Adding XP system to Home network

Posted on 2004-10-23
Last Modified: 2012-05-05
I have a home network with two computers - i'm thinking of adding in a third - a WinXP (sp2) desktop that i just bought.

In poking around in the XP network set up i noticed (for choosing the ICS computer) that it says:

"The computer must be one that you can leave on at all times so that the other computers can access the internet. If the computer is turned off the connection to the internet will not be available."

Is this really true - because right now i have a desktop (WinME) computer hardwired to a Netgear hub/wireless router and networked (wirelessly) to a Win98SE laptop . My desktop does not have to be on for the laptop to access the internet (obviously it does for printer and file sharing), but that's not what i understand from the above statement.

I'm confused before i've begun.

Question by:davsay
    LVL 5

    Accepted Solution

    ICS (Internet connection sharing) is a way to share the internet using windows, You would have two network cards installed in one machine, one would goto your modem, the other a hub/switch where other computers would connect as well.  What the warning is telling you is if your network was setup like this (the computer is the device thats sharing the internet) the other computers wouldn't be able to connect to the internet.

    In your case since you have a netgear router doing this function you don't have to worry, so long as that has power you can get to the internet as well as connect to other computers on your network.
    LVL 4

    Expert Comment

    what dullz said -- please  don't take points from dullz and give to me for adding this!

    Author Comment

    Ok, thanks.

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone. Privacy Policy Terms of Use

    Featured Post

    Find Ransomware Secrets With All-Source Analysis

    Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

    Suggested Solutions

    Lets look at the default installation and configuration of FreeProxy 4.10 REQUIREMENTS 1. FreeProxy 4.10 Application - Can be downloaded here ( 2. Ensure that you disable the windows fi…
    Don’t let your business fall victim to the coming apocalypse – use our Survival Guide for the Fax Apocalypse to identify the risks and signs of zombie fax activities at your business.
    Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
    After creating this article (, I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

    875 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    13 Experts available now in Live!

    Get 1:1 Help Now