Part 4.


87 views
Uploaded on:
Category: Education / Career
Description
Part 4 Examining Programming Necessities Learning Goals Investigate an organization's: Client base, assets, client access, and client profitability Existing programming frameworks and databases Break down: Corporate society and programming execution Framework execution and security issues
Transcripts
Slide 1

Part 4 Analyzing Software Requirements

Slide 2

Learning Objectives Analyze an organization’s: User base, assets, client access, and client profitability Existing programming frameworks and databases Analyze: Corporate society and programming execution System execution and security issues Backup and debacle recuperation routines Technical bolster, client assist, and with traininging

Slide 3

Evaluating the Company User Base and Resources Operating frameworks Workstation working framework overhauls User base User-based system movement

Slide 4

MS-DOS Many impediments for systems administration Not intended to exploit the elements of a system working framework like Windows 2000 Server and Active Directory Upgrade to a later form of MS-DOS (6.22) for the most availability alternatives

Slide 5

Windows 3.1 and 3.11 Windows 3.1 Limited systems administration capacities Windows 3.11 or Windows for Workgroups (WFW) Peer-to-associate correspondence opens the path for sharing assets Designed to run 16-bit applications Has a 640 KB ordinary memory restriction

Slide 6

Limitations of Windows 3.1 and 3.11 Cannot hunt down and perspective items in Active Directory Slow; can bring about system bottlenecks alongside low client efficiency

Slide 7

Windows 95 and Windows 98 Full distributed and system correspondence highlights Greater limit for envelope sharing, printer sharing, system correspondence, workgroup exercises, and other system operations Support TCP/IP, NetBEUI, and NWLink Windows 95 presents a GUI interface Windows 98 includes all the more systems administration capacities Compatible with more up to date 32-bit programming

Slide 8

Microsoft Directory Service Client for Windows 95/98 Enables these non-Windows 2000 customers to benefit from three capacities: Ability to utilize Kerberos confirmation security Ability to view data distributed in Windows 2000 Active Directory Enhanced area logon execution

Slide 9

Windows NT Workstation Has all shared and system correspondence focal points of Windows 95 and Windows 98 Same GUI interface as Windows 95/98 Runs in an advantaged mode to protect it from “crashes” created by programming applications

Slide 10

Windows NT Workstation Disadvantages Some 16-bit projects experience difficulty running Early forms that don\'t have administration pack redesigns may do not have a few drivers that are required for printers, NICs, guiding gadgets, sound gadgets, and so forth. Focal points Can go about as a little server on a system If clients have introduced administration pack 3 or higher, it bolsters Dfs and Active Directory access to discover system objects

Slide 11

Windows 2000 Professional More systems administration abilities than Windows NT Workstation Support for new fringe gadgets Full PnP and vitality sparing capacities that are not accessible in Windows NT

Slide 12

Advantages of Windows 2000 Professional Written to be completely good with Windows 2000 Server and Active Directory administrations Up to 25% quicker than Windows NT Workstation (speedier system reaction) IntelliMirror elements help clients to be more gainful through: Fast establishment Automated arrangement Versatile information taking care of Recovery from issue circumstances

Slide 13

Windows Millennium Edition Home excitement elements Better treatment of PnP gadgets Enhancements to bolster more extensive systems administration and Internet availability Provides computerized setup of home-based systems Targeted for the home PC business sector Includes assembled in DSClient abilities for access to Active Directory on business and expert systems

Slide 14

Macintosh Can unite with Windows 2000 Server-based systems by utilizing the AppleTalk convention, or through TCP/IP When AppleTalk is utilized, Macintosh PCs are connected to the system by setting up Windows 2000 Server Services for Macintosh, which incorporates: File Server for Macintosh (MacFile) Print Server for Macintosh (MacPrint) AppleTalk Protocol

Slide 15

UNIX All renditions have the ability to go about as host PCs Can get to assets on different PCs that bolster the Network File System (NFS) convention

Slide 16

UNIX For Windows NT Server Support for UNIX customers includes executing outsider, plate sharing programming that utilizes the NFS convention In Windows 2000 Server UNIX PCs are upheld by introducing the Windows 2000 segment for UNIX document and print administrations

Slide 17

Analyzing Workstation Operating System Upgrades Factors in evaluating whether to redesign How it will advantage the organization (new abilities, expanded client profitability, lower TCO) One-time buy expense Cost as far as worker hours to perform the update Ongoing bolster expenses Consider how workstation overhauls and rollouts of programming are performed, and how overhauls will influence Active Directory outline

Slide 18

Determining the User Base Number of clients Total number of clients Typical number of clients who are signed on at any one time Amount of system movement the clients make Operating frameworks running on those users’ PCs Locations of the clients

Slide 19

Determining the User Base

Slide 20

Value of Determining Number of Users To help size Active Directory To figure out where to find DCs and worldwide index servers To enhance execution by making locales

Slide 21

Determining the Operating System

Slide 22

Viewing Server Resource Use in Windows NT 4.0

Slide 23

Viewing Server Resource Use in Windows 2000

Slide 24

Using Network Monitor to Study User-based Network Traffic Network Monitor Driver Enables a Microsoft-based server or workstation NIC to accumulate system execution information for appraisal by Microsoft Network Monitor Network Monitor A Windows NT and Windows 2000 system observing device that can catch and presentation system execution information Useful for get-together benchmarks

Slide 25

Installing Network Monitor Driver

Slide 26

Installing Network Monitor

Slide 27

Capturing Data with Network Monitor

Slide 28

Network Monitor Panes

Slide 29

Network Monitor Total Pane Statistics Network Statistics Captured Statistics Per Second Statistics Network Card (MAC) Statistics Network Card (MAC) Error Statistics

Slide 30

proceeded with

Slide 31

Network Monitor Total Pane Statistics

Slide 32

Network Monitor Station Pane Statistics

Slide 33

Analyzing User Access and Productivity Network Monitor can be utilized to concentrate low, medium, and high utilization of assets Value of investigating client access examples To focus position and number of DCs To focus situation and number of worldwide list servers To tune access to Active Directory and system assets by actualizing subnets and Active Directory webpage assignments

Slide 34

Checklist for Analyzing User Access Patterns What sorts of client access are connected with low, medium, and high observed system activity? What client access examples exist on neighborhood systems and crosswise over WANs? How is client access influenced by branch workplaces, backups, and accomplice connections? proceeded with

Slide 35

Checklist for Analyzing User Access Patterns How is client access influenced by outsourcing connections? What efficiency needs are connected with client access?

Slide 36

Evaluating Existing Software and Software Systems Accounting programming Office programming E-mail programming Specialized business programming Development programming

Slide 37

Analyzing Accounting Software Active Directory issues concentrate on making security gatherings and gathering approaches that build up solid get to and security How diverse modules impart in an incorporated bookkeeping framework How program changes and testing are taken care of Requirements forced by company’s money related examiners Potential requirement for extraordinary security access for developers amid overhauls

Slide 38

Analyzing Office Software May need to make and distribute shared information organizers for clients and to offer Dfs May need to set up security gatherings to restrict access to shared envelopes Design security and shared envelopes to empower clients to introduce and redesign programming, if necessary

Slide 39

Analyzing E-mail Software One framework or different frameworks? Utilized as a part of mix with date-book and planning programming? Firewalls needed?

Slide 40

Analyzing Specialized Business Software Can incorporate a wide range of programming for business capacities Inventory Manufacturing Marketing Fundraising Management E-trade

Slide 41

Analyzing Development Software Consider making a different territory –, for example, an advancement space – in which to create and test projects before they are duplicated into a creation area for clients to get to

Slide 42

Analyzing Databases and Data Structures Flat record databases Network databases Relational databases

Slide 43

Flat File Database Data is put away consecutively in customary records in the same catalog on a first-in premise Security is determined to records and envelopes Access to information is slower than for different sorts of databases

Slide 44

Network Database A level record database that uses a basic table structure Security is set up on documents and organizers Access to a table can be quicker than for consistent level document databases

Slide 45

Relational Database Data is put away in tables that can be outlined with upgraded connections to each other for quick information get to Most proficient kind of database Several levels of security Access to information and information questions can be quick

Slide 46

Advantages of Relational Databases Ability to standardize the database One or more perspectives of particular information can be made; information can be gotten to without needing to pursuit whole database Statistics can be produced for an information inquiry or report to archive the speediest course through which to acquire information

Slide 47

Open Database Connectivity (ODBC) An application programming interface in Windows-based working frameworks and a standard for getting to information inside a social database How achieved: Application must be composed to utilize ODBC Must be an ODBC

Recommended
View more...