Solved

Why is it called "remote"

Posted on 2004-05-01
3
247 Views
Last Modified: 2010-03-18
I'm studying for a mcse exam. I'm going thru WINS resolution quering order. I see that whenever quering local cache is refered to in regards to the clients attempt to resolve for before asking the server. Its always referred to as "NetBIOS remote name cache".

Why is it called "remote" isn't this (or that) the point. Isn't it quering its OWN LOCAL cache? Not another nodes (client, server, whatever).
0
Comment
Question by:Treasur2
3 Comments
 
LVL 4

Accepted Solution

by:
kreaganoutsourceditbiz earned 250 total points
ID: 10970020
That's just what they named it.

Per Microsoft;

How WINS Works
By default, when a system is configured to use WINS for its name resolution, it adheres to h-node for name registration. For name resolution, it will also adhere to h-node but with a few differences. It will:

Check to see if it is the local machine name.
Check its cache of remote names. Any name that is resolved is placed in a cache where it will remain for 10 minutes.
Try the WINS Server.
Try broadcasting.
Check the LMHOSTS file, if the system is configured to use the LMHOSTS file.
Try the HOSTS file and then a DNS, if so configured.

Extraced from;
http://support.microsoft.com/default.aspx?scid=http://support.microsoft.com:80/support/kb/articles/Q119/4/93.asp&NoWebContent=1
0
 
LVL 1

Assisted Solution

by:Nazarelfadil
Nazarelfadil earned 250 total points
ID: 10970024
hi
remote hoste name not remote cash, remote is a describtion of the other host-name and not the cash under query.
0
 

Author Comment

by:Treasur2
ID: 10970169
Ohhhhhhh. I get it. Its a gramatical thing.  Thanks.
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

Suggested Solutions

This article is in response to a question (http://www.experts-exchange.com/Networking/Network_Management/Network_Analysis/Q_28230497.html) here at Experts Exchange. The Original Poster (OP) requires a utility that will accept a list of IP addresses …
The Need In an Active Directory enviroment, the PDC emulator provide time synchronization for the domain. This is important since Active Directory uses Kerberos for authentication.  By default, if the time difference between systems is off by more …
This tutorial demonstrates a quick way of adding group price to multiple Magento products.
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

758 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now