Professional Documents
Culture Documents
CSS CORE UNIT 4
CSS CORE UNIT 4
LEARNING OUTCOME NO. 1: PLAN AND PREPARE FOR MAINTENANCE AND REPAIR
LEARNING OUTCOME NO.2: MAINTAIN COMPUTER SYSTEMS & NETWORKS
LEARNING OUTCOME NO.3: DIAGNOSE FAULTS OF COMPUTER SYSTEMS AND
NETWORKS
LEARNING OUTCOME NO. 4: RECTIFY/CORRECT DEFECTS IN COMPUTER SYSTEMS AND
NETWORKS
LEARNING OUTCOME NO. 5: INSPECT AND TEST THE COMPUTER SYSTEMS AND
NETWORKS
1
Information Sheet 4.1-1
TOOLS, EQUIPMENT AND TESTING DEVICES
Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to be
1. Familiar with the following Tools, Equipment and Testing Devices
and its functions.
Introduction:
2
A wrench is a tool used to provide grip
and mechanical advantage in applying
torque to turn objects—usually rotary
fasteners, such as nuts and bolts—or
keep them from turning.
II. EQUIPMENT
3
III. TESTING DEVICES
IV. MATERIALS
4
An electrical connector is an electro-
mechanical device for joining electrical
circuits as an interface using a
mechanical
assembly. Connectors consist of plugs
(male-ended) and jacks (female-ended).
Self-Check 4.1-1
Matching Type
Instruction: Match Column A with Column B that correspond to the correct
answer. Write the letter of the correct answer on the space provided.
Column A Column B
Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to be:
1. Familiar with the Occupational Health and Safety Procedures for
Computer Systems Servicing NC II.
Introduction:
Occupational Health and Safety during Disassembling of PC
1. Observe ESD (Electrostatic Discharge).
2. Always use an anti-static wrist strap.
3. Document everything.
4. Switch off the computer.
5. Remove the cables from the back of the case.
6. Be sure to have a container to keep the screws.
7. Place all components when remove in anti-static bags or anti-static mat.
8. Make sure you have all the tools, resource material, drivers or software that you
need.
9. Do a full System Backup.
10. Use common
sense.
Electro-static Discharge
• It is the transfer of
an
electrostatic charge between two objects. This is a very rapid event that happens
when two objects of different potentials come into direct contact with each other.
• is one of the few things an individual can do to damage or destroy his or her
computer or hardware components
• ESD can occur when working in your computer and will
cause components you touch to no longer work
properly.
Anti-static Wrist Strap
6
• The antistatic wrist strap prevents static electricity from building up. Static electricity
can electronically destroy many of the delicate components inside the computer.
• An antistatic wrist strap should be worn any time work is being done inside the
computer.
Anti-static Bag
• A bag that has been specially designed to help
prevent static electricity inside the bag.
• It is important to remember that only the inside
of an antistatic bag is protected, placing a
hardware device on top of the bag and not
inside of the bag will not protect it. In fact it is
often more harmful to place an electrostatic
sensitive device on top of the bag.
Anti-static Mat
• Also known as a grounding mat.
• It is a floor or table mat used to help reduce the risk
of electrostatic discharge while working on a
computer or other electrostatic sensitive object.
How to help prevent ESD
The best method of preventing ESD is to use an ESD wrist
strap and/or use a grounding mat. However, because most
users do not have access to such items, there are steps to
help reduce the chances of ESD as much as possible.
1. Zero Potential - Most importantly, make sure you and the computer are at Zero
Potential by continuously touching an un-painted metal surface of the chassis or
the computer power supply case.
2. Standing - It is also very important that you are standing at all times when working
on the computer. Setting on a chair can generated more electrostatic.
3. Cords - Make sure everything is removed from the back of the computer (power
cord, mouse, keyboard, etc.).
4. Weather - Electrical storms can increase the ESD risk; unless absolutely necessary,
try not to work on a computer during an electrical storm.
5. Accessories - To help reduce ESD and help prevent other problem, it is also a good
idea to remove all jewellery.
Self-Check 4.1-2
True or False
Instruction: Identify if the following statements are True or False. Write T if
the statement is True and F otherwise, on the space provided.
1. ESD can occur when working in your computer and will
cause components you touch to no longer work properly.
2. Static electricity may not electronically destroy many of the
delicate components inside the computer.
3. Setting on a chair does not generate more electrostatic. So it
is fine take a seat at all times when working on the
computer.
4. Electrical storms can increase the ESD risk.
7
5. The outside of an antistatic bag is also protected, so placing
a hardware device on top of the bag can also protect it.
6. To help reduce ESD and help prevent other problem, it is
also a good idea to remove all jewellery.
7. It is fine not to document everything as long as you
remember the tasks you have been doing.
8. An antistatic wrist strap may not be worn any time work is
being done inside the computer. Provided steps to reduce
ESD are observed.
9. Make sure everything is removed from the back of the
computer (power cord, mouse, keyboard, etc.).
10. Zero Potential can be done by continuously touching the
painted metal surface of the chassis or the computer power
supply case.
Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to be:
1. Familiar with the different Computer Systems and Network
Procedures for Computer Systems Servicing NC II.
2.
Introduction:
9
run your server. Low resources can cause slow performance and possible corruption
of files and applications. Take appropriate actions as needed.
7. Physical checks of the systems hardware and connections – Visually check the
equipment for any alarms, inoperative lights, and other malfunctions that could
inhibit proper performance.
8. Protect Files against possible deletion – Activate “Shadow Copies of Shared Folders”
to automate the retention and protection of files on a server. This service restores
files that have been deleted or overwritten preventing you from having to reload
backup copies.
Weekly
1. Keep the server system updated – Download and install the “Windows Server
Updated Services.” This service downloads security and performance updates. It
also allows you to manage, test, distribute and install these updates.
2. Keep User Rights Updated – Run the “Active Directory Certificate Services” role to
configure, maintain and manage user access rights as needed. This is important if
you frequently have employment turnover.
3. Perform and/or verify weekly backups.
4. Update anti-virus signature files to keep current protection.
5. Run anti-virus scan to detect and remove any malware that may have been
transmitted to the server.
6. Run file system integrity diagnostics to detect any system problems and repair them
before a shutdown becomes necessary.
7. Check for unnecessary services that are running and may cause server interruption.
Cables / Connectors Maintenance
One of the most common causes of computer problems is that a connector comes loose. In
order to troubleshoot, check all the cables on the outside of the computer. If you find all of
those in place, you may want to check the cables on the inside of your computer.
Two types of cables are inside the console: power and data. Some devices, like disk drives,
require both.
To ensure that cables are properly attached, follow these steps:
1. Taking Inventory of Your Components
2. Open the console.
3. Locate the spot where the cable attaches.
4. Give the cable a little tug.
5. If the cable is loose, it falls out. If it does, reattach it.
6. Gently press the cable so that it’s snugly attached.
7. Cables have two ends. You need to check both ends
Self-Check 4.1-3
Part I. Multiple Choice
Instruction: Read the questions below carefully. Encircle the correct letter
which represents the best answer
1. Composed in different many forms. Most internal drives are regular IDE hard
drives that come with the computer. A removable drive is another popular
storage device.
a. Electrical Connector b. Compact Disc
10
c. Crimping Tool d. Computer Storage Media
2. It is a tool used to provide grip and mechanical advantage in applying torque to
turn objects.
a. Wrench c. Screwdriver
b. Pliers d. Wire Strip
3. A hand tool used to hold objects firmly. They are also useful for bending and
compressing a wide range of materials.
a. Wrench c. Screwdriver
b. Pliers d. Crimping Tool
4. A bag that has been specially designed to help prevent static electricity inside the
bag.
a. Anti-static Mat c. Anti-static Bag
b. Anti-static Pouch d. Electro-static Discharge
6. It is a floor or table mat used to help reduce the risk of electrostatic discharge
while working on a computer or other electrostatic sensitive object.
a. Anti-static Floor c. Anti-static Room
b. Anti-static Mat d. Anti-static Table
8. It supplies heat to melt solder so that it can flow into the joint between two work
pieces.
a. Electronic Stand c. Soldering Lead
b. Soldering Metal d. Soldering Iron
10. A device used to conjoin two pieces of metal by deforming one or both of them in
a way that causes them to hold each other.
a. Wire Stripper c. Pliers
b. Crimping Tool d. LAN Cable Tester
11. Is used to verify that all of the intended connections exist and that there are no
unintended connections in the cable being tested.
a. Crimping Tool c. Wire Stripper
b. Computer Storage Media d. LAN Cable Tester
13. A small, hand-held device used to strip the electrical insulation from electric
wires.
a. Electrical Connector c. Soldering Iron
b. Crimping Tool d. Wire Stripper
14. It is a small, portable, round medium used electronically for recording, storing,
and playing back audio, video, text, and other information in digital form.
a. Compact Disc c. USB Flash Drive
b. Computer Storage Media d. Tape Recorde
12
Part II. Enumeration
Instruction: Give the 10 Occupational Health and Safety Procedures to be
followed when disassembling PC.
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
13
Part IV. Modified True or False
Instruction: Identify if the underlined words are True or False. Write T if the
statement is True, otherwise write the correct answer, on the space
provided.
_______________ 1. Warning logs can include errors for both software and
hardware failures that need to be addressed before they
become big problems.
_______________ 2. Shadow Copies of Shared Folders service restores files
that have been deleted or overwritten preventing you
from having to reload backup copies.
_______________ 3. To truly get a handle on wire wreckage, set aside ten or
fifteen minutes to shut down and plug everything.
_______________ 4. Be sure to check for unnecessary services that are
running and may cause server interruption.
_______________ 5. Preventive maintenance saves time and money,
improves performance, and helps to safeguard
important data files.
_______________ 6. Each program that you have installed, but eventually
did not use, does not take up memory and processing
time, so cleaning out your system will make some room
for new programs and speed up your computer.
_______________ 7. If you are a Microsoft user, you can go to Windows
Update site to scan your system and install updates.
_______________ 8. Even if you, your friends, and your family treat your
screen right, monitors sometimes find a way to gather
dust nonetheless.
_______________ 9. Electro-static discharge makes computers a magnet for
dust, dirt, and debris. Thus, cleaning the computer and
keyboard is necessary.
_______________ 10. One of the most common causes of computer problems
is that a connector comes tight.
_______________ 11. Make sure that there is sufficient RAM and CPU
resources and hard drive space to adequately run your
server.
_______________ 12. Run anti-virus scan to detect and remove any malware
that may have been transmitted to the server.
_______________ 13. Make sure that Windows Firemail is running to prevent
network intrusions.
_______________ 14. Mainstream programs will safely run as background
processes, protecting your computer whenever you have
it on.
_______________ 15. Windows Server Changed Services downloads security
and performance updates. It allows you to manage,
test, distribute and install these updates.
14
Information Sheet 4.2-1
PROCEDURES IN MAINTAINING NETWORK SYSTEMS
Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Maintain network systems.
INTRODUCTION
1. Reset the modem the Internet has slowed down. Do the same to your router
(if in use). The "Reset" button is usually located at the back of the modem or router. Reboot
all the computers in the network.
2. Use the “Disk Defragmenter” feature in Windows. This feature is designed to
rearrange and organize files in your computer. To do this, navigate to the “Start” menu and
then select “All Programs.” Click on “Accessories” and choose “System Tools” from the
options. Select “Disk Defragmenter” and click on the computer drive to commence the
process.
3. Perform a “Disk Cleanup.” Navigate again to “System Tools” (see Step 2), but
this time choose “Disk Cleanup.” Select the drive you want to clean up and then click “OK.”
If the computer has several drives, repeat the process until all drives are cleaned.
4. Clean the registry. Because the registry is a delicate and essential part of the
operating system, you will need third party software to perform this procedure. Download a
registry cleaner such as “Wise Registry Cleaner” or “Abexo Free Registry Cleaner.” Install the
software to the computer and proceed to the cleaning process.
5. Delete temporary files and browsing history that you no longer need,
because they eat much of the disk space when not deleted. To do this, open your web
browser and delete your Internet history by accessing the “Tools” menu and then “Internet
Options” or “Options.”
6. Scan the computers for viruses using a trusted and reliable anti-virus
software such as Norton, AVG or McAfee. Delete, heal or quarantine viruses that may be
hindering the computer from performing to its optimum level.
7. Inspect the Ethernet cables that connect the computers to the network. If
one computer cannot detect an Internet connection, it may be because of malfunctioning or
faulty cables.
15
Self-Check 4.2-1
Directions:
1.
2.
3.
4.
5.
SAFETY MEASURES
Learning Objective:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Observe safety measures.
2. Know the classifications of Safety Measures.
Introduction:
These Safety Measures apply to anyone who accesses, uses, or controls University
computer and data resources, including, but not limited to faculty, administrators, staff,
students, those working on behalf of the University, guests, tenants, contractors,
consultants, visitors, and/or individuals authorized by affiliated institutions and
organizations.
Scope of these Measures
These Measures are applicable to a wide variety of IT resources which are connected
to NYU-NET or are used for any NYU business purpose. A system (see "Definitions," below)
16
may be any IT resource to which the safeguards outlined in these Safety Measures may be
applied. Examples of systems include, but are not limited to:
• Desktop, laptop, or server computers running general purpose operating
systems such as Windows, Mac OS, and Unix
• Mobile devices, such as PDAs and cell phones, to the extent that they interact
with NYU resources, such as E-mail
• Network server applications, such as an FTP-server application
• Web applications, such as a wiki
• Databases
All of the above systems may perform their own authentication and authorization,
logging and auditing, and have their own configurations which must be managed, and each
of them are a considered a compliance object to be safeguarded.
A. Basic System Safety Measures
These Basic System Safety Measures apply to all systems at NYU, regardless of the level of
their System Classification (see "Definitions," below). It is a baseline, which all systems
must meet. Note that for most personal workstations, these are the only measures that
apply. The requirements are:
1. Password Protection: All accounts and resources must be protected by passwords which
meet the following requirements, which must be automatically enforced by the system:
a. Must be at least eight characters long.
b. Must NOT be dictionary or common slang words in any language, or be
readily guessable.
c. Must include at least three of the following four characteristics, in any order:
upper case letters, lower case letters, numbers, and special characters, such
as *!@#$%^&*.
d. Must be changed at least once per year.
2. Software Updates: Systems must be configured to automatically update operating
system software, server applications (webserver, mailserver, database server, etc.),
client software (web browsers, mail clients, office suites, etc.), and malware protection
software (antivirus, anti-spyware, etc). For Medium or High Availability systems, a plan
to manually apply new updates within a documented time period is an acceptable
alternative.
3. Firewall: Systems must be protected by a firewall that allows only those incoming
connections necessary to fulfill the business need of that system. Client systems which
have no business need to provide network services must deny all incoming connections.
Systems that provide network services must limit access to those services to the smallest
reasonably manageable group of hosts that need to reach them.
4. Malware Protection: Systems running Microsoft or Apple operating systems must have
antivirus and anti-spyware software installed and it must be configured to automatically
scan and update.
B. Intermediate System Safety Measures
These Intermediate System Safety Measures define the security measures that must be
applied to Medium Criticality and High Criticality systems. Note that except under special
circumstances, they do not apply to desktop and laptop computers. The requirements are:
1. Authentication and Authorization
17
a. Remove or disable accounts upon loss of eligibility: Accounts which are no
longer needed must be disabled in a timely fashion using an automated or
documented procedure.
b. Separate user and administrator accounts: Administrator accounts must not
be used for non-administrative purposes. System administrators must be
provisioned with non-administrator accounts for end-user activities, and a
separate administrator account that is used only for system-administration
purposes.
c. Use unique passwords for administrator accounts: Privileged accounts must
use unique passwords that are not shared among multiple systems.
Credentials which are managed centrally, such as the NetID/password
combination, are considered a single account, regardless of how many
systems they provide access to.
d. Throttle repeated unsuccessful login-attempts: A maximum rate for
unsuccessful login attempts must be enforced. Account lockout is not
required, but the rate of unsuccessful logins must be limited.
e. Enable session timeout: Sessions must be locked or closed after some
reasonable period.
f. Enforce least privilege: Non-administrative accounts must be used whenever
possible. User accounts and server processes must be granted the least-
possible level of privilege that allows them to perform their function.
2. Audit and Accountability
g. Synchronize system clock: The system clock must be synchronized to an
authoritative time server run by NYU (currently tick.nyu.edu and
tock.nyu.edu) at least once per day.
h. Enable system logging and auditing: The facilities required to automatically
generate, retain, and expire system logs must be enabled.
i. Follow an appropriate log retention schedule: System logs must be retained
for 30-90 days and then destroyed unless further retention is necessary due
to legal, regulatory, or contractual requirements.
j. Audit successful logins: Generate a log message whenever a user successfully
logs in.
k. Audit failed login attempts: Generate a log message whenever a user
attempts to log in without success.
l. Audit when a system service is started or stopped: Generate a log message
when a system service is started or stopped.
m. Audit serious or unusual errors: Generate a log message when a serious or
unusual error occurs, such as crashes.
n. Audit resource exhaustion errors: Generate a log message when a resource
exhaustion error occurs, such as an out-of-memory error or an out-of-disk
error.
o. Audit failed access attempts: Generate a log message when an attempt to
access a file or resource is denied due to insufficient privilege.
p. Audit permissions changes: Generate a log message when the permissions of
a user or group are changed.
q. Include appropriate correlation data in audit events: For each audit event
logged be sure to include sufficient information to investigate the event,
18
including related IP address, timestamp, hostname, username, application
name, and/or other details as appropriate.
3. Configuration and Maintenance
a. Security partitioning: Systems may share hardware and resources only with
other systems that have similar security requirements, regardless of
their Criticality classification. Systems which share similar security
requirements have user communities of similar size and character, similar
firewall profiles, and similar technical requirements. For example:
i. Multiple systems of the same Criticality may be aggregated together
to share hardware and resources provided they have similar security
requirements.
ii. Medium Criticality systems may share hardware and resources
with Low Criticality systems provided that all systems meet
these Intermediate Systems Safety Measures, and share similar
security requirements.
b. Follow vendor hardening guidelines: This document cannot be
comprehensive for all systems available. Follow basic vendor
recommendations to harden and secure systems.
c. Disable vendor default accounts and passwords: Many systems come with
default accounts which are publicly known. These accounts should be
disabled.
d. Disable all unnecessary network services: Processes and services which are
not necessary to complete the function of a system must be disabled.
4. Additional Requirements
a. Report potential security incidents: Potential security incidents must be
reported to ITS Technology Security Services: security@nyu.edu.
b. Security review: During the design of the technical architecture, a review of
the system must be requested from ITS Technology Security Services.
c. Vulnerability assessment: Before system deployment, a vulnerability
assessment must be requested from ITS Technology Security Services.
d. Physical access: The system must reside in a locked facility, to which only
authorized personnel have access.
e. Documentation: Create and maintain documentation summarizing the
business process, major system components, and network communications
associated with a system.
C. Advanced System Security Measures
These Advanced System Security Measures define the security measures that must be
applied to High Criticality systems. The requirements are:
1. Audit and Accountability
a. Enable process auditing or accounting: Enable process auditing or
accounting, which generates log information about the creation of new
processes and their system activity.
b. Audit privilege escalation or change in privilege: Generate a log message
whenever a user changes their level of privilege.
c. Audit firewall denial: Generate a log message when the host-based firewall
denies a network connection.
d. Audit all significant application events: Log all significant application events.
19
e. Write audit events to a separate system: System logs must be written to a
remote system in such a way that they cannot be altered by any user on the
system being logged.
2. Configuration and Maintenance
a. Follow advanced vendor security recommendations: This document cannot
be comprehensive for all systems and applications available. Conform to best
practices and recommendations outlined in vendor security whitepapers and
documentation.
b. Host-based and network-based firewalls: Systems must be protected by
both a host-based and a network-based firewall that allows only those
incoming connections necessary to fulfill the business need of that system.
c. Configuration management process: Configuration changes must be
regulated by a documented configuration and change management process.
d. Partitioning: Systems may share hardware and resources only with other
systems that have similar security requirements, regardless of
their Criticality classification. Systems which share similar security
requirements have user communities of similar size and character, similar
firewall profiles, and similar technical requirements. For example:
i. Multiple systems of the same Criticality may be aggregated together
to share hardware and resources provided they have similar security
requirements.
ii. High Criticality systems may share hardware and resources
with Medium and Low Criticality systems provided that all systems
meet these Advanced Systems Security Measures, and share similar
security requirements.
3. Additional Requirements
Physical access: The system must reside in a secured, managed data center.
D. Data Handling Security Measures
These Data Handling Security Measures define the minimum security requirements
that must be applied to the data types defined in the Reference for Data and System
Classification(www.nyu.edu/its/policies/sec_ref.html). Some data elements, such as credit
card numbers and patient health records, have additional security requirements defined
in external standards. In addition, access and use of University data is covered by
the University Data Management Policy (www.nyu.edu/its/policies/datamgmt.html).
Please be sure to consult all appropriate documents when determining the appropriate
measure to safeguard your data.
The best way to safeguard sensitive data is not to handle it at all, and business
processes that can be amended to reduce or eliminate dependence on restricted data
should be corrected. For example, the University ID number can often be substituted for a
social security number and poses much less risk if accidentally disclosed.
1. Requirements for Handling Confidential Data
a. Access control: Access to confidential data must be provided on a least-
privilege basis. No person or system should be given access to the data unless
required by business process. In such cases where access is required,
permission to use the data must be granted by the Data Steward (see
"Definitions," below).
20
b. Sharing: Confidential data may be shared among the NYU community. It may
be released publicly only according to well-defined business processes, and
with the permission of the data steward.
c. Retention: Confidential data should only be stored for as long as is necessary
to accomplish the documented business process.
2. Requirements for Handling Protected Data
a. Access control: Access to protected data must be provided on a least-privilege basis.
No person or system should be given access to the data unless required by business
process. In such cases where access is required, permission to use the data must be
granted by the Data Steward.
b. Sharing: Protected data may be shared among the among University employees
according to well-defined business process approved by the Data Steward. It may be
released publicly only according to well-defined business processes, and with the
permission of the Data Steward.
c. Retention: Protected data should only be stored for as long as is necessary to
accomplish the documented business process.
d. Incident Notification: If there is a potential security incident that may place
protected data at risk of unauthorized access, ITS Technology Security Services must
be notified.
3. Requirements for Handling Restricted Data
a. Collection: Restricted data should only be collected when all of the following
conditions are met:
i. The data is not available from another authoritative source;
ii. The data is required by business process; and
iii. You have permission to collect the data from the appropriate Data
Steward.
b. Access control: Individuals must be granted access to restricted data on a
least-privilege basis. No person or system may access the data unless
required by a documented business process. In such cases where access is
required, permission to use the data must be granted by the Data Steward.
c. Access auditing: Enable file access auditing to log access to files containing
restricted data.
d. Labeling: Portable media containing restricted data should be clearly marked.
e. Sharing: Access to restricted data can be granted only by a Data Steward. No
individual may share restricted data with another individual who has not
been granted access by a Data Steward.
f. Idle access: Devices which can be used to access restricted data must
automatically lock after some period of inactivity, through the use of
screensaver passwords, automatic logout, or similar controls.
g. Transit encryption: Restricted data must be encrypted during transmission
with a method that meets the following requirements.
i. Cryptographic algorithm(s) are listed in FIPS 140-2 Annex A, the list of
approved security functions.
ii. Cryptographic key lengths meet best practices for length, given
current computer processing capabilities.
iii. Both the source and destination of the transmission must be verified.
21
h. Storage encryption: Restricted data must be encrypted using strong, public
cryptographic algorithms and reasonable key lengths given current computer
processing capabilities. Keys must be stored securely, and access to them
provided on a least-privilege basis (see ISO 11568 for recommendations on
securing keys). If one-way hashing is used in lieu of reversible encryption,
salted hashes must be used. Possible encryption scenarios are:
i.
i. Encrypt files containing restricted data using different keys or
passwords than those used for system login.
ii. Encrypt data stored in databases at the column-level.
iii. In addition to file and/or database encryption, implement full-disk
encryption on portable devices containing restricted data.
j. Retention: Restricted data should only be stored for as long as is necessary to
accomplish the documented business process.
k. Destruction: When restricted data is no longer needed it should be destroyed
using methods that are resistant to data recovery attempts such as
cryptographic data destruction utilities, on-site physical device destruction,
or NAID certified data destruction service.
l. Incident notification: If there is a potential security incident which may place
restricted data at risk of unauthorized access, ITS Technology Security
Services must be notified: security@nyu.edu.
Definitions
Data Classification Table: Classifies data types that are commonly used at NYU
according to the impact to the University if they are disclosed without authorization.
Data Steward: Data Stewards are typically operational managers in a functional
area with day-to-day responsibilities for managing business processes and establishing the
business rules for the production transaction systems and are appointed by the respective
Data Trustees. The Data Steward will be responsible for developing an overall data access
plan following the categorization in the Reference for Data and System Classification.
Personal workstations: Personal workstations are typically accessed by a single
person at a time, and do not offer services to multiple account holders. These may be
laptops, desktops, or other portable computing devices, such as PDAs or smart phones.
Server: Servers are systems typically accessed by many remote users concurrently,
via the network services they provide, such as an e-mail server.
System: An information technology resource that can be classified and to which
security controls listed in a Security Measure may be applied. A system may be a
workstation, laptop, server, web application, database, or similar.
System classification: A framework for classifying the relative importance of NYU
systems based on their data processing and availability requirements.
Self-Check 4.2-2
A. Multiple Choice
Direction: Choose the best answer of the given choices. Use a separate sheet of
paper in answering.
22
1. Password characters must be at least
A. 12
B. 8
C. 10
D. 9
2. Create and maintain summary of the business process, major system components, and
network communications associated with a system.
A. Documentation
B. Summarization
C. Communication
D. Association
3. Defines the security measures that must be applied to High Criticality systems.
A. Intermediate System Safety Measures
B. Basic System Safety Measures
C. Advanced System Safety Measures
D. Low-end System Safety Measures
4. Portable media containing restricted data should be clearly marked.
A. Labeling
B. Tagging
C. Marking
D. Naming
5. Systems typically accessed by many remote users concurrently, via the network services
they provide, such as an e-mail server.
A. Netbook
B. Tablet
C. Work Station
D. Server
6. A framework for classifying the relative importance of NYU systems based on their data
processing and availability requirements.
A. Personal Workstations
B. Data Classification
C. System Classification
D. Security Measure
7. Are typically operational managers in a functional area with day-to-day responsibilities for
managing business processes?
A. Data Steward
B. Data Trustees
C. Processor
D. Registrar
8. A notification if there is a potential security incident which may place restricted data at
risk of unauthorized access, ITS Technology Security Services
A. Excess Notification
B. Telegram
C. Mail
D. Incident Notification
9. Define the minimum security requirements that must be applied to the data types
A. Low-end System Safety Measures
B. Basic System Safety Measures
23
C. Data Handling Safety Measures
D. Advanced System Safety Measures
10. Protection that allows only those incoming connections necessary to fulfill the business
need of that system.
A. Password
B. Firewall
C. Anti-virus
D. Workstation
Learning Objective:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Identify and diagnosefaulty systems and cables.
Introduction:
Many of these suggestions are common-sense answers, rather than complex technical
procedures. Don't overlook them; otherwise you can spend hours tracing a circuit or trying to find a
bad connection just because somebody has unplugged a cable.
Remember that a problem that appears in your network might really be located on one of
the computers or other devices connected to the network. In many cases, you will want to look for
problems in the Windows, Macintosh, or Linux/Unix operating system as well as on the network
itself.
Steps on how to diagnose and identify faulty systems and cables:
1. Define the problem
The first step in solving a problem should be to identify the symptoms. Remember that
computers and networks don't break down completely at random. Every piece of information you
can find about a problem can help you isolate and solve it. Is the problem a failure to connect to a
particular computer through the network, or an error message, or a file transfer that takes longer
than usual? Is it limited to a single computer, or does it appear all over the network? Have any of the
lights on your network router, switch, or modem changed color or gone dark? Does the problem
occur when you are using a particular program or only when a certain desk lamp (or vacuum cleaner
24
or any other electrical device) is turned on? As you identify symptoms, make a list—either on paper
or in your mind.
If you see an error message, copy the exact text onto a piece of paper. You might have to
restart the computer or go to another computer to search for information, and you will need the
specific wording of the message. Don't ignore the cryptic code numbers or other apparently
unintelligible information. Even if the message means nothing to you, it could be the key to finding
the help you need.
Sometimes you can identify a pattern in the symptoms. When more than one user reports
the same problem, ask yourself what those users have in common: Are they all trying to use the
printer or connect to the Internet at the same time? Are they connected to the network by Ethernet
cables or Wi-Fi? Does the problem happen at the same time every day?
If you're lucky, defining the problem can tell you enough to fix it. For example, if the Power
LED indicator light on your modem is off, that's a good indication that the power cable is unplugged,
either at the wall outlet or on the modem itself. If everybody has trouble connecting to the Internet
during a rainstorm, maybe water is leaking into the telephone cable that carries your Internet
connection from the utility pole to your house.
More often, your list of symptoms will be a starting point that you can use to search for
more information. As you analyze the problem, ask yourself these questions:
What caused the problem? Did it occur when you or another user ran a specific program or
tried to connect? Does the problem seem to be related to some other action? If you try the same
action again, does the same problem occur? Did it first appear when you turned on a computer?
What has changed? Have you installed new hardware on the network or loaded new
software on the server or another computer? Did you recently update the router's firmware? Have
you made any other change to the network or another connected computer, even if the change
seems unrelated to the problem?
What else happened? Have you noticed any other problems or unexpected events? Has
another network user experienced a similar problem at about the same time?
Is this a new problem? Have you ever experienced this problem or something similar
before?
2. Look for simple solutions first
Look for easy solutions before you start to tear apart hardware or run complex
software diagnostic routines. Nothing is more aggravating than spending several hours running
detailed troubleshooting procedures, only to discover that restarting a computer or flipping a switch
is all that was needed to fix the problem.
Restart everything
The first thing to try when an otherwise unexplainable problem occurs is to turn off each
network component—one at a time—wait a few seconds, and then turn it back on again. Sometimes
that's all you need to do to clear a program or a chunk of memory that is stuck on the wrong setting
and return it to the correct value. If possible, use the operating system's shut-down process to turn
off the computer in an orderly manner; don't use the power switch or reset button unless the
computer won't respond to a mouse or keyboard command.
NOTE: Don't turn off your computer until you have copied the text of any error messages on
the screen. Sometimes the same problem will produce a different message after you restart (or none
at all), and the text of the original message might be a useful troubleshooting tool.
25
When you restart a computer, don't use the Restart option; that can leave some settings at
the same values rather than resetting them to the default startup configuration. You should turn off
the computer completely, count to ten, and then turn it back on.
If the problem continues after you restart the computer, try restarting the modem, Wi-Fi
access point, or network router. If a device doesn't have an on/off switch, disconnect the power
cable, wait a few seconds, and plug it back in. After you restart each device, check to find out if the
problem still exists. If the problem still occurs, move on to the next device.
3. Check the plugs and cables
If a single computer can't connect to the network, confirm that the physical cables providing
those connections are not unplugged. Be sure to check both ends of each cable. If the whole
network can't find the Internet, check the cables connected to the modem. If possible, examine the
cable itself to make sure it hasn't been cut someplace in the middle.
Almost all routers, switches, modems, and network adapters have LED indicators that light
when they detect a live connection. If one or more of these LEDs has gone dark, check the
connection.
Most data plugs and sockets maintain solid connections, but it's possible that a plug might
have come loose without separating itself from the socket, or a wire inside the plug might have a
bad contact. If you suspect a loose connection, try wiggling the cable while you watch the LED
indicator that corresponds to that socket. If the LED lights and goes dark as you shake the cable, try a
different cable.
If you can't connect through a newly installed wall outlet, make sure the wires inside the
outlet are connected to the correct terminals at both ends of the cable inside the wall (at the outlet
and at the data center).
To quickly confirm that data is passing through the network to and from each computer, use
the tools supplied with the computer's operating system to display network activity. If the computer
reports that no link is available, a cable is disconnected or the network adapter or hub has a
problem.
4. Check the AC power
Every device connected to the network probably has an LED indicator that lights when the
device is connected to AC power. When a connection fails, look at the front of each device to
confirm the power light is on. If it's not, check the device's power switch (if it has one) and both the
plug at the back of the device and the plug or power supply that plugs into the AC outlet.
If you use a power strip or an uninterruptible power supply, make sure that the master
power switch is turned on and the power unit is plugged into an AC outlet.
If the network fails but your computer still works, a fuse or circuit breaker might have blown
in the room containing the network switch, router, or other control device.
5. Check the settings and options
Look for other switches and settings that might interfere with a device's operation. For
example, make sure that the network printer is online and that no Error LED indicators or messages
are visible in the control panel. Or if you're having trouble with a Wi-Fi connection, make sure your
computer hasn't associated itself with the "wrong" base station and connected to one of your
neighbors' networks instead of your own.
6. Isolate the problem
If your search for simple solutions to a network problem or failure doesn't produce an
answer, the next step is to identify the physical location where the problem is occurring. Although
it's easy (and often appropriate) to think about a network as an amorphous cloud that exists
26
everywhere at the same time, when you're looking for a specific point of failure, you must replace
that cloud with a detailed map that shows every component and connection. If you don't already
have a network diagram in your files, consider drawing one now.
Most problems offer some kind of hint about their location: If just one computer's
connection to the network has failed, but all the others work properly, the problem is probably in
that computer or its network link. But if nobody on the network can connect to any other computer
or to the Internet, the problem is probably in a server, router, or other central device. Start
searching for the source of a problem in the most logical device.
If you have a hardware problem, it's often effective to isolate the problem by replacing
individual components and cables one at a time until the problem goes away. If the problem
disappears when you install a replacement, that's a good indication that the original part was the
source of the problem. If the replacement is a relatively expensive item like a router or a printer, you
might want to send it back to the manufacturer for replacement or repair, especially if it's under
warranty. But if you replace a cheap part like a cable or a network interface card, it's often easier to
just throw it away and buy a new one.
Similar techniques can work with software. If a computer connection fails, try shutting down
each program running on that computer, one at a time, and then try to reestablish the connection. If
you recently installed a new program, driver, or update, try uninstalling the new software and test
the connection again. If the connection works, the conflict is between the new software and your
network connection or device driver. In Windows, try restarting the computer in Safe Mode and re-
establishing the connection; if it works in Safe Mode, you know that the Windows operating system
is not the source of the problem.
Even if a network problem appears without warning, the problem was probably caused by
something that has changed within the hardware or software. Therefore repeating your steps can
often help identify and solve it.
8. Keep notes
As you try to identify and solve a problem, keep a record of what you have done. Describe
each problem you encounter and what you did to fix it in a simple log or notebook. Note
configuration settings, websites that provide useful information, and the exact location of any
options or control programs that caused the problem or helped solve it. Keep this on paper, rather
than in a text file stored on the computer, so you will be able to access it if the computer breaks
down again.
If the same problem appears again, your log will tell you exactly what you did to fix it the
first time; rather than stepping through all the same unproductive troubleshooting techniques again,
you can go directly to the correct solution.
One excellent approach is to keep a network notebook in a loose-leaf binder. Among other
things, your notebook should include the following:
The configuration settings and passwords for each modem, router, Wi-Fi access point, and
other device connected to the network.
The numeric IP addresses for your Internet connection, DNS servers, default gateway, and
subnet mask.
The numeric addresses used by your LAN.
The make, model, serial number, and MAC address (if you can find them) of each hub,
switch, router, modem, Wi-Fi access point, network adapter, and other network device.
A list of channel numbers, SSIDs, and passwords for your Wi-Fi network.
The telephone numbers and other contact information for your ISP and the telephone
company or cable service that supplies your physical Internet connection.
27
Instruction manuals for each modem, router, access point, or other network device.
A list of your network's users, including names, telephone numbers, and logins.
A diagram that shows how each computer and other device connects to the network.
Passwords for each network server.
Account names and passwords for your email service.
A list of rooms that have wall-mounted network outlets and the label on the other end of
each cable.
A log of adds, moves, changes, and deletions to your network.
A log of repairs, including:
Self-Check 4.2-3
ENUMERATION:
Direction: Enumerate at least 5 steps on how to diagnose and identify faulty systems and cables.
1.
2.
3.
4.
5.
28
Did the Trainee overall performance meet the required
evidence/standard?
Yes No
Learning Objective:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Know and run diagnostics software.
Introduction:
Network troubleshooting tools are a necessity for every network administrator.
When getting started in the networking field, it is important to amass a number of tools that
can be used to troubleshoot a variety of different network conditions.
While it is true that the use of specific tools can be subjective and at the discretion of
the engineer, the selection of tools in this article has been made based on their generality
and common use. This article reviews the top 10 basic tools that can help you troubleshoot
most networking issues.
Ping
The most commonly used network tool is the ping utility. This utility is used to
provide a basic connectivity test between the requesting host and a destination host. This is
done by using the Internet Control Message Protocol (ICMP) which has the ability to send an
echo packet to a destination host and a mechanism to listen for a response from this host.
Simply stated, if the requesting host receives a response from the destination host, this host
is reachable. This utility is commonly used to provide a basic picture of where a specific
networking problem may exist. For example, if an Internet connection is down at an office,
the ping utility can be used to figure out whether the problem exists within the office or
within the network of the Internet provider. Figure 1 below shows an example of the ping
utility being used to obtain the reachability status of the locally connected router.
30
issue with the default DNS servers configured on a host. Figure 4 below shows an example
of how the nslookup utility can be used to query the associated IP address information.
31
Figure 6: PuTTY
32
Figure 8: Subnet calculator
Speedtest.net/pingtest.net
A very easy test that can be used to both determine the Internet bandwidth
available to a specific host and to determine the quality of an Internet connection is the use
of the tools available at the speedtest.net and pingtest.net websites. The speedtest.net site
provides the ability to determine the amount of bandwidth that is available to a specific
host at a specific point in time; this is often a good tool to use when measuring how long it is
going to take to upload or download information from a local to remote host. This
measurement can also be used to determine whether the connection is offering the amount
of bandwidth that was purchased from the Internet provider; keep in mind however that
some amount of bandwidth difference is expected between the quoted bandwidth
purchased and the measured bandwidth. The pingtest.net website is used to determine the
quality of the connection by measuring the ping response times and jitter amounts over a
short period of time. This information can be used to determine a likelihood of how well the
measured connection will deal with certain types of high demand traffic like Voice over IP
(VoIP) or gaming. Figure 9 and 10 below show example output from both of these sites.
33
Figure 9: Speedtest
Pathping/mtr
In an effort to take advantage of the benefits of both the ping and tracert/traceroute
commands, the pathping and mtr utilities were developed. Both of these tools take the
functionality and information that can be obtained from these types of tools and provide a
more detailed single picture of the path characteristics from a specific host to a specific
destination. Figure 11 and 12 below show examples of these two tools and what
information they provide.
34
Figure 11: Pat
35
Route
The last of the tools covered in this article is the route utility. This utility is used to
display the current status of the routing table on a host. While the use of the route utility is
limited in common situations where the host only has a single IP address with a single
gateway, it is vital in other situations where multiple IP address and multiple gateways are
available. Figure 13 below shows an example of the route utility being used on a Windows
machine.
Summary
As with any job, the type of tools that are quickly available can greatly influence the
amount of time that it takes to complete a job. When troubleshooting a networking issue,
the amount of time that it takes to find and fix a problem directly affect the wasted costs
that it causes to any system relying on the network. This article has taken a look at the 10
most commonly used tools that can help in ensuring that the time that it takes to find and
fix a problem is as short as possible. I hope the information in this article can be helpful in
future troubleshooting.
Learning Objective:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Repair or replace faulty systems and cables.
2. Know the specific softwares and hardwares needed.
Introduction:
SOFTWARES
Looking for some network utilities? There are plenty of options, but don't waste time on the
bulky and more heavyweight contenders, unless you really need them - our Tiny Tools may
provide all you need.
If you'd like to find out what software is installed across your network, for instance, you
could install some expensive commercial solution, complete with database, analytical tools and
more. But we've found a 160KB program which will scan all your network PCs for no cost at all.
And capturing network traffic normally involves installing complex utilities, and a supporting
library or two. But if you can get by with raw sockets then the 20KB RawCap will get you started
in seconds.
This is just the start, though. Other tools in the list will help with performance issues,
network management, security, file sharing and more. And they're all free, and very lightweight:
even installing all ten will use less than 7MB hard drive space.\
Figuring out what's happening on your network normally involves a whole library of tools,
yet somehow Network Stuff has managed to cram them all into a single portable application.
It's strong on the basics, for instance: the program can display your IP addresses (both local
and external), scan your network for other systems, reveal MAC addresses and run graphical ping
or traceroutes to the addresses you specify.
But Network Stuff can also display all the currently open network and internet connections;
use built-in Whois and DNS tools to get more information on IP addresses; remotely wake up or
shut down other systems on your network, and the list goes on.
The only problem here is complexity, as there's a lot to explore. If you get lost, though, check
the author's website for some helpful guidance.
2. DNS Jumper 1.0.5 - 812KB
Packet sniffing - capturing network traffic for later analysis - can be an invaluable way to
diagnose tricky network problems, both hardware and software. And there are few easier ways
to get the job done than with the super-lightweight RawCap.
The program is a command line tool, but it's also straightforward to run from Explorer. Just
double-click the file, choose your network interface, enter an output file name, and that's it - the
program will capture raw packets and save them in a .pcap file.
Unsurprisingly for a 20KB tool, there's no help here to analyse the finished results. Just
opening the file in Notepad may be enough, though if you're looking for plain text. And there's
no doubting RawCap's simplicity: it doesn't need any other components or DLLs beyond the .NET
Framework 2.0.
4. Fast Software Audit 1.0.0 - 160 KB
When you want to secure your network it's important to understand which processes are
listening for connections, and the portable Close The Door will tell you everything you want to
know: the network interface, ports, protocols, process, related Windows services and a whole lot
more.
The HOSTS file can be used to tell Windows the IP address of various network or Internet
resources, so improving performance or allowing you to block some sites or resources entirely.
Windows doesn't make it particularly easy to access HOSTS, unfortunately, but the Blue Life
Hosts Editor probably provides everything you'll need. Just launch the program to view your
current HOSTS file, then add or remove entries to suit your needs, and save the results when
you're finished: easy.
Beware, though, if you try to block a site you've just visited then it'll appear not to work, as
Windows will cache the previous IP address. Save the new file, click "Flush DNS" and everything
should now work just as you expect.
Network management can be easier than you think. If you've got a copy of Remote Reboot X to
hand, anyway.
Add the names of your network computers to the program, and in click or two you can then
remotely shut them down or wake them up again, all from the comfort of your own PC.
You can even automate the process, for example having a PC woken up just after lunch so it's
ready and waiting when you return.
And there are even system information options to, say, retrieve the free C: drive space on one of
the systems, or its list of automatic but stopped services (very useful for troubleshooting). Not
bad at all for a portable tool under 500KB in size
9. HFS 2.2f - 560KB
If you regularly use a laptop on a couple of networks - home and work, say - then the chances
are you probably waste a lot of time manually adjusting a host of low-level network settings. But
it doesn't have to be that way.
Simple IP Config allows you to create separate network profiles for home, work, and anywhere
else you like. Each of these can be used to store your IP Address, Subnet Mask, Gateway, DNS
Server, and so on. And switching from one profile to another is as simple as selecting it, and
clicking "Apply" - no messing around in Control Panel is required at all.
UTP CABLE
RJ-45
RJ45 is a standard type of connector for network cables. RJ45
connectors are most commonly seen with Ethernet cables and
networks.
Several other kinds of connectors closely resemble RJ45 and can be easily confused for each other.
The RJ-11 connectors used with telephone cables, for example, are only slightly smaller (narrower)
than RJ-45 connectors.
CRIMPING TOOL
A crimping tool is a tool designed to crimp or connect a
connector to the end of a cable. For example, network
cables and phone cables are created using a crimping tool
to connect the RJ-45 and RJ-11 connectors to the end of
the cable. In the example picture below, this crimper is
capable of crimping a RJ-11 (6-Pin) and RJ-45 (8-Pin)
connectors and also includes a wire cutter near the
handles that can be used to cut phone or CAT5 cable.
LAN TESTER
LAN CARD
The LAN (Local Area Network) card is a 'door' to the network
from a computer. Any type of network activity requires a LAN
card: the Internet, network printer, connecting computers
together, and so on. Today many devices contain a network
card, including televisions for their Internet apps, Blu-ray
players, mobile phones, VoIP, desk phones, and even
refrigerators. LAN cards are hardware devices that can be added to a computer, or they can be
integrated into the main hardware of the computer.
ROUTER
Routers are small physical devices that join multiple networks
together. Technically, a router is a Layer 3 gateway device,
meaning that it connects two or more networks and that the
router operates at the network layer of the OSI model.
Straight Cable
You usually use straight cable to connect different type of devices. This type of cable will be used
most of the time and can be used to:
1) Connect a computer to a switch/hub's normal port.
2) Connect a computer to a cable/DSL modem's LAN port.
3) Connect a router's WAN port to a cable/DSL modem's LAN port.
4) Connect a router's LAN port to a switch/hub's uplink port. (normally used for expanding network)
5) Connect 2 switches/hubs with one of the switch/hub using an uplink port and the other one using
normal port
RJ-45 connectors are normally used in telephone and network cables. Occasionally they are
used for serial network connections. When the RJ-45 connectors first came into use, they were
primarily used for telephones. The great advances in technology created a need for another size
connector and the RJ-45 was adapted to fit. Today there are 2 different RJ-45 connector sizes
available, 1 for Cat 5 cable and 1 for Cat 6 cable. The user has to make sure they have the one suited
to their job. The easiest way to tell them apart is to compare them side by side. The Cat 6 connector
is larger than the Cat 5 connector. Below are instructions for crimping RJ-45 connectors to a cable.
1. Purchase your cable and your RJ-45
connectors. Most ethernet cable is sold on spools of
varying lengths, so you might have to measure and cut
the amount you need when you get home.
Blue
Green
Learning Objective:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Test repaired or replaced network system
2. Learn how to burn-in
Introduction:
BURN-IN
Burn-in is a test in which a system or component is made to run for an extended
period of time to detect problems.
Burn-in may be conducted to ensure that a device or system functions properly
before it leaves the manufacturing plant or may be part of a repair or maintenance routine.
An end user may use a burn-in process to ensure that new equipment is functioning
properly, for example, running a new computer for several days before committing it to
serious use. If any of the components are defective the problem will usually show up within
this initial testing time frame.
When a faulty device or system is brought into a repair facility, the malfunction
might not occur until the hardware has been warmed or cooled to a certain temperature.
Humidity may also be a factor. Under these circumstances, a burn-in must be performed and
environmental parameters varied until the problem is found. The equipment is powered-up
and then left to run continuously for hours (or sometimes for days) until the malfunction is
observed and can be diagnosed.
PassMark BurnInTest is a software tool that allows all the major sub-systems of a
computer to be simultaneously stress tested for endurance, reliability and stability.
Assists in PC Troubleshooting and diagnostics.
Avoid delivering dead on arrival and faulty hardware to your
customers.
• Dramatically reduce your test times with simultaneous testing.
• Build your image as a supplier of quality systems.
• Avoid costly downtime, system rebuilds and lost data.
• Test the stability of a system after configuration changes or hardware
upgrades (critical for overclocking and system upgrades).
• The hottest, fastest CPU Burn In tool around! (Heat testing)
Configuration files
What are configuration files?
Configuration files end in the extension „bitcfg. For example the current
configuration is stored automatically in the file „LastUsed.bitcfg‟, which is located in the
BurnInTest installation directory. Configuration files aid with the automation of the testing
process and also allow the maintenance of several different test configurations. For example
a configuration file could be created for each different model ofcomputer to be tested.
By saving a particular configuration to a file, you can avoid resetting all the
parameters each time BurnInTest is used.
How are configuration files created
A configuration file can be created by first selecting all the required settings in the
test duty cycles and testpreferences windows, then use the menu option, „Save Test
Configuration As‟. This will create a newconfiguration file in the location selected by the
user.
After the configuration files have been created they can be transferred between
computers where BurnInTestis installed.
How are configuration files used
Files can be used in three ways
1. They can be loaded from the command line.
2. They can be loaded by using the menu option, „Load Test Configuration‟.
3. They can be loaded by a BurnInTest script file. A script file can load multiple
test configurationsduring the one test run.
CBLM on CSS NC II Date Developed: Document No.
JANUARY, 2020
MAINTAINING AND REPAIRING Issued by:
Date Revised:
COMPUTER SYSTEMS AND NETWORKS St. James Academy
Page 58 of
of Skills
Developed by: Technology, Inc. 43
DIAGNOSE FAULTS OF COMPUTER
SYSTEMS AND NETWORKS Revision #: 01
For the purpose of test automation options 2 and 3 are of most interest.
Selecting a test configuration
It is possible to adjust a wide range of values from the „test duty cycles‟ and “test
preferences‟ windows. The following general tips can be used to help select the right
combination of tests to perform and their intensity level.
Only turn on tests for which there is some corresponding hardware. For example,
there is obviously no point in turning on the tape drive test if there is no tape drive
installed.
If the disk drive has a fairly large capacity, you will probably need to set the duty
cycle for the disk test to 100% in order to make sure the maximum amount of disk
surface is tested over several cycles.
Monitor the CPU utilization during the 1st couple of test runs. If the CPU is not
running at 100% all the time, raise the duty cycle of one or more tests. Conversely, if
the CPU consistently runs at 100%, lower the duty cycle of one or more tests.
If the machine has booted to Windows there is a reasonable chance that the CPU is
working reasonably reliably. Give preference to the RAM test over the CPU test when
setting the duty cycle. RAM tends to fail more often than a CPU.
Don’t be scared of pushing the machine too hard. It’s better that it fails on the
production line than after you have shipped it to your customer.
You should test for at least a few hours. An absolute minimum is one complete cycle of the
disk test. Leaving BurnInTest to run on the PC overnight should give the machine a good
work out.
Carrying out tasks before the test run
From the Pre-Test tab in the preferences window, BurnInTest allows the user to
select the option of running an external application before the test run proper starts. For
instance you may want to launch a report of the previous test run before beginning the
current one. The test run proper will not begin until the external application is exited.
Carrying out tasks after the test run
CBLM on CSS NC II Date Developed: Document No.
JANUARY, 2020
MAINTAINING AND REPAIRING Issued by:
Date Revised:
COMPUTER SYSTEMS AND NETWORKS St. James Academy
Page 59 of
of Skills
Developed by: Technology, Inc. 43
DIAGNOSE FAULTS OF COMPUTER
SYSTEMS AND NETWORKS Revision #: 01
From the Timers tab in the preferences window, it is possible to define certain actions to
take on successful or unsuccessful test completion. In each case (successful or unsuccessful
completion), there are three options.
1. Stop the tests normally (this is the default behavior).
2. Stop the tests, Close BurnInTest and run a specified external application. This
could be used, for example, to call an application or batch file that would clean
up the hard disk after the completion of testing.
3. Reboot the PC using the current Reboot options. This option uses the PassMark
Rebooter application to perform the reboot. If used in conjunction with a startup
shortcut to BurnInTest, it’s possible to create a reboot cycle. See the „Rebooter‟
section below for more details.
As each environment will be different, the function of an external batch file will vary
between companies.Some possibilities are described below.
Example Autostop actions
Copy the log files (see below) to a network drive
Call an external program to sound an audible alarm
Start another test program to run a sequence of tests
Call a batch file to clean up the hard disk of the machine
Report information - (Machine identification)
General report information
The identity of the machine can be entered in to the „Machine Identity‟ window,
(accessible from the Edit menu in BurnInTest).
This information can be saved to a file using the „Save as Defaults‟ button. The name
of the file is always “machineid.dat‟. This file will be saved in the BurnInTest installation
directory.Each time BurnInTest starts it checks to see if this file exists on the disk and loads
the contents of the file.
Test reporting - logging to disk
BurnInTest can create report files automatically. Using the setting in the preferences dialog
the user can select:
If logging to disk is on or off.
The log file directory and base file name. Note: Log files are prefixed as described
below and suffixed with the created date and time.
The required detail level of the log file. Either a Results Summary or Normal
(recommended).
Whether a very detailed activity trace log is produced and the level. It is
recommended that No trace log be specified under normal circumstances.
The approximate size of the log (and trace) files.
The format of the log file. Plain ASCII text, HTML web page or HTML Customer
certificate..
A prefix to the log file name, including a number of system Environment variables.
Whether to clear all log files at the start of each test run, or to accumulate the log
files over test runs.
Note: Log entries are written to disk in real time. You can also log periodic interim result
reports.
The log file format can be ASCII (plain text), HTML (for the web) or an HTML
Customer certificate (1 page HTML report for your customer). Log files can be opened in a
text editor or a word processor application. See the example reports Appendix 1. HTML files
CBLM on CSS NC II Date Developed: Document No.
JANUARY, 2020
MAINTAINING AND REPAIRING Issued by:
Date Revised:
COMPUTER SYSTEMS AND NETWORKS St. James Academy
Page 61 of
of Skills
Developed by: Technology, Inc. 43
DIAGNOSE FAULTS OF COMPUTER
SYSTEMS AND NETWORKS Revision #: 01
can be opened in a browser and posted on the web. Both formats can be attached to E-Mail
messages.
New log/trace files will be created when BurnInTest is started and logging is turned
on, or any logging options are changed (eg. Turned on, Log directory changed, format
changed). If BurnInTest is restarted with scripting commands of REBOOT or REBOOTEND,
entries will be concatenated to the previous log file (ie. That relate to the same script being
run).
BurnInTest will automatically modify the file name selected to include the current
date and time, e.g. If you use the file c:\temp\logfile.txt as your log directory then
BurnInTest will create files like,
c:\temp\logfile_081209_113751.log
or
c:\temp\logfile_081209_113751.trace (for a trace file)
051209 is the date (in Year Month Day format), the 9th of December 2008 in this case.
113751 is the time (in Hour Minute Second format)
Logging to disk may be useful if your system is unstable. You could create a log, and
then even if the computer crashed, you would have a record of how much testing was
completed before the crash. Logging can also be used as a method of keeping quality
assurance records in a manufacturing environment.
Installation and execution options
There are several different ways to install and run BurnInTest. Some of them are more
suited to a mass production environment.
Standard Install
This is what happens when the standard package is installed. The files are expanded from
the compressed archive and the install program is run to prompt the user for various
There are a number of different ways to specify command line arguments and this can
depend on what you are trying to achieve. The most common options for specifying a
command line argument are:
1) You can create a shortcut to bit.exe and then specify the command line in the shortcut
target.
Example 3.1: Start BurnInTest from a shortcut and run tests automatically.
The “Reboot options‟ section allows the selection of Reboot types (Reboot, Shutdown,
Power Off, Logoff), Force shutdown behavior (Ask to close, Force to close, Force if hung),
the Delay once Rebooter is triggered before rebooting and the number of Maximum
Reboots, used for during reboot cycling (see below). The „Auto-login‟ section provides the
option of setting the system to auto login on restart. If Rebooter is run without any
command line options, it launches the configuration window as above. If the command line
option –reboot is used, Rebooter will automatically carry out the currently saved reboot
option.
e.g.
rebooter.exe –reboot
Reboot cycling
BurnInTest can be setup so that the PC will reboot itself in a cycle, with test runs occurring
between each reboot. BurnInTest uses another software utility called Rebooter to reboot /
restart a PC. Rebooter can be used from within BurnInTest or it can be run by itself (look for
the executable called, rebooter.exe in the BurnInTest installation directory).
To use Rebooter from within BurnInTest, go to the BurnInTest Preferences window and then
select the "Post-Test" tab. Clicking on the „Reboot options‟ button will open the Rebooter
configuration window. You can get additional help about Rebooter options by clicking on the
help button in the Rebooter configuration window.
Here is a brief description of how a BurnInTest can be set-up to reboot itself in a cycle.
Step1 – Select and save Rebooter settings
Set the “Maximum Reboots‟ value to the number of cycles required.
Set the other parameters in Rebooter. (Reboot type, Delay, etc). Don‟t set the delay value to
be too short, as you want BurnInTest to fully stop before rebooting. 20 Seconds is a good
value.
Save the settings, with the „Save Options‟ button. Then close the Window.
CBLM on CSS NC II Date Developed: Document No.
JANUARY, 2020
MAINTAINING AND REPAIRING Issued by:
Date Revised:
COMPUTER SYSTEMS AND NETWORKS St. James Academy
Page 67 of
of Skills
Developed by: Technology, Inc. 43
DIAGNOSE FAULTS OF COMPUTER
SYSTEMS AND NETWORKS Revision #: 01
Step2 – Configure the settings you want in BurnInTest
From the Preferences and Duty Cycle windows enter all the settings that you want for your
test runs. When you close these windows, the settings are saved to disk and will become the
new default values. Alternatively a separate configuration file could be created (using the
„Save As Config‟ menu option) and used on the command line.
Make sure you
- Set a test period with the Auto-Stop option in the preferences window.
- Select „Exit & reboot PC‟ in the Action after Auto-Stop check boxes.
- Have the log file accumulation option set in the Logging section of the preferences window
Step3 – Create an auto run shortcut
Create an auto run short cut that points to the BurnInTest executable. You need to do this
manually in Windows. The command line in the shortcut should use the „/r‟ option. This will
start tests executing in BurnInTest automatically. The command line for the shortcut should
be something like C:\Program Files\BurnInTest\bit.exe /r
The Rebooter help file (Rebooter.hlp ) also contains more details about how to start
programs automatically with Windows.
Step4 – Start the cycle
Start the 1st test run from within BurnInTest, with the "Start Tests" button. At the end of the
test period you have entered the PC will reboot according to the settings in Rebooter and
after the reboot, BurnInTest will automatically re-start and do another test run, then Reboot
again.
Note:
When Rebooter is started from BurnInTest, the Rebooter setting of "Auto load Rebooter at
startup" is not applied. This allows BurnInTest to be setup as the auto restart program, and
avoids the conflict of both BurnInTest and Rebooter autostarting after a reboot. This means
that only a single reboot will be performed when rebooter is run from BurnInTest. To
perform multiple reboots from within BurnInTest a script should beused with multiple
REBOOT commands.
More about Rebooter
Rebooter is a small utility program developed by Pass Mark Software to help automate the
PC hardware testing process. It has been designed to work with Pass Mark BurnIn Test but
will also work with 3rd party application. Rebooter allows you to
Shutdown, Reboot or Logout of a PC.
Reboot a PC from the command line
Set a timer so that the PC will reboot after a certain amount of time
Setup a reboot loop, to reboot a PC over and over again in a cycle.
Force a shutdown or request a shutdown.
Enable and disable the Windows auto-login feature. (Windows 2000, XP and later)
Include reboots into your hardware stress testing plan, (when used with
BurnInTest).
Sleeper
Pass Mark Sleeper is a small freeware application, which allows the user to put their system
into various states of sleep and hibernation. Sleeper can be called from BurnInTest using the
If Sleeper is called without any command line, the configuration screen above is displayed
allowing the user to select options such as the Sleep state to enter, the duration of the sleep
or hibernation etc. It is then possible to begin the sleep by clicking the Sleep Now button.
All settings can also be specified from the command line. See the Sleeper online help for
more details on command line options.
Like Rebooter, Sleeper can be called from within BurnInTest by specifying the required
command line from within the Pre-Test and/or Timers tabs on the preferences window.
Test hardware - Loopback plugs
The BurnInTest optical drive test provides the best test when used with PassMark CD/DVD
test set as this provides pre-defined test data selected for the specific purpose of testing
optical drives and that BurnInTest can better validate.
The following BurnInTest tests use loopback plugs or cables.
Serial Port test
Parallel Port test
Audio test
USB test. Pass Mark USB 2.0 Loopback plug: Used to test USB 1.x and 2.0 ports.
Supports testing of Full Speed (12Mb/s) and High Speed (480Mb/s). USB 2.0 ports
will be tested at the faster High Speed.
It is recommended that you have at least one plug per port on the machine under test. For
example, if the computer being tested has two COM ports, then having two serial loopback
plugs will halve the amount of time you must spend testing.
Self-Check 4.2-6
Directions:
TRUE OR FALSE
Tell whether the given statement is true or false. Write (T) if the statement is True and (F) if
the statement is False. Write your answer to a separate sheet.
2. PassMark BurnInTest is a software tool that allows all the major sub-systems of a
computer to be simultaneously stress tested for endurance, reliability and stability.
3. First step in Reboot cycling is the “Select and save Rebooter settings”
Learning Objectives
After reading the INFORMATION SHEET, YOU MUST be able to:
1. Identify the different types of computer system error
2. Recognize the procedure in diagnosing a computer
Introduction:
Has your computer ever stopped working for no apparent reason? The
frustration brought on by technological advancements can cause any sane
person to yank the plug right out of the wall. Luckily, there's a better way.
Learn what to do when your computer freezes, facts about different kinds of
computer failure, the various ways torestart Macs and PCs, and how to
prevent future freezes.
How to restart a PC
After any common computer failure follow these steps. Simultaneously
hold down the Control key, the Alt key, and the Delete key. A dialogue box
will ask you if you want to exit the current program. Click the Task List
button. An End Task window appears and lists the programs you are
currently running. Select the program you were in when your computer
froze. For instance, if you were workingwithMicrosoft Word, but went to
check your e-mail in Netscape, and then the computer crashed, you would
CBLM on CSS NC II Date Developed: Document No.
JANUARY, 2020
MAINTAINING AND REPAIRING Issued by:
Date Revised:
COMPUTER SYSTEMS AND NETWORKS St. James Academy
Page 72 of
of Skills
Developed by: Technology, Inc. 43
DIAGNOSE FAULTS OF COMPUTER
SYSTEMS AND NETWORKS Revision #: 01
select Netscape in the End Task window. After selecting the correct
program, hit the End Task button. Hopefully, the program will unlock at
this point. You should then restart yourcomputer by going to the Start
menu and selecting Shut Down. In the Shut Down window, click the
Restart button and OK, and the computerwill reboot.
System error 5 -
Access is denied
This is a
permission
issue. If the net
view command
fails with a "System
error 5 has
occurred. Access is
denied." message, 1)
make sure you
are logged on
using an account that has permission to view the shares on the remote
computer. 2) Need to cache credential: logon the same username and
System error 85 has occurred. The local device name is already in use
Cause: net use /persistent: yesis default settings for NT and win2000/XP.If
you have mapped some network drives and check the reconnect at logon, or
your network uses logon script to map network drives, the mapped network
drives may show red Xs. If you enable echo and pause the logon script or if
using net use to map the same drive manually, you may get "System error
85 has occurred. The local device name is already in use." One thing you
may want to try is using net use /persistent: no, for example, net use i:
\\servername\folder /persistent: no.
System error 1219 has occurred - The credentials supplied conflict withan
existing set of credentials
Symptoms:
1) When you log on to a domain from w2k client;
2) Whenattempting to join a domain, you may receive the following error
message: The credentials supplied conflict with an existing set of
credentials.
System error 1231 has occurred. The network location cannot bereached.
Symptom: When using net view\\computername,you may receiveSystem
error 1231.
Resolutions: 1) make sure Client for MS Networks is enabled, 2) makesure
you have permission to access it.
System Error 1240 - The account is not authorized to login from this
Station.
Symptoms:
1. You may get the system error 1240 when using net
view\\remotecomputer'
Resolutions:
1. Use Regedit to enable unencrypted (plain text)passwords for the SMB
client.
2. Enable Send Unencrypted Password to Connect to 3rd Party SMB Servers
under Local Security Policy.
3. Set the following policies as showing: Digitally sign client communications
(always)-disabledDigitally signservercommunications(always)-disabled
System error 1326 has occurred - Logon failure: unknown user name orbad
password.
Symptom: when using net use to map a network drive, you may
receive"System error 1326 has occurred. Logon failure: unknown user name
or bad password." message.
Resolutions:
1) create a user account on remote computer;
2) need toenable the guest account;
CBLM on CSS NC II Date Developed: Document No.
JANUARY, 2020
MAINTAINING AND REPAIRING Issued by:
Date Revised:
COMPUTER SYSTEMS AND NETWORKS St. James Academy
Page 76 of
of Skills
Developed by: Technology, Inc. 43
DIAGNOSE FAULTS OF COMPUTER
SYSTEMS AND NETWORKS Revision #: 01
3) make sure the remote computer doesn't use auto-logon and blank
password;
4) make sure you have a folder or drive shared on the remote computer.
5) use net use \\servername /user: username command. Make sure you
type correct command (e.g. use net use \\servername \user: username will
get this error too)
System error 1331 has occurred - Logon failure: account current disable
System error 1385 has occurred - Logon failure: the user has not
beengranted the requested logon type at this computer
Resolution:
1. The users do not have permission to connect to theremote computer. To
resolve this problem: on the remote computer, select Administrative
Tools>Local Security Settings>Local Policies>User Rights Assignment, right-
click on Access this computer from thenetwork>Properties>Add Users or
Groups, add everyone or any users you want to be able to access the
computer from the network.
System error 1396 has occurred - Logon Failure: The target accountname
is incorrect.
Symptoms:
1. when using net use, you may receive above message.
2. when using net view \\hostname, you may receive "System error 5 has
occurred. Access is denied.". However, net view \\ip works fine. 3. You may
receive above error while running logon script.
Causes:
1. SPN for the domain that is hosting the replica has not been propagated.
2. Incorrect target account name or the server is not online.
System error 6118 has occurred. The list of servers for this workgroup
isnot currently available
SYMPTOMS:
1) After enabling ICS/ICF, you can't see any computes on MyNetwork places.
If you try, you may get "workgroup is not accessible".
2) If you use the net view command, you may receive "System error 6118
has occurred. The list of servers for this workgroup is not currently
available." message.
Resolutions:
1) This behavior can occur if you enable the ICF that will closes the ports for
file sharing by default. To open these ports, right-click the network
connection that is firewall protected> Properties>Advanced>Settings>Service
Tab>Add, Enter 127.0.0.1 for the required Internet Protocol (IP) number.
Enter UDP ports from 135 through 139, and TCP ports from 135 through
139 one by one (the external and internal port numbers should be identical).
2) This may occur if the workgroup name and the domain name are the
different.
System
Error Symptoms Action/resolutions
51 The
remote
computer
is not
available
67 The
network
name
cannot be
found
1219 The
credentials
supplied
conflict
with an
existing
set of
credentials
1231 The
network
location
cannot be
reached.
Learning objectives
After reading the INFORMATION SHEET, YOU MUST be able to:
1. Identify the problem of computer system
2. Recognize if procedure of Diagnosing a computer system
Introduction:
PC Diagnosing
Check cables: In case of any device failure, check all the cables ofyour
computer such as data cables, power cable, internal circuitry cables and
make sure that all these are plugged in and working fine.
Hardware settings: Check the hardware settings in the CMOS andin the
device manager of the system and make all the device drivers are up to date
and all the cards are plugged in properly.
AC outlet
AVR
AVR fuse
Monitor Power Cable
Monitor Switch
Power Supply
3. Check the power cords and cable connectors in your computer unit.
Testing Procedures
Instructions
Things You'll Need:
· New memory
· CD burner
· Blank CD-R or CDRW
1. We will assume you know how to buy the right memory. If not, visit my
article on buying the right memory.
2. Shut down your PC, unplug your computer, and Open the cover.
TIP: If you have toggle switch on the back of your power supply, you can add
more safety by turning the switch off and leaving the computer plugged
into the wall outlet. Yes, leave it plugged with the hard power switch off.
This provides an excellent ground to your computer with no actual power
applied.
3. we have 2 sticks of new memory rated for our computer. Lets assume our
computer has 4 slots. 2 slots are filled, 2 are empty. With the case open,
open the levers on the side of the installed memory sticks and remove
them. Put them in a safe place.
4. Insert the new memory sticks in the same place the old sticks were and
lock the levers. The reason we are doing these extra steps is so we can test
the new memory. Leaving in the old memory can affect the new memory's
speed reading or even errors in the old memory will not be clearly the fault
of the old memory.
6. Inside the BIOS or Setup screen, look for the section called memory.
Check to see the memory is running at the speed you purchased and
displays the full amount you purchased. Exist setup and allow computer
to boot up fully.
7. Download Memtest86+ 2.11. Its free and supports DDR2 and DDR3
memory. Unzip the file and create a CD using the ISO file using your
favorite cd burner program. This is a bootable CD.
9. Reboot the PC and insert the CD you just made before the post screen is
done. Assuming your PC is set to boot from the CD first,(most are), the
CD will start up the MEMTEST program and start running. This will run
over and over. It will also count how many times its run and the number
of errors it encounters. The number of errors should be zero Let it run for
up to 8 hours. Once you are satisfied, exit the program using the legend
on screen. Remove the CD, and turn off the computer.
10. You now know you have reliable memory that will likely last for years to
come
Instructions
· Screwdriver
· Replacement processor
1. Turn the computer off and then remove the power cable from the
electrical wall outlet. Plug a power cable from a different electrical device
2. Power the computer back on and place your hand behind the case
near the power supply. Wait a few moments to see if any air is pushed
out of the power supply by the cooling fan. Replace the power supply
instead of the motherboard if the fan is not working.
3. Shut down the computer again and pull out all of the cables from the
back side of the case. Remove any other devices you have
connected to the front ports on the computer such as a USB printer or
jump drive.
4. Set down the computer so that the left side panel is facing towards
you. Unlock the side panel from the computer case by removing the case
screws if there are any. Twist of the thumbscrew or pull up on the metal
holding latch if the computer does not use case screws.
5. Remove the screws holding any expansion cards to the case and then
pull them off the motherboard. Pull out all of the cables running from the
motherboard to the power supply and drive bays. Pull out the screws
holding the motherboard to the case. Pull the motherboard straight up
out of the case and set it down carefully on a flat non-metal surface.
7. Remove the screws holding the power supply to the case and slide it
out of the drive bay. Set it down near the motherboard and connect the
SATA cable from the motherboard to the power supply. Connect the
power cable from the power supply to a wall outlet. Plug cable from the
computer's monitor into the corresponding port on the motherboard.
8. Remove the RAM modules and replace them with another set. Press
down the power button on the motherboard with a screwdriver or another
flat object. Wait to see if the computer loads up without error, which will
indicate that the problem is with the RAM modules instead of with the
motherboard.
9. Power the motherboard back off and replace the processor with a
different one. Turn the motherboard back on and see if the system boots
up normally, which will indicate a defective processor.
11. Replace the motherboard if the system still will not boot up after all of
the other components have been checked.
Instructions
2. If that doesn't work then check to make sure that everything is plugged in
and is turned on. This includes checking the wires from the speakers to the
computer and making sure the speakers have power. Also check to see if the
volume isn’t muted or turned down extremely low.
3. Check to see if the driver is working. Click the start menu, right click on
the computer icon, and select properties. On the left hand side under task
select device manager and select sound, video and games controller. Double
click on your sound device to bring up the properties page. From here it will
tell you if your sound card is working properly or not. If it isn’t try
reinstalling the sound card driver. If the sound card is not showing up at all,
then it might be defective.
4. The next step is to rule out the speakers. Either take them and hook they
up to another computer to see if they work or you can take different
speakers and hook it up to the computer to see if they work. If they do work
chances are the card is defective.
5. Before ruling out the sound card is toast, try rolling Windows back to an
earlier date by using System Restore which is located under accessories >
System Tools. Restore the computer to a few days before the problem started
to happen
Self-Check 4.3-2
TRUE OR FALSE: Write T if the statement is True and F if the
statement is False.
CBLM on CSS NC II Date Developed: Document No.
JANUARY, 2020
MAINTAINING AND REPAIRING Issued by:
Date Revised:
COMPUTER SYSTEMS AND NETWORKS St. James Academy
Page 87 of
of Skills
Developed by: Technology, Inc. 43
DIAGNOSE FAULTS OF COMPUTER
SYSTEMS AND NETWORKS Revision #: 01
___1. The most frustrating problem computer users run into are startup
problems.
____2. When you find a faulty component in your computer, check it with
the other computers so that you can make sure whether the fault
is in the component or not.
____3.Troubleshooting is a big learning option and we can learn a lot
when we face any kind of troubleshooting in our computer.
____5. Voltage Regulator and power supply could cause power failure in
the computer unit.
Learning Objective:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Identify and use Hand Tools for Testing and troubleshooting Computer
System & Network.
Introduction
d.
e.
f.
Learning Objectives
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Replace and repair computer parts and upgrade.
2. Enumerate computer parts that needs replacement
Introduction:
In all cases, if you’re upgrading or replacing a computer part, you’re doing so on the assumption that
the PC still has some value , so you don’t want to get in over your head and break things if you aren’t
fairly sure of what you’re doing . Replacing PC parts is pretty much all screwdriver work, it doesn’t
require great coordination, but it does demand a certain mechanical awareness, the ability to see where
things fit and how they are supposed to go together. If you force something, you’re doing it wrong and it
will break . Modern PC’s all use ATX power supplies which are really only safety off when they are
unplugged or the override switch on the back is turned off.
CBLM on CSS NC II Date Developed: Document No.
JANUARY, 2020
MAINTAINING AND REPAIRING Date Revised: Issued by:
COMPUTER SYSTEMS AND NETWORKS St. James Academy
Page 92 of
of Skills
Developed by: Technology, Inc. 43
DIAGNOSE FAULTS OF COMPUTER
SYSTEMS AND NETWORKS Revision #: 01
10 pieces of hardware you should replace neither than repair
Any time a computer component stops working, or just becomes unstable as we all know will
happen from time o time -- we have to decide whether to replace it, have it repaired, or just get by as is
with perhaps a temporary fix. Repair or just getting by will nearly always be the cheapest solution, at
least in the short run. Replacement, however, will usually provide a good opportunity to upgrade. In
fact, given the rate at which the various technologies behind computer hardware are advancing , unless
you replace something a week after you buy it, you may almost be forced to upgrade. Following are a
few items which, if replaced (and generally upgraded), can provide excellent benefits, from an enhanced
user experience to additional compatibility, greater longevity, and stability for the whole system.
Power Supply
One of the most overloaded pieces of computer hardware is the power supply unit (PSU).
Computer enthusiasts often brag about their blazing fast processors, top-of-the- line video cards, ans
gigs upon gigs of RAM, but rarely about their great PSUs.
The truth is, the power supply is the last thing we should skimp on when choosing components
for our system. If a computer‘s brain is its processor, its heart is the power supply. And having one that
is worn out, underpower, unstable, or just generally cheap can be a major cause of hardware failure.
Every computer’s power requirements are different, but a good minimum for a modern PC is 450
watts. Some system, especially those with multiple high-end video cards or lots of add-on cards and
peripherals may require a PSU rated at 800 watts or more. Replacing a failing or inadequate power
supply can make a previously unstable system stable.
Aside from supplying enough power, that power must be supplied stably. A common cause of
‘unexplained’ lockups and system crashes is a drop in voltage supplied to the system when under load,
caused by a poorly manufactured PSU. The easiest way to find a quality PSU is to stick to the consistently
top brands such as Antec, EnerMax, and PC Power & Cooling.
Fans
As computers have gotten more powerful over the last decades, they have also gotten hotter.
Gone are the days of a passively cooled Pentium 100; now we have fans on our massive CPU heatsinks,
on our monster video cards, and on intake and outtake vents to our computer cases.
All of these fans are playing important roles by keeping our computers safely cooled, and we
should try to ensure that they continue doing so.
CBLM on CSS NC II Date Developed: Document No.
JANUARY, 2020
MAINTAINING AND REPAIRING Date Revised: Issued by:
COMPUTER SYSTEMS AND NETWORKS St. James Academy
Page 93 of
of Skills
Developed by: Technology, Inc. 43
DIAGNOSE FAULTS OF COMPUTER
SYSTEMS AND NETWORKS Revision #: 01
Fans are one of the few parts that when replaced with something better. But they deserve
mention because:
As one of the few moving parts in our system, they are one of the most likely to actually break.
When they break it’s likely to pass unnoticed or not cause mush concern.
Also, fans are cheap and easy to replace. It generally takes about 10 dollars, 15 minutes, and a
screwdriver to install a new one, so there’s really no good excuse for not doing so.
Surge protector/UPS
VIDEO CARD
The video card is one of the most important elements in the performance of your system and
overall user experience. Even though it is also one of the priciest components, there are two good
reasons to replace it should your old one bite the dust.
First, video cards are one of the components that are being improved upon seemingly every day. Just
like with CPUs, a video card that’s two years old simply isn’t as fast as a current one and won’t have the
newest features (such as support for directX 10).
Also, the video card is the number one hardware stopgap as we migrate to vista. Manufactures just
aren’t providing new vista-compatible drivers for lots of their old video cards. This means that many of
us will have to replace our video cards whether they are broken or not, if we plan to switch to Vista.
Considering that it has moving spinning parts, the average CD/DVD drive is actually fairly
robust. Because of that, how ever , many people are still using old read-only (or CD RW) drives
instead of amazingly cheap (and handy)DVD writers. If you’re still using an old drive and it
finally gives up the replace it with a DVD/CD RW combo drive for less than 50 dollars.
Hard drives
The computer component we all least want to fail is the hard drive. It’s easier to cope with the
loss of the much more expensive processor or video card as long as we still have our precious data, or
your first instinct is to try to repair.
But if you’ve been practicing good backup habits, you can actually come out of the situation better of
when you replace the old drive with something bigger and faster.
The “giant” 100-GB hard drive of a few years ago is no longer so large. Today, you can get 750
GB for less than 200 bucks. In addition to being much, much larger , newer hard drives will generally be
serial ATA II (SATA II), which has a maximum data transfer rate of about 300 MB /as. SATA II is fairly new
, so many motherboards don’t support it. But even if yours doesn’t, the SATA II drives generally have a
jumper that can put them in SATA I mode.
TIP: Right now, most SATA II hard drives ship with thyis limiting jumper in place by default, so if your
board does support SATA II, be sure to change the jumper before you install the drive.
Monitor
With the exception of servers, a computer isn’t much good without a monitor. Monitors rarely
make it all the way to the stage of completely not working, because we replace them when they start to
fade. If you replace a monitor that’s more than a few years old , the new likely not much resemble the
CBLM on CSS NC II Date Developed: Document No.
JANUARY, 2020
MAINTAINING AND REPAIRING Date Revised: Issued by:
COMPUTER SYSTEMS AND NETWORKS St. James Academy
Page 96 of
of Skills
Developed by: Technology, Inc. 43
DIAGNOSE FAULTS OF COMPUTER
SYSTEMS AND NETWORKS Revision #: 01
old.
Any reluctance you may have had to switch from the giant 50-pound cathode ray tube (CRT)
monitor to a slim and featherweight liquid crystal display (LCD) should be gone by now. The gap in
performance in terms of color rendering and refresh rates between CRTs and LCDs is very small.
Unless you’re a graphic designer who need a multi-thousand dollar large screen CRT, the
benefits of size, weight, power consumption, and less eye fatigue that LCDs enjoy will far
outweigh any small performance advantages of a CRT. With the exception of the extremely low
end markets, it’s quite hard to find a new CRT monitor anyway.
If you were already using an LCD that’s a few years old , when you replace it you’ll enjoy
those leaps in performance that the LCDs have made in the last few years.
Keyboard
Since so many of us spend hours every day banging away at them, its important to have a
keyboard that’s comfortable and efficient. And since we use them so much and often so
brutally, it is no wonder that they break often. Keys come off, get stuck, or just get really dirty.
When these things happen, you should usually go ahead and replace the keyboard rather than
CBLM on CSS NC II Date Developed: Document No.
JANUARY, 2020
MAINTAINING AND REPAIRING Date Revised: Issued by:
COMPUTER SYSTEMS AND NETWORKS St. James Academy
Page 97 of
of Skills
Developed by: Technology, Inc. 43
DIAGNOSE FAULTS OF COMPUTER
SYSTEMS AND NETWORKS Revision #: 01
live with the hassle.
Today’s keyboard have new, handy features. Some have built in user defined macro
keys for often- repeated commands; some can fold up for easy transport ability; some have
built-in ports so they can double as USB hubs. There is a keyboard with some unique feature to
suit nearly anyone’s needs.
Motherboard and Processor
Replacing the motherboard is always the most involved upgrade. Since it usually means “starting
over” with a clean installation of the operating system, lots of people are reluctant to change to a newer
board even when the old one gives up the ghost, preferring instead to replace it with the exact same
model, thus avoiding having to wipe the OS. However, since a motherboard upgrade is the most
involved, it also can give the widest range of benefits.
First and foremost, replacing the mother board usually gives us the chance to upgrade to the latest
processor technology. Today, you can get the benefits of a dual or even quad CPU setup with only one
processor processing core is placed on a single wafer. In computer’s performance by a factor of two or
four.
Additionally, upgrading the motherboard gives you access to new technologies for other
components. PATA and SATA I hard drives (and optical drives) can be upgraded to SATA II. AGP video
cards can be upgraded to PCI-E USB 1.1 ports become USB 2.0. The list goes on for virtually every
component. Sometimes, even though it can be a pain, starting over can be the best thing.
Learning Objective:
After reading this INFORMATION SHEET, YOU MUST be able to:
4. Inspect and test computer systems and networks
5. Learn how to burn-in
Introduction:
BURN-IN
Burn-in is a test in which a system or component is made to run for an extended period
of time to detect problems.
Burn-in may be conducted to ensure that a device or system functions properly before it
leaves the manufacturing plant or may be part of a repair or maintenance routine.
An end user may use a burn-in process to ensure that new equipment is functioning
properly, for example, running a new computer for several days before committing it to serious
use. If any of the components are defective the problem will usually show up within this initial
testing time frame.
When a faulty device or system is brought into a repair facility, the malfunction might
not occur until the hardware has been warmed or cooled to a certain temperature. Humidity
may also be a factor. Under these circumstances, a burn-in must be performed and
environmental parameters varied until the problem is found. The equipment is powered-up and
then left to run continuously for hours (or sometimes for days) until the malfunction is
observed and can be diagnosed.
PassMark BurnInTest is a software tool that allows all the major sub-systems of a
computer to be simultaneously stress tested for endurance, reliability and stability.
• Assists in PC Troubleshooting and diagnostics.
• Avoid delivering dead on arrival and faulty hardware to your customers.
CBLM on CSS NC II Date Developed: Document No.
JANUARY, 2020
MAINTAINING AND REPAIRING Date Revised: Issued by:
COMPUTER SYSTEMS AND NETWORKS St. James Academy
Page 99 of
of Skills
Developed by: Technology, Inc. 43
DIAGNOSE FAULTS OF COMPUTER
SYSTEMS AND NETWORKS Revision #: 01
• Dramatically reduce your test times with simultaneous testing.
• Build your image as a supplier of quality systems.
• Avoid costly downtime, system rebuilds and lost data.
• Test the stability of a system after configuration changes or hardware upgrades
(critical for overclocking and system upgrades).
• The hottest, fastest CPU Burn In tool around! (Heat testing)
Configuration files
What are configuration files?
A configuration file contains all the parameters available in the test duty cycles and test
preferences windows. That is to say it contains information about which tests to perform, the
duty cycle setting for each test and other preferences, such as drive letters and device names.
Configuration files end in the extension „bitcfg. For example the current configuration is
stored automatically in the file „LastUsed.bitcfg‟, which is located in the BurnInTest installation
directory. Configuration files aid with the automation of the testing process and also allow the
maintenance of several different test configurations. For example a configuration file could be
created for each different model of computer to be tested.
By saving a particular configuration to a file, you can avoid resetting all the parameters
each time BurnInTest is used.
How are configuration files created?
A configuration file can be created by first selecting all the required settings in the test
duty cycles and test preferences windows, then use the menu option, „Save Test Configuration
As‟. This will create a new configuration file in the location selected by the user.
After the configuration files have been created they can be transferred between
computers where BurnInTest is installed.
How are configuration files used?
Files can be used in three ways
4. They can be loaded from the command line.
5. They can be loaded by using the menu option, „Load Test Configuration‟.
CBLM on CSS NC II Date Developed: Document No.
JANUARY, 2020
MAINTAINING AND REPAIRING Date Revised: Issued by:
COMPUTER SYSTEMS AND NETWORKS St. James Academy
Page 100 of
of Skills
Developed by: Technology, Inc. 43
DIAGNOSE FAULTS OF COMPUTER
SYSTEMS AND NETWORKS Revision #: 01
6. They can be loaded by a BurnInTest script file. A script file can load multiple test
configurations during the one test run.
For the purpose of test automation options 2 and 3 are of most interest.
Selecting a test configuration
It is possible to adjust a wide range of values from the „test duty cycles‟ and “test
preferences‟ windows. The following general tips can be used to help select the right
combination of tests to perform and their intensity level.
Only turn on tests for which there is some corresponding hardware. For example, there
is obviously no point in turning on the tape drive test if there is no tape drive installed.
If the disk drive has a fairly large capacity, you will probably need to set the duty cycle
for the disk test to 100% in order to make sure the maximum amount of disk surface is
tested over several cycles.
Monitor the CPU utilization during the 1st couple of test runs. If the CPU is not running
at 100% all the time, raise the duty cycle of one or more tests. Conversely, if the CPU
consistently runs at 100%, lower the duty cycle of one or more tests.
If the machine has booted to Windows there is a reasonable chance that the CPU is
working reasonably reliably. Give preference to the RAM test over the CPU test when
setting the duty cycle. RAM tends to fail more often than a CPU.
Don’t be scared of pushing the machine too hard. It’s better that it fails on the
production line than after you have shipped it to your customer.
You should test for at least a few hours. An absolute minimum is one complete cycle of
the disk test. Leaving BurnInTest to run on the PC overnight should give the machine a good
work out.
New log/trace files will be created when BurnInTest is started and logging is turned
on, or any logging options are changed (eg. Turned on, Log directory changed, format changed).
If BurnInTest is restarted with scripting commands of REBOOT or REBOOTEND, entries will be
concatenated to the previous log file (ie. That relate to the same script being run).
BurnInTest will automatically modify the file name selected to include the current
date and time, e.g. If you use the file c:\temp\logfile.txt as your log directory then BurnInTest
will create files like,
c:\temp\logfile_081209_113751.log
or
c:\temp\logfile_081209_113751.trace (for a trace file)
051209 is the date (in Year Month Day format), the 9th of December 2008 in this case.
113751 is the time (in Hour Minute Second format)
Logging to disk may be useful if your system is unstable. You could create a log, and
then even if the computer crashed, you would have a record of how much testing was
completed before the crash. Logging can also be used as a method of keeping quality assurance
records in a manufacturing environment.
Installation and execution options
mkdir c:\burnintest
copy f:\*.* c:\burnintest
c:\burnintest\bit.exe /r /p heavyload.bitcfg
copy c:\burnintest\bitlogfile*.* g:\
copy c:\burnintest\error*.* g:\
del c:\burnintest\*.*
rmdir c:\burnintest
This batch file installs BurnInTest then runs the software with the configuration file that was
prepared in advance. It then saves the log files to a USB Key drive and cleans up.
3. Create a fast install CD
Follow the steps given above to create a CD (in section „Installation and execution options‟), but when
burning the CD include the configuration files and batch file created above. Optionally a machine
identification file, „machineid.dat‟, (see above), could also be included on the CD.
4. Run the tests
To run the tests insert the CD in a machine to be tested and run the batch file.
5. Collect the results
If the test is completed without error there will be a number of log files on the USB Key
drive. These can then be transferred to a central data store (along with the serial number of the
machine). If the test is completed with at least one error you will see something that looks like the
following.
1) You can create a shortcut to bit.exe and then specify the command line in the shortcut target.
Example 3.1: Start BurnInTest from a shortcut and run tests automatically.
Right click on the bit.exe file and select Create Shortcut.
Right click on the new shortcut file and select Properties and specify a Target with the command
line argument.
"C:\BurnInTest\bit.exe" –r
Now to run BurnInTest with these command line parameters, just double click the
BurnInTest shortcut. You could also copy the shortcut to the Windows Startup folder to run BurnInTest
automatically with thecurrent default settings after Windows has booted.
2) You can open a command window, Start-R, "Cmd". This will open a command window where you can
type commands directly, such as shown below.
Example 3.2: Start BurnInTest from a command window and run a pre-defined script of tests
Select Windows Start-R, "Cmd"
Once the Windows command window is open, type in the commands:
cd C:\Program Files\BurnInTest
bit.exe -s MyScript.bits
4) You can write a batch file to execute BurnInTest with Command line arguments.
Example 3.3: Start BurnInTest from a batch file with a pre-defined configuration file
Create a file with an text editor (like Notepad) called Test.bat and include the lines in the file
c:
cd "\program files\BurnInTest"
CBLM on CSS NC II Date Developed: Document No.
JANUARY, 2020
MAINTAINING AND REPAIRING Date Revised: Issued by:
COMPUTER SYSTEMS AND NETWORKS St. James Academy
Page 109 of
of Skills
Developed by: Technology, Inc. 43
DIAGNOSE FAULTS OF COMPUTER
SYSTEMS AND NETWORKS Revision #: 01
bit.exe –c “heavyload.bitcfg”
The “Reboot options‟ section allows the selection of Reboot types (Reboot,
Shutdown, Power Off, Logoff), Force shutdown behavior (Ask to close, Force to close, Force if
hung), the Delay once Rebooter is triggered before rebooting and the number of Maximum
Reboots, used for during reboot cycling (see below). The „Auto-login‟ section provides the
Directions:
TRUE OR FALSE
True or False:
Instructions: Write TRUEif the statement is true andFALSEif it is false.
1. Burn-in is necessary in all computer system and its
components.
2. Windows 7 is a software designed especially for burn-in.
3. BurnInTest detects and collects system information and this is
displayed in BurnInTest and the test reports.
4. Another term of burn-in testing is stress testing.
5. Burn-n may be conducted to ensure that advice or system
functions properly before it leaves the manufacturing plant or
may be part of a repair or maintenance routine.