Hierarchy of management that covers different levels of management
Â
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY
1. VG-PRUCAS-PENNAGARAM
Fundamental Operating Systems
The Purpose of an Operating System
īˇ The operating system (OS) controls almost all functions on a computer.
īˇ All computers rely on an operating system (OS) to provide the interface for interaction between
users, applications, and hardware.
īˇ The operating system boots the computer and manages the file system.
Characteristics of Operating Systems
īˇ The operating system has four main functions:
o Control hardware access
o Manage files and folders
o Provide user interface
o Manage applications
īˇ Control hardware access
o The operating system manages the interaction between applications and the hardware
o OS automatically discovers and configures (Plug and Play)PnP hardware
o To communicate with the hardware, the operating system installs a device driver for
each hardware component.
o A device driver is a small program written by the hardware manufacturer
īˇ File and folder management
o The operating system creates a file structure on the hard disk drive to allow data to be
stored
o A file is a block of related data
o Program and data files are grouped together in a directory
īˇ User interface
īˇ The operating system enables the user to interact with software and hardware. There are two
types of user interfaces:
o Command line interface (CLI)
o Graphical user interface (GUI)
īˇ Application management
īˇ The operating system locates an application and loads it into the RAM of the computer.
īˇ Applications are software programs, such as word processors, databases, spreadsheets,games,
and many other applications.
īˇ An application programming interface (API) is a set of guidelines used by programmers to ensure
that the application they are developing is compatible with an operating system.
īˇ Two examples of APIs are:
o Open Graphics Library (OpenGL)
o DirectX
Operating Systems concepts
To understand the operating system, it is important to understand some basic terms.
The following terms are often used when comparing operating systems:
īˇ Multi-user â Two or more users can work with programs and share peripheral devices, such as
printers, at the same time.
2. VG-PRUCAS-PENNAGARAM
īˇ Multi-tasking â The computer is capable of operating multiple applications at the same time.
īˇ Multi-processing â The computer can have two or more central processing units (CPUs) that
programs share.
īˇ Multi-threading â A program can be broken into smaller parts that can be loaded as needed by
the operating system.
īˇ Multi-threading allows individual programs to be multi-tasked.
Modes of Operation
īˇ All modern CPUs can run in different modes of operation
īˇ The mode of operation refers to the capability of the CPU and the operating environment.
īˇ The four common modes of operation are as follows:
o Real mode
o Protected mode
o Virtual real mode
o Compatible mode
Real Mode
īˇ Executes only one program at a time
īˇ Addresses only 1 MB of system memory at a time
īˇ Directly accesses memory and hardware
īˇ Subject to crashes
īˇ Available to all modern processors
īˇ Only used by DOS and DOS applications
īˇ Program Code directly controls PC hardware.
īˇ PC hardware can be interrupted by bad code.
Protected Mode
īˇ Has access to all memory
īˇ Can manage multiple programs simultaneously
īˇ Allows the system to use virtual memory
īˇ Provides 32-bit access to memory, drivers, and I/O transfers
īˇ Each program is assigned a space in memory
īˇ Computer is protected from program errors
Virtual Real Mode
īˇ Allows a real-mode application to run within a protected-mode operating system
īˇ Creates virtual machines for each program that runs in real mode
īˇ Each virtual machine receives 1 MB of memory and access to hardware
īˇ In the event of a program error, only the virtual machine is affected
īˇ OS provides virtual machine to host the code and protect the PC
Compatibility Mode
īˇ Compatibility mode creates the environment of an earlier operating system for applications that
are not compatible with the current operating system.
Compare Operating Systems
There are two distinct types of operating systems:
3. VG-PRUCAS-PENNAGARAM
īˇ Desktop operating systems: A desktop operating system is intended for use in a small
office/home office (SOHO) with a limited number of users.
īˇ Network operating systems: A network operating system (NOS) is designed for a corporate
environment serving multiple users with a wide range of needs.
Desktop Operating System
o Supports a single user
o Runs single-user applications
o Shares files and folders
o Shares peripherals
o Used on a small network
īˇ Desktop operating systems:
o Microsoft Windows: Windows XP
o Macintosh: Mac OS X
o Linux: Fedora, Ubuntu, and others
o UNIX
Network Operating Systems (NOS)
o Supports multiple users
o Runs multi-user applications
o Is robust and redundant
o Provides increased security
o Used on a network
o Provides increased security compared to desktop operating systems
īˇ Common NOS include:
o Novell Netware
o Microsoft Windows Server
o Linux
o UNIX
Determine Proper Operating System
īˇ To select the proper operating system:
o Create an accurate profile of our customer by analyzing the daily, weekly, and monthly
computer activities
o Select appropriate software and hardware to satisfy
What Does Our Customer Require?
īˇ Office applications
o word processing, spreadsheets, or presentation software
īˇ Graphics applications
o Photoshop or Illustrator
īˇ Animation applications
o Flash
īˇ Business applications
o accounting, contact management, sales tracking or database
4. VG-PRUCAS-PENNAGARAM
Identify Minimum Hardware Requirements
īˇ Customer may need to upgrade or purchase additional hardware to support the required
applications and OS.
īˇ A cost analysis will indicate if purchasing new equipment is a better idea than upgrading.
īˇ Common hardware upgrades:
o RAM capacity
o Hard drive size
o Processor speed
o Video card memory and speed
Hardware Compatibility List (HCL)
īˇ Most operating systems have an HCL.
īˇ HCLs can be found on the manufacturer's website.
īˇ HCL includes list of hardware that is known to work with the operating system.
Installing the Operating System
īˇ Reasons to perform a clean installation of an OS:
o When a computer is passed from one employee to another
5. VG-PRUCAS-PENNAGARAM
o When the operating system is corrupted
o When a new replacement hard drive is installed in a computer
īˇ Before performing a clean installation:
o Back up all data first
o Explain to the customer that existing data will be erased
o Confirm that all needed data has been successfully transferred
Hard Drive Setup Procedures
Operating system setup methods:
o Install an OS over a network from a server
o Install from a copy of the OS files stored on the hard drive
o Install from OS files stored on CDs or DVDs
īˇ Partitioning and Formatting
o Hard drive must be logically divided (partitioned)
o File system must be created on the hard drive
o During the installation phase, most operating systems will automatically partition and
format the hard drive
īˇ The following terms are used when referring to hard drive setup:
o Primary partition: This partition is usually the first partition. A primary partition cannot
be subdivided into smaller sections. There can be up to four partitions per hard drive.
o Active partition: This partition is the partition used by the operating system to boot the
computer. Only one primary partition can be marked active.
o Extended partition: This partition normally uses the remaining free space on a hard
drive or takes the place of a primary partition. There can be only one extended partition
per hard drive, and it can be subdivided into smaller sections called logical drives.
o Logical drive: This drive is a section of an extended partition that can be used to
separate information for administrative purposes.
o Formatting: This process prepares a file system in a partition for files to be stored.
o Cluster: A cluster is also called a file allocation unit. It is the smallest unit of space used
for storing data.
o Track: A track is one complete circle of data on one side of a hard drive platter. A track is
broken into groups of 512 bytes, called sectors.
o Cylinder: A cylinder is a stack of tracks lined up one on top of another to form a cylinder
shape.
o Drive mapping: Drive mapping is a letter assigned to a physical or logical drive
Prepare the Hard Drive
īˇ The first portion of the installation process deals with formatting and partitioning the hard drive.
īˇ The second portion prepares the disk to accept the file system.
īˇ The file system provides the directory structure that organizes the user's operating system,
application, configuration, and data files.
īˇ Examples of file systems:
o The FAT32 file system
6. VG-PRUCAS-PENNAGARAM
o The New Technology File System (NTFS)
Install the Operating System
īˇ During the Windows XP installation the user must provide:
o Define currency and numerals
o Text input language
o Name of user
o Name of company
o Product key
o Computer name
o Administrator password
o Date and time settings
o Network settings
o Domain or workgroup information
Create Administrator Account
īˇ Setup creates the administrator account with the user name âadministratorâ
o Change this name to keep the administrator account secure
o Only use the administrator account occasionally for critical system changes
īˇ Create a fictitious user account to use as a template
īˇ Use secure passwords
o These should be a minimum of 7 characters, containing at least one of each (letter,
number, and symbol)
Complete the Installation
īˇ When Windows XP installation completes:
o Computer will reboot
7. VG-PRUCAS-PENNAGARAM
o Log in for the first time
o Register Windows XP and verify that we are using a legal copy of the OS
īˇ Verification enables we to download patches and service packs
īˇ Use Microsoft Update Manager to scan for new software and to:
o Install all service packs
o Install all patches
Check Device Manager for Conflicts
īˇ Look for warning icons (yellow exclamation points)
īˇ Double-click to learn about the problem
īˇ Click the plus (+) sign to expand the category
īˇ May be able to ignore an error
Custom Installation Options
īˇ With Microsoft System Preparation
īˇ Follow these steps for disk cloning:
o Create a master installation on one computer
o Run Sysprep
o Create a disk image of the configured computer using third-party disk-cloning software
o Copy the disk image onto a server
īˇ When the destination computer is booted,
o A shortened version of the Windows setup program runs
o Setup configures only user-specific and computer-specific settings
o An answer file provides data normally required during set up
The Boot Sequence for Windows XP
1. Power On Self Test (POST)
2. POST for each adapter card that has a BIOS
3. BIOS reads the Master Boot Record (MBR)
4. MBR takes over control of the boot process and starts NT Loader (NTLDR)
5. NTLDR reads the BOOT.INI file to know which OS to load and where to find the OS on the boot
partition
6. NTLDR uses NTDETECT.COM to detect any installed hardware
7. NTLDR loads the NTOSKRNL.EXE file and HAL.DLL
8. NTLDR reads the registry files and loads device drivers
9. NTOSKRNL.EXE starts the WINLOGON.EXE program and displays the Windows login screen
NTLDR and the Windows Boot Menu
īˇ If more than one OS is present on the disk, BOOT.INI gives the user a chance to select which to
use.
īˇ Otherwise:
o NTLDR runs NTDETECT.COM to get information about installed hardware
o NTLDR then uses the path specified in the BOOT.INI to find the boot partition
o NTLDR loads two files that make up the core of XP: NTOSKRNL.EXE and HAL.DLL
o NTLDR reads the Registry files, chooses a hardware profile, and loads device drivers.
8. VG-PRUCAS-PENNAGARAM
The Windows Registry
īˇ The Windows registry is a hierarchal database used by the Windows operating system to store
information and settings for hardware, software, users, and preferences on a system
īˇ Recognized by distinctive names, beginning with HKEY_
īˇ Changes to the Control Panel settings, File Associations, System Policies, or installed software
are stored in the registry
īˇ Each user has their own section of the registry
īˇ The Windows logon process uses the registry to set the system to the state that it was in the last
time the user logged in
īˇ Following are the some of The Windows Registry Files
The NT Kernel
īˇ The NT kernel, the heart of the Windows operating system, takes over. The name of this file is
ntoskrnl.exe.
Manipulating Operating System Files
īˇ MSCONFIG: After we have installed Windows XP, we can use MSCONFIG for post-installation
modifications:
o This boot configuration utility allows we to set programs that will run at startup, and to
edit configuration files
īˇ REGEDIT: The registry is a database that contains information and settings for all of the
hardware, software, users and preferences. REGEDIT allows users to edit the registry.
Startup Modes
īˇ Pressing the F8 key during the boot process opens the Windows Advanced Startup Options
menu, which allows we to select how to boot Windows.
o Safe Mode â Starts Windows but only loads drivers for basic components, such as the
keyboard and display.
o Safe Mode with Networking Support â Starts Windows identically to Safe Mode and
also loads the drivers for network components.
9. VG-PRUCAS-PENNAGARAM
o Safe Mode with Command Prompt â Starts Windows and loads the command prompt
instead of the GUI interface.
o Last Known Good Configuration â Enables a user to load the configurations settings of
Windows that was used the last time that Windows successfully started. It does this by
accessing a copy of the registry that is created for this purpose.
Describing Directory Structures
īˇ Windows file system naming conventions:
o Maximum of 255 characters may be used
o Characters such as a period (.) or a slash ( /) are not allowed
o An extension of three or four letters is added to the filename to identify the file type
o Filenames are not case sensitive
īˇ Windows filename extension examples:
o .doc -Microsoft Word
o .txt -ASCII text only
o .jpg -graphics format
o .ppt -Microsoft PowerPoint
o .zip -compression format
īˇ Each file has a set of attributes that control how the file may be viewed or altered.
īˇ The following are the most common file attributes:
o R -The file is read-only
o A -The file will be archived the next backup
o S -The file is marked as a system file and a warning is given if an attempt is made to
delete or modify the file
o H -The file is hidden in the directory display
The ATTRIB Command
īˇ we can view the filenames, extensions, and attributes by entering a DOS window (choose Start >
Run > cmd) and typing the ATTRIB command
NTFS and FAT32
īˇ FAT32 is used where files need to be accessed by multiple versions of Windows. FAT32 is not as
secure as NTFS
īˇ NTFS can support more and larger files than FAT32, and provides more flexible security features
for folders, files, and sizes
īˇ Partitions can be converted from FAT32 to NTFS using the CONVERT.EXE utility, but not in the
reverse direction
Navigate a GUI (windows)
īˇ The operating system provides a user interface that allows us to interact with the computer.
īˇ There are two methods that we can use to navigate the file system and run applications within
an operating system:
o A GUI provides graphical representations of all the files, folders, and programs on a
computer.
o A command-line interface (CLI) is text based. we must type commands to manipulate
files and execute programs
10. VG-PRUCAS-PENNAGARAM
Manipulate Items on the Desktop
īˇ A desktop on a computer is a graphical representation of a workspace.
īˇ The desktop has icons, toolbars, and menus to manipulate files.
īˇ The desktop can be customized with images, sounds, and colors to provide a more personalized
look and feel.
Desktop Properties
īˇ To customize the GUI of our desktop, right-click the desktop and choose Properties,
īˇ The Display Properties menu has five tabs: Themes, Desktop, Screen Saver, Appearance, and
Settings. Click any of these tabs to customize our display settings
Desktop Items
īˇ There are several items on the desktop that can be customized, such as the taskbar and Recycle
Bin.
īˇ To customize any item, right-click the item and then choose Properties.
The Start Menu
īˇ On the desktop, the Start menu is accessed by clicking the Start button.
īˇ The Start menu, displays all the applications installed in the computer, a list of recently opened
documents, and a listing of other elements, such as a search feature, help center, and system
settings.
īˇ The Start menu can also be customized to two styles, XP and Classic
My Computer
īˇ To access the various drives installed in the computer, double-click the My Computer icon that
appears on the desktop.
īˇ To customize certain settings, right-click My Computer and choose Properties
īˇ there are several settings that can be customized:
o Computer name
o Hardware settings
o Virtual memory
o Automatic updates
o Remote access
īˇ Files can also be moved and copied using My Computer
Launching Applications
īˇ Applications can be launched in several ways:
o Click the application on the Start menu
o Double-click the application shortcut icon on the desktop
o Double-click the application executable file in My Computer
o Launch the application from the Run window or command line
My Network Place
īˇ To view and configure network connections, right-click the My Network Places icon.
o Connect to or disconnect from a network drive
o Right-click Properties to configure existing network connections, such as a wired or
wireless LAN connection
Explore Control Panel Applets
īˇ Windows centralizes the settings for many features that control the behavior and appearance of
the computer. These settings are categorized in Control Panel applets
11. VG-PRUCAS-PENNAGARAM
Display Settings
īˇ Change the resolution and color quality
īˇ Change wallpaper, screen saver, power settings, and other options, by clicking the Advanced
button
Explore Administrative Tools
īˇ The following sections cover some of the most common administrative utilities for
troubleshooting, managing, and maintaining Windows XP, including
o Device Manager
o Task Manager
o Event Viewer
o Remote Desktop
o Performance Settings
Device Manager
īˇ Used to view settings for devices in the computer
īˇ To view the system resources in the Device Manager, use the following path:
Start > Control Panel > System > Hardware > Device Manager
An exclamation mark indicates a problem with a device
Task Manager
īˇ View all applications that are currently running
īˇ Close any applications that have stopped responding
īˇ Monitor the performance of the CPU and virtual memory
īˇ View all processes that are currently running
īˇ View information about the network connections
īˇ To view information in the Task Manager, press Ctrl-Alt-Delete and then select Task Manager or
right-click the taskbar and select Task Manager.
Event Viewer and Remote Desktop
Event Viewer
īˇ Logs a history of events regarding applications, security, and the system.
īˇ These log files are a valuable troubleshooting tool.
īˇ To access the Event Viewer, choose Administrative Tools > Event Viewer from the Control
Panel.
Remote Desktop
īˇ Allows one computer to remotely take control of another computer.
īˇ This troubleshooting feature is only available with Windows XP Professional.
īˇ To access the Remote Desktop,use the following path:Start > All Programs > Accessories >
Communications > Remote Desktop Connection
Performance Settings
īˇ To enhance the performance of the operating system, we can change some of the settings that
our computer uses, such as virtual memory configuration settings,
īˇ To change the virtual memory setting, use the following path:Start > Control Panel > System >
Advanced > Performance area > Settings button >Advanced tab > Virtual memory section >
Change
12. VG-PRUCAS-PENNAGARAM
Install, Navigate, and Uninstall an Application
īˇ Most applications use an automatic installation process when an application
īˇ Microsoft recommends that users always use the Add or Remove Programs utility,when
installing or removing applications
īˇ To open the Add or Remove Programs applet, use the following path:Start > Control Panel >
Add or Remove Programs
UPGRADING AN OPERATING SYSTEM
īˇ Before upgrading the operating system, check the minimum requirements of the new operating
system
īˇ Check the HCL to ensure that the hardware is compatible with the new operating system.
īˇ Back up all data before upgrading the operating system in case there is a problem with the
installation
Upgrading the Windows XP operating system
1. Insert the Windows XP CD. Select Start > Run.
2. In the Run box, where D is the drive letter for the CDROM, type D:i386winnt32 and press Enter. The
Welcome to the Windows XP Setup Wizard displays.
3. Choose Upgrade to Windows XP and click Next. The License Agreement page displays.
4. Read the license agreement and click the button to accept this agreement.
5. Click Next. The Upgrading to the Windows XP NTFS File System page displays.
6. Follow the prompts and complete the upgrade. When the install is complete, the computer will
restart.
Preventive Maintenance technique
īˇ Components of a preventive maintenance plan:
o Updates to the operating system and applications
o Updates to anti-virus and other protective software
o Hard drive error checking
o Hard drive backup
o Hard drive defragmentation
SCHEDULE TASKS
īˇ Most preventive maintenance applications can be set to run automatically according to a
schedule.
īˇ Windows has the following utilities that will launch tasks when we schedule them:
o The DOS AT command launches tasks at a specified time using the command-line
interface (choose Start > Run > cmd) and type AT /?
o The Windows Task Scheduler launches tasks at a specified time using a graphical user
interface. Start > All Programs > Accessories > System Tools > Scheduled Tasks.
System Utilities
īˇ There are several utilities included with DOS and Windows that help maintain system integrity.
īˇ Two system utilities that are useful tools for preventive maintenance are
o ScanDisk or CHKDSK: ScanDisk (Windows 2000) and CHKDSK (Windows XP) check the
integrity of files and folders and scan the hard disk surface for physical errors.
o Defrag: As files increase in size, some data is written to the next available space on the
disk. Defrag gathers the noncontiguous data into one place, making files run faster.
13. VG-PRUCAS-PENNAGARAM
īˇ We can access both of these utilities by using this path: Start > All Programs > Accessories >
System Tools > Disk Defragmenter
Automatic Updates
īˇ An automatic update service scans the system for needed updates, and recommends what
should be downloaded and installed.
īˇ Automatic update services can setup to download and install updates as soon as they are
available or as required, and install them when the computer is next rebooted.
īˇ The Microsoft Update Wizard is available at this path: Start > Control Panel > System >
Automatic Updates
Restore Point
īˇ An update can sometimes cause serious problems. Perhaps an older program is in the system
that is not compatible with the current operating system
īˇ Windows System Restore is the solution for this problem. Windows XP can create an image of
current computer settings, called a restore point.
īˇ Then, if the computer crashes or an update causes system problems, the computer can roll back
to a previous configuration.
īˇ To restore or create a restore point, use the following path: Start > All Programs > Accessories >
System Tools > System Restore
ERD and ASR
īˇ Windows 2000 offers the ability to create an emergency repair disk (ERD) that saves critical
boot files and configuration information necessary to troubleshoot problems in Windows.
īˇ Windows XP offers the same features with the Automated System Recovery(ASR) wizard.
BACKUP THE HARD DRIVE
īˇ Backup tools allow the recovery of data.
īˇ There are several different types of backup.
Normal Backup
īˇ A normal backup is also called a full backup. During a normal backup, all selected files on the
disk are archived to the backup medium.
Copy Backup
īˇ A copy backup will copy all selected files. It does not mark the files as having been archived.
Incremental Backup
īˇ An incremental backup procedure backs up all the files and folders that have been created or
modified since either the last normal or incremental backup.
īˇ It marks the files as having been archived by clearing the archive bit.
Differential Backup
īˇ A differential backup backs up all the files and folders that have been created or modified since
either the last normal backup or the last incremental backup.
īˇ The differential backup does not mark the files as having been archived.
Daily Backup
īˇ Daily backups only back up the files that are modified on the day of the backup.
Backup Media
īˇ There are many types of backup media available for computers:
o Tape drives are devices that are used for data backup on a network server drive. Tapes
drives are an inexpensive way to store a lot of data.
14. VG-PRUCAS-PENNAGARAM
o The Digital Audio Tape (DAT) tape standard uses 4-mm digital audiotapes to store data
in the Digital Data Storage (DSS) format.
o Digital Linear Tape (DLT) technology offers high-capacity and relatively high-speed tape
backup capabilities.
o USB flash memory can hold hundreds of times the data that a floppy disk can hold.USB
flash memory devices are available in many capacities and offer better transfer rates
than tape devices.
Troubleshooting Process
īˇ Step 1 Gather data from the customer
īˇ Step 2 Verify the obvious issues
īˇ Step 3 Try quick solutions first
īˇ Step 4 Gather data from the computer
īˇ Step 5 Evaluate the problem and implement the solution
īˇ Step 6 Close with the customer
1. Gather Data from the Customer
īˇ Customer information
o Company name, contact name, address, phone number
īˇ Computer configuration
o Operating system, patches and updates, network environment, connection type
īˇ Use a work order to collect information
īˇ Description of problem
o Open-ended questions
ī§ What were we doing when the problem was identified?
o Closed-ended questions
ī§ Are we currently logged into our network?
2. Verify the Obvious Issues
īˇ Examine the most obvious causes of a problem.
o Is the caps lock key set to ON?
o Is there a non-bootable disk in the floppy drive?
o Are the drive settings and boot order configured correctly in BIOS?
o Can we log on as another user?
o Was the computer turned off without being shut down properly?
o Has the password changed?
o Does the monitor have power?
o Does the display have the correct settings?
3. Try Quick Solutions First
īˇ Use the Last Known Good Configuration settings
īˇ Enter Safe Mode to troubleshoot video problems
īˇ Uninstall an application that was recently added
īˇ Roll back the system using a System Restore point
īˇ Examine the Device Manager for device conflicts
īˇ Run cleanmgr to clean up temp files
15. VG-PRUCAS-PENNAGARAM
īˇ Run chkdsk/f to repair problems with the hard drive
īˇ Run defrag to speed up the hard drive
īˇ Reboot the computer
īˇ Login as a different user
4. Gather Data from the Computer
īˇ Examine system files.
īˇ Run diagnostic software.
īˇ Refer to the computer user manual or BIOS website for the meaning of beep codes.
īˇ Examine the event logs to determine the cause of computer problems.
5. Evaluate Problem & Implement Solution
īˇ We may need to conduct further research
īˇ Refer to repair manuals
īˇ Study the product documentation
īˇ Visit the manufacturerâs website
īˇ Consult repair journals
īˇ Talk to technicians who may have repaired similar problems.
īˇ Implement the most likely solution first
īˇ Return the computer to the original state before trying the next solution
īˇ It may be necessary to test many potential solutions before the problem is resolved
6. Close with the Customer
īˇ When we are confident that the problem is resolved:
īˇ Document the customer information, problem description, and steps to resolve the issue in the
work order.
īˇ Explain to the customer how we solved the problem .
īˇ Let the customer verify that the problem has been solved.
īˇ Complete all documentation including sales orders, time logs, and receipts.
īˇ Complete the work order.
īˇ Update the repair journal. We can use the notes from the journal for future reference.