Computer Technos

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Saturday, 31 July 2010

Preparing to Create a Workgroup

Posted on 10:38 by Unknown
The “Understanding Workgroups” section of this chapter describes workgroups and how you can benefit from them and avoid their limitations. A workgroup isn’t always the right solution to your networking needs, even when it provides the ease-of-configuration that you need. Consequently, your first step in preparing to create a workgroup is determining whether a workgroup is the right solution. If your network meets these requirements, you can probably use a workgroup to solve your basic networking needs:

• It provides basic file and printer sharing.

• (Optional) It provides basic database management support with no more than two custom applications.

• (Optional) It provides e-mail support with a product such as Exchange Server.

• (Optional) It provides centralized Internet access.

• It has no need for complex mission-critical applications involving large databases.

• It has no need for centralized resource management.

• It requires no remote access.

• It has no need to support external applications, a Web site, or Web services.

• It needs no more than 100 nodes in most cases.

After you determine whether you actually need a workgroup configuration, it’s time to spend some time figuring out the details. Remember that a workgroup is made up of peers. Consequently, you don’t have to have one machine that does everything. Don’t be afraid to create a plan that emphasizes the strengths of each machine in the workgroup, even if you plan to use a server. The server should provide centralized storage, but any other machine can support any other task. In fact, it may be beneficial to spread out the tasks so that the server doesn’t become overwhelmed trying to perform every task.

Create a list of the machines you plan to connect, the resources each machine can provide, and the location of each machine. You can use this list as a planning guide for configuring the network later. Make sure to consider the tasks that each machine will normally perform so that you don’t overload it. If the workstations in a workgroup are overloaded, consider getting a dedicated server to reduce some of the load. Obtain a server that can handle the current load plus at least twice as much additional load for future expansion. Most companies find that their server becomes too small, quite quickly if they don’t obtain enough capacity for future needs.

Although the topic is outside the scope of this book, you also need to consider the physical requirements of the network. The network will likely require switches, NICs, cabling (unless you plan to go wireless), and other physical elements. The kind of cabling you choose is also important because the cable must provide support for the network speed you choose or you’ll experience errors in transmitting the data. Whenever possible, use switches instead of hubs because switches have intelligence built into them that makes them more reliable and faster. Some companies don’t consider these issues and end up with cost overruns as a result. If you use a consultant to perform the physical configuration, make sure to plan for the consulting costs and add a little cushion in case the consultant encounters unanticipated problems.

Survey all the applications you need to run and consider these applications as part of the network setup. In many cases, you need to reconfigure the applications to run properly on the network. For example, Office users will likely want to store their data files in a central location so that everyone in the workgroup can access them. The centralized storage requires additional configuration time, and you need to plan for it as part of your preparation.

One of the issues that administrators tend to run into is that everyone wants to add special gizmos to the network simply because they can and not because they require the gizmos. Avoid gizmos when you can because they usually spell trouble. The more gizmos you have, the more complex your network becomes and the more time you spend securing, configuring, and maintaining it. Gizmos add to support costs and usually make users less productive. In short, gizmos are usually a waste of time, effort, and money, so you should avoid them.

Source of Information : For Dummies Windows Server 2008 For Dummies
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in Networking, Windows Server 2008 | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Windows 7 Shortcut Keys
    Longtime users of Windows have probably grown accustomed to navigating around the Windows user interface using the keyboard. This especially...
  • Windows on Mac: Virtualization Solutions
    If you’d prefer to join the ever-increasing ranks of Mac switchers—you traitor, you—you can still run Windows and, more important, Windows a...
  • Customizing Library Folders in Windows 7
    In your library folders, you can customize view options based on the contents. In the toolbar of the Pictures and Music library folders, Win...
  • Windows 7 BitLocker Drive Encryption
    In Windows Vista, you had the BitLocker Drive Encryption feature that allowed you to encrypt the content of entire volumes. In Windows 7, Mi...
  • Using Windows 7’s Performance Options
    While all the performance tools are available individually throughout the system, Windows 7 introduces a nice list of available tools, if yo...
  • Windows 7 - Installing and Configuring a Printer
    If your printer is already installed and operational at this point, you can skip this section and skim ahead for others that may be of inter...
  • Considering Centralized versus Group Sharing
    One of the most important preparation steps for your server is determining how to store the data you create. The two common methods are cent...
  • Berkeley Motes
    The Berkeley motes are a family of embedded sensor nodes sharing roughly the same architecture. Let us take the MICA mote as an example. The...
  • Using Windows 7 Ease of Access Tools
    If you have difficulty using a mouse or typing, have slightly impaired vision, or are deaf or hard of hearing, you can adjust the appearance...
  • Troubleshooting Boot and Startup Problems - Driver Loading in Safe Mode
    How does Windows know which device drivers and services are part of standard and networking-enabled safe mode? The answer lies in the HKLM\S...

Categories

  • Access 2010
  • BlackBerr
  • BlackBerry
  • Computer Science
  • Cyber Security
  • Exchange Server 2010
  • File Utilities
  • Foursquare
  • Google
  • Hardware
  • Internet
  • iPad
  • Linux
  • Lync Server
  • Microsoft Virtualization
  • Mobile Web
  • Networking
  • News
  • Security
  • Server Architectures
  • Smartphone
  • Ubuntu Linux
  • Windows
  • Windows 7
  • Windows Home Server
  • Windows Security
  • Windows Server 2008
  • Windows Server 2008 Hyper-V
  • Windows XP
  • Wireless

Blog Archive

  • ►  2012 (66)
    • ►  August (5)
    • ►  July (9)
    • ►  June (9)
    • ►  May (8)
    • ►  April (9)
    • ►  March (9)
    • ►  February (8)
    • ►  January (9)
  • ►  2011 (85)
    • ►  December (5)
    • ►  November (6)
    • ►  October (7)
    • ►  September (8)
    • ►  August (9)
    • ►  July (9)
    • ►  June (7)
    • ►  May (7)
    • ►  April (4)
    • ►  March (6)
    • ►  February (8)
    • ►  January (9)
  • ▼  2010 (230)
    • ►  December (13)
    • ►  November (3)
    • ►  October (2)
    • ►  September (10)
    • ►  August (31)
    • ▼  July (32)
      • Preparing to Create a Workgroup
      • Understanding Workgroups
      • Reviewing Legacy Windows Server 2003 Active Direct...
      • Examining Additional Windows Server 2008 R2 AD DS ...
      • Reviewing Additional Active Directory Services
      • Auditing Changes Made to AD Objects
      • Implementing Multiple Password Policies per Domain
      • Restarting AD DS on a Domain Controller
      • Recovering Deleted Items Using the AD Recycle Bin
      • Outlining AD DS Changes in Windows Server 2008 R2
      • Outlining AD DS Security
      • Outlining the Role of DNS in AD DS
      • Explaining AD DS Replication
      • Outlining the Role of Groups in an AD DS Environment
      • Examining the Key Features of Active Directory Dom...
      • Examining the Evolution of Directory Services
      • Windows Server 2008 R2 Running Add-in Applications...
      • Windows Server 2008 R2 Running Built-in Applicatio...
      • Windows Server 2008 R2 Core to an Active Directory...
      • Improvements in Server Roles in Windows Server 200...
      • Addition of Migration Tools
      • Restoring Deleted AD DS Objects Using the Active D...
      • Improvements in Clustering and Storage Area Networ...
      • Improvements for Thin Client Remote Desktop Services
      • Improvements in Windows Server 2008 R2 for Better ...
      • Improvements in Mobile Computing in Windows Server...
      • Improvements in Security in Windows Server 2008 R2
      • Windows Server 2008 R2 Introduction of Windows Dep...
      • Windows Server 2008 R2 Leveraging the Best Practic...
      • Windows Server 2008 R2 Leveraging File Server Reso...
      • Windows Server 2008 R2 Introducing Performance and...
      • Windows Server 2008 R2 Improvements in the Group P...
    • ►  June (23)
    • ►  May (2)
    • ►  April (21)
    • ►  March (32)
    • ►  February (28)
    • ►  January (33)
  • ►  2009 (119)
    • ►  December (33)
    • ►  November (31)
    • ►  October (35)
    • ►  September (20)
Powered by Blogger.

About Me

Unknown
View my complete profile