Administering Network and Hardware Peripheral

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 37

 

MODULE TITLE: Administrating Network and Hardware Peripherals


LO1 Confirm requirements of client
1.1 Identifying and confirming client peripherals
1.1.1 Input peripherals
1.1.2 Output peripherals
1.1.3 Secondary storage devices
1.1.4 Confirming requirements of organizational standards
* Client peripheral requirements are Identified and confirmed in accordance with organizational standards.
1.2 Documenting Client requirements and peripherals
- Client requirements and peripherals needed are documented in line with organizational
standards and report findings to the appropriate person.
1.3 Verifying client requirements
- Client requirements are verified with appropriate person in line with organizational
standards and reporting procedures.
1.3.1 Report Procedures
Action taken to ensure client support expectations are covered by vendor warranty and support services.
1.4 Ensuring warranty and support services
. Action taken to ensure client support expectations are covered by vendor warranty and support
services.
1.4.1 Warranty
Warranty means guarantee (it means promising or agreement to repair or replace it if necessary).
A warranty is a statement provided by the seller or manufacturer of a product that it will work in the manner
specified
Some warranties also apply to certain types of services.
Example: - if you get new brake on your car, the work and materials may be guaranteed to work appropriately
for a
specified time period.
1.4.2 Support services
- Support service is Activity or function required for successful completion of a process, program, or
project.
- The Support Services team provides telephone, fax and email support.
LO2 Obtain required peripheral
2.1 Obtaining peripherals
2.1.1 Instruction or specification
 Peripherals are obtained under instruction from appropriate person.
2.2 Entering peripherals into equipment inventory
- Peripherals are entered into equipment inventory according to organizational standards.
2.3 Validating components
- Contents of delivered components and physical contents that match the packing list are
validated.
2.4 Reserving discrepancies
- Contents of delivered components and physical contents that match the packing list are
validated and resolved discrepancies if necessary.
2.5 Storing peripherals
- Peripherals are stored according to vendor/manual guidelines.

LO3 Connect hardware peripherals


3.1 Verifying installation schedule
- Timeframe for installation schedule is verified with the client requirement.
3.2 Removing old peripherals
 Old peripherals are removed and new peripherals are connected with minimum disruption to
clients, taking into account operating system procedures, environmental considerations and OHS
standards.
 The computer configured to accept the new peripherals based on business requirement.
3.3 Environmental considerations
3.3.1 How to dispose packaging

3.3.2 Safety procedures


 Safety Procedures are available across all industries and for all types of equipment and
processes.
 It is becoming more commonplace (usual) in the Construction and Building Industries.
How to Develop a Safety Procedure
Safety Procedures are not complicated to develop. Some common steps include:
 Risk Assessments
 Site Safety
 Personal Protective Equipment
 First Aid
 General Safety Information
 Maintenance
3.3.2.1 Physical hazards
What is hazard?
A hazard is generally unsafe condition that can cause injury, illness and death.
- Hazard may be arising from the material, operational, or occupational characteristics of an insured
property.
- It is a most common problem in most workplaces due to lack of knowledge.
What is physical hazard?
Physical hazard is those substances which threaten your physical safety.
The most common types of physical hazards are:
 Fire
 Explosion
 Chemical reactivity
Examples of physical hazards include:
 electrical hazards: missing ground pins, improper wiring
 unguarded machinery and moving machinery parts: moving parts that a worker can accidentally touch
 constant loud noise
 high exposure to sunlight/ultraviolet rays, heat or cold
 Working from heights, including ladders, roofs, or any raised work area.
3.3.2.2 Chemical hazards
What Is a Chemical Hazard?
A chemical hazard is any substance that can cause harm, primarily to people.
- Chemical hazards are present (occur) when a worker is exposed to any chemical preparation in the
workplace in any form (solid, liquid or gas).
- It arises from contamination of an area with harmful or potentially harmful chemicals.

Possible sources of chemical hazards include: - the burning of fossils


- materials and chemicals used in construction and industry
- pollution of the environment
- industrial accidents, and
- the deliberate release of toxic materials.
Ergonomics
The term “ergonomics” means the study of work.
What is ergonomic hazard?
Ergonomic hazards refer to unsafe workplace conditions that pose (cause) the risk of injury to the
musculoskeletal system of the worker.
The type of things that cause to ergonomic hazards includes:
 Repetitive and forceful the same movements.
 poor lighting
 improperly adjusted workstations and chairs
 improper work methods
 Use of too much force, especially if you have to do it frequently.
 poorly designed equipment
3.3.2.4.1 Psychological factors
What is a psychological factor?
Psychological factor is thoughts, feelings, attitudes, or other cognitive or affective characteristics of an
individual that influence his/her behaviour.
3.3.2.4.2 Physiological factors
What is physiological factor?
Physiological factor is level of arousal (stimulation), which refers to the overall readiness of the organism to
engage in activity.
Physiological Factor is the factor relating to physiology that includes: -
 Related to the mind and its processes
 Characteristic of an organism's healthy or normal functioning
3.3.2.4.1 Burglary
What is burglary?
Burglary means breaking and entering or housebreaking.
Burglary is the unlawful entrance to someone’s property and the removal of items not theirs, without
permission of the owner.
3.3.2.4.2 Fire
Fire is the rapid oxidation of a material in the chemical process of combustion, releasing heat, light, and
various reaction products.
3.3.2.4.3 Power accidents
It is widely considered as the worst nuclear power accident in history.
Example: -Power tool eye injuries
3.4 Adding new peripherals
Hardware compatibility List
The Hardware Compatibility List is a list of products maintained by Microsoft that note devices that have been
tested for compatibility with Windows OS.
The Hardware Compatibility List will also note those products that have been tested to pass Microsoft
standards of compatibility, reliability and security and will work with all PCs running Windows Vista
A hardware compatibility list (HCL) is a list of computer hardware (typically including many types of
peripheral devices) that is compatible with a particular operating system or device management software. In
today's world, there is a vast amount of computer hardware in circulation, and many operating systems too. A
hardware compatibility list is a database of hardware models and their compatibility with a certain operating
system.

Hardware requirements

 Minimum of 512 MB of RAM


 Minimum of 500 MB of disk space
 DVD-ROM drive
 Stata for Unix requires a video card that can display thousands of colors or more (16-bit or 24-bit
color)

3.4.1. Operating system compatibility


Compatibility mode creates the environment of an earlier operating system for applications that are not
compatible with the current operating system.
Compatibility mode allows an older program written for an earlier version of Windows to possibly run in new
Operating System.
Warning: - Do not use Compatibility mode on older antivirus programs, disk utilities, or other system
programs
because it might cause data loss or create a security risk.
 To Run a Program in Compatibility Mode:
1. Right click on the program's shortcut in the start or program menu.
2. Click on Properties.
3. Click on the Compatibility tab.
4. Check the Run this program in compatibility mode for box.

5. Click on the drop down menu arrow and select which version of Windows the program was made for.

6. To Change the Settings for a Program


A) Check or uncheck the settings you want for the program.
Setting Description
Uses a limited set of colors in the program. Some older programs are designed to
Run in 256 colors
use fewer colors.
Run in 640 × 480 screen Runs the program in a smaller-sized window. Try this setting if the graphical user
resolution interface appears jagged or is rendered improperly.
Disable visual themes Disables themes on the program. Try this setting if you notice problems with the
menus or buttons on the title bar of the program.
Disable desktop Turns off transparency and other advanced display features. Choose this setting if
composition window movement appears erratic or you notice other display problems.
Turns off automatic resizing of programs if large-scale font size (DPI) is in use.
Disable display scaling on
Try this setting if large-scale fonts are interfering with the appearance of the
high DPI settings
program.
7. To Change the Privilege Level of a Program
NOTE: Runs the program as an administrator. Some programs require administrator privileges to run
properly. If you are not currently logged on as an administrator, this option is not available.
A) Check or uncheck the Run this program as an administrator box to enable or disable this option.

8. To Change All of These Settings Above for All Users


NOTE: Lets you choose settings that will apply to all users on this computer.
A) Click on the Change settings for all users button.
B) Repeat steps 4, 5, and 6 in this window to apply them to all users on the computer.
C) Click on OK.

8. Click on OK to apply the changes.


3.4.2 Install device drivers
You can have Windows automatically download recommended drivers and detailed information for your
hardware and devices. This is a good way to make sure all your hardware and devices work properly.
Drivers and information
 A driver is software that allows your computer to communicate with a particular type of hardware
device that is attached to your computer.
 Windows can automatically check if there are drivers available for new devices that you connect to
your computer.
Example: device drivers for: - displays (graphic cards) - NIC/modem
- printers - sound
Note: When you buy an operating system, many device drivers are built into the product.
A device driver essentially converts the more general input/output instructions of the operating system to
messages that the device type can understand.
In certain Microsoft operating systems, a virtual device driver is a program that handles software interrupts
from the operating system (rather than hardware interrupts) for each of the computer's main hardware devices,
including the hard disk drive controller, keyboard, and serial and parallel ports.
A virtual device driver is used to maintain the status of a hardware device that has changeable settings.
3.4.3 Test peripherals
 Hardware peripherals are tested and confirmed to client satisfaction, pay particular attention to possible
impact on other systems and make adjustments as required.
LO4. Install peripherals to a network
4.1. Plan peripheral location
 Location of peripherals are planned to provide appropriate services to users and to take into
consideration OHS standards.
4.1.1 Identifying computer network & types
What is a computer network?
A computer network is a connection of two or more computers to share information and resources each other.
Advantage of computer network:
* Sharing data file
* Sharing programs/software
* Sharing resources
* Sending messages
Disadvantage of computer network:
* Costly, in terms of extra equipments and technical skills
* Data security problems. Data could be at risk to unauthorized access or hackers.
* spread of computer viruses due to sharing of some files or programs
Tip: A hacker is someone who illegally accesses a computer
Types of network
 The type of network can be classified in to three based on geographical limitation:
1. LAN
 A local area network is a network built over a small area.
 Has geographical limitation/restriction
 A LAN can range from simple to complex.
2. MAN
. A metropolitan area network (MAN) is a computer network that usually spans a city or
a large campus.
. It is larger than local area network
3. WAN
* WAN is made up of a number of interconnected LANs.
* Wide area network has no geographical limit.
* The largest WAN is the Internet.
 The type of network can be classified into two based on connection type:
. The connection can be done as peer-to-peer or client/server.

i. Peer to peer connection type


A peer-to-peer network is a type of network in which every computer has equal importance on the network.
- Every computer is used for normal activities such as creating documents.
- There is no centralized control over resources such as files or printers.
- It is a good networking solution when there are 10 or fewer users.
- Allows simple sharing of data and hardware, such as printers
- It is Not expensive and Not suitable for more than 20 PCs
- Has Poor security for data and other resources
- It is easy to install/set up
ii. Server-Based Networks (client/server)
 This type of network is designed to support a large number of users.
 The server not used for normal activities such as producing a document.
 In a server based network environment the server(s) perform several key operations such as :
- Sharing of hardware devices, data and different programs.
- Network Security

Server based network:


 Is easier to find, administer and control
 Has good security for data and other resources
 Data can be backed up centrally
 Can support large number of users.
 Requires high level of technical skill to setup and support
 Costly, in terms of equipments and IT professionals
 requires at least one knowledgeable administrator
The type of network you choose to implement will depend on the following factors:
 Size of the organization
 Level of security required
 Type of business
 Level of administrative support available
 Amount of network traffic
 Needs of the networks users
 Network budget
4.1.2 Types of network topology
Network Topology refers to physical or logical layout (arrangement or shape) of the computers (devices) in the
network.
- It is the locations of the computers and how the cable is run between them.
Network topologies are categorized into the following basic types:
 bus
 ring
 star
 mesh
More complex networks topologies can be built as hybrids of two or more of the above basic topologies.
1. Bus Topology
Bus topology is a type of network which uses a common channel (a single communication line) to connect all
devices together to share information and resources.
 In a bus topology:
- each computer (node) connects to a single segment trunk (a communication line), called
backbone or main highway, which is referred to as the 'bus'.
- the signal travels from one end of the bus to the other.
- a terminator is required at the end of the backbone to absorb the bouncing signal
- a media access method called CSMA/MA is used to handle the collision that occur when two
signals placed on the wire at the same time.
Bus topology
Advantages of bus network:
 Failure of one of the station does not affect others.
 Easy to implement and extend.
 doesn't require much cabling
 work best with a limited number of computers
 Disadvantages of bus network:              
 Limits on cable length and number of computers.
 Difficult to find network faults.
 A cable (a backbone cable) brake/failure can disable the entire network.
 As the number of computers increase, the speed of the network slows down
 Terminator is required
2. Ring Topology
Ring topology is a type of network in which every computer connected to a single cable.
 In ring topology:
 All messages travel through a ring in the same direction (either "clockwise" or "counter
clockwise").
 Each node handles its own applications and also shares resources over the entire network.
 Each computer on the ring has equal access, but only one computer can send message at a time.
 The token travels along the ring until it reaches the destination address.

Ring topology
Advantages of ring topology:
- All nodes on the network have equal chance of transmitting data. 
- Use of cable is economical.
- Data can be sent over large distances (each computer can act as repeater)
Disadvantages:
- If one of the nodes/cable fails, the whole networks will fail.
- Difficult to add and delete nodes to /from the ring.
3. STAR TOPOLOGY
A star topology is a type of network which uses a central point to share data files, programs and resources
between clients.
 In star network:
 The central point is called switch or hub.
 Signals are transmitted from the sending computer through the hub/switch to all computers on the
network.
Star topology
ADVANTAGES of star topology:
* Easy to add new workstations
* Has centralized control
* Failure of a single computer does not affect the whole network
* Fault of a single workstation can be identify easily
DISADVANTAGES of star topology:
* If the central point fails, the whole network will stop.
* Use of cable is not economical
4. Mesh topology
Mesh topology is a type of network in which every node has a connection to every other node in the network.

Mesh topology
4.1.3 Network media
A network media is a network device that carries a message from computer to computer.
 Types of network media:
 Network cables
 Connectivity devices such as hub, switch, NIC, connectors, . . . etc.
Network Cable is used to join computers and network components together.
The choice of cable depends upon a number of factors such as:
- Cost
- Distance
- number of computers involved
- speed, and
- Bandwidth.
Note: Bandwidth is the amount of data that can be sent over a network cable.
Types of network cable:
 Twisted-pair cable (shielded twisted pair and unshielded twisted pair)
* STP - has shield (insulation jacket around the wire)
* UTP - is the most common used cable in office environments.
- Very flexible, cheap, and very easy to install and maintain.
 Coaxial cable
. Coaxial cable is an older form of network cabling.
. It is a good choice for longer distances and for supporting higher data transfer rates with
less up-to-date equipment.

 Fiber-optic cable
. Data can be transmitted in the form of light pulse rather than electrical signals.
. is very well-protected, extremely fast, and very expensive.
. is less susceptible than metal cables to interference.
. is much thinner and lighter than metal wires.

4.1 Connecting peripheral to a network


4.2.1 Using vendor approved technologies
 Peripherals are connected to computers in the network using parallel, serial or other direct connection
methods appropriate for the job order.

4.2.1.1 Parallel
Parallel and serial networking connections are alternative methods of moving data between computers, or from
a computer to a peripheral device.
Parallel connections are still used for large computer installations and specialized tasks.
A parallel connection is more like a superhighway, where there may be eight or more lanes in each direction
moving traffic.
4.2.1.2. Serial
- A serial connection is a single-lane road, with all data moving back and forth along a single channel
for each direction Parallel Advantages of Serial

- Serial connections are easier for computers to maintain and simpler to work with, as a single serial
connection will contain data for only one networking or peripheral purpose.
4.2.1.3. Direct
From simple direct connections between computers to complete home and even IT networks, you will learn
how to select equipment and configure the systems.
4.3 Testing peripherals/cables, and other devices/ operations
 Peripherals are tested for correct operation based on client’s specifications.
LO5. Configure peripheral services
5.1 Install required software to configure/manage local area network
5.1.1 Local peripherals
 What is a peripheral device?
A peripheral is any computer components that is not the essential part of the computer (the processor, memory,
hard disk, . . .etc).
A local peripherals is a peripheral that can be connected to the stand alone (a single) computer.
5.1.2 Network peripherals
 What is a network peripheral?
A network peripheral refers to equipment which typically enables computers to communicate each others.
* Network peripherals include: - routers,
- Switches,
- Access points,
- Network interface cards and other hardware devices.
 Routers
A router is a special computer which has the ability to perform such tasks as routing and forwarding
information with use of software and hardware.
Routers contain a specialized operating system, along with such devises as RAM, flash memory, and one or
more processors.
 Hub
Hubs can be defined as, small, uncomplicated, economical devices that join multiple computers, with a lower
or basic level of networking facilities.
 Switch
A network switch is a small hardware device that joins multiple computers together within one local area
network.
It performs a similar role to hub, but more intelligent and faster.
 Modem
A modem enables a computer to transmit data over long distances using a cable or telephone line.

 Network Adapters
The term NIC refers to network adapter in the form of a card.
It is one of the most essential pieces of equipment for any computer network.
5.1 Install required software to configure/manage local area network
 Basics of Server-based Network
* Whenever the number of computers in a network becomes more, you should use a server-based
environment because it becomes almost impossible for peer-to-peer networks to handle such
computing.
* In the centralized or server-based system, the clients connect to the central computer for one or more
services.
* Almost all processing is done on the server. This helps in the synchronizing the data as everyone
accesses and manipulates the data that is stored in a centralized location.
* Maintaining security in a server based networks much easier than that in a peer-to-peer network as the
only system whose security matters is the server. You only need to maintain the security of the data
and other resources of the server.
* In a server-based environment accounts for different users are created and maintained on the server
and only those users are granted the access whose details match the details specified in the
corresponding account.
* Different rights are assigned to different users such as whether this particular user has the right to print
the data, whether some user has the right to open some particular file, . . . , etc. The management of
such types of rights is easy in centralized networks because the whole administration revolves around
the server.
* It also reduces the overall cost of the system because most of the cost as you have to spent on one
system that needs more resources and also need administration and on the other hand the client
systems can be dump terminal or they can have very low processing power. This makes the server
based network cost efficient.
 The advantages of server based networks.
- In sever based network, users can share equipments like laser printers.
- Management of users becomes very easy in server based network because you can manage all
users from a single computer (server).
- All the data stored on central storage device so it becomes easier to backup data.
- Security is one of the main issues when we talk about server based networks. In server based
network (environment) security is very easy to manage because one server has to make policies
and it applies on all the users in network.
- Backup of all the data is very easy to perform in server based networks as you just have to make
schedule and server automatically makes backup according to the schedule.
- A server based network has the power of managing thousands of users. You cannot do this thing in
peer to peer networks. Actually if there are ten computers and some of them are clients and some
are servers then it is impossible to manage them in peer to peer network. You have to use server
based network.
 In general, server-based network has more advantage over peer-to-peer network
 More scalable than peer-to-peer networks
 There is a central management point for sharing resources
 More easily administered due to the central management point
 More secure than peer-to-peer networks
 Data can be backed up from one central location

 Steps To Install Operating System (Windows Server 2003).


 Set the boot order to 1st CD-ROM, 2nd Hard Disk, and 3rd Floppy disk …from the BOOT menu as
shown.
 Insert the operating system CD

 Press F10 to save the changes you made, and select Yes to confirm save.

Press any key to boot from CD…


 Press any key from the keyboard to boot from CD as soon as the “Press any key to boot from
CD . . .” message displayed.

 Set up will load the needed files and drivers

 Press Enter key to set up windows server 2003.


 Press F8 to accept the agreement

 Press Enter key to setup windows on the selected partition ,to create partition press C on
unpartitioned space

 Enter the partition size and Press Enter key


 Select the partition you need and Press Enter key to set up windows on the selected item(partition)

 Select “Format the partition using the NTFS file system and press “Enter key”

Note: If you choose “Format the partition using the FAT file system” you will loose some special futures of
the NTFS file system
which are not available in FAT file system.
Example
1. You cannot install Active Directory (Which is to be added to the server operating system to increase
the security of your system).
2. You can not the “Disk quota management” (Which enables to the System administrators to assign
hard disk space to all users (Accounts) of the system according to their need.
 Wait until it finishes formatting, Copying, and Restarting. Without touching (giving command)
anything it starts copying files when copying file progress finishes set up will restart itself after 15
seconds.
 After copying files and restarting the graphical user interface displays and start installing window
components
 Click Next button.

 Type Name (Any Name) and Organization (Any Organization Name)

 Enter, Product key and Click “Next

 Click Next button to confirm the number of concurrent connections


 Enter “Computer Name” (any name), enter “Administrator password” and Conform Password, your
password should meet password complexity characteristics and click “Next”. If a warning message
appears like bellow (that informs about your password complexity and combination of possible
characters and digits) and read it correct and click yes.

 Adjust Date and time and click next


 Select typical setting and then click Next.

 Relax and back after around 25 -30 minutes and your installation will finalize and restart , Do
nothing

 Click “Finish”
 Click “yes” button

 The following dialogue will display always you start your server, it is recommended that to read some
points about configuring (managing) your server but for now Close it by clicking the close button in
the control button of this window in the right upper.

 Press “Ctrl+Alt+Del” key


 Enter User Name Administrator& password and click OK

 Now Enjoy Your “Windows 2003 Server” (customize Desk top)

 Active Directory configuration (Domain Controller)


- One of the greatest features of Windows Server 2003 is its ability to be a Domain Controller (DC).
- Some of the most well known features are its ability to store user names and passwords on a central
computer (the Domain Controller) or computers (several Domain Controllers). DNS installation,
because without DNS the client computers wouldn't know who the DC is. 
- Before you start Active Directory installation it is better to configure a valid TCP/IP configuration
including DNS.
Method: Click Start  Run Type "dcpromo" and click "OK"
Click "Next". Keep the option selected and click next

Type the name of the new domain (any name) and click next
Click next

Click next to the existed drive to store the Active Directory database.

Keep the default selection and click Next


Keep the default selection of "Install and configure", and click "Next"

Type the restore mode password if, necessary, and click next.
The restore mode password is the single password that all administrators hope to never use, however they
should also never forget it because this is the single password that might save a failed server. 
Make sure the summaries are all correct because changing it afterwards can prove to be difficult click next

Active Directory installation started the actual process.  This can take several minutes. 
If your computer has a dynamically assigned address (from DHCP) you will be prompted to give it a static IP
address; if necessary or not configure before.
Click finish to complete the installation.

 Adding a Windows XP computer to a Windows Server 2003 domain


- Some things to note about adding a Windows XP computer to a domain are the following:
 You need Windows XP Professional to join a XP computer to a domain. 
 You will loose the "fancy" log on screen and you will receive the "classic" log on screen
- To add the client to the server (window server 2003 domain)
Right click "My Computer" and click "Properties"
Go to the "Computer Name" tab and click "Change..."

Select the "Domain" radio button then type your domain name, not including the extension and click ok.
Type a user name and password and click ok

Click Ok when the welcome message displayed and then the needs to restarted to make effective the change
5.2 Configuring access and security
- Security
Windows 2003 Server allows to provide security to files and folders; this feature is available because of the
NTFS (New Technology File System).
There are different levels of security, such as read, modify, full control etc.
Full control permissions include:
- Read - Write
- execute - delete
- change permissions
Where as modify includes 4 permissions that is, read, write, execute and delete.
- To set permissions on a folder/file use the following steps
. Right click on the object, choose properties
. Click on the security tab, and remove all the permissions by pressing the advanced button and then
unchecking the "inherit permissions option".
. When prompted to remove, press the remove button and then press ok.
. Press the add button and type the user or the group name and press ok.
. Select the permissions from the list and press ok to finish.
5.2.1. User privileges
 USER MANAGEMENT
- Adding new users to active directory (creating user account)
Click Start, select "Administrative Tools" and select "Active Directory Users and Computers “.

Right Click on users and select New user, then the password setting screen displays.

Type user new user name and password and click Next and click finish
After creating user accounts, a user can log on to the server from any client machine in the domain.
5.2.1.1. System privileges
 Installing & Configuring Print Server
- Installing Printer on the Server
- Log in as administrator and open printers and faxes from start -> settings
- Make sure the printer is connected to the server and it is turned on.
- Double click on add printer and press next.
- Choose "Local printer" and check "Automatically detect my plug and play printer" -> next
- Choose "yes" or "no" to print a test page and press finish.
- To share the printer right click on it and choose sharing type a share name and press ok.
- click on security tab, click add to different users to allow the printer
5.3. Configuring work stations
- Client Configuration
. In the client log in as any domain user and open printer and faxes from control panel.
. Double click on add printer, press next.
. Choose "network printer" -> next.
. Select "Connect to this printer" and type the path.
eg:- \\server name\printer name
. Press next and finish to complete the setup.
- To Enable internet printing
. In the server log in as administrator and open add/remove programs -> add/remove
windows components
. Double click on application server and then double click on "internet information server"
. Select "internet printing" and press ok and next to complete the setup.
- Client Setup for Internet Printing
- In the client open internet explorer and choose tools -> internet options, click on security.
- Select internet and set the security to "low" press ok.
- In the address bar type the servers IP address followed by the alias name.
eg:- 192.168.100.3/printers
- Click on the displayed printer name and press the connect link to install the printer.
 Computer management for a remote computer or managing a remote computer
To manage a remote computer you have to be an administrator of the domain.
- Right click on the computer management (local) item choose "connect to another computer".
- Type the name of the network computer, which you want to manage and press ok. This allows you to
see all the manageable items of a remote computer, you can start or stop services on a remote
computer, you can view the event of a remote computer and you can even send console message to the
remote computer
- To send message, right click on computer management choose all tasks -> send console message type
the message and press send to send.
- You can also logoff, restart or shutdown a remote computer by right clicking on computer
management-> properties. Click the advanced tab and press the settings button under startup and
recovery. Press the shutdown button and choose either to logoff, shutdown or restart.
5.4. Sharing Network resources
- File Sharing
Sharing allows an object to be accessed from network. By default in windows 2003 server, there are some
hidden shares, these shares end with a $ symbol. To view these default shares open computer management
(right click on my computer and choose manage) and select shared folders and then shares.
- To share an object
- Right click on the object (only folder or drive), and choose sharing and security
- Select share this object and type the share name and press ok.
- The share name should be within 8 characters and should not contain any space or special
characters.
- By default, all shares are in read only mode, you can press the permissions button to provide
change permission or full control.
- You can also share Hardware, Data and Applications
LO8. Use and maximize operating system
8.1 Configuring Network operating system
A network operating system (NOS) is a computer operating system that is designed primarily to coordinate
the activities of multiple computers across a network.
* It provides the capabilities required for network operation.
- NOS provide the following functions:
- Account administration for users
- printer sharing
- common files, applications and database sharing
- Backing up data
- the ability to manage a network name directory, security, and other housekeeping aspects of a
network.
- Install Components :
 Client functionality
 Server functionality
8.1.1 Adding different functionalities of operating system
- Adding d/nt functionalities of operating system means installing server roles by using
configure your server wizard and manage your server roles by using manage your
server.
8.2 Operating application soft wares
8.2.1 Installing
- Installing means loading of a programs ( or connecting hardware) on to the computers.
- It is the act of putting the program/hardware onto a computer system so that it can be executed.
8.2.2 Upgrading
 The term upgrade refers to the replacement of a product with a newer version of the same
product.
 Adding additional features on the existing system to improve its performance.
8.2.3 Uninstalling
- The term uninstalling means Removing (an application or file) that were installed/added from a
computer.
- You can uninstall an application by selecting Add/Remove Programs from the Control Panel and
then selecting the application you want to remove.
8.3 Working with graphical user interface and command line
The operating system provides user interface for users to insert/give instructions into the computer and
receiving feedback. Based on the type of user interface the OS provides, operating systems can be put into two
groups:
- Command Line Interface (CLI) based operating systems.
- Graphical User Interface (GUI) based operating systems.

 Command Line Interface based Operating Systems


A command line interface (CLI) is a method of talking with a computer by giving lines of text from the
keyboard.
- The user types a command on command prompt and executes the command by pressing the Enter
key.
o Example : DOS

CLI of DOS environment.


 Graphical User Interface based operating systems
In the GUI:
* The screen displays graphical objects which are designed for the user to interact with the system
using a pointing device.
- Example: Windows
GUI of the Windows XP environment
8.3.1 Disk operating system(DOS)
Introduction to DOS
- DOS (Disk Operating System) is a command line based operating system.
- In DOS, all tasks are done by typing commands at a command prompt.
- The point where you type your command is shown by a blinking horizontal line, called the cursor.
- Even though there are many DOS commands, you will be able to manage well if you know some of
them and their functions. Most of these important commands are related to file management.
 Running DOS
To run DOS from Windows, you must load the Command Prompt:
- Start  run  write “cmd”  ok , or
- Start  All Programs  Accessories  click on Command Prompt.

- In the example above, we are working in the C Drive.


- Like Windows, DOS assigns each disk drive a letter. A: or B: is normally for the floppy drive and C:
normally for the hard drive.
- You must always press the Enter key after any DOS command to tell the computer that you have
finished typing the command and the requested command can now start.
 DOS File and Directory Naming
. File names in DOS contain two parts – name and extension.
The rules of file and directory naming in DOS are similar to Windows with the following exceptions:
i. A file name can be a maximum of 8 characters long.
ii. Extensions can be a maximum of 3 characters and an extension is optional.
iii. The following special characters are not allowed in file names: * + = | \ [ ] : ; " < , > ? /.
 Basic DOS Commands
The most common DOS commands include dir, md, rd, cd, edit, copy, ren and del.
 dir Command: directory command (dir) is used to view the contents of a directory.
Syntax: dir [path]
 md Command: md (make directory) command is used to create directories.
Syntax: md [path] directoryname
- Path- indicates the place where the new directory will be created.
- directoryname- indicates the name of the directory to be created.
 CD Command: cd( change directory) command is used to change directory.
Syntax: cd [path][\][..]
- path – the location of the directory to which the current directory is going to be
switched.
- \ - to move to the top level of the drive (e.g. C:\)
- .. – to move up one directory.

 rd Command: rd (remove directory) command is used to delete a directory.


Syntax: rd [path] directoryname
- path – the location of the directory to be deleted.
- directoryname – the name of the directory to be deleted.
- The rd command is used to delete only empty directories.

edit Command: edit command is used to create text files.


Syntax: edit [path][filename]
- path - the directory where you want to create the new file.
- filename - the name of the file that will contain the text.
 How you save file using DOS
* Saving is the process of writing data in memory in the form of a file.
. To save type the text and make the necessary editing.
. While holding down the Alt key, press F and then S. This tells the computer to save your
work.
. In the File Name box, type the [filename].[extension]
. Press the Enter key. The new file will be saved.

To return from this text editor, hold down the Alt key, and press F and then X.
 copy Command: copy command can be used to copy files from one area to another.
Syntax: copy [source] [destination]
- source - the path and file name of the file to be copied.
- destination - the path and file name to which the file is to be copied.
 ren Command: ren or rename command is used to change the name of a file.
Syntax: ren [path]oldName newName or rename oldName newName
 del Command: del (which stands for ‘delete’) is used to delete files.
Syntax: del [path] filename
 Exit Command: exit command lets you exit DOS and return to Windows.
- To exit DOS, type exit and press the Enter key.
Wildcard characters:
A wildcard character can be used to represent one or more letters.
 The question mark (?) represents any single letter
 the asterisk (*) represents one or more letters.
Examples: 1. Dir a* - displays all files and directories in the current directory that start with the letter ‘a’.
2. Dir *a – displays all files and directories in the current directory that end with the letter ‘a’.
3. Dir *me* - displays all files and directories in the current directory that contain ‘me’.
4. Dir ab?? – displays all files and directories that start with ‘ab’ and contain four characters.
Like with dir, you can use wildcard characters to copy or delete a group of files.
For example, if you want to copy all files with the extension exe, you can write: copy *.exe

8.4 Using operating system utilities


 What is utility software?
Utility software is computer software that performs a specific task related to the management of computer
functions, resources, or files, as password protection, memory management, virus protection, and file
compression.
Some examples of commonly used utility software include: - Disk Defragmenters
- Registry Cleaners/disk clean up
- Backup Utility Software
 What are the main functions of utility software?
– Utility software enhances the operation of the Operating System.
– It helps to analyze, configure, optimize and maintain the computer
LO9. Support input and output devices
. Input devices are hardware items (components) that you use to feed information to the computer
system
. Output devices are also hardware items (components) that retrieve information from the computer.
9.1. Setting up and check devices
- Setting up and connecting your computer system input and output devices is very easy.
- All recently manufactured computers use color code which makes even easier to setup. The
color of the port matches with the color of the device connector. Also, usually there is an icon
of the device beside the device port. Refer to the picture on the left to see how the color
coding work and how to connect all the computer devices.
- Input and output devices are set up and checked functionality based on requirement.
9.2. Installing drivers and checking functionality based vendor manuals
A device driver is a bunch/group of files that instruct the operating how to manage and operate the device.
How to Check Which Drivers are Installed?
 You can open the device manager where all the hardware devices of your computer are listed.
 Drivers are installed as appropriate and checked functionality based vendor manuals.
Which are the most common devices that we need to install/update the drivers for?
 Almost all computer and hardware manufacturers include a group of drivers for different hardware
devices and often for each of the supported versions of Windows.
 We need to install or update the following drivers so our devices to work or perform optimally.
 LAN Ethernet Drivers
 Graphics Card Drivers
 Sound Card Drivers
 Drivers for External plug-in Devices
9.3. Ensuring drivers
Drivers are ensured to enable a device properly working. Without drivers, the hardware you connect to
your computer—for example, a video card , sound card or a printer—won't work properly.

You might also like