Maintain Net Perif Notes


Published on

Published in: Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Maintain Net Perif Notes

  1. 1. IT VET 99 Administer Network Peripherals Study Notes for 1999 (Updated 2002) HSC Syllabus Unit of Work
  2. 2. Part 1 Contents
  3. 3. Key Terms and Concepts <ul><li>file server, workstation, network operating system </li></ul><ul><li>users, groups </li></ul><ul><li>security, permissions, resource sharing </li></ul><ul><li>peripheral device support, device drivers </li></ul><ul><li>network protocols </li></ul><ul><li>remote login and management </li></ul><ul><li>consumables </li></ul><ul><li>queues, spooling, pooling </li></ul><ul><li>print server </li></ul><ul><li>device management software </li></ul>
  4. 4. Part 2
  5. 5. The IT Environment <ul><li>What is a FILE SERVER </li></ul><ul><li>In the client/server model, a file server is a computer responsible for the central storage and management of data files so that other computers on the same network can access the files. </li></ul><ul><li>A file server allows users to share information over a network without having to physically transfer files by floppy diskette or some other external storage device. </li></ul>
  6. 6. IT Environment <ul><li>What is a Workstation ? </li></ul><ul><li>A historical view is that workstation is a computer intended for individual use that is faster and more capable than a personal computer . It's intended for business or professional use (rather than home or recreational use). </li></ul>
  7. 7. What is a workstation <ul><li>In IBM and other corporations, the term &quot;workstation&quot; is sometimes used to mean &quot;any individual personal computer location hooked up to a mainframe computer.&quot; </li></ul><ul><li>In today's corporate environments , many workers have workstations . They're simply personal computers attached to a local area network ( LAN ) that in turn shares the resources of one or more large computers. </li></ul>
  8. 8. Warning! <ul><li>Here is a complete syllabus definition </li></ul><ul><li>A workstation is a computer that is connected to a file server or mainframe computer. It is often used by individual workers who need to access file servers , shared hard drives through Local and Wide Area networks. </li></ul>
  9. 9. Network operating system <ul><li>A network operating system (NOS) is a computer operating system system that is designed primarily to support workstation , personal computer , and, in some instances, older terminal that are connected on a local area network ( LAN ). </li></ul><ul><li>Novell's NetWare , and Microsoft's LAN Manager are examples of network operating systems. </li></ul>
  10. 10. Network operating system <ul><li>Definition </li></ul><ul><li>A network operating system (NOS) provides printer sharing, common file system and database sharing, application sharing, and the ability to manage a network name directory, security, and other housekeeping aspects of a network. </li></ul>
  11. 11. Users <ul><li>User in a computing context refers to one who uses a computer system. </li></ul><ul><li>Users are also said to be people that use a system without complete technical expertise required to fully understand the system. </li></ul>
  12. 12. Users <ul><li>In order to identify oneself, a user has an account (a user account ) and a username (also called a screen name , handle , nickname , or nick on some systems), and in most cases a password. </li></ul>
  13. 13. Groups <ul><li>group generally refers to a grouping of users. In principle, users may belong to none, one, or many groups. </li></ul><ul><li>The primary purpose of using groups is to simplify access control arrangements to manage clusters of users whom are given the same scope of access and usage rights across a network. </li></ul>
  14. 14. Groups <ul><li>The primary uses of groups are: </li></ul><ul><li>access control - use groups to simplify the policies on who is allowed to access what </li></ul><ul><li>accounting - how much disk space are the students using? how much disk space is being used by the staff? </li></ul><ul><li>content selection - only display content relevant to group members - e.g. this portal channel is intended for students, this mailing list is for the chess club </li></ul>
  15. 15. Security <ul><li>In information technology, security is the protection of information assets through the use of technology, processes, and training. </li></ul>
  16. 16. Permissions <ul><li>Methods of administering permissions or access rights to specific users and groups of users. </li></ul><ul><li>These systems control the ability of the users affected to view or make changes to the contents of the file system that they are working within. </li></ul><ul><li>Grants or restricts access to information and applications on a network. </li></ul>
  17. 17. Resource Sharing <ul><li>There are hardware assets attached to most networks </li></ul><ul><li>Printers, Faxes, Plotters, DVD Duplicators, Large format printers etc. </li></ul><ul><li>Also software – knowledge bases for technical information can be shared </li></ul><ul><li>Allows several users or groups to share one device, most common is the ‘office printer’. </li></ul>
  18. 18. Part 3
  19. 19. peripheral device support <ul><li>Peripheral Device Support refers to the maintenance of that device by an ‘expert’ or though sufficient documentation that the device can be ‘looked after’. </li></ul><ul><li>For example: High Volume printers may need a periodic ‘service’ in which a technician replaces or services technical components beyond the ability of users. </li></ul>
  20. 20. What are Device Drivers <ul><li>A device driver is a program that controls a particular type of device that is attached to your computer. </li></ul><ul><li>There are device driver s for printers, displays, CD-ROM readers, diskette drives, and so on. </li></ul>
  21. 21. Why do we need Device Drivers <ul><li>When you buy an operating system , many device drivers are built into the product. </li></ul><ul><li>However, if you later buy a new type of device that the operating system didn't anticipate, you'll have to install the new device driver. </li></ul>
  22. 22. Are Device Drivers ‘special’ <ul><li>A device driver essentially converts the more general input/output instructions of the operating system to messages that the device type can understand. </li></ul><ul><li>Upgrading an operating system can lead to drivers no longer functioning ‘normally’. This is often the issue with Windows operating systems. New OS? New Drivers! </li></ul>
  23. 23. Part 4
  24. 24. Network Protocols <ul><li>Protocols are not limited to computing </li></ul><ul><li>Opening doors for women </li></ul><ul><li>Giving up your seat for old people on a bus </li></ul><ul><li>Shaking Hands </li></ul><ul><li>Smiling at people and they smile back </li></ul><ul><li>Hand Gestures </li></ul><ul><li>Starting a football game </li></ul><ul><li>Eating a 3 course meal </li></ul><ul><li>Ways of doing things </li></ul>
  25. 25. IT Protocols <ul><li>In information technology, a protocol (from the Greek protocollon , which was a leaf of paper glued to a manuscript volume, describing its contents) is the special set of rules that facilitates a telecommunication between from one point node to another. </li></ul>
  26. 26. Network Protocols <ul><li>For example, there are protocols for the data interchange at the hardware device level and protocols for data interchange at the application program level. </li></ul><ul><li>How one ‘thing’ interacts, handshakes or communicates successfully with another. </li></ul>
  27. 27. NPs Working together <ul><li>A common, understood method of use and communication of data and information </li></ul><ul><li>Hardware or software may come from different manufacturers or even be on different platforms entirely. </li></ul><ul><li>A PC running Linux transferring data to a Apple Server running OSX. </li></ul>
  28. 28. Internet Protocols <ul><li>Use these to illustrate your understanding of network protocols. </li></ul><ul><li>To answer a question which requires you to EXPLAIN what is meant, then do it in two parts like this. </li></ul>
  29. 29. Model Answer – NPs … Part 1 <ul><li>…A workstation uses a network protocol to establish a communication link between itself and other nodes on the network. This NP is a set of commonly understood methods understanding the messages being sent around the network … </li></ul>
  30. 30. Model answer NPs .. Part 2 <ul><li>On the Internet, there are the TCP/IP protocols, consisting of: </li></ul><ul><li>Transmission Control Protocol (TCP), which uses a set of rules to exchange messages with other Internet points at the information packet level </li></ul><ul><li>Internet Protocol (IP), which uses a set of rules to send and receive messages at the Internet address level </li></ul><ul><li>Additional protocols that include the Hypertext Transfer Protocol (HTTP) and File Transfer Protocol (FTP), each with defined sets of rules to use with corresponding programs elsewhere on the Internet </li></ul>
  31. 31. Part 5
  32. 32. Remote Login & Management <ul><li>Any device on a network that has a STATIC address, ie it is known, can theoretically be controlled remotely. </li></ul><ul><li>Remote Login is the term used to described connecting to a machine over a network protocol, typically TelNet or IP. </li></ul><ul><li>To do this software is needed at both ‘ends’ to allow the process to operate </li></ul>
  33. 33. Remote Access and Management <ul><li>Windows uses REMOTE DESKTOP to connect to a machine with a STATIC IP address. From here you can connect to the machine – by remote control. </li></ul><ul><li>Control the machine OS </li></ul><ul><li>View files </li></ul><ul><li>Amend, Delete, Move files etc., </li></ul>
  34. 34. Remote Access and Management <ul><li>Management of Remote Access means </li></ul><ul><li>Controlling who has access into a network </li></ul><ul><li>What devices the can access </li></ul><ul><li>What they can do on those machines </li></ul><ul><li>Where they can go from one machine to another </li></ul><ul><li>File permissions and access rights </li></ul>
  35. 35. Part 6
  36. 36. Consumables <ul><li>Devices often need parts to function. </li></ul><ul><li>Parts which may be depleted or worn out by use. </li></ul><ul><li>Whilst it is true, epecially in IT, that things wear out. The syllabus is speaking about items that are not intended to last the life of other components </li></ul><ul><li>Ink Cartridges, Floppy Discs, Paper. </li></ul>
  37. 37. Queuing, Spooling, Pooling <ul><li>All print related terms. Do not talk about them in any other context. </li></ul>
  38. 38. Spooling <ul><li>To spool (which stands for &quot;simultaneous peripheral operations online&quot;) a computer document or task list (or &quot;job&quot;) is to read it in and store it, usually on a hard disk or larger storage medium so that it can be printed or otherwise processed at a more convenient time (for example, when a printer is finished printing its current document). </li></ul>
  39. 39. Spooling (where from) <ul><li>The idea of spooling originated in early computer days when input was read in on punched cards for immediate printing (or processing and then immediately printing of the results). </li></ul><ul><li>Since the computer operates at a much faster rate than input/output devices such as printers, it was more effective to store the read-in lines on a magnetic disk until they could be conveniently printed when the printer was free and the computer was less busy working on other tasks. </li></ul>
  40. 40. Spooling Definition <ul><li>In computer science , spooling refers to putting jobs in a buffer , a special area in memory , or on a disk where a device can access them when it is ready. </li></ul>
  41. 41. Pooling Printers <ul><li>Printer Pooling is a standard feature of Windows NT, 2000 and XP which in theory lets you spread your printed output across a pool of several printers. </li></ul><ul><li>The main benefits of pooling printers are that it is often cheaper to run two smaller printers rather than a single large device and you also have some backup if one of the printers fails. </li></ul>
  42. 42. Queue-ing <ul><li>most well known operation of the queue is the First-In-First-Out ( FIFO ) queue process. In a FIFO queue, the first element in the queue will be the first one out; this is equivalent to the requirement that whenever an element is added. </li></ul><ul><li>Your job is in the queue! </li></ul>
  43. 43. Queue-ing <ul><li>Theoretically, one characteristic of a queue is that it does not have a specific capacity . Regardless of how many elements are already contained, a new element can always be added. It can also be empty, at which point removing an element will be impossible until a new element has been added again. </li></ul>
  44. 44. Downsides of Qs <ul><li>If a job ahead fails, it may crash the printer and loose your data. </li></ul><ul><li>If your workstation is unable to multi-task (called background task printing) then you workstation cannot be used until your job has made it to the head of the queue and completed. </li></ul>
  45. 45. Part 7
  46. 46. Print Server <ul><li>A computer and/or software to provide users or a network with access to a central printer. </li></ul><ul><li>The printer server acts as a buffer, holding the information to be printed out in memory until the printer is free. </li></ul><ul><li>It is possible to program the printer server to print jobs in the order they arrive or to give priority to particular users who, in effect, jump the queue </li></ul>
  47. 47. Part 8
  48. 48. Device Management Software <ul><li>Usually a set of applications that operate together to control a device </li></ul><ul><li>Consider there is a standard application on a mobile phone that is used to manage multiple aspects and uses of the phone </li></ul><ul><li>It often provides technical information that is understood by experts not users. </li></ul>
  49. 49. Device Management Software <ul><li>It can schedule maintenance tasks or alters </li></ul><ul><li>Give you feedback on the status of the device (heat, cycles, hours, copies etc.,) </li></ul><ul><li>Allow you to check that it has the latest FIRMWARE – small programs that control the devices functions </li></ul><ul><li>Debugging problems etc., </li></ul>
  50. 50. Summary <ul><li>This presentation is intended as a guide to the KEY TOPICS and WORDS covered in this unit of work </li></ul><ul><li>It is NOT absolute or exhaustive </li></ul><ul><li>You should NOT copy this presentation in whole or in part without written permission of the author. </li></ul><ul><li>EO&E. Copyright Dean Groom 2007. All rights reserved. </li></ul><ul><li>You can contact me : </li></ul>