Network Technology
Foundations
© 2004 ProsoftTraining
All Rights Reserved
Lesson 4:
Hardware and
Operating System
Maintenance
Objectives









Identify the characteristics of motherboards
Identify common IRQ, I/O address and DMA settings
Identify IDE/ATA, EIDE/ATA-2, SATA and SCSI traits
Identify NICs and common peripheral ports
Identify the characteristics of CD-ROMs and DVDs
Describe the characteristics of file system types
Describe the uses of file system management tools
Identify and suggest corrective measures for
operating system boot problems and application
failures
Identify methods to remotely manage and
troubleshoot workstations
Basic Hardware
and System Maintenance



Fix hardware problems by ensuring:
• Components are plugged in
• Components are turned on
• Components are connected properly in
order to operate (such as connecting the
keyboard to the computer)
Periodically clean hardware components
Establish a preventive maintenance plan
Motherboard





Main circuit board in a computer
Must be securely fastened to system chassis
Should never touch anything metal, except
through proper connections
Most motherboard components are soldered on
and no longer replaceable
If components fail (except for memory and the
microprocessor), the entire motherboard needs
to be replaced
IRQs, I/O Addresses and DMA



IRQs — hardware lines used to identify
when a device wants to communicate with
the processor
• Example: When a printer has finished
printing, it sends an interrupt signal to
the computer so the computer can
decide what to process next
I/O address — memory location that allows
the system processor and system devices
to communicate
DMA — allows a device to access system
memory directly, bypassing the processor
Mass Storage
Device Interfaces


To communicate with a motherboard, mass
storage devices need to be connected to
the motherboard through an interface
Three most common interfaces are:
• IDE
• EIDE
• SCSI
IDE/EIDE



IDE is also known as Advanced Technology
Attachment (ATA)
EIDE (ATA-2) is an enhanced version of IDE that
provides higher drive capacities
IDE/EIDE interface cables are long, thin and gray
in appearance
Serial ATA (SATA)


SATA provides faster speeds than standard ATA
SATA devices are connected using a cable that
somewhat resembles a small Category 5 Ethernet
cable
Small Computer
System Interface (SCSI)




With SCSI, multiple devices can be
connected to a single controller in a daisy
chain configuration
You can attach as many as 127 internal or
external SCSI devices to a single controller
SCSI devices include hard disk drives,
floppy disk drives, printers, scanners and
tape drives
SCSI daisy chain must be terminated at
both ends and only at the ends
Resolving
Device ID Conflicts


LUN conflicts are a common cause of
difficulty when installing a SCSI device
All SCSI device numbers and LUNs must be
unique
Network Interface Card




Each network device must have a network
interface card (or network adapter card)
The network adapter makes the physical
connection between the device and the network
cabling
The network adapter converts the data from
the computer into a format appropriate for
transmission over the network
Transceiver — the network adapter component
that handles data transmission
Common Peripheral Ports
Common Peripheral Ports (cont’d)



PS/2-style ports are for the mouse and keyboard
Serial ports:
• Communicate using serial asynchronous
communication
• Are used for serial communication devices
Parallel ports:
• Communicate using parallel communication
• Are used for parallel communication devices
Common Peripheral Ports (cont’d)


USB ports:
• Support asynchronous and isochronous
transmissions for data transfer
• Communicate using serial communication
• Support as many as 127 peripheral devices in
a daisy chain configuration
FireWire (IEEE 1394):
• A high-speed serial interface to which you can
daisy chain as many as 63 peripheral devices
• Good for devices that need to transfer large
amounts of data
Power Requirements



Electricity is measured according to different
standards in North America and Europe
Computing and networking equipment is also
manufactured to different standards
When traveling from North America to Europe,
you will need:
• A special plug adapter
• A power inverter
CD-ROM



CD-ROM — an optical storage device from which
data can be read only
CD-ROM drives use common mass storage
interfaces
Writable CD-ROM devices allow you to create, or
"burn," your own data and audio CDs
• CD-R (CD-recordable) — write data once
• CD-RW (CD-rewritable) — write data multiple
times
DVD


DVD — optical storage device from which data
can be read only
DVDs are similar to CD-ROMs but have higher
storage capacity
• Initial DVD standard provided 4.7 GB of
storage capacity
• Current DVD standards support dual-layer
discs with a storage capacity of 8.5 GB
• Double-sided disc standard supports 9.4 GB
when writing to one side or 17 GB total when
writing to both sides
CD-ROM and
DVD Maintenance






Keep the drives closed when they are not in
use and check all media for foreign matter
before inserting into the drive
CD-ROMs and DVDs should be handled only
by the edges
Avoid scratching the disc surface
Never directly touch or try to manually
clean the laser
Brush away and vacuum accumulated dust
Manually eject a stuck disc by inserting a
wire into the small hole on the face of the
drive, then pressing hard until the disc is
ejected
Software Licensing




When you purchase software, you are
purchasing the right to use the software under
certain restrictions
These restrictions are outlined in the license
agreement
When you load software, the license agreement
typically displays during the installation process
You must indicate that you have read and
understood the agreement before the
installation procedure will allow you to continue
Software Licensing (cont’d)

Apart from legal consequences, using
unlicensed software can also mean:
• No documentation
• No warranties
• No technical product support
• Greater exposure to software viruses,
corrupt disks, or otherwise defective
software
• Ineligibility for software upgrades
Partitions and
Logical Drives

When installing an operating system on a
new computer or after recovering from a
hard disk failure, prepare the hard disk for
use by:
• Partitioning the hard disk
• Creating logical drives
• Formatting logical drives
Disk Partitioning



Partition disks to
divide total
storage space
Primary partition
— the system’s
boot drive, used
for system
startup
Extended
partition — the
remaining drive
space after you
create the
primary partition
Logical Disk Drives


A disk partition
must be
assigned a
logical drive
identifier
A primary
partition is
treated as a
single logical
drive
Logical Drive Format


Low-level format:
• Prepares the hard disk before disk partitions
can be defined
• Primarily the responsibility of the hard disk
manufacturer
High-level format:
• Logical drive formatting that prepares the
drive for use by the operating system
• Creates the file system root directory and
the files used to track disk space use
File System Types



Primary partitions and logical drives must be
formatted so the operating system can use them
Formatting creates the file system by adding
information about how files should be stored on
the drive to organize and manage disk storage
File system types include:
• FAT, FAT32 and NTFS (Windows)
• Ext3 and ReiserFS (Linux)
File and
Directory Permissions



NTFS allows you to set permission bits on
system resources
In NTFS, you can protect files so that only
certain users or groups of users can read
them
Concerns:
• If permissions are applied improperly,
users may take security for granted
• Improperly set permissions can disrupt
an operating system
Convert Utility


Information about the files on an NTFS volume
and their attributes is stored in the MFT
Convert utility — used to convert a partition or
logical drive from FAT or FAT32 to NTFS
convert drive /FS:NTFS [/v]
Disk Defragmenter Utility



As files are created and deleted, a partition can
become severely fragmented
Fragmented files are no longer located in
contiguous clusters
You can use the Disk Defragmenter utility to
defragment hard disks and put files back together
in a contiguous format
Chkdsk Utility

You can use the Chkdsk utility in Windows
NT/2000/XP to:
• Create and display a status report for a disk
based on its file system
• List and correct errors on the disk
• Display the status of the disk in the current
drive
Disk Cleanup Utility
Use the Disk Cleanup utility to recover the disk
space used by:
• Temporary files
• Unused applications
• Files in the Recycle Bin
• Files you downloaded as part of Web pages
• Files created when Chkdsk attempted to
recover lost file fragments
Backup and
Restore Utilities



Keep a current backup of all data files to
ensure that data can be recovered if a hard
drive fails
When you back up data, you store copies of
folders and files to a source other than your
computer's hard disk
You restore data when you need to access
the backed up data
Troubleshooting Software


Software troubleshooting refers to anything other
than problems caused by system hardware
Software problems can be caused by:
• Bugs
• Corrupted files
• Incompatibilities
• Virus infections
Operating System
Boot Problems




Error: No operating system
Operating system files missing
Hard disk or controller failure
Startup failure
Blue Screen
of Death (BSOD)


Blue screen that indicates that a critical
operating system failure has occurred
during startup
To troubleshoot:
• Restart the system in Safe mode and use
the Last Known Good Configuration
option
• Reinstall the operating system
• Attempt to diagnose the problem by
parsing the dump file
System Lockup


Lockup causes:
• Applications that are incompatible with the
operating system or with a hardware
component
• IRQ conflicts
• Related problems that you may be able to find
in the system log file
Power down your system by manually pressing
the power key continually for five seconds
Application Failures


Application failure causes:
• Low system RAM
• Current logon environment may have crashed
• Improper permissions
• Improper system resolution or color levels
View the system log
• Windows Event Viewer
• UNIX/Linux “messages”
Application Failures (cont’d)


Windows protection error causes:
• Device drivers that may not be written
specifically for your operating system
• Applications or utilities that attempt to bypass
the operating system and directly access local
system hardware
Dr. Watson — Windows application debug
program that creates a system error report
Application Failures (cont’d)

Application installation and loading failures:
• Application will not load into memory
• Application can cause an illegal operation,
resulting in the blue screen of death
• Application may not install at all
Remote Management
and Troubleshooting



Telnet — TCP/IP command that establishes
a remote connection with a server
SSH — protocol and command interface
that can gain secure access to a remote
computer
VNC — program that controls a remote
computer
• VNC consists of two components:
 A server that listens to a specific port
 The viewer, which shows the remote
system’s logon environment
Remote Management
and Troubleshooting (cont’d)


Remote Desktop — Windows XP service
used to gain access to a Windows session
that is running on another computer
• Allows multiple users to have active
sessions on a single computer
• Allows you to switch from one user to
another on the same computer
Remote Assistance — Windows XP service
used to seek help from a remote user