Csms (Computer System Management Planning and Maintenance)
Csms (Computer System Management Planning and Maintenance)
SYSTEM
MANAGEMENT
PLANNING
BY JAJATI MALLICK
DEPART MENT OF COMPUTER SCIENCE & ENGINEERING
ASSOCIATE PROFESSOR
PIET & PSET, ROURKELA
And
Rs 100.00
COMPUTER SYSTEM MANAGEMENT PLANNING & MAINTENACE
ACKNOWLEDGEMENT
I express my profound gratitude and sincere thanks to Prof. S. BAHERA and Prof. A.K. Dash for their valuable
suggestions, guidance, constant encouragement for writing this book. It has been a great learning process for me. I
thankful to Purushottam School of Engineering & Technology for all the necessary help I get during this book
writing. Last but not the least, I wish to gratefully acknowledge the moral support I receive from my students. This
book is particularly meant and design for diploma sixth semester Computer science and Engineering students in the
Odisha state.
mallick.jajati@gmail.com
Mob No: 9937577500
Professor Jajati Mallick , Dept. CSE, PSET, manadiakudar, Rourkela 2017 Page 2
COMPUTER SYSTEM MANAGEMENT PLANNING & MAINTENACE
CONTENTS
Preface
1.0 COMPUTER SYSTEM MANAGEMENT PLANNING.. 01
1.1 Need of Management in Computer Centers... 05
1.2 Types of Job Carried Out in Computers in an Organization.. 05
1.3 Duties and Responsibilities of personnel involved 06
1.4 Position of Different Levels 07
1.5 Need of training staff.. 08
1.6 Computer manufacture and installations in India... 09
1.7 Major vendors in computer hardware and software... 09
2.0 Selection of Computer System... 10
2.1 Selection and evaluation of appropriate configuration for different levels of 10
Industries
2.2 Different Types of Industries and Their Computer requirements... 10
2.3 Selection and evaluation of appropriate configuration for different levels of 11
Industries
3.0 SITE PREPARATION & INSTALLATION. 12
3.1 Plan for Computer Room layout based on Size.. 12
3.2 Layout Factors and their effect... 13
3.2.1 Computer Centre Designs: Physical Computer Centre Setup 14
3.3 Power Conditioning Equipment. 15
3.3.1 CVT (Constant Voltage Transformer) 15
3.3.2 Uninterruptible power supply (UPS) 17
3.3.3 Isolation Circuits 20
3.4 Interpretation of the Installation and Wiring Diagram... 21
3.5 Steps for actual installation as per the manufacturers Specified procedure.. 23
4.0 COMPONENTS INSIDE THE COMPUTERS (PC) & THEIR 26
INTERCONNECTION
4.1 Introduction. 26
4.2 Hardware-BIOS interaction 27
4.3 Interconnection between subsystems of PC 29
4.4 System Unit. 31
4.4.1 Mother board... 29
4.4.2 SMPS (Switched Mode Power Supply).. 32
Professor Jajati Mallick , Dept. CSE, PSET, manadiakudar, Rourkela 2017 Page 3
COMPUTER SYSTEM MANAGEMENT PLANNING & MAINTENACE
Professor Jajati Mallick , Dept. CSE, PSET, manadiakudar, Rourkela 2017 Page 4
COMPUTER SYSTEM MANAGEMENT PLANNING & MAINTENACE
Normally, all computer centers are responsible for virtually similar tasks in all organizations,
however, their focuses may not be the same.
The computer center, one of the support departments in the college, offer a wide range of
services to satisfy the general computational and information processing needs of the
educational, research and administrative programs. Services Provided by Computer Center are
Professor Jajati Mallick , Dept. CSE, PSET, manadiakudar, Rourkela 2017 Page 5
COMPUTER SYSTEM MANAGEMENT PLANNING & MAINTENACE
In the department various staff with different computer skills is being employed. The data
processing manager is the head of the department under which you have the computer analyst,
programmer, operation manager, etc. There is probably no standard structure for data processing
department. Precise responsibilities and reporting procedures vary. Figure 1 and 2 show some
alternatives.
Professor Jajati Mallick , Dept. CSE, PSET, manadiakudar, Rourkela 2017 Page 6
COMPUTER SYSTEM MANAGEMENT PLANNING & MAINTENACE
(i) Computer Center must announce the service level policies on:
- Operating Labor
- Uptime
- Time to repair
- Response time
(ii) Objectives are to collect data about the usage & performance. Evaluate whether the
performance is acceptable. If not, find out the problems and change the configurations, change
the system software, recognize the disks, etc.
(iii) Prepare reports to the top management
(iv) System programmer is in charge of these tasks
A steeling committee must be appointed for a fairly high- level control of the planning. The
compositions are: the must senior executive of the companys the chairman, the manager of the
computer department, a representative from the computer manufacturer, and other representative
from the various departments within the company.
Professor Jajati Mallick , Dept. CSE, PSET, manadiakudar, Rourkela 2017 Page 7
COMPUTER SYSTEM MANAGEMENT PLANNING & MAINTENACE
- Due to the rapid growth of educational institutions there is an endemic shortage of good
teachers. A big increase in the output of Masters and PhDs, particularly in Computer Science, is
required.
- A large number of faculty positions in the Universities and engineering colleges and even in
the IITs are vacant due to the dearth of persons interested in becoming
academics. Encouragement in terms of good working conditions and emoluments are needed to
attract competent faculty
- R and D spending of the Indian software services companies is relatively low. To go up the
value chain IT companies have to innovate and invest in focused research. The reduction of cost
of communication gave birth to the offshore software development model. The recent
emergence of the Computing Cloud should lead to the next step, namely, providing Software
as a Service (SaaS). The rich experience gained in the international market of offering software
services should be leveraged to create world class service products from India on the Cloud
- Product companies need, besides an innovative product, huge investment, marketing, and the
willingness to take risks. A company which was initially successful in selling FORTRAN
compilers in a protected market in India went bankrupt as soon as imports were allowed as the
imported product which had a worldwide market sold compilers at less than half the price of the
local product. One of the few notable successes as a 61 product company in India is TALLY
which produced accounting software in 1980. It succeeded as the software was designed keeping
in view the accounting practices in India. It was affordable to a large number of small and
medium enterprises. This provided the volume essential to amortize the development cost of the
product. TALLY was able to continually improve its product by getting feedback from its local
users. No foreign competitor understood the nuances of the local accounting practices or could
match the price. So training of staff must require for running the TALLY software.
The committee should be given specifies terms of reference. There are obviously two choices
open to management. They can recruit experience personnel and thus reap the benefit of that
experience or they can re-train existing staff in computer techniques. In doing this, a number of
factors used to be considered or the advantages and disadvantages of each option.
(a) Recruitment of Experience Personnel Advantages
(i) Benefit of the experience.
(ii) Little or no computer training required.
Disadvantages:
(i) Demand exceeds supply, therefore high salary levels.
(ii) No knowledge of company perhaps even industry.
(iii) No company loyalties.
(iv) Problem of interaction with existing staff.
(v) Gamble of recruiting an unknown person.
Professor Jajati Mallick , Dept. CSE, PSET, manadiakudar, Rourkela 2017 Page 8
COMPUTER SYSTEM MANAGEMENT PLANNING & MAINTENACE
There was no government policy on computers. As part of the five year plans higher technical
education was promoted and five Indian Institutes of Technology and 13 Regional Engineering
Colleges, one in each state, were established. The Directorate General of Technical Development
and the Department of Defence Supplies controlled the area of computers. Foreign companies
were permitted to manufacture and sell computers provided foreign exchange was not required.
Computers were not considered a priority area that deserved foreign exchange outflow. IBM of
the USA and the British Tabulating Machines (which was later named International Computers
Ltd., ICL) were already selling mechanical unit record equipment, namely, key punches,
verifiers, sorters, tabulators and accounting machines to a large number of companies, the Indian
Railways, and statistics departments.
Before a computer is received at the users premises the data processing manager must give
many man- hours of thought to the preliminaries and must draw up detailed plans for the three
major phases,
- Pre installation
- Installation and
- Productive running
Beside, there are also
(i) Detailed planning (sitting, systems and programming, staffing etc) and
(ii) Policy planning (The definition of objectives, budgeting and resources allocation)
All companys personnel must be involved for successful installation of computer system.
Professor Jajati Mallick , Dept. CSE, PSET, manadiakudar, Rourkela 2017 Page 9
COMPUTER SYSTEM MANAGEMENT PLANNING & MAINTENACE
Professor Jajati Mallick , Dept. CSE, PSET, manadiakudar, Rourkela 2017 Page 10
COMPUTER SYSTEM MANAGEMENT PLANNING & MAINTENACE
software, call centres etc. The call centres operate 24 x 7 for worldwide customers and require
language proficiency mostly in English and some European languages. Business Process
Outsourcing (BPO) is primarily performing the backoffice work of a number of organizations,
the largest segment being banks and insurance companies. The backoffice work was typically
accounts receivable, payroll processing, account reconciliation, inventory management, and
similar jobs. American Express was the first organization to start BPO work in India in 1994
followed by GE Capital International Services in 1997 [101]. The success of these pioneers
induced a large member of Indian companies to start BPO Centres for foreign clients in SEZs as
the profit earned at these locations was tax exempt. The cost of starting a BPO was low as the
cost of computer hardware as well as that of communication fell rapidly. The only requirement
was trainable human resources with good knowledge of English (which was available in
reasonable numbers) and identification of overseas clients. BPOs were established not only by
Indian companies performing tasks for offshore clients but also by many British and American
companies who shifted their backoffice data processing to India as they could get better
quality employees and infrastructure at a lower cost. The falling cost of communication
immensely helped the expansion of BPOs.
2.3 Selection and evaluation of appropriate configuration for different levels of Industries
A generic evaluation and selection methodology has been formulated to meet the specific
configuration for different levels of industries
(i). Identification of possible vendors and manufacturers.
(ii). Primary elimination of irrelevant candidates.
(iii). Determination of mandatory requirements.
(iv). Examination of vendors' compliance with mandatory requirements.
(v). Setting quantitative and qualitative criteria and respective weighing scale.
(vi). Writing the RFP to be addressed to selected vendors.
(vii). Receiving, comparing and analyzing bids.
(ix). Concluding final list of vendors.
(x). Performance of hardware and software benchmarks.
(xi). Drawing final conclusions and selection of best computer family.
To evaluate vendor proposals, review proposals on the basis of such factors as pricing, fit of
proposed equipment to specific needs, future growth potential, vendor qualifications, equipment
maintenance, installation, assistance and delivery, etc. Here suggest the direction of rating
analysis might take:
Professor Jajati Mallick , Dept. CSE, PSET, manadiakudar, Rourkela 2017 Page 11
COMPUTER SYSTEM MANAGEMENT PLANNING & MAINTENACE
-3
Professor Jajati Mallick , Dept. CSE, PSET, manadiakudar, Rourkela 2017 Page 12
COMPUTER SYSTEM MANAGEMENT PLANNING & MAINTENACE
The operator should be near to the input and output units which are most in use e.g. card or tape
reader, printer, and tape or disc unit. The room must have air condition used for dust filtration,
temperature control and humidity control.
Professor Jajati Mallick , Dept. CSE, PSET, manadiakudar, Rourkela 2017 Page 13
COMPUTER SYSTEM MANAGEMENT PLANNING & MAINTENACE
stepped up because of the activities of looters. Security attention should be given to the
computer hardwares because of their small sizes; if the physical security is slack valuable and
costly component of the system might be lost.
c) Dust: It is almost always advisable to provide dust cover on computer equipment when not in
use, and in some areas special dust filters may be needed to prevent dust penetrating the casing.
d) Heat: Because of the heat been produced by the computer, full air conditioned office is highly
imperative. It is advisable to buy portable air condition unit or install cooling fan in micro
itself.
e) Power Supply: Computers can not function without electricity. Electric generators must be
provided at the centre incase of the public power supply failure. In addition, the generator
should be supported with power stabilizer and uninterruptible power supply (UPS). Power
stabilizer protect the computer the harmful effects of fluctuations while UPS maintain the
continuity of power supply in the gap between the switch over public supply to in- house
generator or vise versa.
f) Humidity: An unusually assemble of humidity can also be a problem, leading to corrosion of
electric contact; it may be advisable to use non- corrodible plugs and socket or to use a contact
less keyboard for example.
g) Accessories: It is essential to have a supply of computer accessories and part of a micro and
all peripheral equipments.
h) Workshop: Basic maintenance facilities will be needed. It is not necessary to be an electronic
engineer to do routine maintenance such as disc head alignment, to change board in the
computer, or to run the diagnostics programs which will at least help to locate a fault.
i) Communication Facilities: These facilities must be provided to provide a link between the
main computer centre and its terminals.
j) Space Requirement: From 400sq. ft. to several hundred thousand sq. ft; length-to-width ratio
should be approximately 2:3; no long, narrow rooms.
k) Floor loading: should be sufficient, preferably with a sound-absorbent and antistatic
covering.
h) Workshop: Basic maintenance facilities will be needed. It is not necessary to be an electronic
engineer to do routine maintenance such as disc head alignment, to change board in the
computer, or to run the diagnostics programs which will at least help to locate a fault.
i) Communication Facilities: These facilities must be provided to provide a link between the
main computer centre and its terminals.
j) Space Requirement: From 400sq. ft. to several hundred thousand sq. ft; length-to-width ratio
should be approximately 2:3; no long, narrow rooms.
k) Floor loading: should be sufficient, preferably with a sound-absorbent and antistatic
covering.
3.2.1 Computer Centre Designs: Physical Computer Centre Setup
1. Site Selection
2. Designing office and rooms
3. Designing the whole centre
4. Detailing the facilities
. Raised floor: let the wind blow under the floor
. False ceiling
Air conditioner
Smoke and heat detectors
Rooms to be designed
Professor Jajati Mallick , Dept. CSE, PSET, manadiakudar, Rourkela 2017 Page 14
COMPUTER SYSTEM MANAGEMENT PLANNING & MAINTENACE
Machine room
Operator working area
Storage for paper, tapes, disks and outputs
Customer engineer working area
Technician area
System development areas: for system analysts and programmers
Library: for storing books, journals and software
Conference and meeting rooms
Training rooms
Director rooms
Secretary rooms
Operator and guest areas
Toilet
Rest rooms
Areas for storing power units and air conditioners: such areas are needed to be designed so
that there will be no harm in case of power supply shortage.
Separation into air-conditioned and non air-conditioned areas
Floor preparation for equipment installation in the air condition areas
Quiet zone in personnel areas (management offices, system support, operations scheduling,
visiting programmers, library, conference room, coffee room).
Solid and soundproof walls (over 40 dB in passage ways to separate air conditioned from non
air-conditioned and noisy from quiet areas)
Extensive use of moveable walls to allow for ongoing adjustments to technical and task-
related developments
Important features of a power supply to consider when purchasing it are its form factor,
wattage capacity, number and type of connectors it provides, fan size, support for dual video
cards, and warranty. To decide on the wattage capacity of a power supply, add up the wattage
requirements for all components in a system and then increase that total by about 30 percent.
. False flooring: A raised floor (also raised flooring, access floor(ing), or raised access computer
floor) provides an elevated structural floor above a solid substrate (often a concrete slab) to
create a hidden void for the passage of mechanical and electrical services.
Professor Jajati Mallick , Dept. CSE, PSET, manadiakudar, Rourkela 2017 Page 15
COMPUTER SYSTEM MANAGEMENT PLANNING & MAINTENACE
change of voltage across the primary there is a corresponding change in the secondary voltage
depending upon the ratio of the turns on the two windings. However, in a CVT the primary and
secondary windings are wound separately from each other, as illustrated in figure. To set up field
in between the coils, a separate shunt path is provided between the two windings but an airgap is
formed in the shunt path. A capacitor is connected across suitable tappings of the secondary
winding. The constructional details of a CVT are shown in the figure.
Sophisticated computer systems sometimes use diesel engine driven generators for backup in
case of mains failure. Where our CVTs are used for power conditioning in the normal mains
mode it is desirable to take advantage of the CVT performance when using the generator. These
notes provide some guidance on the potential problems which can be met together with
solutions.
Neutral
Some generators do not refer the low side of the output to earth. This MUST be tied down to
avoid damage to any of our larger catalogue units which have double primary shields. Care must
also be taken that the generator neutral is not connected to the CVT output low.
Frequency
All ferroresonant devices are frequency sensitive. The generator must run close to 50 Hz for the
unit to operate correctly. Unfortunately the speed/output voltage curve for the generator goes the
same way as the CVT so speed should be adjusted at actual running load. Short term off-
frequency operation will not damage the CVT.
Phase
The output from the CVT will be out of phase with the input in cases where the generator
supplies other equipment directly some care is needed if a phase sensitive triac firing circuit is
installed.
Professor Jajati Mallick , Dept. CSE, PSET, manadiakudar, Rourkela 2017 Page 16
COMPUTER SYSTEM MANAGEMENT PLANNING & MAINTENACE
Safety
Unless phasing circuits are fitted all circuits should use 'break before make contactors and
enforced supply separation. Some thought needs to be given to the Regulations regarding out of
phase supplies in the same area.
The reason we use a CVT and not a voltage stabilizer for computer applications is that in the
voltage stabilizer relays are present and when these relays operate (switch), the output voltage
may be interrupted for a short time. Such a transient may not be desirable for computers which
may cause the computer to reboot. Also, the CVT provides a clean spike-free output voltage. The
voltage regulation possible in a CVT also is good. The input voltage ranges 170 to 260 V and
output regulation is 230 2 % at no load to full-load. Distortion-approximately 5% under full-
load conditions. Rating of 50, 150, 250, 350, 500, 750, 1000, 2000 VA.
When electrical utility power fails or drops to an unacceptable level, Uninterruptible Power
Systems (UPS) are key in saving and protecting valuable computer data. UPS equipment
Professor Jajati Mallick , Dept. CSE, PSET, manadiakudar, Rourkela 2017 Page 17
COMPUTER SYSTEM MANAGEMENT PLANNING & MAINTENACE
provides power conditioning, power regulation and, in case of power outages, provides the
crucial backup power needed for an orderly shutdown of computer processes and files. UPS are
also used for emergency power supplies for Hospitals, data centers, municipalities, industrial and
commercial centers to supply power in case of power failure from main supply authority.
All UPS include core circuitry that manipulates electricity, converting it from the AC power
produced by the utility company to DC power stored in the battery, and back again for use by
your equipment via an inverter. The exact type, nature, size and quality of this circuitry depend
on the type of UPS, and more specifically the make and model you have chosen. Most modern
UPS are microprocessor-controlled. There is actually a small computer embedded within the
UPS itself that controls the key functions of the UPS. This includes detecting AC power failures,
handling switching between power sources, monitoring the status of the battery, controlling the
status indicators and so on. These UPS are available for different Power output range such as:
Standby UPS are usually available in a size range of up to about 1000 VA. The Line-interactive UPS
isan improved design that is commonly used in units for home and business use, available in sizes up
to 3,000 VA or so. It is superior to the standby UPS, but it stillhas a transfer time like standby UPS.
Online UPS are typically used only for large servers, and for backing up multiple pieces of
equipment in data centers. They are available in sizes from about 5,000 VA up to hundreds of
thousands of VA and even larger. Ferro resonant standby UPS are usually available in a size range of
up to about 15,000 VA, making them suitable.
Professor Jajati Mallick , Dept. CSE, PSET, manadiakudar, Rourkela 2017 Page 18
COMPUTER SYSTEM MANAGEMENT PLANNING & MAINTENACE
UPS
The inverter re-creates steady AC power to run the IT equipment. When power fails the batteries
drive the inverter, which continues to run the information technology (IT) load. When power is
restored, either from the utility or a generator, the rectifier delivers direct current (DC) to the
inverter and simultaneously recharges the batteries. The inverter runs full time. Utility input is
completely isolated from the output, and bypass is only used for maintenance safety or if there's
an internal electronics failure. Since there is no break in the power delivered to the IT equipment,
vacuum fault interrupter (VFI) is generally considered the most robust form of UPS. Most
systems synchronize the output frequency with the input, but that's not necessary, so it still
qualifies as frequency independent. Every power conversion incurs a loss, so the wasted energy
has historically been considered the price of ultimate reliability. The newest VFI systems claim
better than 96% efficiency at nearly all loads.
The offline/standby UPS (SPS) offers only the most basic features, providing surge protection
and battery backup. The protected equipment is normally connected directly to incoming utility
power. When the incoming voltage falls below or rises above a predetermined level the SPS
turns on its internal DC-AC inverter circuitry, which is powered from an internal storage battery.
The UPS then mechanically switches the connected equipment on to its DC-AC inverter output.
The switchover time can be as long as 25 milliseconds depending on the amount of time it takes
the standby UPS to detect the lost utility voltage. The UPS will be designed to power certain
equipment, such as a personal computer, without any objectionable dip or brownout to that
device.
Professor Jajati Mallick , Dept. CSE, PSET, manadiakudar, Rourkela 2017 Page 19
COMPUTER SYSTEM MANAGEMENT PLANNING & MAINTENACE
Professor Jajati Mallick , Dept. CSE, PSET, manadiakudar, Rourkela 2017 Page 20
COMPUTER SYSTEM MANAGEMENT PLANNING & MAINTENACE
Professor Jajati Mallick , Dept. CSE, PSET, manadiakudar, Rourkela 2017 Page 21
COMPUTER SYSTEM MANAGEMENT PLANNING & MAINTENACE
The following tools might not be essential, but they are very convenient:
- Cans of compressed air (see Figure 1-39), small portable compressor, or antistatic
vacuum cleaner to clean dust from inside a computer case Cleaning solutions and pads
such as contact cleaner, monitor wipes, and cleaning solutions for CDs, DVDs, tapes, and
drives
- Multimeter to check cables and the power supply output
- Power supply tester
- Needle-nose pliers for removing jumpers and for holding objects (especially those pesky
nuts on cable connectors) in place while you screw them in
- Cable ties to tie cables up and out of the way inside a computer case
- Flashlight to see inside the computer case
- AC outlet ground tester
- Network cable tester
- Loopback plugs to test ports
- Small cups or bags to help keep screws organized as you work
- Antistatic bags (a type of Faraday cage) to store unused parts
- Chip extractor to remove chips (To pry up the chip, a simple screwdriver is usually more
effective, however.)
- Pen and paper for taking notes
- POST diagnostic cards
When building a new system, you can purchase a computer case with the power supply already
installed or you can purchase a power supply separate from the case. Important features of a
power supply to consider when purchasing it are its form factor, wattage capacity, number and
type of connectors it provides, fan size, support for dual video cards, and warranty. To decide on
the wattage capacity of a power supply, add up the wattage requirements for all components in a
system and then increase that total by about 30 percent.
1. Unpack the monitor and computer case from the box. Remove any plastic covering or
protective tape. Place the monitor and computer case on a desk or work area. Be sure to
place your computer case in an area that is well ventilated and has good air flow. This
will help to prevent the computer from overheating.
2. Locate the monitor cable.
3. Connect one end of the cable to the monitor port on the back of the computer case and
the other end to the monitor.
4. Unpack the keyboard and determine whether it uses a USB (rectangular) connector or a
PS/2 (round) connector. If it uses a USB connector, plug it into any of the USB ports on
the back of the computer. If it uses a PS/2 connector, plug it into the purple keyboard port
on the back of the computer.
5. Unpack the mouse and determine whether it uses a USB or PS/2 connector. If it uses a
USB connector, plug it into any of the USB ports on the back of the computer. If it uses a
PS/2 connector, plug it into the green mouse port on the back of the computer.
6. If you have external speakers or headphones, you can connect them to your computer's
audio port (either on the front or back of the computer case). Many computers have color-
coded ports. Speakers or headphones connect to the green port, and microphones connect
Professor Jajati Mallick , Dept. CSE, PSET, manadiakudar, Rourkela 2017 Page 22
COMPUTER SYSTEM MANAGEMENT PLANNING & MAINTENACE
to the pink port. The blue port is the line in, which can be used with other types of
devices. Some speakers, headphones, and microphones have USB connectors instead of
the usual audio plug. These can be connected to any USB port. In addition, many
computers have speakers or microphones built into the monitor.
7. Locate the two power supply cables that came with your computer. Plug the first power
supply cable into the back of the computer case and then into a surge protector. Then,
using the other cable, connect the monitor to the surge protector.
8. Finally, plug the surge protector into a wall outlet. You may also need to turn on the
surge protector if it has a power switch.
3.5 Steps for actual installation as per the manufacturers Specified procedure
1. Computerized systems should be validated at the level appropriate for their intended use
and in accordance with quality risk management principles. This applies to systems used
in all good (anything) practices (GXP) activities (e.g. good clinical practice (GCP), good
laboratory practice (GLP) and good manufacturing practices (GMP)
2. The purpose of validation of a computerized system is to ensure an acceptable degree of
documented evidence that establishes confidence in the accuracy, reliability and
consistency in performance of the system in accordance with predetermined
specifications. The validation data should meet the principles of being attributable,
legible, contemporaneous, original and accurate (ALCOA) throughout the data life cycle.
3. Computerized system validation should ensure that all necessary technical and procedural
controls are implemented ensuring compliance with good documentation practices for
electronic data generated by the system (WHO guidance on good data and record
management practices, WHO Technical Report Series
4. System elements that need to be considered in computerized system validation include
computer hardware and software, related equipment and network components and
operating system environment, procedures and systems documentation including user
manuals and people (such as, but not limited to, users, data reviewers, system application
administrators, network engineers, database administrators and people involved in
archiving). Computerized system validation activities should address both system
configuration as well as any custom-developed elements.
Professor Jajati Mallick , Dept. CSE, PSET, manadiakudar, Rourkela 2017 Page 23
COMPUTER SYSTEM MANAGEMENT PLANNING & MAINTENACE
Professor Jajati Mallick , Dept. CSE, PSET, manadiakudar, Rourkela 2017 Page 24
COMPUTER SYSTEM MANAGEMENT PLANNING & MAINTENACE
Figure 8 V-model
Professor Jajati Mallick , Dept. CSE, PSET, manadiakudar, Rourkela 2017 Page 25
COMPUTER SYSTEM MANAGEMENT PLANNING & MAINTENACE
(a)The Central Processing Unit (CPU), also called a processor , is like the brain of the computer.
It executes instructions in response to commands. processors speed is measured in Megahertz
(MHZ) , or Gigahertz (GHZ) Higher the hertz, the faster the process in of instructions
(b) RAM (Random Access Memory) is also called main memory. RAM is used to store data and
instructions that are currently being processed by a computers CPU. Data is temporarily stored
in the RAM till it is saved to the hard disk. The data in RAM is erased when power is switch off.
RAM is measured in megabytes (MB) or gigabytes (GB). A bit is the smallest unit of data in
computer processing. It represents a digit in the binary system. So a bit can have either a value 0
or value 1. A byte is a group of eight bits. A Kilobyte (KB)is 2^10 bytes or approximately 1024
bytes. A Megabyte (MB) is about one million bytes. A gigabyte (GB) is 1,024 megabytes. The
Professor Jajati Mallick , Dept. CSE, PSET, manadiakudar, Rourkela 2017 Page 26
COMPUTER SYSTEM MANAGEMENT PLANNING & MAINTENACE
more RAM a computer has, the more things a computer can access at the same time. So more
the RAM, the faster a computer performs tasks.
(c)Secondary storage is where the information is stored permanently till explicitly deleted.
Information is moved between main memory and secondary memory as and when needed.
Power off of a computer, data on hard disk and other secondary storage devices is not erased.
The hard disk drive is the data center of the computer. Operating system, software, content
(created and saved by users) are stored here until explicate deleted. The hard disk drive is
usually found inside a computer. CD/DVD and pen drive are removable storage devices. These
can be used to backup important data and information. They also sometimes used to distribute,
share information or transfer information from one computer to another.
(d) An input device converts data and instructions entered using the device into a pattern of
electrical signals. These signals correspond to binary code that can be processed by a digital
computer. A user inputs data and instructions (Example: using a keyboard), initiates a task
(Example: using a mouse), transfers images (example: using a web camera), using the input
devices. An output device reverses the process, translating the digitized signals into a form
intelligible to the user. The computer displays processed information (example: a print out of the
information or audio, video) through the output devices. Keyboard, mouse, scanner, webcam are
examples of input devices. Monitor, printer, speakers are examples of output devices. Some
devices can handle both input and output. The network device (called network card) in a
computer is both input and output device
4.2 Hardware-BIOS interaction
The BIOS software has a number of different roles, but its most important role is to load the
operating system. When you turn on your computer and the microprocessor tries to execute its
first instruction, it has to get that instruction from somewhere. It cannot get it from the operating
Professor Jajati Mallick , Dept. CSE, PSET, manadiakudar, Rourkela 2017 Page 27
COMPUTER SYSTEM MANAGEMENT PLANNING & MAINTENACE
system because the operating system is located on a hard disk, and the microprocessor cannot get
to it without some instructions that tell it how. The BIOS provides those instructions. Some of
the other common tasks that the BIOS performs includes:
1. A power-on self-test (POST) for all of the different hardware components in the system to
make sure everything is working properly.
2. Activating other BIOS chips on different cards installed in the computer e.g. SCSI and
graphics cards often have their own BIOS chips.
3. Providing a set of low-level routines that the operating system uses to interface to different
hardware devices - it is these routines that give the BIOS its name. They manage things like the
keyboard, the screen, and the serial and parallel ports, especially when the computer is booting.
4. Managing a collection of settings for the hard disks, clock, etc.
The BIOS (an acronym for Basic Input/output System and also known as the System BIOS,
ROM BIOS or PC BIOS) is a type of firmware used to perform hardware initialization during
the booting process (power-on startup) on IBM PC compatible computers, and to provide
runtime services for operating systems and programs. The BIOS firmware is built into personal
computers (PCs), and it is the first software they run when powered on. The name itself
originates from the Basic Input/output System used in the CP/M operating system in 1975.
Originally proprietary to the IBM PC, the BIOS has been reverse engineered by companies
looking to create compatible systems and the interface of that original system serves as a de facto
standard. The fundamental purposes of the BIOS in modern PCs are to initialize and test the
system hardware components, and to load a boot loader or an operating system from a mass
memory device. The BIOS additionally provides an abstraction layer for the hardware, i.e., a
consistent way for application programs and operating systems to interact with the keyboard,
Professor Jajati Mallick , Dept. CSE, PSET, manadiakudar, Rourkela 2017 Page 28
COMPUTER SYSTEM MANAGEMENT PLANNING & MAINTENACE
display, and other input/output (I/O) devices. Variations in the system hardware are hidden by
the BIOS from programs that use BIOS services instead of directly accessing the hardware. MS-
DOS (PC DOS), which was the dominant PC operating system from the early 1980s until the
mid-1990s, relied on BIOS services for disk, keyboard, and text display functions. MS Windows
NT, Linux, and other protected mode operating systems in general ignore the abstraction layer
provided by the BIOS and do not use it after loading, instead accessing the hardware components
directly. Most BIOS implementations are specifically designed to work with a particular
computer or motherboard model, by interfacing with various devices that make up the
complementary system chipset. Originally, BIOS firmware was stored in a ROM chip on the PC
motherboard; in modern computer systems, the BIOS contents are stored on flash memory so it
can be rewritten without removing the chip from the motherboard. This allows easy updates to
the BIOS firmware so new features can be added or bugs can be fixed, but it also creates a
possibility for the computer to become infected with BIOS root kits.
4.3 Interconnection between subsystems of PC
The PC is a system, which means that it contains many different parts that work together to
accomplish its various tasks. However, not all of the various components in the machine are
connected together in the same way, or you could say, at the same level. There are some that are
more centrally located and connected to more of the other pieces; there are others that are more
"added on" to the central core of the machine. There are subsystems within the system that each
do different jobs.
The subsystems each contain components that work together, and with the other subsystems of
the PC. The heart of any PC is what I call the system processing core. This set of critical
components forms the logical center of any PC, and is responsible for most of the key
characteristics that make a system what it is. The system processing core includes the following
components:
Professor Jajati Mallick , Dept. CSE, PSET, manadiakudar, Rourkela 2017 Page 29
COMPUTER SYSTEM MANAGEMENT PLANNING & MAINTENACE
Professor Jajati Mallick , Dept. CSE, PSET, manadiakudar, Rourkela 2017 Page 30
COMPUTER SYSTEM MANAGEMENT PLANNING & MAINTENACE
When a motherboard is considered a field replaceable unit, so its important to know how to
replace one, but the good news is you dont need to know how to repair one that is broken. A
motherboard is the most complicated component in a computer. When you put together a
computer from parts, generally you start with deciding on which processor and motherboard you
will use. Everything else follows these two decisions. A micro ATX motherboard by Intel that
can hold an Intel Core i7, Core i5, or Core i3 processor in the LGA1155 processor socket. When
selecting a motherboard, generally, youd need to pay attention to the form factor, processor
socket, chipset, buses and number of bus slots, and other connectors, slots, and ports. In
selecting the right motherboard when replacing an existing one or when building a new system
is a challenging factor; so the types of slots on the motherboard and whether replacement parts
will fit.
(a) CPU Slot
The CPU is often called the brains of a computer because it is the hardware that carries out
instructions from software by using math, input/output commands and logic. The CPU slot
(also known as a CPU socket) is where the processor is stored on a computer's motherboard. To
replace a CPU you will need to raise the socket by lifting a small lever on the side of the
socket; then you can gently pull out the CPU hardware. Replace the old CPU with a new one
Professor Jajati Mallick , Dept. CSE, PSET, manadiakudar, Rourkela 2017 Page 31
COMPUTER SYSTEM MANAGEMENT PLANNING & MAINTENACE
by aligning your new CPU with the socket, gently placing it in (do not push) and then flipping
the socket lever to secure it.
(b) RAM Slot
Random access memory (RAM) is data storage hardware on your computer's motherboard.
Despite the name, RAM does not actually "remember" anything when a computer is turned off.
Programs must be saved on the hard drive or another storage device. In practical terms, RAM
determines how many programs can run at once and how large the programs can be. Computers
cannot run without RAM installed. They often come packaged with multiple strips located in
RAM slots on the motherboard that are easily removable and replaceable. Upgrading RAM will
improve the speed of your computer.
(c) PCI Slot
The Peripheral Component Interconnect (PCI) slot is a slot for expansion devices. Most desktop
computers come with several PCI expansion slots. PCI slots are used for a variety of devices:
modems, network cards, television tuners, radio tuners, video cards and sound cards, among
others. Most computers today have several of these cards already built in. For computers that do
not, these expansion devices provide additional functionality to a computer, making it possible
for essential functions in a business such as wireless Internet connectivity.
(d) PCI Express Slot
The PCI Express slot, like the PCI slot, is used for expansion cards. PCI Express allows for
higher transfer speeds than PCI and is therefore preferred for graphics cards. The PCI Express
has replaced the Accelerated Graphics Port (AGP) in most computers as the primary slot for
graphics cards. Many newer programs, such as Adobe's popular photo and video editors, rely
more on an advanced graphics card to process data. Upgrading your graphics card can improve
performance markedly.
(e) Hard Drive Slots
To connect hard drives to your computer, you might find a group of small rectangular slots,
called serial advanced technology attachment slots. Some SATA slots might be capable of higher
speeds and are usually colored differently. Connect solid-state drives to the high-speed SATA
slots and mechanical disk drives to the lower-speed slots. Older motherboards might have
parallel advanced technology attachment slots. PATA slots resemble PCI and PCIe slots more
than they resemble SATA slots. PATA slots connect to disk drives as well as CD and DVD
recorders and players using a ribbon cable.
(f) Expansion slot
Alternatively referred to as a bus slot or expansion port, an expansion slot is connection or port
located inside a computer on the motherboard or riser board that allows a computer hardware
expansion card to be connected. For example, if you wanted to install a new video card in the
computer, you'd purchase a video expansion card and install that card into the compatible
expansion slot.
Professor Jajati Mallick , Dept. CSE, PSET, manadiakudar, Rourkela 2017 Page 32
COMPUTER SYSTEM MANAGEMENT PLANNING & MAINTENACE
first job is to convert the input to DC. This is called rectification. The rectifier circuit can be
configured as a voltage doublers by the addition of a switch operated either manually or
automatically. This is a feature of larger supplies to permit operation from nominally 120volt or
240volt supplies. The rectifier produces an unregulated DC voltage which is then sent to a large
filter capacitor. The current drawn from the Mains supply by this rectifier circuit occurs in short
pulses around the AC voltage peaks. These pulses have significant high frequency energy which
reduces the power factor. Special control techniques can be employed by the following SMPS to
force the average input current to follow the sinusoidal shape of the AC input voltage thus the
designer should try correcting the power factor. A SMPS with a DC input does not require this
stage. A SMPS designed for AC input can often be run from a DC supply, as the DC passes
through the rectifier stage unchanged. D.C. to D.C. converters and D.C. to A.C. Converters
belong to the category of Switched Mode Power Supplies (SMPS).
APPLICATIONS:
Switched-mode PSUs in domestic products such as personal computers often have universal inputs,
meaning that they can accept power from most Mains supplies throughout the world, with rated
frequencies from 50Hz to 60Hz and voltages from 100V to 240V (although a manual voltage "range"
switch may be required). In practice they will operate from a much wider frequency range and often
from a DC.
Circuit Diagram:
The energy flow in a power supply is controlled by power semiconductors, which can operate in
different modes. In legacy systems they worked in linear mode and excessive power dissipated in
a series transistor. When a semiconductor operates in switching mode, it can control energy flow
with low losses: when a switch is "on", it has low voltage drop and will pass any current imposed
on it; when it is "off", it blocks the flow of current. As the result, in such an electronic device the
Professor Jajati Mallick , Dept. CSE, PSET, manadiakudar, Rourkela 2017 Page 33
COMPUTER SYSTEM MANAGEMENT PLANNING & MAINTENACE
power dissipation which is the product of voltage and current, can be relatively low in both
states. That's why switch mode PSUs offer greater efficiency compared with linear ones. Such
units are also smaller in size and lighter in weight due to the reduced size of passive components
and lower heat generation. The industry trend toward miniaturization, advancements in
semiconductor technology, as well as various energy efficiency regulations have made
"switcher" the dominant type of PSU across practically the full spectrum of applications. Most
PSU manufactured today for AC input applications also include a PFC front end.
IDE drives- originally developed as alternative to more expensive SCSI drives. Modern
versions called EIDE drives. Support up to 4 multi gigabyte drives. If you want more devices,
use SCSI or USB Low-level formatted at the factory
Low Level Formatting
Low level format scans disk for defects and sets aside sectors with defects so they are not used
for data.
IDE drives should never be low level formatted by a user or technician. Only high level format
necessary.
Installing IDE/EIDE drives
IDE supports TWO drives in a system
one master (boot disk) and one slave
set master and slave using jumpers
EIDE supports FOUR drives per system
2 drives on each of 2 cables
only one master, all others are slaves
IDE and EIDE drives both use 40-pin ribbon cable aligned to pin 1
Professor Jajati Mallick , Dept. CSE, PSET, manadiakudar, Rourkela 2017 Page 34
COMPUTER SYSTEM MANAGEMENT PLANNING & MAINTENACE
SCSI
Pronounced Scuzzy
Small Computer Systems Interface
For wide range of peripheral devices, including hard disks, tape drives, optical drives, CD-
ROMs and disk arrays.
8 devices can connect to a daisy chain
This chain must be terminated at both ends
Each device on chain is assigned unique device ID number that is determined by jumpers or
DIP switches
Installing and configuring SCSI
SCSI bus supports 8 devices
There are eight SCSI IDs numbered 0 through 7
ID 7 is always reserved for the SCSI host adapter
SCSI hard disk, if used as a boot drive, is assigned SCSI ID 0
If you have both IDE and SCSI hard drive, IDE drive should be boot drive
Types of SCSIs
SCSI 1- 5 MB transfer rate, Centronics 50 pin or DB 25, has 8 bit bus
SCSI 2 -also SCSI Fast Wide, includes 16 bit bus , called Wide SCSI, and twice as fast transfer
rate
SCSI 3- Includes Ultra SCSI, Wide Ultra SCSI, and Ultra 2 SCSI, 16 bit bus with up to 80
MBps transfer rate
RAID
Redundant Array of Independent Disks
Category of disk drives that employs 2 or more drives in combination for fault tolerance (error
recovery)
10 levels of RAID
3 on test will be: RAID 0, RAID 3, RAID 5
RAID 0- Striped disk without parity
RAID 3- Parallel transfer with parity
RAID 5- Data striping with parity
Data is Organized on Disk
Tracks-
circular areas of the disk
Length of a track one circumference of disk
Over 1000 on a hard disk
Data first written to outer most track
Sectors-
Divides tracks sections
On a floppy 9 sectors exits
Cylinders-
Logical groupings of the the same track on each disk surface in a disk unit
Clusters-
Groups of sectors used by operating system
64 sectors in one cluster
Professor Jajati Mallick , Dept. CSE, PSET, manadiakudar, Rourkela 2017 Page 35
COMPUTER SYSTEM MANAGEMENT PLANNING & MAINTENACE
Professor Jajati Mallick , Dept. CSE, PSET, manadiakudar, Rourkela 2017 Page 36
COMPUTER SYSTEM MANAGEMENT PLANNING & MAINTENACE
Interleaving
Allows the read/write head to use the rotation of the disk to its advantage
One sector is written to and the disk skips to several sectors down
Formatting
Low level formatting done at factory
Builds the File Allocation Table (FAT)
Physically scans the disk media for defects
Remember FAT is always located at Track 0
High level formatting is automatically done during installation of operating system
Operating System File Systems
DOS uses FAT
Windows 3.x uses Virtual FAT
Win 95 uses VFAT and FAT32
Win NT uses NTFS
Partitioning
FDISK command is used
Divides hard drive into logical subdivisions which are seen by the operating system as
separate logical hard disks.
Hard drives divided into primary and extended partitions. The primary partition boots the
system. Can have up to 4 primary partitions
Extended can be divided up to 23 times on disk.
Partitioning disks improves disk efficiency through reduced cluster size.
In DOS, Win 3x and early versions of Win 95 a hard disk over 2 GB must be divided into
smaller partions
Now Win XP and Win 7 can create a primary partition of up to 30 GB
Following partition, the first sector on cylinder 0 reserved for master boot record
Disk compression
Reduce amount of space taken up by files by substituting codes for repeating patterns of
data
To access data on compressed disk, must load disk compression utility into RAM first
This disk compression utility works between OS and disk controller to intercept requests
and compress or decompress files- the result is slower disk access
The hard disk drive (HDD) is the data center of the computer. Operating system, software,
content (created and save by user) are stored here until explicate deleted. Information is moved
Professor Jajati Mallick , Dept. CSE, PSET, manadiakudar, Rourkela 2017 Page 37
COMPUTER SYSTEM MANAGEMENT PLANNING & MAINTENACE
between main memory and secondary memory as and when needed. On power off a computer,
data on hard disk and other secondary storage device is not erased.
AT Attachment, is an interface standard for the connection of storage devices such as hard disk
drives, floppy disk drives, and optical disc drives in computers. The standard is maintained by
the X3/INCITS committee. It uses the underlying AT Attachment (ATA) and AT Attachment
Packet Interface (ATAPI) standards.The Parallel ATA standard is the result of a long history of
incremental technical development, which began with the original AT Attachment interface,
developed for use in early PC AT equipment. The ATA interface itself evolved in several stages
from Western Digital's original Integrated Drive Electronics (IDE) interface. As a result, many
near-synonyms for ATA/ATAPI and its previous incarnations are still in common informal use,
in particular Extended IDE (EIDE) and Ultra ATA (UATA). After the introduction of Serial
ATA (SATA) in 2003, the original ATA was renamed to Parallel ATA, or PATA for short.
Parallel ATA cables have a maximum allowable length of only 18 in (457 mm). Because of this
limit, the technology normally appears as an internal computer storage interface. For many years,
ATA provided the most common and the least expensive interface for this application. It has
largely been replaced by SATA in newer systems.
Hard disk drives are accessed over one of a number of bus types, including parallel ATA (PATA,
also called IDE or EIDE; described before the introduction of SATA as ATA), Serial ATA
(SATA), SCSI, Serial Attached SCSI (SAS), and Fibre Channel. Bridge circuitry is sometimes
used to connect hard disk drives to buses with which they cannot communicate natively, such as
IEEE 1394, USB, SCSI and Thunderbolt. Disk drive interfaces have evolved from simple
interfaces requiring complex controllers to attach to a computer into high level interfaces that
present a consistent interface to a computer system regardless of the internal technology of the
hard disk drive. The following table lists some common HDD interfaces in chronological order:
HDDs are used in many different places for many different purposes. Different interfaces have
therefore been developed to meet this diversity. The AT Attachment (ATA) interface was
developed for the internal HDDs of desktop PCs, while Small Computer System Interface (SCSI)
was developed for servers and large-scale storage systems. Now, these parallel interfaces are
being replaced to meet the demands for higher speeds. SCSI is being replaced with FC and SAS,
Professor Jajati Mallick , Dept. CSE, PSET, manadiakudar, Rourkela 2017 Page 38
COMPUTER SYSTEM MANAGEMENT PLANNING & MAINTENACE
while AT A is being replaced with SATA. Moreover, because the uses of HDDs are also
expanding, interfaces to meet these new uses are also being developed. The serial interfaces of
the main HDD of each market segment are shown in parentheses.
- Enterprise (FC)
- Server (SAS)
- Desktop (SATA)
- Mobile (SATA)
- Consumer (stationary) (SATA)
- Consumer (mobile) (CE-ATA)
Hard Drive Technologies and Interface Standards
- A hard disk drive (HDD) comes in two sizes: 3.5" for desktop computers and 2.5" for
laptops.
- A hard drive can be a magnetic drive, a solid state drive, or a hybrid drive. A solid state
drive contains flash memory and is more expensive, faster, more reliable, and uses less
power than a magnetic drive.
- Most hard drives use the ATA interface standards. The two main categories of ATA are
parallel ATA and serial ATA. Serial ATA is easier to configure and better performing
than PATA. External SATA ports are called eSATA ports.
- S.M.A.R.T. is a self-monitoring technology whereby the BIOS monitors the health of the
hard drive and warns of an impending failure.
- ATAPI standards are used by optical drives and other drives that use the ATA interface
on a motherboard or controller card.
- Several PATA standards are Fast ATA, Ultra ATA, Ultra ATA/66, Ultra ATA/100, and
Ultra ATA/133.
- Three SATA standards provide data transfer rates of 1.5 Gb/sec (using SATA I), 3.0
Gb/sec (using SATA II), and 6.0 Gb/sec (using SATA III).
- The SCSI interface standards include narrow and wide SCSI, and can use a variety of
cables and connectors. Three connectors are a 50-pin, 68-pin, and 25-pin connector.
- A SCSI chain can contain up to 16 devices including the host adapter. Each device is
identified by a SCSI ID, a number from 0 to 15.
Select and Install Hard Drives
- When selecting a hard drive, consider the storage capacity, technology (solid state or
magnetic),spindle speed, interface standard, and buffer size (for hybrid drives).
- SATA drives require no configuration and are installed using a power cord and a single
SATA data cable.
- PATA drives require you to set a jumper to determine if the drive will be the single drive,
master, or slave on a single cable. The PATA cable can accommodate two drives. A
PATA motherboard has one or two PATA connectors for up to four PATA drives in the
system.
- RAID technology uses an array of hard drives to provide fault tolerance and/or
improvement in performance. Choices for RAID are RAID 0 (striping using two drives),
RAID 1 (mirroring using two drives), RAID 5 (parity checking using three drives), and
RAID 10 (striping and mirroring combined using four drives).
- Hardware RAID is implemented using the motherboard BIOS or a RAID controller card.
Professor Jajati Mallick , Dept. CSE, PSET, manadiakudar, Rourkela 2017 Page 39
COMPUTER SYSTEM MANAGEMENT PLANNING & MAINTENACE
Professor Jajati Mallick , Dept. CSE, PSET, manadiakudar, Rourkela 2017 Page 40
COMPUTER SYSTEM MANAGEMENT PLANNING & MAINTENACE
Partition table.
Located in first physical sector.
Tell where each partition begins/ends.
Identifies
Type of file system for each partition.
If partition is bootable.
Volume
Each partition on drive called a Volume.
Has own volume label.
Active Partition.
Can boot only from active partition.
Hard disk limited to four primary partitions per physical disk.
Extended partition.
Only one primary partition can be an extended partition.
Can contain logical drives (volumes).
Dual booting system (system with 2 OSs)
Create partition for each OS.
Only one OS active at a time.
Boot computer from partition where OS is located.
Each OS formats disks in own way.
Depending on OS used and file system selected may be able to recognize other drive but no read
files on it.
Precautions in running multiple OS
W98, WXP and W7, in multiple-boot configuration compatible.
Order of installation important.
Specific information to install multiple OS beyond scope of book.
File system - organizational scheme of OS.
OS prepares disk to be read from and written to them.
OS is what makes one computer compatible with another.
Process of preparing disk - formatting or initializing disk.
Focusing on Windows-based formatting.
WXP supports four file systems.
NTFS.
Three FAT file systems (FAT12, FAT16, and FAT32).
FAT12 used on floppy disks.
In reality, choice is either FAT or NTFS.
WXP supports two types of file systems on CD-ROM and DVD.
CDFS & UDF.
All disks must be formatted.
Hard disk
- Usually partitioned and formatted.
-- Typically formatted only one time.
Floppy disks for Wintel computer are also preformatted.
Two types of disk storage configuration.
Professor Jajati Mallick , Dept. CSE, PSET, manadiakudar, Rourkela 2017 Page 41
COMPUTER SYSTEM MANAGEMENT PLANNING & MAINTENACE
Basic disks.
Physical disk.
WXP initializes all disks as basic.
Dynamic disks.
Physical disks upgraded/managed by Disk Management utility.
Do not use partitions/logical drives.
Only computers running W2K and above can use dynamic disks.
Professor Jajati Mallick , Dept. CSE, PSET, manadiakudar, Rourkela 2017 Page 42
COMPUTER SYSTEM MANAGEMENT PLANNING & MAINTENACE
Professor Jajati Mallick , Dept. CSE, PSET, manadiakudar, Rourkela 2017 Page 43
COMPUTER SYSTEM MANAGEMENT PLANNING & MAINTENACE
Professor Jajati Mallick , Dept. CSE, PSET, manadiakudar, Rourkela 2017 Page 44
COMPUTER SYSTEM MANAGEMENT PLANNING & MAINTENACE
NTFS
NTFS used if user wants disk security, performance, and efficiency.
Advantages of NTFS.
Secure file system can assign permission to each file/folder on disk.
More efficient storage of data on large hard disks.
Faster access to files/folders.
IF disk failure - better data recovery.
Restore disk based on log file.
Can compress files more data can be stored on disk.
Can assign disk quotas set limits on how much disk space a user may have.
Encryption of files for better security.
CLUSTERS AND NTFS
NTFS.
Uses FAT cluster scheme for allocating data.
Has fewer overheads.
Reducing operating overhead can allocate more computer resources to work you want done.
Structure of NTFS volume looks similar to FAT but there are differences.
MASTER FILE TABLE (MFT)
NTFS uses Master File Table (MFT) instead of FAT.
MFT.
Database of all files on system.
Tracks all files/directories in volume
Dynamic changes size when necessary.
First 16 records called Metadata files.
Professor Jajati Mallick , Dept. CSE, PSET, manadiakudar, Rourkela 2017 Page 45
COMPUTER SYSTEM MANAGEMENT PLANNING & MAINTENACE
Professor Jajati Mallick , Dept. CSE, PSET, manadiakudar, Rourkela 2017 Page 46
COMPUTER SYSTEM MANAGEMENT PLANNING & MAINTENACE
DIR FORMAT.COM
FORMAT A:
Prepare and affix label to blank disk. Name it DATA disk and insert it into Drive A.
Press <Enter>/<Enter>/<Enter>/N/<Enter>
Press <Enter>/N/<Enter>
Key in: CD \
Activity completed.
FORMATTING A DISK WITH A VOLUME LABEL
Can use parameters other than the disk drive letter with the FORMAT command.
Syntax for FORMAT commands (with parameters).
Explain function of each parameter.
Parameters work but have been superseded.
Beginning with MS-DOS version 3.3 volume or drive letter mandatory.
Important parameters to remember are:
FORMAT volume [/V: label] [/Q]
/Q performs quick format
Used only on previously formatted disk.
Deletes entries from FAT and root directory but leaves files untouched.
/V used to place volume label on disk.
/F: size format floppy disk that does not match capacity of floppy disk drive.
Discuss function of /F: size.
Volume label.
Electronic name.
Like labeling file drawer.
Formatting disk in recent versions of OS automatically asks for volume label even if
/V not included.
If parameter /V (fixed) included can provide label itself (variable) and eliminate step.
ACTIVITYUSING THE /V OPTION
C:\> is displayed and a formatted disk in A:
Activity steps.
Key in:
CD \WINNT\SYSTEM32
FORMAT A: /V: SAMPLEDATA
Press <Enter>
Key in: N/DIR A: then VOL then VOL A:
Activity completed.
THE LABEL COMMAND
C:\WINNT\SYSTEM32> displayed.
Disk just formatted is in Drive A.
Activity steps.
Key in: LABEL A:
Press <Enter>.
Key in: Y then VOL A:
Key in: LABEL A:SAMPLE DATA
Professor Jajati Mallick , Dept. CSE, PSET, manadiakudar, Rourkela 2017 Page 47
COMPUTER SYSTEM MANAGEMENT PLANNING & MAINTENACE
Professor Jajati Mallick , Dept. CSE, PSET, manadiakudar, Rourkela 2017 Page 48
COMPUTER SYSTEM MANAGEMENT PLANNING & MAINTENACE
- Bit Specification, are the number of lanes on the highway. 16 bit = 16 lanes, 32 = 32
lanes etc. the more lanes, the more traffic that can be accommodated.
- Voltage references, like 5V or 3.3V, is similar to miles per gallon with the exception that
the lower the voltage, the better the gas mileage.
VESA PCI
Abbreviation Video Electronics Standard Peripheral Component
Association (VESA) Interconnect (PCI)
Year of Introduction 1992 by VESA 1992 by Intel
Use Video cards Graphics display adapters,
network interface controllers,
disk controllers.
Performance Good Highest as compared to ISA,
MCA, ISA and VESA buses.
Bits 32 bits local bus 32 bit or 64 bit local bus.
Processor 80486 processor High speed Pentium
processors and advanced
versions.
Bandwidth 132 MB/s 132 MB/s for 32 bit PCI bus
and 264 MB/s for 64 bit PCI
bus.
Plug and play Not supported It supports plug and play
mechanism.
Bus mastering Not supported It provides bus mastering and
Professor Jajati Mallick , Dept. CSE, PSET, manadiakudar, Rourkela 2017 Page 49
COMPUTER SYSTEM MANAGEMENT PLANNING & MAINTENACE
provides arbitration.
Addressing 32 bit addressing 64 bit addressing
Expansion cards Video few cards can be used. It supports many expansion
cards in comparison to VL
bus.
Professor Jajati Mallick , Dept. CSE, PSET, manadiakudar, Rourkela 2017 Page 50
COMPUTER SYSTEM MANAGEMENT PLANNING & MAINTENACE
Polling: CPU continually examines the status port until a key is pressed (Programmed I/O)
Ex: Reading a character from keyboard
KEYIN: IN 0 ; read status port into A
ANA A ; test A (10H key is pressed, 00H otherwise)
JZ KEYIN ; jump if 00H
IN 1 ; take data into A
RET
The Keyboard Hardware Interface
The PC interfaces to the keyboard using two separate microcontroller chips. These chips provide
user programming registers and a very flexible command set. If you want to program the
keyboard beyond simply reading the keystrokes produced by the keyboard (i.e., manipulate the
LEDs on the keyboard), you will need to become familiar with the registers and command sets of
these microcontrollers.
The Keyboard DOS and BIOS Interface
Both DOS and BIOS provide facilities to read a key from the systems type ahead buffer. As
usual, BIOS functions provide the most flexibility in terms of getting at the hardware.
Furthermore, the BIOS int 16h routine lets you check shift key status, stuff scan/ASCII codes
into the type ahead buffer, adjust the auto repeat rate, and more. Given this flexibility, it is
difficult to understand why someone would want to talk directly to the keyboard hardware,
especially considering the compatibility problems that seem to plague such projects.
The Keyboard Interrupt Service Routine
Although accessing the keyboard hardware directly is a bad idea for most applications, there is a
small class of programs, like keyboard enhancers and pop-up programs, that really do need to
access the keyboard hardware directly. These programs must supply an interrupt service routine
for the int 9 (keyboard) interrupt.
A keyboard macro program (keyboard enhancer) is a perfect example of a program that
might need to talk directly to the keyboard hardware. One problem with such programs is that
they need to pass characters along to some underlying application. Given the nature of
applications present in the world, this can be a difficult task if you want to be compatible with a
large number of PC applications.
Professor Jajati Mallick , Dept. CSE, PSET, manadiakudar, Rourkela 2017 Page 51
COMPUTER SYSTEM MANAGEMENT PLANNING & MAINTENACE
Memory types speed and timingAdjust the values here to match the memory installed in the
system (such as parity, non-parity, SDRAM, EDO, and so on).
Cache adjustmentsSome Cyrix CPUs require the user to disable pipelining for proper
operation.
Configuration of USB portsIf you upgrade a system to Windows 98 or Windows 2000, you
might need to enable the USB ports; systems with older versions of Windows (which didn't
support USB) might not have the USB ports enabled. The USB Keyboard Support feature must
be enabled if a USB keyboard is installed to allow the keyboard to operate outside of Windows.
Configuration of the AGP slotDepending on the specific AGP video card installed (if any),
you might need to set the size of the memory aperture used to transfer data between the system
and the AGP port and select the AGP mode (1x, 2x, and 4x).
Power Management Configuration- Power management works like this: After a user-defined
period of inactivity, devices such as the monitor, the hard drive, or even the CPU will go into
different low-power modes:
- Standby modeShuts off the hard drive and blanks monitor screens that use Display
Power Management Signaling. Move the mouse or press a key to "wake up" the system.
- Suspend modeTurns off the CPU clock to save even more power. Systems that fully
support suspend mode allow you to choose a special shutdown option that "remembers" what
programs and files were open, and can bring the system back to that state when the power is
restored.
PnP (Plug-and-Play) Configuration Screen
Plug-and-Play (PnP) configuration allows either the operating system or the system BIOS to
select hardware settings for PnP-compatible cards when first installed and to change those
settings when new cards are installed
Security/Passwords
You can enable two types of passwords on many systems: a power-on password that must be
entered to allow any use of the system, and a setup password that must be entered to allow access
to the BIOS/CMOS setup. If you don't have all the settings recorded (with screen printouts or by
writing them down), this can be dangerous to enable.
Installation or setup is the act of making the system or program ready for execution.
Because the process varies for each program and each computer, programs (including operating
systems) often come with an installer, a specialized program responsible for doing whatever is
needed for their installation. Configuration is an arrangement of functional units according to
their nature, number, and chief characteristics. Often, configuration pertains to the choice of
Professor Jajati Mallick , Dept. CSE, PSET, manadiakudar, Rourkela 2017 Page 52
COMPUTER SYSTEM MANAGEMENT PLANNING & MAINTENACE
hardware, software, firmware, settings, and documentation. The configuration affects system
function and performance.
Professor Jajati Mallick , Dept. CSE, PSET, manadiakudar, Rourkela 2017 Page 53
COMPUTER SYSTEM MANAGEMENT PLANNING & MAINTENACE
Windows: Review Microsoft: Working with Control Panel. Use Control Panel applets to
configure keyboard, mouse, display, sound, and other settings.
OS X: Review Apple: Set Your Preferences. Use System Preferences to configure
keyboard, mouse, display, sound, and other settings.
Linux: System settings vary by distribution. Search the Internet for system settings
information for your Linux distribution. Use system settings applications to configure keyboard,
mouse, display, sound, and other settings.
(E) Create user accounts.
Windows: Review Microsoft: Create a User Account and Microsoft: Change User
Account Types. Create a new administrator account and a new standard user account. Test the
accounts and identify differences between the account types. Delete the accounts when you're
finished.
OS X: Review Apple: Set Up Users on Your Mac. Create a new administrator account
and a new standard user account. Test the accounts and identify differences between the account
types. Delete the accounts when you're finished.
Linux: User management tools vary by distribution. Search the Internet for information
on how to create or add users for your Linux distribution. Create a new administrator account
and a new standard user account. Test the accounts and identify differences between the account
types. Delete the accounts when you're finished.
(F) Research and compare license and support costs for Windows, OS X, and Linux.
(G) System configuration
The system configuration setting of a client computer comprises of the network setting,
domain name, computer name, IP address, and so on. Deployment Solution lets you create
system configurations to apply on the client computers after they boot to the production
environment from the preboot environment or automation environment. For example, after
you boot 50 client computers to the production environment, you might want the computer
names to be modified and also join a common domain. This task can be performed through
the system configuration that you create and apply on the client computers.
(H) Software
We install a standard set of programs as part of the Computer Setup service. To view a list of
installed programs, visit the Standard Mac and Standard Windows pages. We can install any
software you are licensed for on request. If you need to purchase additional software, you can
order using the ITS Software order form on the ITS Software pages.
Professor Jajati Mallick , Dept. CSE, PSET, manadiakudar, Rourkela 2017 Page 54
COMPUTER SYSTEM MANAGEMENT PLANNING & MAINTENACE
Professor Jajati Mallick , Dept. CSE, PSET, manadiakudar, Rourkela 2017 Page 55
COMPUTER SYSTEM MANAGEMENT PLANNING & MAINTENACE
Our support engineers use a remote access service which allows them to connect to the
problematic system, and fix it without having to visit your office.
5.2 Type & nature of fault
A fault is another word for a problem. A root cause fault is a fundamental, underlying
problem that may lead to other problems and observable symptoms. (It might not be directly
observable). A root cause is also generally associated with procedures for repair. A "fault" or
"problem does not have to be the result of a complete failure of a piece of equipment, or even
involve specific hardware. For instance, a problem might be defined as non-optimal operation or
off-spec product. In a process plant, root causes of non-optimal operation might be hardware
failures, but problems might also be caused by poor choice of operating targets, poor feedstock
quality, poor controller tuning, partial loss of catalyst activity, buildup of coke, low steam system
pressure, sensor calibration errors, or human error. A fault may be considered a binary variable
(OK vs. failed), or there may be a numerical extent, such as the amount of a leak or a
measure of inefficiency.
A fault in a computer system affects the normal operation of the computer, i.e, the
computer malfunctions. The symptoms of malfunction are almost unlimited and vary with the
nature of the fault. The types of symptoms we often come across are listed below:
- A program has given wrong results.
- A program is looping continuously
- The CPU has lost control
- There is a junk display on the CRT
- The HDD is not working
- Opening more than one window causes the system software to hang
- Computer intermittently cancels job with any of the following messages:
. Spurious Interrupt
. Memory parity error
. File not found
. Divide by zero
. Overrun
- A program gives different results at different runs
Nature of faults: solid and intermittent
Computer faults can be broadly classified into 2 types based on frequency of occurrence of the
program.
- Permanent or Solid fault: When there is a permanent in a computer misbehaves
consistently. Any number of times the program is run, the result or symptoms will be same.
- Intermittent fault: When there is an intermittent fault, the computers behavior is not
consistent. Sometimes it works properly and suddenly it malfunctions. After a certain period
of time, it recovers from the fault automatically and again starts functioning properly.
Types of Faults: (Hardware & Software)
A hardware which works now may fail even in the next second. But a software one proven
always works. Hence if there is a software fault in a computer, it is because of one the following
two reasons:
- The program is not proven. It is a new which is not yet debugged thoroughly.
- The program works only for certain types of data. This is due to the incomplete testing of the
software.
Professor Jajati Mallick , Dept. CSE, PSET, manadiakudar, Rourkela 2017 Page 56
COMPUTER SYSTEM MANAGEMENT PLANNING & MAINTENACE
Software errors may appear to be hardware errors. A hardware problem is classified as a fault in
an actual component or in the configuration of that component.
- Electronic problems
- Mechanical problems
- Environmental problems
- Media problems
Each of these types may cause both solid and intermittent problem. They may cause a similar
problem. In practice, it is easier to identify the cause of solid problems. An intermittent
mechanical problem may give symptoms that may mislead the engineer to conclude it as
electronic problem. The symptoms caused by the media problems make one think that they are
either hardware or software problems. Hence an intermittent problem needs a very careful and
systematic approach.
Manifest on of Faults
Fault effects may be permanent or temporary
- Same fault may result in different effects depending on where/when it occurs
- A soft error in the code segment is a permanent error while one in the data
segment may be temporary
. Faults may affect different layers differently
- A permanent fault in the logical level may manifest as a temporary fault at the
architectural level if the function unit in which it occurs is often unused.
Professor Jajati Mallick , Dept. CSE, PSET, manadiakudar, Rourkela 2017 Page 57
COMPUTER SYSTEM MANAGEMENT PLANNING & MAINTENACE
(i) System Stack: Logical level soft error, timing errors etc.
Stuck-at-fault (Permanent)
- Assume that some gate/line gets stuck
- Can be stuck-at-0 or stuck-at-1
- May not correspond to real physical faults
- Very useful for evaluating test cases in ATPG
Bit-Flip Model (Transient)
- Can be caused by cosmic rays/alpha particles striking flip-flops or logic gates (Soft
errors)
- Leads to one or more bits getting flipped
Permanent Errors
- Some functional unit in the processor fails (e.g., an ALU stops working; cache line
has a stuck-at-fault).
- Certain instructions are always executed incorrectly due to design errors (e.g., adds
always encounter error when value overflows register width.
Transient Errors
- Some units experiences an error for 1 cycle/instruction (e.g., an entry in the ROB
has a bit-flip for 1 cycle)
- Cache line has a single bit-flip due to cosmic ray strike
Professor Jajati Mallick , Dept. CSE, PSET, manadiakudar, Rourkela 2017 Page 58
COMPUTER SYSTEM MANAGEMENT PLANNING & MAINTENACE
Permanent Error
- An instruction or data item was corrupted by a fault in the disk image of the OS
- Device experiences a permanent failure
Transient Error
- An OS data/code page in memory is corrupted
- A device experiences a transient malfunctioning
- The kernel experiences deadlock/livelock
(iv) System stack: Application Level Concurrency bugs and Memory corruption errors
Permanent Errors
- Programming errors in application logic-mutation of source code or binary file
- Corruption of configuration files/data-bases needed by the application
Transient Errors
- Software memory corruption errors or corruption of memory locations
- Race conditions/Atomicity violations or lock elision
Professor Jajati Mallick , Dept. CSE, PSET, manadiakudar, Rourkela 2017 Page 59
COMPUTER SYSTEM MANAGEMENT PLANNING & MAINTENACE
Professor Jajati Mallick , Dept. CSE, PSET, manadiakudar, Rourkela 2017 Page 60
COMPUTER SYSTEM MANAGEMENT PLANNING & MAINTENACE
Solution-based diagnostics, that test for known failure modes by identifying if their
known symptoms are detected.
Architectures
Single-purpose diagnostic, also referred to as "Defined-purpose" diagnostic, such as
a program that validates the Windows DirectX configuration
Multi-purpose diagnostic, a monolithic program that performs multiple tasks that
may or may not be suitable for all uses. This would be similar to a hammer that will
perform well with nails, less so with screws, and poorly with nuts and bolts.
Modular diagnostic, which combines sets of single-purpose diagnostics into an
environment that is easily tailored for particular requirements.
Knowledge-Driven diagnostic system (such as a technician or diagnostician) where
the knowledge acquired over time is used as a "mental model" of the system's
operation and informs the diagnostic system through logical reasoning to one or more
possible or likely causes for a situation to exist.
Diagnostic tools
Computer manufactures supply special diagnostic programs. These programs contain test
routines to verify the various functions of the computer hardware. Running these programs helps
one to decide whether the hardware is faulty or not. In order to verify the presence of intermittent
problems, it is necessary to run the diagnostics multiple times. These test programs very often
help us to confirm whether a problem in a computer is related to hardware or software. If
diagnostic programs run successfully without pointing out any problems, then the chance of a
hardware fault is remote. But there are two exceptions to this:
- Intermittent problems may play a hide and seek
- Some problems may be too complex to be detected by simple diagnostic programs. These
faults may occur only when several subsystems work simultaneously.
Unless diagnostic programs simulate the above two situations, then faults may not be caught by
the diagnostics programs. The Software routines that test hardware components (memory,
keyboard, disks, etc.) diagnostics are often stored in ROM chips and activated on startup.
Computer errors can occur due to either hardware or software issues and often requires time
consuming trial-and-error troubleshooting to diagnose. The diagnostic tools cover the usual
culprits such as memory, hard drives, video cards and software, allowing you to pinpoint the
source of your computer troubles. In instances where the tools cannot outright repair the errors,
the information provided can be key to determining what has to be replaced. Your desktop
computer comes with several sophisticated diagnostic programs. Technicians use these tools to
find the causes of erratic behavior in the computer, slow operation and other problems. The
POST , Check Disk, Task Manager, Windows Defender, Drivers these programs consist of
software that is built into hardware drivers and components of the Windows operating system.
Professor Jajati Mallick , Dept. CSE, PSET, manadiakudar, Rourkela 2017 Page 61
COMPUTER SYSTEM MANAGEMENT PLANNING & MAINTENACE
by firmware or software routines immediately after a computer or other digital electronic device
is powered on. The results of the POST may be displayed on a panel that is part of the device,
output to an external device, or stored for future retrieval by a diagnostic tool. Since a self-test
might detect that the system's usual human-readable display is non-functional, an indicator lamp
or a speaker may be provided to show error codes as a sequence of flashes or beeps. In addition
to running tests, the POST process may also set the initial state of the device from firmware.
Most computer peripherals are themselves special-purpose computers. Devices such as printers,
scanners, cameras and USB flash drives have internally stored firmware; some devices may also
permit field upgrading of their firmware.
- Firmware is programming that's written to a hardware device's nonvolatile memory.
- Firmware, which is added at the time of manufacturing, is used to run user programs on
the device and can be thought of as the software that allows hardware to run. Hardware
makers use embedded firmware to control the functions of various hardware devices and
systems, much like a computers operating system (OS) controls the function of software
applications.
- Firmware may be written into read-only memory (ROM), erasable programmable read-
only memory (EPROM) or flash memory. Firmware that is embedded in flash memory chips
can be updated easier than firmware written to ROM or EPROM, which makes it more
adaptable.
- Firmware updates are often issued to fix bugs, roll out new features and improve security.
Professor Jajati Mallick , Dept. CSE, PSET, manadiakudar, Rourkela 2017 Page 62
COMPUTER SYSTEM MANAGEMENT PLANNING & MAINTENACE
Professor Jajati Mallick , Dept. CSE, PSET, manadiakudar, Rourkela 2017 Page 63
COMPUTER SYSTEM MANAGEMENT PLANNING & MAINTENACE
Adhoc techniques of troubleshooting dont always help an engineer. Systematic trouble shooting
is a logical approach. It is a scientific and analytical process. The systematic troubleshooting
approach can be divided into the following steps:
- Symptom observation
- symptom analysis
- fault diagnosis
- Fault Rectification
(I) Symptom observation
The first step in troubleshooting a system or peripheral is observing all the symptoms caused by
the fault in the system. For some problems, especially for problems due to multiple faults, it will
be impossible to locate the exact fault or it will take a long time & thus the downtime will be
increased. The time spent on symptoms observation in turn will yield proportional return during
fault locating. Clean mind and concentration is essential while troubleshooting a problem.
Certain complex problems can be understood only if the engineer has an overall idea of the
system functioning of various software routines and sequences performed by POST, BIOS and
OS.
(II) Symptom analysis
A careful analysis of the symptoms will give a clue to the fault location process. When there are
multiple symptoms the engineers should try to correlate the various symptoms to identify the
problem. If any relationship or clue is found, several steps can be skipped during fault location,
thereby reducing the downtime considerably. In cases where there is no interrelation between the
symptoms of a problem, the engineer should proceed with the fault location, without wasting
time in attempting to establish the relationship. If multiple faults are present, then we may be
minted by mixed symptoms. It is difficult to predict the presence of multiple faults. Two
probable clues are
- Symptoms are not consistent but keep changing
- Certain symptoms vanish suddenly
Troubleshooting a system with multiple faults is a tough task. We may have to repeat the test
multiple times. Once multiple fault is suspected, one should be strictly systematic.
Professor Jajati Mallick , Dept. CSE, PSET, manadiakudar, Rourkela 2017 Page 64
COMPUTER SYSTEM MANAGEMENT PLANNING & MAINTENACE
Professor Jajati Mallick , Dept. CSE, PSET, manadiakudar, Rourkela 2017 Page 65
COMPUTER SYSTEM MANAGEMENT PLANNING & MAINTENACE
Collision
Collision is the effect of two devices sending transmissions simultaneously in Ethernet. When
they meet on the physical media, the signals from each device collide and damaged. Collision
domain is the group of devices that share same collision effects over the Ethernet network. It is a
mechanism of removing collision from network. When two or more nodes simultaneously sense
the wire and found no signals, and each device places its signal on the wire. These signals
would be collide in wire and a collision will occur.
Before placing any signal in wire, NIC (Network Interface Card) examines wire for any
existing signal. This method is known as CS (Carrier Sense). If two NICs sense wire on exactly
same time and see no signal then both will place their signals in wire. This is known as MA
(Multiple Access). If the NICs see a collision for their transmitted signals, they have to resend
the signals. In this situation, each NIC that was transmitting a frame when a collision occurred
creates a special signal, called a jam signal, on the wire, waits a small random time period, and
examine the wire again. If there is no signal in the wire, NIC will retransmit its original signals
again.
Professor Jajati Mallick , Dept. CSE, PSET, manadiakudar, Rourkela 2017 Page 66
COMPUTER SYSTEM MANAGEMENT PLANNING & MAINTENACE
The more devices you place on a segment, the more likely you are going to experience the
collisions. More devices means more random time interval, creating even more collisions,
gradually slowing down a devices access when trying to transmit the data.
6.2 Networking Interconnection Devices
. Hub
.Switch
. Router
6.2.1 Hub
Hub is a device works on the physical layer of OSI Models which create single broadcast
domain & single collision domain. It is a layer 1 device. Hub use the method of Broadcast data
transmission.
Characteristics of HUB:-
1) Hub creates single Broadcast Domain.
2) Hub creates single Collision Domain.
HUB is used to connect multiple computers in a single workgroup LAN network. Typically
HUBs are available with 4,8,12,24,48 ports. Based on port type, there are two types of HUB:-
Ethernet HUB :- In this type of HUB all ports have RJ-45 connectors.
Combo HUB :- In this type of HUB ports have several different types of connectors such RJ-45,
BNC, and AUI. HUBs generally have LED (light-emitting diode) indicator lights on each port to
indicate the status of link, collisions, and other information. To understand the functionality of
hub lets take an example from real life.
` There are four friends who share everything. One of them finds a photo of
Amitabh Bachchan. To share this with friends, he will make three photo copies from Xerox
machine and give one copy to each friend. He doesnt need a copy of photo for hi mself as he
has the original one. Now change the characters in this example. Replace friends with HUBs
port, photo with data signal and Xerox machine with HUB. There is a HUB which has four ports.
Ports share everything. One port received data signal from its connected device. It will make
three copies of data signal from HUB and give one copy to each port. Receiver port doesnt
need a copy of data signal for itself as it has it the original version. When a hub receives signal
Professor Jajati Mallick , Dept. CSE, PSET, manadiakudar, Rourkela 2017 Page 67
COMPUTER SYSTEM MANAGEMENT PLANNING & MAINTENACE
on its port, it repeats the signal and forwards that signal from all ports except the port on which
the signal arrived. There are two types of HUB
Passive HUB :- It forwards the data signal from all ports except the port on which signal arrived.
It doesnt interfere in data signal.
Active HUB :- It also forwards the data signal from all ports except the port on which signal
arrived. But before forwarding, it improves quality of data signal by amplifying it. Due to this
added features active HUB is also known as repeaters.
Usually HUB has one or more uplink ports that is used to connect it with another HUB.
Right cable type is required to connect two HUBs. Logically HUB creates a star topology where
it sits in the center of the topology and all connected systems stays at the points of the star.
Physically HUB creates a bus topology where all connected systems share the same bus
connection. There are two similar devices to HUB, MAU and PatchPanel.
6.2.2 Switch
Switch is a device works on the Data Link Layer of OSI Models which create single broadcast &
multiple collision domains. It is a layer 2 device & works on MAC address. Switch use the
method of Unicast data transmission. Switch maintain a table which called MAC Address Table.
In this table switch store Mac Address & Port no. of all the hosts attached on this network. Thats
why Switch is more intelligent.Switch stores the MAC table in a IC (integrated chip) called
ASIC (Application Specific Integrated Circuit).
Characteristics of SWITCH:-
1) Switch create single Broadcast Domain.
2) Switch create multiple Broadcast Domain.
Switch is also used to connect multiple computers together in a LAN segment. Switches
available with 4,8,12,24,48,64 ports. Each switch port has a separate collision domain. Switch
works at layer two in OSI Layer model. At layer two data signals are formatted in frames. When
a switch receives frame, it checks FCS (Frame checksum sequence) field in it. Switch process
the frame only if it is valid. All invalided frames are automatically dropped. All valid frames are
processed and forwarded to their destination MAC address. Switch makes their switching
decisions in hardware by using application specific integrated circuits (ASICs). Unlike generic
processor such as we have in our PC, ASICs are specialized processors built only to perform
very few particular tasks. In cisco switch ASICs has single task, switch frames blazingly fast. For
example an entry level catalyst 2960 switch has frame rate of 2.7 million frames per second.
Higher end switches have higher FPS rate such as Catalyst 6500 has a rate of 400 million FPS
rate Switches support three methods of switching.
1. Store and Forward
2. Cut and Through
3. Fragment Free
Store and Forward
This is the basic mode of switching. In this mode Switch buffers entire frame into the memory
and run FCS (Frame Check Sequence) to ensure that frame is valid and not corrupted. A frame
less than 64bytes and higher than 1518bytes is invalid. Only valid frames are processed and all
Professor Jajati Mallick , Dept. CSE, PSET, manadiakudar, Rourkela 2017 Page 68
COMPUTER SYSTEM MANAGEMENT PLANNING & MAINTENACE
invalid frames are automatically dropped. Among these three methods, this method has highest
latency. Latency is the time taken by device in passing frame from it.
Cut and Through
Cut and Through method has lowest latency. In this method Switch only read first six bytes from
frame after the preamble. These six bytes are the destination address of frame. This is the fastest
method of switching. This method also process invalid frames. Only advantage of this method is
speed.
Fragment Free
This is a hybrid version of Store and Forward method and Cut and Through method. It takes
goodies from both methods and makes a perfect method for switching. It checks first 64 bytes of
frame for error. It processes only those frames that have first 64bytes valid. Any frame less than
64 bytes is known as runt. Runt is an invalid frame type. This method filters runt while
maintaining the speed.
6.2.3 Router
Router is a device works on the Network Layer of OSI Models which creates no Broadcast
Domain & Collaisen Domain. Router prevent Broadcast. It is a Layer 3 device works on IP
Address.
Router has mainly 2 types of interface.Ethernet or LAN interface & Serial or WAN
interface.
Router maintain a table called Routing Table. It holds the Information of IP Addresses,
Interface & HOP of all the hosts connected to this network.HOP means jump. How many router I
have to jump to go to the recipient that is HOP. Basically routers are used :-
- To connect different network segments.
- To connect different network protocols such as IP and IPX.
- To connect several smaller networks into a large network (known as internetwork)
- To break a large network in smaller networks (Known as subnet usually created to improve
the performance or manageability)
- To connect two different media types such as UTP and fiber optical.
- To connect two different network architectures such as token ring and Ethernet.
- To connect LAN network with Telco companys office (Known as DTE device).
- To access DSL services (known as DSL Router).
Professor Jajati Mallick , Dept. CSE, PSET, manadiakudar, Rourkela 2017 Page 69
COMPUTER SYSTEM MANAGEMENT PLANNING & MAINTENACE
Professor Jajati Mallick , Dept. CSE, PSET, manadiakudar, Rourkela 2017 Page 70
COMPUTER SYSTEM MANAGEMENT PLANNING & MAINTENACE
- Category 6: High-performance UTP cable that can transmit data up to 10Gbps. Category 6 has a
minimum of 250MHz of bandwidth and specifies cable lengths up to 100 meters with
10/100/1000Mbps transfer, along with 10Gbps over shorter distances. Category 6 cable
typically is made up of four twisted pairs of copper wire, but its capabilities far exceed those
of other cable types. Category 6 twisted pair uses a longitudinal separator , which separates
each of the four pairs of wires from each other. This extra construction significantly reduces
the amount of crosstalk in the cable and makes the faster transfer rates possible.
- Category 6a: Also called augmented 6. Offers improvements over Category 6 by offering a
minimum of 500MHz of bandwidth. It specifies transmission distances up to 100 meters with
10Gbps networking speeds.
Professor Jajati Mallick , Dept. CSE, PSET, manadiakudar, Rourkela 2017 Page 71
COMPUTER SYSTEM MANAGEMENT PLANNING & MAINTENACE
of all cable media. Anyone trying to access data signals on a fiber-optic cable must
physically tap into the medium. Given the composition of the cable, this is a particularly
difficult task.
Two types of fiber-optic cable are available:
- .Multimode fiber : Many beams of light travel through the cable, bouncing off the cable
walls. This strategy actually weakens the signal, reducing the length and speed at which the
data signal can travel.
- Single-mode fiber: Uses a single direct beam of light, thus allowing forgreater distances and
increased transfer speeds.
NETWORK CABLE
STRAIGHT CABLE:-
END 1 END 2
1) BLUE 1) BLUE
2) GREEN 2) GREEN
3) BROWN 3) BROWN
4) ORANGE 4) ORANGE
5) BLUE on WHITE 5) BLUE on WHITE
6) GREEN on WHITE 6) GREEN on WHITE
7) BROWN on WHITE 7) BROWN on WHITE
8) ORANGE on WHITE 8) ORANGE on WHITE
Straight cable is used to connect pc to hub, pc to switch, router to hub through
Ethernet & router to switch through Ethernet.
CROSS CABLE:-
END 1 END 2
1) ORANGE 1) GREEN
2) BLUE 2) BROWN
3) GREEN 3) ORANGE
4) ORANGE on WHITE 4) ORANGE on WHITE
5) BLUE on WHITE 5) BLUE on WHITE
6) BROWN 6) BLUE
7) GREEN on WHITE 7) GREEN on WHITE
8) BROWN on WHITE 8) BROWN on WHITE
It is used for to connect pc to pc, hub to hub, switch to switch, switch to hub, router to
router through Ethernet.
Professor Jajati Mallick , Dept. CSE, PSET, manadiakudar, Rourkela 2017 Page 72
COMPUTER SYSTEM MANAGEMENT PLANNING & MAINTENACE
END 1 END 2
A variety of connectors are used with the associated network media. Media connectors attact tp
the media and allow the physical connection into computing device. Many of the fiber and the
copper networks are used for sending data from the one place of the world to the corner of it.
There are so many connections are out there which are most commonly found in the modern era.
These connectors have some specific cables as well. The cables that we use at the homes are
important since they might be the base of the connection that is being used. When the house is
being build, and the networking is being selected from the scratch, it is very vital to know that
the cables selected are of the right type so that no difficulty can be seen in the future. Here are
some connectors and the cables which have some specific characteristics;
(I) BNC connectors are associated with coaxial media and 10Base2 networks. BNC
connectors are not common as they once were, but they still are used on some
network cards and older hubs. Common BNC connectors include a barrel connector,
T-connector and terminator.
(II) When one starts working with the fiber, he would notice that it contains many types.
There are various kinds of the connectors which are connected at the end of the
cables. They are mentioned as Connectors: SC, ST and LC: The ST uses a half-twist
bayonet type of lock. The SC uses a push-pull connector similar to common audio
and video pulgs and sockets. The LC connectors have a flange on top, similar to an
RJ-45 connector, that aids secure. MT-RJ is a popular connector for two fibers in a
very small factor.
(III) It is pretty obvious that if one decides to do all the cabling himself, he would have a
different way of doing it than others. Hence one can face many problems while doing
so. Due to that reasons, there are some standards which have been created and linked
to the devices so everyone follows the same. Some of them are associated to the
twisted pair cabling. These are; Connectors: RJ-11, RJ-45: there are two connectors
which are associated to the twisted cables. RJ (Registered jack)-11 connectors are
Professor Jajati Mallick , Dept. CSE, PSET, manadiakudar, Rourkela 2017 Page 73
COMPUTER SYSTEM MANAGEMENT PLANNING & MAINTENACE
small plastic connectors used on telephone cables. They have capacity for six small
pins. The RJ-45 connectors are used with twisted-pair cabling and have capacity for
eight small pins.
(IV) F-type connectors are screw-on connections used to attach coaxial cable to devices.
This includes RG-59 and RG-6 cables. F-type connectors are commonly associated
with connecting Internet modems to cable or satellite Internet service providers
(ISPs) equipment.
Professor Jajati Mallick , Dept. CSE, PSET, manadiakudar, Rourkela 2017 Page 74
COMPUTER SYSTEM MANAGEMENT PLANNING & MAINTENACE
Appendix A
Professor Jajati Mallick , Dept. CSE, PSET, manadiakudar, Rourkela 2017 Page 75
COMPUTER SYSTEM MANAGEMENT PLANNING & MAINTENACE
Professor Jajati Mallick , Dept. CSE, PSET, manadiakudar, Rourkela 2017 Page 76
COMPUTER SYSTEM MANAGEMENT PLANNING & MAINTENACE
Professor Jajati Mallick , Dept. CSE, PSET, manadiakudar, Rourkela 2017 Page 77
COMPUTER SYSTEM MANAGEMENT PLANNING & MAINTENACE
Professor Jajati Mallick , Dept. CSE, PSET, manadiakudar, Rourkela 2017 Page 78