Lesson3. Conduct Test On The Installed Computer System
Lesson3. Conduct Test On The Installed Computer System
Software Tools
Like hardware tools, there are a variety of software tools that can be used to help technicians
pinpoint and troubleshoot problems. Many of these tools are free and several come with the
Windows operating system.
Disk Management Tools
Software tools help diagnose computer and network problems and determine which
computer device is not functioning correctly. A technician must be able to use a range of
software tools to diagnose problems, maintain hardware, and protect the data stored on a
computer.
You must be able to identify which software to use in different situations. Disk management
tools help detect and correct disk errors, prepare a disk for data storage, and remove
unwanted files.
The following are some disk management tools:
FDISK: A command-line tool that creates and deletes partitions on a hard drive. The
FDISK tool is not available in Windows XP, Vista, or 7. It has been replaced with the
Disk Management tool.
Disk Management Tool: Initializes disks, creates partitions, and formats partitions.
Format: Prepares a hard drive to store information.
ScanDisk or CHKDSK: Checks the integrity of files and folders on a hard drive by
scanning the file system. These tools might also check the disk surface for
physical errors.
Defrag: Optimizes space on a hard drive to allow faster access to programs and
data.
Disk Cleanup: Clears space on a hard drive by searching for files that can be safely
deleted.
System File Checker (SFC): A command-line tool that scans the operating system
critical files and replaces files that are corrupted.
Use the Windows 7 boot disk for troubleshooting and repairing corrupted files. The Windows
7 boot disk repairs Windows system files, restores damaged or lost files, and reinstalls the
operating system.
Test procedures
A test procedure is a set of steps to guide you through what needs to be done to thoroughly
test the installation. It is designed to help you work more effectively and to make sure you
test everything that needs testing.
Test procedures are created in-house and could include these steps:
1. Gathering test information. The first step is to run the tests required by the procedure and
find out what happens. You should record all the results of your tests in a log so that you
know which pass and which fail, thereby requiring further action.
2. Validating the test information. The next step is to check the data you gathered from the
tests to make sure it is correct. This is usually done by running the tests again.
3. Responding to test information. This step is important because you need to be able to
recognize when a test shows problems or is successful. For example, if ping is used to
test a network connection then Request timed out shows the test was not successful.
4. Checking specification. The final step is an important end to testing. You need to check the
specification for the installation to make sure that it has been met. For example, if a user
requested an upgrade to make their display run at 1920 x 1200, then the ICT professional
should check that the graphics card and screen can do this.
External Visual Inspection
The external visual inspection consists of a quick inspection of the exterior of the computer,
the monitor, the keyboard, any peripherals, and cables. While performing the visual
inspection, make any necessary corrections. To perform the external visual inspection,
perform the following steps:
1. Turn off the computer, the monitor, and all peripherals.
2. Verify that all power cables are properly connected to the computer, the monitor and
To observe problem indications during the boot routine, perform the following
steps:
1. If the system is off, turn on all peripherals and the computer.
2. Check the power supply fan.
light up during the boot routine, troubleshoot the diskette drive or hard-disk drive subsystem,
as appropriate.
5. Observe the monitor screen for the Diagnostics menu.
Internal Visual Inspection
NOTICE: Before you proceed with the internal visual inspection described in this section, ensure that
the user has saved all open files and exited all open application programs if possible.
A simple visual inspection of a computers interior hardware can often lead to the source of a
problem, such as a loose expansion card, cable connector, or mounting screw. To perform the
internal visual inspection, perform the following steps:
1. Turn off the system, including any attached peripherals, and disconnect all the AC power
cables from electrical outlets.
CAUTION: Before beginning to work inside the computer, disconnect the power supply from
the power source and the power supply cables from the power supply.
2. Remove the computers right side cover.
CAUTION: The heat sink assembly can get extremely hot during system operations. Be sure
that it has had sufficient time to cool before touching it.
CAUTION: When handling the heat sink assembly, take care to avoid sharp edges on
the heat sink.
3. Verify that the chips, expansion cards, and SEC cartridge and heat sink assembly or
assemblies are fully seated in their sockets or connectors.
4. To ensure that the chips are fully seated in their sockets, press firmly on the top of each
chip.
5. Verify that all jumpers are set correctly.
6. Check all cable connectors inside the computer to verify that they are firmly attached to
their appropriate connectors.
7. Reinstall the computer cover.
8. Reconnect the computer and any attached peripherals to their power sources, and turn
them on.
1. Defrag: Optimizes space on a hard drive to allow faster access to programs and data.
2. System error messages these messages can indicate problems or provide status
information.
3. For a PS/2-compatible mouse, the keyboard and mouse interface cable connectors are
identical except for their labels.
4. Validating the test information. The next step is to check the data you gathered from
the tests to make sure it is correct. This is usually done by running the tests again.
5. Disk Management Tool: Initializes disks, creates partitions, and formats partitions.
6. Format: Prepares a hard drive to store information.
7. Disk Cleanup: Clears space on a hard drive by searching for files that can be safely
deleted
8. A loopback adapter, also called a loopback plug, tests the basic functionality of
computer ports. The adapter is specific to the port that you want to test.
9. A test procedure is a set of steps to guide you through what needs to be done to
thoroughly test the installation. It is designed to help you work more effectively and to
make sure you test everything that needs testing.
10.Beep codes A beep code is a series of beeps that indicates an error condition.
Internet Protocols
A protocol is a set of rules. A letter sent through the postal system also uses protocols. Part
of the protocol specifies where on the envelope the delivery address needs to be written. If
the delivery address is written in the wrong place, the letter cannot be delivered. Internet
protocol works in a similar way. Internet protocols are sets of rules governing communication
within and between computers on a network. Protocol specifications define the format of the
messages to be exchanged. Timing is crucial to network operation. Protocols require
messages to arrive within a certain amount of time so that computers do not wait indefinitely
for messages that may have been lost. Therefore, systems maintain one or more times
during transmission of data. Protocols also initiate alternative actions if the network does not
meet the timing rules. Many protocols consist of a suite of other protocols that are stacked in
layers. These layers depend on the operation of the other layers in the suite to function
properly.
The main functions of protocols are:
Identifying errors
To understand how networks and the Internet work, you must be familiar with the commonly
used protocols. These protocols are used to browse the web, send and receive e-mail, and
transfer data files. You will encounter other protocols as your experience in IT grows, but they
are not used as often as the common protocols described here:
HTTP: Hypertext Transfer Protocol governs how files such as text, graphics, sound, and
video are exchanged on the World Wide Web (WWW). The Internet Engineering
Task Force (IETF) developed the standards for HTTP.
FTP: File Transfer Protocol provides services for file transfer and manipulation. FTP
allows multiple simultaneous connections to remote file systems.
POP3: Post Office Protocol is used to download e-mail from a remote mail server.
IMAP: Internet Message Access Protocol is also used to download e-mail from a remote
mail server.
SMTP: Simple Mail Transfer Protocol is used to send e-mail to a remote e-mail server.
The more you understand about each of these protocols, the more you will understand
how networks and the Internet work.
IP Addressing
An IP address is a number that is used to identify a device on the network. Each device
on a network must have a unique IP address to communicate with other network devices.
Network devices are those that move data across the network, including hubs, switches, and
routers. On a LAN, each host (device that sends or receives information on the network) and
network device must have an IP address within the same network to be able to communicate
with each other.
A persons name and fingerprints usually do not change. They provide a label or
address for the persons physical aspectthe body. A persons mailing address, on the other
hand, relates to where the person lives or picks up mail. This address can change. On a host,
the Media Access Control
(MAC) address is assigned to the host Network Interface Card (NIC) and is known as
the physical address. The physical address remains the same regardless of where the host is
placed on the network in the same way that fingerprints remain with someone regardless of
where he or she goes. An IP address consists of a series of 32 binary bits (1s and 0s). It is
very difficult for humans to read a binary IP address. For this reason, the 32 bits are grouped
into four 8-bit bytes called octets. An IP address, even in this grouped format, is hard for
humans to read, write, and remember. Therefore, each octet is presented as its decimal
value, separated by a decimal point or period. This format is called dotted-decimal notation.
When a host is configured with an IP address, it is entered as a dotted-decimal number, such
as 192.168.1.5.
Imagine if you had to enter the 32-bit binary equivalent of this:
11000000101010000000000100000101. If you mistyped just 1 bit, the address
would be different, and the host may not be able to communicate on the
network. The logical 32-bit IP address is hierarchical and is composed of two
parts. The first part identifies the network, and the second part identifies a host
on that network. Both parts are required in an IP address. For example, if a host
has an IP address of 192.168.18.57, the first three octets, 192.168.18, identify
the network portion of the address, and the last octet, 57, identifies the host.
This is called hierarchical addressing, because the network portion indicates the
network on which each unique host address is located. Routers only need to
know how to reach each network, not the location of each individual host.
IP Classes
Class A
Purpose
Used for large networks, implemented by large companies and some
Class B
Class C
Class D
Class E
countries
Used for medium-sized networks, implemented by universities
Used for small networks, implemented by ISPs for customer
subscriptions
Used for special use for multicasting
Used for experimental testing
Subnet Mask
The subnet mask indicates the network portion of an IP address. Like the IP address,
the subnet mask is a dotted-decimal number. Usually all hosts within a LAN use the same
subnet mask. Table 3 shows default subnet masks for usable IP addresses that are mapped to
the first three classes of IP addresses:
255.0.0.0: Class A, which indicates that the first octet of the IP address is the network
portion
255.255.0.0: Class B, which indicates that the first two octets of the IP address are the
network portion
255.255.255.0: Class C, which indicates that the first three octets of the IP address are
the network portion
Class A
Octet
Network
1
Class B
Octet
Network
1
Class C
Octet
Network
1
Host
2
Host
Host
4
6. Type the IP address for your computer. Enter the appropriate IP Address in the IP address
section.
7. Type a subnet mask. The value used on a local network is commonly 255.255.255.0, but it
can be different, such as 255.255.255.127.
8. Type the default gateway address. The default gateway is the router, so type the routers
address. Figure 54 shows an example of assigning an IP Address, Subnet mask and default
gateway.
IP address
Subnet mask
Default gateway
The DHCP server receives a request from a host. The server then selects IP address
information from a set of predefined addresses that are stored in a database. After the IP
address information is selected, the DHCP server offers these values to the requesting host
on the network. If the host accepts the offer, the DHCP server leases the IP address for a
specific period of time.
Using a DHCP server simplifies the administration of a network because the software keeps
track of IP addresses. Automatically configuring TCP/IP also reduces the possibility of
assigning duplicate or invalid IP addresses. Before a computer on the network can take
advantage of the DHCP server services, the computer must be able to identify the server on
the local network. You can configure a computer to accept an IP address from a DHCP server
by clicking the Obtain an IP address automatically option in the NIC configuration window, as
shown in Figure 56.
If your computer cannot communicate with the DHCP server to obtain an IP address, the
Windows operating system automatically assigns a private IP address. If your computer is
Ping
The ping is a Command Prompt command used to test the ability of the source computer to
reach a specified destination computer. The ping command is usually used as a simple way
to verify that a computer can communicate over the network with another computer or
network device. The ping command operates by sending Internet Control Message Protocol
(ICMP) Echo Request messages to the destination computer and waiting for a response. How
many of those responses are returned, and how long it takes for them to return, are the two
major pieces of information that the ping command provides.
Table 8. Ping Command Syntax
Syntax
Description
-t
Using this option will ping the target until you force it to stop using Ctrl-C.
resolve,
-n count
This option sets the number of ICMP Echo Request messages to send. If you
execute the ping command without this option, four requests will be sent.
-l size
Use this option to set the size, in bytes, of the echo request packet from 32 to
65,527. The ping command will send a 32 byte echo request if you do not use
the -l option.
-f
Use this ping command option to prevent ICMP Echo Requests from being
fragmented by routers between you and the target. The -f option is most often
used to troubleshoot Path Maximum Transmission Unit (PMTU) issues.
-i TTL
This option sets the Time to Live (TTL) value, the maximum of which is 255. TOS
This option allows you to set a Type of Service (TOS) value. Beginning in
Windows 7, this option no longer functions but still exists for compatibility
reasons.
-r count
Use this ping command option to specify the number of hops between the
computer and the target computer or device that you would like to be recorded
and displayed. The maximum value for count is 9 so usethe tracert command
instead. If you are interested in viewing all hops between two devices.
-s count
Use this option to report the time, in Internet Timestamp format, that each echo
request is received and echo reply is sent. The maximum value for count is 4
which means that only the first four hops can be time stamped.
-w timeout
Specifying a timeout value when executing the ping command adjusts the
amount of time, in milliseconds, that ping waits for each reply. If you do not use
the -w option, the default timeout value is used which is 4000, or 4 seconds.
-R
This option tells the ping command to trace the round trip path.
-S srcaddr
-4
This forces the ping command to use IPv4 only but is only necessary if target is
a hostname and not an IP address.
-6
This forces the ping command to use IPv6 only but as with the -4 option, is only
necessary when pinging a hostname.
target
/?
Use the help switch with the ping command to show detailed help about the
command's several options.
you see reflects that networks do not always respond identically. Differing amounts of traffic
on the communication lines or differing loads on the server are common causes. You will see
very different response times depending on the access equipment you use. Routing hop
count The part of the replies that says TTL=50 tells you about the route the message took
from one point to another. The acronym TTL stands for Time to Live, which is a measure of
how many rerouting from one point to another the packet has to go through before IP
declares it undeliverable. The number following TTL (called the hop count) is a number that
usually starts at 255 and counts down by one every time the message gets rerouted through
an intermediary computer.
I.
Protocols
Directions: In this worksheet, write the name of the protocol and the default port(s) for each
protocol definition in the table. Do this on your notebook.
Be prepared to discuss your answers in front of the class.
Subnet Mask
255.0.0.0
IP Address Class
A
To deepen your understanding with regard to the Internet Protocols, IP Address and
subneting, utilize the Internet and the website www.professormesser.com, watch and learn
from the video presentations. Use the URLs below:
1. http://www.professormesser.com/n10-005/binary-math-2/
2. http://www.professormesser.com/n10-005/ip-classes/
3. http://www.professormesser.com/n10-005/networkingprotocols/
4. http://www.professormesser.com/n10-005/subnetting/