network technology foundations © 2004 prosofttraining all rights reserved

41
Network Network Technology Technology Foundations Foundations © 2004 ProsoftTraining All Rights Reserved

Upload: camilla-hancock

Post on 17-Dec-2015

217 views

Category:

Documents


0 download

TRANSCRIPT

Network Technology Network Technology FoundationsFoundations

© 2004 ProsoftTraining

All Rights Reserved

Lesson 4:Lesson 4:Hardware and Hardware and

Operating System Operating System MaintenanceMaintenance

ObjectivesObjectives

Identify the characteristics of motherboardsIdentify the characteristics of motherboards IdentifyIdentify common IRQ, I/O address and DMA settings common IRQ, I/O address and DMA settings Identify IDE/ATA, EIDE/ATA-2, SATA and SCSI traitsIdentify IDE/ATA, EIDE/ATA-2, SATA and SCSI traits Identify NICs and common peripheral portsIdentify NICs and common peripheral ports Identify the characteristics of CD-ROMs and DVDsIdentify the characteristics of CD-ROMs and DVDs Describe the characteristics of file system typesDescribe the characteristics of file system types Describe the uses of file system management toolsDescribe the uses of file system management tools Identify and suggest corrective measures for Identify and suggest corrective measures for

operating system boot problems and application operating system boot problems and application failuresfailures

Identify methods to remotely manage and Identify methods to remotely manage and troubleshoot workstationstroubleshoot workstations

Basic Hardware Basic Hardware and System Maintenanceand System Maintenance

Fix hardware problems by ensuring:Fix hardware problems by ensuring: • Components are plugged inComponents are plugged in• Components are turned onComponents are turned on• Components are connected properly in Components are connected properly in

order to operate (such as connecting the order to operate (such as connecting the keyboard to the computer)keyboard to the computer)

Periodically clean hardware componentsPeriodically clean hardware components Establish a preventive maintenance planEstablish a preventive maintenance plan

MotherboardMotherboard

Main circuit board in a computerMain circuit board in a computer Must be securely fastened to system chassisMust be securely fastened to system chassis Should never touch anything metal, except Should never touch anything metal, except

through proper connectionsthrough proper connections Most motherboard components are soldered on Most motherboard components are soldered on

and no longer replaceableand no longer replaceable If components fail (except for memory and the If components fail (except for memory and the

microprocessor), the entire motherboard needs to microprocessor), the entire motherboard needs to be replacedbe replaced

IRQs, I/O Addresses and DMAIRQs, I/O Addresses and DMA

IRQs — hardware lines used to identify IRQs — hardware lines used to identify when a device wants to communicate with when a device wants to communicate with the processorthe processor• Example: Example: When a printer has finished When a printer has finished

printing, it sends an interrupt signal to printing, it sends an interrupt signal to the computer so the computer can the computer so the computer can decide what to process nextdecide what to process next

I/O address — memory location that allows I/O address — memory location that allows the system processor and system devices the system processor and system devices to communicateto communicate

DMA — allows a device to access system DMA — allows a device to access system memory directly, bypassing the processormemory directly, bypassing the processor

Mass Storage Mass Storage Device InterfacesDevice Interfaces

To communicate with a motherboard, mass To communicate with a motherboard, mass storage devices need to be connected to storage devices need to be connected to the motherboard through an interfacethe motherboard through an interface

Three most common interfaces are:Three most common interfaces are:• IDE IDE • EIDE EIDE • SCSI SCSI

IDE/EIDEIDE/EIDE

IDE is also known as Advanced Technology IDE is also known as Advanced Technology Attachment (ATA)Attachment (ATA)

EIDE (ATA-2) is an enhanced version of IDE that EIDE (ATA-2) is an enhanced version of IDE that provides higher drive capacitiesprovides higher drive capacities

IDE/EIDE interface cables are long, thin and gray IDE/EIDE interface cables are long, thin and gray in appearancein appearance

Serial ATA (SATA)Serial ATA (SATA)

SATA provides faster speeds than standard ATASATA provides faster speeds than standard ATA SATA devices are connected using a cable that SATA devices are connected using a cable that

somewhat resembles a small Category 5 Ethernet somewhat resembles a small Category 5 Ethernet cablecable

Small Computer Small Computer System Interface (SCSI)System Interface (SCSI)

With SCSI, With SCSI, multiple devices can be multiple devices can be connected to a single controller in a daisy connected to a single controller in a daisy chain configurationchain configuration

You can attach as many as 127 internal or You can attach as many as 127 internal or external SCSI devices to a single controllerexternal SCSI devices to a single controller

SCSI devices include hard disk drives, SCSI devices include hard disk drives, floppy disk drives, printers, scanners and floppy disk drives, printers, scanners and tape drivestape drives

SCSI daisy chain must be terminated at SCSI daisy chain must be terminated at both ends and only at the endsboth ends and only at the ends

Resolving Resolving Device ID ConflictsDevice ID Conflicts

LUN conflicts are a common cause of LUN conflicts are a common cause of difficulty when installing a SCSI devicedifficulty when installing a SCSI device

All SCSI device numbers and LUNs must be All SCSI device numbers and LUNs must be uniqueunique

Network Interface CardNetwork Interface Card

Each network device must have a network Each network device must have a network interface card (or network adapter card)interface card (or network adapter card)

The network adapter makes the physical The network adapter makes the physical connection between the device and the network connection between the device and the network cabling cabling

The network adapter converts the data from the The network adapter converts the data from the computer into a format appropriate for computer into a format appropriate for transmission over the network transmission over the network

Transceiver — the network adapter component Transceiver — the network adapter component that handles data transmissionthat handles data transmission

Common Peripheral PortsCommon Peripheral Ports

Common Peripheral Ports Common Peripheral Ports (cont’d)(cont’d)

PS/2-style ports are for the mouse and keyboardPS/2-style ports are for the mouse and keyboard Serial ports:Serial ports:

• Communicate using serial asynchronous Communicate using serial asynchronous communicationcommunication

• Are used for serial communication devicesAre used for serial communication devices Parallel ports:Parallel ports:

• Communicate using parallel communicationCommunicate using parallel communication• Are used for parallel communication devicesAre used for parallel communication devices

Common Peripheral Ports Common Peripheral Ports (cont’d)(cont’d)

USB ports:USB ports:• Support asynchronous and isochronous Support asynchronous and isochronous

transmissions for data transfertransmissions for data transfer• Communicate using serial communicationCommunicate using serial communication• Support as many as 127 peripheral devices in a Support as many as 127 peripheral devices in a

daisy chain configurationdaisy chain configuration FireWire (IEEE 1394):FireWire (IEEE 1394):

• A high-speed serial interface to which you can A high-speed serial interface to which you can daisy chain as many as 63 peripheral devicesdaisy chain as many as 63 peripheral devices

• Good for devices that need to transfer large Good for devices that need to transfer large amounts of dataamounts of data

Power RequirementsPower Requirements

Electricity is measured according to different Electricity is measured according to different standards in North America and Europestandards in North America and Europe

Computing and networking equipment is also Computing and networking equipment is also manufactured to different standardsmanufactured to different standards

When traveling from North America to Europe, When traveling from North America to Europe, you will need:you will need:• A special plug adapterA special plug adapter• A power inverterA power inverter

CD-ROMCD-ROM

CD-ROM — an optical CD-ROM — an optical storage device from which storage device from which data can be read onlydata can be read only

CD-ROM drives use common mass storage CD-ROM drives use common mass storage interfacesinterfaces

Writable CD-ROM devices allow you to create, or Writable CD-ROM devices allow you to create, or "burn," your own data and audio CDs"burn," your own data and audio CDs • CD-R (CD-recordable) — write data onceCD-R (CD-recordable) — write data once • CD-RW (CD-rewritable) — write data multiple CD-RW (CD-rewritable) — write data multiple

timestimes

DVDDVD

DVD — optical DVD — optical storage device from which data storage device from which data can be read onlycan be read only

DVDs are similar to CD-ROMs but have higher DVDs are similar to CD-ROMs but have higher storage capacitystorage capacity• Initial DVD standard provided 4.7 GB of Initial DVD standard provided 4.7 GB of

storage capacitystorage capacity • Current DVD standards support dual-layer Current DVD standards support dual-layer

discs with a storage capacity of 8.5 GBdiscs with a storage capacity of 8.5 GB • Double-sided disc standard supports 9.4 GB Double-sided disc standard supports 9.4 GB

when writing to one side or 17 GB total when when writing to one side or 17 GB total when writing to both sideswriting to both sides

CD-ROM and CD-ROM and DVD MaintenanceDVD Maintenance

Keep the drives closed when they are not in Keep the drives closed when they are not in use and check all media for foreign matter use and check all media for foreign matter before inserting into the drivebefore inserting into the drive

CD-ROMs and DVDs should be handled only CD-ROMs and DVDs should be handled only by the edgesby the edges

Avoid scratching the disc surface Avoid scratching the disc surface Never directly touch or try to manually Never directly touch or try to manually

clean the laser clean the laser Brush away and vacuum accumulated dust Brush away and vacuum accumulated dust Manually eject a stuck disc by inserting a Manually eject a stuck disc by inserting a

wire into the small hole on the face of the wire into the small hole on the face of the drive, then pressing hard until the disc is drive, then pressing hard until the disc is ejectedejected

Software LicensingSoftware Licensing

When you purchase software, you are When you purchase software, you are purchasing the right to use the software under purchasing the right to use the software under certain restrictionscertain restrictions

These restrictions are outlined in the license These restrictions are outlined in the license agreementagreement

When you load software, the license agreement When you load software, the license agreement typically displays during the installation processtypically displays during the installation process

You must indicate that you have read and You must indicate that you have read and understood the agreement before the understood the agreement before the installation procedure will allow you to continue installation procedure will allow you to continue

Software Licensing Software Licensing (cont’d)(cont’d)

Apart from legal consequences, using Apart from legal consequences, using unlicensed software can also mean:unlicensed software can also mean:• No documentationNo documentation • No warrantiesNo warranties • No technical product supportNo technical product support • Greater exposure to software viruses, Greater exposure to software viruses,

corrupt disks, or otherwise defective corrupt disks, or otherwise defective softwaresoftware

• Ineligibility for software upgradesIneligibility for software upgrades

Partitions and Partitions and Logical DrivesLogical Drives

When installing an operating system on a When installing an operating system on a new computer or after recovering from a new computer or after recovering from a hard disk failure, prepare the hard disk for hard disk failure, prepare the hard disk for use by:use by:• Partitioning the hard diskPartitioning the hard disk • Creating logical drivesCreating logical drives • Formatting logical drivesFormatting logical drives

Disk PartitioningDisk Partitioning

Partition disks to Partition disks to divide total divide total storage spacestorage space

Primary partition Primary partition — the system’s — the system’s boot drive, used boot drive, used for system for system startupstartup

Extended Extended partition — the partition — the remaining drive remaining drive space after you space after you create the create the primary partitionprimary partition

Logical Disk DrivesLogical Disk Drives

A disk partition must A disk partition must be assigned a logical be assigned a logical drive identifier drive identifier

A primary partition A primary partition is treated as a single is treated as a single logical drivelogical drive

An extended An extended partition can be partition can be divided into multiple divided into multiple logical drives (drives logical drives (drives D and E in figure)D and E in figure)

Logical Drive FormatLogical Drive Format

Low-level format:Low-level format:• Prepares the hard disk before disk partitions Prepares the hard disk before disk partitions

can be definedcan be defined• Primarily Primarily the responsibility of the hard disk the responsibility of the hard disk

manufacturer manufacturer High-level format:High-level format:

• Logical drive formatting that prepares the Logical drive formatting that prepares the drive for use by the operating systemdrive for use by the operating system

• Creates the file system root directory and the Creates the file system root directory and the files used to track disk space usefiles used to track disk space use

File System TypesFile System Types

Primary partitions and logical drives must be Primary partitions and logical drives must be formatted so the operating system can use themformatted so the operating system can use them

Formatting creates the file system by adding Formatting creates the file system by adding information about how files should be stored on information about how files should be stored on the drive to organize and manage disk storagethe drive to organize and manage disk storage

File system types include:File system types include:• FAT, FAT32 and NTFS (Windows)FAT, FAT32 and NTFS (Windows)• Ext3 and ReiserFS (Linux)Ext3 and ReiserFS (Linux)

File and File and Directory PermissionsDirectory Permissions

NTFS allows you to set permission bits on NTFS allows you to set permission bits on system resourcessystem resources

In NTFS, you can protect files so that only In NTFS, you can protect files so that only certain users or groups of users can read certain users or groups of users can read them them

Concerns:Concerns:• If permissions are applied improperly, If permissions are applied improperly,

users may take security for granted users may take security for granted • Improperly set permissions can disrupt Improperly set permissions can disrupt

an operating system an operating system

Convert UtilityConvert Utility

Information about the files on an NTFS volume Information about the files on an NTFS volume and their attributes is stored in the MFTand their attributes is stored in the MFT

Convert utility — used to convert a partition or Convert utility — used to convert a partition or logical drive from FAT or FAT32 to NTFS logical drive from FAT or FAT32 to NTFS

convert convert drivedrive /FS:NTFS [/v] /FS:NTFS [/v]

Disk Defragmenter UtilityDisk Defragmenter Utility

As files are created and deleted, a partition can As files are created and deleted, a partition can become severely fragmentedbecome severely fragmented

Fragmented files are no longer located in Fragmented files are no longer located in contiguous clusterscontiguous clusters

You can use the Disk Defragmenter utility to You can use the Disk Defragmenter utility to defragment hard disks and put files back together defragment hard disks and put files back together in a contiguous formatin a contiguous format

Chkdsk UtilityChkdsk Utility

You can use the Chkdsk utility in Windows You can use the Chkdsk utility in Windows NT/2000/XP to:NT/2000/XP to:• Create and display a status report for a disk Create and display a status report for a disk

based on its file system based on its file system • List and correct errors on the disk List and correct errors on the disk • Display the status of the disk in the current Display the status of the disk in the current

drive drive

Disk Cleanup UtilityDisk Cleanup Utility

Use the Disk Cleanup utility to recover the disk Use the Disk Cleanup utility to recover the disk space used by:space used by:• Temporary filesTemporary files• Unused applicationsUnused applications• Files in the Recycle BinFiles in the Recycle Bin• Files you downloaded as part of Web pagesFiles you downloaded as part of Web pages• Files created when Chkdsk attempted to Files created when Chkdsk attempted to

recover lost file fragmentsrecover lost file fragments

Backup and Backup and Restore UtilitiesRestore Utilities

Keep a current backup of all data files to Keep a current backup of all data files to ensure that data can be recovered if a hard ensure that data can be recovered if a hard drive failsdrive fails

When you back up data, you store copies of When you back up data, you store copies of folders and files to a source other than your folders and files to a source other than your computer's hard disk computer's hard disk

You restore data when you need to access You restore data when you need to access the backed up datathe backed up data

Troubleshooting SoftwareTroubleshooting Software

Software troubleshooting refers to anything other Software troubleshooting refers to anything other than problems caused by system hardwarethan problems caused by system hardware

Software problems can be caused by:Software problems can be caused by:• BugsBugs• Corrupted filesCorrupted files• IncompatibilitiesIncompatibilities• Virus infectionsVirus infections

Operating System Operating System Boot ProblemsBoot Problems

Error: No operating systemError: No operating system Operating system files missingOperating system files missing Hard disk or controller failureHard disk or controller failure Startup failureStartup failure

Blue Screen Blue Screen of Death (BSOD)of Death (BSOD)

Blue screen that indicates that a critical Blue screen that indicates that a critical operating system failure has occurred operating system failure has occurred during startupduring startup

To troubleshoot:To troubleshoot:• Restart the system in Safe mode and use Restart the system in Safe mode and use

the Last Known Good Configuration the Last Known Good Configuration optionoption

• Reinstall the operating systemReinstall the operating system• Attempt to diagnose the problem by Attempt to diagnose the problem by

parsing the dump fileparsing the dump file

System LockupSystem Lockup

Lockup causes:Lockup causes:• Applications that are incompatible with the Applications that are incompatible with the

operating system or with a hardware operating system or with a hardware componentcomponent

• IRQ conflictsIRQ conflicts• Related problems that you may be able to find Related problems that you may be able to find

in the system log filein the system log file Power down your system by manually pressing Power down your system by manually pressing

the power key continually for five secondsthe power key continually for five seconds

Application FailuresApplication Failures

Application failure causes:Application failure causes:• Low system RAMLow system RAM• Current logon environment may have crashedCurrent logon environment may have crashed• Improper permissionsImproper permissions• Improper system resolution or color levelsImproper system resolution or color levels

View the system logView the system log• Windows Event ViewerWindows Event Viewer• UNIX/Linux “messages”UNIX/Linux “messages”

Application Failures Application Failures (cont’d)(cont’d)

Windows protection error causes:Windows protection error causes:• Device drivers that may not be written Device drivers that may not be written

specifically for your operating systemspecifically for your operating system• Applications or utilities that attempt to bypass Applications or utilities that attempt to bypass

the operating system and directly access local the operating system and directly access local system hardwaresystem hardware

Dr. Watson — Windows application debug Dr. Watson — Windows application debug program that creates a system error reportprogram that creates a system error report

Application Failures Application Failures (cont’d)(cont’d)

Application installation and loading failures:Application installation and loading failures:• Application will not load into memoryApplication will not load into memory• Application can cause an illegal operation, Application can cause an illegal operation,

resulting in the blue screen of deathresulting in the blue screen of death• Application may not install at allApplication may not install at all

Remote Management Remote Management and Troubleshootingand Troubleshooting

Telnet — TCP/IP command that Telnet — TCP/IP command that establishes establishes a remote connection with a servera remote connection with a server

SSH — SSH — protocol and command interface protocol and command interface that can gain secure access to a remote that can gain secure access to a remote computercomputer

VNC — program that controls a remote VNC — program that controls a remote computercomputer• VNC consists of two components:VNC consists of two components:

A server that listens to a specific portA server that listens to a specific port The viewer, which shows the remote The viewer, which shows the remote

system’s logon environment system’s logon environment

Remote Management Remote Management and Troubleshooting and Troubleshooting (cont’d)(cont’d)

Remote Desktop — Remote Desktop — Windows XP service Windows XP service used to gain access to a Windows session used to gain access to a Windows session that is running on another computerthat is running on another computer• Allows Allows multiple users to have active multiple users to have active

sessions on a single computersessions on a single computer • Allows you to switch from one user to Allows you to switch from one user to

another on the same computeranother on the same computer Remote Assistance — Remote Assistance — Windows XP service Windows XP service

used to seek help from a remote userused to seek help from a remote user