Lesson 3: Analyzing the Current Technical Environment

For the purposes of this training kit, an organization's technical environment defines how it organizes and manages its technical resources. Before you can begin planning your Active Directory infrastructure you must analyze the current state of your technical environment. This lesson covers the items you need to consider when analyzing your technical environment.


After this lesson, you will be able to

  • Analyze your organization's current network architecture
  • Analyze your organization's current hardware
  • Analyze your organization's current software
  • Analyze your organization's current technical standards
  • Analyze your organization's current DNS environment
  • Analyze your organization's current Windows NT domain architecture

Estimated lesson time: 40 minutes


Analyzing the Current Technical Environment

By analyzing your company's current technical environment, you can determine the technical requirements for implementing Active Directory. When you analyze your organization's current technical environment, you will need to analyze each component of the current technical environment, including

  • Network architecture
  • Hardware
  • Software
  • Technical standards
  • DNS environment (if applicable)
  • Windows NT domain architecture (if applicable)

To analyze each component thoroughly, you'll need to use your interviewing skills to gather information from various members of your design team. One of the best ways to gather information is to develop a worksheet that outlines what you need to know about each component and then use the worksheet to interview your team members. The Supplemental Course Materials CD-ROM that accompanies this book contains blank copies of interview worksheets that you can use to conduct your own technical environment analysis. The worksheets are only a starting point; you should modify them to meet your own analysis needs.

The result of your interviews and the completed worksheets will be a technical environment analysis document that describes the current state of each component of the technical environment. When complete, this document can be distributed to each member of the design team, providing a starting point for discussion and assessing future needs. In this lesson, you will examine the completed work-sheets that constitute the technical environment analysis document for Hiabuv Toys, a fictitious toy company whose business environment we analyzed in the previous lesson.

You will use your technical environment analysis document in conjunction with your technical environment needs assessment to determine the location and function of components in your Active Directory infrastructure plan. You will learn to conduct needs assessments for your technical environment as you learn and practice each stage of the infrastructure design process in Chapters 3–6.

Analyzing the Current Network Architecture

By analyzing network architecture, you portray the physical environment of your organization's network, which includes the current

  • Location of points on the network
  • Number of users at each location
  • Network type used at each location
  • Location, link speed, and percentage of average available bandwidth of remote network links

NOTE


Average available bandwidth is the amount of bandwidth that remains when you take the total bandwidth available for a link and subtract the amount of network traffic that occurs on the link during peak traffic.

  • TCP/IP subnets at each location
  • Speed of local network links
  • Location of domain controllers
  • List of servers at each location and the services that run on them
  • Location of firewalls in the network

The completed Network Architecture Worksheet for Hiabuv Toys analyzes the organization's network architecture.

Hiabuv Toys Network Architecture Worksheet

Use this worksheet as a guide for gathering data about your organization's network architecture.

  1. Diagram the network architecture of your organization by identifying the locations on the network, the number of users at each location, the links between locations, the link speed, and the percentage of average available bandwidth on each link during normal business hours. Indicate any links that are pay-by-usage, historically unreliable, or intermittently available or that can only connect using Simple Mail Transfer Protocol (SMTP).

    click to view at full size

  2. List the network type (Windows, Novell) used at each location.

    All servers at all locations use a Windows NT 4 network.

  3. List the TCP/IP subnets at each location.

    Seattle: 140.10.x.x. Chicago: 141.10.x.x. Miami: 143.20.x.x. London: 144.31.x.x. Taipei: 150.30.x.x.

  4. List the local network link speed at each location.

    Each location has a high-speed backbone connecting a set of 10- to 100-MB LANs.

  5. List the location of domain controllers in the network.

    Seattle: 2 domain controllers. Taipei: 2 domain controllers. Chicago: 4 domain controllers. Miami: 2 domain controllers. London: 3 domain controllers.

  6. List the servers at each location, their purpose, and the services that run on them.

    Each location has an Exchange server and at least one file server. The London and Chicago locations each have SQL servers to handle the personnel, financial, client, and tech support information. The Seattle and London locations each have an SQL server to handle distribution information. The Chicago location has a CAD server to handle the Engineering department's product development information. The Taipei location has a server to handle manufacturing information.

  7. List the location of all firewalls in the network.

    Only the Chicago site currently has a firewall.

  8. Note any known difficulties or problems encountered with the current network architecture in your organization.

    Chicago currently has no direct link to Taipei. A direct link could free up some bandwidth between Chicago and Seattle and Chicago and London. Also, there is only one link to Miami; if outages occur, the Miami site would be isolated. The lack of firewalls at various locations presents a security risk.

NOTE


A blank copy of this worksheet is located on the Supplemental Course Materials CD-ROM (\chapt02\worksheets\NetworkArch).

Analyzing the Current Hardware and Software

The purpose of analyzing the hardware and software currently in use on your network is to determine its compatibility with Windows 2000 Server. The first step in your analysis should be to conduct an inventory of the hardware and installed software.The second step is to compare your inventory with the list of hardware and software compatible with Windows 2000 Server, available at http://www.microsoft.com/windows2000/upgrade/compat/default.asp.

Your hardware inventory should include the name of each device and the manufacturer's name and model number. Depending on the device type, you may need to include more information about the device such as processor type, memory, or disk capacity. The types of devices you should consider for your inventory include audio or sound cards, computers, cameras or digital cameras, CD-R/RW, controller cards, DVD, input devices, modems, monitors, networking, printers, scanners, smart card readers, storage, TV tuners, uninterruptible power supply (UPS), USB/ 1394, video, and any other devices that are installed.

Your software inventory should include the name of the product, the version number, the manufacturer's name, and the language (for example, English or French) used in the software. Depending on the software, you may need to include more information about the software such as whether it's a service pack or patch release. The categories of software products you should consider for your inventory will depend on the individual needs of the company, but in general they include arts & entertainment, commerce, connectivity and communications, cross-platform tools/integration, data processing, data warehousing, multimedia, network infrastructure, operating systems, system management, user interface enhancements and accessibility, utilities and servers, and workflow and conferencing.

The completed Hardware and Software Worksheet for Hiabuv Toys inventories the Seattle location's hardware and the Training department's installed software and notes whether each is compatible with Windows 2000 Server.

Hiabuv Toys — Hardware & Software Worksheet

Use this worksheet as a guide for inventorying and analyzing your organization's hardware and installed software.

  1. List your organization's hardware devices by location. Put a * next to items that are not compatible with Windows 2000 Server.

    Hardware—Seattle location

    4 Servers: (2) Generic Pentium CPUs (64 MB RAM*), (2) Dell PowerEdge 4400 (Pentium III 2 GB ECC RAM)

    105 Workstations: (30) Generic Pentium CPUs (64 MB RAM*), (25) Dell Dimension XPS B (Pentium III, 512 MB RDRAM), (50) Dell Optiplex GX110 (Pentium III, 512 MB SDRAM)

    10 Printers: (9) HP Laserjet 7550+, (1) HP Color Laserjet 4500N

    2 Scanners: (2) UMAX Astra 1220S

    1 SCSI Storage Unit: Dell Power Vault 210S

    1 UPS Unit: APC Smart-UPS 3000RM

  2. List the software used in your organization by department. Put a * next to software that is not compatible with Windows 2000 Server.

    Software—Training department (located in Chicago)

    Microsoft Windows NT Workstation 4

    Microsoft Office 2000 Professional, English

    Microsoft Internet Explorer 5.01

    Adobe Acrobat 4, English

    Adobe Photoshop 5.5, English

    Visio Professional 5, English

    McAfee VirusScan 4, English*

    WinZip 8

  3. Note any known difficulties or problems encountered with the hardware or software currently installed in your organization.

    The two old Seattle servers occasionally overheat and will need to be replaced.

NOTE


A blank copy of this worksheet is located on the Supplemental Course Materials CD-ROM (\chapt02\worksheets\Hardware&Software).

Analyzing the Current Technical Standards

Your organization's technical standards are the conventions currently in place for the technical environment. Technical standards usually include

  • Standard hardware configurations for desktops, servers, and other devices
  • Standard software configurations for user desktops
  • Naming conventions for users, groups, devices, and domains
  • Network performance standards
  • Security standards

The completed Standards Worksheet for Hiabuv Toys analyzes the technical standards currently in place for the Engineering department in the organization.

Hiabuv Toys Technical Standards Worksheet

Use this worksheet as a guide for gathering data about the technical standards currently in place in your organization.

  1. List the standard hardware configuration for desktops in each department in your organization

    Engineering department: 800EB MHz Pentium III processor (128 MB RDRAM, 30-GB hard drive), 21" monitor (32-MB graphics card), DVD-ROM drive (12x max), CD-RW drive (8x/4x/32x max), digital sound card, speakers, mouse, and modem. This standard was implemented 6 months ago; hardware will continue to be updated for the next 12 months.

  2. List the standard hardware configuration for servers in your organization.

    Standard server configuration for departments, including Engineering: 2 Pentium III processors at 800 MHz, 133-MHz system bus, 32-KB level 1 cache, 256-KB full speed level 2 cache, 2-GB ECC 133 MHz SDRAM memory, 36-GB hard drive, external storage unit, tape backup unit, 21" monitor, CD-ROM drive, 3.5" diskette drive, mouse, and modem. This standard was implemented 6 months ago; hardware will continue to be updated for the next 12 months.

  3. List the standard desktop configuration for users in each department in your organization.

    All users in Engineering see the Hiabuv Toys logo during startup and a standard Hiabuv Toys screen saver. Shortcuts to software, such as the CAD program used to design products and the Microsoft Office Shortcut Bar appear on the desktop. Users are prohibited from making changes to their desktops.

  4. Indicate the standard security settings that apply to the organization, which include password, account lockout, and Kerberos-related settings. Then indicate any areas within the organization that differ from this standard.

    For the entire organization, the maximum password age is 45 days, with a minimum password length of 8 characters. However, for the Engineering department, the maximum password age is 30 days, with a minimum password length of 12 characters. For the entire organization, the account lockout threshold is three invalid attempts. However, for the Engineering department, the account lockout threshold is two invalid attempts.

  5. List the naming conventions for users, groups, devices, and domains in your organization.

    Users: Each user name consists of the last name of the user. If there is more than one user with the same last name, the user's first initial is used before the last name. If there is more than one user with the same first initial and last name, the first and second initials are used before the last name.

    Groups: Each group name consists of the name of the group followed by the abbreviated department name.

    Devices: Each device name consists of the name of the device followed by the abbreviated department name. Numbers are placed after the department name when duplicate devices exist in the same department.

    Domains: A domain name is descriptive of the domain.

  6. List the network performance standards set by your organization.

    Hiabuv Toys has the following performance goals: 100% up time, except for time required for system maintenance, 50% available bandwidth for all site links during peak traffic periods, and changes replicated to each site every 20 minutes.

  7. List objects that must be hidden from users and the users from which the objects must be hidden.

    Engineering and payroll servers and software must be hidden from users.

  8. List the security standards set by your organization.

    Password standards: change password every 30 days, the last nine passwords are remembered; a password must be seven or more characters.

    Account standards: accounts are locked out for 60 minutes after three faulty logon attempts; logon hours, account expiration dates, and specific workstations are set for consultants, contractors, and temps.

    Files, folders, and shared folders: department supervisors receive relevant training to standardize permissions for each department.

  9. Note any known difficulties or problems encountered with the standards currently set by your organization.

    The naming convention for groups makes group names difficult for users to remember. Departments still need help setting the appropriate permissions for files, folders, and shared folders.

NOTE


A blank copy of this worksheet is located on the Supplemental Course Materials CD-ROM (\chapt02\worksheets\TechStandards).

Analyzing the Current DNS Environment

A Domain Name System (DNS) service is a name resolution service used to translate host names to IP addresses in Active Directory. As you learned in Chapter 1, for Active Directory and associated client software to function correctly, you must have installed and configured Windows 2000 DNS. If your organization does not currently use DNS, there is nothing to analyze at this time. However, if your organization is already using another DNS service, it's important to find out whether the service is compatible with Active Directory and how it is currently structured.

The minimum requirement for a DNS service to be compatible with Active Directory is for the service to support service resource records (SRV RRs), as described in RFC 2052, and dynamic update, as described in RFC 2136. Many established DNS environments operate on UNIX servers running the BIND (Berkeley Internet Name Domain) implementation of DNS. If your DNS environment is running BIND version 8.1.2 or later, it supports SRV RRs and dynamic update and is compatible with Active Directory DNS requirements. If your organization is currently running Windows NT 4 DNS, your DNS service is also compatible with Active Directory DNS requirements.

NOTE


To read more about service resource records, launch an Internet search engine and run a search on "RFC 2052" and "RFC 2136." RFCs (Request for Comments) are the official documents of the Internet Engineering Task Force (IETF) that specify the details for new Internet specifications or protocols. RFC 2052 is entitled "A DNS RR for Specifying the Location of Services (DNS SRV)." RFC 2136 is entitled "Dynamic Updates in the Domain Name System (DNS Update)."

Although the DNS services described here are compatible with Active Directory, only the Windows 2000 DNS service allows you to use Active Directory as the data storage and replication engine. With some planning, you will be able to migrate from these compatible DNS services to Windows 2000 DNS.

The completed DNS Environment Worksheet for Hiabuv Toys analyzes the organization's existing DNS environment.

Hiabuv Toys DNS Environment Worksheet

Use this worksheet as a guide for gathering data about your organization's existing DNS environment.

  1. Indicate the type of DNS service currently used in your organization.
  2. Diagram the existing DNS namespace used in your organization. Indicate the location of domain name servers

    click to view at full size

NOTE


A blank copy of this worksheet is located on the Supplemental Course Materials CD-ROM (\chapt02\worksheets\DNSEnvironment).

Analyzing the Current Windows NT Domain Architecture

In Windows NT, you can group users and servers into domains for administrative purposes. In Windows 2000, organizational units (OUs) have been introduced to handle administration, while domains still provide administration but hold OUs and many more objects than in Windows NT. The purpose of analyzing the current Windows NT domain architecture employed in your organization is to understand the workings of the present domain structure so that you can convert each of the domains into an Active Directory domain, tree, and forest structure. If your organization does not currently use Windows NT, there is nothing to analyze at this time.

The completed Windows NT Domain Architecture Worksheet for Hiabuv Toys analyzes the organization's existing Windows NT domain architecture.

Hiabuv Toys Windows NT Domain Architecture Worksheet

Use this worksheet as a guide for gathering data about your organization's Windows NT domain architecture.

  1. Use ovals to diagram the existing domains in your organization's Windows NT architecture. Include arrows to represent the direction of trusts between domains and the name of each domain.
  2. Indicate the location of domain controllers in the network.

    click to view at full size

NOTE


A blank copy of this worksheet is located on the Supplemental Course Materials CD-ROM (\chapt02\worksheets\NTDomain).

Lesson Summary

In this lesson you learned to analyze each component of your technical environment, including the current network architecture, hardware, software, technical standards, DNS environment, and Windows NT domain architecture. An organization's technical environment defines how it organizes and manages its technical resources. Your organization's technical environment has a direct effect on your Active Directory infrastructure.

You also learned to create a document, the technical environment analysis document, which describes the current state of each technical environment component in your organization. The technical environment analysis document includes the completed Network Architecture, Hardware and Software, Technical Standards, DNS Environment, and Windows NT Domain Architecture worksheets. When complete, this document can be distributed to each member of the design team, providing a starting point for discussion and assessing needs.



MCSE Training Kit Exam 70-219(c) Designing a Microsoft Windows 2000 Directory Services Infrastructure
MCSE Designing a Microsoft Windows 2000 Directory Services Infrastructure Readiness Review; Exam 70-219 (Pro-Certification)
ISBN: 0735613648
EAN: 2147483647
Year: 2001
Pages: 76

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net