A Guide to Computer User Support

advertisement
Chapter 13
Computer Facilities
Management
Learning Objectives
• Major types of computer facilities
• Common facilities management problems
• Management tools and procedures for dealing
with end-user facilities problems
Guide to Computer User Support, 3e
2
Introduction to
Computer Facilities Management
• Computer facility is a combination of
• Hardware
• Software
• Network
• Information
• People
• Operating procedures
• Environment (furniture, space, and electrical power)
associated with the use of any computer system
Guide to Computer User Support, 3e
3
Introduction to
Computer Facilities Management
•
Types of facilities
• Centralized facilities are located at one central physical site
• Decentralized facilities locate computers geographically
where users are
• Distributed facilities are a combination in which some parts
of a computer system are centrally located and other parts are
dispersed where users are
• Distributed facilities represent the current trend
• A network server is centrally located
• User workstations are decentralized
Guide to Computer User Support, 3e
4
Facilities Impact Support Services
• Centralized facilities concentrate the need for
support services in a limited geographic area
• Maximizes control over facilities and users
• Decentralized facilities challenge support
services since users are dispersed
• Minimizes control over facilities and users
• Support services in distributed facilities
• Must provide services where users are located
• Network provides tools to support users where they work
Guide to Computer User Support, 3e
5
Common
Facilities Management Problems
Guide to Computer User Support, 3e
6
Managing Hardware Problems
• User support specialists may
• perform simple diagnosis and repairs
• differentiate between
• real hardware malfunctions
• operating system configuration problems
• temporary network failure
• Ways organizations handle hardware repairs
• Outsource repairs to service vendor
• Perform simple repairs in-house and outsource others
• Maintain an in-house repair facility
Guide to Computer User Support, 3e
7
Outsourcing Hardware Repairs
•
•
Service level agreement (SLA) is a written contract between an
organization and a service vendor
SLA defines expectations for
• Response time for service
• Local availability of parts
• Preventive maintenance and diagnostic services
• Where the service will be performed
• On-site
• At repair depot
• Costs and penalties
Guide to Computer User Support, 3e
8
Repair Alternatives
• Time and materials is an alternative to
contracted hardware repairs where an
organization pays based on
• labor costs (time)
• replacements parts (materials)
• Time and materials limitations
• Organization pays transportation costs to repair depot
• Hourly rate for labor
• Best effort basis (no guarantees)
• Few guarantees on responsiveness
Guide to Computer User Support, 3e
9
Other In-house Strategies
• Redundant system is an extra backup computer
or peripheral identical to hardware in daily use
• Can be placed into service when original hardware fails
• Can be used until original hardware is repaired
• A low-cost form of insurance
• Redundant array of inexpensive disks (RAID)
• Provides large amounts of cheap, replaceable storage
• A defective disk can be replaced with no downtime
Guide to Computer User Support, 3e
10
Managing Power Failures
• Power management addresses electrical supply failures,
spikes, brownouts, and poor quality power
• Downtime is a measure of the number of hours a computer
•
system is unavailable due to problems
Uptime measures the number of operational hours
• Power management strategies:
• Surge suppressor
• Power conditioner
• Uninterruptible power supply (UPS)
Guide to Computer User Support, 3e
11
Power Conditioning Equipment
• Surge suppressor protects against some power spikes (see
chapter 10)
• Power conditioner is a device that inputs “dirty”
power from an electric utility and retransmits
“clean” power to computer equipment
• Dirty power is electricity that fluctuates beyond normal
bounds in voltage or frequency
• Protects equipment from damage by removing all but
largest power surges
• Can overcome some limited duration brownouts
Guide to Computer User Support, 3e
12
Uninterruptible Power Supply (UPS)
• Uninterruptible power supply (UPS) is an electrical
device that includes
• power conditioning circuits
• battery backup
• Provides backup power and time for computer
equipment to be shut down correctly
• Prevents damage to hardware, software and data due to
•
abnormal termination
The larger the battery capacity, the longer a system will
operate under UPS power
Guide to Computer User Support, 3e
13
Managing Software Problems
• User support staff may be first to learn of software
•
problems
Software problem report (SPR) is a procedure to
capture problems with computer programs
• Documents problem incidents
• Can be manual or automated
• SPRs are a useful source of information to developers in a
•
software vendor
Also called a bug report
Guide to Computer User Support, 3e
14
Managing Network Problems
• Network problems are often combinations of hardware
and software problems
• Size of network causes unique problems
• Network technology also provides tools to help solve
problems
• Examples of network problems
• Administrative procedures
• Performance monitors
• Media backups
• Access security
• Software maintenance
Guide to Computer User Support, 3e
15
Network
Administrative Procedures
• Network problems that confront support staff
• Establish and maintain user accounts
• Grant rights and privileges of authorized access to
resources
• Allocate disk space
• Handle accounting and billing problems and disputes
Guide to Computer User Support, 3e
16
Network
Performance Monitors
• Performance monitors are hardware and software tools
that show user and network support staff how effectively
and efficiently a network is operating
• Number of users logged on
• Hard drive access activity
• Applications running
• Percentage of downtime
• CPU and memory use
• Number of jobs in print queue
• Network throughput bottlenecks
• Can alert facilities staff to possible service problems
Guide to Computer User Support, 3e
17
Network Media Backups
• Network media requires periodic backup
• Server storage space
• User data
• Server can provide space and a convenient
•
way for users to back up personal data
Can be scheduled when load on server and
network is light
Guide to Computer User Support, 3e
18
Network
Software Maintenance
• Networks increase the difficulty of software
•
installation and updates
Network tools can make the software
administration task easier than it would be for a
comparable number of standalone systems
• Automatically distribute new versions of software
• Run applications software directly from server
• Automate installation procedures
Guide to Computer User Support, 3e
19
Managing Security Problems
• Sources of security problems
• Internal threats arise from an organization’s workers
and user
• External threats arise from clients, hackers and the
public from outside an organization
• Electronic threats arise from attempts to breach the
information or resources in a system
• Physical threats arise from attempts to damage or
disrupt equipment or facilities
Guide to Computer User Support, 3e
20
Electronic Security Strategies
•
Operating system vulnerabilities are unintended paths or
gateways into a system due to unpatched software bugs
•
•
A firewall is a hardware device or software utility that intercepts
and prevents unauthorized attempts to access a computer
connected to the Internet
•
•
Support staff should encourage users to install updates and patches
Most vulnerable: DSL and cable broadband connections
A callback modem returns a user’s call to a predefined, secure
telephone number for each user
Guide to Computer User Support, 3e
21
Managing Physical Threats
• Physical threats arise from several sources
• Thieves
• Equipment
• Information
• Disgruntled employees
• Members of public who are threatened by
• Technology
• Bureaucracies
Guide to Computer User Support, 3e
22
Physical Security Strategies
• Tools to deal with threats of sabotage by limiting
physical access to facilities
• Keypad entry locks
• ID badges and cards
• Biometric ID readers
• Motion sensors and heat detection devices
• Camera systems that monitor facilities
• Reception desks
• Metal detectors
• Physical barriers (walls and windows)
Guide to Computer User Support, 3e
23
Managing Disasters with
Contingency Plans
• Risk management is the use of tools and strategies to
•
reduce an organization’s financial and customer service
risk due to unpredictable interruptions in the ability to
provide computer services
Disaster management tools address recovery from
• Power failures
• Floods
• Fires
• Earthquakes
• Sabotage
• Terrorist attacks
• Storms
Guide to Computer User Support, 3e
24
Disaster Management Strategies
• Business interruption insurance
• Engineering inspections
• Hot and cold site agreements
• Media Backups
• Disaster/contingency plans
Guide to Computer User Support, 3e
25
Insurance
• Business interruption insurance provides
additional financial resources at the time of a
disaster to
• offset the cost of returning business to operational
state
• protect organization from financial ruin
Guide to Computer User Support, 3e
26
Inspections
• An engineering inspection helps identify the
potential damages due to disasters
• Work performed by a consulting engineer
• Helps identify potential for damage to computer and
other equipment
• May recommend structural modifications to buildings
• May recommend detection devices to warn of
problems
Guide to Computer User Support, 3e
27
Site Agreements
• Create redundancy that serves as backups to an existing
•
system
Provide means to return a computer installation to
operational status quickly
• Cold site is a geographically distant location that includes
•
space for a replacement computer
• Hot site is a facility similar to a cold site, plus operational
equipment similar to the system it is intended to backup
Tip: mutual assistance agreements between similar organizations
are an alternative to commercial site agreements
Guide to Computer User Support, 3e
28
Media Backups
• Media backups are copies of important programs and
•
data maintained on media that is separate from the
original
Backup media:
• Floppy disks
• Cartridge tapes
• Writeable optical media (CDs and DVDs)
• Removable hard drives
• USB flash drive
• Backups facilitate restoration of programs and data after
a disaster
Guide to Computer User Support, 3e
29
Disaster/Contingency Plans
•
•
A disaster/contingency plan describes various steps to take in
case of of a temporary disruption of service due to a disaster
Includes information such as:
•
•
•
•
•
•
•
•
•
Employee directory
List of notifications to be made
Location of backup media
Copy of operational procedure documentation
Inventory of equipment, software, licenses
Insurance policies
Hot/cold site or reciprocal aid agreements
Facilities floor plan
Instructions for staff evacuation
Guide to Computer User Support, 3e
30
Managing Ergonomic, Safety and
Productivity Problems
• Chapter 10 covers ergonomic problems and solutions in
•
greater detail
Ergonomic concerns are ongoing
• Need to train end users about potential workstation problems
• Can provide questionnaires or forms for users to report
•
•
problems they encounter
Provide links on organization’s Web page to information
Site visits by support specialists help identify and correct
problems
Guide to Computer User Support, 3e
31
Managing User Errors
• Errors result in lost data and decreased
•
productivity
Common user errors
• Data entry errors
• Lapses in data security
• Failure to follow operational procedures
• Use of unlicensed software
• Use of poor quality software
• Misuse of powerful software tools
Guide to Computer User Support, 3e
32
Strategies to
Minimize User Errors
• Increased user training
• Feedback to software developers
• Automated procedures
• Reduce user errors
• System audits
• A system audit is an investigation by an independent
consultant to verify that operating procedures are
followed and to identify potential problems
Guide to Computer User Support, 3e
33
Managing Computer Crime
and Misuse
• Access controls are procedures and tools to limit
electronic entry into a computer system or network
• User IDs and authentication procedures
• Firewalls and callback modems
• Organizational policies that limit access
• Physical controls are tools to limit physical access to
facilities, equipment and information
• Door locks, ID badges, alarms
• Cable tie-down systems
Guide to Computer User Support, 3e
34
Managing Computer Crime
and Misuse (continued)
• Inventory controls maintain records about the location,
configuration and value of equipment
• Also called asset management
• Information controls limit and monitor access to
valuable or confidential information
• Organizational policies on access to information
Guide to Computer User Support, 3e
35
Managing Computer Recycling
• Turnover of equipment poses disposal problems
• Hand-me-down strategy
• Donate obsolete equipment
• Recycle
• for use by charitable organizations
• for salvage value of materials
• Some supplies and peripherals can be recycled
• Tip: Avoid disposal in a landfill
Guide to Computer User Support, 3e
36
Facilities Management
Tools and Procedures
Guide to Computer User Support, 3e
37
Media Backup Procedures
• Utility software writes media backup copies
• Automated backups run at a scheduled time
• Format options
• Same format as original media
• Compressed format
• Takes less space
• Must be decompressed when restored
• Tip: use automated backup options in application
packages such as word processors and spreadsheets
Guide to Computer User Support, 3e
38
Media Backup Strategies
• What to backup
•
•
•
•
User data
Application software
Operating system Registry and other user-specific files
Operating system software
• Type of backup
•
•
•
•
Full backup copies all files to backup media
Incremental backup copies only files that changed since last backup
Differential backup copies only files that changed since last full
backup
Progressive backup copies only those files that need to be backed
based on a database of backup information
• Other backup options
•
By date created
Guide to Computer User Support, 3e
39
Backup Media Labels
• Naming convention for 3-set backup rotation:
stdnn
s = media set letter (A, B, C)
t = type of backup
Full
Incremental
Differential
Progressive
d = day of week (MTWHFSU)
nn = sequence number (01, 02, 03 …)
Guide to Computer User Support, 3e
40
Backup File Restoration
• File restoration is a procedure to copy one or
more files from backup media to original or
replacement disk
• Backup software is used for file restores
• May require permissions from owner of data
• Tip: test file restore procedures periodically
Guide to Computer User Support, 3e
41
Media Defragmentation
• Operating systems try to write each file in
•
•
contiguous (adjacent) sectors on a disk
When a disk does not contain enough contiguous
free space to hold a file, the operating system
breaks the file into chunks or fragments
Disk fragmentation occurs as a disk contains
• Fewer whole files
• More fragmented files
• Fragmentation slows disk performance
• Fragmented files take longer to write and read
Guide to Computer User Support, 3e
42
Defragmentation Strategy
• Disk defragmentation uses a utility program
that rewrites files on a disk so that each file is in
contiguous (adjacent) sectors
• Shortens access time to write or read files
• Regroups free space so it is contiguous
• Dramatically improves disk performance
• Tip: As a safety precaution, users should backup a hard
drive prior to running a defrag utility
Guide to Computer User Support, 3e
43
Media Maintenance Strategies
• Recover lost allocation units
• Use Windows ScanDisk utility (or equivalent)
• Recovers lost allocation units
• Repairs free space
• Checks disk surface for common problems
• Repairs problems with FAT table, directory structure and files
Guide to Computer User Support, 3e
44
Media Maintenance Strategies
(continued)
•
•
•
Erase Unused Programs and Files
•
•
•
Increases amount of available disk space
Improves system performance
What to erase
• User data files
• Obsolete application programs, including old versions
• Unused utility software
Tools
•
•
•
•
Uninstall option in application software packages
Operating system’s Add/Remove Software option
Operating system’s Disk Cleanup utility
Utility software to perform disk cleanup tasks
Tip: Stay away from operating system folders and files, Registry, configuration
files
Guide to Computer User Support, 3e
45
Media Maintenance Strategies
(continued)
• Recycle and replace tape cartridges
• Magnetic tape becomes brittle with age
• Recopy stale tape media
• Discard brittle tapes
Guide to Computer User Support, 3e
46
Computer Supplies
• Maintain inventory of
• Printer supplies
• Media
• Cleaning supplies
• Computer parts
• Sources
• Local office supply stores
• Electronics vendors
• Mail-order catalogs
• Internet vendors
Guide to Computer User Support, 3e
47
Preventive Maintenance
• Preventive maintenance reduces the likelihood of
•
computer component failure and repair costs
Procedures to clean and adjust
• System unit
• Disk drives
• Printers
• Keyboards
• Mouse parts
• Display screen
Guide to Computer User Support, 3e
48
Preventive Maintenance (continued)
• System unit
• Remove dust buildup with vacuum cleaner
• Test electronic components with diagnostic software
• Test battery strength
• Check internal and external cable connections
• Disk drives
• Serviced only by qualified technician
• Usually replaced rather than repaired
• Disk cleaning kit for floppy drives in harsh environment
Guide to Computer User Support, 3e
49
Preventive Maintenance (continued)
• Printers
• Remove dust and paper particles with vacuum cleaner
• Keep inside free of ink and toner spills
• Peripheral rotation swaps a heavily used device with one that
has received less use
• Attempts to extend the life of a printer
• Keyboards
• Remove dust and dirt particles with vacuum cleaner or
•
compressed air
Clean keys with lint-free cloth and isopropyl alcohol
Guide to Computer User Support, 3e
50
Preventive Maintenance (continued)
• Mouse parts
• Clean rubber ball and contacts inside mouse
• Use isopropyl alcohol
• Display screen
• Clean screen regularly to improve visibility
• CRT-type monitor case should be removed only by
qualified repair technician
Guide to Computer User Support, 3e
51
Antivirus Software Utilities
• Computer Virus is a program that can replicate
and attach itself to other programs, e-mail
messages, macros, or disk media
• Can be benign
• May cause damage to hardware or data
• Antivirus utility software
• Virus detection –
• Virus removal –
• Virus monitoring –
Guide to Computer User Support, 3e
find it
get rid of it
prevent its returns
52
Tips on Antivirus Software
• Virus attacks can destroy disk data
• Media backups are an important virus management tool
• Keep antivirus software up-to-date with latest virus
definitions
• Use automatic update service if available
• A virus hoax is a warning about a suspected virus
• Usually via e-mail
• From a trusted source
• Warns of dire consequences if warning ignored
• May be fallacious
• Veracity can be tracked at antivirus vendor Web sites
Guide to Computer User Support, 3e
53
Use Accounting and Statistics
• Software that collects, stores, and reports on computer
•
resource use
Common use fees:
• E-mail
• Internet access (ISP)
• Applications software provider (ASP)
• Service bureau
• Web hosting
• Helps determine and allocate costs of providing services
to users and departments
Guide to Computer User Support, 3e
54
Other Computer Facilities
Management Tasks
• Design or remodel facilities
• Plan for new equipment purchases
• Design charge back systems
• Negotiate vendor agreements
• Coordinate environmental and safety effort
• Consult on ethical issues
• Provide information on legal issues
Guide to Computer User Support, 3e
55
Chapter Summary
•
•
The type of computer facility (centralized, decentralized or
distributed) can impact the kinds of support users need
Common facilities management problems
•
•
•
•
•
Support specialists may make simple hardware repairs or rely on
service vendors through an outsourcing agreement or a time and
materials repair depot
The impact of electrical power failures can be reduces with power
conditioners and uninterruptible power supplies
Software problem reports may provide useful information for
software developers
The impact of network problems can be reduces with
administrative procedures, performance monitors, media backups,
and access security
Tools to manage security threats address internal and external as
well as electronic and physical access
Guide to Computer User Support, 3e
56
Chapter Summary (continued)
• Common facilities management problems (continued)
• Disaster planning involved media backups, reciprocal site
•
•
•
agreements security measures and a contingency plan
User problems can be reduced with training, robust software
design, automated procedures, and system audits
Computer crime and misuse is minimized with access
controls, physical controls, inventory controls, and information
controls
Obsolete equipment can be handed-down to other workers, or
through recycling or disposal
Guide to Computer User Support, 3e
57
Chapter Summary (continued)
•
Tools and procedures for managing problems in computer facilities
•
•
•
•
•
•
•
Media backups to safeguard data
• full, incremental, differential and progressive
Media defragmentation to improve disk performance
Media maintenance to recover lost disk space
An inventory of computer supplies
Regular preventive maintenance tasks to prolong the useful life of
equipment
Updated antivirus utility software to protect against virus attacks
Computer use statistics to allocate costs of service and support
Guide to Computer User Support, 3e
58
Download