Windows Client Cluster Report: Network Administrator's Perspective

Verified

Added on  2020/05/11

|12
|2055
|98
Report
AI Summary
This report simulates the role of a network administrator at Dallas Technical Center, focusing on the management of a Windows client cluster. It begins with an introduction to operating systems, emphasizing their role in computer functionality and software compatibility. The report details the pre-installation steps, including ensuring the legitimacy of the operating system, verifying product and activation keys, and adhering to the center's safety policies. It discusses file system configuration, data migration techniques, and data security measures such as backups and partitioning. The report then explores the installation of the desktop operating system, recommending the use of bootable CD-ROMs for efficiency and security. It covers data restoration, antivirus installation, and the creation of files and directories using Windows Explorer, including the use of Copywhiz. The report also addresses configuring access to externally stored information, modifying desktop application settings, and utilizing the Command Line Interface (CLI). Furthermore, it covers configuring user settings to align with organizational regulations, password configurations, and ensuring application security through licensing and administrator accounts. The report concludes with a focus on creating a user-friendly desktop environment, staff training, network synchronization, and the use of the App Builder tool and a product glossary.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: Windows client cluster 1
WINDOWS CLIENT CLUSTER
Author’s name:
Institution affiliation:
Date:
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Window client cluster 2
In this report, my made-up roll is that of a network administrator working for Dallas Technical
Center.
Introduction
An operating system is essential software that enables a computer to run by managing the
computer’s processes and memory (Korkishko, 2017). It is an interface between the computer
hardware and the computer user. It also supports the running of various software and hardware
components of the machine. It is the work of the Operating System of a machine to ensure
compatibility of any software being installed in the machine. Software running in a computer is
housed by the operating system. Amongst other functions, the operating system performs
memory management, device management, file management, processor management, security of
the computer, taking control of the system performance, detecting errors and software-user
coordination.
Part One
When preparing to install any software, it is important to take into consideration safety
precautions both for the computer and the important data. Therefore, before starting the
installation process, I will first ensure that the operating system software that I want to install is
legit. I will access the product key and the activation key codes to ascertain if they are genuine.
As a network administrator, I will also refer keenly to Dallas Technical center’s work and safety
policies. I will go ahead and ask the Center’s Information Technology office to serve me with
legit driver packs, reliable anti-virus software and the general information on the specifications
of the computers, which is basically the manual containing factory information regarding the
computers.
Document Page
Window client cluster 3
A file system is a scheme of organizing and storing computer files and information contained for
simple and efficient retrieval (Pudipeddi, 2017). I will ensure proper configuration of the files in
order to allow security configuration. For instance I will configure the file system as NTFS and
not as FAT, FAT makes the computer less secure. I will check whether the operating is to be
installed from CD-ROM, boot disks or from the network. I will also examine the service that the
operating system will be required to offer, for example, if the installation will be server
installation, then I will take keen interest on the DNS, DHCP and the computers Active
Directory.
The operating system will have a license key in order for it to be acceptable. Actually all
operating systems will require a license key for it to operate, it is also important to that I ensure
that they product and activation key are not counterfeit. I will use data models for easy
identification of which data should be migrated, for example the Data Flow Diagrams. I will test
the migration technique more than once for purposes of proper functioning.
I will ensure data security by seeking external back up mechanism with enough space and virus
proof. Another option I will consider is partitioning the internal disk so that I can install the
operating system one partition while the other houses the data. I will show my client how and
where he/she can access the operating system upon authentication, the user will be required to
enter password in order to access the site. I will also inform the client that the system may at
times be sluggish, especially when running more than one software at a time, many programs
executing at the same time will bring about system deadlock hence slow performance of the
computer.
Document Page
Window client cluster 4
Part Two
Installing the desktop operating system should be carefully done to avoid unnecessary mistakes
that can lead to poor performance of the computer (Wang, 2017). When choosing an installation
method, I will consider the most efficient, secure and one with fast installation speed. It is also
important to note that over the internet download and installation method is a no option.
As a network administrator for Dallas technical center, I will choose installation from the
bootable CD-ROM. This method is easier and fastest compared to other installation options like
over the network method. I will disconnect the computer from the network to the time of
complete installation. Repairing the software is necessary since software breakdown cannot be
ruled out in any system. I will run a vulnerability test on the software to fix any error in the
operating system. I also will be conducting periodical recovery consoles to ensure reliability and
security.
After a successive installation, it is now time to restore data from the back up location to the
previous stations. I will first install an antivirus in the computer to clean up any unnecessary
applications that might be risky to data security, after which I will transfer the data to their
workstations.
Part Three
Dallas technical center has large data storage units and several files that need to be properly
stored. Since in the center we are using windows, I will create files and directories using
windows explorer
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Window client cluster 5
It is therefore my responsibility to create a structure that can enhance easy access of the files. I
will put the data into segments on different files so that the storage load is shared amongst
smaller disks hence easy retrieval. I will use windows Explorer program, I will achieve this by
creating folders, which are the directory structures. Below is what I will create for Dallas
Technical center using windows explorer copywhiz
Step 1
I will open the program, windows explorer and select files, then m right-click and choose
copywhiz than copy from menu. This is shown below:
Figure 1 showing open windows explorer
Step 2
I will navigate to the destination directory/ folder, right-click the folder inside and select
copywhiz then paste. This is also shown below
Document Page
Window client cluster 6
Figure 2 showing windows explorer activity
Step 3
After I am done with copywhiz pasting, a copywhiz window will appear, I will again click on
‘advanced settings’ and select create folder only and click ok as shown below
Document Page
Window client cluster 7
Figure 3 showing how to create a folder (directory)
The above steps demonstrate how I will create the directories and files using windows explorer.
On configuring access to externally stored information:
1. I will connect the external storage device, probably a USB device to the Wii U console
2. I will then configure the USB device for deleting all the data in the USB, once the data is
deleted, it will in no means be recovered.
3. I will select ‘copy/move/delete data’.
4. I will then select ‘USB storage’
5. After the above selection, the data displayed is the present stored data in the USB device
When configuring desktop applications, I will need to carry out the following exercise
1. I will set programs as default; this will help me specify the type of file related with a
particular application.
2. I will then modify the file associations; the modification enables me to pick a program
and select the type of file related with it. I will do this as shown below.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Window client cluster 8
Figure 4 showing file association modification
3. After modifying file associations, I will now modify the auto play settings; this defines
what windows will do after inserting external medium like USB device.
4. I will apply settings on program access defaults; this will enable me to create a program
configuration that specifies which desktop applications should be used to perform tasks.
5. I will then configure applications for compatibility; this is installing and configuring
applications and windows applications.
6. In order to meet the business requirements, I will configure the desktop applications
compatibility regulations to suit the center’s prudent.
7. The last step will be to install, reinstall and update the applications; this will be done on
condition that there is internet connection. The process ends here.
Document Page
Window client cluster 9
Part Four
A Command Line Interface (CLI) is a user interface to an operating system or any other software
running in a computer, the user responds to a prompt by keying in commands on specific lines,
where he/she receives a reply from the system, then the user enters successive commands and so
on. Nowadays, users have a taste for graphical user interface (GUI) which is actually offered by
popular operating systems such as Windows, Mac and BeOS.
Step 1
I will click on ‘start’ menu, then type ‘cmd’ and enter. The command prompt pops up. The
command prompt looks as below
Figure 5 showing open command prompt
Step 2
I will give commands such as moving into the current directory, creating files and directories
My command on moving into a directory, I just type ‘dir’ in the command prompt and press
enter.
Document Page
Window client cluster
10
Figure 1 showing directory
In the above window, there are 7 directories
Creating a directory, I will key in a command ‘mkdir test’ then I will move into the directory by
typing ‘cd command’.
Creating a file using the command prompt, I will type ‘edit techn.txt’ techn.txt is my file name,
then ‘enter’ a blank window open meaning my file techn is ready for editing. I will type various
commands like, ‘copy con techn.txt’ for copying the file contents.
Part Five
Configuring user settings so as to be compatible with the organizations regulations is a
requirement for any network administrator; various organizations have different rules that need
incorporation into the network to offer better services to their clients.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Window client cluster
11
I will Set default programs to match the business requirements by getting in the control panel
then to set default programs and then set program associations. Here I will configure the program
to be business oriented and select the relevant options. On passwords configuration, I will
introduce new password formats for the institution by changing the static password enabling tool
in the global configuration mode, ‘router (config)#’ then ‘password’
It is important to ensure security to any applications in an organization or network. I will ensure
only licensed applications are installed at a price. Setting the desktop applications secure will be
done by creating an administrator account in the computers with a different password.
Part Six
A good desktop environment includes ease of access to applications and simple naming of the
applications for the client not to struggle locating the applications. It is a strategy that needs
usability testing and frequent fixing of undesirable changes.
I will conduct training and awareness to my fellow staff and users about our user standards. I will
also carry out regular synchronization of the network to ensure no malicious entries are being
dared. I will use the App Builder tool to develop common desktop applications. This application
makes work easier on ‘help, Tool-Talk, Drag and drop’ activities. I will also develop a common
desktop environment product glossary in order to enhance ‘source and reference’ method. This
strategy will ensure proper usage of the graphical user interfaces.
Document Page
Window client cluster
12
Reference
Korkishko, T. &. (2017). Method and system for providing security policy for Linux-based
security operating system.
Pudipeddi, R. V. (2017). U.S. Patent No. 9,575,988. Patent and Trademark office.
Wang, X. W. (2017). Improved rule installation for real-time query service in software-defined
enternet of vehicles. IEEE Transactions on intelligent Transportation systems, 225-235.
chevron_up_icon
1 out of 12
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]