CSS Grade 10 Learning Material Third Quarter 1
CSS Grade 10 Learning Material Third Quarter 1
COMPUTER SYSTEMS
SERVICING
LEARNING MATERIAL
Quarter 3
Introduction 3
Pre-Test 4
LESSON 11: MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS
(MRCN)
LO 1. Plan and prepare for maintenance and repair
Information Sheet 1.1 PPE 6 Week 1
Self-Check 1.1 9
Activity Sheet 1.1 10
Information Sheet 1.2 OHS policies and procedures 11 Week 2
Self-Check 1.2 15
Activity Sheet 1.2 16
Information Sheet 1.3 Planning and preparing for maintenance 17 Week 3
Self-Check 1.3 19
Activity Sheet 1.3 20
Information Sheet 1.4 Tools and tests equipment 21 Week 4
Self-Check 1.4 27
Activity Sheet 1.4 29
Information Sheet 1.5 PC systems 30 Week 5
Self-Check 1.5 33
Activity Sheet 1.5 34
Information Sheet 1.6 PC specifications 35 Week 5
Self-Check 1.6 38
Activity Sheet 1.6 38
Information Sheet 1.7 Computer operations 39 Week 6
Self-Check 1.7 42
Activity Sheet 1.7 43
Information Sheet 1.8 Electronic fault findings 44 Week 7
Self-Check 1.8 51
Activity Sheet 1.8 51
Information Sheet 1.9 Maintenance of computer
systems and network 53 Week 8
Self-Check 1.8 58
Activity Sheet 1.8 59
References 60
Introduction
2
In this learning material, there will be two (2) most essential learning
competencies that you will encounter: (1) Plan and prepare for maintenance and repair and
(2) Maintain computer systems and networks. The two most essential learning
competencies contain sub-topics that discuss the details on MAINTAINING AND
REPAIRING COMPUTER SYSTEMS AND NETWORKS (MRCN).
Pre-Test
3
Direction: Choose the correct answer from the given choices. Write your answer
on a separate sheet of paper.
1. One long beep followed by two short ones normally signifies that it is not
properly seated, faulty, or missing.
a. Video card c. sound card
b. Modem d. RAM
2. What does it indicates if continuous beeps has been found?
a. Video card c. No sound card
b. No RAM d. No Modem
3. Regularly using of these will find cross-linked files and lost file fragments.
a. ScanDisk c. Internet
b. RAM d. Video
4. If this is working, booting your PC will light the front panel-power LED
and let the BIOS perform a Power-On Self-Test, or POST.
a. ScanDisk c. Powersupply
b. RAM d. Video
5. POST stands for .
a. Power On Stable c. Powersupply On Test
b. Powerful On technique d. Power Self On Test
6. BIOS stands for .
a. Basic Input Output System c. Beep Internal Out System
b. Beep In Out Scale d. Basic In Out Scale
7. It is another source of sometimes bizarre hardware faults
a. External parts c. RJ45
b. Internal cabling d. UTP cable
8. A well-built of these with 300 Watts, or larger, capacity fitted with a
quiet fan is likely to keep your PC running far more reliably when you
install several hard drives and soundcards.
a. External parts c. Power supply
b. CD ROM d. Motherboard
9. These are similar from motherboard to motherboard, you really need to
refer to the manual to find out what each sequence of beeps signifies.
a. External parts c. Beep codes
b. CD ROM d. Motherboard
10. It can be quick and easy or a case of time, effort and perseverance in
fixing problems in electronics.
a. External parts c. Fitting
b. Fault finding d. Motherboard
11. Which tool is used for hardware to stand on to prevent static electricity
4
from building up?
a. Anti-static mat c. Philips head screwdriver
b. Hex driver d. Wire cutter
12. Which tool is used to loosen or tighten cross-head screws?
a. Anti-static mat c. Philips head screwdriver
b. Hex driver d. Wire cutter
13. Which tool is sometimes called a nut driver? It is used to tighten nuts
in the same way that a screwdriver tightens screws?
a. Anti-static mat c. Philips head screwdriver
b. Hex driver d. Wire cutter
14. Which tool is used to strip and cut wires?
a. Anti-static mat c. Philips head screwdriver
b. Hex driver d. Wire cutter
15. Which tool is used to retrieve parts from location that are too small for
your hand to fit?
a. Part Retriever c. Cable ties
b. Lint-free Cloth d. Flat head screwdriver
16. Which tool is used to clean different computer components without
scratching or leaving debris?
a. Part Retriever c. Cable ties
b. Lint-free Cloth d. Flat head screwdriver
17. Which tool is used to bundle cables neatly inside and outside of a
computer?
a. Part Retriever c. Cable ties
b. Lint-free Cloth d. Flat head screwdriver
18. Which tool is used to loosen or tighten slotted screws?
a. Part Retriever c. Cable ties
b. Lint-free Cloth d. Flat head screwdriver
19. Which tool is used to loosen or tighten screws that have a star-like
depression on the top, a feature that is mainly found on laptop?
a. Anti-static mat c. Philips head screwdriver
b. Torx screwdriver d. Wire cutter
20. Which tool is used to blow away dust and debris from different
computer parts without touching the components?
a. Anti-static mat c. Compressed air
b. Hex driver d. Wire cutter
5
Learning Objectives:
After reading this Information Sheet, the learner is expected to:
a. Identify personal protective equipment
b. Enumerate personal protective equipment
c. Explain each personal protective equipment
Safety precautions
Proper preparation is the key to a successful built. Before you begin, make sure that
you have the tool you will need, and secure a clear well-lit workplace. Gather all the
components you’ll be using and unpack them at the same time. Find a dry, well-
ventilated place to do your work, you should choose an area without carpets, because it
tends to create static electricity. Always keep in mind that personal protection is one of
the traits of a good technician.
6
Preventive Maintenance
Maintenance is keeping something in working order. It includes repair, testing,
adjusting, and replacing parts of a computer or a peripheral.
Types of Preventive Maintenance
Active
Passive
Active – this is carried out before problems develop in a computer unit.
Passive – this is carried after problems have developed in the computer unit.
Personal Protective Devices
1. Anti-Static Devices
2. Power Surge Protector Devices
Anti-Static devices
These are the devices used to protect computer units from electro static
discharge.
Anti-static Wrist Strap
images.google.com.ph/imgres
Anti-static Mat
images.google.com.ph/imgres
Anti-static Bag
7
images.google.com.ph/imgres
8
images.google.com.ph/imgres
images.google.com.ph/imgres
Directions: Search and encircle ten (10) terms used in personal protective equipment.
Encircle the word/ words vertically, horizontally, backward, upward or downward.
S U R G E P R O T E C T O R L A
M A B G O G G L E S C V D E F N
A C V A Z X S D A Q D O V F G T
I N A E W V B A F D F L A A P I
N Q T S R G F R E H G T B B A S
T D A I I B E D E E G A C C S T
E H T F S J F D R L A G D D S A
N E R D T T E R T M E E C C I T
A L E C S K A R Y E S R F I V I
9
N T W V T L E T I T I E V V E C
C S D G R M D Y I S L G B P U B
E T E T A U T E R C Y U H O L A
N R R Y P E D R T Y M L N N A G
M A T U F R T Y U I O A J J T B
I P G I O V F G H J I T T T O G
J G H A C T I V E E N O L L R F
R O T E C T O R L A N R N S E D
A. Direction. Write TRUE if the statement is correct and FALSE if it is wrong. Write
your answers on the space provided
_______ 1. Selecting the best tool for each task requires training in the proper use
of the tools, field experience in their safe use, and following the
manufacturer’s guidance and instructions for that specific tool.
_______ 2. When obtaining the tool, all the associated tooling and consumable parts,
as recommended by the manufacturer, must be included.
_______ 3. The safe use of a tool depends on using the tool for the purpose for which
it was designed and also for other purposes where it can be used as
substitute where tool is not available.
_______ 4. All tools should be kept in good condition with regular maintenance.
_______ 5. Preparing for a task includes only knowing the task to be done.
_______ 6. Preparing for a task includes also the sequence of tasks to be done.
10
B. Direction: Identify the tools on the boxes. Write your answer on the space provided.
_____________7.
_______________9.
_____________8.
_______________10.
Learning Objectives:
After reading this Information Sheet, the learner is expected to:
a. Identify occupational health and safety policies and procedures
b. Apply contingency measures in accordance with the OHS procedure
c. Follow occupational health and safety policies and procedures
Occupational safety and health (OSH) also commonly referred to as occupational health
and safety (OHS) or workplace health and safety (WHS) is an area concerned with the
safety, health and welfare of people engaged in work or employment. The goals of
occupational safety and health programs include to foster a safe and healthy work
environment. Occupational safety and health may also protect co-workers, family
members, employers, customers, and many others who might be affected by the
workplace environment. In the United States the term occupational health and safety is
11
referred to as occupational health and occupational and non-occupational safety and
includes safety for activities outside of work.
• Hold the components by the edges and do not touch the IC’s.
• Do not use excessive force if things don’t quite slip into place.
• Wear rubber sole shoes when standing on the ground or in a concrete floor.
• Always power off and unplug the computer before working on it.
• Execution of OHS policies are carried out along with the task.
12
students will also be capable of participating and contributing to OHS
management issues.
13
When possible, try to avoid working in carpeted areas. Carpeting greatly increases
static buildup within your body.
1. Unplug the power connector from the socket when working on your computer to
avoid accident.
2. Use anti-static devices and rubber footwear to disperse static electricity. Always
use an anti-static wrist strap when working on a computer (except when working
on monitors)
3. Always grasp an unpainted metal part of the computer chassis with your bare
hand before you touch anything inside. Do this even if you are wearing an anti-
static wristband.
4. Handle all sensitive components in non-conducting metallic edge. Don't touch the
pins or other connectors.
5. Never plug an ATX power supply into AC power unless it is connected either to a
computer's motherboard or to a dummy test load.
6. Always use a UL-approved surge protector or an Uninterruptible Power Supply
that incorporates surge and spike protection.
7. Check all signal pins and alignment to avoid incorrect connection.
8. Be careful with the sharp edges inside the computer case.
9. Do not use excessive force when installing computer components to prevent
damage.
10. Clean the area before and after using it to maintain sanitation and prevent
accidents.
11. Do not clean your system with wet clothes or any liquid detergents.
12. Use an air duster or blower in cleaning the computer system.
13. Do not eat, drink or smoke when working on your computer
Health and safety procedure is the responsibility of all persons in the computer and
technology industries. You must identify the hazards where you are working and decide
how dangerous they are. Eliminate the hazard or modify the risk that it presents.
Whenever you spot a hazard, assess the risk by asking yourself two questions: - How
likely is it that the hazard could harm me or someone else? - How badly could I or
someone else be harmed?
14
It is your employer's responsibility to fix hazards. Sometimes you may be able to fix
simple hazards yourself, as long as you don't put yourself or others at risk. For example,
you can pick up things from the floor and put them away to eliminate a trip hazard. What
to do? • Ask your supervisor for instructions and training before using equipment. • Ask
for help moving or lifting heavy objects.
Is an agent, factor or circumstance that can cause harm with or without contact. They
can be classified as type of occupational hazard or environmental hazard. One of the
most common physical hazards involving computer technicians is cables running across
the floor. If someone trips, falls, and hurts himself because of a cable you ran across the
floor, someone (you, your employer, or your customer) has a serious legal negligence
problem. If you need to temporarily run a cable across the
For cables that are temporary but will need to run across the floor for a longer period of
time, use "gaffers tape". Gaffers tape is a heavy tape with strong adhesive to stick to the
floor. It comes in a wide range of colors, from unintrusive matte black to hazard warning
red. Although it has strong adhesive, it can be removed easily and cleanly. For long
term cable routing there is a wide variety of cable organizing devices like cable
Inside computers and electronic equipment, there is a range of voltages from 3.3 volts
to 25 volts, most of these are harmless. But at the power supply, you'll find line voltage,
which is a lethal 220 volts. Most of the time while working inside computers and
electronic equipment, you'll want them unplugged from the wall socket. If you need to
work on equipment while it is still plugged in or powered up, remove all jewelry and wrist
watches. If you must work
CRT monitors are becoming less common nowadays, but should you run into one, it is
best NOT to open it up. Instead, outsource any CRT repair job to a qualified CRT repair
15
service. A CRT monitor has a high-voltage anode inside it, which can carry a charge of
up to 25,000 volts, and it can still be holding a high charge days after the power is
removed. If you must open a CRT monitor case for some reason, be sure to study the
proper way to discharge a CRT before you proceed.
Source:
https://www.slideshare.net/grayzon21/computer-hardware-
servicing-practice-occupational-health-and-safety-procedure#
16
ACTIVITY SHEET 1.2
OHS Policies and Procedures
1. What is OHSP?
_______________________________________________
2-7 Enumerate the Health and Safety Procedures
_______________________________________________
_______________________________________________
_______________________________________________
_______________________________________________
_______________________________________________
_______________________________________________
8-10 Workplace Procedures
_______________________________________________
_______________________________________________
_______________________________________________
17
Learning Objectives:
After reading this Information Sheet, the learner is expected to:
a. Understand planning and preparing for maintenance
b. Follow the procedures of preventive maintenance
c. Value the importance of preventive maintenance
18
Maintenance Procedures
In preparing maintenance procedure, you also have to consider designing a systematic
plan for both for hardware and software. This saves time, money and frustration and
ensures safe conditions to prevent injury to people and damage to computer equipment.
Planning Maintenance Procedures for Computer System and Networking: A. Design a
systematic maintenance plan for hardware.
1. Design a monitoring, evaluating and updating plan.
2. Place your computer in a well-ventilated area.
3. Schedule the use of computer for its longer life.
4. Move the computer only when it is turned off and unplugged.
5. Treat your computer properly.
19
Install or secure passwords. Installing passwords makes your files more secure.
Delete temporary files. Deleting the temporary files on your computer will enhance
its speed and will create more disk space for your files.
Update anti-virus and spy ware. Regularly update your anti-virus for your
computer protection against viruses.
Direction: Read carefully each statement below. Write T if the statement is TRUE or F
if the statement is FALSE.
___________1. All tools and equipment must be properly maintained so that workers
are not endangered.
___________2. Preventive maintenance is the systematic care and protection of tools,
equipment and machines in order to keep them in a safe, usable
condition, limit downtime and extend productivity.
___________3. The degree of detail to include regarding tools and equipment
maintenance will depend on the kinds of tools/equipment used.
___________4. Damaged or defective equipment/tools should not be tagged and
removed from service.
___________5. Most manufacturers can provide maintenance schedules for their
equipment.
___________ 6. Properly stored tools and equipment will be easy to find when needed
and are less likely to be lost.
___________7. Use bins for storing small parts is a good practice on proper storage.
___________8. Productivity is increased because time is not lost looking for tools,
parts and equipment is one of the benefits of proper storage.
___________9. Deleting the temporary files on your computer will enhance its speed
and will create more disk space for your files.
20
___________10. To avoid damage to the computer unit always turn on and plug it
when transferring the computer to another location.
Direction: Answer the given questions below. Write your answer on the
space provided.
3-7 What are the procedures in planning maintenance for computer system
and networking?
_________________________________________________
_________________________________________________
_________________________________________________
_________________________________________________
8-10 What are the common methods of determining preventive failure
management policies?
_________________________________________________
_________________________________________________
21
INFORMATION SHEET 1.4
TOOLS AND TESTS EQUIPMENT
Electronics test and test equipment are essential elements of electronics and
computer. Electronic equipment can develop failures, or it may not work properly
when it is built. In order to discover whether a circuit is working, and then where the
problem is located, it is necessary to use various forms of test equipment.
The purpose of an antistatic wrist strap is to equalize the electrical charge between
you and the equipment. The antistatic wrist strap is a conductor that connects your
body to the equipment that you are working on. When static electricity builds up in
your body, the connection made by the wrist strap to the equipment, or ground,
channels the electricity through the wire that connects the strap.
https://www.google.com/search?q=wrist+strap&source
3. Snap the connector at the end of the wire to the wrist strap, and connect the other
end either to the equipment or to the same grounding point that the antistatic mat is
connected to. The metal skeleton of the case is a good place to connect the wire.
When connecting the wire to equipment that you are working on, choose an
22
unpainted metal surface. A painted surface does not conduct the electricity as well
as unpainted metal.
https://www.google.com/search?q=antistatic+mat+
1. Lay the mat on the workspace next to or under the computer case.
2. Clip the mat to the case to provide a grounded surface on which you can place
parts as you remove them from the system.
Reducing the potential for ESD reduces the likelihood of damage to delicate circuits
or components.
A technician needs to be able to properly use each tool in the toolkit. This topic
covers many of the various hand tools used when repairing computers.
Screws Match each screw with the proper screwdriver. Place the tip of the
screwdriver on the head of the screw.
the screw.
https://www.google.com/search?q=screwdriver+set&tbm
Screws can become stripped if you over-tighten them with a screwdriver. A stripped
screw, may get stuck in the screw hole, or it may not tighten firmly. Discard stripped
screws.
Flat head screwdriver Use a flat head screwdriver when you are working with a
slotted screw. Do not use a flat head screwdriver to remove a Phillips head screw.
Never use a screwdriver as a pry bar. If you cannot remove a component, check to
23
see if there is a clip or latch that is securing the component in place. CAUTION: If
excessive force is needed to remove or add a component, something is probably
wrong. Take a second look to make sure that you have not missed a screw or a
locking clip that is holding the component in place. Refer to the device manual or
diagram for additional information.
Phillips head screwdriver Use a Phillips head screwdriver with crosshead screws.
Do not use this type of screwdriver to puncture anything. This will damage the head
of the screwdriver.
Hex driver Use a hex driver to loosen and tighten bolts that have a hexagonal (six-
sided) head. Hex bolts should not be over-tightened because the threads of the bolts
can be stripped. Do not use a hex driver that is too large for the bolt that you are
using. CAUTION: Some tools are magnetized. When working around electronic
devices, be sure that the tools you are using have not been magnetized. Magnetic
fields can be harmful to data stored on magnetic media. Test your tool by touching
the tool with a screw. If the screw is attracted to the tool, do not use the tool. Part
retriever, Needle-nose pliers, or tweezers The part retriever, needle-nose pliers, and
tweezers can be used to place and retrieve parts that may be hard to reach with
your fingers. Do not scratch or hit any components when using these tools.
CAUTION: Pencils should not be used inside the computer to change the setting of
switches or to pry off jumpers. The pencil lead can act as a conductor and may
damage the computer components.
Keeping computers clean inside and out is a vital part of a maintenance program.
Dirt can cause problems with the physical operation of fans, buttons, and other
mechanical components. On electrical components, an excessive buildup of dust will
act like an insulator and trap the heat. This insulation will impair the ability of heat
sinks and cooling fans to keep components cool, causing chips and circuits to
overheat and fail.
CAUTION: When compressed air is used to clean inside the computer, the air
should be blown around the components with a minimum distance of four inches
from the nozzle. The power supply and the fan should be cleaned from the back of
the case.
CAUTION: Before cleaning any device, turn it off and unplug the device from the
power source.
Computer Cases and Monitors Clean computer cases and the outside of monitors
with a mild cleaning solution on a damp, lint-free cloth. Mix one drop of dishwashing
24
liquid with four ounces of water to create the cleaning solution. If any water drips
inside the case, allow enough time for the liquid to dry before powering on the
computer.
LCD Screens Do not use ammoniated glass cleaners or any other solution on an
LCD screen, unless the cleaner is specifically designed for the purpose. Harsh
chemicals will damage the coating on the screen. There is no glass protecting these
screens, so be gentle when cleaning them and do not press firmly on the screen.
CRT Screens To clean the screens of CRT monitors, dampen a soft, clean, lint-free
cloth with distilled water and wipe the screen from top to bottom. Then use a soft,
dry cloth to wipe the screen and remove any streaking after you have cleaned the
monitor.
Clean dusty components with a can of compressed air. Compressed air does not
cause electrostatic buildup on components. Make sure that you are in a well-
ventilated area before blowing the dust out of the computer. A best practice is to
wear a dust mask to make sure that you do not breathe in the dust particles.
Blow out the dust using short bursts from the can. Never tip the can or use the
compressed air can upside down. Do not allow the fan blades to spin from the force
of the compressed air. Hold the fan in place. Fan motors can be ruined from
spinning when the motor is not turned on.
CAUTION: Never use a standard vacuum cleaner inside a computer case. The
plastic parts of the vacuum cleaner can build up static electricity and discharge to
the components. Use only a vacuum approved for electronic components.
Mouse Use glass cleaner and a soft cloth to clean the outside of the mouse. Do not
spray glass cleaner directly on the mouse. If cleaning a ball mouse, you can remove
the ball and clean it with glass cleaner and a soft cloth. Wipe the rollers clean inside
the mouse with the same cloth. Do not spray any liquids inside the mouse.
25
https://www.google.com/search?q=cleaning+materials+of+computer
LAN CARD
It is a network interface card. This is a computer circuit board or card that is installed in
a computer so that it can be connected to a network.
SERVER
It is a part of a network. It is a special computer that users on the network can access to
carry out a particular job.
HUB / PORT
It is a connector on the back of a computer or other device. A port is either a serial port
or a parallel port.
MODEM
The modem is a device that allows a given computer to share data or otherwise a
device which let computers exchange information
SCANNER
It is an input device that read text or illustration printed on paper, translates the
information into a form that a computer can use
26
FLAT SCREW DRIVER
It is used to drive or fasten negative slotted screws
USB
Universal Serial Bus, a hardware interface for low-speed peripherals such as the
keyboard, mouse, joystick, scanner, printer and telephony devices.
PRINTER
It is a piece of hardware that produces a paper copy (also known as ‘hardcopy’) of the
information generated by the computer.
RAM
Random Access Memory, is a primary memory. This memory is used inside the
computer to hold programs and data while it is running.
BIOS
Basic Input / Output System, chip that controls the most basic functions of the computer
and performs a self-test every time you turn it on.
FLASH DRIVE
RAM that can retain data without electrical power. It is widely used for BIOS chips and
for digital camera and digital music storage
VIDEO CAMERA
A camera using videotape: a camera that records onto videotape
SOLDERING IRON
It is used to join two or more metal conductors with the support of soldering lead melted
around it.
DESOLDERING TOOL
It is used to unsolder unwanted parts or component in the circuit with the support of
soldering pencil.
LAN TESTER
For RJ11,12,45 & BNC w/ Remote Unit This ergonomic tester is designed to test most
network cable wiring. You can either conduct an auto or manual test.
27
UTP
Unshielded Twisted Pair, is a popular type of cable used in computer networking that
consists of two shielded wires twisted around each.
Source: https://baictchs09.wordpress.com/2018/10/21/materials-tools-equipment-and-testing-
devices/
Multiple Choice. Encircle the letter of the correct answer. Write your answers
on the space provided.
____1. Which tool is used for hardware to stand on to prevent static electricity
from building up?
a. Anti-static mat c. Philips head screwdriver
b. Hex driver d. Wire cutter
____2. Which tool is used to loosen or tighten cross-head screws?
a. Anti-static mat c. Philips head screwdriver
b. Hex driver d. Wire cutter
____3. Which tool is sometimes called a nut driver? It is used to tighten nuts
in the same way that a screwdriver tightens screws?
a. Anti-static mat c. Philips head screwdriver
b. Hex driver d. Wire cutter
____4. Which tool is used to strip and cut wires?
a. Anti-static mat c. Philips head screwdriver
b. Hex driver d. Wire cutter
____5. Which tool is used to retrieve parts from location that are too small for
your hand to fit?
a. Part Retriever c. Cable ties
b. Lint-free Cloth d. Flat head screwdriver
____6. Which tool is used to clean different computer components without
scratching or leaving debris?
a. Part Retriever c. Cable ties
b. Lint-free Cloth d. Flat head screwdriver
28
____ 7. Which tool is used to bundle cables neatly inside and outside of a
computer?
a. Part Retriever c. Cable ties
b. Lint-free Cloth d. Flat head screwdriver
____8. Which tool is used to loosen or tighten slotted screws?
a. Part Retriever c. Cable ties
b. Lint-free Cloth d. Flat head screwdriver
____9. Which tool is used to loosen or tighten screws that have a star-like
depression on the top, a feature that is mainly found on laptop?
a. Anti-static mat c. Philips head screwdriver
b. Torx screwdriver d. Wire cutter
____ 10. Which tool is used to blow away dust and debris from different
computer parts without touching the components?
a. Anti-static mat c. Compressed air
b. Hex driver d. Wire cutter
29
ACTIVITY SHEET 1.4
TOOLS AND TESTS EQUIPMENT
Direction. Fill in the blanks. Write your answers on the space provided.
30
INFORMATION SHEET 1.5
PC SYSTEMS
Learning Objectives:
After reading this Information Sheet, the learner is expected to:
a. Understand the computer systems
b. Configure server manager
c. Appreciate the importance of accomplished forms
A computer system consists of mainly four basic units; namely input unit, storage unit,
central processing unit and output unit.
INPUT•
• Input devices, such as a keyboard or sensor, are used to collect and provide the
computer system with data or instructions. Motion sensor
This unit is used for entering data and programs into the computer system by the user
for processing.
Storage Unit: The storage unit is used for storing data and instructions before and after
processing.
PROCESS•
31
.• A CPU is the computer system’s brain that can transform data from input devices into
useful information or a physical action
.• The CPU can process data really fast but it can’t think for itself. It only does what it is
told to do by following instructions.
Information
• Data becomes information when it is put into context (i.e. given meaning).
• A barcode number is just data on its own. So is the product name, image and price.•
But this data becomes meaningful information when the data is put together.
• When a barcode is scanned, we can find out what item it is, what it looks like and how
much it will cost.
The task of performing operations like arithmetic and logical operations is called
processing. The Central Processing Unit (CPU) takes data and instructions from the
storage unit and makes all sorts of calculations based on the instructions given and the
type of data provided. It is then sent back to the storage unit. CPU includes Arithmetic
logic unit (ALU) and control unit (CU)
OUTPUT•
Output device receives information from the CPU and presents it to the user in the
desired from. The processed data, stored in the memory of the computer is sent to the
output unit, which then converts it into a form that can be understood by the user. The
output is usually produced in one of the two ways – on the display device, or on paper
(hard copy).
An output is when the computer communicates the results of the processed data
.• The data has been transformed into useful information that we can see and use
.• This information is usually shown on a display monitor or paper printout and it should
be easy for us to understand.
32
http://uru.ac.in/uruonlinelibrary/Cloud_Computing/Basics%20of%20Computer.pdf
A computer performs five major operations or functions irrespective of its size and
make. These are
Source: https://www.slideshare.net/corb201/computer-systems-input-process-output
http://jhigh.co.uk/ComputingSG/ComputerSystems/CS_Types.html
33
SELF CHECK 1.5
PC SYSTEMS
a. Input c. Storage
b. Output D. Process
2. What do you call a device that receives information from the CPU and
presents it to the user in the desired from.?
a. Input c. Storage
b. Output D. Process
3. It becomes information when it is put into context (i.e. given meaning)..
a. Process c. Output
b. Server D. Data
4. This unit is used for storing data and instructions before and after processing.
a. Input c. Storage
b. Output D. Process
5. It is the computer system’s brain that can transform data from input devices
into useful information or a physical action.
a. Input c. Monitor
b. Output D. CPU
34
ACTIVITY SHEET 1.5
PC SYSTEMS
35
INFORMATION SHEET 1.6
PC SPECIFICATIONS
Learning Objectives:
After reading this Information Sheet, the learner is expected to:
a. Understand computer specifications
b. Configure server module add-ons
c. Value the importance of server modules and add-ons
36
Sample specification for a certain desktop computers:
Processors Two companies - Intel Inc. and AMD Inc. – are the manufacturers of most
of today’s PC processors and both offer a range that balances price and performance.
Processors are generally defined by their speed, in megahertz (MHz) or in gigahertz
(GHz), and this relates to the number of operations they can perform per second. The
higher the value, the faster the PC will perform and the more expensive it is. More
recent and more powerful processors use a 64 Bit architecture, rather than the previous
32 Bit models.
Memory (RAM)
The main working memory in a computer is called random access memory or RAM. The
processor uses this memory to run programs. RAM is measured in megabytes (MB).
Most modern computers use DDR 2 RAM. A minimum of 2024 MB (2GB) of RAM is
recommended for general purpose PCs. 2048 MB (2GB) of RAM is also sufficient for
PCs running multimedia applications, i.e., those on which digital music, digital video or
high-end graphics are being created/edited.
Storage – The Hard Drive The hard drive is the computer’s primary storage area. It
stores the applications and programs that run on the PC, as well as any work created by
users. From a school’s perspective, the capacity of the hard drive, measured in
gigabytes (GB), is a key criterion and should be given due consideration when
reviewing PC specifications. A hard drive capacity of at least 80GB is recommended for
general purpose PCs. A hard drive capacity of 200GB or more is recommended if
working with multimedia applications where large graphics and digital audio/video files
are being created and stored.
Other Specifications Monitors The older Cathode Ray Tube (CRT) have been
largely replaced by Liquid Crystal Display (LCD) and Light Emitting Diode (LED) flat-
screens. A 15” LCD/LED has the same viewing area as the older 17” CRT. Average
entry-level PCs usually come with a 17” flat-screen and this is adequate for most
general purpose applications. Larger 19” flat-screens are available and may be
appropriate if video editing and advanced graphics work is being carried out. Teachers
of students with special needs may want to consider using larger monitors with their
students.
Optical Drives CD R/W drives are standard on PCs and allow the information on a
compact disc (either data or audio) to be read and written to by the PC. It is defined by
its speed (i.e., 48x or 48 speed). DVD drives can read both CDs and DVDs. Standard
on entry level computers are 48x DVD-ROM/CD_RW drives and allows you to copy
blank CDs. High performance computer use 52x DVD-RWs. Educational software is
37
being developed in both DVD and CD formats, but a DVD can hold over 25 times more
data than a CD.
Graphics and Sound Cards These cards are installed inside a PC and are responsible
for determining the quality of the audio and visuals (graphics and video) output by the
computer. They hold their own memory (in MB), which is why they add to a computer’s
capability. An integrated graphics card with 256MB of memory is recommended for
general purpose PCs. Computers running high-end applications generally require a
separate 256MB graphics card. A sound card generally comes as standard in most PCs
purchased today. If students intend to work extensively with digital music, the school
should consider getting a high-end sound card as this will create greater depth,
complexity and realism of sound.
Speakers and Headphones Most computers come with either built-in or external
speakers. Schools may also consider buying headphones to control sound levels within
a classroom or computer room. Cheap ‘headphone splitters’ can also be purchased —
these enable two sets of headphones to be used per computer.
Network Interface Card (NIC) It is recommended that all PCs be purchased with a
suitable network interface card (NIC). A network card allows a computer to be
connected to a network. A 10/100/1000 Mbps (Megabits per second) card is the
standard network card today. Few school networks currently operate at speeds higher
than 100Mbps.
Operating Systems (OS) PCs are generally purchased with an operating system pre-
installed. It is worth checking that your existing software will still work with the operating
system of any new systems being purchased. It may be possible to choose a particular
operating system and, if so, this may help standardize new machines with existing
school PCs. An operating system (OS) is system software that manages computer
hardware, software resources, and provides common services for computer programs.
Source: https://myshadow.org/computer-specification-hardware
38
SELF CHECK 1.6
PC SPECIFICATIONS
39
information (like documents, music and other data) your
computer can hold.
___________4. These are technical descriptions of the computer's
components and capabilities.
___________5. These are the (2) manufacturers of most of today’s PC
___________6. processors and both offer a range that balances price and
performance.
___________7. These cards are installed inside a PC and are responsible for
___________8. determining the quality of the audio and visuals (graphics
and video) output by the computer.
___________9. This card allows a computer to be connected to a network.
___________10. It is system software that manages computer hardware,
software resources, and provides common services for
computer programs.
Learning Objectives:
After reading this Information Sheet, the learner is expected to:
a. Identify computer operations
b. Perform computer operations
c. Signify the importance of computer operations
40
Hardware is typically directed by the software to execute any command or instruction. A
combination of hardware and software forms a usable computing system,
although other systems exist with only hardware.
a) COMPUTER HARDWARE
Hardware refers to the physical, tangible computer equipment and devices, which
provide support for major functions such as input, processing (internal storage,
computation and control), output, secondary storage (for data and programs), and
communication.
41
A computer system is a set of integrated devices that input, output, process, and store
data and information. Computer systems are currently built around at least one digital
processing device. There are five main hardware components in a computer system:
Input, Processing, Storage, Output and Communication devices.
Computer Software is the languages of the computer. And like the human languages,
there are many different computer languages. Essentially, Computer software can be
divided into three main groups depending on their use and application these are:
Is the software used by the computer to translate inputs from various sources
into a language which a machine can understand. Basically the System software or the
operating system software coordinates the different hardware components of a
computer.
2. Application software
A normal user rarely gets to see the operating system or to work with it. But all of
us are familiar with application software which we must use to interact with computer.
Popular example of application software are the Microsoft office suite which include
word, excel, and PowerPoint. We have use this application extensively. Internet
explorer , Mozilla Firefox is two applications software used to access the internet.
3. Programming Languages;
Programmers use the programming software to develop the programming
languages necessary to run computer software. Compliers, interpreters, linkers and
text editors are some of the basic tools used in programming software.
42
Source: https://sites.google.com/site/fixurpc1974/common/pc-operations
https://en.wikipedia.org/wiki/Computer_hardware
43
4.________________ is a set of integrated devices that input, output, process,
and store data and information.
1. Computer hardware
_________________________________________________________
_________________________________________________________
2. Computer software
_________________________________________________________
_________________________________________________________
3-5 Components of computer systems
_________________________________________________________
_________________________________________________________
_________________________________________________________
_________________________________________________________
6-10 Basic operations of computer
_________________________________________________________
_________________________________________________________
_________________________________________________________
_________________________________________________________
44
INFORMATION SHEET 1.8
ELECTRONIC FAULT FINDINGS
Learning Objectives:
After reading this Information Sheet, the learner is expected to:
b. Identify defects in computer systems and networks
c. Apply the electronic fault finding techniques
d. Appreciate the importance of procedures in electronic fault findings
1. Check that all components are in the correct position and orientation.
2. Check that there are no short circuits (excessively high current drain on the
power supply may indicate shorts). Examine the PCB for solder splashes across
pads/tracks and stray component leads/wires.
3. Carry out some basic electrical tests to ensure power is reaching all parts of the
circuit.
4. Check all components are functioning correctly. Has overheating during soldering
damaged any components? IC's and transistors are particularly susceptible.
5. Remove and test suspect components using appropriate test equipment.
Alternatively, substitute dubious components with tried and tested ones.
6. Make a thorough check of circuit voltages/currents/signals using appropriate test
equipment.
7. Where kits are connected to other equipment check for compatibility problems by
testing on alternative equipment.
Fault finding can be quick and easy or a case of time, effort and perseverance. It may
(and will) be frustrating at times but it really is one of the best teachers, providing you
with a greater knowledge and understanding of electronics.
The most serious random problem is a spontaneous reboot, which can be caused by a
faulty or heavily loaded PSU, bad mains interference, or overheating, particularly of the
CPU. This is often caused by failure of the CPU fan, but this is easy enough to check —
just open up the case and see if the fan is still spinning. If your cooling arrangements
are not broken but simply insufficient (this can happen, particularly in the case of Athlon
45
processors, which generate a lot of heat), you'll need to upgrade your CPU heatsink
and/or fan to bring its top temperature down to a more sensible level.
Power Supplies
If your PC won't boot up, you need to establish how far it's getting before the problem
occurs. If you see messages on the screen then your power supply is probably working
OK. If, on the other hand, no LEDs illuminate on the PC's front panel, and you can't
hear your hard drives or cooling fans spin up, you may have a problem with your mains
supply, or a faulty or dead computer PSU (Power Supply Unit). Faulty power supplies
can also cause random reboots: these can also mean that your power supply is working
properly but is under such a heavy load that occasionally the voltages sag a bit, or even
collapse. This may also occur if the mains voltage ever sags (a brownout), but you
should be able to spot this fairly easily, as your studio lights will probably dim at the
same time.
https://www.soundonsound.com/techniques/detecting-resolving-pc-hardware-faults#top
A well-built power supply of 300 Watts, or larger, capacity fitted with a quiet fan is likely
to keep your PC running far more reliably when you install several hard drives and
soundcards. If you've recently added yet another hard drive and find that when you
switch on, the drive LED lights up but your computer won't boot, it's probably time to fit a
beefier supply, which should ensure that your system becomes stable once more. It
seems generally accepted that a 250 Watt PSU is probably sufficient if you're only
running a single hard drive and 128Mb of RAM, but for most of us a 300 Watt or larger
capacity is far more sensible. This should be perfectly sufficient to power a fast Athlon
or Pentium 4, a couple of hard drives, CD-R/W, DVD, and several parasitically powered
USB devices.
46
One other PSU issue that's of particular interest to technician is fan noise. Although we
all want quiet PCs, it's vital that the cooling fans in the PSU and on the CPU carry on
working properly. If you ever hear any squealing noises, it may mean that one of your
fans is about to fail, and needs replacing. If on the other hand your PC suddenly seems
unusually quiet, don't assume your prayers have been answered — one of your fans
may have failed, and will need replacing immediately before anything expensive
overheats.
Many POST-related problems occur after installing a new CPU, a PCI or AGP
expansion card, or after inserting extra RAM (see Static Precautions box). If your
problem appears after a CPU install, check that the new CPU is correctly fitted in its
socket, check the motherboard jumper settings and the BIOS settings for CPU clock
frequency, multiplier, and front side buss.
With any expansion card, the most important thing to check is that it's seated correctly
in its slot, and that the backplate is firmly screwed down, since this establishes a good
earth connection. Graphics cards tend to be extremely reliable, but if yours isn't securely
bolted into place, you may not be able to boot your PC. One long beep followed by two
short ones normally signifies that the graphics card is not properly seated, faulty, or
missing, while one long followed by three short beeps is similar except that it may also
indicate faulty video RAM.
Continuous beeps indicate that no RAM has been found, although if you've fitted an
extra stick or two, the chances are that the original RAM will still work, in which case
you need to check on the bootup screen that the new stick has been recognized, or by
looking at the Performance page of Control Panel's System applet, which displays the
amount of RAM along with various other parameters. After installing more RAM, it's also
wise to run a DOS-based utility such as GoldMemory, mentioned in SOS November
2001, which will identify any incompatibility between your RAM and motherboard, or an
incorrect RAM setting in your BIOS, and log any memory failure during its continuous
testing of every byte until you stop it.
47
If beep codes suggest that your PC keyboard is faulty, this will nearly always be a
connection problem (try reinserting the lead), although some machines may give an
error if a key is pressed when you boot the PC, so don't lean on it or leave things resting
on top. If you ever spill a drink on your PC keyboard, switch off immediately, disconnect
it, and hold it over a bath or sink until the liquid has drained away. Then rinse it out with
clean water (ideally distilled water), and leave it to dry out thoroughly for a day or two.
Alternatively, with keyboards now starting at £10, it may be easier to replace it.
Cable Issues
Another source of sometimes bizarre hardware faults is internal cabling. For instance, if
the IDE cable connecting your motherboard and hard drive is not inserted correctly,
your drive may not be detected by the BIOS at all. One of the conductors on all IDE
cables will either be coloured red or have writing printing on it, so make sure these
identification marks match up with pin one on your hard drive, and pin one on the
motherboard socket. In the case of 80-way cables, make sure that the correct end
(normally blue) is plugged into the motherboard — it may appear to work the other way
round, but it won't be as reliable.
https://www.soundonsound.com/techniques/
detecting-resolving-pc-hardware-faults#top
Fitting the most appropriate internal leads is important, as is ensuring that they are of
the correct length, and are pushed firmly home. Faster data rates tend to require short,
high-quality cables, so if you're using one of the latest ATA100 or AT133 drives, make
sure you use high-quality 80-way IDE cables to connect them up, and don't exceed the
recommended maximum length of 18 inches unless absolutely necessary. Even better,
use 80-way cables for all drives, regardless of their speed, for greater signal/noise ratio
and therefore reliability, and if you're only connecting one drive to an IDE cable, always
48
do so using the connector at the end of the cable, since using the centre one may cause
problems due to reflections from the unterminated 'stub' at the end.
Another cause of cable problems is tension: a taut cable is more easily disturbed
accidentally when you're inside the PC installing something else, and may result in your
drive not being recognized, or eventually cause intermittent problems. This situation isn't
helped by the fact that IDE cables don't latch, making them easier to pull out by
accident.
Even with the correct cable, if it's not pushed all the way home in its socket at both ends
you can get some peculiar faults, such as high CPU overhead (even when DMA is
properly enabled), and slow sustained transfer rates.
If your PC refuses to boot up when you press the front-panel power switch, don't forget
that most modern designs use low-voltage soft switching via the motherboard, so the
power switch lead may simply have become dislodged. The floppy drive cable can also
be pulled out by accident, as can the various other slim cables connecting front-panel
switches and LEDs. If you find one floating about inside your PC, make sure you
reconnect it the correct way round — many motherboards provide foolproof keyed
connectors, but not all.
Many POST-related problems occur after installing a new CPU, a PCI or AGP
expansion card, or after inserting extra RAM. If your problem appears after a CPU
install, check that the new CPU is correctly fitted in its socket, check the motherboard
jumper settings and the BIOS settings for CPU clock frequency, multiplier, and front
side buss.
With any expansion card, the most important thing to check is that it's seated correctly
in its slot, and that the backplate is firmly screwed down, since this establishes a good
earth connection. Graphics cards tend to be extremely reliable, but if yours isn't securely
bolted into place, you may not be able to boot your PC. One long beep followed by two
49
short ones normally signifies that the graphics card is not properly seated, faulty, or
missing, while one long followed by three short beeps is similar except that it may also
indicate faulty video RAM.
Continuous beeps indicate that no RAM has been found, although if you've fitted an
extra stick or two, the chances are that the original RAM will still work, in which case
you need to check on the bootup screen that the new stick has been recognized, or by
looking at the Performance page of Control Panel's System applet, which displays the
amount of RAM along with various other parameters. After installing more RAM, it's also
wise to run a DOS-based utility such as GoldMemory, mentioned in SOS November
2001, which will identify any incompatibility between your RAM and motherboard, or an
incorrect RAM setting in your BIOS, and log any memory failure during its continuous
testing of every byte until you stop it.
If beep codes suggest that your PC keyboard is faulty, this will nearly always be a
connection problem (try reinserting the lead), although some machines may give an
error if a key is pressed when you boot the PC, so don't lean on it or leave things resting
on top. If you ever spill a drink on your PC keyboard, switch off immediately, disconnect
it, and hold it over a bath or sink until the liquid has drained away. Then rinse it out with
clean water (ideally distilled water), and leave it to dry out thoroughly for a day or two.
Alternatively, with keyboards now starting at £10, it may be easier to replace it.
If the BIOS can boot your PC far enough to enable the graphics card and monitor
screen, it can also provide more meaningful error messages, such as indicating
problems with the motherboard's CMOS memory, floppy and hard drives, keyboard, and
RAM. Occasionally these may be erroneous, and if you power down, wait a few
seconds, and then reboot, the problem may disappear (this has happened to me at odd
times over the years). However, if you have to power up several times to force your PC
to leap into action, this may indicate a failing component, so heed the warning signs and
investigate further.
50
If your drive contains priceless data, and you haven't got a backup, a professional data
recovery company may still be able to get it back for you — but it'll cost. For this reason,
I'm far happier with two drives in my PCs — always make sure the data on your audio
drive is backed up onto a partition on your system drive and you're much safer. Even
better, get your data organized and then copy it onto multiple CD-Rs. Various utilities
such as PowerQuest's Drive Image, and Steinberg's Wavelab 4.0 make this
comparatively easy.
https://www.soundonsound.com/techniques/
detecting-resolving-pc-hardware-faults#top
Regularly using a utility like ScanDisk will find cross-linked files and lost file fragments. If
the Thorough option is enabled, as shown here, it will also check the surfaces of your
hard drives for physical defects. Most musicians run a defragmenter utility like
Microsoft's Disk Defragmenter or Norton's Speed Disk on a fairly routine basis to
optimise performance, but you should also periodically use Microsoft's ScanDisk or
Norton's Disk Doctor, preferably before defragging. These will check your hard drives
for errors in the Partition Table, Boot Record, File Allocation Table (FAT) and Directory
Structure, and will find problems such as cross-linked files where two files both claim to
reference one or more of the same clusters, or lost clusters that are marked 'in use' but
aren't claimed by any file in the FAT.
ScanDisk will normally run automatically when you reboot after a crash or improper
shutdown, but if you run it on demand make sure there are no other programs, utilities,
and particularly virus checkers running in the background, since these could well cause
it to restart several times, or even refuse to finish for the same reason. Musicians are
probably well aware of the potential dangers of background utilities, but another way to
bypass ScanDisk or Defrag restarts is to run them from within Safe Mode, or even by
booting directly into DOS.
Source: https://quasarelectronics.co.uk/fault-finding-guide
51
https://www.soundonsound.com/techniques/detecting-resolving-pc-hardware-faults#top
___1. One long beep followed by two short ones normally signifies that it is not
properly seated, faulty, or missing.
a. Video card c. sound card
b. Modem d. RAM
___2. What does it indicates if continuous beeps has been found?
a. Video card c. No sound card
b. No RAM d. No Modem
52
___3. Regularly using of these will find cross-linked files and lost file fragments.
a. ScanDisk c. Internet
b. RAM d. Video
___4. If this is working, booting your PC will light the front panel-power LED
and let the BIOS perform a Power-On Self-Test, or POST.
a. ScanDisk c. Powersupply
b. RAM d. Video
___5. POST stands for .
a. Power On Stable c. Powersupply On Test
b. Powerful On technique d. Power Self On Test
___6. BIOS stands for .
a. Basic Input Output System c. Beep Internal Out System
b. Beep In Out Scale d. Basic In Out Scale
___7. It is another source of sometimes bizarre hardware faults
a. External parts c. RJ45
b. Internal cabling d. UTP cable
___8. A well-built of these with 300 Watts, or larger, capacity fitted with a
quiet fan is likely to keep your PC running far more reliably when you
install several hard drives and soundcards.
a. External parts c. Power supply
b. CD ROM d. Motherboard
___9. These are similar from motherboard to motherboard, you really need to
refer to the manual to find out what each sequence of beeps signifies.
a. External parts c. Beep codes
b. CD ROM d. Motherboard
___10. It can be quick and easy or a case of time, effort and perseverance in
fixing problems in electronics.
a. External parts c. Fitting
b. Fault finding d. Motherboard
53
INFORMATION SHEET 1.9
Maintenance of Computer System and Networks
Learning Objectives:
After reading this Information Sheet, the learner is expected to:
a. Recognize functional areas of network management.
b. Differentiate functional areas of network management.
c. Appreciate effectiveness of management tools and practices.
Network Management
The ISO network management model's five functional areas are listed below.
1. Fault Management—Detect, isolate, notify, and correct faults encountered in the
network.
2. Configuration Management—Configuration aspects of network devices such as
configuration file management, inventory management, and software management.
3. Performance Management—Monitor and measure various aspects of performance so
that overall performance can be maintained at an acceptable level.
4. Security Management—Provide access to network devices and corporate resources
to authorized individuals.
5. Accounting Management—Usage information of network resources.
Fault Management
The goal of fault management is to detect, log, notify users of, and (to the extent
possible) automatically fix network problems to keep the network running effectively.
54
Because faults can cause downtime or unacceptable network degradation, fault
management is perhaps the most widely implemented of the ISO network management
elements.
Network Management Platforms
A network management platform deployed in the enterprise manages an infrastructure
that consists of multivendor network elements. The platform receives and processes
events from network elements in the network. Events from servers and other critical
resources can also be forwarded to a management platform.
The following commonly available functions are included in a standard management
platform:
a. Network discovery
b. Topology mapping of network elements
c. Event handler
d. Performance data collector and grapher
e. Management data browser
Network management platforms can be viewed as the main console for network
operations in detecting faults in the infrastructure. The ability to detect problems quickly
in any network is critical. Network operations personnel can rely on a graphical network
map to display the operational states of critical network elements such as routers and
switches.
Network management platforms such HP OpenView, Computer Associates Unicenter,
and SUN Solstice can perform a discovery of network devices. Each network device is
represented by a graphical element on the management platform's console. Different
colors on the graphical elements represent the current operational status of network
devices. Network devices can be configured to send notifications, called SNMP traps, to
network management platforms. Upon receiving the notifications, the graphical element
representing the network device changes to a different color depending on the severity
of the notification received. The notification, usually called an event, is placed in a log
file. It is particularly important that the most current Cisco Management Information
Base (MIB) files be loaded on the SNMP platform to ensure that the various alerts from
Cisco devices are interpreted correctly.
Troubleshooting Infrastructure
Trivial File Transfer Protocol (TFTP) and system log (syslog) servers are crucial
components of a troubleshooting infrastructure in network operations. The TFTP server
is used primarily for storing configuration files and software images for network devices.
Routers and switches are capable of sending system log messages to a syslog server.
The messages facilitate the troubleshooting function when problems are encountered.
Occasionally, Cisco support personnel need the syslog messages to perform root cause
analysis.
55
Fault Detection and Notification
The purpose of fault management is to detect, isolate, notify, and correct faults
encountered in the network. Network devices are capable of alerting management
stations when a fault occurs on the systems. An effective fault management system
consists of several subsystems. Fault detection is accomplished when the devices send
SNMP trap messages, SNMP polling, remote monitoring (RMON) thresholds, and
syslog messages. A management system alerts the end user when a fault is reported
and corrective actions can be taken.
Configuration Management
The goal of configuration management is to monitor network and system configuration
information so that the effects on network operation of various versions of hardware and
software elements can be tracked and managed.
Configuration Standards
With an increasing number of network devices deployed, it is critical to be able to
accurately identify the location of a network device. This location information should
provide a detailed description meaningful to those tasked with dispatching resources
when a network problem occurs. To expedite a resolution if a network problem occurs,
make certain to have available contact information of the person or department
responsible for the devices. Contact information should include telephone number and
the name of the person or department.
Naming conventions for network devices, starting from device name to individual
interface, should be planned and implemented as part of the configuration standard. A
well defined naming convention provides personnel with the ability to provide accurate
information when troubleshooting network problems. The naming convention for devices
can use geographical location, building name, floor, and so forth. For the interface
naming convention, it can include the segment to which a port is connected, name of
connecting hub, and so forth. On serial interfaces, it should include actual bandwidth,
local data link connection identifier (DLCI) number (if Frame Relay), destination, and the
circuit ID or information provided by the carrier.
Configuration File Management
When you add new configuration commands on existing network devices needs, you
must verify the commands for integrity before actual implementation takes place. An
improperly configured network device can have a disastrous effect on network
connectivity and performance. Configuration command parameters must be checked to
avoid mismatches or incompatibility issues. It is advisable to schedule a thorough
review of configurations with Cisco engineers on a regular basis.
56
Inventory Management
The discovery function of most network management platforms is intended to provide a
dynamic listing of devices found in the network. Discovery engines such as those
implemented in network management platforms should be utilized.
An inventory database provides detailed configuration information on network devices.
Software Management
The upgrade window to complete device maintenance is fairly limited for some
organizations. In a large network environment with limited resources, it might be
necessary to schedule and automate software upgrades after business hours. The
procedure can be completed either using scripting language such as Expect or an
application written specifically to perform such a task.
Performance Management
Service Level Agreement
A service level agreement (SLA) is a written agreement between a service provider and
their customers on the expected performance level of network services. The SLA
consists of metrics agreed upon between the provider and its customers. The values set
for the metrics must be realistic, meaningful, and measurable for both parties.
Performance Monitoring, Measurement, and Reporting
Different performance metrics at the interface, device, and protocol levels should be
collected on a regular basis using SNMP. The polling engine in a network management
system can be utilized for data collection purposes. Most network management systems
are capable of collecting, storing, and presenting polled data.
Performance Analysis and Tuning
User traffic has increased significantly and has placed a higher demand on network
resources. Network managers typically have a limited view on the types of traffic
running in the network. User and application traffic profiling provides a detailed view of
the traffic in the network. Two technologies, RMON probes and NetFlow, provide the
ability to collect traffic profiles.
netFlow
The Cisco NetFlow feature allows detailed statistics of traffic flows to be collected for
capacity planning, billing, and troubleshooting functions. NetFlow can be configured on
individual interfaces, providing information on traffic passing through those interfaces.
57
The following types of information are part of the detailed traffic statistics:
a. Source and destination IP addresses
b. Input and output interface numbers
c. TCP/UDP source port and destination ports
d. Number of bytes and packets in the flow
e. Source and destination autonomous system numbers
f. IP type of service (ToS)
Security Management
The goal of security management is to control access to network resources according to
local guidelines so that the network cannot be sabotaged (intentionally or
unintentionally). A security management subsystem, for example, can monitor users
logging on to a network resource, refusing access to those who enter inappropriate
access codes. Security management is a very broad subject; therefore this area of the
document only covers security as related to SNMP and basic device access security.
A good security management implementation starts with sound security policies and
procedures in place. It is important to create a platform-specific minimum configuration
standard for all routers and switches that follow industry best practices for security and
performance.
Authentication
Authentication is the process of identifying users, including login and password dialog,
challenge and response, and messaging support. Authentication is the way a user is
identified prior to being allowed access to the router or switch. There is a fundamental
relationship between authentication and authorization. The more authorization privileges
a user receives, the stronger the authentication should be.
Authorization
Authorization provides remote access control, including one-time authorization and
authorization for each service that is requested by the user. On a Cisco router, the
authorization level range for users is 0 to 15 with 0 being the lowest level and 15 the
highest.
Accounting
Accounting allows for the collecting and sending of security information used for billing,
auditing, and reporting, such as user identities, start and stop times, and executed
commands. Accounting enables network managers to track the services that users are
accessing as well as the amount of network resources they are consuming.
Accounting Management
58
Accounting management is the process used to measure network utilization parameters
so that individual or group users on the network can be regulated appropriately for the
purposes of accounting or chargeback. Similar to performance management, the first
step toward appropriate accounting management is to measure the utilization of all
important network resources.
Source: https://www.cisco.com/c/en/us/support/docs/availability/high-availability/15114-
NMS-bestpractice.html#intro
Identification: Choose the letter of the correct answer which best describes each
statement.
A. Security Management
B. Performance Management
C. Fault Management
D. Configuration Management
E. Accounting
1. Control access to network resources according to local guidelines so that the
network cannot be sabotaged.
2. Detect, log, notify users of, and (to the extent possible) automatically fix network
problems to keep the network running effectively.
3. Enables network managers to track the services that users are accessing as well
as the amount of network resources they are consuming.
4. Evaluation of products that will determine if they meet the requirements of
different users.
5. Monitor network and system configuration information so that the effects on
network operation of various versions of hardware and software elements can be
tracked and managed.
59
ACTIVITY SHEET 1.9
Network Management
Direction: On a separate sheet of paper list down one application for each Network
Management Functions.
Network Management Function Application (5 points)
1. Fault Management
2. Configuration Management
3. Performance Management
4. Security Management
5. Accounting
60
REFERENCES:
COMPUTER HARDWARE SERVICING 9 K to 12 – Technology and Livelihood
Education
https://sites.google.com/site/cprorgrams/sem-4/ch--nw/troubleshooting-fundamentals/
hoe-to-isolate-computer-problems
https://www.slideshare.net/celesteddelacruz7/diagnostic-software-tools
https://download.cnet.com/utilities-diagnostic/
https://www.techrepublic.com/blog/windows-and-office/use-the-system-diagnostic-
report-as-a-troubleshooting-aid/
https://edu.gcfglobal.org/en/computerbasics/how-to-use-your-computers-builtinhelp/1/
https://cssnc2site.wordpress.com/maintain-and-repair-computer-systems-and-networks/
https://www.slideshare.net/search/slideshow?
searchfrom=header&q=Software+Configuration+in+computer&ud=any&ft=all&lang=**&s
ort=
https://support.microsoft.com/en-in/help/10741/windows-fix-network-connection-issues
https://study.com/academy/lesson/types-of-personal-protective-equipment.html
https://www.slideshare.net/bijendraprajapati/desktop-pc-specifications?qid=240ee05a-7b32-41e6-
9de0-cfa33699189c&v=&b=&from_search=1
https://www.cisco.com/c/en/us/support/docs/availability/high-availability/15114-NMS-
bestpractice.html#intro
61
62