General question about DHCP network configuration

In the past, I've always set up printers on network with a static IP address. With the proliferation of networked printers and progress in the printer driver software, I wonder if the static configuration is always recommended and necessary.

Let's say I have install an Officejet 6500 wireless printer configured for DHCP and it gets an address 192.168.1.7. To continue, the printer driver is installed on the computers all networked and the printer port is listed as HPxxx192.168.1.7. After a break from running, say that the address assigned dynamically changes printer 192.168.1.5, leading to the question... to will the computers still be able to print to the printer who has now a new IP address? Basically, is the intelligent print driver so that he will direct the print jobs to the new address without additional configuration? (perhaps the answer varies depending on the printer model and the operating system of the client)

I have installed HP network printers on a regular basis in a variety of operating system environments. So the question in more specific general. I don't feel a particular problem at this stage. But when I configure network printers in the future, an answer to the question will be useful.

Thanks in advance.

It depends on.  On older printers a static IP address is very important on the latest not so much. It is really dependent on the platform on which rests the HP software.  HP printers currentlyon market, in theory, do not need static IP addresses.

In addition, when you set a static IP address, I always put one outside DHCP pool.  If the range is the range (.2 a.254) I reduced the scope and then put printers outside the pool.  This way there is never any conflict.

Tags: HP Printers

Similar Questions

  • Newbe question about the network configuration of ESXi 3.5

    I have ESXi 3.5 works well on a Dell Poweredge T300 server.  I want to connect a Netgear ReadyNas Pro Business Edition for this Dell and connect by iscsi.

    I want to connect 1 network card of the ReadyNas for 1 network card on the Dell printer.

    My question is on the Dell when I go to the ESXi server and customize by pressing F2 and goto network settings I see the following:

    X vmnic0 embeeded nic1

    NIC2 integrated vmnic1 used by vswitch1

    I'm may be thick but can you explain what NIC on the ESXi server is used for access interenet and I need to configure for iscsi?  I thought that it should be obvious, but it is vmnic0 or vmnic1?

    Your ESXi host has two vswitchs configured what uplinks to physical NIC in the system.

    vSwitch0 what uplinks to vmnic0 (who, although a red x, indicating a problem seems to be very well) this vswitch holds you management interface (IP 192.168.2.107) and a portgroup of VM for your virtual machines. You also have an another vswitch vswitch1 what uplinks to GB NIC vmnic1. This vswitch has unused virtual machine port group. Also a VLAN ID has been set for this vswitch which would lead me to believe that VST is / was operating on that host in the past.

    Haven't you set up this? If this isn't the case, I would get with one who did.

    Order "the great vSwitch debate" parts 1 and 2 to start.

    http://kensvirtualreality.WordPress.com/2009/03/29/the-great-vswitch-debate-part-1/

  • I have a question about the network configuration

    Hello

    I'll set up a network with 8 computers. My logic is correct?

    I have an internet connection by cable to come in the main office. I was going to plug the BEFSR41 "Router EthernetFast cable with switch 4-port" to the internet. Then plug 3 computers and an ethernet cable that relate to an EG008W "Gigabit 8-port Workgroup switch". Then plug the remaining computers to the EG008W.

    What is the correct procedure?

    Thank you

    Greg

    Thank you!

  • General questions about errors in eventvwr

    Greetings.

    I have a general question about some failed modules are stored in the Windows Event Viewer.

    An error leading to the crashes some applications that I've seen several times now when supporting computer problems is something like this:
    (Windows error reporting) Fault bucket, Type 0, name of the event: PCA2, (...) P1: application.exe, (...)

    I wonder what this 'PCA2. Which is a kind of module Windows handles tasks such as allocating memory or smth. Like this? What could be the cause of these errors (physical memory problems / corrupt swap file / insufficient rights?)

    Same Question for the application falls down because of "kernelbase.dll" as in:
    (Application error) Failing application: application.exe, Version: 0.0.0.0, (...) Failed module: KERNELBASE.dll, Version: 6.1.7601.18015, (...) Path of the failing module: C:\Windows\syswow64\KERNELBASE.dll (...)

    What is the .dll file and what could possibly cause kernelbase.dll Fault?

    The application can be a bit buggy, but I wonder what could possibly cause these accidents and if there is a way to fix these problems - or what dev did wrong.

    The two errors occur mainly on x 64 systems - especially Windows 7/vista

    Kind regards

    With application errors, the application is called everything first and the module he collaborated with is named second. Normally you should try to reinstall the application if you see not to repeat the mistakes. If this does not work, you go to the forum on the application to see if other users see the same error. There may be a bug in the application.

    The observer of the Application event log contains Information reports (event ID: 1001) for errors where the details were sent to Microsoft for review. You will find that there are corresponding to the event ID: 1000 reports errors, either in the system or Application logs. These reports are also included in the center of the Action. Center type action in the area of research above the Start button and press ENTER. Click on the arrow pointing downwards to the right of Maintenance, and then click view reliability history. The errors reported are the Red orbs with a white cross. You can search for solutions to problems, but occasionally you get a significant response from Microsoft.

    I can't tell you what it means PCA2. Google did not find a significant result. The reports themselves are not unintelligible, although I have never tried to understand the meaning of a particular report. I have extracted what, in my view, is a starting point of two reports:
    Event name: PCA2 = P1: motherboard_utility_onoffchargesetup.exe P2: 4.65.0.0

    Event name: PCA2 = P1: setup.exe P2: 11.0.0.28844

    You have the app in the boredom and the version of the file. These details have been extracted a file of information system to a computer with a card mother Gigabyte. So, you see I have a starting point, if I wanted to determine the cause of a failure.

    I will say before you go dive deep into each event ID: 1001 report that many are not easy to even begin to understand. However, they can provide useful clues.

    KERNELBASE.dll is likely to be the module with which the application works. You need to focus on the application.  KERNELBASE is probably preceded by P3 or P4 in the report?

    General remarks on the event viewer:
    http://www.gerryscomputertips.co.UK/syserrors5.htm

  • General question about the updates and version number

    I have a general question about versions and update.  I'm new on this and am in the deep end of learning I want.

    In vSphere web client, I see the following versions (these are exactly as the seller, he left a few months that I have screenshots in my documentation that match)

    Version - VMware ESXi, 5.1.0 1612806

    Profile - Dell (updated) ESXi - 5.1 - 799733 (A00)

    I am trying to familiarize themselves with the Update Manager and I noticed that there are a lot of patches and updates available.

    Lists of Update Manager 5 patches as "Missing" with Red x but directly above them are a list of patches with green tick indicating that "installed" - it is perhaps obvious, but im guessing 'installed' means really installed when displayed on the screen - there is an update installed, labeled "ESXI 5.1 all the update 2-' would be able to tell that it has been installed by the details of profile/version above?

    I don't think it's a big deal at this stage, but if I install all missing patches and then the details of the version/profile change in summary screen?

    I hope this makes sense.

    Thank you

    This article allows to correlate the updated version: products VMware correlating build numbers to update levels (1014508)

  • General question about the Browser element

    Will look for an alternative, I found the Browser element and now I have a few questions about that:

    As I am not yet experienced on the Interfaces of Java development, I was wondering if following senario is possible:

    Have some HTML Pages which do the job of the Interface.

    If you submit a form, the JAva Base program (the Master application) process all Information.

    If you are viewing a list, the info is from a json of the Base program output.

    As the Communication Server Client HTML, the only difference is, that all communications remains inside the app.

    Is this possible?

    I can't speak to the idea of dealing with the entry of html, but I can confirm that it is possible for an application program to create a html page and providing the BrowserField for display.

  • How I replace perfectly my record excel sheet with ability of database? + General questions about computing distributed with LabVIEW

    Surprisingly, I'm almost finished with a full blown control-simulation application, that I've been working on for more than a year now, thanks in no small part of this community. The final step is to run on the simulations of k ~ 8 and be able to meet a simulation and overall statistics on performance. Each simulation is taking about 6 minutes of real time to run (~ 2 seconds of real time per hour of simulation time, valid for 7 days of simulation), as we seek to about 800 hours of your time to simulate. I have 5 computers available and a raspberry 2 Pi these simulations on, I'm looking to set up a kind of compute cluster at the end in about 2 weeks.

    The ability of current logging is sketchy; I got about 40 columns of data, and they are written in a spreadsheet with a .xls format tabs-delimited. This works very well for individual simulations, but it would be quite heavy to deal with if I had more than 20,000 of them. I think this must be done with a relational database sort, but my experience with databases is very limited, especially then, when it comes to LabVIEW. Here are my questions:

    -Can I create a kind of master-slave configuration where a computer (and probably the Pi) keeps track of the simulations are complete, which are running, and who have never run? Computers slaves ask for simulation settings, and IP would give them to him.

    -How should I take care of the database? Each simulation is about 500 k in .xls format, it's about 5 GB of data in all. Computers slaves synchronization from time to time to take care of the redundancy?

    -How can I refine my memory + General fresh disk I/O? How can I know which items from my point of view most of them?

    -Do you have suggestions for the implementation of clusters of databases relational/computer with LabVIEW?

    I have attached a picture of my configuration of logging + the overall structure of the application. It is a state machine with a structure of the event for the interruptions.


  • General questions about Cluster 4400 WLC

    I have inherited some 4402 wireless LAN controllers and I am in charge of making their ship-shape. So I have a few general knowledge wireless, I have not worked with before wireless controllers and have a few issues with that I was wondering if someone could help me:

    (1) how can I check that the primary and secondary controllers are configured for failover without actually performing a test? Both have AP failback enabled, but I don't know what else to check.

    (2) they are running code 3.2.116.21. If I want with 3.2 or plan to move up to 4.X?

    Thanks to a bouquet. I'm slowly working my way through the docs and the answers to them would of course speed up things.

    Hi Johnny,.

    I hope things are well with you! The steps required to set up relief AP are detailed in the attached doc. I would always try to provide a Maintenance window to test this point, rather than not knowing for sure :)

    WLAN controllers to access tipping points light Configuration example

    http://www.Cisco.com/en/us/Tech/tk722/tk809/technologies_configuration_example09186a008064a294.shtml#C4

    Now, for your second question, it is likely that you will want to upgrade the WLC to a version more recent code. They have passed through 4.0.x, 4.1.x and newer 4.2.x. 3.2 is a fair way behind. Take a look at the WLC Release Notes;

    Series 4400 Cisco Wireless LAN controllers Release Notes

    http://www.Cisco.com/en/us/products/ps6366/prod_release_notes_list.html

    I hope this helps!

    Rob

  • Basic question about ESXi networks

    Hi all

    It may be a very simple question for you but I am new to ESXi and I need your help.

    I have a configuration of ESXi envionrment like that.

    192.168.1.200 - ESXi Server

    192.168.1.50 - a Linux machine

    192.168.1.60 - a Windows 8.1

    ESXi server connects to a router and the network is 192.168.1.0/24.

    The topology just like that.

    Screen Shot 2016-07-03 at 11.08.25 AM.png

    My problem is,

    1. I have a Mac machine connect to the same router. There is a web interface built into the Linux box. Can I use the Windows 8 to go, but I can't use the machine to physical Mac do. The firewall is off turn in ESXi already

    2. How can I make the two machines able to access internet?

    Thank you!!

    After taking a second look at the configuration of the network, I have seen that you have configured a VLAN ID on the port group. Assuming you are using a router not supported (i.e. without ports trunk/tag), this may cause the problem. Please remove the VLAN ID to see if that solves the problem.

    André

  • Some General Questions about the externalization of authentication

    We plane to outsource the APEX authentication so that it would be linked to the credentials of the end-user network. Were do because:

    It is more in line with the expectations of the users.
    It will simplify maintenance by the user.
    When the user leaves the ice, their APEX access will be automatically disbanded as their network connections are disabled.

    We found some very good articles on the subject, for example http://www.greenit.li/greenIT/Willkommen_files/Oracle_APEX_ProofOfConceptNTLMPLSQL.pdf (other suggestions would be welcomed and encouraged). However; We have a few questions:

    The first is authentication and authorization. We get how end users can be authenticated based on Active Directory. However, within the APEX now, create us a new user and specify if who are developers, who, team development Application Builder, SQL workshop, they can access. schemas are accessible to them, etc. This page requires, of course, a password.

    How will this work if the authentication is outsourced? We always create the same user in the APEX?
    If so, what should we put the password related areas?
    If this is not the case, how do we control authorization once authentication completed successfully?
    If not, how to make the application available for users (authenticated network) and not others?
    If the application allows the user to pass a password (assuming that they are properly connected to the network), what should happen when a person clicks on logout?

    Thank you for any input,

    -Joe

    Joe Upshaw wrote:

    One of the elements of game here (great requirements above) is to make sure that the APEX applications are directly linked in the cycle of creation/decommissioning of the user of the organization. In other words, the desire is that deleting or disabling a user account in the central directory (Active Directory) have the effect of disabling access to all enterprise systems. We do not expect to allow some "heavy" end users the ability to access the SQL browser. Is there something that can be done, perhaps with the authorisation schemes, which would allow their access is automatically revoked if it network id have been revoked? Can authorisation schemes be applied to the APEX development pages maybe?

    Laughing out loud

    The only thing that comes to mind is running a scheduled task on your databases which retrieves users APEX in the APEX_WORKSPACE_APEX_USERS view, checks the user account is still valid in AD using dbms_ldap (assuming that the user IDS match, or there is a convention to get from one to the other) and removes , expires or to block those who are not using the APEX API. The problem which is the

    To perform this procedure, the current user must have administrator privileges in the workspace.

    restriction to the user of apex_util API. Comply with the scheduled job will have to Re: create a session programmatically (that is to say, outside the APEX)., who is skating on or above the line about the API without papers/not taken in charge. This may be frowned upon by the great above and Oracle. (However, in this case it is less of a concern that the use of such methods in your APEX applications, which certainly, I would not recommend.)

  • General questions about the iphone compatible hearing aids, please?

    I am a seller of oil field that moves and I need my first hearing aids.  I have loss of hearing with a classic old guy and it's average but I'm late for h / a. I'm missing an important part of my life and want to hear the birds sing again!  I currently use a 5 s with 9.2 and a bluetooth Plantronics traveler legend.  I have hands free for safe driving and especially for taking notes of value and wear it all day.  I don't listen to music or videos, no vehicle bluetooth and any other iOS device.  The goal is good h/a and the use of good phone.

    I am interested in the Halo of Starkey and research scared me a bit of the questions that I barely understand!  Googling found a lot of comments, but they seem to all written by agents of sale or competitors.

    Where is the microphone bluetooth on the Halos?

    Is the call phone stereo or mono?

    The function of the hearing aid remains so that on the phone?

    In light of my basic needs, all warnings other than the stupid of these things cost?

    I am also considering a 6s, this would be a better phone for the Halo team?

    Prone glitch or awkward iphone apps?

    I'm bored of conversation in the meeting rooms, restaurants are tough and shows are terrible for the hearing?

    Generally you are happy with new h/a and halos in particular.

    Everything is provided with a newbie would not recognize that you like?

    Let me know if you need more details.

    Where is the microphone bluetooth on the Halos?

    --> The microphone's upstairs behind the part of the ear. If you use the Halos as your ears "on the phone", you still talk in the phone's microphone.

    Is the call phone stereo or mono?

    --> Is not true stereo, but you will hear the call through two hearing aids.

    The function of the hearing aid remains so that on the phone?

    --> You can leave the active hearing aid microphones or cut them. It's your choice.

    In light of my basic needs, all warnings other than the stupid of these things cost?

    --> Feel free to test-drive a few models, unless the first really works well for you.,.

    I am also considering a 6s, this would be a better phone for the Halo team?

    -->, I can't comment on that, except to say that my experience with multiple iPhones over the years that I have great confidence that each new model is better than the previous. There are a few bumps on the road, but Apple is good enough, solve them. YMMV

    Prone glitch or awkward iphone apps?

    --> Not, in my opinion.

    I'm bored of conversation in the meeting rooms, restaurants are tough and shows are terrible for the hearing?

    --> Which has not changed for me. It is the nature of sound amplification without being able to directly select that sounds to amplify and to mute.

    Generally you are happy with new h/a and halos in particular.

    -->, I am very happy.

    Everything is provided with a newbie would not recognize that you like?

    --> I like the ability to define a 'from' sensitive geographically, where you can control the volume up down and the bass/treble back. It is a crude tool, but it works.

  • My hard disk crashed - I have questions about the network now.

    My hard drive crashed on the computer that was the computer on which the files shared.  We had a T: climb together on this computer where we recorded the files and programs that we wanted to share.  My questions are this... We have replaced the hard drive on this computer.  Do I need to set up the drive w: in this computer once again, on the other computer as well, since I'm not there, and if so how do I?  Thank you.

    Hello

    Yes, you must redo the sharing.

    Most of the network news are stored on the system which is located on the drive crashed, and now he's gone.

    Jack-MVP Windows Networking. WWW.EZLAN.NET

  • Question about DHCP on WRT54G

    Hi all:

    Could I use DHCP for wireless connection and assign IP private for PC for connection wiring?

    It will come into conflict with each other?

    Best regards

    Chen min

    Yes, you can. You can have the PC running static IP and DHCP on the same network, regardless if it is wired or wireless.

  • Questions about the network resource class.

    I am running Windows 7 Enterprise x 64 SP1.

    In Windows Explorer, if I click on 'Network' in the navigation panel, it will browse the network and show me resources available network (see photo).

    The resources are grouped into categories, such as 'Network infrastructure', 'Media Devices', 'Storage', 'Computers', etc.

    I have two network storage devices: one of them is Western Digital MyBookLive (host name is "MyBookLive"), the other is QNAP TS - 469 Pro (host name is "QNAP").  I can access both by UNC (\\MyBookLive\Share, \\QNAP\Public, etc.).

    I noticed that 'MyBookLive' shows in the 'Storage' category, which is the desired behavior.  But "QNAP" shows as "other devices."

    My question is - how does windows rank network resource?  How does Windows know if a resource is 'Storage' vs 'Network Infrastructure '?

    Thank you very much!

    Hi Mihcael,

    Advanced networking issues are supported in the TechNet Forums. I suggest you send the request in the TechNet forums.

    http://social.technet.Microsoft.com/forums/en-us/home?category=w7itpro

    Hope this information helps.

  • General question about the connections of 3DES side2side ASA

    Hello I have a question for a project:

    We have an office outside our main building is connected via a connection to radio waves of 34 MB and a 10 MB darkfiber.today the radiowaveconnection is not secured and the client wants a 3des encryption and that he will use 2 ASA5510.there are also the 2 questions:

    I have a connections between eigrp process running and I know that the asa cannot deliver this protocol.so can I use the asa in transparent mode only for encryption or as side2side connection?

    She I the first time I work with the ASA so any help is appreciated.

    concerning

    Klaus

    This document describes how to use the Cisco Adaptive Security Device Manager (ASDM) to configure the Cisco 5500 Series Adaptive Security Appliance (ASA) to act as a remote VPN server. The ASDM provides the safety management of world class and through a Web management interface that is intuitive and easy to use. Once the Cisco ASA configuration is complete, it can be verified by using the Cisco VPN Client.

    http://www.Cisco.com/en/us/products/ps6120/products_configuration_example09186a008060f25c.shtml

Maybe you are looking for