Part 4 Analyzing Software RequirementsSlide 2
Learning Objectives Analyze an organizationâs: User base, assets, client access, and client profitability Existing programming frameworks and databases Analyze: Corporate society and programming execution System execution and security issues Backup and debacle recuperation routines Technical bolster, client assist, and with trainingingSlide 3
Evaluating the Company User Base and Resources Operating frameworks Workstation working framework overhauls User base User-based system movementSlide 4
MS-DOS Many impediments for systems administration Not intended to exploit the elements of a system working framework like Windows 2000 Server and Active Directory Upgrade to a later form of MS-DOS (6.22) for the most availability alternativesSlide 5
Windows 3.1 and 3.11 Windows 3.1 Limited systems administration capacities Windows 3.11 or Windows for Workgroups (WFW) Peer-to-associate correspondence opens the path for sharing assets Designed to run 16-bit applications Has a 640 KB ordinary memory restrictionSlide 6
Limitations of Windows 3.1 and 3.11 Cannot hunt down and perspective items in Active Directory Slow; can bring about system bottlenecks alongside low client efficiencySlide 7
Windows 95 and Windows 98 Full distributed and system correspondence highlights Greater limit for envelope sharing, printer sharing, system correspondence, workgroup exercises, and other system operations Support TCP/IP, NetBEUI, and NWLink Windows 95 presents a GUI interface Windows 98 includes all the more systems administration capacities Compatible with more up to date 32-bit programmingSlide 8
Microsoft Directory Service Client for Windows 95/98 Enables these non-Windows 2000 customers to benefit from three capacities: Ability to utilize Kerberos confirmation security Ability to view data distributed in Windows 2000 Active Directory Enhanced area logon executionSlide 9
Windows NT Workstation Has all shared and system correspondence focal points of Windows 95 and Windows 98 Same GUI interface as Windows 95/98 Runs in an advantaged mode to protect it from âcrashesâ created by programming applicationsSlide 10
Windows NT Workstation Disadvantages Some 16-bit projects experience difficulty running Early forms that don\'t have administration pack redesigns may do not have a few drivers that are required for printers, NICs, guiding gadgets, sound gadgets, and so forth. Focal points Can go about as a little server on a system If clients have introduced administration pack 3 or higher, it bolsters Dfs and Active Directory access to discover system objectsSlide 11
Windows 2000 Professional More systems administration abilities than Windows NT Workstation Support for new fringe gadgets Full PnP and vitality sparing capacities that are not accessible in Windows NTSlide 12
Advantages of Windows 2000 Professional Written to be completely good with Windows 2000 Server and Active Directory administrations Up to 25% quicker than Windows NT Workstation (speedier system reaction) IntelliMirror elements help clients to be more gainful through: Fast establishment Automated arrangement Versatile information taking care of Recovery from issue circumstancesSlide 13
Windows Millennium Edition Home excitement elements Better treatment of PnP gadgets Enhancements to bolster more extensive systems administration and Internet availability Provides computerized setup of home-based systems Targeted for the home PC business sector Includes assembled in DSClient abilities for access to Active Directory on business and expert systemsSlide 14
Macintosh Can unite with Windows 2000 Server-based systems by utilizing the AppleTalk convention, or through TCP/IP When AppleTalk is utilized, Macintosh PCs are connected to the system by setting up Windows 2000 Server Services for Macintosh, which incorporates: File Server for Macintosh (MacFile) Print Server for Macintosh (MacPrint) AppleTalk ProtocolSlide 15
UNIX All renditions have the ability to go about as host PCs Can get to assets on different PCs that bolster the Network File System (NFS) conventionSlide 16
UNIX For Windows NT Server Support for UNIX customers includes executing outsider, plate sharing programming that utilizes the NFS convention In Windows 2000 Server UNIX PCs are upheld by introducing the Windows 2000 segment for UNIX document and print administrationsSlide 17
Analyzing Workstation Operating System Upgrades Factors in evaluating whether to redesign How it will advantage the organization (new abilities, expanded client profitability, lower TCO) One-time buy expense Cost as far as worker hours to perform the update Ongoing bolster expenses Consider how workstation overhauls and rollouts of programming are performed, and how overhauls will influence Active Directory outlineSlide 18
Determining the User Base Number of clients Total number of clients Typical number of clients who are signed on at any one time Amount of system movement the clients make Operating frameworks running on those usersâ PCs Locations of the clientsSlide 19
Determining the User BaseSlide 20
Value of Determining Number of Users To help size Active Directory To figure out where to find DCs and worldwide index servers To enhance execution by making localesSlide 21
Determining the Operating SystemSlide 22
Viewing Server Resource Use in Windows NT 4.0Slide 23
Viewing Server Resource Use in Windows 2000Slide 24
Using Network Monitor to Study User-based Network Traffic Network Monitor Driver Enables a Microsoft-based server or workstation NIC to accumulate system execution information for appraisal by Microsoft Network Monitor Network Monitor A Windows NT and Windows 2000 system observing device that can catch and presentation system execution information Useful for get-together benchmarksSlide 25
Installing Network Monitor DriverSlide 26
Installing Network MonitorSlide 27
Capturing Data with Network MonitorSlide 28
Network Monitor PanesSlide 29
Network Monitor Total Pane Statistics Network Statistics Captured Statistics Per Second Statistics Network Card (MAC) Statistics Network Card (MAC) Error StatisticsSlide 30
proceeded withSlide 31
Network Monitor Total Pane StatisticsSlide 32
Network Monitor Station Pane StatisticsSlide 33
Analyzing User Access and Productivity Network Monitor can be utilized to concentrate low, medium, and high utilization of assets Value of investigating client access examples To focus position and number of DCs To focus situation and number of worldwide list servers To tune access to Active Directory and system assets by actualizing subnets and Active Directory webpage assignmentsSlide 34
Checklist for Analyzing User Access Patterns What sorts of client access are connected with low, medium, and high observed system activity? What client access examples exist on neighborhood systems and crosswise over WANs? How is client access influenced by branch workplaces, backups, and accomplice connections? proceeded withSlide 35
Checklist for Analyzing User Access Patterns How is client access influenced by outsourcing connections? What efficiency needs are connected with client access?Slide 36
Evaluating Existing Software and Software Systems Accounting programming Office programming E-mail programming Specialized business programming Development programmingSlide 37
Analyzing Accounting Software Active Directory issues concentrate on making security gatherings and gathering approaches that build up solid get to and security How diverse modules impart in an incorporated bookkeeping framework How program changes and testing are taken care of Requirements forced by companyâs money related examiners Potential requirement for extraordinary security access for developers amid overhaulsSlide 38
Analyzing Office Software May need to make and distribute shared information organizers for clients and to offer Dfs May need to set up security gatherings to restrict access to shared envelopes Design security and shared envelopes to empower clients to introduce and redesign programming, if necessarySlide 39
Analyzing E-mail Software One framework or different frameworks? Utilized as a part of mix with date-book and planning programming? Firewalls needed?Slide 40
Analyzing Specialized Business Software Can incorporate a wide range of programming for business capacities Inventory Manufacturing Marketing Fundraising Management E-tradeSlide 41
Analyzing Development Software Consider making a different territory â, for example, an advancement space â in which to create and test projects before they are duplicated into a creation area for clients to get toSlide 42
Analyzing Databases and Data Structures Flat record databases Network databases Relational databasesSlide 43
Flat File Database Data is put away consecutively in customary records in the same catalog on a first-in premise Security is determined to records and envelopes Access to information is slower than for different sorts of databasesSlide 44
Network Database A level record database that uses a basic table structure Security is set up on documents and organizers Access to a table can be quicker than for consistent level document databasesSlide 45
Relational Database Data is put away in tables that can be outlined with upgraded connections to each other for quick information get to Most proficient kind of database Several levels of security Access to information and information questions can be quickSlide 46
Advantages of Relational Databases Ability to standardize the database One or more perspectives of particular information can be made; information can be gotten to without needing to pursuit whole database Statistics can be produced for an information inquiry or report to archive the speediest course through which to acquire informationSlide 47
Open Database Connectivity (ODBC) An application programming interface in Windows-based working frameworks and a standard for getting to information inside a social database How achieved: Application must be composed to utilize ODBC Must be an ODBC
Monday, October 13, 2008 Section 9, Section II (of III). Task : Section 9 issues 1-4, 6, 9, 16, ...
7. Part 7: Model Evaluation. 7. Section 7: Model Evaluation. Appraisal Sorts. The Model Correlat ...
I am sad!! There is no opportunity to cover: Section 10 Please Read it!!! Part 10. Revolution of ...
Clarify how records of sales are perceived in the records. ... Uncollectible records receivable ...
The exchange insights in the Current Account, for instance, demonstrate the creation of exchange ...
Basic stock and paid-in capital records are recorded at chronicled rates. ... misfortunes coming ...
Conform area to market esteem and put the distinction in an exceptional value account ... Exchan ...
A few occasions cross periods in this way by what method would we be able to legitimately repres ...
Constitution has allotted the Commonwealth Parliament select forces to ... where a State law is ...
Business Statistics: A Decision-Making Approach, 6e 2005 Prentice-Hall, Inc. ... Get ready diagr ...
Why We Buy by Paco Underhill. Chapters 3-7: The Mechanics of Shopping. Key Topics. Chapter ...
Outline of Bioinorganic Chemistry. Chapter 1 Introduction Chapter 2 Alkali and Alkaline Ea ...
Chapter 15 White-Collar & Organized Crime. Chapter Summary. Chapter Fifteen is an overview o ...
2. Section Summary. Part Five acquaints the peruser with the social procedure speculations of wr ...
Discovering Alabama Chapter 2. Discovering Alabama Chapter 2 Vocabulary. Immunity Bartered ...
Buyer No Asset Chapter 7 Proceeding. A purchaser no advantage Chapter 7 continuing is a procedur ...
Motivation. Recap of part 12 and 14Review of section 16Chapter 16 discussionReview of part 11Cha ...
2. Subjects in this address. Absence of straightforwardness of processArticles of Chapter 11.Per ...
Section 16: Politics. Scholarly originations of human instinct lead to political philosophies go ...