.  Any suggestions?
Question by:lonjames
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
LVL 26

Accepted Solution

Soulja earned 225 total points
ID: 8085866
I am assuming since you are using two different routers you will have to create a static route between the Dlink router and the DSL router.

Expert Comment

ID: 8085969
What model number is your D-Link?  If it's a router, then it will get the one IP from your ISP and assign two new (private) IPs to your PCs.  If your D-Link is a hub, then I'd expect the problem you've described where only one PC gets an IP (and it's an IP from your ISP).

Expert Comment

ID: 9153221
This old question needs to be finalized -- accept an answer, split points, or get a refund.  For information on your options, please click here-> http:/help/closing.jsp#1 
Post your closing recommendations!  No comment means you don't care.

Featured Post

Free Tool: Subnet Calculator

The subnet calculator helps you design networks by taking an IP address and network mask and returning information such as network, broadcast address, and host range.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
Most of the applications these days are on Cloud. Cloud is ubiquitous with many service providers in the market. Since it has many benefits such as cost reduction, software updates, remote access, disaster recovery and much more.
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…

777 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question