Contents 1. Mobile Devices ................................................................................................................... 3 2. Networking ......................................................................................................................... 5 2.1 Ports and Protocols .......................................................................................................... 5 2.2 Network Devices ............................................................................................................ 16 2.3 SOHO Networks (Small Office Home Office) .............................................................. 27 2.4 Wireless Networks ......................................................................................................... 37 2.5 Network Services ........................................................................................................... 49 2.6 Network Configurations................................................................................................. 57 2.7 Internet Connections ...................................................................................................... 70 2.8 Network Tools ............................................................................................................... 78 3. Hardware .......................................................................................................................... 85 3.1 Cables and Adapters ...................................................................................................... 85 3.2 Connectors ................................................................................................................... 113 3.3 Memory ........................................................................................................................ 122 3.4 Storage ......................................................................................................................... 131 3.5 Motherboards, CPUs, and Add-on Cards .................................................................... 142 3.6 Peripherals.................................................................................................................... 183 3.7 Power ........................................................................................................................... 193 3.8 Custom PCs.................................................................................................................. 198 3.9 Common Devices ......................................................................................................... 203 3.10 SOHO Multifunction Devices.................................................................................... 207 3.11 Print Technologies ..................................................................................................... 212 4. Virtualization and Cloud Computing ............................................................................. 231 4.1 Cloud Computing ......................................................................................................... 231 4.2 Client-side Virtualization ............................................................................................. 240 5. Hardware and Network Troubleshooting ....................................................................... 245 5.1 Troubleshooting ........................................................................................................... 245 5.2 Troubleshooting Computer Hardware ......................................................................... 251 5.3 Troubleshooting Hard Drives ...................................................................................... 262 5.4 Troubleshooting Video and Display Issues ................................................................. 267 5.5 Troubleshooting Mobile Devices and Laptops ............................................................ 270 5.6 Troubleshooting Printers .............................................................................................. 281 5.7 Troubleshooting Networks........................................................................................... 286 1. Mobile Devices PRL – Preferred Roaming List Allows your phone to connect to the right tower Updates Over the Air (OTA) PRI – Product Release Instructions Radio Settings such as ID numbers, network codes, country codes Updates Over the Air (OTA) IMEI – International Mobile Station Equipment Identity Identifies a physical mobile device IMSI – International Mobile Subscriber Identity Identifies the user of a mobile network (SIM Card) Configuring Email on Mobile Devices POP3 – Post Office Protocol 3 Used for downloading and deleting mail from ISP server Name of POP3 Server, Username and Password Defined by mail provider, Port: tcp/110 POP3S for SSL (Secure Socket Layer) encryption, Port: tcp/995 IMAP – Internet Message Access Protocol Access mail on ISP central server Mail is usually stored on the server Supports folders and server-side searching Name of IMAP4 server, Username and Password Defined by mail provider, Port: tcp/143 IMAPS for SSL (Secure Socket Layer) encryption, Port: tcp/993 SMTP – Simple Mail Transfer Protocol Used for sending mail from a device to a mail server or between mail servers Usually, must send from a local or trusted device Authentication usually required, but may be different credentials than the incoming mail SMTP that required no authentication, relatively unused, Port: tcp/25 SMTP with authentication, Port: tcp/587 Microsoft Exchange Other than email, can also use for contacts, calendars, reminders Email, server, domain, username and password There is an integrated message encryption - S/MIME (Secure/Multipurpose Internet Mail Extensions) - Encrypt and digitally sign 2. Networking 2.1 Ports and Protocols IP – Internet Protocol Efficiently move large amounts of data from one IP address to another IP address Runs through network Ethernet, DSL, Cable systems Encapsulated by the IP is the TCP (Transmission Control Protocol) or UDP (User Datagram Protocol), occurs at OSI Layer 4 (Transport) Multiplexing is the ability to use many different applications at the same time over the same connection with TCP and UDP Ethernet Frame (Example for HTTP application data that is being sent to a web server): TCP – Transmission Control Protocol Connection-oriented A formal connection to setup the connection and close the connection It is a “reliable” delivery - Recovery from errors - Manage out-of-order messages or retransmissions When TCP data is being transmitted from point A to point B, there will always be an acknowledgement from point B that the data is received If there is no acknowledgement from point B, the data will be retransmitted from point A Flow Control - The receiver can manage how much data is sent UDP – User Datagram Protocol Connectionless as there is no formal open or close to the connection - Data is just simply being sent from point A to point B “Unreliable” delivery - No error recovery - No reordering of data or retransmission as there is no acknowledgement No flow control - Sender determines the amount of data transmitted IPv4 Sockets Server IP address, protocols, server application port number Client IP address, protocols, client port number Non-ephemeral ports (permanent port numbers) Usually are Ports 0 to 1,023 Usually on a server/service Ephemeral ports (temporary port numbers) For server to communicate back to the client Usually are Ports 1,024 to 65,535 Determined in real-time by the client Only for that particular session Most servers (services) use non-ephemeral (permanent) port numbers, but that is not always the case Port numbers are for communication so that clients and servers know where to send the data, not security Service port numbers needs to be “well known” for the client side For example: tcp/80 for web servers Ports on the network example: - Web server – tcp/80 - VoIP server – udp/5004 - Email server – tcp/143 - The source port which is the client’s port is randomly chosen for that session so that the server knows where to communicate back to the client for the particular service Common Network Ports FTP – File Transfer Protocol - tcp/20 (active mode data) - tcp/21 (control) - Transfers files between systems - Has security built in, and able to configure and authenticate with username and password o Some systems support a generic/anonymous login, with any password - Full-featured functionality such as list, add and delete etc SSH – Secure Shell - tcp/22 - Encrypted communication link - Login to devices remotely - Console access Telnet – Telecommunication Network - tcp/23 - Some older equipment only supports Telnet and not SSH - Same usage as SSH - Not encrypted, in-the-clear communication - Not the best choice for production systems as it is not encrypted SMTP- Simple Mail Transfer Protocol - tcp/25 - Server to server email transfer - Also used to send mail from a device to mail server o Configured on mobile devices and email - If you are receiving email, probably using IMAP4 or POP3 DNS – Domain Name System - udp/53 - Converts domain names to IP address - As they are very critical resources, multiple DNS servers are in production HTTP and HTTPS – Hypertext Transfer Protocol / Hypertext Transfer Protocol Secure - HTTP – tcp/80 - HTTPS – tcp/443 - Web server communication in the browser and by other applications - HTTP is in-the-clear communication, while HTTPS is encrypted POP3 – Post Office Protocol version 3 - tcp/110 - For receiving emails from an email server - Basic mail transfer functionality IMAP4 – Internet Message Access Protocol version 4 - tcp/143 - Includes management of email inbox from multiple clients RDP – Remote Desktop Protocol - tcp/3389 - Remote desktop services on many windows versions - Can connect to an entire desktop or just an application SMB – Server Message Block - Protocol used by Microsoft Windows o File Sharing, printer sharing o Also called CIFS (Common Internet File System) - Modern Windows direct communication over tcp/445 (NetBIOS-less) o Direct SMB communication over TCP without the NetBIOS transport - Older Windows uses NetBIOS over TCP/IP o udp/137 – NetBIOS name services (nbname) o udp/138 – NetBIOS datagram services (nbdatagram) o tcp/139 – NetBIOS session services (nbsession) AFP – Apple Filling Protocol - tcp/548 - File services in macOS - Works with SLP (Service Location Protocol) o tcp/427 and udp/427 - File management like copy, move and delete files DHCP – Dynamic Host Configuration Protocol - udp/67 and udp/68 - Automated configuration of IP address, subnet mask and other options - Requires a DHCP server o Server, appliance, integrated into a SOHO router etc - Dynamic / pooled o IP address are assigned in real-time from a pool o Each system is given a lease and must renew at set intervals - DHCP reservation o Addresses are assigned by MAC addresses in the DHCP server, and assign the same IP address to that MAC address every time o Quickly manage addresses from one location LDAP – Lightweight Directory Access Protocol - tcp/389 - Store and retrieve information like username and passwords in a centralised network directory/database to provide authentications o Commonly used in Microsoft Active Directory SNMP – Simple Network Management Protocol - Queries: udp/161 - Traps: udp/162 - Gather statistics from many network devices for network administrators - Version 1 – the original o Structured tables (1 query at a time) o In-the-clear communication (not encrypted) - Version 2 – A good step ahead o Data type enhancements o Bulk transfers (can query about many stuff) o Still in-the-clear communication (not encrypted) - Version 3 – A secure standard (commonly used) o Message integrity o Authentication o Encryption 2.2 Network Devices NIC – Network Interface Card The fundamental network device Every device that needs a network connection has a NIC Specific to network type - Ethernet, WAN, wireless, etc Often built-in to the motherboard or as an expansion card Many options such as single port, multi-port, copper, fiber Repeater Receive signal, regenerate, and resend it out - No forwarding decisions to make Common use - Boost copper or fiber connections - Convert one network media to another - Extend wireless network reach Hubs “Multi-port repeater” Traffic going in one port is repeated to every other port Everything is half-duplex - Two devices cannot communicate at the same time. - Once one of the devices is done sending information, another device can then begin sending information Becomes less efficient as network speeds increase/or more devices connected 10 megabit / 100 megabit Difficult to find today as it is too slow as more devices are connected to the network Bridge Connect the hub networks together using bridges - Can connect to different physical networks and topologies - Gets around physical network size limitations / collisions Make decisions on what traffic should be forwarded through the bridge based on the destination MAC addresses that is inside the ethernet frame Imagine a switch with 2 to 4 ports Distributes traffic based on MAC addresses Makes forwarding decisions in software An example of a modern bridge is a wireless access point (WAP) - Where on one side you have your wireless network, and it is connected to the ethernet wired network on the other side - The wireless access point is deciding based on the destination MAC address of the traffic it receives, and deciding whether it should forward it to the wireless network or the ethernet wired network Switches Bridging done in hardware - Hardware is ASIC – Application-Specific Integrated Circuit - Forwards traffic based on data link address (MAC address) Many ports and features - The core of an enterprise network - May provide Power over Ethernet (PoE) Multilayer switch / Layer 3 switches - Includes both switching and routing functionality within the same device o Routing functionality is making forwarding decisions based on destination IP address Unmanaged Switches Very few configuration options, plug and play Fixed configuration No VLANs (Virtual Local Area Network) Very little integration with other devices - No management protocols o If you want the switch to communicate back and forth to a management station via SNMP (Simple Network Management Protocol), you wouldn’t use this switch Low price point, simple is less expensive Managed Switches VLAN (Virtual Local Area Network) support Traffic prioritization Interconnect with other switches via 802.1Q E.G. Voice traffic gets a higher priority Redundancy support - Spanning Tree Protocol (STP) External Management SNMP – Simple Network Management Protocol Port mirroring for troubleshooting on the switch - Can connect a network analyser to one of the ports on the switch and capture packets from any other port on the switch to watch the traffic flow across the network Routers Routes traffic between IP subnets - Makes forwarding decisions based on IP address - Routers inside of switches are referred to as multilayer switches / “layer 3 switches” Often connects diverse network types - LAN, WAN, copper, fiber WAP – Wireless Access Point Not a wireless router A wireless router is a router and a WAP in a single device WAP is a bridge, and it extends the wired network onto the wireless network, and makes decisions based on MAC addresses Wireless LAN Controllers Centralized management of WAPs - Commonly used in large organisations to manage access points throughout the building. E.G university building with large number of WAPs - Allows a single “pane of glass”, which is a central management console that presents data from multiple sources in a unified display Management functions - Deploy new access points - Performance and security monitoring - Configure and deploy changes to all sites - Report on access point use Usually a proprietary system - If you are using a CISCO access point, you will probably be using a CISCO wireless LAN controller The wireless controller is paired with the access points Can also be cloud-based - Connect to the cloud-based controller and manage the console from anywhere Firewalls Filters traffic by port number - OSI Layer 4 filtering (TCP/UDP) o Some firewalls can filter based on the application Can encrypt traffic into/out of the network Protect your traffic between sites Some older firewalls can proxy traffic - A common security technique - They sit in the middle of the communication. o If you want to surf the website, you would send that request to the firewall, the proxy firewall will then make the request for you, receive the response, check through the response to make sure its appropriate for you to view, then send the traffic to you Most firewalls can be layer 3 devices (routers) - Usually sits on the ingress/egress of the network Cable Modem Broadband - Transmission across multiple frequencies - Different traffic types Data on the “cable” network - DOCSIS – Data Over Cable Service Interface Specification - Coaxial Cabling, shared bandwidth High-speed networking - 4 Mbits/s through 250Mbits/s are common - Gigabit speeds are possible Multiple services - Data for our internet connection, voice for telephone communication, and video for cable television DSL Modem ADSL – Asymmetric Digital Subscriber Line - Uses telephone lines instead of cable for cable television - Twisted-pair copper cabling, dedicated bandwidth Download speed is faster than the upload speed (Asymmetric) - ~10,000 foot distance limitation from the telephone company’s central office (CO) - 52 Mbit/s downstream, 16 Mbit/s upstream are common - Faster speeds may be possible if closer to CO Cable Infrastructure in an Office Patch Panels Combination of punch-down blocks and RJ-45 connectors Runs from desks are made once Permanently punched down to the patch panels Patch panel to switch can be easily changed - No special tools - Use existing cables Power over Ethernet (PoE) Power provided on an Ethernet cable - One wire for both network and electricity - For phones, cameras, wireless access points (WAPs) - Useful in difficult-to-power areas Power provided at the switch Switch does not provide power Built-in power – Endspans Connect a device in the middle, In-line power injector – Midspans Commonly marked on the switch or interfaces with PoE Ethernet over Power (EoP) Also called PLC – Power-Line Communication - IEEE standard 1901 500 Mbits/s Standard includes links to the premise, intra-building networking, vehicles, smart energy devices, etc 2.3 SOHO Networks (Small Office Home Office) The SOHO Router An all-in-one device - Modem - Router - Switch - Wireless Access Point (WAP) - Firewall, etc Routing and Switching Routing to the outside world Switching for local devices - WAN / DSL port One VLAN / LAN1, LAN2, LAN3, LAN4, etc Not much to configure - Routes and switches by default Access Points Settings Enable or disable frequencies - 2.4 GHz and/or 5 GHz - Available options will depend on the wireless standard used Configure SSID - May need a separate SSID for each frequency Security mode - WPA2 encryption preferred - Pre-shared key or Enterprise where everyone will have their own username and password to access the wireless network Channel / Channel bandwidth - Automatic / other nearby networks IP Addressing WAN interface - Automatically assigned via DHCP from the ISP - May require authentication into the router’s configuration before its able to be used on the network LAN interface - The SOHO router acts as its own DHCP server for the LAN - Internal IP address and subnet mask of the router is automatically assigned by the router through DHCP - DHCP address range for other devices - DNS server addresses, if not configured will use the same DNS configuration as the WAN NIC Configuration Wired - May not have many options to configure - Ports configured for auto speed and duplex - Speed: 10 / 100 / 1000 Mbit/s - Duplex: Half / Full Wireless - Enable / Disable wireless adapter - Find the network SSID - Key in password to access the wireless network End-user Device Configuration Automatic - Auto speed and duplex - DHCP Addressing End-user device configures based on router - IP address - Subnet mask - Default gateway - DNS servers IoT (Internet of Things) Configurations Internet of Things - Home Automation, mostly wireless through 802.11, which security is an issue Devices: - Thermostat - Light switches - Security cameras, Door locks - Voice-enabled smart speakers / digital assistants Almost all devices communicate outbound - No special port mapping / NAT (Network Address Translation) configurations required - Connect to a central server to gain access to these devices Firewall and DMZ Ports Every SOHO router is also a firewall - No external device can directly access the internal network - This normally can’t be disabled Some firewall in SOHO routers allow DMZ ports to be configured and allow unrestricted access - Consider creating more specific port forwarding rules, or don’t allow DMZ ports at all as it is generally a bad idea NAT – Network Address Translation IPv4 supports around 4.29 billion addresses, but there are over 20 billion devices connected to the internet around the world and growing at a rapid speed The address space for IPv4 is exhausted, meaning there are no more available addresses to assign to individuals This is where NAT come into play, however, this is not the only use of NAT NAT is an always-on functionality that is inside the SOHO router Configuring NAT For SOHO devices, this is automatic - Source NAT, also called PAT – Port Address Translation - All internal devices are translated to a single external address, and to the internet it all looks like 1 device Port Forwarding Also called Destination NAT or Static NAT - Destination address from the inbound traffic is translated from a public IP to a private IP - Does not expire or timeout, so anyone who accesses that IP address and port number externally will always have access to that particular server on the internal network External IP/port number translates to an internal IP/port 24x7 access to a service hosted internally Does not have to be the same port number Web server, gaming server, security system, etc This allows your internal device to be available externally UPnP – Universal Plug and Play Allows network devices to automatically configure settings on the SOHO router and find other network devices Sometimes also known as “Zero-configuration” Applications on the internal network can open inbound ports using UPnP - Instead of manually creating port forwarding rules, applications can communicate directly to the SOHO router to enable or disable the access for certain port numbers - Ports are only open when using that particular application, and when those particular applications are closed, those particular ports are disabled on the router - Security concern as we do not have direct control over when certain ports are open or closed - No approval needed - Used for many peer-to-peer (P2P) applications Best practice would be to disable UPnP, and have all of your configurations done manually through port forwarding Whitelist / Blacklist Content filtering and/or IP address ranges Whitelisting - Nothing passes through the firewall unless its approved - Very restrictive Blacklisting - Nothing on the blacklist is allowed - Specific URLs - Domains - IP addresses MAC Filtering Media Access Control address (MAC address) The “hardware” address Limit access through the physical hardware address (MAC Address) - Keeps the neighbours out - Additional administration with visitors as you would have to add the MAC addresses of your visitors so that they can gain access to your network Easy to find working MAC addresses through LAN analysis - MAC addresses can then be spoofed to gain access to the network - Free open-source software Not a good security, basically none at all (Security through obscurity) Wireless Channels and Encryption Configure for the highest encryption possible - WPA2-AES (Advanced Encryption Standard) is the best option - Choose WPA2 over WPA (Wireless Protected Access) - Older wireless routers might have WEP (Wired Equivalent Privacy), but it is not a safe option as it has quite a number of vulnerabilities Check your devices if you have more than one wireless access point (WAP) and ensure that all of them allow the highest encryption which is WPA2-AES Use an open frequency (channel) - Make sure it’s not conflicting with other devices or WAP in your area - Some access points will automatically find good frequencies - Channels 1, 6, 11 Managing QoS (Quality of Service) Some SOHO routers allow you to change the priority of your traffic - You may want to change the VoIP priority to high, and world of warcraft to low Prioritize applications, port numbers, IP addresses, or MAC addresses Or vice-versa A feature of high-end SOHO routers Be careful as you can accidentally cause applications that needs the highest priority to slow down 2.4 Wireless Networks Wireless Standards Wireless networking (802.11) Many updates over time Managed by the IEEE LAN/MAN Standards Committee (IEEE 802) Check with IEEE for the latest updates The Wi-Fi trademark - Wi-Fi Alliance handles interoperability testing 802.11a One of the original 802.11 wireless standards Released in October 1999 Operates in the 5 GHz range - Or other frequencies with special licensing 54 Mbit/s Smaller range than 802.11b - Higher frequency is absorbed by objects in the way - Many rules-of-thumb calculate 1/3 the range of 802.11b or 802.11g Not commonly seen today 802.11b Also an original 802.11 standard - Also released in October 1999 along with 802.11a Operates in the 2.4 GHz range 11 Mbit/s Better range than 802.11a, although slower Less absorption problems More frequency conflict - As it is used in many devices like baby monitors, cordless phones, microwave ovens, Bluetooth 802.11g An “upgrade” to 802.11b - Released in June 2003 Operates in the 2.4 GHz range 54 Mbit/s - Same as 802.11a (but a little bit less throughout) Backwards-compatible with 802.11b Same frequency conflict problems as 802.11b 802.11n The update to 802.11g, 802.11b, and 802.11a - Released in October 2009 Operates at 5 GHz and/or 2.4 GHz 150 Mbit/s per stream (600 Mbit/s total) 40 MHz channel widths 40 MHz mode and 4 antennas 802.11n uses Four MIMO (Multiple-Input Multiple-Output) streams - Multiple transmit and receive antennas 802.11ac Significant improvements over 802.11n Released in January 2014 Operates in the 5 GHz band - Less crowded, more frequencies (up to 160 MHz channel bandwidth) 866.7 Mbit/s per stream (Around 6.8 Gbit/s total) Increased channel bonding Larger bandwidth usage Changed to denser signalling modulation - Faster data transfers Eight MU-MIMO (Multi-User MIMO) streams 802.11 Summary Table 802.11 Technologies Frequency 2.4 GHz or 5 GHz, and sometimes both Channels - Groups of frequencies, numbered by the IEEE - Non-overlapping channels would be necessary Bandwidth - Amount of frequency in use - 20 MHz, 40 MHz, 80 MHz, 160 MHz 802.11 Channel Bandwidths 802.11a – 20 MHz 802.11b – 22 MHz 802.11g – 20 MHz 802.11n - 20 MHz or 40 MHz (two continuous 20 MHz bonded channels) - In 2.4 GHz, a 40 MHz channel uses much of the available bandwidth 802.11ac - 40 MHz for 802.11n stations - 80 MHz by default and is required for 802.11ac stations - 160 MHz optional (contiguous channels or non-contiguous bonded) Band Selection and Bandwidth Bluetooth High speed communication over short devices PAN (Personal Area Network) Connects our mobile devices - Smartphones - Tethering and file transfers - Headsets and headphones - Health Monitors - Automobile and phone integration - Smartwatches - External Speakers RFID (Radio-Frequency Identification) It’s everywhere, anything that needs to be tracked - Access Badges - Inventory / Assembly line tracking - Pet / Animal Identification Radar Technology - Radio energy transmitted to the tag - RF powers the tag, ID is transmitted back - Bidirectional communication - Some tag formats can be already active / powered NFC – Near Field Communication Two-way wireless communication Payment systems - Major credit cards - Online wallets Bootstrap for other wireless Builds on RFID, which is mostly one-way NFC helps with Bluetooth pairing Access token, identity “card” - Short range with encryption support Zigbee Internet of Things (IoT) networking Uses the ISM band (Industrial, Scientific, and Medical) Open standard – IEEE 802.15.4 PAN 900 MHz and 2.4 GHz frequencies in the US Alternative to WiFi and Bluetooth - Longer distances than Bluetooth - Less power consumption than WiFi WMN – Wireless Mesh Network of all Zigbee devices in your home - Meaning all devices connect through Zigbee can communicate through each other, and greatly expands size of network - Light switch communicates to light bulbs - Tell Amazon Echo to lock the door Z-Wave Proprietary home automation networking - Internet of Things (IoT) - Control lights, locks, garage doors, etc Also uses the ISM band (Industrial, Scientific, and Medical) - 900 MHz frequencies in the US - No conflicts with 802.11 Also WMN – Wireless Mesh Network - Nodes can hop through other nodes on the way to the destination Cellular Networks Mobile devices Separate land into “cells” “Cell” phones Antenna coverages a cell with certain frequencies Started with 2G Networks - GSM – Global System for Mobile Communications - CDMA – Code Division Multiple Access Poor data support as it was originally built for voice communication like phone calls - Originally used circuit-switching - Minor upgrades for some packet-switching 3G Technology 3rd Generation Introduced in 1998 Upgraded data connectivity over 2G - Incremental 3G updates improved speeds - Usually several megabits per second Bandwidth improvement allowed new functionality - GPS - Mobile television - Video on demand - Video conferencing 4G and LTE LTE – Long Term Evolution - A “4G” Technology - Converged standard (GSM and CDMA providers) - Based on GSM and EDGE – Enhanced Data Rates for GSM Evolution Standard supports download rates of 150 Mbit/s LTE-A (Advanced) - Standard supports download rates of 300 Mbit/s Moving to 5G Update to 4G - Rollout in late 2018 and 2019 - Worldwide launches in 2020 Significant performance improvements - At higher frequencies - May not be as significant at lower frequencies Technology updates - Additional frequencies - Improved data transmission methods 2.5 Network Services Web Server Respond to browser requests - Using standard web browsing protocols - HTML, HTML5 Web pages are stored on the server - Once your browser on your computer request for those pages from the server, those pages will be downloaded over the network to your browser - Static pages or built dynamically in real-time when a client is requesting them File Server Centralized storage of documents, spreadsheets, videos, pictures, and any other files Standard system of file management - For Windows it would be SMB (Server Message Block), for MacOS it would be AFP (Apple Filling Protocol) The front-end hides the protocol - Use the file manage available in their operating systems, and the protocols between their computer and server handles all these transactions Print Server Connect a printer to the network May be software in a computer Computer is connected to the printer May be built-in to the printer Provide printing services for all network devices Network adapter and software Uses standard printing protocols - For Windows SMB – Server Message Block - IPP – Internet Printing Protocol - LPD – Line Printer Daemon DHCP Server Dynamic Host Configuration Protocol Automatic IP address configuration Very common service - Available on most SOHO routers Enterprise DHCP will be redundant - Usually running on central servers DNS Server Domain Name System Convert names to IP addresses and vice versa Distributed naming system - The load is balanced across many different servers Usually managed by the ISP or enterprise IT department A critical resource Proxy Server An intermediate server - Client makes the request to the proxy - The proxy performs the actual request - The proxy provides results back to the client Useful features - Access control, caching, URL filtering, content scanning Mail Server Store your incoming mail Usually managed by the ISP or the enterprise IT department Send your outgoing mail A complex set of requirements Usually one of the most important services that require 24x7 support Authentication Server Login authentication to resources Almost always an enterprise service Centralized management and repository for all of the credentials Not required on a home network Usually run on a set of redundant servers - So that its always available - Extremely important service SIEM – Security Information and Event Management Logging of security events and information in one single database Security alerts Real-time information Log aggregation (consolidating) from all devices/servers - Usually includes advanced reporting features Long term storage Data correlation Link diverse data types and across a long period of time Forensic analysis - Gather details from all devices/servers after an event Syslog Standard for message logging Diverse systems, consolidated log Usually a central logging receiver, integrated into the SIEM - As long as the device can communicate its logs back through Syslog, you can consolidate everything in this central database (SIEM) Going to need huge amount of disk space as you are storing a lot of data over a long period of time Some Syslog consolidation tools and SIEMs will use WORM (Write Once Read Many) drive technology - Protect important security logs IDS (Intrusion Detection System) and IPS (Intrusion Prevention System) Intrusions - Exploits against operating systems, applications, etc - Buffer overflows, cross-site scripting, other vulnerabilities Detection vs. Prevention - Detection – Alarm or Alert - Prevention – Stop it before it gets into the network All-in-one Security Appliance Next-generation firewall / UTM – Unified Threat Management / Web Security Gateway URL Filter / Content Inspection Malware inspection Spam Filter CSU / DSU (Channel Service Unit/Data Service Unit) - A hardware device that converts digital data frames from the communications technology used on a local area network (LAN) into frames appropriate to a wide-area network (WAN) Router, Switch Firewall IDS/IPS Bandwidth Shaper QoS (Quality of Service) Endpoint Management Server Manage all devices from “one pane of glass” - Software installations - Driver installations - Software updates - Security patches - Remote troubleshooting Require an agent installed on all of the devices - Server sends the commands - Agent executes the commands Legacy and Embedded Systems Legacy systems - May also be “really important” - Learning old things can be just as important as learning the new things Embedded Systems - Purpose-built device - Not usual to have direct access to the operating system - Alarm system, door security, timecard systems 2.6 Network Configurations IP Addressing IPv4 is the primary protocol for everything we do IPv6 is slowly appearing IPv4 Addresses Internet Protocol version 4 – 32 bits - OSI Layer 3 address (Network) Since 1 byte is 8 bits, the maximum decimal value for each byte is 255 IPv6 Addresses Internet Protocol version 6 – 128 bits - 340 undecillion addresses, which means each individual can have a HUGE number of addresses assigned to them DNS will become very important so that we can refer to devices by name rather than IP addresses First 64 bits is generally the network prefix (/64) Last 64 bits is then the host network address Networking with IPv4 IP Address, E.G. 192.168.1.165 Every device needs a unique IP address Subnet mask, E.G. 255.255.255.0 - Used by the local device to determine what subnet it’s on - The subnet mask usually isn’t transmitted across the network Default gateway, E.G. 192.168.1.1 - This is the IP address of the router that allows you to communicate outside of your local subnet - The default gateway must be an IP address on the local subnet DNS Servers (Domain Name Services) We remember names Google.com, Youtube.com Internet routers or routers in general don’t know names - Routers only know IP addresses DNS has to translate between names and IP addresses You configure TWO DNS servers in your IP configuration in case one becomes unavailable - That’s how important it is DHCP (Dynamic Host Configuration Protocol) IPv4 address configuration used to be manual - IP address, subnet mask, default gateway, DNS servers, NTP servers, etc The bootstrap protocol (BOOTP) was released in October 1993 BOOTP didn’t automatically define everything - Some manual configurations were still required - BOOTP also didn’t know when an IP address might be available again DHCP – Dynamic Host Configuration Protocol - Released in 1997, and updated through the years - Provides automatic address / IP configuration for almost all devices Step 1: Discover There is a DHCP server on the local subnet as well as a DHCP server outside of the local subnet DHCP Relay (IP Helper) is configured on the router, so that if the router ever sees any requests for DHCP, to also send them to the DHCP server that’s outside When the client work station is first turned on, it does not have an IP address, so it will send a broadcast out to udp/67 over the network The broadcast will make its way to every device on the local subnet, and it will eventually reach the DHCP servers that have been configured on the network Step 2: Offer The DHCP servers will examine the broadcast If they have an IP address that’s available, they will make an offer to the client workstation through a broadcast to udp/68 The broadcasts from both the DHCP servers will be seen by the client workstation Step 3: Request When multiple offers are made to the device, the device usually chooses the first offer that was received Now that it knows that an IP address is available, the client workstation will send a broadcast over udp/67 to request that IP address Step 4: Acknowledge Once the DHCP server receives the address, it will broadcast a formal acknowledgement to that address to the client workstation through udp/68 At this point, the client workstation can configure itself with that IP address Turning dynamic into static DHCP assigns an IP address from the first available from a large pool of addresses You may not want your IP address to change IP address will occasionally change Server, Printer, or personal preference Disable DHCP on the device - Configure the IP address information manually - Requires additional administration Easier way is to configure an IP Reservation on the DHCP server - Associate a specific MAC address with an IP address - If you need to make changes, just go on the DHCP server, and the change will be implemented across all of the devices configured APIPA – Automatic Private IP Addressing If you turn on your computer and you don’t receive a response from a DHCP server, you might still be able to communicate with other devices within your local subnet It is a link-local address No forwarding by routers Automatically assigned by the operating system - Before it puts that address onto your workstation, it sends an ARP (Address Resolution Protocol) to the local network to ensure nobody else is using the IP address that it wants to assign to your workstation IETF has reserved 169.254.01 through 169.254.255.254 - First and last 256 addresses are reserved - Functional block of 169.254.1.0 through 169.254.254.255 Example of a APIPA configured on a workstation: IPv6 Link-local Addresses A non-routable local network address Will only work on the local subnet, same as IPv4 link-local addresses Required on every IPv6-enabled interface - You may see many IPv6 addresses per interface o A link-local address, and an address that allows you to communicate outside of your local subnet fe80::/10 with only one subnet allocated (all zeros) - Effectively becomes fe80::/64 o Zeros in the first 64 bits, and the last 64 bits are assigned as node addresses (host addresses) The last 64 bits are usually created with a modified EUI-64 (Extended Unique Identifier) - Based on the MAC address, so that there is some uniqueness to the linklocal address SSL VPN – Secure Sockets Layer VPN Uses common SSL/TLS protocol (tcp/443) - TLS – Transport Layer Security, an improved version of SSL - Avoid running into most firewall issues No big VPN clients (for end-users) - Usually remote access communication, and create a secure tunnel between end-user’s device and the corporate network Simply assign authentication credentials to a user, and they can use the same username and password they always use to gain access to the SSL VPN No requirement for digital certificates or shared passwords (like IPSec) Can be run from a browser or from a (usually light) VPN client that is built into your operating system - Across many operating systems Client-to-Site VPNs Also called “remote access VPN” Requires software on the user device - May be built-in to existing operating system Decrypted Decrypted Encrypted You can simply start the SSL VPN software on your laptop, and it creates this encrypted tunnel back to your VPN concentrator at the corporate facility - If anyone was to capture any of the traffic between your remote workstation and the VPN concentrator, all they would see is encrypted information The VPN concentrator is then responsible for decrypting that information and sending it into the corporate network When this information is sent back to your remote workstation, it is encrypted by the VPN concentrator, and decrypted by your laptop LANs – Local Area Network A group of devices in the same broadcast domain 1 2 We often maintain the separation of the different local area networks for security reasons and to maintain the efficiency of the network - Means that we need a separate switch every time we want to have a separate broadcast domain VLAN – Virtual LANs To simplify the separate broadcast domains, we create a virtual LAN A group of devices in the same broadcast domain Separated logically instead of physically All of the devices on the red network can only see and communicate with the other devices on the red network Same with devices in the blue network We can configure a single switch to act and operate as if its multiple switches - Simplifies the administration - Save cost Configuring VLANs All devices connected in the red ports can communicate to each other on VLAN 1 Same with blue ports (VLAN 2) and green ports (VLAN 3) None of the devices can communicate across to a different VLAN 2.7 Internet Connections Cable Modem Broadband - Transmission across multiple frequencies - Different traffic types Data on the “cable” network - DOCSIS – Data Over Cable Service Interface Specification - Coaxial Cabling, shared bandwidth High-speed networking - 4 Mbits/s through 250Mbits/s are common - Gigabit speeds are possible Multiple services - Data for our internet connection, voice for telephone communication, and video for cable television DSL Modem ADSL – Asymmetric Digital Subscriber Line - Uses telephone lines instead of cable for cable television Twisted-pair copper cabling, dedicated bandwidth Download speed is faster than the upload speed (Asymmetric) - ~10,000 foot distance limitation from the telephone company’s central office (CO) - 52 Mbit/s downstream, 16 Mbit/s upstream are common - Faster speeds may be possible if closer to CO Dialup Network with voice telephone lines Analog lines with limited frequency response 56 kbit/s modems - Compression up to 320 kbit/s Relative slow throughput and difficult to scale Legacy systems, network utility - May be difficult to find a modem nowadays Fiber Optics Fiber optics to the home Converged services High speed networking Voice, Video, Data Enhanced features - Hundreds of HD channels - 1 Gbit/s Internet access - 1 Terabyte of cloud storage - 2 Terabyte DVR Satellite Networking Communication to a satellite - Non-terrestrial communication High cost relative to terrestrial networking 50 Mbit/s downstream, 3 Mbit/s upstream are common - Allow you to connect from remote sites or difficult-to-network sites High latency 250 ms upstream, 250 ms downstream High frequencies – 2 GHz - Line of sight, there is rain fade (no internet connectivity if there is heavy thunderstorm) ISDN – Integrated Services Digital Network BRI – Basic Rate Interface (2B + D) - Two 64 kbit/s bearer (B) channels (sending data over ISDN connections) - One 16 kbit/s signaling (D) channel (sets up or tear down the connection, and sends management information) PRI – Primary Rate Interface - Delivered over a T1 or E1 o T1 – 23B + D o E1 – 30B + D + alarm channel - Commonly used as connectivity from the PSTN (public switched telephone network) to large phone systems (PBX – Private Branch Exchange) Cellular Networks Mobile devices Separate land into “cells” Antenna coverages a cell with certain frequencies Tethering “Cell” phones Turn your phone into a wireless router through wire to laptop Mobile hotspot - Standalone devices - Use your phone for other things Line-of-sight Wireless Internet Services Line-of-sight - Visual path between antennas - High frequencies Common in metropolitan areas as it covers a wide geographical area - Cover many homes simultaneously WiMAX networking - Worldwide Interoperability for Microwave Access - Wireless high-speed internet access Also have options for non-line-of-sight - Lower frequencies, slower speeds LAN – Local Area Network Local is relative Same room, building or a group of buildings High-speed connectivity Ethernet and 802.11 wireless - Any slower and it isn’t “local” WAN – Wide Area Network Spanning the globe Generally connects LANs across a distance that is very far away - Generally much slower than LAN Many different WAN technologies - Point-to-point serial, MPLS (Multi-Protocol Label Switching), etc - Terrestrial and non-terrestrial PAN – Personal Area Network Your own private network Bluetooth, IR, NFC Automobile - Audio output, integrated with phone Wireless headset with mobile phone Health - Workout telemetry, daily reports MAN – Metropolitan Area Network A network in your city - Larger than a LAN, often smaller than a WAN Historically MAN-specific topologies - Everyone is moving to Metro Ethernet o Local network provider is going to hand off an ethernet connection, and you simply plug into that ethernet port Common to see government ownership - As they “own” the right-of-way” WMN – Wireless Mesh Network All devices connect together, like IoT (Internet of Things) A mesh “cloud” Self-form Self-heal Connects to each other automatically Reacts automatically to changes Many different network technologies - 802.11, Zigbee, Z-wave, etc 2.8 Network Tools Cable Crimpers “Pinch” the connecter onto a wire Connect the modular connectors to the ethernet cable Coaxial, twisted pair, fiber The final step of the process Metal prongs are pushed through the insulation so that you have copper to copper connectivity - The plug is also permanently pressed onto the cable sheath Modular Connectors A good crimp Crimping best-practices - A good pair of electrician scissors / cable snips - A good wire stripper Make sure you use the correct modular connectors - Differences between wire types Multimeters AC voltage Check wall outlet voltage DC voltage - PC power supply output voltages - CMOS battery power Continuity tests - Cable connectivity - Fuse status - Wire mapping Tone Generator Where does that wire go? Tone generator Follow the tone Puts an analog sound on the wire Inductive probe - Doesn’t need to touch the copper, hear through a small speaker Easy wire tracing Even in complex environments Connect the tone generator to the wire - Modular jack - Coax - Punch down connectors Use the probe to locate the sound - The two-tone sound is easy to find Cable Testers Relatively simple Can identify missing pins Continuity test Or crossed wires Only tells us if we have wired it properly - Not used for frequency testing o Crosstalk, signal loss, etc Loopback Plugs Useful for testing physical ports - Or for fooling your applications that is expecting to have an ethernet connection available, even if you are not directly connected to a live ethernet network - As they are used for looping back traffic from one interface back into the same interface Serial / RS-232 (9 pin / 25 pin) Separate loopback plugs for different network connections Ethernet, T1, Fiber These are not cross-over cables - They cannot be used to connect different devices with each other Punch-down Tools Punch-down blocks are intermediate section between a user’s workstation and the networking equipment that might be in a closet or server room “Punch” a wire into a wiring block 66 or 110 block Can be tedious - As every wire must be individually punched Trims the wires during the punch Very efficient process Punch-down best practices - Organization is key as there is lots of wires Cable management Maintain your cable twists as close as possible to the blocks Your category 6A cables will thank you later Document everything - Written documentation, Tags, Graffiti Wi-Fi Analyzer Wireless networks are incredibly easy to monitor Everyone “hears” everything Purpose-built hardware or software installed on your device - Specializes in 802.11 analysis Identify errors and interference - See all of the signal strengths and frequencies that are in use in your area or network, in order to identify errors or interference - Manage how to configure your wireless network to perform optimally - Validate antenna location and installation 3. Hardware 3.1 Cables and Adapters The Importance of Cables Incredibly important fundamental to network communication Usually only get one good opportunity at building your cable infrastructure Even vast majority of wireless communication uses cables Twisted Pair Copper Cabling Balanced pair operation - Two wires with equal and opposite signals - Transmit +, Transmit - / Receive +, Receive – The twist keeps a single wire constantly moving away from the interference Once the signal reaches the end of the wires, the opposite signals are compared to each other to reconstruct anything that may have been corrupted by this interference Pairs in the same cable have different twist rates - This will also help in making sure that traffic is able to get through the network even when there is interference Network Cabling Standards EIA – Electronic Industries Alliance - Alliance of trade associations, develops standards for the industry - Standards start with RS-# (Recommended Standards) or EIA-# TIA – Telecommunications Industry Association - Standards, Market analysis, Trade shows, Government affairs, etc - ANSI / TIA / EIA-568 – Commercial Building Telecommunications Cabling Standard o Always used when laying cabling infrastructure in buildings International ISO / IEC 11801 Cabling Standards - Define classes of networking standards Copper Cable Categories No Plenum Plenum Plenum Space - Building air circulation - Heating and air conditioning system Concerns in the case of a fire May be network cables and water pipes running in the plenum Smoke and toxic fumes if there is network cables running Worst-case planning - Proper network cabling if it is running through a plenum Plenum-Rated Cable Traditional cable jacket - PVC – Polyvinyl Chloride o If it catches on fire, the fumes are toxic Fire-rated cable jacket - FEP – Fluorinated Ethylene Polymer - Low-Smoke PVC Plenum-rated cable may not be as flexible May not have the same bend radius Worse-case planning - Important concerns for any structure Unshielded and Shielded Cables UTP – Unshielded Twisted Pair - No additional shielding - The most common twisted pair cabling STP – Shielded Twisted Pair - Additional shielding protects against interference Extra pair of grounding wire - Shield each pair and/or the overall cable - Requires the cables to be grounded Abbreviations: - U = Unshielded - S = Braided Shielding (shield around each individual pairs of wire) - F = Foil Shielding (Overall cable) / (individual pairs) TP - F/UTP = Foil around the cable and no shielding around the pairs - S/FTP = Braided shielding around the entire cable and foil around the pairs T568A and T568B Termination Pin assignments from EIA/TIA-568-B standard Eight conductor 100-ohm balanced twisted-pair cabling T568A and T568B are different pin assignments for 8P8C (8 position, 8 conductor) connectors (also known as RJ45) Many organizations traditionally use 568B Assign the T568A pin-out to horizontal cabling (same floor of a building) Difficult to change in mid-stream You can’t terminate one side of the cable with 568A and the other with 568B - Will run into problems, such as not being able to run Gigabit speeds and cable troubleshooting issues Coaxial Cables Two or more forms share a common axis RG-6 used in television / digital cables (in cable modems) And high-speed internet over cable RG-59 used as patch cables from the cable modem to other devices - Not designed for long distances Optical Fiber Communication Transmission by light No RF (Radio Frequency) signal The visible spectrum Very difficult to monitor or tap Signal slow to degrade - Transmission over long distances Immune to radio or electrical interference - There’s no RF The ferrule is made of ceramic, and help to protect the fiber core when connecting and disconnecting from network equipment Multimode Fiber The optic fiber you would put between two devices will either be multimode fiber or single-mode fiber Multimode fiber means when the light is going into the fiber core itself, it is going to bounce around into multiple modes, and when it comes out on the other side you will see the light is in those different modes Short-range communication - 2 km for 100 Mbit/s - 550 m for 10 Gbit/s Inexpensive light source - Usage of LED to send the light signal Single-mode Fiber Long-range communication Over 80 km without additional processing Expensive light source - Laser beams VGA – Video Graphics Array DB-15 connector (15 pins) Blue colour More accurately called DE-15 PC System Design Guide Analog signal - Image degrades after 5 to 10 meters HDMI – High-Definition Multimedia Interface Video and Audio stream - All digital - About 20 meters distance before losing too much signal 19-pin (Type A) connector Proprietary connector miniHDMI - Type C connector - Designed for smaller devices DisplayPort VESA (Video Electronics Standards Association) standard Data is sent in packetized form Royalty-free standard Like Ethernet and PCI express Compatible with HDMI and DVI - Use passive unpowered adapter to be able to convert between DisplayPort and HDMI DVI – Digital Visual Interface Single and dual link - Single link: 3.7 Gbps (HDTV at 60 fps) - Dual link: 7.4 Gbps (HDTV at 85 fps) - Analog Signals - Digital Signals - Integrated - Digital and analog in the same connector DVI-A DVI-D DVI-I Lightning Cables Apple proprietary - 8-pin digital signals Some advantages over Micro-USB - Higher power output, can be inserted either way, more durable Thunderbolt Used to connect a peripheral device such as storage device or video display to your computer High-speed serial connector - Data and power on the same cable - Based on Mini DisplayPort (MDP) standard Thunderbolt v1 - Two channels - 10 Gbit/s per channel - 20 Gbit/s total throughput - Mini DisplayPort connector Thunderbolt v2 - 20 Gbit/s aggregated channels - Mini DisplayPort connector Thunderbolt v3 - 40 Gbit/s aggregated throughput - USB-C connector Maximum 3 meters for copper - Up to 60 meters with optical - Allows you to Daisy-chain up to 6 devices USB – Universal Serial Bus Simplify connections - Printers, storage devices, keyboard, mouse, etc USB 1.1 - Low speed: 1.5 Mbit/s, 3 meters - Full speed: 12 Mbit/s, 5 meters USB 2.0 - 480 Mbit/s, 5 meters USB 3.0 - SuperSpeed - 5 Gbit/s, ~ 3 meters o Standard does not specify a cable length USB 1.1 / 2.0 connectors: USB 3.0 connectors: USB 3.1 - Released July 2013 - SuperSpeed+ - Type-A and USB-C connector - 10 Gbit/s (twice the rate of USB 3.0) USB 3.2 - Released September 2017 - New SuperSpeed+ modes over USB-C - 10 Gbit/s and 20 Gbit/s - USB-C can replace all of the previous USB connectors USB-C o USB-C can be plugged in either way, so its not annoying compared to connect the USB-A - USB-C isn’t necessarily USB 3.1 o The cable must support the function: o USB 3.1 speeds, power delivery of > 7.5 watts, alternate mode (additional data wires) DB-9 Serial Cable Connector D-subminiature or D-sub Different sizes, A through E Commonly used to send serial data over an RS-232 connection - Recommended Standard 232 - An industry standard since 1969 Serial communications standard - Built for modem communication - Used for modems, printers, mice, networking Also commonly used as a configuration port - Serial console interface SATA – Serial Advanced Technology Attachment SATA Revision 1.0 SATA 1.5 Gbit/s, 1 meter SATA Revision 2.0 - SATA 3 Gbit/s, 1 meter SATA Revision 3.0 SATA 6 Gbit/s, 1 meter SATA Revision 3.2 - SATA 16 Gbit/s, 1 meter The PATA Standard For older / Legacy type of storage Parallel AT Attachment, Parallel ATA, ATA An evolutionary process, and was created around 1999 Originally called IDE – Integrated Drive Electronics - A Western Digital invention - 2nd generation called EIDE – Enhanced IDE The evolution - Promised faster speeds (from 16 MB/s through 133 MB/s) - Additional devices (CD-ROM drives, etc) Now called PATA – Parallel ATA Additional wires in the 80-wire cable is used for grounding inside of the cable to reduce the amount of crosstalk, and improve throughput Comparison of PATA and SATA Cabling: SATA cable takes up much less room inside of a computer case, and allow for more airflow in the computer case thus having better cooling The SCSI Standard SCSI – Small Computer Systems Interface - Not really “small” any longer - When it was introduced, there was no USB Originally designed to string many peripherals together onto a single cable/controller (hard drives, optical drives, scanners all along the same SCSI bus) Up to 16 devices in a SCSI “chain” Many different formats - Fast SCSI, Ultra SCSI, Ultra-Wide SCSI, Ultra2 SCSI, Ultra3 SCSI, Ultra320 SCSI, Ultra-640 SCSI, iSCSI (SCSI over IP) Parallel and Serial options available Not just for hard drives - Scanners, tape drives, CD-ROM drives Many devices on a single bus 8 on a narrow bus, 16 on a wide bus Very intelligent interface functionality - Much of the difficult configuration work that administrators have to do is done between the SCSI devices Industry longevity - Well supported in the enterprise - A standard drive for virtual systems Every SCSI device on a single bus is assigned a separate ID number - Logical unit (LUN) numbers are defined within each SCSI ID SCSI ID 0 (SCSI controller), ID 2 (Hard Drive), ID 3 (CD-ROM) Separate drives in a storage array or virtual machine The signal at the “end” of a physical SCSI bus is terminated - Can be internal to the device or a separate termination device Modern data centres probably using a newer SCSI device called SAS – Serial attached SCSI, that have no jumpers, terminators, or settings An external storage drive that connects with SCSI: Daisy Chaining Legacy SCSI drive: SAS – Serial Attached SCSI Move from parallel to serial - Increased throughput, and added flexibility - More expensive than SATA, generally used for servers or in processingheavy computer workstations Point-to-point connection The bus has two devices on it The control and management of SCSI No more daisy chains No termination required Similar to the move from PATA to SATA But have the high speed of a serial connection 2.5” SAS drive: High-density internal SAS connector: Drive arrays normally used in enterprise settings: 24 drives on the top array, and 24 drives on the bottom array Adapters and Converters Convert between different connectors Convert from one format to another They must be electrically compatible You need Ethernet but you only have USB A good temporary fix - Or a good permanent one DVI to HDMI DVI-D and HDMI are electrically compatible - HDMI is backward-compatible with DVI-D - No signal conversion required - No loss of video quality DVI-A to VGA DVI-A includes analog signals - Backward compatible with VGA - Only 640 x 480 resolution is officially supported May only need an adapter Analog to analog VGA to DVI-D will need a converter (a power device that will perform a conversion of those signals) - Check your interface specifications USB to Ethernet Some newer laptops don’t have a wired Ethernet interface Convert USB to Ethernet 3.2 Connectors RJ11 Connector 6P2C – 6 position, 2 conductor RJ14 uses 6P4C for dual-line use Telephone connection RJ45 Connector 8P8C – 8 position, 8 conductor - Modular connector - Wired Ethernet connection Similar in shape to an RJ48C - 8P4C, used with T1/WAN data lines RS-232 Connector Recommended Standard 232 An industry standard since 1969 Serial communications standard - Built for modem communication - Used for modems, printers, mice, networking Also commonly used as a configuration port - Serial console interface BNC Connector Bayonet Neill-Concelman Common type of coaxial cable connector - Paul Neill (Bell Labs) and Carl Concelman (Amphenol) DS3 WAN links Rigid and bulky - Can be difficult to work with F-connector Cable television Cable modem Coaxial RG-6 or RG-59 cable - Threaded connector (must screw in) USB 1.1 / 2.0 connectors USB 3.0 connectors USB-C Connector Lightning Connector Apple proprietary - 8-pin digital signals Some advantages over Micro-USB - Higher power output - Can be inserted either way - More durable SCSI Interfaces 2.5” SAS drive (Serial Attached SCSI) High-density internal SAS connector eSata Connector External SATA connection Molex Connector 4-pin peripheral power connector - Molex Connector Company - AMP MATE-N-LOK - Provides +12 V and +5 V For older peripherals or maybe for fans Power for many devices in the computer case - Older Storage devices - Optical drives - Fans and other peripherals Power Supply The power for Molex is usually provided directly from the power supply Bundle of cables for connection to the motherboard, including the 4-pin Molex connectors 3.3 Memory What is memory? RAM – Random Access Memory is the most common RAM is not referring to hard drive or SSD storage It’s not the only kind of memory On a drive, data is stored permanently Data and programs can only be used when moved to RAM - RAM is essentially short-term memory where data is stored as the processor needs it - Anytime you play a game from your computer’s hard drive or stream a movie from the Internet, all of the data that your computer’s processor needs to play the game or watch the movie is stored in RAM. This is so that your processor can get to it quickly - Once you’re done playing your game or watching your movie and you close it down, the processor doesn’t need that data anymore, so it replaces it with the next task you give it RAM Slots Memory types have changed throughout the years - Driven by standardization and technology One of the most important components of your computer As it determines the overall performance Every motherboard is different - Check the motherboard manual to know the specifications of RAM supported DIMM – Dual Inline Memory Module Electrical contacts are different on each side 64 bit data width - Means we are able to transfer data from these memory modules in chunks of 64 bits at a time SO-DIMM – Small Outline Dual In-line Memory Module About half the width as a DIMM Usually in a laptop and mobile devices DDR2, DDR3, and DDR4 SDRAM DRAM – Dynamic Random Access Memory The memory on the DIMM Dynamic - Needs constant refreshing - Without refreshing, the data in memory disappears Random Access - Any storage location can be accessed directly - Unlike magnetic tape SDRAM – Synchronous DRAM Found in today’s desktops and computers SDRAM is synchronous with the common system clock - Queue up one process while waiting for another - Classic DRAM didn’t wait for a clock signal SDR (Single Data Rate) vs DDR (Double Data Rate) DDR2 SDRAM Faster speeds - Twice as fast as DDR - Maximum of 8 GB per DIMM (compared to 512 MB for DDR) Not backwards and forward compatible - DDR2 won’t work in DDR, DDR3, or DDR4 slots DDR3 SDRAM Twice the data rate of DDR2 Larger chip capacities – Maximum 16GB per DIMM Not backwards compatible DDR4 SDRAM Speed increases over DDR3 - Faster frequencies - Maximum 64 GB per DIMM Not backwards compatible DIMM Size Comparison Multi-channel Memory Dual-channel, triple-channel, or quad-channel Memory combinations should match - Exact matches are the best, as they provide the best performance Memory That Checks Itself Most of the memory that we’re using on our desktop computers doesn’t provide any type of error checking or error correction Used on critical computer systems VM servers, Database servers, any servers Parity Memory - Adds an additional parity bit - Won’t always detect an error - Can’t correct an error ECC Memory (Error Correcting Code Memory) - Detects errors and corrects on the fly - Not all systems use ECC - It looks the same as non-ECC memory Parity Even parity - The parity bit makes the total bits an even number Valid or error? - Even parity byte - Now that these parity bits have been added to this memory, and the transactions have occurred in the RAM, it is now ready to write this information back to the storage drive In the second line, it is not an even byte, that means something must have gone wrong, and that particular byte is corrupted. The parity memory will recognise that particular byte as invalid 3.4 Storage Optical Formats Small bumps on the discs that is read with a laser beam CD-ROM (Compact Disc ROM) Microscopic binary storage 700 MB capacity DVD-ROM (Digital Versatile Disc) - 4.7 GB for single-layer - 8.5 GB for dual-layer Blu-ray Disc - 25 GB for single-layer - 50 GB for dual-layer Writing to optical media “Burners” don’t create bumps in the discs - They darken certain areas of the disc that have photosensitive dye in them Compact Disc-ReWritable (CD-RW) DVD Read and ReWritable (DVD-R/RW) - And Dual Layer (DVD-R DL) Blu-ray Disc Recordable (BD-R) Blu-ray Disc Recordable Erasable (BD-RE) SSD – Solid-State Drives Non-volatile memory Very fast performance No moving parts No spinning drive delays SSD commonly seen installed into a PCI Express slot, normally in servers 2.5 Inch SATA Interface SSD Normally used in a desktop or laptop M.2 SSD Interface Smaller storage device - As fast or faster than SATA - No SATA data or power cables PCI Express bus connection 4 GB/s throughput or faster Different connector types - Needs to be compatible with the slot key - B key, M key, or B and M key, some M.2 drive supports both B key - Maximum of PCIe x 2 lanes - Maximum of PCIe x 4 lanes M key Hard Disk Drives Non-volatile magnetic storage Rapidly rotating platters Random-access - Retrieve data from any part of the drive at any time Moving parts - Spinning platters, moving actuator arm - Mechanical components limit the access speed - Mechanical components can also break Hybrid Drives SSHD – Solid State Hybrid Drive - Both a spinning drive and SSD in a single device SSD caches the slower spinning hard drive data - Write to the SSD cache very quickly, and in the background, the cache is writing to the hard drive as you’re doing other things Increases speed without the cost of an SSD-only system Looks like a normal hard drive or SSD - Same form factor Drive Size Comparison USB Flash Drives Flash Memory - EEPROM (Electrically Erasable Programmable Read-Only Memory) - Non-volatile memory - No power required to retain data Limited number of writes Can still read data Not designed for archival storage - Easy to lose or damage - Always have a backup Flash Memory Data Redundancy Hard drives store huge amounts of data Hard drives are moving components Important data They will eventually break You can prepare for that by using an array of drives and sharing the information over that array RAID – Redundant Array of Independent Disks They are also inexpensive disks Different RAID levels - Some very redundant and provide us with access to our data even if a drive happens to fail, and there are some that provides no redundancy RAID 0 – Striping RAID 1 – Mirroring RAID 5 – Striping with Parity Nested RAID – RAID 1 + 0 (aka RAID 10) - A stripe of mirrors Software RAID vs Hardware RAID Software-based RAID - A feature of the operating system - Doesn’t require any special hardware - Usually lower performance than hardware-based Hardware-based RAID - A feature of the hard drive controller - Configured outside of the OS o Usually invisible to the OS - High performance, designed for speeds Hot Swappable Drives Add and remove while the system is running Uses a drive chassis The connection is “hot” Where you can put 2 or more drives Easy to repair, replace a drive while the system is running - Combine with RAID for 100% uptime RAID 0 – Stripping File blocks are split between 2 or more physical drives High performance Data written quickly No redundancy - A drive failure breaks the array - RAID 0 is zero redundancy - If one of the drive fails, you lose access to all of your data RAID 1 – Mirroring File blocks are duplicated between 2 or more physical drives High disk space utilization - Every file is duplicated - Required disk space is doubled High redundancy - Drive failure does not affect data availability RAID 5 – Striping with Parity File blocks are striped - Along with a parity block - Requires at least 3 disks Efficient use of disk space - Files aren’t duplicated, but space is still used for parity High redundancy - Data is available after drive failure o Data is reconstructed using the parity - Parity calculation may affect performance RAID 10 (1+0) – A Stripe of Mirrors The speed of striping and the redundancy of mirroring - The best of both worlds, requires at least 4 drives 3.5 Motherboards, CPUs, and Add-on Cards Motherboard Form Factors Physical size - Basic layout - Room for small changes - Standard connectors Power Airflow - Case sizing Increasingly important Focus on which motherboard would be the best choice for a scenario - ATX, microATX, ITX, and mini-ITX ATX (Advanced Technology Extended) Form Factor Standardized by Intel in 1995 - Seen many updates over the years Motherboard Power - Original ATX motherboard has 20 pin connectors - Newer ATX motherboard has 24 pin connectors, and additional 4/8 pin connector for CPU power ATX motherboards are still manufactured today ATX is still the popular standard for personal computers MicroATX (uATX) Form Factor Smaller than an ATX motherboard Limited expansion slot Backwards compatibility (ATX) - Same power connectors - Same mounting points Also very popular form factor Still manufactured today ITX (Information Technology Extended) Form Factor A series of low-power motherboards Mini-ITX is screw-compatible with ATX and microATX Developed by VIA Technologies in 2001 Fits almost any case Small form factor uses - Single-purpose computing - i.e. streaming media A Computer Bus Communication path Internal PC growth A city of technology Independent pathway System expansion - Additional capabilities The Expansion Bus Older expansion slots that supported parallel communication allowed us to send information across the bus - The wider the bus, allowed us to send more information - “width” in bits Newer serial bus uses total amount of bandwidth we’re able to communicate across the bus Clock speed of the bus - The expansion bus gets its own clock - 1 MHz (megahertz) = 1 million cycles per second - 1 GHz = 1000 MHz = 1 billion cycles per second Clock speed does not necessarily equal transfer rate - DDR3 SDRAM can transfer 64 times the memory clock speed Conventional PCI (Peripheral Component Interconnect) Created in 1994 A common expansion interfaces - 32-bit and 64-bit bus width - Parallel communication Throughput varies by bus version - 133 MB/s (32-bit at 33 MHz) - 266 MB/s (32-bit at 66 MHz or 64-bit at 33 MHz) - 533 MB/s (640bit at 66 MHz) 32-bit PCI Parallel Bus 64-bit PCI Parallel Bus PCI 32-bit Expansion Card PCI 64-bit Expansion Card PCI Express (PCIe) Replaced PCI, PCI-X, and AGP (Accelerated Graphics Port) Communicates serially - Unidirectional serial “lanes” - Not all devices share these “lanes”, so slower devices don’t slow down all devices One, two, four, eight, sixteen, or thirty-two full duplex lanes - x1, x2, x4, x8, x16, x32 - “x” is pronounced “by” (“by 4”, “by 16”) PCI Express Serial Communication PCI Express Throughput Different versions of PCIe Improvement in speed with each iteration Per-lane throughput in each direction - v.1x: 250 MB/s - v.2x: 500 MB/s - v.3.0: ~ 1 GB/s - v.4.0: ~2 GB/s - v.5.0: ~ 4 GB/s Data Centre Servers Because the interface card is taller than the server rack, so we need a Riser card so that we can mount the interface card horizontally Riser Card CPU Sockets (Central Processing Unit) Motherboards are matched with CPUs CPU socket is usually the largest connector on the board CPUs have specific socket requirements And usually central to everything Not easily upgradable - And often not an option ZIF Socket (Zero Insertion Force) PGA – Pin Grid Array LGA – Land Grid Array Reverse of the PGA Pins are on the motherboard No pin to damage on the CPU - Easier to damage motherboard LGA Processor Storage Drive Interfaces – SATA Storage Drive Interfaces – SATA and PATA Computer Case Various front-panel connections - Not directly connected to the motherboard - So you must connect it directly to the motherboard Most front panel connectors are labelled Internal USB Connector USB on the motherboard Integrated – part of the motherboard on the back Internal case connection BIOS – Basic Input/Output System The software used to start your computer - The firmware - System BIOS, or ROM BIOS (Stored on ROM for older computers) - Newer computer systems store BIOS on flash memory, so we can upgrade the BIOS using an application instead of removing and installing chips Initializes the CPU and Memory - Build the workspace POST – Power-On Self-Test This process will look for a CPU, Memory, Display, Keyboard, etc If all of the hardware passes the diagnostics in POST - It will start looking for a boot loader on a storage device to load the operating system The flash memory on the motherboard that contains the BIOS software It has a Main BIOS on the right, and a Backup BIOS on the right Easily allows upgrade to the BIOS, and allow users to be able to switch back and forth between different BIOS versions Legacy BIOS The original / traditional BIOS Been around for more than 25 years Older operating systems talked to hardware through the BIOS Instead of accessing hardware directly Limited hardware support - No drivers for modern network, video, and storage devices UEFI BIOS (Unified Extensible Firmware Interface) Based on Intel’s EFI (Extensible Firmware Interface) A defined standard Implemented by the manufacturers Designed to replace the legacy BIOS - For modern computers - Graphical and text-based UEFI Advantages Boot from large (>2.2 TB) GUID (Globally Unique Identifier) Partition Table (GPT) disks - Also supports FAT (File Allocation Table) formatted drives, and removable media (USB flash drives) Includes a pre-boot environment - This isn’t an operating system (OS) - Has its own shell, drivers, and applications - Browse the internet, backup a storage drive - Remote diagnostics, even without an OS Non-Volatile BIOS Memory Store the BIOS configuration Your settings CMOS – Complementary Metal-Oxide Semiconductor - A type of memory on older BIOS - Allowed us to write and change information on the CMOS, and there was a battery on the motherboard to constantly refresh the information so that we don’t lose our configurations Usually flash memory these days - Easily stored and accessed The “CMOS” Battery Not needed for today’s flash-based storage - Maintains older BIOS configurations - May only be used to maintain date/time A bad battery will require a BIOS configuration or date/time configuration on every boot On older systems, can reset the BIOS configuration by removing the battery Newer computers use a jumper Launching BIOS Del, F1, F2, Ctrl-S, Ctrl-Alt-S Play around the BIOS settings in a virtual environment - Hyper-V (windows 8/10) - 3rd party virtualization – VMware Workstation Player Fast Startup Windows 8 and Windows 10 - Doesn’t actually shut down all the way - Starts up very quickly Starts up so quickly, you can’t open the BIOS configuration Disable fast startup in the Control Panel / Power Options Some motherboards have a separate process - Hold F2, then press the power button Configure Component Information RAM View and configure memory settings Hard Drive / SSD - Drive settings - Boot order Optical Drive (CD-ROM / DVD-ROM) - Enable / Disable CPU types Built-in Diagnostics Part of the BIOS Run from the BIOS menu Always available No additional media or software required Focused on hardware checks - Doesn’t touch the operating system (OS) Important Tips Have a backup of your BIOS configuration - Makes notes or take a picture - Some BIOS will have a backup and restore process within the BIOS itself Don’t make a change unless you’re certain of the settings BIOS Passwords BIOS password / User Password - Systems won’t start - Need the password to start the operating system Supervisor Password - Restrict BIOS changes - Must use supervisor password to change any BIOS configuration Full Disk Encryption (FDE) Everything that is written onto a disk, including the operating system, is encrypted In Windows, this is called BitLocker disk encryption Not just individual files BIOS integrates with TPM TPM – Trusted Platform Module - Can be added to many motherboards - Built-in to some systems - Adds advanced cryptographic functions LoJack for Laptops Originally called CompuTrace - Name licensed from the vehicle recovery service (LoJack) Allows you to track where your laptop is Built into the BIOS - Software installed into the OS - Reinstalls itself if removed or new storage drive installed “Phone home” function Provides location information Theft Mode - Remotely lock the laptop and/or delete files - Force a startup password Secure Boot Malicious software can “own” your system Malicious drivers or OS software Secure boot - Part of the UEFI specification Digitally sign known-good software - Cryptographically secure - It looks at the core operating system files, and checks to see if there is a digital signature for those files - If the digital signature matches the files that are on your hard drive, then the system continues to boot - If the core operating system files have been modified, the digital signatures will fail, and software won’t run without the proper signature Support in many different operating systems - Windows and Linux support Firmware Upgrades Firmware - Non-volatile memory and software - Older-style ROMs - Newer-style flash memory Computer BIOS, video adapter firmware, game console, etc. - Improve performance, fix bugs Not usually part of a normal maintenance process - Upgrade for a specific reason Identify Current BIOS Version May appear when system starts Easier to look in System Information (msinfo32) Version and Date details Compare the current to the existing version on the manufacturer’s website Can be difficult to catch An upgrade may not be available If possible, get a copy of the current version from the manufacturer’s website for a backup Before Upgrading Read the documentation on the manufacturer’s website - Some BIOS updates are bland - Others are full of new features - Check for OS prerequisites Locate a reliable power source - Laptop: Connect to AC power and have a full battery - Desktop: Use a UPS (Uninterruptible Power Supply), if possible Run the Upgrade Program Really-old BIOS upgrades may require a boot disk Most modern upgrades run as an executable - Close all of your other applications before running - May also run in the BIOS from a flash drive Most upgrade apps will check for prerequisites Floppy or optical media But don’t rely on this Requires a reboot, so save your important documents Other Options for Upgrading Newer options may be available - Modern motherboards have advantages Multiple BIOS versions - Two separate BIOS versions - Easily switch between them Upgrade from a USB flash drive - Computer may not even need to be powered on CPU Processor Cores Dual-core / Quad-core / Octa-core / Multi-core And more all the time Multiple cores - Each core has its own CPU and cache - The entire chip may have a shared cache CPU Cache Super fast memory - There’s not much of it - Temporary holding space for the transactions that are going through the processor - Level 1 Cache (closest to the CPU in the core) First check or first storage of data Level 2 Cache (may also be part of the same core) Holds data, instructions, and/or results Secondary level or secondary storage of data Level 3 Cache - Still on the chip these days, may be shared throughout the cores Virtualization Support Run other operating systems within a single hardware platform The multiple operating systems share physical hardware components Virtualization in software was limited - Performance and hardware management challenges - Each part of the memory that is associated with each virtualized operating systems has to be kept separate, and also separate storage and transactions that are occurring, and all of these are independent to each individual virtualised system Virtualization added to the processor - Hardware is faster and easier to manage, more efficient at handling the separations - Intel Virtualization Technology (VT) - AMD Virtualization (AMD-V) Hyper-Threading Technology (HTT) One CPU acts like two - While the transfer process for information is happening in or out of the CPU, another transaction could be executing information at the same time Doesn’t actually work as fast as two 15% to 30% performance improvement Operating system must be written (support) for HTT - Windows XP and later (any modern OS) Processor Speed Real speed: CPU Clock - Historical qualification of speed - Megahertz (MHz) or Gigahertz (GHz) Total number of transactions that can occur in a single second (MHz = Millions, GHz = Billions) Actual speed - Combination of different factors - Clock speed, CPU architecture, bus speed, bus width, L1 cache size, L2 cache size, operating system capabilities CPU manufacturers have moved away from marketing performance in clock cycles No broadly accepted measure of performance - Use a benchmark that works for you Overclocking When fast isn’t fast enough Increase the clock speed past the rated value A balancing act - More power required - More heat created - At some point, the system becomes unstable Change the base clock (BCLK) - Need an unlocked CPU - Run a stress test to confirm the stability This will void your warranty - As you can break more than your CPU Integrated GPU (Graphics Processing Unit) Part of a video adapter, motherboard or CPU Graphics rendering requires a lot of work - Dedicated hardware speeds the process Intel and AMD Two solid CPU manufacturers - The differences are subtle - AMD tends to be a bit less expensive Costs Laptops Intel has a large portfolio of options Choosing a side - Historically, AMD is value and Intel is performance - This is a dynamic technology segment, which means it changes all the time Case Fans Cool air is pulled through a personal computer - Motherboard layout becomes important Lesser cables to block airflow Component location is key Always check for good airflow Devices, wiring, power Many different sizes and styles - And volume levels On-board Fans Designed to cool an entire adapter card Can be bulky May take additional adapter card space Usually seen on high-end graphic cards Fan Specifications Standard sizes Different speeds (if motherboard supports it) 80mm, 120mm, 200mm Variable speeds Different noise levels - Not all fans sound the same Heat Sink Air will pass through a heat sink Dissipate heat from the CPU through thermal conduction Copper or aluminium alloy (conduct heat efficiently) Fins/grid increase surface area - Heat is then transferred to the cooler air Thermal paste creates a good contact between the chip and the heat sink They get HOT Fanless / Passive Cooling No fans, no noise Specialized functions Video servers, TV set top box, satellite receiver, media server Functions are very controlled Silent operation Carefully measured thermal tests Low-power components - Heat sinks Liquid Cooling Coolant is circulated through a computer - Not a new concept o Mainframe computers High-end systems Gaming, Graphics Overclocking Expansion Cards Extend the functionality of your computer Relatively simple process Designed for end-user installation Install hardware You may need more than the motherboard provides Add a card Install a driver - Onboard Video Software for the operating system Video Cards Sound Cards Network Cards (Ethernet) Multi-port Ethernet For servers USB Expansion Card Storage Card SSD storage card eSATA Card External connection for SATA drives Documentation Check the motherboard documentation Number and type of slots Check the adapter card documentation - Minimum requirements – Hardware, Software - Knowledge base for the manufacturers - Support forums – what are other people saying? You may need to perform a driver installation before installing the hardware Driver Installation Check the manufacturer’s website for the latest version Uninstall previous drivers Some manufacturer might provide setup program Manual installation through Windows Device Manager Check the Device Manager for the status after installation to see if its working 3.6 Peripherals Printers Colour and B&W output - Paper documents - Photos AIO – All-In-One Printer, Scanner, Copier, Fax Connectivity - USB, Ethernet, 802.11 wireless, Bluetooth/Infrared Scanner Connected via USB or 802.11 wireless Different form factor - All-In-One (AIO) - Flatbed May include an ADF – Automatic Document Feeder Barcode / QR Code Reader Serial or USB Connector or 802.11 wireless Or with your phone - Built-in camera Display Devices Monitors The most popular output device Many different connections - VGA, DVI, HDMI, DisplayPort Many different standards - Different sizes and resolutions VR Headset Virtual Reality Motion Tracking Headset determines what you see X, Y, and Z axis Interact with a virtual environment - Gaming, Education, Art, Travel Optical / DVD Drives Store and read data with light - Small bumps read with a laser beam - Microscopic binary storage Read / Write media - Store backups and documents Read-only media - Data can’t be deleted - Common for video distribution Limited storage size - Dual-layer Blu-ray holds 50 GB Mouse USB Connection Or an adapter for old PS/2 interface Optical mice have few moving parts - May need the right surface - Glass may cause a problem Keyboard Connected via USB Or an adapter for old PS/2 interface Additional features may require additional drivers and/or software Touch Pads Integrated into the keyboard for laptops - May be a standalone device - Connected via USB or Bluetooth Replaces a mouse - Uses no additional space Signature Pads Small digitizer - And stylus USB connection Drivers may be required Gaming Input Game pad and Joystick - USB connected - Used exclusively for games Webcam Video Capture - Built-in camera - USB connected - 802.11 wireless Usually includes both audio and video - Specialized drivers and software Microphone Integrated into most new laptops and multimedia devices Connectivity - Analog – TRS (Tip / Ring / Sleeve) - Digital – USB Speakers Analog output devices - Compatible with our ears Connectivity - TRS (Tip / Ring / Sleeve) jacks at the back of your computer - Speaker output, audio adapter Headset Headphone and microphone Desk and mobile use - USB - TRS plug - Bluetooth Talk and listen - Desktop telephone - Mobile communication - Gaming Digital Projectors Not always LCD Common to see LCD Metal-halide Lamps - Very bright (very hot) light - Brightness measured in lumens - Relatively expensive Always let bulbs cool - Fans will run after shutting off - Keep it plugged in External Storage Device Storage outside the computer, often removable - Very portable, easy to move large files - USB flash drive, SSD, Hard Drives Many different connectivity options - USB, Thunderbolt, eSATA, etc Very large storage options - Very mobile - Can be a security concern KVM – Keyboard, Video and Mouse Use many computers with a single keyboard, video display, and mouse - Useful for data centres that have many servers Magnetic Reader / Chip Reader Point of sale terminal Method of payment for credit card Support for different format - Integrated Circuit in the credit card o Physically inserted into the reader - Magnetic Strip o Backwards compatibility Reader is USB connected to a point of sale (POS) terminal NFC – Near Field Communication / Tap-to-pay Device ~ 10 cm wireless range Built into many phones Integrates with a payment terminal Many different uses - Contactless payment systems - Identity token / Door key - Gaming and Entertainment Smart Card Reader Smart Card - Card with embedded circuitry - Used in credit cards, payment cards, identification cards Useful form of authentication Username, password, physical smart card Readers are built-in to the laptops or external - USB connected 3.7 Power Computer Power Supply Computer uses DC voltage Most power source provide AC voltages Convert 115 V AC or 220 V AC - To 3.3 V DC, 5.5 V DC, and 12 V DC Amp and Volt Ampere (amp, A) – The rate of electron flow past a point in one second “the diameter of a hose” Voltage (volt, V) – Electrical “pressure” pushing the electrons - “How open the faucet is” Power Watt (W) – Measurement of real power use Volts * Amps = Watts - 120 V * 0.5A = 60 W Current Alternating Current (AC) - Direction of current constantly reverses - Distributes electricity efficiently over long distances - Frequency of this cycle is important o US/Canada – 110 to 120 V of AC (VAC), 60 Hertz (Hz) o Europe – 220 to 240 VAC, 50 Hz Direct current (DC) - Current moves in one direction with a constant voltage Dual-voltage Input Options Voltage varies by country - US/Canada – 110 to 120 V of AC (VAC), 60 Hertz (Hz) - Europe – 220 to 240 VAC, 50 Hz Manually switch between 110 V / 115 V and 220 V / 230 V - Get your meter - Or use an auto-switching power supply Don’t plug a 115 V power supply into a 230 V power source 24-pin Motherboard Power Main motherboard power Old original ATX standard was a 20 pin connector Provides +3.3 V, +/- 5 V, +/- 12 V 24 pin was added for PCI Express power You can connect a 24-pin connector to a 20-pin motherboard - Some cables are 20-pin + 4-pin Power Supply Output Different voltages For different components Positive and negative voltage - Voltage is a difference in potential - The electrical ground is a common reference point - Depends on where you measure from At the front door of your house - The second floor is +10 feet - The basement is -10 feet +12 V - PCIe adapters, hard drive motors, cooling fans, most modern components - Some motherboard components - Many components are now using +3.3 V - M.2 slots, RAM slots, motherboard logic circuits +5 V +3.3 V Uncommon to find -12 V and -5 V on modern motherboards -12 V - Integrated LAN - Older serial ports - Some PCI cards -5 V (modern power supply most probably don’t supply) - Available for older ISA adapter cards - Most old ISA cards didn’t use it - Today’s motherboard doesn’t have ISA slots Sizing a Power Supply Power supplies are rated by Watts (W) Bigger isn’t necessarily better More expensive, and doesn’t speed up your computer Physical size is relatively standard Overall and by individual voltages Older cases and systems may have proprietary sizes Calculate the Watts required for all components - CPU, Storage Devices, Video Adapter - Many online calculators Video adapter cards are usually the largest power draw Many video card specifications list a recommended power supply wattage 50% capacity is a good rule of thumb - Power supply runs efficiently and there’s room to improve components in the future 3.8 Custom PCs Graphics Workstation Computer Aided Design (CAD) / Computer Aided Manufacturing (CAM) SSD High-end video High Speed storage Complex graphics Maximum RAM - Significant memory use Audio / Video Editing Workstation Specialized audio and video card - High quality audio - Powerful video Large fast hard drive - Constant disk writes - SSD Dual monitors - Edit in one monitor, view output in the other Virtualization Workstation Maximum RAM Every OS needs its own memory Maximum CPU cores - Constant processing - Needs an efficient CPU - Most virtualization apps can use multiple cores Gaming PC SSD High-end video / specialized GPU Graphically complex High-definition sound card Fast start and load times Multiple layers, atmosphere High-end cooling - High utilization for hours at a time NAS – Network Attached Storage Device Access from anywhere Media streaming Central location File sharing - Easy access Gigabit NIC (Network Interface Card) High speed transfers RAID array - Redundant Hard Drives Standard Thick Client A standard desktop computer Desktop applications Executable programs running in local memory and local CPU Meets recommended requirements for running the operating system - CPU, total RAM, disk space Thin Client Basic application usage - Applications usually run on a remote server - Virtual Desktop Infrastructure (VDI) - Local device is a keyboard, mouse, and screen Minimal operating system on the client - No huge memory or CPU needed to provide the remote desktop functionality Network connectivity - Big network requirement - Everything happens across the wire Custom PC Configurations Summary 3.9 Common Devices Thin Client Very little client configuration Mouse, Keyboard, network, monitor All the work is done on the server And power on Minimal OS on the client - Most of the OS is on the server - Apps are centralized on the server Few moving parts, if any - Inexpensive to buy - Easy to replace Thick Client Traditional computer With all of the requirements Local resources - Operating system - Device Drivers - Applications Ongoing support - Security patches - Operating system updates - Application updates Account Setup and Settings Centralized account management - Microsoft Active Directory - User account added to the directory Thin client - No local permission required Thick client - Device is added to the Microsoft domain - User authenticates to gain access to the thick client, and any other resources on that local device/network Laptop Thick client that moves from place to place Touchpad configuration Cloud-based or local drive Wireless connections Finger combinations and swiping Synchronization and backup Mobility brings additional administrative concerns Mobility in the office and elsewhere Additional security - VPN connectivity, local drive encryption Phone / Tablet Centralized management Touchscreen configuration Set by policy and requirements Synchronization and backup Lock codes and biometric access Application installations Mobile Device Manager (MDM) Cloud-based Wireless enabled - Includes VPN connectivity 3.10 SOHO Multifunction Devices Multifunction devices - Printer - Scanner - Fax - Network connection - Phone line connection - Print from web There are a lot of things that can go wrong - You are going to fix them Printer Drivers Specific to a printer model Get the right operating system drivers Get the right version of the operating system Windows 7, Windows 8/8.1, Windows 10 32-bit drivers are very different than 64-bit drivers You can’t mix and match drivers Printer Configuration Settings Duplex - Printing on both sides of the page without manually flipping over the paper - Not all printers can do this - Print multiple copies in their proper order - Non-collated Collate o Print 4 copies of page 1 first, then 4 copies of page 2 and so on - Collated o Prints page 1-4 first then repeat for 3 more times for 4 sets Orientation Portrait vs Landscape Quality - Resolution - Colour, Greyscale - Colour saving Wired Device Sharing USB type B - The most common connector - USB Type B on the printer - USB Type A on the computer Parallel - Only for legacy systems - Centronics interface on the printer - DB-25 on the computer Ethernet RJ-45 connector Wireless Device Sharing Bluetooth Limited Range 802.11 a/b/g/n/ac Infrastructure mode - Many devices using an access point 802.11 Ad hoc mode - No access points - Direct link between wireless devices Device Sharing Integrated print server - Prints directly to the printer - Jobs are queued on the printer - Jobs are managed on the printer o Web-based front-end o Client utility / application Cloud printing - Print to the cloud - Useful from mobile devices - The cloud sends to your printer - Google, Brother, HP, etc Sharing from an Operating System Network ports - Common on Windows devices - Commonly uses tcp/139, tcp/445, udp/137, and udp/138 Bonjour - Discover Apple devices on the LAN - Part of macOS - Can be added to Windows (iTunes, etc) AirPrint - Print from iOS devices to compatible printers Printer Data Privacy User authentication - Everyone can print - Set rights and permissions - Printing vs. managing the printer Print and scan caching - Click print - Local system creates a file of the output - Output file is sent to the print server spooler - Printing is done from the spool file - Spool file is deleted when done o But not always 3.11 Print Technologies Laser Printers Combine a laser, high voltage, charged ions, powdered ink, heat, and paper Very high quality Fast printing speeds Very complex - Many moving parts, requires on-printer memory, very messy on the inside Imaging Drum Image is drawn onto a photosensitive drum “Painted” with laser The drum is then put through the toner, and the toner sticks to the area where the laser hit - Transfers toner to the paper - Where it is heated, and permanently affixed to the output Can be separate from the toner cartridge - Or combined Fuser Assembly The process of permanently attaching that toner to the printed page is done using Heat and Pressure - Melt plastic toner powder - Permanently bond toner to paper Transfer Belt and Roller Colour laser printers - Cyan, Yellow, Magenta, Black Four separate toner cartridges Image is transferred from all cartridges to the single belt - And then to a single transfer roller Pickup Rollers Pick up paper - Should be a single page at a time - Problems if no paper is picked up or multiple sheets are picked up Should be periodically cleaned or replaced Separation Pad Pull just the top sheet from the paper tray Multiple sheets Small and inexpensive - Easy to clean or replace Duplexing Assembly Printers usually print on a single side Not both sides simultaneously Printing on both sides is a two-step process - Print side 1, print side 2 Automatic mechanism to “flip” the page Can be built-in to the printer - Or available as an add-on Cross-section of a Laser Printer The Laser Printing Process Replacing the Toner Cartridge Look for the messages Low doesn’t mean empty The toner can also contain the OPC (Organic Photoconductor) Drum - Sensitive to light, keep it in the bag Power down the printer first Remove packing strips from the new drum Laser Printer Maintenance Kit Standard maintenance kit - Replacement feed rollers, new fuser unit, etc Check the printer page counter to know when to perform maintenance Power down and replace the components Fuser unit are HOT Reset the page counter when you’re done Laser Printer Calibration Different toner cartridges print with different densities It can adjust the density of colours Can be automated or manual process - Check printer manual Laser Printer Cleaning The toner and paper dusts make laser printers dirty Check the manufacturer’s recommendations - Water, Isopropyl Alcohol (IPA) Inkjet (ink-dispersion) Printers Relatively inexpensive technology Quiet High-resolutions, and in colour Expensive ink - Proprietary Eventually fades Clogs easily Ink Cartridges Place drops of ink onto a page Pulled from a set of cartridges CMYK - Cyan, Magenta, Yellow, Key (Black) Print Head Some consumer printers integrate the print head into the ink cartridge Others separate the ink cartridges from the print head Feed Rollers Pick up and feed paper through the printer Must be clean and not worn Duplexing Carriage and Belt Ink Cartridges are moved over the paper Carriage may include its own print head Belt moves the carriage back and forth Inkjet Printer Calibration Align nozzles to the paper - Print test images - Lines should be crisp, and colours should align Printers includes a calibration option - May need to make minor adjustments Cleaning Print Heads Small droplets of ink And small holes in a print head Clogged heads are a big issue - Many printers automatically clean every day - Outputs has streaks or sections of missing colours Cleaning process can be started manually Some print heads/cartridges can be removed to manually clean Replacing Inkjet Cartridges Usually separate colours Take seconds to replace Some cartridges will combine these A few minutes to calibrate and prepare the cartridges Recycle the empty cartridges Clearing Jams Lots of turns and twists - Jam is inevitable Remove tray paper Remove paper from the path Check for any scraps of paper Thermal Printer White paper (Used to print receipts) - Turns black when heated - No ink Very quiet Paper is sensitive to light and heat Fade over time Feed Assembly Pull paper through the printer - Relatively small paper path Heating Element Full-length heating element - No moving print heads Thermal Paper Paper covered with a chemical - Changes colour when heated Cash registers, credit card terminal Looks like normal paper Thermal Paper Replacement Relatively inexpensive Different sizes Actual replacement process is easy Cleaning the Heating Element Liquid Cleaner - Isopropyl Alcohol (ISA) - Get a cleaning pen - Check the manufacturer recommendation Swab gently, usually small areas Use a cleaning card which cleans the head and paper pathways Removing Debris Relatively small amount of paper bits and dust Blow or wipe it out Avoid using a vacuum as it tends to build up and discharge static electricity Dot-matrix (Impact) Printers Print head with a small matrix of pins - Presses against a ribbon to make a mark on paper Good for carbon/multiple copies Low cost per page Noisy Poor graphics Niche use - Car Rental, Airports Dot-matrix Printer Head Moves back and forth Pins hit ribbon and paper One matrix - Must move across the page to print Printer Ribbon Fabric - One long ribbon - Never ending circle Easy to replace Once single unit Proprietary size - Specific to printer model Tractor Feed Paper pulled through with holes on the side of the paper Continuous paper feed Instead of using traction Perforations between pages Holes have to line up perfectly Printer Ribbon Replacement Replace when ink becomes too light Ink is eventually consumed Designed to be modular - Replace in less than a minute Print Head Replacement Takes a lot of abuse - Directly hit the ribbon and paper Gets hot Another modular part, look for a release lever or bar Replacing Paper Not as easy as laser printers Forms must be positioned correctly Paper must feed perfectly into holes Text needs to fit a predefined space Paper must feed without constraint - Make sure nothing in the way Virtual Printer No physical output No additional hardware required Output to a “digital” document No printer, no paper Useful for sending electronically - Easy to manage Print to File You need to print to a printer at work, but you’re at home Print to the work printer driver File will be in an output format specific to that printer But save it as a file Can’t open it with another program Must use command line to copy the file to the printer - i.e. copy filename LPT1: Print to PDF – Portable Document Format Adobe PDF - A one-way path from application to PDF - Cross-platform compatibility Proprietary Adobe format - Requires specialized software - PDF viewers built into many Internet browsers Many 3rd party tools available - Some applications will print to PDF without any additional software Print to XPS (XML Paper Specification) Microsoft XPS Similar use case to Adobe PDF - But XPS is included in Windows - And available all the way back to Windows XP Print to XPS, view in any operating system - If there’s an XPS reader Print to Image Print to a graphics image Not integrated into the OS For later image editing or sharing A feature of an application Some 3rd party image print drivers available - Applications may export graphics formats natively 3D Printers “Print” in three dimensions Additive manufacturing - Melt plastic filament in layers to create the objects - No machining process required Rapid Prototyping Create a 3D item based on an electronic model Design and create relatively quickly and inexpensive Deploy designs anywhere in the world - Or in space stations 4. Virtualization and Cloud Computing 4.1 Cloud Computing Infrastructure as a Service (IaaS) Sometimes called Hardware as a Service (HaaS) - Outsource your equipment You’re still responsible for the management and security Your data is out there, but more within your control Web Server providers Software as a Service (SaaS) On-demand software - No local installation, run through browsers - Why manage your own email distribution or payroll? Central management of data and applications - Maintenance and security are all maintained by the 3rd party provider A complete application offering Google Mail, Dropbox, Google Workspace, etc Platform as a Service (PaaS) No servers, no software, no maintenance team, no HVAC You don’t have direct control of the data, people, or infrastructure Trained security professionals are watching your stuff Put the building blocks together Someone else handles the platform, you handle the development Develop your app from what’s available on the platform SalesForce.com Cloud Deployment Models Private - Your own virtualized local data centre - Available to everyone over the internet Public Hybrid A mix of public and private Community - Several organizations share the same resources Shared Resources Internal Cloud - No resources are shared - Build your own cloud - Pay for everything up front (hardware, software and networking structure in data centre) No ongoing costs External Cloud - Share resources with a public cloud - Underlying infrastructure owned by a 3rd party - Cost may be metered or up-front Metered and Non-Metered Metered Cloud Services - You pay for what you use - Cost to upload, store, and download Non-Metered Services - You pay for a block of storage - No cost to upload and download - A flat fee Cloud Computing Characteristics Rapid elasticity - Scale up and down the application resources as needed - Seamless to everyone On-demand self-service - Adding software, networks, servers, storage is a challenge outside of the cloud - The cloud enables instant resource provisioning Resource Pooling - All of the computing power in one place - One large resource instead of many small resources - Use a very large piece of hardware instead of individual small hardware, and virtualize all those servers in that large hardware - So we can take advantage of the idle times of one server by using those resources with another running server - Pooled to serve multiple users through multi-tenant model (many users can access the same location’s resources) Measured Service - Cost and utilization are very closely tracked o Bandwidth set in and out of applications o Storage that is being used for applications o And the number of people using that application - Resource planning and granular chargebacks Off-site Email Applications Email is a staple Detailed Electronic Communication A challenge to maintain - Expensive hardware and storage - Trained support team - Ongoing backup and maintenance Cloud-based email hosting - Flat cost per user per month - Personal options may have no direct cost - Looks and feels the same for the user Microsoft 365, Google Mail Cloud File Storage Services Store your files in the cloud Access, share, and edit from anywhere Easy to collaborate - One place for all files Synchronization app - Store files on a local drive - The app synchronizes to the cloud - Sync the files to other devices Cloud storage providers - Dropbox, Google Drive, Microsoft OneDrive Virtual Application Streaming On-demand applications - No local installation - Globally distributed User starts the application - The components are downloaded as needed - If you don’t use a component, you don’t download it - User data is stored securely in the cloud Easy to update - The application is in one place - Some data is cached, only update the changes Application Streaming Mobile phones / tablets - Run an app (or a portion of an app) in real-time - Try many different apps or components - Can be cached locally for later use Like online advertising on mobile devices - Runs a part of an application in real-time, and allow you to use that app as if it was installed on your mobile device Applications for laptop / desktops - No complex deployment processes - Apps are only streamed if they are used - New applications are simply added to the cloud offering - Quickly manage and make changes Cloud-hosted Virtual Desktops A Virtual Desktop Infrastructure (VDI) in the cloud Access from almost any OS Users connect to a pre-built desktop Windows, Mac OS, Linux, iOS, Chromebook, web browser Virtual NIC - All communication in the desktop is local to the virtual desktop o If you are working on sensitive information on this virtual desktop, all of that information remains local to that virtual desktop o If someone was looking at the network communication between you and that virtual desktop, they would not be able to see the sensitive information - No sensitive information sent from the local device 4.2 Client-side Virtualization Virtualization One computer, many operating systems Separate OS, independent CPU, memory, network, etc Host-based virtualization Your normal desktop plus others Standalone server that hosts Virtual Machines (VM) But really one computer Enterprise-level Been around since 1967 - IBM mainframe virtualization The Hypervisor Virtual Machine Manager - Manages the virtual platform and guest operating systems - And keeps all of these resources separate May require a CPU that supports virtualization, which can improve performance Hardware management by the Hypervisor - CPU - Networking - Storage - Security Resource Requirements CPU processor support - Intel: Virtualization Technology (VT) - AMD: AMD-V Memory Disk Space Above and beyond host OS requirements Each guest OS has its own image Network - Configurable on each guest OS (Standalone, NAT, bridged, etc) - Virtual Switch Emulation vs. Virtualization Virtualization is a native operating system - Performing native OS processes - Identical to using a non-virtual system Emulation is one device running processes designed for a completely different platform/architecture - One device pretending to be another - Original code is used - Code is interpreted for running on the current hardware - This is commonly slower than running natively, and it is not easy to do Hypervisor Security Hypervisor is a sweet spot for the bad guys No significant vulnerabilities yet VM escaping - Malware recognizes its on a virtual machine - Malware compromises the hypervisor - Malware jumps from one guest OS to another Many hosted services are virtual environments - Malware on one customer’s server can gather information from another Guest Operating System Security Every guest is self-contained Use traditional security controls - Host-based firewall - Anti-virus, anti-spyware Watch out for rogue virtual machines Like a real computer The bad guys try to install their own system Self-contained VMs provided by 3rd parties can be dangerous - You have no idea what’s running on there Network Requirements Most client-side virtual machine managers have their own virtual (internal) network Shared network address - The virtual machine shares the same IP address as the physical host - Uses a private IP address internally - Uses NAT to convert to the physical host IP Bridged network address - The VM is a device on the physical network (local network) - Every VM can use DHCP to be able to obtain an IP address from the local DHCP server, or you can manually configure the IP addresses Private addresses - The VM does not communicate outside of the virtual network - Only able to communicate with VMs that is on that private network 5. Hardware and Network Troubleshooting 5.1 Troubleshooting Change Management Change control - A formal process for managing change - Avoid downtime, confusion, and mistakes - Corporate policy and procedures Nothing changes without the process - Plan for a change - Estimate the risk associated with the change - Have a recovery plan if the change doesn’t work - Test before making the change - Document all of this and get approval - Make the change The Troubleshooting Process Identify the Problem Information gathering - Get as many details as possible - Duplicate the issue, if possible Identify symptoms May be more than a single symptom Question users - Your best source of details Determine if anything has changed Approach multiple problems individually Who’s in the wiring closet? Break problems into smaller pieces Backup everything - You’re going to make some changes - You should always have a rollback plan What else has changed? - The user may not be aware - Environmental changes - Infrastructure changes There may be some clues - Check OS log files - Applications may have their own log files Establish a Theory Start with the obvious Consider everything Occam’s razor applies Even the not-so-obvious Make a list of all possible clauses - Start with the easy theories - And the least difficult to test Research the symptoms - Internal knowledge base - Google searches Test the Theory Confirm the theory Determine the next steps to resolve the problem Theory didn’t work? - Re-establish new theory or escalate, or call an expert The theory worked! - Make a plan Establish a Plan of Action Build the plan - Correct the issue with a minimum of impact - Some issues can’t be resolved during production hours / office hours Identify the potential effects - Every plan can go bad - Have a plan B and plan C Implement the Solution Fix the issue Implement during the change control window Escalate as necessary - You may need help from a 3rd party Verify Full System Functionality It’s not fixed until it’s really fixed - The test should be part of your plan - Ask your customers confirm the fix Implement preventative measures - Avoid this issue in the future Document Findings It’s not over until you build the knowledge base What action did you take? Don’t lose valuable knowledge What outcome did it have? Consider a formal database - Help desk case notes - Searchable database 5.2 Troubleshooting Computer Hardware Unexpected Shutdowns No warning, black screen May have some details in your Event Viewer Heat-related issue - High CPU or Graphics, Gaming - Check all fans and heat sinks - BIOS may show fan status and temperatures Failing hardware - Has anything changed? - Check Device Manager, run hardware diagnostics Could be anything - Eliminate what’s working Lockups System completely stops - May still see information on the screen, but it just freezes completely - Usually not much in the event log - Similar to unexpected shutdowns Check for any activity - Hard drive and status light - Try Ctrl-Alt-Del to bring up the task manager Update drivers and software patches Sometimes its low resources Has this been done recently? RAM, Storage space Hardware diagnostic may be helpful POST – Power On Self-Test Test major system components before booting the operating system - Main systems (CPU, CMOS, etc) - Video - Memory Failures are usually noted with beeps and/or codes BIOS versions can differ, check your documentation Don’t bother memorizing the beep codes - They are all different between manufacturers - Know what to do when you hear them POST and Boot Blank screen on boot - Listen for beeps - Bad video o May need to replace the external video adapter card - BIOS configuration issue o Especially when there are multiple options for video in your system BIOS time and setting - Maintained with the motherboard battery - Replace the battery Attempts to boot from an incorrect device - Set boot order in BIOS configuration - Confirm that the startup device has a valid operating system - Check for media in a startup device Continuous Reboot How far does the boot go before rebooting? BIOS only? OS splash screen? Bad driver or configuration - Press F8 during startup for Windows, and select “Boot from last known working configuration” Boot into safe mode (F8 for Windows 7) - This will load a basic configuration of windows - Disable automatic restarts in system properties Bad hardware - Try removing or replacing devices - Check connections and reseat No Power No power at the source No power from the power supply Get your multimeter to check the power socket or power supply Fans spin – no power to other devices - Where is your fan power connected? - No POST – bad motherboard? - Case fans have lower voltage requirement - Check the power supply output Overheating Heat generation CPUs, Video adapters, Memory Cooling systems - Fans and airflow - Heat sinks - Clean and clear of dusts Verify with monitoring software - Built into BIOS - Or 3rd party software Loud Noises Computer should not have a loud noise like grinding Rattling Loose components Scraping - Hard Drive issues Clicking - Hard drive or fan problems - Blown capacitor Pop Intermittent Device Failure Sometimes it works, sometimes it doesn’t Bad installation of adapter cards - Check and reseat - Use all the screws Bad hardware - Poor connection - Heat and vibration Indicator Lights POST codes on the motherboard Power lights Link lights on the NIC Speed light on the NIC Activity lights on the NIC Smoke and Burning Smell Electrical problem Always disconnect the power Locate bad components - Even after the system has cooled down - Replace all damaged components Crash Screen (BSOD) Windows Stop Error Contains important information Also written to event log Useful when tracking down problems - Sometimes more useful for manufacturer support Remember to take note of all these important information on the BSOD Every BSOD can have different information depending on what is causing the crash The Spinning Ball of Death (macOS) The macOS X Spinning Wait Cursor - Feedback that something inside the system is holding up the entire operating system from moving forward Sometimes the spin starts, but it never stops You never get back control of your computer Many possible reasons - Application bug - Bad hardware - Slow paging to disk Restart the computer - There may be details in the console logs Log Entries Windows - Event viewer - Boot logs o System configuration (C:\Windows\ntbtlog.txt) Linux - Individual application logs - /var/log macOS X - Utilities / Console.app Error Messages The details of an error message can make or break a troubleshooting session - Write down everything - Take a picture, make a video - Train your users The error might not make sense - Write it down anyway - The internet will tell you what it means - Spend your time troubleshooting the right things 5.3 Troubleshooting Hard Drives Disk Failure Symptoms Read / Write failure Slow performance “cannot read from the source disk” Constant LED activity on the hard disk Loud clicking noise Troubleshooting Disk Failures Get a backup Check for loose or damaged cables Check for overheating Check power supply Especially if problems occur after startup Especially if new devices were added Run hard drive diagnostic - From the drive or computer manufacturer - Preferably on a known good computer Boot Failure Symptoms Drive not recognized - Lights (or no lights) - Beeps - Error messages Operating system not found - The drive is there, but Windows OS is not Troubleshooting Boot Failures Check your cables Physical problems Check boot sequence in BIOS - Check for removable disk (especially USB) - Check for disabled storage interface For new installation, check hardware configuration - Try different data and power cables - Try different SATA interfaces Try the drive in a different computer RAID not Found Missing or faulty RAID controller RAID Stops Working Each RAID is different - Don’t start pulling drives until you check the console RAID Recovery For RAID 1, 5 and 10 - If you replace a new drive, the RAID array will recognize it’s a new drive, and it will begin rebuilding the data on that drive Crash Screens (BSOD) Windows stop error, or Apple spinning wait cursor May indicate a storage device issue - Diagnostics needed for drive and motherboard - Make sure to have backup SMART Errors Self-monitoring, Analysis, and Reporting Technology Use 3rd party or built-in utilities Avoid hardware failures Schedule disk checks Look for warning signs Built-in to most drive arrays Warning signs - Replace a drive in time 5.4 Troubleshooting Video and Display Issues No Video Image Is it connected? Input selection on monitor Check brightness control Swap the monitor HDMI, DVI, VGA, etc Image is dim Check both power and signal cable Try the monitor on another computer No windows after Windows loads - Use VGA mode (F8 during startup) o Basic mode configuration, that any monitor will be able to display Image Quality Problems Flickering, colour patterns incorrect Check cable pins Especially if missing a colour Distorted image and geometry - Check the OS refresh rate and resolution settings o Need to match the display specifications for monitor - Native resolution is important on LCD displays - Check or replace cable Disable hardware acceleration Troubleshoot with the software drivers Oversized images and icons - Resolution set too low o Lower = Larger Burn-in / Ghosting - A problem across all monitor type - That screen will lock that image in place, and still see part of it despite not displaying it anymore - Some displays will pixel-shift (move one pixel or two in different direction) when it recognises that an image has been displayed for an extended period of time o But you won’t notice it - LCDs have “image sticking” (a pixel that is stuck to a particular colour) o Remove by displaying a white screen over an extended period Other Video Issues Pixel problems - Stuck pixels (constantly bright) - Dead pixels (always black) Artifacts - Unusual graphics – check adapter (hardware acceleration) - Image persistence – Turn off and on the display - Motion trails o Disable advanced video features BSOD and Overheating - Video drivers - Monitor internal temperatures 5.5 Troubleshooting Mobile Devices and Laptops Laptop LCD Display Troubleshooting No display or dim video - Verify the backlight - Look closely, it may be barely visible - No backlight, and using older fluorescent style lights, need to replace inverters Confirm video with an external display to the laptop - Video good, but LCD bad - Replace the LCD display Flickering Video - Connector problem - Bad video cable - Bad video hardware that is connecting the LDC display to the motherboard of the laptop Input Issue Sticking keys - Difficult to clean - Laptop keycaps are very delicate Ghost cursor / Pointer Drift - Mousepad causes cursor to bounce around - Modify the configuration to check for palm press - Update drivers Num lock indicated lights - The letters are doubled as numbers Wireless Troubleshooting Multiple antennas - WiFi main and aux, Bluetooth - Antenna wires wrap around laptop screen Easy to accidentally disconnect during maintenance - No 802.11 wireless - No Bluetooth Check the connectors - Loose cables can cause intermittent wireless access Power Issues Battery not charging - Batteries lose capacity over time - Laptop charging hardware may be faulty No power - Check the external power adapter “brick” with multimeter - Master laptop reset o Hold power for 10 seconds o Each laptop is different External Monitor Issues Toggle Fn keys - Secondary functions - Toggle between LCD / external monitor / both Use external monitor - Bypass the LCD (but not the video hardware) by booting up with the external monitor Touchscreen Non-Responsive Touchscreen completely black or touchscreen not responding to input - Buttons and screen presses do not register Apple iOS restart Android device restart App Issues Apps not loading or slow performance Stop the app and restart Restart the phone Update the app to the latest version Unable to Decrypt Email Protect your email Built-in to corporate email systems Microsoft outlook Each user has a private key Encrypted communication channels You can’t decrypt with the key Install individual private keys on every mobile device - Use a Mobile Device Manager (MDM) Short Battery Life Bad reception - Always searching for signal - Enable airplane mode on the ground to conserve battery Disable unnecessary features 802.11 wireless, Bluetooth, GPS Check application battery usage Replace aging battery Overheating Phone will automatically shut down Charging / Discharging the battery, CPU Usage, Display light All these create heat Check app usage Avoid overheating damage Some apps use a lot of CPU Avoid direct sunlight Frozen System Nothing works - No screen or button response Soft or hard restart Ongoing problems may require a factory reset - Install latest operating system and reload No Sound from Speakers Check volume settings for both app and phone Bad software / delete and redownload Try headphones to see if its app or phone problem Sound starts but then stops Dueling apps / keep app in foreground Load latest software or factory reset GPS not Functioning Check settings to enable GPS Configure location mode Need a good view of the sky Swollen Battery Buildup of gas - Designed to self-contain - Do not open the battery packet / container o Significant fire risk Faulty battery - Stop using immediately - Dispose properly Device Disassembly Different than working on a desktop computer - Many different pieces - Intricately engineered - Tight quarters Taking it apart is easy Hard to get it back together Easy to break something - Very delicate parts Mapping the Puzzle Document and label Seems obvious when disassembling, but not obvious when assembling Cable locations - There are a lot of cables on laptops and mobile devices - Antennas, drives, video, etc Screw locations - There are a lot of screws - Different sizes - “Hidden” screws Organize Parts Laptops disassemble in sections Outer shell, keyboard, video connector, etc Step-by-step - Take pictures or videos - Use a big workspace Use containers to separate the sections - Glasses, boxes, etc - Magnetic grid - Multi-day projects should be sealed or protected Get the Right Information Refer to manufacturer resources Often provide step-by-step repair guides The internet provides the rest - Online written guides - YouTube videos Specialized sites can help - http://www.ifixit.com/ The Tools Use appropriate hand tools - Sometimes a single screwdriver - Get a good tweezer - Sometimes specialized tools Magnification will be needed For small devices Get a big anti-static cloth - Sometime soft to protect screens - Easy to break tiny parts 5.6 Troubleshooting Printers Testing the Printer Print or scan a test page - Built into Windows - Not the application Use diagnostic tools - Web-based utilities o Built into the printer - Vendor specific o Download from the manufacturer’s website - Generic o Available in LiveCD form Bad Output Streaks and blurs - Inkjet: Clean the print heads - Laser: Check for scratched photosensitive drum Faded prints, black pages Low toner or ink Ghost images - Laser printer optical drum not cleaned properly - Ghost or “shadow” from previous drum rotation Final Print Colour Pints in wrong colour Low ink in one cartridge Laser printer output smudges everywhere - Toner not fused to the paper - Fuser problem as it may not be hot enough Paper Jam Careful when removing as you can rip the paper or damage the internal components Paper not feeding - Check the tray - Pickup rollers Creased paper - Problems in the paper path - Check the paper weight Network Issues No connectivity - Power - Wired cabling / Wireless settings Access denied - Manage security settings of the printer Bad Output Garbled characters on paper Bad printer driver / wrong model Incorrect page description language (PCL or Postscript) Bad application Check with test page OS Issues Unable to install printer - Drivers are important OS updates - User must have proper rights - Check the printer driver o 32-bit vs. 64-bit Backed up print queue - Print server not working - Print spooler crash o Restart the spooler service o Change recovery options Error Messages Error codes on the printer display Low memory errors - Laser printers build the entire page in memory - Complex images and graphics consume more memory No Output Check the printer’s power - Check for display messages - Run a test print form the printer to check if it is able to work as a standalone device Check the connectivity - Print a test page from a computer - Check direct connection (via cable) - Try across the network - Test the operating system, network, drivers, and spooler Check other applications if Windows test print is working - Print from a different program Multiple Failed Jobs in Logs Corrupted print jobs - Print spooler will crash - Most spooler configuration will automatically restart Problems are logged Windows Event Viewer, Windows-PrintService One job may be causing the issue - Monitor the queue for details, and remove that one job 5.7 Troubleshooting Networks No Network Connectivity Do you have a link light on the NIC (Ethernet Cable)? Is it plugged in? Ping loopback (127.0.0.1) - Is the protocol stack working properly? - Availability and intermittent connectivity Ping local IP address Ping default gateway Checks local configuration, adapter, and link signal Connectivity on the local network Ping devices on router’s other side - Ping to Google DNS IP address 8.8.8.8 APIPA – Automatic Private IP Address If you turn on your computer and you don’t receive a response from a DHCP server, you might still be able to communicate with other devices within your local subnet A link-local address No forwarding by routers IETF has reserved 169.254.01 through 169.254.255.254 - First and last 256 addresses are reserved - Functional block of 169.254.1.0 through 169.254.254.255 Automatically assigned - Uses ARP (Address Resolution Protocol) to confirm the address isn’t currently in use Local Resources Unavailable Windows Shares - Server unavailable - Share permissions have been modified - Relies on DNS to find the server Printers - Device sharing printer (or printer) is unavailable - Printer permissions have been modified - Service is associated with a specific server - May be a cluster of servers - Problems may be related to the servers or the network path Email Limited or No Connectivity Windows alert in the system tray - “Limited or No connectivity” - “No Internet Access” Check local IP address An APIPA address will only have local connectivity If DHCP server is working properly and an address is obtained, perform ping tests - Local gateway, remote IP address Intermittent Connectivity Internet access Check system tray - Broken LAN icon is a loss of signal - Check for cable problem - Might have bad NIC Problem with switch or wireless access point - Bad interfaces - Router rebooting IP Conflicts Doesn’t occur if you have DHCP Windows will identify a duplicate And prevent a conflict Two identical IP address will conflict But static addresses can conflict Intermittent connectivity, if any Reboot or reset the NIC to restart the DHCP process Slow Transfer Speeds Router or infrastructure congestion - Overloaded network or devices Speed and duplex incompatibility Hardware issue with the adapter Or cabling Malware infection Low RF Wireless Signals Interference Signal strength Usually automatic, look for manual tuning Bounce and latency Transmitting signal, transmitting antenna, receiving antenna, etc Incorrect channel Something else is using our frequency Multipath interference, flat surfaces Incorrect access point placement - Locate close to the users Wireless Interference Predictable interference - Florescent Lights - Microwave ovens - Cordless telephones - High-power sources Unpredictable interference - Multi-tenant building Measurements - Signal strengths - Performance Monitor SSID not Found Network name doesn’t appear Too far away Other networks are there Local networks are louder Wireless router has disabled SSID broadcasting - It will never appear on a list - You can still manually connect