The Domain Name System
The Domain Name System
resources connected to the Internet or a private network. It associates various information with domain names
assigned to each of the participating entities. Most prominently, it translates more readily memorized domain
names to the numerical IP addresses needed for locating and identifying computer services and devices with the
underlying network protocols
Whether you're accessing a Web site or sending e-mail, your computer uses a DNS server to look up the domain
name you're trying to access. The proper term for this process is DNS name resolution, and you would say that the
DNS server resolves the domain name to the IP address. For example, when you enter
"https://www.howstuffworks.com" in your browser, part of the network connection includes resolving the domain
name "howstuffworks.com" into an IP address, like 70.42.251.42, for HowStuffWorks' Web servers.
Input Web Address/Search Servers for IP Address/Once it is found Site sent to computer as data packets and
stored in local dns cache
You can always bypass a DNS lookup by entering 70.42.251.42 directly in your browser (give it a try). However,
you're probably more likely to remember "howstuffworks.com" when you want to return later. In addition, a Web
site's IP address can change over time, and some sites associate multiple IP addresses with a single domain name.
Because managing DNS seems like such a big job, most people tend to leave it to the IT professionals. However, by
learning a little bit about how DNS works and how DNS servers are distributed across the Internet, you can manage
DNS with confidence. The first thing to know is what the purpose of a DNS server is on the network where it
resides. A DNS server will have one of the following as its primary task:
Maintain a small database of domain names and IP addresses most often used on its own network, and delegate
name resolution for all other names to other DNS servers on the Internet.
Pair IP addresses with all hosts and sub-domains for which that DNS server has authority.
DNS servers that perform the first task are normally managed by your Internet service provider (ISP). As mentioned
earlier, the ISP's DNS server is part of the network configuration you get from DHCP as soon as you go online.
These servers reside in your ISP's data centers, and they handle requests as follows:
If it has the domain name and IP address in its database, it resolves the name itself.
If it doesn't have the domain name and IP address in its database, it contacts another DNS server on the Internet. It
may have to do this multiple times.
If it has to contact another DNS server, it caches the lookup results for a limited time so it can quickly resolve
subsequent requests to the same domain name.
If it has no luck finding the domain name after a reasonable search, it returns an error indicating that the name is
invalid or doesn't exist.
The second category of DNS servers mentioned above is typically associated with Web, mail and other Internet
domain hosting services. Though some hardcore IT gurus set up and manage their own DNS servers, hosting
services have made DNS management much easier for the less technical audience. A DNS server that manages a
specific domain is called the start of authority (SOA) for that domain. Over time, the results from looking up hosts
at the SOA will propagate to other DNS servers, which in turn propagate to other DNS servers, and so on across the
Internet.
This propagation is a result of each DNS server caching the lookup result for a limited time, known as its Time To
Live (TTL), ranging from a few minutes to a few days. People managing a DNS server can configure its TTL, so TTL
values will vary across the Internet. So, each time you look up "www.howstuffworks.com," it's possible that the
DNS server for your ISP will find the lookup results "70.42.251.42" in its own cache if you or someone else using
that server looked for it before within the server's TTL.
This great web of DNS servers includes the root name servers, which start at the top of the domain hierarchy for a
given top-level domain. There are hundreds of root name servers to choose from for each top-level domain.
Though DNS lookups don't have to start at a root name server, they can contact a root name server as a last resort
to help track down the SOA for a domain.
The Dynamic Host Configuration Protocol (DHCP) is a network management protocol used on UDP/IP networks
whereby a DHCP server dynamically assigns an IP address and other network configuration parameters to each
device on a network so they can communicate with other IP networks.[1] A DHCP server enables computers to
request IP addresses and networking parameters automatically from the Internet service provider (ISP), reducing
the need for a network administrator or a user to manually assign IP addresses to all network devices.[1] In the
absence of a DHCP server, a computer or other device on the network needs to be manually assigned an IP
address, or to assign itself an APIPA address, which will not enable it to communicate outside its local subnet.
DHCP can be implemented on networks ranging in size from home networks to large campus networks and
regional Internet service provider networks.[2] A router or a residential gateway can be enabled to act as a DHCP
server. Most residential network routers receive a globally unique IP address within the ISP network. Within a local
network, a DHCP server assigns a local IP address to each device connected to the network
1. DHCPDISCOVER
It is a DHCP message that marks the beginning of a DHCP interaction between client and server. This message is
sent by a client (host or device connected to a network) that is connected to a local subnet. It’s a broadcast
message that uses 255.255.255.255 as destination IP address while the source IP address is 0.0.0.0
2. DHCPOFFER
It is DHCP message that is sent in response to DHCPDISCOVER by a DHCP server to DHCP client. This message
contains the network configuration settings for the client that sent the DHCPDISCOVER message.
3. DHCPREQUEST
This DHCP message is sent in response to DHCPOFFER indicating that the client has accepted the network
configuration sent in DHCPOFFER message from the server.
4. DHCPACK
This message is sent by the DHCP server in response to DHCPREQUEST recieved from the client. This message
marks the end of the process that started with DHCPDISCOVER. The DHCPACK message is nothing but an
acknowledgement by the DHCP server that authorizes the DHCP client to start using the network configuration it
received from the DHCP server earlier.
5. DHCPNAK
This message is the exact opposite to DHCPACK described above. This message is sent by the DHCP server when it
is not able to satisfy the DHCPREQUEST message from the client.
6. DHCPDECLINE
This message is sent from the DHCP client to the server in case the client finds that the IP address assigned by
DHCP server is already in use.
7. DHCPINFORM
This message is sent from the DHCP client in case the IP address is statically configured on the client and only other
network settings or configurations are desired to be dynamically acquired from DHCP server.
8. DHCPRELEASE
This message is sent by the DHCP client in case it wants to terminate the lease of network address it has be
provided by DHCP server.
As indicated in the name, there are two layers to TCP/IP. The top layer, TCP, is responsible for taking large amounts
of data, compiling it into packets and sending them on their way to be received by a fellow TCP layer, which turns
the packets into useful information/data.
The bottom layer, IP, is the locational aspect of the pair allowing the packets of information to be sent and
received to the correct location. If you think about IP in terms of a map, the IP layer serves as the packet GPS to
find the correct destination. Much like a car driving on a highway, each packet passes through a gateway computer
(signs on the road), which serve to forward the packets to the right destination.
The Link Layer is the physical network equipment used to interconnect nodes and servers.
A hub is a network hardware device for connecting multiple Ethernet devices together and making them act as a
single network segment. It has multiple input/output (I/O) ports, in which a signal introduced at the input of any
port appears at the output of every port except the original incoming.[1] A hub works at the physical layer (layer 1)
of the OSI model.[2] A repeater hub also participates in collision detection, forwarding a jam signal to all ports if it
detects a collision. In addition to standard 8P8C ("RJ45") ports, some hubs may also come with a BNC or an
Attachment Unit Interface (AUI) connector to allow connection to legacy 10BASE2 or 10BASE5 network segments.
A network switch (also called switching hub, bridging hub, officially MAC bridge[1]) is a computer networking
device that connects devices together on a computer network by using packet switching to receive, process, and
forward data to the destination device.
A network switch is a multiport network bridge that uses hardware addresses to process and forward data at the
data link layer (layer 2) of the OSI model. Some switches can also process data at the network layer (layer 3) by
additionally incorporating routing functionality. Such switches are commonly known as layer-3 switches or
multilayer switches.[2]
Switches for Ethernet are the most common form of network switch. The first Ethernet switch was introduced by
Kalpana in 1990.[3] Switches also exist for other types of networks including Fibre Channel, Asynchronous Transfer
Mode, and InfiniBand.
Unlike less advanced repeater hubs, which broadcast the same data out of each of its ports and let the devices
decide what data they need, a network switch forwards data only to the devices that need to receive it.
First take a look at the power button and see if its stuck in the socket. If so, you may be able to simple tap the front
of the case to release the button. In some cases, you may have to remove the system unit cover to get the button
to return to the out position.
If you cannot stop the computer from rebooting by pressing the power button and releasing it, turn off the power
switch in the back of the computer next to the power supply. If your power supply do not have a power switch,
you will have to unplug the system from the wall outlet.
This must be done as soon as possible so that the constant rebooting will not damage components such as the
hard drive. Constant rebooting also have the danger of power surges that can further damage larger components
such as the motherboard.
Second you check your computer's software by checking to be sure no virus or malware have not effected your
hard drive. Virus and malware are small software that is downloaded along with other files that is designed to
cause mischief.
To remove any viruses and malware, use a anti-virus program that will search your hard drive and remove these
file quickly. These files can cause such damage as wiping your hard drive of all data or hijacking your web browser
so you have no control over your online surfing.
If you find no malware on your computer, take a look at your BIOS to see if it has become unstable or has been
changed. BIOS stands for Basic Input Output System and is a small program designed to check all components for
proper operation when the computer is turned on.
If your BIOS has been changed or if you're not sure if its been changed, try to reset the BIOS settings to the default
settings after you access the BIOS as the computer reboots.Once inside the BIOS, you should have the option to
load your default settings, save the change, and reboot the computer.
However, there are times when a continually rebooting computer will not allow you to access the BIOS. You can
then reset the BIOS by removing the system unit cover and locating the jumper on a three pin header.
You must consult your computer or motherboard manual to properly perform this procedure and it should be
done as a last resort. Before making any changes to your BIOS, you should backup your BIOS if your computer
reboots at long intervals.
After checking your computer's software for its rebooting problem, you must check to be sure hardware is not at
fault. This problem may exist because one of your memory modules are unseated from its socket . Memory
modules are long, narrow sticks that attach to the motherboard.
Remove any static electricity from yourself, remove the system unit cover and check these memory modules to be
sure they are secure. Check the connections to the hard drive and the connections leading from the power supply.
Power supply connectors should be checked if you've done work inside your computer recently. Power Supplies
are known to slowly fail and lead to rebooting problems. There is no way to check an ailing power supply and this
should be considered the problem as a last resort.
Following these steps will help you correct any computer that continually reboots itself. If no virus or malware is
found, carefully and thoroughly check all connections. And if the problem still exist, the most likely cause would be
the Power Supply.
Kerberos builds on symmetric key cryptography and requires a trusted third party, and optionally may use public-
key cryptography during certain phases of authentication.[1] Kerberos uses UDP port 88 by default.
Kerberos is a computer network authentication protocol that works on the basis of tickets to allow nodes
communicating over a non-secure network to prove their identity to one another in a secure manner. The protocol
was named after the character Kerberos (or Cerberus) from Greek mythology, the ferocious three-headed guard
dog of Hades. Its designers aimed it primarily at a client–server model and it provides mutual authentication—both
the user and the server verify each other's identity. Kerberos protocol messages are protected against
eavesdropping and replay attacks.
Kerberos builds on symmetric key cryptography and requires a trusted third party, and optionally may use public-
key cryptography during certain phases of authentication.[1] Kerberos uses UDP port 88 by default.
In the console tree, click Computer Configuration, click Windows Settings, and then click Security Settings.
Click Account Policies to edit the Password Policy or Account Lockout Policy.
Click Local Policies to edit an Audit Policy, a User Rights Assignment, or Security Options.
In the details pane, double-click the security policy setting that you want to modify.
If this security policy has not yet been defined, select the Define these policy settings check box.
Step 2: Type gpedit.msc and press enter to open group policy editor.
Computer Configuration > Windows Settings > Security Settings > Account Policies > Password Policy
Step 5: Type in the number of days a user can use the password before Windows 10 requires to change it.
Under Select signature to edit, choose New, and in the New Signature dialog box, type a name for the signature.
Under Edit signature, compose your signature. You can change fonts, font colors, and sizes, as well as text
alignment. If you want to create a more robust signature with bullets, tables, or borders, use Word to format your
text, then copy and paste the signature into the Edit signature box.
To add images to your signature, see Add a logo or image to your signature.
Under Choose default signature, set the following options for your signature:
In the E-mail account drop-down box, choose an email account to associate with the signature. You can have
different signatures for each email account.
If you want your signature added to all new messages by default, in the New messages drop-down box, select one
of your signatures. If you don't want to automatically add a signature to new messages, choose (none). This
doesn't add a signature to any messages you reply to or forward.
If you want your signature to appear in the messages you reply to and forward, in the Replies/forwards drop-
down, select one of your signatures. Otherwise, accept the default option of (none).
Choose OK to save your new signature and return to your message. Outlook doesn't add your new signature to the
message you opened in Step 1, even if you chose to apply the signature to all new messages. You'll have to add the
signature manually to this one message. All future messages will have the signature added automatically. To add
the signature manually, select Signature from the Message menu and then pick the signature you just created.
In the Select signature to edit box, choose the signature you want to add a logo or image to.
Select the Image icon Insert an image from your device icon , locate your image file, and select Insert.
To resize your image, right-click the image, then choose Picture. Select the Size tab and use the options to resize
your image. To keep the image proportions, make sure to keep the Lock aspect ratio checkbox checked.
When you're done, select OK, then select OK again to save the changes to your signature.
If you don't choose to insert a signature for all new messages or replies and forwards, you can still insert a
signature manually.
Choose your signature from the fly-out menu that appears. If you have more than one signature, you can select
any of the signatures you've created.
Right-click on the Windows icon in the taskbar, or if you have a touch enabled device, touch and hold it, a menu
will pop-up.
A Run Window should now appear, in this window type the following command eventvwr
To reset Microsoft Store, select Start > Settings > Update & Security > Troubleshoot, then select Windows Store
Apps from the list and select Run the troubleshooter.
To clear the Microsoft Store cache, press the Windows Logo Key + R to open the Run dialog box, then type
wsreset.exe and click OK. A blank Command Prompt window will open, and after about ten seconds the window
will close and the Store will open automatically.
To reset Windows Update, select Start > Settings > Update & Security > Troubleshoot, then select Windows
Update from the list and select Run the troubleshooter.
Select the Start button, and then select Settings > System > Storage .
Windows will take a few moments to determine what files and apps are taking up the most space on your PC.
Select all the items you want to delete, and then select Remove files.
To choose which files you want Storage sense to delete automatically, select Change how we free up space
automatically, then select or clear the check boxes for options under Temporary Files, Locally available cloud
content, and select Free up space now.
Select the Start button, type disk cleanup, then select Disk Cleanup from the list of results.
Select the check box next to the type of files you want to delete. (To view a description of each type of file, select
the name.) By default, Downloaded Program Files, Temporary Internet Files, and Thumbnails are selected.
To free up even more space, select Clean up system files, and then select the type of system files you want to
delete.
In the search box on the taskbar, type advanced system, and then select View advanced system settings, which has
Control panel listed underneath it.
In System Properties, on the Advanced tab, select Settings in the Performance area.
In Performance Options, select Advanced > Change in the Virtual memory area.
Clear the Automatically manage paging file size for all drives check box.
Select Custom size, then enter an initial size (in MB) and maximum size in the corresponding boxes.
In the search box on the taskbar, type powershell, press and hold (or right-click) Windows PowerShell, and then
select Run as administrator > Yes.
At the prompt, type dism.exe /Online /Cleanup-image /Restorehealth (note the space between "dism.exe" and "/"
and each switch (/)).
If DISM finds corrupted files and replaces them, restart your PC and see that improves performance.
In the search box on the taskbar, type powershell, press and hold (or right-click) Windows PowerShell, then select
Run as administrator > Yes.
At the prompt, type sfc /scannow (note the space between "sfc" and the "/").
If SFC finds corrupted files and replaces them, restart your PC and see if that improves your PC’s performance.
If SFC doesn’t find corrupted files or finds corrupted files but can’t replace them, try using the Deployment Image
Service and Management Tool (DISM).
At the Command Prompt, type the following and then push Enter:
Ren %systemroot%\SoftwareDistribution SoftwareDistribution.bak
When that command completes, type the following and then push Enter:
Close the Command Prompt window, and reboot your computer. (Servicing Stack)
Press the CapsLock or NumLock key to see if the status light above the key turns on.
If the status light turns on, do the following to try and wake your device:
If you have a keyboard connected, press the Windows logo key + Ctrl + Shift + B. If you’re in tablet mode,
simultaneously press the volume-up and volume-down buttons three times within 2 seconds.
If Windows is responsive, you’ll hear a short beep and the screen will blink or dim while Windows attempts to
refresh the screen.
If your using a desktop PC, press Ctrl + Alt + Delete, select an account and try to sign in.
f you can’t sign in, select the Power button on the bottom right-hand corner of the screen to restart your device.
If you don’t see the Power button on your screen, press and hold the power button on your device for 10 seconds
to turn it off. Then press and release the power button to turn your device back on.
If the status light doesn't turn on, press and hold the power button on your device for 10 seconds to turn it off, and
then unplug your adapter. After 30 seconds, plug your adapter back in and restart your device.
On the Services tab of the System Configuration dialog box, tap or click to select the Hide all Microsoft services
check box, and then tap or click Disable all.
On the Startup tab of the System Configuration dialog box, tap or click Open Task Manager.
On the Startup tab in Task Manager, for each startup item, select the item and then click Disable.
On the Startup tab of the System Configuration dialog box, tap or click OK, and then restart the computer. Once
the computer restarts in a clean boot environment, you can follow troubleshooting steps to install, uninstall, or run
your application. Your computer may temporarily lose some functionality while in a clean boot environment,
however that functionality will return when you reset the computer to start normally after you have finished your
troubleshooting.
Go to the right side of the taskbar and right-click (or press and hold) the OneDrive icon. If you don’t see it there,
you might need to select the Show hidden icons arrow first.
Select Settings, go to the Account tab, and then select Choose folders.
Select the Sync all files and folders in my OneDrive check box, then OK.
Select the Start button, then select Settings > Update & Security > Device encryption/BitLocker
Right-click (or press and hold) a file or folder and select Properties.
Select the Advanced button and select the Encrypt contents to secure data check box.
Select OK to close the Advanced Attributes window, select Apply, and then select OK.
Select the Start button, type Services in the search box on the taskbar, and then select Services from the list of
results.
Select the Standards tab, and the double-click Print Spooler in the list of services.
Type %WINDIR%\system32\spool\printers in the search box on the taskbar, select the file folder in the search
results, and then delete all files in the folder.
Type Services in the search box on the taskbar, and then select Services from the list of results.
Select the Standards tab, and the double-click Print Spooler in the list of services.
Select Start, select Automatic in the Startup Type box, and then select OK.
After your PC restarts to the Choose an option screen, select Troubleshoot > Advanced options > Startup Settings >
Restart.
After your PC restarts, select a startup setting by pressing the corresponding number
On the sign-in screen, hold the Shift key down while you select Power > Restart (in the lower-right corner of the
screen).
After your PC restarts to the Choose an option screen, select Troubleshoot > Advanced options > Startup Settings >
Restart.
After your PC restarts, select a startup setting from the list of options by pressing the corresponding number on
your keyboard.
For a limited time after upgrading to Windows 10, you’ll be able to go back to your previous version of Windows by
selecting the Start button, then select Settings > Update & Security > Recovery and then selecting Get started
under Go back to the previous version of Windows 10. This will keep your personal files, but it'll remove apps and
drivers installed after the upgrade, as well as any changes you made to settings. In most cases, you'll have 10 days
to go back.
Keep everything in the windows.old and $windows.~bt folders after the upgrade.
Know the password you used to sign in to Windows 7 or Windows 8.1 (if you used one).
Have the USB drive you used to upgrade to Windows 10 (if you used one).
Check to see if you can restore your PC to factory settings. This will reinstall the version of Windows that came with
your PC and remove personal files, apps and drivers you installed, and any changes you made to settings. Select
the Start button, then select Settings > Update & Security > Recovery. Under Reset this PC, select Get started >
Restore factory settings.
If you have a product key for your previous version of Windows, use the media creation tool for Windows 8.1 or
Windows 7, and then do a clean install.
Select your profile image, then My Account, and Sign-in & security. Scroll down to Signing into Google.
Enter your Gmail password and on the drop-down, tap Select App, Mail, and your Device you want the email to go
to. Then select Generate.
Return to Outlook, paste the code in the box provided, select Connect.
Under AccountInformation, make sure the account you sent the email from is selected.
If your account is a Microsoft Exchange account and your email message recipients are all on the same email
system, you can use recall or replace.
Or, select File > Info > Resend or Recall > Recall This Message...
Select Delete unread copies of this message to recall the sent message.
Select Delete unread copies and replace with a new message to replace the sent message with a new message.
Select the Tell me if recall succeeds or fails for each recipient check box.
Select a condition, and what to do with the message based on the condition.
To use the rule right away, select the Run this new rule now on messages already in the current folder checkbox,
and then select OK.
Select File > Manage Rules & Alerts > New Rule.
Select a template.
Edit the rule description.
Click an underlined value, choose the options you want, and then select OK.
Select the conditions, add the relevant information, and then select OK.
Name the rule, setup rule options, and review the rule description. Click an underlined value to edit.
In the Contact Group box, type the name for the group.
Select Contact Group > Add Members and then select an option:
Add people from your address book or contacts list, and choose OK.
Go to that location and unzip the file: right-click the file and choose Extract All.
An image of what it looks like after you've unzipped your exported calendar.
If you have multiple Google calendars, you'll see an ICS file for each one.
Do this step for each Google Calendar you want to import to Outlook.
In the Import and Export Wizard, choose Import an iCalendar (.ics) or vCalendar file, and then choose Next.
Browse to where you stored the extracted file, and choose the one that ends with gmail.com, and choose OK.
Go to your Outlook calendar. You should now see your Google Calendar events there.
Design/Watermark
Go to Mailings > Start Mail Merge > Step-by-Step Mail Merge Wizard.
Select Label options, choose your Label vendor and Product number (find this on your label package), and then
select OK.
Choose Address block, select OK, and then select Update all labels.
Select Next: Preview your labels, and then Next: Complete the merge.
Enter email addresses of the people you want to share with, and make choices for permission you want to allow.
To review the changes in your document, go to Review > Tracking > Display for Review.
To review the changes, indicated by a red line in the margin, choose Simple Markup.
For a detailed view of the changes, choose All Markup.For a preview of how the document will look if you make all
the suggested changes permanent, choose No Markup.
To view the original document as if all the suggested changes were removed, choose Original.
Select a cell.
Type a comma (,) and select the range or table to look for the value.
Type a comma (,) and the number of the column where the lookup value is located.
Select the cell where you want to put the combined data.
Type = and select the first cell you want to combine.
Select the next cell you want to combine and press enter.
Select the cell where you want to put the combined data.
Type =CONCAT(.
Use commas to separate the cells you are combining and use quotation marks to add spaces, commas, or other
text.
Select the cell or column that contains the text you want to split.
Select the Delimiters for your data. For example, Comma and Space. You can see a preview of your data in the Data
preview window.
Select the Column data format or use what Excel chose for you.
Select the Destination, which is where you want the split data to appear on your worksheet.
Select the range of data you want to rearrange, including any row or column labels, and press Ctrl+C.
Choose a new location in the worksheet where you want to paste the transposed table, ensuring that there is
plenty of room to paste your data. The new table that you paste there will entirely overwrite any data / formatting
that’s already there.
Right-click over the top-left cell of where you want to paste the transposed table, then choose Transpose
Select a chart.
Select Trendline and then select the type of trendline you want, such as Linear, Exponential, Linear Forecast, or
Moving Average.
Select Secondary Axis for the data series you want to show.
More rows of data? Drag handle to add a Sparkline for each row.
Select Sparkline Color > Weight to select the width of the Sparkline.
If the data has positive and negative values, select Axis to show the axis.
Click your first slide, and then on the Design tab, click the down arrow in the Variants group.
Click Colors, Fonts, Effects, or Background Styles and choose from built-in options or customize your own.
When you're done customizing styles, click the down arrow in the Themes group, and then click Save Current
Theme.
Give your theme a name, and click Save. By default, it is save with your other PowerPoint themes and will be
available in the Themes group under a Custom header.
Select and copy the data in Excel that you want to add to the table.
To indicate whether the first row of your data contains column headings, select Yes or No.
Select and copy the data in Excel that you want to add to the table.
In Access, open the table you want to paste the data into.
Select the file you want to share so a green checkmark A green checkmark appears appears.
Select Share.
Add the emails of people you wish to share your file with. Type in a message, and then select Send.
Copy Link creates a direct link to the file that you can share in an email or IM.
Outlook opens up your Outlook app with your file attached to a new email.
1. On the Start menu, click Computer
3. In the Folder box, type the path to the server. For example for student W: drives:
\\studentsrv.student.eku.edu\users\%USERNAME%
6. In the Password box, type your email password for the domain, and then click OK.
Step 1 - Download the manufacturer driver from their website. Recommend using their universal
print driver. Step 2 – Add a Printer and select The Printer that I want isn’t listed Step 3 – Add a
printer using a TCP/IP address or hostname Step 4 – Uncheck Query Printer and unselect
Autodetect – select TCP/IP Device| Step 5 – Generic Network Card – Select NEXT Step 6 –
Select Manufacturer then Have Step 7 – Browse to the downloaded driver package Step 8 –
Select driver then Next Step 9 - Create a User-Friendly Name Step 10 – Share Printer (Required)
1. Click on the Network icon in the bottom-right corner of the taskbar. (If you don't see the button, click the up arrow
button on the left.)
Note: Alternatively, you can open Action Center (Windows key + A), and then click the Network button in the
Quick actions section to access the network flyout.
2. Select the wireless network you want to connect.
3. (Optional) Check the Connect automatically option.
4. Click the Connect button.
Quick tip: If you don't see any network listed, click the Wi-Fi button to turn on the adapter from the flyout.
5. Confirm the network security key (password).
6. Click the Next button.
Once you complete the steps, the device will connect to the network using the wireless connection.
Reconnect automatically
Windows 10 also offers an option to re-enable and reconnect the device automatically after disconnecting the
adapter manually.
o In four hours.
o In one day.
After you complete the steps, Windows 10 won't try to re-establish a wireless connection until the schedule you
specified.
When you use this feature, the computer will only auto-connect to those networks that you've previously
configured to connect automatically.
On Windows 10, you can also use the "Network & Security" settings page to pre-configure Wi-Fi connections
manually, and then when the network is in range, it'll connect automatically.
To set up a Wi-Fi connection with the Settings app, use these steps:
1. Open Settings.
2. Click on Network & Security.
3. Click on Wi-Fi.
4. Click the Manage known networks option.
5. Click the Add a new network button.
6. Confirm the name of the new network.
7. Use the drop-down menu to select the Security type. (Usually, the security type is WPA2-Personal AES.)
8. Confirm the network security key (password) as necessary.
9. Check the Connect automatically option.
10. Check the Connect even if this network is not broadcasting option (optional).
11. Click the Save button.
After you complete the steps, the computer will connect automatically to the Wi-Fi network you specified when it's
range.
1. Open Control Panel.
2. Click on Network and Internet.
3. Click on Network and Sharing Center.
4. Under the "Set up a new connection or network" section, click the Set up a new connection or network option.
5. Select the Manually connect to a wireless network option.
6. Click the Next button.
7. Confirm the network SSID name.
8. Use the drop-down menu to select the Security type. (Usually, the security type is WPA2-Personal.)
9. Confirm the network security key (password).
10. Check the Start this connection automatically option.
11. (Optional) Check the Connect even if the network is not broadcasting option.
12. Click the Next button.
13. Click the Close button.
Once you complete the steps, the device will automatically connect to the Wi-Fi network.
Alternatively, you can connect to a Wi-Fi network using the netsh command-line tool using Command Prompt.
To connect to a wireless access point with command lines, use these steps:
1. Open Start.
2. Search for Command Prompt, right-click the top result, and select the Run as administrator option.
3. Type the following command to view the available network profiles and press Enter:
netsh wlan show profile
4. Confirm the wireless network profile with the settings you want to use.
5. Type the following command to connect to the Wi-Fi network and press Enter:
netsh wlan connect ssid=YOUR_WIFI_SSID name=PROFILE_NAME
In the command, remember to specify the SSID of the network and profile name with the network settings you're
trying to connect.
For example, this command connects to the tsunami network using the tsunami profile:
netsh wlan connect ssid=tsunami name=tsunami
Quick Tip: If you have more than one wireless adapter, you must also specify in the command which adapter you
want to use. Here's an example of the command: netsh wlan connect ssid=YOUR_WIFI_SSID name=PROFILE_NAME
interface=Wi-Fi.
After you complete the steps, the device will connect to the wireless network.
On Windows 10, you can use the netsh command tool to manage wireless adapters and networks. However, it
only allows connections to previously known networks, because you must specify a network profile, which you
can't create with the tool.
If you must use Command Prompt to connect one or multiple devices to the same Wi-Fi network, there's a
workaround you can use. You can export the network profile that was created automatically during the first
connection, and then import it using netsh to connect to the wireless network.
1. Open Start.
2. Search for Command Prompt, right-click the top result, and select the Run as administrator option.
3. Type the following command to view the available network profiles and press Enter:
netsh wlan show profile
4. Type the following command to export a profile and press Enter:
netsh wlan export profile PROFILE-NAME key=clear folder=PATH\TO\EXPORT\FOLDER
For example, this command exports the tsunami profile to the Documents folder.
netsh wlan export profile tsunami key=clear folder=C:\Users\m\Documents
Once you complete the steps, you can import the same XML file to connect other computers to the same network
or reconnect your device if the profile is no longer available.
1. Open Start.
2. Search for Command Prompt, right-click the top result, and select the Run as administrator option.
3. Type the following command to determine the name of the network adapter and press Enter:
netsh wlan show interfaces
4. Confirm the name of the adapter that will connect to the network. (On Windows 10 with a single adapter, usually,
the name is Wi-Fi.)
5. Type the following command to import the network profile and press Enter:
netsh wlan add profile filename="PATH\TO\PROFILE.XML" Interface="YOUR_WIFI_ADAPTER_NAME" user=current
In the command, make sure to specify the path to the XML file and interface name.
For example, this command imports the xml profile located in the Documents folder to the Wi-Fi adapter:
netsh wlan add profile filename="C:\Users\m\Documents\wi-fi-tsunami.xml" Interface="WI-FI" user=current
6. Type the following command to connect to the wireless network and press Enter:
netsh wlan connect ssid=YOUR_WIFI_SSID name=PROFILE_NAME
In the command, make sure to specify the SSID and profile name.
For example, this command connects to an access point using the tsunami SSID and tsunami profile name:
netsh wlan connect ssid=tsunami name=tsunami
Quick Tip: If you have more than one wireless adapter, you must also specify in the command which adapter you
want to use. For example, netsh wlan connect ssid=YOUR_WIFI_SSID name=PROFILE_NAME interface=Wi-Fi
Settings-Update and Security-Recovery (Restart Now)-Troubleshoot-Advanced Options-UEFI