You are on page 1of 91

Introduction

Type of Competency: Computer Hardware Servicing Module : Configuring Computer Systems and Networks How to use this module

HOW TO USE THIS MODULE Welcome to the Module: Configuring Computer Systems and Networks This

module contains training materials and activities for you to complete. The unit of competency Configure Computer Systems and Networks contains the knowledge, skills and attitudes required for Computer Hardware Servicing. It is one of the Core Modules at NC II You are required to go through a series of learning activities in order to complete each learning outcome of the module. In each learning outcome there are Instruction Sheets, you may refer to other reference materials for further reading to help you better understand the required activities. Follow these activities on your own and answer the self-check at the end of each learning outcome. Get the answer key from your instructor and check your work honestly. If you have questions, please dont hesitate to ask your facilitator for assistance. Recognition of Prior Learning (RPL) You may already have some or most of the knowledge and skills covered in this module because you have: been working for someone already completed training in this area If you can demonstrate to your trainer that you are competent in a particular skill or skills, talk to him/her about having them formally recognized so you wont have to do the same training again. If you have qualifications or Certificates of Competency from previous trainings, show them to your trainer. If the skills you acquired are still relevant to this module, they may become part of the evidence you can present for RPL. At the end of this learning material is a Learners Diary, use this diary to record important dates, jobs undertaken and other workplace events that will assist you in providing further details to your trainer or assessors. A Record of Achievement is also provided for your trainer to complete once you completed the module. This learning material was prepared to help you achieve the required competency in Configuring Computer Systems and Networks. This will be source of

information

Introduction

Type of Competency: Computer Hardware Servicing. Module : Configuring Computer Systems and Networks How to use this module

for you to acquire the knowledge and skills in this particular trade independently and your own pace with minimum supervision or help from your instructor. In doing the activities to complete the requirements of this module, please be guided by the following: Talk to your trainer and agree on how you will both organize the training under this module. Read through the module carefully. It is divided into sections, which cover all the skills, and knowledge you need to successfully complete. Work through all information and complete the activities in each section. Read the information sheets and complete the self-checks provided. Suggested references are included to supplement the materials provided in this module. Most probably your trainer will also be your supervisor or manager. He/She is there to support you and show you the correct way to do things. Ask for help. Your trainer will tell you about the important things you need to consider when you are completing the activities and it is important that you listen and take notes. You will be given plenty of opportunities to ask questions and practice on the job. Make sure you practice your new skills during regular work shifts. This way you will improve both your speed and memory and also your confidence. Talk to more experienced work mates and ask for their guidance.

Use self-check questions at the end of each section to test your own progress. When you are ready, ask your trainer to watch you perform the activities outlined in this module. As you work through the activities, ask for written feedback on your progress. Your trainer keeps feedback/pre-assessment reports for this reason. When you have completed this learning material and feel confident that you had sufficient knowledge and skills, your trainer will arrange an appointment with a registered assessor to assess you. The results of the assessment will be recorded in your Competency Achievement Record. Note: Please follow this template. Use Arial font, size 12 and strictly follow the same font style (regular, bold or italic) as shown in the sample template

Introduction

Type of Competency: Computer Hardware Servicing. Module : Configure Computer Systems And Networks Summary of Learning Outcome and Assessment Criteria : Computer Hardware Servicing

Qualification

Module Title : Configuring Computer Systems and Networks Module Description: This module covers the knowledge, skills and attitudes needed to configure computer systems and networks.

Learning Outcomes 1. Plan and prepare for configuration 2. Configure computer systems and networks 3. Inspect and test configured computer systems and networks Learning Outcomes no. 1 Plan and Prepare for configuration Assessment Criteria: 1. Appropriate Personal Protective Equipment are used and OHS policies and procedures followed 2. Normal function of systems and networks checked in accordance with manufacturers instructions 3. Fault or problem in the systems and networks diagnosed in line with the standard operating procedures. 4. Computer systems and networks configured in line with the standard operating procedures. CONTENTS: Occupational health and safety Testing normal function of systems and networks Procedures in checking the faults or problems Procedures in configure systems and networks

CONDITIONS: The students/trainees must be provided with the following: OH & S policies and procedures OH & S policies manuals Computer systems and networks 1 Server Peripherals 1 Desktop Computers Materials Wires and Cables Appropriate Software Computer Storage Media Tools Pliers Philips screw driver Equipment/testing devices Computer Personal protective equipment Anti-static wrist wrap

REFERENCES: Internet

http://en.kioskea.net/contents/configuration-reseau/testsdiagnostics-reseau.php3 http://www.ehow.com/facts_7536192_standard-operatingprocedure-computers.html http://ictknowledgebase.org.uk/healthandsafety http://en.wikipedia.org/wiki/Server http://en.wikipedia.org/wiki/Antistatic_wrist_strap http://en.wikipedia.org/wiki/Goggles http://en.wikipedia.org/wiki/Glove http://en.kioskea.net/contents/configuration-reseau/testsdiagnostics-reseau.php3 http://support.microsoft.com/kb/300986

Magazines

NRB Magazine
Groth, David; Toby Skandier (2005). Network+ Study Guide, Fourth Edition'. Sybex, Inc.. ISBN 0-7821-4406-3

PREREQUISITES: To complete this module you must have the competency in using various tools, equipment, supplies, and materials. It is also required to have the competency in performing housekeeping and safety practices, has good oral and written communication skills and has a basic knowledge in computer operation.

Type of Competency: CORE COMPETENCY INTRODUCTION Module: CONFIURING COMPUTER SYSTEMS AND NETWORKS How to use this module Qualification: COMPUTER HARDWARE SERVICING NC II Module Title: CONFIGURING COMPUTER SYSTEMS AND NETWORKS Learning Outcome # 1: Plan and Prepare for configuration Assessment Criteria: 1. Appropriate Personal Protective Equipment are used and OHS policies and procedures followed 2. Normal function of systems and networks checked in accordance with manufacturers instructions 3. Fault or problem in the systems and networks diagnosed in line with the standard operating procedures. 4. Computer systems and networks configured in line with the standard operating procedures. Resources: Internet

http://en.kioskea.net/contents/configuration-reseau/testsdiagnostics-reseau.php3 http://www.ehow.com/facts_7536192_standard-operatingprocedure-computers.html http://ictknowledgebase.org.uk/healthandsafety http://en.wikipedia.org/wiki/Server

Magazines

NRB Magazine

Type of Competency: CORE COMPETENCY Module: CONFIGURING COMPUTER SYSTEMS AND NETWORKS Activity LO1: Plan and prepare for configuration LEARNING EXPERIENCES LEARNING ACTIVITIES SPECIAL INSTRUCTIONS Read information sheet No.1 OH & S Information sheet No.1 OH & S Policies Policies and Procedure at workplace. and Procedure at workplace. Perform self check self check No.1 Submit answers for checking answers key No.1 Do the assignment assignment sheet No. 1 Learning Read information sheet No.2 SOP for computers. Perform self check Submit answers for checking Read information sheet No. 3 Safety Precaution Perform self check Submit answers for checking Read information sheet No. 4 What is Server, Peripherals and Desktop Computer Perform self check Submit answers for checking Do the assignment Read information sheet No. 5 materials needed in configuring computer systems and networks Perform self check Submit answers for checking Read information sheet No. 6the use of tools, equipment and testing devises in configuring computer systems and networks Perform self check Submit answers for checking ICAI Information sheet No.2 SOP for computers. self check No.2 answers key No.2 information sheer No. 3 Safety Precaution self check N. 3 answers key No.3 information sheer No. 4 What is Server, Peripherals and Desktop Computer self check N. 4 answers key No.4 assignment sheet No. 4 Information sheet No.5 materials needed in configuring computer systems and networks. self check No.5 answers key No.5 Information sheet No.6 the use of tools, equipment and testing devises in configuring computer systems and networks. self check No.6 answers key No.6 Do the institutional assessment

INFORMATION SHEET No. 1

Type of Competency: CORE COMPETENCY Module: CONFIGURING COMPUTER SYSTEMS AND NETWORKS Title: OH & S Policies and Procedure at workplace

OH & S Policies and Procedure at workplace Occupational health and safety is a cross-disciplinary area concerned with protecting the safety, health and welfare of people engaged in work or employment. The goal of all occupational health and safety programs is to foster a safe work environment.[1] As a secondary effect, it may also protect co-workers, family members, employers, customers, suppliers, nearby communities, and other members of the public who are impacted by the workplace environment. It may involve interactions among many subject areas, including occupational medicine, occupational (or industrial) hygiene, public health, safety engineering, chemistry, health physics. The Occupational Safety and Health Office (OS&H) is responsible for the implementation of Edith Cowan University's Safety and Health Framework, including relevant Policies and Procedures such as Hazard Identification and Accident Reporting Polices. The OS&H office provides advice and assistance to the network of OS&H Representatives and OS&H Committees. The OS&H office is able to provide assistance and guidance on matters such as OS&H legislation, hazard Identification, Risk Analysis and Control, safe systems of work, Ergonomics, Manual Handling and Return to Work Programs. Safety Safety is the state of being "safe" (from French sauf), the condition of being protected against physical, social, spiritual, financial, political, emotional, occupational, psychological, educational or other types or consequences of failure, damage, error, accidents, harm or any other event which could be considered non-desirable. Safety can also be defined to be the control of recognized hazards to achieve an acceptable level of risk. This can take the form of being protected from the event or from exposure to something that causes health or economical losses. It can include protection of people or of possessions. Health Health is the level of functional and/or metabolic efficiency of a living being. In humans, it is the general condition of a person in mind, body and spirit, usually meaning to being free from illness, injury or pain (as in good health or healthy).[1] The World Health Organization (WHO) defined health in its broader sense in 1946 as "a state of complete physical, mental, and social well-being and not merely the absence of disease or infirmity." Although this definition has been subject to controversy, in particular as having a lack of operational value and the problem created by use of the word "complete", it remains the most enduring.[4] Classification systems such as the WHO Family of International Classifications, which is composed of the International Classification of Functioning, Disability and Health (ICF) and the International Classification of Diseases (ICD), are commonly used to define and measure the components of health. Quality of life The term quality of life is used to evaluate the general well-being of individuals and societies. The term is used in a wide range of contexts, including the fields of international development, healthcare, and politics. Quality of life should not be confused with the concept of standard of living, which is based primarily on income. Instead, standard indicators of the quality of life include not only wealth and employment, but also the built environment, physical and mental health, education, recreation and leisure time, and social belonging.

Computer Health and Safety


The Law The number of computers in the workplace has increased rapidly over the last few years and it is now quite normal for most staff in voluntary organizations to be exposed to computer usage. The Health and Safety at Work Act lays down legal standards for computer equipment and requires employers to take steps to minimize risks for all workers. Workers have received substantial damages for injuries caused through use of computers where the employer could have foreseen the risk but did nothing about it. The main regulations covering the use of computer equipment include:

Health & Safety (Display Screen Equipment) Regulations 1992 Management of Health & Safety at Work Regulations 1992 Provision and Use of Work Equipment Regulations 1992 Workplace (Health, Safety and Welfare) Regulations 1992

Improving health and safety practice should be taken seriously, although it need not take much time or expense. Measures students should take include:

Understanding the law - make sure someone in your organization has a health and safety brief covering all areas, not just computers. Being aware of the health risks - the government officially recognizes some of the risks although there are some grey areas you'll need to make up your own mind about. Assessing the risks - using procedures set out in the law - be systematic and get help if you need it. Get a health and safety audit done by a competent organization if necessary. Taking steps to minimize the risks - this may only involve taking simple measures. Training all users to recognize the risks - if people aren't aware of the dangers they can't take adequate precautions to protect their health. Taking users views seriously - if users feel there is something wrong there often is.

The Risks With the increase in computer use, a number of health and safety concerns related to vision and body aches and pains have arisen. Many problems with computer use are temporary and can be resolved by adopting simple corrective action. Most problems related to computer use are completely preventable. However it is important to seek prompt medical attention if you do experience symptoms including:

continual or recurring discomfort aches and pains throbbing tingling numbness burning sensation or stiffness

Seek help even if symptoms occur when you are not working at your computer. Laptop computers can present particular problems due to small screens, keyboards and inbuilt pointing devices (e.g. a small portable mouse or touchpad). Prolonged use of laptops should be avoided. If using a laptop as a main computer (i.e. use as a normal desktop computer in addition to use as a portable), it is advisable to use the laptop with a docking station. This allows an ordinary mouse, keyboard and monitor to be used with the laptop. The main risks associated with using computers include:

Musculoskeletal problems 8

Eye strain and a greater awareness of existing eye problems

Rashes and other skin complaints have also been reported, although it is thought these are caused by the dry atmosphere and static electricity associated with display units rather than by the display units themselves. There are potential risks from radiation though this is a contentious area. Musculoskeletal problems These can range from general aches and pains to more serious problems and include:

Upper limb disorders such as repetitive strain injury (RSI) tenosynovitis and carpal tunnel syndrome - by far the most important as it can quickly lead to permanent incapacity Back and neck pain and discomfort Tension stress headaches and related ailments

These types of problem can be caused by:


Maintaining an unnatural or unhealthy posture while using the computer Inadequate lower back support Sitting in the same position for an extended period of time An ergonomically poor workstation set up

Eye strain Computer users can experience a number of symptoms related to vision including:

Visual fatigue Blurred or double vision Burning and watering eyes Headaches and frequent changes in prescription glasses

Computer work hasn't been proven to cause permanent eye damage, but the temporary discomfort that may occur can reduce productivity, cause lost work time and reduce job satisfaction. Eye problems are usually the result of visual fatigue or glare from bright windows or strong light sources, light reflecting off the display screen or poor display screen contrast. Prevention is better than cure Several relatively straightforward precautions can be taken by computer users to avoid problems. Avoiding musculoskeletal problems General precautions to avoid musculoskeletal problems include:

Taking regular breaks from working at your computer - a few minutes at least once an hour Alternating work tasks Regular stretching to relax your body Using equipment such as footrests, wrist rests and document holders if you need to Keeping your mouse and keyboard at the same level Avoiding gripping your mouse too tightly - hold the mouse lightly and click gently Familiarize yourself with keyboard shortcuts for applications you regularly use (to avoid overusing the mouse)

It is also important to have your workstation set up correctly. Your workstation includes monitor, keyboard, mouse, seating, desk, and where appropriate, footrest (to 9

enable you to put your feet flat if they would otherwise not reach the floor), wrist rest, and document holder. Monitors should:

Swivel, tilt and elevate - if not use an adjustable stand, books or blocks adjust the height Be positioned so the top line of the monitor is no higher than your eyes or no lower than 20 below the horizon of your eyes or field of vision Be at the same level and beside the document holder if you use one Be between 18 to 24 inches away from your face

Keyboards should:

Be detachable and adjustable (with legs to adjust angle) Allow your forearms to be parallel to the floor without raising your elbows Allow your wrists to be in line with your forearms so your wrists does not need to be flexed up or down Include enough space to rest your wrists or should include a padded detachable wrist rest (or you can use a separate gel wrist rest which should be at least 50 mm deep) Be placed directly in front of the monitor and at the same height as the mouse, track ball or touch pad

Chairs should:

Support the back - and have a vertically adjustable independent back rest that returns to its original position and has tilt adjustment to support the lower back Allow chair height to be adjusted from a sitting position Be adjusted so the back crease of the knee is slightly higher than the pan of the chair (use a suitable footrest where necessary) Be supported by a five prong caster base Have removable and adjustable armrests Have a contoured seat with breathable fabric and rounded edges to distribute the weight and should be adjustable to allow the seat pan to tilt forward or back

Tables and desks should:


Provide sufficient leg room and preferably be height adjustable Have enough room to support the computer equipment and space for documents Be at least 900 mm deep Have rounded corners and edges

10

SELF-CHECK No. 1 Self check No.1

Type of Competency: CORE COMPETENCY Module: CONFIGURING COMPUTER SYSTEMS AND NETWORKS LO1: Plan and prepare for configuration

Direction: Read the Question Carefully and choose the best answer. Write only the letter on the space provided. ________ 1. OH & S stands for? a. Occupation Houses and Street b. Occupation Health and Safety c. Office Health and Safety ________ 2.It is used to evaluate the general well-being of individuals and societies. The term is used in a wide range of contexts? a. Safety b. Health c. Quality of life ________ 3. It is the level of functional and/or metabolic efficiency of a living being. In humans, it is the general condition of a person in mind, body and spirit, usually meaning to being free from illness, injury or pain? a. Safety b. Health c. Quality of life ________ 4. It is the condition of being protected against physical, social, spiritual, financial, political, emotional, occupational, psychological, educational or other types or consequences of failure, damage, error, accidents, harm or any other event which could be considered non-desirable? a. Safety b. Health c. Quality of life ________ 5. The area concerned with protecting the safety, health and welfare of people engaged in work or employment? a. cross-disciplinary b. X- disciplinary c. OH & S disciplinary

11

ANSWER KEY No. 1

Type of Competency: CORE COMPETENCY Module: CONFIGURING COMPUTER SYSTEMS AND NETWORKS LO1: Plan and prepare for configuration

ANSWER KEY NO. 1

1. B 2. C 3. B 4. A 5. A

12

Assignment Sheet No. 1

Type of Competency: CORE COMPETENCY Module : CONFIGURING COMPUTER

SYSTEMS

AND

NETWORKS Title: PLAN AND PREPARE FOR CONFIGURATION

NAME OF TRAINEE: ______________________________________


Direction: Make a composition regarding in the essence of following the OH & S policies. Write it on one whole sheet of yellow paper to be submitted on next week.

13

INFORMATION SHEET No. 2

Type of Competency: CORE COMPETENCY Module: CONFIGURING COMPUTER SYSTEMS AND NETWORKS Title: SOP for computers

SOP for computers


Standard Operating Procedure for Computers When you get a computer, there is no list of exactly what to do or how to use it. Your manual will describe some basics about the computer but for day-to-day use you are left on your own to figure out the procedures for use to keep things going smoothly.

Shutdown
1. Close all your programs before shutting down the computer. 2. Click on the shutdown option in the Start menu and wait for it to shutdown. 3. Shutting down with just the power button can cause problems in the Microsoft Windows operating system.

Software
1. Close all other programs when installing a new program. This prevents problems with the new program. 2. Restart after each install. This ensures everything is installed correctly.

Safety
1. Keep your computer clean to keep it running well. 2. Don't eat over the keyboard and avoid spilling drinks near the computer. 3. Keep the computer in a place where it does not get too hot (above 95 degrees Fahrenheit or so). 4. Plug your computer into a surge protector.

Security
1. Install antivirus, antispyware and firewall software to protect your data and keep others from intruding in your computer files. 2. Shut your computer down when not in use. 3. Don't share your passwords or write them down where they can be found.

14

SELF-CHECK No. 2 Self check No.2

Type of Competency: CORE COMPETENCY Module: CONFIGURING COMPUTER SYSTEMS AND NETWORKS LO1: Plan and prepare for configuration

Direction: Write the correct procedure of the following:

Shutdown Software Safety Security

15

ANSWER KEY No. 2

Type of Competency: CORE COMPETENCY Module: CONFIGURING COMPUTER SYSTEMS AND NETWORKS LO1: Plan and prepare for configuration

Shutdown
1. Close all your programs before shutting down the computer. 2. Click on the shutdown option in the Start menu and wait for it to shutdown. 3. Shutting down with just the power button can cause problems in the Microsoft Windows operating system.

Software
1. Close all other programs when installing a new program. This prevents problems with the new program. 2. Restart after each install. This ensures everything is installed correctly.

Safety
1. Keep your computer clean to keep it running well. 2. Don't eat over the keyboard and avoid spilling drinks near the computer. 3. Keep the computer in a place where it does not get too hot (above 95 degrees Fahrenheit or so). 4. Plug your computer into a surge protector.

Security
1. Install antivirus, antispyware and firewall software to protect your data and keep others from intruding in your computer files. 2. Shut your computer down when not in use. 3. Don't share your passwords or write them down where they can be found.

16

INFORMATION SHEET No. 3

Type of Competency: CORE COMPETENCY Module: CONFIGURING COMPUTER SYSTEMS AND NETWORKS Title: Safety Precaution

Safety Precaution
Always Remember: Safety

First!

These guidelines are important. It is possible to do serious damage in the Computer Lab- both to yourself and to some expensive equipment. Please, follow these guidelines!

Protecting Yourself:

In the Computer Lab Please, no running. Coats, bags and other items should be placed under your desks or on the coat rack. Its easy to trip! Periodically glance away from the screen. Staring into a computer monitor too long will strain your eyes. Let an instructor know if the colour scheme, font size, or other settings of your computer are causing strain on your eyes. There are many built-in ways to adjust these settings for comfort. Avoid long sessions of typing as they may cause repetitive stress injuries to your hands. Maintain good posture to ease your back. Keep the noise level to a minimum. Be aware of the fire exits and the location of this rooms fire extinguishers. When working inside of a computer case Dont attempt to touch any live wires. The high voltage in this country can kill! Dont open the computers power supply or monitor. There is nothing inside either that can be repaired except by a professional, but there are many things that can injure you. Watch out for sharp metal edges! Finally Dont sit in front of the computer all day. It is not your friend, its just a tool! Get out and exercise, chat with your mates, and have a life! Protecting the Equipment: In the Computer Lab Please, no food or drink near the computers! Always shut down the computer via Windows Start button Use a surge protector to keep excess electric power from damaging your computer Unplug the computer or turn off the wall socket when the machine is not in use. Excessive heat can damage the computers. Please ensure that the room temperature stays cool. Motion can damage some computer components. Try to move laptop computers as little as possible, especially when the hard drive or the floppy drive is whirring. 17

Note all serial numbers, in case of theft. Always have at least two copies of all your important files, in case the worse happens! Especially in busy offices, the data on your computer is soon more valuable than the hardware itself. Turn off the computer when not in use. Like a car engine, parts wear out after a certain mileage!

When working inside of a computer case Beware of static electricity! The mild shock that would startle you can destroy the sensitive electronics inside of a computer. Wear an anti-static strap to ensure that you are grounded to the PC. Do not touch any of the circuit boards directly! If you must add or remove them, please handle them by their edges. They can be damaged, and the fingerprints that you leave behind can cause short circuits Especially, do not touch the gold or silver contacts where the component connects to the motherboard! Keep dust away from the computers. This can cause short circuits Lab Safety Rules Laboratory experiments are valuable methods of hands-on learning. However, safety should be a primary concern when dealing with chemicals. Basic lab safety rules concerning protection and procedures should be followed at all times. Food
o

Food and drink should never be allowed in a lab environment. This prevents the accidental ingestion of dangerous chemicals and other substances.

Fire
o

Flammable substances should always be kept away from any source of flame. When burners are needed, use them away from other combustible materials and exercise caution.

Safety
o

Protective safety measures should be used any time an experiment is under way. These safety measures include goggles and gloves, as well as fume hoods for toxic byproducts.

Procedures
o

Procedures for using fire extinguishers, eyewash stations and other safety gear should always be explained. Safety protocols should be followed at all times.

Experiments
o

Many types of experiments can create dangerous situations if they do not go as planned. Always exercise safety when experiments are under way and avoid looking directly into chemical test tubes.

Safety in the Laboratory Several labs in the Electrical and Computer Laboratory have equipment that can compose a danger if used improperly. All students, teaching assistants and faculty 18

using the lab, should be aware of the risks that are present in the particular lab they are working in. Inside the main door of every lab in the department there are two posters an information poster and a safety poster. The information poster:

outlines the general rules governing the use of the lab, lists networked printer names and locations, lists the name(s), telephone extension, office number and email address of the Engineering Support contact responsible for the equipment in the lab.

The color-coded safety poster:


lists the safety precautions that should be taken when using the lab, identifies the dangers and possible risks in that lab, and describes the procedures to follow in case of emergencies.

The safety posters are color-coded based on the severity of the risk: high-risk labs are coded with RED POSTERS, medium-risk labs with YELLOW POSTERS and lowrisk labs with GREEN POSTERS. The sections that follow, explain each type of environment. The safety posters are color-coded based on the severity of the risk in each lab. HIGH-RISK LABS (RED POSTER) Electrical Power, floor and wall outlets are at 120 Volts AC. If you come in contact with 120 Volts AC it could be fatal; take appropriate safety precautions. 208 Volts 3-Phase AC and 120 Volts DC exist in this lab. If you come in contact with any of these voltages it could be fatal; take appropriate safety precautions. Power Supplies in this lab generate fatal voltage levels. Improper use of test equipment will pose a danger.

Eye and muscle strain due to prolonged use of the computer. Take frequent breaks to relieve eye and muscle strain.

MEDIUM-RISK LABS (YELLOW POSTER) Electrical Power, floor and wall outlets are at 120 Volts AC. If you come in contact with 120 Volts AC it could be fatal; take appropriate safety precautions. Power Supplies in this lab could expose you to fatal voltages. Improper use of test equipment will pose a danger.

Eye and muscle strain due to prolonged use of the computer. Take frequent breaks to relieve eye and muscle strain.

LOW-RISK LABS (GREEN POSTER) Electrical Power, floor and wall outlets are at 120 Volts AC. If you come in contact with 120 Volts AC it could be fatal; take appropriate safety precautions.

Eye and muscle strain due to prolonged use of the computer. Take frequent breaks to relieve eye and muscle strain.

WHAT TO DO IN CASE OF EMERGENCY The following instructions apply to all locations on campus:

In case of Emergency, dial 80 on any campus telephone (RED button on pay phones), go to a safe location. If you discover a fire: pull the closest fire alarm, dial 80 from a safe location on any campus telephone (RED button on pay phones), and give Security all the

19

pertinent facts.

IF YOU HEAR OR SEE THE FIRE ALARM ACTIVATE, YOU MUST EVACUATE THE BUILDING IMMEDIATELY.

SAFETY DEVICES IN LABS/BUILDING Please be aware of the following emergency devices:


RED Emergency Power Shut Off (EPO) buttons, know the location of these buttons before starting work. Blue Distress Pulls, know the location of the these Pulls. Pay phones with RED emergency button, know the location.

GENERAL SAFETY PRECAUTIONS The following precautions apply to all labs:


Report any unsafe conditions, such as broken or frayed power cables, to your Professor, TA or Engineering Support. Be aware of your surroundings; familiarize yourself with the location of the Blue Emergency Pull Stations, Telephones, Fire alarm Pulls. Always consult Material Safety Data Sheets before using any chemical or hazardous materials. Never work alone late at night.

GENERAL LAB RULES The following rules apply to all labs:


No food or drink allowed in the lab. No offensive computer screens. No tampering with wires or network cables. No use of illegal software. No attempting to compromise network security.

General Safety Practices in the Laboratory The Laboratories in the Electrical Department provide students with the best opportunity to gain practical knowledge. Students, Staff and Faculty should make themselves aware of the possible hazards that may be present in the laboratory. Following are some general guidelines that can be used to reduce the risk of injury caused by laboratory hazards. 1. Know what you are working with and how to use it safely. Before beginning any new experiment, find out about the potential hazards involved and the appropriate safety precautions to follow. 2. Perform only appropriate experiments, and be sure you understand the procedures involved before you begin. If anything unexpected, dangerous, threatening, or unmanageable happens, immediately call your instructor or the lab staff personnel. 3. Use fume hoods or other necessary engineering controls when handling toxic materials. 4. Wear the proper protective clothing and equipment for each job. This should include eye protection and may include: o face shields or safety glasses (students are required to provide their own safety glasses). o lab coats or aprons (students are required to provide their own lab coats). o gloves to protect the hands from sharp edges, chemicals or hazardous materials. o hearing protection. 20

5. Students who are not appropriately attired will not be allowed to perform experimental procedures. Clothing that unduly exposes limbs to splash or drop hazards should not be worn i.e. Shorts, halter tops, sandals and open-toed shoes. Loose clothing and long hair should be confined to avoid contact with hazardous materials, equipment, rotating machinery, or heat sources such as soldering irons or open flame. 6. Contact lenses can be a serious problem in the laboratory, as they can trap chemicals next to the eye, and are difficult to remove in case of a splash accident. We strongly suggest that they not be used when in lab. 7. Never eat, drink, smoke or chew gum around chemicals or hazardous materials, and always wash hands thoroughly before touching food or cigarettes. Food and drink (including water) are not to be brought into the lab at any time. 8. Keep work areas clean and free from obstructions. Backpacks and coats should be put away. 9. Cleanup should follow the completion of any experiment, return leads etc. to wall racks. 10. All chemical containers should be correctly and clearly labeled. 11. Be familiar with emergency procedures; know the location of, and how to use, the nearest emergency equipment. Note the locations of fire extinguishers. (These should only be used on small fires, make sure the extinguisher is rated for type of fire.) Also note the location of fire alarm pull boxes. Upon hearing a fire alarm, all persons must leave the building. Leave quickly, making sure doors are closed. Don't use the elevator during a fire. 12. Follow prescribed waste disposal procedures; if unsure, call the Chemistry Technologist at 416-979-5000x6356 for advice on hazardous waste disposal. 13. Be alert to unsafe conditions and call attention to them so corrections can be made as soon as possible. Report any accident, unusual occurrence, or injury immediately. First Aid Kits for minor injuries, are located in ENG478 (main office), ENG439 (engineering support) and ENG418 (Jim Koch). All injuries should be checked by Health Services. 14. Remove all broken glass from work area or floor as soon as possible. Never handle broken glass with bare hands (use dustpan and broom). Place broken glass in cardboard box and mark as such. Notify lab staff for disposal. 15. Spills and leaks must be cleaned up without delay. Check with the lab staff for help in cleaning up special situations. 16. Students may not work alone in labs. 17. In the event of a medical or personal emergency contact Ryerson Security. Dial "80" from any office phone OR Press the RED "EMERGENCY" button on any pay phone on Campus. Pay Phones on the 4th of the ENG building floor are located at the north side of the Atrium adjacent the drink-vending machine. To contact Police, Fire, Ambulance, dial 911 for "EMERGENCY" from any pay phone on Campus. Internal office phones may require you to dial 9 911. If you dial 911 first, you should also notify Security, they may be able to respond faster and they can direct Emergency Personal to the scene. 18. Hazardous materials likely to be found in the labs. Lead/Tin solder, solder flux remover, Humidity calibration Salts and Circuit Board Fabrication Chemicals such as developer, ammonium persulphate etch, cold tin plating solution. Read the Material Safety Data Sheet (MSDS) before handling/using. Printed copies of MSDS's can also be found in ENG418. 19. THINK SAFETY!

21

SELF-CHECK No. 3 Self check No.3 Direction:

Type of Competency: CORE COMPETENCY Module: CONFIGURING COMPUTER SYSTEMS AND NETWORKS LO1: Plan and prepare for configuration

Answer the following questions: 1. What is the importance of following the Safety Precaution? 2. What are the following rules to apply if you are inside of a computer laboratory? 3. What are the emergency devices?

22

ANSWER KEY No. 3

Type of Competency: CORE COMPETENCY Module: CONFIGURING COMPUTER SYSTEMS AND NETWORKS LO1: Plan and prepare for configuration

1. What is the importance of following the Safety Precaution? To avoid serious damage in the Computer Lab- both to yourself and to some expensive equipment 2. What are the following rules to apply if you are inside of a computer laboratory?

No food or drink allowed in the lab. No offensive computer screens. No tampering with wires or network cables. No use of illegal software. No attempting to compromise network security.

3. What are the emergency devices? RED Emergency Power Shut Off (EPO) buttons, know the location of these buttons before starting work. Blue Distress Pulls, know the location of the these Pulls. Pay phones with RED emergency button, know the location.

23

INFORMATION SHEET No. 4

Type of Competency: CORE COMPETENCY Module: CONFIGURING COMPUTER SYSTEMS AND NETWORKS Title: What is Server, Peripherals and Desktop Computer

What is Server, Peripherals and Desktop Computer


What is a Computer Server

Most of us are very well acquainted with the word computer server. We know that in all organizations, schools and colleges there is a computer server, to which all the computers are connected. But many of us will give absurd answers, if asked the question, what is a computer server? Thus, in this article, I will be explaining to you, the answer to the question, what is a computer server? Tasks Performed by a Computer Server Well, the tasks performed by a computer server depend on the use of the computer server. We will come to this process of classification of the server, at a later stage. For now I have listed down some of the generalized tasks performed by a computer server.

Stores applications and databases required by the computers connected to it. Provides computer security features. It protects all the computers connected to it using a firewall. Provides an IP address to the machines connected to it. An IP address is a unique number in the format x.x.x.x, where x can be any 1 to 3 digit number, which is assigned to every computer in the network.

Features of a Server The server that you choose for your organization, should satisfy certain conditions. It needs to have a memory size or RAM, large enough to hold the number of queries that are executed by the computers connected to it. It may have to provide services to a large number of computers and hence it will require a primary memory of that capability. The next aspect that you need to take care of, is the processor speed. The processor speed is usually measured in Giga Hertz and it needs to be sufficient to execute all the commands requested by the machines. It is very necessary that your server should have an optimum processor speed, because it needs to provide multitasking facility. The hard drive storage capacity of the computer server, needs to be large enough to be able to store all the data that the host machines will require. In a network, computer users generally store the information, that they intend to share on the computer server.

24

Types of Server The different types of computer servers can be categorized in two main categories. Dedicated Server This type of a server performs a particular function, like hosting a website. There are various web hosting services, which use dedicated servers for hosting websites. On the payment of a certain amount of money, you can upload your webpages on their computer servers. They will perform the task of hosting your websites. Certain companies also have dedicated computer servers to hold their own websites. These type of servers require to be very powerful because they need to handle the web traffic, that tries to access the webpages contained in them. Shared Server A shared computer server is an ordinary server, that is used in a network, for multiple users. Large number of applications, databases etc. are stored in them. Different users connected to the server, access the server depending on their requirements. These server do not require to be customized like the dedicated servers. The most common example for this type of server, is an application server. An application server stores all the information required by the people in a network. In many organizations, the employees are often given dummy terminals. It means that, they have a computer keyboard and a computer monitor, but the entire processing and storage is done at the computer server. These terminals do not have individual hard disks, instead, they store data on the computer server's hard disk Hope this article has helped you in solving the query, what is a computer server? This article was meant, not only to answer your question, what is a computer server, but also to acquaint you with the different aspects related to it.

Computer peripherals

Computer peripherals are add-on hardware to the computer to expand its abilities or improve its performance. By adding memory, computers are able to perform a lot better, or by adding video cards, the computers graphics create more detail. These are just some of the peripherals, although there is a lot more you can put on your PC, some of them may not be compatible. Compatibility maybe an issue to some of the peripherals and may even cause the worst outcome the PC refuses to boot or the PC refuses to recognise the peripheral being added. The easiest way to solve that would be figuring out where it started and you can start from there. Narrow down the problem and re-check the connections specially the cards you just added-in. Checking the wires and screws make a difference. And everytime 25

you install a new add-on card, and it suppose to be plug-and-play but it is not, maybe because you made a mistake in the installation process. Do not panic. Go through the whole process again and then try ones more. If still nothing is solve then maybe there might be a compatibility problem. Technically, every piece of hardware inside your PC requires a driver to communicate and function with the operating system, the software applications, and other hardware components in your computer. Software drivers basically translate messages from and to the hardware in question and the operating system, allowing your computer system to work as a whole theoretically. Generally, though appearances may be deceiving, any computer system is actually made up of a bunch of specialized pieces that do not communicate the low level language of other peripherals and, therefore, needs a great deal of translation to be able to talk and work effectively with them. These facts may not solve all the hardware problems you may run into, however, they should solve a good number of them. The important thing to remember when trying to do any troubleshooting job, is that computers really are just logical devices and there is always a logical reason behind why things just not suppose to react the way they are. Finding what is that reason and then putting the right solution is not always easy, but if you approach the problem logically and work through it step-by-step, there is a very good chance you will be able to solve it by yourself.

Desktop computer

A desktop computer is a personal computer (PC) in a form intended for regular use at a single location, as opposed to a mobile laptop or portable computer. Prior to the widespread use of microprocessors, a computer that could fit on a desk was considered remarkably small. Desktop computers come in a variety of types ranging from large vertical tower cases to small form factor models that can be tucked behind an LCD monitor. "Desktop" can also indicate a horizontally-oriented computer case usually intended to have the display screen placed on top to save space on the desktop. Most modern desktop computers have separate screens and keyboards. Tower cases are desktop cases in the earlier sense, though not in the latter. Cases intended for home theater PC systems are usually considered to be desktop cases in both senses, regardless of orientation and placement.

26

SELF-CHECK No. 4 Self check no. 4

Type of Competency: CORE COMPETENCY Module: CONFIGURING COMPUTER SYSTEMS AND NETWORKS LO1: Plan and prepare for configuration

Direction: identify the following objects:

1. _______________________

2________________________

3. ________________________

27

ANSWER KEY No. 4

Type of Competency: CORE COMPETENCY Module: CONFIGURING COMPUTER SYSTEMS AND NETWORKS LO1: Plan and prepare for configuration

1. Computer peripherals 2. Computer desktop 3. Computer server

28

Assignment Sheet No. 2

Type of Competency: CORE COMPETENCY Module : CONFIGURING COMPUTER

SYSTEMS

AND

NETWORKS Title: PLAN AND PREPARE FOR CONFIGURATION

NAME OF TRAINEE: ______________________________________


1. What are those materials that necessary to configure computer systems and networks? 2. Cut pictures of that materials and put it on short folder. To be submitted next week!

29

INFORMATION SHEET No. 5

Type of Competency: CORE COMPETENCY Module: CONFIGURING COMPUTER SYSTEMS AND NETWORKS Title: Materials needed in configuring computer systems and networks

Materials needed in configuring computer systems and networks


Connectors Computer cables can be confusing so here's a quick visual guide that will help you quickly identify almost every cable that came bundled with your computer and other electronic gadgets. You may also refer to this guide for ideas on how to hook different devices using commonly available connectors and converters.

1. USB Cables and Connectors What are USB cables used for - You can use USB cables to connect most new devices to your computer including flash memory sticks, portable media players, internet modems and digital cameras. Computer accessories like mice, keyboards, webcams, portable hard-drives, microphones, printers, scanners and speakers can also be connected to the computer through USB ports. Additionally, USB cables are also used for charging a variety of gadgets including mobile phones or for transferring data from one computer to another. How to recognize USB Cables - The standard USB connector, USB-A, is a rectangular connector. The USB-A end is present on every USB cable as it is the end that connects to your computer. The other end of the USB cable may have different connectors including USB-B (a square connector commonly used with printers, external hard drives, and larger devices) or smaller connectors such as the Mini-USB and Micro-USB that are commonly used with portable devices such as media players and phones.

Additionally, many other connectors have USB-A connectors at the end that connects to the computer, and a device-specific connector at the other end (e.g. the iPod or a Zune). Then you have USB Male to Female connectors for extending the length of a USB cable. Many other non-USB cables can also connect to your computer via a USB converter; these cables have the standard USB-A connector on one end while the other end could have connections for other ports such as Ethernet or audio.

30

2. Audio Cables and Connectors 2.1 - 3.5mm headphone jack The most common audio cable is the standard headphone jack, otherwise known as a TSR connector. It is available in several sizes, but the most common ones used with computers are the 3.5 mm or 1/8" mini audio jack. Most speakers and microphones can connect to the computer with these audio cables. The microphone port on your computer is usually pink while the speaker port, where you insert the stereo audio cable, is colored green. Some computers have additional TSR audio ports colored black, grey, and gold; these are for rear, front, and center/subwoofer output, respectively. A larger variety of the TSR connector, 1/4 TRS, is commonly used in professional audio recording equipment and it can be connected to a computer using an 1/4" to 1/8" converter (pictured right). 2.2 - Digital Optical Audio For high-end audio, like when you want to connect the output of a DVD player or a settop box to a Dolby home theater, you need the TOSLINK (or S/PDIF) connector. These are fiber optic cables and can therefore transmit pure digital audio through light. Some laptops and audio equipment have a mini-TOSLINK jack but you can use a converter to connect it to a standard TOSLINK (Toshiba Link) port.

31

3. Video Cables 3.1 - VGA One of the most common video connectors for computer monitors and high-definition TVs is the VGA cable. A standard VGA connector has 15-pins and other than connecting a computer to a monitor, you may also use a VGA cable to connect your laptop to a TV screen or a projector.

Converter cables are lso available to let VGA monitors connect to newer computers that only output HDMI or DVI signals. A smaller variant of VGA, Mini-VGA, is available on some laptops but with the help of a converter, you can connect any standard VGA monitor to a Mini-VGA port of your laptop. Related: How to Connect your Laptop to a TV Set 3.2 - DVI Monitor Port If you have purchased a computer in the recent past, chances are that it uses DVI instead of VGA. The new breed of "thin" laptops use the smaller variants of DVI like the Mini-DVI and Micro-DVI (first seen in MacBook Air). A DVI cable has 29 pins, though some connectors may have less pins depending on their configuration. DVIs video signal is compatible with HDMI, so a simple converter can allow a DVI monitor to receive input from an HDMI cable. Additionally, DVI to VGA converters are also available for connect your new graphics card to old monitor that supports only VGA mode. 3.3 - S-Video S-Video cables, otherwise known as Separate Video or Super Video cables, carry analog video signals and are commonly used for connecting DVD players, camcorders, older video consoles to the television. Standard S-Video connectors are round in shape and may have anywhere between 4-9 pins. 4. Audio and Video Cables 4.1 - RCA Connector Cables RCA connector cables are a bundle of 2-3 cables including Composite Video (colored yellow) and Stereo Audio cables (red for right channel and white or black for the left audio channel).

32

Sometimes additional cables may be included, offering additional audio channels and/or component video instead of composite. Component video offers better picture than composite because the video signal is split in different signals while in the case of composite, everything is transferred through a single yellow plug. Uses of RCA Connectors - The RCA cables are usually used for connecting your DVD player, stereo speakers, digital camera and other audio/video equipment to your TV. You can plug-in an RCA cable to the computer via a video capture card and this will let you transfer video from an old analog camcorder into your computer's hard drive. 4.2 - HDMI Cables HDMI is the new standard that provide both audio and video transmission through a single cable. HDMI support a maximum resolution of 40962160p (HD is only 19201200) with up to 8 channels of digital audio and are used for connecting Blu-Ray players to an HDTV. Standard HDMI cables can be up to 5 meters long, but higher quality ones can be up to 15 meters long, and the length can be further increased with amplifiers. HDMI is backwards compatible with DVI so you can use a converter to watch video on a DVI device through the HDMI cable though you will have to use another cable for the audio. 4.3 - DisplayPort A combined digital video and audio cable that is more commonly used in computers is DisplayPort and the smaller derivative Mini DisplayPort. Both support resolutions up to 2560 1600 60 Hz, and additionally support up to 8 channels of digital audio. Mini DisplayPort connector is currently used in MacBooks but we could them in other computers as well in the near future. Standard DisplayPort cables can be up to 3 meters long, but at a lower resolution cables can be up to 15 meters long. DisplayPort connectors are available to connect VGA, DVI video, or HDMI video and audio with a DisplayPort cable or connection. Additionally, converters are available to convert Mini DisplayPort into standard DisplayPort. 5. Data Cables 5.1 - Firewire IEEE 1394 Firewire, otherwise known as IEEE 1394, i.LINK, or Lynx, is a faster alternate to USB and is commonly used for connecting digital camcorders and external hard drives to a computer. It is also possible to ad-hoc network computers without a router over FireWire. Firewire typically has 6 pins in its connector, though a 4 pin variety is common as well.

33

5.2 - eSATA Cables While SATA cables are used internally for connecting the hard drive to the computer's motherboard, eSATA cables are designed for portable hard drives, and can transfer data faster than USB or FireWire. However, the eSATA cable cannot transmit power, so unlike USB, you cannot power an external hard drive with eSATA. The eSATA cable is somewhat different from the internal SATA cable; it has more shielding, and sports a larger connector. 6. Networking Related Cables 6.1 - Phone RJ11 Cable The telephone cable, otherwise known as RJ11, is still used around the world for connecting to the Internet through DSL/ADSL modems. A standard phone cable has 4 wires and the connector has four pins. The connector has a clip at the top to help maintain a tight connection. 6.2 - Ethernet Cable Ethernet is the standard for wired networking around the world. The Ethernet cable, otherwise known as RJ45, is based on Cat5 twisted pair cable and is made from 8 individual wires. The Ethernet connector, likewise, has 8 pins and looks similar to a phone plug, but is actually thicker and wider. It too has a clip to help maintain a tight connection like a phone connector.

Network Adapter

A network adapter interfaces a computer to a network. The term "adapter" was popularized originally by Ethernet add-in cards for PCs. Modern network adapter hardware exists in several forms. Besides traditional PCI Ethernet cards, some network adapters are PCMCIA devices (also know as "credit card" or "PC Card" adapters) or USB devices. Some wireless network adapter gear for laptop computers are integrated circuit chips pre-installed inside the computer. Windows and other operating systems support both wired and wireless network adapters through a piece of software called a "device driver." Network drivers allow application software to communicate with the adapter hardware. Network device drivers are often installed automatically when adapter hardware is first powered on.

34

A few network adapters are purely software packages that simulate the functions of a network card. These so-called virtual adapters are especially common in virtual private networking (VPN).

Wires and Cables

A wire is a single, usually cylindrical, flexible strand or rod of metal. Wires are used to bear mechanical loads and to carry electricity and telecommunications signals. Wire is commonly formed by drawing the metal through a hole in a die or draw plate. Standard sizes are determined by various wire gauges. The term wire is also used more loosely to refer to a bundle of such strands, as in 'multistranded wire', which is more correctly termed a wire rope in mechanics, or a cable in electricity.

A cable is two or more wires running side by side and bonded, twisted or braided together to form a single assembly. In mechanics cables, otherwise known as wire ropes, are used for lifting, hauling and towing or conveying force through tension. In electrical engineering cables are used to carry electric currents. An optical cable contains one or more optical fibers in a protective jacket that supports the fibers.

Network Software
Network Software is a set of primitives that define the protocol between two machines. The network software resolves an ambiguity among different types of network making it possible for all the machines in the network to connect and communicate with one another and share information. network software is the information, data or programming used to make it possible for computers to communicate or connect to one another. Network software is used to efficiently share information among computers. It encloses the information to be sent in a package that contains a header and a trailer. The header and trailer contain information for the receiving computer, such as the address of that computer and how the information package is coded. Information is transferred between computers as either electrical signals in electric wires, as light signals in fiberoptic cables, or as electromagnetic waves through space.

35

Computer storage media

This category refers to digital media used in computer storage devices. Examples of such media include (a) magnetic disks, cards, tapes, and drums, (b) punched cards and paper tapes, (c) optical disks, (d) barcodes and (e) magnetic ink characters. Types of Computer Storage Media Types of Computer Storage Media If your computer forgot everything it knew and every project you had worked on each time you turned it off, it wouldn't be a very efficient machine. To keep this from happening, a computer uses various types of storage media to store information in some ongoing fashion. This means every time it starts up, it can load an operating system from a drive and know how to process your data. It can find your data on your drive or optical media and process it. It can also save the resulting files on the drive or media for later use. Magnetic Tape Magnetic tape was one of the first-used types of media and is no longer used in modern systems. A large spool of magnetic tape was used to store data in a sequential way in magnetic stripes on the tape. The drawback was that you couldn't just go straight to the file you wanted; you had to start at the beginning and read each file till you found the one you wanted to process. Magnetic Disk Replacing tape technology, the magnetic disk is still in common use as the dominant form of storage media, from floppy disks to hard drives. On a magnetic disk, the data is still recorded in magnetic bits on the disk like tape. The main difference is that you can go directly to the data you want to retrieve, instead of
36

having to go through every file. The read/write head of the drive can skip directly to the information you want by using a table of contents to know the location. Optical Discs CDs, DVDs and Blue-Ray are examples of optical discs. They use a laser to burn minute pits in a reflective surface to store data. This type of media is not subject to damage from external magnetic fields like hard drives, but they are subject to scratching and have to be kept in a protective case when not inserted into the optical drive.

Volatile Chip Volatile chip memory is also known as Random Access Memory (RAM) and is used mostly for immediate data transactions. It is not as suitable for longterm data storage, because it loses the data when the electrical current is turned off. It is, however, used for caching data used in the short term, since it is much faster than the hard disk drive.

Solid State A USB flash drive is a good example of solid state memory. This type of computer storage media is chip-based, so it is fast and it keeps the data even when the current is turned off. This makes it ideal for portable storage applications like file backups. While the size of a USB drive may be small, it can hold several gigabytes of information. Some netbooks are now equipped with solid state hard drives as well.

37

SELF-CHECK No. 5 Self check no. 5 Matching type:

Type of Competency: CORE COMPETENCY Module: CONFIGURING COMPUTER SYSTEMS AND NETWORKS LO1: Plan and prepare for configuration

1 Magnetic Tape

2 Optical Discs

3 Magnetic Disk

4 Network Adapter

5 HDMI Cables

38

ANSWER KEY No. 5

Type of Competency: CORE COMPETENCY Module: CONFIGURING COMPUTER SYSTEMS AND NETWORKS LO1: Plan and prepare for configuration

1 Magnetic Tape

2 Optical Discs

3 Magnetic Disk

4 Network Adapter

5 HDMI Cables

39

INFORMATION SHEET No. 6

Type of Competency: CORE COMPETENCY Module: CONFIGURING COMPUTER SYSTEMS AND NETWORKS Title: Use of tools, equipment and testing devises in configuring computer systems and networks

Use of tools, equipment and testing devises in configuring computer systems and networks
Computer configuration In communications or computer systems, a configuration is an arrangement of functional units according to their nature, number, and chief characteristics. Often, configuration pertains to the choice of hardware, software, firmware, and documentation. The configuration affects system function and performance. Computer system A computer is a programmable machine designed to sequentially and automatically carry out a sequence of arithmetic or logical operations. The particular sequence of operations can be changed readily, allowing the computer to solve more than one kind of problem. Conventionally a computer consists of some form of memory for data storage, at least one element that carries out arithmetic and logic operations, and a sequencing and control element that can change the order of operations based on the information that is stored. Peripheral devices allow information to be entered from external source, and allow the results of operations to be sent out. A computer's processing unit executes series of instructions that make it read, manipulate and then store data. Conditional instructions change the sequence of instructions as a function of the current state of the machine or its environment. The first electronic computers were developed in the mid-20th century (19401945). Originally, they were the size of a large room, consuming as much power as several hundred modern personal computers (PCs).[1] Modern computers based on integrated circuits are millions to billions of times more capable than the early machines, and occupy a fraction of the space.[2] Simple computers are small enough to fit into mobile devices, mobile computers can be powered by small batteries. Personal computers in their various forms are icons of the Information Age and are what most people think of as "computers". However, the embedded computers found in many devices from MP3 players to fighter aircraft and from toys to industrial robots are the most numerous.

40

Multimeter

A multimeter or a multitester, also known as a or VOM(Volt-Ohm meter), is an electronic measuring instrument that combines several measurement functions in one unit. A typical multimeter may include features such as the ability to measure voltage, current and resistance. Multimeters may use analog or digital circuitsanalog multimeters(AMM) and digital multimeters (often abbreviated DMM or DVOM.) Analog instruments are usually based on a microammeter whose pointer moves over a scale calibration for all the different measurements that can be made; digital instruments usually display digits, but may display a bar of a length proportional to the quantity measured. A multimeter can be a hand-held device useful for basic fault finding and field service work or a bench instrument which can measure to a very high degree of accuracy. They can be used to troubleshoot electrical problems in a wide array of industrial and household devices such as electronic equipment, motor controls, domestic appliances, power supplies, and wiring systems. Multimeters are available in a wide ranges of features and prices. Cheap multimeters can cost less than US$10, while the top of the line multimeters can cost more than US$5,000. Most instruments and sensors are designed to meet certain accuracy specifications; the process of adjusting an instrument to meet those specifications is referred to as calibration. The device used to calibrate other instruments is known as a calibrator. Calibrators vary in form and function depending on the instruments with which they are designed to work. Several different types of calibrators are described below.

41

Types of Calibrators Black Body Calibrators A black body is used for calibrating infrared pyrometers. They typically consist of a target plate that has a very high emisivity. The temperature of the target plate can be controlled to very tight tolerances. To calibrate and infrared pyrometer, the pyrometer makes a measurement of the the target plate. The controlled temperature of the plate is compared with the pyrometer reading. The pyrometer is then adjusted until the the difference is minimal. The high emissivity of the target plate minimizes emissivity errors. Block Calibrators Block Calibrators are used for calibrating temperature probes. They contain a metal block that can be heated to a precise temperature. Temperature probes can be inserted into the block and the measured temperature of the probes can be compared with the controlled temperature of the blocks. Since temperature probes generally don't have any adjustments, this is really verification process rather than a true calibration. Simulators and Signal References When calibrating an instrument, such as a panel meter or temperature controller, it is necessary to input a precise known electrical signal. The instrument's display or output value can then be adjusted to match the input signal. a signal reference is used to generate the precision signal. Signal references are available as voltage references, current references and frequency references. When working with an instrument that reads a sensor, such as thermocouple, a special type of signal reference, called a simulator is used. The simulator can accurately reproduce a sensor output. Many signal references and simulators can not only generate signals but read them as well. Fluidized Sand Bath Temperature Probe Calibrators Fluidized baths provide safe, rapid heat transfer and accurate temperature control, enabling you to efficiently and safely calibrate and maintain temperature sensitive instruments. The principle of fluidization occurs when a gasusually low pressure air or nitrogenflows upward through a partially-filled chamber or retort of dry, inert particles of aluminum oxide. The gas flows at a low velocity, which sets the particles in motion, separates them, then suspends them to a stable level to give the particles the appearance of turbulence quite similar to the state of boiling liquid. Besides circulating and flowing like a liquid, fluidization solids exhibit excellent heat transfer characteristics. Temperature probes inserted into the bath come to a 42

consistent, stable temperature very quickly. ice pointTMCalibration Reference Chambers ice pointTMcalibration reference chambers employ thermoelectric cooling elements to produce a very precise stable 0C reference chamber. The reference chamber can be used for calibrating temperature probes but they are also commonly used in simulating a thermocouple signal for the calibration and verification of instruments that read thermocouples.

Signal generator From Wikipedia, the free encyclopedia Jump to: navigation, search A signal generator, also known variously as function generator, pitch generator, arbitrary waveform generator, digital pattern generator or frequency generator is an electronic device that generates repeating or non-repeating electronic signals (in either the analog or digital domains). They are generally used in designing, testing, troubleshooting, and repairing electronic or electroacoustic devices; though they often have artistic uses as well. There are many different types of signal generators, with different purposes and applications (and at varying levels of expense); in general, no device is suitable for all possible applications. Traditionally, signal generators have been embedded hardware units, but since the age of multimedia-PCs, flexible, programmable software tone generators have also been available.

Oscilloscope

An oscilloscope (also known as a scope, CRO, DSO or, an O-scope) is a type of electronic test instrument that allows observation of constantly varying signal voltages, usually as a two-dimensional graph of one or more electrical potential differences using the vertical or 'Y' axis, plotted as a function of time, (horizontal or 'x' axis). Although an oscilloscope displays voltage on its vertical axis, any other quantity that can be converted to a voltage can be displayed as well. In most instances, oscilloscopes show events that repeat with either no change, or change slowly.

43

Oscilloscopes are commonly used to observe the exact wave shape of an electrical signal. In addition to the amplitude of the signal, an oscilloscope can show distortion, the time between two events (such as pulse width, period, or rise time) and relative timing of two related signals.[1] Oscilloscopes are used in the sciences, medicine, engineering, and telecommunications industry. General-purpose instruments are used for maintenance of electronic equipment and laboratory work. Special-purpose oscilloscopes may be used for such purposes as analyzing an automotive ignition system, or to display the waveform of the heartbeat as an electrocardiogram. Originally all oscilloscopes used cathode ray tubes as their display element and linear amplifiers for signal processing, (commonly referred to as CROs) however, modern oscilloscopes have LCD or LED screens, fast analog-to-digital converters and digital signal processors. Although not as commonplace, some oscilloscopes used storage CRTs to display single events for a limited time. Oscilloscope peripheral modules for general purpose laptop or desktop personal computers use the computer's display, allowing them to be used as test instruments.

44

SELF-CHECK No. 6

Type of Competency: CORE COMPETENCY Module: CONFIGURING COMPUTER SYSTEMS AND NETWORKS LO1: Plan and prepare for configuration

Self check no 6 Direction: fill in the blanks 1. _____________ is a type of electronic test instrument that allows observation of constantly varying signal voltages, usually as a two-dimensional graph of one or more electrical potential differences using the vertical or 'Y' axis, plotted as a function of time, 2. 3. 4. 5. A _____________ is used for calibrating infrared pyrometers. They typically consist of a target plate that has a very high emissivity. A _____________ is an electronic measuring instrument that combines several measurement functions in one unit. A _____________ is an arrangement of functional units according to their nature, number, and chief characteristics. A _____________ is a programmable machine designed to sequentially and automatically carry out a sequence of arithmetic or logical operations. The particular sequence of operations can be changed readily, allowing the computer to solve more than one kind of problem.

45

ANSWER KEY No. 6

Type of Competency: CORE COMPETENCY Module: CONFIGURING COMPUTER SYSTEMS AND NETWORKS LO1: Plan and prepare for configuration

1. 2. 3. 4. 5.

Oscilloscope Black body Multitester Configuration Computer

46

Type of Competency: CORE COMPETENCY INTRODUCTION Module: CONFIGURING COMPUTER SYSTEMS AND NETWORKS How to use this module 6. Learning Outcomes no. 2 Configure Computer Systems and Networks Assessment Criteria: 1. Appropriate Personal Protective Equipment are used and OHS policies and procedures followed 2. Normal function of systems and networks checked in accordance with manufacturers instructions 3. Fault or problem in the systems and networks diagnosed in line with the standard operating procedures. 4. Computer systems and networks configured in line with the standard operating procedures. Conditions: The students/trainees must be provided with the following: OH & S policies and procedures OH & S policies manuals Computer systems and networks 1 Server Peripherals 1 Desktop Computers Materials Wires and Cables Appropriate Software Computer Storage Media Tools Pliers Philips screw driver Equipment/testing devices Computer Personal protective equipment Anti-static wrist wrap

Resources Internet http://en.wikipedia.org/wiki/Antistatic_wrist_strap http://en.wikipedia.org/wiki/Goggles http://en.wikipedia.org/wiki/Glove

Magazine Groth, David; Toby Skandier (2005). Network+ Study Guide, Fourth Edition'. Sybex, Inc.. ISBN 0-7821-4406-3. 47

Type of Competency: CORE COMPETENCY INTRODUCTION Module: CONFIGURING COMPUTER SYSTEMS AND NETWORKS How to use this module

Qualification: COMPUTER HARDWARE SERVICING NC II Module Title: CONFIGURING COMPUTER SYSTEMS AND NETWORKS Learning Outcome # 2 : Configure Computer Systems and Networks ASSESSMENT CRITERIA: 5. Appropriate Personal Protective Equipment are used and OHS policies and procedures followed 6. Normal function of systems and networks checked in accordance with manufacturers instructions 7. Fault or problem in the systems and networks diagnosed in line with the standard operating procedures. 8. Computer systems and networks configured in line with the standard operating procedures.

RESOURCES Internet http://en.wikipedia.org/wiki/Antistatic_wrist_strap http://en.wikipedia.org/wiki/Goggles http://en.wikipedia.org/wiki/Glove

Magazine Groth, David; Toby Skandier (2005). Network+ Study Guide, Fourth Edition'. Sybex, Inc.. ISBN 0-7821-4406-3.

48

Learning Activities

Type of Competency: CORE COMPETENCY Module : CONFIGURING COMPUTER SYSTEMS AND NETWORKS LO2: Configure Computer Systems and Networks SPECIAL INSTRUCTIONS Information Sheet # 1 OH & S safety equipments (Static Electricity) Self check # 1 Answer sheet # 1 Information Sheet # 2 computer system and networks (topologies and types Self check # 2 Answer sheet # 2 Assignment sheet # 2 Information Sheet # 3 different faults in computer system and network Self check # 3 Assignment Sheet #3 Information Sheet # 4 configuring computer systems and networks Self check # 4 Assignment Sheet # 4 Operation Sheet # 1 Job Sheet # 1 ICAI

LEARNING EXPERIENCES LEARNING ACTIVITIES Read the OH & S safety equipments (Static Electricity) Answer the self-check Check your answers with the answer sheet Read information sheet on computer system and networks (topologies and types) Answer the self-check Check your answer with the answer sheet Do the assignment Perform activities on different faults in computer system and network Answer the self-check Check your answers with the answer sheet Perform configuring computer systems and networks Answer the self-check Check your answers with the answer sheet Perform the operation sheet Perform your job sheet Do the institutional assessment

Ask your trainer if you can proceed to the next learning outcome.

49

Information sheet no. 1

Type of Competency: CORE COMPETENCY Module: CONFIGURE COMPUTER SYSTEMS AND NETWORKS Title: OH & S safety equipments (Static Electricity)

Occupational Health and Safety


An organization entering into a service agreement must be aware of and able to provide an appropriate documented system to demonstrate compliance with its occupational health and safety obligations as employers under all relevant State and Federal law The department requires that all organizations have occupational health and safety systems in place to manage their obligations and duty of care under the Occupational Health and Safety Act 2004. Any organization system must enable an audit to ensure compliance with the Act The OHS Act 2004 clearly defines the duty employers have to consult with staff and/or health and safety representatives on a range of OHS issues, including making decisions about risk controls, adequacy of facilities and any changes to the workplace, plant or conduct of work that may directly impact on the safety or health of employees. OH & S safety equipments OH & S Equipments Goggles Goggles or safety glasses are forms of protective eyewear that usually enclose or protect the area surrounding the eye in order to prevent particulates, water or chemicals from striking the eyes. They are used in chemistry laboratories and in woodworking. They are often used in snow sports as well, and in swimming. Goggles are often worn when using power tools such as drills or chainsaws to prevent flying particles from damaging the eyes. Many types of goggles are available as prescription goggles for those with vision problems. Gas mask A gas mask is a mask put on over the face to protect the wearer from inhaling "airborne pollutants" and toxic gases. The mask forms a sealed cover over the nose and mouth, but may also cover the eyes and other vulnerable soft tissues of the face. Some gas masks are also respirators, though the word gas mask is often used to refer to military equipment (e.g. Field Protective Mask, etc.) (The user of the gas mask is not protected from gas that the skin can absorb.) Glove Gloves protect and comfort hands against cold or heat, damage by friction, abrasion or chemicals, and disease; or in turn to provide a guard for what a bare hand should not touch. Latex, nitrile rubber or vinyl disposable gloves are often worn by health care professionals as hygiene and contamination protection measures. Police officers often wear them to work in crime scenes to prevent destroying evidence in the scene. Many criminals wear gloves to avoid leaving fingerprints, which makes the crime investigation more difficult. However, not all gloves prevent fingerprints from being left on the crime scene, depending on the material from which the glove is made. Antistatic wrist strap An antistatic wrist strap, ESD wrist strap, or ground bracelet is an antistatic device used to safely ground a person working on very sensitive electronic equipment, to prevent the buildup of static electricity on their body, which can result in electrostatic discharge (ESD). It is used in the electronics industry by workers working on electronic devices which can be damaged by ESD, and also sometimes by people working around explosives, to prevent electric sparks which could set off an explosion. It consists of a stretchy band of fabric with fine conductive fibers woven into it. The fibers are usually 50

made of carbon or carbon-filled rubber, and the strap is bound with a stainless steel clasp or plate. They are usually used in conjunction with an antistatic mat on the workbench, or a special static-dissipating plastic laminate on the workbench surface. An antistatic wrist strap with crocodile clip. The wrist strap is usually worn on the nondominant hand (the left wrist for a righthanded person). It is connected to ground through a coiled retractable cable and 1 megohm resistor, which allows high-voltage charges to leak through but prevents a shock hazard when working with low-voltage parts. Where higher voltages are present, extra resistance (0.75 megohm per 250 V) is added in the path to ground to protect the wearer from excessive currents; this typically takes the form of a 4 megohm resistor in the coiled cable (or, more usually, a 2 megohm resistor at each end). Very cheap wrist straps do not have conductive fabric and instead use the fabric to hold the metal plate against the skin, which can result in reduced ESD protection over time as the metal corrodes.

Static electricity
Static electricity refers to the build up of electric charge on the surface of objects. The static charges remain on an object until they either bleed off to ground or are quickly neutralized by a discharge. Static electricity can be contrasted with current (or dynamic) electricity, which can be delivered through wires as a power source. [1] Although charge exchange can happen whenever any two surfaces come into contact and separate, a static charge only remains when at least one of the surfaces has a high resistance to electrical flow (an electrical insulator). The effects of static electricity are familiar to most people because we can feel, hear, and even see the spark as the excess charge is neutralized when brought close to a large electrical conductor (for example, a path to ground), or a region with an excess charge of the opposite polarity (positive or negative). The familiar phenomenon of a static 'shock' is caused by the neutralization of charge. Electrostatic discharge (ESD) is the sudden and momentary electric current that flows between two objects at different electrical potentials.[1] The term is usually used in the electronics and other industries to describe momentary unwanted currents that may cause damage to electronic equipment. ESD is a serious issue in solid state electronics, such as integrated circuits. Integrated circuits are made from semiconductor materials such as silicon and insulating materials such as silicon dioxide. Either of these materials can suffer permanent damage when subjected to high voltages; as a result, there are now a number of antistatic devices that help prevent static build up.

51

SELF CHECK NO. 1

Type of Competency: Computer Hardware Servicing. Module : Configuring Computer Systems and Networks LO2: Configure computer systems and networks

Direction: Answer TRUE or FALSE Occupational Health and SafetyAn organization entering into a service agreement must be aware of and able to provide an appropriate documented system to demonstrate compliance with its occupational health and safety obligations as employers under all relevant State and Federal law
1. An antistatic wrist strap, ESD wrist strap, or ground bracelet is an

static device used to unsafely ground a person working on very sensitive electronic equipment 2. The wrist strap is usually worn on the nondominant hand
3. Static electricity refers to the build up of electric charge on the

surface of objects. The static charges remain on an object until they either bleed off to ground or are quickly neutralized by a discharge. 4. Goggles are form of eyewear that usually close or damage the eyes area

52

ANSWER KEY No. 5

Type of Competency: CORE COMPETENCY Module: CONFIGURING COMPUTER SYSTEMS AND NETWORKS LO2: Configure Computer Systems and Networks

ANSWER KEY # 1 1. TRUE 2. FALSE 3. TRUE 4. TRUE 5. FALES

53

ASSIGNMENT SHEET NO. 1

Type of Competency: CORE COMPETENCY Module : CONFIGURING COMPUTER

SYSTEMS

AND

NETWORKS Title: CONFIGURE COMPUTER SYSTEMS AND NETWORKS

NAME OF TRAINEE: ______________________________________


Direction: cut at least 2 pictures of safety equipments and paste it on whole bond paper. Submit it to instructor for checking.

54

Information Sheet No. 2

Type of Competency: Computer Hardware Servicing. Module: Configuring Computer Systems and Networks Title: Configure Computer Systems and Networks

Network Operating System


Abbreviated as NOS, an operating system that includes special functions for connecting computers and devices into a local-area network (LAN). Some operating systems, such as UNIX and the Mac OS, have networking functions built in. The term network operating system, however, is generally reserved for software that enhances a basic operating system by adding networking features. Novell Netware, Artisoft's LANtastic, Microsoft Windows Server, and Windows NT are examples of an NOS. Network operating systems (NOS) typically are used to run computers that act as servers. They provide the capabilities required for network operation. Network operating systems are also designed for client computers and provide functions so the distinction between network operating systems and stand alone operating systems is not always obvious. Network operating systems provide the following functions:

File and print sharing. Account administration for users. Security.

Installed Components

Client functionality Server functionality

Functions provided:

Account Administration for users Security File and print sharing

Network services

File Sharing Print sharing User administration Backing up data

Network topology

Network topology is the layout pattern of interconnections of the various elements (links, nodes, etc.) of a computer network. Network topologies may be physical or logical. Physical topology means the physical design of a network including the devices, location and cable installation. Logical topology refers to how data is actually transferred in a network as opposed to its physical design. In general physical topology relates to a core network whereas logical topology relates to basic network. 55

Topology can be considered as a virtual shape or structure of a network. This shape does not correspond to the actual physical design of the devices on the computer network. The computers on a home network can be arranged in a circle but it does not necessarily mean that it represents a ring topology. Any particular network topology is determined only by the graphical mapping of the configuration of physical and/or logical connections between nodes. The study of network topology uses graph theory. Distances between nodes, physical interconnections, transmission rates, and/or signal types may differ in two networks and yet their topologies may be identical. A local area network (LAN) is one example of a network that exhibits both a physical topology and a logical topology. Any given node in the LAN has one or more links to one or more nodes in the network and the mapping of these links and nodes in a graph results in a geometric shape that may be used to describe the physical topology of the network. Likewise, the mapping of the data flow between the nodes in the network determines the logical topology of the network. The physical and logical topologies may or may not be identical in any particular network There are two main types of network categories which are:

Server based Peer-to-peer

Server-based Configuration

A server-based network consists of a group of user-oriented PCs (called Clients) that request and receive network services from specialized computers called Servers. Servers are generally higher-performance systems, optimized to provide network services to other PCs. Some common server types include file servers, mail servers, print servers, fax servers, and application servers. Relationship between a server and a client is same as a Teacher and a Student, where teacher provides services (of teaching) and student study. You know, student never teaches the teacher, right! Peer-to-Peer Configuration

56

A peer-to-peer network is a group of user-oriented PCs that basically operate as equals. Each PC is called a peer (workstation). The peers share the resources, such as files and printers, but no specialized servers exist. Each peer is responsible for its own security, and, in a sense, each peer is both a client (because it requests services from the other peers) and server (because it offers services to the other peers). Small networks -- usually under 10 machines -- may work well in this configuration. If security is an issue, then peer-to-peer is never suitable even there are 2 computers only. Many network environments are a combination of server-based and peer-topeer networking models. For example, an organization may concurrently use Novell's server-based networking operating system, NetWare, and Microsoft's peer-to-peer (workgroup) operating system, Windows for Workgroups. New desktop operating systems, such as Microsoft Windows 98, integrate easily into either network model.

Network topology
Bus network topology

In local area networks where bus topology is used, each node is connected to a single cable. Each computer or server is connected to the single bus cable through some kind of connector. A terminator is required at each end of the bus cable to prevent the signal from bouncing back and forth on the bus cable. A signal from the source travels in both directions to all machines connected on the bus cable until it finds the MAC address or IP address on the network that is the intended recipient. If the machine address does not match the intended address for the data, the machine ignores the data. Alternatively, if the data does match the machine address, the data is accepted. Since the bus topology consists of only one wire, it is rather inexpensive to implement when compared to other topologies. However, the low cost of implementing the technology is offset by the high Star network topology

57

In local area networks with a star topology, each network host is connected to a central hub. In contrast to the bus topology, the star topology connects each node to the hub with a point-to-point connection. All traffic that traverses the network passes through the central hub. The hub acts as a signal booster or repeater. The star topology is considered the easiest topology to design and implement. An advantage of the star topology is the simplicity of adding additional nodes. The primary disadvantage of the star topology is that the hub represents a single point of failure. Ring network topology

A network topology that is set up in a circular fashion in which data travels around the ring in one direction and each device on the right acts as a repeater to keep the signal strong as it travels. Each device incorporates a receiver for the incoming signal and a transmitter to send the data on to the next device in the ring. The network is dependent on the ability of the signal to travel around the rin Mesh topology

A network setup where each of the computers and network devices are interconnected with one another, allowing for most transmissions to be distributed, even if one of the connections go down. This topology is not commonly used for most computer networks as it is difficult and expensive to have redundant connection to every computer. However, this topology is commonly used for wireless networks. Below is a visual example of a simple computer setup on a network using a mesh topology.

58

Kinds of Mesh Topology


Full Mesh Topology In this type of networking topology, every node has a circuit, which connects to every other node in the network. It is very expensive to implement and also yields greatest amount of redundancy. However, the advantage of this topology, is that in case of failure in any one node, traffic to other nodes can be directed through the other nodes. This is the topology, which is usually reserved for backbone networks. Click to read on computer networking tutorial. Partial Mesh Topology As opposed to full mesh topology, partial mesh is less expensive and also there is less redundancy. In this topology, some nodes are configured like the nodes in full mesh, while the majority of the nodes are connected to one or two nodes in the network. Normally partial mesh topology is found in peripheral networks, that are connected to full mesh backbone.

59

SELF CHECK NO. 2

Type of Competency: Computer Hardware Servicing. Module : Configuring Computer Systems and Networks LO2: Configure computer systems and networks

Directions: Multiple choice 1. A topology that both ends of the network must be terminated with a terminator. A barrel connector can be used to extend it. a. b. c. d. topology bus star ring

2. A topology that all devices revolve around a central hub, which is what controls the network communications, and can communicate with other hubs. Range limits are about 100 meters from the hub. a. b. c. d. topology bus star ring

3. A topology that Devices are connected from one to another, as in a ring.

A data token is used to grant permission for each computer to communicate. a. b. c. d. topology bus star ring interface. topology bus star ring

4. A network consists of multiple computers connected using some type of

a. b. c. d.

60

ANSWER KEY NO. 2

Type of Competency: Computer Hardware Servicing. Module : Configuring Computer Systems and Networks LO2: Configure computer systems and networks

ANSWER SHEET #2 1. 2. 3. 4. b c d a

61

Assignment Sheet No. 2

Type of Competency: CORE COMPETENCY Module : CONFIGURING COMPUTER

SYSTEMS

AND

NETWORKS Title: CONFIGURE COMPUTER SYSTEMS AND NETWORKS NAME OF TRAINEE: ______________________________________ TITLE : Computer System and Networks (Topologies And Types) INSRUCTIONS: Cut or Draw a Computer Network using the STAR TOPOLOGY

Feedback to trainee:

TRAINEE SIGNATURE: TRAINERS SIGNATURE:

DATE: DATE:

62

INFORMATION SHEET No. 3

Type of Competency: CORE COMPETENCY Module: CONFIGURING COMPUTER SYSTEMS AND NETWORKS Title: different faults in computer system and network

Different Faults in Computer System and Network


THE FIVE MOST COMMON NETWORK PROBLEMS 1. Cable Problem: Cables that connect different parts of a network can be cut or shorted. A short can happen when the wire conductor comes in contact with another conductive surface, changing the path of the signal. Cable testers can be used to test for many types of cable problems such as: Cut cable, incorrect cable connections, Cable shorts, Interference level, Connector Problem 2. Connectivity Problem: A connectivity problem with one or more devices in a network can occur after a change is made in configuration or by a malfunction of a connectivity component, such as hub, a router or a Switch 3. Excessive Network Collisions: These often lead to slow connectivity. The problem can occur as a result of bad network setup/plan, a user transferring a lot of information or jabbering network card. NB: A jabbering Network card is a network card that is stuck in a transmit mode. This will be evident because the transmit light will remain on constantly, indicating that the Network card is always transmitting. 4, Software Problem: Network problems can often be traced to software configuration such as DNS configuration, WINS configuration, the registry etc. 5. Duplicate IP Addressing: A common problem in many networking environments occurs when two machines try to use the same IP address. This can result in intermittent communications. Common Network Problems & Solutions Limited Website Connectivity Symptom: You are successfully connected to the internet but most of the time your connection times out on a webpage or the page cannot be found. You may also find that you can visit some sites but not others. Solution: This is most likely the result of a bad DNS server that your network is currently using to connect. The DNS server allows you to use domain names to connect to various websites and their respective servers. If your DNS server that you are using is acting up, it may fail to locate the correct servers for some domains and thus show you an error page in your browser. To fix this find yourself a new DNS Server! Google just recently announced their public DNS server and can be accessed at 8.8.8.8 and 8.8.4.4 (very easy to remember, so it will be used in this solution). Now you just need to change your DNS server to the two mentioned above. 1)Open Control Panel 2Network and Internet Network and Sharing Center 3)Hit the Change adapter setting link on the left hand side of the window 4)Right click on the connection you are using to access the internet (if Wireless Wireless Network Connection, if Wired Local Area Connection) 5)Select Properties 63

6)Select Internet Protocol Version 4 and hit the Properties button 7)Hit the tick box next to Use the following DNS server addresses and input the two DNS servers that you want (for example, 8.8.8.8 and 8.8.4.4) Hit the OK buttons and happy surfing! Unable to Obtain IP Address from Router Symptom: You receive a yellow warning sign above your network connection icon that tells you it has been unable to obtain an IP address from your router (thus unable to connect to the internet) Solution: Im not sure what the exact cause of this problem is, but there are two possible solutions. First, the universal troubleshooting technique for routers is to unplug them (the power) for roughly 30 seconds and plug them back in, thus doing a soft reset to the system. If this does not work, you could try setting a static IP address to your computer (this will require the use of another computer connected to the network however). 1)Reset the Router (unplug and re-plug power cable back in) OR 2)On a computer that is on the network correctly: a. Open Control Panel b. Network and Internet Network and Sharing Center c. Hit the Change adapter settings link on the left hand side of the window d. Right click on the connection you are using to access the internet (if Wireless * Wireless Network Connection, if Wired * Local Area Connection) e. Select Status and then the Details button f. Jot down the IPv4 Address (usually something like 192.168.1.100) g. Jot down the Gateway Address 3)On the computer that is unable to connect to the internet: a .Repeat from Step 2 and go select Properties from the drop-down menu b. Go into the properties for Internet Protocol v4 c. Enter in the IP address you acquired earlier, but change the last 3 digits to something else, so if it was 100, use something like 155. d. Enter in the Subnet Mask as 255.255.255.0 e .Enter in the Gateway as what you jotted down earlier 4)If all went correctly you should now be able to exit out and enjoy the wonderful World Wide Web. Windows XP takes a long time to open shared resources on older versions of Windows Windows XP displays Scheduled Tasks for each computer in a workgroup or domain. You can usually speed up the display of shared resources by disabling this feature. 1. Click the start button and select Run to open the Run dialog box. 2. Type regedit and press enter to open Microsoft Registry Editor. 3. Navigate to the following key: HKLM:SOFTWAREMicrosoftWindowsCurrentVersionExplorer RemoteComputerNameSpace{D6277990-4C6A-11CF-8D8700AA0060F5BF} 4. While that key is selected in the left-hand pane, press the Delete key to delete it. Frequent Network Cable Unplugged Notification Balloon When this balloon pops up it can be pretty disturbing, especially if youve been using the network all along. How do you have a network cable unplugged? 1. Begin by checking your Router or Hub. Check the connection state lights and see if they are correct. This may indicate a failing or faulty router. 64

2. Next check the network cable. Look for cuts, breaks or bends. Also look for any abnormalities in the insulation that may indicate breaks inside the cable. Check the integrity of the cable terminations, or ends. Make sure that they are securely attached, clean, and fit snugly into all devices. Use a patch cable tester or network probe if available. 3. Download and install the latest drivers for your network card. 4. Manually set the speed and duplex settings for your network adapter. Most adapters use the auto-detect setting. If auto-detection fails for any reason, the Network Cable Unplugged error will usually result. Most routers and switches use 100Mb, full duplex. Hubs usually use 100Mb, half duplex. You can find these settings easily: a) Open My Network Places and click the View network connections link in the left panel. b) Right-click your Ethernet connection and choose Properties to open the Local Area Connection Properties. c) On the General tab, click the Configure button. d) Click the Advanced tab and select Link Speed & Duplex in the Property box. You can browse websites by IP address, but not by URL This indicates a DNS, or Domain Name Service, failure. For most people this will mean one of two things. Either your ISPs DNS server is down or your settings are incorrect. You will need to contact your ISP to find out. You may have also received this information from your ISP when you set up your account. One computer can ping a second, but the second cannot ping the first Okay, so you have two computers in a network. One can ping the other fine, but the second cannot ping the first. Typically this is due to improperly configured firewall settings on the first computer. Make sure that the firewall is set to allow ping requests. Disabling the firewall temporarily while you attempt to ping can be a quick way to determine if this is the problem.

65

Self Check No. 3 Self check no. 3

Type of Competency: Computer Hardware Servicing. Module : Configuring Computer Systems and Networks LO2: Configure computer systems and networks

Direction: Identify the following terms


Cable Problem Connectivity Problem Excessive Network Collisions Software Problem Duplicate IP Addressing

66

Answer No. 1

Type of Competency: Computer Hardware Servicing. Key Module : Configuring Computer Systems and Networks LO2: Configure computer systems and networks

1. Cable Problem: Cables that connect different parts of a network can be cut or shorted. A short can happen when the wire conductor comes in contact with another conductive surface, changing the path of the signal. Cable testers can be used to test for many types of cable problems such as: Cut cable, incorrect cable connections, Cable shorts, Interference level, Connector Problem 2. Connectivity Problem: A connectivity problem with one or more devices in a network can occur after a change is made in configuration or by a malfunction of a connectivity component, such as hub, a router or a Switch 3. Excessive Network Collisions: These often lead to slow connectivity. The problem can occur as a result of bad network setup/plan, a user transferring a lot of information or jabbering network card. NB: A jabbering Network card is a network card that is stuck in a transmit mode. This will be evident because the transmit light will remain on constantly, indicating that the Network card is always transmitting. 4, Software Problem: Network problems can often be traced to software configuration such as DNS configuration, WINS configuration, the registry etc. 5. Duplicate IP Addressing: A common problem in many networking environments occurs when two machines try to use the same IP address. This can result in intermittent communications.

67

Information Sheet No. 4

Type of Competency: Computer Hardware Servicing. Module : Configuring Computer Systems and Networks TITLE : Configuring Computer Systems and Networks

Configuring Computer Systems and Networks


UTP Cable the information listed here is to assist Network Administrators in the color coding of Ethernet cables. Please be aware that modifying Ethernet cables improperly may cause loss of network connectivity. Use this information at your own risk, and insure all connectors and cables are modified in accordance with standards. The Internet Centre and its affiliates cannot be held liable for the use of this information in whole or in part. T-568A Straight-Through Ethernet Cable

The TIA/EIA 568-A standard which was ratified in 1995, was replaced by the TIA/EIA 568-B standard in 2002 and has been updated since. Both standards define the T-568A and T-568B pin-outs for using Unshielded Twisted Pair cable and RJ-45 connectors for Ethernet connectivity. The standards and pin-out specification appear to be related and interchangeable, but are not the same and should not be used interchangeably. T-568B Straight-Through Ethernet Cable

Both the T-568A and the T-568B standard Straight-Through cables are used most often as patch cords for your Ethernet connections. If you require a cable to connect two Ethernet devices directly together without a hub or when you connect two hubs together, you will need to use a Crossover cable instead. 68

RJ-45 Crossover Ethernet Cable

A good way of remembering how to wire a Crossover Ethernet cable is to wire one end using the T-568A standard and the other end using the T-568B standard. Another way of remembering the color coding is to simply switch the Green set of wires in place with the Orange set of wires. Specifically, switch the solid Green (G) with the solid Orange, and switch the green/white with the orange/white. Ethernet Cable Instructions: 1. Pull the cable off the reel to the desired length and cut. If you are pulling cables through holes, its easier to attach the RJ-45 plugs after the cable is pulled. The total length of wire segments between a PC and a hub or between two PC's cannot exceed 100 Meters (328 feet) for 100BASE-TX and 300 Meters for 10BASE-T. 2. Start on one end and strip the cable jacket off (about 1") using a stripper or a knife. Be extra careful not to nick the wires, otherwise you will need to start over. 3. Spread, untwist the pairs, and arrange the wires in the order of the desired cable end. Flatten the end between your thumb and forefinger. Trim the ends of the wires so they are even with one another, leaving only 1/2" in wire length. If it is longer than 1/2" it will be out-of-spec and susceptible to crosstalk. Flatten and insure there are no spaces between wires. 4. Hold the RJ-45 plug with the clip facing down or away from you. Push the wires firmly into the plug. Inspect each wire is flat even at the front of the plug. Check the order of the wires. Double check again. Check that the jacket is fitted right against the stop of the plug. Carefully hold the wire and firmly crimp the RJ-45 with the crimper. 5. Check the color orientation, check that the crimped connection is not about to come apart, and check to see if the wires are flat against the front of the plug. If even one of these are incorrect, you will have to start over. Test the Ethernet cable. Ethernet Cable Tips:

A straight-thru cable has identical ends. A crossover cable has different ends. A straight-thru is used as a patch cord in Ethernet connections. A crossover is used to connect two Ethernet devices without a hub or for connecting two hubs. A crossover has one end with the Orange set of wires switched with the Green set. Odd numbered pins are always striped, even numbered pins are always solid colored. Looking at the RJ-45 with the clip facing away from you, Brown is always on the right, and pin 1 is on the left. No more than 1/2" of the Ethernet cable should be untwisted otherwise it will be susceptible to crosstalk. 69

Do not deform, do not bend, do not stretch, do not staple, do not run parallel with power cables, and do not run Ethernet cables near noise inducing components.

Basic Theory:

By looking at a T-568A UTP Ethernet straight-thru cable and an Ethernet crossover cable with a T-568B end, we see that the TX (transmitter) pins are connected to the corresponding RX (receiver) pins, plus to plus and minus to minus. You can also see that both the blue and brown wire pairs on pins 4, 5, 7, and 8 are not used in either standard. What you may not realize is that, these same pins 4, 5, 7, and 8 are not used or required in 100BASE-TX as well. So why bother using these wires, well for one thing its simply easier to make a connection with all the wires grouped together. Otherwise you'll be spending time trying to fit those tiny little wires into each of the corresponding holes in the RJ-45 connector. T568A and T568B termination Perhaps the widest known and most discussed feature of TIA/EIA-568-B.1-2001 is the definition of pin/pair assignments for eight-conductor 100-ohm balanced twisted-pair cabling, such as Category 3, Category 5 and Category 6 unshielded twisted-pair (UTP) cables. These assignments are named T568A and T568B and they define the pinout, or order of connections, for wires in RJ-45 eight-pin modular connector plugs and jacks. Although these definitions consume only one of the 468 pages in the standards documents, a disproportionate amount of attention is paid to them. This is because cables that are terminated with differing standards on each end will not function normally. TIA/EIA-568-B specifies that horizontal cables should be terminated using the T568A pin/pair assignments, "or, optionally, per [T568B] if necessary to accommodate certain 8-pin cabling systems." Despite this instruction, many organizations continue to implement T568B for various reasons, chiefly associated with tradition (T568B is equivalent to AT&T 258A). The United States National Communication Systems Federal Telecommunications Recommendations do not recognize T568B. The primary color of pair one is blue, pair two is orange, pair three is green and pair four is brown. Each pair consists of one conductor of solid color, and a second conductor of the same color with a white stripe. The specific assignments of pairs to connector pins varies between the T568A and T568B standards. Mixing T568A-terminated patch cords with T568B-terminated horizontal cables (or the reverse) does not produce pinout problems in a facility. Although it may very slightly degrade signal quality, this effect is marginal and certainly no greater than that produced by mixing cable brands in-channel. Wiring Regardless of the wiring standard, RJ-45 modular jack pins are numbered 1 through 8, pin 1 being the leftmost pin on the connector side of the plug, 8 the rightmost. Pins on jacks are numbered correspondingly, pin 1 being the rightmost and pin 8 the leftmost connector when the connectors are on the bottom side of the socket.

70

Configuring in cross cable network Assuming that I have two computers: a desktop and a laptop, here are the steps to connect them and configure them into a network: 1. Connect the crossover cable to the network connectors of both computers. You should see a tiny light coming up on the connector when the cable is well connected. 2. On the laptop, go to Start > Control Panel > Network Connections > Local Area Connection. 3. Right mouse click on "Local Area Connection", and select "Properties". The "Local Area Connection Properties" dialog box shows up. 4. Select "Internet Protocol (TCP/IP)" and make it checked. 5. Select "Internet Protocol (TCP/IP)" and click the Properties button. The "Internet Protocol (TCP/IP) Properties" dialog box shows up. 6. Select "Use the following IP address" and make it checked. Enter "192.168.0.1" in the IP address field. Enter "255.255.255.0" in the subnet mask field. 7. Click the OK button to close the "Local Area Connection Properties" dialog box. 8. Click the Close button to close the "Local Area Connection Properties" dialog box. 9. On the desktop, repeat step 2 to step 8 the same way as on the laptop except that entering "192.168.0.2" in the IP address field and entering "255.255.255.0" in the subnet mask field. 10. Open a command window and run the ipconfig and ping commands:
>ipconfig Windows IP Configuration Ethernet adapter Local Area Connection: Connection-specific IP Address. . . . . Subnet Mask . . . . Default Gateway . . >ping 192.168.0.1 Pinging 192.168.0.1 with 32 bytes of data: Reply Reply Reply Reply from from from from 192.168.0.1: 192.168.0.1: 192.168.0.1: 192.168.0.1: bytes=32 bytes=32 bytes=32 bytes=32 time<1ms time<1ms time<1ms time<1ms TTL=128 TTL=128 TTL=128 TTL=128 DNS . . . . . . Suffix . . . . . . . . . . . . . . . . : : 192.168.0.2 : 255.255.255.0 :

Ping statistics for 192.168.0.1: Packets: Sent = 4, Received = 4, Lost = 0 (0% loss), Approximate round trip times in milli-seconds: Minimum = 0ms, Maximum = 0ms, Average = 0ms

11. On my laptop, open a command window and run the ping command:
>ipconfig Windows IP Configuration Ethernet adapter Local Area Connection: Connection-specific IP Address. . . . . Subnet Mask . . . . Default Gateway . . DNS . . . . . . Suffix . . . . . . . . . . . . . . . . : : 192.168.0.1 : 255.255.255.0 :

71

>ping 192.168.0.2 Pinging 192.168.0.2 with 32 bytes of data: Reply Reply Reply Reply from from from from 192.168.0.2: 192.168.0.2: 192.168.0.2: 192.168.0.2: bytes=32 bytes=32 bytes=32 bytes=32 time<1ms time<1ms time<1ms time<1ms TTL=128 TTL=128 TTL=128 TTL=128

Ping statistics for 192.168.0.2: Packets: Sent = 4, Received = 4, Lost = 0 (0% loss), Approximate round trip times in milli-seconds: Minimum = 0ms, Maximum = 0ms, Average = 0ms

Very nice. My crossover cable network is working! Note that:

Both computers are configured to static private network IP addresses. If you are taking the laptop back to an office network with dynamic IP address allocation, you need to change the settings on the "Internet Protocol (TCP/IP) Properties" dialog box. "ipconfig" displays the connection status and settings of the network connection. "ping" command is good testing tool to check if you reach a remote computer or not over the network.

When you configure computer, you will also need to configure network card for your computer to communicate with other computer or network devices. This communication method is called protocol. You will need to have TCP/IP protocol and other Windows items installed on your computer in order to make it work correctly. 1. Go to Start and click on Control Panel. 2. Control Panel window will appear. Double click on Network Connections. Network Connections window will appear. 3. Right click correct Local Area Connection by identifying correct network card and click Properties.

4. In the Local Area Connection Properties, you need to have following items installed: 72

Client for Microsoft Networks Allows your computer to access resources in a Microsoft network. File and Printer Sharing for Microsoft Networks Allows your computer to share files and printers in Microsoft network. Internet Protocol (TCP/IP) The protocol that enables your computer to talk to other computers in your network. You need to specify IP address, netmask, gateway and other network information for it to work. Assign the IP address following your IP network design, and make sure the IP is unique. If you dont have those specified items installed, click Install and follow instructions to install the items which you missed. How to configure a networks? 1) Click Start and click Control Panel. 2) Control Panel window will appear, then double click Add Hardware icon. Simply follow step-by-step instructions prompted by system for adding card driver. Kindly check your network card driver status to confirm its installed properly. Configuring TCP/IP

Assign Computer Name and Workgroup Each computer in your network must have a name and assigned to a workgroup, so that its easy for you to identify the computers in your network. Follow step-by-step instructions here to set computer name and workgroup when you configure computer. So, this is the way you can use to configure computer in your network. After that, you can proceed to do file sharing or printer sharing in the network. If you have network connectivity problem, check out how to use ping to troubleshoot the problem. At this stage, basically your network is up and working. How to configure a networks? 73

Configuring System Failure and Recovery Options You can use the System control panel to configure system failure and recovery options. IT Professionals can also modify system failure and recovery settings on local or remote computers by modifying the values in the following registry key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\CrashControl In the following steps, the registry value is provided for each option with a sample command line to modify the option on your local computer by using the command-line utility (Wmic.exe) to access Windows Management Instrumentation (WMI). See the Additional Information for IT Professionals section of this article for more information. To configure system failure and recovery options, follow these steps: 1. Right-click My Computer, and then click Properties. 2. Click the Advanced tab, and then under Startup and Recovery, click Settings (or Startup and Recovery). 3. Under System Failure, click to select the check boxes for the actions that you want Windows to perform if a system error occurs: The Write an event to the System log option specifies that event information is recorded in the System log. By default, this option is turned on. On computers that are running the Windows 2000 Server or Windows Server 2003 family operating systems, you cannot turn off this feature. Windows always writes event information to the System log. To turn off this option by modifying the registry on a Windows XP or Windows 2000 Professional-based computer, set the LogEvent DWORD value to 0. For example, type the following information at a command prompt, and then press ENTER: wmic recoveros set WriteToSystemLog = False The Send an administrative alert option specifies that administrators are notified of the system error if you configured administrative alerts. By default, this option is turned on. To turn off this option by modifying the registry, set the SendAlert DWORD value to 0. For example, type the following information at a command prompt, and then press ENTER: wmic recoveros set SendAdminAlert = False For more information about how to set an alert, click the following article number to view the article in the Microsoft Knowledge Base: 310490 (http://support.microsoft.com/kb/310490/ ) How to set up administrative alerts in Windows XP The Automatically restart option specifies that Windows automatically restarts your computer. By default, this option is enabled. To turn off this option by modifying the registry, set the AutoReboot DWORD value to 0. For example, type the following information at a command prompt, and then press ENTER: wmic recoveros set AutoReboot = False 4. Under Write Debugging Information, select the type of information that you want Windows to record in a memory dump file if the computer stops unexpectedly: The (none) option does not record any information in a memory dump file. To specify that you do not want Windows to record information in a memory dump file by modifying the registry, set the CrashDumpEnabled DWORD value to 0. For example, type the following information at a command prompt, and then press ENTER: wmic recoveros set DebugInfoType = 0 The Small Memory Dump option records the smallest amount of information to help identify the problem. This option requires a paging file of at least 2 megabytes (MB) on 74

the boot volume of your computer and specifies that Windows will create a new file each time the system stops unexpectedly. A history of these files is stored in the folder that is listed under Small Dump Directory (%SystemRoot%\Minidump). In Windows XP and Windows Server 2003, the small memory dump file is used with the Windows Error Reporting feature. To specify that you want to use a small memory dump file by modifying the registry, set the CrashDumpEnabled DWORD value to 3. For example, type the following information at a command prompt, and then press ENTER: wmic recoveros set DebugInfoType = 3 To specify that you want to use the D:\Minidump folder as your Small Dump Directory by modifying the registry, set the MinidumpDir Expandable String Value to D:\Minidump. For example, type the following information at a command prompt, and then press ENTER wmic recoveros set MiniDumpDirectory = D:\Minidump The Kernel Memory Dump option records only kernel memory. This option stores more information than a small memory dump file, but it takes less time to complete than a complete memory dump file. The file is stored in theDump Filebox (%SystemRoot %\Memory.dmp by default), and any previous kernel or complete memory dump files are overwritten if the Overwrite any existing file check box is selected. If you set this option, you must have a sufficiently large paging file on the boot volume. The required size depends on the amount of RAM in your computer (although the maximum amount of space that must be available for a kernel memory dump on a 32-bit system is 2 GB plus 16 MB; on a 64-bit system, the maximum amount of space that must be available for a kernel memory dump is the size of the RAM plus 128 MB). The following table contains guidelines for the size of the paging file: Collapse this tableExpand this table RAM size Paging file should be no smaller than 256 MB1,373 MB 1.5 times the RAM size 32-bit system: 2 GB plus 16 MB 1,374 MB or greater 64-bit system: size of the RAM plus 128 MB To specify that you want to use a kernel memory dump file by modifying the registry, set the CrashDumpEnabled DWORD value to 2. For example, type the following information at a command prompt, and then press ENTER: wmic recoveros set DebugInfoType = 2 To specify that you want to use the D:\Dump\Mem.dmp file as your memory dump file by modifying the registry, set the DumpFile Expandable String Value to D:\Dump\Mem.dmp. For example, type the following information at a command prompt, and then press ENTER: wmic recoveros set DebugFilePath = D:\Dump\Mem.dmp To specify that you do not want to overwrite any previous kernel or complete memory dump files by modifying the registry, set the Overwrite DWORD value to 0. For example, type the following information at a command prompt, and then press ENTER: wmic recoveros set OverwriteExistingDebugFile = 0

75

The Complete Memory Dump option records the contents of system memory when the computer stops unexpectedly. This option is not available on computers with 2 or more GB of RAM. For more information about this issue, click the following article number to view the article in the Microsoft Knowledge Base: 274598 (http://support.microsoft.com/kb/274598/ ) Complete memory dumps Not available on computers with 2 or more gigabytes of RAM If you select this option, you must have a paging file on the boot volume that is sufficient to hold all the physical RAM plus 1 MB. The file is stored as specified in theDump Filebox (%SystemRoot%\Memory.dmp by default). The extra MB is required for a complete memory dump file because Windows writes a header in addition to dumping the memory contents. The header contains a crash dump signature and specifies the values of some kernel variables. The header information does not require a full MB of space, but Windows sizes your paging file in increments of MBs. To specify that you want to use a complete memory dump file by modifying the registry, set the CrashDumpEnabled DWORD value to 1. For example, type the following information at a command prompt, and then press ENTER: wmic recoveros set DebugInfoType = 1 To specify that you want to use the D:\Dump\Mem.dmp file as your memory dump file by modifying the registry, set the DumpFile Expandable String Value to D:\Dump\Mem.dmp. For example, type the following information at a command prompt, and then press ENTER: wmic recoveros set DebugFilePath = D:\Dump\Mem.dmp To specify that you do not want to overwrite any previous kernel or complete memory dump files by modifying the registry, set the Overwrite DWORD value to 0. For example, type the following information at a command prompt, and then press ENTER: wmic recoveros set OverwriteExistingDebugFile = 0. Note If you contact Microsoft Product Support Services about a stop error, you might be asked for the memory dump file that is generated by the Write Debugging Information option. For more information about these Windows memory dump file options, click the following article number to view the article in the Microsoft Knowledge Base: 254649 (http://support.microsoft.com/kb/254649/ ) Overview of memory dump file options for Windows Server 2003, Windows XP, and Windows 2000

Additional Information for IT Professionals The sample commands in the previous procedures use Wmic.exe to configure system failure and recovery options in the Windows registry. Wmic.exe is included with Windows XP and Windows Server 2003. Wmic.exe is not included with Windows 2000, but you can run Wmic.exe on a Windows XP- or Windows

76

SELF CHECK NO. 4

Type of Competency: Computer Hardware Servicing. Module : Configuring Computer Systems and Networks LO2: Configure computer systems and networks

Direction: Identify the following terms: Client for Microsoft Networks _____________________________________________________________ _____________________________________________________________ _____________________________________________________________ _____________________________________________________________ _____________________________________________________ File and Printer Sharing for Microsoft Networks _____________________________________________________________ _____________________________________________________________ _____________________________________________________________ _____________________________________________________________ _____________________________________________________

Internet Protocol (TCP/IP) _____________________________________________________________ _____________________________________________________________ _____________________________________________________________ _____________________________________________________________ _____________________________________________________

77

ANSWER KEY NO. 1

Type of Competency: Computer Hardware Servicing. Module : Configuring Computer Systems and Networks LO2: Configure computer systems and networks

Client for Microsoft Networks Allows your computer to access resources in a Microsoft network. File and Printer Sharing for Microsoft Networks Allows your computer to share files and printers in Microsoft network . Internet Protocol (TCP/IP) The protocol that enables your computer to talk to other computers in your network. You need to specify IP address, netmask, gateway and other network information for it to work. Assign the IP address following your IP network design, and make sure the IP is unique.

78

Operation Sheet No. 1 Objectives:

Type of Competency: Core Competency Module : Configure Computer Systems and Networks Learning Outcome #2: Configure Computer Systems and Network

To configure UTP cable

Equipment: o LAN Tester o Computer Units Tools and Materials: o UTP Cable o RJ 45 o Crimping Personal Protective Equipment: o Antistatic wrist strap Procedures:
6. Pull the cable off the reel to the desired length and cut. If you are pulling cables through holes, its easier to attach the RJ-45 plugs after the cable is pulled. The total length of wire segments between a PC and a hub or between two PC's cannot exceed 100 Meters (328 feet) for 100BASE-TX and 300 Meters for 10BASE-T. 7. Start on one end and strip the cable jacket off (about 1") using a stripper or a knife. Be extra careful not to nick the wires, otherwise you will need to start over. 8. Spread, untwist the pairs, and arrange the wires in the order of the desired cable end. Flatten the end between your thumb and forefinger. Trim the ends of the wires so they are even with one another, leaving only 1/2" in wire length. If it is longer than 1/2" it will be out-of-spec and susceptible to crosstalk. Flatten and insure there are no spaces between wires. 9. Hold the RJ-45 plug with the clip facing down or away from you. Push the wires firmly into the plug. Inspect each wire is flat even at the front of the plug. Check the order of the wires. Double check again. Check that the jacket is fitted right against the stop of the plug. Carefully hold the wire and firmly crimp the RJ-45 with the crimper. 10. Check the color orientation, check that the crimped connection is not about to come apart, and check to see if the wires are flat against the front of the plug. If even one of these are incorrect, you will have to start over. Test the Ethernet cable.

79

Direction: Drawing

80

JOB SHEET NO. 1

Type of Competency: Computer Hardware Servicing. Module : Configuring Computer Systems and Networks Learning Outcome # 2: Configure computer systems and networks

I. Objective: to be able to configure computer system and network II. Tools Equipment and Materials: A. Tools B. Equipment C. Materials III.Procedures: 1. Connect the crossover cable to the network connectors of both computers. You should see a tiny light coming up on the connector when the cable is well connected. 2. On the laptop, go to Start > Control Panel > Network Connections > Local Area Connection. 3. Right mouse click on "Local Area Connection", and select "Properties". The "Local Area Connection Properties" dialog box shows up. 4. Select "Internet Protocol (TCP/IP)" and make it checked. 5. Select "Internet Protocol (TCP/IP)" and click the Properties button. The "Internet Protocol (TCP/IP) Properties" dialog box shows up. 6. Select "Use the following IP address" and make it checked. Enter "192.168.0.1" in the IP address field. Enter "255.255.255.0" in the subnet mask field. 7. Click the OK button to close the "Local Area Connection Properties" dialog box. 8. Click the Close button to close the "Local Area Connection Properties" dialog box. 9. On the desktop, repeat step 2 to step 8 the same way as on the laptop except that entering "192.168.0.2" in the IP address field and entering "255.255.255.0" in the subnet mask field. 10. Open a command window and run the ipconfig and ping commands:
>ipconfig Windows IP Configuration Ethernet adapter Local Area Connection: Connection-specific IP Address. . . . . Subnet Mask . . . . Default Gateway . . >ping 192.168.0.1 Pinging 192.168.0.1 with 32 bytes of data: Reply from 192.168.0.1: bytes=32 time<1ms TTL=128 Reply from 192.168.0.1: bytes=32 time<1ms TTL=128 DNS . . . . . . Suffix . . . . . . . . . . . . . . . . : : 192.168.0.2 : 255.255.255.0 :

Pliers Philips screw driver

Computer Wires and Cables Appropriate Software Computer Storage Media

81

Reply from 192.168.0.1: bytes=32 time<1ms TTL=128 Reply from 192.168.0.1: bytes=32 time<1ms TTL=128 Ping statistics for 192.168.0.1: Packets: Sent = 4, Received = 4, Lost = 0 (0% loss), Approximate round trip times in milli-seconds: Minimum = 0ms, Maximum = 0ms, Average = 0ms

11. On my computer, open a command window and run the ping command:
>ipconfig Windows IP Configuration Ethernet adapter Local Area Connection: Connection-specific IP Address. . . . . Subnet Mask . . . . Default Gateway . . >ping 192.168.0.2 Pinging 192.168.0.2 with 32 bytes of data: Reply Reply Reply Reply from from from from 192.168.0.2: 192.168.0.2: 192.168.0.2: 192.168.0.2: bytes=32 bytes=32 bytes=32 bytes=32 time<1ms time<1ms time<1ms time<1ms TTL=128 TTL=128 TTL=128 TTL=128 DNS . . . . . . Suffix . . . . . . . . . . . . . . . . : : 192.168.0.1 : 255.255.255.0 :

Ping statistics for 192.168.0.2: Packets: Sent = 4, Received = 4, Lost = 0 (0% loss), Approximate round trip times in milli-seconds: Minimum = 0ms, Maximum = 0ms, Average = 0ms

Very nice. My crossover cable network is working! I. Illustration:

82

Qualification: COMPUTER HARDWARE SERVICING NC II Module Title: CONFIGURING COMPUTER SYSTEMS AND NETWORKS Learning Outcome # 3 : Inspect and Test Configured Computer Systems and Networks

Assessment Criteria: 1. Final inspections are undertaken to ensure that the configuration done on the systems and networks conforms with the manufactures instruction/manual 2. Computer systems and networks are checked to ensure safe operation. 2. Report is prepared and completed according to company requirements. Resources: Internet http://en.kioskea.net/contents/configuration-reseau/tests-diagnosticsreseau.php3 http://support.microsoft.com/kb/300986

83

Type of Competency: CORE COMPETENCY Module: DIAGNOSING AND TROUBLESHOOTING COMPUTER SYSTEM Activity LO.: Correct defects in computer system and networks LEARNING EXPERIENCES LEARNING ACTIVITIES SPECIAL INSTRUCTIONS Read information sheet No.1 How to Information sheet No.1 How to check check configured systems and networks configured systems and networks to to ensure safety. ensure safety. Perform self check self check No.1 Submit answers for checking answers key No.1 Learning Conduct Institutional Assessment ICAI Ask your trainer if you can proceed to the next learning outcome.

84

Type of Competency: Computer Hardware Servicing. INFORMATION Module : Configuring Computer Systems and Networks TITLE : Inspect and Test Configured Computer Systems and SHEET NO. 1
Networks

Inspect and Test Configured Computer Systems and Networks


Network tests and diagnostics

Testing the IP configuration


Before doing anything else, you are advised to check the computer's IP configuration. Windows systems offer a command-line tool, called ipconfig, that lets you find out your computer's IP configuration. The output of this command gives the IP configuration for each interface; a computer with two network cards and one wireless adapter has 3 interfaces each with its own configuration. To view your computer's IP configuration, simply enter the following command (Start/run):
cmd /k ipconfig /all

The output of such a command looks like this:


Windows IP Configuration Host name . . . . . . . . . . : CCM Primary DNS suffix . . . . . . : Node type . . . . . . . . . . : Broadcast IP routing enabled . . . . . . . . : No WINS proxy enabled . . . . . . . . : No Ethernet adapter wireless network connection: Connection-specific DNS suffix: Description . . . . . . . . . . . : Intel(R) PRO/Wireless LAN 2100 3A Mini PCI Adapter Physical address . . . . . . . . .: 00-0C-F1-54-D5-2C DHCP enabled. . . . . . . . . . . : No IP address. . . . . . . . . . . . : 192.168.1.3 Subnet mask . . . . . . : 255.255.255.0 Default gateway . . . . . . : 192.168.1.1 DNS servers . . . . . . . . . . : 193.19.219.210 193.19.219.211 Ethernet adapter local area connection: Media status . . . . . . . . . : Media disconnected Description . . . . . . . . . . . : Broadcom 570x Gigabit Integrated Controller Physical address . . . . . . . . .: 0F-0F-1F-CB-99-87

The above report shows that the computer has two network interfaces, one of which is wireless. The name of the machine on the network is CCM. The Ethernet interface connected to the local area network (network card) is not active since the cable is disconnected, but the wireless adapter is configured. Machines on a same network must use a same address range (with different addresses) and a same subnet mask. In the case of a local network, connecting machines that do not have routable IP addresses, so-called private address ranges must be used. The default gateway refers to, when applicable, the IP address of the machine offering internet access. DNS servers. 85

The DNS servers must correspond to the organization's DNS servers; most of the time these are the service provider's DNS servers.

Testing the connection


To test the proper functioning of a network, there is a highly practical utility provided as a standard feature with most operating systems; this is the ping utility. Ping lets you send a data packet to a network computer and lets you evaluate the response time. The ping command is explained in detail at the following address:

Network tools - Ping command

To test the network thoroughly, simply open a command-line window, then successively carry out the following steps:

ping the loopback address (127.0.0.1), representing your computer:


ping -t 127.0.0.1

ping the IP addresses of the network's computers, for example:


ping -t 192.168.0.3

ping the computer names, for example:


ping -t Mickey

ping the computer used as gateway on the local area network, that is, the computer sharing its internet connection. It usually has the address 192.168.0.1:
ping -t 192.168.0.1

ping the service provider's gateway. The address of the service provider's gateway can be retrieved using the ipconfig command on the computer being used as gateway on the local area network; ping the service provider's name servers . The address of the service provider's DNS servers can be retrieved using the ipconfig command on the computer being used as gateway on the local area network; ping a machine on the internet network, for example:
ping -t 193.19.219.210

ping a domain name, for example:


ping -t www.commentcamarche.net

If all this works, your network is ready to be used! To View the TCP/IP Configuration by Using the Ipconfig.exe Tool 1. Click Start, click Run, type cmd, and then press ENTER. 2. At the command prompt, type ipconfig, and then press ENTER. This command displays your computer's DNS suffix, IP address, subnet mask, and default gateway. 3. If you need more information and want to display a detailed configuration report, type ipconfig /all at the command prompt, and then press ENTER. 4. Confirm that your computer has the appropriate settings for DNS and WINS servers, an available IP address, the proper subnet mask, the proper default gateway, and the correct host name.

86

To Display Connection Information by Using the Nbtstat.exe Tool NetBIOS over TCP/IP (NetBT) resolves NetBIOS names to IP addresses. TCP/IP provides many options for NetBIOS name resolution, including local cache lookup, WINS server query, broadcast, DNS server query, and LMHOSTS and HOSTS lookup. Nbtstat.exe is a useful tool for troubleshooting NetBIOS name resolution problems. You can use the nbtstat.exe command to remove or correct preloaded entries. To use the nbtstat.exe command:

To list the NetBIOS table of the local computer, type nbtstat -n at the command prompt, and then press ENTER. This command displays the names that were registered locally on the computer by programs such as the server and redirector. To list the contents of the NetBIOS name cache, type nbtstat -c at the command prompt, and then press ENTER. This command shows the NetBIOS name cache, which contains name-to-address mappings for other computers. To purge the name cache and reload it from the LMHOSTS file, type nbtstat -R at the command prompt, and then press ENTER. To perform a NetBIOS adapter status command against the computer that you specify by name, type nbtstat -a NetBIOS computer name at the command prompt, and then press ENTER. The adapter status command returns the local NetBIOS name table for that computer and the MAC address of the network adapter. To display a list of client and server connections, type nbtstat -s at the command prompt, and then press ENTER. This command lists the current NetBIOS sessions and their status, including statistics, as shown in the following example:

NetBIOS Connection Table Local Name State In/Out Remote Host Input Output -----------------------------------------------------------------DAVEMAC1 <00> Connected Out CNSSUP1<20> 6MB 5MB DAVEMAC1 <00> Connected Out CNSPRINT<20> 108KB 116KB DAVEMAC1 <00> Connected Out CNSSRC1<20> 299KB 19KB DAVEMAC1 <00> Connected Out STH2NT<20> 324KB 19KB DAVEMAC1 <03> Listening

\Testing Connections to Remote Servers If you are unable to contact to a remote server, there are two common tools that you can use. Use the ping command to verify that a host computer can connect to the TCP/IP network and network resources. Use the tracert command to examine the route taken to a destination.

To Test Connections by Using Ping.exe You can use the ping command as a troubleshooting tool to sequentially test connectivity to various network resources. To ping a network host directly: 1. Click Start, click Run, type cmd, and then press ENTER. 2. Type ping IP address of the remote network host (for example, ping 192.168.1.104) or ping host name (for example, ping www.microsoft.com), and then press ENTER. 3. Check for a reply that may look like this: Reply from 192.168.1.104: bytes=32 time=40ms TTL=61 If this message displays, the server is available on the network. If you are unable to contact the resource, you can troubleshoot the connection by using the ping command to test connectivity to various network resources: 87

a) Ping the loopback address (by using the ping 127.0.0.1 command) to verify that TCP/IP is installed and working correctly on the local computer. b) Ping the IP address of the local computer to verify that it was added to the network correctly. c) Ping the IP address of the default gateway to verify that the gateway is functional and it is possible to connect to a local host on the local network. You can obtain the IP address of the local default gateway by using the ipconfig command. d) Ping the IP address of another remote host to verify that you can communicate through a router. To Test Connections by Using Tracert.exe Tracert.exe is a route-tracing utility that you can use to determine the network path to a destination. To determine the path that a packet takes on the network and where that path may be ending: 1. Click Start, click Run, type cmd, and then press ENTER. 2. At the command prompt, type tracert IP address of the remote network host, and then press ENTER. 3. Examine the results to determine the length of time that the packet took to reach each network segment and the point at which the connection may stop working. To Test Connections by Using the NET VIEW Command 1. Click Start, click Run, type cmd, and then press ENTER. 2. At the command prompt, type net view \\computer name, and then press ENTER. A list of the file and print shares of a computer that is running Windows 2000 is generated by establishing a temporary NetBIOS connection. If there are no file or print shares available on the specified computer, you receive a "There are no entries in the list." message. If the command does not work, type net view \\IP address of the remote computer, and then press ENTER. If the command works, but a net view attempt to the computer name does not work, the computer name may be resolving to the wrong address. If the command does not work and generates a "System error has occurred" error message, verify that you typed the correct name of the remote computer, that the computer is operational (and is running the File and Printer Sharing for Microsoft Networks service), and that all of the gateways (routers) between the local computer and the remote host are operational by using the ping command. Troubleshooting This section describes how to troubleshoot some of the issues that you may have.

I Can Contact a Network Resource Directly, but If I "Ping" the Resource It Always Returns "Request Timed Out" Many organizations block the return of ICMP (ping) packets as a security measure. Because of this, if you are trying to contact a resource across the Internet, or critical internal systems, it may not be possible to obtain a response to a "ping" or "tracert" message.

I Can Ping a Resource by Its IP Address, but I Can Not "Ping" It by Name If it is possible to contact a resource by using its IP address but a ping message to its host name does not work, the problem is likely caused by a name resolution failure, rather than network connectivity. Check to make sure that the computer is configured with the proper DNS or WINS entries, and that the DNS or WINS servers are available.

88

SELF CHECK NO. 1

Type of Competency: Computer Hardware Servicing. Module : Configuring Computer Systems and Networks LO3: Configure computer systems and networks

Self check no 1. Direction: Enumeration. How to View the TCP/IP Configuration by Using the Ipconfig.exe Tool?
How to Test Connections by Using Ping.exe?

89

ANSWER KEY NO. 1

Type of Competency: Computer Hardware Servicing. Module : Configuring Computer Systems and Networks LO3: Configure computer systems and networks

1. To View the TCP/IP Configuration by Using the Ipconfig.exe Tool


1. Click Start, click Run, type cmd, and then press ENTER. 2. At the command prompt, type ipconfig, and then press ENTER. This command displays your computer's DNS suffix, IP address, subnet mask, and default gateway. 3. If you need more information and want to display a detailed configuration report, type ipconfig /all at the command prompt, and then press ENTER. 4. Confirm that your computer has the appropriate settings for DNS and WINS servers, an available IP address, the proper subnet mask, the proper default gateway, and the correct host name. 2. You can use the ping command as a troubleshooting tool to sequentially test connectivity to various network resources. To ping a network host directly: 1. Click Start, click Run, type cmd, and then press ENTER. 2. Type ping IP address of the remote network host (for example, ping 192.168.1.104) or ping host name (for example, ping www.microsoft.com), and then press ENTER. 3. Check for a reply that may look like this: Reply v.168.1.104: bytes=32 time=40ms TTL=61 If this message displays, the server is available on the network. If you are unable to contact the resource, you can troubleshoot the connection by using the ping command to test connectivity to various network resources: a) Ping the loopback address (by using the ping 127.0.0.1 command) to verify that TCP/IP is installed and working correctly on the local computer. b) Ping the IP address of the local computer to verify that it was added to the network correctly. c) Ping the IP address of the default gateway to verify that the gateway is functional and it is possible to connect to a local host on the local network. You can obtain the IP address of the local default gateway by using the ipconfig command. d) Ping the IP address of another remote host to verify that you can communicate through a router.

90

ASSIGNMENT SHEET NO. 1

Type of Competency: CORE COMPETENCY Module: CONFIGURING COMPUTER

SYSTEMS

AND

NETWORKS Title: INSPECT AND TEST CONFIGURED COMPUTER SYSTEMS AND NETWORKS

NAME OF TRAINEE: ______________________________________ Direction: Group the class in to 4, and perform a rule play regarding on how to inspect and configure computer systems and networks.

91

You might also like