Sie sind auf Seite 1von 60

Wu 150100000698

DIPLOMA IN INFORMATION TECHNOLOGY DIT

PROJECT
IT201 Operating System [Windows 95 to Windows 2000]

Name:

Wu

Centre: 1501 Student ID: 150100000698 Class: IT201-Operating System Country: Brunei Lecturer Name: Mr.

IT201

Page 1

Wu 150100000698

Contents
1. Proposal

Page

1.1 Introduction .....................................................................................................................3 1.2 Current system.................................................................................................................3 1.3 Problem background........................................................................................................4 1.4 Proposed system and objective........................................................................................5

2. Installation of Win2000 ..................................................................................................8

3. Using MMC, Task Scheduler, Control Panel 3.1 Using MMC.....................................................................................................................19 3.2 Using Task Scheduler......................................................................................................23 3.3 Using Control Panel ........................................................................................................25

4. Managing Windows 2000 file system, storage 4.1 Creating Volume..............................................................................................................26 4.2 Convert FAT to NTFS.....................................................................................................27

5. Users, Group, Profiles and Policies 5.1 Creating Users and group.................................................................................................29 5.2 Setting Rights for different group ..35 5.3 Change local security policy ..38

6. Windows 2000 security and access controlset


6.1 Create legal warning message.....................................................................................................40 6.2 Change default shell....................................................................................................................42 IT201 Page 2

Wu 150100000698

7. Network Protocols, Explain TCP/IP,.............................................................................44 Advantages and disadvantages of TCP/IP

8. Netware connectivity 8.1 steps to link NetWare.......................................................................................................45 8.2 steps to link RAS ............................................................................................................47

9. Printing 9.1 Steps to create local printer .............................................................................................50 9.2 Steps to create network printer........................................................................................53

10. Performance tuning 10.1 Create Alert Object........................................................................................................55 11. Reference........................................................................................................................58 ................................................................................................................................................

IT201

Page 3

Wu 150100000698

1. Proposal 1.1 Introduction


SingTel Company is founded in 1990. It is located in Bandar Seri Begawan. At present, the company has 1000 computers. The company provides varies kind of services, such as notifying customers to pay phones bill, repairing phone, giving important information to customers on time, etc. Nowadays, the manager of SingTel Company has opened a new branch in Time Square Mall near the Brunei International Airport. He is intending to improve the current system of the computers of the company in order to solve many problems. The improving system will improve the performance of the employers. It will also give customers contentment.

1.2 Current system


The current SingTel is still using the old operating system in their computers. The old operating system is window 95. Window 95 is a graphical OS which is designed for workstation. It has switched from 16-bit architecture to a preemptive multitasked 32-bit architecture. It has redesigned graphical interface. Learning and using window 95 is easy. The efficiency and manipulation has become better and better. It has print support with faster disk/file access. Employers can print data quickly. Employers can use task bar to switch multiple programs, so they can start to run applications and open documents easily. It also comes with multimedia support that has built-in support for midi, sound, digital video playback and fast CD-ROMs. However, opening a new branch with current OS system may cause his many problems. Because Windows 95 only can install some limited old version applications. And it also lacks of many functions. When customers ask some information from employers of SingTel, employers spend a lot of time to search. Some data cannot install because of not consistent with old version of Windows 95.

IT201

Page 4

Wu 150100000698

1.3 Problem background


The current system has some disadvantages. The drawback of window 95 can be found as below: 1. Windows 95 does not have hibernation function which is designed to save energy. 2. Windows 95 is not support Symmetric Multiprocessing (SMP) Scalability. 3. Windows 95 memory is small. The maximum physical RAM that Windows 95 supports is 1 GB. 4. Windows 95 is supported FAT16. FAT16 is not better than NTFS. 5. Windows 95 does not support USB mass storage device class. 6. Windows 95 does not support hard disks larger than 32GB. 7. Windows Desktop Update, Internet Explorer5 or 6(IE) and Outlook Express are not supported by Windows 95. 8. Windows 95 does not support remote services.

IT201

Page 5

Wu 150100000698

1.4 Proposed system and Objective


In order to improve the operating system of SingTels computers, the manager has decided to use Windows 2000. About Windows 2000 Windows 2000 is a new generation network operating system. It provides network users and organizations with improved application, management, and infrastructure. It is more stable than Windows 95. It also can use on PC, business desktops, laptops and servers. One of Windows 2000 tools is to assist the network administrator in administrative tasks everyday and in client computers. It also decreases overhead costs with the capabilities for automating many of tasks. And Windows 2000 has 4 versions. 4 versions of windows 2000: * Windows 2000 professional * Windows 2000 Server * Windows 2000 Advanced Server * Windows 2000 Advanced Server * Windows 2000 Data center Server The new features of windows 2000 those not included windows 95:

Hibernation
Windows 2000 provides hibernation. When users do not use running computer for a long time, computer automatically hibernate. It can help company to save electricity.

Symmetric Multiprocessing (SMP) Scalability


It allows an O.S. to use more than one CPU simultaneously. Therefore, the performance of O.S can be improved more efficiently by reducing transaction time. Users are not need to take a long time to wait. It helps SingTel Company to improve work efficiency.

IT201

Page 6

Wu 150100000698

Memory Support Because each application requires a certain amount of memory when they are running, Windows 2000 can not more than 64GB of memory. Each application can run properly and fast. And it also avoids data losing. Therefore it is better than Windows 95 that only supports 1 GB. SingTel Company can save a lot of data, such as every customers information, every handphones information, every customers expire date about bills and so on.

File System
Windows 2000 provided FAT (file allocation table), FAT32 and NTFS (new technology file system). But users always use NTFS in windows 2000 because it is secure file system. NTFS contains: file system recovery, compression security, large partition size and disk quotas.

* As for file name length, NTFS can support up to 255 characters whilst FAT16 limits 8.3 characters. *NTFS has security with file encryption, FAT16 just use to read files. * When something interrupted causes file copies are not complete, cluster chains is cleaned. However, file copies would be damaged by FAT 16 under this condition. Using NTFS, employers create file name more detailed than before. It is easy to find file next time. It also help SingTel Company to protect files.

Mass storage class devices


It is a protocol that allows a Universal Serial Bus(USB) device to become accessible to a host computing device, to enable file transfers between the two. It is easier for users to do the jobs. They can copy data to USB, so they can do at home then bring it to company again. Employers of SingTel can bring customers data to home to arrange.

Windows Desktop Update, Internet Explorer5 or 6. Remote Installation Services (RIS)

IT201

Page 7

Wu 150100000698

It allows an administrator to adjust an operating system throughout the organization. Administrator does not need to visit each client computer. Manager of SingTel can deploy O.S on each computer on one computer.

Terminal Services
With help of the terminal emulator, it can provided remote access to desktop. Using terminal services, users can run client applications on server. It is easier to control two branchs of SingTel Company.

Multitasking
It enables to run multiple applications at the same time on the same O.S. Users can manipulate information on different applications together. When customers ask different information, employers of SingTel will search answers together by different applications.

Multithreading
It enables to run more than one function simultaneously on the same application. It is easier for users to use. It offers more function that users can choose. When customers register their phones bills or phone number, employers of SingTel can type in or update their information to save in application by using different function.

Active Directory
It is used to manage security, data and distributed resource with other interconnected network computer directory. With active directory, company could assemble virtual private networks so that data can be encrypted locally or on the network. The objective is to improve two branch of SingTel Company to become easier and faster to communicate and control. Using new operating system that is Windows 2000, it gives company many advantages, such as, saving power, running quickly, customers data storing completely, remote services, and so on.

IT201

Page 8

Wu 150100000698

2. Installation of Win2000
Since SingTel Companys computers older O.S version is Windows 95, the company would like to install windows 2000. Steps of installation of windows 2000 is below: (1) Firstly, the CD-ROM drive of the computer will be booted because of the procedure is used to change the computer BIOS Boot Sequence setting. (2) We will install Windows 2000 Professional. The CD will be inserted into the CD-ROM drive and reboot computer. (3) After (1) and (2), the Windows 2000 Setup screen will be appeared. A message will be appeared as Setup is loading files (ACPI Plug & Play Bus Driver).

(4) Next Windows 2000 Professional Setup is displayed. We have three choices to choose. Press ENTER if we want to continue, press R if we want to repair or press F3 if we want to quit.

IT201

Page 9

Wu 150100000698

(5) Because we want to install Windows 2000, we just press ENTER.

(6) In order to continue setup, press C key or to quit setup, press F3 . We press C key to continue. Windows 2000 Licensing Agreement Screen is shown. Press F8 if we agree or Press ESC if we do not agree. Once we agree, press F8.

(7) Next step is the existing partition information. From here, new partition can be created in the hard disk or existing partition can be deleted. The unpartition space can also be selected to create the partition in the hard drive. ENTER for setting up Windows 2000 on the selected item. C key stands for creating a partition in the unpartitioned space. D key stands for delete the selected partition. Press C key to create a partition

IT201

Page 10

Wu 150100000698

(8) The size of unpartition space on the disk will be displayed during following the setup of window 2000. We need to type the size number that we want.

(9) In order to select the partition that is used for installing Windows 2000 Professional, press ENTER.

IT201

Page 11

Wu 150100000698

(10) Disk formatting is to make disk useable . So we need to make disk formatting. We choose NTFS instead of FAT, because NTFS has security features. The Format the partition using the NTFS file system will be selected and press ENTER.

(11) The process is to copy files to the Windows 2000 installation folder so that we need to wait for some minutes. (12) After finishing portion of setup, press ENTER key to restart the computer. (13) The Microsoft Windows 2000 Professional screen will be appeared after restart.

IT201

Page 12

Wu 150100000698

(14) Windows 2000 Setup screen display.

(15) Follow the Windows 2000 Setup Wizard. Click Next button. Installing Devices will be displayed.

(16) Finish the Windows 2000 Setup Wizard, click Next button. Regional Setting screen is appeared. From here, we can customize Windows 2000 for different regions and languages. For all users on the computer, the default system locale and default user locale are set to English (United States). Click Customize button to change the setting of system or user locale. If we want to change the keyboard layout, click Customize button.

IT201

Page 13

Wu 150100000698

(17) Click Next button. Personalize our software came out. We type name and organization on the box.

(18) Click Next button. Your Product Key screen shot is displayed. Typing Product Key in the box.

(19) Click Next button. Computer Name and Administrator Password screen shot is appeared. We type name in the Computer name box and password in administrator password box.

IT201

Page 14

Wu 150100000698

(20) Date and Time Settings screen shot is shown. We can adjust date & time from here.

(21) Click Next button. Next screen shot is Networking Settings. Installing network software allows us to connect to other computers, networks.

(22) After completing progress bar in networking setting, Typical settings and Custom settings will be appeared. (Typical settings will be chosen to create network connections using the Client for Microsoft Networks, the TCP/IP transport protocol with automatic addressing, and File and print Sharing for Microsoft Networks. Custom settings is used to allow you to manually configure networking components.)

IT201

Page 15

Wu 150100000698

(23) Click Next button. Workgroup or Computer Domain screen shot is displayed.

(24) Click Next button. Progress bar will be appeared to show the installation Windows 2000 components.

IT201

Page 16

Wu 150100000698

(25) Next screen is to display Performing Final Tasks window. We need to wait for few minutes.

(26) After Setup complete Performing Final Tasks, Click Finish button. Then the CD windows 2000 professional installation will be remove from the CD-ROM drive.

IT201

Page 17

Wu 150100000698

(27) On the first boot up, Windows2000 Professional is starting up automatically.

(28) After finishing starting up, Network Identification Wizard is displayed. And click Next button.

(29) This Wizard is to require the user log on to this computer.

(30) Click Next button. Finish this Wizard to click Finish button. (31) Then the display of Log On To Windows 2000 Professional comes out.

IT201

Page 18

Wu 150100000698

(32) The system start to load and the Windows 2000 Professional desktop will appear.

IT201

Page 19

Wu 150100000698

3. Using MMC, Task Scheduler, Control Panel 3.1 Using MMC


MMC is Microsoft Management Console. MMC is Windows-based multiple interface application and it is included Windows 2000 operating system. It allows system administrator and advanced user to configure and monitor system with flexible interface. Snap-ins provides the actual management behavior. The MMC environment provides for seamless integration between snap-ins. It is powerful to create a console file from scratch. Creating Consoles: 1. Click Run on Start Menu, type MMC on the Open Combo Box. Then click OK button.

2. Click Console on the menu bar and choose Add/Remove Snap-in in the list box. The Add or Remove Snap-in dialog box appears.

IT201

Page 20

Wu 150100000698

3. Click Add button. The Add Standalone Snap-in dialog box is shown that displays snap-ins which will install on the computer.

4. Choose Computer Management from the list of Snap-ins. Computer Management wizard will be opened.

IT201

Page 21

Wu 150100000698

5. Choose Local Computer (the computer this console is running on). Choose Another computer that select another computer from your workgroup or domain. And check box that is Allow the selected computer to be changed when launching from the command line

. 6. Click Finish button. Computer Management (Local) is shown on the Add/Remove Snap-ins dialog box.

IT201

Page 22

Wu 150100000698

7. Click Extensions tab. And select Add all extensions. This function is for all locally installed extensions on the computer is available.

8. Click OK button. Now there is Computer Management(Local) on Console Root.

IT201

Page 23

Wu 150100000698

3.2 Using Task Scheduler


Task Scheduler enables us to automatically perform routine tasks on a chosen computer. The task scheduler does this by monitoring whatever criteria you choose to initiate the tasks and then executing the tasks when the criteria is met. 1. Select Scheduled Tasks under Control Panel. And then double-click Add Scheduled Tasks. 2. Click Next button. Select which program you want window to run, such as Calculator. Or click Browse button to choose any program.

3. Click Next button. We can rename the program or just use the default name. And choose any time option that we want such as daily, weekly and so on.

4. Click Next button. Select the time and day we want this task to start.

IT201

Page 24

Wu 150100000698

5. Click Next button. Enter the name and password of a user. The task will run as if it were started by that user.

6. Click Next button. Lastly, click Finish button. Add Scheduled Task has successfully.

IT201

Page 25

Wu 150100000698

3.3 Using Control Panel


Control Panel allows users to control and change system settings. Control panel displays a list of applets. Users use this setting in Control Panel to personalize the computer. 1. Click Control Panel under settings on Start menu.

2. Choose any icon that users want to change information. For example, Add/Remove Programs.

IT201

Page 26

Wu 150100000698

4. Managing Windows 2000 file system, storage


4.1 Creating Volume (1) Open Computer Management (Local) under Administrative Tools under Control Panel

(2) Click storage on Computer Management (Local). Finally, click Disk Management.

(3) Right Click any unallocated space on the dynamic disk, and click New Volume. (4) Follow the New Volume Wizard.

IT201

Page 27

Wu 150100000698

4.2 Covert FAT to NTFS We use Setup Program to help us convert FAT to NTFS firstly. It helps us to keep files integrated by using this program. Setup Program will check all existing file system. It will tell us if we use FAT, FAT32 or NTFS. If it is, we do not need to covert anything. If it is FAT or FAT32, we have two choices. One choice is that we dont want to keep files intact; we should use formatting a partition instead of converting. Secondly, we use Convert.exe. Convert.exe is for converting a partition after complete Setup Program. (1) After finishing Setup, click Start button, click Run, type cmd on box and then press Enter. Command window will appear.

(2) Type help convert in the command window, and press Enter. Information about Converting FAT volumes to NTFS is shown below.

IT201

Page 28

Wu 150100000698

(3) After (1) and (2), we can convert a volume to NTFS from the command prompt. Click Start button, select Programs and Accessories, and thus click Command Prompt.

(4) In the command prompt window, typing drive or partition that we want to convert to NTFS. For example: convert C:/fs:ntfs.

IT201

Page 29

Wu 150100000698

5. Users, Group, Profiles and Policies


5.1 Creating Users and group On one computer, we can create several users and group. Therefore, several users and group can execute same computer. Double-click Users and passwords under Control Panel. (2) Select Advanced and click Advanced under Advanced User Management frame

Firstly select Users under tree 1.1 Select New User with Right-click Users, the New User form will pop up in the screen. Then, we have to fill in the new user form.

IT201

Page 30

Wu 150100000698

1.2 Click Create button, first user account has created successfully. 2.1 Continue to fill the New User form. And multiselect User cannot change password and Password never expires.

2.2 Click Create button, second user account has created successfully. 3.1 Continue to fill the New User form. And select User cannot change password.

3.2 Click create button. Thirdly user account has successfully created. 4.1 Continue to fill the New User form. And select User cannot change password.
IT201 Page 31

Wu 150100000698

4.2 Click Create button. Forth user account has successfully created. 5.1 Continue to fill the New User form. And select User cannot change password.

5.2 Click Create button. Fifth user account has successfully created.

IT201

Page 32

Wu 150100000698

Five users account below:

Secondly Select Groups under tree (1.1) Right-click group and select new group, thus fill in New Group form and Add members

(1.2) Click Create button, first group has created successfully. (2.1) Continue to fill in New Group form and Add another members

IT201

Page 33

Wu 150100000698

(2.2) Click Create button, second group has created successfully. (3.1) Continue to fill in New Group form and Add another members

(3.2) Click Create button, third group has created successfully. (4.1) Continue to fill in New Group form and Add another members

IT201

Page 34

Wu 150100000698

(4.2) Click Create button, forth group has created successfully. (5.1) Continue to fill in New Group form and Add another members

(5.2) Click Create button, fifth group has created successfully. Five group below:

IT201

Page 35

Wu 150100000698

5.2 Setting Rights for different group Notice: When you click to allow Full Control permission, other permissions will be automatically allowed. When you click to allow Modify permission, other permissions will be allowed except Full control. Choose any folder that you want to share, such as Proposal folder

First group IT 201 Choose IT 201 group to share this folder to them under Security and give Read &Execute, List Folder Contents and Read permissions to the group.

Click Apply and OK button

Second group IT 201 Choose IT 207 group to share this folder to them under Security and give Full Control permission to the group

IT201

Page 36

Wu 150100000698

Third group IT 209 Choose IT 209 group to share this folder to them under Security and give Read &Execute, List Folder Contents, Read and Write permissions to the group.

Fourth group IT 210 Choose IT 210 group to share this folder to them under Security and give Modify, Read &Execute, List Folder Contents, Read and Write permissions to the group.

IT201

Page 37

Wu 150100000698

Fifth group IT 211 Choose IT 211 group to share this folder to them under Security and give Full control permissions to the group.

IT201

Page 38

Wu 150100000698

5.3 Change local security policy Local security policy is used to view and modify local security policy, such as user rights and audit policies. 1. Click Local Security Policy under Administrative Tools under Control panel.

2. For example, open User Rights Assignment under Local Policies.

IT201

Page 39

Wu 150100000698

3. Choose any option that you want to change local security policies. For example: Access this computer form the network. Right click it, and then click security

4. From Add button, we can add five groups inside. After changing, click OK button.

IT201

Page 40

Wu 150100000698

6. Windows 2000 security and access control Set


Windows 2000 securities are on below: Account Policies Local Policies Audit Log Management Default Group Accounts System Services Securing the File system Share Folder Permissions Securing the Registry IPSec Policy Encrypting File system Enable Automatic screen Lock Protection Update the system Emergency Repair Disk

6.1 Create legal warning message (1) Click Start button and click Run. Type Regedit32 in the box.

(12) Click OK button. Click Add Value under Edit toolbar. And type LegalNotice as value name.
IT201 Page 41

Wu 150100000698

(13) Click OK button. And type warning on the string editor box.

(14) Click OK button. (15) Click SOFTWARE Microsoft Windows NT CurrentVersion Winlogon under Registry Editor-[HKEY_LOCAL_MACHINE on Local Machine]. Then we will see LegalNotice here that we just created.

(16) When we log off the computer, we will see the warning message.

IT201

Page 42

Wu 150100000698

IT201

Page 43

Wu 150100000698

6.2 Change default shell Notice: Using change default shell, administrator can allow limited function for users to use. (1) Click SOFTWARE Microsoft Windows NT CurrentVersion Winlogon under Registry Editor-[HKEY_LOCAL_MACHINE on Local Machine].

(2) Double click Shell: REG_SZ: explorer.exe. For example: Notepad. We type Notepad.exe in the String Editor box.

(3) Click OK button. We will see Shell: REG_SZ: explorer.exe change to Shell: REG_SZ: notepad.exe

IT201

Page 44

Wu 150100000698

(4) Log off the computer. After that notepad automatically run. But we just have notepad on the desktop.

Compare to before changing default shell desktop:

Before changing default shell desktop

IT201

Page 45

Wu 150100000698

7. Network Protocols, Explain TCP/IP, Advantages and disadvantages of TCP/IP


Network Protocols is an established guideline that specifies how networked data is formatted into a packet, how to include information about which node sent the packet, which node is receive the packet, how the packet is transmitted, and how it is interpreted at the receiving end. TCP/IP stands for Transmission Control Protocol/Internet Protocol. This protocol is suitable for medium and large networks. TCP ensures data that have been successfully by performing extensive error checking. To ensure data to reach the correct destination IP consists of rules that is used for packaging data. Meanwhile, TCP/IP has some advantages and disadvantages. Advantages of TCP/IP * It is better to used for enterprise networks or for medium to large networks * It is designed for routing and it has a high reliability * It connects to the Internet by web servers immediately * It is compatible with standard tools for analyzing network performance * It is ability to use Dynamic Host Configuration Protocol (DHCP) and Windows Internet Naming Service (WINS) through a Microsoft NT server Disadvantage of TCP/IP * It is hard to set up and maintain if it is compared with NetBEUI or IPX/SPX * It is slower than IPX/SPX and NetBEUI on networks with light to medium traffic volume

IT201

Page 46

Wu 150100000698

8. Netware connectivity
8.1 steps to link NetWare (1) Click Start button and select Settings, then double left click Network and Dial-up connections. The Network and Dial-up Connections window is displayed.

(2) Double left click Local Area Connection, and click Properties button on the Local Area Connections Status window.

(3) There are three components. Client for Microsoft Networks allows the computer to access resources on a Microsoft network. File and Printer Sharing for Microsoft
IT201 Page 47

Wu 150100000698

Networks allows other computers to access resources on your computer using a Microsoft network. Internet Protocol (TCP/IP) provides communication across diverse interconnected networks. Select Client for Microsoft Networks and click Install button.

(4) Three type of network component provide us to install. Type1 Client provides access to computers and files on the network user is connecting to. Type2 Service provides additional features. Type3 Protocol is a language the computer uses to communicate with other computers. Netware is a protocol, so select Protocol and click Add button.

(5) Choose any protocol that you want to install. If you have an installation disk for this component, you just click Have Disk button. Let us choose NWLink IPX/SPX/NetBIOS Compatible Transport Protocol and click OK button.
IT201 Page 48

Wu 150100000698

(6) NWLink NetBIOS and NWLink IPX/SPX/NetBIOS Compatible Transport Protocol are added on Local Area Connection Properties window.

(7) Linking Netware successful. 8.2 steps to link RAS RAS is Remote Access Services. It is any combination of hardware and software. It enables to remote access tools or information that typically reside on a network of IT devices. (1) Click Start button and select Settings, then double left click Network and Dial-up connections. The Network and Dial-up Connections Window is displayed.

IT201

Page 49

Wu 150100000698

(2) Double left click Make New Connection. Network Connection Wizard is displayed. Let us follow the wizard.

(3) Click Next button to continue creating a new connection.

(4) Choose any type of network connection to create. Option1 Dial-up to the Internet connect to the Internet using my phone line (modem or ISDN). Option2 Accept incoming connections is connected by other computers through phone line, the internet or direct cable. Option3 Connect directly to another computer connect using my serial, parallel, or infrared port. After choosing, click Next button

IT201

Page 50

Wu 150100000698

(5) Select any option and click Next button.

(6) Click Next button and select which modem you want to create.

(7) Click Finish button.


IT201 Page 51

Wu 150100000698

9. Printing
9.1 Steps to create local printer (1) Double left click Printers under Control Panel

(2) Click Add Printer, Add Printer Wizard window is displayed.

(3) Let us follow the wizard. Click Next button.

IT201

Page 52

Wu 150100000698

(4) If the printer is attached to your computer directly, click Local Printer. Click Network printer, if it is attached to another computer or directly to the network. Now we need to add local printer, so we just click Local printer. And click Next button.

(5) To select the port you want your printer to use. Otherwise, you click create a new port. And then click Next button.

(6) Select the manufacturer and model of your printer. If your printer did not display on the list, then click Have Disk button. For example: select Agfa manufacturer and AGFAAccuSet v52.3 printer. And click Next button.

IT201

Page 53

Wu 150100000698

(7) You can rename the printer name or just use default name. Click Yes if you want to your Windows-based programs to use this printer as the default printer. Otherwise, click No button. And then click Next button.

(8) Click Do not share this printer if you do not want to share. Otherwise, click Share as and type a share name. Thus, click Next button.

(9) If you click Yes, the printer will print out a test page. If you click No, the printer do nothing. Then click Next button.
IT201 Page 54

Wu 150100000698

(10) Click Finish button. The New local printer is created successfully. 9.2 Steps to create network printer (1) Double left click Printers under Control Panel

(2) Click Add Printer, Add Printer Wizard window is displayed.

(3) Let us follow the wizard. Click Next button.


IT201 Page 55

Wu 150100000698

(4) Click Network printer to create network printer. And click Next button.

(5) Type the printer name, or click Next to browse for a printer if you dont know the printer name. And click Next button. (6) Click Finish button. Network printer is created successfully.

IT201

Page 56

Wu 150100000698

10. Performance tuning


In order to monitor system resources, Windows 2000 has four tools to do that. 1. Monitoring Event Logs. It provides us with monitoring information about hardware, software, system problems and security. Three types of logs are system log, application log and security log. 2. Task Manager. It provides information about programs and processes running on your computer. It also displays the most commonly used performance measures for processes. 3. System Monitor. We can Use system monitor to get more comprehensive information about the computer or other computers on the network. 4. Alert. Alert is used to warn a user or administrators when some criteria are met or exceeded. If you are not actively monitoring a particular counter but want to be notified when it exceeds or falls below a specified value so that you can investigate and determine the cause of the change by using Alert. 10.1 Create Alert Object (1) Double left click Administrative Tools under control panel.

(2) Double left click Performance. The performance window is appeared.

IT201

Page 57

Wu 150100000698

(3) Right click Alerts on the left tree listing. Select and click New Alert Settings. And type the new alert name. For example: printer alert

(4) Click OK button. Write a comment, such as: printer. And click Add button.

(5) After finishing select counters. Click Add button.

IT201

Page 58

Wu 150100000698

(6) Select you want to let alert happen when the value is Under or Over. And type Limit value. Click Apply and OK button under printer alert window.

(7) Printer alert is added successfully.

IT201

Page 59

Wu 150100000698

Reference: 1. Define of Windows 95 http://en.wikipedia.org/wiki/Windows_95#Physical_RAM_limit 2. Advantages of Windows 95 http://www.cityu.edu.hk/csc/netcomp/net6/win95.htm 3. Define and version of Windows 2000 http://en.wikipedia.org/wiki/Windows_2000 4. Features of Windows 2000 http://tutorials.beginners.co.uk/features-of-windows-2000.htm 5. Comparison between NTFS and FAT16 http://www.adrc.com/ckr/ntfs_fat.html 6. MMC http://en.wikipedia.org/wiki/Microsoft_Management_Console 7. RAS http://en.wikipedia.org/wiki/Remote_Access_Service

IT201

Page 60

Das könnte Ihnen auch gefallen