Using network drive mappings, Computer Engineering

If various load generators need to access the similar physical files, rather than having to remember to copy the files every time they change, each load generator can reference a common folder using a mapped drive. But since drive mappings are associated with a particular user:

 

1. Logon the load generator as the user the load generator will use

2. Open Windows Explorer and under Tools select Map a Network Drive and make a drive. It saves time and hassle to have consistent drive letters across load generators, so some companies reserver certain drive letters for specific locations.

3. Open the LoadRunner service within Services (accessed from Control Panel, Administrative Tasks),

4. Click the "Login" tab.

5. State the username and password the load generator service will use. (A dot appears in front of the username if the userid is for the local domain).

6. Stop and start the service again.           

 

 

Posted Date: 4/3/2013 3:58:07 AM | Location : United States







Related Discussions:- Using network drive mappings, Assignment Help, Ask Question on Using network drive mappings, Get Answer, Expert's Help, Using network drive mappings Discussions

Write discussion on Using network drive mappings
Your posts are moderated
Related Questions
2. The Turing test has often been incorrectly interpreted as being a test of whether or not a person could distinguish between responses from a computer and responses from a person

This step of systems examination is one of the most difficult. In this stage systems specifications are identified by asking what, who, when, where and how. A few questions address

With the help of clocked JK flip flops and waveforms, explain the working of a three bit binary ripple counter. Write truth table for clock transitions. Ans. Three-Bit Binary Rip

Q. Illustrate logical Data Processing Instructions? AND, OR, NOT, XOR operate on binary data stored in registers. For illustration if two registers comprises data:   R1 = 10

Disadvantages of random scan display - Just by wire-frame, it is almost impossible to create images with shaded objects or areas filled with a given colour. - In case

Q. Explain about different types of Mice? Mice can be classified on the foundation of numbers of buttons, position sensing technology or type of Interface:  Sensing Technol

A protocol is a formal description of message formats and the rules two or more machines must follow to exchange those messages. Because TCP (transmission control protocol) and IP

explain common bus system with the help of neat diagram in basic computer.

Draw the ISDN address structure and explain how the addressing works? Address Structure: The ISDN address structure is demonstrated in figure. ISDN number part has a maximum

In scalar processors just one instruction is implemented per cycle which means just one instruction is issued for each cycle and only that one instruction is completed however the