Thursday, July 22, 2010

FreeBSD Serial (65): SMB CIFS protocol


The advent of the NetBIOS, Microsoft will use the NetBIOS implements a network file / print service system, the system sets a NetBIOS-based file sharing protocol, Microsoft called SMB (Server Message Block) protocol. This protocol is used for their Lan Manager and Microsoft Windows NT Server systems, but Windows systems are included in this agreement, client software, so this agreement a great impact in the local area network system.

With the Internet's popularity, Microsoft hopes to extend the agreement up to the Internet, as Inter net to share data between computers on a standard. It will therefore hardly any technology existing SMB protocol for finishing the document, re-named CIFS (Common Internet File System), and intends to phase out NetBIOS it, trying to make it a standard protocol on the Internet.

Therefore, in order to integrate Windows and Unix computers, the best way is to install in Unix support SMB / CIFS protocol software, so that Windows clients do not need to change the settings, you can use the Windows NT server as the same, using the Unix computer the resources of the.

And other standard TCP / IP protocol different, SMB protocol is a complex agreement, because with the development of Windows computers, more and more features are added to the agreement to, and difficult to distinguish between the concept and function should belong to Windows operating system itself, which concept should belong to the SMB protocol. Other network protocols is to first have an agreement as to achieve the relevant software, so the structure of some of the clear and concise, while the SMB protocol has been mixed with Microsoft's operating systems were developed, so the agreement will contain a large number of Windows systems concept.

Browse

In the SMB protocol, the computer to access network resources, you need to know the resources exist on the network list (for example, use Windows Network Neighborhood view can access the computer), this mechanism is called browsing (Browsing). Although the SMB protocol approach often used in broadcasting, but if every time a way to understand the current broadcast network resources (including the provision of services, computers and various computer services, resources), you need to consume a large amount of network resources and waste long Find the time, so it is best in the network maintains a list of network resources to facilitate the search network resources. Only when necessary, only to re-locate resources, such as using a computer search function under Windows.

But there is no need for each computer maintains a list of the resources, maintaining the network from the current task list of resources on the network completed several special computer, these computers are called Browser, the Browser by recording broadcast data or query the name server records network resources.

Browser does not pre-specified computer, but in general carried out between computers automatically elected by the. Different computers can provide services in accordance with their ability to set the time in elected with different weights. To ensure the shutdown of a Browser Web browser is still normal, the network often have more than one Browser, a main Browser (Master Browser), the other for backup Browser.

Working Group and the field

Working Group and the field during the two concepts have the same usefulness of browsing are used to distinguish and maintain the same set of view data in multiple computers. In fact, their difference is authentication, the Working Group in each computer are essentially independent, independent of the customer access to certification, the field will exist one (or several) domain controller, save the entire domain are valid authentication information, including user authentication information and authentication information within the members of the computer. Browse data when the authentication information is not required, Microsoft expanded the domain of the working group, just to create a hierarchical directory structure, the original combination of browsing and directory services, to expand the scope of a network service Mircrosoft strategy.

Working Group and the field can span multiple subnets, so the network on the existence of two Browser, way for the Domain Master Browser, for the maintenance of the entire work group or domain view of data, another for the Local Master Browser, used for maintenance this web browser data, communicate it and Domain Master Browser for all available data. Division was mainly due to the two Browser view data depends on the local network broadcast to get the list of resources between different subnets can only exchange between the ability of the browser in order to exchange list of resources.

However, in order to view the resources of multiple subnets, you must use the NBNS name server resolution means, without the help of NBNS, the computer will not get outside the computer's NetBIOS name of the subnet. Local Master Browser also need to check NetBIOS name server to get the Domain Master Browser name, in order to exchange information on network resources.

Because domain controllers in the domain specificity, it tends to be used as a domain controller Browser, primary domain controller should be used as a Domain Master Browser, set when they elected a greater weight.

Authentication

In Windows 9x systems, it is customary to use share-level authentication with one another by sharing resources, mainly in the Windows system can not provide a true multi-user capability. The resources of a shared class certification is only one password associated with, but not user data. The idea is for a few team members to share files between the resources, once the need to share the resources to become more complex technology needed for the limit, then the resources are set for each share of the practice is no longer a suitable Password the.

Therefore, for large networks, a more appropriate way is a user-level authentication, and certification of each visit to distinguish between users and assign permissions to different users by way of shared resources. Working Group approach for the computer, the user authentication is done through the machine, while the domain of the computer through the domain controller for authentication. When the Windows computer through a domain controller authentication, it can set the execution domain controller on the user's logon script and desktop profiles.

Shared resources

SMB server can provide to the outside of each file or print services, each shared resource that needs to be given a share name, the name will be displayed in the server's resource list. However, if a resource name of the last letter for the $, then the name is hidden on the name, can not be directly reflected in the browse list, but only through direct access to the name to visit.

In the SMB protocol, in order to obtain a list of server resources, you must use the name of a hidden resource IPC $ to access the server, or customer can not obtain a list of system resources.






Recommended links:



FREE convert mp4 to 3gp



PICKED Browsers



Using Flash To Create A Flash Player



Shift from the C + + C # issues needing attention (1)



Articles about Web Servers



Easy to use FTP Servers



ts format



mp4 converter



Specialist Audio And MULTIMEDIA



Deletion of posts by the company, "3.15" price hike: prices starting at 20,000 yuan



Convert m4a to m4r



Eighth say C # sharp experience indexer and operator overloading



China IPTV-What is the SHORT board?



Swift DVD to 3GP Flash M4V



IPod VQF To OGG



No comments:

Post a Comment