Vous êtes sur la page 1sur 54

Juan Sumulong Memorial Schools System Inc.

SMHS JSMJC APHS


School Year 2015 - 20016
SUBJECT MATTER OUTLINE
TECHNOLOGY AND LIVELIHOOD EDUCATION - COMPUTER
GRADE TEN
Course Title: Information and Communications Technology Computer Hardware Servicing and Game
Development
Introduction:
This is a specialization course which leads to a Computer Hardware Servicing National Certificate
Level II (NC II). It covers three core competencies that a Grade 10 Technology Livelihood Education (TLE)
student ought to possess: 1) configuring computer systems and networks; 2) maintaining computer
systems and networks; and 3) game development using Microsoft Visual C# Programming Language and
Microsoft XNA.
Subject Outline:
FIRST GRADING/THIRD GRADING
PRELIMINARY
COMPUTER HARDWARE SERVICING
Lesson 1 Configuring Computer
Systems and Networks
1.

2.

3.

Plan and prepare for


configuration
OHS Policies and Safety
Procedures
Network, its Communication
Types and Architecture
Network Types and Topology
Network Materials, Tools,
Devices and Equipment
Procedure in using the Tools
and Equipment
Configure computer system
and network
Making Ethernet Cables
Cable Splicing Cross over
Setting IP Address
Network Security
File and Printer Sharing
Inspect and test configured
computer system and networks

Guidelines for Testing


Computer Systems and
Networks

Network Tests and


Diagnostics

Hands-on:
LAN Cabling
(Cross over and Straight Thru)
Testing LAN cable
Configuring (peer to peer)
File Sharing and printing

MIDTERM
Lesson 2 - Maintaining Computer
and Network Systems
1.

Plan and Prepare for


Maintenance of Computer
System and Networks

PC Specifications

Faulty Computer System

Tools and Testing


Equipment
2. Maintain Computer Systems

Cleaning the hardware


components

Diagnostics Software

Maintenance Techniques

Solutions to Faulty
Computer System
3. Inspect and test
Configured/Repaired computer
systems and networks

Computer Communications

Internet Connectivity

DEPARTMENTAL
GAME DEVELOPMENT
Chapter 1
Understanding Game Design
Lesson 1 Game Classification
Lesson 2 Game Motivation and
Design
Lesson 3 Game Design
Document

Written Activities :
Time line of Game History
Differences of List of Game
Classification (table making)
List of Game Motivation
Illustration of Logo (Draft)

Hands-on Activities:
Hands-on:
Diagnose and trouble shoot network
Problem
Installing anti- virus
Checking installed anti-virus

Combinations in Game Genre


What is Special about your Game
Game Names and Logo

Reference Materials:
K to 12 Basic Education Curriculum
Junior High School TLE and Senior High School Tech-Voc-Livelihood Track
Information and Communications Technology Computer Hardware Servicing
D Whiz in Game Development, Rex Bookstore Inc.
Subject Requirements:
LAN Cabling
File Sharing
Printed Documents
Hands-on Exercises

SECOND GRADING/FOURTH GRADING


PRELIMINARY
Chapter 2
Learning the C# Programming
Language

MIDTERM
Lesson 6 Control Statements

DEPARTMENTAL
Chapter 3
Working with Microsoft XNA
Lesson 7 Working with
Microsoft XNA

Lesson 4 Get Started with the


C# Programming
Language

Lesson 8 Preparation for the


Game Window

Lesson 5 Understanding
Variables

Lesson 9 Image Management

Familiarization :

Familiarization:

Manipulating C# Language

If Else Statement,
Values and its result
Loops

Written Activities:

Written Activities:

Parts and Its Function (Table)


List of Global and Local Variables
Illustration of Flowchart

List of Values and its Results


Functions of if statement in values
List of Symbols and its functions

Hands-on Exercises:

Hands-on Exercises:

Creating the Basic C# Structure


Declaring Variables
Assigning Values to Variables
Creating Global Variables
Passing Data Between Methods

Creating a List of Questions Using


Switch
Evaluating Users Input with If Else
Statement
Using For Loop

Activities:
Downloading picture for image
management

Hands-on Exercises:

Reference Materials:
D Whiz in Game Development, Rex Bookstore Inc.
Subject Requirements: Program Output
C# Structure
Question Game
LOGO
Traditional Games
Hangman Game
Hands-on Exercises

The XNA Structure


Managing Your Game Windows
Inserting Background Images
Drawing Images into the Game
Window

OCCUPATIONAL HEALTH AND SAFETY POLICIES


(Ref : http://www.bubblews.com/news/922405-occupational-health-and-safety-for-computer-hardware-servicing)

The following are the OHS observed during computer hardware servicing maintenance
implementation.
A. Workplace
1. Do not work alone so that there's someone who can take care of you in case of
emergency.
2. Contingency measures during workplace accidents, fire and other emergencies are
recognized.
3. Hazard/risks in the workplace and their corresponding indicators are identified to minimize
or eliminate risk to co-workers, workplace and environment.
4. Clean the area before and after using it to maintain sanitation and prevent accidents.
B. Computer systems
1. Always power off and unplug the computer before working on it. When making circuit
changes, switch off and unplug the power cord from the equipment then discharge the
capacitors.
2. Be careful with tools that may cause short circuit.
3. Replace only fuses with those proper rating (usually on AVRs).
4. Handle all sensitive components in non-conducting metallic edge.
5. Check all signal pins and alignment to avoid incorrect connection.
6. Be careful with the sharp edges inside the computer case.
7. Do not use excessive force when installing computer components to prevent damage.
8. Do not clean your system with wet clothes or any liquid detergents.
9. Use brush, compressed air or blower in cleaning the computer system.
C. Technician
1. Personal protective equipment are correctly used in accordance with organization OHS
procedures and practices.
2. Always discharge yourself before touching any part of the computer.
3. Use anti-static devices and rubber footwear to disperse static electricity.
4. Do not eat, drink or smoke when working on your computer.

SAFETY PROCEDURES
(Ref: http://www.upgradenrepair.com/Howtodoandinfo/safety.htm)

There are certain procedures you should follow when you are installing items in your system.
Below is information to avoid damage to your system or/and yourself.

Before entering the computer, move computer off the carpet (for static purposes). If your
not able to then try not to move on the carpet to keep the static from building.
Disconnect all cables including power cord. Remove the power cord, monitor, keyboard,
mouse, phone line, network cable, speakers, printer, scanner, USB cables, cable modem,
DSL modem and anything else that is connected. (it should look similar to the picture
below)

With everything disconnected, push the power button for 5 seconds. (with power cord
disconnected). The computer can store power even with the power cord disconnected.
Pushing the power button drains that power (only if the power cord is
disconnected). VERY IMPORTANT!!!

Touch something metal on the case of the system to release any static build up in your
body.

Computers are the best dust collectors. Do not blow on the dust with your breath.
Your breath has moisture and electronics hate moisture.

If you want to clean the inside of the system of dust, use compressed air that is designed
for electronics.

While using the compressed air, do not hold down the button. Not only will the can get
cold, moisture will also form. Use quick short bursts.

When handling parts, do not touch the bronze teeth. Hold the parts on the edges if at all
possible.

Be careful while inside system, the system has sharp edges.

Never put your hands inside system when the system is either plugged in or turned on.

Some computer desks have a compartment that you can put your computer in. Make sure
that compartment is well ventilated. If it is not ventilated, it can fry the system. If it is not
well ventilated, you can drill holes in the desk to give it ventilation, or you can install a
small fan in the desk that will circulate air.

Do not connect or disconnect cables while the system or device is turned on. ( unless it is
USB. USB can be disconnected or connected while system is on). Equipment can be
damaged by this.

DEFINITION
A computer network is a telecommunications network that allows computers to exchange data.
The physical connection between networked computing devices is established using either cable
media or wireless media (radio waves/infrared).
TYPES OF NETWORK COMMUNICATION
Intranet

- is a private network within an organization that resembles the internet


- organizations use intranets to provide information to their employees
- typical applications include electronic telephone directories, email addresses,
employee information, internal job openings and much more

Extranet

- is a private network that connects more than one organizations


- many organizations use the internet technologies to allow suppliers, customers
and business partner limited access to their network
- the purpose is to increase efficiency and reduce costs

Internet

- is a public network
- is worldwide collection of networks that links million of business, government
agencies, educational institution and individuals

- internet users can access service like web browsing, email, file transfer, mailing
list, chat rooms, instant messaging and newsgroups

CLASSIFICATION OF NETWORK ARCHITECTURE


The architecture of a network is a logical design that determines how the devices in the network
communicate.
CLIENT-SERVER ARCHITECTURE
On a network built using the client-server architecture, the devices communicate to other
devices through a central computer referred to as a server. The server is a terminal with
high processing power, which provides services for the other computers on the network.
The client is a terminal that accesses the resources available on a server.

WORKSTATION

WORKSTATION

WORKSTATION

PEER-TO-PEER ARCHITECTURE
On a network built using the peer-to-peer architecture, no specific distinction exists
between a client and a server. Any node can provide a service as well as send a request
for a service from another node on the network. The peer-to-peer network architecture
allows sharing of resources, data, and users. Each node on the network has full control
over the network resources.

HYBRID ARCHITECTURE
A hybrid, in general, is a composition of two different types of elements. A hybrid network
architecture is created to get the benefits of both, the peer-to-peer and the client-server
architectures in a network.

TYPES OF NETWORK
(Based on the size and the coverage area)
PERSONAL AREA NETWORKS (PANs)
A personal area network (PAN) is a computer network used for communication among
computer and different information technological devices close to one person. It is a small
network established for communication between different devices such as laptops,
computers, mobiles, and PDAs. A PAN may include wired and wireless devices. The reach of a
PAN typically extends to 10 meters.
LOCAL AREA NETWORK (LANs)
A local area network (LAN) is a network that connects computers and devices in a
limited geographical area such as a home, school, office building, or closely positioned group
of buildings. Each computer or device on the network is a node. Wired LANs are most likely
based on Ethernet technology.
METROPOLITAN AREA NETWORK (MANs)
Metropolitan Area Network (MAN) is high speed network that connects local area
network in Metropolitan Area such as city or town and handles bulk of communication activity
across the region. A MAN typically includes one or more LAN but covers a smaller
geographically area than a WAN.
WIDE AREA NETWORK(WANs)
A wide area network (WAN) is a computer network that covers a large geographic area
such as a city, country, or even intercontinental distances. A WAN uses a communications
channel that combines many types of media such as telephone lines, cables, and air waves. A
WAN often makes use of transmission facilities provided by common carriers, such as
telephone companies. One of the most prominent examples of the existing WANS is the
Internet
NETWORK TOPOLOGY
The pattern of interconnection of nodes in a network is called the Topology. This layout also
determines the manner in which information is exchanged within the network.
BUS
-

TOPOLOGY
Popular topology for data network
Single transmission medium onto which various nodes are attached.
Normally coaxial cable is used.
Terminators at both end of BUS absorb signal, removing it from BUS.

STAR TOPOLOGY
The star topology connects nodes over a network using a central control unit called the hub.
You can easily add nodes to a star-based network by attaching the required nodes to the hub.
Setting up a star topology requires a lot of cabling because all the nodes have to connect to
the hub.

RING TOPOLOGY
The ring topology connects the nodes on a network through a point-to-point connection. Data
is accepted from one neighboring node transmitted to other. Data travels in one direction. If
one of the nodes on the network stops, the entire network stops functioning.

MESH
-

TOPOLOGY
Each node is connected to more than one node.
Provide an alternate route mechanism
Excellent for long distance networking
Supports back-up and rerouting
Used in large internetworking environments with stars, rings and buses as nodes

TREE TOPOLOGY
The tree topology is created where the nodes are connected in a hierarchical manner. In tree
topology, the device at the root is referred to as the parent for all the other nodes or devices
in the network. The nodes below a parent node are referred to as child nodes.

HYBRID TOPOLOGY
The hybrid topology can be a combination of two or more basic topologies such as bus, ring,
star, mesh, or tree. Hybrid networks combine more than two topologies, which, in turn,
enable you to get advantages of the constituent topologies

NETWORK MATERIALS, TOOLS, DEVICES AND EQUIPMENT


TOOLS, EQUIPMENT AND TESTING DEVICES

1. Protective Eyewear to protect the eye

2. Pliers - hand tool used to hold objects firmly.


Pump pliers are ideal for tackling plumbing jobs,
as well as miscellaneous household repairs that call
for the installation or removal of stubborn bolts.
They're like hands, but less sweaty and more grabby.

Any time that precision counts. Narrow jaw tips


make this type of pliers the right choice for zeroing
in on specific points along wires that need to be
carefully shaped.

Times when you need to cut through thick


wires that won't yield to a standard household
wire cutter.

Anytime you need to make very carefully controlled


cuts on circuit boards. Also perfect for trimming the
delicate wire used in jewelry-making

Every single time you work in close proximity to live


electrical circuits and energized components.

3. Screw driver is a tool, manual or powered, for turning (driving or


removing) screws.

Phillips is perhaps the most common type of screw drive. It is characterized by a


cross in the middle of the screw head, with the four ends not extending to the
end of the screw head. The cross also has a ball point in the middle. The
screwdriver itself is cross-shaped, with each cross blade being tapered at 57
degrees. The blades protrude slightly from the screw drive for easy removal of
the screwdriver.

Flathead/Slotted
The slotted style is the original type of screw drive, with a straight slotted line
going across the screw head, from end to end. These are also very common,
though it is becoming harder to find them in applications that require a good
amount of torque because the screwdriver tends to slip out of the slot more
easily than drivers do for other screw drive types. Slotted screwdrivers have a flat
blade that varies in size depending upon the size of the slot. The table below
shows the blade width that corresponds with the slot size.

Hex
Whereas a Torx screw drive has six points, a hex screw drive has six even sides,
giving it the shape of a hexagon. Many hex-type screws can be fastened and
unfastened using an allen wrench, but there are also hex screwdrivers that can be
used for these purposes. The six sides create a stronger connection between the
screwdriver and the screw drive than a square recess screw drive has with its
compatible screwdriver.

4. LAN Tester - is a circuit


used to check the LAN cables

5. Crimping Tools is a tool designed to crimp or connect a connector to the end of


a cable.

PERSONAL PROTECTIVE EQUIPMENT


Gloves (anti-static) - a covering for the hand worn
for protection against cold or dirt

Goggles protection for the eye

NETWORK MATERIALS
UTP Cable - A popular type of cable that
consists of two unshielded wires twisted
around each other.

Terminals or switch hub - A common connection


point for devices in a network

RJ45 CONNECTOR

PROCEDURE IN USING THE TOOLS AND EQUIPMENT


(Ref: https://www.cmu.edu/ehs/occupational-office/workplace-safety/tools-and-equipment.html)

1.
2.
3.

4.
5.

Only tools and equipment which are in good condition may be used.
Tools shall only be used for the purpose for which they were designed.
Employees shall make frequent inspections of tools and equipment, and
immediately remove from service any items found defective. The following are
examples of the types of defects which should be looked for:
Split, broken, cracked, or splintered wooden handles.
Mushroomed heads on chisels or impact drills.
Wrench jaws which slip or do not hold.
Frayed cords, damaged or modified grounding plugs, or broken insulation on
electrical tools.
Rounded edges on sharp-edged tools.
Dull cutting tools.
When using hand tools, the employee shall place himself in such a position that he
will avoid injury if the tool slips.
Only soft faced hammers (brass, plastic, rubber, or similar materials) shall be used
on highly tempered steel tools such as cold chisels, star drills, etc. Proper eye
protection must be worn when performing such an operation.

6.
7.
8.
9.
10.
11.
12.
13.

14.
15.
16.
17.
18.
19.

Files, rasps, and other tools having sharp tangs shall be equipped with approved
handles.
Tools which are not in use shall be placed where they will not present a tripping or
stumbling hazard.
Pointed tools shall never be carried edge or point up in pockets.
Tools shall not be thrown from one worker to another, or to another working
location.
Extensions shall not be used on wrenches to gain leverage unless the wrench is
designed to be used in such a fashion.
When cutting wire or any other material under tension, the material being cut shall
be secured to prevent the ends from snapping free.
All power tools must be properly grounded before their use.
Gloves shall not be worn when operating lathes, drill presses, power saws, or
similar equipment. Loose clothing must not be worn and long sleeves should be
rolled up prior to operation.
Hooks, brushes, vacuums, or special tools shall be used to remove dust or chips.
Compressed air shall not be used.
All machinery must be turned off when unattended.
Maintenance, repairs, adjustments, and measurements must not be made while
saws, lathes, grinders, and similar equipment are in operation.
Compressed air shall never be used to dust off clothing, or be directed toward
another person.
Sawblades, gears, sprockets, chains, shafts, pulleys, belts, and similar apparatus
shall not be operated without the proper guarding.
Safety glasses, goggles, or face shields shall be worn when operating power tools.

MAKING ETHERNET CABLES


(Ref:http://www.groundcontrol.com/galileo/ch5-ethernet.htm)

HOW TO MAKE AN ETHERNET CABLE


Purchasing Ethernet cables can be quite expensive and
pre-made lengths are not always the length you need.
Making Ethernet cables is easy with a box of bulk Category
5e Ethernet cable and RJ-45 connectors that are attached
to the cut ends of your preferred cable length.

Bulk Ethernet Cable - Category 5e or CAT5e


(You may also use Category 6 or CAT6 cabling which has
higher performance specifications and is about 20% more
expensive than CAT5e.)

Bulk RJ45 Crimpable Connectors for CAT-5e


or
Bulk RJ45 Crimpable Connectors for CAT-6

RJ-45 Crimping tool

There are two kinds of Ethernet cables you can


make, Straight Through and Crossover.

STRAIGHT THROUGH Ethernet cables are the


standard cable used for almost all purposes. It is
highly recommend you duplicate the color order
as shown on the left. Note how the green pair is
not side-by-side as are all the other pairs. This
configuration allows for longer wire runs.

CROSSOVER CABLES - The purpose of a


Crossover Ethernet cable is to directly connect
one computer to another computer (or device)
without going through a router, switch or hub.

CABLE SPLICING CROSS OVER


(Ref : http://www.wikihow.com/Make-a-Crossover-Cable-from-One-Standard-Ethernet-Cable)

1. Find a standard Ethernet cable you don't use for anything. With this guide, you will
be able to use a long 100 feet (30.5 m). cable, or a shorter size, whatever your needs
require.
2. Towards one end of the cable, cut open a slit a few inches long. Be careful not to
damage the wiring inside the cable or cut yourself.
3. Peel back and remove the cable casing. This will leave the inner wiring exposed.
Examine how the wiring is twisted together and note the colors of the wires. For this
project, we will be cutting the colored wires (green, orange, white-green, white-orange)
and leaving the other wires in place as usual.
4. Cut the green, orange, white-green and the white-orange. The other wires will be
left as-is.
5. With the wires cut, work now one-by-one.
First, strip the orange wire on both cut sides down. (approx. 1/4 or 1/2 inch)
After both ends of the orange wire has been stripped, strip both ends of the green
wire down. (approx. 1/4 or 1/2 inch)
6. On Side "A" we will call it, connect the green stripped end to the orange stripped
end on Side "B". Twist the wires together, and mend with electrical or another kind of
tape. If you have a soldering iron, you can optionally solder the leads together.
7. You now have one step of your crossover wire completed. Lets continue on.
8. Just as we connected the orange and green wires for one side of our crossover
cable, lets now repeat the process with the final two wires.
Start by stripping the green-white wires. (once again, approx. 1/4 or 1/2 inch)
Repeat the wire stripping on orange-white wires. (once again, approx. 1/4 or 1/2
inch)
9. On Side "A", join the green-white wire to the orange-white wire on Side "B".
Twist the wires together and fix with tape. Again, if you prefer, you can solder the wires
together as opposed to twisting them together.
10. Join the remaining wires. Join the orange-white wire on Side "A", with the green-white
wire on Side "B". Fashion the wires with tape or solder.
11. Clean the cable up.
Note the direction that the wiring in the cable case is twisting.
Holding the cable in your hands, twist the cable in the same way as the internal
wiring is twisted.
12. Admire your new, homemade crossover cable!

Setting a Static IP Address in Windows 7


It is very important to setup a static ip address, if you are going to use port forwarding.
When you have port forwarding setup, your router forwards ports to an ip address that
you specify. This will probably work when you initially set it up, but after restarting your
computer it may get a different ip address. When this happens the ports will no longer
be forwarded to your computer's ip address. So the port forwarding configuration will not
work.
What is an ip address?
IP addresses are four sets of numbers separated by periods that allow computers to
identify each other. Every computer has at least one ip address, and two computers
should never have the same ip address. If they do, neither of them will be able to
connect to the internet. There is a lot of information at the following link. You don't need

all of it. But if you want to know more about how networks work, you'll find it there. For
more information on ip addresses, subnets, and gateways go here
Dynamic vs Static IPs Most routers assign dynamic IP addresses by default. They do
this because dynamic ip address networks require no configuration. The end user can
simply plug their computer in, and their network will work. When ip addresses are
assigned dynamically, the router is the one that assigns them. Every time a computer
reboots it asks the router for an ip address. The router then hands it an ip address that
has not already been handed out to another computer. This is important to note. When
you set your computer to a static ip address, the router does not know that a computer
is using that ip address. So the very same ip address may be handed to another
computer later, and that will prevent both computers from connecting to the internet. So
when you asign a static IP addresses, it's important to assign an IP address that will not
be handed out to other computers by the dynamic IP address server. The dynamic IP
address server is generally refered to as the dhcp server.
ASSIGNING IP ADDRESS
(Ref : http://portforward.com/networking/static-win7.htm)

If you have a printer, before you begin print out this page!
Step 1:
Open up the start menu, and look for the Search programs and files box. You should now see
the following window.

Step 2:
Type cmd in the Search programs and files box, and press Enter on your keyboard. The will
bring up a black command prompt window.

Step 3:
The command prompt may look different on your screen, but it doesn't really matter.
Type ipconfig /all in that window, and then press the enter key. This will display a lot of
information. If it scrolls off the top you may need to enlarge the window.

Step 4:
I want you to write down some of the information in this window. Take down the IP address,
Subnet Mask, Default Gateway, and Name Servers. Make sure to note which is which. We are
going to use this information a little bit later. We are only concerned with IPv4 entries, you can
ignore the IPv6 stuff.
The name server entries are a bit complicated. Name Server is just another name for
DNS(domain name server) server. Some router's act as a proxy between the actual name
servers and your computer. You will know when this is the case, because the Default Gateway
will list the same ip address as the Name Servers entry. We need to have the correct Name
Server IP addresses. If we do not, you will not be able to browse the web. There are a couple
ways to get these. The first way is to log into your router's web interface, and look at your
router's status page. On that page you should see an entry for DNS Servers, or Name Servers.
Write down the ip adresses of your Name Servers. Another way to get the correct Name Servers
to use, is to give your ISP a call. They should know the ip addresses of your Name Servers right
off. If they ask you why you need them, you can tell them you are trying to setup a static IP
address on your computer. If they try to sell you a static external ip address, don't buy it. That's
an entirely different thing that what you are trying to setup.
Type exit in this window, then press the enter key to close it.
Step 5:
Once again open the start menu. This time click Control Panel.

Step 6:
Click on View Network Status and Tasks.

Step 7:
Single click Change adapter settings on the left side of your screen.

Step 8:
You might have more than one Internet connection listed here. You will need to determine which
adapter is your connection to the Internet if this is the case. Right click on your network adapter
and choose propertiesto open up the properties window of this internet connection.

Step 9:
Click Internet Protocol Version 4(TCP/IPv4) and then the Properties button.

You will see the following screen:

Step 10:
Before you make any changes, write down the settings that you see on this page. If something
goes wrong you can always change the settings back to what they were! You should see a dot in
the Obtain an IP address automatically box. If you do not, your connection is already setup
for a static ip. Just close all these windows and you are done.

Pick an ip address and enter it into the IP Address box. The ip address you choose should be
very similar to the router's ip addres. Only the last number of the ip address should be different.
If the router's ip address is 192.168.1.1, I might choose 192.168.1.10. The ip address you
choose should end with a number between 1 and 254, and should not be the same as the
router's ip address. Every device that connects to your network needs to have it's own ip
address.
Put the subnet mask we previously found in the subnet mask section. The default gateway
should go into theDefault gateway box. Enter the dns servers we prevoiusly found into the
two DNS Server boxes. Click okay all the way out of this menu.
If you find that you can not pull up webpages, the problem is most likely the dns numbers you
entered. Give your ISP a call, and they will be able to tell you which dns servers to use. This is a
question they answer all of the time. They will be able to tell you what you should use right
away.
That's it you should be done! If you can't connect to the internet go back and change your
configuration back to what it originally was.
NETWORK SECURITY
1.
2.
3.
4.
5.
6.
7.
8.

Click the Start button


Click Control Panel
Under Network and Internet click View network status and tasks
On the left hand menu, click Manage Wireless Networks, then locate your wireless
network on the new menu.
Right-click on your wireless network and select Properties
Click on the Security tab
Check the box that says Show characters, if it is not already checked.
The Network security key box will display your key. You can use this same key to connect
other devices to your network.

FILE AND PRINTER SHARING


You can turn your humble Windows client computer running Windows 7 or Windows 8 into a
server computer so that other computers on your network can use your printer and any folders
that you decide you want to share. In effect, your computer functions as both a client and a
server at the same time. A couple of examples show how:
Its a client when you send a print job to a network printer or when you access a file

stored on another servers hard drive.


Its a server when someone else sends a print job to your printer or accesses a file stored

on your computers hard drive.


Here are the steps to enable file and printer sharing in Windows 7:
1. Click the Start button, type Control Panel, and press Enter.
This step opens the Control Panel.
2. Double-click the Network and Sharing Center icon and then click Change
Advanced Sharing Settings.
This step opens the Advanced Sharing Settings page, which lists network settings for each
network youre connected to.
o For a home computer running Windows 7: Two networks are listed: Home or Work,
and Public.
o In Windows 8: The Home or Work network is called Private.
o For a computer connected to a domain network: A third network named Domain is
listed.
3. Click the down arrow next to the network you want to enable file and printer
sharing for.

o
o

For a home computer: Click the down arrow next to Home or Work (Windows 7) or
Private (Windows 8).
For a computer connected to a domain network: Click the down arrow next to
Domain.

The figure shows the settings for a Domain network. The settings for a Home or Work
network are the same.
Do not enable file or printer sharing for the Public network. Enabling file or printer sharing on
a public network exposes your computers data to other users on the same public network.

4. Select the Turn on File and Printer Sharing option.


5. Click the Save Changes button.
This action saves your changes and closes the Advanced Sharing Settings page.
GUIDELINES FOR TESTING COMPUTER SYSTEMS AND NETWORKS
You've set up all your network switches, plugged in all the cables, and configured all your
computers. One task remains before you can declare your network finished: You must verify that
the network works as expected.
Here are a few simple tests you can conduct to make sure your network is functional.
Check the physical connections.
Check that the Link light the little red or green light next to the RJ-45 port is lit on every
computer. You must check this light both on the computer itself and on the switch or router the
computer is plugged into. If this light is not on, you have a connection problem most likely a
bad cable.
Verify that you can log on.
When you're sure the physical connections are good, you should attempt to log on to each of
your network computers using a valid domain user account.
Check the network configuration.
Click the Start button, type cmd and press Enter. Then, enter the command ipconfig /all and
press Enter.
This command will spit out numerous lines of information. The line you're looking for should
resemble this:
IPv4 Address. . . . . . . . . . . : 192.168.1.125(Preferred)
If this part of the output does not show a valid IP address, you need to check that your IP
configuration is set correctly and that your DHCP server is working.

Verify that the computers can ping each other.


Another basic test you should perform is to use the ping command from a command prompt to
make sure that the computers on your network can contact one another.
Do several ping tests. First, make sure that TCP/IP is up and running by having the computer try
to ping itself. Open a command prompt and type ping localhost. The output from this command
will indicate whether or not the ping was successful

NETWORK TESTS AND DIAGNOSTICS


(Ref:http://en.kioskea.net/contents/110-network-tests-and-diagnostics)

Testing the IP configuration


Before doing anything else, you are advised to check the computer's IP configuration. Windows
systems offer a command-line tool, called ipconfig, that lets you find out your computer's IP
configuration. The output of this command gives the IP configuration for each interface; a
computer with two network cards and one wireless adapter has 3 interfaces each with its own
configuration.
To view your computer's IP configuration, simply enter the following command (Start/run):
cmd /k ipconfig /all
The output of such a command looks like this:
Windows IP Configuration
Host name . . . . . . . . . . : CCM
Primary DNS suffix . . . . . . :
Node type . . . . . . . . . . : Broadcast
IP routing enabled . . . . . . . . : No
WINS proxy enabled . . . . . . . . : No
Ethernet adapter wireless network connection:
Connection-specific DNS suffix:
Description . . . . . . . . . . . : Intel(R) PRO/Wireless LAN 2100 3A Mini PCI Adapter
Physical address . . . . . . . . .: 00-0C-F1-54-D5-2C
DHCP enabled. . . . . . . . . . . : No
IP address. . . . . . . . . . . . : 192.168.1.3
Subnet mask . . . . . . : 255.255.255.0
Default gateway . . . . . . : 192.168.1.1
DNS servers . . . . . . . . . . : 193.19.219.210
193.19.219.211
Ethernet adapter local area connection:
Media status . . . . . . . . . : Media disconnected
Description . . . . . . . . . . . : Broadcom 570x Gigabit Integrated Controller
Physical address . . . . . . . . .: 0F-0F-1F-CB-99-87
The above report shows that the computer has two network interfaces, one of which is wireless.
The name of the machine on the network is CCM.
The Ethernet interface connected to the local area network (network card) is not active since the
cable is disconnected, but the wireless adapter is configured.
Machines on a same network must use a same address range (with different addresses) and a
same subnet mask. In the case of a local network, connecting machines that do not have
routable IP addresses, so-called private address ranges must be used.
The default gateway refers to, when applicable, the IP address of the machine offering internet
access. DNS servers.
The DNS servers must correspond to the organization's DNS servers; most of the time these are
the service provider's DNS servers.
Testing the Connection

To test the proper functioning of a network, there is a highly practical utility provided as a
standard feature with most operating systems; this is the ping utility. Ping lets you send a data
packet to a network computer and lets you evaluate the response time.
To test the network thoroughly, simply open a command-line window, then successively carry
out the following steps:
ping the loopback address (127.0.0.1), representing your computer:
ping -t 127.0.0.1
ping the IP addresses of the network's computers, for example:
ping -t 192.168.0.3
ping the computer names, for example:
ping -t Mickey
ping the computer used as gateway on the local area network, that is, the computer sharing its
internet connection. It usually has the address 192.168.0.1:
ping -t 192.168.0.1
ping the service provider's gateway. The address of the service provider's gateway can be
retrieved using the ipconfig command on the computer being used as gateway on the local area
network;
ping the service provider's name servers . The address of the service provider's DNS servers can
be retrieved using the ipconfig command on the computer being used as gateway on the local
area network;
ping a machine on the internet network, for example:
ping -t 193.19.219.210
ping a domain name, for example:
ping -t www.commentcamarche.net
If all this works, your network is ready to be used!

PC SPECIFICATIONS

MINIMUM SPECIFICATION

Processor
Motherboard (built-in)
o Video Card
o Sound Card
o LAN Card
RAM
Hard Drive
DVD Drive
LED MONITOR
Casing w/power supply
mouse
keyboard
speaker
avr

FAULTY COMPUTER SYSTEM AND NETWORK


(Ref : http://compnetworking.about.com/od/homenetworktroubleshooting/tp/error-messages-fornetworks.htm)
If your network connection is not configured properly or suffers a technical failure, you will often
see some error message generated and displayed on your screen. These messages give helpful
clues to the nature of the issue. Use this list of the common network-related error messages to
help troubleshoot and fix networking problems.
1. "A Network Cable Is Unplugged"
This message appears as a Windows desktop balloon. If your connection is wired, you
may lose access to the network. If your connection is wireless, your network will probably
function normally, although this error message will become an annoyance as it pops up
repeatedly until the issue is addressed. Several different conditions can generate this error
each with their own solution.
2. IP Address Conflict (or Address Already in Use)
If a computer is set up with a static IP address that is being used by some other device on
the network, the computer (and possibly also the other device) will be unable to use the
network. This problem can even occur with dynamic (DHCP) addressing in some cases.
3. "The Network Path Cannot Be Found"
Updating the TCP/IP configuration can resolve this issue sometimes seen on Microsoft
Windows computers when trying to access another device via Network Neighborhood.
4. "Duplicate Name Exists on the Network"
After starting up a Microsoft Windows computer connected to a local network, you may
encounter this error as a balloon message. When it occurs, your computer will be unable
to access the network. You may need to change the name of your computer to resolve this
issue.
5. "Limited or no connectivity..."
When attempting to access a Web page or network resource on a Windows shared drive,
you may receive a pop-up dialog error message that starts with the words "limited or no
connectivity."
6. "Connected with Limited Access..."
A technical glitch in Windows Vista causes this error message to appear when making
certain types of wireless connections. Microsoft has provided a fix for this issue in Vista
service packs. This error can also occur on a home network for other reasons that may
require you to reset your router.
7. "Unable to Join Network Failure" (error -3)
This error appears on the Apple iPhone (or iPod Touch) when it fails to join a Wi-Fi
network. You can troubleshoot this problem the same as you would for a PC that cannot
connect to a hotspot.
8. "Unable to Establish the VPN Connection" (error 800)
When using a VPN client on Windows XP, you may receive error 800 when trying to
connect to the VPN server. This generic message can indicate problems on either the
client or server side.
9. Connection refused
This error means that the network connection PuTTY tried to make to your server was
rejected by the server. Usually this happens because the server does not provide the
service which PuTTY is trying to access.
10. Connection timed out
This error means that the network connection PuTTY tried to make to your server received
no response at all from the server. Usually this happens because the server machine is
completely isolated from the network, or because it is turned off.

TOOLS AND TESTING EQUIPMENT


TOOLS
1. Pliers (assorted)
2. Screw drivers (assorted)
3. Soldering iron/gun- A soldering gun is an approximately pistol-shaped, electrically
powered tool for soldering metals using tin-based solder to achieve a strong mechanical
bond with good electrical contact.

4.Wrenches Any of various hand or powertools, often having fixed or adjustable jaws, used for
gripping, turning, or twisting objects

5. Utility knife/stripper is a knife used for general or utility purposes. The utility knife was
originally a fixed blade knife with a cutting edge suitable for general work.

6. Hot air soldering station A hot air gun or hot air station is used to heat devices and
melt solder,

7. LAN Tester
8. Crimping tools
EQUIPMENT AND TESTING DEVICES
1. Maintenance bench- A test bench or testing workbench is a virtual environment used to
verify the correctness or soundness of a design or model
2. Power supply equipment - A simple desktop power supply with power output connector
seen at lower-left ...supplies are designed to be secured into standard
electronic equipment racks.

3. Multi-meter- is an electronic measuring instrument that combines several measurement


functions in one unit.

4. Calibrators is an equipment used to adjust an instrument accuracy, often associated with a


specific application

5. Signal generator are electronic devices that generate repeating or non-repeating


electronic signals (in either the analog or digital domains).

6. Oscilloscope An electronic instrument that produces an instantaneous


trace on the screen of a cathoderay tube corresponding tooscillations of voltage and
current.

7. Appropriate Software

CLEANING THE HARDWARE COMPONENTS


(Ref: http://www.computerhope.com/cleaning.htm)

Cleaning your computer, components, and peripherals help keep everything in good working
condition and helps prevent germs from spreading. The picture shows a good example of just
how dirty the inside of your computer case can get. In this example, it is obvious that all the
dust and dirt is going to prevent proper air flow and may even prevent the fan from working.
How often should I clean my computer?
General cleaning tips
Cleaning tools
Case cleaning
CD-ROM, DVD, and other disc drives
CD and DVD disc cleaning
Fan cleaning
Hard drive cleaning
Headphones cleaning
Keyboard cleaning
Laptop cleaning

LCD cleaning
Monitor cleaning
Motherboard cleaning
Mouse cleaning
Printer cleaning
Scanner cleaning
How often should I clean my computer?
The frequency of how often you should clean your computer varies on different factors. To help
you determine how often you need to clean your computer we created the checklist below.
Check each of the boxes below that apply to your computers conditions to help determine how
often you should clean the computer.
Where is computer located?
In a home environment
In a clean office environment
In construction or industry environment
In school environment
Computer environment
Have cat or dog in same building as computer
Smoke in same building as computer
Smoke next to computer
Computer is on floor
Room that the computer is in has carpet
Eat or drink by computer
Who uses it?
Adult (18 and older)
Young adults (ages 10-18) use computer
Pre-teen (younger than 10) use computer
More than one person uses computer
With what is checked above, clean your computer every

11

months.

General Cleaning Tips


Below is a listing of suggestions to follow when cleaning any computer components or
peripherals as well as tips to help keep a computer clean.

1. Never spray or squirt any liquid onto any computer component. If a spray is needed,
spray the liquid onto a cloth.
2. You can use a vacuum to suck up dirt, dust, or hair around the computer. However,do
not use a vacuum inside your computer as it generates static electricity that can
damage your computer. If you need to use a vacuum inside your computer, use a
portable battery powered vacuum or try compressed air.
3. When cleaning a component or the computer, turn it off before cleaning.
4. Be cautious when using any cleaning solvents; some people have allergic reactions to
chemicals in cleaning solvents, and some solvents can even damage the case. Try
always to use water or a highly diluted solvent.
5. When cleaning, be careful to not accidentally adjust any knobs or controls. Also, when
cleaning the back of the computer, if anything is connected make sure not to
disconnect the plugs.
6. When cleaning fans, especially smaller fans, hold the fan or place something inbetween the fan blades to prevent it from spinning. Spraying compressed air into a fan
or cleaning a fan with a vacuum may cause damage or generate a back voltage.
7. Never eat or drink around the computer.
8. Limit smoking around the computer.

Cleaning Tools
Although computer cleaning products are available, you can also use household items to clean
your computers and peripherals. Below is a listing of items you may need or want to use while
cleaning your computer.
Cloth - A cotton cloth is the best tool used when rubbing down computer components.
Paper towels can be used with most hardware, but we always recommend using a cloth
whenever possible. However, only use a cloth when cleaning components such as the
case, a drive, mouse, and keyboard. You should not use a cloth to clean any circuitry such
as the RAM or motherboard.
Water or rubbing alcohol - When moistening a cloth, it is best to use water or rubbing
alcohol. Other solvents may be bad for the plastics used with your computer.
Portable Vacuum - Sucking the dust, dirt, hair, cigarette particles, and other particles
out of a computer can be one of the best methods of cleaning a computer. However, do
not use a vacuum that plugs into the wall since it creates lots of static electricity that can
damage your computer.
Cotton swabs - Cotton swaps moistened with rubbing alcohol or water are excellent tools
for wiping hard to reach areas in your keyboard, mouse, and other locations.
Foam swabs - Whenever possible, it is better to use lint-free swabs such as foam swabs.
Tip: See our tools page for a list of other tools every technician should have.

Case Cleaning
Why? Cleaning your case keeps the appearance of the computer looking new. While cleaning, if
you see ventilation slots, these can be cleaned or cleared to help keep a steady airflow into the
computer and keep all components cool.
Procedure: The plastic case that houses the PC components can be cleaned with a slightly
damp lint-free cloth. For stubborn stains, add a little household detergent to the cloth. You
should not use a solvent cleaner on plastics.
Make sure all vents and air holes are hair and lint free by rubbing a cloth over the holes and
vents. It is also helpful to take a vacuum around each of the hole, vents, and crevices on the
computer. It is safe to use a standard vacuum when cleaning the outside vents of a computer.
If you are looking for steps on cleaning the inside of the computer, see the motherboard cleaning
section.
Computer case help and support.

CD-ROM, DVD, and Other Disc Drive Cleaning


Why? A dirty CD-ROM drive or other disc drives can cause read errors when reading discs.
These read errors could cause software installation issues or issues while running the program.
Procedure: To clean the CD-ROM drive we recommend purchasing a CD-ROM cleaner from your
local computer retailer. Using a CD-ROM cleaner should sufficiently clean the CD-ROM laser from
dust, dirt, and hair.
In addition to cleaning the drive with a special disc designed to clean drives, you can also use a
cloth dampened with water to clean the tray that ejects from the drive. However, make sure that
after the tray is cleaned that it completely dry before putting the tray back into the drive.
See the CD disc cleaning recommendation for further steps on cleaning each of your CDs.
Computer CD-ROM and disc drive help and support.My computer is running slow what
steps can I do to fix it?

CD and DVD Disc Cleaning


Why? Dirty CDs can cause read errors or cause CDs to not work at all.
Procedure: Use a cleaning kit or damp clean cotton cloth to clean CDs, DVDs, and other discs.
When cleaning a disc wipe against the tracks, starting from the middle of the CD or DVD and
wiping towards the outer side as shown in the picture below. Never wipe with the tracks; doing
so may put more scratches on the disc.

Tip: If the substance on a CD cannot be removed using water, pure alcohol can also be used.
Computer CD-ROM and disc drive help and support.

Hard Drive Cleaning


Why? Computer hard drives cannot be cleaned. However, they can be cleaned with software
utilities to help it run fast and efficiently. Utilizing these utilities prevent the hard drive from
slowing down.
Procedure: Refer to our basic troubleshooting section for your operating system for steps that
can be done to help improve the performance of your computer.
My computer is running slow what steps can I do to fix it?
Computer hard drive help and support.

Headphones Cleaning
Why? Headphones and headsets can be used by many different people and may need to be
frequently cleaned to help prevent the spreading of germs and head lice.

Procedure: If the headphones being used are plastic or vinyl, moisten a cloth with warm water
and rub the head and earpieces of the headphones.
Note: If the headphones are being used for a library or school, do not use any disinfectant or
cleaning solvent since some people can have allergic reactions to the chemicals they contain.
Headphones that have cushions also have the availability of having the cushions replaced.
Replacing these cushions can also help keep the headphones clean.
Finally, in regards to headphones spreading head lice. If many different students use the same
headphones, consider having the students using their own headphones, placing bags over the
headphones, or using headphones that can be wiped with warm water after each use.

Keyboard Cleaning
These steps are for cleaning a desktop keyboard. See the cleaning a laptop keyboard page for
laptop steps.
Dust, dirt, and bacteria

The computer keyboard is usually the most germ infected items in your home or office. A
keyboard may even contain more bacteria than your toilet seat. Cleaning it helps remove any
dangerous bacteria and keeps the keyboard working properly.
Procedure: Before cleaning the keyboard first turn off the computer or if you are using
a USB keyboard unplug it. Not unplugging the keyboard can cause other computer problems as
you may press keys that cause the computer to perform a task you do not want it to perform.
Many people clean the keyboard by turning it upside down and shaking. A more efficient method
is to use compressed air. Compressed air is pressurized air contained in a can with a very long
nozzle. To clean a keyboard using compressed air aim between the keys and blow away all of the
dust and debris that has gathered there. A vacuum cleaner can also be used, but make sure the
keyboard does not have loose "pop off" keys can be sucked up by the vacuum.
If you want to clean the keyboard more extensively, remove the keys from the keyboard.
After the dust, dirt, and hair has been removed. Spray a disinfectant onto a cloth or use
disinfectant cloths and rub each of the keys on the keyboard. As mentioned in our general
cleaning tips, never spray any liquid onto the keyboard.
Substance spilt into the keyboard
If the keyboard has anything spilt on it (e.g. pop, cola, Pepsi, Coke, beer, wine, coffee, and
milk), not taking the proper steps can destroy the keyboard.

Procedure: Below are recommendations that can help prevent a keyboard from becoming bad
after something has spilt into the keys.
If anything is spilt onto the keyboard turn the computer off immediately or at the very least
disconnect the keyboard from the computer. Once done flip the keyboard over to prevent the
substance from penetrating circuits. While the keyboard is upside down, shake the keyboard
over a surface that can be cleaned later. While still upside down, use a cloth to start cleaning the
keys. After cleaned leave the keyboard upside down for at least one night allowing it to dry.
Once dry, continue cleaning the keyboard with any remaining substance.
If after cleaning the keyboard keys are sticking, remove the keys and clean below the keys and
the bottom portion of the key.
Finally, if the keyboard still works but remains dirty or sticky before discarding the keyboard as a
last resort try washing the keyboard in the dishwasher.
If after doing all the above steps the keyboard still does not work we recommend buying a new
keyboard.
Computer keyboard help and support.

LCD Cleaning
Why? Dirt, dust, and fingerprints can cause the computer screen to be difficult to read.
Procedure: Unlike a computer monitor, the LCD or flat-panel display is not glass and requires
special cleaning procedures.
When cleaning the LCD screen it is important to remember to not spray any liquids onto the LCD
directly, press gently while cleaning, and do not use a paper towel since it scratches the LCD.
To clean the LCD screen use a non-rugged microfiber cloth, soft cotton cloth, or Swiffer duster. If
a dry cloth does not completely clean the screen, you can apply rubbing alcohol to the cloth and
wipe the screen with a damp cloth. Rubbing alcohol is used to clean the LCD before it leaves the
factory.
Computer Flat panel and LCD help and support.

Monitor Cleaning
Tip: This section is for computer monitors if you have an LCD or flat-panel see theLCD cleaning
section.
Why? Dirt, dust, and fingerprints can cause the computer screen to be difficult to read.
Procedure: A glass monitor screen can be cleaned with ordinary household glass cleaner. Be
sure to remove power from the monitor and spray the cleaner onto a lint-free cloth so the fluid
does not leak into the electrical components inside the monitor. Vacuum off any dust that has
settled on top of the monitor, and make sure no books or papers are covering the air vents.
Obstructed monitor vents can cause the monitor to overheat or even catch on fire.
Caution: We suggest only using a cloth dampened with water when cleaning non-glass monitors
or any anti-glare screens. Using ordinary household glass cleaner on special screens, especially
cleaners with ammonia can remove anti-glare protection or other special surfaces.
Other good cleaning solutions
Microfiber Towels

Swiffer Dusters
Related pages
Computer monitor help and support.

Motherboard Cleaning
Why? Dust and especially particles of cigarette smoke can build up and corrode circuitry causing
various problems such as computer lockups.
Caution: When inside the computer take the necessary ESD precautions and try to avoid
unplugging any cables or other connections.
Procedure: Our recommendation when cleaning the motherboard from dust, dirt, or hair is to
use compressed air. When using compressed air, hold it in the upright position to prevent any of
the chemicals from coming out of the container, which may damage or corrode the Motherboard
or other components. Also, ensure when using compressed air that you always blow the dust or
dirt away from the motherboard, or out of the case.
Another good alternative to compressed air is a portable battery powered vacuum. Portable
vacuum's can effectively remove the dust, dirt, and hair from the motherboard completely and
prevent it from getting trapped within the case.
Warning: Never use an electricity powered vacuum as it can cause lots of static electricity that
can damage the computer. When using a vacuum keep it a couple inches away from the
motherboard and all other components to prevent damage and anything from being sucked into
the vacuum (e.g. jumpers or small cables).
Tip: When cleaning the inside of the case also look at any fans or heat sinks. Dust, dirt, and hair
can collect around these components the most.
Computer motherboard help and support.

Mouse Cleaning
Why? A dirty optical-mechanical mouse (mouse with a ball) can cause the mouse to be difficult
to move as well as cause strange mouse movement.
Procedure: To clean the rollers of an optical-mechanical mouse, you must first remove the
bottom cover of the mouse. To do this, examine the bottom of the mouse to see what direction
to rotate the cover. As you can see in the below illustration, the mouse cover must be moved
counter clockwise. Place two fingers on the mouse cover and push the direction of the arrows.

Once the cover has rotated about an inch, rotate the mouse into its normal position, covering
the bottom of the mouse with one hand and the bottom should fall off including the mouse ball.
If the cover does not fall off try shaking the mouse gently.
Once the bottom cover and the ball is removed, you should be able to see three rollers located
within the mouse. Use a cotton swab, finger, or fingernail to remove any substance. Usually,
there is a small line of hair and dirt in the middle of the roller, remove as much as this substance
as possible.
Once you have removed as much dirt and hair as possible, set the ball back within the mouse
and place the cover back on.
If the mouse still has the same problems repeat the above process. If after several attempts the
mouse is still having the same problems, your mouse has other hardware issues and should be
replaced.
Note: Cleaning your mouse pad with a damp cloth can also help improve a computer's mouse
movement.
Why? To help keep the mouse clean and germ-free, it can be helpful to clean the mouse.
Procedure: Use a cloth moistened with rubbing alcohol or warm water and rub the surface of
the mouse and each of its buttons.
Computer mouse help and support.

Printer Cleaning
Why? Cleaning the outside of a printer can help keep the printer's appearance looking good and
if used by many different people keep the printer clean of germs.
Procedure: First, make sure to turn off the printer before cleaning it. Dampen a cloth with
water or rubbing alcohol and wipe the case and each of the buttons or knobs on the printer. As
mentioned earlier, never spray any liquid directly onto the printer.
Why? Some printers require the inside to be cleaned to help keep the printer running smoothly.
Computer printer help and support.

Scanner Cleaning
Why? Flatbed scanners commonly become dirty with dust, fingerprints, and hair. When the
scanner is dirty, the images may have distortions.

Procedure: Clean a flatbed scanner's surface by spraying a window cleaner onto a paper towel
or cotton cloth and wipe the glass until clean. As mentioned earlier, never spray a liquid directly
onto the component.
The same towel or cotton cloth can also be used to clean the outside of the scanner.

DIAGNOSTICS SOFTWARE
(Ref: http://www.techradar.com/news/software/applications/10-best-free-lightweight-networking-tools-1088165)

Tools in the list will help the network with performance issues, network management, security,
file sharing and more. And they're all free, and very lightweight: even installing all ten will use
less than 7MB hard drive space.
1. Network Stuff 3.0.9 - 1.34 MB
Figuring out what's happening on your network normally involves a whole library of tools,
yet somehow Network Stuff has managed to cram them all into a single portable
application.
It's strong on the basics, for instance: the program can display your IP addresses (both
local and external), scan your network for other systems, reveal MAC addresses and run
graphical ping or trace routes to the addresses you specify.
But Network Stuff can also display all the currently open network and internet
connections; use built-in Who is and DNS tools to get more information on IP addresses;
remotely wake up or shut down other systems on your network, and the list goes on.
The only problem here is complexity, as there's a lot to explore. If you get lost, though,
check the author's website for some helpful guidance.
2. DNS Jumper 1.0.5 - 812KB
Changing your DNS settings can improve your online security, perhaps give you access to
sites you couldn't reach otherwise, and improve your browsing speed. Windows doesn't
exactly make this easy, but that's where DNS Jumper comes in.
This tiny tool comes with a lengthy list of DNS alternatives. If you're not sure which is
best then it can test them all to find the fastest. When you're happy, it's able to apply
your preferred DNS settings in a click, and the program can even back up and restore
your original settings to avoid the chance of any problems.
3. RawCap 0.1.4.0 - 20KB
Packet sniffing - capturing network traffic for later analysis - can be an invaluable way to
diagnose tricky network problems, both hardware and software. And there are few easier
ways to get the job done than with the super-lightweight RawCap.
The program is a command line tool, but it's also straightforward to run from Explorer.
Just double-click the file, choose your network interface, enter an output file name, and
that's it - the program will capture raw packets and save them in a .pcap file.
Unsurprisingly for a 20KB tool, there's no help here to analyze the finished results. Just
opening the file in Notepad may be enough, though if you're looking for plain text. And
there's no doubting RawCap's simplicity: it doesn't need any other components or DLLs
beyond the .NET Framework 2.0.
4. Fast Software Audit 1.0.0 - 160 KB
If you manage a PC network then you'll know it's important to keep track of the software
your users are installing. You could check this manually, or invest in some big corporate
inventory tool, but the ultra-compact Fast Software Audit - portable and only 160KB could be enough. Just enter the network names of the computers you'd like to audit and
it'll quickly scan them, revealing the list of installed applications. (Though please note,
your systems will need the Remote Registry service to be running for this to work.)
5. CloseTheDoor 0.2.1 portable - 484 KB
When you want to secure your network it's important to understand which processes are
listening for connections, and the portable CloseTheDoor will tell you everything you want
to know: the network interface, ports, protocols, process, related Windows services and a
whole lot more.

All this information can seem baffling at first, but CloseTheDoor can help. Right-click
something and you'll find options to search the web for useful information on the process,
port and how it's generally used.
And if you do identify malware then CloseTheDoor can even shut down that process,
though be careful - if you accidentally terminate something important then you might
crash your PC.
6. BlueLife Hosts Editor 1.0 - 388KB
The HOSTS file can be used to tell Windows the IP address of various network or Internet
resources, so improving performance or allowing you to block some sites or resources
entirely.
Windows doesn't make it particularly easy to access HOSTS, unfortunately, but
the BlueLife Hosts Editor probably provides everything you'll need. Just launch the
program to view your current HOSTS file, then add or remove entries to suit your needs,
and save the results when you're finished: easy.
Beware, though, if you try to block a site you've just visited then it'll appear not to work,
as Windows will cache the previous IP address. Save the new file, click "Flush DNS" and
everything should now work just as you expect.
7. Network Activity Indicator 1.6 -1.03 MB
We often miss the old Windows XP network icon, where the monitors flashed to show
network activity. But now there's an easy way to get it back. Install Network Activity
Indicator and it'll immediately restore the same icon to your system tray. (Although
Windows Vista/Windows 7 will often hide it again: click the arrow to the left of the system
tray area, click Customize and set "Network Activity Indicator" to "Show icon and
notifications to bring it back.)
This isn't just a cosmetic tool, though. You can also customize the program to flash only
for particular network traffic (TCP, UDP, ICMP), or on specific network interfaces. And it's
even able to provide details on network traffic (MB's uploaded and downloaded), and a
host of useful statistics (open connections, failed connection attempts, errors received,
more).
8. RemoteRebootX 2012 - 428KB
Network management can be easier than you think. If you've got a copy of
RemoteRebootX to hand, anyway.
Add the names of your network computers to the program, and in click or two you can
then remotely shut them down or wake them up again, all from the comfort of your own
PC.
You can even automate the process, for example having a PC woken up just after lunch so
it's ready and waiting when you return.
And there are even system information options to, say, retrieve the free C: drive space on
one of the systems, or its list of automatic but stopped services (very useful for
troubleshooting). Not bad at all for a portable tool under 500KB in size.
9. HFS 2.2f - 560KB
When you want others on the network to be able to access your files then you'll probably
start by sharing folders. But if you can't get that working as you like then setting up a web
server with HFS could be a simpler approach.
There's no complex configuration involved, for instance - just run the program and it's
ready to go.
Drag and drop the files you'd like to share and they'll be accessible within seconds.
And yet there are plenty more advanced options, if you need them. Worried about the
program taking up all your bandwidth, for instance? Just limit the download speed to suit
your requirements - it's all very easy.
10. Simple IP Config 2.3 - 1.32MB
If you regularly use a laptop on a couple of networks - home and work, say - then the
chances are you probably waste a lot of time manually adjusting a host of low-level
network settings. But it doesn't have to be that way.
Simple IP Config allows you to create separate network profiles for home, work, and
anywhere else you like. Each of these can be used to store your IP Address, Subnet Mask,
Gateway, DNS Server, and so on. And switching from one profile to another is as simple as
selecting it, and clicking "Apply" - no messing around in Control Panel is required at all.

MAINTENANCE TECHNIQUES
1. Deleting Files

2. Scandisk - Microsoft ScanDisk (also called ScanDisk), is a diagnostic utility


included in MS-DOS and Windows 9x. It checks and repairs file systems errors on a
disk drive. It was first introduced in MS-DOS 6.2 and succeeded its simpler
predecessor, CHKDSK.
ScanDisk included a more user-friendly interface than CHKDSK, more configuration
options,[1][2] and the ability to detect and (if possible) recover from physical errors
on the disk. This replaced and improved upon the limited ability offered by the MSDOS Recover utility.[3] Unlike CHKDSK, ScanDisk would also repair crosslinked files.
[4]

3. Disk Defragmenter is a utility in Microsoft Windows designed to increase access


speed by rearranging files stored on a disk to occupy contiguous storage locations,
a technique called defragmentation. Defragmenting a disk minimizes head travel,
which reduces the time it takes to read files from and write files to the disk

4. Uninstall unused programs

Open the Add or Remove Programs Application

You have decided to remove a program from your computer. There are 2
ways to do it: use the uninstall program that may have come with your
application or use the "Add or Remove Programs" function in the Control
Panel.
This is an easy task to perform. Here's what you will need:
The Add or Remove Programs application
A small amount of time (depending on the size of the application you
want to remove and the speed of your computer
A bit of nerve and interest in learning something new.
Note: This procedure is written for Windows XP; Windows Vista is similar.

Click on the Start button.


Click on Settings.
Click on Control Panel.
Find the Add or Remove Programs application, in the Control Panel
window; double-click and open it.

SOLUTIONS TO FAULTY COMPUTER SYSTEM


(Ref:http://blog.pluralsight.com/network-troubleshooting-tools)

Network troubleshooting tools are a necessity for every network administrator. When getting
started in the networking field, it is important to amass a number of tools that can be used to
troubleshoot a variety of different network conditions.
While it is true that the use of specific tools can be subjective and at the discretion of the
engineer, the selection of tools in this article has been made based on their generality and
common use. This article reviews the top 10 basic tools that can help you troubleshoot most
networking issues.
10. Ping
The most commonly used network tool is the ping utility. This utility is used to provide a basic
connectivity test between the requesting host and a destination host. This is done by using the
Internet Control Message Protocol (ICMP) which has the ability to send an echo packet to a
destination host and a mechanism to listen for a response from this host. Simply stated, if the
requesting host receives a response from the destination host, this host is reachable. This utility
is commonly used to provide a basic picture of where a specific networking problem may exist.
For example, if an Internet connection is down at an office, the ping utility can be used to figure
out whether the problem exists within the office or within the network of the Internet provider.
Figure 1 below shows an example of the ping utility being used to obtain the reachability status
of the locally connected router.

Figure 1: Ping utility


9. Tracert/traceroute
Typically, once the ping utility has been used to determine basic connectivity, the
tracert/traceroute utility can used to determine more specific information about the path to the
destination host including the route the packet takes and the response time of these
intermediate hosts. Figure 2 below shows an example of the tracert utility being used to find the
path from a host inside an office to www.google.com. The tracert utility and traceroute utilities
perform the same function but operate on different operating systems, Tracert for Windows
machines and traceroute for Linux/*nix based machines.

Figure 2: Tracert/traceroute utility


8. Ipconfig/ifconfig
One of the most important things that must be completed when troubleshooting a networking
issue is to find out the specific IP configuration of the variously affected hosts. Sometimes this
information is already known when addressing is configured statically, but when a dynamic
addressing method is used, the IP address of each host can potentially change often. The
utilities that can be used to find out this IP configuration information include the ipconfig utility
on Windows machines and the ifconfig utility on Linux/*nix based machines. Figure 3 below
shows an example of the ifconfig utility showing the IP configuration information of a queries
host.

Figure 3: Ifconfig utility


7. Nslookup
Some of the most common networking issues revolve around issues with Dynamic Name System
(DNS) address resolution issues. DNS is used by everyone using the Internet to resolve
commonly known domain names (i.e. google.com) to commonly unknown IP addresses (i.e.
74.125.115.147). When this system does not work, most of the functionality that people are
used to goes away, as there is no way to resolve this information. The nslookup utility can be
used to lookup the specific IP address(es) associated with a domain name. If this utility is unable
to resolve this information, there is a DNS issue. Along with simple lookup, the nslookup utility is
able to query specific DNS servers to determine an issue with the default DNS servers configured
on a host. Figure 4 below shows an example of how the nslookup utility can be used to query
the associated IP address information.

Figure 4: Nslookup utility


6. Netstat
Often, one of the things that are required to be figured out is the current state of the active
network connections on a host. This is very important information to find for a variety of
reasons. For example, when verifying the status of a listening port on a host or to check and see
what remote hosts are connected to a local host on a specific port. It is also possible to use the
netstat utility to determine which services on a host that is associated with specific active ports.
Figure 5 below shows an example of the netstat utility being used to display the currently active
ports on a Linux machine.

Figure 5: Netstat utility


5. PuTTY/Tera Term
When connecting to a variety of different types of equipment, a telnet, SSH or serial client is
required; when this is required both the puTTY and Tera Term programs are able to provide
these functionalities. The selection of one over the other is strictly a personal preference. Figures
6 and 7 below show both puTTY and Tera Term being used to connect to a host via SSH.

Figure 6: PuTTY

Figure 7: Tera Term


4. Subnet and IP Calculator
One of the most important tools in the belt of a junior network engineer is an IP network
calculator. These can be used to unsure a correct IP address selection and with this a correct IP
address configuration. While this type of tool is used by senior level network engineers, much of
the information obtained from the tool becomes simpler to calculate the longer and more
experience you have in the field. Two of the more commonly used free IP calculators include
Wildpackets (Bitcricket) Network Calculator and Solarwinds Advanced Subnet Calculator which
can be found at the links below.
http://www.bitcricket.com/downloads/IPCalculator.msi
http://downloads.solarwinds.com/solarwinds/Release/FreeTool/SolarWinds-SubnetCalculator.zip

Figure 8: Subnet calculator


3. Speedtest.net/pingtest.net
A very easy test that can be used to both determine the Internet bandwidth available to a
specific host and to determine the quality of an Internet connection is the use of the tools
available at the speedtest.net and pingtest.net websites. The speedtest.net site provides the
ability to determine the amount of bandwidth that is available to a specific host at a specific
point in time; this is often a good tool to use when measuring how long it is going to take to
upload or download information from a local to remote host. This measurement can also be used
to determine whether the connection is offering the amount of bandwidth that was purchased
from the Internet provider; keep in mind however that some amount of bandwidth difference is
expected between the quoted bandwidth purchased and the measured bandwidth. The
pingtest.net website is used to determine the quality of the connection by measuring the ping
response times and jitter amounts over a short period of time. This information can be used to
determine a likelihood of how well the measured connection will deal with certain types of high
demand traffic like Voice over IP (VoIP) or gaming. Figure 9 and 10 below show example output
from both of these sites.

Figure 9: Speedtest

Figure 10: Pingtest


2. Pathping/mtr
In an effort to take advantage of the benefits of both the ping and tracert/traceroute commands,
the pathping and mtr utilities were developed. Both of these tools take the functionality and
information that can be obtained from these types of tools and provide a more detailed single
picture of the path characteristics from a specific host to a specific destination. Figure 11 and 12
below show examples of these two tools and what information they provide.

Figure 11: Pathping

Figure 12: Mtr


1. Route
The last of the tools covered in this article is the route utility. This utility is used to display the
current status of the routing table on a host. While the use of the route utility is limited in
common situations where the host only has a single IP address with a single gateway, it is vital

in other situations where multiple IP address and multiple gateways are available. Figure 13
below shows an example of the route utility being used on a Windows machine.

Figure 13: Route Utility


Summary
As with any job, the type of tools that are quickly available can greatly influence the amount of
time that it takes to complete a job. When troubleshooting a networking issue, the amount of
time that it takes to find and fix a problem directly affect the wasted costs that it causes to any
system relying on the network. This article has taken a look at the 10 most commonly used tools
that can help in ensuring that the time that it takes to find and fix a problem is as short as
possible.

COMPUTER COMMUNICATIONS

INTERNET CONNECTIVITY
(Ref:http://www.tutorialspoint.com/internet_technologies/internet_connectivity.htm)

Here in this tutorial, we will discuss how to connect to internet i.e. internet service providers,
software and hardware requirements, configuring internet connection etc.
Internet Service Providers (ISP)
Internet Service Provider (ISP) is a company offering access to internet. They offer various
services:

Internet Access

Domain name registration

Dial-up access

Leased line access

ISP Types
ISPs can broadly be classified into six categories as shown in the following diagram:

ACCESS PROVIDERS
They provide access to internet through telephone lines, cable wi-fi or fiber optics.
MAILBOX PROVIDER
Such providers offer mailbox hosting services.
HOSTING ISPS
Hosting ISPs offers e-mail, and other web hosting services such as virtual machines, clouds etc.
VIRTUAL ISPS
Such ISPs offer internet access via other ISP services.
FREE ISPS
Free ISPs do not charge for internet services.
Connection Types
There exist several ways to connect to the internet. Following are these connection types
available:

1. Dial-up Connection
2. ISDN
3. DSL
4. Cable TV Internet connections
5. Satellite Internet connections
6. Wireless Internet Connections
Dial-up Connection
Dial-up connection uses telephone line to connect PC to the internet. It requires a modem to
setup dial-up connection. This modem works as an interface between PC and the telephone line.
There is also a communication program that instructs the modem to make a call to specific
number provided by an ISP.
Dial-up connection uses either of the following protocols:
1. Serial Line Internet Protocol (SLIP)
2. Point to Point Protocol (PPP)
The following diagram shows the accessing internet using modem:

ISDN
ISDN is acronym of Integrated Services Digital Network. It establishes the connection
using the phone lines which carry digital signals instead of analog signals.
There are two techniques to deliver ISDN services:
1. Basic Rate Interface (BRI)
2. Primary Rate Interface (PRI)
Key points:

The BRI ISDN consists of three distinct channels on a single ISDN line: t1o 64kbps B
(Bearer) channel and one 16kbps D (Delta or Data) channels.

The PRI ISDN consists of 23 B channels and one D channels with both have operating
capacity of 64kbps individually making a total transmission rate of 1.54Mbps.

The following diagram shows accessing internet using ISDN connection:

DSL
DSL is acronym of Digital Subscriber Line. It is a form of broadband connection as it provides
connection over ordinary telephone lines.
Following are the several versions of DSL technique available today:
1. Asymmetric DSL (ADSL)
2. Symmetric DSL (SDSL)
3. High bit-rate DSL (HDSL)
4. Rate adaptive DSL (RDSL)
5. Very high bit-rate DSL (VDSL)
6. ISDN DSL (IDSL)
All of the above mentioned technologies differ in their upload and download speed, bit transfer
rate and level of service.
The following diagram shows that how we can connect to internet using DSL technology:

Cable TV Internet Connection


Cable TV Internet connection is provided through Cable TV lines. It uses coaxial cable which is
capable of transferring data at much higher speed than common telephone line.
Key Points:

A cable modem is used to access this service, provided by the cable operator.

The Cable modem comprises of two connections: one for internet service and other for
Cable TV signals.

Since Cable TV internet connections share a set amount of bandwidth with a group of
customers, therefore, data transfer rate also depends on number of customers using the
internet at the same time.

The following diagram shows that how internet is accessed using Cable TV connection:

Satellite Internet Connection


Satellite Internet connection offers high speed connection to the internet. There are two types
of satellite internet connection: one way connection or two way connection.

In one way connection, we can only download data but if we want to upload, we need a dialup
access through ISP over telephone line.
In two way connection, we can download and upload the data by the satellite. It does not
require any dialup connection.
The following diagram shows how internet is accessed using satellite internet connection:

Wireless Internet Connection


Wireless Internet Connection makes use of radio frequency bands to connect to the internet and
offers a very high speed. The wireless internet connection can be obtained by either WiFi or
Bluetooth.
Key Points:

Wi Fi wireless technology is based on IEEE 802.11 standards which allow the electronic
device to connect to the internet.

Bluetooth wireless technology makes use of short-wavelength radio waves and helps to
create personal area network (PAN).

Vous aimerez peut-être aussi