Characteristics Of Microsoft Windows Computer Science Essay

Published: Last Edited:

This essay has been submitted by a student. This is not an example of the work written by our professional essay writers.

I have been appointed as the Network Manager for BestInvest Inc, this company have many branches all over the world. This company decided to implement Network computers (NCs) as a direct replacement for normal PC workstations on the network if it is possible to save money and reduce cost of the technical support. As a Network manager of this company, my duty is to research different type of platform like Microsoft Windows Thin-client and Linux thin-client and find what is the best choice for this company. Basically I have to find lowest price and best quality.


In this stage I investigate the characteristics of Network Computer Linux and One Microsoft Windows and also investigate the total cost of ownership for each.

Characteristics of Linux thin-client:

Operating System Linux 2.6 Kernel

Linux thin-client computer Linux thin-client computer support multitasking such as at the same time several program can runs different CPUs, Which means it support multiprocessor machine.

Linux thin-client computer support multitasking such as at the same time several program can run.

Linux thin-client is very easy to operate.

Linux thin-client is bard-disk less computer.

Linux thin-client isn't need memory.

Linux thin-client is not requiring hardware maintenance.

Linux thin-client network very secured.

It is remote controlled network

Characteristics of Microsoft Windows thin-client:

Operating System Windows 7/Vista/XP/98

Microsoft Windows thin-client network implementation very expensive.

Easy to use disk management tool and that also helps save storage costs.

Microsoft Windows thin-client has decorated and attractive interface.

Microsoft Windows thin-client is also disk less.

Microsoft Windows thin-client network is not requiring hardware maintenance.

Microsoft Windows thin-client network is very easy to operate.

Microsoft Windows thin-client server support at the same time several users can logon to the same machine and there are no required separate user licenses.

Total cost of ownership:

Being a network Manager of BestInvest Inc. I have to calculate the total cost of ownership for this project of replacing all workstation to thin-client.

I will calculate total cost of ownership for one branch but it will apply for all branches of this company. Every branch has approximately 20 thin-client workstation.

List of Hardware and Software

Linux thin-client

Microsoft Windows thin-client

The initial costs of the hardware and software (One server and 20 thin PC for one time)



Hardware and Software installation cost (one time)



Costs for the initial deployment and employee tainting (one time)



On-going maintenance fees for software updates and upgrades as well as help-desk support for next 5 years



Expenses related to system and network maintenance for next 5 years



Costs associated with downtime for next 5 years



Total Cost of Ownership



After investigation I have found the characteristics of Microsoft Windows thin-client and Linux thin-client and also described total cost of ownership that I have describe above.

Task -2

In this stage I will describes Network Computer/Thin-client with an example and also describe benefits, drawbacks of thin-client. It has been describing Network infrastructure of one branch office and also comparing of two different solutions offered by two different commercial vendors.


The Network Computer/thin-client involves connecting to the Network Computer Server and thin-client software and some hardware device with the server side using a highly efficient network protocol. Thin-client structural design enables server-based processing and support for mission-critical, web-based and other custom application across any type of connection to any type of client hardware, regardless of platform.

Benefits of thin-client computer:

User cannot load their own applications or change configuration settings without the administrator's permission.

Easy to backup and restore

Licensing is simpler to manage; Software need not be installed on a user's PCs 'just in case'.

It can save device additional device cost

Networking cost also less from other systems

Easy distribution

Facilitates 'hot-disking' or working across various sites.

Drawbacks thin-client computer:

Poor response times

Less robust transactional support

Resource loading

It is not possible to use floppy or CDs on the client machine with a true thin-client solution.

Poor multimedia performance.

Bandwidth issues.

Reliance of the server.

Network support infrastructure required for Thin-client computer:

Network computer (Network Server)


Web server

Network Switch


Wire cables required for the thin client network connection

PXE enabled Network Interface Card (NIC) for the thin-client computer

Display monitor required for the thin-client computer

Comparison Between two different commercial vendors:

Compare topics




Linux thin-client computer implementation cost cheaper than others

Microsoft Windows thin-client computer implementation is very expensive


Linux thin-client provide strong security

Microsoft Windows thin-client not provide strong security


Linux thin-client interface not so good looking

Microsoft Windows thin-client interface is so attractive looking


At the same time can run many program

Microsoft Windows thin-client not provide this facilities

Multiple user support

Multiple user can access at the same time

Not support multiple user at the same time


In this task I have described thin-client with an example, benefits of thin-client computer, drawbacks thin-client computer, network support infrastructure required for thin-client computer and comparison between two different commercial vendors.


Any organization network must be secured because at anytime virus can attack the network.

Virus is the major threat for any organization network. Like others this Organization need network security policy.

Described different types of virus:

Trojan horse:

In computers, a Trojan horse is a program in which malicious or harmful code is contained inside apparently harmless programming or data in such a way that it can get control and do it's chosen from of damage, such as ruining the file allocation table on your hard disk. In one celebrated case, A Trojan horse may be widely redistributed as part of a computer virus. ( Date: 16/07/2012)


Computer worms are malicious software applications designed to spread via computer networks. Computer worms are one form of malware along with viruses and Trojans. A person typically installs worms by inadvertently opening an email attachment or message that contains executable scripts. ( Date: 16/07/2012)


A virus is a small program that embeds itself into other programs. When those other programs are executed, the virus is also executed, and attempts to copy itself info ore programs. In this way, it spreads in a manner similar to a biological virus. ( Date: 16/07/2012)

The major network security issues:

Ensuring that only authorized personnel have access to the network infrastructure - wiring closets, networking devices, etc.

Security devices such as firewalls and anti-virus software

Data encryption systems where data is transmitted through areas that are not controlled by company

Data backup regimes, including the use of off-site backup

Training staff in the safe and secure use of the equipment they have access to

Security Policy:

Network must be password protected to prevent unwanted attract.

Only network administrator can change access permission.

No access without authorized personnel.

Password or other information must be encrypted when during travel.

User must have minimum knowledge about computer security.

Only a single network communications device should be attached per Ethernet jack. If additional jacks are required, a cabling request must be submitted to information Technology Survives (ITS).

Physical access to infrastructure network switching equipment is not permitted without specific authorization of ITS


I have successfully completed my investigation about different types of virus, the major network security issues and security policy.

Summary of the project:

I have completed my investigation on Characteristics of Linux thin-client, Characteristics of Linux thin-client and Microsoft Windows thin-client, Total cost of ownership, Benefits of thin-client computer, Drawbacks thin-client computer, Network support infrastructure required for Thin-client computer, Comparison Between two different commercial vendors, Described different types of virus, The major network security issues, Security Policy. After all I have found that Linux thin-client is more reliable, most secure and also low price. So I am requesting to my superior to implement Linux thin-client for this company.