Professional Documents
Culture Documents
APLSC-14
A+ Preparation
APLSC-14
Compiled by: Brendon Gouws
Quality assured by: Storm Leibbrandt and Juan Pierre Pretorius
Edited by: Ali Parry and Norman Baines
Version 1.0
January 2014 CTI Education Group
TABLE OF CONTENTS
Introduction to A+
2
2
4
4
5
6
7
8
8
9
10
11
19
21
22
23
A+ 801
24
24
31
90
1.1
1.2
1.3
1.4
2.1
2.2
2.3
2.4
2.5
3.1
3.2
3.3
3.4
3.5
3.6
3.7
3.8
3.9
3.10
3.11
3.12
3.13
3.14
3.15
3.16
3.17
3.18
Cases
Disassembling a computer
Motherboards
Power supplies
Additional exercises
Understanding signalling
Numbering systems
Data representation
Ports and connectors
Modern ports
Display connectors and cable types
Audio connectors
Basic input devices
Touch screens and digitisers
Gesture recognition
System resources
Basic principles to supporting I/O devices and ports
Expansion bus slots
Expansion cards
Display devices
Display characteristics, coating and power
Video adapters
Installing a monitor
24
26
28
30
31
34
39
74
89
91
93
97
101
104
114
120
122
129
132
133
134
136
141
145
154
156
175
176
186
191
192
288
312
324
359
393
405
4.1
4.2
4.3
4.4
4.5
5.1
5.2
5.3
5.4
6.1
6.2
6.3
6.4
6.5
7.1
7.2
7.3
8.1
8.2
8.3
8.4
8.5
8.6
8.7
8.8
8.9
8.10
8.11
9.1
9.2
9.3
9.4
9.5
9.6
Storage devices
Memory
Processors
Verifying your work done
Additional exercises
Printers
Printer types
Paper
Printer connections
Printer support and research
Basic local print installation process
Upgrading printers
Printer maintenance
Scanners
Barcode and RFID readers
Additional exercise
Environmental controls
Protecting against power problems
MSDS documentation
Throwing away and recycling components
Compliance with laws
Additional exercise
193
237
256
286
287
288
307
310
311
312
313
316
322
323
324
326
356
359
362
375
376
378
379
379
381
387
391
392
393
396
401
402
404
404
405
406
416
420
540
570
Introduction to A+ 802
571
A+ 802
573
What is an OS?
Choosing an OS
32-bit vs. 64-bit and RAM considerations
Windows operating systems
Verify hardware and software compatibility
Back up data and settings
Choosing an installation method
Automating the installation
Recovering and repairing installations
Upgrade paths
Preparing a hard drive for installation
Windows 7 installation process
Performing an attended Windows 7 installation
420
426
428
435
436
449
460
464
470
519
540
541
542
545
555
556
557
558
559
560
562
563
564
566
567
567
568
569
571
572
572
573
573
575
575
576
588
589
590
597
604
606
609
610
614
618
622
622
624
678
689
719
745
769
798
2.1
2.2
2.3
2.4
2.5
2.6
2.7
2.8
3.1
3.2
3.3
4.1
4.2
4.3
5.1
5.2
5.3
5.4
6.1
6.2
6.3
6.4
6.5
6.6
6.7
6.8
7.1
7.2
7.3
7.4
7.5
7.6
7.7
7.8
7.9
7.10
8.1
8.2
Configure hardware
Device Manager
Safely removing hot-swappable devices
Display Settings
Tablet PC Settings, Pen And Input Devices
Mouse and keyboard settings
Gamepad and joystick settings
Sound settings
Hardware profiles
Managing power
System tools
Performance tools
624
632
635
638
647
648
651
670
678
680
682
689
695
701
719
725
729
730
745
754
756
757
760
762
767
768
769
772
780
782
788
789
790
791
793
794
798
801
8.3
8.4
808
813
814
830
909
9.1
9.2
9.3
9.4
9.5
10.1
10.2
10.3
10.4
10.5
10.6
Maintaining disks
Scheduling tasks
Updating systems
Data backups
Shadow Copy (Previous Versions)
Troubleshooting theory
Understanding the boot process
Repair environments and boot errors
Troubleshooting the registry
Troubleshooting applications and Windows errors
Troubleshooting system components
814
814
816
822
828
830
836
839
865
866
877
909
915
938
939
946
950
962
970
972
979
991
997
1004
1027
1063
1112
12.1
12.2
12.3
12.4
Windows printing
Installing local printers
Configuring printers
Troubleshooting printers and print devices
1027
1032
1040
1056
1063
1064
1070
1076
1077
1085
1087
1100
1102
1104
1111
1112
1118
14.3
14.4
14.5
14.6
Mobile networking
Data synchronisation
Mobile Security
Mobile device resets
1125
1135
1137
1143
Unit 15 - Virtualisation
1144
1216
1217
Bibliography
1219
1220
1144
1150
1151
1152
1153
1178
1182
1188
1209
1211
1212
1214
1214
1217
1217
Introduction to A+
Welcome to the A+ Preparation module. The level of
education and type of training needed for many jobs in the
Information Technology (IT) industry vary from employer to
employer, but there is always a need for qualified computer
technicians and other related support roles. As technology
changes and advances, companies are increasingly looking
for qualified people with technical certifications to manage
new technologies and support older ones.
A computer technician (also known as a techie) must be a jack-of-all-trades:
a hardware expert in everything ranging from motherboards to the latest
mobile devices; a software expert in various operating systems and
applications; a troubleshooter; a communicator to handle the occasional
irrational/computer illiterate user; a good listener to gather computer
symptoms from customers; a counsellor to make customers feel good about
their computers and confident in the computer technicians skills; and a juggler
who can manage his or her time and priorities. These skills do not come
overnight and not all of them can be taught, but you can continuously develop
and fine-tune them.
Being a computer technician involves having the knowledge to build a
computer from scratch, manage software, develop problem-solving techniques,
run tests and diagnostics, do installations and give technical support. A
computer technician is responsible for carrying out high quality repair on the
equipment for which he or she is responsible and for keeping that equipment in
good running condition.
A computer technicians work means that he or she must be up to speed with
the latest technological developments while supporting older technologies that
are still in use. Even after qualifying, computer technicians must regularly
attend training workshops to update their knowledge and skills since
technology is always changing. This training will continue throughout your
career.
Furthermore, computer technicians need to be able to understand and be
responsive to the customers needs and requirements. You need to
communicate openly, effectively and honestly with customers regarding the
repairs you have done, and keep them fully informed of any unresolved or
outstanding problems.
The aim of this module is to give you the knowledge to build, install, configure
and upgrade personal computers (PCs), laptops, mobile devices, printers,
virtual machines and other IT hardware and software, as well as to solve
common computer problems. It will take you from the just-a-user level to the
I-can-fix-this level so that you can become an entry level computer technician
or occupy another IT support role.
Page 1 of 1229
Once you have completed this module, you will understand and be able to
explain how all the internal components of a computing device work, how to
take the device apart and put it back together, install and work with software,
solve common problems by following common methodologies and, using
system programs and problem-solving software, create a network of
computers so that they can communicate with one another, and perform steps
to extend the lifespan of the computer and other devices.
Hands-on, practical labs and exercises will test your ability to work with and
keep the computer in good working order, as well as upgrade it, and will also
help you to develop computer- and network-related problem-solving skills.
Furthermore, you will learn how to communicate with customers in a
professional manner and how to handle complaints.
Page 2 of 1229
Note
Information specific to the topic that you should take note of is placed
in this note box, which might also be a tip or caution box. A note box
provides information that should be taken into account, a tip box
provides a tip about a topic relevant to the section, and a caution box
provides very important safety or warning information that should be
noted and adhered to.
Page 3 of 1229
Bibliography
Module prerequisites
It is recommended that you have the following knowledge and skills before
starting this module:
Days
1 day
2 days
2 days
1 day
1 day
1 day
1 day
2 days
1 day
1 day
13 days
Page 4 of 1229
Page 5 of 1229
Note
Network+,
Page 6 of 1229
The following websites are general resources for researching anything IT:
Search engines are often the first places to go when you are trying to solve a
problem and need information fast:
Note
Study tactics
Perhaps it has been a while since you have studied for a test. Here is a trick
that law and medical students use who have to memorise lots of information:
write it down.
The act of writing something down can help you remember important
information, even if you never look at the information again. Try taking
separate notes on the material to help memorise the information. Additionally,
make flash cards with questions and answers on difficult topics. Take your
notes to bed and read them just before you go to sleep. Many people find they
really do learn while they sleep! Also, the more times you go through the
information, the more likely it will remain in memory.
Page 7 of 1229
LO1
Be able to manage hardware
devices
1.1
1.2
1.3
LO2
Be able to manage software
2.1
2.2
2.3
LO3
Be able to perform support
functions
3.1
LO4
Be able to manage networks
4.1
4.2
4.3
4.4
3.2
3.3
3.4
Page 8 of 1229
Note
40
30
A+ Practical Examination
30
Total
Note
100
To complete the CTI A+ Preparation module, you must pass both the
internal CTI A+ 220-801 and A+ 220-802 examinations. The study
guide will prepare you for CTIs internal examinations.
Please visit the following links on the GTS website for practice examinations on
both sections of the A+ Preparation module:
220-801: www.gtssupport.com/flower27/220-801/index.htm
220-802: www.gtssupport.com/flower27/220-802/index.htm
Page 9 of 1229
Page 10 of 1229
The following textbook, which may be borrowed from the campus library, as
additional, supplementary reading so that you can deepen your
understanding of the topics in this module:
Prowse, L.D. 2013. Authorized Exam Cram CompTIA A+ 220801 220-802. 6th edition. Pearson Education, Inc.
Page 11 of 1229
An input device is any hardware device that can be used to enter data and
instructions into the computer and select commands. Some commonly used
input devices are:
o Keyboard has keys to enter data into the computer.
o Mouse a small hand-operated device that controls the movement of a
small symbol, called a pointer or cursor, on the screen to make
selections.
o Microphone allows you to speak into the computer.
o Webcam a digital camera that allows you to take pictures and create
videos and store them on the computer.
o Scanner converts paper-based material so that it can be used by the
computer.
Computer case
Monitor
Mouse
Keyboard
Figure 0.1 A PC
PC: A PC is a standalone computer that is usually used by a person at
home, school or in an office.
A laptop is a portable computer that has similar components to a full-size
computer but it is smaller and has different specifications. A smartphone is a
mobile device that has advanced computing capabilities beyond making phone
calls, such as email, web browsing and so on.
A+ Preparation | V1.0 Jan 2014
Page 12 of 1229
Smartphones have touch screens that you can touch with your fingers to
perform tasks. Touch screens are both input and output devices, and are
common in portable computers, mobile phones, tablets and in wearable
computing devices, such as glasses and smart watches.
Page 13 of 1229
User and user interface: A user or end user is a person who uses the
computer directly or uses the information it provides. The user interface is
the way the user interacts with the computer or device, in particular through
the use of input devices, gestures and software.
o The two main types of user interface that are available are:
Graphical user interface (GUI) pronounced gooey, it allows
you to interact with the computer by pointing to and selecting
graphical objects that represent programs and other items on the
screen. See Figure 0.4.
Page 14 of 1229
Firmware
Firmware is software programmed into a hardware chip. It is known as
software on a chip, and the softwares job is to control the hardware to which
the chip is attached.
Page 15 of 1229
BIOS: Short for Basic Input/Output System, the BIOS is a firmware chip
that includes software code that gives the computer basic instructions for it
to start. BIOS programming is referred to as bootstrap programming while
starting a computer is known as booting the computer. The BIOS works
with Complimentary Metal-Oxide Semiconductor (CMOS) memory,
which stores BIOS hardware parameters that you can see and change using
a program.
Information processing cycle
Some people refer to the input, processing, output and storage activities of a
computer as the information processing cycle. Figure 0.6 shows an
example of this cycle.
Page 16 of 1229
Page 17 of 1229
Page 18 of 1229
Cables
There are two types of cables used inside the case:
Data cable this connects components to each other so that they can
transfer data.
Power cable supplies electricity to a component.
IT infrastructure
Although it has different definitions, IT infrastructure generally refers to a
set of hardware, components, systems, software, networks, facilities and
everything else that supports the flow and processing of information for a
company. It generally does not include people and documentation.
Introduction to networking
A computer network is a group of computers and devices connected to one
another in order to share information. The simplest network has two computers,
the connectivity media such as a cable or over the air wireless signals, and
the network adapter that works as the computers connection to the network.
Common networking terms
Computer networking has its own language. You should understand the
following terms before starting this module:
Communication sending data from one device to another.
Client a computer that allows you to access the network and take
advantage of the resources and services available on it. Generically, a client
can also refer to any application that you use to access a network server.
Page 19 of 1229
Page 20 of 1229
IP address
An Internet Protocol (IP) address is a number assigned to each computer
participating in a network that allows them to communicate.
Proprietary vs. standard
The term proprietary means any process or way of doing something that
works only on one vendors or manufacturers equipment. A standard, on
the other hand, is any way of doing something that the industry has agreed
upon.
Authorised vs. unauthorised access
Unauthorised access occurs when someone gains access to a computer or
network resource without permission, typically by hacking into the resource.
Unauthorised use involves using a computer resource for unauthorised
activities.
Page 21 of 1229
Figure 0.13 shows a web browser displaying the CTI web page accessed from
the www.cti.ac.za website.
Page 22 of 1229
Artificial intelligence
Artificial Intelligence (AI) is the area of computer science that focuses on
making systems and software think and behave like humans and reason with
the world around it. Software that suggests music you might like to hear or
restaurants you might like to eat at are examples of AI.
Page 23 of 1229
A+ 801
Welcome to the A+ 801 section of the A+ Preparation module. In the units of
this section you will learn about safety and preventative measures; computer,
portable, and printer hardware; communication skills and professionalism;
networking; and Internet connectivity.
Page 24 of 1229
Health and safety laws designed to keep the workplace safe from
danger (hazards).
Building codes designed to ensure the health, safety and protection of
people when it comes to how the building is built, and who makes use of
and works in it. Building code rules ensure that fire prevention and
electrical systems are not damaged and are safe to use.
Environmental regulations rules on how to correctly throw away old or
unused equipment, since throwing away equipment affects the
environment.
Although the rules about workplace safety are determined by local government
authorities in different areas and may vary widely from country to country,
keeping the workplace environment safe is generally the responsibility of
employers and employees who need to work together to keep it safe:
The companys health and safety procedures should be set out in a handbook
that is given to all staff. These procedures should:
Page 25 of 1229
4) Only if you have training and it is safe to do so, do what you can to
neutralise the emergency, e.g. give first aid or use fire fighting equipment
to extinguish the fire.
The first thing to know about electricity is that your body conducts
electricity, which means that electricity will pass through your body. This
can give you an electric shock, which can cause several symptoms from
muscle spasms to severe burns, to a heart attack and even death. Broken,
faulty or incorrectly installed electrical equipment can give you an electric
shock as well. Always keep this in mind every time you work on any type of
electrical equipment!
Do not open and work inside computer power supply units, monitors and
laser printers unless you have been trained to do so. These components
store power for periods of time after being switched off and unplugged. You
should follow any warning signs printed on these systems.
Be sure to read the instructions on the fire extinguisher before you use it.
Although theory is great, there is no substitute for hands-on safety training,
which might be available in your company. Here is a basic run down on how to
use a fire extinguisher.
Page 26 of 1229
You can use the memory aid P-A-S-S to help you remember this:
P: Pull the safety pin from the fire extinguishers top handle.
A: Aim the hose at the bottom of the fire, not at the flames.
S: Squeeze the top handle to release the substance from the
extinguisher.
S: Sweep the hose from side to side at the base of the fire until
the fire is completely extinguished.
Ensure that there are enough power outlets available. Do not overload
power outlets, as this could be a potential fire hazard. You can use an
appropriate power strip (an extension lead with multiple sockets) when
you need to plug multiple devices into one power outlet.
Electricity can pass through metal and most liquids, so keep these items
away from electrical equipment.
Page 27 of 1229
Avoid touching visible electrical contacts with any part of your skin.
Do not work with electricity in wet surroundings, especially on wet floors.
Keep your hands and the surrounding area clean and dry.
Remove your watch and other jewellery, and secure loose clothing before
handling equipment.
Immediately replace or isolate damaged equipment or cables that could
be dangerous.
Cables can be a trip hazard. Use proper cable management products, such
as cable ties, to tie up multiple cables on the floor and inside the
computer box, and do not run cables across walkways.
Do not leave any equipment in walkways or at the edge of a desk.
When lifting and moving objects:
o Never pick up heavy objects with your back. Rather bend your knees
and then lift with your legs to avoid injuring your back. Reverse this
process when putting the object down.
o Make sure that you have a tight grip on the object before picking it up.
o Keep your back straight when carrying the object.
o Make sure that the path you take to carry the object is clear.
o Be careful when handling large, awkward or hot objects or objects with
sharp or rough edges. If necessary, wear protective gear, such as
gloves, for these objects.
o For objects that are too heavy or awkward to carry, ask another
person for help or use a trolley truck to move the object.
Firstly, drain your body and clothing of static electricity before working on
the equipment.
Page 28 of 1229
Note
Anti-ESD wrist straps and mats use resistors devices that stop the
flow of electricity to stop static charges from running through a
component. These resistors fail over time, so it is always a good idea
to read the documentation that comes with the anti-ESD tools to see
how to test the resistors properly. Tests should be done on a daily
basis.
Use anti-ESD bags for parts almost all computer components come in
anti-static bags when you buy them. Hold onto these bags! When installing
or removing any electrical component, keep it inside the bag until you are
ready to work with it.
Page 29 of 1229
Note
1.4 Exercises
Page 30 of 1229
2.1 Cases
A desktop computer is one that is designed to be used at a single location,
such as on top of a desk. The system case, also known as the chassis, is the
metal and plastic box where the internal components, such as the
motherboard, power supply unit and hard disk drives, are stored. There are
different types of cases, sizes and colours. The three basic types of cases are:
Slimline
Page 31 of 1229
Tower sits upright on a flat surface and is taller than it is wide. It comes
in three sizes:
o Full-tower often used for servers, this case has extra internal space
for additional drives, expansion cards and backup power supplies.
o Midi-tower used for high-end user computers and office computers,
this case has space for extra devices and cards, but not as much space
as the full-tower case.
o Mini-tower used for office and home computers, this case has limited
room for additional devices and cards.
Full-tower
Midi-tower
Mini-tower
Small form factor (SFF) a semi-portable or super slimline case that can
only hold a limited number of components. It is typically used as a media
centre entertainment system.
Page 32 of 1229
Front Panel
Back Panel
Carefully choose a case. Cases come in different sizes and with many
different options. You also get specialised cases such as those for gaming
and entertainment systems.
The type of motherboard you choose determines the type of case that can
be used. The size and shape of the motherboard must match the case. A
quick test fit of the motherboard in the case saves a lot of return trips to
the vendor.
You can typically but not always buy a case that comes with a PSU
already installed. You must match the power rating and connection type of
the PSU to the type of motherboard you choose.
The design of the case may limit the number and size of the components
that can be added.
The external or internal drive places are called drive bays. A drive bay is a
rectangular metal box that holds hard drives and optical drives. Other bays
hold card readers and ports. An external bay is one that allows you to
access openings in the bay from outside of the case. Optical disc drives are
installed in external bays. An internal bay is one housed entirely inside the
case. Hard disk drives are installed in internal bays.
If a computer has many components, it needs more room for air flow to
keep the system cool.
The position of the power and reset switches and other lights and indicators
are found on the front panel, but the exact position depends on the design
of the case.
Vents are often found at the back and sometimes on the side panels to
allow cooling fans to be mounted to the case.
Page 34 of 1229
Have various containers handy to hold the various screws, parts and clips
that you remove.
Power off and disconnect the computer from the mains power supply (AC
wall outlet).
Unplug the monitor, mouse, keyboard and all other external cables
attached to the computer.
Take ESD precautions and use an anti-static wrist strap and mat. Use antistatic bags of various sizes to store the different computer components.
Remember to take your time and follow the correct procedures for handling
cables and components!
Page 35 of 1229
There are other tools that should be taken on a repair job every time, including
a pen to complete the repair documentation and a bootable disc with the
computer technicians favourite repair programs on it for the different
operating systems.
Note
There are different methods for opening cases. Examine the case
before attempting to open it.
Most tower cases have panels on both sides of the case that can be removed.
It is usually necessary to remove only one side panel to see the motherboard
and the other parts connected to it. Generally, you will only need to remove
both side panels if you have to remove parts such as internal storage drives,
which are usually fastened to a drive bay on both sides of the bay. The front
panel is removed to install or replace parts such as the power switch,
removable media drives, front I/O panel connections, lights and so on.
As a computer technician, you need to be comfortable with taking the
computer apart and putting it back together again. To start off, go through the
following steps which show you how to remove the cover from a tower
computer. First prepare the workspace before opening the case. Small
containers can be used to hold screws and other parts as you remove them.
1. With the computer turned off and all external cables removed from the
computer, press and hold down the power button for a few seconds to drain
power from the system.
2. Knowing which side panel to remove is easy. All you need to do is see
where the on-board motherboard connections are on the back panel of the
case. The connections in Figure 2.2 are on the left side of the case (as
indicated by the white square), which means that the bottom of the
motherboard is facing the left side of the case. Therefore, you must remove
the right side panel in Figure 2.2 to see the top of the motherboard.
Page 36 of 1229
Figure 2.3 Slide the panel to the back and lift it off the case
7. Some cases need you to remove the front panel before removing the side
panels. Look for hinges at the top of the panel and a lever at the bottom.
Squeeze the lever to release the front panel and lift it off the case. Then
remove the screw and slide the side panel to the front and lift it off the
case. Remember that some cases have tool-free clips, which means you will
only need to unclip the panel to remove it.
Page 37 of 1229
2
1
1.
2.
Power cables
3.
4.
Case fan
5. On-board motherboard
outward facing
ports/connections
7
8
9
6.
CPU fan
7.
Memory slots
8.
Hard drives
9.
Blanking plates
10
11
12
13
Page 38 of 1229
2.3 Motherboards
The motherboard is the component that makes all other components work
together to make the computer functional. Also called the main board or
system board, the motherboard is a printed circuit board (PCB) that holds
the CPU, chipset, memory and expansion slots in place. Every piece of
hardware is directly or indirectly plugged into the motherboard. The
motherboard has electrical wires called traces that make up the buses of the
system, and it distributes the power from the PSU to many components.
When buying a motherboard, it normally comes with a printed manual or an
electronic version of the manual on a disc that gives instructions and
information about the layout, installation and configuration of the motherboard
and various other components that connect to it. You can also download the
manual from the motherboard manufacturers website.
Size
Description
Form
factor
Nano-ITX
Size
Description
Pico-ITX
Note
Remember that each form factor needs its own case, that is, ATX
motherboards go into ATX cases. You cannot replace one form factor
with another without buying a new case, with the exception that you
can mount most micro-ATX and mini-ITX boards into ATX cases.
Proprietary boards
There are several manufacturers that make their own proprietary
motherboards that will only work with their own cases. Be aware that
replacement parts can cost more for these proprietary boards than for nonproprietary boards and are usually not readily available.
Note
Page 40 of 1229
You can identify the motherboard manufacturer and model number as follows:
Note
Be aware that the model number for OEM computers might be the
model number of the computer and not the motherboard. If this is the
case, refer to the technical documentation for the model of the OEM
computer, which you can download from the computer manufacturers
website.
Figure 2.7 shows where to find the motherboard manufacturers name and
model number from the System Information program. You can also find this
information using the CPU-Z program.
Page 41 of 1229
Wire connectors
Headers
Figure 2.8 Front panel connectors
You will typically find the following components with wire connectors on the
front panel:
Page 42 of 1229
There are several ways of determining which connector plugs into which
header:
Page 43 of 1229
On older motherboards, the CPU speed and other CPU settings were often
configured by setting jumpers.
Many modern motherboards have a jumper setting called clear CMOS that
when set, resets all of the BIOS parameters to the factory default.
Many modern motherboards allow you to set a supervisor password to
control access to the BIOS Setup program and a user password that locks
access to the computer. If you forget both passwords, you will not be able
use the computer unless you use a jumper to clear the passwords.
BIOS firmware might need updating to solve a problem or to use a new
motherboard feature. If updating the BIOS fails, jumpers can be set to undo
the update.
Some documentation may refer to setting jumpers to on, off, closed or open.
In general, to set a jumper to on or the closed position, place the jumper over
the desired pair of pins; to turn it off or the open position, simply remove the
jumper from the pins or leave the clip on one pin only. To set jumpers
correctly, always read the manual.
Figure 2.11 shows the connections to clear a password, with one jumper
removed and lying to the left of the pins. The directions are printed directly on
the bottom left of this motherboard, and for clarity, the pins are labelled. To
clear the password for this motherboard, the jumper must be connected to
pins 1 and 2. By default, this jumper is connected to pins 2 and 3.
Page 44 of 1229
Caution
Page 45 of 1229
Figure 2.13 shows an 8-bit bus running between the CPU and RAM with the
capital letter R (binary 01010100) being transmitted between them. All bits of
a byte (8 bits) are placed on their bus wires at the same time. To pass the
letter R on the bus, voltage is placed on only three wires in Figure 2.13, while
the other five wires do not have any voltage. Also, a ninth error checking bit
might be used to verify that the data read by a component is the same data
written to the bus.
The bus in the figure is only 8 bits wide. Todays buses are much wider: 16,
32, 64, 128 and 256 bits.
0 = No voltage
1 = Voltage
Data Bus
0
1
0
1
0
1
0
0
System clock
The system clock synchronises all computer operations and provides the CPU
with a basic timing signal. Timing oscillation signals (ticks/pulses) are created
and carried by traces over the motherboard buses to ensure every component
stays synchronised.
Each tick of the clock is called a clock cycle and it is the smallest unit of time
in which any operation can occur. While components such as the CPU do two
or more operations on one tick, others only do one operation on each tick.
How fast the clock ticks is called the clock speed and it is measured in the
number of cycle ticks per second (technically called the clock frequency).
Clock frequency is measured in Hertz (Hz) and multiples thereof.
A+ Preparation | V1.0 Jan 2014
Page 46 of 1229
One Hertz is one tick of the system clock per second, one Megahertz (MHz) is a
million ticks of the clock per second, and one Gigahertz (GHz) is a billion ticks
of the clock per second.
The system clock is provided by one or more oscillator crystals on the
motherboard or chipset that vibrate at specific frequencies when voltage is
applied. The output is a sine wave that alternates at a specific frequency, such
as 66 MHz or 100 MHz.
The system clock has a clock generator that creates the timing signal and
clock multipliers that take the signal and apply a multiplication factor to it to
create different timing signals for different types of bus. For example, if a
crystal creates a 100 MHz signal and the motherboard uses a two time (2X)
multiplier, the output is 200 MHz.
Parallel and serial bus types
Components communicate over a bus by sending control, data and address
bits as electrical signals to each other. These bits are sent over the bus in one
of the following ways:
Parallel bits of data are sent over multiple wires at the same time. This
can be one-way and two-way.
Serial bits of data are sent over a single wire, one after the other. This
can be one-way and two-way.
Bus performance
A motherboard can have more than one bus, each having a different width and
each running at a different speed and so on. Bus performance is measured by
its bandwidth (also known as the data transfer rate), which is the amount
of data that can be sent over the bus at a given time. The factors that
determine the bus bandwidth, depending on whether it is a serial or parallel
bus, are:
Clock speed the speed at which the clock signal oscillates, measured in
Hz. Although many users often use the term speed when referring to the
CPU and motherboard bus, it is technically more accurate to use the term
frequency. Motherboard buses are most often measured in frequencies of
Hz.
Width the number of bits that can be sent over the bus at a given time.
For example, a 32-bit bus can carry 32 bits of data at a time and a 64-bit
bus can carry 64 bits of data at a time. The width of the data bus is called
the data path size.
Encoding mechanism the mechanism that is used to electrically
represent binary information as signals so that they can be sent over the
bus.
Note
The width of the parallel bus (32-bit or 64-bit, for instance) and the
clock speed give you its bandwidth, while the clock speed and
encoding mechanism determine the data rate for serial
communication.
Page 47 of 1229
Figure 2.14 An empty processor socket with lever and metal cover
Note
The CPU socket and the motherboards chipset determine the list of
CPUs a particular motherboard supports, since each motherboard can
only support a limited number of CPU models. Also, many
motherboards accept CPUs with different speeds. Refer to the manual
or manufacturers website to find this information.
When installed, the CPU is either covered by a heatsink or a heatsink and fan
assembly that takes heat away from it. Heat can damage the CPU and
motherboard, and therefore the CPU requires a cooling system.
2.3.2.6 Chipset
The chipset is one or more chips on the motherboard that work together to
control the flow of data and instructions between the CPU and other
components. The chipset extends the data bus and address bus to every
computer component.
Note
Page 48 of 1229
To transfer data between the CPU and various devices, the chipset consists of
memory, video, sound, network, drive, keyboard, mouse and I/O controllers.
Note
For a long time chipsets on traditional motherboards were split into two
functional groups:
Note
Communication between the CPU and RAM used to occur over what
was known as the front side bus (FSB), which ran between them.
The original FSB architecture has been replaced by newer
architectures, such as HyperTransport or Intel QuickPath Interconnect
and Direct Media Interface (DMI).
Figure 2.15 shows the configuration for one type of modern chipset. Many
modern motherboards using both Intel and AMD CPUs use one chipset and
have moved the functionality of the Northbridge to the CPU.
Page 49 of 1229
Chipsets generate heat. To take heat away from the chipset, it can be either
passively cooled with a heatsink on top, such as with the Southbridge, or
actively cooled with both a heatsink and a fan assembly on top, such as with
the Northbridge. Chipset heatsinks are considered part of the motherboard,
and depending on the motherboard you should never have to install or replace
one. However, some motherboards have an optional fan assembly that is
installed on top of the Northbridge (IOH) to keep it cool.
Tip
Chipsets have a name and model number. There are different ways to identify
a chipset:
Motherboard manual
Page 50 of 1229
Device Manager you can find chipset information under the System
devices category in Device Manager on a Windows computer. In Windows
7, click the Start button. In the Search box, type Device Manager and in
the program list, click Device Manager. Device Manager is a Windows
program that lets you view and configure hardware devices installed on or
connected to your computer. You will only see information in Device
Manager if the chipset drivers are installed correctly.
Driver: A program written for a particular type of device that tells the OS
how to communicate with that device.
CPU-Z you can find information about the chipset on the Mainboard tab
of the CPU-Z program, as illustrated in Figure 2.16.
Page 51 of 1229
Tip
The type of slots together with the chipset determine the type of RAM
you can install on the motherboard, while the capabilities of the
memory controller and the number of slots determine how much
memory you can add to it.
There are different types of RAM and each type needs its own kind of slot.
Memory is addressed in banks. The motherboard can have one or more banks,
with each bank having one or more slots. A bank must be filled completely,
that is, if a bank has two slots for example, the RAM installed in those two
slots must be identical in every way.
Although each motherboard has a different number of slots, the slots look
similar. To identify RAM slots on a motherboard, look for the following:
The module has notches at the bottom that align with keys in the slot that
prevents it from being inserted incorrectly or into an incompatible
motherboard. The most common type of module used is DIMM (Dual Inline
Memory Module). The motherboard can take only one type of DIMM and you
must know the type so that you can add or replace RAM when needed.
Figure 2.17 shows what empty RAM DIMM slots look like on a modern
motherboard.
RAM
slots
Page 52 of 1229
Motherboards, operating systems and CPUs have memory limits. You can
check the motherboard manual to see what specific type, speed and amount of
RAM the motherboard supports and the location of the slots and how the
modules must be fitted.
Cache
To speed up operations, manufacturers can add cache memory between the
CPU and RAM. Cache is a very fast kind of memory that improves performance
by predicting what data and instructions the CPU will ask for next and prefetches and temporarily stores that information before being asked. Because
only current or predicted information is stored, cache is smaller in size than
RAM.
2.3.2.8 ROM BIOS and POST
The CPU does not automatically know how to communicate with a device and
therefore needs the Basic Input/Output System (BIOS) for this. The BIOS
is complex firmware (programs coded into a chip) that allows the CPU to
communicate with fundamental computer devices.
Figure 2.18 shows two different BIOS chips. Older motherboards used a readonly memory (ROM) BIOS chip or several iterations of ROM. On modern
motherboards, the BIOS chip is a flash ROM chip called the System ROM. To
communicate with hardware, the BIOS needs many programs collectively
known as the System BIOS. ROM chips are non-volatile and do not lose their
contents when power is switched off. Also, because the BIOS is a flash ROM
chip, its contents can be changed through a process called flashing the ROM
or flashing the BIOS. This is done using software and overwriting the program
code.
Figure 2.18 A ROM BIOS chip (left) and Dual BIOS chips (right)
Note
Some motherboards support Dual BIOS and have two physical BIOS chips:
one chip functions as the main BIOS that the computer primarily uses during
boot up while the other functions as a backup that can automatically take over
during boot up when the main one fails.
Page 53 of 1229
POST when the computer boots or reboots, the BIOS runs a program
called the Power-on Self-Test (POST) which runs tests to see if all the
basic hardware needed to successfully boot the computer is working
properly. If the system is working properly, POST will not report any errors.
However, when POST does encounter an error, the system will simply stop
the boot process and will inform you by either making a series of beep
sounds that represent beep codes or display numeric or text error
messages on screen. Each BIOS manufacturer has its own set of beep
codes that can be created, so it is important to look up the meaning of the
beep code for a specific motherboard by reading its manual or by visiting
the manufacturers website. If the computer is working properly and POST
has successfully completed with no errors detected, the computer will make
either one short beep (sometimes two, depending on the manufacturer)
or on many systems, no beep. You can only hear beep codes on systems
with built-in speakers that are connected and working.
Tip
The BIOS also searches for a list of places where it can find the operating
system to which it hands over control of the system. Examples include the
hard drive, optical drive, USB drive or network.
Page 54 of 1229
You can find the name of the BIOS manufacturer, version number and date in
any one of the following ways:
Page 55 of 1229
During boot, the BIOS looks to these parameters to find out what
hardware it should expect to find.
CMOS is volatile RAM and uses a battery on the motherboard that gives it the
charge it needs to store its contents, including keeping track of the date and
time when the computer is off. Although the battery comes in different shapes
and sizes, it is generally a round coin cell battery like the one shown in Figure
2.21. The battery recharges itself when the power supply supplies the
motherboard with power. This allows the battery to usually last for years.
Page 56 of 1229
If the battery runs out of charge, gets disconnected or fails, all the information
in CMOS will be lost. When this happens, the computer cannot be used until
the battery is replaced with a new, equivalent one and the configuration
parameters are re-entered in the CMOS Setup program. Therefore, record
important information before the information gets lost. A good indication that
the battery is starting to fail is when the computer starts to lose its time or a
CMOS battery-related error message appears on screen.
When you start the computer, the first screen of text that appears on the BIOS
screen provides you with instructions on how to enter the CMOS Setup
program. These instructions, usually found at the bottom of the screen, tell
you what key or key sequence to press on the keyboard to enter the program.
You can also find these instructions in the system or motherboard manual.
Replacing the CMOS battery
The CMOS battery is considered a field replaceable unit. If you encounter a
CMOS battery-related error, if the clock resets itself every time you reboot, if
the time is incorrect, or if the system loses its CMOS parameters when
unplugged, then the motherboard battery is losing or has already lost its
charge and needs to be replaced. The steps in this demonstration exercise
show you how to replace the battery:
Note
Page 57 of 1229
If the motherboard does not use a coin cell battery and you do not
know how to remove and replace it, then go to your motherboard or
system documentation or search online for help.
Page 58 of 1229
The types of drive host bus adapters (standards) you should know include:
PATA (Parallel Advanced Technology Attachment)
The PATA host adapter allows internal PATA hard and optical drives to be
connected to the motherboard. A motherboard might have one or more PATA
headers. PATA is also known as IDE (Integrated Drive Electronics). Figure
2.25 shows two IDE headers on the motherboard that accept IDE drive data
cables.
Page 59 of 1229
Page 60 of 1229
2
3
1.
2.
3.
4.
5.
6.
AGP slot
PCIe slot
PCIe slot
PCIe slot
PCI slot
PCI slot
5
6
Figure 2.28 Types of expansion slots
On-board (I/O) ports, shield and connector modules
Motherboards have a variety of on-board input/output (I/O) ports for
connecting various peripheral devices to the computer. Ports coming directly
off the motherboard are known as on-board or integrated ports and face the
back of the case when the motherboard is installed inside the case. Figure 2.29
shows on-board I/O ports coming off the back of one type of motherboard.
Page 61 of 1229
S/PDIF port
for surround
speaker
system
Standard video
graphics
adapter port
for monitor
Bluetooth module
allowing wireless
data transfer with
Bluetooth devices
PS2 mouse
& keyboard
combo port
Audio ports
for speakers
microphone,
and other
audio sources
Wireless
network
antenna
port
eSATA port
for external
SATA drives
Figure 2.30 I/O shield that fits the motherboard ports to the case
Note
You might have to install drivers that come with the motherboard disc
before some of the ports will work. The motherboard manual will
show you a diagram of the motherboard with a description of each
port and connector.
Page 62 of 1229
Clear CMOS button a button that clears the contents of CMOS memory.
Optical drive audio connector allows the motherboard to receive audio
input from sound sources, such as optical drives.
Page 63 of 1229
Page 64 of 1229
Only stick labels on the protective parts of cables. Do not stick labels
on a circuit board, connector or electrical contact of any kind.
This exercise will show you how to remove a motherboard. For safety, it is best
to remove the motherboard before upgrading the CPU:
Page 65 of 1229
Note
1. With the computer placed on an anti-static mat on the work bench, turn the
computer off and unplug it from the wall outlet and remove the power
cable.
2. Unplug all other external cables and place a sticker with the cable name on
each cable (that is, only if you do not know where they get plugged back
into).
3. Open the case and take ESD precautions (including wearing an anti-static
wrist strap).
4. Disconnect all internal cables attached to any expansion cards after labelling
them for easy reconnection.
5. Disconnect all data cables from all drives and motherboard headers and
label each cable for easy reconnection, including its orientation.
6. Disconnect all power cables from all drives and label each one for easy
reconnection.
7. Label every expansion card, remove every card by unscrewing it from the
slot bracket, handle each card by its edges, and store each one in its own
anti-static bag.
8. Disconnect all power supply cables from the motherboard, including the
power connectors for the motherboard itself, CPU fan, PSU fan sensor
connector, case fans and expansion card connections. The new motherboard
must use the same PSU connections as the current motherboard or
otherwise a new PSU might be needed.
9. Disconnect all wire connectors and their wires leading to and from the frontand back-mounted ports and other switches, and label each one before
disconnecting them. Use the manual as a reference to properly label these
wires.
10. Remove the heatsink/fan and CPU before removing the motherboard and
place them in their own anti-static bags. Removing these parts helps to
prevent too much flexing of the motherboard and makes it easier to
remove the motherboard. However, skip this step if removing the
heatsink/fan needs a lot of downward pressure and the motherboard is
not well supported around the heatsink area.
11. Depending on your system, you might have to remove other components
to ensure that you have more than enough space to lift the motherboard
out of the case. Double check that there are no components blocking the
path for easy removal. Are any drives or drive bays in the way? Is the PSU
in the way? Remove anything that could block you from removing the
motherboard or could cause you to bump important attached components
(such as RAM modules or the CPU fan) when removing the motherboard.
The motherboard is securely mounted to the case with screws and, depending
on the case design, there might be small plastic or metal spacers as well. Also
known as standoffs or standouts, spacers separate the motherboard from
the case so that the bottom of the motherboard does not touch the case. If the
motherboard were to touch the case, it would cause an electrical short and
could damage the motherboard and power supply. Spacers help to ground the
motherboard and therefore you should use them. Figure 2.34 shows you
different types of spacers and their location at the bottom of an empty case.
A+ Preparation | V1.0 Jan 2014
Page 66 of 1229
The screws go into the spacers to hold the motherboard in place. Cases that do
not use spacers have screw holes that are elevated to prevent the bottom of
the motherboard from touching the case. For these cases, you only need to
use screws to secure the motherboard to the case.
13. Lift the motherboard up and out of the case and place it in a large antistatic bag. See Figure 2.35.
Page 67 of 1229
Some shields are removed from the back of the case and others by pushing
them into the case. Examine your shield to decide how best to proceed. Be
careful when pushing the shield out because it often has sharp edges.
Choose one that provides the most room for expansion so that devices can
be easily exchanged.
Choose one that best suits the computers current configuration, knowing
that when it comes time to upgrade, a new motherboard will most likely be
needed.
Choose one that best meets the customers current needs with little to
moderate room for expansion.
Page 68 of 1229
Technical support: Good online technical support includes driver and BIOS
updates, updated tables of CPU and RAM compatibility, frequently asked
questions (FAQs), and monitoring programs. Also, make sure the vendor
can be contacted by email, phone or by other means.
It allows you to make certain that the CPU and RAM work well with the
motherboard.
Installing these components beforehand prevents bending or what is known
as flexing the motherboard.
It can be much easier to attach the CPU fan to the CPU with the
motherboard placed on a work bench rather than trying to do it inside the
case.
Page 69 of 1229
When you insert the new motherboard, do not assume that you will
put the screws and spacers in the same place as they were in the old
motherboard. When it comes to the placement of screws and spacers,
follow the anywhere it fits rule. Just make sure the location of the
spacers or elevated screw holes match the screw holes on the
motherboard and the I/O ports of the motherboard align with the
installed I/O shield.
4. Place the motherboard inside the case and carefully line it up with the I/O
shield and the spacers or elevated screw holes.
Page 70 of 1229
Leaving a loose screw inside the case and failing to fasten any slot
cover or card in place are common causes of electrical faults. If
metal parts touch live components on the motherboard, the system
will stop working. Remove or secure any loose metal parts inside
the case.
6. Once the motherboard has been mounted to the case, with the CPU and
RAM properly installed, it is time to connect the wire connectors for the
LEDs, buttons and ports on the front panel to the motherboard headers. The
wire connectors have specific header connections to the motherboard. There
is no clear rule for finding out what the function of each wire is; often the
function is printed on the wire connector. If not, track each wire to the
LED/port/button to find out what it is used for.
You can follow a few rules when installing these wire connectors:
1st rule the LEDs have a positive side and a negative side. If they do not
work one way, turn them around and try them the other way.
2nd rule when in doubt, test each connection by guessing. Incorrect
installation only results in the component not working; it will not damage the
motherboard.
A+ Preparation | V1.0 Jan 2014
Page 71 of 1229
3rd rule with the exception of the speaker and power button, which must be
connected for the computer to power up, you initially do not have to plug in
the other connectors for the computer to work. Although many technicians
ignore the other wire connectors, it is not a best practice and should only be
done when testing.
If the power wire connector is plugged into the wrong pins on the
motherboard, the system will not start and you will not see an error
message. Check the wire connectors, motherboard or motherboard
manual to find out what the correct pinouts and installation are.
7. Connect the data cables to the hard drive and optical drive and to their
appropriate host adapters on the motherboard, respectively. Follow the
correct configuration and orientation instructions found in the motherboard
manual.
8. Connect the power cables. Follow the correct configuration and orientation
instructions found in the motherboard manual.
Depending on the power connectors the motherboard supports, you will
typically need to connect power cables for most of the following:
Hard drive and optical drive power cables coming from the PSU to the
hard drive and optical drive.
Motherboard a motherboard will always need a main power connector.
Processor motherboards will most likely need a power connector for the
CPU.
Case fans connect the power cables coming from the case fans to the
pins on the motherboard labelled Fan Header or Chassis Fan. Case fans
plugged into the motherboard can be monitored and controlled in the
Windows OS. Alternatively, some case fans use a connector coming
directly from the PSU, which cannot be monitored by the OS.
CPU fan every motherboard has a CPU fan power connector that
accepts a power cable from the CPU fan to the pins on the motherboard
labelled processor Fan or CPU Fan Header.
PCIe power some motherboards have additional power connections to
accept power connectors from the PSU to provide power to one or more
PCIe expansion cards.
Power fan connector some motherboards have a power fan connector
used for monitoring and regulating the speed of the PSU.
Page 72 of 1229
Figure 2.41 Connect motherboard power (left) and case fan power
(right)
9. After you install the motherboard and connect all wires and cables, install
the graphics card (if no on-board video exists or if you are required to do
so).
Note
10. Perhaps the most important step is to double check that all of the
connectors and cards are properly seated and connected where they are
supposed to be connected! If something is wrong, it is better to find it
now than after you have powered up.
11. If you are using a working computer that you previously stripped apart,
you can now replace the side panel and fasten it.
12. Plug the keyboard and monitor back in, plug the power cable back in, and
finally turn on the computer.
Assuming that you have done everything correctly, the computer will boot up
normally. See if the BIOS information shows up on the BIOS screen and
observe POST with no errors. If there is a problem during POST, read the
motherboard manual to see where you made a mistake. If you receive no
power at all, make sure all the necessary power connectors are plugged in. If
the fans power up but there is nothing on the screen, you could have several
problems. The CPU, RAM or graphics card might not be connected to the
motherboard properly. The only way to find the problems is to test.
Tip
Check the easy connections first (RAM and video) before removing
and reseating the CPU.
Once everything is working correctly, POST has completed successfully and the
OS loads (assuming the OS is already installed on the hard drive), log into the
OS desktop and insert the motherboard disc and run the setup program. Follow
the on-screen steps to install any chipset drivers, which might include drivers
for on-board devices such as video, network, sound and USB.
Page 73 of 1229
Current
Voltage
Resistance
Power
Energy
Definition
A complete and closed path through which current can flow.
Current is the flow of electrons through a circuit when a force is
applied and is measured in Amps (I) (or amperes). Electricity
can either be:
Direct Current (DC) electrons always flow in one direction
only around a continuous circuit. DC is the type of current that
most electronic devices, including computers, use.
Alternating Current (AC) electrons flow in both directions;
first one way then the other, around a continuous circuit. Wall
outlets supply AC.
A measurement of the potential difference between two points
in a circuit. It can be seen as the pressure that pushes
electrons through a circuit, or the pressure behind the power to
the device. Voltage is measured in Volts (V). Anything other
than the proper voltage is dangerous for the device.
The conductivity of the media the force that limits the flow of
electrons in a circuit. Increased resistance results in a decrease
in the amount of current that will flow through a conductor.
Resistance is measured in Ohms ( or R).
You can think of power as the amount of work done or energy
used up to move electrons in a given period of time. Power is
measured in Watts (W) (or wattage). Think of wattage as a
bucket of power that the attached device can take and use. A
bigger bucket simply holds more power, but does not force the
power on the device like voltage does. Power is equal to voltage
multiplied by current (W= V x I).
The amount of power that a system uses over time. This is
measured in Watt-hours or Kilowatt-hours (kWh).
Page 74 of 1229
Capacitor stores an electrical charge for some time and releases it when
needed. When power is given to the capacitor, it charges up; when power is
switched off, the capacitor lets go of its charge very slowly. Therefore, the
capacitor can still keep its charge long after power to it has been cut off.
Figure 2.43 shows a type of capacitor on a motherboard.
Page 75 of 1229
Page 76 of 1229
Caution
A PSU has capacitors that store charges for long periods after being
unplugged from the wall outlet. Therefore, a PSU is not userserviceable. Thus, do not attempt to open and work on a PSU
unless you have the necessary knowledge, training, tools and
experience to do so. The PSU is a field replaceable unit; it should
be replaced and recycled when it goes bad.
The PSU gets plugged into the AC wall outlet using a suitable power cable. The
plug on the power cable must be fitted with a working fuse of the correct
rating (typically 3A or 5A) and it must be suited to the country you are in. The
power cable gets plugged into the PSUs standard connector. South African
voltage requirements are 220-240V.
2.4.2.1 Choosing a PSU
Consider the following PSU features and power characteristics when choosing a
PSU:
Form factor
The form factor of the PSU determines its compatibility with the motherboard
by the type and number of power connectors it provides, and the case in terms
of how much space it needs plus the location of screw holes and fans. When
choosing a PSU, match the form factor (size and shape) to the case and
motherboard.
Most PSUs are based on the ATX form factor. The most common standard size
is 150 mm wide x 86 mm high x 140 mm deep for ATX PSUs.
The demand for smaller and quieter computers has led to the development of a
number of smaller form factor (SFF) PSUs that use standard ATX connectors
but differ in size and shape from the standard ATX PSU and cannot give the
same amount of power as the standard ATX PSU. Here are some of the
common speciality types of PSUs:
On/Off switch
Many ATX PSUs have an On/Off switch on the back that ensures no power is
being sent to the components. If you really need the computer to shut down
with no power to the motherboard, use this switch. See Figure 2.45.
A+ Preparation | V1.0 Jan 2014
Page 77 of 1229
When this switch is turned off, the computer cannot be turned on with the
power button on the front panel.
Power cable connection
On/Off switch
Figure 2.45 A typical power supplys switches and connections
Caution
Soft power
The power button on the computers front panel simply tells the computer
whether it has been pressed. The BIOS or OS takes over from there and
handles the task of turning the computer on or off. This is called soft power
and it prevents the computer from being turned off before the OS has shut
down properly. It also enables the computer to use power-saving modes that
put the computer to sleep or wake it up and to shut it down if pressed long
enough. The most important parameter for ATX soft power resides in CMOS
Setup. Boot into CMOS and look for a Power Management screen.
Note
Voltage selection
It is vital that the PSU is set to the correct input voltage according to the
country. Some PSUs come with a voltage selector switch (often a red
switch), as shown in Figure 2.45, that you can use to adjust the voltage level.
Some are auto switching (auto-sensing) and can detect the incoming
voltage and automatically switch to that voltage accordingly, while others can
only accept one type of input voltage (fixed).
Page 78 of 1229
Caution
Page 79 of 1229
Many manufacturers offer PSU models that range from 300 watts to
over 1000 watts.
Components only take what they need from the PSU and no more.
Therefore, if you buy a 500W PSU and install it into a computer that
only needs 250W, the PSU will only supply 250W to the computer.
Therefore, buying an efficient, higher wattage PSU has two benefits: running a
PSU at less than 100% load helps it live longer and gives the computer plenty
of extra power for any additional components to the computer.
Page 80 of 1229
When building a computer, you need to work out the precise wattage needed
for everything connected to the computer, with an extra 30% or more wattage
to spare. You can find out the wattage rating you need for your PSU in one of
the following ways:
Note
Page 81 of 1229
Page 82 of 1229
Page 83 of 1229
Connector
If the PSU does not have a connector that you need, there are adapters
available to convert one type of connector to another type. Figure 2.49
illustrates a Molex-to-SATA adapter (left) and an adapter that converts two
Molex cables to a single 6-pin PCIe connector (right).
Page 84 of 1229
If the PSU only has one rating, assume that it is the peak rating. To calculate
the actual rating, take the peak rating and subtract between 10% and 15%
from it.
Cooling
There are many parts inside the PSU that work to convert AC to DC and they
create a lot of heat. This is why most PSUs have one or more fans inside them
while others use heatsink technology.
Fans can be mounted on the back or bottom of the PSU. You can even find
quiet PSUs with fan sensors that react to the temperature inside the computer,
which either causes the fans to speed up when necessary or run slowly and
silently when not. The fan sensor connector plugs directly into the
motherboard as shown in Figure 2.51.
Page 85 of 1229
Warranty
Consider the warranty and the overall quality of the PSU, that is, form factor,
wattage rating, cabling, connectors, cooling and protection.
Tip
It has the same PSU connectors and pinouts as the original so that it is
compatible with the motherboard and other components.
It has the same or compatible form factor (shape, size and switch location).
It has the same or higher wattage rating. A higher rating is highly
recommended.
It supports any special features needed by the motherboard, CPU, graphics
card and so on.
This exercise will show you how to remove and install a PSU:
Note
1. Shut down the computer. If the PSU has an On/Off switch, turn it off as
well.
2. Disconnect the AC power cable from the PSU and remove all external
cables.
3. Place the case upright on a flat surface.
4. Open the case to see the PSU, which might be as simple as removing the
cover or as involved as removing both of the side panels, front panel and
case lid. Look at the documentation that came with the computer or PSU to
see how to find and remove the PSU.
5. Disconnect the PSU from the motherboard. To do this, the catch securing
the PSU connector must be released to allow the connector to be removed.
6. Disconnect the PSU from all drives and cards.
7. Disconnect the PSU from the case and CPU fans. Ensure that all other PSU
cables are disconnected.
A typical PSU is attached to the case by several screws that attach the PSU to
the back panel of the case. See Figure 2.52. The PSU might also be supported
by a shelf inside the case with screws securing it to the case.
A+ Preparation | V1.0 Jan 2014
Page 86 of 1229
Page 87 of 1229
Page 88 of 1229
11. Check that all hard and optical drives are working (missing the power to
an optical or second drive might not immediately be obvious after a boot).
When working on an ATX PSU, you may find using the power button
inconvenient because you are not using a case or you have not bothered to
plug the power buttons wire connector into the motherboard header. In such a
situation, you can use a screwdriver to jump short the two power wire
headers on the motherboard momentarily to start the system. It will not
damage the motherboard if done correctly because this is what the power
button wire connector does. You can also short the same two headers
momentarily to power down the motherboard.
Page 89 of 1229
Page 90 of 1229
Single ended signalling each signal travels on one wire while another
wire functions as a common ground. This method is not good at dealing
with any electrical interference and is used by older bus types, such as
serial, PS/2 mouse and keyboard ports or video graphics array (VGA)
display ports.
Differential signalling signals are sent as the difference between
voltages on a pair of wires, and the two wire voltages are compared at the
receiving end. This helps reduce or prevent electrical interference from
anything that disrupts of changes the signal, and it allows the use of lower
voltages, reducing power consumption and heat. This method is used by
newer buses, such as USB, Firewire and PCIe.
Parallel
3
4
5
Serial
1
Page 91 of 1229
Parallel sends multiple data bits over multiple wires at the same time
(one wire for each bit). Keeping with the 8 bits = 1 byte nature of
computer data, most parallel bus types use multiples of 8, such as 32 bits
and 64 bits. Parallel communication is used by older bus technologies.
Serial sends data one bit at a time, one bit after the other, working at a
higher frequency (speed). Serial communication is used by modern bus
technologies.
3.1.2 Hertz
Hertz (Hz) measures the transmission frequency (or speed) of signals in cycles
per second (or electrical changes each second). It is commonly used to
measure various speeds, including the CPUs clock speed. Megahertz (MHz) is
equal to 1000 Hz, and Gigahertz (GHz) is one million Hz or 1000 MHz. Table
3.1 shows the most common multiples of Hertz used.
Table 3.1 Hertz
Abbreviation
Name
Multiples of
Hz
KHz
MHz
GHz
THz
Hertz
Kilohertz
Megahertz
Gigahertz
Terahertz
One
One
One
One
thousand
million
billion
trillion
Analogue signal
Page 92 of 1229
Note
Since computers only process digital data, they need digital input.
Therefore, the computer needs to translate between analogue and
digital signals for some types of communication.
101 = 10
102 = 10 x 10 = 100
103 = 10 x 10 x10 = 1000
And so on.
21 = 2
22 = 2 x 2 = 4
23 = 2 x 2 x 2 = 8
And so on
Page 93 of 1229
Base
2
10
16
Values
0 and 1
0, 1, 2, 3, 4, 5, 6, 7, 8, 9
0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B, C, D, E, F
128
64
32
16
As you can see, the numbers 1, 2, 4, 8, 16, 32, 64 and 128 are placed in the
reverse numerical order, and then the binary value is written below it. 1, 2, 4,
8, 16, 32, 64 and 128 are called the powers of 2 because you multiply the
number 2 by itself. Binary values are read from right to left and the positions
represented by the 1s are added together to represent the decimal value.
2. To convert, you simply take the decimal value from the top row only where
a 1 appears in the binary value below it, and then you add the values
together. For instance, in our example we have 128 + 16 + 8 + 4 + 1 =
157.
Decimal
Binary (8 bits)
Answer
128
64
32
16
128
+0
+4
+0
+1
+0 +16 +8
= 157
Page 94 of 1229
For a 16-bit value, you use the decimal values 1, 2, 4, 8, 16, 32, 64, 128, 256,
512, 1024, 2048, 4096, 8192, 16384, 32768 (powers of 2) for the conversion.
Table 3.3 shows you how to count from 1 to 10 (decimal) in binary using the
same method above where a 1 bit appears.
Table 3.3 Decimal-to-binary conversion
Decimal
0
1
2
3
4
5
6
7
8
9
10
Binary
00000000
00000001
00000010
00000011
00000100
00000101
00000110
00000111
00001000
00001001
00001010
256
128
64
32
16
2. First, you will find that 256 is bigger than 234 but 128 is not. Place a 1 in
the 128 column.
3. Subtract 128 from 234 = 106. Place a 1 in the 64 column because it is
smaller than 106.
4. Subtract 64 from 106 = 42. Place a 1 in the 32 column because it is smaller
than 42.
5. Subtract 32 from 42 = 10. Place a 0 in the 16 column because it is bigger
than 10. Place a 1 in the 8 column because it is smaller than 10.
6. Subtract 8 from 10 = 2. Place a 0 in the 4 column because it is bigger than
2. Place a 1 in the 2 column because it is equal to 2.
7. Subtract 2 from 2 = 0. Place a 0 in the 1 column because it is smaller than
0.
8. Decimal 234 equals 11101010 (in binary for 8 bits, not counting the 256
column).
Page 95 of 1229
Hexadecimal Binary
0
1
2
3
4
5
6
7
8
9
A
B
C
D
E
F
0000
0001
0010
0011
0100
0101
0110
0111
1000
1001
1010
1011
1100
1101
1110
1111
Binary calculations
0
1
2
1+2=3
4
1+4=5
2+4=6
1+2+4=7
8
8+1=9
2 + 8 = 10
1 + 2 + 8 = 11
4 + 8 = 12
1 + 4 + 8 = 13
2 + 4 + 8 = 14
1 + 2 + 4 + 8 = 15
Page 96 of 1229
Figure 3.3 Converting 79 into hex and into binary using a Calculator
Note
Keep in mind that the calculator will drop any leading zeroes. Also,
when converting decimal to binary, it will only show a limited number
of binary numbers, so for long numbers, it is best to work on bytes or
octets.
Abbreviation
b
B
KB
MB
GB
TB
PB
EB
ZB
Size
Single binary value (1 or 0)
= 8 bits
= 1024 Bytes
= 1024 KB
= 1024 MB
= 1024 GB
= 1024 TB
= 1024 PB
= 1024 EB
Page 97 of 1229
You may be wondering why kilobyte, megabyte, gigabyte and terabyte do not
equal exactly one thousand, million, billion and trillion bytes respectively. Kilo
literally means thousand, so you would think that one KB would be one
thousand bytes. However, the bytes are calculated by using binary with the
formula of 210 (or 2 x 2 x 2 x 2 x 2 x 2 x 2 x 2 x 2 x 2). If you enter these
numbers into a calculator, you will see that it works out to 1024. The same
applies to MB, GB, TB, PB, EB and ZB but with more 2s.
Bits and bytes and other measurements are used in different ways:
Note
Page 98 of 1229
Metre (m) a unit of length where 1m = 100 cm. Metres can be used to
measure many components that run for long distances, such as cable
lengths. 1000 metres = 1 kilometre (km).
ASCII
00110000
00110001
01000001
01000010
00101011
00100001
English
9), and
enough
such as
3.3.1.2 Unicode
Sending files to another user whose computer does not use exactly the same
encoding as yours results in all of your language-specific characters getting
transformed into some other characters that do not make sense in your file.
This leads us to Unicode.
Page 99 of 1229
Port
Jack
Plug (or
connector)
Front
Back
Newer parallel interfaces are covered by the IEEE 1284 standard. The
Institute of Electrical and Electronics Engineers (IEEE) is a standards-setting
group that publishes computer bus and networking standards.
Speeds range from 150 KBps for Standard mode, 2 Mbps for Extended
Capabilities Port (ECP) mode and 2.5 MBps for Enhanced Parallel Port (EPP).
The maximum length of a standard parallel cable is 5m and IEEE 1284 cable
is 10m, with data speeds dropping with longer cables.
Figure 3.8 shows a parallel port and two types of parallel connectors.
25-pin female DB25 (D-sub)
port
When adding or removing devices from PS/2, serial and parallel ports,
you might have to shut down the computer first, add or remove the
connector and then start the computer again.
Duplex: Duplex simply means being able to send and receive data. Halfduplex allows a device to send and receive data in both directions, but only in
one direction at a time. In contrast, full-duplex allows a device to send and
receive data in both directions at the same time.
o You can plug any USB device into any USB port and it will work, but you
can only get 3.0 speeds when you plug a USB 3.0 device into a 3.0 port.
Possible combinations include:
USB 1.1 or 2.0 device in a USB 3.0 port. This will work at the devices
speed. For example, a 2.0 device will run at 480 Mbps.
USB 3.0 device in a USB 2.0 port. This will work at the USB 2.0 speed
of 480 Mbps.
USB 3.0 device in a USB 3.0 port. This is the only combination that
allows the full theoretical 5 Gbps speed. USB 3.1 will be backwardcompatible with older USB devices, with fully backward-compatible
cables and connectors.
The maximum length for a USB cable attached to USB 1.1 devices is 3 m
and for high speed USB 2.0 it is 5 m, while the recommended cable length
for SuperSpeed USB 3.0 is 3 m.
There are two types of standard push/pull USB connectors:
o Type A plugs into the computers USB port and is used by external USB
hubs to support USB devices.
o Type B plugs into a device.
USB Standard connectors. Each has USB Mini connector designed for
4 pins, two for power and two for
smaller devices like cameras. It has 5
data.
pins. One pin supports USB On the Go
(OTG) which allows a device such as a
smartphone to work as a device when
Type B for
connected to the computer or as a host
device end
when connected to a keyboard or
printer. OTG provides easy switching
Type A
between the host and device roles.
for
computer
end
Mini B
Micro B
USB 3 Type
A for
computer
end
Micro A
USB ports built into the computer are connected to USB root hubs. Each root
hub is controlled by a Standard OpenHCD USB Host Controller (for USB 1.1),
Enhanced Host Controller (for USB 2.0) or Extensible Host Controller Interface
(xHCI) for USB 3.0. The other type of USB hub you might see in Device
Manager is a Generic USB Hub. A generic hub allows you to connect multiple
devices to the same USB port and to increase the distance between the device
and the USB port (it simply splits one USB port into multiple ports).
Open Device Manager in Windows 7 and expand the Universal Serial Bus
(USB) category by clicking the plus (+) sign. As you can see from Figure 3.11,
this computer has two USB Enhanced Host Controllers that support USB 2.0
ports, two Generic USB hubs and a USB Mass Storage Device because a flash
drive is plugged into the computers USB port.
Different types of USB devices draw different amounts of power. To see how
much power a particular USB device draws, in Device Manager double-click the
device for the hub that the device is connected to and click on the Power tab.
Figure 3.12 shows the power needed for the USB Mass Storage Device that is
plugged into the computer.
SCSI chain also known as the SCSI bus, the chain is a series of SCSI
devices working together through a host bus adapter. Up to 8 or 16 internal
or external devices (or both) can be attached to a single chain.
SCSI ID when the host adapter receives data for a particular device, it
references that device by its unique ID. The SCSI ID allows each device to
share the same SCSI chain and each device is assigned a priority. The SCSI
ID can range from 0 to 7 or 0 to 15.
Termination both ends of the SCSI bus must be terminated so that when
a signal is sent down the SCSI bus, the terminator at the end of the bus can
absorb it. See Figure 3.14.
External chain
Optical drives
Internal chain
Scanner
Hard drives
Terminate last devices that
make up both internal and
external chain
SCSI standards there are many SCSI standards which differ in device
speed, bus widths, cable lengths and other technical details. Depending on
the standard, SCSI bandwidth can be up to 320 MBps, bus widths from 8-bit
to 16-bit, and maximum cable lengths from 1.5 m to 25 m. The two general
categories of all SCSI standards used on computers have to do with the
width in bits of the SCSI bus, either 8 bits (narrow SCSI) or 16 bits (wide
SCSI).
SCSI cable there are different types of SCSI cables and connectors
available. Internal cabling uses a ribbon cable with several keyed
connectors that are attached to computer devices (the order is
unimportant), with one connector attached to the host adapter. External
cabling uses thick, shielded external SCSI cables that run from the host
adapter to each device in a process called daisy-chaining. Each device has
two ports on it.
The following symbols denote the various SCSI ports, with the SCSI SE symbol
(the first symbol on the left) used by most SCSI devices.
Image
This exercise provides the general steps to install a PnP SCSI host adapter
card:
1.
2.
3.
4.
Turn off the computer and unplug all cables. Take ESD precautions.
Open the case, ensuring that the motherboard slots are facing you.
Remove the appropriate slots blanking plate.
Check the documentation that comes with the card and make any needed
adjustments in the PnP configuration in the CMOS Setup program before
installing the card. You might need to change parameters for the card.
5. Handle the card by its edges and then install it into the correct expansion
slot. Secure the card in the slot.
3.5.3 FireWire
FireWire, based on the IEEE 1394 standard, sends data at high speeds over its
serial bus, making it ideal for streaming real time video and voice data
between devices. It can connect computers to each other, digital devices such
as hard drives and scanners to computers or devices to each other.
Take note of the following points about FireWire:
The FireWire bus is powered and supports PnP and hot swapping.
Although FireWire is compared to USB, there are differences between them
in their connectors, functionality, maximum devices, cable lengths, speeds,
etc.
Figure 3.16 1394a 6-pin (left) and 4-pin (right) connectors and ports
1394b uses a 9-pin powered connector for high-speed devices. There are two
versions of the 1394b connector and port. The beta connector and port is used
only for 1394b-to-1394b connections, and the connector has a wide notch at
the top of the connector and port. The bilingual connector and port is used for
1394b-to-1394a or 1394b-to-1394b connections, and has a narrow notch at
the 1394b connector end of the cable and uses either the 4-pin or 6-pin 1394a
connector at the other end of the cable.
1394a 6-pin
connector
1394a 4-pin
connector
1394b beta
connector
1394b bilingual
connector
Most modern monitors use liquid crystal display (LCD) technology, which
accepts digital signals only.
Digital connectors are quickly replacing analogue because they make both the
monitor and the video adapter cheaper, provide a clearer signal because there
is no analogue to digital conversion, and the installation is easier. Many
monitors and video adapters only support digital signals, but there are
monitors that support both digital and analogue connections.
The main computer video ports and connectors are discussed next.
In short, frames per second (fps) refer to how many still images
(frames) the video adapter can output to the displayed per second
and is expressed in Hertz.
3.6.4 DisplayPort
Take note of the following points about DisplayPort:
DisplayPort is a royalty-free display interface that uses less power than
other interfaces and is designed to replace VGA and DVI and complement
HDMI.
DisplayPort can be used to send both audio and video at the same time, but
each one is optional and can be sent without the other. It sends packetised
data, much like a network.
The DisplayPort connector is found on some computer and laptop models.
Its bandwidth can be allocated in lanes with each lane given a different data
rate. The maximum data rate for a 4-lane link is 17.28 Gbps.
DisplayPort supports various features such as 3D and high-bandwidth
digital content protection (HDCP). HDCP protects the video content sent
between the video source, such as the computer port, and the display by
encrypting the connection.
DisplayPort supports both copper and fibre-optic cabling and multiple
monitors (daisy-chained) on the same cable.
DisplayPort uses a 20-pin connector. The DP++ (dual mode) port allows a
connection to DVI-D and HDMI devices using a suitable adapter cable. See
Figure 3.21.
Component
S-Video
Composite
Figure 3.25 DVI-I to VGA (top and bottom left) and DVI-D to HDMI
(top and bottom right)
Grey/brown
Output
additional side speakers.
for
Note
3.8.1 Keyboard
A keyboard lets you enter data and send commands to the computer or
mobile device. There are different models that come in different shapes and
sizes, and the exact layout of the keys can vary between them. Most
keyboards use the 104-key keyboard layout, which includes the <Windows>
keys on the sides of the Spacebar and a <Right-click> key next to the <Ctrl>
key.
The keyboard has characters printed on each of its keys. Pressing each one
creates the letter, number, symbol or other function printed on it. To create
some characters requires pressing and holding multiple keys at the same time
or in a specific order. Figure 3.30 shows a keyboard.
3.8.2 Mouse
A mouse is a pointing device that lets the user move a graphical pointer on
screen to choose graphical items. A mouse places its motion detection
mechanism on the bottom, requiring the user to move the entire mouse to
move the on-screen pointer or cursor. The mouse has multiple buttons that
can be pressed and released to act on whatever the user is pointing to on
screen. These buttons can be changed for different functions. The three main
types of mouse are:
Mechanical mouse has a round ball at the bottom that rolls on a flat
mouse pad in any direction. Rollers detect the balls movement, and
circuitry translates the movement into signals that cause the on-screen
pointer to move in the same direction as the ball. To access the ball and
rollers, turn the mouse upside down and remove the protective cover.
Optical mouse uses light emitting diodes (LEDs) as its electronic light
source to track the movement of the mouse over a surface.
Laser mouse uses an infrared laser to detect the mouses movement over
a surface.
There are different mouse models that come in different shapes and sizes and
numbers of buttons, with smaller types of mouse available for portable
devices. Like a keyboard, a mouse uses a USB, PS/2 or wireless (infrared or
Bluetooth) connection. The standard mouse has at least two buttons and a
scroll wheel as shown in Figure 3.32:
The wheel is used
to scroll up and
down through
screens of
information and is
a clickable button.
The primary mouse
button, usually the left
one, is used to select
and highlight items and
text.
There are also touch-based mouses available like the one shown in Figure 3.33
designed for portable devices. The mouse in Figure 3.33 has sensors and a
blue LED beam at the bottom that reads the surface it moves over as well as a
large touch-sensitive surface that responds to one-, two- and three-fingered
movements (called gestures).
Modern gamepads and joysticks communicate with the computer using USB or
wireless. Wireless connections typically use a wireless USB dongle, similar to
those used with wireless keyboards and mouses.
Depending on how complex the controller is, you might have to install drivers
that come with the gamepad or joystick to get it to work. Simpler controllers
can probably get by using the default drivers included in the OS. You will need
to configure the gamepad or joystick in Windows to make sure all the buttons
and controls work properly. You might also need to configure the controller
from within the game you want to play.
Tip
Resistive panel has a glass panel coated with two main layers of
electrically conductive and resistive material that face each other with a
very small gap between them. When you touch the touch screen, the two
layers are pressed together and the horizontal and vertical lines on the two
layers register the exact location of your touch, allowing an electrical signal
to be generated and sent to the device. Resistive screens are not as clear as
capacitive screens.
Infrared panel uses LEDs that send out beams of light to form a grid over
the surface of the screen and sensors that detect the light beams. When
you break the beams of light travelling across the screen with your touch,
the location of the break can be determined.
1. Shut down the computer and disconnect it from the power outlet.
2. Connect the touch screen monitor to the appropriate video port on the
computer.
3. Connect the USB cable to the touch screen and to the port on the computer.
4. Turn the computer on and install the driver for the touch screen interface.
A digitiser (also called a graphics tablet) enables you to draw, paint, ink or
pencil on a tablet using a stylus. See Figure 3.41.
The digitiser receives input using a special surface. When you press against the
surface using the stylus, the surface transforms the analogue movements into
digital information, which the drawing application turns into an image on
screen.
Most digitiser tablets connect to the computer through a USB or wireless
connection. You will need to install drivers before you connect the digitiser. The
digitiser should also come with a configuration program that allows you to
adjust the sensitivity of the stylus, configure buttons on the tablet, and
configure other parameters. You might need to install a graphic arts application
as well.
Figure 3.43 Playing a game using the Leap Motion gesture controller
The current focus in gesture recognition includes:
Facial gesture recognition the device can recognize and store images
and videos of your face to perform tasks.
Eye recognition or eye tracking the process of measuring either where
your eyes are looking at or the movement of your eyes relative to your
head.
Each device needs its own set of system resources that allows it to
communicate with the CPU and memory. Software also uses certain system
resources to communicate with hardware, and vice versa. The main types of
system resources are listed in Table 3.7. All of the system resources depend on
certain address and control lines on the bus on the motherboard.
Table 3.7 System resources
System
resource
I/O address
Memory
address
IRQ
(interrupt
request)
DMA channel
Note
Definition
Also known as a port address, the I/O address tells the
CPU where to look in memory to communicate with the
device. The address is referred to using a hexadecimal
address in a range of 0000-FFFF, although references to
I/O ports are made using the start address only, such as
03F8 or 3F8h (for hexadecimal).
A memory address is assigned to memory that allows
software to access specific areas of memory. When the
driver loads, it lets the CPU know which block of memory
should be set aside for the exclusive use by the device.
Memory addresses are usually shown in a hexadecimal
range, such as 00F0000000FFFFF.
An IRQ is voltage that a device places on a line to signal to
the CPU that it should process its request. When the CPU
receives an IRQ, it stops whatever it is doing as soon as
possible and determines how to handle the request. When
requests come in, special interrupt controllers prioritise the
competing requests, favouring lower interrupt numbers
between 0 and 15, making IRQ 0 the highest priority. The
priority of the request is determined by the IRQ number
assigned to the device. Each device is given its own
interrupt to use when interrupting the CPU, although some
devices can share an interrupt with each other.
Allows a storage device or expansion card to directly
communicate with memory without going through the CPU.
This allows fast data transfer rates.
You can also use the Control Panel or manufacturer software to configure
the device. The Control Panel program in Windows has many programs
called applets that you can use to see and change hardware, software,
user and other computer settings. See Figure 3.47.
Follow the correct installation and removal procedures!
PCI is an older bus standard that has mostly been replaced by PCI Express
(PCIe).
PCI supports many different cards, including network, video, sound, I/O and
storage adapter cards for SCSI, PATA and SATA.
PCI supports up to 5 devices (each of which can have 8 different functions).
PCI devices support PnP and bus mastering allowing devices to control
the bus and transfer data directly to RAM without going through the CPU.
The PCI bus uses its own internal interrupt system for dealing with requests
from cards, which is handled by the PCI BIOS. The PCI BIOS can assign
multiple PCI devices with the same IRQ (called PCI steering) without
causing resource conflicts.
PCI has multiple versions (PCI and PCI 2.x).
PCI has a 32-bit or 64-bit wide parallel bus, capable of transferring data 32bits or 64-bits at a time, working at 33.3 MHz or 66 MHz bus frequency and
achieving data rates of 133 MBps up to 533 MBps.
The bandwidth on a PCI bus is shared by all components connected to it and
only one component can make use of the bus at one time.
Older desktop computers commonly support 32-bit slots and cards, and
servers support 64-bit slots and cards.
PCI slots can deliver up to 25 watts of power to the expansion card.
PCI slots and cards are manufactured in 3.3 and 5V versions. You cannot
plug a 3.3V card into a 5V slot or a 5V card into a 3V slot. Universal (dual
voltage) cards are keyed to fit in slots based on either of the two voltages.
32-bit 3V cards can be plugged into 64-bit slots.
The slots are easily recognisable because they are short and usually white.
Figure 3.48 shows the PCI expansion cards and slot orientation.
PCIe has three major versions, 1.x, 2.0 and 3.0, with plans announced for
4.0 supporting faster speeds per lane. For the first three versions, a single
lane (x1 slot) operates in each direction or transmits and receives from
either communicating device at full duplex, at a data rate of 250 MBps for
PCIe 1.x, 500 MBps for PCIe 2.0, and 1 GBps for PCIe 3.0. The more lanes
you have, the more data gets sent in a given time. Combining lanes results
in an upward multiplication of these rates. For example, PCIe graphics cards
have 16 lanes that provide a transfer rate of 4 GBps (16 x 250 MBps).
Although MBps is used here, PCIe speeds are often measured in transfers
per second, and all the PCIe versions achieve speeds in the gigatransfers
per second (GT/s) range.
The most powerful PCIe slots with the highest data transfer rates connect
directly to the Northbridge; the lesser PCIe slots connect to the
Southbridge.
PCIe 1.x can supply 150W (75W from pins on the expansion slot with an
extra 75W from a 6-pin connector from the PSU). PCIe 2.x slots supply
power up to 150W and another 150W from an 8-pin auxiliary connector
from the PSU.
PCIe supports hot swappable and hot pluggable expansion cards.
PCIe 2.0 motherboards and cards are compatible with PCIe 1.x, but to
achieve full performance, use PCIe 2.0 cards in 2.0 slots.
Compatibility is important: a x1 card can go in a x1 or larger slot but a x16
card currently only fits in a x16 slot.
PCIe slots almost always have a plastic extension that does not include any
pins but does help the card fit snugly and prevent it from working loose.
You will not find the version of a PCIe slot or card by looking at it. You will
have to refer to the system documentation, motherboard manual or cards
user manual, or visit the manufacturers website.
PCIe x4
slot
PCIe x1slots
You will not find AMR and CNR slots on modern motherboards
because current systems use built-in components or have PCIe slots
for modems, sound and network cards, and USB ports.
1. Read the cards documentation. For most cards, you first install the card
and then install the driver afterwards but this might not be the case for all
cards.
2. If installing a card to replace an on-board port, access the CMOS Setup
program and disable that port.
3. With the computer shut down and all the external cables disconnected,
press the power button to drain power.
4. Remove the case cover. If the case has a one piece design, remove the
entire case; otherwise for a tower case, remove the one side panel only.
Ensure the expansion slots are facing you or upwards.
5. Find the appropriate type of slot you plan to use and remove the slot cover
for that slot (if needed). Most slot covers are held in place by screws that
fasten the cover to the back of the case. However, some systems use
different methods.
6. Remove the slots blanking plate. The blanking plate snaps or punches out,
and sometimes you have to remove the screw from a slot cover to remove
the blanking plate. Examine the case for the correct removal procedure.
Keep screws in a container.
When voltage is applied to the liquid crystal, it untwists, changing the lights
orientation and causing more of it to be blocked. The more voltage that is
applied, the more the liquid crystal untwists and the more light is blocked.
Each pixel has three cells (sub-pixels): one red, one green and one blue, as
shown in Figure 3.60.
Seal
Cathode
Emissive layer
Conductive layer
Anode
Substrate
Light
There are Active Matrix (AMOLED) and Passive Matrix (PMOLED) types:
AMOLED are better quality screens than PMOLED but need a thin film
transistor (TFT) backplane to switch each individual pixel on or off to
produce light. See Figure 3.62.
Throw - the size of the image at a certain distance from the screen. You
need to consider the recommended minimum and maximum throw
distance.
Note
After turning off the projector, it is best to leave it off for at least a
few minutes before turning it back on again, so as to ensure that the
lamp has cooled down.
3.15.6 3D displays
Improvements in display technology and graphics processing have led to
several 3D output devices, including 3D display screens, TVs, laptops, mobile
devices and game consoles. The newest 3D displays use filters, prisms, lenses
and other parts built into the screen to create the 3D effect and as a result, the
user does not have to wear 3D glasses or other gear to experience the 3D
effect. Figure 3.68 shows a picture of a 3D display.
Resolution
Native
resolution
Dot pitch
Description
Short for picture element, a small dot that can be turned
on and off and joined with many other dots to create the
image on screen. A pixel must be made up of at least one
red, green and blue phosphor (triad) to create any colour.
With more pixels, you can see more of the image and in
more detail.
The number of pixels used to create the image and
addressed by software. Shown as the number of horizontal
(across) pixels times the number of vertical (up and down)
pixels. Values can range from hundreds to thousands of
pixel counts for high-end displays. You can find out how
many pixels are on the screen by multiplying the values
together: 1024x768 = 786 432 pixels per screen. CRT
monitors and graphics cards are designed to use several
resolutions up to a maximum one. A higher number of
pixels results in a higher resolution and an overall better
image.
A single fixed resolution, such as 16801050, that enables
LCD monitors to display the sharpest picture possible.
Setting an LCD monitor to a different resolution other than
the native one can severely degrade image quality, causing
the image to appear fuzzy. See the monitors
documentation to find the native resolution.
For CRTs, the distance between two adjacent phosphors of
the same colour (e.g. red and red), measured in
millimetres.
Characteristic
Screen size
Aspect ratio
Refresh rate
Response rate
Brightness
Contrast ratio
Viewing angle
Description
The diagonal length of the screen surface, measured in
inches. CRT monitors provide two numbers: The monitor
size measures from two opposite diagonal corners of the
plastic case (bezel). The viewable image size (VIS)
measures one edge of the actual screen to the opposite
diagonal side of the screen. LCDs use the viewable image
size. Common sizes are 15, 17, 19 and 21 with 30+
available.
The screens width divided by its height. The common
resolutions, such as 1024768, 1280960, 12801024,
and 16001200, match a 4:3 ratio. For example, for a
display that supports 4:3 ratios, such as 1024768, if you
divide the first number by 4 and multiply the result by 3, it
equals the second number. This means that for every 4
pixels running horizontally, there are 3 pixels running
vertically. Depending on screen resolution, widescreens can
have varying aspect ratios of 10:6, 16:9, 16:9.5 or 16:10.
Refers to how quickly the monitor updates or redraws the
screen, measured in Hertz (Hz) or times per second.
Refresh rates for CRT monitors vary from 60 Hz or more,
with 75 Hz or higher causing less flicker on screen and are
ideal. There is no need to freshen up a dot on an LCD
display because each one has its own transistor to light it
up; it is on or off. The refresh rate for an LCD monitor
refers to how often a screen can update completely.
Standard LCDs have a 60 Hz rate with models featuring 120
Hz and 240 Hz.
The amount of time it takes for a pixel on an LCD monitor
to change colour, to go from pure black to pure white and
back again, measured in milliseconds (ms). The lower the
response time the better, with better quality monitors
having 8 ms times or less.
Luminance is how bright the screen appears to your eyes,
measured in nits or candelas per square metre (cd/m2).
Typical LCDs fall between 200 and 300 cd/m2, with 500
cd/m2 or better designed for gaming and home theatre
systems.
The difference in the amount of light between the brightest
(white) colour and the darkest (black) colour that the
monitor can display. For example, a contrast ratio of 600:1
means that the white areas are 600 times the brightness of
the black areas. The higher the ratio the better.
The degree of angle at which you can see the screen from
the sides and top and bottom, and continue to see clearly
defined images and accurate colours.
Characteristic
Colour depth
Description
Also known as bit depth, it describes the number of bits
that represent colour. Common colour depths include 4-bit
(16 colours), 8-bit (256 colours), 16-bit (65, 536 colours)
24-bit (16, 777, 216 colours), 32-bit (4,294,967,296
colours), 30-bit, 36-bit and 40-bit (billions of colours).
Gloss screens give a sharper contrast, richer colours and wider viewing
angles compared to matte screens. Each manufacturer has a different name
for gloss coatings. The drawback is that they can take external light from
nearby objects and shine on your eyes, resulting in glare (which can
negatively affect your eyes). Antiglare covers or filters are available that
you can fit over the front of the display screen to avoid glare caused by light
sources.
Matte screens give a good richness of colour and reduction in glare by
scattering light. A drawback to scattering light results in reduced contrast
and brightness and a narrower viewing angle when compared to gloss,
which can seem like the screen is blurred.
Whenever a known display mode starts with the letter W, it means wide
screen formats (16:9 or 16:10). When it starts with the letter Q, it means the
horizontal and vertical resolutions are each doubled, making a final resolution
four times (quadruple) the number of pixels compared to the original standard.
The letter H for hexadecatuple means it is 16 times as many pixels compared
to the original standard resolution. HD is for high definition screens. Super (S),
eXtended (X), Plus (+) and Ultra (U) mean steps, one after the other, up the
resolution ladder from a comparative original standard but usually mean less of
a jump up the ladder than what it would be if it were two times or four times
the resolution.
Note
VGA 640x480 and SVGA 800x600 are commonly seen if you attempt
to boot the system into an advanced boot or safe mode, which starts
the system in a limited state that is used for troubleshooting
purposes.
Graphics card model numbers are organised by generations (or series), such
as 800 or 900 or 8000 or 9000. Each successive generation has built on the
previous one to create faster and more powerful hardware.
Tip
A high-end graphics card is easy to spot. It has lots of Video RAM and
a fast GPU, and some have decorative cooling systems as well. GPUs
have code names such as Volcanic Islands and Pirate Islands.
The following factors are a good overall measurement of the graphics cards
performance:
Frame rate is how many still images (frames) the card can output to the
screen each second, measured in frames per second (FPS). Put another
way, how often in a second can the video card redraw what you see on
screen. The higher the frame rate, the better.
GPU clock speed (MHz) is the basic measure of performance.
Size of the memory bus between the GPU and video RAM (in bits).
Amount of video RAM (MB or GB) you have.
Memory clock rate (MHz or GHz).
Memory bandwidth (GB/s).
RAMDAC speed (MHz). Random access memory digital-to-analogue
converter (RAMDAC) is a special chip (or function built into a chip) that
takes the digital signal from the card and turns it into an analogue signal for
the analogue monitor. Some cards have multiple RAMDACs, which can
improve performance and support more than one monitor.
Shader units support special effects built into games and other software.
The 3D architecture of the card plays an important role in performance.
The CPU, RAM and motherboard also play a major part, since using a very fast
graphics card with a motherboard that cannot deliver data quickly gives no
performance benefits. Similarly, the card's connection to the motherboard and
the speed at which it can receive instructions from the CPU affects how well it
does its job.
The graphics pipeline is the central part of graphics processing. The graphics
pipeline has a number of stages where particular video jobs are completed and
where each stage works at the same time in a fixed order. Figure 3.71 shows a
flowchart of a modern day graphics pipeline.
Video RAM
GPU Heatsink
GPU Fan
Figure 3.74 shows a screenshot of a program called GPU-Z that shows all
information about your video card/adapter including Video RAM. You can
download GPU-Z from: www.techpowerup.com.
Note
Multiple graphics card technologies using two or more slots are also
available.
DVI (digital)
VGA (analogue)
DisplayPort (digital)
HDMI (digital) for HD TV. Some devices offer HDMI output directly, while
other cards support HDMI through a special cable that connects to a DVI
port.
Graphics cards might support other connectors as well. You can also get
adapters that convert one type of video connector to another type (such as
VGA-to-DVI). The graphics card shown in Figure 3.75 has three ports: HDMI,
VGA and DVI.
Figure 3.75 Graphics card with VGA, DVI and HDMI ports
Polygon
Edge
Vertex
Figure 3.78 A vertex, edge and polygon for the tip of a 3D jet plane
Once the processor has determined where all the vertices must go, the system
begins to draw lines called edges between the vertices to build the 3D object
into many triangular shapes. See Figure 3.79. Although any shape will work,
triangles make the most sense from a mathematics point of view. All 3D
games use triangles to connect vertices. The 3D process then groups triangles
into different shapes called polygons.
Polygons have faces that are the result of surrounding edges and vertices.
When faces are joined together they create a polygon mesh. A series of
triangles are often called geometry, model or mesh. Next comes texturing
and shading. Every 3D game stores a number of image files called textures.
The program wraps textures around an object called a primitive to give it a
surface. This process is known as texture mapping. A single object can have
one or more textures, applied to one triangle or a group of triangles
(polygons). Shading controls the way the surface interacts with light (levels of
lightness and darkness). Figure 3.80 shows the finished jet plane.
APIs are different from drivers. But as with updated APIs, updated
drivers can help programs run correctly.
Several APIs have been developed, with the major ones being:
OpenGL standard was developed for UNIX systems but has since been
ported (or made compatible) with a wide variety of computers, including
Windows and Apple.
DirectX is a Microsoft specification that programmers use to take control of
certain hardware and to communicate directly to that hardware. It provides
the speed necessary to play advanced games. DirectX is not only for video;
it also supports direct access to joysticks and game controllers, sound,
network connections for multiplayer games, presentation devices and other
parts of your computer. Microsoft constantly adds to and changes DirectX to
support various types of hardware and releases different versions of
DirectX.
As many games need DirectX and all graphics cards have drivers to support it,
you need to make sure that DirectX is installed and working properly on your
computer. This can be done on a Windows computer by using the DirectX
Diagnostic Tool (dxdiag).
Some graphics cards use heat pipes to take heat from the CPU and
memory and move it to a radiator-type cooler on the card. A heat
pipe provides better cooling but needs extra space around the card.
3.17.9 Overclocking
Overclocking means running the GPU faster than its rated clock speed set by
the manufacturer. This can be done using software/firmware. Although
overclocking provides better performance, it is not recommended as it can lead
to many problems, such as an unstable system and even hardware failure.
1. If a graphics card is installed and you need to remove it because you are
installing a new card, for instance, then go into Device Manager and
uninstall its driver from there.
2. If the graphics card is intended to replace the on-board video port, go into
the CMOS Setup program and disable the on-board video port. Set the
Primary VGA BIOS or Primary Graphics Adapter or a similar option to the
appropriate slot setting, such as PCIe if using a PCIe slot.
3. Shut down the computer and unplug all external cables.
4. Open the case and take ESD precautions.
5. Disconnect any internal cables attached to the old graphics card and remove
the screw holding the cards bracket in place. Then release the cardretention mechanism that holds the card in place. Card retention
mechanisms vary from motherboard to motherboard. Some use a lever that
can be pushed to one side to release the lock while others use a knob that
you pull out to release the lock. Check the motherboard documentation on
how to release the retention mechanism.
6. Remove the card from the slot and place it in an anti-ESD bag.
7. Take the new graphics card from its anti-ESD bag, holding it by its edges
and metal bracket, and plug it into the appropriate slot. Lock the card into
position using the retention mechanism and with the screw for the bracket.
Check the motherboard documentation for specific instructions for installing
the card and locking it into place.
First you need to install device drivers for the graphics card. The
graphics card needs a driver to work.
Drivers install in much the same way as all of the other drivers:
either the driver is already built into the OS or you can use the
installation disc that comes with the card. However, it is best to check
the manufacturers website for an updated driver and use that driver
instead. If the website does not offer a driver, then use the one on
the installation disc. Avoid using the built-in Windows driver as it
tends to be the most outdated.
13. When Windows starts, the Found New Hardware Wizard should launch.
Although you can install drivers for the card using this wizard, it is best to
cancel the wizard and use the driver from the manufacturers website or
the one on the disc.
14. Run the installer setup program for the card and follow the on-screen
instructions to install the driver. During the installation, Windows might
ask you to install the driver and continue with the installation.
To install multiple graphics cards means that you must have a motherboard
that can handle two or more PCIe cards, a PSU that gives enough wattage and
the correct connectors (some manufacturers rate their PSUs as SLI or
CrossFire certified), a case to fit everything in, enough system RAM and a
cooling system powerful enough to stop the computer from overheating. When
running two cards together, the system automatically defaults to the lowest
clock settings of the cards when SLI or CrossFire is enabled. Keep these factors
in mind when upgrading or building a computer.
1. Shut down the computer, disconnect all cables, open the case and take ESD
precautions. Also handle the cards properly.
2. On some motherboards, you have to set a switch on the motherboard to a
dual card position while on others you do not.
3. Some motherboards have a protective cover over the graphics card
connector, so remove this cover if it has one.
4. Install and secure the first card into the first PCIe slot. Graphics cards can
be heavy so it is recommended to secure the graphics card to the case.
Figure 3.87 The white square shows a second slot for a second card
5. Connect the power connector to the first card.
6. Plug the video cable from the monitor into the card and connect all other
external cables.
7. Boot the computer and make sure the display is working. Install the driver
for the card.
8. Shut down the computer, disconnect all cables and take ESD precautions.
Handle the second card properly.
9. Install and secure the second card in the second PCIe slot and connect its
power connector. You can also install an optional bridge that connects to a
connector at the top of each card. The bridge improves performance
because the cards can communicate by way of the bridge and PCIe slots.
See Figure 3.88. SLI and CrossFire bridges are not compatible.
13. To configure the cards to work together, either a notification pop up will
appear telling you that it has found the new cards and you can simply
follow the steps from there, otherwise open the program that comes with
the card and choose the appropriate Enable parameter from within the
program to enable dual card functionality. Read the cards documentation
for more information.
1. Determine if the monitor is using a cable that is compatible with the video
adapter.
2. If the Windows computer is running and has an existing monitor that will be
replaced, navigate to the Display applet in Control Panel and choose a
resolution and refresh rate that is compatible with the new monitor.
3. Shut down the computer.
4. Connect the video cable between the new monitor and video adapter.
Secure the connector on both ends of the cable by fastening the screws.
5. Plug the monitor into the wall outlet, turn it on and start the computer.
6. Open the Display applet. If the monitor is listed as Plug-and-Play or by
brand and model, adjust the resolution. If not, install the driver for the
monitor before continuing. The driver might be provided on an optical disc
bundled with the monitor or can be downloaded from the manufacturers
website.
7. For CRT monitors, choose a flicker-free refresh rate.
LCD and CRT monitor settings range from the simplest, that is, brightness,
contrast, colour and factory default reset, to more sophisticated adjustments.
Most adjustments to the monitor take place when installing it. All monitors
have an On/Off button and have an on-board menu system, allowing you to
make changes to the monitors image and screen.
Every manufacturer provides a different way to get to the monitors menu, but
they all provide two main functions: physical screen adjustment (bigger,
smaller, move left, right, up, down and more) and colour adjustment (for
adjusting the red, green and blue levels). Make sure the user using the
monitor understands how to adjust these settings. Both the monitor buttons
and display tools in the OS provide you with the opportunity to fine-tune the
monitors image.
For CRT monitors only, you can use the buttons on the monitor to change the
size and horizontal and vertical position of the screen, adjust the orientation of
the screen, make edges straight, cancel wavy lines, adjust coloured shadows
around text and lines, and degauss to reduce magnetic fields created around
the monitor which can make the image slightly fuzzy. Do not degauss a
monitor more than twice within a 20 30 minute period.
Monitor menu
Monitor buttons
In the industry, the term capture is used interchangeably with record, and
the term output with play or playback.
Note
The term sound card used in this section refers to both the card and
on-board adapter.
Sound cards follow standards. Standards for lower end cards support a limited
set of features, such as playback and recording capabilities for office
computers. Standards for mid-to-higher end cards support more features such
as surround sound and sending multiple streams of sound from one
computer to different output devices.
Surround sound: Surround sound involves using multiple speakers and
maybe other sound equipment that are arranged in a way that surrounds the
listener to create a cinematic sound experience.
Amplitude determines the sound's volume (or the height of the wave) and
depends on the strength of the vibrations creating the sound. The loudness
of sounds is measured in decibels (db).
Frequency is the number of waves that pass a certain point in each
second to create sound, measured in the number of Hertz (Hz) or cycles
per second. One cycle is a complete vibration back and forth.
Timbre is the quality and texture that makes a particular sound different
from another, even when two sounds have the same amplitude and
frequency.
Note
Mono recording uses one sound channel and has one or more speakers
that output the exact same sound.
Stereo recordings use multiple sound channels, allowing multiple
speakers to output different sounds.
Note
When recording sound, place the sound card in the slot furthest away
from the power supply and CPU. Also place the graphics card as far
away from the sound card as possible to prevent interference with
analogue inputs.
Hardware and software is available that allows you to record sounds to storage
and create an entirely digital sound with special software. MIDI devices, also
known as MIDI controllers, come in several form factors. Some use a grid or
row of buttons while others light up. The audio software should include options
and instructions for configuring the MIDI device, but for many applications, you
can just plug it in and start playing. Most modern MIDI controllers use USB.
Stereo is the oldest computer speaker technology. It has a left and a right
speaker that share a single jack that plugs into the sound card.
2.1 speaker system has a pair of stereo speakers - called satellites - that
come with a subwoofer. 2.1 speaker systems have a single jack that on one
end plugs into the sound card, and on the other end into the subwoofer,
with another wire running from the subwoofer to two speakers. This is a
good, non-surround sound speaker setup. The number on the left is the
total number of speakers and the number on the right is the total number of
subwoofers. For example, 2.1 means the system has two speakers and one
subwoofer (bass).
Dolby Digital or Digital Theatre System (DTS) is designed to support
five channels (speaker setup): front-left, front-right, front-centre, back-left
and back-right, and it also supports a subwoofer.
Dolby Digital Plus or DTS-HD has two extra side speakers.
Figure 3.97 shows a stereo speaker system (left) and a surround sound
speaker system (right).
Tip
The number of sound ports depends on the sound standards the card
or motherboard supports.
3.19.7 Microphones
If you want to record your own sounds or use a system that recognises your
voice, you will need to plug a microphone into the sound card to input sounds
into the computer. To record sound, a microphone detects vibrations and turns
them into an electronic signal. Microphones plug into the inch jack (which
has a pink ring or microphone icon) on the sound card. To install a
microphone, you plug it into the port and configure and test it in the Sound
applet in the Control Panel on a Windows computer. Figure 3.99 shows two
types of microphones available for computers.
1. Shut down the computer, unplug all cables and open the case. Take ESD
precautions.
2. Remove the sound card from its anti-ESD bag, handling it by its edges and
metal bracket.
3. Find an open PCIe slot and plug in the sound card.
4. Make sure the card is securely seated and secure it to the chassis with a
screw.
5. Close the case, connect the cables and boot the computer.
6. Once the sound card is installed, let Windows install its drivers. This applies
to expansion cards and on-board sound. You now have a choice between
the built-in OS drivers and the driver that comes on an optical disc with the
card. Take a moment to check the manufacturers website to see whether
the sound card has any driver updates and install those drivers.
7. If no driver updates are available, like any other expansion card, it is always
best to install the driver that comes with the card.
8. All sound devices have a setup program that guides you through the
installation process.
You might run into a USB sound card in which case the installation process is
reversed. Install the drivers before you plug in the USB device. Windows
probably has basic drivers for USB sound cards, but do not risk this; always
install the drivers first.
3.20.2.1 Connections
Modern digital cameras plug directly into a USB port. Another option is
connecting the cameras removable digital media to the computer using one of
the many digital media readers available. Many printers have memory card
slots and support direct printing from a camera without going through a
computer.
3.20.2.2 Camera quality, size and features
Apart from being measured by its lens system, image sensor size (the image
sensor chip captures and converts light into electrical charges one pixel at a
time, and additional circuitry in the camera converts the charges into digital
information), shutter speed (the time the shutter stays open when capturing a
picture) and features, a digital camera is advertised by its resolution,
measured in millions of pixels (megapixels or MP). The more megapixels
recorded in the photo being taken, the more detail is shown in that photo. The
resolution also affects how large the image can become before it becomes
blurry.
Sizes of digital cameras range from small, ultra-compact models to large
models. Modern cameras have an LCD screen for previewing shots, and
viewing and scrolling through photos and for setting up slideshows.
Another camera feature is the capability to zoom in (to get a closer view of
faraway objects) and zoom out. Digital cameras have their focal lengths (the
range through which the optics in the lens can move) measured in millimetres
(mm). You will also see cameras advertised with a zoom rating (x), which is
the difference between the smallest and biggest magnification measurements
of the lens. Most mid-to-high end camera models have an optical zoom
meaning the zoom is built into an adjustable lens but almost all models
include multiple levels of digital zoom, accomplished by software in the
camera.
Another camera feature that is good to know is the flash. The cameras flash
provides a brief intense light to allow a photo to be captured when it would
otherwise be too dark to take it.
3.20.2.3 Compression
Image files can be large and larger file types require the computer to have
more storage space to store them. Compression is a term used to describe
methods of making a file smaller in size. Compression schemes can be:
Lossy involves losing some image data and image quality when
compressing a file that will not be that noticeable when looking at the
compressed image. However, you will not be able to get the original file
back after it has been compressed. Many digital cameras convert photos to
the lossy compressed JPEG (Joint Photographic Experts Group) format.
MP3s also use lossy compression.
Lossless involves reducing the file with no loss of image data and image
quality. Lossless basically rewrites the original files data in a more efficient
way. Some entry level and professional cameras can typically record
uncompressed (RAW) data.
Tip
Files compressed with lossless compression are bigger in size than files
compressed with lossy compression.
1. Connect the cameras USB cable to the cameras USB port and the other
end to the computers USB port.
Note
You might need to first install software before connecting the camera
to the computer or you might need to connect the camera and then
install software afterwards. Read the cameras documentation for
installation guidelines.
3.20.3 Webcams
A webcam (or web camera) records digital video and takes still images using
an image sensor. It is most commonly used for video conferencing, security or
live chat situations. Some of the features you can find on modern webcams
include high definition video recording, autofocus and zoom capabilities with a
built-in microphone for video calling.
Modern webcam technology can digitally recognise and track your face with
little or no training to keep your face in the picture. This technology
recognises when you are sitting in front of the camera, homes in on your face
and begins automatically tracking your face as you move around.
3.20.3.1 Webcam connectivity and installation
Most webcams use USB connections and many laptops have built-in webcams.
Since Windows only comes with a limited set of webcam drivers, it is best to
install the drivers supplied with the webcam. Check the cameras
documentation for the correct installation procedure.
After the driver is installed and the webcam is plugged in, you need to
configure and test it. All webcams come with an application to configure its
properties, which might be in the notification area on the taskbar, or in
Computer or the Control Panel.
A challenge for technicians is getting the webcam application to recognise
there is a webcam plugged in and configured for use. Every application does
this differently, but the steps are generally the same (with exceptions):
1. Tell the application you want to use the webcam.
2. Tell the application whether you want the webcam to turn on automatically
when you chat.
3. Configure the image quality of the webcam.
4. Test the webcam.
3.20.4 Camcorders
A camcorder is a video and sound recording device that you hold in your hand
for that purpose. Modern camcorders support HD recording and have built-in
hard drives, and some include two lenses to capture 3D videos. Digital
camcorders typically use USB or FireWire connections. Figure 3.108 shows a
picture of a Blu-ray disc camcorder.
Explain how a hard drive works and list factors that affect its
performance.
Choose a hard drive and remove, install and configure the
various types of hard drive, including PATA, SATA and SCSI.
Describe how to protect data with RAID and how RAID
systems are configured.
Explain how CD/DVD/Blu-ray optical drives work, and
describe the capabilities and uses of the various optical
media.
Remove, install and configure optical drives.
Explain how flash memory, tape and floppy drives work and
describe the capabilities and uses of these devices.
Remove, install and configure tape drives and flash memory.
Identify the different types of memory for computers,
including SDRAM, RDRAM and DDR and their characteristics.
Explain how memory is packaged for different technologies.
Describe the characteristics of different memory types and
ways of installing memory, including chips, banks, singleand double-sided, dual channel, error correction and
registered memory.
Remove, install, upgrade and manage memory.
Explain how CPUs work.
Identify the CPU models created by the major CPU
manufacturers.
Describe key CPU features including multiprocessing, core,
instruction set, cache, clock speed, overclocking, power
management and virtualisation.
Identify which CPU is compatible with which socket.
Explain how CPUs are packaged and how packaging
determines their connection to the motherboard.
Identify the components that cool the entire computer.
Remove, install and upgrade CPUs.
All the parts are in a sealed casing to keep out dirt, dust and outside air that
can affect the distance between the heads and platters.
Tracks: The surface of each platter is logically divided into tracks, which
are circles on one side of the platter. When the head is positioned over a
track, it can read or write data on the track as the platter spins. Tracks are
numbered, starting with the outer most track which is called track 0. All
platters have the same number of tracks, but the number is different from
one hard drive model to another.
Sectors: Tracks are logically separated into slices called sectors. A sector
can be between 512 bytes and 4 KB in size and is the smallest unit of
storage on a platter.
Clusters: A cluster is a group of multiple sectors. Files are written to
clusters.
Cylinders: One corresponding track on all surfaces of all platters is called a
cylinder. For example, cylinder 0 is made up of all track 0s on all platters
inside the hard drive; cylinder 1 is made up of all track 1s on all platters
and so on.
Figure 4.2 shows the sector, cluster, track and cylinder format of a hard drive.
Capacity
Modern hard drives can store anywhere from hundreds of gigabytes (GB) to
multiple terabytes (TB) of data. An average computer has one or two hard
drives, although most computers accept more. Network servers have many to
store large amounts of data.
Remember the more data you store on the drive, the more disk space
is used up so disk capacity is important when choosing a hard drive.
With auto-detection, the BIOS detects the new drive and automatically
chooses the correct drive capacity and configuration.
Performance
Disk performance can be measured in terms of some (or all) of the following
important characteristics:
Spindle speed is how fast the disk platters spin, measured in revolutions
per minute (rpm). Modern hard drives are rated in thousands of rpms.
The higher the rpm, the faster the drive and the more data can pass
through the read/write heads.
Seek time is the average amount of time it takes to move the read/write
head from one track to another, measured in milliseconds (ms). For
example, if the read/write heads are on track 1, it will take them longer to
move to track 12 than to track 3. The lower the better.
Latency is how long it takes the appropriate sector to move under the
read/write head, measured in milliseconds (ms).
Access time is how long it takes the read/write head to find a particular
position on the drive, measured in milliseconds (ms). Access time is a
combination of seek time and latency. The lower the access time, the
better.
Data transfer rate covers both the internal transfer rate (how fast
read/write operations are performed on platters) and external transfer
rate (how fast data can be moved to the CPU across the bus). Transfer
rates on modern drives are rated in MBps and GBps.
Note
The hard drives internal buffer or cache can help achieve better
transfer rates, improving the time it takes to read and write data, and
can range in different megabyte sizes. Larger buffer sizes provide
better performance.
Interface standards
Match the drive to the standards supported by the motherboard. Examples
include PATA and SATA for internal drives and eSATA, FireWire and USB for
external drives.
Reliability
When you shop for a drive, you might notice a statistic (or metric) called the
mean time between failures (MTBF) or early-life failure rate listed in the
drive specifications. This metric tells you the number of hours that a device
should work in the best possible conditions before a serious incident occurs.
For an individual drive, these statistics do not accurately predict reliability.
However, if you are a manager thinking of buying thousands of drives each
year or a vendor building and supporting thousands of systems, it might be
worth your while to look at the MTBF values and study the methods that each
vendor uses to calculate them.
Tip
The key point to remember when looking at any MTBF value is that it
is meant to be an average, based on testing done on many hard
drives over a period of time.
Another statistic to look out for is life expectancy, which is how long the
device can be expected to stay reliable and usable.
Self-Monitoring, Analysis and Reporting Technology (SMART) is a
feature built into modern hard drives that monitors performance, disk spin up
time, temperature, distance between the head and platter, and other
mechanical activities to help predict when the drive is likely to fail. If SMART
suspects that the drive is going to fail, it creates a status report so that
monitoring software can notify you of the problem that is likely to happen,
perhaps allowing you time to back up data before any real problem does occur.
Most hard drive manufacturers have a free diagnostic program (which usually
works only for their drives) that will do a SMART check along with other drive
tests. Figure 4.4 shows two hard drive diagnostic programs that report on the
condition of internal and external hard drives.
Because SSDs have flash memory chips and no moving parts (instead of
spinning platters), they create less heat and are reliable, quiet and less likely
to fail or lose data when there is a power failure or vibrations compared with
magnetic hard drives. However, they perform worse when writing data to the
drive and storing large gigabyte files.
SSDs are installed in laptops and desktop computers as internal and external
devices. They are being used to both replace hard drives as a faster way of
storing data and in other areas where hard drive storage is not always possible
or practical, such in high temperature and high humidity environments. Figure
4.6 shows an illustration of an internal SSD hard drive for a computer.
The host bus adapter or host adapter is the connection point between hard
drives, optical drives and tape drives and the motherboard, allowing data to be
moved to the CPU and RAM. Most motherboards have the host adapter built
into their circuitry, which connects to headers where you plug in the drives
data cable.
A hard drive must have a set of rules to work properly. These rules make up a
standard called an interface that oversees how the drive works with the
system. Standards tell you the number of heads on the drive, what commands
the drive responds to, the cables and connectors used with the drive, the
number of drives supported and so on. There are two main bus standards for
attaching drives to the computer:
Jumper for
Master/Slave
Molex Power
Connector
The maximum cable length for both cables is 46 cm (18). You will also find a
44-pin connector for attachment to smaller 2.5 inch drives. Figure 4.9 shows
an 80-wire PATA ribbon cable.
Along the one side of the ribbon cable is a colour-coded stripe which tells you
the wire on that side is attached to Pin 1 on each connector. The cable has a
key to ensure that you do not plug it incorrectly into each drive and the
motherboard. Figure 4.10 shows Pin 1 on the connector, the red stripe (wire 1)
and the key on the cable.
Wire 1
red stripe
Pin 1
Key
Pin 1
Drive
Pin 1
Drive
Coloured
stripe aligns
with each
Pin 1
Pin 1
Motherboard
IDE header
on
motherboard
Fortunately, IDE uses a master and slave configuration that allows the
master controller on the one drive to tell the slave controller on the other drive
when it can transfer data to and from the motherboard.
This way, each drive knows when it can send and receive data and when the
other one is transferring data. Each channel can have a master and a slave
drive. To tell the difference between the drives, use the channel name followed
by the words master or slave. For example, if two hard drives are installed on
the primary channel, they are called primary master and primary slave.
The master and slave setting can be configured by setting a jumper in between
the power and data connectors on the drive itself. You use a jumper (a clip
that covers two pins on the back of the drive) to set the drive to master or
slave, as shown in Figure 4.12. The top drive in Figure 4.11 should be made
the master and the bottom drive should be made the slave.
You will find the master (or primary) drive at the end of the ribbon cable: the
opposite end to the motherboard connector. The slave (or secondary) drive is
connected to the IDE cable in the middle, between the master drive and the
motherboard. Since data cannot go to and from each drive at the same time, it
is essential to make one drive the master and the other the slave.
Blue motherboard
Black master drive
Grey slave drive
The following criteria must be met in order to use the cable-select option:
1. A special IDE cable-select cable or the 80-conductor (40-pin) cable must be
used.
2. The host controller must support the cable-select option.
A+ Preparation | V1.0 Jan 2014
The connector on the cable-select cable might also have master and
slave labels on it.
Some other technologies that you need to understand in relation to PATA are:
Direction
Master or
single drive
Drive is slave
Cable select
(CS)
When two drives connect to the same cable, the faster or bigger
capacity drive should be configured as master. Hard drives are normally
the fastest IDE drives. When only one master drive connects to an IDE
cable, connect the drive to the end connector (the one furthest away
from the motherboard) for best performance.
Avoid putting a hard drive and an optical drive on the same channel.
The optical drive uses a more complicated command set than the hard
drive and it can slow down the hard drive.
For optimum performance, connect the boot hard drive to the primary
IDE motherboard connector and configure it as master.
If a drive is the only one on the cable, set it to master or single.
Tip
For hard drives, you can slide the drive into the 3.5-inch bay from the
inside of the case.
For optical drives, this can be done by removing the front panel of the
case and/or the 5.25-inch drive slot cover from the case and then
sliding the drive from the front of the case into the 5.25-inch bay
opening. These slots are generally removed by pushing some tabs,
either on the inside or outside of the case, or by removing screws.
Make sure the front of the optical drive where the disc gets inserted is
lined up with the computers front panel.
Depending on the cases design, hard drives can be placed inside the
case vertically or horizontally.
Both SATA hard drives and optical drives use the same data cable and
power connector.
There are various SATA standards with each one supporting a Gbps speed,
such as 6 Gbps. As of this writing, the latest SATA revision 3.2, called SATA
express, supports bus speeds up to 16 Gbps. This is not the drive speed, but
the bus speed. It uses SATA software over the PCIe bus to increase speeds.
SATA also supports hot swapping, allowing you to connect and disconnect the
drive while the computer is running.
Figure 4.20 SATA drive with power cable (left) and data cable (right)
Note
Drive speeds for SATA, like most other components, will increase over
time.
In this exercise you will learn how to install a SATA drive. SATA
drives are easy to install. Most internal drives need a special
host adapter card or an integrated motherboard header. Handle
the drive carefully. Do not touch any exposed circuitry or chips
on the drive. When it comes to installing and removing cables,
hold the cables connector rather than the cable. Always read
the documentation that comes with the drive, card or
motherboard for configuration and installation information.
Make sure that you visualise the steps. You can also search
online for help. You can follow these general steps to install a
SATA hard drive, optical drive or SSD drive.
5. Slide the drive into the appropriate bay with the drives connectors facing
the motherboard and the drives circuitry facing downwards.
Note
For hard drives, slide the drive into the 3.5-inch bay from the inside of
the case.
For optical drives, remove the computers front panel and/or the 5.25inch drive slot cover from the case and then slide the drive from the
front of the case into the bay opening. These slots are generally
removed by pushing tabs, either on the inside or outside of the case or
with screws. Make sure the front of the optical drive where the disc gets
inserted is lined up with the computers front panel.
Depending on the case design, hard drives can be placed inside the
case vertically or horizontally.
Attach the one end of the data cable to the drives data connector. See
Figure 4.21. The connector is keyed so it can only be connected to the
drive and motherboard in one direction.
Attach the other end of the data cable to the motherboard header (see
Figure 4.22) or to a SATA host expansion card. Generally the
motherboard headers, labelled SATA1 and SATA2, are used before
headers, labelled SATA3 and SATA4.
Therefore, connect the data cable for the bootable drive to SATA1 (the
lowest port) and connect the other drives to SATA2 and so on. The
cables connector is keyed so it can only be connected in one direction.
Note
There are also adapters available that allow a SATA hard drive to
connect to a standard IDE header.
Check all your connections. You can use cable ties to keep cables neat
and tidy.
Close the case, connect all external cables to the computer and monitor.
After physically installing the drive, check to see if the drive is recognised
by the BIOS. Turn on the computer and check to see if the drive is listed
on the BIOS screen. If it is not listed, enter the CMOS Setup program by
pressing the appropriate key/key sequence shown on the BIOS Startup
screen and check that the drives controller is enabled. You might need
to change the adapter mode, usually choosing between ATA-compatibility
mode and Advanced Host Controller Interface (AHCI) mode. Figure 4.25
shows three SATA drives detected in the CMOS Setup program. Notice
that SATA in Figure 4.25 uses the numbering system (i.e. SATA 1 and so
on).
16. If it is still not recognised, recheck all connections. When the drive is
recognised by the BIOS, you have to prepare it for use. If you need to
install an OS on the drive, you will need to partition it and then format it
with a file system to store files.
17. You can do these tasks using the OS installation disc, or if an existing OS
exists on the first bootable hard drive and you have installed a new
second hard drive, you can log into the OS and use it to partition and
format the new second drive.
Note
You install internal SSD and hybrid drives with PATA or SATA
connections just as you would any PATA or SATA drive.
Figure 4.26 eSATA port (left), connector (middle) and external hard
drive (right)
To un-mount an eSATA drive, click on the Safely Remove Hardware icon in the
notification area. Select the appropriate drive and remove it when the OS asks
you to.
Another type of storage to know about is network attached storage (NAS).
NAS is not a type of drive, but a computing system with one or more hard
drives designed to store and provide data to devices over a network. NAS is
attached to the network through an Ethernet connection and typically receives
power through an external power supply. Many NAS devices have a web-based
management program like the one shown in Figure 4.27 that users can access
using a web browser.
SCSI devices should be properly terminated. If the signal was not absorbed or
removed from the bus, the signal would bounce back up the cable and collide
with other data on the bus, causing interference or destroying the signal. The
SCSI chain will not work properly without terminating both ends of the chain.
Figure 4.30 shows how SCSI devices can be terminated.
Note
Most modern SCSI host adapter cards are self-terminating, so you will
not need to terminate them. Do not terminate devices that are not on
the ends of the chain.
Instead of jumpers and switches, newer SCSI cards have either a software
program that comes with the adapter or a program built into the adapters
ROM chip that enables configuration through software. Refer to the adapters
documentation for configuration instructions.
You must enable the SCSI BIOS on the SCSI host adapter if booting off a SCSI
hard drive. Enabling this will allow the computer to recognise the drive when it
boots without needing you to install a driver for the card.
Note
If you are booting off a PATA or SATA drive and using the SCSI drive
as an additional drive, disable the SCSI BIOS and install a driver in
the OS.
After assigning jumpers and configuring termination, you must fasten the drive
to the drive bay with screws and connect the drive to the host adapter using a
suitable SCSI cable. Modern internal SCSI devices connect to the host adapter
with a flexible 68-pin ribbon cable. Many external devices connect to the host
adapter with a 50-pin high-density (HD) connector, while higher end SCSI
devices use a 68-pin HD connector. Some early versions of SCSI used a 25-pin
connector.
Note
When installing and chaining multiple SCSI devices, install and test
one device at a time, one before the other.
Earlier SCSI versions were parallel technologies that needed devices to share
bandwidth. The latest SCSI devices are known as SAS (Serial Attached
SCSI). SAS devices connect through a serial point-to-point bus, allowing them
to support higher 6 Gbps speeds. They also support more devices on a single
SCSI chain; use smaller, longer, round cables; have a small hard drive form
factor that can support larger capacities; and have no termination issues.
4.1.2.5 Creating a RAID array
Redundant Array of Independent (or Inexpensive) Disks (or Devices)
allows reading from and writing to multiple physical disks for some purpose.
When two or more disks are grouped together in what is called an array, the
OS views them all as one large storage space (a logical volume). RAID can
be implemented in hardware or software. There are several levels of RAID
shown by a number and each number defines a different way to spread data
across multiple disks. Depending on the RAID level, RAID provides one or more
of the following benefits:
Table 4.2 briefly describes the most commonly used RAID levels. Figure 4.33
shows 3 different types of RAID configuration.
Table 4.2 RAID levels
RAID
level
Description
RAID 0
RAID level
Description
RAID 1
RAID 5
Nested RAID
RAID-1
RAID-5
Note
Two or more identical drives for best performance, the drives should be
identical in size, speed and other features. If some drives are bigger than
others, the additional disk space will be ignored.
RAID compatible motherboard or plug-in controller card both have
controllers, chips and a special BIOS, and handle all RAID functions
including finding and configuring the drives in the array.
Hardware RAID is invisible to the OS. The only difference in the physical
installation between normal PATA/SATA drives and RAID drives is where they
are connected. They must be connected to a motherboard or a card that
supports RAID. To find out if RAID is supported, read the system or
motherboard manual. After the drives used to create the array are connected
to the built-in adapter or card, restart the computer. Start the CMOS Setup
program and turn RAID on or off for the PATA or SATA drives. See Figure 4.35.
Save the changes and exit the CMOS Setup program.
If any drive that will be used to create the array has data, back up
that drive before starting the array configuration process. Most RAID
host adapters delete data on all the drives in the array when creating
the array. Also, RAID must be configured before installing the OS on a
drive in the array.
Note
The data on the DVD and Blu-ray discs have pits that are smaller and
more closely spaced than the pits on CD discs.
An optical drive consists of a spindle motor that spins the disc, a laser diode
or similar device to generate the laser, a lens (mirror) system to guide the
laser beam to read the disc, and a tracking system to move the laser and
lens assembly. Modern optical drives use either a tray-loading mechanism, as
shown in Figure 4.40, where the disc is loaded onto a motorised or manually
operated tray that opens and closes, or a slot-loading mechanism, whereby
the disc is inserted into a slot and taken in by motorised rollers. Slot-based
drives cannot handle non-standardised discs and are not as common as trayloading drives. Internal optical drives fit into a 5.25 inch drive bay.
If the drives eject button does not work or there is a disc stuck inside the
drive, you can insert a paper clip in the emergency eject pinhole (as shown in
Figure 4.41) to manually open the tray.
Burning also called recording or writing, means to write data to the disc.
Ripping means to copy data from a disc to the hard drive.
Session a period of time in which something happens, meaning a file or
files are added in the same operation.
Single-session writing data in one operation.
Multi-session writing data at a time without filling up the disc and then
adding additional sessions later on until the disc is full.
Read-only memory (ROM) only reads data; you cannot change and
delete data if the disc has data stored on it. ROM standards include: CDROM, DVD-ROM and BD-ROM.
A CD can store data and video, but has limited space. Originally, CD-ROMs
could store 650 MB of data and 74 minutes of music, but modern CD-ROMs
can store 700 MB of data or 80 minutes of music. CD specifications for
recording, sampling and the physical diameter in mm are published in a
series of technical documents known as books, which are known by the
colours of their cover, for example, red, yellow, green and white.
DVDs can store data and video:
o Single-sided, single-layer DVD can store 4.7 GB
o Single-sided, dual-layer DVD can store 8.5 GB
o Double-sided, single-layer DVD can store 9.4 GB
o Double-sided, dual-layer DVD can store 17 GB
o DVD-video can store 17.1 GB
o DVD-audio can store 8.5 GB
BDs can store data and high definition (HD) video:
o Mini-discs can store 7.8 GB per layer
o Double-sided, single-layer BD can store 25 GB
o Double-sided, dual-layer BD can store 50 GB
4.1.3.7 Compatibility
CD drives can only read and write to CD formats, that is, they cannot read and
write to DVD and BD formats. Most DVD drives can read and write to CD and
DVD formats, but not BD formats. Depending on the drive features and model,
BD drives can read, write and play CD and DVD formats using a compatible
DB/DVD/CD optical head. To be certain as to which drive supports which
formats, look in the drives documentation or visit the manufacturers website.
CD when working with CDs, 1x equals 150 KBps. Multiply the x-rating by
150 to find out the drives speed for reading, writing or rewriting CDs.
Modern models offer 7 Mbps speeds. Drives that feature three speeds are
shown as Record/Rewrite/Read. For example, 24x/16x/52x.
DVD when working with DVDs, 1x equals 1.385 MBps. Multiply the 1x
factor by 1.385 to find out the drives speed for reading, writing or rewriting
DVDs.
Blu-ray when working with Blu-ray discs, 1x equals 4.5 MBps. Multiply the
1x factor by 4.5 to find out the drives speed for reading, writing or
rewriting Blu-ray discs.
Note
Keep in mind that these are maximum speeds that are rarely
achieved in real life operation.
4.1.3.9 Buffer/Cache
One way an optical drive reduces data transfer time is by using its on-board
buffer or cache memory to store frequently used data. A buffer improves
performance because it is much quicker for the CPU to fetch data from the
buffer than having to fetch it from the disc. Buffer sizes typically range from
KB to MB sizes, with the bigger buffers providing better performance. The
buffer also helps the burning process run smoothly by constantly feeding data
to the drive.
4.1.3.10 How to reliably record to optical discs
The main factors that influence your ability to create a working disc are:
Interface type.
Drive buffer size.
The location and condition of the data you want to record.
The writing (recording speed), whether the computer is performing other
tasks while trying to create the disc.
Features available with the recording software.
When experiencing problems with recording data, make sure the drive has
some kind of buffer under-run protection.
4.1.3.11 Internal and external connections
Optical drives can use many interfaces. The particular
recommend to the customer depends on several factors.
interface
you
The following questions will help you decide which interface to use:
Is the drive going to be an external drive? If so, eSATA, USB and FireWire
are the choices, with USB a popular choice. Many manufacturers have
released external versions of optical drives, both readers and writers.
Is the drive going to be an internal device? If so, internal drives can be
PATA, SATA or SCSI. Most internal drives use SATA (though you will find
some older PATA ones) and support the ATAPI standard.
Do you plan to add more devices, such as a scanner, to the computer in the
near future? If so, SCSI, USB, eSATA, and FireWire are options.
4.1.3.12 Installation
Figure 4.45 shows a CD, DVD and BD drive on top of each other. Optical drives
look identical from the outside. Can you tell which drive in Figure 4.45 is a CD,
DVD and Blu-ray drive?
When you install a new optical drive into a computer, the first question to ask
is: Does Windows recognise the drive? To find out, log into the OS and open
Computer and check that the drive is listed, as shown in Figure 4.48.
Device Manager has most of the information about optical drives. Open Device
Manager and find the drive in the list of devices. Right-click on the drive and
select Properties to see more information. The General tab shows the
current status of the drive, informing you whether the device is working
properly or not. Other tabs, such as the Driver tab, provide other information
about the drive.
4.1.3.13 DVD and Blu-ray region codes
To protect against piracy and to control the distribution of DVD and Blu-ray
movie and audio software across the worlds regions, a DVD and Blu-ray drive
or disc player has a region code. The region code enables you to play only
those DVD and Blu-ray discs on a drive that has the same region code. If the
region code is different, the disc will not work on the drive. However, illegal
methods have been developed to overcome this region-code restriction.
Note
There are region-free drives available that do not need this region
code setting. Current standards allow changes to be made to the
region code before the drive is locked. There are programs on the
Internet that you can use to check your drive for its region
requirements without increasing the number of times the region code
has been changed.
Some drives allow you to add more storage through a memory card slot and
have security features that allow you to secure the drives contents.
SmartMedia
Microdrive
Compact
flash (CF)
Memory Stick
xD
Picture
Card
To safely remove a hot swappable card from the reader, close any programs
that are using the cards contents and then check the status light on the reader
to see if the card is not being used, and then remove it.
Figure 4.52 External USB floppy drive, floppy disk and 34-pin ribbon
cable
Note
By default, many computers that still support floppy drives first attempt to
boot from the floppy drive looking for an OS before any other boot device. This
process enables technicians to insert a floppy disk into a problematic computer
to run programs when the hard drive fails. On the other hand, it also means
hackers can insert bootable floppy disks into servers and cause harm. You do
have a choice, though, because most systems have CMOS parameters with
which you can change this default boot order to a hard or optical drive.
A+ Preparation | V1.0 Jan 2014
Magnetic tape drives are mainly used in network servers. Tape drives
accommodate full-sized and smaller tapes.
There are different types of internal and external tape drives, such as Quarterinch cartridge (QIC), Digital Audio Tape (DAT) and Digital (DLT), which come in
different formats and support different gigabyte and terabyte capacities.
Capacities are typically listed in compressed and uncompressed format.
Most tape drives are also available in autoloader (auto-changer) or tape
library designs to allow unattended automatic backups of drives that need
multiple tapes.
Autoloader: An autoloader is a hardware device that has one or more tape
drives and a robotic arm that swaps the tapes in and out of the drives.
Figure 4.53 shows a single tape drive (left), a tape cartridge (middle) and a
tape autoloader (right).
4.2 Memory
System memory is the primary workspace for the CPU. It is the area where
data, instructions and programs are stored while the CPU is processing them.
Random access memory (RAM) is the system memory the CPU uses to
temporarily store data, instructions, the OS, applications and user data.
Random access means the CPU can access any piece of memory it needs
from anywhere in RAM, and any access takes an equal amount of time.
Accessing RAM is fast and efficient compared to accessing hard drives.
However, RAM is volatile and needs electricity to store its contents. RAM is
temporary. When the computer is shut down or restarted, the contents of
RAM is erased.
Read-only memory (ROM) is non-volatile memory that keeps its contents
when the computer is off. This makes it an ideal place to put the computers
startup instructions.
The memory controller chip (MCC) is RAMs and the CPUs go-between. See
Figure 4.54. Basically, when the CPU wants to store or access data from RAM,
the memory controller is responsible for getting the job done. It does this by
moving data over the address bus, which connects the memory controller to
RAM. The memory controller can be in one of two places: within the
Northbridge chipset on older systems or integrated in the CPU on modern
systems.
If the computer accepts tin modules and you install gold ones, over time a
chemical reaction between the metals can damage the connector. Memory
errors can also occur.
RAM Description
RDRAM
(RAMBUS)
DDR runs twice as fast as SDRAM, has one notch, uses 184-pin DIMM and
cannot be inserted into a DDR2, DDR3 or DDR4 memory slot. Instead of
processing data for each tick of the system clock, as regular SDRAM does, it
processes data when the tick rises and again when it falls, doubling the data
rate of memory. This is known as double pumping. For example, if the
motherboard runs at 200 MHz, DDR runs at 400 MHz.
Two improvements over DDR are DDR2 and DDR3, which double and
quadruple bus speeds, respectively. DDR2 runs faster, uses less power and
generates less heat than DDR. DDR3 is faster and uses less power than DDR2,
further reducing heat generation. Both DDR2 and DDR3 use 240-pin DIMMs,
although their notches are not in the same position and their modules and
slots are keyed differently and therefore they are not compatible. Figure 4.56
shows a comparison of the notch positions of DDR, DDR2 and DDR3.
You can use the following formulas to calculate the speed of each of the DDR
versions by using a 100-MHz clock:
DDR speed calculation:
Clk 2 (DP) 64 (bits)/8 (bytes)
100 MHz 2 64/8 = 1600 MBps
(bits)/8 (bytes)
MBps
(bits)/8 (bytes)
MBps
Table 4.4 shows these speeds and their different naming conventions for DDR.
You can see that the standard name DDR is taken from the clock, the clock
multiplier and double pumping. For example, DDR3 uses a 4-times multiplier
and double pumping. Therefore, it is eight times faster than SDRAM. The
standard name comes from multiplying the clock by 8. The PC rating is a little
more difficult to understand, but if you calculate the speed by using the clock,
you can see that the PC rating shows the calculated speed in MBps. Also, the
names include the version (DDR, DDR2 or DDR3).
Table 4.4 DDR speeds and naming convention examples
DDR standard name
DDR PC rating
DDR2 standard name
DDR2 PC rating
100 MHz
DDR-200
computer-1600
DDR2-400
PC2-3200
DDR3-800
PC3-6400
200 MHz
DDR-400
computer-3200
DDR2-800
PC2-6400
DDR3-1600
PC3-12800
Each DDR version supports multiple clock speeds and each newer version
supports faster clock speeds. Some of the clock speeds supported by different
DDR versions are as follows:
DDR various speeds supported from 100 MHz at 1.6 GBps for computer1600 (DDR-200) to 200 MHz at 3.2 GBps for PC-3200 (DDR-400).
DDR2 various speeds supported from 200 MHz at 3.2 GBps for PC2-3200
(DDR2-400) to 533 MHz at 8.5 GBps for PC2-8500 (DDR2-1066).
DDR3 various speeds supported from 533 MHz at 8.5 GBps for PC3-8500
(DDR3-1066) to 1066 MHz at 17.066 GBps for PC3-17000 (DDR3-2133).
Example
that
affect
capacity,
features
and
Characteristic Description
Single-sided/
Single-sided or double-sided refers to how the memory
double-sided/
controller accesses RAM (not how many sides of the DIMM
quad ranked
has chips). In double-sided RAM, the chips are separated
into two groups known as ranks and the system can only
access one rank at a time. In contrast, single-sided (or
single-rank) RAM is in one group; the system can access all
RAM on the DIMM without switching. If you have a DIMM
with chips on only one side, it is most likely a single-sided
(single-rank) DIMM. However, if it has chips on both sides, it
can be single rank, dual rank or even quad rank. Switching
back and forth between ranks takes time and slows down
RAM. Single-sided RAM does not switch, and if all other
factors are the same, it is faster than double-sided RAM.
Quad 4 ranked modules are available for network servers.
Channel
Channels have to do with how many DIMM slots the memory
controller can address at a time. Slots are colour coded to
represent a channel, with two slots having the same colour,
three slots having the same colour and so on.
Dual channel the memory controller can access two
DIMMs at the same time, doubling the speed. Two separate
64-bit channels (paths) are used together resulting in a 128bit FSB.
Triple channel the memory controller can access three
DIMMs at the same time, achieving higher speeds and better
performance.
Quad channel the memory controller can access four
DIMMs at the same time, achieving much higher speeds and
better performance.
Parity
An old method not used anymore for checking the accuracy
of data going in or out of memory chips. Check CMOS Setup
to see if the system supports this.
Non-parity
Non-parity memory chips do not use any error checking.
Most memory modules are non-parity because the memory
controller provides error correction. Also, applications
routinely check for errors and often find and correct them
without needing parity or ECC RAM.
ECC
An alternative to parity checking that uses enhanced parity
circuitry to find and correct internal single bit errors and
informs you of large 2-, 3- or 4-bit errors with an error
message. The motherboard must support error correction
code (ECC) modules, and you must typically enable them in
CMOS Setup. ECC is used in network servers.
Characteristic
Buffered
and
registered
memory
CL rating
Description
Buffers and registers keep data temporarily, taking some
load off the memory controller, but delay data transfers.
This enables the system to keep stable when lots of RAM is
installed. Some DIMMs use buffers, some use registers and
others use neither. If the module does not support registers
or buffers, it is called an unbuffered DIMM. Most DDR
SDRAM is unbuffered. Registered DIMM must be supported
by the motherboard.
CL or CAS (Column Address Strobe) is the amount of
time (clock cycles or nanoseconds) that passes before the
CPU moves on to the next memory address. A RAM cell is
the intersection of a row and column. The CAS signal picks
which column to select and a signal called RAS (row
address strobe) picks which row to select. The intersection
of the two is where data is stored. The delay in RAMs
response time is called latency. The lower the number of
nanoseconds (ns), the faster the access time of the memory
chips. Latency is sometimes advertised as a CL rating. The
higher the CL rating, the slower the memory. A rating of CL5
waits five clock cycles before moving to the next memory
address.
Figure 4.57 Intel-based DDR slots (S), banks (B) and channels (C)
Note
Slots of the same colour show the same bank and matched pairs
should be installed in these slots. You can install a single DIMM in slot
1 and the system will have a single-channel RAM. For best
performance, install matched DIMMs in the same bank.
Looking at Figure 4.57, you should install the matched pair of DIMMs in slots 1
and 3 (Bank 0), leaving slots 2 and 4 empty. The system will take advantage
of this dual-channel architecture by using two separate 64-bit channels.
What happens if you install the DIMMs in slots 1 and 2 instead? The system
will still work; however, both DIMMs are installed in channel 1, so the system
will work with only a single channel. RAM will be about half as fast as it could
be if it were installed correctly to take advantage of the dual channels.
Figure 4.58 shows the motherboard that supports AMD CPUs. Slots 1 and 2
make up Bank 0, and slots 3 and 4 make up Bank 1. Channel 1 includes slots 1
and 3 and Channel 2 includes slots 2 and 4.
Figure 4.58 AMD-based DDR slots (S), banks (B) and channels (C)
While this can be confusing between different motherboards, the good news is
that most motherboard manufacturers use the same colour for each bank.
Note
Table 4.7 shows the configuration of the slots, banks and channels for a
motherboard using triple-channel RAM. A motherboard with this configuration
will have six DIMM slots to support triple-channel memory.
Table 4.7 Triple channel memory
Slots
Slot 1
Slot 2
Slot 3
Slot 4
Slot 5
Slot 6
Banks
Bank 0
Bank 1
Bank 0
Bank 1
Bank 0
Bank 1
Channels
Channel 1
Channel 1
Channel 2
Channel 2
Channel 3
Channel 3
Slots in each bank are commonly the same colour, so you might see a
motherboard with Bank 0 slots (slots 1, 3 and 5) all blue and with Bank 1 slots
all black. Triple-channel DIMMs are sold in matched sets of three, similar to
how dual-channel DIMMs are sold in matched pairs. When you install triplechannel DIMMs, you should install the matched set in the same bank. For
example, if you buy one set, you would install it in slots 1, 3 and 5.
Quad-channel motherboards have eight DIMM slots. When buying RAM for a
quad-channel motherboard, you buy the RAM in a matched set of four.
4.2.2.7 Serial Presence Detect (SPD)
SPD allows the motherboard to automatically discover and configure any DIMM
installed. An SPD chip on the DIMM stores all information about the module,
including its size, speed, ECC or non-ECC, and so on. When a computer boots,
it queries the SPD chip so that the memory controller knows how much RAM is
on the module, how fast it runs and other information. Many programs, such
as CPU-Z, can query the SPD chip. Figure 4.59 shows both the Memory and
SPD tabs of the CPU-Z program. CPU-Z indicates the type of DDR RAM, the
amount of installed RAM, the total number of slots on the motherboard, the
number of slots used and the exact type of RAM in each slot.
The total RAM installed. The more RAM there is, the faster the computer.
Generally, use as much memory in a computer as the motherboard and OS
can support.
Amount of RAM needed. This depends on the OS (OSs have memory
limits), type and number of application running at the same time, and the
maximum amount of RAM the motherboard supports.
Memory module type and chip. If you want to change to a faster type of
memory module, from say DDR2 or DDR3 which both use a 240-pin module
or to DDR4 which uses 284-pin, you will most likely have to upgrade the
motherboard first. Use what the motherboard supports.
Speed. Some motherboard manufacturers insist you use the same speed
and sometimes the same sizes of memory in each memory slot, while
others are more flexible. Check the motherboard manual to find out about a
particular system.
When there is not enough RAM, the OS will display an error message
or the system will slow down by quite a lot. Always store modules in
anti-ESD bags when not in use. Also, use strict ESD procedures when
working with the modules. RAM is very sensitive to ESD.
When you add more memory to a computer, you need to answer the following
questions:
How much is currently installed and how much RAM does the customer
need?
The answer is probably all you can get. Microsoft sets minimum RAM
requirements for its OS on its website. To find out how much RAM the Windows
computer has, go to the System Information tool by clicking Start > All
Programs > Accessories > Run. Type msinfo32 in the Run dialog box and
press <Enter>. Scroll down to see installed memory information.
Windows also has the handy Performance tab in the Task Manager program
(shown in Figure 4.60). Task Manager provides information about computer
performance and running applications, processes and processor usage,
memory, network activity, statistics and so on.
The Performance tab provides information about the amount of RAM used by
the computer. Access Task Manager by pressing <CTRL> + <SHIFT> +
<ESC> and select the Performance tab. Figure 4.60 shows how this
computer currently has 8 GB RAM installed.
All motherboards can handle different capacities of RAM, with the exception
of multi-channel configurations. Manufacturers recommend installing the
largest module in the lowest numbered slot.
Although you may get away with mixing memory speeds, the safest and
easiest route is to use the speed specified in the motherboard manual and
make sure that every module runs at that speed for best performance.
Mixing memory speeds will result in all modules performing at the slowest
speed module and might cause the system to lock up.
Do not put mismatched RAM modules in the same bank with a motherboard
that uses multi-channel configurations.
Chips can be high-grade, low-grade, remanufactured or used. Poor quality
chips cause frequent errors or unstable systems so it is good to know the
quality of the chips. Stamped on each chip is the date it was made. For best
results, buy memory from reputable sources that only sell new components
and new memory chips.
High quality modules have heatsinks installed to reduce heat and help the
module last longer.
Use a memory manufacturer website that you know can be trusted when
buying RAM. Some websites have a program (as shown in Figure 4.62) that
you can run or download and run. Some programs can identify your
motherboard and the RAM it supports and provide recommendations.
5. Find out which bank (slot or series of slots) to fill first. Most slots are
numbered, usually starting from 0 or 1. Some motherboards allow slots to
be filled in any order while most need them to be filled from the lowest
numbered slot upwards. In general, most people fill Bank 0 or 1 (the
lowest-numbered slot) first and then the next bank and so on. Refer to the
motherboard manual for specific instructions.
The slots should look like the one shown in Figure 4.65. Notice that the
notches cut into the connectors at the bottom of the module match up to the
slot breaks (spacers) in the slots if the correct DDR DIMM is used.
Module
Notches
Locking clips
Slot
Figure 4.65 Slot ready for module
6. Pull the locking clips on both sides of the slot outward (in an open position).
7. Pick up a module by its edges do not touch the chips or pins or contacts
at the bottom and line up the notches with the slot breaks in the slot. If
the notches do not line up the right away, turn the module around and try it
the other way. It is possible to install the modules the wrong way.
8. After making sure your module is lined up correctly with the slot, insert it
and push straight down to seat it. A good hard push down is usually all you
need to ensure a solid connection.
9. As the module moves into place, make sure the locking clips on each side of
the slot move towards the centre (as shown in Figure 4.66) until they snap
and lock into the side notches of the module to lock it in place. A fair
amount of force is needed to engage the clips and lock the module into the
slot.
10. That is it! When correctly installed, the module should sit upright on the
motherboard and the two locking clips should be flush against the sides of
the module.
11. Repeat these steps for any additional modules that need to be fitted.
Figure 4.68 Incorrect RAM count (left) and correct RAM count (right)
Use the OS to restart the computer several times. Also, at some point, you
should look at the RAM using CPU-Z or within Windows to ensure the OS sees
the correct amount of RAM installed.
There are a couple of ways to do this in Windows 7:
Computer
and
select
Task Manager: Press <Windows> + <R> to bring up the Run dialog box
and type taskmgr. Then go to the Performance tab and take a look at the
Physical Memory box. It should display the total physical memory. Keep in
mind that this shows the amount of RAM in megabytes and that 1024 MB is
roughly 1 GB.
CPU-Z: Open CPU-Z and click on the Memory tab.
4.3 Processors
At the heart of every computer is a chip called the processor,
microprocessor or CPU (central processing unit). The CPU executes
instructions, performs calculations and coordinates I/O operations. The CPU
chip is a programmable integrated circuit that has millions and billions of tiny
electronic switches, called transistors and signal pathways, within an area
called the die. All CPUs process 1 and 0 bits and each bit has a switch. Like a
light bulb, if the switch is open the bit is on and electricity can flow through.
The CPU reads the open (on) switch as a 1. If the switch is closed (off), the
electricity is blocked and the CPU reads the off bit as 0.
The main CPU manufacturers are Intel and AMD (Advanced Micro
Devices). Intel and AMD currently create many CPU models for desktop, highend computers/servers, laptops and mobile devices that are sold under
different names or families, such as Core, Pentium, Xeon, Itanium and Atom
for Intel and Athlon, Phenom, AMD FX, AMD Fusion, and Opteron for AMD.
Both Intel and AMD reuse model names and continue to improve the
manufacturing process after releasing a new model, but they try to minimise
the number of model names in use. Both companies use code names such as
Core, Haswell, Broadwell, Skylake, Shark Bay, K10, Temash and Kaveri to
keep track of different variations within models.
Mobile devices and laptops have different needs from those of desktop
computers, notably the need to use as little electricity as possible. This helps
to extend the battery life and create less heat.
Note
You might encounter Advanced RISC Machine (ARM) CPUs. ARM uses
a reduced instruction set computer (RISC) chip architecture, and
often runs more quickly and with less power than Intel and AMDbased CPUs, so these CPUs do not need fans. ARM CPUs are popular
in tablets.
Decode
The control unit breaks up each instruction into commands that the CPU can
understand and can work with, according to the instruction set. The
instructions are called microcode and groups of instructions (1s and 0s) are
collectively known as the instruction set.
For new instruction sets, the OS, applications and sometimes the graphics card
or motherboard BIOS must support it.
Execute
During this step, the control unit passes the instructions to the execution unit
which is responsible for executing the operation that is specified by the
instruction. The execution unit is made up of several functional components:
Write back
The final step simply writes back or stores the results of the execute step to
an internal register for the next instructions to quickly access or it may be
written to RAM.
After the instruction is executed and the resulting data is written back, the CPU
does the same fetch-decode-execute-writeback instruction cycle but with the
next-in-line instruction because of the incremented value in the program
counter.
Fetch
Decode
Instruction Cycle
Writeback
Execute
Circuits inside the CPU handle each stage and an operation is not complete
until it has gone through all stages. Modern circuits are organised in an
assembly line called a pipeline. With pipelining, a new instruction begins
executing as soon as the previous one reaches the next stage of the pipeline.
This means that while the CPU is executing one instruction, it is at the same
time fetching the next instruction ready for execution.
Note
Note
It is important to note that Figure 4.73 is the same view you would
see if you had a four-core CPU with Hyper-Threading enabled. A key
point to remember is that even when a CPU has multiple cores, it is
still a single chip that plugs into the motherboard.
4.3.6 Cache
Because CPUs run faster than slower RAM can give it instructions, you will
always get what is called wait states because RAM cannot keep up with the
CPU. A wait state is a clock tick in which nothing happens. To minimise wait
states, modern CPUs come with built-in, very high-speed memory called cache
memory. Cache preloads or caches as many instructions as possible and
keeps copies of already executed instructions in case the CPU needs to process
them again. Although cache was originally placed on a separate chip on the
motherboard, almost all modern CPUs include cache (on die).
There are multiple levels of cache:
Level 1 (L1) smallest and fastest cache and is closest to the CPU. A
multicore CPU has a separate L1 cache on each CPU core.
Level 2 (L2) bigger but slower than L1; only accessed if the requested
instruction is not in the L1 cache. It is much more common for L2 cache to
be part of the CPU today. L2 is shared by all cores of the CPU.
Level 3 (L3) the biggest and slowest cache; only accessed if the
requested instruction is not in L2 cache and it is shared among all cores. L3
is seen only on high-end CPUs or on motherboards.
Many newer CPUs include L1 cache for each core, L2 cache for each core, and
a single shared L3 cache on the same CPU chip.
Intel Advanced Smart Cache is a cache technology that shares L2 cache
between each core to achieve better performance and improve resource
allocation. Each core dynamically uses up all of the available L2 cache and
when one core is inactive, the other cores will have access to the full cache.
Note
Cache comes in KB and MB sizes. With each generation of multicore CPU, CPU
manufacturers have changed the way in which they allocate cache among the
cores. Depending on the CPU model, cache can be available to only one core
(discrete) or to all cores (shared).
Figure 4.74 shows the CPU-Z program displaying the cache breakdown of the
CPU.
If cache does not have the needed information, the CPU gets that
information from RAM and stores copies of it in its cache.
Note
4.3.8 Addressing
The data and address bus runs between the CPU and RAM. The wider the data
bus, the more data can be moved over the bus in one clock cycle. The data bus
is 64-bits wide. To store data in RAM, the CPU has to provide an address that
points to a particular location in RAM using an address that looks something
like 10 or 11, which represents two completely different memory locations.
The CPU accesses memory locations through the address bus. The wider the
address bus, the more memory locations the CPU can access. The address bus
for 32-bit CPUs is either 32- or 36-bits wide. A 32-bit address bus allows the
CPU to access a maximum of 4, 294, 967, 296 memory addresses (4 GB) while
a 36-bit address bus expands that to 64 GB address space. Theoretically, a 64bit CPU can support a 64 exabyte address space but in practice 64-bit CPUs
are limited to 1 TB to stay compatible with 32-bit software.
Note
The clock speed is the CPUs maximum speed, not the speed at which
it must run. It can run at any speed as long as that speed does not go
over its clock speed.
Send data
Figure 4.76 Clock cycle where data is clocked four times in one cycle
Note
Clock crystals are not used only for processors and chipsets. Many
chips in the computer, such as those on an expansion card, have a
clock wire that are pushed by a clock chip.
The internal clock speed may be the same as the external motherboard
speed, but it is more likely to be a multiple of it. For example, a CPU might
have an internal speed of 3.2 GHz but an external speed of 800 MHz. That
means for every tick of the system clock, the CPU has 4 internal ticks of its
own clock. This factor is called a clock multiplier. It is a number that when
multiplied by the bus speed gives the CPU its clock speed. Other names for the
multiplier include processor or bus/core ratio, clock ratio, bus frequency
multiple and bus frequency ratio.
To summarise, the speed of a CPU is based on the speed of the system crystal
and the multiplier. As another example, if the speed of the crystal is 100 MHz
and it has a multiplier of 20, the speed of the CPU is 2 GHz (100 x 20). You
commonly see the CPU speed listed as only the multiplied speed.
Take a look at Figure 4.77. It reveals that this computer has an Intel Core 7
CPU 870 and the clock is listed as 2.93 GHz. The system is using a 133.333
MHz clock (commonly listed as 133 MHz) and a 22 times multiplier.
Intel Direct Media Interface (DMI) can use multiple lanes, similar to
PCIe.
Intels QuickPath Interconnect (QPI) each core in a CPU has a
separate two-way 20-lane QPI link to the chipset.
AMD HyperTransport used with the FSB to increase speed.
Many modern CPUs with integrated memory controllers have very fast pointto-point serial connections that run between multiple CPUs (cores), between
integrated memory controllers and between CPUs (cores) and the chipset. Both
QPI and HyperTransport have similarities but they are used differently. Both
architectures allow much more data to be transferred in both directions at the
same time (full duplex), increasing bandwidth, and both use a double data rate
(DDR) connection, meaning that data is sent on both the rising and falling
edges of the clock signal.
Note
You might find that the effective rate of data transfers for these
technologies is rated in multiple gigatransfers per second (GT/s). The
industry sometimes uses the term transfers per second to mean
the number of operations that transfer data per second over a given
data channel.
4.3.11 Overclocking
Overclocking involves running the CPUs clock speed higher than that for
which it is rated, to improve performance. The GPU and RAM are other devices
that can be overclocked. Overclocking works by changing the bus speeds, clock
multipliers and voltages for these components. If supported, it can be done by
changing parameters in the CMOS Setup program.
Note
CPU cores
GPU cores
CPUs and sockets are keyed so that the CPU fits into a socket in only
one way. If you feel any resistance when putting a CPU into a ZIF
socket, it indicates that the pins are not lined up. Double-check the
keying and ensure that the CPU is lined up correctly. If you try to
force it, you will likely bend pins and damage the chip or the socket.
Another type of socket you might find in mobile devices is ball grid array
(BGA). The pins on the CPU are replaced with balls of solder. The BGA chip,
which typically has more pins than LGA and PGA, is mounted in the socket and
then heated to melt the solder.
Number
pins
775
1366
LGA 2011
2011
LGA 1156
LGA 1155
1156
1155
Socket
Socket
Socket
Note
Intel Core i7-960 Processor 3.2 GHz 8 MB Cache Socket LGA 1366
This name tells you it is an Intel processor in the Core i7 family with a model
number of 960 and a 3.2-GHz multiplied clock. The 8 MB cache is the total
amount of cache. LGA 1366 is the type of socket the CPU plugs into and the
1366 is the number of pins.
4.3.20 Cooling
Electricity equals heat. Because computers use electricity, their components
create heat as they work and the faster they work the more heat they create.
If they create too much heat, they overheat and become unstable or get
damaged. Thus, it is important to keep the computer cool.
4.3.20.1 Cooling the CPU
CPUs have billions of transistors, all connected with extremely small wires. If
these transistors or wires get too hot, they can easily break, making the CPU
useless. To avoid overheating, a cooler, which has a fan and heatsink, sits on
top of the CPU.
A heatsink is a block of metal with fins that take hot air away from the
chip. It is glued to the surface of the chip with thermal paste (the liquid
paste sits between the bottom of the heatsink and the top of the chip) that
removes air pockets, helping to take heat away from the chip. This paste is
also known as thermal transfer material, thermal compound, thermal
grease or phase change material.
A cooling fan is placed on top of the heatsink and blows the hot air out
into the case. Make sure that the fan you use matches the CPU model to
provide the correct amount of power to cool the amount of heat the CPU
creates.
Clips can use retaining screws, pressure release (press down on them and they
release) or a retaining slot. Small screwdrivers can be used to release the clips
that attach using the retaining slot. Clips for fans and heatsinks can be difficult
to install.
When the CPU and coolers are bundled together, the heatsink might
have thermal compound already stuck to the bottom of it and covered
with tape.
You can usually remove the cooler if you need to replace it, although some
CPUs have the fan permanently attached. You might also find a plastic shroud
(cover) over the CPU that directs air to a fan.
Tip
If you are replacing the CPU, you will need to clean off the old thermal
paste from the CPU and heatsink. Some vendors sell cleaning material
to remove this paste, but you can often use cotton swabs and
isopropyl alcohol to remove it.
www.intel.com
www.amd.com
You can also search other websites that will give you information on the latest
CPUs such as:
www.tomshardware.com
www.arstechnica.com
www.hardocp.com
www.tomshardware.com
www.bit-tech.net
If you are trying to replace a CPU with a matching one, you can use the CPU-Z
program to identify the computers current CPU. Figure 4.91 shows the result
of searching Intels website for information about a specific CPU.
CPU socket.
CPU clock speed or frequency (the higher the better). Look at
benchmarks, which measure different areas of a CPUs performance.
Support for architectures such as QPI and HyperTransport in place of the
FSB.
Number of cores.
Memory cache (the more the better).
SIMD technologies, microcode improvements and other CPU features.
Power management features.
All modern CPUs are 64-bit.
Cost.
Note
You will find CPUs advertised with a speed that you can use for
comparisons. For example, one CPU might have a speed of 2.8 GHz
and another might have a speed of 3.4 GHz. It is safe to assume that
the 3.4 GHz CPU is faster, but the speed is not always tied to the FSB.
3. Cooler assembly: If the CPU does not come with a heatsink and fan
assembly, choose a cooler that fits the CPU and CPU socket, and one that
gets good reviews. You will also need thermal paste if not included with the
cooler assembly.
Before installing the CPU onto the motherboard, make sure that the CPU
model and motherboard socket are compatible.
Use the motherboard manufacturers website to get the most up-to-date
information.
Do not touch the bottom of the CPU.
The correct way to hold a CPU is by its edges or corners. Do not touch the
pins or contacts on the CPU and socket. Always leave the plastic protective
chip cover in place covering the CPU until you are ready to install it into a
motherboard.
It is very important that the CPU is installed slowly, carefully and straight
down into the socket in the correct way, by following pin 1. Any careless
handling will damage the pins/contacts on the motherboard or socket.
Read all the directions that come with the CPU and cooler before you begin.
1. Open the socket by pushing down the locking lever and gently pushing it
away from the socket to lift the lever and then pull it back in the open
position.
3. Remove the sockets protective cover and store it in a safe place (do not
throw it away). If you remove the CPU and are not using the socket, the
cover should be left in the socket to protect it. While the socket is exposed,
do not touch the socket pins.
Pin 1 might be a bevelled corner or white dot printed in one corner of the
CPU.
Pin 1 might be a square joint where one of the pins is connected to the
bottom of the CPU.
Pin 1 may be a gold triangle or spur on the bottom of the CPU.
On the socket:
Pin 1 might be a difference in the pattern of pin holes in one corner of the
socket.
A 1 printed on the motherboard next to one corner of the socket.
6. Hold the CPU with index finger and thumb, and align it so that the notches
on the edges of the CPU line up with the posts in the socket. Gently insert
the CPU straight down without tilting or sliding the CPU in the socket. To
protect the pins, it needs to go straight down into the socket.
Press
down
13. Ensure that the heatsink/fan assembly is sitting evenly on top of the CPU.
14. Now attach the power connector from the fan to the motherboard power
header near the CPU.
Go back and double check all your connections and configurations and make
sure that there are no loose parts inside the case. Also check that all
components are clean and no dirt or dust exists on any component inside the
case.
7. Once you have done this, close and secure the case and connect all external
cables.
8. Turn on the computer and double check the following signs to make sure
the computer is working properly:
is
an
important
motherboard
Stores and runs the POST program that identifies, tests and initialises basic
hardware.
Stores a basic routine called the bootstrap program or boot loader that
finds the OS and allows it to load.
Stores the CMOS Setup program that stores system parameters. CMOS
also acts as a clock to keep the current date and time.
There are various BIOS companies that write BIOS programs and sell
them to computer manufacturers. You might find the BIOS
manufacturers name on the Startup screen.
You always open the CMOS Setup program during the boot process. The real
question is how to get to the program for a particular computer. BIOS
manufacturers use different keyboard keys or key combinations to open the
CMOS setup program. Usually the keys are shown on the BIOS Startup screen.
For example, at the bottom of the screen in Figure 5.1, it states press the DEL
key to enter BIOS Setup. Keep in mind that this is only one possible example.
Motherboard manufacturers can change the key or key combination for
entering CMOS Setup. You can even set up the computer so the message does
not show. If you do not see an Enter Setup message, wait until the RAM
count starts and then try one of the following keys or key combinations:
Delete <Del>, Escape <Esc>, <F1>, <F2>, <F10>,
<Ctrl>+<Alt>+<Enter>, <Ctrl>+<Alt>+<Esc>, <Ctrl>+<Alt>+<S>,
<Ctrl>+<Alt>+<F1>, or <Ctrl>+<Alt>+<F11>.
It may take a few tries, but you will eventually find the right key or key
combination. If not, check the motherboard manual or the manufacturers
website for information.
Note
Not all BIOS screens display the same type of information and POST
results. Some BIOS or computer manufacturers change the BIOS
screen to show nothing more than their own logo during the boot
process. You can typically enable/disable this feature, called screen
logo or something similar, from within the CMOS Setup program.
Most programs have a Help menu that you can access from within the program
to explain the purpose of each parameter. Always look in the computer or
motherboard documentation for the meaning of each parameter.
This exercise will ask you to open the CMOS Setup program for
your computer and will explain most of what you can expect to
find in the BIOS. Go through this section and then go through
the CMOS Setup program on your computer. Answer the
questions and perform the tasks when asked to. To avoid
making a mistake, do not save anything unless you are sure you
know what a parameter does by changing it.
Step 1: Enter the CMOS Setup program
1. Turn on the computer. You should hear one, maybe two beeps or no beeps
from the motherboard speaker which indicates POST has done its test.
2. Watch the screen carefully and when the BIOS screen appears, press the
proper key or key combination to open the Setup program. You have to be
quick to catch the key combination or try any of the above key or key
combinations listed in the previous section.
3. If you missed it the first time, restart the computer and try opening the
program again. You might be able to pause the initial start-up screen using
the Pause/Break key and then press <Enter> to allow the computer to
continue to boot.
Step 2: Explore each screen, answer the questions and do the exercise
CMOS programs vary widely. The computers you use might have similar
options, but the menus might be named differently and the parameters might
be stored under different menus and submenus. There are several different
CMOS Setup program screenshots in this unit so that you know what you can
expect to work with in the workplace. You can navigate most programs by
keyboard, but some programs support a mouse.
5.1.1.1 Main menu
You are now in the main menu of the CMOS Setup program. From the main
menu, you can go to any other menu and submenu by using the keyboard
arrow keys and pressing <Enter> to select a submenu or option. Depending
on the program, you might be able to see and change the time, date, language
and other information from the Main menu, otherwise navigate to the
Standard CMOS Features menu or another menu/submenu. Figure 5.2 shows
an example of the Main menu for this CMOS Setup program. To move back
one screen, you usually press the <Esc> key or use the keyboard
navigational keys. When saving, you will usually be given the option to save
changes and exit or exit without saving.
Write down the BIOS manufacturers name and version number. (For example:
AMI BIOS 0103.)
5.1.1.3 Date/Time/Daylight Saving
The computers real time clock (RTC) is the battery-powered clock that keeps
track of the second, minute, hour, day, month and year. The OS picks up these
values when it loads. These values can be adjusted automatically within the
time zone parameters in the OS to support daylight saving time (DST). An
incorrect date and time could indicate the CMOS battery is failing.
Daylight saving time (DST): DST is the practice of adjusting time in some
countries to make better use of daylight.
Is the date and time set correctly in CMOS Setup? Yes or no. If your answer is
no, set the correct time and date.
5.1.1.4 CPU features
There will be options for changing CPU features, such as cores, cache, HyperThreading, execute disable, power performance and so on. In many cases,
these features will be detected and enabled by default, but in case there are
not, you know where to find them and change them for troubleshooting if
needed.
Write down any features that the CPU supports and what features are disabled
and enabled. (For example: Hyper-Threading enabled.)
5.1.1.5 Virtualisation
Virtualisation enables you to create an entire virtual computer, recreating hard
drives, RAM, network adapters and more hard as well as software. To run
virtual machines, you will need a powerful physical computer since you are
trying to run multiple computers on it at the same time and assign each virtual
machine with resources such as RAM, hard drive space and so on. To support
this, CPU manufacturers have added hardware-assisted virtualisation and have
named their virtualisation technologies by different names. Hardware-assisted
virtualisation helps virtual machines use physical hardware more efficiently and
is controlled by the BIOS. The virtualisation feature is typically disabled by
default in CMOS Setup on many systems, so if you need to set up hardwareassisted virtualisation, you will need to activate it here.
Note
5.1.1.6 Overclocking
Some computers have menus that display information about the CPU, RAM and
GPU, and include parameters for overclocking them to make them run faster
than what the manufacturer intended. See Figure 5.5. Be very careful when
overclocking as it causes devices to create more heat and you could end up
with an unstable or damaged system. If there are overclocking parameters, it
is best to leave them set to Auto or Default and stay away from this screen.
Some manufacturers disable these parameters to prevent overclocking.
5.1.1.8 Wake up
Many CMOS programs give you options for wake up events, such as powering
on when a mouse is clicked or a key is pressed, or waking up a computer over
a network from another computer or a call from a modem or at a certain time
of day. See Figure 5.6 above and Figure 5.7 below.
Does your CMOS Setup program allow you to configure wake up events? Yes or
no.
If yes, write down what options the CMOS Setup program supports to wake up
your computer.
(For example: wake up by mouse.)
Figure 5.8 Health check CMOS parameters (left) and health program
(right)
If available, write down
system/motherboard.
the
current
temperature
of
the
CPU
and
CPU temperature:
____________________________________________________________.
System/MB temperature:
______________________________________________________.
5.1.1.10 Halt on post errors
Some computers allow you to configure the BIOS to stop and ask you if certain
errors happen during the POST part of the boot process, such as to stop on all
errors, on no errors (not recommended), on all but keyboard errors and so on.
See Figure 5.9.
Note
Boot order
Once supplied power, hardware, firmware and software enables the computer
to boot up. Once POST has completed, it passes control to the BIOS function
called the bootstrap loader. The purpose of the bootstrap loader is to find the
OS by reading CMOS information. The CMOS Setup program has an option that
you configure to inform the bootstrap loader which devices to check for an OS
and in which order (called the boot sequence) so that the OS can load. The
option in the program might be called boot device priority, boot sequence
or something similar. You will usually be able to set 3 or more boot options
that will be tried in order, one after the other, starting with the first boot
device. Your choices are:
Hard drive PATA, SATA or SCSI. If you have a mix of PATA, SATA and
SCSI drives, adjust the CMOS Setup to your preferred drive. A SCSI boot
disk is normally set to ID 0. A SATA boot drive should be connected to the
lowest numbered port. Most likely you will boot from the hard drive with the
OS pre-installed.
Optical drive most likely when you install a new hard drive or an OS, you
will boot from the optical drive first and if there is no optical disc, turn to
the hard drive next. After the OS is installed, to prevent accidental boots of
the disc, change setup to boot first from the hard drive. You might also set
the optical drive as the first boot device if performing a repair install.
USB some systems can boot to USB devices.
Network/PXE a pre-boot execution environment (PXE) network
adapter enables you to get boot settings over a network from a specially
configured network server to download and install an OS.
If you use the wrong boot order, the BIOS will skip straight to the hard drive
and load the OS.
Note
Boot order is the first place to look when you see this error at boot:
Invalid Boot Disk
Set the boot order (if not set already) to boot first from the hard drive and
then to the optical drive.
Note
If the Quick Boot option is enabled, the system will skip memory and
drive tests to enable faster startup. Also, enabling Boot Sector
Protection provides some protection against malware.
Note
Passwords used for BIOS-level security should follow the same rules
as passwords for any user account. That is, they should have a
number of different characters and be a certain length. You can set a
password and find password options under the boot or security menu
or a similar menu in the CMOS Setup program.
If both the supervisor and user passwords are set up, you must enter
a valid password to boot the computer.
Some motherboards provide additional options that either allow you to open
and view CMOS parameters, but not make any changes, or open CMOS Setup
and only make a few changes, otherwise you are given no access at all.
Set the supervisor password to P@ssword and then reboot the computer. Can
you open the CMOS Setup program with this password? Yes or no.
If necessary, reboot the computer. Open the CMOS program using your
password. When you have logged in, remove the password, reboot the
computer, test to see if you can open CMOS Setup again, close it and continue
with the rest of this section.
What to do for a forgotten power-on password
When a power-on password is set and forgotten, most motherboards have pins
that you can jumper together to clear all power-on passwords. This means that
not only must you set the password, but you also need to lock the case to stop
users from opening it and getting to the password-clear jumper; otherwise, the
password serves no purpose.
Provided you know the password to get into CMOS Setup, a password can also
be cleared by entering CMOS Setup and choosing the Clear Password or some
similar parameter. There are also CMOS programs, such as the CMOS save and
restore program, that can be downloaded from the Internet. The program
backs up the CMOS information that you can use to restore at a later time.
This means that you must back up CMOS before setting a password so that it
can be restored to a state without a password.
If you cannot find the motherboard manual and you do not know how to clear
the password, as a last resort you can try using the Clear CMOS jumper or
button, or remove the CMOS battery for a few minutes to clear CMOS RAM.
Note
These methods will clear all the information in CMOS Setup and set
the parameters to their default settings, so they should be recorded
beforehand.
Computer firmware the hard drive must be used with the specific
computer only.
Drive firmware you can move the hard drive between computers that
have a compatible BIOS.
Full disk encryption (FDE) encrypts the entire drive with a password used
as the encryption key.
BitLocker does not encrypt the Windows volume with the boot files
used to boot the computer; if it did, the computer would not boot.
The CMOS Setup program usually has parameters that can enable or disable
TPM. See Figure 5.16.
If the laptop is reported stolen, the tracking server can attempt to find the laptop
by either using data provided by the Laptops GPS chip or information from
nearby wireless networks. The tracking server and company can attempt to
remotely lock down the laptop by performing various operations, such as:
If you use automatic setup to load default parameters after you make
changes, all your changes will be overridden. Try using the default
options and then make any changes you want.
5.1.6 UEFI
The original BIOS has not changed much over time in the way it is
programmed. As such, BIOS works only in 16-bit mode and depends on x86compliant hardware. Extensible Firmware Interface (EFI) specification is a
newer type of BIOS. EFI was renamed Unified Extensible Firmware
Interface (UEFI).
UEFI has already replaced BIOS on many systems. It acts as super-BIOS,
doing the same job as BIOS, but in a 32- or 64-bit environment, and offers
additional features such as browsing the Web and launching games without
booting the OS, as well as opening the CMOS Setup program. You can think of
UEFI as a mini-OS that runs on top of the computers firmware, enabling you
to do many tasks at boot time by using your mouse. It works as a nonhardware-specific, non-OS-specific, 32- or 64-bit bootloader. This does not
make POST or system setup go away. They still exist, but UEFI runs instead of
BIOS.
Figure 5.19 shows the UEFI interface for two different motherboards.
UEFI firmware can install a BIOS update from an optical disc from
within the UEFI menu.
From within Windows, download the update file to your hard drive. Close
all open programs and disable virus scanning programs. Double-click the
file to run the update program and follow the directions on screen. The
computer will reboot to enable the update. Most update programs allow
you to back up your current BIOS so that you can return to it if the
update goes wrong. Let the system do the update.
Virus and scanners: A virus is a program that performs harmful actions on
Caution Avoid anything that can disrupt the update process, such as a
power failure. When you start a BIOS update, be sure to complete
it.
A computer without a working BIOS will not boot and a failed update can make
the motherboard unusable. If the motherboard gives problems, consider
updating the chipset drivers before performing the update.
There are various steps you can try to recover from a failed update. Some
motherboards have a program that you can use to recover if the BIOS is
corrupted or the update fails. Other motherboards have a flash recovery
jumper or switch used for BIOS recovery.
1. With a jumper, you typically download and copy an update file to one of the
bootable media.
2. You then shut down the computer, set the jumper according to instructions,
and boot and run the BIOS update from the media. There will be no video
but you should hear the POST beep(s) and hard drive activity.
3. Once the drive activity has ended, shut down the computer, remove the
update media and reset the jumper to its normal position and boot.
Figure 5.21 shows how to set jumpers for a particular motherboard. The
jumper in Figure 5.21 can be set to clear passwords, recover from a failed
BIOS update or be set to normal mode.
Finally, do not update the BIOS unless you have a very good reason to do so.
There is a common saying: If its not broken, dont fix it!
Is there an option to update the BIOS in your CMOS Setup program? Yes or
no. If you answer yes, what is the name of the menu or submenu that gives
you this option?
If you do update the BIOS chip, make sure the vendor has the correct chip. It
might be a different brand of BIOS than your current BIOS. The vendor will
need the motherboards ID information displayed at bootup. You can download
free programs to display this information for you.
The replacement chip must plug into the motherboard. Some chips are square
and some are rectangular. The replacement chip must support your
motherboard/chipset and it must provide the features you need, such as
support for particular processor speeds and larger hard drives. For steps on
how to replace the chip, refer to the motherboard manual or manufacturers
website.
Thin client a computer that runs the OS at its most basic performance
level and is designed to handle only very basic applications. A laptop or
desktop are suitable thin clients. A thin client commonly relies on a remote
network server to do everything beyond the most basic computing tasks.
The thin client is booted into an OS and all keystrokes and mouse clicks and
movements are sent to the remote network server, which runs, processes
and displays the requested application or entire Windows desktop (called
Virtual Desktop Infrastructure [VDI]) to the clients monitor for viewing
along with any sounds that have been requested. If you are helping a
customer identify the resources needed for a thin client, ensure that it
meets minimum recommended requirements for the OS and the application
used to connect to the remote system.
6.2.2 Workstations
A workstation is a high performance computer that runs more demanding
applications than your standard computer would run. The requirements of a
workstation changes as technologies and standards change.
6.2.2.1 Programming workstation
A programming-based workstation is used by programmers to develop
applications and games in Rapid Application Development (RAD)
environments. A database server is also often needed for testing. Programming
workstations need a fast 64-bit CPU, lots of RAM and a fast hard drive with
plenty of storage space.
6.2.2.2 Virtualisation workstation
A virtualisation workstation is used by different types of professionals to run
one or more virtual machines (VMs) on top of a single workstation called the
host. A developer, for example, might use virtualisation for testing. To achieve
good performance and to be able to run many virtual machines with their OS
and applications on the single workstation, the workstation needs a powerful
64-bit CPU (preferably with hardware-assisted virtualisation), lots of RAM and
a fast hard drive with lots of storage space.
6.3.1
Devices certified with the Digital Living Network Alliance (DLNA) connect
to a home network, find each other and share media. If you share media files
on a Windows computer, for example, a DLNA-enabled TV, game console or
other home theatre device should be able to see those files. Look for the DLNA
logo on devices such as Blu-ray players, network storage boxes, printers,
digital cameras and more.
Media streaming streaming video and other files from the home server
to remote computers. This server should have a powerful CPU, plenty of
disk space and RAM, a very fast Gigabit network card since the network
connection will be busy and cabling to support these speeds.
File sharing storing and sharing files from the home server. Storing files
on the server allows them to be managed, secured and backed up easily.
You can configure multiple hard drives on the server in a RAID array
according to the customers needs to speed up disk access, increase disk
capacity and avoid losing any valuable data. This server should have a very
fast Gigabit network card and cable connection and plenty of disk space to
store the many different types of files.
Printer sharing a printer can be controlled and managed centrally from
the home server acting as a print server for all home printers. You can
assign printer permissions to control who can print and manage printers and
so on. This server should have a very fast Gigabit network card and cable
connection and extra RAM to support printing.
Instead of building your own customised home server PC, you can go out and
get a pre-configured NAS appliance and attach it to your cabled Ethernet or
wireless network so that users can use it to store and share files and printers.
NAS has a cut-down server motherboard and a hard drive or RAID array with
some kind of OS installed, and usually comes with a Web-based program that
you can use to manage it. The NAS can be a large system designed for a large
network or a small system for a small office/home office (SOHO) network. If
you are going to connect the NAS to the Internet, then make sure that you
have set up security properly.
6.3.3 Gaming PC
A video game is a computerized game with a story or activity played on a
gaming platform such as a TV, computer, mobile device, gaming console or
other gaming system for the purpose of entertaining or teaching us. A PC
game is software that involves a player interacting with a computer connected
to a monitor, although a PC game works on a gaming laptop as well.
Competition modes are ways to build cooperation and competition into games:
Single-player (me versus the situation)
Two-player competitive (you versus me)
Multiplayer competitive (everyone for himself)
Multiplayer cooperative (all of us together)
Team-based (us versus them)
Hybrid competition modes (combination of the above)
People love to play video games together too and technology gives them lots
of ways to do it, including:
Single player one player plays the game.
Multiplayer local gaming means two or more players playing together in
one place.
Networked play, also called multiplayer distributed gaming, refers to people
playing against other people over a network or Internet at different
locations.
LAN parties are events in which a group of people get together in one
place, but each has his own PC connected to the others over a local area
network (LAN).
When you build a PC for a gamer, you mostly build it around the latest
graphics card technology. The parts you use to build the gaming PC will
depend on how much the customer can spend and their needs. Instead of
following the recommended OS requirements for a gaming PC, you might want
to turn your attention to the system requirements for the latest PC game. Find
a game that came out recently and see what its requirements are. Then, go
beyond those requirements to keep that gaming PC future-proof. Futureproofing means building a PC that keeps it relevant for a few years.
Graphics card When thinking ahead, you should buy a card that is
powerful now and in the near future. Keep the following in mind when
choosing a card:
o Do not get an extremely powerful graphics card that your CPU can barely
handle.
o If the customer wants the best of the best PC gaming experience, you
will need to link multiple high-end graphics cards together.
o Think about what ports are needed by the card VGA, DVI or HDMI, or a
combination.
o Think about cards that support DirectX or any other API.
o How do you know which cards are powerful? Look at the series, memory,
suffixes and benchmark tests:
If possible, choose a card from the latest possible series.
The more memory, the better. A top-notch graphics card with onboard memory and a specialized Graphics Processing Unit (GPU) is
needed for many of the games.
Learn the suffixes, such as GTX, GTS, HD, X, etc.
Use benchmarks on the Internet to compare the performances of
each card. The benchmark shows you how well cards perform during
intense graphical testing, e.g. frame rates during a specific game
sequence, while running through different screen resolutions. Some
common benchmark websites include:
Passmark www.passmark.com
Tomshardware www.tomshardware.com
CPU consider clock speed and number of cores. A high-end, powerful CPU
is essential for a great gaming PC experience, with multiple CPUs further
improving the gaming experience.
RAM essential to system performance. If you want games to run
smoothly, you will need to provide enough RAM for them. An SSD drive (or
two) will help load game data into RAM much faster.
Motherboard consider the quality of the motherboard and the CPU
socket and slots it has. Gaming PCs typically use ATX motherboards, which
allow future expansion. Consider the chipset and ports.
Sound card many games take advantage of sound cards that create
surround sound. Games often have three dimensional (3D) sound and a
good surround sound system provides a realistic experience.
PSU make sure it gives enough power. Future upgrades to a gaming PC
will possibly need more power. Remember: power supplies lose power the
older they get.
Cooling a powerful CPU and GPU will create heat so you must consider a
cooling system that can handle the heat.
Hard and optical drives consider disk space to store game files and
optical drives to read game media.
Monitor consider the number of monitors needed, resolution, size and so
on. More and more computer games provide support for 3D displays.
Widescreen displays are better for playing games. Choose a port that
matches the graphics card.
Peripherals some gamers have keyboards and mouses that have extra
buttons that can be customised. Some PC games are best enjoyed when
using a gamepad.
Case the case is a personal choice and can come in different colours,
lights and features.
Network Gigabit network card for high-speed connections to other
gamers.
Display
Keyboard
Hinge
Optical drive
One of the most striking differences between laptops and similar portables and
tablets/smartphones is upgradability. You can and should upgrade laptops
while tablets/smartphones do not offer much upgradability when it comes to
their hardware.
7.2 Laptops
As a computer technician, it is important that you identify components and
ports that surround the laptop, and that you know how to install and configure
laptop hardware. In many respects, laptops work the same way as desktop
computers.
Power and extra buttons
Screen
Touchpad
Keyboard
By far the most common pointing device on modern laptops is a flat, touchsensitive pad called a touchpad or trackpad.
To work the touchpad, you simply glide your finger across its surface to move
the pointer on screen, and tap the surface once or twice to single- and doubleclick, respectively. Some manufacturers include a multi-touch touchpad to
perform tasks using multiple fingers.
Laptop keyboards commonly have function keys, labelled <F1> to <F12>,
which you can use when working with any computer. For example, you can
press <F1> to open Help in many applications or <F5> in just about any
application to refresh the display. On laptops, you will often find that function
keys have more than one function, which you can access by pressing the <Fn>
key with a function key. The <Fn> key also enables you to toggle other
features specific to the laptop, such as network connectivity and external
displays.
Figure 7.6 shows part of a laptop keyboard with some keys highlighted. The
function keys are across the top and the <Fn> key is on the bottom.
Function keys
Fn key
Figure 7.6 shows how one manufacturer is using the function keys,
but there is no standard. Another laptop might be using these keys
for different purposes.
The following section takes a look at the purpose of function keys and other
buttons found on many laptops:
Dual-display also known as dual screen, dual monitor, dual view and
multi-monitor, this is useful when you have a second monitor connected to
the laptop or when the laptop is connected to a projector.
Not all laptops support all of these choices, but they are common. Although the
Function key on many laptops is used to switch between these choices, this is
not always the case. You might have to use the Display applet in Control
Panel to click a checkbox. Some laptops come with their own display
management programs to switch between these choices.
Note
If the display on the laptop is not working, toggle the dual-display key
by pressing it repeatedly to see if the display changes. The user might
have accidentally set it to projector only.
Wireless (On/Off) use this key to turn wireless on and off. The key
typically has a radio transmitting tower icon. You might see the wireless
control in different places. Some laptops have a button above the keyboard
that can control some features. One LED looks like a transmitting antenna and
it is blue when wireless is enabled. If you press it, it changes to orange and
disables wireless. Some laptops have a switch for wireless on the side.
Figure 7.8 Wireless (On/Off) touch panel button (left) and wireless
function key (right)
When faced with an unfamiliar laptop that a customer brings in for repair, you
have the following options:
Step 1 find a dedicated laptop technician and refer the customer to that
technician.
Step 2 if the problem looks like something you can repair, then search
the Internet for videos and other sources of information. Every portable
computer has a specific make and model.
People have to deal with broken devices, and they sometimes place videos
or a list of troubleshooting steps online on how to repair the problem. This
applies to desktop computers and other devices as well. Take precautions
when following guidelines online; otherwise, you could do more damage
instead of actually fixing the problem.
Step 3 if it is beyond your skills level or it needs a set of expensive tools
that you do not have, then revert to step 1 and go and find a dedicated
computer technician/repair centre. Otherwise, determine what tools and
parts you need. You will have to buy some parts from the manufacturer or
vendor.
If you are going to do the repair, you must find out whether the laptop is
under warranty, which means that support and parts for the laptop are given
for a period of time under certain terms and conditions. Performing tasks such
as removing labelled parts can cause that manufacturer to cancel the warranty
and thus provide no support. If the laptop is under warranty, look at the
documentation on how to get the necessary technical support.
Manufacturers might provide diagnostic software that tests components for a
specific laptop model to find out if they need to be replaced. The software can
be downloaded from the manufacturers website, stored on the disc or stored
on the laptops hard drive.
Laptops from reputable vendors are sold with an OS pre-installed at the
factory. The OS is customised by the manufacturer to the specific needs of the
laptop. In this situation, the manufacturer is called the original equipment
manufacturer (OEM) and the OS is called the OS build. Drivers installed on
an OS build are also specific to proprietary devices installed in the laptop, and
diagnostic software is written specifically for the laptops OS. Therefore, be
very careful when upgrading the OEM laptops OS to a new one. If you have
problems with a component, in many circumstances you will have to go to the
OEM for solutions and updates for device drivers.
Figure 7.12 shows an entry-level toolkit for a laptop technician. There are
more professional toolkits that have many more tools.
Step 5 put a name on every cable, component and screw location and
take notes or photos of the entire dissembling process. It is common to
tape the screws you remove next to the photos you take or to the
manufacturers documentation to keep track of where each screw goes.
Step 6 organise any parts you remove from the laptop. Store screws and
other small parts in a container of some kind.
Step 7 take ESD precautions. You can attach an anti-ESD wrist strap to
an unpainted metal part of the laptop, for instance, on a port on the back
of the laptop. If a wrist strap is not available, ground yourself by touching
an unpainted metal part before touching any sensitive component inside it.
Keep ESD-sensitive components (CPU, memory, adapter cards, etc.) in
anti-ESD packaging and work on an anti-ESD mat.
The following laptop repair websites provide useful resources such as links to
major vendors laptop manuals and illustrated step-by-step procedures for
removing many components:
www.insidemylaptop.com
www.laptoprepair101.com
Note
The laptops battery allows it to run for a period of time when disconnected
from AC power. You will see batteries in many different shapes, sizes and
types. Types of batteries include the older and outdated Ni-Cad (nickelcadmium) battery which loses a significant amount of its rechargeability if
charged repeatedly without being totally discharged (a problem called
memory effect); the longer life NiMH (nickel-metal-hydride) battery which is
much less susceptible to memory effect problems, can tolerate overcharging
better, can take more recharging and can last longer between recharge cycles;
and the current lithium-ion (Li-ion) battery, which is more efficient than
earlier batteries.
Relative battery capacity is measured in cells. A battery that has more cells will
have a longer run time but also a longer charge than one with fewer cells. A Liion battery has good storage capacity and discharges slowly when it is not
used. Keep in mind that large capacity batteries are larger.
You can charge the battery in the following ways:
Quick charge plug the laptop into the AC wall outlet with the laptop
turned off. This takes a few hours to fully charge the battery.
Trickle charge plug the laptop into the AC wall outlet with the laptop
turned on. This is a slower charging method that can take several hours to
charge the battery.
Battery charger an external charging unit that charges the battery while
it is removed from the laptop. Keep the charger away from flammable
materials and ensure that there is good ventilation around the unit.
When the battery is fully charged, the laptop continues to run on power
coming from the AC adapter.
Note
The battery that comes with the laptop should be able to power all internal
components and common peripherals. If you have power problems, use fewer
peripherals at a time, lower the screen brightness, use CPU/graphics card
throttling features, and disable Bluetooth and wireless devices that are not
being used. If you need extra battery power for more peripherals, you can buy
a second battery pack and fit it to a media bay.
In general, stick to the following best practices:
Never drain the battery all the way down unless this needs to be done as
part of a battery calibration (where you reset the battery according to
steps given by the manufacturer). Rechargeable batteries have only a
limited number of charge/discharge cycles before overall battery
performance is reduced.
Never handle a battery that is damaged; battery chemicals are very
dangerous.
Recycle old batteries using the correct recycle procedure.
Follow the manufacturers instructions for charging a particular battery to
get the best battery life.
Most batteries are very easy to remove and replace. Just make sure that you
get the manufacturers recommended model. Before inserting or removing the
battery pack, turn the laptop off and unplug it from the wall outlet. Batteries
are typically held in a compartment in the unit that is secured with a sliding
latch or screws on the bottom of the laptop or in a media bay on the side. You
can slide the latch to one side to release it or unscrew to remove the screw
plate. Turn the laptop over, release the latch and allow the battery to slide out
or remove the battery with your hands. Insert the new battery using the
reverse order. Just make sure you insert the battery so that the positive and
negative terminals are in the right directions. Check the laptop manual for the
proper charge time for the new battery.
Removed battery
Battery
goes here
Latch
Figure 7.14 Remove laptop battery
Note
Hard drive
RAM
Hard drive, RAM, cards
Figure 7.17 shows the bottom of a laptop with the plate removed. When the
screws are removed, you can remove the plate to get to the internal
components.
Every laptop offers a unique challenge to the laptop technician who wants to
upgrade RAM. More often than not, you need to unscrew or open a screw plate
on the bottom of the laptop, otherwise you will have to remove the keyboard.
To replace a RAM module, shut down the laptop, unplug it and remove the
battery. Take ESD precautions. Review your documentation to find out where
the module(s) can be found. For this step assume that RAM is added to a
compartment underneath the laptop. Figure 7.19 shows how to remove the
RAM module from the compartment. The compartment is opened by undoing
screws from underneath the laptop and removing the screw plate. This laptop
has two slots for two modules. Some laptops support multi-channel memory.
Each module is held in place with latches that are fixed into each slot that lock
into the notches on each side of the installed module. When secured, the
module lies flat, but when you release the latches by gently pushing them
outwards, the module rises to a 45 degree angle, allowing easy removal.
Some systems give you control over the amount of shared memory while
others simply allow you to turn shared memory on and off. The parameters are
found in CMOS Setup on only those systems that support shared memory.
A+ Preparation | V1.0 Jan 2014
Adding more system RAM to a laptop with shared memory will improve laptop
performance.
7.2.5.2 Replacing the laptop (2.5 inch) hard drive
Most hard drives in new laptops use a SATA connector that is often a combined
power and data connector. Older PATA drives directly plug into a 44-pin
connector, which means you need to pay attention to cabling and jumpers.
Some PATA drive makers may need you to set the drive to use a cable select
as opposed to master or slave, so check with the laptop manufacturer for any
special configuration.
If you need to buy a hard drive for a laptop, ensure that you get one 2.5
inches in size. Compared to its 3.5 inch desktop counterpart, the 2.5 inch
laptop drive tends to be slower and has a lower TB capacity. If you need more
space, you can connect an external drive to the laptop using a media bay,
expansion card or through an appropriate port.
7.2.6.3
Adapter slots and cards
Manufacturers have developed ways for you to add features to the laptop
through expansion slots and cards.
Mini-PCI/PCIe expansion slot
Mini-PCI is an SFF expansion slot that supports 32-bit data transfer at 33 MHz
using 3.3V power with bus mastering and direct memory access.
Mini-PCI cards are installed inside the laptop with their ports generally lining
up with the edge of the outside of the laptop case. There are three types of
Mini-PCI cards:
Mini PCI cards allow SCSI, SATA, USB, FireWire, wireless, network, sound and
other types of device and memory connectivity. Some mini-PCI cards have
multiple functions such as a modem and network adapter.
Mini-PCIe slots and cards are smaller than Mini-PCI but they can carry more
data. Their cards have a 52-pin edge connector, support USB 2.0 and PCIe x1
lane functionality and use 1.5V and 3.3V power.
PC Card
For many years, the Personal Computer Memory Card International
Association (PCMCIA) established parallel bus standards involving laptops
and other portable computers, especially when it came to expansion cards,
which are generically called PC Cards. See Figure 7.26. PC Cards are small,
credit card-sized cards that come in three sizes: Type I, II and III, each
differing in the thickness of the card (Type I being the thinnest and Type III
the thickest).
Each card has at least one function, such as networking, but many have more.
All cards are hot swappable (hot-pluggable) and they insert into a slot in the
side of a laptop. All slots are backward-compatible and most laptops offer
multi-purpose slots for different cards.
PCMCIA 2.0 are 16-bit, 5V cards that can be used in PC Card and CardBus
(PCMCIA 2.1) slots. CardBus are 32-bit, 3.3V cards that support 133 Mbps
speeds and their slots are keyed, which means they cannot be used in
PC Card slots.
To insert a PC Card or Cardbus card, just push it into the slot until it stops.
Then attach any cables or dongles needed for operation. To remove it, remove
any cables or dongles. Click the Safely Remove Hardware or Eject icon in
Windows. Stop and wait for the computer to acknowledge that the card can be
removed, and then push the ejector button and pull the card out of the slot
and store it in its case or anti-ESD bag.
ExpressCard
Some newer laptops include an ExpressCard slot and there are a wide variety
of ExpressCards available that provide USB, eSATA, network, FireWire,
memory, sound and many other functions. ExpressCard is a serial bus using
1.5V power. Its slots are not backward-compatible with PCMCIA. Figure 7.27
shows the two ExpressCard versions.
The trend for newer and lighter laptops is to include multiple USB
ports rather than ExpressCard or PC Card slots as the means of
connecting peripherals to the laptop.
To insert an ExpressCard, just push it into the slot until it stops. Then attach
any cables or dongles needed for operation. To remove it, remove any cables
or dongles. Click the Safely Remove Hardware or Eject icon in Windows. Stop
and wait for the computer to acknowledge that the card can be removed. Push
in the card to release it and then pull the card out of the slot and store it in its
case or anti-ESD bag.
A+ Preparation | V1.0 Jan 2014
1:
2:
3:
4:
Remove
Remove
Remove
Remove
Partially lift the keyboard up but not all the way up since there is a cable
connector that attaches the keyboard to the motherboard. This cable is known
as a flex cable. Gently work the connector out of the slot. The connector
usually has two locking tabs, one on each end of the flex cable connector. Use
a small screwdriver or toothpick to move these tabs into the unlocked position.
Otherwise, with another connector you must pull it up and away from the
motherboard connector as shown in Figure 7.30. Now you can lift the keyboard
up all the way and you are ready to install the new one.
A USB keyboard can be used in place of the laptop keyboard when the
laptop keyboard is broken or in for repair.
If you need to remove the touchpad, you can usually do this after removing
the keyboard, and you might have to remove other components such as the
hard drive and optical drive that block access to the screws that hold the
touchpad in place. Details vary from laptop to laptop.
Touchpads are usually held in place with a clip and connected to the
motherboard with a cable. Carefully remove the clip and the cables connector
and you will be able to remove it. Reverse the steps to replace the touchpad.
It is often held in place with one or more screws and has a connection to the
motherboard. Remove the screws and the connector and you will be able to
remove the speaker. To replace the speakers, reverse the steps.
Tip
Refer back to Unit 3 for more information on how these display types
work. Plasma displays have not been used for laptops for a long time
because they use a lot of power and their internal design makes them
unsuitable for use in laptops.
Tip
If the screen has an LED backlight, then the entire screen panel must
be replaced. For an OLED screen, there is no inverter and backlight to
replace.
The graphics adapter in a laptop does the same thing that the computer
graphics adapter does: it generates and manages the image sent to the
screen. On lower end laptops the graphics adapter is often built into the
motherboard chipset and most often shares system RAM with the CPU. For
graphic-intensive tasks, shared memory can slow the system down quite a bit.
Despite this, integrated graphics help with battery life and cooling.
With the screen separated, you should be able to get to and unplug the
video (display) cable from the back of the screen. Unplug the video cable
from the connector at the back of the screen.
For some screens, when you separate the screen you will see the
inverter card. The inverter (if used) typically has two connectors.
Disconnect these and remove the inverter. As always, hold the circuit
board by its edges and try not to touch any actual circuits or chips. You
can buy inverters from various places online, including the manufacturer
of the laptop or laptop display. Make sure you are getting the right part
number. Connect the flex cable and the other connector to the inverter
board.
Tip
At this stage, the bulb could be replaced (if it failed) on some laptops.
It is usually found on the back of the screen at the bottom. However,
some screens have non-removable bulbs. If this is the case, the entire
screen must be replaced.
To find the new replacement screen, you can search by the part/model number
printed on the back of the screen.
12.
13.
14.
15.
16.
17.
If the CPU is soldered to the motherboard, you will not be able to replace it,
but if the CPU can be replaced, then you should read the manufacturer's
manual for detailed instructions.
Figures 7.40 to 7.42 show some of the steps for taking a particular type of
laptop model apart.
As you can see in Figure 7.41, the CPU has an elaborate heatsink and fan
assembly that includes both the CPU and chipset. Each of the components
screws down in multiple places, plus the fan has a power connection. Some
models have a fan that is separate from the heatsink. No matter what cooling
system is used, the CPU cannot be replaced without removing the fan and
heatsink.
Laptop CPUs use different sockets than desktop CPUs. They are not
interchangeable.
Install the CPU first, followed by the heatsink, fan (if not built into the
heatsink) and the rest of the laptop components you took out.
Then you will rebuild the laptop and hope it works. As with other components,
follow the procedures in the manufacturers instructions in the manual.
Put it back together in the reverse order in which you took it apart.
Be sure to tighten (not over tighten) all screws. Loose screws and other
parts can be dangerous because they can cause an electrical short as they
move about inside the laptop. Make sure there are no loose parts before
turning the laptop on.
Use power management, even if you are plugged into the AC wall outlet.
Always use a hard, flat surface to allow the cooling fan and vent on the
bottom to work properly.
Listen to the fan, assuming the laptop has one. If it is running very fast
(you can tell this by a high pitched whirring sound), then take a look at your
power management settings and your environment and change whatever it
is that is causing it to hold on to that heat. Be alert to a fan that suddenly
goes silent. Fans do fail, causing overheating and failure. All laptop fans can
be replaced easily.
Clean the laptop regularly as follows:
o Use a computer vacuum cleaner or compressed air can to clean vents.
o Use compressed air can to clean the keyboard.
o Use a soft cloth and approved cleaning solution (or water and mild
detergent) to clean the screen, touchpad and case.
Although some (not all) laptops can take knocks and can survive being
dropped, it is best to carry the laptop in a suitable case.
Media bay: A media bay holds a device that you can switch with another.
Although laptops most often connect to port replicators or docking stations
with USB ports, some manufacturers have proprietary connections for
proprietary port replicators and docking stations. To use a port replicator or
docking station, plug all the peripherals into it and then connect the laptop to
the port replicator or docking station. For universal port replicators that can be
used with different laptop models, software drivers must be installed before
connecting the replicator. Standard port replicators might include drivers, or
the driver might come pre-installed.
With the voice control system, you can answer and make phone calls, respond
to messages and perform other tasks. Some smart watches support gesture
control, which means that you can perform a task such as answering a phone
call simply by moving your hand. Additionally, many smart watches
synchronize with a mobile device to exchange data.
Smart talking shoes, such as Google shoes shown in Figure 7.49, have a tiny
built-in computer that can detect your movement and can motivate and give
you feedback while you are performing certain tasks such as walking, running
or exercising. It has speakers and a microphone, a screen, pressure sensors,
an accelerometer to measure the increase of speed, Bluetooth to connect to
social networks and other technologies.
8.1 Printers
A printer is a peripheral device that places what you see on screen onto media
such as paper. A printed copy of data from the computer is referred to as a
hard copy. A print job is a file that is sent to a queue and patiently waits
there until the printer agrees to print it. Many programmers use the terms
page, workbook and binder in their applications instead of the term paper.
What a printer can and cannot do is largely determined by the type of printer
technology it uses, that is, how it gets the content onto paper.
Although different types of printers exist, the principles are the same for most
of them. Each type has its own characteristics that affect how you install,
configure and troubleshoot it. The best way to begin covering printers is to
look at what they have in common. Most printers have the following
subsystems:
Paper transport pulls, pushes and rolls paper through the printer. This
can be done using a belt, tractor feed and rollers.
Marking engine components that are responsible for placing the image
onto paper. This includes ribbons, print cartridges and moving parts that are
inside one of these and anything else needed to print the image.
Print engine the brains of the operation that accepts data and
commands from the computer and translates these commands into action.
It also redirects feedback from the printer to the computer.
Tip
Speed how quickly the printer can print, measured in Pages Per Minute
(PPM). Different speeds are given for different printed outputs (for
example, pages for monochrome text using black ink only will print more
quickly than full colour pages).
Connections almost all printers support USB while some models support
network and wireless connections too.
Image quality the basic measure of print quality is the maximum
supported resolution, measured in dots per inch (dpi) or simply how
many dots the printer can print per square inch of paper. Horizontal
resolution is determined by the print engine and vertical resolution by the
paper handling mechanism.
Some printer specifications use two numbers, such as 600600, to describe
resolution, but when the numbers are the same, you will often see it as one
number (i.e. 600-dpi printer implies a 600600 dpi resolution). The
minimum resolution for a monochrome (black and white) printer should be
600 dpi and for a photo-quality printer 1200 dpi. Higher dpi means the dots
are closer together and the better the quality of the printout.
Figure 8.2 The print quality dialog for a laser printer with graphics
resolution (text quality is not affected by this option)
Note
Printer dots are not the same as pixels. Multiple dots are needed to
reproduce one pixel.
AC power supply provides power to the motors that move the paper,
the system electronics, the laser system and the secondary transfer
corona/roller.
Control panel the printers user interface.
System board holds most of the electronic circuitry, processor, ROM and
RAM. A printer might have one or more boards. If a printer does not have
enough RAM to hold a print job, it will often give an error message. You can
add RAM to the printer as long as you search the manufacturers website
for the correct type of RAM it needs.
Developer roller rotates to magnetise the toner before it goes onto the
drum.
Control blade prevents too much toner from sticking to the drum.
Tray holds the paper to be printed. Paper should be held by media
guides. Different trays may support different types, sizes and thicknesses
of paper and other media.
Pickup rollers used to pick up a sheet of paper from the tray and begin
feeding it through the printer. Paper in the tray should be held by media
guides.
Separator pad/roller works with the pickup rollers to ensure that only
one sheet of paper is picked up and passed through the printer at a time.
Registration roller holds a page until the next laser process is ready for
it.
Secondary transfer corona wire/roller applies a charge to the paper
to pull the toner from the drum onto the paper.
Where should you plug in the laser printer? The best choice is to use a
dedicated surge protector that does not have any additional equipment
plugged into it. The next best choice is to plug it into a grounded wall outlet. It
should not be plugged into a power source that is shared with other devices.
8.2.1.2 Laser printing process
The laser printing process, known as the electro-photographic imaging
process, includes the following stages that work in a specific sequence to place
the image onto paper:
Stage 1: Processing
Process the image. This is also known as the raster image processing
stage. A raster image, also known as a bitmap, is a pattern of dots. A laser
printer uses a chip called the raster image processor (RIP) to create the
raster image. The RIP receives the print job from the printer driver, creates the
raster image and stores it in memory.
Note
If the printer does not have enough memory to store the raster
image, a memory error occurs.
Stage 7: Cleaning
Clean the drum. To prepare the drum for the next sheet of paper, a rubber
blade, pad or roller cleans the drum by scraping any leftover toner for reuse.
An erase (discharge) lamp or primary charge roller removes any leftover
charge on the drum.
1.
2.
3.
4.
5.
6.
7.
Cover
LCD panel
Control panel
Belt for print head
Output tray
Ink cartridges
Flash memory card reader
Unidirectional the printer prints only when the print head is moving
from left to right.
Bidirectional the printer prints when the print head is moving from left
to right or right to left. This method is usually enabled in the Printers
Preferences page and might be named High Speed.
Note
Owing to the cost of the ink cartridges, many people look for alternatives. You
can get kits to refill the cartridge, but this practice is generally not
recommended. Most ink cartridges are vacuum-sealed and it is difficult to
replace the ink and keep the seal. Without the vacuum seal, the cartridge can
leak and damage the printer. However, there are professional companies that
use high quality ink and have the equipment necessary to refill cartridges and
keep the vacuum seal.
8.2.2.3 Inkjet print heads and cleaning cycle
There are two primary Ink Delivery Systems (IDS) used by inkjet printers:
Thermal (or bubble) uses heating elements to heat up the ink. Each
nozzle attaches to a small ink chamber that attaches to a larger ink
reservoir. Ink inside the chamber heats to a boiling temperature. Once the
ink boils, a bubble forms. As the bubble gets hotter, it expands and is
forced out of the nozzle onto the paper. Ink is sent through the print head
only when it is needed.
Many manufacturers, such as the one that makes bubblejet printers, use
this process or a similar process, but they all generically referred to as
thermal inkjet printers.
Piezoelectric moves the ink with electrical charges. The print head
nozzles have piezoelectric crystals, which vibrate and change shape when a
charge is applied to them. This vibration of the crystal controls the flow of
ink onto the paper. Ink is sent through the print head in a continuous
stream whenever the printer is printing.
Fixed intended to last the lifetime of the printer and costly to replace. If it
fails, it is usually cheaper to replace the printer.
Disposable usually built into the ink cartridge. When you replace the ink,
you are also replacing the print head. Other disposable print heads are
separate from the ink, but they are usually easy to replace.
Although dot matrix printers are relatively slow and noisy and do not create
good quality printouts as inkjet and laser printers do, when all these
requirements are not important, they provide acceptable results.
Tiny metal pins, called print wires, are located in a print head. Paper moves
under the print head by pull or push tractors. A motor and carriage assembly
move the print head from side to side across the paper as it prints. The pins
are fired by coils of wire called solenoids.
When a coil is energised (given voltage), it creates a strong electromagnet that
makes the pin move forward and strike the inked ribbon against the paper,
leaving tiny dots.
All the possible dots in a certain area represent a dot matrix and collectively
they all create the image on paper. As soon as the pins have been fired, a
strong permanent magnet returns them to their resting position. A ribbon, a
long strip of cloth soaked with ink, is also moving during the printing process
to reduce wear.
Plain paper held against a moving roller (the platen), which rotates and
pulls the paper through the printer by friction. A cut-sheet feeder may be
added to some printers to automatically provide the next sheet of paper.
Tractor-fed paper also known as fan-fold, continuous or even paper
with holes, it is suitable for multi-part forms. The sheets are attached to
each other and include sprocket holes on each side. The holes in the sides
are secured over rollers at each end of the roller.
A tractor feed mechanism feeds the paper using these sprocket holes. Each
sheet includes perforated sides that you can tear off and separate the
sheets after printing.
The feeder passes the paper to the printer and is specific to the printer model.
Pin feeders and tractor feeders are used with continuous paper. The sprockets
and pins on the side of the printer advance the paper through it. These can be
adjusted to suit the type of paper and different paper widths.
A platen gap lever is often fitted to printers capable of printing on multi-part
forms. While some printers allow you to use this lever to adjust the gap
between the print head and the platen to different paper thicknesses, more
sophisticated printers adjust the gap automatically. Incorrect adjustment of
the platen gap can cause faint printing (gap too wide) or smudging (gap too
narrow).
Figure 8.14 shows a dot matrix printer.
Direct thermal printer uses a print head that burns dots onto the
surface of heat-sensitive thermal paper to create the image. The special
thermal paper is covered with a chemical that when heated changes colour.
Thermal wax printers uses a print head that melts ink from a waxbased ribbon onto the paper to create the image.
Both printers use a print head that is the width of the paper. When a printer
needs to print, a stepper motor turns a rubber roller which feeds the paper
past the print head. A heating element heats certain spots on the print head to
a certain temperature. The paper below the heated print head changes colour
in those spots to create the image.
Thermal printers can print in one or two colours with paper available in
different sizes and colours. Their speed is measured in inches per second (ips).
Paper may be in a fan-fold or roll format.
You need to clean thermal printers periodically with compressed air or an ESDsafe vacuum to remove dirt. You can clean the print head with isopropyl
alcohol and a lint-free cloth or a cotton swab. Cleaning the print head extends
its life, but you can replace it if it fails.
Note
Laser printers are used in larger companies. Inkjet printers are used
by home users and small office environments. Impact printers are
used in companies that need multi-part forms. Thermal printers are
used for receipts, labels and barcodes.
8.3 Paper
There is a wide variety of paper types and forms available for printers,
including single sheet paper for inkjet and laser printers, continuous paper for
dot matrix printers and thermal paper for thermal inkless printers.
Manufacturers recommend the best paper to use for the printer in different
situations. This is most important when printing colour printouts.
Figure 8.20 Print server that supports an Ethernet, wireless and USB
Options and upgrades look for memory upgrades, paper trays, feeders,
sorters, staplers, and printer stands.
Replacement parts look for parts made by or approved by the printer
manufacturer or vendor. This includes maintenance kits.
Additional software to use with your printer, such as software to create
business cards or edit photographs.
Firmware updates some printers have flashable firmware to solve
problems and add features. Download the correct update for your printer.
8.5.1 Researching
There is a lot of information on the Internet about printers. All of the top
printer manufacturers, for example, HP, Lexmark, Canon, and so on, have
websites that can provide insight into modern printers. As a computer
technician, you will need to visit these sites for information about new printers
and to download the most current drivers for those printers. It is
recommended that you visit one of the major printer manufacturer websites
and take a look at the various printer features and download pages for the
different types of printers available.
1.
2.
3.
4.
The method you use depends on the printer. Go to the support website for the
printer to find out whether a firmware update is available, what the benefits
are for updating the firmware and how to install the update.
8.8.2.3 Paper
The printers software will notify you when the tray runs out of paper. When
loading new paper:
Use good quality paper designed for the model of printer and print function.
Do not overload the paper tray.
Do not use creased or dirty paper.
With paper jams, the printers display screen will notify you of the area of the
printer that is jammed. Check the manufacturers manual to find out how to
remove components that might prevent you from removing the paper. Do not
rip or tear the jammed page. Look for a release mechanism or lever to remove
the page stuck in the fuser or developer assembly.
The toner cartridge in some laser printers includes the drum, the
developer and/or a cleaning blade. Therefore, when you replace the
toner cartridge, you might also be replacing other components.
The toner cartridge/drum is light sensitive. When removing it, make sure that
it is removed for a short period of time and place it in its storage bag or in a
dark area. Also, you should be careful not to touch it. You can easily scratch it
or leave marks that will not be cleaned during a print cycle. These scratches or
marks will appear on every printout until the drum is replaced.
Note
Most laser toner cartridges include replacement filters and instructions about
what should be cleaned. It is common to replace the ozone filter when
replacing the toner cartridge. Other filters can usually be cleaned by
vacuuming them. Follow the manufacturers recommendation.
8.8.2.5 Calibration
Colour laser printers have the potential to create colours or lines that are not
aligned properly. Many printers use a transfer belt to minimise this problem,
but the problem can still occur. The solution is to run a calibration test done
manually using the printers screen or driver software. This will ensure that the
printer heads are aligned.
8.8.2.6 Replacing the maintenance kit
Your source for determining the parts that need to be replaced and when to
replace them is the printer manufacturer. Many laser printers have
components, such as the fuser, rollers or pads, that wear out over time and
should be replaced according to a regular schedule. These components can
usually be bought as a maintenance kit or separately. Many laser printers
that use a maintenance kit display a message or error code with a meaning
such as Service Required, Perform Printer Maintenance, Maintenance Kit
Replace or Perform User Maintenance after the printer has printed a specific
number of pages (its copy or page count). The maintenance kit may also
include step-by-step instructions and any special tools or equipment you need
in order to perform maintenance.
Depending on the model and whether the printer uses colour or monochrome,
the recommend page count can be up to hundreds of thousands of pages. To
determine how many pages the printer has printed so that you know when to
perform maintenance, you need to get a page count from the printer since its
last maintenance period. This can be done with buttons on the printer to print
a printout or by using the printers program from a computer connected to the
printer.
Note
Print heads can also develop minor alignment issues over time. This means
print head alignment must be done. Again use software program (usually the
driver software) to align the print head. This is typically done when replacing
ink cartridges.
Paper when loading tractor-fed paper, ensure the holes in the paper are
engaged in the sprockets and the paper enters the printer cleanly. Also
check for torn sprocket holes, separated tear-offs and damaged sheets.
Paper dust it is very common for these printers to build up paper dust,
especially with tractor feed paper. You should clean them out regularly with
compressed air or an ESD-safe vacuum cleaner.
Paper path the paper path can get jammed. You can normally see the
entire path of an impact printer, so it is usually fairly easy to clear a paper
jam.
Ink ribbon as the ink ribbon is used and becomes worn, the print quality
goes down. Replace the ribbon.
Print head the pins on the print head can become damaged and no longer
fire. It might be because of paper dust, so when you clean out the printer,
you should also clean the print head. Compressed air works well. When a
pin stops firing in a print head, the only option is to replace the print head.
Platen the roller or plate on which the pins impact can develop dents over
time, but you can often rejuvenate it by rubbing it with isopropyl alcohol.
Check the platen gap carefully. An incorrect platen gap can lead to ribbon
and print head damage.
Gears and pulleys be sure to keep these oiled according to the
manufacturers instructions.
8.9 Scanners
A scanner scans photos, documents and other items and converts them into
digital files for the computer to store and process. After the document has
been scanned, it can be saved, changed and emailed to another computer, as
you would with any other file. Task-specific scanners, such as receipt
scanners and business card scanners, are also available. The following
sections discuss the different types of scanners:
The last mirror reflects the image onto a lens, which uses either a prism to
split the image into red, green and blue (RGB) colour or focuses the image
onto sensors covered with different coloured filters.
8.9.3 3D scanner
A 3D scanner scans a real-world object, such as a car, to gather data about its
shape and how it looks, such as its colour. The collected data is converted into
digital data, usually having many points (vertices) and processed by 3D
software.
You should be able to adjust the resolution, colour depth and grey scale depth
on the scanner.
UPC code
ISBN
Barcode reader
RFID tags are intelligent bar codes that have chips and radio antennae which
can communicate to a networked system over the air with radio waves so that
people can track information about the object the tag is attached to.
The networked system is linked to a database or hardware inventory tracking
system.
You can attach an RFID tag to products, price tags, shipping labels, ID cards,
and more items. An RFID reader is used to read data in an RFID tag. You can
also get RFID printers.
Dirty air dust, debris and other dirt particles can block air vents and
create thick layers of dirt on parts, causing them to overheat, short circuit
and even stop working. Clean them regularly to avoid problems. You can
also use air and dust filters on vents, or place the computer within an
enclosure with its own air filters and fans to keep out dust.
Mouses mouse cleaning kits are available. For an older mouse, clean the
trackball if it is dirty using a mild detergent, soapy water, contact cleaner
or isopropyl alcohol. Rinse the ball and dry completely with a lint-free cloth.
Use a cotton swab or lint-free cloth with isopropyl alcohol to clean the
rollers inside the mouse. For an optical mouse, simply wipe the bottom of
the mouse with a damp, lint-free cloth. Use the mouse on a clean, flat
surface.
Keyboards keyboard cleaning kits are available. Keep food and liquids
away from the keyboard and other parts. Use a compressed air canister,
computer vacuum cleaner or brush to clean debris from the keyboard and
wipe down the surfaces with a lint-free cloth and approved cleaner. Use a
key puller to remove and clean dirty keys or replace them.
Turn the device off and disconnect it from the power supply before
cleaning it. After cleaning the device, power on the computer to make
sure it works as it should.
Frequency Checks
Monthly
Make sure the fans are working correctly.
Run hard drive checks.
Ensure all cables are correctly seated and connected to the
chassis, components and peripherals.
Dissipative packaging a bag or foam packaging that is sprayed with antistatic coating or other chemicals. It is used to hold non-static sensitive
parts that are packed close to static-sensitive components.
Sub-type
Surge
Spike
Undervoltage
Sag
Brownout
Blackout
Noisy power
EMI
(Interference)
RFI
Explanation
A short (typically under 1 second) temporary
increase in voltage above the normal voltage line.
Also called transient voltage. Caused by turning
off a light and lighting strikes, and from both
power and data (network) cables. Many surges
are too short to harm the computer but longer
ones can cause the PSU to crash, reboot or even
damage it.
A short yet powerful surge (larger increase in
voltage) that can destroy computer equipment.
Lightning strikes are common causes of spikes. It
can come from power and data (network) cables.
A short drop in voltage that occurs for less than a
second. Motors, transformers and power tools
can cause sags. Sags can stop computer
equipment from working properly.
A drop in voltage that lasts for longer than a
second. Overloaded power circuits can cause
brownouts. Brownouts typically cause lights to
dim and computers to restart or shut down.
A complete power failure. Blackouts might be
caused by a blown fuse, tripped circuit breaker or
power line or power that is down.
Stands for Electromagnetic Interference, a
magnetic field that interferes with electronic
equipment. EMI can cause permanent damage
and erase data on some storage devices.
Stands for Radio Frequency Interference,
electromagnetic noise where radio waves cause
interference with other signals.
Overloading happens when the power strip pulls too much current from the
wall outlet or when too much current is sent to the power strip. To prevent
overloading, it might come with an on/off switch and circuit breaker that trips
and cuts off the power. The strip can usually be reset by pressing a button.
The UPS has a bank of batteries that give steady power for a limited period of
time, ranging from a few minutes to a couple of hours just enough time for
the power to be restored, a backup generator to switch on, or for the computer
to stay on and be shut down properly. This stops hardware and software
problems caused by unexpected power outages.
Although you can perform your own calculations using ratings such as the
UPSs volt-amps (VA) and watts, which takes a long time to do for each
computer component, a far better and quicker way is to visit the UPS
manufacturers or vendors website and use their configuration wizard or
calculator to find out how much power you need and what UPS to get. Figure
9.6 shows one of these UPS selector wizards.
Runtime the time the computer will keep running on power from the UPS,
usually measured in minutes.
Connections look for USB; other ports might be supported as well.
Display screen some UPS units have display screens that show line power
status, battery power status, battery low/replace status and other
information. Others have light indicators and switches.
Self-test some UPS units have a self-test procedure and include a selftest button.
Software many UPS units come with monitoring and maintenance driver
software, as shown in Figure 9.7.
Network support UPSs made for networks come with software that
notifies network users that the server is going to be shut down shortly.
Automatic shutdown essential for network servers or other unattended
systems, it needs a USB or serial port and software from the UPS vendor.
After a shutdown, it allows startup from a remote location over the
Internet.
Note
The more components you connect to the UPS, the less time the
battery can last if a power outage occurs. Thus, many UPS vendors
limit the amount of battery ports on the unit.
To use the UPS, simply plug the computer and monitors power cable into the
UPS and plug the UPS power cable into the AC wall outlet and turn the UPS on.
A UPS also normally connects to the computer using a serial or USB port to
provide status information and alerts. You can configure the UPS through its
driver software or by using the Windows Control Panel applet (the UPS may
add a tab under Power Management).
Many UPS units beep or sound an alarm at a different rate when the battery is
low and power is lost. Recharge or replace the battery. When the UPS is not
used, store it according to the manufacturers instructions. UPS batteries hold
less charge as they get older. Many vendors have trade-in programs for old
batteries and models.
9.2.1.5 Backup generator
For power outages that last for a longer time period, a backup generator can
be used. Using diesel, propane or natural gas as a fuel source, the backup
generator can give power for days to an entire building. Generators might take
time to start up, so UPS units should be used for a smooth transition to the
power generated by the backup generator.
Luckily, many companies specialise in computer recycling and will gladly accept
your old computer or component and some will even pick them up from you. If
you cannot find a recycler, call your local government department to see where
to drop off your computer. An even better alternative for your old computer is
to donate it to a charity or school.
Do the following for the various components:
Note
Use phrases such as Yes, I see or Uh-huh from time to time so that the
customer knows you are paying attention. Do not eat food or drink while on
the phone. Tell the customer that you are putting him or her on hold and
explain why. Do not keep a customer on hold for long periods without getting
back to him or her.
Body language and appearance
A customer can see how you look and dress and your body language. Every
company has a dress code for technicians; follow it. Body language means
visual communication, such as your stance, hand movements and eye contact.
Try to make regular eye contact when speaking with the customer (but do not
stare).
Punctuality
Be on time for a visit, call or email. If you are running late, contact the
customer, apologise and let them know that you will be late, or reschedule.
You might also need to inform your manager as well.
Use proper language
Speak clearly and slowly so that the customer understands what you are
saying. Try to make sense of what you are saying. Stay away from using
technical language, jargon and acronyms (for example TCP/IP) that the
customer might not understand. While you do not have to speak too formally,
avoid being over-familiar with customers by using slang words such as hey.
Be positive and helpful
No matter what the situation, always keep a positive attitude and tone of
voice. Your tone of voice tells the customer whether you are tired, bored, keen
to help, angry or impatient. Dealing with angry customers is a part of anyones
job who works in the service industry. Allow the customer to vent until he or
she has calmed down. You will be able to collect more information about the
problem with less anger mixed into the conversation.
As long as you keep positive, you have a much better chance of getting him or
her to remember that you are there to help. You can use statements such as I
know how frustrating it feels to lose data or I know how it feels when I
cannot do the work to cool off the situation and let the customer know you
are on their side.
Be confident, friendly and helpful.
Deal with customers professionally
Be patient and understanding. Never argue with or shout at the customer or be
defensive or offensive (attacking). Avoid being judgemental and avoid using
the word you, as it can sound as if you are accusing someone of doing
something. Never ask questions such as What did you do? or Who was
working on this?
After you understand what the problem is, always clarify by repeating the
problem back to the customer to reassure him or her that you understand
what the problem is. Ask the customer to repeat anything you did not
understand.
Work ethics
Ethics are right and wrong principles by which we live and work. Companies
want employees who are honest, dependable and responsible, and have
integrity. Honesty means telling the truth, while integrity means doing the
right thing. Do not sell people goods and services they do not want and need.
Do not lie to your customers about a problem and do not hide your mistakes.
Do not be afraid to say I do not know and do not make a promise that you
cannot keep.
If the customer asks you to do something that is inappropriate, make sure you
know exactly what the customer wants you to do, then take the appropriate
action. For example, if you are asked to install company software on the
customers home computer, then check with that company if you are allowed
to do the installation under the companys licensing agreement. If allowed,
then proceed. If not, you will have to politely refuse the request. This type of
customer behaviour should be reported to your manager.
Do not help yourself to food and drink, and ask for permission to use the
bathroom.
Do not look around the customers files and folders unless it is necessary to
solve the problem and you have been given permission to do so. This is
especially important when dealing with private information at a desk,
printer or within files and folders. Ask the customer to move the private
information to another area where you cannot see it or close the file or
application, etc. Do not look at or touch confidential information.
When making changes to the computer during troubleshooting, reset (if
possible) the change back to what it was. For example, if you need to
change the resolution on the screen for troubleshooting, change it back
when you are done.
Keep your equipment out of the customers way and when at the
customers site, keep the working area clean and tidy and leave it as you
found it.
Avoid learning other peoples passwords. If you know a password that gives
you access to a mission-critical system and that system ends up
compromised or with data missing, who might be blamed? If you anticipate
accessing something many times (the more usual situation), ask the
customer to change the password temporarily.
Escalation
Escalation is the process of passing a request to another person, most likely
to someone who has more knowledge and experience and possibly more
resources to take on the job. Do not be afraid to escalate; not everyone can fix
every problem. Remember there is always someone to help you; it is just a
matter of finding them.
You should escalate when you cannot solve the problem, when you do not
have an answer to something, when you are not allowed to configure
something, or when the customer becomes difficult or abusive and demands
help with something you cannot provide support for. Tell the customer you are
escalating the problem to a more knowledgeable expert.
Know your companys escalation policy: what documents to fill out or software
to configure, who to pass the problem on to (your manager, co-worker, online
support, etc.), how to pass the problem on (by email, phone call or online
entry), whether you are still responsible for the problem, and who should keep
in contact with the customer after escalation.
Personal experience
Websites
Search engines
Online frequently asked questions (FAQs)
Co-workers
Support vendors
An expert system is software that uses a database of known facts and rules
to simulate the reasoning and decision-making ability of a human expert for
the purpose of helping the human to solve problems. These systems ask a
question about a problem that the computer technician or user must answer.
The response to each question triggers another question until the system
arrives at one or more possible solutions.
Many systems are intelligent and are listed in the general category of
computer software known as artificial intelligence.
Manage work activities in a timely and stress-less way
Problem management means tracking and documenting support requests.
Many companies use a Call Management or Problem Management System for
this. The system uses an incident or job ticket to track the name and other
information about the caller or company looking for help, the date, time and
length of the help desk or onsite call, the causes of and solutions to the
problem addressed, who did what and when, how each call was resolved, and
whether a follow up was done.
When someone calls for help, the computer technician creates the job ticket by
entering it into the system, which stays open until the issue is resolved and a
follow up is done. The ticket might be escalated.
Actual the person dealing with the problem. If escalated, the other
person has ownership.
Perceived the customer perceives that you, who initially took the call, has
ownership of the problem even though another person is handling the
problem. The customer expects you to keep in touch with them with
updates on how the troubleshooting process is coming along.
Ownership builds trust and loyalty because the customer knows that the
responsible person can be counted on. When escalating, always confirm that
either you or the escalated person has stayed in contact with the customer
and kept them up to date.
Set expectations
Keep the customer up to date and offer options. When you understand what
the problem is, tell the customer how you plan to fix it, what will be involved
and if not using a call management system, give them a reasonable
assessment of how long it will take to fix it.
A+ Preparation | V1.0 Jan 2014
If you truly do not have a feel for the time involved, tell the customer that you
cannot give an exact or predicted timeframe and then tell them what you will
need to know before you can set a time. Stay in contact with the customer
often, giving him or her updates at certain intervals. If applicable, give
different repair or replacement options as the job progresses.
Documentation
The customer decides when the job is done. For onsite support, provide the
customer with documentation about the services you provided, including costs
of replacement parts, hours worked, cost per hour, etc. Give the
documentation to the customer at the end of the service and keep a copy for
yourself or for your company. If the customer owns the replaced parts, offer
them to the customer (this is especially important if you replace any storage
media).
Quality assurance and SLAs
Although the word quality means different things to different people, many
people will agree that it means giving a product or service that is done well,
looks good and does its job well. Quality assurance in IT is the process of
giving quality products and services, and setting and measuring performance
targets against company goals.
Most service contracts are overseen by a Service Level Agreement (SLA).
The SLA is a contract or agreement between a service provider and a customer
that describes the level of service that the service provider agrees to give to
the customer.
Quality assurance and SLAs go hand in hand. SLAs must measure key quality
aspects of a service and should define exactly what the customer can expect
from the service provider, which specific equipment the service provider will
support and for how long, costs, diagnostics, preventive maintenance and
penalties for failing to follow these descriptions.
The SLA aims to:
Follow up
After you finish the job and complete the documentation, follow up with the
customer at a later date. Make a simple phone call to the customer to confirm
that the customer is happy with your work. If they are not, you will have an
opportunity to fix the problem. If they are happy, this follow up helps to build a
relationship with them.
Within IT, the activities that are not allowed are security incidents. In other
words, if the activity is not allowed by the companys security policy, it is an
incident. Examples of incidents:
Note
A client who asks for data and services; a client is sometimes referred to as
a workstation.
A server who provides data and services. A server is a computer that
provides a central place where access to hardware, software and other
resources can be controlled, managed and distributed. The server can be
dedicated to providing resources and services or it may be used as a client
as well, using applications and data stored on other servers.
A peer who both asks for and provides data and services.
Peer-to-peer all hosts can both ask for and provide data and services. For
example, two peers set up to share files are considered a peer-to-peer
network. On a Windows network, this is known as a workgroup.
Client/Server in this model, clients ask for data and services from one or
more servers, which allow the data and services to be easily managed and
secured. A client/server network is also called a server-based network.
Wired uses cable to carry data signals between devices. This is known as
bound media.
Wireless uses electromagnetic waves (radio signals) to carry data over the
air between devices. This is known as boundless media.
Although both bandwidth and throughput are related and are often used
interchangeably, they are technically not the same. Bandwidth is the
theoretical or potential speed that is rarely reached because of factors such as
interference and errors, while throughput is the real speed of the network.
The standard measure of both bandwidth and throughput is in bits per
second (bps) because networks usually transfer data serially or one bit at a
time. However, it is more practical to measure bandwidth and throughput in
kilobits per second (Kbps), megabits per second (Mbps) and gigabits per
second (Gbps). Mbit(s) and Gbit(s) are used interchangeably with Mbps and
Gbps.
Both the signalling speed, measured in MHz (millions of clock cycles per
second), and encoding method are important factors to achieve higher
bandwidths. Encoding simply means taking data bits and turning them into
the correct electrical, light or electromagnetic signals so that they can be sent
over the network media.
Note
Hybrid
Star
Bus
Full Mesh
3 different Rings
The physical topology of the network will most likely not be the same
as the logical topology.
Note
Layer 6 Presentation
The presentation layer is responsible for formatting data so that application
layer protocols (and then the users) can understand and work with that data.
Some common file formats handled by the presentation layer include JPEG,
ASCII, MP3 and MP4. Other examples of presentation layer formatting are
compression/decompression and encryption/decryption.
Encrypted text
Hello
1@2!m
Hello
Half-duplex
Full-duplex
Note
Layer 5 Transport
The transport layer deals with exactly how computers are going to send data.
Protocols at the transport layer do not actually send data. Two methods of
transport layer communication are connection-oriented and connectionless:
To pass data over the network to the correct application at the destination, the
transport layer must identify the target application that can work with that
data. To do this, the transport layer assigns an identifier to a TCP and UDP
application. This identifier is called a port number or port address. It is a
software or logical port, not a hardware or physical port. For example, web
servers typically open port 80 for web browsers to use this port to get web
pages from it. When a computer sends a segment, it specifies the destination
port that matches the service it wants to connect to. It also includes a source
port that acts as a return address for that connection.
Note
Layer 3 Network
The network layer packages segments into packets (sometimes called
datagrams) and moves those packets between different networks, LANs and
WANs. It has the following key responsibilities:
Routing the process by which a packet gets from one place to another.
It includes choosing the best path to a particular computer or network and
forwarding packets on that path to the destination (called path
determination).
Logical address: A logical address is one that can be managed, changed and
assigned by a user or system. For example, an IP address.
Internet Protocol (IP) is the protocol that gives devices an IP address, Internet
Connection Management Protocol (ICMP) is the protocol used for testing
network connections, and routing protocols are used by routers to learn about
networks and the best paths to them. All of these protocols work at the
network layer. Routers and advanced switches called multilayer switches work
at this layer.
Sending an IP packet
Layer 2 takes the Layer 3 packet and packages it into a frame and prepares
the frame to be sent over the media (which happens at the physical layer) so
that it goes to the correct host inside the network.
The data link layer is different from the other layers because it has two sublayers:
Logical Link Control (LLC) places information into the frame that
identifies the Layer 3 protocol to use for the frame (i.e. IP). LLC is
implemented by network software. It also controls the flow of frames (flow
control) and error checking.
Media Access Control (MAC) it turns packets into frames, controls how
frames are placed on the media and is responsible for picking up errors that
happen at the physical layer (only error detection, not correction). It is also
responsible for the logical topology of the network, MAC addressing and
delivery of frames to the correct host inside the network. In Ethernet, the
address used at this layer is called the Media Access Control (MAC) address.
Two protocols that work at this layer are the address resolution protocol (ARP),
which learns a MAC address from an IP address, and Reverse ARP (RARP),
which learns an IP address from a MAC address. Devices that work at Layer 2
include basic switches, wireless access points and bridges.
Network
Network
Network
Network
card
card driver
cables (or other media) and other connecting hardware
basic switches, hubs or wireless access points
Layer 1 Physical
The physical layer, also called the PHY, is where the actual data bits inside
frames travel over the media as signals. All signalling at Layer 1 is digital.
This can mean energising a copper wire with electricity, where electricity on
means a binary 1 and electricity off means a binary 0; or it can mean blinking
a light pulse down the cable where on equals 1 and off equals 0. Wireless
devices do much the same function but over the air.
Figure 11.14 Data moving through the layers of the OSI model
Every device on a network needs a network interface to send and get data.
Many types of network interfaces exist:
Most network adapters are built into the motherboard (on-board LAN);
otherwise, you can add an expansion card into an available expansion slot
on the motherboard.
Most laptop network interfaces are either built into the motherboard or fit
into an expansion bus or card slot.
USB network adapters plug into a USB port and can be used with both
computers and laptops.
00-50-56-C0-00-08
00:50:56:C0:00:08
0050.56C0.0008
To understand MAC addresses, you need to understand frames. Inside a frame
is the MAC address of the destination network adapter, the MAC address of the
network adapter that sent the frame, user data and some type of error check
to make sure the frame got to its destination in good order.
11.5.1.1 Choosing a network card
The following factors will help you choose a network card:
Network compatibility choose a network card that will work with the
cables and hosts on your network. For Ethernet, look for 802.3
compatibility, for wireless (Wi-Fi) look for 802.11 compatibility. Both
Ethernet and wireless can exist on the same network and often do.
Bus compatibility new network cards will most likely use the PCIe bus
while those for laptops will most likely use PC Card or Express Card
(CardBus).
Media type and connectors the card you use must have connectors
that match the type of cable you use. The most common Ethernet cable is
unshielded twisted pair (UTP), which uses an RJ-45 connector but you can
also get fibre-optic cables and connectors. Wireless cards usually have one
or more fixed or detachable radio antennae.
Combo cards these cards have two or more network connectors. Some
cards have different ports while others have the same.
Speeds network cards support different speeds, the most common being
100 Mbps (known as Fast Ethernet) or 1000+ Mbps (known as Gigabit
Ethernet) over twisted pair cabling. Wireless cards support different
speeds depending on the wireless standard supported. Many cards are
listed as 10/100 or 10/100/1000 Mbps cards, which means they will detect
the network speed of 10 Mbps, 100 Mbps, or 1000 Mbps and automatically
use that speed. Most Ethernet and wireless cards can fall back to a slower
speed by using an autonegotiation process. All modern Fast and Gigabit
Ethernet cards can work in full-duplex mode. You can also get faster fibreoptic cards.
Additional features a network card might have features that are important
enough for you to go out and buy the card. Some examples include:
o PXE this might mean the difference between automatically installing
an OS on 100 computers instead of walking around and performing the
100 installations yourself.
Driver almost every new network card comes with a driver disc, but the
latest drivers can be downloaded from the manufacturers website.
Physical slot availability check to make sure that the appropriate slot is
available before you begin.
Built-in network adapter if you have to install a network card, disable the
on-board network adapter. This can be done by going into CMOS Setup or
on some systems, a system configuration program.
11.5.2 Hubs
A hub connects several devices together. For example, you can connect a
number of computers and a printer to a hub and all of these devices will be
able to communicate with each other. Most hubs have a number of RJ-45 ports
and you can run twisted pair cables from each of the network devices to the
hub. Figure 11.21 shows several network devices set up in a star topology
through a hub. You can also join multiple hubs together to create bigger
networks.
11.5.3 Switches
You do not usually connect computers directly to each other, especially on a
network that has many computers. Instead, you connect each computer by
cable (usually twisted pair) to a switch. You, in turn, connect the switch to the
rest of the network. Many LANs have a number of switches connected to each
other, a process called daisy chaining, while SOHO networks typically use
one switch. Each Ethernet switch has a certain number of RJ-45 ports into
which you can plug networking cables. An eight-port switch, for example,
allows you to connect up to eight computers to it; one computer to each port.
The terms bridge and switch are often used interchangeably when
talking about how they work. Both switches and bridges break up one
large overloaded network into smaller sections to achieve better
performance, and both look at MAC addresses to build a table and
make forwarding decisions so that frames are sent to specific devices.
A switch is simply a faster bridge with more ports and features. There
are other differences between them: a bridge performs its bridging
function using software; a switch uses a hardware processor chip
called Application Specific Integrated Circuit (ASIC) to switch
frames more quickly; a switch supports different port speeds, a bridge
does not; a switch supports full-duplex, a bridge only half-duplex.
Both basic switches and bridges work at Layer 2.
11.5.4 Routers
A router connects networks together to create an internetwork. As a Layer 3
device, the router works by understanding packets and protocols to find out
what network packets are coming from and what network must they go to. You
can have multiple routers on a network and all of them will monitor the
network and choose the best path to forward packets to their destination. If
part of the network is very busy, a router can automatically forward packets
along a less busy path.
A+ Preparation | V1.0 Jan 2014
A router can connect networks that use the same and different networking
technologies, such as in LANs, WANs and on the Internet. You can join your
Ethernet LAN to the Internet to give LAN users Internet access using a router,
and you can use it to break up a large Ethernet LAN into smaller sections
called subnets (which are identified by a unique network address).
Departments and groups that share computers and servers are good
candidates for dividing a large network into smaller subnets. Once divided,
computers and servers for each department can be placed into their own
subnet to communicate with each other.
Take a look at Figure 11.24 which shows two separate networks on either side
of the router connected by the router. As you can see, the router gives all
users in both networks access to the Internet.
There are different types of routers that are used for different reasons, and
each type has different security and connectivity features. A router will have
an OS, memory for storing routing instructions and routing information, a
processor for processing instructions, LAN, WAN and management ports called
interfaces, and a web-based program or command line interface that can be
used to set it up.
Figure 11.26 shows the LED lights for switch ports on the left and NIC LEDs on
the right.
Network devices are rated for specific speeds. Many can work at multiple
speeds. Devices that can communicate at different speeds usually can
autosense or auto-negotiate speeds.
A switch might be using 100 Mbps for an older, slower computer connected to
one port and 1000 Mbps for a newer computer connected to another port.
Autosense is built into most network devices and it is best to leave it enabled.
Note
Devices also often have lights for the speed of the connection. Again, the
meaning of the light might be different for different vendors, but some
common meanings are:
Solid green the connection is using the fastest speed, such as 1000
Mbps.
Amber or brownish yellow the connection is using the slowest speed,
such as 100 Mbps.
Not lit no connection.
Note
Network devices often show an amber LED for the connection when
running in half-duplex and a green light when running in full-duplex.
This is different for different devices, so it is best to refer to the
devices documentation to find out what the different lights mean.
Router it is mainly used to connect the WAN port to the ISPs network
and to forward data between the LAN and the Internet. This allows the
home router to work as a default gateway for all devices on the LAN,
giving them access to the Internet.
WAN connection or modem a port for a connection to a cable or digital
subscriber line (DSL) modem.
Switch has a group of ports that allow you to connect multiple
computers or other devices directly to the LAN.
Wireless Access Point (WAP) allows computers with wireless network
adapters to access and use the network. Most home routers are also
wireless routers. The wireless client sends data to the router, which then
forwards the data to the Internet through the WAN port.
Some home routers offer other functions not listed above. Once you have
chosen your home router, you must decide whether to go with wired or
wireless. If you go for wired, you need to choose the appropriate type of
cabling. If you go with wireless, make sure you get a wireless router. After the
networking nuts and bolts are in place, consider security.
To use the home router, simply connect the WAN port to your Internet
connection and then connect your devices to any of the LAN ports on the
router; otherwise, connect the devices to a switch which in turn is connected to
a LAN port. These devices should get an IP address from the DHCP server built
into the router and as long as they are set up properly with the correct
addressing information, they should be able to access the Internet.
Figure 11.27 shows you how to set up a particular wireless router for a wired
connection (top) and its user interface (bottom). This home router supports
over 1 Gbps wireless speeds; it has Gigabit LAN and WAN ports for network
and Internet connectivity and USB ports for printers and external storage. It
also supports cloud-based storage along with many other features.
Even though the pairs are right next to each other in the same cable, these
twists stop signals from jumping over from one wire to another wire,
interfering with each other completely or reducing the interference.
11.6.1.1 Twisted pair connectors
A registered jack (RJ-45) connector is used on both ends of the Ethernet
twisted pair cable. For example, one end can plug into the RJ-45 port of the
computers network card and the other end can plug into a switch. RJ-45
connectors are technically called 8P8C (eight pins eight contacts), but
technicians call them RJ-45 connectors. RJ-45 is the most common connector
used for network data cabling.
The RJ-45 connector is similar to the RJ-11 connector used for telephones.
However, RJ-11 connectors are smaller than RJ-45 connectors and RJ-11
cables have only two pairs of wires (4 wires in total), while Ethernet twisted
pair cables using RJ-45 connectors have four pairs of wires (8 wires in total).
Figure 11.28 shows the RJ-45 port and RJ-11 port on a laptop. Figure 11.28
also shows two LEDs on the RJ-45 port. The LED on the top left is the Link light
used to show connectivity and the LED on the top right is the Activity light, and
it flashes when it detects activity on the port.
RJ-45 port
RJ-11 port
Figure 11.29 Twisted pair cable with an RJ-45 and RJ-11 connector
Several newer twisted pair connectors are available, including GG45 and
TERA:
GG45 (where GG stands for GigaGate and 45 as a reminder of the backward
compatibility with RJ-45) is a new connector for very high-speed twisted pair
cabling. It is a 2 in 1 connector that has a full RJ-45 interface but with four
additional conductors (12 conductors in total) for high-speed networks. This
means you can plug in Cat5e or higher RJ-45 connector into a GG45 port but it
will only run at the cable speeds supported for that twisted pair category.
Figure 11.30 shows a comparison between GG45 port, connector and RJ-45
connector.
Figure 11.30 GG45 port (left) and connector (middle) and RJ-45
connector (right)
TERA is a connector that supports high frequencies to carry more data over
very high-speed networks. This non-RJ45 style connector is not backwardcompatible with RJ-45 connectors. See Figure 11.31.
A twisted pair cable should not be longer than 100 metres. Therefore,
the distance between a computer and switch or a switch and router
should not be more than 100 metres. If the distance between them is
longer than 100 metres, you need to use a repeater to amplify the
signal so that it can go another 100 metres.
UTP Cable
Outer Jacket
Outer Jacket
4 twisted pairs with
colour insulation
sheaths (2 wires twisted
around each other)
Braid shield
Foil shield
Copper wire conductor
Each category has different specifications, with higher numbers meaning newer
cables and faster speeds. Each category is usually shortened to CAT with a
number, as shown in Table 11.1. The table lists the top speed of each category
and frequency with comments.
Table 11.1 Categories of twisted pair cable
Category Top speed
CAT 5
100 Mbps
CAT 5e
1000 Mbps
Frequency
100 MHz
100 MHz
CAT 6
10 Gbps
250 MHz
CAT 6a
10 Gbps
500 MHz
CAT 7
10 Gbps
600 MHz
CAT 7a
40 Gbps
1000 MHz
CAT 8
1200 MHz
Comments
Recommended top speed of 100 Mbps.
Extended version of CAT 5. Used on
networks that run at 10/100 Mbps and
even
theoretically
1000
Mbps,
depending on how it is used. Available
for UTP and STP.
Used with 10/100/1000 Mbps speed
networks, along with 10 Gbps over
shorter
distances.
A
longitudinal
separator separates each of the four
pairs of wires from each other, reducing
interference, and resulting in faster
speeds. Available for UTP, STP and
SFTP.
Used with Gigabit and 10 Gigabit
networks. Backward-compatible with
CAT 5 and CAT 5e. Available for UTP,
STP and SFTP.
Used with Gigabit and 10 Gigabit
networks. Backward-compatible with
CAT 5, CAT 5e and CAT 6 and CAT 6a
Ethernet cable using GG45 connector.
Also available with the TERA connector.
Available in STP.
A fully shielded and screened cable
running at 40 Gbps (possibly higher
speeds). Uses GG45 or TERA connector.
Category in development; this will most
likely support 100+ Gbps over short
distances.
Today, the most often used twisted pair types are Category 5e or higher. The
number of twists is one factor in determining the bandwidth of the cable. When
we talk about bandwidth and Mbps rating, we refer to a rate of data transfer.
For example, Category 5e cable has a 1000 Mbps data transfer rate. When we
refer to MHz and bandwidth, we talk about the width range of frequency of the
media.
Tip
You should know the category of cable needed for different speeds.
For example, if you are installing a Gigabit network, you must use at
least CAT 5e or higher cables. It is recommended that to run high
bandwidth applications such as streaming video, consider installing
CAT 6 or higher. The category number should be clearly printed on
the cable.
RJ-45 Pin
1
2
3
4
5
6
7
8
T568B Colour
White, orange stripe
Orange
White, green stripe
Blue
White, blue stripe
Green
White, brown stripe
Brown
Figure 11.33 shows how the wires for both standards must be set out and the
pin positions. Brown is Pin 8 for both standards.
Figure 11.33 T568A and T568B colour wires and pin position
For more information on cabling standards, you can visit the TIA website at:
www.tiaonline.org
Computer to a switch
Computer to a hub
Router to a switch
Router to a hub
Wireless Access Points Ethernet port to a switch
If you wire one connector on one side of the cable using T568A and the other
connector on the other side using T568B, you have created a crossover
cable. An Ethernet crossover cable is used to connect a:
Computer to a computer
Switch to a switch
Router to a router
Computer to a routers Ethernet port
Hub to a switch
Note
Core thin glass or plastic centre of the fibre where the light travels.
Cladding outer glass or plastic material surrounding the core that
reflects the light back into the core. The light pulses bounce back and forth
off the reflective cladding walls as they move forward through the cable.
This process is called total internal reflection.
Buffer coating plastic coating that protects the fibres from damage and
other outside factors.
MMF
Bigger core
Up to 2 km
Up to 10 Gbps
Plastic core
Shorter
SMF
Smaller core
Up to 40+ km
Up to 10 Gbps
Glass core
Longer
Fibre is more expensive and more difficult to work with than twisted pair
cables. The connectors can get damaged quite easily, so do not repeatedly
plug and unplug them. It is unlikely that you will find fibre cables used in
SOHO networks, but many bigger companies are using them more and more.
Fibre has three important benefits over twisted pair cable:
Insulation (dielectric)
Conducting core
Outer jacket
RG-6
RG-59
Characteristics
TRG-6 cable has a larger centre conductor than RG-59
does and it has extra shielding.
RG-6 is the standard for cable TV (CATV) or satellite TV
systems because it is more efficient when sending any
digital signals, including High Definition (HD) signals.
It is used for receiving television signals, distributing video
applications and for camera system (CCTV) connections.
RG-6 uses the F-type screw on connector.
Networks using coaxial cable today will use RG-6.
RG-59 was originally used with cable TV connections and
is good for sending analogue signals.
It was used in some early networks but can send only a
limited amount of data.
It can be used to send data between video systems, such
as between a DVD player and a TV.
RG-59 uses a BNC connector, which uses a push-and-turn
connection. Video applications and cable TV are provided
by this standard.
Figure 11.37 Coaxial cable BNC (left) and F-type (right) connector
Note
Coaxial cable is more difficult to install than twisted pair. Coaxial cable with
multiple shielding provides better protection against eavesdropping and
interference.
Baseband can carry only one signal over a network medium at one time.
The signal, usually sent as an electrical pulse or light, takes up all the
bandwidth of the media. Ethernet networks use baseband signalling.
Broadband can carry multiple analogue signals on one network medium
(light or electromagnetic waves). For signals to be both sent and received,
a technique called multiplexing is used to divide the bandwidth (media)
into separate channels, each of which can carry a different signal.
Alternatively, two cables can be used: one to send and one to receive
signals.
Figure 11.38 IEEE logo, with Ethernet UTP cable and a common
Ethernet network symbol
Ethernet has become faster and has used different types of cabling over the
years. As a result, there are a number of Ethernet versions, often called
Ethernet types or flavours. Even though there are different speeds and
types of cables, all flavours of Ethernet use the same Ethernet frame. This
means all Ethernet flavours are compatible with each other, and you can mix
and match them on the same Ethernet network by using devices such as
switches to link network segments that use different types of cable. Ethernet
uses a specific naming format for the different flavours. By learning this
format, you will usually be able to identify the speed and what type of cable it
is using.
A+ Preparation | V1.0 Jan 2014
If you know the cable, you will have an idea of the connector it needs.
The basic format is:
nBASE-x
n the speed
BASE means the cables can carry only one data signal per wire at one time
(baseband).
x the type of cable
Table 11.5 shows some Ethernet specification examples.
Table 11.5 Ethernet specification examples
Specification
10BASE2
100BASE-T
Speed
10 Mbps
100 Mbps
1000BASE-LX
10GBase-T
1000 Mbps
10 Gbps
Note
There are many more identifier letters. The speed is easy because it is
just the first number. The cable is more difficult but the identifier
gives you a clue. If it is 2, 5 or C, it is coaxial. If it starts with a T, it is
twisted pair. The rest are fibre.
You can see that if the first number is 10, the speed is 10 Mbps. If it is 100,
the speed is 100 Mbps, and 1000 means 1000 Mbps (or 1 Gbps). The last item
in the table uses 10G to mean 10 Gbps.
Traditional standard Ethernet networks ran at 10 Mbps. This speed has been
increased to 100 Mbps, 1Gbps, 10 Gbps and faster speeds over the years. Most
network devices can work at speeds faster than 10 Mbps, with 1+ Gbps
common in many networks. Keep in mind that these speeds are the top speeds
that can be achieved over the network under ideal conditions. In reality, the
actual speeds are rarely reached.
Note
EMI and RFI are sometimes combined into the same type of
interference, listed as EMI/RFI. There are technical differences, but
technicians commonly protect against both EMI and RFI with shielded
cables or cable that is not affected by EMI/RFI, such as fibre-optic
cables.
Attenuation
Attenuation refers to the weakening of the signal as it travels down the cable.
The signal weakens to such an extent that it cannot be understood by the
receiving device. All types of cables have a maximum cable length that
indicates how long the cable can be without suffering from attenuation.
Consider the attenuation when choosing a cable type. You can use a repeater,
hub or switch to extend a twisted pair cable run, otherwise use fibre-optic
cables.
Eavesdropping
Eavesdropping happens when someone physically taps into the cable and
connects a device to the cable run. Physically securing your cables and using
encryption are some of the ways of protecting against eavesdropping.
Crosstalk
Crosstalk occurs when wires, carrying voltage, create an electromagnetic field
that causes interference on other wires in the cable. That is, data from one
cable crosses over to another cable. This can weaken the signals on each cable
or result in unauthorised users having access to data.
For example, Figure 11.40 shows how data can cross over from one cable to
another. In this case, one cable is carrying secret data and the other is
carrying unclassified non-secret data. If these two cables are right next to
each other, secret data can cross over to the unclassified data cable.
Solid cable uses one thick inflexible wire for each conductor and is used
for the horizontal twisted pair cable that runs within the walls and ceilings
of the building.
Stranded cable each conductor is made up of a group of thin wires
twisted together. Stranded cable is flexible, so it does not break easily.
Stranded cable is best used for patch cables that run between computers
and the wall jack, and between computers and switches in work areas.
Technically, the cable that connects a computer to the wall jack is a
station cable not a patch cable but the word patch cable is an
appropriate reference for stranded cable and therefore is referred to as a
patch cable. A patch cable is not supposed to be longer than 5 m.
Wire Stripper
Cable
Cutter
Cable
Tester
2x RJ-45 Plugs
Figure 11.44 Making a UTP cable using a wire stripper (far left) and
crimper (far right)
Testing cable runs can be done both after installing cables and when
troubleshooting cables.
Note
Plugging the two ends of a cable run into a computer and a switch, or
between two computers by using patch cables, is sometimes used as
a temporary way of testing the cable, but it is not the best or
recommended way to test. There are many types of cabling errors
that can cause problems that you will not find out about immediately.
When it comes to testing patch cables in work areas, the easiest and most
efficient test you can do is to use a cable that you know works (a known good
one) in place of the suspected faulty cable. If the problem is not with the
patch cable and you know for sure the problem is not with network hardware
(NIC, switch, etc.) and software (drivers, configuration errors, etc.), then you
need to look at testing the cabling running in the walls and ceilings (called
horizontal cabling). The following sections look at some tools that will help you
troubleshoot cables.
11.8.3.1 Identifying cables
You can use a tone generator and probe to trace and identify the one cable
you need in a bundle of cables. Figure 11.46 shows a tone generator and
probe, which is also called a toner probe, toner generator and locator or
fox and hound tester. You connect the tone generator to one end of a cable
to send a signal over it and touch the probe at the other end of the cable to
detect the signal. The probe makes a sound when it detects the signal.
Note
You can also get a wiremap tester that works like a multimeter but connects
to all eight wires at once on both ends and tests them at the same time. The
wiremap tester can check if an RJ-45 plug has been wired correctly. Wiremap
testers, like most cable testers, have a main handheld unit that you connect to
one end of the cable and a loopback device that you connect to the other end.
11.8.3.3 Testing cable length
You can find cable testers that can work out how long the cable run is, find a
break in any one of its wires, and identify where the break is in terms of the
distance from the cable end. The technique that gives this capability is called
time domain reflectometry (TDR). The tester sends a signal over the cable
and measures how long it takes to come back from the other end. Using this
information, the TDR device can work out how long the cable run is.
11.8.3.4 Testing performance
Cable certifiers, scanners or media testers are more advanced handheld
testing and certifying devices. You connect the cable certifier to one cable end
and a remote unit to the other end. Then you can choose various performance
tests that the certifier must run through. A certifier can, for example, see if the
cable is compliant with a TIA/EIA cable standard and can be used to test
continuity and termination, and determine cable lengths and distances, all
within seconds.
11.8.3.5 Testing fibre-optic cables
Fibre-optic cables have different types of interference and different
performance level requirements. Cable lengths and cable breaks are something
to consider when installing fibre-optic cables. There are cable certifiers you can
get to test fibre-optic cables. You can use a TDR device called optical time
domain reflectometer (OTDR) to work out the length of the fibre-optic cable
and if the cable has any breaks, just like with the TDR copper testing device.
See Figure 11.47.
Application
Presentation
Session
Transport
Network
Data Link
Physical
Most, if not all, operating systems use TCP/IP by default and if they
do not, they will provide a way for you to use it.
The next few sections examine the protocols that make up the TCP/IP protocol
suite.
UDP
Connectionless
No guarantee; best effort packet delivery
Unreliable, but faster than TCP
Does not resend dropped packets
Checks packets
Port range
0 to 1023
Registered
1024 to 49 151
Dynamic
(ephemeral)
49 152 to 65 535
Comments
Reserved by the IANA and used for
commonly used protocols or services,
such as HTTP (web applications) and
SMTP (mail applications). By defining
well-known
ports
for
server
applications, client applications can be
programmed to request a connection
to that specific port so that it can use
the service that comes with that port.
Assigned
to
user
processes
or
applications that you have chosen to
install
rather
than
common
applications that would receive a wellknown port. An example would be the
alternate HTTP port 8080. Many
registered ports are assigned by IANA.
Assigned
dynamically
to
client
applications
when
requesting
a
connection. It is not common for a
client to connect to a service using
dynamic or private ports.
As a computer technician, you do not need to know all 65 535 ports, but you
do need to know the port numbers for many common networking protocols and
services. You also need a basic understanding of the protocols used on
networks and the Internet. The next sections provide an overview of the
commonly used protocols and their ports.
11.9.1.3 Firewalls and ports
A firewall controls the traffic coming in and going out of the network. A
common way it does this is by allowing or blocking traffic based on ports. For
example, if users on an internal network need to visit websites on the Internet
using the HTTP protocol, which uses port 80 by default, the firewall must allow
HTTP traffic to go out the network through that port. If you decide to stop
users from visiting any HTTP websites, you can block all outgoing traffic using
port 80.
Note
Most firewalls block all traffic unless you create an exception rule to
allow traffic. For example, if you want to allow HTTP traffic, the
firewall must have an exception rule to allow traffic on port 80. An
exception rule is also known as opening the port.
11.9.2 IP protocol
Internet Protocol (IP) gives packets the address that identifies hosts and
the network they are on to allow the packets to reach their destination. IP is
media independent, which means IP packets can be sent over wireless,
Ethernet cable, fibre-optic cable and other OSI Layer 1 media.
Computers, servers, laptops, router interfaces, printers and other IP hosts are
identified in a TCP/IP network with an IP address. As a computer technician,
you will come across two versions of IP addresses (IPv4 and IPv6), and will
most likely need to troubleshoot IP addressing problems, so lets explore both
IP versions.
192.168.1.5
Each number represents 8 bits (also called a byte or octet), giving a total of
four octets separated by dots like this:
First Octet
192
Second Octet
168
Third Octet
1
Fourth Octet
5
First Octet
11000000
Second Octet
.10101000
Third Octet
.00000001
Fourth Octet
.00000101
Most people would rather work with decimal numbers, but it is worth knowing
that the IP address is made up of 32 bits with four octets of eight bits.
If all bits are a 1 in any octet (11111111), the value is 255. This is important
to remember because an IPv4 address cannot have any decimals greater than
255. For example, the following IP address is not valid:
192.168.256.2
This is because the third decimal is 256. The decimal number of 256 can be
displayed in binary as 100000000, but an octet in an IPv4 address has only
eight bits.
11.9.3.2 Two part of an IP address
Although you cannot see it at first, each IPv4 address has two parts: the
Network ID and the Host ID.
Network ID: Determines the network the host is on and all hosts on the
same network or subnet must have the same Network ID to communicate
with each other.
Host ID: Identifies the host and it must be unique for each host on the
network or subnet, that is, no two hosts on the same network must have
the same Host ID.
The Network ID begins at the far left side of the IP address and continues until
it meets the Host ID. The Host ID then continues to the far right side of the IP
address.
11.9.3.3 The subnet mask and Network ID
IP addresses are matched with a subnet mask to identify the Network ID and
the Host ID of the address, so that you can determine which network the host
is on. Subnet masks are shown in decimal like IP addresses. Take a look at the
following IP address and subnet mask example:
IP address
158.80.164.3
Subnet Mask
255.255.0.0
The above IP address has a subnet mask of 255.255.0.0. When the subnet
mask is 255, that part of the IP address is the Network ID. When the subnet
mask is 0, that part of the IP address is the Host ID.
The three most common subnet masks are:
255.0.0.0
255.255.0.0
255.255.255.0
Note
As you continue in your career, you will learn that the subnet mask
can have numbers other than 255 or 0. However, for this module, you
will see subnet masks with the numbers 255 or 0. This makes it much
easier to identify which part of the IPv4 address is the Network ID
and which part is the Host ID.
Take a look at another example in the table below, which shows an IP address
of 192.168.2.11, a subnet mask of 255.255.255.0 and the Network ID.
Network Info
192.168.2.11
255.255.255.0
Network ID
First
octet
192
255
192
Second
octet
168
255
168
Third
octet
2
255
1
Fourth
octet
11
0
0
In the first octet, the subnet mask is 255, so 192 is part of the Network ID.
The subnet mask is 255 in the second and third octets also, so 168 and 2 are
also part of the Network ID. However, the subnet mask is 0 in the last octet,
so that part of the network ID is 0. Put together, you can see that the network
ID is 192.168.2.0.
Host ID
Once you have found the Network ID, then whatever is left over, is the Host
ID. For the IPv4 address 192.168.2.11 and subnet mask 255.255.255.0, the
Network ID is 192.168.2.0, and the Host ID is 11. The most important part to
remember is that even though the Network ID is the same, each computer has
its own unique Host ID, meaning that no two computers and hosts can have
the same IP address on the same network.
When two hosts have the same IP address on the same network, an IP
address conflict occurs. Usually, one host will know that a conflict has
occurred and assign itself an IP address of 0.0.0.0 and will not be able to
communicate on the network. In some cases, both hosts will not be able to
communicate on the network. Figure 11.51 shows the IP conflict error message
on a Windows computer.
Class
A
B
C
Example
10.2.3.5
172.16.2.18
192.168.4.16
When looking at an IPv4 address, you should be able to identify what class it is
in. For example, what class is 172.16.32.45 in? What is its default subnet
mask? 172.16.32.45 is a Class B address because the first number is 172 (in
the range of 128 to 191), and the subnet mask is 255.255.0.0. What class is
192.168.9.3 in and what is its default subnet mask? 192.168.9.3 is a Class C
address because the first number is 192 (in the range of 192 to 223) and the
subnet mask is 255.255.255.0.
Note
There are also D and E classes. Class D addresses are used for
multicast traffic and Class E addresses are used for research and
testing purposes.
IP address
10.1.2.3
172.16.1.2
192.168.1.5
Subnet mask
255.0.0.0
255.255.0.0
255.255.255.0
CIDR notation
10.1.2.3 / 8
172.16.1.2 /16
192.168.1.5 /24
192.168.1.5, 255.255.255.0
192.168.1.5 /24
Note
11.9.3.6 Subnets
A subnet is seen as a network within a Class A, B or C network where hosts
share the same Network ID, and each subnet is separated by one or more
routers.
11.9.3.7 Subnet and broadcast addresses
On each IPv4 network, two host addresses are reserved for special use. These
two addresses are not actually assigned to a host.
The subnet (or network) address identifies the network itself. The
subnet address for each subnet will be the first number of the subnet. For
example, 192.168.1.0/24 is a subnet address.
The broadcast address identifies all hosts on a particular network. Every
host on the network will receive and process a packet sent to the networks
broadcast address. For example, 192.168.1.255 /24 is a broadcast address.
Broadcasts are not the only type of IPv4 packet. IPv4 can use three primary
types of packets when sending traffic:
Unicasts one-to-one traffic. Packets are sent from one host to one other
host. This is the normal way hosts on a client/server and peer-to-peer
network communicate.
Multicasts one-to-a-group traffic. Packets are sent from one host to a
group of hosts with the same multicast address. Multicasting saves
bandwidth. Multicast packets are used for video and audio broadcasts, for
distributing software and for news feeds.
Broadcasts one-to-all traffic. Packets are sent from one host to all other
hosts on the local network, and the purpose is usually to share information
about itself and to ask for information about other hosts on the local
network. The broadcast address allows all the receiving hosts to accept the
packet and process it as it would a packet to its unicast address. Broadcast
packets are used for mapping IP addresses to MAC addresses and for
requesting MAC addresses of hosts, among other uses.
Figure 11.53 shows two default gateways for two different networks. Hosts in
Network 1 go through the default gateway using 192.168.1.1. Hosts in
Network 2 go through the default gateway using 192.168.7.1. When one
computer sends packets to another, the router first checks the Network ID of
both computers. If the Network IDs are the same, it knows the computers are
on the same network. If they are different, it knows the packets need to go
through the default gateway. While some people call the default gateway the
router, this is not entirely accurate. You use the default gateway to get out of
the network through the routers port, but the default gateway is not the
router.
The default gateway must have the same Network ID as the hosts in
the subnet or network. If it has a different Network ID, hosts will not
be able to communicate with it, and it will not be able to reach any
hosts outside of the network.
A private address is intended for internal use within a home, office or any
other internal network and can be freely used by anyone on their private
network. In fact, these are the only addresses you will see used on any private
network. Routers will drop traffic with private addresses and never route them
on the Internet.
Private IP addresses fall into one of the following ranges:
Figure 11.54 shows how a Class A, B and C address can be configured in the
TCP/IP Properties dialog boxes for network adapters.
Because packets with private destination addresses are not routable across the
Internet, services to translate packets from hosts using private addresses are
needed. This is where NAT comes in.
11.9.3.10 NAT
Network Address Translation (NAT) is a generic term for several related
but different services. It is most commonly used to translate private (or
unregistered) IP addresses to public IP addresses and public IP addresses back
to private addresses.
Figure 11.55 shows an internal network that accesses the Internet through a
NAT router. The internal network has private IP addresses, and NAT translates
them to a public IP address when a user connects to the Google.com web
server and translates them back when it returns the requested web page from
the web server.
The NAT device is usually a router, firewall or server that you place
between the Internet and your private network. In smaller networks,
the NAT router would have one public IP address, assigned by the
ISP. In many bigger networks, NAT devices use multiple public IP
addresses.
Since private IP addresses are translated and never seen on the Internet, you
can use any private address scheme internally as you wish. Therefore, NAT
helps hide your internal computers and your addressing scheme from attackers
on the Internet.
Broadcasts are useful, but they eat up bandwidth. The bigger the
network is, the more bandwidth broadcasts eat up.
XX:XX:XX:XX:XX:XX:XX:XX
Each X is 8 bits long, giving us 16 bits in each group separated by colons. 16
bits x 8 = 128 bits in total. 128-bit IPv6 addresses are written like this:
2001:0000:0000:3210:0800:200C:00CF:1234
The IPv6 developers did not provide a name for the group of four
hexadecimal characters, so many technicians and writers are
unofficially calling them fields or hextets, in contrast to octets
used in IPv4. We will stick with the term group to keep this section
consistent.
1423:0021:0C13:CC1E:3142:0001:2222:3333
You can shorten that address to:
1423:21:C13:CC1E:3142:1:2222:3333
All zeros cannot be removed, though, because each group must have at least
one character. Here is another example:
Full IPv6:
Short IPv6:
FC00:0000:0000:0076:0000:042A:B95F:77F5
FC00::76:0:42A:B95F:77F5
The second IPv6 address shows only six groups of hexadecimal numbers.
Because you know that a full IPv6 has eight groups of numbers, you know that
the double colon is for two groups of zeros in this address.
An important rule is that you can use the double colon only once in the
address; only for one consecutive string of zeros separated by colons. For
example, the following is wrong:
FC00:0000:0000:0076:0000:042A:B95F:77F5
FC00:0000:0076:0000:0000:042A:B95F:77F5
However, there are limits to how we can reduce the IPv6 zeros. Zeros within
the IPv6 address cannot be taken out when they are not first in the number
sequence. For example:
Prefix ID
Interface ID
64 bits
64 bits
The Network ID and Host ID are a fixed size, so there are no subnet masks in
IPv6. However, IPv6 still uses subnets. Network IDs use the same slash
notation as IPv4s CIDR to identify the Network ID. For example, you might
see an address like the following:
2001:0DB8:1234::5678:9ABC:DEF0/48
A+ Preparation | V1.0 Jan 2014
The /48 indicates that the first 48 bits are for the network address. Similarly,
the /64 in the following IPv6 address indicates that the first 64 bits are the
network address (or prefix ID):
2001:0DB8:1234::5678:9ABC:DEF0/64
Here is a second example:
21cd:53::/64
This is the shortened version of the following network address:
21cd:0053:0000:0000/64
11.9.5.2 IPv6 address types
Another difference between IPv4 and IPv6 is in the types of addresses they can
have. There are no classes in IPv6 and no broadcasts either, but what you will
find are the following three types of addresses in IPv6:
Note
When you see an x in the next few sections, it means it can be any
hexadecimal number, but usually 0.
Unicast addresses
IPv6 supports several types of unicast addresses, including global, linklocal and unique local, which are terms that identify the area the address
covers. IPv6 unicast addresses generally assign the first 64 bits of the address
to the network and the last 64 bits to the host (or interface ID). OS
manufacturers have a choice as to how to make the Interface ID. The most
common way is with a random number, which Windows uses by default. When
your network card is activated, Windows simply creates a random number for
the last 64 bits of the IPv6 address. Once created, this unique 64-bit number
will never change.
The three types of unicast addresses are as follows:
Link-local IPv6 address is used on a single link. Both the network and host
part of the address are automatically created by the OS on every interface
when a host running IPv6 boots up and the address is unique only on the local
link on which it is created.
A+ Preparation | V1.0 Jan 2014
This address is never routed beyond the local link. The address always starts
with Fe80 or FE8x: in the first group and it has the prefix of /10. For
example:
FE80::1311:22FF:FE22:3333/10
On a one link IPv6 network with no router, hosts can use this address to talk to
each other. If your OS has IPv6 enabled, you can see its link-local address.
Figure 11.57 shows the link-local address starting with Fe80 for a typical
computer after running the ipconfig command at the Windows command
prompt. This command shows IP configuration information for the local
computer.
Global IPv6 address is the equivalent of an IPv4 public address, that is, it is
a publicly routable address that is unique on the Internet. An ISP assigns part
of the global address to companies and users. Global addresses start with
2xxx: or 3xxx in the first group. The interface ID of the address comes from a
random number generated by the OS or can be configured to use the hosts
MAC address.
A host must have a global address to connect to the Internet and it must be
unique on the Internet. The most common way to get this address is from the
default gateway router, which must be configured to hand out a global
address. When you connect your computer to a network, it sends a special
packet looking for a router running IPv6 in the network. The router gets this
packet and responds with a packet telling the computer its Network ID and
subnet (together called the prefix) and other information, such as the domain
name server (DNS) address (if configured).
Once the computer gets a prefix from a router, it creates the rest of the
address just like with the link-local address. The computer ends up with a 128bit public IPv6 address as well as a link-local address. Figure 11.58 shows
global IPv6 information starting with 2001 in Windows after running the
ipconfig command.
Big companies use a DHCP server, but SOHO networks often have a wireless
router that comes with DHCP. DHCP commonly provides IP addresses, subnet
masks, and the default gateway addresses. In many cases, DHCP will provide
DNS server addresses as well.
Note
Host name this is used on the Internet and internal networks to identify
each host. Host names are also called computer names. Examples of host
names are: www, ftp, sibuleles computer and TestBox1.
Network Basic Input/Output System (NetBIOS) name the older
NetBIOS name is usually the same as the host name or computer name.
That is, the server with a host name of mail1 also has a NetBIOS name of
mail1. NetBIOS names are used only on internal networks and not on the
Internet.
Workgroup name identifies a workgroup. The name is only recognised
within the small workgroup network. A workgroup is a Windows network
that enables a handful of users working together to share resources, such
as drives, files and printers.
Domain name identifies a domain network, such as cti.ac.za. The letters
after the dot tells us something about the domain network. Examples are
.com (commercial) and .info (general use).
FQDN host names are often used with a domain name to give a fully
qualified domain name (FQDN). For example, a web server with the
host name of www hosting a website for CTI has a FQDN of www.cti.ac.za.
Similarly, a mail server named mail1 on an internal domain named cti.ac.za
has an FQDN of mail1.cti.ac.za.
There are several types of top level domains, dedicated to specific purposes:
Generic
.com commercial organisations
.edu educational institutions
.gov government institutions
.net networking organisations
.org non-commercial organisations
Country codes
.za South Africa (.co.za)
.uk United Kingdom (.co.uk)
.us United States
.au Australia
.ng Nigeria
You will find other generic top level domains available, some sponsored and
some not, such as aero, biz, coop, info, museum, name, pro, cat, jobs, mobi,
tel and travel.
Note
Beneath each top level domain are second level domains. People and
companies can buy these second level domains for their own use. For example,
the second level domain cti in cti.ac.za belongs to CTI who bought the domain
name from an Internet registrar (a company that sells domain names to
customers).
ISPs have DNS servers and many medium-to-big-sized companies have their
own internal DNS servers. For example, consider the network shown in Figure
11.62. If internal users need to access hosts on the internal network, they will
ask their internal DNS server. This server keeps a mapping of all names and IP
addresses of internal computers.
Note
If you host an Internet domain on your own DNS server, that server
must be accessible from the Internet and have a registered IP
address. Many SOHO networks do not use an internal DNS server. A
common configuration is with a wireless router that uses the ISPs
DNS server. The router forwards all DNS requests to the ISPs DNS
server and returns the IP addresses to the user.
Hosts or other subdomains can be assigned within the second level domain.
Once you buy the rights to a second level domain, you can create as many
hosts as you want in that domain. For example, once you own the aplus.co.za
domain, you can create subdomains called sales.aplus.co.za and
maketing.aplus.co.za and then add hosts such as ftp.sales.aplus.co.za to that
domain. The server ftp.sales.aplus.co.za would be in the sales.aplus.co.za
subdomain.
Note
The lower domains are largely open to use in whatever way the owner
of the domain name sees fit. There is no limit on the number of levels
you can create within a second level domain; however, the top level
domains are not as flexible.
A DNS name for a host on the Internet has at least a host name, a second
level domain name and a top level domain name, written in that order and
separated by dots. The complete DNS name for a computer is called the fully
qualified domain name (FQDN). Consider the following translation:
www.wikipedia.org = 209.85.225.104
The above is a FQDN:
The client can resolve NetBIOS names with a similar file called
lmhosts. Additionally, when a name is resolved by any method, it is
placed in the host memory cache (sometimes called the DNS cache).
If the name is in the cache, the client uses it instead of querying DNS.
11.9.7.3 WINS
Some internal networks use Windows Internet Name System (WINS) to resolve
NetBIOS names to IP addresses. NetBIOS names and WINS servers are not
used on the Internet. You will see them only on internal networks and you will
hardly find them used anymore because of DNS.
Note
HTTP servers are web servers and HTTP clients are typically web browsers. A
web server is a computer or another device running web server software that
manages web-based activities by storing and delivering resources using HTTP
on the request of the HTTP client. It might also have a database where it
stores information and where the HTTP client can fetch that information.
Additionally, the function of the HTTP server can often be extended to support
extra scripting and programming features (web applications). Two common
web server platforms are:
Apache freely available web server software for many different operating
systems. It is popular for Linux operating systems.
Microsoft Internet Information Services (IIS) web server software
packaged with Windows server and client operating systems. Figure 11.64
shows the IIS Manager program for a Windows client computer.
Figure 11.65 shows a common web browser application showing some famous
icons for websites and web browsers.
http://news.cnet.com/mobile-news/index.htm
A URL tells you:
The protocol or service used. For example, HTTP or FTP for files. In this case
HTTP.
The FQDN or IP address where the host is located (for example, the
news.cnet.com web server). IP addresses are mainly used for testing
purposes or when DNS is not available.
The file path to the requested resource (for example, directory is /mobilenews and file name is index.htm).
http://192.168.1.1/index.html
IPv6 addresses can be used in URLs. URLs, however, use the colon for a
specific TCP port. Because IPv6 groups are separated by colons, the IPv6
address must be placed in between brackets, to follow the URL standard:
http://[FEC0::CC1E:2412:1111:2222:3333]/index.html
Lets take a look at how the web browser reads and understands the following
URL:
http://news.cnet.com/mobile-news/index.htm
You are attempting to reach index.htm file in the mobile news directory located
on the server news.cnet.com. The browser looks at the protocol, which in the
address shown is http://. Since the browser knows the protocol is HTTP, it
knows how to read and understand all the words on the right of the forward
slashes //. It now looks at the FQDN news.cnet.com, which tells the browser
where to find the web server it needs to fetch the resource from. Once it
reaches this web server, it fetches the index.htm web page file from the
mobile news directory. Once the browser has fetched this page, it reads and
understands it and shows it in its main window for you to look at.
11.9.8.2 HTTP client and server interaction
HTTP uses TCP to transfer files between the client and server and relies on
DNS for name resolution. TCP connections are created using the default HTTP
port 80. HTTP is not a secure protocol. HTTP messages upload data to the
server in plain text which can be captured and read by anyone. Similarly, the
server responses, typically HTML pages, are unencrypted. Under HTTP, there is
no authentication between the client and server by default. This is where
encryption comes in.
11.9.8.3 HTTPS
Most web connections use HTTP because they do not need to be secured. But
when you need to send data securely to stop someone from seeing your web
data, you should consider encrypting it. For example, you would not want
other people to see your username and password as you log into a banking
website to authenticate who you are to the HTTP server. In such a situation,
you want to make sure you are using HTTPS. HTTPS, also called HTTP Secure
or HTTP over SSL, works with one of the following encryption protocols to
secure HTTP connections:
Secure Sockets Layer (SSL) used to encrypt many types of web and
other traffic. It often uses port 443 but might use other ports, depending
on the protocol being encrypted.
Transport Layer Security (TLS) is the chosen replacement for SSL. It
can be used anywhere SSL is used. Just about all current web servers and
web browsers support TLS, as do many other applications.
Both of these protocols can provide authentication, where clients and servers
exchange credentials to confirm who they are, encryption, where the data
exchanged by clients and servers is encrypted using encryption keys (special
mathematical formulae) to prevent someone capturing and reading the data,
and data integrity, to ensure that the data has not been changed while
travelling over the network.
SSL/TLS make use of certificates. A digital certificate is an encrypted
document that proves that a computer, person or company is who they claim
to be and not something they are not. You can think of it as an encrypted
credit card that helps people trust that a website or other resource is secure.
You can use it to secure emails, electronic commerce (e-commerce), banking
and other online transactions.
This certificate is signed by a trusted company or authority called a Certificate
Authority (CA) that guarantees that the key you are about to get is actually
from the web server and not from someone else pretending to be the web
server. The CA verifies the identity of computers, servers, people and
resources and hands out signed digital certificates for authenticity.
The SSL/TLS process basically involves the server getting a digital certificate
from the CA, to verify its identity to the client. When the client is confident that
the server is who it says it is because it trusts the same CA, then secure and
encrypted data transfers can go ahead between the two. The server uses the
certificate and the SSL or TLS protocol to encrypt traffic between it and the
client.
Both SSL and TLS work at the session layer of the OSI model and encrypt TCP
connections over the default port 443, not UDP.
HTTP uses port 80 and HTTPS uses port 443. SSL and TLS also use
port 443 by default when used with HTTPS, and SSL and TLS can be
used to encrypt other types of traffic including email and remote
connections. For example, virtual private network (VPN) connections
sometimes use SSL over port 443 as well. To create a VPN
connection, a certificate is installed on the client so that the server
can trust it.
To view the certificate, click the lock icon. Because digital certificates verify a
companys current status, they expire after a time period. If the certificate is
not renewed in time, you may see a message box appear that says "This
websites certificate has expired" or something similar. This error has nothing
to do with you or your computer, but is displayed because the web server you
are connected to has not renewed its certificate. While this does not
necessarily mean that you should not trust the website, it does show that the
website is less than professional if it is a website that is supposed to offer
secure connections.
All email client programs are databases and all mail messages when
received, are stored in the database. After messages are received, the
email client program stores them in various mailboxes: Inbox,
Deleted Items and Junk, for example.
8. Her Inbox includes the new message from Pieter. She opens the email and
looks at the From: field, which lists Pieter as the sender.
9. She reads the email and clicks the Reply button to create a return message
to Pieter. Once the message is ready, she sends it and it goes through
pretty much the same process as above.
DNS Server
DNS Server
Mail Server
Mail Server
SMTP
SMTP
SMTP
POP3 or IMAP4
Thandi
Pieter
Several email address formats exist; all Internet email addresses come in the
following address format:
accountname@domainname
Every person with an email account has a mailbox that can receive mail sent to
that persons email address. You can also set up aliases for mailboxes, so that
janp could have the alias of support and receive mail sent to both
janp@inet.co.za and support@inet.co.za in his mailbox.
When you configure your standalone email client program, you need to enter a
username, password, default email address and the FQDN or IP address of the
SMTP and POP3 or IMAP4 server. For example, you might need to set up an
email account in your email client with smtp.gmail.com (to send email to
Gmails SMTP server) and pop3.gmail.com (to download email from Gmails
POP3 server), as shown in Figure 11.69. Your ISP will provide the names or IP
addresses if you are not hosting a mail server on your internal network.
Note
If one of these names is incorrect, you will either not get your email
or not be able to send email. If an email setup that has been working
well for a while suddenly gives you errors, it is likely that either the
POP3, IMAP or SMTP server is down or that the DNS server has
stopped working.
SMTP, IMAP and POP3 can be encrypted with SSL or TLS as SMTPS, POP3S and
IMAPS. The default ports for these are:
Figure 11.70 shows how to set SMTP authentication and SSL encryption in a
particular email client application. Every major email client will have a setting
called Connection security, or Security, or something similar. If your mail
server uses encryption, change this setting to TLS or SSL.
and
and
see
you
To upload files with HTTP, you can use web browser scripting or plugins, but FTP must be used to copy files from the client to the server.
Just type in the name of the FTP site using the ftp:// URL. Figure 11.72
shows a web browser accessing the Microsoft ftp site by its domain name. You
can also use the FTP servers IP address instead of the domain name. Notice
that both the protocol and the hostname say ftp.
In some cases, the username includes a domain name. In these situations, you
would type:
ftp://username@domainname:password@ftp.domainname
An anonymous logon works fine for most public FTP sites. However, many
technicians prefer to use programs such as FileZilla to access an FTP site
because these applications can store username and password parameters. This
enables you to connect to the FTP site more easily later on.
A+ Preparation | V1.0 Jan 2014
Many firewalls block FTP traffic by default. To allow FTP traffic to pass
through, you need to make sure your firewall has port 21 open to
allow outgoing FTP traffic. Firewalls will allow incoming FTP traffic if
outgoing FTP traffic is allowed. Therefore, you usually do not need to
open the second port using FTP.
Trivial File Transfer Protocol (TFTP), like FTP, is also used to transfer files
to and from remote computers over the network. It is designed to be
lightweight and fast, and uses the connectionless UDP, so it has less overhead
than FTP, which uses the connection-oriented TCP. It does not, however,
include FTPs authentication and security capabilities and user interface
features, nor does it have the level of functionality that FTP has. TFTP uses
port 69 by default. Figure 11.74 shows the running of a TFTP client command
in the Windows command prompt (on the right). This feature must be turned
on in the Programs and Features applet in Control Panel on a Windows 7
computer as shown on the left in Figure 11.74.
11.9.12 SMB
Server Message Block (SMB) is a request/response protocol that is used to
provide shared access to files and printers between hosts on Windows
networks. SMB is the reason that Windows tools like Network can show you all
the computers on your network. When you access shared files over your
network, your Windows computer uses SMB to create the connection and
return the files to your computer. Similarly, when you send a print job to a
printer, the OS uses SMB to transfer the data.
SMB typically uses Network Basic Input/Output System (NetBIOS) over
TCP with ports 137, 138 and 139 by default. If used directly over TCP, it uses
port 445. SMB is hidden from the user. Modern Windows operating systems
use SMB version 2 that is backward-compatible with SMB version 1, so they
have no problem communicating with older systems.
The Linux and UNIX operating systems also provide a way of sharing resources
with Windows networks using a version of SMB called SAMBA. Apple
Macintosh (MAC) also supports resource sharing using the SMB protocol.
Remote assistance
When a user calls you about a technical support issue and she says that
something does not work, you can use remote assistance to transfer yourself
from your desk to her desk to see exactly what she is seeing on her screen in
order to provide assistance. The user sends out a remote assistance request to
you and you can use it to access that users computer from a remote location.
If the user trusts and gives you permission, you can take control of the users
computer and show him or her how to do specific tasks, such as open files,
while he or she sits back and watches you do it on his or her computer screen.
Remote assistance even includes a chat window that you and the user can use
to chat.
Note
Make sure that port 3389 is open on firewalls and routers between the
hosts involved in the remote assistance connection. Otherwise, RDP
traffic will be blocked.
11.9.13.2 Telnet
Telnet is a terminal emulation command line tool that you can use to connect
to remote computers, switches and routers, and run commands through the
telnet prompt on that host as if you were sitting in front of it. One problem
with telnet is that you must know how to run commands on that other host.
Also, the user on the remote host must give you permission to access it and it
must run a service known as the Telnet Daemon to support telnet access.
The default port used by Telnet is port 23.
Once the Telnet Client feature is enabled in Windows, telnet can be used from
the command line by typing the following command:
telnet IP address
OR
telnet name
(Substitute the IP address or name of the remote host to which you want to
connect.)
If you connect, you will be asked for a username and password. If no
username and password have been set for the terminal connection, you will
not be allowed to connect. After you are authenticated, the telnet prompt of
the remote host will appear and from that point forward, you can run telnet
commands.
Sometimes technicians use Telnet for troubleshooting because it allows them
to easily find out whether a host is listening and responding to traffic on a
specific port.
For example, imagine you are having problems with your email. You might
want to check that the mail server (with the IP address of 192.168.1.1 in this
example) is working and listening for SMTP commands. You can enter the
following command at the command prompt before pressing <Enter>:
telnet 192.168.1.1 25
The command will attempt to connect to the mail server at the IP address
192.168.1.1 by using SMTPs default port 25. If successful, you might be asked
to confirm if you want to connect using telnet and if you choose yes, you will
have a screen where you can enter the username and password. Thereafter,
you will have a telnet prompt waiting for you to enter SMTP commands. Being
able to access the prompt indicates that the mail server is working and
listening on port 25. If the mail server is not running, you will get an error.
Figure 11.79 shows a telnet session with an SMTP server.
status
?
close
quit
Note
Comment
Starts a telnet connection with the host on that
port. Host can be a hostname, FQDN or IP
address
Shows session status
Get help
End the current session
Exit the telnet prompt
11.9.14 SNMP
Simple Network Management Protocol (SNMP) can be used to communicate
with and manage and monitor network devices on a TCP/IP network from a
central place. The management software usually creates a map of the
interconnections between network devices, as well as display detailed log
information for each device that helps us monitor and troubleshoot them.
Devices that can be monitored with SNMP include switches, routers, servers,
printers, wireless access points, UPSs, to name a few. SNMP has the following
components:
The agents use UDP port 161 and the management system uses UDP port 162.
You can get both open source (freely available) software like that shown in
Figure 11.80 and commercial SNMP software. There are three versions:
SNMPv1, SNMPv2 and SNMPv3. Unlike SNMPv1 and SNMPv2, SNMPv3 supports
high level security, including authentication and encryption.
Port
TCP 20 and 21
TCP 22
TCP 22
TCP 23
TCP 25
TCP/UDP 53
UDP 67 and 68
TCP/UDP 69
TCP 80
Protocol
NTP
POP3
IMAP4
HTTPS
SSL
SMTPS
IMAPS
POP3S
RDP
Port
UDP 123
TCP 110
TCP 143
TCP 443
TCP 443
TCP 465
TCP 993
TCP 995
TCP 3389
11.9.19 Sockets
When one TCP/IP host addresses traffic to another, it uses an IP address with
a port number. Together they are called a socket, which identifies a specific
application process running on a specific computer. You will find the terms port
number and socket used interchangeably, but in this context, the term socket
refers only to the unique combination of IP address and port number.
To enter a socket into a URL, you enter the IP address first and then follow it
with a colon and the port number like this:
http://IPv4address:port
http://[IPv6Address]:port
Take a look at the following example:
An HTTP web page request sent to a web server (port 80) running on a host
with
an
IPv4
address
192.168.2.10
or
IPv6
address
of
2001:db8:85a3:8d3:1319:8a2e:370 would be destined to socket:
192.168.2.10:80
or
[2001:db8:85a3:8d3:1319:8a2e:370]:80
Because the port number for http is 80, this socket addresses the web server.
In most cases, however, URLs have FQDNs, not IP addresses and the format is
the same, but with the DNS name replacing the IP address. For example:
ftp.cti.ac.za:21
Wireless clients use the same network protocols and network client
software that cable networks use.
Wireless clients such as laptops and smartphones must use the same
frequency to connect to the WAP.
Router
is an AP with extra functions. A wireless router was
in the home router section, and functions as a switch,
firewall, etc. It is common to find wireless routers used in
Figure 11.85 shows a network setup using the wireless router. The cable plugs
into the wireless routers RJ-45 ports using twisted pair cables and the wireless
clients using wireless network interface cards (WNICs) connect to the router
using wireless radio signals. Figure 11.85 also shows how the wireless routers
WAN is connected directly to the ISPs Internet line to give all users on the
network access to the Internet.
You can see the speed and signal strength on your wireless network
by looking at the wireless NICs properties. In Windows, open the
Network and Sharing Center, select Change Adapter Settings,
then right-click your wireless NIC and select Properties.
Top speed
54 Mbps
11 Mbps
54 Mbps
75 Mbps (single channel)
150 Mbps (bonded
channel)
From 400 Mbps to 1+
Gbps (theoretical at close
range)
Frequency
5 GHz
2.4 GHz
2.4 GHz
2.4 & 5 GHz
Indoor ranges
30m
45m
45m
70m
5 GHz
Undetermined
*The draft standard means that it is used by many products now or will be in
the near future but the standard is under development.
The 802.11n standard requires all devices except handheld devices to use a
feature called multiple-input-multiple-output (MIMO). MIMO devices use
multiple antennae to send and receive data using separate frequencies. It does
this by allowing devices to multiplex signals over a single channel at the same
time. Although the official standard supports speeds up to 600 Mbps, it is more
likely that you will see MIMO devices that support 75 Mbps (single channel),
150 Mbps (bonded channels) and up to 300 Mbps speeds.
Note
11.10.9 Channels
802.11 standards use frequency bands starting at 2.4 GHz or 5 GHz. The
802.11a standard specifies radio frequency ranges between 5.15 and 5.875
GHz. In contrast, 802.11b and 802.11g standards work between the 2.4 and
2.4835 GHz range. Each frequency includes multiple channels. Whereas a band
starts from a specific frequency and ends at a specific frequency, a channel is
simply a fixed band of frequencies that wireless devices use to communicate to
each other. A single channel is used for communications, as shown in Figure
11.88. You normally do not have to change the channels on your AP or router.
However, if there is a lot of interference on one channel, you can switch to a
different channel with less interference (such as 1, 6 or 11 which are more
than 22 MHz apart and will not interfere with each other). Figure 11.88 shows
the options for changing the channel on this particular wireless router. This
router automatically chose channel 6 by default, which is common, but any of
the channels can be chosen.
Lowering the power level can affect users on your WLAN. Wireless
clients connect to the AP using the fastest speed they can get without
errors and if the RF level is too low, it can result in connectivity issues
or slow speeds.
Note
The two encryption types used with the wireless security protocols are:
Temporal Key Integrity Protocol (TKIP) WPA uses RC4 with TKIP. It
was designed so that WPA would be more secure than WEP while allowing
users to use the same hardware. Even though old hardware supports TKIP,
you might need to do a firmware upgrade for it to work.
Advanced Encryption Standard (AES) WPA2 uses AES. AES is much
stronger than either WEP or WPA with TKIP. Beyond wireless, AES is used
worldwide as an encryption standard in many different applications. You
might need to do a firmware or driver upgrade on wireless devices to
support AES.
Swiping the card or other token through a reader identifies the account holder.
The card can be used with a password or personal identification number (pin)
to provide even stronger security.
11.10.11.3 WPS
Wi-Fi Protected Setup (WPS) was developed by the Wi-Fi Alliance to make
it easier for users to set up a secure WLAN. WPS works in two common ways:
Push button you press a button on the AP for a short time and then
press a software button on the wireless client, such as a WPS-capable
laptop or printer. See Figure 11.90. The two devices communicate to each
other and automatically set up a secure connection. A strong PSK key is
still used, but you do not need to enter it. There is a set time frame, such
as a two minute gap, that you have to set the buttons on both devices.
Check the devices documentation on how to do this.
PIN assigned to the AP and/or a wireless client. You need to enter only
the PIN in the software of the other device to create a connection. A strong
PSK key is used for WPA2, but you do not need to enter it.
Attackers can learn MAC addresses that you have allowed and change
their system to use the same MAC address, therefore beating MAC
filtering. Additionally, it might be difficult to manage and keep track of
MAC addresses on a WLAN that has a lot of clients on it.
The Wireless Network Mode on this wireless router is set to Mixed. This means
that it can support both 802.11b and 802.11g devices.
11.10.13.1 SSID broadcast
When SSID broadcast is enabled on your wireless router, it periodically sends
out packets to announce itself within the maximum range to the WLAN,
essentially shouting Here I am; who wants to connect? These broadcast
packets allow other devices to easily see it and connect. Sometimes you can
see your neighbours WLAN from your wireless-enabled laptop just by scanning
the areas coverage.
11.10.13.2
Enabling or disabling SSID broadcast
If you disable SSID broadcast on your AP, clients not configured with the SSID
will not be able to find your WLAN and connect. Although disabling SSID
broadcast might provide some privacy by hiding the WLAN from users that are
not familiar with how WLANs work, it does not provide any security. Even if
you disable SSID broadcast, many standard packets sent over the WLAN
include the SSID.
Note
You might hear people saying that the SSID is the password for the WLAN, but
this is not true. WEP, WPA and WPA2 all support a passphrase, also called a
network security key. This passphrase is different from the SSID.
11.10.13.3 Renaming the SSID
Renaming the SSID to a unique name is the very least you can do to secure
your WLAN. This reduces the amount of information that people have about
your network.
Note
The best way you can secure your wireless network is by using a
strong security protocol, such as WPA2, and a strong passphrase that
nobody can easily guess.
Note
SSID
Security (such as WPA or WPA2)
Passphrase or pre-shared key
Note
If you enable SSID broadcasting, you usually do not need to enter the
SSID or the security type. These will be automatically selected when
you try to connect from the client. However, what you will need to do
is configure the exact same passphrase on the client, since this is not
broadcasted automatically.
You can use the following general steps to configure wireless settings on a
Windows computer:
1. Open the wireless network listing in Windows. You will see a display similar
to Figure 11.93 on the far right side of the taskbar. In Figure 11.93, the
mouse is hovering over one of the wireless networks and it shows details
about the network, including its name, signal strength, security type and
protocol.
The network that has been joined in Figure 11.94 is the same network
configured earlier on in Figure 11.89. Figure 11.89 shows the wireless
router configured using the Security Mode of WPA2 Personal and the
WPA Shared Key of IWillPa$$A+. Figure 11.92 shows the wireless
router with an SSID of APlusCertified and Wireless SSID Broadcast is
set to Enable.
In speed and range, infrared is not very impressive. Infrared devices can
transfer data up to 4 Mbps speeds at no longer than 1 metre. Infrared links are
direct line-of-sight and are vulnerable to interference, such as a person
walking in between the infrared link and even bright sunlight.
Note
11.10.15.2 Bluetooth
Bluetooth is a short-range radio-based technology that is used to connect
computing devices using low power. Devices that support Bluetooth are called
Bluetooth-capable or Bluetooth-enabled devices. Bluetooth is not designed to
be a full-function networking solution, nor is it meant to compete with Wi-Fi,
but rather to create simple small networks or PANs. Some great examples are
linking two laptops for a quick PAN setup, connecting sound headsets to your
smartphone, and connecting input devices such as keyboards and mouses to
computers and mobile devices.
Note
Bluetooth has been upgraded over the years to make it faster and more
secure. The first generation (versions 1.1 and 1.2) supports speeds at around
1 Mbps while the second generation (v2.0 and v2.1) is backward-compatible
with the first generation versions and adds support for more speed by
introducing Enhanced Data Rate (EDR), which reaches top speeds of around 3
Mbps.
Bluetooth v3.0 + HS (high speed) provides theoretical speeds up to 24 Mbps to
a maximum of 100 metres, though not over the Bluetooth connection itself.
Instead, devices link up using Bluetooth and then use a Wi-Fi 802.11 network
to transport user data quickly. The HS part of the specification is not
mandatory, and hence only devices with the +HS will actually support the
Bluetooth over 802.11 high-speed data transfer channel. A Bluetooth 3.0
device without the +HS suffix will not support high speed.
Bluetooth v4.0 includes Classic Bluetooth, Bluetooth high speed and Bluetooth
low energy protocols. Classic Bluetooth is made up of legacy Bluetooth
protocols and Bluetooth high speed is based on Wi-Fi. Bluetooth low energy
(BLE), previously known as WiBree, quickly builds up simple connections
between devices that use very little power running off a coin cell battery (e.g.
smartphones and wearable computing devices). It supports speeds up to 1
Mbps.
Depending on what Bluetooth version you use, you might not need to take the
pairing steps mentioned earlier. For example, Bluetooth version 2.1 uses
Secure Simple Pairing (SSP), and one type of SSP is called Just Works that just
works without your needing to enter a PIN and go through the pairing process.
However, as a security precaution, you might need to approve the pairing
process first.
Bluetooth logo
Bluetooth devices are configured for one of three classes that define how much
power is needed for the device in milliwatts (mW) and the approximate
distance. The classes also support different power levels. Table 11.13 shows
the three classes of Bluetooth and their approximate ranges:
Table 11.13 Bluetooth classes
Bluetooth Class
Class 1
Class 2
Class 3
Note
Approximate distances
100m
10m
1m
Although Bluetooth does not need line-of-sight, its radio signals can be blocked
by thick walls and metal objects, and other radio-based devices working in the
same 2.4 GHz range can interfere with it. Saying this, Bluetooth hops
frequencies many times a second, making it highly resistant to interference.
12.3.1 Dial-up
The traditional phone connection to the Internet is a dial-up connection. Dialup access is a way of connecting to a network using a modem and public
switched telephone network (PSTN). The PSTN is the entire collection of
interconnected public telephone cables and services throughout the world
which allow people to make telephone calls, and can be used for Internet
access. All of the PSTN is digital except the connection between the phone
companys switches and the end customer, which is voice-grade analogue
copper cables. The part between the customer and telecommunication provider
switches is called the local loop or plain old telephone service (POTS).
The central office (CO), also called the local exchange or point of
presence (POP), is the telecommunication or phone companys building with
switches inside that connect to the end customer.
You can think of a dial-up connection as making a telephone call over a
telephone cable between computers. Users subscribe through an ISP for dialup access and are charged for how long they connect. To dial the ISP and
connect, you need dial-up software and hardware, such as a modem or ISDN
terminal adapter.
12.3.1.1 Modem
Data is transferred over telephone wires using analogue signals that
continuously change voltages. Computers work with digital signals voltages
that are either on or off and use only two states of voltage: zero volts and
positive volts. A modem, short for modulator/demodulator, turns the
computers digital data into an analogue signal (modulation) to send it over the
telephone line and then turns it back into digital data (demodulation) when it
reaches the other end of the line.
Telephones and modems use 2-pair cables with RJ-11 connectors. The
cables and RJ-11 connections are smaller than RJ-45 connectors used
with NICs and Ethernet ports.
The top speed, in theory, that you can get from one phone line connection is
56 Kbps; however, in reality, this speed is 33.6 Kbps or typically less.
With traditional phone lines, you can either talk on the phone or connect with
the computer, but you cannot do both at the same time. Most modems allow
you to split the phone line, however. You can connect the phone line directly
into the modem input jack for computer use. The modem then has another
port that you can connect to your phone.
12.3.1.2 PPP
Dial-up networking works by using the Point-to-Point Protocol (PPP) to
send packets over phone lines. PPP sets up a connection between two points
over phone lines. The two points could be an ISP and its customer or a dial-up
remote access computer and remote access server (RAS), for example. PPP
encapsulates the network protocol (usually TCP/IP) and provides a way to
manage the connection by allowing two hosts to negotiate the following
options:
12.3.2 ISDN
A standard telephone connection has a telephone line that runs from the users
telephone to a network connection box outside the users office or home, and
then from there to a central switch at the phone companys central office. A
city generally has a lot of central offices, each with a central switch. These
switches are connected to each other through high-speed trunk lines.
Integrated Services Digital Network (ISDN) is a special type of dial-up
connection that uses the existing copper cable telephone network for voice,
video and data. With ISDN, the entire telephone network including the local
loop the line from the users telephone to the central office switch is digital.
Note
Since ISDN signals are digital, ISDN lines use terminal adapters (TAs) that
look like analogue modems but work completely differently for the digital-only
connection. The terminal adapter can be an external device, an ISDN-enabled
router or an expansion card. You connect the TA to the ISDN network through
a network terminator (NT1). An ISDN wall jack usually looks similar to the
standard RJ-45 network jack.
Note
You can make and receive phone calls while you are connected to the
Internet with ISDN. However, ISDN will disconnect one of the
channels, reducing the speed of the Internet connection.
ISDN users pay a fee for line rental and pay for each minute they use the ISDN
service. It was once popular and can be a good solution for customers who are
a long distance from the nearest ISP and where the other more popular and
faster DSL or Cable Internet connections are not available. However, because
ISDN needs special equipment, it cannot be used in laptops and other mobile
devices when travelling away from the ISDN service.
12.4.1 xDSL
Digital subscriber lines (DSLs) is a broadband Internet access technology
that quickly transfers digital data over standard PSTN phone lines in full-duplex
mode. It uses different frequencies on the copper cable to make it possible to
use the same phone line to talk to a friend on the phone and upload or
download Internet data on the computer at the same time. There are several
versions or flavours of DSL, and they are sometimes known as xDSL. The x
stands for the various flavours of DSL being offered by the DSL provider while
DSL generally refers to any type of DSL service. Some common types of DSL
are:
Symmetric DSL (SDSL) has the same speed for both uploads and
downloads. SDSL is a dedicated DSL link over copper from the DSL
provider to the Internet system. A dedicated DSL line is not used for
regular voice traffic. SDSL is suitable for companies, business applications
such as web hosting, intranets and VPN connections. Faster speeds are
more expensive.
There are some main pieces of DSL equipment you need to know about: the
DSL modem and line filter at the customer end and the DSLAM at the DSL
providers central office:
A DSL transceiver (known as a DSL modem) connects a computer or router
to a telephone line to send and receive voice and Internet traffic. The modem
is different from a dial-up modem; it takes digital signals from the users
computer and turns them into the voltage signal of a suitable frequency range
which it then applies to the phone line.
The modem can be standalone hardware connected through an Ethernet port,
an adapter inserted into a computer, or the more common DSL router which
combines the function of a DSL modem and a home router/switch as a
standalone Internet appliance.
A+ Preparation | V1.0 Jan 2014
The appliance has multiple Ethernet ports that you can connect to multiple
computers on the LAN and it might also be an AP. Also called a gateway, a
DSL router usually manages the connection and sharing of the DSL connection
in a SOHO network and has a WAN port that you connect to the Internet.
12.4.2
All of the Internet connection methods described up to this point rely on cables
installed and kept in good condition by telephone companies. However, many
companies in certain parts of the world that offer digital cable television
(CATV) services and telephone services also offer Internet connections by
installing and using the same cable for all of these services. In many cases,
fibre-optic cable is used for long distance cable that runs over the main part of
the network but the cable connections that enter the customers home or office
are copper-based coaxial.
This combination of fibre and coaxial is called a hybrid fibre coaxial (HFC)
network. Cable Internet connections start with an RG-6 or RG-59 coaxial cable
running into the customers house or office. The coaxial cable then connects to
a cable modem which in turn connects to a small home router or the
computers USB adapter or Ethernet NIC. Cable broadband service is simply
known as Cable.
Figure 12.7 shows a basic connection path for a broadband cable connection
for a home user. The cable telecommunications company provides both the TV
signal and the connection to the Internet as an ISP. The signal is split at the
users home with one cable going to the TV and the other cable going to a
cable modem and then to the users computer.
Both DSL and cable, fully digital Internet connections, use the term
modem that takes the incoming signal from the Internet and
translates it into something the computer can understand. You might
also come across the terms broadband modems and broadband
routers, which are simply network devices that support both DSL and
cable.
12.4.4 Satellite
Another connection method available for companies and users who do not have
access to other broadband Internet connections is satellite access. Figure 12.8
shows a typical configuration for a satellite-based Internet connection. With a
satellite dish located in space, the ISP has a connection to the Internet through
its own satellite dish.
The home user has a satellite dish at his or her home aligned with the satellite
above the earth, with a Digital Video Broadcast Satellite (DVB-S) modem
connected to his or her computer using coaxial cable. The modem can either
be installed as an expansion card or as an external box connected to the
computers USB or Ethernet port.
To make it easier for users to connect to the Internet, most hotspots, both free
and fee-based, disable security for the wireless networks. This means that you
should take some basic security precautions when using a public hotspot,
including making sure your firewall is running, disabling file sharing on your
wireless device and avoid websites that ask for confidential information but do
not use the secure connection.
12.4.6 WiMAX
WiMAX stands for Worldwide Interoperability for Microwave Access,
and the WiMAX forum advances and certifies compatibility and interoperability
of broadband wireless products based on the IEEE 802.16 family of wireless
broadband standards. WiMAX is a wireless broadband Internet access system
that allows data to be sent in various ways, ranging from point-to-point links
to full mobile cellular type access. It is similar to Wi-Fi, but provides Internet
access to many more users and over longer distances, making it suitable for
people in cities and rural areas to access the Internet.
Many applications can use WiMAX, including last mile broadband connections
replacing DSL and cable, hotspots and high-speed connectivity for companies.
It provides wireless MAN connectivity at speeds up to 70 Mbps with WiMAX 2
(802.16m) supporting 100 Mbps speeds. Even though speeds are split up
between several companies or a few hundred home users, it will still provide
fast speeds to each user.
Wireless broadband access (WBA) is set up like a cellular phone system
using base stations (towers providing cellphone and Internet access) and
subscriber stations (SS) such as smartphones, gaming consoles and laptops
that connect to WiMAX base stations. A subscriber is a customer who
subscribes to a network and uses its fee-based services for an agreed upon
time.
Figure 12.9 shows a basic example of a WiMAX network. An ISP is connected
to the Internet on one side and has a cable connection to a WiMAX tower on
the other side. The tower has a transmitter and receiver with a clear line of
sight to another tower with another transmitter and receiver. Data is sent
using microwave signals between the two towers.
As you might imagine, LoS WiMAX is far faster than non-LoS WiMAX. The
problem with WiMAX is that it is not backward-compatible with 2G and 3G
cellular technologies, and it costs quite a bit and needs a lot of power. WiMAX2
(802.16m) is a 4G technology that supports 1 Gbps speeds for fixed
subscribers and 100 Mbps to mobile subscribers using MIMO antenna
technology, while it maintains backward compatibility with existing standards.
Before moving on, it is worth mentioning a proposed IEEE 802.20 standard
called global area network (GAN). Like a cellphone network, a GAN enables
users to travel across a country and access the network the whole time. It
would give users with mobile devices enough bandwidth to access the Internet
at speeds comparable to DSL or even better.
Note
www.speedtest.net/
speedtest.mybroadband.co.za/
www.dslreports.com/speedtest
speedof.me/
testmy.net/country/za
reviews.cnet.com/internet-speed-test/
Figure 12.12 Mobile app for testing upload and download speeds
Testing your Internet speed between you and your ISP by using your ISPs
speed test program is another option. Be careful when using any program and
services, as some programs do not give accurate results. Therefore, like
everything else in IT, you should always read expert reviews before using
programs from the Internet.
Note
A good way to test speeds is to run the test three or more times, once
every few minutes and then work out the average of all the test
results.
Internet
Note
12.7.1 ACLs
An access control list (ACL) is simply a list of rules that a firewall goes
through to find out what it must do with incoming and outgoing traffic. Each
rule or line in the ACL tells the firewall what traffic it must look for based on
criteria, such as port numbers for application traffic and IP addresses for host
traffic, so that it can filter (allow or deny) that traffic based on the criteria. See
Figure 12.15. Firewalls will typically have many rules in place, which can be
applied to inbound packets coming into the firewall and outbound packets
leaving the firewall.
12.8 NAT
Network Address Translation (NAT) translates public and private IP
addresses. A NAT device has at least two network interfaces: one connected to
the internal network and one to the Internet. To perform translation, the NAT
device replaces the private IP address inside all packets coming from clients on
the internal network to its own public IP address before sending those packets
out to the Internet, thereby hiding internal clients from the Internet. It also
changes its own IP address inside packets coming from Internet hosts back to
the IP address of each client on the internal network.
A+ Preparation | V1.0 Jan 2014
See Figure 12.16 for an idea of how these different translations work.
You can think of a proxy as a server that sits between an internal client and
the Internet to filter and cache web requests coming from the client.
Figure 12.17 shows a network with a proxy server that gives you an idea of
how a proxy server works. Clients that are configured to use the proxy server
send URL requests to the proxy server instead of to the Internet web server.
The proxy server gets the URL request and returns it to the client. The web
request can be a web page or something else. The proxy server has one or
more public IP addresses assigned to it and has direct access the Internet. The
internal network has private IP addresses, and the proxy server uses NAT to
translate the private addresses to public and public back to private, and
therefore provides security by hiding internal clients from the Internet.
If a proxy server is not used on a network, you would usually run NAT
on a router or firewall that is connected to the Internet. If NAT is not
used, all internal clients would need to have public IP addresses,
which is expensive.
Because each request a client sends to the Internet goes through the proxy
server, the proxy server can provide more functions over and above just
forwarding requests. For example, a proxy server can cache frequently
requested web pages to speed up future web requests, it can filter content to
block access to unauthorised websites, it can log (keeping track of) Internet
activity, and can scan incoming packets from the Internet for various types of
malicious software and outgoing packets for private company information.
Note
Without it, clients on the Internet will not be able to access the internal
servers. Most routers and firewalls support port forwarding. It can be left open
all the time or turned on only when needed.
For example, imagine you have a small office network protected by a router
firewall, as shown in Figure 12.18. The firewall is connected to the Internet
with a public IP address, and the computers on the internal network have
private IP addresses.
Tip
Port triggering often uses port ranges such as the trigger range of 5670 to
5680 and the incoming range of 8760 to 8770. When the router gets outgoing
traffic using any port between 5670 to 5680, it opens incoming ports 8760 to
8770 to receive incoming traffic. The advantage of port triggering is that it is
not based on IP addresses. Therefore, internal clients can still use DHCP and
the router will return traffic to the computer with the same IP address that
sent the traffic that triggered the incoming port to be opened.
The downside is that only one internal client application can use it at a time. If
Thandi uses her application to trigger the port, it would work for her. But if
Cedric then opened an application to trigger the port, either Thandis
connection will be lost or Cedrics connection will be refused. Some routers
work on a first come-first served basis connection and therefore will not close
the first connection. Other routers, however, give preference to the most
recent connection request.
It is common for a DMZ to have two firewalls, but there are other
possible configurations. For example, a three-legged DMZ is one
firewall with three connections. One connection is for the Internet,
another is for the network server, and the third is for the internal
network. This is cheaper because only one firewall is used, but it is
also more difficult to configure.
To create a DMZ that works like it should, you must be aware of the traffic that
needs to pass between the external network and the internal one. For
example, if your web server runs an application that needs to access a
database, you might want to place your database server on the more secure
internal network.
A+ Preparation | V1.0 Jan 2014
In this case, you must set up the firewall protecting the internal network to
pass database traffic to the database server, but leave out the web server
traffic coming from the Internet.
Email instead of running your own internal mail server that users can use
to send and receive email, the company can sign a contract with an
Internet-based email provider such as Google Mail (Gmail).
Online or cloud storage instead of setting up your own local file server
with a large amount of shared storage space, you can sign up for an
Internet file storage service and then store your data on the Internet and
access it at any time. Also, data can be backed up by the cloud service
provider. Examples include Google Drive, Microsoft SkyDrive, Dropbox and
Amazon Cloud Drive.
Start date :
Student, please note that unless all of the following exercises have been
signed off by a lecturer, you will not be allowed to book for the A+ practical
examination.
DATE
SIGN
Unit 2
Unit 3
Unit 4
Unit 5
Unit 8
Introduction to A+ 802
Welcome to the A+ 802 section of the A+ Preparation module. In the previous
section, you studied the material required for a strong grasp of computer
hardware, communication skills, printers and networking. In this section you
will learn about software, operating systems, system and management
programs, virtualisation, troubleshooting, security, mobile devices and the
software part of networking.
Note
This unit and all subsequent units in the A+ 802 section cover the objectives
for the CTI A+ 802 examination.
Days
1 day
1 day
1 day
1 day
1 day
2 days
2 days
1 day
1 day
1 day
1 day
2 days
1 day
1 day
17 days
Required material
The CTI practical examination will cover the lab exercises in this study guide
and those in the GTS lab books. This study guide will list the exercises that
must be completed in the GTS book.
You are required to study the entire A+ 802 section in
this study guide only. You are strongly encouraged to work
in the Windows 7 and Windows 8.1 operating system as you
read through the rest of this book. Where this icon appears in
this study guide, please complete that exercises in the lab
book:
GTS A+ Certificate 802 Support Skills Labs and References
(G185eng) book.
A+ 802
A+ Certificate 802 Support Skills Study Notes (G185eng)
A+ 802
Unit 1 Operating System Installation and
Upgrade
At the end of this unit, you will be able to:
Skills
Study
Notes
Tip
There are several tasks you need to do before you actually install an OS or
upgrade one to a newer one. If you do your homework first and prepare
properly, the installation process is easy and will go fast, but skipping any of
the preparation tasks might cause problems such the computer locking up and
refusing to boot during installation. With that in mind, look at the following
steps you need to go through before and after installing the OS:
1.
2.
3.
4.
5.
6.
1.2 Choosing an OS
A 32-bit CPU with a 32-bit Windows OS cannot address more than 4 GB RAM.
It is important to choose an OS and hardware to match the requirements of
that OS. Even though a 32-bit OS can address 4 GB RAM, it will not use it all.
It reserves some of the addressable memory space for devices such as
graphics cards and peripherals. 64-bit operating systems do not have this
limitation and can theoretically address as much as 16 exabytes of RAM.
As such, you need to consider many factors before deciding which OS to use
for a given situation. Some of these considerations include:
The hardware on 32-bit systems is identified as x86 and you can only install
32-bit operating systems on it. The hardware on 64-bit systems is identified as
x64 (sometimes AMD 64 or Intel 64 indicating it is an AMD or Intel CPU), and
you can install both 64-bit and 32-bit operating systems on it.
Figure 1.2 shows the Windows XP x64 desktop and Start menu.
Note
Table 1.1 lists the minimum system requirements for Windows XP.
Table 1.1 Windows XP minimum requirements
Component
CPU
Memory
Display
Hard disk
Installation media
Minimum Specification
32-bit x86 (233 MHz or higher with 300 MHz or higher
recommended)
64 MB RAM (128 MB recommended)
SVGA (800 x 600) or higher
1.5 GB free disk space + paging space (2 GB
recommended)
CD-ROM or cross-network
Table 1.2 shows a comparison of the limitations with the different Windows XP
editions.
Table 1.2 Windows XP system limits
Maximum Multicore SMP
RAM
(Max CPUs)
32-bit Home
32-bit
Professional
32-bit Media
Center
32-bit Tablet
XP 64-bit
Professional
x64
HyperThreading
4 GB
4 GB
Yes
Yes
No
2-way
Yes
Yes
Virtualisation
and Data
Execution
Environment
Yes (SP2)
Yes (SP2)
4 GB
Yes
No
Yes
Yes (SP2)
4 GB
128 GB
128 GB
Yes
Yes
Yes
2-way
2-way
2-way
Yes
Yes
Yes
Yes (SP2)
Yes (SP2)
Yes (SP2)
Table 1.3 lists the minimum system requirements for Windows Vista. For good
performance, consider a system with a dual-core CPU with 1 GB RAM.
Table 1.3 Windows Vista minimum requirements
Component
CPU
Memory
Display
Hard disk
Installation media
Audio
Minimum Specification
800 MHz (32-bit or 64-bit recommended)
512 MB (1 GB recommended for all editions except for
Home Basic)
SVGA (800 x 600) or higher
DirectX9 graphics with WDDM
32 MB video memory recommended for Home Basic
Aero requires 128 MB video memory, pixel shader v2.0
and 32-bits/pixel (for all editions except Home Basic)
20 GB with 15 GB free space (40 GB recommended for all
editions except for Home Basic)
DVD-ROM or cross-network
Sound card and speakers are recommended
Just like other operating systems, Windows Vista editions have limitations on
the hardware they support. Table 1.4 lists the hardware limitations for
Windows Vista editions.
Table 1.4 Windows Vista system limits
Home Basic
Home Premium
Business
Enterprise
Ultimate
Maximum
RAM 32-bit
4 GB
4 GB
4 GB
4 GB
4 GB
Maximum
RAM 64-bit
8 GB
16 GB
128 GB
128 GB
128 GB
Ultimate: this edition is available in 32-bit and 64-bit and includes all the
features available in any other Windows 7 edition.
After deciding what version of Windows 7 to use, and before buying and
installing that OS, you should identify the minimum system requirements for
the OS. If the hardware does not meet the minimum system requirements,
you will not be able to run the OS. Most editions are available in both 32-bit
and 64-bit versions (except for the Starter edition). Table 1.5 lists the
minimum system requirements for Windows 7. A dual-core CPU with 2 GB RAM
should provide acceptable performance for a system running office-type
applications.
Table 1.5 Windows 7 minimum requirements
Component
CPU
Memory
Display
Hard disk
Installation media
Audio
Minimum Specification
1 GHz
1 GB RAM
DirectX9 graphics or later
Windows Display Driver Model (WDDM) 1.0 for Aero
Support
16 GB free space
DVD-ROM or cross-network
Sound card and speakers are recommended
Even though Table 1.5 lists the minimum requirements, which might be
suitable for a user who uses basic office and web applications for light tasks
such as web browsing, they will not give satisfying results for a user who uses
resource-intensive applications. Buying a faster CPU and adding more RAM
than the minimum or even the recommended requirements provides much
better performance.
A+ Preparation | V1.0 Jan 2014
64-bit CPU supporting AMD64 or EMT64T, 2GB RAM and 20 GB free hard
disk space.
Tablet/touch screen runs on dedicated hardware.
TV Turner card and IR Receiver for remote control are recommended for
Media Center systems.
Not only must you learn the minimum system requirements, but also the limits
related to hardware support. Table 1.6 compares the hardware limitations in
terms of memory and CPUs for the different Windows 7 editions.
Table 1.6 Windows 7 system limits
Starter
Home
Premium
Professional
Enterprise
Ultimate
Maximum
RAM 32-bit
2 GB
4 GB
4 GB
4 GB
4 GB
Maximum
RAM 64-bit
N/A
16 GB
192 GB
192 GB
192 GB
2-way
2-way
2-way
Installing Windows 7 Home Premium on a system with two CPUs will still work,
but the OS will only use one CPU. Windows 7 32-bit systems support up to 32
cores and 64-bit systems support up to 256 cores in any single CPU. Although
12-core CPUs are available, you probably will not see 32-core or 256-core
CPUs in the near future. All editions support Hyper-Threading, hardware
assisted virtualisation, data execution prevention and DVD playback and
recording; but Blu-ray requires third-party software.
You can use several websites and tools to check whether your systems
hardware is compatible with Windows 7. You can use the following tools for a
system that already has an OS pre-installed:
Note
Ensure that your system and all attached devices are in the Windows
Certified Products list at:
https://sysdev.microsoft.com/en-us/hardware/lpl/
Windows 8: loosely called core or standard, this edition is a basic stockkeeping unit (SKU) aimed at home users and includes features such as the
new Start screen shown in Figure 1.5 that replaces the traditional Start
menu, Windows Store (an online app store), Microsoft account integration,
the Windows desktop, remote desktop, VPN client along with other very
basic features. This edition does not support features such as the ability to
join Active Directory domain networks and process group policies, drive
encryption and virtualisation.
Windows 8 Pro: this edition is comparable to Windows 7 Professional and
Ultimate, and is designed for PC enthusiasts and company users and
includes all the features of the Windows 8 edition with additional features,
such as Remote Desktop, Active Directory domain connectivity and group
policy processing, file access on the go, encrypting file system (EFS),
BitLocker drive encryption and BitLocker To Go, virtualisation and virtual
hard disk (VHD) booting. Windows Media Center functionality will be
available only for Windows 8 Pro as a separate software package (or addon).
Windows 8
Windows 8
Pro
Windows 8
Enterprise
Windows RT
Devices
Maximum RAM
32-bit
4 GB
4 GB
Maximum
RAM 64-bit
128 GB
512 GB
4 GB
512 GB
Yes
2-way
4 GB
N/A
Yes
2-way
Windows 8.1 has the same device requirements as Windows 8 and will run on
most computer hardware that was originally designed for Windows 7. However
x64 Windows 8.1 editions require CPUs that support extra, specific x86
instructions. Additionally, some Windows 8.1 features require other hardware
components:
The following two Windows editions are designed for business environments:
Windows 8/8.1 can run apps built on two separate platforms. Virtually any
desktop program that runs in Windows 7 will also run on Windows 8/8.1. The
new WinRT apps run only in Windows 8/8.1.
In general, you can expect most applications that run properly in Windows 7 to
work in Windows 8/8.1. Windows 8/8.1 supports a new programming model
designed for immersive, touch-enabled apps that are available online through
the Windows Store. However, some application compatibility issues are
possible because of changes made to Windows 8.1. In addition, devices
powered by Windows RT 8.1 can run most Windows Store apps but are unable
to run desktop programs, including installers and web browser add-ons.
Setup Wizard this program runs during the Windows 7 installation and
quickly checks your hardware.
Upgrade Advisor or Upgrade Assistant Microsoft provides a free
program which you can run on your system to see if your hardware and
software will work with a newer version of Windows and that there are no
compatibility issues with Windows 7 or 8/8.1. This program is available on
the installation media or can be downloaded from Microsofts website. You
can access this website to download it by clicking the Check Compatibility
Online link from the initial Windows 7 installation screen. You can also
download it from here:
windows.microsoft.com/en-us/windows/downloads/upgrade-advisor.
Windows 8s program is called Upgrade Assistant and it checks to see if
your system meets the minimum system requirements and scans your
hardware, apps and connected devices to see if they will work with
Windows 8. It then provides you with a compatibility report.
windows.microsoft.com/en-za/windows-8/upgrade-to-windows-8
See Figure 1.6. Make sure all peripherals are connected to your computer
and turned on.
Note
You can also search for the upgrade advisor or assistant from
Microsofts download website at www.microsoft.com/download/. You
can use this same method to find many other free downloadable tools
provided by Microsoft.
Microsoft websites the following two websites are useful for checking
for compatibility with a Windows-based system:
o Windows Compatibility Center lists hardware and software that is
compatible with Windows. You can search for the Windows Compatibility
Center here:
www.microsoft.com/windows/compatibility/
o Windows Logod Products List (LPL) lists hardware devices and
expansion cards that have been tested and verified to work with different
versions of Windows. It was previously known as the hardware
compatibility list (HCL). If a device is not listed on the Windows LPL,
its driver has most likely not been signed or guaranteed by Microsoft.
You can access the list here:
msdn.microsoft.com/en-us/library/windows/desktop/hh801892.aspx
https://sysdev.microsoft.com/
Note
Unsupported hardware can cause issues during the setup process and
you should physically uninstall the hardware from the system before
starting the process.
If you are running Windows XP on the C: partition for example, you can
install Windows 7 on the E: partition as long as it exists.
2nd RULE: the system partition (which contains the boot files) must
be accessible to each OS.
3rd RULE: always install the older OS first and the newer one last.
The older OS is less likely to recognise the multi-boot environment. A
newer OS is aware of the older OS and keeps critical files. However, an
older OS is not aware of newer OS and often corrupts critical files.
Note
1.7.3 Upgrade
An in-place upgrade simply involves installing an OS on top of an earlier
installed OS. Supported applications, data files and settings in the previous OS
are normally included in the new installation. For example, if you upgrade a
Windows Vista Ultimate that has Microsoft Office to Windows 7 Ultimate,
Windows 7 would also include Microsoft Office. You would not have to reinstall
Microsoft Office.
To upgrade Windows usually means inserting the Windows installation disc
while your old OS is running, which will auto start the installation program. The
installation program will then ask you whether you want to perform an upgrade
or a new installation; if you select new installation, the program will remove
the existing OS before installing the new one, so choose upgrade.
An upgrade is often simpler for home users and users on small networks.
However, there are limitations on what systems can be upgraded. When
upgrading an earlier OS to Windows 7 on the same partition, Windows 7 keeps
data from the previous installation in a folder named Windows.old. You can
copy data from the Windows.old folder to anywhere else on your system.
Tip
If you no longer need the data in the Windows.old folder, you can delete the
folder by using the Disk Cleanup program. Click Start, type Disk Cleanup in
the Search box, and press <Enter>. Select Previous Windows
Installation(s) and click OK to delete the folder.
Tip
You can use any of these three methods to install Windows on a computer with
an existing OS or on a new computer. However, even if you are installing it on
a computer with an existing OS, it does not mean that it is an upgrade. Any
applications you need might still need to be installed.
1.7.4.1 Installation Media CD or DVD
When you buy a retail copy of Windows, it comes on a bootable CD or DVD
with all the files you need to perform a clean install or upgrade of the OS.
Instead of having different discs for each edition of Windows Vista/7, every
installation disc contains all of the available editions (except for Enterprise).
You can place the disc into your optical drive, turn your computer on, set the
boot order in CMOS (if not set by default) to boot to the optical drive first and
then start the installation. During the installation, you can configure your hard
drives by partitioning or formatting them as desired.
1.7.4.2 Remote network installation
If you work for a medium to large-sized company, it might be more convenient
for you to install Windows from across the network. Although the term
network installation can involve many different tools and methods depending
on the Windows version used, client computers that receive the installation
must be connected to a server and that server might be another Windows
client computer or a server running a network OS. The serving computer must
host an image, which can be either the default Windows installation or a
custom image that the network administrator has created.
One way to allow a remote network installation is to copy all the installation
files to a folder on a network server and then share that folder. Users can then
connect to the share and start the installation by clicking the setup file. For
example, you can copy everything on the Windows 7 installation DVD to a
network share and install systems from there.
Tip
You still need a valid license key to activate the installation for each system
that connects. However, the contents of the DVD are not tied to the license
key, so one DVD can be used with multiple license keys. A drawback is
network bandwidth; that is, if the network is already busy, this added network
traffic can slow down network performance for all users.
This method can be automated with scripts or answer files that automatically
select the options and components needed for the installation. The scripts can
even install extra applications at the end of the OS installation, all without your
having to do anything once the installation is started.
This type of installation is called an unattended installation and does not
need you to be there for the installation, as opposed to attended
installation, which needs you to be there to start and complete the
installation and input information at various points.
1.7.4.3 Image deployment
Imaging is a very common way of installing Windows because it reduces the
time needed to configure and deploy systems, reducing overall costs. An
image is a snapshot of a hard disk volume on which an OS and usually
application software are pre-installed. The image contains the OS,
configuration settings, service packs, updates, application software and
everything else you need, and after the snapshot is captured and saved to a
file, it can be deployed to multiple systems. For example, an administrator
might need to install Windows 8 on 50 new computers. He or she could install
the OS on 50 target computers individually or use imaging software to speed
up the process. Figure 1.9 gives you an idea of how this process would work.
You can buy many disk cloning/imaging tools to create and clone
images, such as Acronis True Image (www.acronis.com) and
Symantecs Norton Ghost (www.symantec.com/), or you can use free
tools such as Clonezilla (clonezilla.org/) or those provided by
Microsoft, such as the Windows Automated Installation Kit (Windows
AIK) or Windows Deployment Services (WDS).
You need a PXE client with a PXE-aware BIOS and NIC to configure the
client to boot to the network.
After that, to make the image bootable, you can download, install and run the
Windows 7 USB/DVD Download Tool from here, which will convert the image
and transfer it to the drive, making the drive bootable:
www.microsoftstore.com/store/msusa/html/pbPage.Help_Win7_usbdvd_dw
nTool
You must be the administrator to run this tool and install it from USB and your
Windows 7 computer must have .NET Framework 2.0 or higher installed.
Despite the name of the tool, you can use it for a Windows 8 image. Figure
1.10 shows some screenshots of this tool and the OS contents of the bootable
drive.
It can take a long time to install Windows and then apply drivers and
configure settings afterwards. A way around this is to create
slipstream media (CD, DVD, USB or network share) with the latest
drivers and updates pre-applied to the media to speed up the
installation process and to allow a direct installation of updated
software. Search the Web on how to build slipstream media and
complete the installation.
If you are going to use the same answer file for multiple systems on the same
network, you need to ensure that each computer is assigned its own unique
computer name, since all computers on a network must have a unique name.
You can either provide a list of names to use or have the Setup program
randomly create names. When you are finished, Setup Manager will ask you to
save your answers as a text file.
Note
Once you have created an answer file, you can start your installation with this
command and go do something else while the installation runs.
D:\i386\winnt32 /s:%SetupFiles% /unattend:%AnswerFile%
Substitute %SetupFiles% with the local path (D:\i386 if installing from a disc)
or network path of your setup files. If you decide to go with the network path
option, then you must create a network boot disk so that the installation
program can access the files from that location. For %AnswerFile%, substitute
the name of the text file you created with Setup Manager (usually
unattend.txt).
Note
You can use any text editor to create an answer file instead of using
Setup Manager, but the text file can be very long with a lot of
different commands and syntax. Most technicians prefer the easy
method of using Setup Manager.
Note
The following sections describe some of the tools in the Windows ADK kit. You
can search for and download Windows ADK from:
www.microsoft.com/en-za/download/
1.8.4.1 Deployment and imaging
Windows ADK contains tools and components that can be used to customise,
deploy and manage Windows images, including:
1.8.4.3
Windows To Go
Windows To Go is a Windows 8/8.1 Enterprise feature that allows you to create
a portable Windows 8 workspace, hosted on a USB drive. By placing a
configured bootable Windows To Go USB flash drive or external hard drive into
a computer and booting to it, you can access your own personal Windows 8
desktop, applications and files, regardless of the OS running on the host
computer.
When booted into the Windows To Go workspace, the newly booted computer
uses the Windows To Go drive as its local hard drive and prevents changes to
the hosts hard drive by disabling it by default. A Windows to Go drive does not
have a visible partition and is not assigned a drive letter to prevent data
leaking between the Windows To Go drive and host computer.
You can restore a failed USB drive to working condition by reformatting and reprovisioning it with Windows To Go, but all data will be lost. If the Windows To
Go drive is disconnected while the computer is on, the computer will freeze
and you will have 60 seconds to reinsert the drive, either into the same port,
where functionality will be resumed to the exact point where the drive was
removed or if the drive is not re-inserted or reinserted into a different port, the
host computer will turn off after 60 seconds.
You will not need to install software on the host computer to run Windows To
Go, but the host does have to meet several basic system requirements, listed
in Table 1.9.
Table 1.9 Windows To Go requirements
Component
USB drive
USB port
Firmware
Processor architecture
CPU
RAM
Display
Requirement
Windows To Go certified drive
USB 2.0 or higher with USB 3.0 improving
performance
The computer must be able to boot from a USB
drive and USB booting must be enabled in the
BIOS.
Must support the image on the Windows To Go
drive
1 GHz or faster
2 GB or higher
Direct X9 with WDDM 1.2 or higher
Windows To Go Image
architecture
32-bit
64-bit
32-bit
64-bit
32-bit
32-bit
32-bit
64-bit
only
and 64-bit
only
only
Although using any of these recover methods is better and faster than
reinstalling the OS, the OEM recovery media will not usually recover
user data, settings or applications and will not include any updates or
service packs applied between the ship date and recovery date and
only works if the original hard drive is still installed. Also, using these
recovery methods will usually remove everything on your system.
In Windows 8/8.1, you can create a USB recovery drive by copying the
recovery image stored on the OEM recovery partition from that partition to the
drive and then delete it and use a recovery drive instead (or keep both of
them). However, the drive cannot be used for anything other than for recovery
purposes.
Also, you will not be able to use a recovery drive created in a 64-bit Windows 8
version to boot and repair a Windows 8 32-bit version, it is bit-specific.
Tip
You can also create your own recovery media using backup or drive
imaging software.
You will need the installation disc as well as the license key to
complete the installation.
A lot can go wrong with a repair install so you should only use it as a
last resort; that is, after you have tried all other repair methods and
before reinstalling Windows.
You will have to reinstall applications after the install, but you can
migrate user data and settings from Windows XP to Windows 7.
Table 1.11 lists the upgrade paths from earlier editions of Windows. If an
upgrade path is not available, you must perform a clean installation of
Windows 7.
Table 1.11 Windows 7 upgrade paths
From
Windows XP
Windows Vista
Home Premium
Windows Vista
Business
Windows Vista
Ultimate
Note
Upgrade to
Windows 7
Home Premium
No
Yes
Upgrade to
Windows 7
Professional
No
Yes
Upgrade to
Windows 7
Ultimate
No
Yes
No
Yes
Yes
No
No
Yes
You can only upgrade to Windows 7 from Windows Vista if you have
the same bit edition, that is, you can upgrade a 32-bit Vista to 32-bit
Windows 7, but not 32-bit to 64-bit. You can however upgrade a 64bit Vista to a 32-bit Windows 7. Also, you can perform an in-place
only to a comparable or higher edition, from Home to Professional for
example. Likewise, you cannot upgrade a consumer version of
Windows 7 to a business version.
technet.microsoft.com/en-us/library/jj203353.aspx#editions
Table 1.12 lists the in-place upgrade paths from Windows 7. If an upgrade
path is not available, you must perform a clean installation of Windows 8.
Upgrade to
Windows 8
Upgrade to
Windows 8 Pro
Windows 7 Starter
Windows 7 Home
Basic
Windows 7 Home
Premium
Windows 7
Professional
Windows 7 Ultimate
Windows 7
Enterprise
Yes
Yes
Yes
Yes
Upgrade to
Windows 8
Enterprise
No
No
Yes
Yes
No
No
Yes
No
No
Yes
No
No
Yes (volume license)
File Allocation Table (FAT32) this file system does not include security
features such as the ability to assign permissions to files and folders.
Sometimes FAT32 is referred to as FAT but FAT technically refers to an
older 16-bit version of FAT and FAT32 refers to the 32-bit version. Most
USB flash drives and USB external drives use FAT32.
New Technology File System (NTFS) this is the preferred file system
for Windows up to Windows 7. It provides increased security and reliability
compared to FAT32, allowing you to assign permissions to files and folders
and it has additional features that improve its performance.
All versions of Windows support both FAT32 and NTFS for reading and writing
files. However, some versions of Windows cannot be installed on FAT32 hard
drives. See Table 1.13.
Table 1.13 Installing Windows on Fat32 and NTFS
Windows
Windows
Windows
Windows
XP
Vista
7
8/8.1
Install on FAT32
Yes
No
No
No
Install on NTFS
Yes
Yes
Yes
Yes
You should consider the following points before installing the OS:
Decide whether partitioning a disk will give you better disk performance.
You can create multiple partitions for various types of data (one for the OS,
another for user files, one for a page file, one for log/cache files whose size
changes dynamically, etc.), separating the OS and program files from the
rest of the files. This allows you to create image clones of only the OS and
installed software. The downside is that the system will constantly be
moving from one partition to another as you access files, affecting access
time and disk performance.
Make sure you have enough disk space for the OS and boot files and user
data and consider future growth.
You must install Windows Vista, 7 and 8/8.1 on a NTFS boot partition.
If using hardware RAID, access the RAID program or firmware at boot-up
using the appropriate key combination and configure the RAID level and
create volumes before installing the OS on them.
The default language for the installation is English and you can change this in
the Language To Install field. The time and currency format you choose
affects how the time, date and currency will be displayed on your system. For
example, July 4, 2014 using the English (Australia) option will display as
4/07/2014 while choosing the same date using the English (South Africa)
option will display as 7/4/2014. Keyboards have different keys to support
different languages and there are several different keyboard layouts available.
You can change these settings using the Region And Language applet in the
Control Panel after installing and logging into Windows.
You will be asked to verify the correct time and date and to set the time zone
during the installation. If you want to change this later on, you can do so in
the Date And Time applet in the Control Panel.
If you have a single drive with a single partition, simply select it and continue
with the rest of the installation. However, if you have multiple drives or
multiple partitions on a single drive, Windows will provide you with multiple
choices. You can also change existing drives and partitions during the
installation. Figure 1.19 shows the options that will appear if you click Drive
Options (Advanced) on the Where do you want to install Windows?
screen.
Format choose this option to format the partition with NTFS. Formatting
will delete everything on the partition.
New creates a new partition. If your drive has unallocated space, click on
it and select New to create a new partition. You will be able to enter a size
for the new partition. For example, you could enter 40960 (in megabytes)
for a partition size of about 40 GB.
Refresh after making changes to a drive, click Refresh to display the
changes you made.
System boot files the partition includes the boot manager code and
boot configuration database and other boot files needed to load the OS. If
the installation program does not create the system partition, Windows 7
stores these files in the system partition (root of C: drive).
BitLocker drive encryption this reserved space installs the start-up
files that allow you to enable BitLocker later on.
Windows Recovery Environment (WinRE) this holds tools that can be
used to recover Windows from many system errors after a failure.
Windows will only create the system partition if you create a new partition on
a disk that has no partitions created or if you delete all the current partitions
on the disk and then create a new one. However, if you are installing Windows
7 on a system that you are dual-booting with another OS, the installation
program will not create the system partition. Similarly, if there is no
unallocated space on the drive, the installation program will not create the
system partition. Also, Windows does not assign it with a drive letter but it is
listed in the Disk Management program in Windows.
Note
If you are running another Windows-based system, you can also start
the installation from within the OS. Place the DVD into the DVD drive,
browse to the DVD and double-click the setup program to start the
installation.
The DVD or USB should boot automatically and start the installation, but if a
prompt appears asking you to Press any key to boot from CD or DVD or
Press any key to boot from external device ... or something similar, then
press any key to do so. You only have a few seconds to press a key. This
prompt is a protective measure that indicates there is some kind of data on the
drive.
Tip
5. Click Install Now. This will officially begin the Windows 7 clean installation
process. This part of the installation will take some time; do not press any
keys here.
6. The Microsoft Software License Terms screen appears.
Note
7. Read through the agreement and if you agree to the terms, select the I
accept the license terms checkbox and then click Next.
8. When asked to select Upgrade or Custom (advanced), click Custom
(advanced). You will be asked to choose where to install Windows.
Assuming you had an earlier OS like Vista or XP on the drive, you could delete
the partitions for those operating systems to replace them with Windows 7 or
even a previous installation of Windows 7. Only complete this part of the
exercise if you need to, otherwise skip it! If you wanted to delete or
format a partition, you could:
Select the partition, choose Drive options (advanced) and click Delete
or Format.
Review the warning and click OK. For a deletion, all data on the partition
(including the OS, user files and everything else) will be deleted, and the
space from that partition will be added to unallocated space. For a format,
any data stored on the partition will be lost and the partition will be
formatted with NTFS.
Note
9. If you need to, delete all existing partitions on the drive. Since we are
performing a clean install of the OS, you can delete the 100 MB System
Reserved Partition that was created when the previous OS was installed (if
any OS previously existed). The installation program will create a new
system partition.
10. Click New.
A+ Preparation | V1.0 Jan 2014
11.
12.
In the Size text box, enter the desired size of the partition. For this
exercise, enter 81920 for a size of about 80 GB. This should be sufficient
for the OS and any added programs such as virtualisation software and
user data for this guide.
Click Apply. Review the warning about Windows creating additional
partitions for system files and click OK. See Figure 1.20.
18. Type a word or phrase in the Type a password hint (required) text
box. This hint will display if you enter the wrong password when logging
on to Windows 7 and can be used with a password reset disk. Click Next.
19. If the Windows Product Key screen appears, you can enter your product
key.
If you leave the product key blank and click the Next button, you will only be
installing the Windows 7 edition named on the box or disc label, even though
every version is on the disc. The product key will both verify the legitimacy of
your purchase and inform the installer which edition you have purchased.
Leaving the product key blank simply installs a 30-day trial of the OS.
20. Leave the product key blank and click Next.
21. On the Updates screen, you can select Use Recommended Settings, Install
Important Updates Only, or Ask Me Later. This screen determines how you
want to set up Windows Automatic Updates.
22.
23. On the time and date screen, make sure your OS knows what time it is.
Select your time zone such as (UTC +02:00) Harare, Pretoria and the
correct date and time and then click Next.
24. If your computer is connected to a network, you will be asked to choose
your computers location, as shown in Figure 1.22. If you are on a trusted
network, such as your home or office network, select the appropriate
option and your computer will be discoverable on the network. If you are
on an untrusted network like in a coffee shop, airport or you have mobile
broadband, choose Public network. For now choose Work network.
25. Windows 7 will complete the setup by adding icons to the desktop,
preparing the desktop and so on and your desktop will appear. If you
chose the recommended settings for updates and were connected to the
Internet, updates will automatically be downloaded. If asked to restart the
computer, click Restart Now.
Reconfigure any settings, such as network settings, that were found not to
work.
Install and configure any applications (office, email, web browser, etc.)
required by the user of the computer.
Activate Windows.
Restore user data.
1.14.1 Activation
The Windows OS uses an activation program that verifies whether the copy of
Windows is genuine or not. This program also checks to see if Windows has not
been used on more computers than the Microsoft Software License Terms
allow. You must activate Windows within a certain number days after
installation and you can do it over the Internet or by phone. Most systems are
configured to automatically activate Windows when connected to the Internet
and these systems begin trying to activate Windows three days after you log
on for the first time. The activation program pairs a product key with details on
the computer hardware.
Note
All of the information you can capture is collectively called the user state.
Note
You typically will not have to migrate user data and settings for an
upgrade. This information will be migrated to the newer version as
part of the upgrade process. However, it is always a best practice to
back up user data before making any major system changes.
These programs move files and folders to locations that Windows understands.
For example, in Windows XP, the user profiles are stored in C:\Documents and
Settings by default. In Windows 7, the migration tool moves them from
Windows XP to the C:\Users folder.
1.14.2.1 Windows Easy Transfer (WET)
If you need to transfer files and settings from one computer to another in a
home or small office environment, you can use Windows Easy Transfer to do
so. For example, you can transfer files and settings from a Windows XP
computer to Windows 7 computer or between two Windows 7 computers. You
can use this tool to transfer information in the following ways:
Easy Transfer cable plug the cable into the USB port of the old
computer and the new one and transfer the files. This is not a regular USB
cable.
Network you can transfer files between computers that are connected
over a network.
Windows Easy Transfer is included in Windows 7/8 and can be downloaded for
Windows XP and Windows Vista systems. Free versions can be downloaded
from Microsofts download website (www.microsoft.com/download). Just
search for Windows Easy Transfer for Windows XP or Windows Easy Transfer
for Windows Vista respectively.
Tip
In Windows 7, Click Start > All Programs > Accessories > System Tools
and choose Windows Easy Transfer. You must have administrative access to
run it, which you will be because the user account you created during the
installation is automatically made an administrator. Windows Easy Transfer
automatically selects files in the Documents, Music and Pictures folder, and
also allows you to choose additional files. Figure 1.24 shows some screenshots
of the program. If you click Advanced at the screen shown on the right, you
can select individual files and folders to migrate.
There are many options when using the scanstate and loadstate commands,
including the ability to choose which users to migrate and whether to store
data in uncompressed, compressed, or compressed and encrypted format.
Tip
The program will provide you with all the instructions on how to upgrade,
including whether to install the OS now or create media (DVD or USB) or install
later (the program will place an installation link on your desktop).
Alternatively, you can upgrade with a disc or USB. Place the disc into the
optical drive or plug the USB into the computer and click the setup program to
start the installation. Follow the instructions for there.
Here are the requirements for upgrading to Windows 8.1:
Windows 8 can be updated to Windows 8.1 from the Windows Store or from
media. Upgrading to a different edition of Windows 8.1 is supported from
media only. You can upgrade Windows 8 to Windows 8.1 and keep Windows
settings, personal files, and applications.
Volume licence versions of Windows 8, Windows 8 Enterprise, and Windows
8 Enterprise Evaluation versions cannot be upgraded from the Windows
Store. You must use media to upgrade these editions.
You must upgrade to Windows RT 8.1 from Windows RT by using the
Windows Store. Media is not available for Windows RT 8.1 upgrades.
To upgrade Windows 7 to Windows 8, you can buy and download Windows
8.1 using Windows 8.1 Upgrade Assistant and install Windows 8.1 now,
later or using media with an ISO file or a USB flash drive.
To upgrade to Windows 8.1 from Windows XP/Vista, you will need to install
it from a Windows 8.1 installation disc and perform a clean installation. This
means you will not be able to keep any files, settings, or programs when
you upgrade.
You can find more details about upgrade paths and if files and settings can be
kept by visiting the following website:
technet.microsoft.com/en-us/library/jj203353.aspx
Tip
Recycle Bin
Start
button
Gadgets
Notification area
Frequently-used
pinned programs
Icons
An icon is a small image representing a program, file, folder or other item.
Double-clicking on an icon opens its associated program. Figure 2.2 shows
some examples of icons that can be placed on the desktop.
Recycle Bin
This icon represents a temporary storage area for items such as files and
folders that have been deleted. When you delete a file or folder, it goes to the
recycle bin for a period of time so that you can recover it within the time it is
kept. Figure 2.3 shows two Recycle Bin icons. The icon on the left indicates the
recycle bin is empty and the icon on the right shows that it has deleted files in
it.
Figure 2.3 Recycle Bin icon when empty (left) and full (right)
Desktop shortcuts
A shortcut is an icon placed on the desktop that links to a file or program
stored in another location, rather than the item itself. Double-clicking the icon
opens the item. Deleting the shortcut only deletes the shortcut icon, not the
original item. You can identify a shortcut by the arrow placed on its icon, as
shown in Figure 2.4.
The Start
button opens the Start menu. See Figure 2.5. It is
called a menu because it provides a list of choices. Clicking the Start button
once opens the Start menu (otherwise you can press the Windows or start
key to open the menu).
The Running programs area in the middle of the taskbar shows one or
more programs that are currently running. In Figure 2.7, two programs are
open (Calculator and Minesweeper) and each has its own button on the
taskbar. Because the Minesweeper program is in front of any other open
window, it is the active window and is ready for you to interact with it. You
can switch between them by clicking the programs button on the taskbar.
The Notification Area on the far right side of the taskbar contains
commonly-used system icons for the date and time, volume control,
battery state (on laptops), network connections, removable device states
and other items. See Figure 2.8. These icons show programs running in the
background. The notification area is also called the system tray or
systray. Pointing to the Show Desktop toggle icon makes all windows
transparent Aero Peek while clicking it minimises or restores all open
windows.
Notification Area
Show Desktop toggle icon
Figure 2.8 Notification Area
Sometimes an icon will display a small pop-up window (called a
notification) to notify you, for instance, that Windows has completed the
installation of a driver for a USB device as shown in Figure 2.9, or when is it
safe for you to remove a USB device.
Several gadgets are available by default, but many more are available online.
By clicking the link Get more gadgets online (shown at the bottom of the
Gadgets window in Figure 2.12), you will be able to browse through the
available gadgets on Microsofts website.
Note
2.1.3 Aero
What you have been seeing with Windows 7 is called the Aero desktop. Aero
adds a number of features to the desktop, such as adding transparency (seethrough glass effect) to window title bars and borders, lighting up window
buttons when you point to them and providing scalable icons and previews of
window and file contents. Windows Aero in Windows 7 also supports features
such as Peek, Shake and Snap.
Peek view the desktop and make open windows transparent by hovering
your mouse over the Show desktop button on far right hand side of the
notification area.
Shake click and hold the title bar of a window and shake the mouse. All
other windows will be minimised. If you shake the open window again, all
the other windows will be restored
Snap click and hold the title bar, and drag the window to the right, left or
top of your screen to resize it.
Another Aero feature called Flip 3D arranges open windows so that you can
quickly flip through 3D previews of them, as shown in Figure 2.13. To use Flip
3D, press the <Windows key> followed by the <Tab> key to start it. While
holding the <Windows> key, keep pressing <Tab> to cycle through the
windows and then when you have found the window you want, release both
keys to make that window the active window. Try <Windows> + <Shift> +
<Tab> keys to scroll through your windows in the opposite direction.
Minimize
Navigation buttons
Menu bar
Maximize
Close
Resize
Scroll bar
Scroll
bar
button
Command bar
Minimize: click this button to minimise the window to the taskbar. Click the
icon on the taskbar to return the window to its previous size.
Maximize: click this button to resize the window to full screen.
Close: click the X button to close the application. If you did not save your
work, many applications will ask you to save it to a location before closing.
Menu bar: most windows have drop-down menus that are presented when
you click on a drop-down arrow or a menu button. A drop down menu
provides a list of choices that you can access by simply selecting the menu
item.
Command bar: some applications have a dynamic command bar. Selecting
an item displays common commands associated with that item.
Navigation buttons: allow you to go backward or forward through
windows or folders.
Scroll bar: appears when there are additional items for a screen. Drag the
scroll bar or click within the empty space of the scroll bar to move it.
Scroll bar button: click the small arrow to move the scroll bar in small
increments.
Resize window: hover your mouse over the border or corner of a window
until you see an arrow, then click and hold the mouse button and move the
mouse to resize the window. Release the button when you are happy with
the window size.
Active window: you can open and work with multiple windows at the same
time. The top Calculator window is the active window and responds to your
commands while the bottom Windows Explorer window is open and running.
Choose the bottom window to activate it.
Technicians often work with dialog boxes. A dialog box is a window that
provides information or requests input. You usually open a dialog box from
within another window, such as an application window.
For example, Figure 2.15 shows the Computer Name/Domain Changes dialog
box, which has been opened from the System Properties window, and the DNS
Suffix and NetBIOS Computer Name dialog box, which was opened by clicking
the More button in the Computer Name/Domain Changes dialog box. System
Properties (shown in the background in Figure 2.15) runs as a process and
both of these dialog boxes is a part of that overall process.
Tab
Checkbox
Textbox
Radio button
OK and
Cancel
Tab: Each tab holds a group of related options. Click once on the tab to
make that particular major section active.
Checkbox: clicking inside a checkbox option places a check mark or tick
inside the checkbox and turns on that setting.
Textbox: this is an area where you can enter information.
Radio button: clicking on this enables the setting and places a solid dot in
the circle.
OK and Cancel: clicking the OK button applies the changes made within
the dialog box. Clicking the Cancel button cancels any changes made to
the dialog box. Clicking the Apply button applies changes immediately and
keeps the dialog box open for further changes.
Tip
When a dialog box is closed with the Close (X) button, changes in
the dialog box are not saved or applied. Click OK or Apply to save
changes.
Standard user this account enables users to do regular work and install
software and configure settings that do not affect other users or the
security of the computer.
Administrator this account has complete control over the computer and
can perform administrative tasks such as configure certain system settings
or install drivers.
Since Windows XP does not have UAC, malware can sometimes make changes
without the user knowing about it. UAC in Windows Vista/7 blocks this
malware. Anytime a user is logged on with an administrator account, the user
is assigned two security access tokens (a standard user and administrator
token). These are directly related to the standard user and administrator
account types. Most of the time, only the standard user access token is used,
and the user can do anything that a standard user can do. If the user tries to
do something that requires administrative privileges, UAC switches into Admin
Approval Mode, dims the screen by default and asks the user to approve the
action by displaying a UAC permission dialog box similar to that shown in
Figure 2.16.
Simply click on Show Details to get the location of the program that caused
the UAC dialog box to appear, or click Hide Details to hide this information.
Figure 2.17 shows another kind of UAC dialog box. An important piece of
information in this kind of UAC dialog box is the Publisher, which identifies who
created the application that is being started. If Windows can verify the
publisher, the publisher appears as Verified Publisher. However, if Windows
cannot verify the publisher, the publisher appears as Unknown, as shown in
Figure 2.17.
By default, UAC dims the desktop to prevent third-party software from tricking
you by displaying a fake authorisation dialog box, and disables all other
interaction with the system. The darkened desktop is called the secure
desktop and it prevents any other program from running. If you do not have
administrator permissions with the current account, you will be asked to enter
the username and password or only a password for an administrator account.
If you are an administrator, you must either click Yes or Continue to approve
the action or click No to block it.
Note
There are other UAC dialog boxes that notify you when a program
that is not part of Windows needs your permission to start, shown
with the
icon, and a dialog box with the blocked icon
to notify
you when a program has been blocked by a security policy.
You can find the Disable and Enable UAC on the Tools tab of msconfig and you
will need to restart the computer to apply the changes.
You can change the settings for UAC in the Control Panel on Windows 7 with
the following steps:
1. Click Start > Control Panel. If necessary, change View by from Category
to Large Icons.
2. Select Action Center.
3. Select Change User Account Control Settings.
Note
There are multiple ways of finding settings in the Control Panel. You
can even use the Search box in the Start menu to access many
settings. For example, type user account control in the Search box
and select Change User Account Control Settings option from the
list that appears.
The User Account Control Settings dialog box will appear, as shown in Figure
2.18.
Always Notify: the most secure setting that will notify you before
changes that require administrator permissions are going to be made. It
uses secure desktop.
Notify Me Only When Programs Try to Make Changes To My
Computer: you will be notified before programs make changes, but not
if you try to make changes to Windows settings that require
administrator permissions. It uses secure desktop.
Note
Windows Vista does not have all these UAC notification options.
Instead, you can only turn UAC on or off and this can be done in the
User Accounts applet in Control Panel.
5. You can accept the setting by clicking OK, or you can cancel by clicking
Cancel.
Note
2.4.1 Right-click
Every item on the Windows desktop is called an object. To open an object,
double-click on it, and to change something about the object, right-click on it.
Right-clicking on an object displays a shortcut or context menu and it works on
almost everything in Windows. Figure 2.19 shows the result of right-clicking on
Computer in the Start menu.
2.4.4 MMC
The Microsoft Management Console (MMC) is a blank console that holds
individual configuration tools called snap-ins. Some tools come pre-configured
in an MMC and you can add snap-ins to an MMC to group all your favourite
tools into one console. You can add as many snap-ins to the console as you
want and there are many to choose from. Many companies sell third-party
tools as MMC snap-ins.
You can use the following steps on a Windows 7 computer to create an MMC
for your own use:
1. Click Start and type mmc in the Search box.
2. Select MMC from the list that appears. If prompted by User Account
Control, click Yes to continue. A blank MMC console will appear, as shown
on the left in Figure 2.23.
Note
The same steps listed here apply to Windows Vista. Many of the steps
done on Windows 7 throughout this module apply to Windows Vista as
well. To start an MMC in Windows XP, select Start > Run to open the
run dialog box and type mmc and press <Enter> to open a blank
MMC.
Figure 2.23 Blank MMC console (left) and Add or Remove Snap-ins
dialog box (right)
5. Select Device Manager in the list and click the Add button to open a
Device Manager dialog box that asks you to choose the local or a remote
computer for the snap-in to work with.
Note
You can add tools from other computers in your network by selecting
Another Computer and entering that computers name or IP
address. However, you will not be able to use snap-ins from another
computer it if you do not have administrative privileges on that
remote computer. You will be able determine the difference between
the local and remote computer by the designations local and remote
(or the remote computers name or IP address) shown next to the
name of the snap-in.
6. Choose Local computer for this exercise and click the Finish button. Click
OK to close the Add or Remove Snap-ins dialog box.
7. You should see Device Manager on local computer listed in the left page
of the console as shown in Figure 2.24. Click it. A list of devices by type
should be listed in the middle pane. You can expand each device type as
you wish.
Snap-in name
Device Manager
Event Viewer
gpedit.msc
perfmon.msc
Performance
Description
Use to manage devices and drivers.
Use to view logs. System, security
and application events are recorded
in logs.
View and manipulate local Group
Policy settings.
Use to monitor system performance.
Command
services.msc
secpol.msc
taskchd.msc
wf.msc
Snap-in name
Services
Description
View, start, stop and manipulate
services.
Local Security Policy
View
and
manipulate
security
settings for the local system.
Task Scheduler
Use to schedule tasks.
Advanced
Windows Use to manipulate advanced settings
Firewall
for the firewall.
Description
Use to administer distributed server applications or
reconfigure security permissions for existing services.
Use various tools to configure users and groups, disks,
services, devices, monitor events, manage system
performance and so on.
Control data connections to local or remote databases (or
data sources).
View information about system, security and application
events recorded in logs.
Set up connections to network-attached storage devices.
View and edit many security settings on the local computer
only, to lock down the computer. Computers joined to a
domain get their security settings from the domain security
policies.
View and track system performance.
Monitor and manage shared and non-shared printers and
print drivers.
Manage software and hardware services running in the
background.
Access boot configuration, service startup, startup
applications and system tools. Useful for identifying
problems that can prevent Windows from starting correctly.
Schedule programs or tasks to run automatically or when
system events occur.
Configure more advanced Windows firewall settings.
Use to run tests on the computers RAM when you suspect
memory problems.
Use Windows PowerShell, a task automation framework
consisting of a command line shell and scripting language.
This console can be used to package PowerShell scripts and
functions for distribution and reuse.
All files are grouped into folders (also called directories). A folder inside
another folder is called a subfolder and a directory inside another directory is
called a subdirectory. (The terms directory and folder describe the same
thing. Folder is a more modern term, introduced when the GUI desktop
metaphor became widespread.) Any folder can have multiple subfolders.
Examples of the types of folder icons likely to be seen are shown below:
Here are a few items to remember about folder names and filenames:
Folders and files can have spaces in their names, but are limited to a
maximum of 255 characters (including spaces).
The only characters you cannot use for file and folder names are \ / ? : * "
><|
Files do not have to have extensions, but Windows will not know the file
type without an extension.
Folder names can have extensions but they are not commonly used.
Note
Two or more files with the same name can exist in different folders,
but two files in the same folder cannot have the same name. In the
same way, no two subfolders under the same folder can have the
same name, but two subfolders under different folders can have the
same name.
The exact location of a file is called its path. The path for the
exam.txt file is C:\Diploma\Aplus\.
Use a \ to separate the items in a path. The \ divides the file name from the
path to it and one directory name from another directory name in a path.
Use a \ as required as part of the volume name, for example C:\ in
C:\path\file.
Do not assume case sensitivity. For example, consider the names DIPLOMA,
Diploma, and diploma to be the same, even though POSIX-compliant file
systems may consider them as different. NTFS supports POSIX for case
sensitivity but this is not the default behaviour.
Drive letters are not case-sensitive. For example, D:\ and d:\ refer to the
same volume.
Program
files
Temporary
files
Fonts
Offline Files
Default location
C:\
Description
Also called the system or active
partition, it contains the files needed to
boot the computer.
C:\Windows
Also called system root or boot
partition, this is the default location
where the Windows OS files are stored.
C:\Windows\System32 Contains critical system files. All
programs and drivers that make
Windows run are stored here. 64-bit
Windows versions also store critical
files in C:\Windows\SysWOW64.
C:\Program Files
Contains the files for all installed
applications.
C:\Windows\Temp
Stores any temporary files created by
Windows or any application running on
Windows. Files are written to this
location on a non-stop basis and
Windows deletes the files automatically
as needed.
C:\Windows\Fonts
Contains all installed fonts.
C:\Windows\CSC
Also called Client Side Cache, it
temporarily stores offline network files
and web pages that are viewed offline.
Windows automatically deletes this
folder when it needs the space.
Default location
C:\Documents and Settings\username
C:\Users\username
C:\Users\username
Figure 2.30 shows Windows Explorer opened to the profile of a user named
Sibulele on a Windows 7 system. The path is C:\Users\sibulele. You can view
these folders within Windows Explorer, but most settings are changed through
the OS. For example, when a user creates a Favorite in Internet Explorer, the
information is stored in a folder in the profile but the user makes the change
only in Internet Explorer.
Profiles enable multiple users to use the same computer with their
own settings and preferences, but the real benefit of user profiles is
on a network, where the profile for each user can be stored on a
network server and accessed whenever the user logs on to any
Windows computer on the network. User-specific settings can follow
the user from system to system.
There are many tools available at the command prompt that can be used to
configure, test and troubleshoot a system (or networked systems).
On Windows XP/Vista/7, click Start > All Programs > Accessories and
select Command Prompt.
On Windows XP, click Start > Run, type in cmd and press <Enter>.
On Windows Vista/Windows 7, type command in the Search box of the Start
menu and select Command Prompt.
Using cmd will start the cmd.exe application directly and will display
C:\Windows\system32\cmd.exe in the windows title bar.
Using command creates a shortcut in the logged on user user profile that
points to the C:\Windows\system32\cmd.exe application. The same
cmd.exe application runs, but the shortcut creates a slightly different
environment, with Command Prompt shown in the windows title bar.
If you click Start, type in command, right-click Command Prompt and
choose Properties, you will see all the properties of the shortcut.
In contrast, if you click Start, type in cmd, right-click cmd and choose
Properties, you will see the properties of the cmd.exe application. There
are fewer property options for the application than there are for the
shortcut.
C:\Windows\system32
C:\Windows
C:\Windows\System32\Wbem
C:\Windows\System32\WindowsPowerShell\v1.0\
Internal command: this is one of the many commands built into the
cmd.exe program. They do not require an external application to run. For
example, the copy command is a built-in command.
External command: this is not built into the cmd.exe program, but instead
is executed from an external file. For example, the ipconfig command runs
the ipconfig.exe program located in the C:\Windows\system32 folder. These
files are normally found in this directory.
Executable program: this is a file with one of these extensions: .com,
.exe, .cmd, .msc, .js, .jse, .vbs, .vbe, .wsf and .wsh. For example,
dxdiag.exe is the program name for the DirectX Diagnostic Tool. If you
enter dxdiag at the prompt, it will start the DirectX tool.
Batch file: this file contains a group of one or more commands and is
saved with the .bat or .cmd file extension. When the batch file is executed,
all the commands are executed.
Note
Exceptionally long paths that cause the file to exceed the 260character limit sometimes cause problems, particularly with the error
that appears when copying a file with a very long file name to a
location that has a longer path than its current location.
The .exe (short for executable) and .com (short for command) file extensions
are used for program files. Anything that is not a program is usually some kind
of data that supports a program and the extension for the data file will indicate
which program uses that file. For example, Microsoft Word uses .docx and
Powerpoint uses .pptx. In contrast, graphics file extensions often reflect the
graphics standard used to render the image, such as .jpg for the JPEG (Joint
Photographic Experts Group) format.
The assoc command enables you to view known extension associations at the
command prompt. Figure 2.35 shows the output from executing the assoc
command.
Note
Changing the extension of a data file will not affect the files contents,
but without the correct extension, Windows will not know which
program uses it and will ask you to browse for a program to open the
unknown file with.
ping
PING
PinG
Ping is used to test network connectivity. However, there are commands that
must be entered using a specific uppercase or lowercase letter, but they are
rare.
Note
Where the case matters for any commands in this study guide, it will
be stated. Similarly, documentation will usually inform you if the case
matters.
Table 2.5 shows the command line syntax in its most basic form.
Table 2.5 Command line syntax
Command Argument
Do this
To this (if any)
/Switch
Like this
For example, Table 2.6 breaks down the command format H: /fs:ntfs and
then explains what it means.
Table 2.6 Syntax example: format H: /fs:ntfs
Command Argument
Format
H:
Format
this hard
drive
/Switch
/fs:ntfs
with the NTFS file system
As another example, Table 2.7 breaks down the dir /p command and then
explains what it means.
Table 2.7 Syntax example: dir /p
Command Argument
dir
Show
the contents of this directory
(Nothing here means perform this
action in the current directory.)
/Switch
/p
pausing one screen at a
time
The argument field in Table 2.7 is empty because the command does not have
an argument, only a switch. This illustrates that many commands are run
without arguments. Yet another example is shown in Table 2.8, which breaks
down copy E: C:\Aplus.
Table 2.8 Syntax example: copy E: C:\Aplus
Command Argument
copy
E: C:\Aplus
Copy
everything on the E: drive to the Aplus
folder on the hard drive. (A space is
placed in between the two arguments.
The backslash means down a level.)
/Switch
(Nothing here means
that nothing is
modified.)
Tip
Many commands also support the use of the dash (-) as a switch,
instead of the slash (/). That is, you can use ipconfig -all and it will
work the same as ipconfig /all.
If you want to find out the syntax and switches used by a particular command,
the best thing to do is ask the system for help.
2.7.8.3 Getting help
The command prompt has a built-in help system. You can get help for almost
all commands by entering the command name with the help switch (/?)
before pressing <Enter>. This will list the syntax and switches for the
command. You can also get help for some commands by using the help
command. You can type in help followed by the command name and press
<Enter>. The following two commands show how to get help on the format
command:
format /?
help format
You can use these two commands for most commands by just substituting
format with the name of the command. However, the /? switch is supported by
more commands. Figure 2.37 shows an example of how to get help for the
format command.
It means that your computer understands the command name, but does not
recognise the other parts of the command. It might be that you are not using
the correct switch, or you are missing a space or you are not using quotes
correctly.
Tip
When you see an error, double check the spelling. Often you can find
the problem by looking at the command one character at a time.
Tip
It is good to get into the habit of using quotes, even though they are
not always needed.
Usage
List all files in the current directory.
List all files that start with the letter b.
List all files that end with letter t.
List all files that have a .txt extension
List all files that that start with win and end with xe, with
any number of characters in between (even zero).
Lists all files without an extension.
The ? wildcard can be used for a single character only. For example, imagine
that you have several study guides with different versions, such as
StudyV1.doc, StudyV2.doc and so on, all in a specific directory. You could run
the following command to list all of them:
dir studyv?.doc
As another example:
dir ??52???.txt
The ? symbol in the command will return all the files that have any two
characters before the 5 and any three characters after the 2 in the results.
2.7.8.7 Recalling commands and moving around
The command prompt history feature keeps track of all the commands you
have entered in the current session. This is useful when you need to re-enter a
command. Table 2.10 shows the keys you can use to recall commands from
history and their usage.
Usage
Recalls the previous command in the history list.
Recalls the next command in the history list.
Recalls the first command used in the history list.
Recalls the last command in the history list.
Clears the current command.
There are a few other keys that you can use to move the cursor around the
command prompt after you have retrieved a command. Table 2.11 shows
some of these keys and their usage.
Table 2.11 Keys to move the cursor at the command line
Key
Left arrow
Right arrow
Home
End
Tip
Usage
Moves the
Moves the
Moves the
Moves the
cursor
cursor
cursor
cursor
to
to
to
to
the
the
the
the
Using the recall and movement keys is useful for saving time,
especially with long commands. You can also use the <Tab> key to
autocomplete file names and paths. For example, you could start
entering the first few letters of the file path C:\Win and press the
<Tab> key and the system will complete the path automatically to
C:\Windows.
4. Click OK.
5. At the prompt, type notepad and press <Enter>. This will open the
Notepad text editor.
Notepad is a plain-text editor that you can use to create batch files and scripts,
view text-based reports and edit HTML files. You can also access it by clicking
Start > All Programs > Accessories and selecting Notepad or by typing
notepad in the Search box on the Start menu and selecting it from the results
list.
6. Within Notepad, type ipconfig but do not press the <Enter> key.
7. Press <Ctrl> + <A> to select the ipconfig text and press <Ctrl> + <C>
to copy it to the clipboard.
8. Select the Command Prompt window.
9. Right-click inside the Command Prompt window. The text you copied from
Notepad is automatically pasted into the window.
10. Press <Enter> to run the command.
11. Use the mouse to select all the text displayed in the Command Prompt
window. To do this, click in the upper left corner of the window and drag
the mouse to the bottom right. Release the mouse when you have
selected all the text.
12. Press <Enter>. You can also right-click the mouse. Both actions copy the
text to the Clipboard.
13. Select the Notepad window. Press <Ctrl> + <V> to paste the text into
Notepad. At this point, you can save Notepad. This illustrates that you
could use this method to save the IP configuration of a system in a file if
you wanted to.
A+ Preparation | V1.0 Jan 2014
14. Go back into Properties and deselect QuickEdit mode. Save your
changes.
Note
Copying and pasting does not work with <Ctrl> + <C> or <Ctrl> +
<V>, but as you can see, it is possible to copy and paste and do this
quickly using QuickEdit mode.
Not only can you redirect output to a file, but you can also redirect
input from a file to the command prompt, though this is less common.
This is useful when you want to use a file as input to a command that
is expecting text or record data and can be done by using the less
than (<) symbol and the name of the file.
If the environment variable represents a path, such as the user profile path,
you might need to enclose it with quotes at the command prompt like this:
dir "%homepath%"
Variables are useful when running commands and when creating batch files. If
a variable is entered incorrectly, the system will output what has been entered
with the percent symbols. In such a case, double check your spelling. Table
2.12 shows some common variable names along with what they represent.
Table 2.12 Command variable names
Variable
%systemdrive%
%systemroot%
%windir%
%homepath%
%path%
%username%
%userdomain%
%userprofile%
Representation
System drive (such as C:\)
Location of Windows (such as C:\Windows)
Path to the users profile (such as C:\Users\username in
Windows Vista/7).
List of paths known to the system
Username for logged on user (such as sibulele)
Name of domain if the computer is joined to a domain, or
name of computer if it is not joined to a domain.
Location of the profile of the logged on user
Note
You can view, create and modify variables by using the set command
at the command prompt.
In Windows XP, you can use EDIT.COM at the command prompt or the GUI
Notepad editor. With EDIT.com, you can create and modify files. To create
a new file, use the edit or edit filename command. To edit an existing
file, use edit filename, for example edit c:\boot.ini. To modify a file,
you can use mouse clicks to choose menu options, the <Alt> key to
activate the menus and basic keyboard shortcuts such as <Ctrl> + <V> to
paste.
In Windows Vista/7, you can use the GUI Notepad editor to modify a file.
For example, if you enable boot logging and run notepad
c:\Windows\ntbtlog.txt at the command prompt, this will open the
ntbtlog.txt file. If you are not the administrator of the computer, then run
Notepad as the administrator.
Tip
The interpreter executes each line in turn, starting with the first line. The @
symbol at the start of the line prevents the prompt from displaying that
command and ECHO off turns off the prompt permanently, or until it is turned
on again. A batch file can also take arguments such as file names as a variable
in the form of %1.
The example batch file must be saved with the .bat (or .cmd) extension in
plain text format, typically created by using a text editor such as Notepad so
that it can be executed. It can be executed from within Windows Explorer by
double-clicking on the file or within the Command Prompt (by entering the full
name of the file and pressing <Enter>). The output of the command is:
Hello World!
Press any key to continue
Note
You can use the following steps to open Notepad and create a batch file.
1. Start the command prompt.
2. At the prompt, type notepad and press <Enter>.
3. Within Notepad, type ipconfig /all > c:\Scripts\MyIPConfig.txt.
Note
Description
Opens DirectX Diagnostic Tool. This tool can be used to
troubleshoot issues with games, movies and other multimedia
applications that use DirectX.
Opens Windows Explorer. This tool can be used to view and
manage files.
Opens an empty Microsoft Management Console. You can add
tools as snap-ins into an MMC.
Opens System Configuration. Use this tool to configure the
system, services and startup applications.
Starts System Information. Use this tool to view hardware and
software components, including the BIOS version, amount of
RAM installed and processor type and speed.
Opens Remote Desktop connection. Use this tool to connect to
another system.
Command
regedit
regedt32
Description
Opens the Registry Editor. Use this tool to edit the registry
database, which contains hardware, software, user and
system configuration information.
Opens the Services console. Use this tool to stop, start,
enable and disable services.
Opens the File Signature Verification tool. Use this tool to
identify a digitally signed file and verify its integrity.
services.msc
sigverif
Table 2.14 lists some other useful commands that you can launch from the
command prompt.
Table 2.14 Other Windows OS commands
Command
date
time
hostname
set
ver
winver
Description
Use to view and set the date.
Use to view and set the date.
Use to view the name of the computer.
Use to set options for a device or program.
Shows OS version information.
Opens the about Windows page, showing version
information.
Many of the commands can also be launched from the Search box and Run
dialog box. Some commands such as telnet or nslookup (the dns query and
troubleshooting tool) work in interactive mode. This means that using the
command starts the program (such as the telnet program) with its own prompt
and from that point you can use only commands that are supported by that
program until you exit the program.
Switch user: switch to another user account. Another user who has a user
account on the system can log in with their username and password and
access their own desktop. After the other user is logged off, you can log in
again to find all your programs and files open and exactly as you left them.
Log off: closes all open programs and files (giving you the opportunity to
save any unsaved files first) and services started under the current user
account without turning off the system. It then displays a screen so that
the next user can log in.
Lock: locks the system with a password when you are away from it. This
will display the Logon screen that will ask the user to enter their account
password to log in.
Restart: closes all open programs and services before rebooting the
system without turning it off (a soft reset). You might use this when
installing new software or after updating Windows or to solve problems
when your system is running slowly or has locked up.
Standby/sleep: saves all your running programs and open windows in
memory and puts the system into a low power state, which can then be
started up quickly again to resume working. You can send a laptop to Sleep
just by closing the lid.
Hibernate: saves all your running programs and open windows to the hard
drive before turning off the laptop. Hibernate uses the least amount of
power but the laptop takes longer to start up.
Shutdown: closes all open programs, offers you the opportunity to save
any unsaved files, stops services, exits Windows and switches off the
system.
Cold and warm boot: a hard or cold boot involves using the power button to turn
the system on while a soft or warm boot involves using the operating system to
reboot the system.
Note
You can change the function of the Windows Power button from its
default of Shut Down to another function in the Taskbar and Menu
Properties dialog box. After choosing a new function for the Windows
power button, Windows displays the new functions name on the
Power button and adds the Shut down command to the list that
appears when you click the () button on the Start menu.
You can also select these commands and do more by pressing <Ctrl> +
<Alt> + <Del>, as shown in Figure 2.42.
A+ Preparation | V1.0 Jan 2014
Description
Shuts down the system.
Use quickly to abort a shutdown in progress.
Use to specify a delay in seconds (nn) before the
shutdown starts. Default is 30 seconds.
Saves running programs and open windows to the hard
drive before turning off the system.
Logs off the current user.
Restarts the system.
HKEY_LOCAL_MACHINE
(HKLM)
HKEY_USERS (HKU)
HKEY_CURRENT_CONFIG
(HKCC )
Description
Stores information used by different software
applications: filename extensions, file types,
shortcut menus and so on.
Stores settings that apply only to the user who
is currently logged on, which contains the boot
NTUSER.DAT file stored in the user profile.
Examples include environment variables,
desktop settings, network connections, printers
and application preferences. NTUSER.DAT is
locked open for writing whenever the user is
logged on.
Stores settings that apply to the local computer.
For example, hardware and OS data such as
bus type, memory, device drivers, security
settings and start up control data.
Stores all personalised information for all users
(actively loaded account holders or user
profiles) on the computer.
When the computer starts, it identifies and
stores the current configuration here. You will
rarely be asked to edit this hive.
If you expand one of the hives by clicking its arrow, you will see a long list of
inner folders called keys, which might contain files called subkeys and data
items called value entries that contain the actual settings that the registry
tracks and that you can edit (or you can create new entries). A value entry has
three parts: a name, a data type and the value itself. The data type usually
contains a number, binary value or text. The main data types include:
Note
There are other data types, but the ones listed above are used for the
majority of all value entries. A number of entries appear in more than
one place, as live mirrors of each other, so if you edit one entry, you
make a change in both mirrored entries.
You can expand the hive to view its subkeys and value entries. For example,
Figure 2.43 shows the registry editor opened to a specific subkey called
System. The five hives are in the left pane with the HKEY_LOCAL_MACHINE
hive expanded. You can double-click any value entry in the right pane to open
it, as shown with the SystemBIOSDate value and its data in the figure.
If you want to search for a specific key, value or data in the registry, you can
use the Find feature available from the Edit drop-down menu as shown in
Figure 2.44. First, select Computer at the top of the left pane as shown in
Figure 2.43 to search the entire registry, or select a specific hive or key. Next,
select Edit > Find (or press <Ctrl> + <F>), and enter the term you are
searching for.
1st RULE: Back up the registry before making changes and take your time
when making a change. You can back up any individual key or the entire
registry and restore it when needed.
2nd RULE: Do not make changes until you have a thorough understanding
of the entry you are trying to change or add.
You can use the following steps in Windows XP/Vista/7 to back up the registry:
1. Log on to the system by using an account with administrative privileges.
2. Start the registry editor by running the regedit or regedt32 command
from a command prompt or the Start >Search box.
3. Right-click Computer in the left pane and choose Export. (You can also
click the Export option from the File menu).
The Registry Hive Files format can be used to create a binary copy of a
portion of the registry. Restoring from a binary file however will remove
any additions or reverse any changes you made.
4. Browse to the location where you want to store the backup, and type in a
name for the backup. For example, you might choose to create a folder
named RegBackup on the C: drive and name the backup RegComputer.
Click Save.
5. You can also back up any portion of the registry. For example, right-click
HKEY_LOCAL_MACHINE and select Export.
6. Browse to the location where you want to store the backup, and type in a
name for the backup. For example, you might choose to name the backup
HKLM_Backup. Click Save.
Lastly, you can connect to remote computers to gain partial access to their
registries. To do this, select File > Connect Network Registry, then browse
for computers that are members of the same network your computer is a
member of, connect to them and edit their registries. Their computer should
appear in the left pane of your registry editor. Remember that you need to
have administrative privileges on the remote computer to do this.
The user account and user profile are not the same thing. The user
must authenticate before gaining access to their user account and the
OS then uses the user profile to deliver the settings (theme, screen
saver, etc.) that are configured for the user.
Local accounts are local to the computer and cannot be accessed from
other computers. Local accounts are stored in the Local Security Accounts
database called Security Accounts Manager (SAM). This database stores
an encrypted list of usernames and their associated passwords for users
who are allowed to access the system. SAM is stored in the registry as a
subkey of HKEY_LOCAL_MACHINE. If a user needs to access other
computers in a workgroup network, then that user will need to have a user
account on each computer.
Domain accounts are stored in Active Directory on a Windows Server
Domain Controller and managed by network administrators. The domain
controller maintains a security database, including domain user accounts
and domain groups, for the domain network. A domain account allows the
user to log onto the Active Directory network from any computer in the
domain.
Note
The Administrator account has full (or near full) rights and permissions to
do everything on the local system and is a member of the local
Administrators group by default. The account named Administrator is
either hidden (in Windows XP) or disabled (in Windows Vista/7) by default
for security reasons.
Tip
Keep the Guest account disabled unless it is needed, and then disable
it again after it is used.
You will see that accounts in Windows Vista/7 are identified as standard user
accounts and administrator accounts. Administrators have full privileges
and can change any settings. Standard user accounts (simply referred to as
users) are normal user accounts for users on a network. They can access their
own data and modify some system settings that do not apply to other users,
but they cannot perform tasks that require administrative privileges unless
they have an administrator username and password.
Note
Note
Due to how UAC is used in Windows Vista/7, the Power Users group is
not needed in these operating systems, but it is kept for backward
compatibility.
Users group contains regular users as members. They can run typical
applications but do not have privileges to make system changes and access
critical system files.
Guests group enables someone who does not have an account on the
system to log on by using a guest account.
Backup Operators group contains users that can back up and restore files.
Remote Desktop Users group contains users that are authorised to
connect to the system by using Remote Desktop.
Everyone group applies to any user who can log on to the system. You
cannot edit this group, but permissions can be assigned to this group.
Authenticated Users group contains all users that have a user account
and can log onto the computer.
Creator Owner group contains the user account that took ownership or
created the resource. Each resource has an owner but administrators and
users that have been allowed to do so are able to take ownership.
Interactive group contains all users who use the computers resources
locally.
Network group contains users who access the computers resources over a
network connection.
A users group membership is checked only when the user first logs
on. If you make a change to the users group membership, the user
needs to log off and then back on before the change applies to the
account.
Figure 3.6 shows the groups within Windows 7 with the Administrators group
property page opened. You can double-click any group to view its properties.
Using this property page, you can view, add or remove individual users from a
group.
Figure 3.6 Groups and group properties in Local Users and Groups
Clicking Create will create the new user and clicking Close will close the dialog
box.
Access to a partition is controlled by the BIOS before the system boots the OS
and then by the OS after it is started. Each partition or volume is assigned a
drive letter such as C:, D: and so on. The OS uses these letters as identifiers
when accessing data on the different volumes.
Note
In the past, the terms partition and volume were used for different
types of disks. According to Microsoft, these terms are used
interchangeably today. Technically, a partition is used to describe a
piece of space sectioned off on the drive. That partition is then
formatted with a file system and assigned a drive letter, at which
point the OS recognises it as a volume. Do not be surprised if you see
these terms mixed in different documentation, but it is important to
know that they refer to the same thing: a defined storage area of a
physical disk.
Figure 4.1 shows two examples of how you can partition a single hard disk
drive, but do take note that there are more ways of partitioning the disk than
this. On the left, a single disk is used to create a single volume. On the right,
the disk is divided into three volumes.
The most common situations that require partitioning are when you
are installing an OS on a new drive and when you are adding an
additional drive to an existing system.
Larger volumes: Windows systems support GPT disks as large as 256 TB.
However, GPT disks have a theoretical limit of 9.4 zettabytes (ZB) size.
More partitions: Windows systems support up to 128 primary GPT
partitions on a single disk. GPT disks do not need or use extended
partitions.
Redundancy and error detection: GPT disks use primary and backup
partition tables for redundancy and error detection fields for improved
partition data structure integrity.
Performance and reliability: Disk structure is optimised for performance
and reliability.
Only fixed disks can be configured as GPT disks. Removable disks, such as
flash drives, use the MBR partitioning scheme. Linux systems can use and boot
from a GPT disk. Windows systems from Windows XP to Windows 8 can use a
GPT disk. However, only 64-bit versions of Windows Vista/7 can boot to a GPT
disk and only if the computer has a UEFI-based motherboard.
You can use the Disk Management tool in Windows to determine whether your
computer is using an MBR or GPT disk. To do so, complete the following steps:
1. Click Start, right-click (My) Computer and select Manage.
2. Select Disk Management.
3. Right-click on Disk 0 in the lower half of the console and select Properties.
Select the Volumes tab and look at the Partition style as shown in Figure
4.2. The disk in Figure 4.2 is an MBR disk. Figure 4.2 also introduces you to
the Disk Management tool and its various disk-related views and options.
The system partition is the location where the files needed to boot the
computer are stored. It is usually the root of the C: drive. The system
partition is also known as the active partition.
The boot partition is the location where the OS files are stored. In
Windows, the boot partition is usually C:\Windows.
Basic disks are the most common type of storage used with Windows and
are the simplest to use. A basic disk contains partitions, such as primary
partitions and logical drives, and these are usually formatted with a file
system to become a volume for file storage.
Dynamic disks provide features that basic disks do not, such as the ability
to create more than 1000 volumes on a single disk, instead of the fourpartition limit of a basic MBR disk, and the ability to create volumes that
span multiple disks (spanned and striped volumes) and create fault-tolerant
volumes (mirrored and RAID-5 volumes), and even extend certain volumes.
Dynamic storage is a feature of NTFS-formatted disks.
Note
Also, Windows does not support all the different RAID configurations. Only
high-end editions of each version of Windows support dynamic disks. This
includes Windows XP Professional; Windows Vista Business, Ultimate and
Enterprise and Windows 7 Professional, Ultimate and Enterprise.
Common RAID configurations are described in Unit 4 of the A+ 801 section and
as a reminder; some of them are listed in Table 4.1.
Table 4.1 RAID level configuration and support
RAID
level
RAID 0
Striped
RAID 1
Mirrored
RAID-5
striping
with
parity
RAID-10
Note
Number
of Fault
disks
tolerance
At least two
No
Windows
support
dynamic disks
Yes
Only two
Yes
At least three
Yes
Only servers
At least four
Yes
No
for
The limitations in Table 4.1 apply only to dynamic disks. Any system
can support an external disk array. For example, you can install
external disk enclosures configured as RAID-0, RAID-1, RAID-5 or
RAID-10 and connect them with USB, FireWire, or eSATA. Windows
views the external array as a single physical disk that can be
partitioned as you wish.
Simple volumes work like primary partitions on a basic disk and occupy
space on a single physical disk. For example, if you have a physical disk
and you want to make half of it G: and the other half H:, you create two
volumes on the dynamic physical disk. You can increase the size of a
simple volume by extending it to the same disk or a different disk (creating
a spanned volume) and you can also decrease their size by shrinking the
simple volumes.
Spanned volumes use unallocated space on two or more physical disks to
create what appears to the OS as a single volume. For example, if you have
a G: volume used for data but it is running out of space, you can add
another physical disk and span the G: volume to the new disk. However, if
any disk in the spanned volume fails, the entire volume is lost. You can
extend or shrink a spanned volume. A spanned arrangement is called JBOD
(Just a Bunch Of Disks).
Striped volumes are RAID 0 volumes. You can use unallocated space on
two or more physical disks of the same size and stripe them. Once striped,
they appear to the OS as a single volume. However, because data is split
and placed on different physical disks, if any disk fails, all data in the entire
volume is lost.
4.2.1 Clusters
You learnt in the A+ 801 section that a hard drive has multiple platters and
each platter is divided into tracks, sectors and clusters as shown in Figure 4.3.
As a reminder:
A track is a single circle around the platter. A drive will have many more
tracks than the platter shown in Figure 4.3.
A sector is the smallest unit of storage and is typically between 512 and 2
KB in size. Just as a pie is cut into slices, a platter is logically divided into
separate slices and a single piece of a track within a slice is a sector.
A cluster is the smallest unit of disk space for storing a file and is made up
of one or more sectors. Clusters are also known as allocation units or file
allocation units and each cluster is identified with a unique number.
4.2.2 Fragmentation
It is best for a file to be stored in contiguous clusters so that the hard drive can
start reading in one cluster and continue reading until the entire file has been
retrieved from each adjacent cluster. However, as a hard drive fills up, there is
not always enough space to store a file in contiguous clusters and instead the
file system has to break up or fragment the file into pieces and store those
pieces in different areas on the platter. This means that if you have a 20 MB
file, the system might have to store 10 MB in one area, 6 MB in another area
and 4 MB in another area. When the file is read, the OS has to retrieve each
piece and put the file back together again.
It is common for some fragmentation to occur, but when a disk is used more
over time, a lot of fragmentation can occur. Instead of a file broken up into
three pieces, for example, it could be broken up into twelve pieces, and the
system would then have to work much harder to find and retrieve the pieces
and put them back together again.
The symptoms of a fragmented hard drive include:
Disk thrashing: the hard drives LED constantly blinks, indicating lots of
activity. Also, you will hear the drive working as the read/write heads
constantly move around the disk to retrieve the different file pieces.
Slow performance: fragmentation slows down the system because it has
to spend extra time finding and opening each piece of a file. If you suspect
a volume is highly fragmented, check and defragment it. Defragmenting
improves performance by bringing all those pieces together, making finding
and opening each file faster. You can defragment a volume using the
Windows Disk Defragmenter GUI tool or the defrag command line tool.
Note
You can format disks as FAT, FAT32 or NTFS from Windows systems.
However, you can format disks as FAT only if they are smaller than 4
GB. If the disk size is larger than 4 GB but less than 32 GB, you can
select only FAT32 or NTFS. If the disk size is larger than 32 GB, you
can select only NTFS. Although Windows systems cannot create
FAT32 partition size large than 32 GB, if the partition already exists,
they can use it.
Windows Vista with SP1 and Windows 7 systems also support exFAT (or
FAT64), but this format is designed to enable mobile storage media to be used
on mobile systems and is not widely supported on non-Windows desktop
systems. exFAT supports volume sizes up to 128 petabytes (PB) and file sizes
up to 16 exabytes (EB). If you are formatting removable hard drive or flash
media larger than 32 GB, you will see exFAT as a format option (as shown in
Figure 4.4). exFAT is typically only used for drives smaller than 1 TB to achieve
better performance.
Figure 4.4 shows the Computer window on the left displaying various drives.
You can use this window to format drives. Right-click on the drive you want to
format, select Format, and the Format dialog box will appear (as shown on the
far right).
Larger volumes and files: supports much larger file and volume sizes
than NTFS.
Resiliency: verifies and auto-corrects corrupted data, making it resilient to
disk corruption.
Integrity: stores data so that it is protected from many common errors
that cause data loss. It provides protection for file system metadata and
user data on a per-volume, per-directory or per-file basis. If corruption
occurs, ReFS can detect and when configured with storage spaces,
automatically correct the corruption.
Storage spaces: ensures the protection of data in the storage space.
Similar to RAID, storage spaces enable you to connect multiple physical
drives and use them all as one large virtual storage space (a storage pool).
Quick recovery: in the event of a system error, ReFS is designed to
recover from that error quickly, with no loss of user data.
Figure 4.6 shows the Disk Management console within Windows 7. The three
numbered areas in the figure are described below:
1. This area lists all volumes and provides information about each volume,
such as the type of disk, the file system used, the health status, how big
each one is and how much free space each one has.
2. Disk 0 is a basic disk and this shows that it has a system reserved partition,
a C: volume, and unallocated space. You can create new partitions on
unallocated space.
3. Disk 1 is a dynamic disk and it has one volume labelled as E: and
unallocated space. You can create new volumes on unallocated space.
Note
A boot loader is the program that calls the OS into RAM and loads
the OS.
Note
Change drive letters: if you want a drive to use a specific drive letter that
is not in use, you can right-click on the drive and choose Change drive
letters and paths. This causes the system to recognise the drive with the
new letter (typically D: through to Z:).
Extend a volume: you can right-click on the volume and choose Extend
Volume to add space to the volume from unallocated space. For example, if
you have a 100 GB volume and 20 GB of unallocated space, you can extend
the volume to include the additional 20 GB without affecting any data on
the volume, making the volume size 120 GB in total.
If you do not initialise the disk, the status of the disk will be listed as
Not Initialised.
Full format: this option prepares the disk and scans it for bad sectors and
marks them as bad. A system will not write data to bad sectors.
Quick format: this option only formats the disk; it does not scan it for bad
sectors. A quick format is quicker but not recommended for a system that is
used regularly because the system might attempt to write data to bad
sectors, resulting in corrupted files.
You can format any Windows partition/volume in (My) Computer by rightclicking the drive and choosing Format. You will see a dialog box that allows
you to choose a file system, the cluster size, a volume label (name), perform a
quick format and enable compression, which will enable users to compress
folders or files. However, the recommended method of formatting a volume is
by using the Disk Management console or from the command prompt.
The following steps show how to create and format a volume in Disk
Management on a Windows 7 system:
1. Right-click the unallocated space on the volume at the bottom of the
console and select New Simple Volume. Click Next.
2. The system will identify the maximum amount of space in MB that you can
shrink the volume to. You can accept the default or shrink it to a different
size.
3. Click Shrink. The amount of space freed up by the shrink operation will be
assigned to Unallocated space.
If you want to assign more space to a volume, you can do so by extending it,
but the disk must have unallocated space on it. The following steps show how
to extend a volume on Windows 7 using Disk Management:
1. Right-click on a volume and choose Extend Volume. Click Next.
2. This will automatically select all of the unallocated space on the disk. You
can change this to a smaller size and leave some unallocated space. Click
Next.
3. Click Finish to extend the volume to take the additional space you specified
away from the Unallocated Space.
4.3.1.7 Mount a volume
While volumes can be assigned a drive letter, they can also be mounted as a
folder on the same or another drive, known as a mount point or mounted
drive. You may, for example, use the Documents folder on your Windows 7
computer to store your music and video files. As your collection grows, you
realise your current hard drive is running out of space. You are going to buy
another hard drive, but do not want to copy everything over to the new drive.
After you install the new hard drive, you can mount the primary partition (or
logical drive) as a folder within the existing Documents folder on your C: drive
(for example, C:\Users\Sibulele\My Files). The drive will not have a letter (but
you could add one later if you want to). To use the new drive, just drop files
into the My Files folder. They will be stored on the new hard drive and not on
the original drive.
Note
You can create mount points on basic disks formatted with NTFS, but
the mounted drive can be formatted with any file system. Also, the
mount-point folder must be empty.
You can use the following steps on a Windows 7 computer to create a mount
point using Disk Management:
1. Right-click the unallocated space of a disk and select New Simple Volume.
Click Next. This will automatically select all the unallocated space on the
disk, but you can change it to a smaller size and leave some unallocated
space if you want to. Click Next.
2. Select Mount in the Following Empty NTFS Folder. See Figure 4.8.
You cannot use a system as a multi-boot system if any of its disks are
dynamic.
This is a one-way action. You should not lose data converting a basic disk to
dynamic, but you will lose all your data when converting a dynamic disk
back to basic. Also, you must delete all the volumes on the dynamic disk
before converting it back to basic. As with basic partitions, you must format
the volumes with NTFS or FAT/FAT32 before the OS can use them. Back up
your data before converting.
You can use Disk Management to convert a basic disk to a dynamic disk on a
Windows 7-Based system as follows:
1. Right-click on the disk (i.e. Disk 0 or Disk 1) in Disk Management, and
select Convert to Dynamic Disk. A dialog box will appear with the disk
selected. Make sure this is the disk you want to convert and click OK.
2. Click Convert. Review the warning from Disk Management that indicates
that you will not be able to use the system as a multi-boot system. Click
Yes. After a moment, the disk will be listed as a dynamic disk.
4.3.1.9 Performing tasks on a dynamic disk
If you created a dynamic disk, you can create a spanned volume, a mirrored
volume, or a striped volume. You can create a mirrored volume using Disk
Management on Windows 7 as follows:
1. Right-click the unallocated space on a disk and select New Mirrored
Volume. See Figure 4.10. Click Next.
2. The disk you clicked will be selected. Select a second disk from the list of
available disks and click Add.
3. The size will default to the maximum amount of space from either disk. You
can change the size if desired. Click Next.
4. Click Next to accept the default drive letter.
5. Choose a format option and click Next. Click Finish.
6. If the disks are basic disks, you will be asked to convert them to dynamic.
Click Yes. The system will create the mirrored volume.
4.3.2 Diskpart
Diskpart is an advanced disk management tool that can be used at the
command prompt and at the Recovery Console (Windows XP) or Windows
Recovery/Pre-installation environment (Windows Vista/7). You can do anything
in diskpart that you can do in Disk Management and it can be used when Disk
Management is not available.
1. You can start diskpart from the command prompt by typing:
diskpart
2. Press <Enter>.
3. Then you can type help and press <Enter> to see a list of commands that
can be entered. Some of the common actions you can perform with diskpart
are format, convert (between basic and dynamic, or between MBR and
GPT disks), assign (change the drive letter), shrink extend and delete
(destroy a volume).
4. When using diskpart, you must first select the item you want to work on.
You can use the list command to list available items, by typing any one of
the following commands before pressing <Enter>:
list disk
list partition
list volume
5. You can then select the item by typing any one of the following commands
before pressing <Enter>:
select disk x
select partition x
select volume x
(substitute x with the number shown from the output of the list command.
After the item is selected, you can run the desired command).
6. You can select a volume from a partition as follows:
select partition | volume x
(substitute x with the volume number, such as 0)
7. After selecting a disk, you can display configuration information for the disk,
such as its file system, type (partition), size, health status, info (system,
boot) by typing the following before pressing <Enter>:
detail disk
Note
If the output of this command indicates that the disk has no partitions
on it, suspect that a virus has corrupted the partition table. You might
be able to fix this by partitioning and formatting the disk. If you want
to wipe all partition and volume information off the currently selected
disk, run the clean command at the diskpart prompt. This tool
handles corruptions that simply will not let Windows boot and can be
used as a last resort.
As a short exercise, you can go through the following steps to start diskpart
and list the disks and partitions on your computer:
1. Start the command prompt by typing cmd in the Search box in the Start
menu and press <Enter>.
2. Type in diskpart and press <Enter>. If prompted by UAC to continue,
click Yes. A new window will appear with DISKPART> as the prompt.
3. Type in list disk and press <Enter>. This command lists all the disks in
your computer.
Figure 4.12 shows an example of the output from running the list diskpart
command on my computer at the DISKPART> prompt. The asterisk (*) in the
Dyn column for Disk 1 and Disk indicates that they are dynamic disks. All of
these disks are of the MBR type. If they were GPT disks, they would have an
asterisk in the Gpt column.
Note
Running chkdsk can take a long time and you will not be able to
cancel the process once it is started.
4.3.4 Convert
Although it is best to use NTFS instead of FAT, you will come across FAT
volumes. If you want to convert a volume from FAT to NTFS, you can do so
with the convert command.
A+ Preparation | V1.0 Jan 2014
Converting a FAT volume to NTFS does not reformat it, so you will not lose any
data. The basic syntax of the command is as follows:
convert volume /fs:ntfs
You specify the volume letter followed by a colon. For example, if you want to
convert the
E: drive from FAT32 to NTFS, you could use the following command:
convert e: /fs:ntfs
Note
Note
You can also run the defrag command at the command prompt to defragment
a hard drive. The basic syntax is as follows:
defrag volume
For example, if you want to defrag the E: drive, use the following command:
defrag e:
Table 4.3 lists some common switches you could use with the defrag
command, along with sample usage. The volume used in the table is E:, but
change it according to your volume.
Table 4.3 Common defrag command switches
Switch Function
/a
Perform analysis of the drive and display a report. For example:
defrag e: /a
/f
Force the volume to be defragmented. For example:
defrag e: /f
/v
Display complete analysis and defragmentation reports.
example:
defrag e: /v
/c
Defragment all volumes. For example:
defrag e: /c
For
4.3.7 Fdisk
Fdisk is a very old command that is used to create partitions. This is useful for
when you need to install an older OS that does not include built-in tools for
creating partitions. An undocumented feature with fdisk is the fdisk /mbr
command, which can be used to repair the master boot record on older
operating systems. Newer operating systems include the fixmbr command
from the recovery console.
Note
If you look closely at Figure 4.16, you will notice that that the tool uses
unfamiliar names for the partitions, such as HDA1 or SDA2. These are Linux
naming conventions for disks and partitions and are well documented in the
help screens of GParted.
After you create the VHD, you must attach it and then format it
before it can be used, just like a physical volume. When a VHD has
been attached and available for use, it appears blue.
To make a VHD available for use (either one you have just created or another
existing VHD):
4. Right-click Disk Management and choose Attach VHD. Alternatively, on
the Action menu, select Attach VHD.
5. Specify the location of the VHD using the full path.
Figure 4.17 shows the Create and Attach Virtual Hard Disk dialog box that
appears when the Create VHD option is chosen (in the centre), and the Attach
Virtual Hard Disk dialog box (on the right) that appears when the Attach VHD
option is chosen.
GTS A+ Certificate
802 Support Skills Study Notes
(G185eng) Module 1 Unit 5 (p.67-79)
Figure 5.1 shows Windows Explorer opened to the C: drive, with the Windows
folder opened (as in C:\Windows). The left navigation pane shows the drives
and folders that make up the hierarchical structure of the system and network
and the right pane shows the contents of the currently selected drive/folder.
Click the plus + sign to expand or minus sign to collapse parts of the
hierarchy.
Note
If your keyboard includes the Windows key, you can open Windows
Explorer on any Windows-based system by pressing <Windows> +
<E>.
If you cannot see the Windows Explorer menu bar at the top, press
<Alt> + <T> to bring it up temporarily. Alternatively, click the
Organize button on the menu bar; then choose Layout and select
Menu Bar to display it permanently. Layout also allows you to enable
or disable any of the window panes in Windows Explorer.
To open a file or folder, double-click it. You can also right-click on it and
select Open or Open with. Alternatively, you can use the File menu in
most applications to open files specific to that application.
To rename a file or folder, right-click it and select Rename. You can also
change the file extension but this is not recommended as the file will no
longer be associated with the program used to open it.
To copy and paste a file or folder, open the location that contains the file
or folder, right-click on the file or folder and then click Copy (or press
<Ctrl> + <C> to copy). Open the location you want to copy the file or
folder to, right-click in a blank area, and then click Paste (or press <Ctrl>
+ <V>).
To select files and folders one after the other, click on the first item
and press and hold down the <Shift> key, and then click on the last item
of the group. Release the key when you are done with your selection.
To select files and folders at random, press and hold down the <Ctrl>
key, and then click each file and folder that you want to select. Release the
<Ctrl> key when you are done with your selection.
To select all the files and/or folders, click inside the window and press
<Ctrl> + <A> key combination.
To delete a file or folder and move it to the Recycle Bin until this is
emptied, right-click on it and then click Delete. Alternatively, you can select
the file or folder and press the <Delete> key. A confirmation dialog box will
ask you if you are sure you want to delete the file or folder.
To zip (compress) files and folders to make them smaller to save space,
or to keep files together into an archive, or to transfer them much more
quickly, locate the file or folder, right-click it, point to Send to and then
click Compressed (zipped) folder. The newly-created compressed folder
will be assigned a .zip extension. You can copy, drag, cut and paste zipped
items in the same way as unzipped items.
Tip
You can also zip and unzip files using third party programs like 7-Zip
and WinRAR. Many of these programs support many archive file
formats, such as .iso, .tar, .7z, .cab, .rar, .wim and .zip.
5.1.3 Libraries
The version of Windows Explorer in Windows 7 includes libraries for each user
profile. Libraries provide a way of organizing files and folders stored in
different locations. The default libraries are shown on the left in Figure 5.3.
Libraries do not hold any data but instead act as virtual folders that link to the
locations where the folders are actually stored. A library can include pointers to
multiple folders on a local hard drive, an external hard drive and folders on a
network drive. When you click on a library folder, it shows all the folders within
it, regardless of where they are located.
You can create new libraries within the main Libraries window by right-clicking
Libraries in the left pane (or right-clicking an empty work area) and select
New > Library, and give the library a name. After a library has been created,
you can add folders from your system or from shares on other systems.
To add a folder to a library, right-click any folder in Windows Explorer, select
Include in Library and then click the library you want to use in the menu that
appears. You can also right-click a library, select Properties and use the
Include a folder button as shown on the right in Figure 5.3 to add folders.
Only folders can be added to a library (not individual files, printers, etc.).
Deleting files and folders from within a library will also delete the actual files
and folders from their original locations. If you want to remove an item
from a library but not delete it from the location it is stored in, you should
remove the actual folder containing the item.
5.2.1 Extensions
Windows files have a name, a dot and a three or four character extension.
When you double-click a file to open it, Windows opens the correct application
based on the extension. Windows maintains a table that lists every extension
and the program that opens it. Here are some common examples:
When you double-click this file
Star wars.docx
Quarterly results.xlsx
Home page.htm
A home movie.mp4
A song.mp3
Use the Web service to find the appropriate program: If this option is
chosen, Windows will take your computer onto the Internet and search
Microsofts website for the file extension.
Select the program from a list of installed programs: If this option is
chosen, an Open with dialog box similar to the one shown on the left of
Figure 5.6 will appear. From here you can select the program you want to
open the file with or browse for the program in the C:\Program Files folder.
You can also choose Always use the selected program to open this kind of
file, if you wish.
7. Select either OK or Apply to make the change. OK will make the change
and close the dialog box and Apply keeps it open so that you can change
other settings. The Search tab in Figure 5.8 allows you to specify various
search options.
Figure 5.9 shows two views of Windows Explorer opened to Sibuleles user
profile on Windows 7. The one on the left is a normal view and the view on the
right shows some of the hidden folders shown after making the change.
Figure 5.9 Comparing views before and after making Folder Option
changes
You can also show hidden files and extensions in Windows XP by selecting
Start > Control Panel. If necessary, modify the view to Classic View. Select
Folder Options and click on the View tab.
Then select Show Hidden Files And Folders, deselect Hide Extensions For
Known File Types and deselect Hide Protected Operating System Files
(Recommended). Review the warning, and click Yes to approve the change
and click OK to close the dialog box.
Figure 5.10 shows Windows Explorer opened to C:\Windows\System32 with
some files and their extensions.
Command usage
Archive. When cleared, it indicates the file has been archived (or
backed up); when set, it indicates the file has not been archived
or has been modified since the last archive.
Hidden. Users cannot view hidden files unless settings are
changed to view them.
Not index. Indicates whether the file is included in the index. The
system can find indexed files more easily.
Read-only. Users cannot modify a read-only file without
changing this attribute.
System. The OS protects system files to prevent users and
malicious software from causing damage.
Running attrib at the command prompt will list all the files in the current
directory along with any attributes that are assigned to them. For example, the
following shows the output from the attrib command:
C:\Aplus\Study>attrib
C:\Aplus\Study\Archived file.docx
A
H
C:\Aplus\Study\Hidden File.txt
A
I
C:\Aplus\Study\Not Indexed File.rtf
A
R
C:\Aplus\Study\Readonly File.txt
A
SH
C:\Aplus\Study\System and Hidden File.sys
As you can see, the first file listed above does not have any attributes. The
other files show A for not archived, H for hidden, I for not indexed, and S for
System.
To see the attributes of a specific file, such as aplus.txt, for example, type:
attrib aplus.txt
You can set any attributes with the + sign and clear any attributes with the
sign. For example, you can type the following command to make a file named
aplus.txt read only:
attrib +r aplus.txt
If you want to clear the read-only attribute, use the following command:
attrib -r aplus.txt
You can add or remove multiple attributes in one command. For example, to
remove three attributes (read-only, system, and hidden) from the
NTDETECT.COM system file, run the following:
attrib -r -h -s ntdetect.com
Note
You can also see most of these attributes from the properties page of a file
within Windows Explorer. Right-click any file in Windows Explorer and select
Properties. You can see the Read-only and Hidden attributes on the General
tab, as shown on the left in Figure 5.12. Click the Advanced button and the
dialog box will look similar to that shown on the right.
Notice the compress and encryption attributes shown on the right in Figure
5.12, which can be selected to compress or encrypt the file respectively. The
compress attribute can be manipulated with the compact command and the
encryption attribute with the cipher command.
Although you do not need to know these two commands, it is good to know
that the compact command with no switches displays the compression status
of specified files within a directory and compact /c compresses a specified file
or directory. Also, the cipher command with no switches displays the
encryption status of files. The cipher /e command encrypts a specified file or
directory and cipher /a /e command encrypts the directory and its files. Use
cipher /d to decrypt a file or directory.
Figure 5.13 shows two separate windows with the prompt focused on the APlus
directory on the C: drive. The window on the left shows the result of entering
the compact command with no switches (the output is self-explanatory), and
the window on the right shows the result of entering the cipher command with
no switches. The U to the left of the directories means that they are
unencrypted. If the directories were encrypted, an E would be shown next to
their name.
Note
If you try to change to an optical drive that does not have a disc, the
system will display an error.
You cannot move from one directory to another at the same level. You
should move up a level or to the root directory and then move down the
directory structure.
Commands such as cd\ or cd.. do not require spaces, but do work with one
space.
Single dot (.) refers to the root directory of the drive, which is C:\ in this
case.
Double dot (..) refers to the parent directory, which is C:\Aplus in this
case.
As stated previously, you can use the double dot to change to the parent
directory like this:
cd..
However, you cannot use a single dot to change to the root. As stated
previously, to change to the root, use a backslash like this:
cd\
You can include the full path for commands or files in the cd command, but
very often it is easier to change the directory. For example, imagine that you
are currently in the C:\Aplus\Study path, but you want to list the contents of
the C:\Aplus folder. You could use the dir command with the path as follows:
dir C:\Aplus
A+ Preparation | V1.0 Jan 2014
Notice that the backslash (\) is used in this command to refer to the root of the
drive, so the command changes to the C:\Aplus directory. Because you are
only moving up one directory, you could also use .. to change to the parent
directory. If your current path is C:\Aplus\Study, the parent folder is C:\Aplus.
The following commands run separately can also work:
cd ..
dir
To list files and directories in the root directory of the E: drive when your
current drive is C:, use the following command:
dir e:\
To list files and subdirectories in the current directory of the E: drive, use the
following command without the backslash:
dir e:
Some common switches that can be used with the dir command are listed in
Table 5.3.
Table 5.3 Common dir switches
Dir
switch
dir /w
dir /a:
dir
dir
dir
dir
/q
/s
/o:
/o:d
Usage
Lists files in a wide list format with no file details. Subdirectories
will be listed in square brackets like this [Windows] when using
this command.
Lists files that have specific attributes such as hidden (/a:h),
system (/a:s), or read only (/a:r)
Includes the name of the owner for each file
Lists all files and subdirectories in the current directory
List files by name (/o:n), by size (/o:s), by extension (/o:e),
List files by date. Use dir /t:c for created on, dir /t:a for last
access, or dir /t:w for last modified.
Using the /s switch with the dir command can be very useful when you are
looking for a specific file. For example, imagine you are looking for a file
located in one of the subdirectories of the current directory. You only know
that the file has the word aplus somewhere in its name and you are not sure
about the rest of the its name and extension. You can use the following
command with the * wildcard:
dir *aplus*.* /s
To search the entire drive from the root directory, either change to the root
directory or include the path in the command. For example, to start searching
from the root of the drive, you can use the \ to identify the root like this:
dir \*aplus*.* /s
A+ Preparation | V1.0 Jan 2014
Step 1: change the prompt to the directory containing the file(s) you want
to copy or move.
Step 2: type copy or move and enter a single space.
Step 3: type the name(s) and paths of the file(s) to be copied/moved (with
or without wildcards) and enter a single space.
Step 4: type the path of the new location for the file(s).
Step 5: press <Enter>.
As an example, the directory C:\Aplus contains the file study.txt. To copy this
file to a USB drive (E:).
1.
2.
3.
4.
5.
If the destination name is not given, the same file name is used.
If a new name is specified as the destination file, the copied/moved file will
be given that new name.
The copy/move command not only lets you put a file in a new location but
also change the name and extension of the file, making the command very
dangerous. For example, the command copy c:\autoexec.bat e:\my.sav
will not only copy the autoexec.bat file to the E: flash drive, but also give
it the new name and extension of my.sav.
The copy command can be used to copy the contents of multiple text files
together. For example, you can use copy log1.txt + log2.txt + log3.txt
logall.txt command to combine the log1.txt, log2.txt and log3.txt log files
into a single file named logall.txt.
As with any command, avoid making mistakes.
You can also use wildcards with the copy command. For example, the
command C:\Study\A+> copy *.txt "C:\Study\Sec+ copies only files
with the .txt extension in the A+ subdirectory to the Sec+ subdirectory.
Note
Table 5.4 shows important switches used with the copy command that you
should know about.
Table 5.4 Common copy command switches
Copy
switch
copy /a
copy /v
copy /y
copy /d
copy /z
Note
Usage
Indicates an ASCII-based text file. The copy command uses the
end-of-file character <Ctrl> + <Z> with ASCII files to indicate
the end of the file. If it is not used, the system considers the file
as a binary file (/b) and does not look for the end-of-file
character.
Verifies that files are written correctly.
If the same destination file already exists, the /y switch causes
the prompt to not ask the user to confirm the operation before
overwriting the file. This switch is useful in batch files. The /-y
switch prompts the user to overwrite an existing file.
Decrypts an encrypted source file at the destination.
If the connection is lost during a network copy process, the copy
command will restart the copy process from the point of failure
when the connection is up again.
The copy command will not copy files that have the system or hidden
file attributes. You can copy these files using xcopy and robocopy.
5.4.6 xcopy
The standard copy command can only work in one directory at a time. The
xcopy command is an extension of the copy command and works similarly to
copy, but it has extra switches that enable you to copy multiple directories at a
time. The most important points that you should remember about the xcopy
command are:
To give you an idea of the power of xcopy, you can clone an entire drives
contents to another drive by using the following xcopy command:
xcopy D: \ H:\ /h /s /e /k /c /r
This command copies all files from the root directory and subdirectories of the
D: drive to the root directory of the H: drive, including system and hidden files
(/h), empty directories and subdirectories (/s and /e), and file attributes (/k).
The command will also continue copying even if errors occur (/c) and will
overwrite read-only files (/r).
Because xcopy works on directories, you do not have to use filenames as you
would in copy, although filenames and wildcards can be used with xcopy.
Note
The data or core information in the file, which copy and xcopy will also
copy.
Both basic and advanced attributes.
Original timestamps, such as when the file was created.
Security information, including all permissions, such as the ability to read
or modify a file.
Ownership information, including the original owner of the file instead of
changing the owner to the user that performed the copy.
Audit settings that allow the system to log when a user accessed a file.
Table 5.5 shows some important switches that you can use with robocopy.
Usage
Copies the data and all metadata for files. For example:
robocopy c:\aplus e:\success /copyall
Copies directories and subdirectories, but not empty
subdirectories. For example:
robocopy c:\aplus e:\success /s
Includes all empty subdirectories in the copy. For example:
robocopy c:\aplus e:\success /e
Deletes destination files and directories that do not exist in
the source location. For example:
robocopy c:\aplus e:\success /purge
Moves files and deletes them from the source after they are
copied. For example:
robocopy c:\aplus e:\success /mov
Moves files and directories and deletes them from the
source after they are copied. For example
robocopy c:\aplus e:\success /move
The syntax for robocopy is different to xcopy and has changed over the various
versions. You might prefer to run it in the GUI by using the click-to-select
Robocopy GUI (as shown on the left in Figure 5.15) or the improved Richcopy
(shown on the right in the figure).
Table 5.6 lists some switches used with the del command along with examples.
Table 5.6 Common del command switches
Switch Usage
del /p
Prompts to confirm before file deletion, for example, del aplus.doc
/p
del /f
Forces deletion of read-only files, for example, del aplus.doc /f
del /q
Quiet. Does not prompt for confirmation when using wildcards, for
example, del *.* /q
del /s
Deletes files in all subdirectories, for example, del aplus.doc /s
del /a: Select files to delete based on their attribute, where the attributes are
r, h, s and a. A minus sign (-) before the attribute means do not
select it and without the minus means select it. For example, del
aplus.doc /a:r or del aplus.doc /a:-r
rd /q
Usage
The command on its own deletes an empty directory.
If the directory is not empty, use this switch to delete a directory
and all its subdirectories and files. You will be prompted with an Are
You Sure (Y/N) question. You can press <Y> to confirm the action
or <N> to cancel it.
Using this will prevent the system from asking the Are You Sure
question (quiet mode). This switch along with the suppression
switches for all other commands are useful to include in batch files.
As an example, you can use the following command to delete all files and
subdirectories within a directory called Aplus:
rd c:\aplus /s
Note
If sfc finds that files are missing and there are no replacement files on the
system, you will be asked to insert the Windows installation disc so that the
files can be copied over to the system. To familiarise yourself with sfc switches,
enter sfc /?, as shown in Figure 5.17.
Figure 5.17 Viewing the sfc command syntax, switches and examples
You can also run sfc /scanboot to scan all protected files every time the
system boots, sfc /purgecache to delete the file cache and sfc
/cachesize=x to modify its size.
SFC is integrated with Windows Resource Protection (WRP) in Windows
Vista/7. WRP prevents damage to or malicious use of critical system files and
folders, registry keys and files that are installed as part of the OS by restricting
permissions to them from any source (including administrators). WRP replaces
Windows File Protection (WFP) in earlier Windows operating systems.
Study
Notes
Study
Notes
Skills
When you install an application on a Windows system, its files are written to
the Program Files directory on the boot partition (usually C:\Program Files).
The installer or setup program will also add configuration data to the registry
and add the new applications name to the Start > All Programs menu and
will tell Windows about the kinds of files (file extensions) the application can
open. The installer might also add folders and files to the users home folder or
the All Users folder if the application is shared amongst users.
Some installers have trouble letting UAC know they need more
privileges and simply fail no matter what account you are logged in
with. In such cases, right-click the installer icon or file and select Run
as administrator to give the installer the access it needs.
Are you sure? Internet downloads are the most common sources of virus
infections. If you are downloading from a software companys site, like
Microsoft.com, that you can trust, you are generally safe. But if the site is
unfamiliar, be very careful.
Run or Save? As shown in Figure 6.2, when you download a program from
the Internet, Windows will ask if you want to Run its installer or Save it.
With Run, the computer will download the installer program to your hard
drive, open the installer and install the software and then disappear. With
Save, the web browser will download the installer program to your hard
drive and leave the installer file there for you to install the program at a
later time.
Live File System: select this drag-and-drop file copy format when you
want to burn a data disc that will play in a computer. You can copy files with
both recordable and rewritable media.
Mastered format: select this format when you need a disc that can play
digital music files, pictures, or video files on any computer or in different
electronic devices, such as CD, DVD, and Blu-ray disc players.
For both formats, insert the writable disc and when the AutoPlay dialog box
appears, click Burn files to disc using Windows Explorer. If AutoPlay does
not appear, click Start > Computer, and then double-click the disc burner
drive. In the Burn a Disc dialog box, type a name for this disc in the Disc
title box, click With a CD/DVD player for the Mastered format or Like a
USB flash drive for the Live File System disc format and then click Next.
Open the folder that contains the files you want to burn and then drag the files
into the empty disc folder.
Note
You can burn a disc image file, which often has either an .iso or .img file
extension, to a recordable CD/DVD by using Windows Disc Image Burner.
1.
2.
3.
4.
This is how Pismo File Mount third-party software extracts the contents from
an Office ISO downloaded from the Microsoft website.
1. Download and run the installer for Pismo File Mount Audit Package.
2. After the installation, right-click on the ISO file and choose Mount (as shown
in Figure 6.7).
C:\Program Files
C:\Program Files
(x86)
Note
Do not delete the (x86) folder. It will disable many applications and
most often requires reinstalling the OS to restore functionality.
You can often get older applications to work in Windows by using the Program
Compatibility wizard. The Program Compatibility wizard checks with a
Microsoft website to determine whether there is a known setting that works for
the application and if so, will configure the settings. You can also manually
configure compatibility settings. The following steps show you how to start and
run the Program Compatibility wizard in the various Windows operating
systems:
In Windows XP, click Start > All Programs > Accessories > Program
Compatibility Wizard.
In Windows Vista, click Start > Control Panel (Category View ) >
Programs and select Use An Older Program With This Version Of
Windows.
In Windows 7, click Start Control Panel (Category view) > Programs.
Select Run Programs Made For Previous Versions Of Windows.
After starting the wizard, select the program and follow the wizards steps.
To start the application, click Start > All Programs > RemoteApp and
Desktop Connections. Then, click the name of the remote application and
sign into it using dialog boxes used by Remote Desktop.
Start/Stop
buttons
Service Status
Startup Type
Notice the four buttons below the Startup Type menu. They enable you to
start, stop, pause and resume the service.
Some services depend on other services to run. A service that depends on
another service is called a dependency. If a service will not start, it could be
due to a problem with a dependent service. You can click the Dependencies
tab to view a list of dependent services.
Tip
Microsoft provides many tools (such as COM, DCOM and COM+) that
programmers can use to share data objects (elements of programs) between
applications on a single computer and between computers.
COM is commonly used by programmers as a standard for reusing code and
includes ActiveX controls (such as the real-time charts found in Task Manager),
COM OLE (Object Linking and Embedding) which enables embedding and
linking of objects in files such as Excel and Word, COM+ (an extension to COM
with better memory and CPU management) and DCOM (programming between
networked computers). You might also need to configure Distributed
Transaction Coordinator (DTC), which uses a transaction manager to
coordinate information between databases, file systems and other resources.
You will only need to open Component Services in those cases when something
is wrong or when a company that creates in-house or buys custom applications
needs you to add or configure components or register new server applications
or reconfigure security permissions for existing services. In such cases, the
programmer will give you instructions on what to do. You can find Component
Services in Administrative Tools or you can start it with the comexp.msc
command.
Tip
General tab: select the type of startup. The default is Normal Startup
which loads all drivers and services. You can choose Diagnostic Startup and
restart the computer to cause Windows to load only basic services and
drivers. If you change any settings on the Services or Startup tabs, it will
automatically change to Selective Startup (a custom boot).
Boot tab: control how the computer boots and choose which OS on a multiboot system should be booted to by default when the user does not choose
an OS at the dual-boot menu. The Timeout setting indicates how long the
system must wait before it automatically boots to the default OS.
Note
Services tab: lists the services running on the computer and their current
status (such as running or stopped) and startup mode. You can enable or
disable a service by selecting or deselecting the services check box, but
your choices are limited when compared to the Services console. If the
service has been disabled, it lists the date and time when it was disabled.
Startup tab: enable or disable any startup programs that start when
Windows starts and when they are written to the registry. It also controls
application shortcuts placed in Start > All Programs > Startup folder.
Many applications configure themselves to start automatically. You can
disable these applications when troubleshooting an infected computer or a
problematic application or when Windows is slow to load on the computer.
Tools tab: provides a launching pad for many tools available on your
system. Tools such as Event Viewer, Registry Editor and Command Prompt
and so on. Select any tool and click Launch to start it.
After starting it, you will notice that it is has several tabs:
This tab is most commonly used to determine what process is using most of
the CPUs processing time (shown as a percentage) and using the most
amount of RAM (in kilobytes). Most processes also provide a description to help
you understand what the process is used for.
Click column name
to reorder in
alphabetical order
or click CPU or
Memory column
name to see which
processes are
using the most CPU
time or amount of
RAM
The System Idle
Process indicates
how much time the
CPU is not doing
anything other
than waiting for a
command.
Open File Location takes you to wherever the file is located so that you
can find out what the process does.
End Process instantly ends the process. If the process is an application,
that application will close. Make sure you know everything about the
process before ending it.
End Process Tree although Task Manager does not give you any clue as
to which processes depend on other processes, it does give you the End
Process Tree option, which ends the process and any process it depends
on.
Debug is greyed out unless you are running a Windows debugger
program. This program is used by programmers to read dump files to
analyse problems with programs. Dump files show the status of the
program when you select Create Dump File. You will only use this option
when you are having problems with a program and support staff ask you to
create a dump file.
Caution Do not kill a process needed by the system as it can reduce the
systems stability and cause it to fail or reboot without warning.
Also, you cannot kill the System Idle Process. When it is high, it
indicates that the CPU is not being tasked.
If you want to see what processes you are about to kill when ending a process
tree (process and dependent processes), use a program such as the free
Process Explorer. See Figure 6.20. Process Explorer is a much more powerful
task manager and monitoring tool than the one built-into Windows. Instead of
just listing all of the processes, Process Explorer uses a tree structure so you
can see all the dependencies. It can be downloaded from here:
technet.microsoft.com/en-us/sysinternals/bb896653.aspx
Normally, you will only see your account listed on the Users tab, but there are
two ways that other users will show up:
Fast User Switching: this feature allows more than one user to be logged
into the system. If another user is logged in, the user shows up on the
Users tab.
Remote Desktop Connections: remote desktop services enable users to
connect to a system from a remote computer. Users connected using
remote desktop services are shown on the Users tab.
If other users are listed, you, as the administrator, can use this tab to send the
user a message to inform him or her that the computer will be shut down, for
example, and you can also select the user and click the Disconnect or Logoff
to disconnect or log off the other user.
Note
You can also apply a filter to select a set of tasks using /fi criteria,
where criteria is PID, image name, service name, or you can target
multiple processes using a filter for CPU time, memory usage or
status (Not Responding for instance). Wildcard (*) characters can be
used to specify processes.
Study
Notes
Study
Notes
Skills
If you need to search for drivers online, make sure you download the
driver designed for your OS. If you have a 64-bit OS, you must get a
64-bit driver. A 32-bit driver will not work.
You can also type hdwwiz.exe in the Search box in Windows 7 to run
the Add Hardware wizard.
Figure 7.4 shows the shortcut menus for two different devices. The device on
the left is (My) Computer and the other one on the right is a malfunctioning
printer.
A+ Preparation | V1.0 Jan 2014
As you know, USB and FireWire devices are hot swappable and can
simply be added and removed with the system switched on. You
simply plug them in and let the OS take care of them. On the other
hand, if a device is hot pluggable, you can install it while the system
is running but you cannot necessarily remove it without shutting down
the system first.
In Windows XP, click Start > Run. Type in devmgmt.msc and click OK.
In Windows Vista/7, click Start > Control Panel. If necessary, change the
view to Classic View on Windows Vista or to Large icons on Windows 7.
Select Device Manager.
In Windows Vista/7, click Start and type devmgmt.msc in the Search box
and click it from the results list.
You will not find the same category on every system. Device Manager
will only show categories for the hardware installed on the system.
Power: USB root hubs and generic hubs have this tab and it shows the
power available per port.
Power Management: shows device-specific power management settings.
USB, network, keyboard and mouse devices have this tab.
Note
Figure 7.6 shows some of these tabs. Notice that the General tab on the left
indicates that this systems network adapter is working properly.
Windows
XP
icon
Windows
Vista
icon
Windows 7
Figure 7.8 shows the Device Manager open on a Windows 7 computer. The
network adapters category has expanded automatically to indicate that the
network adapter has a possible problem. If a device has a problem, you can
right-click the device and select Properties. Use the General tab to display the
devices status and to troubleshoot a disabled or non-working device. The
Device status section will provide information about the problem. In this
case, the error indicates that the device is disabled (Code 22). To solve the
problem and make the error go away, click the Enable Device button to
enable the network adapter.
Note
When you have a malfunctioning device, you have several options to fix the
problem:
Look up the error code number on the General tab to determine what the
problem is and how to fix it. Table 7.1 shows a few common examples.
Table 7.1 Common error codes in Device Manager
Code
number
Code 1
Code 3
Code 10
Code 12
Problem
Recommended solution
The error code is not always so clear. A Microsoft knowledge base (KB) article
at the following website provides explanations for most error codes and how to
fix them. Although the article is based on Windows XP, the same codes apply
to Windows Vista and Windows 7.
support.microsoft.com/kb/310123
An
Click the Troubleshoot button (if any) on the General tab. The name and
usage of this button changes according to the problem.
Manually change resources for older non PnP systems that do not use ACPI
power management. If the problem is a resource conflict, such as when
two devices use the same IRQ, use the Resources tab and change the
settings to eliminate the conflict if possible.
Manually update drivers using the Driver tab.
Unknown
Device
listed
under
Other
Devices
in
Device
Manager
Copy the hardware ID (the first value) and go online and search the various
hardware ID databases or driver identifier websites with this information and
you should be able to find out who the vendor is and the device name, which
you can then use to search for its driver.
Note
Often the manufacturer will send the driver to Microsoft and it will be made
available through the Update Driver button. However, sometimes the most
up-to-date driver might not be available on Microsofts website.
You can download the most up-to-date driver from the manufacturers and
OEM vendors website and click the Update Driver button and select
Browse My Computer For Driver Software. You can then browse to
where you saved the downloaded driver and select it and let Device
Manager install it.
You can also update, disable/enable and uninstall the device driver from the
devices shortcut menu by selecting the appropriate option. See Figure
7.10.
You can also disable devices in CMOS Setup. If you want to prevent
users from using a built-in device, disable it from within Device
Manager or from the BIOS.
Two kinds of drivers are available: signed and unsigned. A signed driver has
been digitally signed by Microsoft and carries with it a digital signature that
verifies the publisher of the driver and ensures that the driver file has not been
changed since it was digitally signed. An unsigned driver does not carry any
guarantee that whoever issued the driver can be trusted and that the driver
file has not been changed in any way and that it does not contain malware.
In Windows XP/Vista/7, only administrators can install unsigned drivers. In
Windows XP, you can configure driver signing to either ignore device drivers
that are not digitally signed, display a warning when Windows detects device
drivers that are not digitally signed (the default behaviour), or prevent
unsigned drivers from being installed. To configure driver signing in Windows
XP, open the System Properties window, click the Hardware tab and select
Driver Signing. Windows Vista/7 versions automatically configure driver
signing.
If you suspect there are unsigned drivers on your system that could be causing
problems, you can run the sigverif (File Signature Verification) tool from
the command prompt or Run dialog box to check it. Sigverif examines the
drivers and system files and verifies that they are digitally signed. When it
opens, click Start and wait for it to complete. When it completes, a dialog box
appears indicating that the files have been scanned.
If you want to remove multiple devices, you must go through the same
process for each device. You can also safely remove devices from the
Computer folder. Open Computer, right-click the device you want to remove
and then click Eject.
If you are using a PnP device but cannot remove it because the safely remove
icon has disappeared, that is, Windows might have hidden it, then you can
enable it as follows:
Right-click on the date/time in the notification area.
Click Customize notification icons.
Find Safely Remove Hardware and Eject Media in the list that appears
and make sure that it is not set to Hide or it is set to Only show
notifications.
Also check to see if the plug-and-play service is running in the Services
console.
Resolution: For an LCD, choose its native resolution, which is usually the
highest listed (see the instruction manual to find out). For a CRT, choose a
resolution that is comfortable to view.
Colour quality (or depth): For users that only work with basic office and
email applications, consider using 24-bit or 16-bit colour depth to increase
system performance (32-bit uses more video resources). Gamers, graphic
designers and other designers will probably want 32-bit colour depth.
Refresh rate: Common refresh rates for CRT monitors vary from 56 Hz to
85 Hz, but ideally use a flicker-free refresh rate of 75 Hz or higher to
produce less eyestrain and provide more comfort. LCDs never flicker, so
the default Windows refresh rate of 60 Hz works well.
Themes: use this to change the look and feel of the entire windows
environment. A theme is a design scheme made up of pictures, colours
and sounds that can be applied to backgrounds and windows.
Desktop: use this to set the background colour or image of the desktop
(wallpaper). You can also customise the desktop with icons and any web
pages you want to place on it.
Screen Saver: use this to set screen saver settings and power
management options. A screensaver is a program that fills the screen with
moving pictures or animation when the computer is not in use. Initially, a
screensaver was designed to prevent phosphor burn-in (screen burn-in) on
CRT and plasma monitors, but now it is used primarily for entertainment,
security or to display system status information.
Appearance: use this to fine-tune the theme. You can also configure
advanced appearance settings to adjust almost everything about the
desktop, including the types of fonts and colours of every part of a window.
Settings: use this to set the screen resolution and colour quality the video
card/monitor supports and enable multiple displays on a system that
supports two or more monitors. You can also change more advanced
settings for the monitor/video driver.
There are two ways to set up multiple monitors: plug in two or more video
cards or use a single video card with multiple video ports for the monitors.
Multiple monitors are easy to configure; you simply plug in the monitors and
Windows should find them. By default, the second monitor is not enabled. To
enable it, you can use the Multiple displays dropdown box and select the
appropriate option through the Display applet in Control Panel, as shown in
Figure 7.20.
In Windows XP, open the Display Properties dialog box, select the
Settings tab and click the Advanced button.
In Windows Vista, access the Display Settings dialog box, select the
Monitor tab and click the Advanced Settings button.
In Windows 7, open the Display applet, click Change display settings in
the left panel and then click the Advanced settings link.
In the dialog box that appears in all versions, click the Adapter tab and then
click the Properties button. In the Properties dialog box for the adapter,
select the Driver tab and then click the Update Driver button and follow the
instructions to update the driver.
1. Plug the projector into the appropriate port and then turn it on. You might
have to use buttons on the projector to change the video mode to receive
video input from the computer. For a laptop, use a monitor/projector
function (Fn) key to activate the video port. When you first use the
projector, it will show an image of exactly what you see on the laptop or
computer screen.
2. Choose Start > Control Panel and click the Connect to a Projector link
in the Hardware and Sound settings (or in the Search box, type
projector, and then click Connect to a projector). This shows the
Projector settings window where you can choose how to show the desktop.
3. Select how you want to display the desktop using one of the following
choices:
Figure 7.23 Virtual keyboard (left) and Tablet PC input panel (right)
You can use the Pen and Input Devices applet in Windows Vista or Pen and
Touch applet in Windows 7 to configure how your pen (stylus) interacts with
the desktop and windows. You can configure how different pen actions (such
as a single tap or double-tap) and flicks are interpreted and whether the
system provides visual feedback. It is used only on mobile devices, such as
tablet PCs and graphics tablets.
Microsoft encourages graphics artists and software developers to use feature
called digital ink, which allows applications to accept pen strokes as input
without first converting the pen strokes into text or mouse-clicks. In the
Windows Journal application for example, you can write on the screen just as
though you were writing on paper. See Figure 7.24. Microsoft Office also
supports digital ink.
Right-click on the controller and select Game controller settings. Select your
device from the list of controllers and click Properties. Depending on what
gamepad or joystick you have, you might be able to configure its buttons,
sticks, triggers and more.
Figure 7.30 Volume control (far left) and volume mixer and control
options dialog boxes
7.10.1 APM/ACPI
Advanced configuration power interface (ACPI) is a power management
standard supported by Windows and most hardware devices, including hotswappable devices. ACPI is an update to an earlier standard called advanced
power management (APM), which always had problems with hot-swappable
devices. In APM, the BIOS controlled power management and the OS and
other software had little control. With ACPI, both the OS and BIOS work
together to control power management. This makes it easier for users and it
enables applications to work with the power management.
Tip
An SMM-capable CPU System Management Mode (SMM) is a specialpurpose operating mode that enables the CPU to slow down or stop its clock
without erasing registry information and it enables power saving in
peripherals. All modern CPUs support SMM.
Hardware devices it is important that the CPU, motherboard, hard drive
and display screen support power management. Such devices are usually
labelled Energy Star to indicate their compliance with the Energy Star power
saving standard.
BIOS: almost all BIOS support ACPI.
Operating system the OS must know how to send signals to a particular
device to change its power state. For example, the OS must be able to
request that a hard drive be shut down, or the CPU slow down, or the
display screen turn off after 10 minutes of inactivity. Current versions of
Windows provide full ACPI compatibility.
G0: known as the working state. The system has full power and is running
normally.
G1: known as the sleep (S) or low-power state. The system can be in one
of four separate (S) states:
o S1: power to the CPU and RAM is available, but the CPU stops
processing.
o S2: CPU is powered down.
o S3: known as sleep, suspend or standby state. Power to RAM is still
on, but power to the hard drive, display and other devices is off. When a
user takes action, such as pressing a key, the system wakes up and
returns power to normal for the entire system. A system in this mode
still uses power, but it can return to full operation much quicker than in
the S4 state.
o S4: known as hibernation or suspend to disk state. A snapshot of
everything in RAM is saved to a file called hiberfil.sys on non-volatile
memory or to the hard drive and the system is then powered off. When
the system is turned back on, the snapshot is copied from the hard drive
into RAM. Many laptops are configured to go into hibernation state when
their lid is closed. The hibernate state saves the most power but the
system takes longer to turn back on.
G2 (S5): known as soft power off state. The system is off but still has
power available for devices used to wake up the system.
G3: known as mechanical off state. The system is completely
disconnected from power, except for the real-time clock (RTC).
Note
You can access the Power Options applet in the various Windows operating
systems as follows:
In Windows XP/Vista, click Start > Control Panel. Change the view to
Classic View and double-click the Power Options applet.
On Windows 7, click Start > Control Panel. Change the view to Large
Icons and then double-click the Power Options applet.
The dialog box in Windows XP looks different than it does in Windows Vista/7.
Windows XP uses power schemes and Windows Vista/7 use power plans,
enabling you to better control how the system uses power. Both the power
scheme and power plan are a pre-defined collection of power usage settings.
7.10.2.1 Windows 7 power plans
You can use power plans to reduce how much power your system uses,
maximise its performance, or strike a balance between the two. When you
open the Power Options applet in Windows 7, you will see the following
available power plans:
Refer back to Figure 7.17, which shows you the Power Options applet in
Windows 7. Select one of the plans and click Change plan settings link. This
will take you to the Edit Plan Settings page where you can configure basic
settings. If you click Change advanced power settings link, you can view
and change advanced power settings. Figure 7.31 shows the Advanced
settings page for the Balanced (Active) plan that is active by default on this
system.
You can use the powercfg command to control power settings at the
command prompt.
Study
Notes
Study
Notes
Skills
In Windows XP, click Start > Run, enter msinfo32.exe and click OK. The
.exe is not needed.
In Windows Vista/7, click Start and enter msinfo32.exe in the Search box
and select it from the results list.
You can also access it by choosing Start > Programs or All Programs >
Accessories > System Tools > System Information.
It is important to note that you can also use System Information to collect
information about remote computers. To do this, select View > Remote
Computer and then enter the network machine name of the remote computer.
In Windows XP only, you can access several troubleshooting tools including Net
Diagnostics, System Restore, File Signature Verification, DirectX Diagnostics
and Dr Watson (application crash reporting tool) from the Tools menu. In
Windows Vista/7, you can use msconfig to access these kinds of tools,
including the DirectX Diagnostic Tool for checking your video card.
It does not have enough resources such as RAM to cope with the demand.
An application is fully and entirely using up a particular resource such as
RAM for itself without freeing it up for other applications to use.
A resource is not working properly or is outdated.
A resource is not configured for maximum performance and needs to be
adjusted.
A resource, such as hard drive space or RAM, is not sharing workloads
properly and needs to be adjusted.
You can use several tools to track the performance of a computer or laptop.
These tools include Task Manager, Windows XPs Performance Monitor and
Windows Vista/7s Performance Information and Tools and the Reliability and
Performance Monitor.
In Windows XP, click Start > Control Panel. In Category view, select
Performance and Maintenance > Administrative Tools and doubleclick Performance.
In Windows Vista, click Start > Control Panel > System and
Maintenance > Performance Information and Tools. Then select
Advanced Tools and click the Reliability and Performance Monitor link.
In Windows 7, click Start > Control Panel > System and Security
(Category view) > Administrative Tools > and double-click on
Performance Monitor. See Figure 8.5.
The terms you should be familiar with when working with the Performance
tools in the various Windows operating systems are objects, counters and
instances. An object is a resource such as memory, physical disk, processor
and network that is given a set of characteristics. A counter is a measurement
that tracks specific information about an object and there can be multiple
instances of the same type of object. For example, the Physical Disk Length
object has a counter, Average Queue, that tracks how many disk operations
are waiting while the disk is busy servicing other disk operations, and if there
are two disks, three instances of the object can be viewed: disk 0, disk 0 and
disks Total. Many counters can be associated with an object. Table 8.1
describes some common counters used. Note that each counter refers to an
object, such as physical disk, memory, or the processor.
Table 8.1 Commonly used performance counters
Object
Physical
Disk
Memory
Counter
% Free Space
Memory
Pages/sec
Processor
% Processor Time
Available bytes
Description
Percentage of free space on the physical
disk. Should be at least 15%.
Amount of memory available. Should not
be below about 10% of Total RAM.
Number of pages retrieved or written to
the disks virtual memory page files per
second. Should not be excessive,
averaging about 50.
Percentage of the processors time that it
is busy doing work rather than sitting idle.
Should be 85% or less.
4. If collecting data for a short time, then using a short sample interval of few
seconds is fine, but if collecting data over long periods, then set longer
sample intervals such as 10 to 15 minutes to avoid overloading the system
and generating a large, unmanageable log file.
In Windows XP, Performance Logs and Alerts enables you to create graphs, bar
charts and text reports that can be saved and viewed at a later time, as well as
set parameters that generate an alert when a certain counters threshold has
been reached. There are three types of logs or alerts that can be created:
Counter logs creates log files using objects and counters that you select
to determine system health and performance.
Trace logs creates log files based on statistics collected about services.
Alerts use to select objects and counters and set when the tracking is to
begin, how often the system is monitored, and how alerts are to be
handled. Alerts by default are sent to Event Viewer in the application event
log.
Windows 7 drops Reliability Monitor from this tool and simply names it
Performance Monitor, but it functions almost identically to Reliability and
Performance Monitor in Windows Vista. You can still find Reliability Monitor in
Windows 7 by searching for it in the Search box or as part of the Action Center
Control Panel applet. Figure 8.6 shows the reliability monitor.
Figure 8.8 shows the Performance Monitor on the left and as a result of clicking
the Add Counter (green plus) button (indicated by the arrow), the Add
Counters dialog box on the right.
Note
Data Collector Sets not only enable you to choose counter objects to
track, but also enable you to schedule when you want them to run.
8.3.1
Performance options
On the Advanced tab, click the Settings button in the Performance section.
This opens the Performance Options dialog box, which has three tabs (as
shown in Figure 8.11 and described below):
Visual Effects: here you can change visual effects that impact performance,
such as animations, and thumbnails..
Advanced: this tab enables you to configure settings for Processor scheduling,
Memory usage (Windows XP only) and Virtual memory. Under Processor
scheduling, you can choose how to allocate processor resources for best
performance of either programs or background services. Under Memory usage
settings, you can allocate more of memory to programs or to the system
cache. Under Virtual memory, you can change the size and location of the page
file.
Data Execution Prevention: DEP runs in the background to stop malicious
software from taking over programs loaded into RAM. It does not stop the
malicious software from being installed on a system, but it does make the
software less effective. Changing the default setting of monitoring only critical
OS files in RAM to all running programs and services will have a negative effect
on system performance, so it is best to leave this setting to its default for most
of the time.
8.3.2
Understanding paging
Computer systems use both physical memory and virtual memory. Physical
memory is the installed RAM and virtual memory is a file on the hard drive that
works as an extension of RAM through what is known as RAM cache. The file
is called a page or paging file, swap file or virtual memory.
With virtual memory, when a system starts running out of physical RAM
because too many programs are running at the same time, it swaps
applications from RAM to the page file. This allows you to run more programs
even if you run out of physical RAM. All versions of Windows use a page file.
Programs do not actually run from the page file, the OS must load
them back into RAM and this entire swapping process takes time.
All files in the cache are encrypted for removable flash devices and hardware
manufacturers can choose to disable encryption on internal, non-removable
ReadyBoost devices.
Windows will ask you if you want to use ReadyBoost when you plug the USB
device into your system. You can also enable it manually with the following
steps:
1.
2.
3.
4.
HD Tune Pro: A hard disk/SSD tool that can be used to measure the
drive's performance, scan for errors, check the health status, securely
erase all data and do much more. Visit www.hdtune.com
Figure 8.14 HD Tune Pro (left) and Unigine benchmark result (right)
Note
Maintenance consists of the jobs you do to keep your system running well,
such as by running hard drive tools, while optimisation consists of the jobs
you do to your system to make it better, such as updating drivers so that
hardware performs better.
At the end of this unit, you will be able to:
Study
Notes
Study
Notes
Skills
Triggers: identify the criteria that will start the task and are normally
based on a day and time or an event like when a program starts.
Actions: identify whether the system should start a program, send an
email, or display a message at the scheduled time and how it should be
done. A task can have a single action or multiple actions.
Conditions: identify extra conditions that must be met for the task to run,
such as to run the task only when the system is using AC power (not on
battery power), or only when the system is idle, or connected to the
Internet.
Settings: allow you to fine tune the behavior of the task. For example, you
can choose settings such as If task fails, restart every: <time period> or
Stop the task if it runs longer than: <time period>.
History: shows details about when the task has run.
It is not only the Windows defrag tool that includes a built-in scheduling
option, many Windows programs offer it, including the backup program, but
they still use Schedule Tasks/Task Scheduler. If you set up an automated
defragmentation from within Disk Defragmenter for example, you can open
Task Scheduler and it will be listed as a scheduled task.
A+ Preparation | V1.0 Jan 2014
Note
To check for updates, you can click Check for updates and then wait while
your system looks for the latest updates. If there is a message telling you that
important updates are available (as shown in Figure 9.2), or telling you to
review important updates, then click the Important Updates Are Available
message.
A+ Preparation | V1.0 Jan 2014
This will open the Select updates to install page as shown in Figure 9.3. This
page provides you with information about each update that is ready to be
installed. In the list, click on each update for more information and you can
also click on the More information link on the right. Select the check boxes
for any updates that you want to install, and then click OK to install them.
Apply the latest updates to make your system as secure as possible against
software attacks. This requires you to do more work and keep up-to-date
with security bulletins.
Only apply the patch if it solves a problem with the system.
Depending on the purpose of the patch, the wisest approach is to apply the
patch only if it solves a particular problem. However, the exception to this
approach is when an important or critical patch is available, such as a security
path for example, in which case you should test and install immediately, as it
might be too dangerous to leave the system unpatched for too long.
Once you have installed the driver, you can update it using its Properties
dialog box in Device Manager.
Keep in mind that all registry cleaners are risky in that they might
delete entries that the system or you the user wants to keep.
Additionally, some registry cleaners might be malware and are often
advertised for free on the Internet. Be careful what you download
from the Internet.
An archive attribute is a 1-bit storage area that all files have and when a file
is changed, even by just opening it, its archive attribute is turned on. When a
backup program backs up a file, it usually turns the archive attribute off. If the
archive attribute is turned on, it means that the file has been changed since it
was last backed up.
Windows Explorer or (My) Computer by default do not show much about files
in any view, even when you select Details from the View menu (as shown in
Figure 9.8 on the right). To customise your view, right-click the column bar
that says Name, Size and so on to look at the default options. You will see
options such as Name, Date and Size. The options differ according to the
version of Windows you are running. Selecting the More option brings up a
menu offering more view options. See Figure 9.8.
Archive attribute
Copy
Incremental
Differential
Daily or daily
copy
Description
Every file and folder selected is backed up and the archive
bit is turned off for every file backed up. This can take a
long time on large systems, but has the shortest restore
time. Only one tape set is required.
Identical to a full backup, except that the archive bit is not
changed. This is used for making extra copies of a
previously completed backup.
Backs up only the files that have been changed since the
last full or incremental backup, that is, files with the
archive bit turned on. This is a fast backup, but is the
slowest when it comes to restoring data. Multiple tape
sets are required.
Backs up files that have changed since the last full
backup, but does not turn off the archive bit. A maximum
of two tape sets are used.
Makes copies of all the files that have been changed
during the day. It does not change the archive bit.
Tape drives
Optical
media
Description
A practical and common option for backing up because it does
not cost much, it can store lots of data, has fast access times
and it is easy to use. It can be used for personal and network
backups.
Magnetic tapes are suitable for backing up because of their
low cost, portability and large storage capacity, and they can
also be reused when old information is no longer required.
This is typically used for network backups.
Although optical media can be used to store files and folders,
they are not suitable for backing up because they can only
store a limited amount of data, their recording speeds are
slow and they are not designed to be continually overwritten.
All Windows Vista editions do not allow you to select the files and
folders you want to back up. If you want to choose a file to back up,
you need to buy a third-party tool. Windows Vista does not support
backing up data to USB flash drives on any edition.
6. Select the folders and files to back up and whether to include a system
image of each drive. Click Next.
7. Review your selections and click Save Settings and Backup. This starts
the backup, which you can monitor using the progress bar shown in the
Backup and Restore applet. Backups can take a long time depending on how
much you are backing up. Backups can be restored using this applet as
well.
Figure 9.9 Backup and Restore applet (left) and Set up backup
wizard (right)
Unlike Windows Vista, Windows 7 allows you to create image backups to a
network location and back up data to USB flash drives, but the drives must be
at least 1 GB in size. However, unlike Windows XP, both Windows Vista and
Windows 7 do not support backing up to tape.
Note
Keep documentation for each backup. A backup log or catalog for each
backup will make it easy to find files that need to be restored. The log can
include information about the backup method used, which files and folders
were backed up and when they were backed up, and on which backup media is
the data stored.
Open: select this to open the file so that you can view it before you
actually restore it.
Copy: select this to create a copy of the file to store it in another location.
Restore: select this to overwrite the current version of the file with the
previous version.
It is also possible to get a previous version of a file that has been deleted, but
the way to do this is slightly different. You will not be able to right-click on the
file that is deleted. Instead, you have to go through the following steps:
1.
2.
3.
4.
5.
6.
Notes
It includes talking to users to determine how and when the problem took
place, determining the cause of the problem, such as a faulty hard drive,
its symptom(s), such as a bluescreen shown onscreen, its consequences
such as the user no longer able to work because of the fault, and its
solutions, such as to replace the hard drive. In addition, it also involves
testing and verifying the solution and documenting the entire process.
Stay calm and take your time coming to the correct solution.
Consider taking breaks to refresh your mind.
Do not assume anything. Even though the symptoms of a current
problem are similar to a problem you have experienced before, the
problem and its solution could be completely different. Treat every
problem as a new challenge.
Do not overlook the obvious. Simple things cause sometimes problems.
Run through what should happen and verify that there is not a user or
configuration error.
Keep an open mind and be patient. Be prepared to try different things
and to start over again when needed.
When assessing whether to repair a part, consider how much that part
will cost and how much it will cost for you to perform the repair. In
many cases, a replacement is the best and most effective option.
Know when to give up! When you cannot fix a problem, be prepared to
pass the problem onto a senior technician who can fix it to avoid wasting
the customers time.
Make sure you have all the hardware and software tools, documentation
and any other information needed before visiting a user or customer.
When helping a user over the phone or online, make sure you provide
clear, concise and accurate information.
If you need to take a system offline, make sure it is scheduled
appropriately and sensitively and that everyone affected is informed and
provide time frames.
Handle and maintain the users equipment and resources with care.
The users data is important. Check when the last backup was made and
if one was not made, make a backup before making any system
configuration change. Many technicians use drive imaging software such
as Norton Ghost to make image backups.
You want to find out about symptoms, unusual behaviour or anything that
the user might have done recently that could have directly or inadvertently
caused the problem. Gather information by asking good questions that the
user can answer simply (that is, without having to know anything about the
system and its software). Good questions include open questions that the
user can explain in their own words like What is the problem? or What
happens when you try turning the system on? and closed questions that
require a Yes/No or a fixed response like What does the error message on
the screen say?. If the user cannot properly explain the problem any
further, then you will need to physically inspect the system.
Identify any changes made to the system: you cannot always rely on
the user to let you know everything that has happened. Therefore
physically look at and listen to the system, and even smell it. See if any
new hardware or software has been installed. Look around for anything
that might seem out of place. In some cases, you might need to inspect the
environment around the system that might affect a problematic system.
Check system logs or diagnostic software for information.
Review documentation and consult: your company might have
documentation that logs past problems and solutions. Perhaps the same
problem has happened before, or other related problems can help you to
find out what is wrong. Maybe another technician listed in the
documentation can assist. Perhaps the user has documentation or a manual
concerning the system, component, software or other device that has
failed.
Note
This step is different from the other steps in that you are not making a list
of causes but instead choosing one probable cause as a starting point.
Unless the problem is of little importance, you might need to break down
the troubleshooting process into logical areas and decide whether the
problem is with hardware or software (or both) by using your knowledge
and understanding and your senses:
Sight: watching the computer boot, Windows load, looking at lights, etc.
Hear: listen for beeps and other sounds.
Smell: burning components.
The theory might mean that you must bring the system back to base. This
means that you must take the system down to the minimum configuration
needed to run and if this works, then add peripherals and devices one-byone to the system and test it after each one until you find the problem. This
takes a lot of time but might be necessary. Also, when troubleshooting a
cable, connector or device, it is good to have a known good working
copy at hand, so that you can swap the failed one with the working one
when needed.
If the first theory fails during testing, go back to step 2 to establish a new
theory of probable cause and continue doing this until you find a theory
that works. If you run out of ideas and have tested all your theories, you
might need to escalate the problem by calling in some help. Some help
sources you can go to include:
This might mean restarting the system once or twice, opening applications,
using the newly-installed hardware device, using Device Manager to
confirm that the device is configured properly, updating software or the
device driver, installing anti-virus software permanently, accessing the
network and even watching the user do whatever he or she needs to do on
the system for a few minutes.
You will not only want to verify functionality, but also prevent the problem
from happening again if possible by implementing a preventative measure.
For example, if you are troubleshooting a system and you notice that there
is too much dust on the fans and the inside of the system, you should use
the proper tools and vacuum it out. Whatever preventative measure you
take, make sure it does not affect other systems or policies, and if it does,
get permission first.
These six steps are not the only troubleshooting steps you are
likely to see in your career, but they will improve your problemsolving ability when working in the field. Also, your role as a
technician is not only to solve problems, but also to communicate
and provide feedback to the user in a professional and honest way
and to share your knowledge and educate the user.
Note
Every MBR-based hard drive has one MBR, and each partition on
the hard drive has a single boot sector, but only one of them can
be marked active.
Figure 10.1 shows a single hard drive with two partitions. Remember that a
hard drive can have up to four primary partitions, with one partition
marked as active. The active partition includes code within the boot sector
that identifies the location of the files that start the OS.
Hard disk
MBR
Boot
Sector
Partition 1
(Active)
Boot
Sector
Partition 2
2. The master boot code scans the partition table or partition boot record
(PBR) on the disk, looking for the active partition. The partition table
describes the number and size of partitions on the disk.
3. The master boot code loads the contents of the active partitions boot
sector into RAM and runs it:
a) On Windows XP, the NTLDR file is run.
b) On Windows Vista and Windows 7, the Windows boot manager
(bootmgr) is loaded.
Note
NTLDR (NT Loader): this is the program that loads the OS by reading
the BOOT.INI file. To do this, it loads its own minimal file system that
enables it to read the file.
BOOT.INI: this text file lists the disk, partition and folder of the location
of the OS available to NTLDR. On multi-boot systems, it contains the
menu of operating systems that can be selected on the boot menu and
specifies the default OS. See Figure 10.2. It is a hidden system file in
the root of the system partition that can be modified with msconfig,
automatically with System Startup settings and by using a text editor.
NTDETECT.COM: NTLDR starts this to detect hardware installed in the
system.
NTBOOTDD.SYS: this mini SCSI disk driver is used only if the system
boots from a SCSI drive whose host adapter does not have an on-board
SCSI BIOS enabled.
When bootmgr completes the initial load, it runs the boot loader program
Winload.exe to start Windows Vista/7, or alternatively, the
Winresume.exe program to restore a previous session if the OS is placed
into a hibernation state. Both of these are called from the
Windows\System32 folder.
Note
The same files are used with EFI, but are assigned the .efi file
extension as in bootmgr.efi and stored in the EFI System
Partition (ESP).
If you do not press the <F8> key, the system will boot into
Windows and you will have to restart to try again. Try tapping the
key repeatedly if the menu does not appear. The worst that can
happen is a Keyboard Error that POST interprets as a stuck key on
the keyboard.
The various options will be explored in the next few sections. The options
provide access to the Windows Recovery Environment, Repair Your
Computer, safe modes and the Last Known Good Configuration. All of the
options are the same on Windows Vista and Windows 7, but Windows XP
does not provide the following menu options:
Safe mode: starts the system with a minimal set of drivers: the most
basic version.
Safe mode with networking: starts the system with basic network
drivers and services needed to access network resources and the
Internet. This mode is useful if you need to research a problem or
download updates from the Internet. If you cannot start this mode,
then the problem is a network driver or other network problem. Reboot
into safe mode and use Device Manager to disable network components
starting with the network adapter.
Safe mode with command prompt: starts the system with a minimal
set of drivers and loads the command prompt but not the Windows GUI.
This is useful if the desktop does not display or if the the explorer.exe
program is corrupted. You can delete the corrupted explorer.exe file and
copy in an undamaged file from the disc using the prompt. You must
know how to navigate the directory structure and know the location of
the file you are replacing. Although Explorer cannot be loaded in this
mode, you can load other GUI tools that do not depend on Explorer,
such as Event Viewer using eventvwr.msc and system restore using:
C:\Windows\system32\restore\rstrui.exe.
You will know when the system is booted into safe mode because the
screen will be black and the words safe mode will be in white letters
located in the four corners of the screen as shown in Figure 10.4.
It is very important to remember that you can use the Last Known
Good Configuration only before you log in again. Also, it is best to
test the driver or software installation on another test computer or
virtual machine before trying to install it again on the users
computer.
You cannot use Last Known Good Configuration if you have logged in after
experiencing a problem caused by a recently updated driver, but there is a
workaround: you can boot into safe mode and use Device Manager to roll
back the faulty driver to a previous working driver.
10.3.1.3 Repair your computer and Windows RE
The Repair your Computer option starts the Windows Recovery
Environment (Windows RE or WinRE). Windows RE provides a list of
automated and manual tools that you can use to troubleshoot and repair
problems. Also known as System Recovery Options, the purpose of
Windows RE is to recover Windows Vista/7 from errors that prevent it from
starting and is very useful to use to fix errors that cause the system to
freeze and when you cannot boot into safe mode.
Tip
When you select the Repair your computer option, you might be asked to
configure one or more of the following options depending on how you start
the tool (installation media, boot menu or repair disc):
Restore your computer using a system image that you created earlier.
Use Recovery Tools. You will also be asked to choose an OS to repair.
Choose this option to access the Windows RE tool set shown in Figure
10.6.
Keyboard language.
Log on with a local account.
If you use an administrative account, the options will include the command
prompt, as shown in Figure 10.6.
This minimal graphical OS with the various tools you get when you
boot directly to the Windows installation disc is called a Live DVD
because the system directly loads from disc into RAM and does not
access or modify the hard drive, unless you run the installation or
the tools.
You can run the following tools at the system recover options screen:
Startup Repair: this tool automatically runs a series of checks and
attempts to repair almost any boot problem so that Windows can start
properly. It can repair a corrupted registry using a backup copy on the
hard drive, restore critical system and driver files, roll back any nonworking drivers, uninstall incompatible service packs and patches, run
chkdsk, write a new boot sector, repair the MBR and run a memory test
on RAM.
System Restore: this tool allows you to apply a snapshot or restore
point of the system at a point in time so that you can return your
system to a previous working state. This is similar to how you can apply
a restore point from within Windows or within safe mode, but if you use
system restore in safe mode, you cannot undo the restore operation.
System Image Recovery (Windows 7) or Windows Complete PC
Restore (Windows Vista): if you created a system image and have a
drive containing the image plugged in, you can use this tool to apply the
image to the system to restore it.
Windows Memory Diagnostic: use this tool to run thorough tests on
RAM. It will open the same diagnostic tool that you can start from within
Windows.
Command Prompt: this provides access to a Windows RE Command
Prompt. It includes troubleshooting commands such as bootrec and
bcdedit, but it does not include some of the normal command prompt
commands (although it does include the important ones).
Note
Selecting an option to boot into one of the safe modes forces the
system to boot into that safe mode every time until the setting is
changed back.
All but one of the settings in the Boot Options area of the Boot tab directly
relate to menu items in the Advanced Boot Options menu:
Windows shows both recent and automatic restore points that you can
choose from. If you want to view more options, select Show More
Restore Points. By default, the Task Scheduler tool in Windows
automatically creates restore points periodically and before a certain event
has taken place, for example, before an application is installed or a
Windows or driver update is applied. However, it is recommended that you
create a restore point before making changes that might not trigger an
automatic restore point, such as when directly editing the registry or
making another system configuration change.
In Windows XP, you can create restore points and access and restore them
by clicking Start > All Programs > Accessories > System Tools, and
selecting System Restore.
System Restore is turned on by default and uses some disk space to save
information on restore points. To turn System Restore off or change how
much disk space it uses, in Windows XP, open the System Properties
applet in Control Panel and select the System Restore tab. In Windows
Vista/7, right-click Computer and select Properties, and then click the
System protection link. On the System Protection tab, click the
Configure button.
Note
System Restore does not affect any user files, such as documents or
pictures, when a restore point is applied. It restores only system files,
applications and drivers. However, when restore points are created, they do
save previous versions of files that can be restored by using the Shadow
Copy Previous Versions feature. Also, System Restore will not usually reset
passwords, but it will reset the password to what it was when the restore
point was created. This is very useful in that it enables you to recover from
a forgotten password.
To restore the system to a previous point, start the System Restore
Wizard by choosing Start > All Programs > Accessories > System
Tools > System Restore. You can also run the System Restore tool
(rstrui) from the installation media or by selecting the Repair Your
Computer option from the Advanced Boot Options menu on startup, as
shown in Figure 10.10.
System Restore should not be the first step you try when
troubleshooting a system. Simply rebooting is known to fix many
issues and LKG is a good option.
If system restore does not work, they you need to go to a backup (if you
made one that is). The next few sections explore the different backup
methods available in the different operating systems.
10.3.2.2 Automated System Recovery (ASR) for Windows XP
ASR is a recovery option in Windows XP that recovers the system
configuration to a point in time. It is intended as a last resort after trying
Last Known Good Configuration, rolling back drivers, troubleshooting in
safe mode and using previous restore points. ASR includes two steps:
Step 1: ASR backup involves creating a large file that includes the
boot and system volume, system state information (registry and boot
and system files), and application and user data and copying it to
backup storage media. ASR will not back up extra partitions or drives.
You also need a blank ASR floppy disk that stores information critical to
the restoration process. You can create an ASR backup from the
Windows XP backup utility (ntbackup) by choosing the Automated
System Recovery Wizard from the Advanced Mode option.
Step 2: ASR restore to recover from a catastrophic failure using
ASR, boot to the Windows XP installation disc and press <F2> when
asked to run ASR. Insert the ASR floppy disk when asked and follow the
instructions on the screen. ASR will format the boot and system
partition(s) and perform a mini-installation of devices, drivers and other
basic configurations. After a few moments, the ASR Recovery wizard will
ask you for the location of the backup file you made. Select it and the
restoration process will complete.
Note
Emergency Repair Disk (ERD) is a tool that was phased out with
Windows 2000. It was a much simpler version of Windows XPs
ASR that backed up critical system and boot files.
To use the image to recover the system after a catastrophe, complete the
following steps:
1. Use the Backup and Restore (Center) applet in Control Panel if you
can log into Windows.
2. If you cannot start Windows, then boot to the installation disc and
choose the repair option or use the repair option in the Advanced
Options boot menu. Select the System Image Recovery (Windows 7)
or Windows Complete PC Restore (Windows Vista) option and follow
the instructions on-screen to re-image the system. See Figure 10.12.
You can run commands such as attrib, cd, chkdsk, copy, del, dir,
diskpart, format, md, mkdir, rd, rmdir, disable and enable (for
services), listsvc (to see a list of services and drivers on the system) and
many more important ones from the Recovery Console. To learn more
about individual commands, their syntax and switches, use the help system
(/?). The command syntax is different under recovery console.
You should understand the following three important boot troubleshooting
commands when working at the recovery console:
Note
When using the recovery console, you will only be able to access
the root folder, %SystemRoot% (Windows) folder and its
subfolders, the cmdcons folder and removable drives. You will not
be able to access user data files.
To exit the recovery console, type exit and press <Enter> and then
restart the system.
10.3.3.3 Windows Vista/7 RE command prompt
In Windows Vista/7, the boot troubleshooting command prompt is called
Windows RE command prompt.
The Windows RE command prompt functions similarly to the regular
Windows command prompt with all the most important regular commands,
but includes a few additional diagnostic commands that you will not find in
the regular command prompt. You can start the Windows RE Command
Prompt on a Windows Vista/7 system as follows:
1. Start the system and press <F8> to access the Advanced Boot
Options menu.
2. Select Repair Your Computer to access System Recovery Options.
3. Select Command Prompt to access the Windows RE Command Prompt.
The most important command to know for recovery is the bootrec (boot
recovery) command. You can run bootrec with the following key switches:
bootrec /fixboot rebuilds the boot sector for the active system
partition.
bootrec /fixmbr repairs the MBR by rebuilding it for the system
partition.
bootrec /rebuildbcd scans disks to locate bootable operating
systems and re-creates the BCD file or store similarly to how bootcfg
/rebuild re-creates the BOOT.INI file in Windows XP.
bootrec /scanos scans the system looking for operating systems not
in the BCD.
Solution
Run disk diagnostics first and then
run
chkdsk
from
recovery
console/WinRE command prompt
or run Startup Repair.
Make sure drive is correctly
identified in CMOS Setup or reset
them to the default.
Use fixmbr command at recovery
console or Startup repair or
bootrec
/fixmbr
at
WinRE
command prompt.
Unplug USB drive and change boot
order settings in CMOS Setup to
boot to hard disk.
When Windows finds a file system error for a drive such as when it
is shut down improperly, it flags that drive as a dirty bit or volume.
The next time the system reboots but before Windows loads, the
autochk disk checking program automatically runs to correct
errors in the file system.
Virus infection: run antivirus software to check it. You might need to
run sfc/scannow to repair system files.
Faulty RAM: run memory diagnostics to check RAM.
Faulty power supply: check the power supply voltages to ensure they
are correct.
If the system boots to the GUI in Safe Mode, replace the video driver.
If the system cannot boot to the GUI at all, use a backup to repair or
recover the Windows installation.
If the boot settings have been changed on the Boot tab of msconfig,
then change them back to their proper settings.
If the missing GUI is registry-related, attempt a System Repair from the
Windows installation disc or if possible, restore a backup copy of the
registry.
Note
Several issues can cause the GUI to fail to load. Bugs in drivers or
registry problems and even auto-loading programs can cause
Windows to hang during the GUI-loading phase. The first step to
troubleshooting these issues is to use one of the Advanced Boot
Options to try get past the hanging point and into Windows. If the
GUI files are corrupted for what is called a Missing Graphical
Interface problem, your only choices are to restore from a backup
or rebuild from the installation disc.
If the system stops without displaying any kind of error message onscreen,
it is most likely a problem with the CPU or power.
10.3.4.6 Windows XP boot errors and failures
If the NTLDR, BOOT.INI, NTDETECT.COM or NTOSKRNL.EXE files are
corrupted or missing, you will see the corresponding error message listed in
Table 10.3. The table also describes the causes of and the solutions to the
error.
NTLDR is missing or
bad
Invalid boot.ini
Windows could not
start
Hal.dll is missing or
corrupt
Ntoskrnl.exe
missing
is
Some of these errors indicate that the system is trying to boot from a nonbootable disk. They indicate that there is a problem with either the files or
that BIOS is not configured correctly. Verify the boot order in CMOS Setup.
Ensure that the system is not trying to boot to media without an OS (such
as a CD or DVD). You can also remove any CDs or DVDs from the drives.
Additional steps you can take to fix Missing NTLDR or Missing boot.ini
errors include:
Fix the boot sector. If the active partition has a corrupted boot sector,
it might not be able to locate the NTLDR file. Run the following
command to repair the boot sector:
fixboot x
(Substitute x with the driver letter of the partition containing the boot
sector you want to repair)
Fix the MBR. The MBR might be corrupted, causing this error. Run the
following command to fix the MBR:
fixmbr device
(Substitute device with the device parameters you obtained from the
map command to repair it. For example, fixmbr \Device\Harddisk0)
First step repair: use commands at the recovery console to either fix
the master boot record, replace missing or bad boot files or rebuild the
boot.ini file, depending on what the problem is.
Second step restore: if the repair fails, attempt to restore from a
backup copy of Windows using ASR.
Third step rebuild: if a restore is not available or fails, rebuild the
system by rebooting to the Windows installation disc and install on top
of the existing OS (repair installation) or use a recovery OEM disc or
partition if available. To avoid losing important data though, it is better
to swap the C: drive for a blank hard drive and install a clean version of
Windows on the blank drive.
Note
You will lose data at the restore and rebuild steps, so you definitely
want to spend a lot of time and energy on the repair step first.
Note
Errors that indicate a problem with the boot sector (or that the system is
trying to boot from the wrong disk) include:
A problem with the MBR or boot sector can give any of the following errors:
If there is no bootmrg entry in the BCD store or the Boot\BCD file on the
active partition is damaged or missing, the following error message will be
shown:
Verify boot order in CMOS Setup and ensure that the system is booting
from the correct media.
Repair a missing BOOTMGR file.
Repair or replace the BCD.
Fix the boot sector.
Fix the MBR.
To repair the BCD store or rebuild it, you can use the following steps:
1. Start the system and press <F8> to access the Advanced Boot
Options menu. Select Repair Your Computer to access System
Recovery Options. Run the Startup Repair tool. This should
automatically repair the system and ask you to restart it. If this does not
work, go to step 2.
2. Boot to the System Recover Options, and choose the Command Prompt
tool. In the Windows RE command prompt, run all the commands listed
in Table 10.4 to rebuild the BCD. The table contains explanations about
what each command does.
Table 10.4 rebuilding the BCD
Commands to run to rebuild Usage
BCD
bcdedit /export C:\backup_bcd
Creates a backup of the current
BCD if you later need to import
data from it. Replace export with
import to import BCD copy.
c:
Windows RE boots into the hidden
100-MB system partition and
identifies it as C within Windows
RE.
cd boot
The BCD file is in the boot folder of
this partition.
attrib bcd -s -h -r
Removes the system, hidden and
read-only attributes of the BCD file
so that it can be renamed.
ren c:\boot\bcd bcd.old
Renames the file as Bcd.old in case
you need the original file later.
bootrec /rebuildbcd
Creates a new BCD for the system.
You
can
also
use
the
third-party
program
EasyBCD
from
neosmart.net/EasyBCD/ to configure and tweak the BSD. See Figure
10.17. This program provides more power and safety than bcdedit.
If you need to repair the boot sector and/or the MBR on a Windows Vista/7
system, run the Startup Repair tool first. If this does not work, use the
following steps:
1. In Windows RE command prompt, run the following command to repair
the boot sector:
bootrec /fixboot
2. Run the following command to repair the MBR:
bootrec /fixmbr
If the records in the MBR or boot sector are damaged, resulting in the
following errors, it might be caused by malware, disk corruption or the user
installing too many operating systems in a multi-boot configuration.
OS not found
Invalid drive specification
c:\windows\system32\config\system
c:\windows\system32\config\software
c:\windows\system32\config\sam
c:\windows\system32\config\security
c:\windows\system32\config\default
c:\windows\repair\system c:\windows\system32\config\system
c:\windows\repair\software c:\windows\system32\config\software
c:\windows\repair\sam c:\windows\system32\config\sam
c:\windows\repair\security c:\windows\system32\config\security
c:\windows\repair\default c:\windows\system32\config\default
The easiest command is copy. All you need to do is copy the backed-up
registry files from the RegBack location to where the main registry files are
(hint: move up one level in the tree to the \config folder).
Description
Contains events specific to and logged by the OS, such
as service load failures, driver load failures, hardware
conflicts and so on.
Contains events logged specifically by applications, such
as application errors or virus scan start/stop status.
Application developers choose which events appear in
this log.
Contains events called audits, which record anything to
do with security and are described as failed or
successful. Examples include the number of logon
attempts, who tried to log on and who tried to access or
delete a file. Administrators choose which events to log.
Most of the audit records available to Windows are
turned off by default but can be turned on in
Administrative Tools > Local Security Policy.
In Windows Vista/7, these logs are inside a folder called Windows Logs
within Event Viewer, and in Windows XP they are directly within the Event
Viewer. By default, log files are given the .evtx extension and stored in
C:\windows\ system32\winevt\logs.
Figure 10.19 shows the Event Viewer opened in Windows 7. You can see
that Windows Logs is expanded in the left pane and the System log is
selected. The middle pane shows the events for the System log. By default,
the events are organised in the order in which they are recorded, but you
can reorganise them. For example, if you click the Level heading, it will
reorganise the display in alphabetical order, with Critical events list first,
then Error events, and so on.
Error
Critical
Success
audit
Failure audit
Description
A blue i in a white circle. Indicates successful activities
have occurred, such as a driver or service started.
Investigate for informational purposes.
A black exclamation mark ! in a yellow triangle.
Indicates issues that can impact system operations or
result in a more serious problem, such as when the
system runs low on disk space, or installation did not
complete or a service timed out. Investigate now and
again.
An exclamation mark ! in a red circle in Windows
Vista/7 (a white X in Windows XP). Indicates a failure
or corruption that can impact the functionality of an
application or the OS, such as service failed to start or
device conflicts. Investigate right away.
A white X inside a red circle. Indicates an
unrecoverable error that caused the application or
Windows to close unexpectedly. Critical events often
result in a STOP error or system reboot. Investigate
right away.
A gold key. Indicates that the security event was
successful, such as an account was successfully logged
on or off.
A gold lock. Indicates that the security event was
unsuccessful, possibly a security breach or a user typing
an incorrect password. Investigate right away.
An event will also have a date and time when the event took place, the
process or activity that logged the event (source), the username, computer
name, event ID, the name of the log where the event was recorded, data in
bytes and words and a description of the event.
You can find more information about a specific error by either typing in the
error code/event ID for the event or typing the description into Microsoft
Help and Support website: support.microsoft.com.
You can use the Find command on the Action menu and Filter command
on the View menu to find and filter particular errors or levels.
10.5.1.2 Log properties
Event logs are configured as circular logs by default in that they record
data until they reach a maximum size. New events will overwrite older
events. You can right-click any log and select Properties to set its maximum
size and set other options as shown in Figure 10.21.
Install the latest updates and drivers, which can help improve
performance.
Make sure there is enough disk space and RAM.
If the drive containing the page file and temporary files is nearly full or
badly fragmented, use disk cleanup to remove unwanted files, check the
drive for errors and defragment it.
Move the page file and temporary files to a second drive if available.
Make sure virtual memory is enabled.
A malware-infected system can slow the system down. Scan it using
anti-virus software.
Anti-virus software can affect performance. Try disabling scanning
temporarily or schedule scans to run when the system is not used.
Do not run more applications than the system can handle and close
some open applications if you need to; otherwise add more resources to
the system.
Check task manager for high CPU and RAM usage. Check with the
software vendor for known problems.
If a service critical to Windows does not start, the OS will tell you with
an error message as soon as it happens. If a service that is less than
critical to Windows fails to start, the OS usually waits until you run a
program that needs that service before it shows the message.
A good place to check for problems with services is the System log in
the Event Viewer.
Another good place to check is the Services console. Make sure that the
Startup Type for the service is set to Automatic so that it starts
automatically; otherwise set it to Manual if the service becomes stuck
and fails to run at startup or Automatic (delayed start) if the service
does not have to start immediately but only after every other service
has started at boot.
A service might not start when the hardware used by the service is not
available. For example, a wireless network configuration will not work if
a wireless adapter is not installed.
Some services depend on other services to run and if a service is not
running, it might prevent the other services that depend on it from
running or from working correctly. Investigate service dependencies in
the Services console.
Services must interact with the OS and network and must have the
appropriate account permissions to do so. Make sure the service is
associated with a valid user or system account and the password for the
account is correct.
For a critical Windows service failure, check system files and scan the
disk for errors and malware.
For an application service failure, use the Properties box for the service
in the Services console to find the path and filename to the executable
program. Then use Windows Explorer to make sure the file is not
missing or corrupt. Also try reinstalling the application that uses the
service.
You might be able to re-register the software component that the
service relies on by using the regsvr32 command.
Check msconfig to see if the service is disabled. Sometimes software
uninstall routines leave behind registry entries and startup shortcuts
called orphans, which can appear as blank entries in the Startup tab of
msconfig. Use msconfig and regedit to look for and manually remove
orphaned items properly.
If you enable or disable a service and you encounter a problem starting
the system, you can boot in Safe Mode and change the service
configuration or restore the default configuration.
regsvr32 file_name.dll
regsvr32 /u file_name.dll
Note
If you need to troubleshoot OLEs such DLL files or ActiveX (.ocx) controls
(for example, ones that work with Internet Explorer), they can also be
manipulated with the regsvr32 command.
Note
Indicator light: tells you the state of the component (e.g. has power
and switched on, is reading/writing data, sending packets; or does not
have power). For example:
o Hard drive: if its light flickers periodically, it indicates normal
read/write activity. If the light is solid for long periods (without
flickering), it might indicate a problem (especially if no processing is
going on).
o Network adapter: it can have one or more lights to indicate network
activity and other information such as connection speed.
Overheating: Make sure the fans on a hot system are working properly
and not clogged with dirt or dust. Burning smells or other odours or
smoke indicate something is overheating often to a point where it is too
late to save the component. Shut down the system and unplug it
immediately and investigate. Check the vendor documentation to see if
the system is working within acceptable limits. Heat problems can cause
symptoms like spontaneous reboots, bluescreens, lockups and so on.
These symptoms will typically be cyclic in that if you turn off the
system, let it cool down, turn it back on again and let it run long
enough to build up heat, the symptom reappears.
A hard disk that makes a whirring whine when first spinning up and a
chattering noise when written to are normal sounds, but clicking,
squealing, loud noises, or continual noises can all point to a problem.
Newer drive models make very little noise. You might be able to
optimise disk performance in CMOS Setup to reduce noise.
Dead system: problems with the AC wall outlet, AC power to the power
supply, power cables and connections, power supply failure or
misconfiguration, or other component failure or other component
causing a short circuit.
Overheating: power supply is overloaded with devices drawing too
much power (in watts), fans inside power supply have failed, inadequate
airflow outside or inside the system and dirt and dust.
Random or spontaneous reboots: due to incorrect voltage on the
power good line between the power supply and motherboard.
Loud noises: a whirring, rattling or thumping noise from the power
supply while the system is running indicates a power supply fan failure.
A loud bang, followed by a system crash indicates a blown capacitor and
will give off a burnt smell. In either case, replace the power supply
immediately.
Fuse failure: the fuse can fail due to an overload or due to the power
supply failing. If the power supply simply pops and stops working, it is a
blown fuse. The proper course of action is to replace the power supply.
You can test the fuse, but do not attempt to replace it. It is likely that
the power supply is faulty if the fuse is blown.
Fan failure: the fan inside the power supply can fail for various
reasons, it could be due to the fact that the power supply is old,
extremely clogged with dirt, or the fan was of a cheaper design. The
course of action is to replace the power supply.
Broken power switch: sometimes a faulty PC power switch prevents
the power supply from starting. The power switch is behind the on/off
button on every computer. To test, make sure it is plugged in and try
shorting the soft power jumpers using a key or screwdriver.
You can try the following tests to isolate the cause to power:
If the lights on the front panel are off and you cannot hear the fans or hard
drives spinning, the computer is not getting power. This is likely due to a
power switch, connection to the motherboard, power supply problem,
power coming from the AC outlet, power cables/connectors, or fuses. Try
the following tests to determine what the cause is:
1. Check if every other equipment in the area is working. There may be a
blackout.
2. With no power to the computer, make sure the power supply is
connected to the motherboard.
3. Make sure the power supply cable is plugged into the computer and the
wall outlet correctly and the wall outlet and power supply switch is on.
If connected to a surge protector, make sure it is turned on and works.
4. Swap the power cable with a known good cable. There might be a
problem with its plug or a fuse. Use a multimeter to check the fuse
resistance.
5. Test the wall outlet by plugging in another piece of known good
equipment such as a lamp. If the lamp does not turn on, get an
electrician in to investigate the faulty wall outlet.
6. Disconnect extra devices, such as optical drives. If this solves the
problem, the power supply is underpowered and overloaded and you
will need to get one with a higher wattage to meet the demand.
Power supplies can die suddenly with the computer failing to start and the
power supply fan not turning. This can be caused by anything from an
electrical spike to hardware malfunction. When the power supply dies
slowly over time, it typically means that the internal circuitry of the power
supply has begun to fail. A slow death can result in intermittent errors, or
frequent failure of hard drives and other devices and it could be tough to
troubleshoot.
Some clues to intermittent errors that point to the power supply include
when users say things like Sometimes when I start the computer I get an
error code. If I reboot, it goes away. Sometimes I get different errors, or
my computer will run fine for an hour or so and then it locks up,
sometimes once or twice an hour. Begin troubleshooting intermittent
errors by swapping out the power supply with a known good one and boot
the computer and watch it for a while to see if the same errors occur.
10.6.2.1 Testing power
When troubleshooting power supplies, your best tools are a known good
backup power supply, a power supply tester, a multimeter and your eyes
and ears.
A multimeter is used to measure DC voltages (VDC) to determine if the
power supply is working correctly and AC voltages (VAC) to determine if
the wall outlet is supplying the correct AC voltage.
It is also used to measure continuity to test if electricity flows from one end
of the cable to another and resistance (Ohms) to determine if a fuse or
network cable is working properly amongst other electrical tests. The meter
will have two test leads, a black and a red. Most meters are digital (DMM),
often also referred to as a volt-ohm meter (VOM), and have an LED or LCD
screen for readouts. Keep note of the following points when using a
multimeter:
Check leads before using them. Do not use leads with broken probes or
damaged insulation. Hold both leads by the plastic handles; never touch
the metal probes with your hands when connected to an energised
circuit. Never touch the probes together when testing an energised
circuit. You can measure the voltage only when the power is on and
supplying voltage to the system. Therefore, do not touch anything within
the computer except the connector and multimeter when testing. Do not
touch components with your hands or with the multimeter probes.
Remove jewellery when testing to avoid shocks. Turn off the power
supply immediately if there are any unusual sights, smells or noises.
If possible, connect the meter before powering up and power down
before removing the meter.
When measuring voltages, always connect the black lead to the COM or
REF (ground pin or terminal) and connect the red lead to the power
source (pin or terminal to be tested). Examine the markings around the
terminal as there might be more than one terminal for the red lead.
Digital multimeters might only have one setting for each AC and DC
measurement while autoranging meters can automatically adjust to the
correct range for the test selected and the voltage present.
Make sure you set the switch on the multimeter to the highest value or
range that will be tested to avoid damage. If you set it at a low voltage,
such as 5V, and then measure 12V, you might damage the meter.
Make sure the leads are connected to the correct terminals and all
switches are set to the correct position before taking measurements.
Do not adjust switch settings on the meter while it is on and connected
to an energised circuit; it could damage the meter.
Note
AC voltage
(wall outlet)
Multimeter
setting
AC
Probe
position
How to test
Red to live.
Black to
ground.
DC voltage
(PSU outputs to
motherboard,
drives)
Resistance
(fuse)
DC
Red to live.
Black to
ground.
Ohms
Touch the
probes to
both ends of
fuse.
Continuity
(cables, CONT
fuses)
CONT
Touch red
lead on one
end and
black lead
on other end
of the cable.
Figure 10.30 shows the usage and voltages for the various power supply
connectors and the pin-outs for an ATX 24-pin P1 motherboard connector.
To test an AC adapter:
1. Turn off the AC adapter.
2. Set the multimeter to use the appropriate voltage range.
3. Insert the red probe into the middle of the DC jack. Do not push the
probe too far into the jack. Shorting the jack will damage the adapter.
4. Turn on the multimeter.
5. Turn on the AC adapter.
6. Touch the black probe to the metal part outside the DC jack.
Note
When power supplies fail, you can sometimes see smoke or smell
burning components or hear sparks. In this case remove the power
immediately.
Most power supplies will not supply voltages unless they are plugged into a
component. If you need to test a power supply but do not have a
motherboard, you use a power supply tester as shown in Figure 10.32 to
do so. A power supply tester can test an unconnected power supply, but
not one that is plugged into a system.
POST finds the video card BIOS. If found, the video card starts from its
own BIOS and passes control over to it and information from the card
manufacturer might be shown on screen.
The BIOS logo screen might appear (if supported and configured).
The startup screen appears showing tests done on the system including
a count on the amount of RAM. If any errors are picked up here, a
number code on older systems or descriptive text message such as key
stuck on newer systems might be shown on screen. You should be able
to access CMOS Setup at this point using the appropriate key/key
combination determined by the BIOS manufacturer.
Some systems indicate that system checks have completed successfully
with one or two short beeps, but modern systems tend to be boot
silently.
Search for other devices with ROM BIOS chips and ensure that checks
have been done.
The BIOS might display a summary screen about system configuration
that can be paused using the <Pause> key.
The OS load sequence starts.
Note
POST also ensures that the CPU and system timer are both
running, the keyboard is working and that BIOS is not corrupt.
Problems that occur during the POST are usually caused by incorrect
hardware configuration or installation.
10.6.3.1 POST not running
If the computer has power and its fans are spinning, but it does not start or
its screen is blank and there are no beeps from its speaker (assuming that
it is connected), then it is likely that POST is not executing. The most likely
cause is a faulty cable or a damaged CPU or a CPU that is not seated
properly. You can troubleshoot this by going through the following tests
and solutions:
Ask what has changed before the problem occurred. A recent BIOS
update may have failed and resulted in the system failing to boot.
Recover from BIOS update failure.
Check cabling and connections and reseat adapter cards before
rebooting the system.
Check for faulty connectors and devices that stop POST from executing.
Remove one device at a time or all non-essential devices and add them
back one-by-one.
Use a POST card. See Figure 10.33. Plug the POST card into a PCIe
expansion slot and watch its LED display run through a series of twodigit hexadecimal codes as the system starts. If 00 or FF is shown on
the cards display after the system finishes booting, everything is
probably OK; otherwise any other number indicates a problem that can
be cross-referenced in the accompanying booklet, disc or online
documentation. The card is very useful when there is a blank display.
Check for a faulty CPU or BIOS and replace the CPU or BIOS chip if
necessary.
For motherboards that have jumpers to configure modes such as BIOS
recovery and password settings, make sure the jumpers are configured
correctly.
Beep code
The beep code is heard through the speaker attached to the motherboard.
An error is often indicated by a series of beeps. However, POST cannot
entirely rely on showing a message on screen because it might find a
video-related error that causes a blank screen. Therefore the error must
become evident through beeps.
The POST routine is in the BIOS and there are many different types of BIOS
and many versions of beep codes and the BIOS vendor determines what
the BIOS code means. You can find meaning of the code in the
motherboard documentation or at the manufacturer website, although it
not always possible to list what every POST beep code means. The
following are a few examples of what you might hear:
If the computer is losing the correct time or resets the time to January, and
displaying these kinds of CMOS errors, it most likely means that it is time
to replace the CMOS battery with a new one and re-enter the CMOS
parameters into CMOS Setup. Here are a few more examples of errors that
point to lost CMOS information:
Note
Problems with BIOS Time and Setting resets are typically caused
by a problem with the CMOS battery or CMOS chip itself. If
replacing the battery with a new one and resetting BIOS settings
to their correct values does not solve the problem, the CMOS chip
on the motherboard might be damaged, which means the
motherboard itself will have to be replaced.
If the message is unclear or the issue is unknown, you can find its meaning
in the motherboard manual, BIOS vendors website, third-party website or
performing an online search.
(Hex) error code
A hexadecimal (also called a numeric or POST code) is sent through an I/O
port address and shown onscreen after the video adapter is initialised.
Older systems displayed cryptic codes such as Error 301 to indicate a stuck
key on the keyboard. You will rarely see messages with just an error code
today. Instead, if a key is stuck, you will see a display indicating that a key
is stuck. If you have to, you can monitor these codes using a POST card.
10.6.3.3 OS search
Once POST has finished testing the system:
Speed: check the voltage and timings settings in CMOS Setup and make
sure the CPU is running at the correct speed. The CPU should not run at a
higher clock speed, which can cause it to overheat.
Environment: make sure the room is not too hot or dusty or the system is
near hot equipment such as radiators or placed in direct sunlight.
Note
The following are some possible causes and symptoms related to RAM
problems:
Tip
The power supply and RAM are the primary hardware causes of
intermittent problems while malware is the primary software cause
of intermittent problems.
more
You can either run the tool from Administrative Tools or boot to Windows
PE and select Windows Memory Diagnostic. Select Restart now and
check for problems. After the system restarts, the tests will start
automatically and you will see a display similar to Figure 10.34. By default,
two passes of the standard test mix are run and this is usually good
enough.
Although these programs can help you determine whether a module needs
to be replaced, in general, use your common sense. For a large number of
modules, a more expensive RAM tester can provide a more accurate way
of finding RAM problems.
Make sure the card is compatible, installed properly and given power
and shows up in Device Manager without any errors. Also, make sure its
contacts are clean.
If the card stops working or does not show up in Device Manager, try
reinstalling the driver before checking seating or dirt.
If the card comes with diagnostic software, run it.
You can also run a loopback test that sends data out of the cards
output port and checks to see if it comes (loops) back into its input
port. This can be done by plugging in a loopback plug into the port
and using the diagnostic program that comes with the plug to perform
the test. If the card is bad, replace it.
If Device Manager does not recognise the card, test it on another
system and if it still does not work, the card itself might be damaged
and must therefore be replaced.
The Power tab shows the power usage only for a given moment, so
click the Refresh button to keep getting accurate readings.
There is another issue with USB power: when the system places the device
into a sleep state to save power and it does not wake up. This is noticeable
when accessing a USB device that was working earlier on but suddenly no
longer appears in Device Manager. To fix this, open Device Manager and
then open hubs Properties page, click the Power Management tab and
uncheck the Allow the computer to turn off this device to save power
checkbox.
For problems where devices such as network adapters and mouses
periodically wake up the computer or fail to work after the computer has
been in sleep mode, you can deselect the Allow this device to wake up
the computer in Windows Vista/7 or Allow this device to bring the
computer out of standby in Windows XP option on this tab. If that fixes
the problem, look for an updated device driver or system chipset driver.
You can get USB loopback plugs with software that tests, among other
things, to see if the USB port has power, that data can be sent and
received from the port, USB error rates and speeds and USB cabling. See
Figure 10.37.
Noise: A healthy disk generally makes a quiet, low-level noise when its
platters are accessed. Any loud, grinding or clicking noise indicates a
problem. Make a backup and replace the drive immediately.
Failure to boot: Boot failures can have several causes, including that
the hard drive is not a boot device, there is no active partition or the
boot files are missing. Other causes, and their symptoms and solutions
include:
o No detection at boot: SATA, SSD, PATA or SCSI drive-detection
problems include power, cabling, BIOS settings or drive failure. Check
this. If the LED is inactive or you suspect it might be faulty, listen to
the drive to hear if it spins. If it does not spin, it might be faulty.
o If the drive has power, check the following configuration:
CMOS boot order: Set hard disk as either first boot device or the
second after the optical drive.
CMOS settings are corrupt and system cannot find bootable
drive: Configure CMOS settings, make hard drive as first boot
device and restart system. Replace CMOS battery if the settings
continue to be corrupted.
Cables and connections: check for loose or damaged data cables
and incorrect drive-to-motherboard connection.
PATA drive: check master/slave/cable select jumper settings, the
position of master and slave drives on the cable and drive-tomotherboard connection.
SCSI drive: make sure the host adapter driver is working and ID
numbers and termination are set up correctly.
Motherboard jumper or CMOS setting: if the drive is connected
to a motherboard port, make sure it is not disabled by a jumper or
CMOS setting.
o If the hard drive is detected by POST but not by Windows,
check the following:
OS Not found: this error most probably means there is a
problem with the file system or OS loader code.
In Windows XP, boot in the recovery console and type C:. If an
invalid media type error is shown, it means the disk does not
have a valid file system structure or has not been formatted,
possibly because of a surface error or a virus. Use fixmbr or
fixboot tools to recover; otherwise reformat the disk.
In Windows XP/Vista/7, boot into the recovery command prompt
and type C:. If an Invalid drive specification error is shown, it
might mean that the MBR record is damaged or the active
partition is missing or corrupted, possibly by a virus. Use
diskpart to check the partition structure and the fixmbr or
fixboot commands in Windows XP and bootrec /fixboot and
bootec/fixmbr commands in Windows Vista/7 to repair the boot
sector and master boot record. Failing to format a drive makes
the drive unable to hold data. Accessing the drive in Windows
results in a drive is not accessible error.
Slow performance: if the system overuses the disk for paging, it will
slow down. The solution is to add more RAM instead of replacing the
disk. Other causes and solutions to a disks slow performance include:
o Fragmentation: causes the drive to work harder to retrieve file
pieces scattered throughout the disk. Use defrag to defragment the
drive
o Low disk capacity: caused by a drive that does not have enough
free space (at least 10 percent). System performance is affected
badly as the space is filled up. Use Disk Cleanup to remove files and
manually remove or move files and uninstall applications.
RAID disks not recognized: If you are using hardware RAID and the
configuration firmware tool does not recognise any disk, first check to
make sure it is powered and connected properly.
RAID not found: It could be that the controller drivers are not
installed, the existing array has stopped working and does not appear in
the RAID configuration tool because of faulty disks or controllers that
must be replaced or the power or data cables are disconnected. It could
also indicate the RAID function is disabled in BIOS or a conflict between
the motherboard built-in RAID function and the RAID adapter card or
external enclosure exists and the function in the motherboard BIOS
should be disabled.
RAID Stops Working: If one disk in RAID 0 fails, the array will stop
working and you will have to replace the disk, rebuild the array using
the vendors recommendation and restore the data from a backup. Other
RAID arrays (1, 5 and 10) have built-in redundancy, so if one disk fails,
the volume will be listed as degraded in the Configuration tool or
Missing, Failed or another error in Disk Management (if dynamic disks
are used for Software-RAID) but the data on the volume should still be
accessible. Figure 10.38 shows a boot message indicating a problem
with RAID (on the left) and the RAID configuration tool indicating the
volume is missing one disk (on the right).
If a controller has failed, then you should be able to recover the data on
the volume, though files might be corrupted if the failure interrupted the
write operation. Either install a new controller or install the disks into
another system.
Note
The process for managing a disk failure depends on the RAID vendor. All
controllers can generate an event in the OS System log and perhaps
alert the administrator with a message. If the array supports hot
swapping, then you can simply remove the faulty disk and insert a new
one and configure it using the RAID configuration tool (if using a
hardware-RAID controller) or Disk Management (if using dynamic disks
for software-RAID). Rebuilding affects performance as the controller
might have to write multiple gigabytes of data to the new disk.
Figure 10.39 shows Disk Management indicating a failed RAID 1 array as
a result of one disk failure.
Missing colour: check the video cable for breaks and the connectors for
bent pins. A bad cable might not support higher resolutions. Check the
monitor controls for the colour. If the colour adjustment has already
reached the maximum, the monitor will require an internal service by an
authorised repair centre.
Flickering image: caused by a loose cable, power issue or a mismatch
between a high resolution and a low refresh rate. Check the cable, power
cycle the device or increase the refresh rate to 72 Hz or higher to support
the needed resolution or lower the resolution. This is not a problem for LCD
monitors.
Video playback does not work: lower or disable the hardware
accelerator using the slider on the Troubleshoot tab in the Advanced
Properties and if this works, check for an updated display driver.
Distorted image on CRT: In the case that the resolution is set too high,
or to a resolution not supported by the monitor, you might get a distorted
image or no image at all. Check resolution settings in safe mode and use
the monitors onscreen picture display (OSD) controls to change the
geometry (image size and shape issues). See Figure 10.41.
With more advanced video cards, you might need to re-install the driver
programs in Control Panel, so always check there first before you try
deleting a driver using Device Manager. Download the latest driver and
reinstall.
Bad Pixels: A pixel on an LCD monitor that never lights up (stays black) is
a dead pixel while a pixel that is stuck (constantly bright) on a specific
colour such as white is a stuck pixel. There are software programs such as
LCD Repair, UDPixel and Monitor Test that you can use to identify stuck
pixels and possible dead pixels and attempt to reactivate them. Always try
power cycling the device as well. If you cannot repair the stuck or dead
pixel, find out from the vendor if the warranty covers replacing it;
otherwise, the monitor will need to be replaced.
Artifacts: artifacts (image distortions) are simply drawing errors. For
example, you might see horizontal or vertical black lines or wide bars with
distorted colours on screen or a repeating pattern of small bars or
rectangles over the entire screen or wavy vertical lines equally spaced
across the screen. There are a few things you can do:
BSOD
In some cases, a faulty driver or faulty video card can result in a serious
stop error in Windows. Restart the system into safe mode, and then use
Device Manager to install the correct driver.
High-end video cards are intensely used by gamers and designers. If the
temperature is high, it might cause the card to throttle back the GPU
speed, or the video card might stop working altogether, causing the current
application to close, the display to show a STOP error, or the display could
go blank. Also overheating can cause the system to shut down. Consider
additional cooling fans or a liquid cooling system if this happens more than
once or twice.
10.6.13
Check if the battery is fully inserted into the battery compartment and
locked into place.
Batteries can be recharged or cycled by the laptop so many times
before failing. After several years, the battery will not hold a charge any
longer and fail or will lose charge quickly. The system will work with AC
power without any problem but will not work while on battery power.
The solution is to replace the battery with a known good battery.
Alternatively, remove the battery and run the laptop on AC only. If that
works, you know the AC adapter is good. If it does not, replace the AC
adapter.
Video cable
Inverter
Backlight
bulb
No image: make sure the laptop is on, the cut-off switch or plastic pin
near the screen hinge that shuts off the display is not stuck and the
display has not been disabled by using a function key. Press the <Fn>
key and the other key to activate the screen a number of times until the
laptop display comes on. You can also plug in a second monitor and
view the display by toggling the display function key and configuring the
dual-monitor display settings from within the OS. If you cannot see a
display on either display, the video card or the motherboards video
capability has probably failed. If you can view the display on the second
monitor but not the laptops display, it is very likely the LCD screen is
disconnected or has failed and will need to be replaced.
Dim image: On traditional LCD displays, the problem might be due to a
failed inverter/ backlight or the power management settings in Windows
or CMOS Setup. If the problem is not with the power management
settings, then replace the backlight and/or inverter. LED displays do not
use inverters, but the backlight can fail, resulting in a dim image.
Reddish/pinkish hue to the screen or loss of colour: indicates the
possibility of a worn out backlight. Replace the backlight.
Note
If the wireless does not work at all, check along the front, back or side
edges of the laptop for a physical switch that turns the internal wireless
adapter or Bluetooth adapter on and off.
Try the special key combination for your laptop to turn the wireless or
Bluetooth adapter on or off. You usually press the <Fn>key in
combination with another key.
No wireless or intermittent connectivity often indicates interference with
the signal. Therefore, find what is causing the interference and remove
it.
The laptop might simply be out of range or, if the wireless works
intermittently, then right at the edge of the range. Physically move the
laptop closer to the wireless router or AP to ensure there are no out-ofrange issues. If this is not possible, you might be able to boost the
power output of the wireless access point, adjust the antenna position or
move the AP.
If the system has been worked on recently, it is possible that the
connections to the wireless card are loose. You can open the system to
verify that the wires are secured to the wireless card and the antenna
built-into the display is not disconnected.
It is also possible that the wireless card has failed. If so, you will need to
replace it. Alternatively, you can buy a USB wireless dongle that can be
used to connect to a wireless network.
If a user does not have any Bluetooth connectivity, you can follow the
same procedures you used for no wireless connectivity. Just remember
that you will need to pair Bluetooth devices and configure them to work
together.
Study
Notes
Notes
Most of the other parameters on this tab can be left to their default setting.
On some occasions, you might have to go to this tab and enable/disable or
change a parameter to improve performance or troubleshoot a connectivity
problem.
Transmit power refers to the power at which the adapter sends its
signals out, which determines the radio coverage range. The optimal
setting is to set the transmit power at the lowest possible level that is
still compatible with your required signal quality and within the
countrys power output laws. Match the clients radio power level to the
AP to ensure that both of them can send and receive signals.
In case that a computer being awakened is communicating via WiFi, a standard called Wake on Wireless LAN (WoWLAN) can be
used, so long as the wireless chipset supports this standard.
QoS focuses on dealing with the following different types of problems that
can affect data on a network:
Every device, including network adapters, switches and routers, along the
path from the sender to the destination that prioritised traffic must pass
through must support QoS, otherwise the traffic flow receives the standard
first-come, first-serve treatment from network devices.
To configure Windows to provide QoS for applications, you first verify that
the QoS Packet Scheduler for the adapters local network connection is
enabled (as shown in the dialog box on the left in Figure 11.4), which acts
as a traffic cop by allowing you to control the rate of flow and prioritisation
of traffic, and then you must enable QoS for the network adapter and set
the QoS level for applications. This can be done on the Advanced tab in
the Properties of the network adapter, as shown in the dialog box on the
right in Figure 11.4. Click Configure to access the adapters Properties
page.
If a QoS option is not listed, the adapter does not support QoS
The process is different depending on what device you are configuring the
IP address for. Network printers usually have a menu-driven interface or a
web interface that you can use. Operating systems allow you to configure
the properties of the network adapter and routers can be configured via a
command line or web interface.
On Windows Vista:
1. Click Start and type Network and Sharing Center in the Start Search
text box.
2. Select Network And Sharing Center. Alternatively, you can open the
Control Panel and select the Network And Sharing Center from the
Network And Internet category.
3. On the left pane, click Manage Network Connections. You will now
see a list of available network adapters on the system.
On Windows XP:
1. Click Start > Control Panel.
2. In Category View, select Network And Internet Connections >
Network Connections. Otherwise, in Classic View, select Network
Connections. You will now see a list of available network adapters on
the system.
Note
1. After you have accessed the network adapter, you can change its
properties by right-clicking its connection and select Properties. The
Local Area Connection Properties dialog box for the network adapter
appears, as shown in Figure 11.7. This step is for Windows 7, but it is
the same for other Windows systems.
You can click the Install button to add a protocol, network client, or
service that is not listed. You may be asked to insert the Windows disc.
If you do have a router and DNS Server on your network, enter the routers
IP address in the Default gateway field and the DNS Servers IP address in
the Preferred DNS server field; otherwise, these two fields can be left
blank.
When you are finished, your dialog box should look like the one shown on
the right in Figure 11.8.
DHCP
Manual or Static
If you have other computers connected to this one, try configuring their IP
addresses in the same way. Remember, the host part of the IP address
must be unique and go up a number once for each computer: .1, .2, .3
and so on. For example, the second computer could have the IP address of
192.168.1.2 and the same subnet mask of 255.255.255.0.
3. Click OK. Then, in the Local Area Connection Properties dialog box, click
OK. This will complete and bind the IPv4 configuration to the network
adapter.
Test your configuration. There are two basic ways of doing this, first with
the ipconfig command which displays information about your TCP/IP
address configuration, and second with the ping command to make sure
that the computers on the network can contact each other.
5. Ping another computer on the network that is also running IPv6. You
can run the ipconfig command on that other computer to find out what
its IPv6 address is. Then you can ping its IPv6 link-local address from
your computer. For example, ping the IPv6 address from the command
prompt as follows:
ping fe80::6c48:7529:9257:a2a2%11
6. The exact IP address will be different depending on what computer you
ping. Your results should look similar to Figure 11.14.
or
ping
-6
ping
This is an example of how to ping a host on the Internet and the IPv6
address will most likely be different. If you cannot ping a hosts IPv6
address, you can simply look at your results from the output of the ping
domain name command to find out the hosts IP address.
k) The address you just added should show up in the IPv6 Address field.
This is usually just above the Link-local IPv6 Address field. Also check
for the IPv6 gateway and DNS server addresses.
l) Verify connectivity to another IPv6 host. For example, this can be
done by running the following command at the command prompt:
ping 6 2001:ab1:442e:1323::2
You should get replies. If not, check the configuration of both
computers.
m) Reset the GUI IPv6 Properties dialog box by selecting Obtain an
IPv6 address automatically radio button.
n) If you wish, run an ipconfig to find out your auto-assigned address
and another computers address. Try pinging those addresses as well.
o) Close all open windows.
Globe
Meaning
A red X on the icon means no connectivity.
A yellow warning on the icon indicates a connectivity or
configuration issue (or indicates successful local
connectivity which has only computers). Sometimes
Windows takes a moment to resolve the problem
automatically, after which the warning disappears.
A globe indicates successful Internet connectivity or
connection to multiple networks. The Globe is available in
Windows Vista.
Windows can give you this information and other details about your
network and Internet connection. One way to find this information is as
follows:
A wireless adapter will be used for this example, but the same steps can be
applied to a cabled network adapter:
1. Right-click on the network icon in the notification area and choose
Open Network and Sharing Center.
2. Click Change adapter settings. The Network Connections window
appears, listing the connections for all the network adapters installed on
your computer.
a) A cabled network adapter connection is usually called Local Area
Connection, so you would right-click on that and choose Status.
The Status dialog box appears for that connection.
b) A wireless network adapter connection is usually called Wireless
Network Connection, so you would right-click on that connection
and choose Status to open its Status dialog box.
c) A broadband network adapter connection is called Broadband
Connection, Mobile Broadband Connection or something similar,
so you would right-click on that connection and choose Status to
open its Status dialog box.
Figure 11.18 below shows the Status dialog box for a mobile broadband
connection, which shows the state of the Internet connection, how long the
connection has been running, the theoretical maximum speed, number of
bytes sent and received and some other information. If this was a wireless
adapter, it would also show the network's SSID name and the connection's
current signal strength.
To refresh the list of available networks, click the Refresh icon located
at the upper-right side. Figure 11.20 shows a list of dial-up, VPN and
wireless connections.
If Windows 7 has not detected any connections and you know for a
fact that there should be at least one wireless network available in
your area, you should check whether your wireless network
adapter has the appropriate drivers installed and that it is enabled.
2. If you hover your mouse cursor over one of the available wireless
network icons, you will see more details about it, including: the network
name, signal strength, the type of wireless security used (if any), and
its SSID. See Figure 11.21.
3. Once you decide which network to connect to, click it and then click
Connect. See Figure 11.22.
4. After a few seconds, you will be asked to enter the security key. Enter
the network security key or, if you have connected to your own home
network, take it from the router. See Figure 11.22.
Note
If security is not enabled on the wireless network, then you only need to
know its SSID.
Note
1. Open the Network and Sharing Center and then click Set Up a
Connection or Network.
2. The Set Up A Connection Or Network window opens. See Figure
11.24. From this window, can you set up for connections to the
Internet, set up a new network, manually connect to a wireless
network, set up a dial-up or VPN connection, and set up an Ad-hoc
wireless (computer-to-computer) network.
7. In the Encryption type field, if the wireless network is using WPA2Personal (WPA2-PSK(AES)) security, select AES. Otherwise, leave the
default value Windows 7 provides for you.
8. In the Security Key field, depending on the type of security used,
make the following selection:
For WEP, WPA Personal and WPA2 Personal, you will have to enter the
security key as follows:
12. Click OK to close the network properties window, then click Close to
end the Manually Connect to a Wireless Network wizard. When
done, Windows 7 automatically connects to the hidden wireless
network.
When you connect to the hidden wireless network for the first time, make
sure you assign it the correct network location.
13. The wireless icon on your taskbar shows your connection status and
how powerful the wireless signal is.
11.2.7.4 Configuring a client using vendor-supplied wireless
software
If you do not want to use the Wireless tools within Windows, you can use
the software that comes with the wireless adapter to connect to the
wireless network. Figure 11.27 shows a screenshot of a wireless
configuration wizard. As you can see, this tool provides the option to select
the network name, network type (ad hoc and infrastructure), and security.
The following sections describe them in more depth, but the distinguishing
points between the two are as follows:
Workgroups are typically for ten or fewer computers that share the
same network name. Users need an account on each computer to
access it.
In a domain, users have a single account that they can use to access
different domain computers and resources.
11.4.1 Workgroup
A peer-to-peer network, referred to as a workgroup in Windows, is one
in which every computer that participates in the workgroup can act as both
a client that asks for resources and a server that provides resources,
essentially making each computer equal or a peer. Each user is an
administrator in a sense and is responsible for configuring his or her
computer and sharing resources and deciding who should have access to
the shared files on the computer or the printer attached to it.
Each computer in the workgroup has a security account manager (SAM)
database that stores the usernames and passwords for all users that can
access the computer. Figure 11.28 shows a workgroup with two users and
a printer. Each computer includes a separate SAM. If Susan wants to log on
to her computer, she authenticates with a username and password
contained in the SAM on her computer. Her account on her own computer
will not allow her to log on to Danies computer, unless she has an account
stored on in the SAM on Danies computer. This means she would need two
usernames and two passwords: one to log on to her own computer and
another to log on to Danies computer.
3. You can use one account on all computers. Everyone logs on with the
same account, and then all shares are by default assigned to the same
account.
A workgroup is easy to set up, works well for a smaller home or office
networks with a few users, and does not cost too much because there is
not a dedicated server. However, it is unreliable and difficult to organise
and manage since a user could switch off their computer while someone
else is accessing it at the same time. Also, resources and administration
are not handled from a central place, but instead, every user is responsible
for sharing, securing and backing up their own resources.
11.4.2 Domain
A server-based or client/server network is made up of one or more
servers that are placed in a central place where resources can be stored,
shared and managed by the network administrator and provided to clients.
Common network administration tasks such as network security, backups
and monitoring can all be done on the server for the entire network. Larger
networks that need more control use domains. Opposite to the
decentralised nature of workgroups, a domain has a central server that
stores accounts used for authentication and is where access to network
resources can be controlled.
To use a domain on a network of Windows computers, you must have a
much more powerful computer running a version of the Windows Server
OS. When the administrator creates a domain on Windows Server, he or
she takes that stand-alone server running just the Server OS and makes
it a domain controller (DC). The DC stores a database of network
information including user, computer and group objects in Active
Directory.
Active Directory is similar to the SAM in that it includes user accounts, but
it also has many more capabilities, including the ability to authenticate
users that attempt to log on to the domain and authenticate and authorise
access to resources. The administrator creates new user accounts in Active
Directory. These accounts are called domain accounts. Once a network is
set up as a domain, each computer on the network needs to join the
domain (which removes each computer from the workgroup).
The most important point about a domain is that it provides centralised
authentication through the Kerberos authentication and authorisation
protocol and that Active Directory is centralised, scalable in that it can
continuously grow and is a secure network model.
Figure 11.31 shows a DC configured in a domain. Users log on to the
domain using one accounts username and password (single-sign on or
SSO), and they can use this account to access any domain resources they
have been authorised to access. Therefore, users do not need a different
account even if they log on to a different computer in the same domain.
A+ Preparation | V1.0 Jan 2014
4. From here you can set the computers name and join a workgroup or
domain by entering its name.
a) If you want to join a different workgroup, enter the name of the
workgroup and click OK. After a moment, you will see a message
welcoming you to the workgroup. Click OK, and you will be asked to
restart the computer. After restarting, the computer will be a member
of the workgroup and can log in as you normally do with your
username and password.
b) If you want to join a domain, select Domain and enter the name of
the domain, such as aplus.cti.ac.za. Click OK. You will be asked to
enter the username and password of an account that has permission
to join the domain (the domain administrator). Enter the name and
password, and click OK. After a moment, you will be asked to restart
the computer. Click OK. After restarting, the computer will be a
member of the domain. When you log on to a computer that is a
member of a domain, Windows will ask you for a username instead of
showing you icons for all the users on the network (see Figure
11.34).You can log into the domain using the logon format of
domain_name\domain_user_name
(for example, aplus.cti.ac.za\sibulelek).
Note
If the domain pearson.local has a user account called Thandi, for example,
you would use pearson. local\Thandi to log on.You can log on to the local
computer
while
joined
to
a
domain
using
the
format
of
local_computer_name\local_user_name.
To remove a computer from a domain, join an existing workgroup, or
create a new workgroup, you select the workgroup option and type in the
name of the workgroup and click OK. If you are removing yourself from the
domain, you will be asked for administrative credentials so that it can
delete the account from Active Directory. If you do not specify
administrative credentials, it will still remove the computer from the
domain, but the computer account will still remain within Active Directory.
Users can enter the UNC path from the command prompt, the Run
line, or the Search box in Windows 7.
UNC path names are not case-sensitive. You can view a listing of
all the shares available on a system by running the net share
command at the command prompt.
When you select Network, the choices on the menu ribbon change
to give you additional options. They include the Network And
Sharing Center, Add A Printer, and Add A Wireless Device
selections.
All versions of Windows share drives and folders in basically the same way.
Right-click any drive or folder and choose Properties. Select the Sharing
tab (see Figure 11.39). In Windows Vista/7, click the Advanced Sharing
button. Select Share this folder, add something in the Comment or User
limit fields if you wish (they are not required), and click Permissions (see
Figure 11.40).
Click the Add button in the Permissions dialog box shown in Figure 11.40
and add the users or groups you want to assign the appropriate permission
to the share.
Resource
This is created for each hard drive (C, D, E and so
on) on a system.
Location of printer drivers.
Location of Windows folder.
Manual shares if you choose not to use the wizard, and want to share a
folder yourself, right-click on the folder and select Share; then click the
Advanced Sharing button where you can share the folder and assign
permissions to the appropriate users and groups.
Vista allows you to define a network connection as Public or Private
(Home or Work).
Click
Click
Click
Click
Click
Click
To create a Homegroup:
1. Assuming that you are currently connected to a workgroup and are not
already joined to a Homegroup, click Start > Control Panel. If
necessary, change the view to Large Icons and select Homegroup.
2. Click the Create a Homegroup button. (Note: The network location
must be set to Home).
3. Select the resources that you want to share from your computer. See
Figure 11.46. Selecting any of these will share your library in that
category. You can also share printers configured on your computer.
Click Next.
To join a Homegroup:
If another user has created a Homegroup in your network, you can join it,
share your libraries, and access other users shared files.
1. Once you have created a Homegroup, go to another computer on the
network and open the HomeGroup Control Panel applet. If a
Homegroup exists, Windows will display Homegroup information and
ask you to join it. Click Join Now to join the Homegroup. See Figure
11.49.
Sharing more libraries is easy, and you can even share individual folders.
Just right-click on the library or folder and select Share with. Refer back
to Figure 11.43. Windows Explorer also adds a Share with toolbar button.
NTFS permissions are so called because you can only set NTFS
permissions on NTFS drives and not on FAT drives.
You can access NTFS permissions for any file, folder or drive by rightclicking on it, selecting Properties, and clicking the Security tab. This
shows the ACL for that file or folder. Figure 11.51 shows the ACL for a
folder called Study Notes on an NTFS drive along with the subjects (users
and groups) and their standard permissions. To edit the permissions, click
the Edit button to open the dialog box shown on the right in Figure 11.51.
An entry in the ACL is known as an access control entry (ACE) and it
either allows or denies a subject access to the object. When a subject
wants to access an object with an ACL, the OS first checks the ACL for the
appropriate entry for that subject to decide whether the access request is
authorised.
Note
Modify
Permission
Full Control
Deny
Permission
Read
Write
Read & Execute
Modify
Full Control
Deny
For instance, if you have Full Control on a folder and only Read permission
on a file in the folder, you get Full Control permission on the file.
You can determine what a users or groups effective permissions are by
opening the objects Properties dialog box, clicking on the Security tab,
clicking on the Advanced button to open the Advanced Security
Settings window and then clicking the Effective Permissions tab. See
Figure 11.52. From here, click on the Select button and enter the user or
groups name and click OK and then view the results under Effective
permissions in the Advanced Security Settings window.
When selected, each child object will have permissions inherited from its
parent object. When cleared, the permissions applied on the parent object
will no longer be applied to its child objects and you can then choose
whether to copy existing permissions or remove them.
When you combine applying Deny versus Allowed with explicit versus
inherited permissions, the priority of permissions is as follows:
1.
2.
3.
4.
Explicit Deny
Explicit Allow
Inherited Deny
Inherited Allow
When you move (drag and drop) the object on the same NTFS
volume, the object keeps its permissions, unchanged.
When you move an object from one NTFS volume to another NTFS
volume, the object in the new location inherits the permissions from
that new location.
When you move an object from an NTFS volume to a FAT volume,
the object in the new location has no permissions at all.
When you copy an object on the same NTFS volume, the object in
the original location keeps its permissions, unchanged, while the copy of
the object in the new location inherits the permissions from that new
location.
When you copy an object from one NTFS volume to another NTFS
volume, the object in the original location keeps its permissions,
unchanged, while the copy of the object in the new location inherits the
permissions from that new location.
When you copy an object from an NTFS volume to a FAT volume,
the object in the original location keeps its permissions, unchanged,
while the copy of the object in the new location has no permissions at
all.
Note
Share permissions can be accessed from the Sharing tab. Take note
of the following points about Share permissions:
o Shares are accessed only over a network and therefore can only
protect the share when it is accessed over the network.
o FAT volumes can only be protected by Share permissions.
o When a share is created, the Read permission is assigned by default.
The other two permissions available are Change (which allows users
to read and change files) and Full Control (which allows users to do
anything within the share). Only administrators should have Full
Control.
o Share permissions are cumulative. If a user is assigned Read and
Change permissions, the user has Change permissions, which
includes the Read permission and allows the user to both read and
perform actions associated with the Change permission. The
permissions do not cancel each other out. The exception is with the
Deny share permission, which overrides any Allow share permissions.
When you access a file within a share that is on an NTFS drive, both the
NTFS and the Share permissions apply. In this case, the permissions are
not cumulative. Combining NTFS and Share permissions is often described
as using the least restrictive and most restrictive permissions and works as
follows:
Note
Open the Sync Center applet and click on the View sync conflicts link on
the left pane to list all the files that did not sync. To resolve the conflict,
right-click on the file and select View options to resolve. The options
include: keep the version that you edited offline, keep the version on the
server that someone else edited online while you were offline, or keep both
versions and rename the one that you edited. See Figure 11.59.
General tab here you can set or delete credentials (username and
password), save all the current settings as a desktop icon, which makes
it faster to reconnect later.
Display tab use the options on this tab to specify the size (resolution)
of the other computers display.
Local Resources tab here you can set up local peripherals and addons so they behave as though they were connected to the computer you
are using. You can also set up key combinations that affect the local
computer or the remote computer.
Programs tab here you can set up a certain program to run
automatically as soon as you connect to the host computer.
Experience tab here you can tell Windows the speed of your
connection, so it can limit visual effects that slow down the connection.
This affects bitmap caching and video options.
Advanced tab here you can control whether Remote Desktop
Connection warns you if it cannot verify the identity of a computer, and
also whether to connect through a special gateway server (set up by the
network administrator).
There are two options to choose from if you want help from others:
You can create an invitation and invite your helper using an invitation
file or by sending the invitation via email.
Use Easy Connect. Easy Connect is the easiest method which just needs
you to create a password which can then be shared with your helper to
connect to your computer. The helper would use this password to
connect to your remote session. The great thing about Easy Connect is
that if you have used it before, you can just follow the generic steps
below and select your helpers technicians contact name. To invite
someone who is not on your contact list, click Invite someone to help
you.
5. You need to save your invitation file if you choose this invitation method
and send the invitation file to the helper along with the session
password. See Figure 11.64.
Note
Make sure that port 3389 is open on firewalls and routers between
both hosts on a network. Otherwise, RDP traffic will be blocked.
The SOHO router usually acts as a DHCP client and a DHCP server. The
WAN port connected to the ISP is configured as a DHCP client, and it
receives TCP/IP configuration from the ISP. This includes a public IP
address. As a DHCP server, the SOHO router provides internal clients with
private IP addresses. It will also provide these internal clients with the
address of the DNS server provided by the ISP.
Note
In Figure 11.69, you can see that a firewall separates the internal network
from the Internet to block or allow certain traffic. The figure also shows a
file server and other users on the internal network. If users can access
these resources while connected inside the company, they can usually
access them through the VPN.
The P in VPN stands for private, which is the purpose of creating the
tunnel. The data that travels through the tunnel from one end to the other
is encrypted using encryption protocols.
Several types of VPN tunnelling protocols are in use. A tunnelling
protocol provides a secure path between insecure networks and is used as
a means to transport multiple, dissimilar network protocols using the same
transport mechanism. Two common protocols include:
Point to Point Tunnelling Protocol (PPTP) creates a secure tunnel
through the Internet back to the private network. The client takes on an IP
address of that private network, as if the computer were plugged into that
network.
Layer Two Tunnelling Protocol (L2TP) uses Internet Protocol
security (IPsec) to encrypt and authenticate IP packets in the tunnel.
You can use the following steps to create a VPN connection on a Windows 7
computer:
1.
2.
3.
4.
A DSL router. Your DSL device can be Ethernet, DSL or both. You can
also plug a DSL modem into your network router.
Filter also called a micro-filters or splitter, it is a small, rectangular
box that has phone connections on both ends and is used to separate
split the voice and data signals sent through phone lines, ensuring that
neither signal interferes with the other.
Information from your ISP. For most installations, you can assume that
IP addressing information will automatically be provided by the ISPs
DHCP server. However, if static IP addressing is used, you will need to
find out from your ISP what the IP address for your DSL modem is, the
IP address of one or more of your ISPs DNS servers, the subnet mask
or prefix, the IP address of the default gateway and the protocol, such
as PPPoA or PPPoE that you must use to communicate over the
Internet.
The DSL routers setup disc. The device might be configured through a
web-based program, and in this case, make sure you have the manual
at hand. Read the manual for specific instructions. If you do not have
the setup disc, you should be able to download the software from the
manufacturers website.
Figure 11.73 shows the typical set up of ADSL. The computer is connected
to the routers RJ-45 port and the router in turn is connected to the ADSL
filter through its RJ-11 WAN port, which in turn is connected to the RJ-11
wall jack. A phone is also plugged into the filter.
Wall outlet
Power
ADSL filter/splitter
Computer
DSL router
Phone
Note
7. In the User name box, type the username the ISP has provided to you.
8. Type in the password the ISP has given to you.
9. Tick the option: Remember this password.
10. Type a connection name, such as: ADSL connection.
11. Tick the option: Allow other people to use this connection (only if
you want other people to use this connection), otherwise leave it
unticked.
2. Right-click the connection that you want to share, and then click
Properties. If you are asked for an administrator password or
confirmation, type in the password or provide confirmation.
3. Click the Sharing tab and then choose the Allow other network users
to connect through this computers Internet connection check box.
See Figure 11.81.
The Sharing tab will not be available if you have only one network
connection. You might also be able to choose Allow Other Network
Users to Control or Disable the Shared Internet Connection
(Optional). This lets other people on your network control the
shared Internet connection by enabling or disabling it. Optionally,
to allow other network users to use services running on your
network, click Settings, and then select the services you want to
allow.
When you enable ICS, your LAN connection gets a new static IP address
and configuration.
4. Before other users can start using your shared connection, they need to
configure their TCP/IP settings so that their IP address settings change
automatically. Once they have done this, the Internet connection should
be shared.
To test your network and Internet connection, see if you can share files
between computers and make sure each computer can reach a website.
Note
Home page: Change what URL IE opens when it is started. You can
even add multiple home pages, which open in separate tabs.
Browsing History: IE keep a copy of the website files you visit. You
can delete the data or use the settings page to change how much data
to keep.
Search: Use this to change the default search engine used.'
Tabs: Use this to change how tabs and pop-up windows are used.
Appearance: Use this to change some elements on webpages
Security tab
Unfortunately, many websites include malware. To reduce risks, IE uses
security zones with various levels of security:
Restricted Sites: this is the most restrictive zone that allows you to
visit a website but stops the site from running active content that might
damage your computer or steal your data.
Trusted Sites: this zone has relaxed security settings so that a website
can run more programs. You can add sites that you trust not to damage
your computer or information.
Local intranet: this zone can include websites that you access on an
internal network using non-HTTP or HTTP addresses without dots (like
http://success). The security settings for this zone are relaxed to allow
more content to run.
Internet: Any site not in the other zones is considered an Internet site
and it strikes a balance between security and usability by allowing some
active content to run while restricting some active content from running.
Privacy Tab
Here you can configure how cookies are used and control pop-ups through
a pop-up blocker. Cookies are small text files that a website can store on
your computer when you visit that site so that when you go back to that
site, it reads the cookie to identify you and your behaviour for the purpose
of enhancing your experience or changing the advertising based on your
activities. There is a slider that enables you to control what is blocked.
The highest setting blocks everything while the lowest setting blocks
nothing. Go here if you do not want websites tracking your browsing
history (though cookies can authenticate users and do other things too).
Content Tab
Here you can configure the following settings:
Parental Controls: Use this setting to limit Internet usage for specific
accounts.
Content Advisor: uses ratings to restrict content based on categories
such as gambling, language, etc. When enabled, the administrator can
enter a password to allow the content to be viewed.
Certificates: websites commonly use certificates to encrypt
connections, such as online transactions. Administrators use this area to
view and change the certificates.
AutoComplete: this remembers information you have typed in
previously and can retrieve it to automatically fill in different forms or
addresses for you.
Feeds and Web Slices: You can use this to control the schedule for
Really Simple Syndication (RSS) feeds or sites using web slices. Not all
sites use these features.
Connections Tab
The Connections tab enables you to set up your connection to the Internet,
via broadband or dial-up, connect to a VPN, configure a proxy server
connection, or adjust some LAN settings. Many companies use a proxy
server to filter Internet access, and when you are on their network, you
need to set your proxy settings within the web browser (and any other
Internet software you want to use).
A proxy server is software that acts as a middleman when you request
information from Internet web servers. Applications that want to access
Internet resources send requests to the proxy server instead of trying to
access the Internet directly, which both protects client computers and
enables the network administrator to monitor and restrict Internet access
and the websites users are visiting. It also caches (stores) website
information so that users can get web data quicker. It can also be used to
cache FTP and secure information. By default this is not configured. Each
application must therefore be configured to use the proxy server.
If you click the LAN settings button, you can configure connection scripts
and a proxy server as well. Figure 11.84 shows IE configured to use a
proxy server. As you can see, the IP address of the proxy server is
192.168.1.1 and uses port 80, which is used by web servers. By default,
these settings apply to all HTTP, HTTPS and FTP traffic, but you can click
Advanced and configure different proxy servers for different protocols.
Programs Tab
The Programs tab includes the following sections:
Default web browser: Here you can set IE to be the default web
browser.
Manage add-ons: Add-ons such as extra toolbars and extensions can
sometimes slow the browser down, and you can use this area to enable
or disable them.
HTML editing: You can set the default tool used to edit Hypertext
Markup Language (HTML) files from this page if desired.
Internet programs: This link brings you to Default Programs, which
you can use to configure the program Windows will use to open a
particular type of file, based on its extension.
Advanced Tab
This tab lists advanced options that you can turn on and off, such as
disable certain types of content, enable a script debugger, enable or disable
passive FTP, and allow or block active content from running. The available
options include accessibility, browsing, international and security settings.
From here, you can control how IE checks website certificates and use a
Reset button to restore all of the IE settings to their original settings.
A+ Preparation | V1.0 Jan 2014
Home choose this location for when you are at home or when you
trust the people and hosts on your SOHO network. Network discovery is
turned on for home networks and users can see each other and share
resources and can create and join Homegroups.
Work choose this location for your office or SOHO network. Network
discovery is on by default, but you cannot create or join a Homegroup.
Public choose this location for when directly connected to the
Internet and in public places, such as hotspots. HomeGroup is not
available on public networks and network discovery is turned off.
Domain this location is for Windows domain networks and is
controlled by the network administrator and cannot be chosen or
changed by domain users.
Note
Windows Firewall has several predefined rules, but you can click Allow
Another Program and select another program. You cannot add rules
based on ports from this page, but you can do so by using Windows
Firewall With Advanced Security.
11.12.2.4 Windows Firewall with Advanced Security
When configuring the firewall, you typically specify rules that control which
packets are allowed or not allowed to enter the network. A default rule that
you typically set first states Drop all packets or Accept all packets, and
then you build a list of exceptions to that default rule. Windows Vista/7
include the Windows Firewall With Advanced Security applet. You can
create incoming rules for traffic coming into the computer and outgoing
rules for traffic going out. The rules can be based on direction (inbound
rules for traffic coming into the computer and outbound rules for traffic
going out), IP addresses, network IDs, ports, protocol IDs or applications.
You can also create rules for Home/Work network locations as Private, rules
for the Public network location, and Domain rules.
To start this tool, open Administrative Tools in the Control Panel and
double-click Windows Firewall With Advanced Security. It can also be
started by entering wf.msc from the command prompt or in the Search
box.
Figure 11.93 shows this tool open to the Inbound Rules section with the
predefined rule for Remote Desktop open. This is the same Remote
Desktop rule shown in Figure 11.92, but Windows Firewall allows you only
to enable or disable it. With Advanced Security, you can view all of the
properties, although many of the properties cannot be changed in a
predefined rule.
Note
You can add, remove and change any rule as you wish. It quickly
gets difficult, so unless you need to set up a lot of your own rules
and are experienced at doing so, stick to the standard Windows
Firewall applet.
You can start from the bottom or top (where problems occur more often).
ipconfig /release
adaptername
ipconfig /renew
adaptername
ipconfig /release6
ipconfig /renew6
ipconfig /displaydns
ipconfig /flushdns
Tip
Usage
View help on the ipconfig command along with all
its switches.
View full TCP/IP configuration information. This
identifies the host name, MAC address, DNS server
address, DHCP server address (if it is a DHCP
client) and more.
Release the IPv4 address information for a specific
network adapter from the DHCP server. For
example, use ipconfig /release Local Area
Connection. Use ipconfig /release to release IP
address information for all adapters.
Renew the IPv4 address information with the DHCP
server. For example, ipconfig /renew Local Area
Connection. Use ipconfig /renew to renew IP
address information for all adapters.
Release the IPv6 address. Use this on DHCP clients
to remove all IPv6 assigned settings.
Renew the IPv6 address. Use this on DHCP clients
to renew IPv6 DHCP assigned settings.
Displays the contents of the host cache (sometimes
called the DNS resolver cache). These cached
entries come from the hosts file and from recent
responses from DNS.
Removes all the cached entries from DNS
responses. However, this command does not
remove entries from the hosts file. If you flush the
DNS cache and then immediately display the cache,
you will see entries that originate from the hosts
file.
Use ipconfig to check that the system is configured correctly. You can
answer the following questions with ipconfig and proceed from there to
troubleshoot the issue:
gets the same address while a dynamic one is assigned from a pool and
can change.
If your answer to
whether the issue
DHCP client and
configuration from
DHCP servers.
This command will still work even if the network adapter is disabled or
unplugged from the network. Notice the output also shows the TTL of 128.
Step 2: Ping the assigned IP address of your local network adapter. If the
ping is successful, you know that your network adapter is functioning and
has TCP/IP correctly installed, but if you cannot ping the local network
adapter, TCP/IP might not be correctly bound to the network adapter, the
adapters drivers are not installed properly, the IP configuration is incorrect
or not configured properly. If the problem is not with the configuration,
there might be a hardware problem.
Also check for duplicate IP addresses. Windows displays a notification if it
finds a conflict with another host using the same IP address on the network
and disables IP. This is not good, so make sure that they are both using
unique IP addresses.
Note
You can ping the DNS name of the remote host (for example, ping
www.comptia.org, ping srv1if your network uses a DNS server or
the name and IP address of the remote host is configured in your
hosts file. On a Windows network, you can also ping the Network
Basic Input/Output System (NetBIOS) computer name. If you can
ping by IP address and not by name, then it suggests that there is
a name resolution problem.
Not all ping results are that successful. If you cannot reach a system, you
will see errors listed four times instead of four Reply from messages. This
does not necessarily mean that the other system is not running. Many
firewalls including Windows Firewall block ICMP ping requests, so a
system can be working but be configured so that it does not respond to
pings. You can disable the firewall for testing and enable it again.
To use ping effectively, you must understand the error messages that will
show as a result of a failed ping command:
Destination Host Unreachable means the local computer does not
have a route to the destination host or the remote router reports that it
does not know how to reach that IP address. Check the TCP/IP
configuration if the other host is on the same network or check the TCP/IP
configuration and router if the host is on another network.
Request Timed Out essentially indicates that the other host is not
available or cannot send a reply back to your computer. Assuming that the
network connectivity on your computer and the physical cabling and
infrastructure (switches) are working correctly, this typically indicates that
the destination host is not connected to the network, is powered off, or not
correctly configured.
Unknown Host or Ping Request Could Not Find Host indicates that
the requested hostname cannot be resolved to its IP address. Check that
the name is entered correctly and that the DNS server can resolve it. Other
commands, such as nslookup or dig in Linux, can help in this process.
TTL Expired in Transit the packet exceeded the number of hops
specified to reach the destination host. The Time To Live (TTL) counts each
hop (router) along the way to the destination. Each time it counts one hop,
the hop is subtracted from the TTL. If the TTL reaches 0, it has expired,
and you get this message. You can increase the TTL using the -i switch.
Note
11.13.1.3 Tracert
Tracert traces the route or path between two hosts. It does this by using
ICMP echo packets to report information at every step of the journey to the
target destination, including the IP address of every router it passes
through and, in some cases, the name of the router. This information can
help identify where network bottlenecks or breakdowns might be. Each of
the common operating systems provides a tracert tool, but the name of the
command and the output vary slightly on each. For example, in
UNIX/Linux, the command is traceroute.
The basic command syntax for tracert is:
tracert target
(Where target is the IP address or the domain name/FQDN of a
destination host or website).
For example, if you want to identify all the routers between you and a
website named pearson.com, you could use the following command:
tracert pearson.com
Of course, not all attempts are successful. The following output indicates
that it tracert did not get to the remote host:
C:\>tracert 216.119.103.72
Tracing route to comptia.org [216.119.103.72]
over a maximum of 30 hops:
1
27 ms
28
2
55 ms
13
[24.67.224.7]
3
27 ms
27
[204.209.214.19]
4
28 ms
41
[66.163.76.65]
5
28 ms
41
[66.163.68.2]
6
41 ms
55
[24.7.70.37]
7
54 ms
42
[192.205.32.249]
8
*
*
9
*
*
10
*
*
ms
ms
14 ms 24.67.179.1
14 ms rd1ht-ge3-0.ok.shawcable.net
ms
28 ms
rc1wh-atm0-2-1.shawcable.net
ms
27 ms
rc1wt-pos2-0.wa.shawcable.net
ms
27 ms
rc2wt-pos1-0.wa.shawcable.net
ms
41 ms
c1-pos6-3.sttlwa1.home.net
ms
27 ms
home-gw.st6wa.ip.att.net
*
*
*
In this example, the request gets to hop 7, at which point it fails. This
failure indicates that the problem lies on the far side of the host in step 7 or
on the near side of the host in step 8. In other words, the host at step 7 is
functioning but might not make the next hop. You can isolate the problem
to just one or two hosts.
Note
11.13.1.4 Nslookup
You can use nslookup (short for name server lookup) to troubleshoot
name resolution problems with DNS. Nslookup queries DNS and can verify
that records exist in DNS to resolve host names to IP addresses. Use it to
determine whether a system can map a hostname to an IP address by
querying DNS. The basic command is as follows:
nslookup hostname DNSServer Option
(where hostname is the hostname or IP address to be resolved, DNSServer
is the DNS Server to use and can be left out to use the default DNS Server
and Option is an nslookup subcommand).
Nslookup is a shell command, which means that if you only type nslookup
and press <Enter>, you will start the shell in interactive mode and see a
prompt of >. You can then enter commands specific to nslookup from this
prompt. Table 11.8 list some command switches and instructions when
working in interactive mode.
Table 11.8 nslookup command switches and instructions in
interactive mode
Switch/instruction
Help or ?
<Ctrl> + <C>
set type =xx
exit
Instead of using interactive mode, you can also execute nslookup requests
directly at the command prompt in non-interactive mode. For example,
suppose you have problems reaching the comptia.org website.
You might want to determine whether DNS can resolve the name to an IP
address. You can use the following command:
C:\>nslookup comptia.org
Server: nsc1.ht.ok.shawcable.net
Address: 64.59.168.13
Non-authoritative answer:
Name:
comptia.org
Address: 208.252.142.2
The first two lines show the hostname and IP address of the DNS server
against
which
the
resolution
was
performed,
that
is,
nsc1.ht.ok.shawcable.net along with its IP address (64.59.168.13). The last
two lines show that the DNS server can resolve the website comptia.org to
the IP address of 208.252.142.2.
11.13.1.5 Nbtstat
You can use nbtstat (short for NetBIOS over TCP/IP statistics) to view
protocol statistics and information for Network Basic Input/Output System
(NetBIOS) over TCP/IP connections. Nbtstat is commonly used to
troubleshoot NetBIOS name resolution problems for older Windows NT and
9x clients. A Windows Internet Name System (WINS) server primarily
resolves NetBIOS names to an IP address. When a WINS client starts, it
contacts the WINS server and registers its name and IP address. Then,
when other clients query the WINS server with the name, the server
responds with the corresponding IP address. Clients can also use
broadcasts to resolve NetBIOS names.
Note
Nbtstat calls up the name table. For example, you could find out what
services are running, what the computers name is and the network it is a
part of typing out the following command (see Figure 11.99):
nbtstat n
Usage
Get help on netstat.
Lists all active connections and ports actively listening
for incoming network connections.
Lists programs involved in creating each connection or
listening port. You can combine this with the -a switch
(netstat -b -a).
Shows Ethernet statistics, including bytes sent and
received, dropped packets and errors.
Switch
netstat
protocol
netstat r
Usage
p Shows connections the specified protocol (e.g. TCP or
UDP)
Shows the routing table. A system uses a routing table
to determine routing information for TCP/IP traffic.
netstat s
Shows statistics for protocols. This will list statistics for
TCP, UDP and IP statistics for both IPv4 and IPv6.
netstat interval
Specifies how long to wait before re-displaying
statistics in seconds (interval). For example, enter
netstat 10 (to wait for 10 seconds). Press <Ctrl> +
<C> to stop.
Figure 11.101 shows an example of the output of the netstat a command.
All computers will get the broadcast, but only the computer with that IP
address will respond with its MAC address and the computer that asked the
question will store the resolved IP-to-MAC address mapping in an area of
memory called the ARP cache for a short period of time, which brings us
to the arp command.
You can view the contents of the ARP cache with the arp -a command as
follows:
C:\>arp -a
Interface: 192.168.1.111 --- 0xa
Internet Address
Physical Address
192.168.1.1
68-7f-74-ae-8b-de
192.168.1.107
00-90-a9-82-4b-5f
. . .
Type
dynamic
dynamic
Not only can you map a drive to shared folder on a remote computer from
within Windows Explorer, but also from the command prompt by using the
net use command. The basic syntax is as follows:
net use drive_letter UNC_Path
For example, imagine that your network includes a server called FileSRV1
and that this server is sharing a folder named Data. The UNC path is
\\filesrv1\data.
One way you could connect to this share from a Windows 7 is by entering
\\filesrv1\data in the Search box. However, you can also map the share to
a drive so that it is accessible in Windows Explorer. You could do so with
the following command:
net use v: \\filesrv1\data
This command maps the V: drive letter to the share and the mapped drive
can be viewed in Windows Explorer. When a share is mapped this way,
users can access the data just as if it were a folder on their system. If you
want to delete the mapping, you can use the following command:
net use v: /delete
This does not delete the share on the server. It deletes only the mapping
so that it is no longer visible in Windows Explorer. Table 11.11 lists some
other common net commands you might find useful.
Table 11.11 Common net commands
Command
net view
net print
net share
net start service
net stop service
Usage
Shows a list of computers and network devices on the
network. These are often listed in the Network area of
Windows Explorer.
Displays information about a specified print queue,
about all print queues hosted by a specified print
server, displays information about a specified print job,
or controls a specified print job.
Lists all resources shared on the local system.
Starts or stops the specified service.
Different coloured light (duplex mode) some devices show one colour
(such as green) when running in full-duplex mode and another colour
(such as orange) when running in half-duplex mode.
Different coloured light (speed) some devices show one colour for one
speed and another colour for a different speed.
If you see different-coloured lights for any connection, verify that both
devices support the same faster duplex mode and speed. You should also
verify that autosense or autonegotiation is enabled. If this is not enabled or
not a feature of the device, you might need to manually configure the
faster duplex mode and speed.
11.13.2.2 Troubleshooting cable links
A typical cabled network involves running solid-core UTP cable from the
wall network outlets in work or office areas to a patch panel. A patch
panel, or distribution frame, is simply a box or a wall mounted unit with
a row of female UTP or STP (RJ-45) ports, or fibre ports, in the front and
permanent connections on the back, to which the cables coming from the
different work areas are terminated. Patch panels use punchdown blocks.
The wires from the cables are attached to the punchdown block using a
punchdown tool. Each punchdown block has a number of insulation
displacement connectors (IDCs), which are metal tabs into which the
wires from the cables are fixed and terminated. A patch cable is used to
connect a port on the patch panel to a port on a switch for network
connectivity.
In the work areas, a stranded-core patch cable is used to connect the
network adapter for each computer to the wall network port, or to a switch
(which itself is connected to a wall port).
Tip
Cable cutter/snips use this to make a clean cut on the end of the
network cable.
Wire strippers use this to cleanly strip off the outer jacket of a cable.
Punch down a tool with blades that you can use to punch down or fix
individual wires from the cable into the IDC connectors of a punchdown
block.
Crimper use this to attach connectors to the ends of cables.
Use ping to test the cable. If you can ping another known working
system, the problem is not the cable.
If you cannot ping anything, make sure the cable is properly connected
and is working. Swap the cable for a known good one. Also try plugging
the cable into a different network socket and switch port or wall jack.
By swapping suspect components with known good components, you
should be able to resolve the cable problem.
If several users have a problem, check the switch.
You can use cable testing tools, such as a multimeter, wire map tester,
and tone generator and probe to test cables and a loopback plug to test
the port to determine if the problem is with the cable or the port. If the
problem is with the cable, simply swap it out with a known good one.
If the problem is with structured cabling running within the walls and
through the ceiling ducts, then use cabling testing tools to find the
problem, especially if the problem is intermittent and comes and goes.
You might need to install a new permanent link or there might be a
problem with termination or interference.
Run ipconfig /all and ping commands to see if TCP/IP works; use the
network troubleshooter by right-clicking the Network icon in the
notification area and select Troubleshoot Problems (in Vista it is
Diagnose and Repair); check for the latest drivers for the network
adapter; try rebooting the computer; find out from the user if any
programs were recently installed or updated: sometimes malware or
software updates can cause connectivity issues; power down the
network equipment (SOHO routers, cable modems and so on) and
disconnect the network and power cables and wait for a few seconds,
thereafter reboot the network equipment and see if it solves the
problem.
Slow transfer speeds: upgrade dialup to faster DSL, cable or fibrebased services. Slow transfer speeds could also be caused by an
incompatibility between Ethernet settings on network adapters,
switches and router. It could also be caused by network devices, patch
cables and network adapters - the newer and faster the devices and
cables, the better the transfer speed.
If users cannot find the wireless network, they need to connect using
Windows or the wireless adapters software, although there are third-party
Wireless locator programs, such as inSSIDer, that will identify all wireless
networks in the area and display the SSID, signal strength, distance and
channel used. If an SSID does not show up in Windows or in third-party
software, you should enter the SSID manually.
Some of the common symptoms of wireless connection problems and their
likely solutions are as follows:
Slow wireless transfer speeds: devices and APs connect using the
fastest speed they can achieve without errors. On one hand, a device
that is not working in compatibility mode will not be able to
communicate with older devices, but on the other hand, if an older
device joins a network that works in compatibility mode, it will drop the
speed of the whole network to the earlier standard it supports. Last, if
there is attenuation or interference from any source, devices and APs
will use slower speeds.
Intermittent connectivity: occasionally, problems can cause a device
to periodically disconnect from the AP. The device might also be too far
away from the AP and will need to be moved closer. The problem can
also be due to interference from other radio sources broadcasting on
the same frequency, so changing the channel might help, or
electromagenetic sources such as motors and microwave ovens, or
other sources that are blocking the signal. Repositioning the AP or
device might help. When repositioning the AP, it is best to place it high
up in the centre of the area it serves. Last, you might want to check the
radio power level on the AP and consider increasing it.
Latency issues although speed is important for time-sensitive traffic
such as VoIP, low network latency is even more important. The higher
the latency or the more delay there is in the time it takes for frames to
travel from the source to the destination and back to the source in
milliseconds (called the round-trip time), the more reliability problems
will there be, especially for wireless connections.
Note
Study
Notes
Study
Notes
Skills
The print processor converts the spooled file into a format that
can be sent to the print device.
The print monitor sends the print job to the print device and
provides status information.
Most print devices have RAM and processors, enabling print jobs
to be sent more quickly and reliably. In this final printing phase,
the print device receives the print job from the print spooler and
prints the job. The printer can report any problems by sending a
status message back to the print monitor to inform the user.
The exact process that takes place depends on the type of printer the print
job is being sent to. A print router or redirector service on the local
computer sends print jobs down separate paths depending on whether the
printer is a network or local printer. No matter whether it is a local or
network printer, drivers for the print device must be installed on the local
computer.
Figure 12.1 show the print architecture in Windows Vista/7. Display and
print functions are handled by the Windows Presentation Foundation
(WPF).
Generally, PostScript and PCL are used with high-end printers and
GDI and XPS with low-end printers.
You can also spool a job as plain text using the print devices default font,
margins, orientation options and so on.
12.1.3 Fonts
A computer font is a file containing a set of printable and displayable
letters, numbers, symbols and other characters of a certain design
(typeface). Popular typefaces include Times Roman and Courier. The
typeface represents one aspect of a font. A font also includes qualities such
as size (in points [pt]), spacing, pitch (number of characters that fit in a
horizontal inch), styles (bold and italic) and so on. For example, Times
Roman is a typeface that defines the shape of each character. Within Times
Roman, however, there are many fonts to choose from, different sizes,
styles and so on.
Use the Add Printer option in the Devices and Printers folder in
Control Panel on a Windows 7 computer. You can install and configure
printers in the Printers and Faxes folder in Windows XP and in the
Printers folder in Windows Vista.
Install from a manufacturer-disc (supplied with a newly-purchased
printer).
Install from a manufacturer-downloadable file.
Scenario 1: Some new printers do not come with their own drivers.
They instead use a well-known printer driver and run on that driver.
Scenario 2: When you do not have the correct driver, you can keep
well-known drivers at hand which you know will work and allow you to
print to almost any printer. You may need to set the printer into an
emulation mode to handle a driver other than the one specifically
written for it.
1.
2.
3.
4.
5.
6.
The connectors at each end of the USB cable will be different. Also,
you might need to install the drivers and other software before
connecting the printer to the computer.
8. Following the instructions that came with the printer, open the printer
and find the print head(s).
9. Find the print cartridge(s) that came with the printer.
10. Install the cartridge(s) in the printer.
Note
11.
12.
13.
Note
14. Attach one end of the USB cable to the printers USB port and the
other end to the computers USB port.
Windows automatically finds a PnP printer by default (assuming the printer
is turned on and connected to the computer).
15. The Found New Hardware Wizard should start up. Windows should
locate the driver files and install the printer. If it does not, complete
the following steps:
Note
You can also use the printers setup software to install the driver.
You can also click the Start menu, choose Control Panel and
then Devices and Printers or type Devices and Printers in the
Search box and choose Devices and Printers before pressing
<Enter>.
2. In the upper-left corner of the Devices and Printers screen, click Add
a printer.
Note
Here you can choose the port for a local printer or add a network, wireless
or Bluetooth printer.
3. Choose Add a local printer and then click Next.
4. On the Choose a Printer Port screen, use the drop-down box to choose
the appropriate port, such as USB001 if the local printer will connect to
the computer using a USB cable. If you are using an older standard
printer cable, choose LPT1: (Printer Port).
5. Click Next.
Choose the manufacturer and model of the printer. If you have an
installation disc provided by the manufacturer, click Have Disk and
browse the installation disc for the driver.
8. Click Next.
9. On the Type a printer name screen, give the printer a name. Use a
name that clearly identifies the printer.
10. Click Next.
11. On the Printer Sharing screen, choose the Do not share this printer
radio button.
12. Click Next.
13. On the successful screen, if you want this printer to be the default
printer, select the Set as the default printer check box, click the
Print a test page button and then the Finished button. The printer
will be installed into the Devices and Printers folder and will be
available to all Windows applications. Figure 12.5 shows a printer set
as the default printer, shown by the green tick. Figure 12.5 also shows
the printers right-click menu.
After you click Print Test Page, a message box will appear asking if
the test page printed properly. The page should print after a few
seconds.
15. When the test page prints, take a look at it. If you do not have a
physical printer, you will not be able to print a test page on paper. You
can however print a test page to a file and open the file using a text
editor. A typical Windows test page looks like the one shown in Figure
12.6. The test page displays the time the job was sent to the printer,
computer and various printer information including the printers name,
model and the drivers name, file and version.
On a colour printer, the Windows logo will be shown in red, green, blue and
yellow. This logo features shading. If you see streaks, lines or other print
quality problems in either the logo or text printing, or if the printer does
not print, you need to troubleshoot the printer to solve the problem. It
could be a problem with the printer, the driver, computer or connection
between the printer and computer. With many laser printers, you can print
a self-test page by pressing a button or a combination of buttons on the
printer itself. The self-test page lists the firmware revision used by the
printer, the number of pages printed and the amount of installed memory.
16. Click Close to close the wizard.
17. Once the wizard closes, open the application the user will normally
print from, such as a word processing application.
18. Open each application, create a small document with text inserted and
then print it.
19. When you have successfully printed from each application, close it.
20. When the test is completed, close all open applications.
Make sure that the user has plenty of paper and extra print cartridges. You
will have successfully completed installing a printer when you have printed
a test page from the Add Printer wizard and from each application.
12.2.2.3 Installing print drivers using the Add Printer wizard
You can use the Add Printer wizard if Windows has a suitable driver and if
you do not want to use the enhanced features that come with the
manufacturer-driver. Although the steps are similar to the previous
exercise, the situation is different. Besides, there is more than one way to
install print drivers. To install using the Add Printer wizard, follow these
steps:
1. Click Start, type Devices and Printers in the Search box, then
choose the Devices and Printers option from the program list and
press <Enter>.
2. Right-click the target printer.
3. Click Printer properties.
4. Click on the Advanced tab.
5. Click on the New Driver button.
6. Click Next to launch the Add Printer Driver wizard.
7. On the Printer Driver Selection screen, in the Manufacturer window,
scroll down and choose the manufacturer of the printer.
8. In the Printers window, scroll down and choose the specific model of
the printer.
9. Click the Have Disk button.
10. Insert the driver disc into the optical drive.
11. In the Install from Disk dialog box, use the drop-down box to select
the drive letter of the optical drive.
Note
Note
With some printers, you will need to use their installation software
to do the setup rather than using the Add Printer Wizard. Read the
instructions that come with your printer because the necessary
steps for your printer might be different from the steps in this
exercise.
If the printer uses a Windows-driver, the properties sheet will have some or
all of the following tabs:
General has the Print Test Page button and the Printing
Preferences button, which opens the Printer Preferences menu.
Sharing enables or disables printer sharing over the network.
Remember to Turn on file and printer sharing.
Note
The Sharing tab also has an Additional Drivers button. When set,
this allows remote users to connect to the printer with other
versions of Windows. If this feature is not configured, users
running other versions of Windows must download and install the
appropriate driver for their version of Windows before they can
connect to the printer.
As you can see in Figure 12.10, these options can appear in various
menus, depending on the printer and OS in use.
Inkjet printers paper type, paper size, paper layout, print mode,
utilities (head cleaning, alignment, ink levels) and watermarking.
Laser printers layout, page order, resolution, font substitutions,
printer features, pages per sheet and watermarking.
Figure 12.14 shows you a print job called Test Page listed in the print
queue. The job went to the printer properly; you can tell because it says
Printing under the Status column. Any other message would mean that the
job was either spooled, queued, stopped or has failed. These jobs can be
paused, restarted or cancelled if they are not printing properly.
You can do all of this by right-clicking the job or by making a selection from
the Document menu, all from the See whats printing window. Keep in
mind that larger documents take longer to spool before they start printing.
In addition, all documents can be paused or cancelled or the entire printer
can be taken offline from the Printer menu. Use these options to
troubleshoot problems with print jobs, such as when a job will not print and
needs to be restarted.
You can start and restart the service and do other actions by completing
the following steps:
1. From the Start menu, right-click on Computer and choose Manage to
open the Computer Management console.
2. Click Services and Application in the left pane to expand the list.
3. Click Services in the left pane. A list of all system services running on
the computer will be shown in the middle pane.
Note
You can also open the Services console by typing services in the
Start menus Search box and choosing Services from the
program list that appears and by running services.msc in the Run
dialog box.
4. Scroll down to Print Spooler and make sure the status column for this
service is listed as Started and the Startup Type column is set as
Automatic.
5. To start or restart the service, right-click on it and choose Start or
Restart from the shortcut menu.
6. To make changes to the Print Spooler service, double-click the service
name to open its Properties page. From here you can set the Startup
type to Automatic or Manual and start, stop, pause and resume the
service. Once you have made the change, click Apply to apply the
changes and then click OK to close the Properties page.
Figure 12.16 shows the Print Spooler service, its Properties page (left) and
shortcut menu (right).
Some inkjet printers use their own print spooler or other print
service. If not configured to start automatically, you must make
this change. Check the printers documentation to find the name of
the service.
You can also adjust the Print Spooler service in the command prompt.
Note
If you cannot delete a print job or the print queue has stalled, stop the
Print Spooler service and delete the spooled file from this directory and
start the service again.
Note
Clicking on the Print Processor button on the Advanced tab enables you
to choose the spool file format (EMF or RAW).
12.3.9 Calibration
What you see on screen might not match what the printer prints out.
Calibration matches the printed output of the printer to what you see on
screen. It involves aligning the printing mechanism to the paper and
checking colour output. You might need to calibrate colour laser, inkjet and
multifunction printers before using them. Most printers calibrate
automatically, although if the output is not what you expected it to be, you
can usually use the printers driver to perform a calibration (go to Printing
Preferences in Windows). In some cases, you can run calibration tests by
choosing an option on the printers onscreen menu.
Note
You can also calibrate your monitor when the colours displayed on
its screen are not accurate. By calibrating your monitor, you can
adjust the setting to match the output of your printer.
9. If desired, assign the printer a share name. Note that the share name
does not need to be the same as the printer name. This name will be
displayed to network users and can be used to connect to the printer
from across the network. If clients other than Windows require access,
click Additional Drivers to install drivers for the operating systems
you need to support.
Note
10. Click Apply and then OK. The printer should show up as shared with a
shared icon within the Devices and Printers window, as shown in
Figure 12.21.
Permissions can be set for a printer on the Security tab of the printers
Properties page. Refer to Figure 12.10, which shows the Security tab on
the left. Here you can add users and groups and assign the appropriate
permission including:
16. When the Subnet Mask field appears, use the number keys to input the
subnet mask.
17. Click Next.
18. When the Default Gateway IP Address field appears, use the number
keys to input the gateways IP address.
19. Click Next.
20. When the Time-Out field appears, use the number keys to set the TCP
connection time-out in seconds.
21. Click Next.
22. Click Save.
23. Click Online.
24. Click Exit.
Confirming the configuration settings on a network printer:
25.
26.
27.
28.
Click
Click
Click
Click
Note
Menu.
Information Menu.
Network Cfg.
Print.
After you click Print, the network-configuration page will print with
all the network information you configured on the printer, including
its IP address.
When trying to install a network printer in Windows, the Add Printer wizard
scans for available printers on your local network. You can use the following
steps to add a networked printer on a Windows 7 computer:
1. Click Start and select Devices and Printers.
2. Click Add A Printer.
3. Click Add a Network, Wireless Or Bluetooth Printer.
You can also right-click the printer and choose Remove device
from the shortcut menu.
4. If you installed printer software, you can uninstall it by clicking Start >
Control Panel > Uninstall a program.
5. Select the printer software and click Uninstall. Follow the prompts to
remove the software.
If you understand how different printers work, you can often identify
printer problems and resolve them without too much difficulty. Still, it is
good to have a list of common symptoms, causes and solutions, similar to
the following:
Printer will not print: If you click Print but nothing happens, check
the obvious things first. Ensure that it is plugged in, turned on, properly
connected and is loaded with paper. Some printers have an
online/offline selection, and when it is offline, Windows treats it as
though it is turned off. It could be placed in an offline state by accident,
or because it is waiting for a user to print or because it received
corrupted print data. Setting it back to online allows everything to work
normally. If everything is plugged in and ready to go, check the
appropriate printer applet in Windows. Print a test page using the
printer control panel within Windows. If you do not see the printer, you
will need to reinstall it using the Add Printer Wizard.
Cannot install printer: make sure the user account has the
permission to install the print driver, the driver is for the correct version
(32-bit/64-bit) and edition of Windows and the print spooler service is
started. In Windows XP, a user needs to be in the Power Users or
Administrators group to install a printer, and if not, they will be unable
to install a printer. Regular users can install printers on Windows 7.
Driver installations are normally done by an administrator on a network,
but security policies can be configured to allow normal users to install
signed drivers.
Note
Backed-up print queue: If the printer or the print spooler service has
been paused, print jobs will stay in the queue and will not be printed.
Restart the print spooler service, which might be locked up. Print
spoolers can easily overflow or become corrupt due to too many print
jobs, a lack of disk space or other factors. The print queue window
shows all of the pending print jobs and enables you to delete, start or
pause jobs. Usually just delete the affected print job(s) and try again. If
you have problems with the print spooler, you can get around them by
changing your print spool settings in the Properties of the printer. You
can choose the Print directly to the printer radio button to try
sending the print job directly to the printer. If that does not work, try
restarting the print spooler service. Another possible cause for a stalled
print job is that the printer is simply waiting for the correct paper. You
can also cycle the printer to fix installed jobs.
You can install fonts on a computer by opening the Fonts applet in Control
Panel, as shown on the left in Figure 12.26. Opening a font icon shows a
preview of the font at different sizes, as shown on the right in Figure 12.26.
If the font is not shown here, use the File menu to locate and install it.
Font files are found in the C:\Windows\Fonts directory, but some fonts
may be installed in another directory.
Paper jam: The first solution is to clear the jam by using the
manufacturers jam removal procedure while also making sure the
paper path is free of dirt. To avoid damaging components, do not use
force. Repeating paper jams can be due to using unsuitable or incorrect
paper or paper that is incorrectly loaded in the tray. In addition, it could
also mean a faulty static eliminator strip on a laser printer that has
failed to remove the charge from the paper, causing the paper to stick
to the drum or curl before it enters the fuser unit. It is also possible that
the pickup and separator rollers on a laser printer are worn and more
than one sheet of paper is being picked up. Some printers report a
paper jam when the rollers are unable to pick up the paper. Replacing
the rollers with a maintenance kit might resolve the problem.
Paper not feeding: Make sure the paper is loaded properly. Check the
rollers or tractor feed to ensure that they are working. In some cases,
rollers can become dirty and work inconsistently. Cleaning them
resolves the problem.
Creased paper: Printers often crease the paper as it is fed through the
paper path, but it should not be noticeable unless a heavier paper is
used. A solution is to send the paper through the feeder rather than
through the paper tray or use a different paper type.
Blank pages: If you see this on a laser printer, it could indicate that
the toner is empty or the toner cartridge has been installed without
removing the sealing tape. If the printer does have toner and nothing
prints, print a diagnostic print page from the control panel. Lastly, it is
possible that the charging process is not occurring due to a problem
with the high-voltage power supply, the primary charge (transfer)
roller, or the corona wire. Check the printers maintenance guide to see
how to focus on the bad part and replace it.
Faded or faint print: Indicates the user has chosen low toner or
draft output, the laser printer is low on toner or the drum is worn out
or damaged, or the inkjet printer is low on ink. Replacing the toner, ink
cartridge, or ink ribbon should eliminate this problem. On impact
printers, this problem occurs if the ink ribbon stops moving.
Vertical lines on page for laser printer: You can see this on laser
printers if the toner gets clogged. Remove the cartridge and shake it or
replace the cartridge. It can also occur if the drum is damaged or dirty.
On inkjet printers, this can occur if the print heads are dirty or
misaligned and need to be cleaned and aligned, or a blocked ink nozzle.
Missing colour: replace the cartridge and clean the contacts between
the printer and cartridge.
Print head jam: the inkjet printer will most likely display a message or
flash its LED if its print head jams. Try turning the printer off and
unplug it before turning it back on again.
Clogged or dirty inkjet nozzles: The ink inside the nozzles can dry
out on an inkjet printer when not used for a short time, blocking any ink
from exiting. If the printer is telling Windows that it is printing and
feeding paper through, but either nothing is coming out or only certain
colours are printing, it is almost certainly dried ink clogging the nozzles.
All inkjet inks are water-based, and water works better than alcohol to
clean them up. On older inkjets, you usually have to press buttons on
the printer to start a maintenance program. On more modern inkjets,
you can access the head-cleaning maintenance program from Windows.
Toner specks on paper: might indicate loose toner inside the printer.
Clean the printer using an approved toner vacuum.
Toner not fused to the paper: The fuser assembly fuses the toner to
the paper. Replace the fuser to resolve the problem. A dirty fuser on a
laser printer will leave a light dust of toner all over the paper. Have the
printer cleaned. If the printout is smudged, the fuser is not properly
fusing the toner to the paper. If the toner will not fuse to the paper, try
using a lighter-weight paper. You might also need to replace the fuser.
One of the most important tests you can do on any printer is called a
diagnostic print page or an engine test page. You do this by either holding
down the On Line button as the printer is started or using the printers
maintenance software.
Notes
Notes
Study
13.2.2 Encryption
Cryptography is the study and practice of secret writing, with the aim of
hiding information from everyone except for the intended user.
Cryptography involves encryption and decryption. Encryption scrambles
plain text that can be read by anyone into cyphertext to make it unreadable
(essentially locking the data). Decryption allows the user with the right
key to unscramble the cyphertext back into the plain text to make it
readable again (unlocking the data).
Hash functions
Symmetric (or secret key)
Asymmetric (or public key)
These types are shown in Figure 13.3; the next few sections explain each
type in more detail.
Hash Function
Plaintext
Hash Function
Cyphertext
Symmetric encryption
Plaintext
Key A
Cyphertext
Key A
Plaintext
Asymmetric encryption
Plaintext
Key A
Cyphertext
Key B
Plaintext
A hash algorithm is used to encrypt data, but not to decrypt it. It works by
adding or padding some extra data to a message and then encrypting the
message, and using a finite number of bytes from the encrypted portion of
the message as the fingerprint of the data. Hashes are used to prove that
the data received is the same data sent and that nothing has changed it
(ensuring data integrity). Every time a hash algorithm is applied to the
same data, you will get the exact same result, but if the data has been
changed, even by one letter or a single space, the hash will change.
Figure 13.4 shows two examples of what a hash looks like. A hash
calculator (of which there are some available online) was used to compute
two different text strings. The text strings are exactly the same in both
calculators except that the word hash was capitalised in the second
calculator. Notice that the hashes are completely different, even though the
sentences are essentially the same.
There are encryption algorithms that only generate one key and others that
generate two keys. The key made by a symmetric encryption algorithm
is called a symmetric or secret key. This simply means that the same key
is used to encrypt data and decrypt data (or two keys can be used but the
one is easy to determine from the other one). For example, if you create a
key specifying that the letter A should be replaced by G, the letter B by I,
the letter C by S, and so on, any message you encrypt using that key can
be decrypted by anyone else that has that key. Sometimes you will see this
secret key referred to as a private key.
Sharing the secret key with others has always been the weakest part of
symmetric key encryption. If you are using a system that relies solely on
secret keys, you have to make sure that they are stored and shared in a
safe and secure way. You would not want someone to intercept the key
during its sharing process and using it to access your data.
Symmetric encryption is used for encrypting data for storage and data sent
over a network, such as with the Kerberos authentication protocol.
Examples of symmetric encryption include 3DES (Triple Data Encryption
Standard), AES (Advanced Encryption Standard), RC (Rivest Cipher), IDEA
(International data encryption algorithm), Blowfish/Twofish and CAST
(Carlisle Adams and Stafford Tavares). WEP and WPA used in wireless
networks use symmetric encryption. The main advantage for using
symmetric encryption is that it is faster than asymmetric encryption.
Some encryption algorithms generate two keys, and they are called
asymmetric encryption with asymmetric keys or Public Key Cryptography
(PKC). What this means is that two keys are generated; one key is kept by
the user and the other key is shared with anyone the user wants to share it
with. The keys are different but are mathematically tied to each other,
although knowledge of one key does not easily allow someone to determine
the other key.
These keys are also known as public/private keys. The public key is
freely available to anyone or to whoever you want it to be available to,
whereas the private key is always secured and never sent over the
network. The way the system primarily works is that data encrypted with
the public key can only be decrypted with the private key, or in the case of
a digital signature, data encrypted with the private key can only be
decrypted by using the public key. Figure 13.5 illustrates the asymmetric
encryption process.
13.3 Authentication
Authentication commonly occurs when the user claims an identity with a
username and proves that identity with a password. However, there are
other possible ways, known as authentication factors, of authenticating.
The three authentication factors are: something you know (a knowledge
factor), something you have (an ownership factor) and something you
are (an inherent factor).
A+ Preparation | V1.0 Jan 2014
The password should be a combination of numbers (1-9), uppercase (AZ) letters, lowercase (a-z) letters and special characters (!@#$%^&*?).
Do not use obvious phrases, such as birthdays, job titles, usernames,
dictionary words, and other names that are common and can be
guessed.
Do not use the default password.
Do not write down passwords anywhere or share them with anyone. If a
password must be written down, then make sure that the password is
stored and handled securely.
Do not send passwords electronically using emails or other kinds of
electronic communication.
Choose a password that is easy to remember but difficult to guess or
compromise.
Set expiry dates for passwords to be reset, forcing users to change them
on a regular basis. A common practice is to get users to change their
passwords every 6090 days and administrators every 30 days.
Set password history requirements so that users do not re-use the same
password when required to change it.
Implement automatic account lockout after several unsuccessful log on
attempts, so that if an incorrect password is entered several times, the
system should lock the account out for a certain period of time, before
unlocking it again.
Use different passwords for different services and networks, that is, do
not use work passwords for personal websites you visit and other
services you use outside of work.
Note
In a Windows domain, SSO allows the user to log on once and access
multiple resources without logging on again for that session. This is often
one of the reasons why a company creates a domain instead of a
workgroup, that is, to support SSO. SSO also helps network administrators
better control who can gain access to the network.
Manufacturers have developed key fobs and smart cards that use Radio
Frequency Identification (RFID) to transmit authentication information
wirelessly (contact-less). The reader is connected to a computer and
validates against a security system.
A key fob is a small device, containing a chip, that the user can use to gain
access to a secure area or to log onto a computer or network. Also called a
security or hardware token, a key fob displays a randomly generated
number that can be used for authentication. The number usually changes
every 60 seconds or so and is synchronised with an authentication server.
RSA SecureID is a popular key fob and it is sometimes just called RSA
token. RSA stands for Rivest, Shamir and Adleman and when a user
attempts to access a protected resource, he or she is asked to enter a
unique number or token code as shown in Figure 13.10. This authentication
is based on two factors: something you know (a password or PIN) and
something you have (the authenticator). The authenticator is typically a
key fob and the software token is the RSA authentication software that
provides the security engine used to verify authentication requests.
Disadvantages with something you have are loss and theft and the chance
that the device can be faked, not to mention the cost of buying and
maintaining the equipment.
13.4 Accounting
Accounting is the practice of logging actions by tracking what happened to
a resource and when it happened.
13.5 Malware
Malicious software, or malware, is a general term that refers to any
program or code that is designed to do some malicious task on a system or
network that you do not want done. Malicious programmers write malware
for different reasons, such as to play jokes on people, to infect systems for
personal gain, to generate business for a company, to gather information
about users to steal their identity or to access their bank accounts, to
remotely take control over their computer or to make their computer
unbootable or unusable. This section explores different kinds of malware.
13.5.1 Virus
A virus is a program that makes a copy of itself, often by attaching to an
executable host file that can be spread to infect other computers, or as
code stored in the computers boot sector, for the purpose of carrying out
the malicious action its program code or payload tells it to. For example,
the virus could simply display annoying messages or install spyware, or do
more harmful actions such as delete important system files.
However, the virus can only activate and spread when the user runs the
virus-infected program by loading it into memory. This action requires
tricking the user into opening the infected file or email attachment. Table
13.1 briefly describes some of the different types of viruses, but do note
there are many more. Viruses are classified by the different ways they can
affect the computer (the vector).
Table 13.1 Virus types
Virus
Boot sector
Program
Macro
Polymorphic
(modification)
Stealth
Multipartite
Description
This virus infects the boot sector code, partition table and
sometimes the file system. When the computer boots, the
virus loads into memory.
This virus attaches to a programs executable file and
when the .exe file is run, the virus runs.
A macro is programming that automates certain tasks
within any application that has a built-in macro language,
such as Word and Excel. This virus uses macros to
replicate and spread.
Antivirus software uses a definition file that contains the
signatures of known viruses to detect them. A
polymorphic or metamorphic virus constantly morphs, or
changes, its signature, making it harder for anti-virus
software to detect it.
This virus avoids detection by intercepting anti-virus
software commands and passing the anti-virus software a
clean but false version of the file it is seeking, or it may
jump from file to file, avoiding the anti-virus scanner
altogether.
This virus attempts multiple kinds of infections at the
same time. For example, it can infect both the boot sector
and executable files.
Viruses can infect files stored on discs, drives, network shares and other
items and can spread in many ways, including through USB drives, email
attachments and applications.
13.5.2 Worms
A worm is a program that is similar in function and behaviour to a virus
but actively sends a copy of itself from computer to computer across the
network without needing the user to execute it. A worm can cause many
problems, among them:
Using up all the networks bandwidth as it copies itself from computer to
computer
Crashing the OS or application
Installing a backdoor application that allows an attacker to bypass
normal authentication methods to gain access to the targeted system
Exploiting flaws in program code like buffer overflows, where a buffer
cannot hold all the data sent to it
A+ Preparation | V1.0 Jan 2014
Note
13.5.4 Rogueware
Rogueware (also called rogue antivirus, scareware or ransomware) is
a form of Trojan horse that is written to look and act like legitimate
software, in order to trick users into downloading and installing it. A
common example of rogueware is a program called Security Essentials,
which is designed to look like the legitimate Microsoft Security Essentials
program but is in fact rogueware.
Another example is websites that trick users into downloading and installing
free anti-virus software, which is in fact rogue anti-virus that contains
malicious code.
13.5.5 Rootkits
In a security context, a rootkit is malware that is installed and hidden
mainly to compromise a system and get escalated privileges, such as root
or administrative access. A rootkit is usually installed on a computer by first
getting user-level access and once installed, enables the attacker to gain
root or privileged access to the computer. Root or privileged access could
also allow the attacker to compromise other systems on the network.
Not all rootkits are malicious, but many are and they hide their malicious
activities. Attackers may be able to access your information and monitor
your actions, change and hide files and processes to avoid detection,
change registry keys, create a backdoor entry into your computer to steal
information without you knowing about it, reconfigure your settings or
install additional malware from a remote location. Rootkits can even strike
firmware so that not even shutting down the system or re-formatting the
drive removes them.
Note
Many rootkits like other malware run in the background and hide
themselves. Therefore, you can usually easily spot them by looking
for memory processes, monitoring outbound traffic and checking
for newly installed programs that you did not install.
Rootkits can even replace netstat with a modified version that does not
show the ports used by the rootkit.
Antivirus software sometimes indicates that it can detect and remove
rootkits. This might be true for some rootkits, but for well-written rootkits,
it requires extraordinary measures to remove them. For example, one
rootkit infects the disks master boot record and write-protects it. Even if
you try to reformat the disk, the virus protects the MBR and the rootkit
remains.
13.5.6 Grayware
Grayware (or greyware) is a general term that is sometimes used to
classify programs or files that behave in an annoying or undesirable way,
and yet do not directly do harm to systems and data. However, they do
negatively affect the performance of your computer and involve significant
security risks. Spyware, adware, pop-ups, joke programs and remote
access tools are just some examples of grayware.
13.5.6.1 Spyware
Spyware is software that is either downloaded unwittingly from a website
or installed as part of third-party software that secretly monitors and
collects information about your activity or browsing habits and reports it to
someone else, without your permission and knowledge. That someone else
could be an attacker or online company. Spyware can capture your
keystrokes
(known
as
keyloggers),
screenshots,
authentication
credentials, web form data, Internet usage habits and other types of
information and can use your computers resources to run distributed
computing applications and your Internet connection and email address list
to spread itself to other computers.
Another popular spyware method is to spawn pop-up browser windows
disguised as Windows system warnings that when clicked, trigger a flood of
other browser windows, or may even start a file download.
Note
Spyware often changes your web browser settings. When your web
browsers default home page has been changed, a particular
website comes up every time you perform a search, unusual addons or toolbar helpers install automatically, too many pop-up
windows appear, unusual network activity occurs, the firewall and
anti-virus programs turn off automatically, new programs, icons
and favourites appear, and the Java console appears randomly,
then suspect it could be due to spyware.
13.5.6.2 Adware
Adware is advertising-supported software or a browser plug-in that
observes your activity and displays targeted advertisements.
If you want to check an account, type the address into the web
browser so that you know you are going to the actual website.
13.5.8 Botnets
A botnet, short for robot network, is a group of computers that work
together as zombies or bots (robots) for a bot herder. The bot herder or
master/handler is one or more command and control servers that the
attacker uses to send out commands to all the zombies in the botnet or
zombie army, directing them to do whatever it programmes them to do.
Usually this means downloading and installing additional malware but it
could direct the zombies to send spam to others, start attacks to deny
services such as Denial of Service (DoS), or participate in other malicious
activities. Botnets are huge. It is not uncommon for a botnet to include
tens of thousands of zombie computers on the Internet. Several botnets
have included more than a million computers.
User computers often join a botnet after becoming infected with malware.
If antivirus software does not detect the infection, users will not know.
However, one sign of a botnet infection is unusual network activity when a
user is not accessing the Internet.
Note
13.5.9 Spam
Spam is email that you do not want or have not asked for. While spam is
not malware itself, it is often used to deliver malware via an email
attachment or embedded script or to trick you into clicking a link to a
malicious website that attempts to steal your private information or to get
you to download malware, such as a driveby download that automatically
downloads and installs itself on your computer without your knowledge.
Spam is also notorious for phishing attacks.
Note
www.cert.org
www.sans.org (check out the Top 20 critical security controls)
www.schneier.com
www.grc.com
You can also visit the website of the anti-virus vendor (as shown in Figure
13.17) and look to their malware encyclopaedias for information about the
type, symptoms, purpose and removal of malware.
Here is a long list of steps that can be taken to reduce the risk of virus
infections:
Back up regularly so that you can recover any data that is lost due to
an infection.
Test and apply OS and application security patches and updates. You
can protect your system against malware by keeping it up to date.
Microsoft releases patches and updates on the second Tuesday of every
month (commonly called Patch Tuesday). Updates are useful only
when they are applied. If the update is not applied, the system remains
vulnerable. Malware authors enjoy finding un-patched systems, as the
authors are often able to install malware onto a system without being
detected.
Never give out private information except to authorised users.
Do not allow users to bring and install their own programs. If necessary,
remove or disable removable drives. Windows also allows the
administrator to determine who can run and install programs and
download files. Use these rights effectively.
Install and run anti-virus software that can scan automatically. Keep the
scanner up to date with the latest signatures or definitions (its
identifying fingerprint), since viruses with new signatures come out all
the time.
Perform scans on removable media such as USB drives before using
them.
Keep your A-V program updated. Criminals are constantly creating new
malware and even different versions of old malware on a daily basis. If the
definition file does not include the signature of a new virus, the A-V
program will not detect it. Vendors recommend updating them daily.
Fortunately many AV programs automatically check for updates several
times a day and will download the updates when they are available, or will
at least have update settings that you can configure. Further, you should
periodically update the core anti-malware programming called the engine
to use the latest refinements the developers have included.
Figure 13.19 shows the updated process for a free A-V program called
Malwarebytes.
Figure 13.24 Action Center indicating Windows did not find A-V
software
Note
When the standard steps for removing malware do not work, the
best source for additional information is A-V websites.
If you cannot delete a file and the system reports that it is in use,
you can usually delete it from within safe mode. There are other
tools that you can also use. For example, you might be able to use
the del (delete) command with the /f switch to delete a file, or you
might use a third-party tool.
Because Safe Mode starts with a minimal set of drivers and services, the
malware usually will not be started and cannot protect itself.
Tip
If you need to update definitions for your A-V program, you will
need to select Safe Mode With Networking.
Note
There are two primary ways that you can protect systems.
Ensure that all systems have up-to-date A-V running.
Ensure that AutoPlay is not configured to automatically run programs
from USB drives or from any other media.
o On Windows XP, you can access AutoPlay settings from Windows
Explorer. Right-click an optical disc drive, select Properties, and click
the AutoPlay tab.
o On Windows Vista/7, you can access the AutoPlay applet in Control
Panel from a list view.
13.7.3.8 Best practices for removing malware
There are several best practices for removing malware from systems:
Attack
Tailgating or
piggybacking
Phishing
Configure user rights assignment, account and audit policies in the local
security policy, found in Administrative Tools. You can, for example,
configure the right to load and unload drivers, access the computer
from the network, log on locally, shutdown the system, back up files
and take ownership of files and other objects. Group policies can be
configured and applied to the entire domain.
Grant system privileges and rights over NTFS folders and files.
Restrict user permissions by configuring users as administrators or
standard users and using UAC to help prevent malware from taking
action on your workstation without you knowing about it.
Change default usernames for accounts to make them more difficult for
malware or a hacker to use. For example, you can change the name of
the Administrator account to admin2pc. If others try to log on by using
Administrator, error messages will indicate that either the username or
the password is wrong. No matter how many times they try to guess
the password, they will never succeed.
Disable the guest account. Similarly, you can change the name of Guest
to guest2pc, making it more difficult to use this account.
Run A-V, Anti-spyware, Firewall and Windows Update and keep the
software updated.
Disable Autorun.
Use a privacy filter.
Educate users to lock their desktop or enable a password-protected
screensaver when leaving their workstation unattended, such as when
they go to lunch. This requires users to log in after locking their desktop
or after the screen saver starts and prevents someone else from
performing actions as though they were the user (a lunchtime
attack). You can lock the Desktop by pressing <Windows> + <L> or
using the Lock Computer icon on the Start menu (or place the icon on
the Start menu by configuring its Properties). On Windows 7, you can
enable the screen saver by right-clicking the desktop, selecting
Personalize, and then clicking Screen Saver. Figure 13.29 shows the
Screen Saver Settings page. After choosing a screen saver, select the
On resume, display logon screen check box.
Windows includes several built-in screen savers, and you can find
more online. However, many screen savers available online are
infected with malware.
If a TPM is not available, BitLocker can be used with a PIN that must be
entered when the computer starts.
OR
An external USB drive that includes a startup key and is inserted when
the computer is started. The BIOS must support booting to USB for this
option to work.
And
A hard drive with two NTFS volumes that preferably was created during
the OS installation: One volume for the OS that will be encrypted and
the other an active volume that remains unencrypted so that the
computer can boot. If a second volume needs to be created, the
BitLocker Drive Preparation Tool can be of assistance and can be
downloaded from Windows Update.
Tip
If you select compression instead of encryption, the folder will be colourcoded blue. Encrypted items are green while compressed items are blue.
Remember that you cannot compress and encrypt a file or folder at the
same time.
On Windows XP, open the Folder Options Control Panel applet, click
the Offline Files tab and click Encrypt Offline Files To Secure Data.
On Windows Vista, open the Offline Files Control Panel applet, click
the Encryption tab and click Encrypt.
On Windows 7, start the Sync Center from the Control Panel and click
Manage Offline Files. Click the Encryption tab and click Encrypt.
See Figure 13.31.
The primary goal of hard drive sanitation is to ensure that the hard drive
is fully erased and that any residue or left-over data that could be valuable
to someone else is permanently erased. In some cases, you can use
software tools to sanitise or clean a hard drive. Software tools can
overwrite the drive to remove all remnants of the data (a process called
remnant removal). Otherwise, hardware tools can be used to physically
destroy the drive, or encryption can be used to make the data unreadable.
13.10.4.1 Deleting files
Any file you delete in Windows is moved to the Recycle Bin temporarily so
that it can be restored if needed. However, even when a file is deleted from
the Recycle Bin or the Recycle Bin is emptied, the file is not fully erased
from the disk. That is because the file system uses a table to identify the
location of the file and when the file is deleted, only its entry in the table is
deleted. You can find many undelete tools that will locate deleted files and
add them back to the file system table. If you have data that you do not
want anyone else to access, you need to do more than just delete it. That
is, there are tools available that will completely remove files.
13.10.4.2 Low level vs. standard formatting
Manufacturers perform a low-level format at the factory to define the
positions of the tracks and sectors on the disks platters. Low-level
formatting involves writing zeros onto the disk and can be used to erase
the disk. A zero-fill program sanitises the disk by filling every sector with
zeros. There are zero-fill or low-level format programs available from hard
drive vendors that you can use to fully erase all data on the drive, resetting
it to its factory condition.
Figure 13.32 shows the Western Digital Data Lifeguard Diagnostic Utility,
which enables you to fully erase the disk.
Deleting a file does not truly erase it. Overwriting a file multiple
times with different bit patterns is a secure method of deleting a
file.
For example, a software bug might prevent data from being completely
deleted or the user running the program might make a mistake. To avoid
these risks, companies often choose to physically or magnetically destroy
the media using one of the following effective methods:
Password managers are also available that can be used to store passwords
for multiple accounts.
Anything that shows on the computer screen can be protected using a
privacy filter. Also, users should lock their computers whenever they leave
their workstation.
Study
Notes
Study
Notes
Skills
CPU mobile devices use a system on a chip (SoC), which is a chipset that
might feature one or more or all of these features: processor cores, GPU
cores, Northbridge, Southbridge, system memory and possibly radios for
4G, Bluetooth and Wi-Fi, packaged into one unit. Most companies design
their SoCs around the ARM (Advanced RISC Machine) instruction set and
core architecture or an improvement of that architecture, although there
are other architectures. ARM is a RISC (reduced instruction set computer or
computing) CPU architecture. It uses fewer transistors than the typical
computers CPU, which means that it processes larger operations in smaller
simple chunks and has a more efficient multi-core design that allows the
processor to save power by stopping the cores until it receives instructions
to do something.
Although two SoCs from different companies can both appear to use the
same CPU, the difference lies in the chipset and the components they use.
Both 32-bit and 64-bit architectures are in use and modern mobile CPU
frequency is measured in GHz.
Figure 14.2 shows a SoC diagram for a mobile device.
System memory mobile devices use some low power variant of DDR
SDRAM, which is measured in GB.
Display mobile devices use a variety of display types. Most tablets use
some type of LCD panel, with the less expensive ones using twisted
nematic (TN) panel and the better ones using an In-Plane Switching (IPS)
panel or Plane-to-Line Switching (PLS) for richer colours and better viewing
angles. Smartphones use OLED screens.
Note
Mobile device screen sizes vary and are commonly quoted as the
diagonal size in inches. This is the length of the screen from the upper
corner to the opposite lower corner and includes only the viewable
area. Smartphone screen sizes range from 3 inches to over 5 inches,
while some smartphones have larger screens. Tablet screen sizes tend
to range from 7 inches to 10 inches.
Buttons and switches mobile devices have various buttons and switches
to operate the device, such as to switch it on and off and to control the
volume.
14.1.2 Sensors
Mobile devices can tell which way the device is being held and change the
screen accordingly. Both accelerometers and gyroscopes sensors can be used
to determine the movement and orientation of the device:
Many devices have a built-in calibration app that generally asks you to touch
the screen in various ways, which results in the app re-learning how to react to
your touch. You can also download apps for this. Many Android devices have a
screen calibration app called G-Sensor Calibration, as shown in Figure 14.4. To
use the app, lay the device down on a flat surface and run it. You can tell if the
surface is level by the horizontal and vertical levelling bubbles on the display.
Then press the Calibrate button to reset the G-sensor. Follow the directions for
the device to start and use the calibration app.
Tap quickly touch and release one finger to select an item or run an app.
Double Tap use two quick taps to perform an action. It will often allow
you to zoom in or zoom out on an item or run an app.
Flick flick the screen to scroll up or down or to pan from side to side. To
do this, place your finger on the screen and quickly swipe it in the desired
direction. This is sometimes called fling.
Press and Hold press and hold without removing your finger to perform
an action. Different items react differently to press and hold. This is
sometimes called press or long press, or touch and hold.
Drag use this to move some items. Select the item with your finger and
then drag your finger across the screen to move it. This is sometimes called
pan, swipe, scroll or slide.
Pinch this is commonly done by touching the screen with two fingers at
the same time and dragging them closer together, as if you were pinching
the screen. It will often zoom in closer. Pinch is sometimes called pinch
close.
Spread this is similar to pinch but is done by spreading two fingers apart.
It will often zoom out. Spread is sometimes called pinch open or stretch.
Repair
Hard drive
Tablet
Rarely
upgradeable
No FRUs
SSD drives
Interface
Touch interface
Upgrade
Laptop
Memory
and
hard
drives
easily
upgradeable
Components can be replaced
Mostly SATA, although some have SSD
drives
Most have a built-in keyboard and
touchpad, while some hybrids are touchbased
The OS for the mobile device is installed at the factory. The primary mobile
operating systems are:
There are other mobile operating systems in use, such as Microsoft Windows
Phone, Windows 8/8.1, Blackberry, Firefox OS, Ubuntu Phone (see Figure
14.5) and Tizen.
There are tablets that can run both Android and Windows together at
the same time, enabling you to switch between the two operating
systems without restarting the device. Data can even be synchronised
between the two.
Google, Apple and Microsoft offer a one-stop online store for almost everything
their customers want for their mobile computing and communication needs,
but the way they offer their products is slightly different. Although they all
provide a website where users can download apps for their respective
operating systems, Apple and Microsoft keep their apps under tighter control
while Google prefers to let developers determine what apps are available to
customers. While Apple manufactures its own devices along with its partners,
Google and Microsoft let a wide variety of device manufacturers produce the
hardware on which their OS runs.
You know when you are working with the Android OS and related
applications when you see the little robot, usually in green, present.
Android apps run in a sandbox, which is an isolated area on the system that
does not have access to the rest of the systems resources, unless the user
explicitly grants access when the app is installed. This lessens the impact of
vulnerabilities and bugs in apps.
Apple App Store Apple devices include links directly to the Apple App
Store or apps can be downloaded at the iTunes App Store at
itunes.apple.com. Because Apps for Apple devices are primarily
downloaded through the App Store and are not easily available through
other sources, the apps are less likely to be malware.
Note
Google Play Most Android apps (both free and paid-for) can be
downloaded from Google Play, at play.google.com/store. Alternatively,
you can download and install the apps APK file from either a third-party
site, the developers site, from the vendors online stores (which customise
the apps to work with their devices), or through an open source market for
Android apps (this provides no guarantee that the app will work on all
Android devices). Figure 14.10 shows the Google Play Store accessed from
a web browser.
You can use links, apps and browsers from within mobile devices to connect to
the respective stores. Alternatively, if the device is connected to the
computers USB port, you can browse apps on the website while working on
the computer and download directly from the website to your mobile device,
passing through your computer. iOS Apps can also be downloaded from a Mac
or PC through an iTunes application.
14.3.1 Wireless
If your mobile device supports Wi-Fi (which almost all mobile devices do), and
a wireless network is within range, you can configure your device to connect to
the wireless network and communicate with RF signals. Most mobile devices
have an embedded wireless antenna to connect to a wireless network. When
connected, you can access the same resources as other devices on the wireless
network, including using that network to access the Internet, download email
and so on.
The wireless configuration for a mobile device works similarly to the
configuration on a computer or laptop, with a wireless standard, SSID,
passphrase or passcode, and security type. The general steps are as follows:
1. In general, first enable Wi-Fi and then allow the mobile device to search for
wireless networks before connecting. See Figure 14.11.
If you still have trouble, you can try the following additional tasks:
If all of these methods fail, a hard reset can bring the device back to factory
settings. Always back up all data and settings before performing a hard reset.
And if the mobile device still cannot connect to any of several known good
wireless networks, take the device into an authorised service centre.
14.3.2 Cellular
Many mobile devices can connect to a cellular network. Most of the world uses
technologies based on GSM while some parts of the world use CDMA.
A+ Preparation | V1.0 Jan 2014
Note
4G networks are available in restricted geographical locations, provide ultrabroadband Internet access to mobile devices, and are designed to carry IPbased voice, data and multimedia HD streaming traffic at fast speeds. The ITU
has taken ownership of 4G, adding it into a specification known as IMTAdvanced. This specification calls for 4G technologies to deliver download
speeds of 1 Gbps when not moving and 100 Mbps when moving. Even though
LTE and WiMAX are marketed and labelled as 4G, that is only partially true
because although they use the extremely efficient OFDM multiplexing scheme,
they fall well short of the actual speed requirement. WiMAX in reality tops at
around 40 Mbps and LTE ranges between 4 Mbps and 30 Mbps (download
speeds).
14.3.3 Bluetooth
Bluetooth is a type of wireless protocol supported by many mobile devices for
sharing data over short distances. Bluetooth devices include mouses,
keyboards, speakers, monitors, headphones and printers, to name a few. Most
mobile devices have Bluetooth discovery disabled by default to conserve
battery life.
Pairing or linking a Bluetooth device with a mobile device is simple. You turn
on Bluetooth on the mobile device (if disabled) and power on the Bluetooth
device. Return to the mobile device to select to pair with the Bluetooth device
and then enter the appropriate PIN code, as shown in Figure 14.14. Not all
Bluetooth pairings require a PIN code, but there is always some kind of pairing
action to do on both devices to pair them. Keyboards and mouses normally
have a small switch to enable discovery mode. Always test the connectivity
between a mobile device and a newly added Bluetooth accessory. If you have
added a keyboard, for example, open up a note-taking app and start typing to
make sure it works.
14.3.4 Infrared
Infrared (IR) is a line-of-sight wireless technology that involves IR devices,
such as mobile devices and computers, connecting and transferring data using
LEDs. You need to go into the device settings to enable IR. Make sure that
nothing is blocking the IR line of sight signal between the IR devices.
14.3.5 NFC
Near field communication (NFC) is a set of standards for very short-range
wireless radio communication for mobile devices that have an NFC chip. NFC is
built upon RFID and allows devices to communicate simply by touching them
together or bringing them very close to each other, usually no more than a few
centimetres apart. Current and anticipated applications include contactless
transactions, data exchange and simplified setup of communications like Wi-Fi.
The FQDN of the SMTP server and port setting. This server sends your
emails to the recipients mail server, so it is sometimes called outgoing.
Companies will often use the same server name as the POP3 server. However,
SOHO users might have to use their ISPs SMTP server. The port number for
SMTP is 25 or 587 (for authenticated SMTP).
The security type used (if any). This will encrypt all traffic between the
mobile device and the mail server. Many mail servers require secure
connections, and they use SSL or TLS to create secure connections, so you will
need to know which of these is in use. If you are prompted to enter the SSL
port number or the secure port number, use the following:
As an example, Figure 14.17 shows the settings pages to add a new IMAP
email account on an iPad.
4. Move on to the Incoming Mail Server section, select IMAP or POP and enter
the appropriate information:
Host Name: Full server name or FQDN of the IMAP or POP server
Username: Full email address
Password: Email address password
5. Move on to the Outgoing Mail Server section and enter the appropriate
information:
6. Save and switch on SSL by selecting the account, selecting SMTP and in the
Incoming Settings section, enter the appropriate information:
Use SSL: ON
Authentication: Password
Delete from server: Never
Server Port: 993
Server Name
smtp.gmail.com
imap.gmail.com
pop.gmail.com
14.3.6.3 Exchange
Microsoft Exchange is a server application that many companies use to
manage email and mailboxes. If your company is using Microsoft Exchange
and it has been configured so that it is accessible via the Internet, you will
need the following information to connect:
If you connect to a Microsoft Exchange mail server, that server name often
takes care of both downloading and uploading of email. You might need to
know the domain that the Exchange server is a member of. Secure email
sessions require the use of SSL or TLS, typically on port 443.
14.3.6.4 Troubleshooting email connections
You can try some of the following methods when troubleshooting email
problems:
Make sure the mobile device is connected to the Internet and there is
adequate reception.
Verify that the username, password and server names are typed in
correctly. Remember that the username is often the email address itself.
Check the port numbers.
Double-check whether SSL or TLS security is required. For non-standard
port numbers and security configurations, check with your network
administrator or the network provider. You can also search online for this
information, if made available.
Also, it is best to set passwords with asterisks (*) so that they arent visible to
other people (shoulder surfers) looking over your shoulder to find out your
password. Finally, some devices allow you to encrypt the contents of the hard
drive.
Figure 14.19 Enabling the Passcode Lock and Erase Data as a failed
logon restriction
Some devices have a setting where the device will be erased after a certain
number of incorrect password attempts. There are also third-party apps
available for most mobile devices that can wipe the data after a certain
number of attempts. Some apps configure the device to automatically take a
picture after a set number of failed attempts and email that picture to the
owner of the device.
Play Sound if you cannot find the device and you know it is hidden
somewhere nearby, such as in your room, you can use this feature to send
a signal to the device to play a sound so that you can find it to switch the
sound off.
Send Message if you lose your device and someone else finds it, you can
use this feature to send a message to the device with your contact
information to let the person that finds your device know that you have lost
it and you would like it returned to you.
Remote Lock this is similar to the passcode lock except that you can send
the signal remotely. After it is set, no one else will be able to access the
device unless they know the passcode.
Remote Wipe this feature sends the remote wipe signal to remove all
data from the device.
Email When Found this feature will send an email to you that verifies any
signal you send to the device was received by that device.
Figure 14.21 Using iCloud and locator app to find an iPad and
available options
14.5.8 OS patching/updates
Security patches and OS updates are available on an on-going basis for mobile
operating systems. As a best practice, you should always ensure that your
device is up to date and the way to do this depends on the device you use.
Examples include using a built-in update app to connecting the device to a
computer via USB and downloading the update and installing it on the mobile
device, passing through the computer.
Soft reset this is usually performed by powering the device off and then
powering it back on again. Just like rebooting a computer, this can fix
temporary problems quickly and easily.
Hard reset this can sometimes fix more advanced problems. A hard
reset may remove all data and apps and return the device to its original
factory condition. Do not perform a hard reset without backing up all the
data and settings you require first.
Unit 15 - Virtualisation
At the end of this unit, you will be able to:
Study
Notes
Study
Notes
Skills
It is also possible to isolate each VM from any other, but in Figure 15.1,
each VM is connected to the other and to the host to create what is known
as a virtual network so that they can all share data and access the
Internet through the hosts network adapter. The Windows Server and
Linux Server VMs are virtual servers for the virtual network, providing
the same services and resources as a physical server would for a physical
network.
If enterprise virtualisation software were run on the host in Figure 15.1,
software-based virtual switches and virtual routers could be configured
and added to the virtual network, so that they would perform the same
function of hardware-based network switches and routers.
Tip
15.1.1 Hypervisor
The hypervisor or virtual machine manager (VMM) is an extra layer of
software, installed either on top of the host OS or directly on the physical
hardware, that provides a platform to create and run one or more VMs on
the host computer and manages the flow of input and output calls made
between each guest and the physical hardware (CPU, memory, storage) in
a fair and timely manner.
The hypervisor can partition the systems resources and isolate the guest
operating systems so that each has access only to its own resources, and
possibly access to shared resources such as files on the host OS, but
cannot affect any resource used by another guest OS.
The hypervisor only gives each guest a portion of the system resources of
the physical host for which it is assigned. For example, a host may have 64
GB of RAM installed, but a guest, which is configured with 4 GB, may
believe that it only has 4 GB installed. A guest may be writing files to a 100
GB virtual hard drive, but actually be working with a portion of a file
system on a much larger storage area network. Processing and network
resources work similarly: a guest may have two virtual CPUs and access to
a single NIC, but the physical host will have many more of both.
There are two types of hypervisors:
RAM Each guest OS requires enough RAM to run over and above the
RAM required by the host OS. For example, if running four VMs with 2
GB each, you will need at least 8 GB beyond what the host is using. The
amount of RAM needed depends on how many VMs you run and what
you use each one for.
Disk The VMs are stored as one or more image files on the disk. How
the VMs are used determines how much space is needed. As you install
applications on the VM or add data to it, the more space will be needed.
Space will also be needed for any snapshots taken. A snapshot is a set
of files that record the state of the VM at a given point in time that you
can repeatedly go back to in the event of a failure. Additionally, most
hypervisors support dynamically expanding disks that start out small
and automatically grow as additional storage space is needed.
Peripherals and adapters Most hypervisors allow guest VMs to use the
hosts sound, network and other adapters and input and output devices,
printers and USB peripherals.
The virtual NIC inside the VM can be configured in exactly the same way as
a real NIC can be configured on a physical host, that is, protocols and
services can be bound to it and it can be assigned an IP address. If there
are multiple virtual NICs in the configuration, the VM will need a unique IP
address for each one.
Security: Many security professionals use VMs for security testing. For
example, when a new virus is discovered, it can be released in an
isolated VM without infecting the host system.
Make sure that virtual devices for each guest OS are mapped to the
appropriate physical devices on the host computer, for example,
between virtual and physical network adapters.
Make sure that management procedures for developing, testing and
deploying guest OS images are being followed and are tightly monitored.
Virtual system management software can be used to detect rogue VMs
that are installed and running.
Secure the host using all of the practices and technologies covered
throughout this module.
Because the host represents a single point of failure, a redundant
host with the exact duplicated guest OS configuration can be kept on the
sidelines and deployed when the production server fails. Make sure that
the redundant server is kept up to date.
www.virtualbox.org
www.oracle.com
Note
From the Help menu, you can find help, connect to the VirtualBox
website using a browser, check for updates and view information about
the VirtualBox version.
15.5.3 Creating a VM
1. To create a VM, click on the New button at the top of the window (or
press <Ctrl> + <N>). A wizard will appear to guide you through the
creation process.
2. Click Next to skip the Welcome screen.
3. The Name and Operating System screen will appear and ask you to
give the VM a name and choose the guest OS type and version that will
be installed on it later on. The supported operating systems are
grouped. If the OS is not listed, choose Other. Your selection will
determine what VM Settings VirtualBox will enable and disable for the
guest OS. Choose the following options for this exercise:
Name set any name. In practice, however, you should give the VM
an informative and useful name that would distinguish it from any
other VMs you create. This name will later be shown in the VM list in
the left of the VirtualBox Manager.
Type: Microsoft Windows
Version: Windows 8.1 (64-bit)
See Figure 15.13.
You can run a 64-bit guest OS on a 32-bit host OS, but only if the
host has a 64-bit CPU and hardware virtualisation is enabled for
the particular VM.
4. Click Next.
5. At the Memory size screen, you can set the amount of RAM to be
allocated to the VM every time it is started. See Figure 15.14.
8. Next, specify a virtual hard disk for the VM. See Figure 15.15. The host
computer sees the VM as a large file on its system, but the VM sees it as
a real hard disk connected to it. When a guest OS reads from or writes
to the virtual hard disk, VirtualBox redirects the request to the image file
on the host. Like a physical disk, a virtual disk has a size (capacity),
which must be specified when the image file is created. This file can be
copied to another host and used on it. Here you have the following
options:
Click on the Create a virtual hard drive now to create a new,
empty virtual hard drive.
Pick an existing disk image file. The drop-down list contains all disk
images that VirtualBox currently remembers, including those that are
currently or have been attached to the VM (or have been in the past).
Alternatively, click on the small folder button next to the drop-down
list to bring up a standard file dialog box, where you can choose the
disk image file on the host hard drive.
Click Create to create the virtual hard disk and to create your VM.
Your newly created VM will appear in the VM list in the left pane of the
VirtualBox Manager, identified by the name that you initially gave to the
VM. Figure 15.18 shows the newly created VM called Windows 8.1 on the
left and its default properties on the right.
15.5.4 VM settings
With the VM selected, click the Settings button to open the Settings
window. See Figure 15.19. This is where you can configure hardware and
input and output settings for the VM. Categories like System, Display and
Network are listed on the left.
A+ Preparation | V1.0 Jan 2014
Clicking on each category will display tabs and settings for that category on
the right. Go through and explore the different settings under each
category and tab. Do not make any changes yet.
Motherboard tab: here you can configure virtual hardware that would
normally be on the motherboard of a real computer. See Figure 15.21.
o Base memory: here you can allocate the amount of memory to take
away from the host and give to the VM when it is running.
o Boot order: like a physical computers BIOS, you can choose the
order in which the guest OS will attempt to boot from the various
virtual boot devices, including CD/DVD drive, virtual hard drive,
network or none of these. In fact, when initially installing an OS from
an optical disc, you will want to boot from the CD/DVD, so make this
the first boot device as shown back in Figure 15.21, but once the
installation is complete, you will want to change the boot order to
boot to the virtual hard disk first. If you select Network, the VM will
attempt to boot from a network via the PXE mechanism and this
needs to be configured on the command line.
o Chipset: you can select the chipset that will be used by the VM. The
choices include:
PIIX3: The original and older chipset option that tends to work
well for many older and newer guest operating systems. Use this
for this exercise.
ICH9: This can be used for some modern guest operating
systems such as Mac OS X. This option should only be used if you
run into something wrong with PIIX3.
o Pointing Device: This has three options:
PS/2: the default virtual mouse for older guests.
USB Tablet: When a USB tablet is connected, VirtualBox reports
it to the VM and communicates mouse events to the VM through
the tablet, without having to capture the mouse in the guest.
USB Multi-Touch Tablet: suited to touch-based guest operating
systems.
o Enable I/O APIC: If you are going to use a 64-bit OS or anticipate
using more than one virtual CPU in the guest OS, enable this feature.
Advanced Programmable Interrupt Controllers (APIC) allows the
guest OS to use more than 16 IRQs and therefore avoid IRQ sharing
for improved reliability.
o Enable EFI: Extensible Firmware Interface (EFI) replaces the legacy
BIOS and may be useful for testing and developing EFI applications.
All modern operating systems can make use of EFI. If the guest does
not support EFI, do not enable this option.
o Hardware clock in UTC time: If enabled, VirtualBox will report the
system time in UTC format to the guest instead of local (host) time.
This affects how the virtual real-time clock (RTC) operates.
Processor tab: the following can be configured on this tab (as shown in
Figure 15.22):
o Processor(s): set how many virtual CPU cores the guest OS should
see. VirtualBox supports SMP and it can present many virtual CPU
cores to each VM. You should not assign more virtual CPU cores than
the physical CPU has available (real cores, no Hyper-Threads).
o CPU execution cap: set the amount of host CPU time the guest CPU
can use. The default setting is 100% meaning that there is no
limitation. Limiting the execution time of the virtual CPUs may cause
guest timing problems.
o Enable PAE/NX: this determines whether the PAE (Physical Address
Extension) and NX (Never Execute) capabilities of the host CPU can
be used by the VM. If enabled PAE allows a 32-bit CPU to address
more than 4 GB RAM and is a prerequisite for NX, which helps the
CPU protect against malware. Some operating systems, such as
Ubuntu Server and Windows 8/8.1, require PAE and cannot run in a
VM without it, so make sure it is enabled.
Video tab: this tab has the following options (as shown in Figure
15.23):
o Video memory size: you can set the size of video memory in MB
that will be taken away from the hosts video memory by the virtual
graphics card and made available to the guest. Depending on how
much video memory is available, higher resolutions and colour
depths may be available.
o Monitor count: here you can tell VirtualBox to display multiple
virtual monitors (windows) running side by side for a particular VM,
but only if the guest OS supports it. Otherwise, the VM can use
multiple physical monitors if it is running in full screen and seamless
mode, but you will need at least as many physical monitors as you
have virtual monitors configured. You can configure the relationship
between guest and host monitors using the view menu by pressing
<Right Ctrl > + <Home> when in full screen or seamless mode.
Note
Video Capture: here you can record the entire VM session from start to
finish or a part of it to a .webm file that can be played by a range of
video
playing
applications.
This
functionality
can
also
be
enabled/disabled while the VM is running. You can set the frame size,
frames per second, where to store the capture videos and quality.
Figure 15.25 shows the Storage category, with a SATA controller created
when the new VM was created. The name Windows 8.1.vdi is the same
name set for the disk when a new VM was created.
To add another virtual hard disk or CD/DVD drive, select the storage
controller (IDE or SATA) you want it to use and then click on the Add
Hard Disk button below the tree. You can then select either Add
CD/DVD device or Add Hard Disk.
Alternatively, right-click on the storage controller and select a menu
item there.
On the right side of the window, you can then set the following:
Choose a device slot the virtual disk should be connected to. IDE
controllers have four slots called primary master, primary slave,
secondary master and secondary slave. SATA controllers on the other
hand have up to 30 slots to which virtual devices can be attached. See
Figure 15.26.
Select the image file to use. For virtual hard disks, a button with a dropdown list appears on the right, giving the option of either selecting a
virtual hard disk file using a standard file dialog box or to create a new
hard disk (image file), which will bring up the Create new hard disk
wizard. Refer to Figure 15.26.
For virtual optical drives, you can Choose a virtual CD/DVD disk file
as shown in Figure 15.27. Most commonly, you will select this option
when installing an OS from an ISO file.
If you select Host Drive from the list, then the VM will connect to the
hosts physical optical drive and the guest OS will be able to read from
and write to that drive. You would select this option when installing
Windows from an installation disc. See Figure 15.27.
To burn optical discs using the hosts optical drive, select the Host
Drive option and then enable the Passthrough option that becomes
available.
NAT: This is the default mode and is the easiest way of accessing the
Internet from the VM to do chores such as checking email, downloading
files, web browsing and so on. A VM with NAT enabled functions like a
real computer that connects to the Internet through a router. The
router is the VirtualBox networking engine, which gives the VM a private
IP address and maps traffic from and to the VM in a hidden way. The
VM is invisible and cannot be reached from hosts on the Internet.
Usually, no configuration is required on the host network and guest.
Host-only Adapter: in this mode, the VMs can communicate with each
other and with the host to create a private, virtual network, but they
will not be able to communicate with LAN or Internet hosts. A virtual
network interface (similar to a loopback interface) is created on the
host, providing connectivity among VMs and the host.
On this tab, you first have to enable the USB controller and optionally
enable the USB 2.0 (EHCI) controller for the guest. After enabling these
options, you then must determine which USB devices will be available to
the guest. For this, you must create filters by specifying certain properties
of the USB device.
The USB 2.0 EHCI controller comes with the VirtualBox extension
package, which must be downloaded from the VirtualBox website
and installed separately.
As shown in Figure 15.31, you can set USB filters with fields set to empty
strings or for USB devices already attached to the host. Clicking on the +
USB button to the right of the USB Filter window creates a new filter, as
shown on the left in Figure 15.32 (behind the shortcut menu). You can give
the filter a name so that you can identify it and specify filter criteria. Rightclick on the new filter and choose Edit Filter to set criteria for it, as shown
on the right in Figure 15.32.
Tip
The more criteria you enter about the device, the more precisely it
will be selected and captured by the VM.
On a Windows host, you will need to unplug and reconnect a USB device to
use it after creating a filter. You can de-activate filters without deleting
them by clicking in the checkbox next to the filter name.
VirtualBox implements both a USB monitor, which allows it to capture
devices when plugged into the host and a USB device driver to claim USB
devices for a particular VM. You do not have to re-plug devices for
VirtualBox to claim them. On Windows, you can see all USB devices that
are attached to the host in the Device Manager.
Note
In the window of a running VM, you can select Shared folders from
the Devices menu, or click on the folder icon on the status bar in the
bottom right corner.
If a VM is not currently running, you can configure shared folders here
in VM Settings. See Figure 15.33.
15.6 Running a VM
Either one of the following methods can be used to start a VM:
Tip
If any information dialog boxes pop up after starting the VM, you
can ignore them after reading them by clicking Do not show this
message again and then clicking OK to close each box. If you are
prevented from running or accessing the guest OS for some
reason, then ask the lecturer for assistance.
If you have OS installation disc, insert it into the hosts optical drive and
then from the wizards installation media drop-down list, select Host
drive with the correct drive letter. See Figure 15.34. This allows the VM
to access the media inserted into the host drive and enables you to
continue with the installation.
With a downloaded ISO image file, you would normally burn the file to
an empty disc and proceed from there. But you can alternatively mount
the ISO file directly by configuring the Storage Settings within the VM.
VirtualBox will then present the file as an optical drive to the VM, much
as it does with a virtual hard disk image. For this, the wizards dropdown list contains a list of installation media that were previously used
with VirtualBox. If your medium is not listed, select the small folder icon
next to the drop-down list (shown in Figure 15.34) to bring up a
standard file dialog box. From there, you can navigate to and select the
image file on the hosts hard disk.
Tip
If the Select Start-up disk dialog box doesnt appear when starting
a VM, possibly because the VM already has a guest OS or the host
drive has not been selected for it, then you can press <F12>
quickly at the VMs boot screen to access the boot menu. From
there, you can choose the media to boot from.
To type within the VM, click on its window title bar first and the VM will own
the keyboard. To release keyboard ownership, press the Host key. Note
that while the VM owns the keyboard, some key sequences like <Alt> +
<Tab> will go to the guest instead of the host. After you press the host
key to re-enable the host keyboard, all key presses will go through the host
again.
The VM owns the mouse only after you have clicked inside the VM window.
The host mouse pointer will disappear, and your mouse will drive the
guests pointer instead. To release ownership of the mouse, press the Host
key.
For convenience, VirtualBox can make keyboard and mouse operations
between the guest and host more seamless through Mouse Integration
(MI). With MI, it is no longer necessary to click inside the VM to use the
mouse within it and press the host key to release it for use on the host.
Instead, the focus will switch automatically between the guest and host as
the pointer travels in and out of the VM window. MI can be disabled by
right-clicking on the mouse icon at the bottom right of the running VM
window and then choosing Disable Mouse Integration.
Use the item in the Machine menu of the running VM, for example,
there you will find Insert Ctrl+Alt+Delete. See Figure 15.35.
Press special key combinations with the Host key, which VirtualBox will
translate for the VM. For example, <Host > + <Del> will send
<Ctrl>+<Alt>+<Del> to the guest (to reboot it).
For <Alt> + <Tab> (to switch between open windows) and some other
keyboard combinations, you can configure whether the host or guest will
be affected by these combinations by configuring the settings in File >
Preferences > Input > Auto-capture keyboard.
8.1
in
VM,
make
sure
the
following
Tip
If the Select start-up disk dialog box does not appear when
starting the VM, but instead, a FATAL: No bootable medium is
found! System halted message does, it means that you have not
told VirtualBox where to find the guest OS, whether it be on a
CD/DVD, virtual hard disk or USB drive. Since this is an installation
from the optical disc, choose the Host drive option from the
Devices menu (refer to Figure 15.37) or press <F12> when
asked to and choose the CD/DVD boot option.
17. Click Use express settings for this exercise. The VM will try to
connect to the Internet, but since we are not connecting to the
Internet, the connection will fail.
Note
18. The next screen is the Sign in to your PC step. You normally have
two account options here:
Sign in with your Microsoft account: This option requires an
Internet connection. If you have an email associated with a major
Microsoft service, enter it here. If you do not, enter any email
address and Microsoft will create an account for you based on that
email address. This option will direct you to another screen where
you can choose to accept the default Skydrive settings and so on.
Sign in with a local account: Like with previous Windows
versions, this is a user account stored locally on this computer. This
is the only option available without an Internet connection. Do take
note that you will still need to create or use a current Microsoft
account sometime in the future, if you want to use features like
Windows Store to download apps.
19. Since we are not going to be connected to the Internet, choose Create
a local account for this exercise.
20. The next screen will ask you to enter a username and password, and
confirm the password and enter a password hint. See Figure 15.42.
Enter this information and click Finish.
This unit will only get you up and running with Windows 8.1 and
covers only the very basics. You are strongly encouraged to fully
explore the OS, as it will only benefit you in the workplace.
If you see your name and/or email address listed, type your password.
When authenticated, Windows displays the Start screen.
If you do not see your name, but you have an account on the computer,
click the left-pointing arrow
. Windows displays a list of all the
account holders. You may see the computer owners name and an
Administrator and Guest account.
If you have just bought the computer, use the account named
Administrator.
Search: opens the search panel so you can find just about anything,
including settings, files and apps.
Share: use this charm to access share options for the current activity
or active app. On the Desktop app, the Share icon lets you share a
screenshot of what you are currently viewing.
Start: use this charm to access the Start screen. This can also be done
by pressing the <Windows> key.
Devices: use this charm to access hardware devices such as print,
monitor and media devices that are available for use with the current
app, screen or window.
Settings: use this charm to access PC settings, to get information
about the network, to change sound levels, to set screen brightness, to
turn notifications on and off, to turn off the computer and more. The
More PC Settings link will enable you to access more options in the
Control Panel. The Settings option will display settings for individual
active apps.
Tip
Instead of opening the search panel, you can search for apps,
settings and files and even Internet content simply by typing
directly at the Start screen.
Tip
Figure 15.49 App thumbnail bar listing running apps (on the left)
Tip
If you cannot find a newly installed app, chances are good that it is
in the All Apps area. Windows 8.1 places newly downloaded apps
in the All Apps area rather than on the Start screen.
Change account picture: this allows you to choose a new picture for
your account from images that you have on the system.
Lock: this will lock the system so that a password, PIN or picture
password is needed to sign in again.
Sign-Out: this will sign you out of your account so that other users can
sign-in. You can sign in again later on to access the system as you left
it.
Tip
If you want to change your password, you can do this from the
Accounts page in PC Settings. Click the Settings Charm and then
click Change PC Settings to access the options.
The Start screen treats the desktop as just another app, so you can switch
to the desktop just as you would open any other app: Click the Start
screens Desktop tile or press <Windows> + <D>. Figure 15.52 shows
the Windows 8.1 desktop.
Taskbar: the taskbar sits at the bottom edge of the desktop and is
where you can access active programs, files, folders and windows.
Programs such as Microsoft Paint and Notepad are not apps, but
desktop programs and thus need the desktop to work. Point at a
programs icon on the taskbar to see the programs name or perhaps a
thumbnail image of that program in action and click on the programs
icon to launch it.
For example, click on the folder icon on the taskbar to open File
Explorer. See Figure 15.53. This is the filing program that lets you
navigate the computers hard disk and the network and open and
manage files and folders. It has a ribbon with commands (buttons,
lists, etc.) that are organised on task-specific tabs and in featurespecific groups on each tab. Some groups have related dialog boxes or
task panes that contain additional commands.
Recycle Bin: The desktops Recycle Bin icon stores recently deleted
files for easy retrieval.
Charms bar: Technically, the Charms bar is not part of the desktop,
but is hidden beyond every screens right edge. To open the Charms bar
with a mouse, point at the desktops top- or bottom-right corners.
To visit the Start screen from the desktop, click the Start button.
Alternatively, right-click on the Start button to show the Power User
menu. This menu has shortcuts to management, configuration and other
Windows tools. You can also press <Windows> + <X> to display the
Power User menu, as shown in Figure 15.54.
PCs and Devices: Here you can personalise the PC and adjust mouse,
keyboard, display (resolution and multi-monitor), printer, scanner and
other peripheral settings. You can also customise the lock screen and
hot corner functionality, set power, sleep and Autoplay options and view
information about the PC.
Accounts: Here you can switch between Local and Microsoft accounts,
change password and the account picture, and add, edit and remove
user accounts and authorise other users access to use this system.
Search and Apps: Here you can configure how search works and
whether to keep searches local only or to search the Internet as well,
clear search history, and enable and disable apps that you wish to use
when searching. You can also configure how Windows Store App
notifications called toast notifications that appear on the top right
corner of the Start Screen are displayed, as well as choose the apps and
programs Windows will use by default.
Time and Language: Here you can change the time zone, adjust the
time and date formats to match your region, and adjust other settings
relating to your language and geographic region.
Ease of Access: Here you can configure settings that make Windows
8/8.1 easier to use.
2. To boot Windows 8.1 to the desktop, select When I sign in or close all
apps on a screen, go to the desktop instead of Start.
3. You can also configure the All Apps view in interesting ways here:
a) The option Show the Apps view automatically when I go to
Start will disable the Start screen completely. If you check this
option, pressing the <Windows> key will take you straight to the All
Apps view instead.
b) The option List desktop apps first in the Apps view when its
sorted by category option, will list desktop programs in the All Apps
view ahead of Start screen apps.
You can also move your mouse to the four corners of the screen. These are
called hot corners. Each will display different options. The top and bottom
right corners will open the App Bar and the top and bottom left corners will
allow you to switch between running apps and opening the Start screen.
Reset your PC: this performs a clean install of the OS to the factory
default. You lose everything from your current Windows 8/8.1
installation, only keeping the apps that came with the system at the
factory. See Figure 15.59. You might be asked to insert recovery media
that came with the system.
If the USB flash drive is large enough and if the PC came with a Recovery
Partition containing a copy of Windows 8.1, you can also copy across this
backup copy of Windows 8.1 to the drive. This means that if you are in a
situation where the Windows 8.1 computer simply will not start and you
need to re-install the OS, start the computer from the Recovery Drive and
you will be presented with the Windows recovery environment (Figure
15.63).
You have one additional option to access the recovery console: press
<F10> and select Launch Recovery Environment. This causes Windows
to restart and open at the beginning of the Advanced Startup menu,
enabling you to begin the startup option selection process from the
beginning. From there, you can select Command Prompt.
Tip
Switch to Fullscreen use this so that the guest OS fills the entire
screen.
Switch to Seamless Mode with this option, the Host OS and guest
OS appear to merge. This allows the window of an application running
on the desktop of a guest OS, such as Windows, to be placed on the
desktop of the host OS, such as Linux, that makes it appear as if it is
running directly on the host rather than within the VM.
Switch to Scaled Mode use this so that the VMs screen will be
scaled to the size of a window. This can be useful if many VMs are
running and you want to have a look at one of them while it is running
in the background.
Adjust Window size use this option to change the window size.
Save the machine state: This tells VirtualBox to freeze the state of the
VM to a file on the hosts local disk, so that when the VM is started
again, it will resume in the same state it was left in. Any programs that
were open will still be open.
Send the shutdown signal: This is like pressing the PCs power
button, it sends an ACPI shutdown signal to the VM. This is an
appropriate way of shutting down the VM, but only if it is running a fairly
modern guest OS and only if the shutdown command within the guest
OS cannot be executed.
Power off the machine: This is like pulling the PCs power cable. It
tells VirtualBox to stop running the VM without saving its state. Avoid
using this option as much as possible, due to potential loss of data.
You should shut down the VM the same way you would with any
host, that is, by clicking the shutdown button within the guest OS.
15.11 Snapshots
A snapshot is a point in time image of the VMs state that you can
repeatedly go back to and use in the future in the event of a failure, even
though you might have changed the VM considerably since taking the
snapshot. You can create many snapshots to go back many points in time,
but remember: they all take up disk space.
A snapshot contains three items:
o
o
o
o
o
o
Note
Lab
Lab
Lab
Lab
Lab
Lab
16:
18:
20:
21:
22:
23:
Two computers are needed to complete the labs. You can create
your own VMs for those exercises that are performed on VMs. The
lecturer will provide you with the resources and equipment that are
available. Skip those lab exercises that require resources and
equipment that are unavailable. However, it is advisable that you
read through every exercise as they cover the tasks that a
computer technician would perform in their job.
Start date :
Student, please note that unless all of the following exercises have been
signed off by a lecturer, you will not be allowed to book for the A+ practical
examination.
DATE
SIGN
Unit 1
Unit 2
Unit 3
Unit 4
Unit 5
Unit 6
Unit 7
Unit 8
Unit 9
Unit 10
Unit 11
Unit 12
Unit 13
Unit 14
Unit 15
You will need to go through all of the exercises in this study guide and
both GTS lab books to prepare for the practical examination.
You should focus on the following areas for the practical examination:
o Troubleshooting hardware
o Assembling a PC
o Changing BIOS settings
o Installing Windows 7, Windows XP and Windows 8.1
o Changing computer names
o Installing drivers
o Installing and configuring VirtualBox
o Networking computers and testing network connectivity
o Performing Remote Desktop tasks
o Installing a second hard drive on VirtualBox and a physical computer
o Creating partitions
o Converting a basic disk to a dynamic disk
o Creating dynamic disk volumes (simple, striped, etc.)
o Performing backups
o Configuring power management
o Changing registry settings
o Editing the BOOT.INI file
o Creating users and adding them to specific groups
o Creating folders and files
o Hiding files and displaying hidden files
o Sharing folders
o Changing NTFS and Share permissions
o Mapping a network drive
o Redirecting the results of commands into a text file using command
prompt
Bibliography
Web sites
www.tomshardware.org
www.intel.com
www.amd.com
www.nvidia.com
technet.microsoft.com
www.microsoft.com
windows.microsoft.com
msdn.microsoft.com
www.apple.com
www.cisco.com
www.comptia.org
www.virtualbox.org
www.vmware.com
pcsupport.about.com
www.cnet.com
www.webopedia.com
Books
General comments (what would you add, leave out, change, etc.).
Campus:
Lecturer:
Date:
Please return this evaluation form to your lecturer so that it can be forwarded
to the Division for Courseware Development. Thank You.
Bedfordview Campus
1st Floor, 14 Skeen Boulevard
Bedfordview, 2008
P.O. Box 1389, Bedfordview, 2008
Tel: +27 (0)11 450 1963/4, Fax: +27 (0)86 686
4950
Email: bedfordview@cti.ac.za
Bloemfontein Campus
Tourist Centre, 60 Park Avenue,
Willows, Bloemfontein, 9301
P.O. Box 1015, Bloemfontein, 9300
Tel: +27 (0)51 430 2701, Fax: +27 (0)51 430 2708
Email: bloemfontein@cti.ac.za
Durban Campus
59 Adelaide Tambo Drive (old Kensington Drive)
Durban North, 4067
P.O. Box 20251, Durban North, 4016
Tel: +27 (0)31 564 0570/5, Fax: +27 (0)31 564
8978
Email: durban@cti.ac.za
Durbanville Campus
Kaapzicht, 9 Rogers Street, Tyger Valley, 7530
P.O. Box 284, Private Bag X7
Tyger Valley, 7536
Tel: +27 (0)21 914 8000, Fax: +27 (0)21 914
8004
Email: durbanville@cti.ac.za
Nelspruit Campus
50 Murray Street
Nelspruit, 1200
P.O. Box 9497, Sonpark, Nelspruit, 1206
Tel: +27 (0)13 755 3918, Fax: +27 (0)13 755
3918
Email: nelspruit@cti.ac.za
Potchefstroom Campus
16 Esselen Street
Cnr Esselen Street & Steve Biko Avenue
Die Bult, Potchefstroom, 2531
P.O. Box 19900, Noordbrug, 2522
Tel: +27 (0)18 297 7760, Fax: +27 (0)18 297
7783
Email: potchefstroom@cti.ac.za
Pretoria Campus
Menlyn Corporate Park, Building A
175 Corobay Avenue (Cnr Garsfontein), Pretoria,
0181
PostNet Suite A147, Private Bag X18
Lynnwood Ridge, 0040
Tel: +27 (0)12 348 3060, Fax: +27 (0)12 348 3063
Email: pretoria@cti.ac.za
Randburg Campus
6 Hunter Avenue, Cnr Bram Fischer Drive
Ferndale, Randburg, 2194
P.O. Box 920, Randburg, 2125
Tel: +27 (0)11 789 3178, Fax: +27 (0)11 789
4606
Email: randburg@cti.ac.za
Vanderbijlpark Campus
Building 2, Cnr Rutherford & Frikkie Meyer Blvds
Vanderbijlpark, 1911
P.O. Box 6371, Vanderbijlpark, 1900
Tel: +27 (0)16 931 1180, Fax: +27 (0)16 933 1055
Email: vanderbijlpark@cti.ac.za