How to start TFTP server in win7 system

Server is a high-performance computer. As a node of the network, it stores and processes 80% of the data and information on the network. Therefore, it is also known as the soul of the network. Recently, users using win7 system do not know how to start the TFTP server and where to start it? The following will introduce how win7 system starts the TFTP server and the method of starting the TFTP server.

The steps are as follows:

1. First, the next TFTP server. Generally, various firmware will come with it. This can be found under my CSDN, free of points.

2. The first line here means that the main directory of face-to-face TFTP is this.

3. The second line is the listening IP address of the current server.

4. The content of the first label TFTP server is the log of the current server.

5. Click setting below to open a window. The main setting options are TFTP port, TFTP default directory, and whether DHCP service is enabled.

6. DHCP is mentioned here. Some routers or other embedded devices are allowed to use the "HyperTerminal" connection in the burning process, but there is no IP address and the IP address cannot be set. At this time, it is necessary to turn on the DHCP server to connect to the embedded devices.

7. If the embedded device supports automatic upgrade, after the TFTP server is turned on, the device will automatically download the file system of bin from the TFTP server. If it does not support automatic burning, you need to enter some commands.

Supplement: server introduction

Servers, also known as servers, are devices that provide computing services. Since the server needs to respond to service requests and process them, generally speaking, the server should have the ability to undertake services and ensure services.

The composition of the server includes processor, hard disk, memory, system bus, etc., which is similar to the general computer architecture. However, due to the need to provide highly reliable services, it requires high processing capacity, stability, reliability, security, scalability, manageability and so on.

In the network environment, according to the different types of services provided by the server, it is divided into file server, database server, application server, web server, etc.

Related reading: what are the server FAQs

  1. System blue screen, frequent crash, restart, slow response

The of the server is very similar to our ordinary computer, whether it is hardware structure or running system. Therefore, just like our computers, they may be infected with viruses, crash, blue screen, restart and other failures due to system vulnerabilities, software conflicts and hardware failures, and slow response due to too much garbage cache information.

  2. The remote desktop connection exceeds the maximum number of connections

Since the server allows 2 connections by default, if you forget to log off after logging in and directly close the remote desktop, the server recognizes that the login is still on the server side. In this case, the most common is to restart the server. However, if it is the peak period, the loss caused by restarting the server is obvious. At this time, you can use the mstsc / console command to forcibly log in. Open the "run" box and type "mstsc / V: xxx.xxx.xxx.xxx (server IP) / console" to forcibly log in to the remote desktop.

  3. How to clean up files that cannot be deleted

In this case, it may be that the file is still running. You can restart and delete it, or run CMD, enter the name of the folder arrtib-a-s-h-r you want to delete, and finally enter the name of the folder del wants to delete. It cannot be recovered after running this command. Please use it with caution.

  4. Hidden trouble of system port

For the server, the first thing is to ensure stability and security. Therefore, we only need to ensure the most basic functions of the server, just like the sound card is prohibited by default. We don't need too many functions and port support. For example, some unnecessary and high-risk ports can be blocked. For some necessary and risky ports, such as ports 3389 and 80, we can set them as non-special secret ports by modifying the registry, so that the security hidden dangers of server ports no longer exist.