A Certification
A Certification
PUBLISHED BY
Microsoft Press
A Division of Microsoft Corporation
One Microsoft Way
Redmond, Washington 98052-6399
All rights reserved. No part of the contents of this book may be reproduced or
transmitted in any form or by any means without the written permission of the
publisher.
1 2 3 4 5 6 7 8 9 QWT 6 5 4 3 2 1
A CIP catalogue record for this book is available from the British Library.
The computer industry has evolved and grown phenomenally since its
commercial inception in the 1960s. This industry is so vast and complex that
no one can claim to understand all its aspects. However, to participate in this
ever-changing and growing industry, the computer technician must be able to
demonstrate a level of proficiency with computers and technology. Certification
is a first step in establishing your presence as a computer professional. It
provides you with the opportunity to gain the skills you need, it helps you
establish your knowledge base, and it gives you the confidence to get started.
NOTE
Each chapter in this book is divided into lessons. Each lesson ends with a brief
summary, and each chapter concludes with a chapter summary and a set of
review questions to test your knowledge of the chapter material.
For specific information about what is included on the companion CD and how
to access this information, see the README.TXT file on the CD.
Features of This Book
Each chapter opens with a "Before You Begin" section, which prepares you for
completing the chapter.
The body of each chapter provides detailed coverage of the subjects you will
need to study to prepare for the test. The "Review" sections at the end of each
chapter allow you to test what you have learned in the chapter lessons. They
are designed to familiarize you with the types of questions you might
encounter on the exam.
Chapter and Appendix Overview
This self-paced training course combines instruction, procedures, multimedia
presentations, and review questions to teach you what you need to know for
A+ Certification. It is designed to be completed from beginning to end, but you
can choose a customized track and complete only the sections that interest
you. (See the next section, "Finding the Best Starting Point for You.") If you
choose the customized track option, be sure to check the "Before You Begin"
section in each chapter. Any concepts or procedures that require preliminary
work from preceding chapters will steer you to the appropriate chapters.
The objectives for the core exam focus on computer hardware. Information
relevant to the core exam objectives can be found in every chapter in this
training kit, except in those that specifically cover operating system material.
The majority of information for this exam is found in Chapters 16 through 21.
Specific information regarding a device will be found in the chapter that covers
that device.
Skill Area Measured Location in Book
Function, Structure, Operation, and File
Chapters 16, 17, and 18.
Management
Chapters 16 and 17. Also see
Memory Management
Chapter 7.
Installation, Configuration, and
Chapters 16, 17, and 18.
Upgrading
Troubleshooting Chapter 21.
Networks Chapters 14, 15, 16, and 17.
Getting Started
This self-paced training course contains hands-on procedures to help you learn
about computer hardware and software. Although it is not a requirement to
have a computer and software to complete the course, you will need one
available for practice. It is recommended that you not use a computer that
contains any important data that needs to be saved. Some of the concepts in
this book require complete reformatting of the hard drive or major
modifications of the operating system, during which all data will be lost.
Hardware Requirements
This course builds knowledge that begins with early technology. Therefore,
almost any computer will provide some level of skill building. In fact, a new
computer with a Pentium III processor and full Plug and Play capability will be
something of a detriment because it is overly capable for our purposes and
does not require the interaction necessary for building these basic skills.
However, to get the most out of this course, your computer should have the
following minimum configuration (all hardware should be on the Microsoft
Windows 98 or Windows 2000 Hardware Compatibility List):
Software Requirements
Windows 98 (minimum)
Microsoft Windows 2000 (recommended)
Access to earlier operating systems (Microsoft Windows 95 and MS-DOS)
is a plus
To view the electronic version of the book, you will need Microsoft Internet
Explorer 4.01 or later. A version of Microsoft Internet Explorer 5.5 is supplied
on the companion CD. For more information, see the README.TXT file on the
companion CD. To view the demonstration videos on the companion CD, you
will need a machine with standard multimedia support and an HTML browser. A
version of Microsoft Windows Media Player 7 is supplied on the companion CD.
About the Electronic Book
The companion CD also includes an electronic version of the book that you can
use to search and view on-screen as you work through the exercises. See the
README.TXT file on the companion CD for instructions on how to install and
use the electronic version of this book.
The A+ Certification Program
A+ Certification is a testing program sponsored by the Computing Technology
Industry Association (CompTIA) that certifies the competency of service
technicians in the computer industry. Many computer hardware and software
manufacturers, vendors, distributors, resellers, and publications back the
program.
Earning A+ Certification means that you possess the knowledge, skills, and
customer-relations expertise that are essential for a successful computer
service technician. The exams cover a broad range of hardware and software
technologies but are not related to any vendor-specific products, including
Microsoft Windows.
Benefits of Certification
To become certified, you must pass two test modules: the Hardware Core and
the Operating System Technologies Core. For the most current rules
concerning taking the test, locations, fees, how the tests are administered, and
the requirements for passing, check the CompTIA Web site at
www.comptia.com.
This text prepares you to master the A+ Exams. By completing all course
work, you will be able to complete the A+ Certification Exams with the
confidence you need to ensure success. More important, you will be able to
conduct your business with the knowledge that you are among the best and
that you really "know your stuff."
Percent of
Domain
Examination
1.0—Installation, Configuration, and
30
Upgrading
2.0—Diagnosing and Troubleshooting 30
3.0—Preventive Maintenance 5
4.0—Motherboard/Processors/Memory 15
5.0—Printers 10
6.0—Basic Networking 10
1.0 Installation, Configuration, and Upgrading
This domain tests the knowledge and skills needed to identify, install,
configure, and upgrade microcomputer modules and peripherals, following
established basic procedures for system assembly and the assembly of field
replaceable modules. You will be expected to know how to
This domain tests the candidate's knowledge and skills in diagnosing and
troubleshooting common problems and system malfunctions, and requires
knowledge of the symptoms relating to common problems. You will be
expected to know how to
4.0 Motherboard/Processors/Memory
This domain requires knowledge of specific terminology, facts, ways and means
of dealing with classifications, and categories and principles of motherboards,
processors, and memory in microcomputer systems. You will be expected to
know how to
5.0 Printers
This domain requires knowledge of basic types of printers, basic concepts, and
printer components; how they work, how they print onto a page; paper path,
care and service techniques, and common problems. You will be expected to
know how to
Identify the basic concepts, printer operations, and printer components.
Identify care and service techniques and common problems with primary
printer types.
This domain tests skills and knowledge of basic network concepts and
terminology, ability to determine whether a computer is networked, knowledge
of procedures for swapping and configuring network interface cards, and
knowledge of the ramifications of repairs when a computer is on the network.
You will be expected to know how to
For A+ Certification, the examinee must pass both this examination and the
A+ Core Hardware (formerly the A+ Core) Examination. This examination
measures essential operating system competencies for entry-level PC
hardware service technicians with six months of on-the-job experience. The
examinee must demonstrate basic knowledge of the command-line prompt,
Windows 9x, and Windows 2000 for installing, configuring, upgrading,
troubleshooting, and repairing microcomputer systems. This examination is
broken down into four domains.
Percent of
Domain
Examination
1.0—Operating System Fundamentals 30
2.0—Installation, Configuration, and
15
Upgrading
3.0—Diagnosing and Troubleshooting 40
4.0—Networks 15
Identify the procedures for installing Windows 9x and Windows 2000 and
bringing the software to a basic operational level.
Identify steps to perform an operating system upgrade.
Identify the boot sequences and boot methods, including the steps to
create an emergency boot disk with utilities installed for Windows 9x,
Microsoft Windows NT, and Windows 2000.
Identify procedures for loading or adding and configuring device drivers,
applications, and the necessary software for certain devices.
Recognize and interpret the meanings of common error codes and startup
messages from the boot sequence, and identify steps to correct the
problems.
Recognize common problems and determine how to resolve them.
4.0 Networks
The test is available to anyone who wants to take it. Payment is made at the
time of registration, either by credit card or by requesting that an invoice be
sent to you or your employer. Vouchers and coupons are also redeemed at
that time.
3 4
Chapter 1
Introduction to Computers
About This Chapter
We begin our introduction to computers with a brief history of how they
evolved. Although this course and the A+ exam focus on the modern electronic
computer, many principles used in early computational machines still apply to
their modern successors. With a summary of computer development and
discussion of the role of today's computer professional, this chapter lays the
foundation for the chapters that follow.
Before You Begin
There are no prerequisites for this chapter.
3 4
Lesson 1: The Development of the Computer
In this lesson, we take a brief look at the development of the computer. By
understanding its origins, you'll gain an appreciation for both the complexity
and simplicity of today's computers.
The technology developed for the ABC machine was passed from Atanasoff to
John W. Mauchly, who, together with engineer John Presper Eckert, developed
the first large-scale digital computer, ENIAC (Electronic Numerical Integrator
and Computer). It was built at the University of Pennsylvania's Moore School
of Electrical Engineering. Begun as a classified military project, ENIAC was
designed to prepare firing and bombing tables for the U.S. Army and Navy.
When finally assembled in 1945, ENIAC consisted of 30 separate units, plus a
power supply and forced-air cooling. It weighed 30 tons, and used 19,000
vacuum tubes, 1500 relays, and hundreds of thousands of resistors,
capacitors, and inductors. It required 200 kilowatts of electrical power to
operate.
The 1960s and 1970s marked the golden era of the mainframe computer.
Using the technology pioneered with ABC, ENIAC, and Colossus, large
computers that served many users (with accompanying large-scale support)
came to dominate the industry.
As these highlights show, the concept of the computer has indeed been with us
for quite a while. The following table provides an overview of the evolution of
modern computers—it is a timeline of important events.
NOTE
Don't worry if you are not familiar with some terms in this
timeline; they are explained in the chapters that follow, as well as
in the Glossary.
Year Events
The 4004—the first 4-bit microprocessor—is introduced by Intel. It
1971 boasts 2000 transistors with a clock speed of up to 1 megahertz
(MHz).
1972 The first 8-bit microprocessor—the 8008—is released.
The 8080 microprocessor is developed. This improved version of
1974 the 8008 becomes the standard from which future processors will
be designed.
Digital Research introduces CP/M—an operating system for the
1975 8080. The combination of software and hardware becomes the
basis for the standard computer.
Zilog introduces the Z80—a low-cost microprocessor (equivalent
to the 8080).
1976
The Apple I comes into existence, although it is not yet in
widespread use.
The Apple II and the Commodore PET computers, both of which
use a 6502 processor, are introduced. These two products become
1977
the basis for the home computer. Apple's popularity begins to
grow.
Intel introduces a 16-bit processor, the 8086, and a companion
math coprocessor, the 8087.
1978
Intel also introduces the 8088. It is similar to the 8086, but it
transmits 8 bits at a time.
Motorola introduces the 68000—a 16-bit processor important to
1980 the development of Apple and Atari computers. Motorola's 68000
becomes the processor of choice for Apple.
The IBM personal computer (PC) is born; it contains a 4.7-MHz
8088 processor and 64 kilobytes (KB) of RAM (random access
memory), and is equipped with a version of MS-DOS 1.0 (three
1981
files and some utilities).
Available mass-storage devices include a 5.25-inch floppy drive
and a cassette tape drive.
Intel completes development of the 80286—a 16-bit processor
with 150,000 transistors.
1982
MS-DOS 1.1 now supports double-sided floppy disks that hold 360
KB of data.
IBM introduces the XT computer with a 10-MB hard disk drive.
1983 MS-DOS 2.0 arrives; it features a tree-like structure and native
support for hard disk drive operations.
The first computer with an 80286 chip—the IBM AT—enters the
market.
It is a 6-MHz machine with a 20-MB hard disk drive and a high-
1984
density, 1.2-MB 5.25-inch floppy disk drive.
Apple introduces the Macintosh computer, marking the first
widespread use of the graphical user interface and mouse.
1985 MS-DOS 3.2, which supports networks, is released.
The first Intel 80386-based computer is introduced by Compaq; it
features a 32-bit processor with expanded multitasking capability
1986
(even though no PC operating system yet fully supports the
feature).
MS-DOS 3.3 arrives, allowing use of 1.44-MB 3.5-inch floppy disk
1987
drives and hard disk drives larger than 32 MB.
IBM introduces the PS/2 computer series. A complete departure
from previous machines, its proprietary design does not support
the hardware and software available on IBM PCs or clones.
1988 Microsoft (with the help of IBM) develops OS/2 (Operating System
2), which allows 32-bit operations, genuine multitasking, and full
MS-DOS compatibility.
Microsoft releases MS-DOS 4.0.
Intel introduces the 80486 processor; it contains an on-board
math coprocessor and an internal cache controller (offering 2.5
1989
times the performance of a 386 processor with a supporting
coprocessor).
1991 MS-DOS 5.0 offers a significantly improved DOS shell.
The Intel i586 processor, the first Pentium, is introduced, offering
2.5 times the performance of a 486.
1992
Microsoft introduces Windows 3.1, vastly expanding the use of a
graphical user interface in the mass market. IBM expands OS/2.
MS-DOS 6.0 arrives. The term "multimedia" (the inclusion of CD-
1993 ROM drives, sound cards, speakers, and so forth, as standard
equipment on new personal computers) comes into use.
Intel delivers the first 100-MHz processor. Compaq Computer
1994
Corporation becomes the largest producer of computers.
Windows 95, code-named Chicago, is introduced by Microsoft. It
features 32-bit architecture.
The Internet, having expanded far beyond its beginnings as a
network serving government and university institutions, is now in
1995
everyday use by the rapidly growing proportion of the population
with access to a modem.
Computer prices drop as performance increases. IBM purchases
Lotus (maker of the popular Lotus1-2-3 spreadsheet).
1995- Software manufacturers scramble to make their products
1996 compatible with Windows 95.
Microprocessor speeds exceed the 200-MHz mark. Hard disk drive
and memory prices fall as basic system configuration sizes
1997 continue to increase.
CD-ROM drives and Internet connections have become standard
equipment for computers.
PC performance continues to soar and prices continue to fall.
Central processing unit (CPU) speeds exceed 450 MHz, and
motherboard bus speeds reach 100 MHz
Entry-level machines are priced near the $500 mark.
1998
Universal serial bus (USB) is introduced.
Windows 98 becomes the standard operating system for most new
personal computers. Computer prices drop well under $1,000,
increasing computer sales to the home market.
Processor speeds exceed 1 gigahertz (GHz). E-commerce grows
1999
dramatically as the Internet expands.
Microsoft releases Windows 2000 and the basic PC becomes a
commodity item in discount stores. Broadband connections such
2000 as DSL and cable begin to take hold, making Internet access
easier and faster than over the telephone line.
Lesson Summary
The following points summarize the main elements of this lesson:
The concepts that form the basis of computer technology have a long
history that stretches back 2500 years.
Rudimentary, electrically powered computers were first developed in the
1950s and 1960s.
The "standard" PC has undergone several stages of evolution,
characterized by improvements to the processor, internal architecture,
and types of storage devices.
3 4
Lesson 2: The Role of a Computer Service
Professional
As computers have evolved, so has the role of the computer technician. This
lesson takes a look at the contemporary technician's role in maintaining and
servicing computers.
Matching the rapid pace of change in the industry, the role of the computer
professional is constantly changing, too. Not too many years ago, the only
tools needed to repair a computer were a screwdriver, needle-nose pliers, the
documentation for the computer, a boot disk with a few utilities, and a good
MS-DOS reference manual. The screwdriver is still the standard repair tool,
but the technician is confronted with a wider array of case types, motherboard
designs, processor types, and operating systems—and a wider array of
customer needs. Today's computer professional needs to be a technician,
scholar, and diplomat rolled into one, as you can see by the table that follows.
Title Skills
You are able to troubleshoot and repair hardware and
Technician
software efficiently and quickly.
You have the wisdom and perseverance to seek answers to
Scholar what you don't know and build your base of knowledge.
Learning never stops.
You are able to instill in the user (your customer) the
confidence that you are in control and can fix things, even
when you are encountering problems for the first time. You
Diplomat
are able to resolve the problem, even if your customer's (lack
of) understanding of the computer might be part of that
problem.
Lesson Summary
The following points summarize the main elements of this lesson:
The concepts that form the basis of computer technology have a long
history that stretches back 2500 years.
Modern computers have followed the growth and technology of the
electronics industry.
The role of the computer technician has paralleled the evolution of the
computer.
A computer technician must combine troubleshooting and repair skills
with on-the-job learning and customer support.
3 4
Review
2. What are the three roles that today's computer service professional needs
to assume?
Answers
3 4
Chapter 2
Understanding Electronic Communication
About This Chapter
We normally think of communication as an act that involves people and
activities like talking, writing, and reading. In this book, though, we are
interested also with communication between computers and between people
and computers. Communicating is the act of giving, transmitting, or
exchanging information. In this chapter, we discuss how a computer processes
data and communicates (transmits information) with its user. Understanding
this process is fundamental to understanding how computers work.
Before You Begin
There are no prerequisites for this chapter.
3 4
Lesson 1: Computer Communication
In this lesson, we examine the fundamentals of electronic communication and
explore how computer communication differs from human communication.
All "out of earshot" communications have one thing in common: They require
some type of "code" to convert human language to a form of information that
can be packaged and sent to the remote location. It might be a set of letters in
an alphabet, a series of analog pulses over a telephone line, or a sequence of
binary numbers in a computer. On the receiving end, this code needs to be
converted back to language that people can understand.
Telegraphs and early radio communication used codes for transmissions. The
most common, Morse code (named after its creator, Samuel F. B. Morse), is
based on assigning a series of pulses to represent each letter of the alphabet.
These pulses are sent over a wire in a series. The operator on the receiving
end converts the code back into letters and words. Morse code remained in
official use for messages at sea almost until the end of the twentieth century—
it was officially retired in late 1999.
Morse used a code in which any single transmitted value had two possible
states: a dot or a dash. By combining the dots and dashes into groups, an
operator was able to represent letters and, by stringing them together, words.
That form of on–off notation can also be used to provide two numbers, 0 and
1. The value 0 represents no signal, or off, and the value 1 represents a
signal, or on, state.
This type of number language is called binary notation because it uses only
two digits, usually 0 and 1. It was first used by the ancient Chinese, who used
the terms yin (empty) and yang (full) to build complex philosophical models of
how the universe works.
Our computers are complex switch boxes that have two states and use a
binary scheme. The value of a given switch's state—on or off—represents a
value that can be used as a code. Modern computer technology uses terms
other than yin and yang, but the same binary mathematics creates virtual
worlds inside our modern machines.
The Binary Language of Computers
The binary math terms that follow are fundamental to understanding PC
technology.
Bits
Bytes
Memory
Value
Unit
Bit Smallest unit of information; shorthand term for binary digit
Nibble 4 bits (half of a byte)
Byte 8 bits (equal to one character)
16 bits on most personal computers (longer words possible
Word
on larger computers)
Kilobyte
1024 bytes
(KB)
Megabyte
1,048,576 bytes (approximately 1 million bytes or 1024 KB)
(MB)
Gigabyte 1,073,741,824 bytes (approximately 1 billion bytes or 1024
(GB) MB)
The binary system of numbers uses the base of 2 (0 and 1). As described
earlier, a bit can exist in only two states, on or off. When bits are represented
visually:
0 equals off.
1 equals on.
The following is 1 byte of information in which all 8 bits are set to 0. In the
binary system, this sequence of eight 0s represents a single character—the
number 0.
0 0 0 0 0 0 0 0
The binary system is one of several numerical systems that can be used for
counting. It is similar to the decimal system, which we use to calculate
everyday numbers and values. The prefix dec in the term decimal system
comes from the Latin word for 10 and denotes a base of 10, which means the
decimal system is based on the 10 numbers 0 through 9. The binary system
has a base of 2, the numbers 0 and 1.
There are some similarities in counting with binary notation and the decimal
system we all learned in grade school. In the decimal system, the rightmost
whole number (the number to the left of the decimal point) is the "digits"
column. Numbers written there have a value of 0 to 9. The number to the left
of the digits column (if present) is valued from 10 to 90—the "10s" column.
The factor of each additional row is 10 in the decimal system of notation. To
get the total value of a number, we add together all columns in both systems:
111 is the sum of 100 + 10 + 1.
NOTE
Byte—Example A
The value of this byte is 0 because all bits are off (0 = off).
0 0 0 0 0 0 0 0 8 bits
128 64 32 16 8 4 2 1 # values
Byte—Example B
In this example, two of the bits are turned on (1 = on). The total value of this
byte is determined by adding the values associated with the bit positions that
are on. This byte represents the number 5 (4 + 1).
0 0 0 0 0 1 0 1 8 bits
128 64 32 16 8 4 2 1 # values
Byte—Example C
In this example, two different bits are turned on to represent the number 9 (8
+ 1).
0 0 0 0 1 0 0 1 8 bits
128 64 32 16 8 4 2 1 # values
The mathematically inclined will quickly realize that 255 is the largest value
that can be represented by a single byte. (Keep in mind that we start with 0
and go to 255, which corresponds to a possible 256 places on a number line.)
Because computers use binary numbers and humans use decimal numbers, A+
technicians must be able to perform simple conversions. The following table
shows decimal numbers and their binary equivalents (0_9). You will need to
know this information. The best way to prepare is to learn how to add in
binary numbers rather than merely memorizing the values.
Numbers are fine for calculating, but today's computers must handle text,
sound, streaming video, images, and animation as well. To handle all of that,
standard codes are used to translate between binary machine language and
the type of data being represented and presented to the human user. The
binary system is still used to transfer values, but those values have a
secondary meaning that is handled by the code. The first common, code-based
language was developed to handle text characters and serves as a good
example that lets us examine some other core concepts as well.
The telegraph and the individual wires in our PCs are serial devices. This
means that only one element of code can be sent at a time. Like a one-lane
tunnel, there is only room for one person to pass through at one time. All
electronic communications are—at some level—serial, because a single wire
can have only two states: on or off.
To speed things up, we can add more wires. This allows simultaneous
transmission of signals. Or, to continue our analogy, it's like adding another
set of tunnels next to the first one: We still have only one person per tunnel,
but we can get more people through because they are traveling in parallel.
That is the difference between parallel and serial data transmission. In PC
technology, we often string eight wires in a parallel set, allowing 8 bits to be
sent at once. Figure 2.1 illustrates serial and parallel communication.
Figure 2.1 Serial and parallel communication
ASCII Code
The standard code for handling text characters on most modern computers is
called ASCII (American Standard Code for Information Interchange). The basic
ASCII standard consists of 128 codes representing the English alphabet,
punctuation, and certain control characters. Most systems today recognize 256
codes: the original 128 and an additional 128 codes called the extended
character set.
The following illustrates how the binary language spells the word binary:
B I N A R Y
01000010 01001001 01001110 01000001 01010010 0101100
NOTE
The following table is a partial representation of the ASCII character set. Even
in present-day computing, laden with multimedia and sophisticated
programming, ASCII retains an honored and important position.
Symbol Binary 1 Byte Decimal Symbol Binary 1 Byte Decimal
0 00110000 48 V 01010110 86
1 00110001 49 W 01010111 87
2 00110010 50 X 01011000 88
3 00110011 51 Y 01011001 89
4 00110100 52 Z 01011010 90
5 00110101 53 a 01100001 97
6 00110110 54 b 01100010 98
7 00110111 55 c 01100011 99
8 00111000 56 d 01100100 100
9 00111001 57 e 01100101 101
A 01000001 65 f 01100110 102
B 01000010 66 g 01100111 103
C 01000011 67 h 01101000 104
D 01000100 68 i 01101001 105
E 01000101 69 j 01101010 106
F 01000110 70 k 01101011 107
G 01000111 71 l 01101100 108
H 01001000 72 m 01101101 109
I 01001001 73 n 01101110 110
J 01001010 74 o 01101111 111
K 01001011 75 p 01110000 112
L 01001100 76 q 01110001 113
M 01001101 77 r 01110010 114
N 01001110 78 s 01110011 115
O 01001111 79 t 01110100 116
P 01010000 80 u 01110101 117
Q 01010001 81 v 01110110 118
R 01010010 82 w 01110111 119
S 01010011 83 x 01111000 120
T 01010100 84 y 01111001 121
U 01010101 85 z 01111010 122
NOTE
Keep in mind that computers are machines, and they do not really "perceive"
numbers as anything other than electrical charges setting a switch on or off.
Like binary numbers, electrical charges can exist in only two states—positive
or negative. Computers interpret the presence of a charge as 1 and the
absence of a charge as 0. This technology allows a computer to process
information.
Lesson Summary
The following points summarize the main elements of this lesson:
Computer Communication
7. Define a bit.
8. Define a byte.
Answers
3 4
Chapter 3
An Overview of the Personal Computer
About This Chapter
In this chapter, we expand on the material in the preceding chapters with an
explanation of the Input/Process/Output (I/P/O) model and see how it can be
used to help us understand the functional design of the personal computer
(PC). We go on to define the hardware components that a computer
professional can expect to encounter every day—the computer parts that you
actually touch.
Before You Begin
If possible, while you work through this chapter, have a PC at hand with its
case open. Take a look at each piece of hardware and try to identify its
function as you go over this material.
3 4
Lesson 1: The Three Stages of Computing
In this lesson, we discuss the three stages of computing and how they relate to
the constituent parts that make up the modern PC.
A modern computer looks like a complicated device. On one level this is true,
and it is the beneficiary of much development in electronics technology. It is
constructed of many hardware components connected with what seem to be
miles of interwoven wires. Despite this apparent complexity, however, a
computer, just like a calculator, handles information in three stages: input,
processing, and output (see Figure 3.1). Each piece of hardware can be
classified as working in one (and sometimes two) of these three stages. We
can also use these three stages to classify any aspect of a computer's
operation or the function of any of its components. During the troubleshooting
phase of a repair job, it is often useful to categorize a problem according to
which of the three stages it occurs in.
Application Function
Input: Typing your words
Processing: Formatting the text (such as word wrap and
Word
fonts)
processor
Output: Storing the text and allowing you to retrieve or
print it
Input: Typing or providing numbers (such as sales figures)
Processing: Applying one or more formulas to the data
Spreadsheet
Output: Displaying the results of the calculation in numeric
or graphical form
Input: Typing information into a data form
Database Processing: Indexing and storing the data records
Output: Producing reports showing selected data records
Input: Moving your chess piece
Processing: Computer calculating how to respond to your
Game
move
Output: Computer making a move
Keep in mind that this is a short list focusing on human interaction with the
machine. The PC often takes information for its own components and processes
that data for internal use, as when a drive is accessed or a display adapter
sends signals to the monitor.
Lesson Summary
The following points summarize the main elements of this lesson:
As you might expect, the components of a computer reflect the function of the
machine—specifically, the three stages of computing, as outlined in Lesson 1.
Let's examine the components.
Input
The following table lists some examples of devices that are used to put
information into a computer.
Device Description
The primary input
device for a computer,
allowing users to type
Keyboard
information just as
they once did on a
typewriter.
Used with graphical
interface environments
to point to and select
objects on the
Mouse system's monitor. Can
be purchased in a
variety of sizes,
shapes, and
configurations.
Converts printed or
photographic
information to digital
information that can
Scanner be used by the
computer. Works
similar to the scanning
process of a photocopy
machine.
When we refer to the CPU, we are usually speaking of the processor. However,
the CPU requires several other components that support it with the
management of data to operate. These components, when working in
harmony, make up the primary elements of the PC we know today. The
following table lists these fundamental support components.
Component Description
The large circuit
board found inside
the computer.
Without it, a
computer is just a
metal box. The
Motherboard
motherboard
contains all the
remaining items in
this table; for all
practical purposes, it
is the computer.
A group of computer
chips or integrated
circuits (ICs) that,
when working
together, manage
and control the com-
Chip set
puter system. This
set includes the CPU
and other chips that
control the flow of
data throughout the
system.
A group of parallel
conductors (circuit
traces) found on the
motherboard and
Data bus
used by the CPU to
send and receive
data from all the
devices in the
computer.
A group of parallel
conductors (circuit
traces) found on the
motherboard and
used by the CPU to
Address bus "address" memory
locations.
Determines which
information is sent
to, or received from,
the data bus.
Specialized sockets
that allow additional
devices called
expansion cards or,
less commonly,
circuit boards, to be
Expansion attached to the
slots motherboard. Used
to expand or
customize a
computer, they are
extensions of the
computer's bus
system.
Establishes the
maximum speed at
which the processor
can execute
Clock
commands. Not to
be confused with the
clock that keeps the
date and time.
Protects unique
information about
the setup of the
computer against
loss when electrical
power fails or is
Battery
turned off. Also
maintains the
external date and
time (not to be
confused with the
CPU's clock).
Stores temporary
information (in the
form of data bits)
Memory
that the CPU and
software need to
keep running.
Output
The following table lists some common devices, known as peripherals, used
exclusively for output.
Device Description
Device Description
Other external storage devices include Iomega Zip drives, which allow users to
store 100 MB or 250 MB of data on a single Zip disk.
Lesson Summary
The following points summarize the main elements of this lesson:
Device Description
Uninterruptible power
supply. Acts as both a
surge suppresser (to
prevent high-power
spikes) and a power
leveler to provide the
computer with a
constant source of
power. Can even
UPS provide power during
a power failure or
interruption (although
the duration depends
on the UPS and the
computer's power
consumption) so that
the user can safely
save data before
shutting down.
Don't let the term support hardware lead you to underestimate the importance
of these components. How important are roads to commerce, or water to a
city? Without a reliable power source, modern PCs would not exist. The
internal power supply keeps a clean current running to the system.
Lesson Summary
The following points summarize the main elements of this lesson:
Components of a Computer
An input device retrieves data from an outside source and brings it into
the computer for processing.
A processing device takes information and alters it in some useful
manner.
An output device takes the altered information and stores or displays it.
Support Hardware
8. What is I/O?
Chapter 4
The Central Processing Unit
About This Chapter
This chapter presents an overview of the CPU (central processing unit), which
functions as the "brain" of the personal computer. Like the human brain, a
CPU is a complicated, highly integrated component performing many
simultaneous functions. Understanding the principles that underlie the
workings of the microprocessor is critical to understanding the computer and
its operation.
Before You Begin
You should be familiar with the terms and concepts introduced in Chapter 1,
"Introduction to Computers," and Chapter 2, "Understanding Electronic
Communication."
3 4
Lesson 1: Microprocessors
A microprocessor is an integrated circuit (IC) that contains a complete CPU on
a single chip. In this lesson, we examine the microprocessor from its inception
to the current state-of-the-art chip. It is important for a computer technician
to understand the development of the processor and what makes each version
different from its predecessors. This knowledge gives us an understanding of
the enhancements each new design offers over earlier ones and how the
system components can take advantage of the new features.
Figure 4.1 shows a Pentium II CPU attached to its motherboard. The mother-
board is the main circuit board, which contains the external data bus and
connection for expansion devices that are not part of the board's basic design.
Expansion slots act as "on ramps" to the external bus. Expansion cards, once
commonly known as daughter cards, are placed in slots on the motherboard.
Other forms of on ramps are the slots that hold memory or the sets of pins
used to attach drive cables. Connectors on the motherboard grant access to
the data bus for keyboards, mouse devices, and peripheral devices like
modems and printers through the use of COM and LPT ports.
Coded messages can be sent into or out of any device connected to the
external data bus. Think of the data bus as a large highway with parallel lanes.
Extending that analogy, bits are like cars traveling side by side—each carries
part of a coded message. Microprocessors are used to turn the coded messages
into data that performs a meaningful task for the computer's user.
NOTE
All hardware that uses data is connected in some way to the data
bus or to another device that is connected to the data bus.
The CPU
The CPU is the part of a computer in which arithmetic and logical operations
are performed and instructions are decoded and executed. The CPU controls
the operation of the computer. Early PCs used several chips to handle the task.
Some functions are still handled by support chips, which are often referred to
collectively as a chip set. Figure 4.3 shows a close-up of the working portion of
a CPU.
Transistors
Many materials, including most metals, allow electrical current to flow through
them; these are known as electrical conductors. Materials that don't pass
electrical current are called insulators. Pure silicon, which is used to make
most transistors, is a semiconductor; its degree of conductivity can be
adjusted, or modulated, by adding impurities during production.
Transistor switches have three terminals: the source, the gate, and the drain.
When positive voltage is applied to the gate, electrons are attracted, forming
an electron channel between the source and the drain. Positive voltage applied
to the drain pulls electrons from the source to the drain, turning the transistor
on. Removing the voltage turns it off by breaking the pathway.
Integrated Circuits
Microprocessors
A year later, the Intel 8008 appeared. Radio Electronics Magazine reported
that hobbyist Don Lancaster used an 8008 to build what was considered the
first personal computer. The article called it a "TV typewriter."
The Intel 8080 appeared in 1974. It sold then for $400 and now sells for about
$1. It powered traffic lights, but of more interest to our discussion, it formed
the core of the Altair computer of 1975. It was sold in kit form for $395 and
was named for a world in the Star Trek TV series. Figure 4.4 shows a picture
of the 8080 die. By today's standards, it was very weak: 6000 transistors, an
8-bit bus, and a 2-MHz clock speed. It could address 64 K of RAM (random
access memory), and users programmed the Altair by throwing manual
switches located on the case.
Figure 4.4 The Intel 8080 microprocessor
Microprocessor Design
The ALU is just what its name implies—the part of the IC that handles the
basic math functions of computation. The I/O unit fetches data from the
outside and passes data back to the external bus.
Registers
Registers are temporary memory storage areas used during data manipulation.
Physically, registers are rows of microscopic switches that are set on or off.
Each row forms a binary number: off = 0 and on = 1. Hence (reading from
right to left) off.off.on equals the number 1. Off.on.on equals the number
three (0 + 2 + 1). The CPU uses registers, like scratch pads, to hold data while
it works on a task. Changes in data during an operation are also stored in a
register, then sent out to other components as the job is finished. The number
and width of a register vary from one type of machine to another. The wider
the register, the more bits the machine can handle at one time—just as with
the width of the external bus. As register width moved from 4 to 8 to 16 to 32
to 64 to 128 bits, PCs increased in performance.
Codes
Computers use various binary-based codes to represent information. In
Chapter 2, "Understanding Electronic Communication," we saw how ASCII
(American Standard Code for Information Interchange) code is a binary
representation of characters on a keyboard. These codes are sent on the
external data bus by a system component to be read by other devices. When
you press a key on a PC keyboard, an ASCII code is generated and sent over
the data bus. Transferring information to and from the CPU (and other
hardware) is only the first step in manipulating data.
Other codes tell the PC how to display data on the monitor, talk to devices
such as printers, and take in data streams from scanners. Each of those
operations requires system resources and the manipulation of binary numbers.
In addition to the code that requires data, special machine code is required for
the CPU to turn the string of numbers into something useful to an application.
As with the data code, this machine code is sent in the form of binary numbers
on the data bus. The CPUs in turn are different enough that a code system
must be written specifically for each of them.
The Clock
Placing a special conductor in the CPU and pulsing it with voltage creates
timing. Each pulse of voltage received by this conductor is called a clock cycle.
All the switching activity in the computer occurs while the clock is sending a
pulse. This process somewhat resembles several musicians using a metronome
to synchronize their playing, with all the violinists moving their bows at the
same time. Thanks to this synchronization, you get musical phrasing instead of
a jumble of notes.
Virtually every computer command needs at least two clock cycles. Some
commands might require hundreds of clock cycles to process. Figure 4.5 shows
an external data bus with a CPU and two devices. Notice that the crystal or
clock is attached to the CPU to generate the timing.
Figure 4.5 CPU with clock
Clock Speed
Clock speed is determined by the CPU manufacturer and represents the fastest
speed at which the CPU can be reliably operated. The Intel 8088 processor, as
used in the original IBM PC, had a clock speed of 4.77 MHz. Today's processors
have clock speeds that run up to and, in some cases, exceed 750 MHz.
NOTE
The system crystal determines the speed at which a CPU operates. The system
crystal is usually a quartz oscillator, very similar to the one in a wristwatch.
You can find the system crystal soldered to the motherboard. Look for a silver
part, usually with a label that indicates the crystal speed.
IMPORTANT
A computer has two clocks: one to set the speed and timing and a
second clock to keep time for date and time calculations. They are
two entirely different devices.
Memory
The CPU can only hold a limited amount of information. To compensate,
additional chips are installed in the computer for the sole purpose of
temporarily storing information that the CPU needs. These chips are called
RAM (random access memory). The term random access is used because the
CPU can place or retrieve bytes of information in or from any RAM location at
any time. RAM is explored in greater detail in Chapter 7, "Memory."
Address Bus
Think of the address bus as a large virtual table in which the columns are
individual bits (like letters) and each row contains a string of bits (making up a
word). The actual lengths of these words will vary depending on the number of
bits the address bus can handle in a single pass. Figure 4.6 shows a table
containing 1s and 0s. Each segment is given an address, just like the one that
identifies a home or post office box. The system uses this address to send data
to or retrieve data from memory.
Figure 4.6 Memory spreadsheet
Like all the other buses in a PC, the address bus is a collection of conductors.
It links the physical memory to the system and moves signals as memory is
used. The number of conductors in the address bus determines the maximum
amount of memory that can be used (memory that is addressable) by the CPU.
Remember that computers count in binary notation. Each binary digit—in this
case, a conductor—that is added to the left will double the number of possible
combinations.
Early data buses used eight conductors and, therefore, 256 (28) combinations
of code, where possible. The maximum number of patterns a system can
generate determines how much RAM the data bus can address. The 8088 used
20 address conductors and could address up to 1,048,576 bytes of memory
locations, or 220. Today's PCs can address a lot more than that, and, in many
cases, the actual limiting factor is not the number of patterns, but the capacity
of the motherboard to socket memory chips. In all cases, the total amount of
memory is the factor of 2X, where X = the number of connectors.
The CPU does not directly connect to the memory bus, but sends requests and
obtains results using the system's memory controller. This circuitry acts as
both postmaster and translator, providing the proper strings of data in the
right order, at the right time, and in a form the CPU can use. As mentioned
before, any write or read action will require at least two clock cycles to
execute. (It can require more clock cycles on systems that do not have
memory tuned to the maximum system clock speed. In that case, the PC will
have to use additional clock cycles while it waits for the memory to be ready
for the next part of the operation.)
Figure 4.7 shows a diagram of the process with the CPU and RAM stack on the
external data bus. The address bus is connected to the memory controller. It
fetches and places data in memory.
When the user pushes a number key (in a program like Calculator, which can
add numbers), the keystroke causes the microprocessor's prefetch unit to ask
for instructions on what to do with the new data. The data is sent through the
address bus to the PC's RAM and is placed in the instruction cache, with a
reference code (let's call it 2 = a).
The prefetch unit obtains a copy of the code and sends it to the decode unit,
where it is translated into a string of binary code and routed to the CU and the
data cache to tell them what to do with the instruction. The CU sends it to an
address called X in the data cache to await the next part of the process.
When the plus (+) key is pressed, the prefetch unit again asks the instruction
cache for instructions about what to do with the new data. The prefetch unit
translates the code and passes it to the CU and data cache, which alerts the
ALU that an ADD function will be carried out. The process is repeated when the
user presses the 2 key.
Next (yes, there's still more to do), the CU takes the code and sends the actual
ADD command to the ALU. The ALU sums a and b are added together after
they have been sent up from the data cache. The ALU sends the code for 4 to
be stored in an address register.
Pressing the equal sign (=) key is the last act the user must execute before
getting the answer, but the computer still has a good bit of work ahead of it.
The prefetch unit checks the instruction cache for help in dealing with the new
keystroke. The resulting instruction is stored, and a copy of the code is sent to
the decode unit for processing. There, the instruction is translated into binary
code and routed to the CU. Now that the sum has been computed, a print
command retrieves the proper address, registers the contents, and displays
them. (That involves a separate flurry of activity in the display system, which
we won't worry about.)
As you can see, a microprocessor must go through many more steps than
human beings do merely to arrive at the conclusion that 2 + 2 = 4. The
computer must execute a complicated sequence to manage the code, place it,
and fetch it from memory; then it has to be told what to do with it. Yet the
result usually appears as fast as you can type the request. You can see that
clock cycles and, hence, processor speed, have a significant effect on
performance. Other issues that affect performance include memory access and
speed, as well as the response time of components such as the display system.
PC Microprocessor Developments and Features
PC microprocessor design grows more complex with each generation, and CPU
packaging keeps changing to provide room for additional features and
operating requirements. Microprocessors have evolved from the 4004
described earlier into today's high-speed Pentiums. Each new processor has
brought higher performance and spawned new technology. Six basic elements
are customarily used to gauge the performance and capability of a CPU design.
Intel has held most of the PC CPU market share since the original IBM PC was
introduced. Closely following each new Intel launch, rivals such as Advanced
Micro Devices (AMD) and Cyrix have offered alternative chips that are
generally compatible with the Intel models. This development, in turn, drives
prices down and spurs a new round of CPU design. Another player is Motorola,
a firm that manufactures the microprocessors used in the Apple family of
computers, among others.
We have already introduced the "pre-PC" CPUs. Now we take a look at the
models that have powered one of the most dramatic developments of the
modern world: the inexpensive, general-purpose computer.
On June 6, 1978, Intel introduced its first 16-bit microprocessor, known as the
8086. It had 29,000 transistors, 16-bit registers, a 16-bit external data bus,
and a 20-bit address bus to allow it to access 1 MB of memory. When IBM
entered the computer business, the 8086 was too powerful (and expensive) to
meet its requirements.
Intel then released the 8088 processor, which was identical to the 8086 except
for an 8-bit external data bus and a slower top clock rate. This meant that 8-
bit components (more common at the time) could be used for the construction
of PCs, and 8-bit applications written for earlier machines could be converted
for PC use. The following table compares the 8088 and 8086 chips.
CPU
Number of Register External Address Internal
Chip Speed
Transistors Width Data Bus Bus Cache
(MHz)
Intel
29,000 4.77-8 16-bit 8-bit 20-bit None
8088
Intel
29,000 4.77-10 16-bit 16-bit 20-bit None
8086
The early 8088 processors ran at 4.77 MHz, whereas later versions ran at 8
MHz. The 8086 and 8088 processors came as a 40-pin DIP (dual inline
package) containing approximately 29,000 transistors. The DIP is so named
because of the two rows of pins on either side of the processor, as shown in
Figure 4.8. These fit into a set of slots on a raised socket on the motherboard.
The small u-shaped notch at one end of a DIP-style CPU denotes the end that
has pin 1. During installation, you need to be sure to line it up correctly or you
might have to repeat the process. While this operation is now pretty rare, it
does need to be done once in a while.
Figure 4.8 DIP processor used for 8086, 8088, and 80286 CPUs
NOTE
The early IBM personal computers based on the 8086 and 8088 chips featured
16 KB of memory
A cassette tape recorder or a floppy disk drive for program and data
storage
A nongraphics monochrome monitor and Monochrome Display Adapter
(MDA)
Clone is a computer term that was used in the heyday of the early
IBM PCs through the 386. It denoted a computer that contained
the same microprocessor and ran the same programs as a better
known, more prestigious, and often more expensive machine.
Most of the 8088- and 8086-based PCs used some variation of MS-DOS. The
variations limited the growth of the software market because of the
compatibility issues they presented among versions of MS-DOS. Buyers had to
be sure that a program would run on their specific version of MS-DOS.
As users found more ways to take advantage of the PC's power, developers
and owners alike soon felt the limitations of the original IBM PC design. The
engineers who created it never envisioned the need for more than 16 K of
RAM. "Who would ever need more than that?" one was quoted as saying. The
cassette drive was never a big seller; most buyers opted for one or two 5.25-
inch floppy disk drives, and many soon craved color graphics and the space of
the seemingly massive 5- and 10-MB hard disk drives.
To meet that growing demand, IBM introduced a more robust PC, the XT
(eXtended Technology), which could take advantage of a hard disk drive. It
came with either a monochrome or four-color display and more RAM. Clone
makers soon followed suit.
The AT could run the same applications as the PC XT (8088), but run them
faster. The use of a 24-bit address path allowed the 286 to access up to 16 MB
of memory. The clone makers soon followed suit, taking advantage of third-
party versions of the 286. Chip makers Harris and AMD produced versions of
the 286 that could run at up to 20 MHz.
Virtual Memory
Virtual memory is the art of using hard disk space to hold data not
immediately required by the processor; it is placed in and out of RAM as
needed. Although using virtual memory slowed the system down (electronic
RAM is much faster than a mechanical hard drive), it allowed the 286 to
address up to 1 gigabyte (1 GB = 1000 MB) of memory (16 MB of actual
memory and 984 MB of virtual memory). Virtual memory required the use of
operating systems more advanced than MS-DOS, leading to the development
of products such as Microsoft Windows, IBM OS/2, and SCO's (Santa Cruz
Operation) PC version of UNIX.
The 286 might have outdated older hardware, but Intel had no desire to
invoke industry ire and slow the adoption of the new chip by requiring all-new
software applications. The result was a CPU with two operating modes: real
and protected.
In real mode, sometimes called compatibility mode, a 286 emulates the 8086
processor and addresses only the first 1 MB of memory. This mode is used to
run older software. Protected mode allows access to all memory on the system,
physical and virtual. In protected mode, a program can write only to the
memory allocated to it, with specific memory blocks allocated to different
programs. This mode can go well beyond the 16 MB of "true" memory, opening
up the possibility of multitasking—running more than one program at a time.
The original 286 processor came packaged in DIP (already shown), pin grid
array (PGA), and PLCC (plastic leadless chip carrier) designs. The PLCC can be
recognized by the arrangement of thin legs around its perimeter. The PLCC's
major advantage is its stronger leads (pins), which make it more difficult to
damage during removal or installation. PLCCs became popular because they
made it easier to upgrade a PC with a faster CPU (see Figure 4.9).
On June 16, 1985, Intel introduced the original 80386 (commonly known as
the 386). This true 32-bit processor was equipped with a 32-bit external data
bus, 32-bit registers, and a 32-bit address bus. The first models shipped with a
clock speed of 16 MHz, and the CPU contained 275,000 transistors. It could
directly address 4 GB of RAM and 64 terabytes (TB = approximately 1 trillion
bytes) of virtual memory. According to Intel, the 386 could hold an eight-page
history of every person on earth in that address space. The 386 was a true
generational leap in PC computing, with true multitasking capability—it really
could run more than one program at a time. That was due to a third memory
mode, called virtual real mode, which allowed independent MS-DOS sessions
(called virtual machines) to coexist on the same system at once. It spawned a
host of programs called memory managers designed to optimize (and
troubleshoot) the more complex world of virtual memory.
The original 80386 chips shipped with speeds of 12 or 16 MHz. Intel produced
faster versions—25 and 33 MHz—and AMD manufactured a 40-MHz variant.
The 386 provided both the real and protected mode available in the 286.
By April 1989, the 386 was running at clock speeds of 33 MHz, and Intel was
calling it the 80386DX to distinguish it from a lower-cost model, the 386SX.
The 386SX came on the scene in June 1988. Intel wanted to increase the sales
of 386-based machines without dramatically dropping the price of its flagship
CPU. The result was the introduction of a scaled-down model for "entry-level"
computers. It had a 16-bit external data bus and a 24-bit address bus (it could
address only 16 MB of memory). The 16-bit configuration allowed the 386SX
to be used as an upgrade chip for existing 16-bit motherboards, thereby
providing an easy transition to the next generation of computers.
The following table compares members of the 80386 chip family from Intel and
rival AMD. The AMD 80386DXLV is notable as the first PC CPU with an internal
cache.
CPU External
Number of Register Address Internal
Chip Speed Data
Transistors Width Bus Cache
(MHz) Bus
Intel
275,000 16-25 32-bit 16-bit 24-bit None
80386SX
Intel
275,000 16-33 32-bit 32-bit 32-bit None
80386DX
AMD
275,000 20-40 32-bit 32-bit 32-bit None
80386DX
AMD
275,000 20-33 32-bit 32-bit 32-bit None
80386DXL
AMD
275,000 20-33 32-bit 32-bit 32-bit 8 KB
80386DXLV
NOTE
The terms SX and DX are not acronyms, which means that they do
not stand for longer terms.
386 Packaging
The 386 was usually placed in either a PLCC package or a PGA package. This
type of mount can be found with the 80386, 486, and some older Pentiums up
to the 166-MHz models. The pins are evenly distributed in concentric rows
along the bottom of the chip (see Figure 4.10).
A variation of the PGA is the staggered pin grid array (SPGA). It looks almost
the same, but with staggered rows of pins. This allows engineers to place more
connectors in a smaller area. It also adds emphasis to the caution given earlier
about not bending pins through careless removal or insertion.
Both the PGA and SPGA have three pointed corners and a "snipped corner" on
one side. Use that corner to align the chip with the socket. If it does not go in
smoothly, double-check before trying to force it!
Some forms of portable PC have existed from the days of the 8088. The early
models, such as the Osborne and the original Compaq, were known as
"luggables"—tipping the scales at close to 30 pounds. Their cases looked more
suited for holding sewing machines than computers. Modern laptop computers
started to gain popularity with the advent of the 386 chip and the use of flat-
screen monitors incorporated in the design, rather than conventional video
tubes (see Chapter 11, "The Display System," for more information).
To seat 80286, 80386, and 80486 CPUs (the latter are covered in the section
that follows) on the more compact laptop motherboards, many vendors use
plastic quad flat pack (PQFP) mounts, which are also more secure than
traditional socket types designed for systems that will not be moved as much.
PQFPs require a submount called a carrier ring (see Figure 4.11). PQFPs
require a special tool for placing or removing a CPU. Be sure to get the tool
before attempting repairs on PQFP-mounted CPUs.
80486
On April 10, 1989, Intel introduced the 80486 line of processors. Once again,
the rallying cry was "better and faster." By this time, applications like
CorelDRAW and Adobe PhotoShop, and desktop publishing tools like Aldus
PageMaker and Ventura Publisher were generating more interest in faster
systems. Microsoft Windows was gaining popularity on its way to becoming the
standard desktop environment.
The 486 processor started life at 25 MHz and could address 4 GB of RAM and
64 TB of virtual memory. It is the first PC CPU to break the 1-million transistor
mark with 1.2 million. It provided a built-in math coprocessor (older PC CPUs
offered separate math coprocessors as an option, usually with a similar
number ending in a 7 rather than a 6. The combination speeded up graphics
programs that used floating-point math).
Once again, Intel sought a way to increase sales without weakening the price
of the flagship version of its 486DX CPU, so it added an SX version in April
1991. This time, the company achieved its goal by removing the math
coprocessor, reducing the number of transistors to 1,185,000. Users could
upgrade the SX to a 486DX by adding an optional OverDrive processor to
restore the missing component.
The 486 label was attached to other chip designs during its active development
phase, both by Intel and third-party chip makers. The 486SL, a variant with a
20- to 33-MHz clock and 1.4 million transistors, debuted in 1992. It was very
popular in high-performance laptop computers, running at lower voltage (3.3
volts instead of 5 volts) than the usual 486. The small and (for that time)
powerful machines also included System Memory Management (SMM) mode,
which could dim the liquid crystal display (LCD) screen and power down the
hard disk drive, extending the life of the battery.
Clock-Doubling Debuts
The need for speed spurred the introduction of new models of the 486 family
through the spring of 1994, the last variations being the DX2 and DX4. These
chips were models with faster clock speeds of up to 100 MHz. The processors
were either 25- or 33-MHz versions that had been altered to run internally at
double or triple their external speed. For example, the DX4 version of the 486
33-MHz processor ran at 33 MHz externally, but at 100 MHz internally (3 ×
33.3 MHz). This meant that internal operations, such as numeric calculations
or moving data from one register to another, occurred at 100 MHz, whereas
external operations, like loading data from memory, took place at 33 MHz.
Vendors such as AMD rode the wave with their own editions of the 486 for
users with a need for greater speed. The following table lists the most popular
486 chips and third-party work-alikes.
CPU
Register External Address Internal
Chip Speed
Width Data Bus Bus Cache
(MHz)
Intel 80486DX 25, 33, 50 32-bit 32-bit 32-bit 8 KB
Intel
50, 66 32-bit 32-bit 32-bit 8 KB
80486DX/2
Intel
75, 100 32-bit 32-bit 32-bit 16 KB
80486DX/4
Intel 80486SX 16, 20, 25 32-bit 32-bit 32-bit 8 KB
Intel 80486SL 16, 20, 25 32-bit 32-bit 32-bit 8 KB
AMD AM486DX 33, 40 32-bit 32-bit 32-bit 8 KB
AMD
33 32-bit 32-bit 32-bit 8 KB
AM486DXLV
AMD AM486DX2 50, 80 32-bit 32-bit 32-bit 8 KB
AMD AM486DX4 100, 120 32-bit 32-bit 32-bit 8 KB
16 KB
AMD AM486DX 120, 133 32-bit 32-bit 32-bit write-
"Enhanced" back
AMD
50, 80 32-bit 32-bit 32-bit 8 KB
AM486DXL2
AMD AM486SX 33, 40 32-bit 32-bit 32-bit 8 KB
AMD
33 32-bit 32-bit 32-bit 8 KB
AM486SXLV
AMD AM486SX2 33 32-bit 32-bit 32-bit 8 KB
8 KB
CYRX CX486DX 33 32-bit 32-bit 32-bit write-
back
8 KB
CYRX
50-80 32-bit 32-bit 32-bit write-
CX486DX2
back
1 KB
CYRX
33-40 32-bit 32-bit 32-bit write-
CX486DLC
back
1 KB
CYRX
20-33 32-bit 32-bit 32-bit write-
CX486SLC
back
1 KB
CYRX
50 32-bit 32-bit 32-bit write-
CX486SLC2
back
NOTE
The 486 is notable for one other reason: the addition of a standard heat sink
and, usually, a fan mounted on the CPU and powered by the PC. To maintain
stable operation, the PC must provide proper cooling for the 486 and newer
CPUs. Failure of the cooling apparatus can lead to erratic behavior and, if left
uncorrected, can damage the chip. If a customer complains of strange noises
inside the PC, the CPU fan is a good place to check. As their bearings age, CPU
fans may start to whine.
The First Pentiums
By 1993, Windows was standard, and users expected a lot more from PCs in
performance and features. Increasing software sophistication led to increasing
memory usage and hard disk drive requirements. The market was ready for a
major upgrade in CPUs, and Intel once again addressed that need. The new
Pentium processor signaled a radical redesign of both the CPU and naming
conventions.
With its CPUs identified by numbers, Intel faced a business problem: Numbers
cannot be trademarked. The company's strategy was to substitute a name that
could be trademarked, Pentium, for its upcoming chips that would otherwise
have been named 586. The word is based on the Latin word for the number
five, and this chip would have been the 80586. The original design has been
revamped several times since 1993 with the introduction of the Pentium II in
1997, the Pentium III in 1999, and the Pentium 4 in 2000. Like the older PC
CPUs, the Pentium has spawned its share of clones, leading to entry-level PCs
priced under $400.
The following table lists the first generation of Pentium and Pentium-
compatible chips.
NOTE
The Pentium 75 was released in 1994. These chips were made using a 0.6-
micron manufacturing process (approximately 21,000 lines and spaces per
inch) and, as a result, they required considerably less power, despite an
additional 200,000 transistors. Intel was able to change the power supply from
5 volts to 3.3 volts (the DX4 also had a reduced power supply), which reduced
by nearly one-half the amount of heat produced. The P90 and P100 processors
were also released at this time. These processors ran internally at 1.5 times
the external speed (60 or 66 MHz, which was the fastest system board). A P75
processor was also released for use in lower specification machines and laptop
computers.
Superscalar Technology
Early processors carried out these steps one at a time. Combining these steps
into a single clock cycle, a process known as pipelining, thereby increases the
speed of processing. Superscalar technology allows the Pentium to have two
instruction pipelines—called U and V. The U pipeline can execute the full range
of Pentium instructions, whereas the V pipeline can execute a limited number.
When possible, the Pentium processor breaks up a program into discrete tasks
that are then shared between the pipelines, allowing the Pentium to execute
two simple instructions simultaneously. Software must be specifically written
to take advantage of this innovative feature, which is known as multithreading.
The original Pentium series came with two 8-KB caches—one for data and one
for program code—compared with the single 8-KB cache on the 486 (16 KB on
the DX4). As described with the 486 chip, the cache uses a technique called
branch prediction to improve its ability to guess what data or program code
will be required next by the processor.
Intel's Competitors
Competitors have moved away from simply making clones of the Intel
processors. They are currently designing their own processors with unique
features. AMD and Cyrix are among the best known. Until recently, all the
Intel processors had been based on a CISC (complex instruction set
computing) architecture. Processors based on RISC (Reduced Instruction Set
Computing) have been used in high-powered machines since the mid-1980s.
Intel has produced its own version of a RISC-based processor that uses a much
smaller and simpler set of instructions, greatly enhancing the speed of the
processor.
Pentium Pro
Intel made CPU selection even more complex with the introduction of the
Pentium Pro in 1995, offering varied features, in different models, of the
Pentium design. This processor was aimed at a 32-bit server and workstation-
level applications such as CAD (computer-aided design), mechanical
engineering, and advanced scientific computation. The Pentium Pro was
packaged with a second speed-enhancing cache memory chip, and it boasted
5.5 million transistors. Introduced in November 1995, it incorporated an
internal RISC architecture with a CISC–RISC translator, three-way superscalar
execution, and dynamic execution. While compatible with all the previous
software for the Intel line, the Pentium Pro is optimized to run 32-bit software.
Its pin structure and mount differ from the basic Pentium, requiring a special
ZIF socket. Some motherboards have sockets for both Pentium and Pentium
Pro chips, but most machines use mother-boards designed for one or the
other. The package, a 2.46-inch by 2.66-inch 387-pin PGA configuration,
houses a Pentium Pro processor core and an on-board L2 cache. Although
mounted on one PGA device, they are two ICs. A single, gold-plated copper
and tungsten heat spreader gives them the appearance of a single chip.
The main CPU and 16-KB first-level (L1) cache consist of 5.5 million
transistors; the second chip is a 256- or 512-KB second-level (L2) cache with
15 million transistors. A 133-MHz Pentium Pro processes data about twice as
fast as a 100-MHz Pentium.
Pentium MMX
Soon, more choices were on the way. About the time the 166-MHz Pentiums
shipped, Intel introduced MMX (Multimedia Extension) technology, designed to
enhance performance of data-hungry applications like graphics and games.
With larger data and code caches, Pentiums with MMX technology can run non-
MMX-enhanced software approximately 10 to 20 percent faster than a non-
MMX CPU with the same clock speed.
To reap the full benefits of the new processor, MMX-enhanced software makes
use of 57 special multimedia instructions. These new MMX operators use a
technology called SIMD (single-instruction multiple-data) stream processing.
SIMD allows different processing elements to perform the same operations on
different data—a central controller broadcasts the instruction to all processing
elements in the same way that a drill sergeant would tell a whole platoon to
"about face," rather than instruct each soldier individually.
The MMX chips also take advantage of dynamic branch prediction using the
branch target buffer (BTB) to predict the most likely set of instructions to be
executed.
The MMX Pentium processor is also more compatible with older 16-bit software
than is the Pentium Pro; consequently, it soon doomed the Pro to the
backwaters of PC computing. All later versions of the Pentium have
incorporated some variation of MMX and improved on it. The original Pentium
desktop line ended with the release of the 233-MHz MMX in June 1997.
Pentium II
The Pentium II incorporated the features of its older designs and added a
number of enhancements, including:
As it had in the past, Intel faced competitors who sold CPUs with similar
performance at lower prices. Most high-priced desktop computers and servers
were sold with a Pentium of one sort or another, but home and entry-level PCs
were another matter. Enter a variation of the SX concept—the Celeron.
Celeron models available in 500, 466, 433, 400, 366, and 333 MHz have
expanded Intel processing into the market for computers selling for less than
$1,200.
All the Intel Celeron processors are available in PGA packages. The versions
operating at 433, 400, 366, 333, and 300 MHz are also available in single-
edge processor packages (see Figure 4.12).
Intel has labeled a new CPU brand to denote high-end server and high-
performance desktop use. First introduced in June 1998, the Xeon line
commands a premium price and offers extra performance-enhancing
technology. The Pentium II models incorporate 7.5 million transistors, clock
speeds to 450 MHz, bus speeds of 100 MHz, full-speed L2 caches in varying
sizes up to 2 MB, new multiprocessing capabilities, and compatibility with
previous Intel microprocessor generations. All models use the SEC package.
The Intel Pentium III processor is the newest member of the P6 family. With
28 million transistors, speeds from 450 MHz to 1 GHz, and system bus speeds
of 100 to 133 MHz, they mark a significant jump in PC CPU technology. They
employ the same dynamic execution microarchitecture as the Pentium II—a
combination of multiple branch prediction, data-flow analysis, and speculative
execution. This provides improved performance over older Pentium designs,
while maintaining binary compatibility with all previous Intel processors. The
Pentium III processor, shown in Figure 4.13, also incorporates MMX
technology, plus streaming SIMD extensions for enhanced floating-point and
3-D application performance. It also utilizes multiple low-power states, such as
AutoHALT, Stop-Grant, Sleep, and Deep Sleep to conserve power during idle
times.
Figure 4.13 The Intel Pentium III processor
Intel offers a Xeon version of the Pentium III processor at speeds up to 1 GHz,
aimed at high-performance workstations and servers.
Motorola
Motorola has been the mainstay CPU for Apple computers. The 68000
processor was introduced in 1979 as a 32-bit chip with a 16-bit data path. At
that time, the 68000 outperformed the Intel 8086. In 1982, the 68010
arrived, adding virtual memory support and a cache capable of holding three
instructions.
1984 saw the advent of the Macintosh II-series computer, which used the
68020 processor. It was the first full 32-bit chip, with a 32-bit data path, math
coprocessor, and the ability to access up to 4 GB of RAM. Introduced in the
same year as Intel's 80286 processor, the Motorola ran faster. However, it
lacked the market share and third-party support to gain real marketplace
momentum. PC clones offered more programs at a lower cost than the Apple
offerings.
The 68030 chip, introduced in 1987, provided increased data and instruction
speed. This was comparable to the 80386 chip. The 68040 processor was
introduced (in the Macintosh Quadra) as a competitor to the 80486. It has
internal caches for data and program code.
The PowerPC processor was developed jointly by IBM, Motorola, and Apple. The
name stands for performance optimization with enhanced RISC. The chips in
this family of processors are suitable for machines ranging from laptop
computers to high-powered network servers. It can run MS-DOS software
without using emulation.
Lesson Summary
The following points summarize the main elements of this lesson:
Existing
Recommendation
CPU
8086/8088 Cannot be upgraded.
80286
Replace the system. It may be possible to use isolated
through
components, but not worth the effort.
486
80386SX Same as for 80286. Replace the motherboard.
Replace a Pentium I motherboard, display adapter, and
sound card with newer components. Depending on the
Pentium I
customer's needs and budget, you may save floppy drives,
mouse, and other minor components.
May upgrade either just the CPU or CPU and motherboard,
depending on the system, the case, and the BIOS. In the
Pentium II case of AT-style PCs, you may need to change the case to an
ATX form factor, and upgrade the motherboard, keyboard,
and mouse to newer designs.
Pentium Possible to just upgrade CPU; it may require a new
III motherboard if the CPU is not supported by the chip set.
Low-insertion-force (LIF)
Zero-insertion-force (ZIF)
NOTE
LIF Socket
Removing an old CPU from an LIF socket is a muscular business! Luckily, there
are special tools designed for this. However, a flat-head screwdriver or a plate
cover for an expansion card slot will also work—just be sure to pry evenly
around the CPU or you will risk damaging the CPU, the socket, or both.
NOTE
There is a notch in one corner of an LIF socket. The CPU will also
have a notch and a dot in one corner, designed to help align the
CPU correctly. The index corner of the CPU must line up with the
notch on the socket. Firmly press the CPU into the PGA socket,
making sure all the pins are lined up.
ZIF Socket
The ZIF socket, shown in Figure 4.14, was the most popular mount for desktop
and tower PCs with 486 and early Pentium CPUs.
Figure 4.14 ZIF socket with CPU inverted showing matching pins
A ZIF socket has a lever arm that allows for simple removal and installation of
CPUs. ZIF sockets were introduced during the early 1990s as a safe means of
providing a user-friendly CPU upgrade. The first ZIF socket had 169 pins and
was used on 486SX systems. These systems were sold with a 486SX chip
already installed in a PGA socket and provided a ZIF socket for a 486
OverDrive chip, a special processor designed to increase the speed of 486
computers. (It works much like the standard clock-doubling processors—DX2
and DX4—used on 486 motherboards.) Often, this is a good method of
increasing the speed of a computer without replacing the motherboard.
Number of Pin
CPU Type Voltage
Pins Layout
17 × 17
486SX/SX2, DXUDX2, DX4ODPR 169 5v
PGA
SX/SX2, DX/DX2, DX4ODPR, 19 × 19
238 5v
Pentium OverDrive PGA
SX/SX2, DX/DX2, DX4ODP, Pentium 19 × 19
237 5v/3.3v
OverDrive PGA
21 × 21
Pentium 60/66 273 5v
PGA
37 × 37
Pentium 75/90/100/120 320 3.3v
SPGA
486 DX4, Pentium OverDrive 235 19 × 19 3.3v
PGA
21 × 21
Pentium 75-200 321 VRM
SPGA
NOTE
Be very careful when handling a CPU or any exposed IC. Static discharge can
damage or ruin the chip. Be sure to use a wrist-grounding strap or other
approved antistatic device. Take great care to not bend any pins, and make
sure the CPU is properly lined up to seat Pin 1 by using the code notch.
CAUTION
Check the memory and bus speed required for the new CPU before attempting
to boot the PC after the procedure. It might require new RAM and will most
often demand that a jumper be set on the motherboard before operating at the
new speed.
The Pentium II and III series are most commonly packaged in an SEC. This
package, shown in Figure 4.15, is very simple to work with. You will need a
motherboard mount and might have to purchase a fan and heat sink before
installing the CPU. Check the manual for jumper-setting adjustments and
follow the simple directions that come with the CPU.
Figure 4.15 Pentium processor in an SEC package and Slot 1
The actual task involves seating two plastic pins, sliding two guides over the
sides of the CPU, and then pushing the frame and CPU into the slot on the
board. With dual CPU boards, you need to know which slot to use, and you
might have to place a special card (which comes with the motherboard) in the
second CPU position if it is to remain empty.
CAUTION
Be sure to properly mount the cooling system, and make sure the
fan works before running the new CPU for any amount of time or
closing the case. Failure to ensure proper heat removal will
destroy the CPU very quickly!
Lesson Summary
The following points summarize the main elements of this lesson:
Microprocessors
8. Define microprocessor.
14. If a customer brought you an old Pentium 60-based computer and asked
you to install a new processor, what would your advice be?
Answers
3 4
Chapter 5
Power Supplies
About This Chapter
The power supply is an often-underrated part of a computer. Many transient
problems can be related to a faulty power supply or to poor electrical supply
from the local provider. Electronic components require a steady electrical
current, free of surges or drops. The power supply is responsible for providing
clean, constant current.
Before You Begin
No specialized knowledge is required; however, a fundamental understanding
of terms related to power and electricity such as voltage and wattage is helpful
when learning about power supplies.
3 4
Lesson 1: Power Supplies
This lesson presents basic information about power supplies for computer
systems. We take a look at the different variations of power supplies, how to
identify the proper type, and how to connect it to the computer (both
motherboard and related devices). We also examine the safety considerations
related to working with power supplies. As a certified computer technician, you
will often be called on to troubleshoot, identify, and replace power supplies.
Define the current and voltage requirements for a computer power supply
Identify when you need to replace a power supply
Specify the correct surge suppressors for a computer system
Select a backup power supply for a computer system
If the computer's power supply is providing reliable, clean power and its own
cooling fan works, all is well. If the power supply or its fan should fail or cause
erratic behavior by the PC, the power supply must be replaced. (Although it is
possible to remove and replace a power supply fan, the low cost of a power
supply makes it more practical to replace the power supply itself.)
Most supplies have a universal input that will accept either 110 volts
alternating current (VAC), 60 hertz (Hz) (U.S. standard power), or 220 VAC,
50 Hz (European and Asian standard). When replacing a power supply, there
are three things to consider: physical size, wattage, and connectors. The
remainder of this chapter covers the basics of power supplies.
NOTE
The very first PCs all used the same type of power supply with a large, red
switch on the side. Variations were manufactured for early portables and tower
cases, with longer or shorter cables and different types of switches. They all
shared a common pair of motherboard connectors. Collectively they are known
as AT-style. When replacing an AT-style power supply, you generally only need
to be concerned about the type of case that it will go in. The exceptions are
some high-end network servers, which sometimes allow for an extra power
lead to the motherboard. All newer desktop PCs (Pentium II and later) and
servers use ATX-style power supplies. The ATX design simplifies motherboard
connection by combining the two power leads in the AT-style power supply into
one. The main issues to be aware of are how much wattage the PC needs to
power its parts and how many peripheral connectors are required. Generally
speaking, older Pentium-based computers and all 486-based and earlier PCs
used AT-style supplies; almost all Pentium II and later-based systems use ATX-
style supplies. The ATX design is preferable for two reasons:
The on–off power control circuit (not the button) on ATX boards is built
into the motherboard. On AT-style PCs, it comes from the power supply.
AT-style power supplies connect to the motherboard through a pair of six-
wire connectors. ATX-style power supplies connect through a single 20-
pin connector.
A few motherboards and power supplies provide both AT and ATX fittings and
switch support. These are rare, but provide more options should you have to
repair such a system. Generally, you should use ATX-style power supplies for
all replacements, if possible.
When replacing a power supply, it's a good idea to compare the existing power
supply to the new one. Make sure that they are physically the same size, have
the same connectors, and that the new one has at least the same power
rating. Some high-quality power supplies offer "silencer" fans that are much
quieter than most models.
Power Supply Wattage
Power supplies are rated according to the maximum sustained power
(measured in watts) that they can produce. A watt is a unit of electrical power
equivalent to one volt-ampere. It is important to keep in mind that the power
supply must produce at least enough energy to operate all the components of
the system at the same time.
CAUTION
The label on a power supply that says "Don't Open" means just
that! Opening a power supply is dangerous. It is better to
completely remove and replace a defective power supply as
needed.
Power Supply Connectors
Power supplies employ several types of connectors, all of which are easy to
identify and use. On the outside of the computer enclosure, a standard male
AC plug and three-conductor wire (two power wires and a ground) draws
current from a wall outlet, with a female connection entering the receptacle in
the back of the power supply. There are three types of connectors on the
inside: the power main to the motherboard (which differs, as mentioned, in AT
and ATX models) and two types of four-pin fittings to supply 5 volts and 3.3
volts of power to peripherals such as the floppy disk and hard disk drives. Let's
take a close look at each in turn.
A pair of almost identical connectors, designated P8 and P9, links the power
supply to the motherboard (see Figure 5.1). These connectors are seated into
a row of six pins and matching plastic guides, or teeth, on the motherboard.
The P8 and P9 connectors must be placed in the proper orientation. The
motherboard manual will show which fittings are for P8 and P9. If the
connectors are not marked,
make sure that the two black wires on each plug are side by side and that the
orange wire (on P8) and the two red wires (on P9) are on the outside as you
push them into place.
The following table of power cables shows voltage values for each of the color-
coded wires on P8 and P9. The ground wires are considered 0 volts; all voltage
measurements (see Chapter 22, "The Basics of Electrical Energy") are taken
between the black wires and one of the colored wires.
NOTE
Remember to install the P8 and P9 plugs so that the black wires are side by
side. Installing them on the wrong receptacle can damage both the
motherboard and the power supply. Figure 5.2 shows the P8 and P9
connectors and a motherboard.
NOTE
The newer ATX main power connection, found on Pentium II computers and
later, is much easier to install. A single 20-pin plug is set into a fitted
receptacle and secured with a catch on the side of the plug that snaps over the
fitting. Figure 5.3 shows how to properly seat the connection. A small, flat-tip
screwdriver is a handy tool for easing the pressure on the catch to remove the
plug. In some cases, you can use a screwdriver to ease installation as well.
Figure 5.3 Placing an ATX plug in its motherboard receptacle
Two standard types of connectors are used to connect the power supply to
peripheral hardware:
CAUTION
PCs can run out of power connections, and large cases can have drives beyond
the reach of any plug on the supply. A good technician has a quick solution on
hand to both of these common problems: extenders and splitters.
Extenders are wire sets that have a Molex connector on each end; they are
used to extend a power connection to a device beyond the reach of the power
supply's own wiring. Splitters are similar to extenders, with the exception that
they provide two power connections from a single power supply connector.
Lesson Summary
The following points summarize the main elements of this lesson:
Problem Description
These are brief (and sometimes catastrophic) increases in the
voltage source (very high voltage for a very short time). They
Surges
can originate with the power source (the local power
company) but most often are due to lightning strikes.
Spikes are very short overvoltage conditions. Spikes are
Spikes measured in nanoseconds, whereas a surge is measured in
milliseconds.
Sags These are brief decreases of voltage at the power source.
If a sag lasts longer than 1 second, it is called a brownout.
The overloading of a primary power source can cause
Brownouts brownouts. Some brownouts are "scheduled" by power
companies to prevent overloading of circuits and potential
catastrophic failure of the system.
A blackout is a complete power failure, which can be caused
by equipment failure (local or regional) or accidental cutting
Blackouts
of power cables. When the power returns after a blackout,
there is a power spike and the danger of a power surge.
Power Protection Devices
Surge suppressors are devices used to filter out the effects of voltage spikes
and surges that are present in commercial power sources and smooth out
power variations. They are available from local computer dealers and
superstores. A good surge suppressor will protect your system from most
problems, but if you purchase an economy model, it might not work when you
need it most. Keep in mind that almost nothing will shield your hardware from
a very close lightning strike.
NOTE
Most power strips with surge protection have a red indicator light.
If the light goes out, this means that the unit is not providing
protection. These types of surge suppressors need to be replaced
every year or so. If the indicator light starts flashing before then,
it means the power strip is failing and should be replaced
immediately.
The amount of time that a UPS device can keep a system running is
determined by battery capacity and the power demands of the equipment
connected to it. A more powerful UPS device will need its own line and circuit
breaker. One of the principal power drains is the monitor. To keep a system
online as long as possible during a power failure, turn off the monitor
immediately after the failure commences.
When considering a UPS, take into account how much protection is needed, as
well as the importance of peace of mind to the user. The VA rating (voltage ×
amps = watts) must be sufficient to supply the computer and all its peripherals
with power for enough time to safely shut down the system. The easiest way
to calculate this number is to add the power rating (watts) for all pieces of
equipment that are to be connected to the UPS, as shown in the following
table.
CAUTION
Never plug a laser printer into a UPS unless the UPS is specifically
rated to support that type of device. Laser printers often require
more power than a UPS is able to provide, potentially placing the
printer, the UPS, and the computer at risk.
Power Supply Problems
The most easily recognized problem is a complete failure of the power supply.
This is easy to detect because, in the event of a failure, the computer will not
boot up (no lights, no sound). If there is apparently no power, be sure to check
the power source and the plug at both ends: the outlet and the computer.
Good power supplies have line-conditioning circuits, but these might not be
sufficient in locations where the power source has substantial quality flaws. If
you have problems with several systems, or if a second power supply still does
not fix a related complaint, add a UPS with good line-conditioning features.
Most power grids in the United States provide current that is far from ideal for
sensitive electronic components. Line-conditioning hardware added in the
chain just before the current reaches the machine adds a much needed level of
protection from spikes (very fast jumps in power levels), surges (longer ones),
and drops. All can cause transient problems with operations. These are often
erroneously blamed on the operating system or software.
Lesson Summary
The following points summarize the main elements of this lesson:
Power Supplies
The key to specifying the proper size of a power supply for a computer is
to add together the power requirements for all the components. It is
important to be sure to add extra power to allow for boot up.
Electrical power is measured in watts.
Proper installation of the P8 and P9 connectors is important to prevent
damage to the motherboard. The black (ground) wires must be installed
side by side.
Molex and mini connectors are used to connect power to devices such as
floppy disk and hard disk drives.
2. What are the two types of power supply connectors to the motherboard?
3. What are the two types of power supply connectors for devices such as
drives?
6. When you purchase a UPS, what is the most important thing to consider?
11. Describe the best way to make sure a new power supply matches the one
you are replacing.
13. A computer power supply has both 5-volt and 12-volt outputs. The 5-volt
output is used to power _____________, and the 12-volt output is used
to power _____________.
Answers
3 4
Chapter 6
Motherboard and ROM BIOS
About This Chapter
In earlier lessons, we provided an overview of the computer. In this chapter,
we focus on the computer's infrastructure. We begin with the centerpiece of
the computer, the motherboard, also called the mainboard. The motherboard is
the key part of the hardware infrastructure. It is a large circuit board that
serves as a home for the central processing unit (CPU) and all its associated
chips, including the chip set and RAM (random access memory), and connects
them to the rest of the physical elements and components of the computer.
Before You Begin
Although this chapter can be studied independently, it is suggested that you
review the preceding chapters, which discuss microprocessors, basic
input/output, and how power gets to the system, before reading this material.
3 4
Lesson 1: Computer Cases
The case, or chassis, which usually is made of metal, holds all the primary
electronics of the personal computer (PC) and often all the drives as well.
The real value of a case does not lie in the label, color, or how pretty it looks.
Instead, the case houses all the internal components, offers access to the
outside world via ports and connectors, and protects the PC's delicate circuits
from damage and electromagnetic interference (EMI). It also protects
surrounding devices, such as TVs, from the PC's EMI.
NOTE
The case design is also often used to underscore the identity of a specific brand
of computer, and can often be part of the reason we purchase a particular
computer. Some people will also choose a case design for its appearance. We
do, after all, want something that looks good, especially if we are spending a
lot of money on it. With some cases, however, there may be a more technical
reason for the case choice, such as the number of drive bays available.
Early computer cases were little more than boxes that sat on the desk and
served as monitor stands. Today, some manufacturers build "designer"
computers that come in fancy colors and command premium prices.
When considering the case, there are four general rules to keep in mind:
The bigger the box, the more components it can hold (providing greater
expansion potential) and, often, the better the air flow (essential for
cooling). Large cases are also easier to work with.
The more compact the box, the less expansion potential it has; working
on it is often much more difficult, and usually air flow is more restricted.
Smaller cases that come with a power supply usually have lower wattage,
reducing the number of internal devices that can be installed.
The more features in a case design, like the power wattage or the number
of bays, the higher the cost.
IMPORTANT
The majority of cases still open the old-fashioned way. However, if you find
yourself with one of the exceptions and can't locate screws in the back, check
to see if the plastic cover in the front can be pulled off. If so, that should
reveal three or four screws. Then see if the main cover can be pulled forward.
If not, look for screws that secure one or more of the side panels. Some side
panel designs are great for granting easy access to our next topic,
motherboards. This style of case allows one to inspect or remove the
motherboard without having to remove the entire outer covering.
Another trend is a case design using fittings that can be opened without any
tools. Some computers now provide easy opening with a thumb screw that
doesn't even require a screw driver. If you are working with one of these
computers, simply turn the thumb screw and slide the case back.
Lesson Summary
The following points summarize the main elements of this lesson:
The case of the PC defines the size, shape, and configuration of the
motherboard, the amount of expansion possible, and the space into which
hard drives and other internal accessories can be fitted.
To prevent EMI and ensure system components are properly cooled, you
should avoid running a computer without its cover.
3 4
Lesson 2: Motherboards
The motherboard is the PC's center of activity. All devices in a computer are in
some way connected to the motherboard. It hosts the largest single collection
of chips of any PC component and serves as the "street system" for the grid of
wires that link all the components, making it possible for them to
communicate.
The motherboard is usually the largest circuit board found inside the computer
case. Motherboards come in a variety of shapes. One size does not fit all, and
careful attention to size and location of mounting holes is required before
installing a new motherboard in an older computer. A motherboard needs to fit
in the space allotted for it, be secure in its mounts, be properly grounded,
receive sufficient ventilation (for cooling of the CPU and other heat-sensitive
components), and must not conflict with other hardware. When considering
the purchase of a new motherboard (see Lesson 2 of Chapter 4, "The Central
Processing Unit"), keep these things in mind:
Most "generic" motherboards will fit into "generic" computers. One reason
some people consider purchasing a PC clone is that it is easier to upgrade.
Keep in mind that a hybrid PC (assembled by a small vendor, made from
untested components) may be constructed of parts that may or may not
be totally compatible. There may also be questions about EMI due to
interaction between components or the way the parts set in the case.
There are two major categories of motherboards: AT and ATX. The main
difference between them is the type of power supply and main power
switch each requires. When you order a new motherboard, be sure to first
verify that it is compatible with the case and power supply to be used.
If you are working on a brand-name computer, you might be required to
purchase a new motherboard or other custom components from the same
manufacturer.
Before buying a motherboard, check its technical references to be sure
that the new board will fit and will be compatible with any of the RAM and
expansion cards the owner intends to use. Often, this information can be
found in the owner's manual. If not, check the manufacturer's Web site, if
one is available, or check other online resources such as technical
libraries. A Web search using the keyword "motherboard" will yield sites
dedicated to computer hardware.
For all practical purposes, you cannot repair motherboards. They should
be replaced if physically or electrically damaged. Your customer will get
new technology, usually for a price lower than the cost of the repair.
Because it is often the most difficult part of a system to replace (you have
to remove all the equipment that is connected to it), check all other
internal and external components before removing or replacing the
motherboard.
When obtaining a replacement, be sure to factor in the cost of all critical
options found on the existing motherboard. Some have a built-in SCSI
(Small Computer System Interface) Host Adapter or display adapters that
might not be common. In that case, either make sure the new board
offers the same level of support or install the appropriate add-on card(s)
to bring the system up to the existing level of operation.
Chip Sets
A motherboard comes with a variety of support chips soldered in place. The
primary elements constitute the chip set and are designed to work with the
CPU. These chips are highly complex and coordinated ICs that help the CPU
manage and control the computer's system. When replacing a CPU, you must
make sure that it is compatible with the chip set and supported by the
motherboard. If not, the computer won't work. A basic chip set (see Figure
6.2) consists of a
Bus controller
Memory controller
Data and address buffer
Peripheral controller
On modern motherboards, you will find specialized chips to control things such
as cache memory and high-speed buses. You will also find boards with fewer
individual chips because the manufacturer has incorporated several functions
into one chip.
Keep in mind that there is a wide range of features (with attendant cost
increases for extras) available when selecting a motherboard. You will need to
keep up to date on the types of processors, memory design, CPUs, and
expansion slots available to recommend and obtain the right product for your
customers.
Motherboards come in many sizes and shapes, but generic boards are
available that fit most clone computers.
The motherboard determines the limits of the computer's capabilities.
Chip sets are unique to each motherboard design and work with the CPU
to manage and control the computer's system.
You should make sure any new motherboard is compatible with the CPU,
RAM, and any other critical hardware and features that are already
installed on the computer.
3 4
Lesson 3: ROM BIOS
In addition to the chip set, you will find other chips called ROM BIOS. A ROM
BIOS chip contains data that specifies the characteristics of hardware devices,
such as memory and hard disk and floppy disk drives, so the system can
properly access them. This lesson explores ROM BIOS and what it does.
More recent systems use a technology called flash ROM or flash BIOS that
allows code in the core chips to be updated by software available through the
BIOS or motherboard supplier. Check the Internet site of the supplier if you
suspect your ROM chip has flash ROM technology; the software and
instructions are generally downloadable.
CAUTION
The first class, called core chips, includes support for hardware that is
common to all computers, is necessary, and never changes.
The second class, called updateable chips, encompasses hardware that is
also common and necessary, but that might change from time to time.
The third class of chips includes anything that is not included in one of
the first two classes.
Core Chips
Look on any motherboard: ROM chips for the core chips are found everywhere.
They are often distinctive because they are in DIP (dual in-line package) form
and are almost always labeled. These chips are commonly used for the
keyboard, parallel ports, serial ports, speakers, and other support devices.
Each ROM chip contains between 16 and 64 KB of programming. If the
functions have been combined, it may be harder to determine the chip's
purpose by appearance.
Updateable Chips
Unlike other ROM chips, CMOS chips do not store programs, but instead store
data that actually configures the features of the motherboard. For example, it
notes the number of floppy drives, the type(s) of hard drives, and if power-
saving options or administrator passwords are active. The CMOS chip also
maintains date and time information when power to the computer is off.
CMOS chips can store about 64 KB of data. However, storage of the data
needed to boot a computer requires only a very small amount of memory
(about 128 bytes).
If the data stored on the CMOS is different from the hardware it keeps track
of, the computer, or part of it, will probably not work. For example, if the hard
disk drive information is incorrect, the computer can be booted from a floppy
disk, but the hard disk drive might not be accessible. The technician or owner
will have to reset the CMOS values before the computer can use the device if
it is not properly defined in the CMOS registry.
IMPORTANT
Although several companies write BIOS code and sell it to computer makers,
three companies—American Megatrends (AMI), Phoenix, and Award—dominate
the BIOS market. Motherboard vendors might use one supplier for a series of
products; however, it is not uncommon for a manufacturer to change sources
within a series due to design or cost considerations. A good technician should
be familiar with the basic CMOS setup procedures for BIOS manufactured by
all three.
Because of its flexibility, the Hi-Flex BIOS, manufactured by AMI, has taken a
large share of the computer market. Motherboard manufacturers can purchase
a basic BIOS from AMI and then add setup parameters to meet the needs of
their products. For this reason, the number of setup parameters available on
one computer can differ from those on another computer, even though they
use the same motherboard. Award competes directly with AMI, providing very
flexible BIOS chips. Award was the first BIOS to heavily support Peripheral
Component Interconnect (PCI) motherboards.
Phoenix is considered a manufacturer of high-end BIOS. Phoenix creates
individual BIOS chips for specific machines. As a result, Phoenix BIOS chips
have fewer setup parameters available. These chips are commonly used in
machines with proprietary motherboards, such as laptops. Vendors can tune
the BIOS for performance, basing new code on the Phoenix core. Keep in mind
that Phoenix also makes parts that are sold and employed without custom
code.
There are several ways to determine who the BIOS manufacturer is:
Watch the monitor when the computer boots. A BIOS screen will usually
be displayed, indicating the manufacturer and version number. (This
screen might not be visible if the computer is warm booted. In that case,
power off the unit and restart.)
Check the computer or motherboard manual. Most include a section on
entering the setup program and setting options.
Remove the cover of the computer and look at the chip. Most BIOS chips
have a manufacturer's label.
Try a good third-party utility program. These products are available at
almost any software store. A Web search for a key phrase such as "BIOS
diagnostic" will yield the names of a number of them.
Reboot the computer and hold down several keys at once or unplug a
drive. This will often cause an error and prompt you to get into the setup
program. Unplugging the keyboard will accomplish the same goal with
less work; however, you won't be able to make adjustments on most
systems with the keyboard inoperative.
Every CMOS setup program looks slightly different. Do not be too concerned
about the differences—all BIOS routines contain basically the same
information. Take your time and get comfortable navigating in the setup
programs. Most of the CMOS setup programs are text-based, so you will have
to use keystrokes to navigate through the information. However, some newer
machines use a Windows-like CMOS setup (they have the look of a Windows
environment and will let you use a mouse to select changes).
For AMI, press Delete when the machine first begins to boot.
For Phoenix, press Ctrl+Alt+Esc, Del, or F2 when requested.
For Award, you can usually follow either of the other two procedures.
Motherboard makers can change the key combinations to access the CMOS
setup. This can be especially true for brand-name computers, and
manufacturers are not likely to publish the information on the startup screen.
TIP
Let's look at some typical screens from a Phoenix BIOS setup program. They
are good examples of how typical CMOS settings are presented and adjusted.
Figure 6.4 shows the first screen of this CMOS setup. From this point, you can
select alternate tabs (Advanced, Security, Power) or adjust any of these
individual items: floppy disk drive, hard disk drive, date and time, or RAM
settings.
The hard disk drive setup screen (Figure 6.5) is where individual hard drive
parameters are set. Today, most hard drives based on IDE (Integrated Device
Electronics) can be automatically detected by the BIOS. The CMOS settings are
then made by the BIOS automatically. However, you should still know how to
do this manually, both to be able to work with an older machine and in case
the setup program fails to recognize the drive.
Figure 6.5 Hard disk drive setup screen
The Advanced tab (Figure 6.6) leads to more advanced setup parameters. A
great deal of customization can be achieved using these settings. Pay careful
attention to any warnings that come up before you make any changes to
device settings. If you don't understand a setting, it is best to leave the default
option.
The Security tab allows you to set security parameters. Be careful: Once you
set a password, you have to remember that password to change the security
parameters. If you encounter a situation in which an owner has set and
forgotten a password, you will have to flush and reset the CMOS to the factory
default settings. Check the motherboard manual for information on how to do
this. It usually involves changing jumper settings twice.
Notice in Figure 6.7 that the virus check reminder option is disabled. If you
find a CMOS virus checker enabled, turn it off. This is especially important
during operating system and program installation. If you are certain that no
virus software is on the computer, yet you continue to get error messages
warning you to turn off all anti-virus software, the CMOS virus checker is the
most likely source of these erroneous messages. If you find this happening,
disable the CMOS virus checker. Of course, if you still get the message, you
should check for a real virus. Figure 6.7 shows the Security tab.
TIP
The Power tab, shown in Figure 6.8, allows the user to set up any power
conservation options provided by the manufacturer. These features typically
include setting a time limit for reducing power to the monitor and hard disk
drive.
Figure 6.8 Power tab
Maintaining CMOS
NOTE
The first clue that the battery is weakening is that the CMOS clock begins to
slow down. Exit to DOS and, when you see the C prompt (C:), type time. If
you notice the clock is slow, it's probably time to change the battery.
NOTE
When the CMOS battery dies completely, you will get lost CMOS errors, as
previously described. If you reload the CMOS data and the errors return, it's
time to change the battery. Although the computer will hold CMOS information
during the week, sometimes, over the weekend—when the computer is turned
off for two days—the CMOS data will be lost. Do not let these seemingly
"intermittent" problems fool you. Sometimes, before a battery dies, but after it
has started to fail, it will still be able to hold CMOS settings for a short time
after the computer is off. Any time a computer loses the CMOS information
more than once in a week, it's a sure sign that you need to replace the battery
immediately—if only to eliminate the battery as the source of the problem.
After replacing the battery, you must run the setup utility and restore any
CMOS settings.
NOTE
Today's computers are becoming less reliant on battery backup for CMOS. With
Windows Plug and Play technology, devices come with their own BIOS, which
the system reads each time the computer is booted. This does not eliminate
the need for CMOS or batteries, but it minimizes the impact of a battery
failure. At the very least, you will still need to retain the date and time
information.
All Other Chips
It would be impossible to put all the necessary BIOS information for every
conceivable piece of hardware on one chip. It would also be impractical, as new
devices are released almost monthly. Upgrading a machine would require a
new BIOS chip (or a new version of the flash BIOS) every time. Fortunately,
there are other ways to handle this challenge.
BIOS can be put on the hardware device itself. Many new add-on boards, such
as display adapters, network interface cards, and sound cards, have their own
on-board ROM chip. Because the system BIOS doesn't have a clue about how
to communicate with the new device, this card includes its own BIOS.
Using device drivers is the most popular way to provide BIOS support for
hardware. A device driver is a program that acts as an interface between the
operating system and the control circuits that operate the device. For example,
Windows has "generic" code that opens a file, but the driver for the disk drive
takes care of low-level tasks like positioning the read head, reading or writing
blocks of data, and so on. Thus, applications programmers don't usually have
to worry about these details and can assume that any hardware supported by
a device driver will work.
Just how a device driver is invoked depends on the operating system, the
hardware, and the software design. Although few devices still use the
CONFIG.SYS file to load drivers, it provides an easy way to see how they work.
Every time the computer is booted up, the CONFIG.SYS file is read and the
device drivers are loaded from the hard disk drive into RAM.
DEVICE=C:\DOS\HIMEM.SYS
DEVICE=C:\DOS\EMM386.EXE NOEMS
DEVICEHIGH =C:\SCSI\ASPIPP3.SYS /D /Z
DEVICEHIGH =C:\DOS\DRVSPACE.SYS
DEVICEHIGH =C:\CDROM\MTMCDAI.SYS /L=001
NOTE
This division determines whether the computer will display errors by beeping
or showing them on the screen. The POST does not assume the video works
until it has been tested. The POST does assume that the speaker always
works, but to let you know that the speaker is working, all computers beep on
startup. Depending on the BIOS type, the POST might also sound a single beep
when it's done to let you know the boot process was successful. If something
goes wrong, the POST sends a series of beep codes to let you know what the
problem is or where to start looking for it.
The purpose of the first POST test is to check the most basic components. The
exact order, number of tests, and error states will vary from product to
product. In a healthy system, the POST reports by using a series of beep codes
and screen messages to convey that all components are working. Then it
transfers control to the boot drive, which loads the operating system. The
POST is a good indication that the hardware is in working order.
If a problem occurs, the POST routine attempts to report the problem. This is
also done using beep codes and (if possible) screen prompts. Some error codes
are specific to chip sets or custom products, and the exact message and
meaning can vary from system to system. (See the POST code references in
the system manual that shipped with the PC or the motherboard to obtain
references for detailed error messages and beeps.) The following table lists the
basic beep codes for AMI and Phoenix BIOSs.
Number of
Possible Problem
Beeps
1 DRAM refresh failure
2 Parity circuit failure
3 Base 64 KB or CMOS RAM failure
4 System timer
5 Processor failure
6 Keyboard controller or Gate A20 error
7 Virtual mode exception error
8 Display monitor write/read test failure
9 ROM BIOS checksum error
10 CMOS RAM shutdown register failure
1 long, 3 short Conventional/extended memory test failure
Display test and display vertical and horizontal retrace
1 long, 8 short
test failure
After a beep code has been recognized, there are a few things you can do to
troubleshoot the error. The following table suggests some solutions. Keep in
mind that, in many cases, it can be less expensive to replace the motherboard
than to replace a chip.
Problem Solution
RAM refresh
Reseat and clean the RAM chips.
failure
Parity error
RAM bit error Replace individual memory chips until the problem is
Base 64-KB corrected.
error
8042 error
Reseat and clean keyboard chip.
(keyboard chip)
Check operating system. Replace keyboard. Replace
Gate A20 error
motherboard.
BIOS checksum Reseat ROM chip. Replace BIOS chip.
error
Video errors Reseat video card. Replace video card.
Cache memory Reseat and clean cache chips. Verify cache jumper
error settings are correct. Replace cache chips.
Any other Reseat expansion cards. Clean motherboard. Replace
problems motherboard.
NOTE
Many computers will generate beep codes when the only problem
is a bad power supply! Turn the computer off and on three or four
times to see if the same beep code is generated every time. If so,
it's probably a legitimate beep code that concerns the hardware
and not the power supply.
After successfully testing the video, the POST will display any error messages
on the screen. These errors are displayed in one of two ways: numeric error
codes or text error messages.
When a computer generates a numeric error code, the machine locks up and
the error code appears in the upper-left corner of the screen. The following
table lists some common numeric error codes, but it is a good idea to check
the manual before beginning repairs based on a beep code or error message.
BIOS manufacturers have stopped using numeric error codes and have
replaced them with about 30 text messages. Instead of numbers, you get text
that is usually, but not always, self-explanatory.
There are two levels of error codes during POST: fatal and nonfatal. As the
name implies, fatal errors will halt the system without attempting to load the
operating system. Memory problems or a faulty disk or display adapter are
examples of fatal errors. Nonfatal errors like a "missing" floppy disk drive will
still result in the system attempting to load the operating system (and often
succeeding).
In most cases, the POST procedure does a good job of testing components. If it
gives a clean bill of health to the hardware, failure to boot will often lie in the
operating system. You can use a bootable floppy disk in most cases to access
the hard disk drive, or boot Windows using the Safe Start approach (press the
F8 key just after the POST completes) and check for conflicting settings.
POST Cards
More difficult to resolve is a hardware problem that keeps the POST from
issuing any report at all. When you face this type of situation, you will find
that this is where a POST card earns its keep. These special diagnostic
expansion cards monitor the POST process and display all codes (usually in
two-digit hexadecimal format) as the system runs the POST. The technician
can then decode this information using the manufacturer's manual. More
advanced models can also run advanced series of tests to isolate erratic
problems.
When choosing a POST card, be sure that it will work with the types of
machines you plan to test. Most are based on the Industry Standard
Architecture (ISA) slot and work with most Intel CPUs. That means they should
help with AT (80286 processors) and later-based PCs that use x86 processors.
Basic models give only POST codes. More advanced models also can check
direct memory access (DMA), IRQ (interrupt request), and port functions.
Some come with fancy diagnostic software. The more features, the higher the
price tag. However, a POST card will save a lot of time and frustration, making
it a worthwhile addition to any PC toolkit.
Lesson Summary
The following points summarize the main elements of this lesson:
Computer Cases
Motherboards
ROM BIOS
BIOS chips are used to provide data to the CPU; this data tells the CPU
how to operate specific devices.
CMOS is a BIOS chip that can have its data updated. The CMOS setup
program is used to make changes.
CMOS chips require a battery to save the data when power to the
computer is off.
Some of the newer BIOS chips are updatable. These are called flash
BIOS.
A device driver is a program that acts as an interface between the
operating system and the control circuits that operate the device.
On machines running MS-DOS, device drivers are loaded by the
CONFIG.SYS file.
Computers running Windows 95, Windows 98, Windows Me, or Windows
2000 load their own device drivers and do not require a CONFIG.SYS file.
POST is used to check a computer before it boots.
POST errors are indicated by beeps before the video is checked, and by
text after the video check.
3 4
Review
3. What is EMI?
Chapter 7
Memory
About This Chapter
In earlier chapters, we learned that the CPU (central processing unit) and
motherboard (bus and controllers) are critical components that help determine
the overall speed with which a computer can process data. This chapter looks
at another important system component and performance factor: memory.
Technicians are often asked to upgrade PCs by adding more memory, and
memory conflicts or errors commonly prompt calls for assistance by users.
Understanding how memory works, how to choose the right memory for a
given system, and how to troubleshoot memory problems is critical to being
successful as a computer technician.
Before You Begin
A clear understanding of microprocessors, motherboards, and computer buses,
covered in earlier chapters, is required before beginning this chapter.
3 4
Lesson 1: ROM and RAM
As a computer technician, you will encounter various types of memory. This
lesson defines the different types of memory, shows you how to locate memory
in a computer, and discusses how to expand or add new memory.
In most cases, a technician will be concerned with ROM only if it has failed and
requires replacement, needs to be upgraded, or conflicts with other memory
installed in the system. A repairperson or technician does not usually directly
control the actual code in ROM.
RAM
RAM (random access memory) is what is most often referred to when PC
memory is discussed. RAM is the form of volatile memory used to hold
temporary instructions and data for manipulation while the system is running.
The term random is applied because the CPU can access or place data to and
from any addressable RAM on the system. If power to the system is lost, all
RAM is lost as well.
All PC CPUs handle data in 8-bit blocks. Each block, known as a byte, denotes
how many bits the CPU can move in and out of memory at one time. The
number is an indication of how rapidly data can be manipulated and arranged
in system memory. Don't confuse this byte with the amount of system
memory, which is usually expressed in megabytes (MB). System memory is
the total amount of active memory that is available to the CPU as a temporary
work area.
Each transaction between the CPU and memory is called a bus cycle. The
amount of memory that a CPU can address in a single bus cycle has a major
effect on overall system performance and determines the design of memory
that the system can use. The width of the system's memory bus must match
the number of data bits per cycle of the CPU.
All computers have some form of memory controller, which handles the
movement of data to and from the CPU and the system memory banks. The
memory controller is also responsible for the integrity of the data as it is
swapped in and out. There are two primary methods of ensuring that the data
received is the same as the data sent: parity and error-correction coding
(ECC).
Parity
Parity is a method of ensuring data integrity that adds an extra bit (the parity
bit) along with each 8-bit bus cycle. There are two kinds of parity: even and
odd. Both use a three-step process to validate a bus transaction; however,
they do it in opposite ways.
In Step 1, both methods set the value of the parity bit based on the even
or odd number that represents the sum of the data bits as the first step.
In Step 2, the string goes into DRAM.
In Step 3, the parity circuit checks the math. If the parity bit matches the
parity bit of the number that represents the sum of the binary string sent,
the data is passed on. If it fails the test, an error is reported. Just how
that error is handled and reported to the user varies with each operating
system.
ECC
A more robust technology, ECC can detect errors beyond the limits of the
simpler parity method. It adds extra information about the bits, which is then
evaluated to determine if there are problems with individual bits in the data
string.
Access Speed
Access speed, denoted in nanoseconds (ns), is the amount of time it takes for
the RAM to provide requested data to the memory controller. Here, smaller is
better. Be sure to buy RAM that is at least as fast as that listed as standard for
the computer in question.
A typical total response time for a 70-ns DRAM chip is between 90 and 120 ns.
This includes the time required to access the address bus and data bus. Most
486- and Pentium-based machines use either 70-ns or 60-ns DRAM chips,
although 50-ns chips are now available. The access speed of a chip is usually
printed on the chip (often as part of the identification number).
Here are a few important things to remember about access speed when adding
memory:
Any add-on memory should be the same speed as or faster (lower
number) than any existing memory.
You cannot mix memory modules with different speeds in the same bank
(a bank is a set of several memory modules).
You should check the motherboard specifications for the recommended
memory chip speed.
RAM Packaging
Over the years, the way memory has been packaged and placed on the
motherboard has changed several times. As faster processors developed and
system requirements for applications increased, so did the need for more and
faster memory. The new memory designs often required new packaging and
connection technology. That trend will continue, and technicians must stay
current on the different memory types and their appropriate applications.
Early versions of RAM were installed as single chips, usually 1-bit-wide DIP
(dual inline package), as shown in Figure 7.1. In some cases, this was soldered
right onto the motherboard, but most often it was seated in a socket, offering
a simpler method of removal and replacement. Some older machines have
special memory expansion cards that contain several rows of sockets. These
cards are placed in a slot on the motherboard.
As the amount of memory and the need for speed increased, manufacturers
started to market modules containing several chips that allowed for easier
installation and larger capacity. These modules come in a variety of physical
configurations. Technicians must be able to identify both the type and amount
of memory a computer requires for optimum performance.
TIP
CAUTION
You won't likely see any SIPPs, but if you do, take special care
when replacing them in the motherboard. SIPPs have a row of pins
along one side. These pins are easily broken, and care should be
taken to avoid damaging them during installation.
SIMMs (30-Pin)
SIMMs (single inline memory modules) quickly replaced SIPPs because they
are easier to install. They are similar to SIPPs with one exception—they
require no pins; 30-pin SIMMs have 30 contacts in a single row along the
lower edge (see Figure 7.3). A 30-pin SIMM can have as few as two or as
many as nine individual DRAM chips. Although SIMM modules can have pin
counts as high as 200, in PCs, 30- and 72-pin versions are the most common.
CAUTION
The power of a processor is often expressed by how many such pieces it can
handle at a time. For example, the original Intel Pentium is a 64-bit CPU,
meaning that it can handle 64 bits at once. That amounts to 8 bytes (8 × 8).
These terms always refer to byte-wide memory (8 bits).
When the bus cycle demand is greater than the number of bits a memory
module provides, more modules must be added to be able to meet the
demand. The most common approach is to employ a bank of modules, matched
to the bit width equal to the data demands of the CPU, and the entire data
bus. When most new CPUs are introduced, the width of the design is the same
as the old memory types, and modules must be used in banks until a new
memory design is available. For example, an 8-bit data bus (8086 or 8088)
needs 8-bit-wide memory to fill one bank. A 16-bit data bus requires 16-bit-
wide memory to fill one bank, and so on. If you install 30-pin SIMMs (each is 8
bits wide) on a 16-bit machine, you will need two rows of chips to completely
fill the data bus.
NOTE
Each of the rows that make a bank must be filled with identical
chips (size and speed). See Figure 7.4.
Figure 7.4 Banking
Most motherboards provide several rows of slots for adding memory, often
referred to as banks. Be careful with the word bank. It is used to describe the
necessary rows of chips, as well as the slots into which they are inserted.
You can determine the size of the DRAM chip by combining the depth and
width of the chip.
Because 72-pin SIMMs are 32 bits wide, the term x 32 is used to describe
them. A 1 MB × 32 SIMM contains 4 MB of RAM because it is 4 bytes wide (1
MB of RAM is 1,048,576 × 32, which equals 4 MB). Remember, memory is
measured in bytes, and chips are measured in bits.
There are many varieties of SIMMs on the market. The following table lists
some common 72-pin SIMMs.
Configuration Memory
4 MB × 36 16 MB, parity
8 MB × 32 32 MB, no parity
8 MB × 36 32 MB, parity
16 MB × 32 64 MB, no parity
16 MB × 36 64 MB, parity
Voltage
All early PCs used 5-volt circuits to power components, including memory.
Today, the trend is to use 3.3-volt power unless 5 volts are required for a
specific part of the system (such as a hard disk drive). Be sure to check the
voltage of the memory before installing a module.
Installing SIMMs
When installing SIMMs:
Always use precautions to avoid ESD. Refer to Chapter 22, "The Basics of
Electrical Energy," for details.
Always handle SIMMs carefully—keep your fingers on the plastic edges.
There is little worse than destroying a 16-MB SIMM because of static
discharge.
All SIMMs have a notch on one side that prevents them from being
installed improperly. If you cannot insert the SIMM easily, it's probably
backward.
SIMMs are inserted into the slot at a 45-degree angle along the wide side
(see Figure 7.6).
After the SIMM is securely seated in the slot, push it upright until the
holding clamps on either side are secured.
IMPORTANT
NOTE
After the RAM is installed, and the RAM count correctly reflects the new
value, the CMOS needs to be updated. On most machines, this is done
automatically and no intervention is required.
If the system fails to boot or reports less than the amount of memory actually
installed, recheck the modules to make sure they are seated properly
according to the motherboard manual and that the right type and amount are
present.
Dual Inline Memory Modules
These newer modules look much like SIMMs, but come in a package with 168
pins and have a different wiring structure, so that one card can form a
complete bank. These are the memory packages used on virtually all new
motherboards.
DIMMS are a real improvement over older memory modules. They provide
larger amounts of RAM on a single module and are easy to install. They slide
straight down into a slot and are secured by a pair of locks that swing into
place above the card as it seats fully in the slot. Check the motherboard
manual or the vendor's Web site for the approved list of DIMM modules. There
are many variations in electronic design (parity, non-parity, etc.), and you
must make sure that the DIMM will actually work with the combination of
motherboard and CPU you are working on. Just because the card fits does not
mean it will work.
Cache Memory
To cache is to set something aside, or to store for anticipated use. Early
explorers would arrange to have a cache of food or other supplies positioned
along their route of travel. This made their travel easier since they didn't have
to carry anything other than essentials needed for each portion of the trip. The
same concept can be applied to CPU operations and computer system design.
Caching, in PC terms, is the holding of a recently or frequently used code or
data in a special memory location for rapid retrieval. Speed is everything when
it comes to computers. Mass storage is much slower than RAM, and RAM is
much slower than the CPU. The high-speed memory chip generally used for
caching is called static RAM (SRAM).
SRAM
SRAM does not use capacitors to store 1s and 0s. Instead, SRAM uses a special
circuit called a flip-flop. The advantages of SRAM are that it is fast and it does
not have to be refreshed because it uses the flip-flop circuit to store each bit.
A flip-flop circuit will toggle on or off and retain its position, whereas a
standard memory circuit requires constant refreshing to maintain an on state.
The main disadvantage of SRAM is that it is more expensive than DRAM.
Caches are organized into layers. The highest layer is closest to the device
(such as the CPU) using it. On early PCs, caches were usually separate chips.
Today, it is not uncommon to have two levels of cache built right into the CPU,
but a cache is not limited to dynamic memory. Mass storage devices like hard
drives can also be used to store less commonly used code or data.
Starting with the 486 chips, a cache has been included on every CPU. This
original on-board cache is known as the L1 (level 1) or internal cache. All
commands for the processor go through the cache. The cache stores a backlog
of commands so that if a wait state is encountered, the CPU can continue to
process using commands from the cache. Caching will store any code that has
been read and keep it available for the CPU to use. This eliminates the need to
wait for fetching of the data from DRAM.
As mentioned, the primary use of a cache is to increase the speed of data from
RAM to the CPU. Some caches immediately send all data directly to RAM, even
if it means hitting a wait state. This is called write-through cache, shown in
Figure 7.7.
Write-back caches are harder to implement but are much more powerful than
write-through caches, because the CPU does not have to stop for the wait state
of the RAM. However, write-through caches are less expensive.
There are two basic kinds of memory in a computer: ROM and RAM.
Memory chips come in many sizes and shapes: DIPPs, SIPPs, DRAM,
SRAM.
Installing memory (RAM) is easy; however, you must be able to match
the size and configuration of the memory chips to the motherboard.
The number of memory modules needed to fill one memory bank equals
the width of the external data bus (in bits) divided by the width of the
SIMM (in bits).
Cache memory is used to increase the performance of a computer.
Cache memory (SRAM) is faster, but more expensive, than the standard
DRAM; therefore, it is used in small quantities and for special purposes.
There are two types of cache memory: L1 and L2.
3 4
Lesson 2: Memory Mapping
Computer memory has many functions. Some memory is reserved for
particular uses by the processor and, if improperly allocated, will cause
problems. Understanding how to identify and manage memory is key to
optimizing a computer. In this lesson, you learn how memory is allocated.
All address buses and wires within a computer come in some multiple of 4 (8,
16, 20, 24, 32). Because there are 16 different combinations, the 16 unique
characters of the base-16 numbering system are a natural choice for computer
shorthand when referring to memory locations or a bus address. The following
table contrasts binary notation with hex shorthand.
10110110011000101101
To represent all the possible addresses for the 20-bit address bus, we use 5
hex values (0 to F) that map to their binary equivalents, from all 0s:
to all 1s:
Each of the possible memory locations for the Intel 8088 can be represented
by 5-digit hexadecimal values, starting at 00000 and ending at FFFFF.
Memory Allocation
Previously in this chapter, we discussed memory in terms of the chips
themselves. In this section, we look at how that memory is allocated for use by
the CPU. This is called memory mapping and it uses hexadecimal addresses to
define ranges of memory.
The original processors developed by Intel were unable to use more than 1 MB
of RAM, and the original IBM PC allowed only the first 640 KB of memory for
direct use. MS-DOS applications were written to conform to this limitation. As
application requirements grew, programmers needed to optimize the use of
memory to make the most of the available space. This 1 MB of memory was
divided into two sections. The first 640 KB was reserved for the operating
system and applications (designated as conventional memory). The remaining
384 KB of RAM (designated as upper memory) was earmarked for running the
computer's own housekeeping needs (BIOS, video RAM, ROM, and so on).
Although some early PC clones had firmware that could make direct use of the
upper memory block available to programmers, actually doing so would result
in hardware and software incompatibility issues (see Figure 7.9).
Under MS-DOS and Microsoft Windows 3.x, the 640-KB area needed to be kept
as free as possible for program use. MS-DOS memory optimization ensures
that MS-DOS applications have as much of this memory as possible. The MS-
DOS limitations no longer apply to Windows versions operating in 32-bit mode
(Microsoft Windows 95 and later) and most newer operating systems.
However, the old memory problems still are a factor when running MS-DOS,
Windows 3.x-based programs on older machines, or MS-DOS compatibility
mode with the more advanced operating systems. While you may never run
into this problem, you should be aware of it as it can cause very erratic—and
often severe—problems.
RAM above the 1-MB address is called extended memory. With the
introduction of the 80286 processor, memory was addressable up to 16 MB.
Starting with the 80386DX processor, memory was addressable up to 4 GB.
Extended memory is accessed through an extended memory manager
(HIMEM.SYS).
Conventional Memory
An irregularity was found in the Intel chip architecture that allowed MS-DOS
to address the first 64 KB of extended memory on machines with 80286 or
faster processors. This special area is called the high memory area (HMA). A
software driver called an A20 handler must be run to allow the processor to
access the HMA. Some versions of Windows use HIMEM.SYS for this purpose.
The only limitation is that HIMEM.SYS can load only a single program into this
area (see Figure 7.11).
Protected Mode
Real Mode
In real mode (MS-DOS), a computer can perform only one operation at a time
and an application expects full control of the system. Real mode operates
within the MS-DOS 1-MB limitation.
Shadow RAM
The upper memory area (UMA), the memory block from 640 KB to 1024 KB, is
designated for hardware use, such as video RAM, BIOS, and memory-mapped
hardware drivers that are loaded into high memory.
Determining Usable Memory
The MS-DOS command MEM (MEM.COM; still available in newer versions of
Windows, type mem in a command window) provides information about the
amount and type of memory available (see Figure 7.13). It provides a quick
way to determine how all of the different areas in physical memory are being
used and the total amount of RAM actually active on the system.
Most MS-DOS and many early Windows systems load numerous device drivers
and TSR (terminate-and-stay-resident) programs using the CONFIG.SYS and
AUTOEXEC.BAT routines during the boot cycle.
NOTE
Avoid using any DOS or 16-bit TSRs in Windows 95, Windows 98,
Windows NT, Windows 2000, or Windows Me, if at all possible.
Their presence degrades system performance and can disable
some of the more advanced memory-handling features of
Windows. Properly configured, newer ver- sions of Windows 98
and beyond will not need either CONFIG.SYS or AUTOEXEC.BAT,
and some versions don't support them.
TSRs are usually loaded into conventional memory by the operating system,
taking up valuable space. Memory-management techniques are used to load
these device drivers and TSRs into the upper memory, allowing more lower
memory to be made available to applications.
To determine which device drivers and TSRs are loaded, use the command
MEM /C
The /c is a classify switch. This determines how much conventional memory a
certain real-mode program is using (see Figure 7.14).
Memory Mapping
4. How many 30-pin SIMM boards are required for one bank of memory on a
computer with a 486 processor?
6. What is DRAM?
Answers
3 4
Chapter 8
Expansion Buses, Cables, and Connectors
About This Chapter
The success of the personal computer is due largely to its ability to expand to
meet the changing needs and economic requirements of the user. In this
chapter, we describe the array of expansion buses that help to expand the
system and work with an ever-growing number of enhancements, including
modems, video cards, and portable drives. We also discuss conflicts within the
computer—how they are created and reconciled.
To resolve this dilemma, designers divided the external data bus into two
parts:
System bus. This supports the CPU, RAM, and other motherboard
components and runs at speeds that support the CPU.
Expansion bus. This supports any add-on devices by means of the
expansion slots and runs at a steady rate, based on the specific bus
design.
Dividing the bus enhances overall system efficiency. Because the CPU runs off
the system clock, upgrading a CPU requires changing only the timing of the
system bus, and the existing expansion cards continue to run as before. There
is usually a jumper setting that changes the system clock speed to match the
CPU. The ability of the motherboard to make this change sets the limit for the
processor speed. Next, we take a look at the evolving types of expansion
buses.
Industry Standard Architecture
The first-generation IBM XT (with the 8088 processor) had an 8-bit external
data bus and ran at a speed of 4.77 MHz. These machines were sold with an 8-
bit expansion bus (PC bus) that ran at 8.33 MHz (see Figure 8.1).
When IBM designed the first PC back in 1981, it took steps that fueled the
rapid development of the PC market. IBM's engineers designed the PC as an
open system, capable of using standard, off-the-shelf components. This
allowed third-party developers to manufacture cards that could snap into the
PC bus. IBM also allowed competitors to copy the PC bus.
With this decision, IBM established the Industry Standard Architecture (ISA)
interface, thus generating the market for "clones." A host of third-party
companies developed products that enhanced the basic PC design and kept
prices much lower for add-ons than those for competing proprietary systems
such as the Apple II. Without this push, the PC market would not have
developed as rapidly as it did.
NOTE
The term "ISA" did not become official until 1990. Therefore, the
8-bit slot is called the XT, and the 16-bit slot is called the AT.
When we refer to an ISA slot or an ISA card, we generally mean
the 16-bit AT-style interface. The speed of the slots remained at
about 7 MHz.
Expansion cards must make use of system resources in an orderly way, so that
they do not conflict with other devices. When demands for these system
resources are not coordinated, the system could behave erratically or even fail
to boot up. Formerly, ISA cards often used a bewildering array of jumpers and
switches to set addresses for memory use or the IRQ (interrupt request)
locations they would use.
The need to overcome the expansion card's lack of speed and compatibility
problems led to a search for a new, standard expansion card interface—one
that everyone could agree on and that would gain user acceptance.
Micro Channel Architecture
In 1986 the market came to be dominated by the new 386 machines with their
32-bit architecture. Most PC manufacturers stuck to the same basic ISA design
and MS-DOS. Expansion devices based on ISA technology for the 286 AT class
machines could be placed in a new 386 clone without problems.
IBM, however, was feeling the pinch of competition from cheaper clones, and
sought to retain its dominance in the PC market. IBM designers produced a
new version of the PC, the PS/2 (Personal System/2), and created a
proprietary expansion bus called Micro Channel Architecture (MCA) as part of
the design. Running at 10 MHz, it offered more performance and provided a
32-bit data path, but was also totally incompatible with older ISA cards.
A feature of MCA was its ability to "self-configure" devices. Unlike devices that
use technology in which the PC configures itself automatically to work with
peripherals such as monitors, modems, and printers, an MCA device always
came with a configuration disk. When installing a new device in an MCA
computer, the technician inserted the configuration disk (when prompted), and
the IRQs, input/output (I/O) addresses, and direct memory access (DMA)
channels were configured automatically. (IRQs, I/O addresses, and DMA
channels are discussed in detail in the next lesson.) An MCA bus is shown in
Figure 8.2.
The PS/2 and its Micro Channel Architecture expansion bus never gained
enough market share to compete with the 386. MCA cards were few and far
between, and more expensive than competing interface designs.
EISA is an improved variation of the ISA slot that accepts older ISA cards, with
a two-step design that uses a shallow set of pins to attach to ISA cards and a
deeper connection for attaching to EISA cards. In other words, ISA cards slip
partway down into the socket; EISA cards seat farther down.
CAUTION
Although EISA is faster and cheaper than MCA, it never gained much more
acceptance than MCA.
Confusion between MCA and EISA technology—along with a limited need for
cards that ran at the faster rate and the fact that only a few display, drive
controller, and network cards were made available—led to the early demise of
both bus technologies. Figures 8.3 and 8.4 show how the slot design of the two
technologies differs.
The speed of the system data bus is based on the clock rate of the
motherboard's crystal. During the heyday of the VLB, this was usually 33 MHz,
and VLB cards usually ran at half that rate, far outpacing the ISA bus. Some
cards ran as fast as 50 MHz, using the full speed of the souped-up system bus.
That often caused system crashes, because 50 MHz was outside the VLB
specification.
The chip design for the VLB controller was relatively simple because many of
the core instructions were hosted by the ISA circuits already on the
motherboard, but the actual data passes were on the same local bus as the
one used by the CPU.
At first glance, there are many similarities between PCI and the older VLB
specifications. Both are local bus systems with 32-bit data paths and burst
modes. Also, the original PCI design operates at 33 MHz—roughly the same
speed as the VLB. However, the important differences between them allowed
PCI to dominate in expansion bus technology. These differences stem from the
following features:
The PCI design's special bus and chip set are designed for advanced bus-
mastering techniques and full arbitration of the PCI local bus. This allows
support of more than three slots.
The PCI bus has its own set of four interrupts, which are mapped to
regular IRQs on the system. If a PC has more than four PCI slots, some
will be sharing interrupts and IRQs.
NOTE
The earlier discussion makes PCI sound like a technician's dream interface:
fast, reliable, and doing most of the work itself. In most cases, that's true; still,
there is always a "but." PCI has gone through many changes, and there are
some features to be aware of when you work with a PCI card:
The early PCI motherboards often have jumpers and BIOS settings that
must be set to enable proper PCI operation. These are most often found
on Pentium 60-MHz and 66-MHz machines.
The PCI bus speed is not fixed. Newer chip sets can drive it—and the
cards on it—at 66 MHz. At full performance, the PCI bus can deliver data
transfers at up to 132 MB per second.
PCI is not used only by PCs. Macintosh and some other non-PC-style
computers incorporate PCI. Manufacturers appreciate this feature because
it allows them to design core technology and port it to different models
using the same production line. You still need to be certain, however, that
a particular card is actually designed for the machine you are working on,
even if it fits.
Keep in mind that PCI is evolving. That will help to keep it a viable interface
for the foreseeable future, but it might also lead to incompatibilities between
new cards and older machines.
Accelerated Graphics Port
In the early days of PCI, the major market for that technology was the high-
performance display adapter. The popularity of PCI led to its dominance of the
expansion bus market. Today, the PCI market includes NICs, sound cards,
SCSI adapters, Ultra Direct Memory Access (UDMA) controllers, and DVD
(digital video disc) interfaces. The variety of devices posed a problem for
display-card designers: Having more cards on a single bus slowed down the
performance, just when the increasing popularity of 24-bit graphics and 3D
rendering called for greater demands on the display system. The search was
on for yet another interface; this time, the solution was a single slot—tuned
for the display adapter. Once again, Intel led the way and developed the
Accelerated Graphics Port (AGP).
The AGP removes all the display data traffic from the PCI bus and gives that
traffic its own 525-MB-per-second pipe into the system's chip set and, from
there, straight to the CPU. It also provides a direct path to the system memory
for handling graphics. This procedure is referred to as Direct Memory Execute
(DIME). The AGP data path is shown in Figure 8.6.
Figure 8.6 AGP Direct Memory Execute offers priority access to display data
The AGP slot, if present, is the only one of its kind on the motherboard and is
usually the slot closest to the keyboard connector (see Figure 8.7). It is set
farther from the back of the PC's case than the PCI slots. AGP connectors are
found only on Pentium II-based and later computers or on similar CPUs from
non-Intel vendors.
Figure 8.7 An AGP slot on the motherboard
IEEE 1394 FireWire High-Performance Serial Interface
One contender that has been touted as a possible replacement for SCSI (see
Chapter 9, "Basic Disk Drives," for details on the SCSI interface) in connecting
external peripherals is IEEE 1394, known also by its Apple trade name of
FireWire. We'll use the short form and call it 1394. This high-speed serial
interface allows up to 62 devices on a chain, at data transfer rates of up to 50
MB per second.
This new interface offers several advantages: a hot swap capability (the ability
to add and remove components while the machine is running), small and
inexpensive connectors, and a simple cable design. Right now, few devices
support 1394, but it is seen as a viable method for connecting multimedia
devices like camcorders and other consumer electronic devices to PCs. Its
isochronous transfer method (sending data at a constant rate) makes it a
natural for video products. Currently, many 1394 PC products are expensive
and there is no provision for connecting internal devices. Both 1394 and SCSI
will coexist much like SCSI and universal serial bus (USB) for the foreseeable
future. (USB is discussed in the next section.)
Although there are some standards defining how connections are made with
1394, several vendors are offering custom ways of linking products.
Universal Serial Bus
The newest addition to the general PC bus collection, the USB connects
external peripherals such as mouse devices, printers, modems, keyboards,
joysticks, scanners, and digital cameras to the computer. The USB port is a
thin slot; most new motherboards offer two, located near the keyboard. They
can also be provided through an expansion card.
1.5 megabits per second (Mbps) asynchronous transfer rate for devices,
such as a mouse or keyboard, that do not require a large amount of
bandwidth.
12 Mbps isochronous transfer rate for high-bandwidth devices such as
modems, speakers, scanners, and monitors. The guaranteed data-delivery
rate provided by isochronous data transfer is required to support the
demand of multimedia applications and devices.
USB devices can be attached with the computer running. A new device will
usually be recognized by the operating system (assuming the operating system
has Plug and Play capability), and the user will be prompted for drivers, if
required. Bear in mind that USB is a new standard, and some early USB ports
and chip sets do not properly support some newer devices. Problems with
embedded USB ports are not generally worth repairing. It is usually better to
install a new USB interface card.
Attaching a new USB device is usually little more complicated than hooking up
the appropriate cables and loading a driver disk if requested (see Figure 8.8).
Keep in mind that older products may not be adequately supported, and that
some devices will require an external power supply.
Figure 8.8 USB connectors
Lesson Summary
The following points summarize the main elements of this lesson:
Define addresses
Describe the attributes and limitations of an IRQ
Identify the causes of conflicts within a computer
Locate and resolve hardware conflicts
NOTE
I/O addresses are patterns of 1s and 0s transmitted across the address bus by
the CPU. The CPU must identify the device before any data is placed on the
bus. The CPU uses two bus wires—the Input/Output Read (IOR) wire and the
Input/Output Write (IOW) wire—to notify the devices that the address bus is
not being used to specify an address in memory, but rather to read to or write
from a particular device. The address bus has at least 20 wires. However,
when the IOW or IOR wire has voltage, only the first 16 wires are monitored.
To allow communication directly between the CPU and a device, each device
responds to unique, built-in patterns or code. If the CPU needs to check the
error status of a hard disk drive controller, for instance, it activates the IOW
wire and puts the correct pattern of 1s and 0s onto the address bus. The
controller then sends back a message describing its error status.
All I/O addresses define the range of patterns assigned to each device's
command set. The device ignores all commands outside its range. All devices
must have an I/O address, and no two devices can have overlapping ranges.
Basic devices on the address list have preset I/O addresses that cannot be
changed. Other devices must be assigned to the open addresses, and they
must be configured at installation. The following table lists standard PC I/O
port address assignments.
PC/XT PC/XT
Used By Used By
Port Port
000h00Fh DMA chip 8237A 2F0h2F7h Reserved
020h021h PIC 8259A 2F8h2FFh COM2
040h043h PIT 8253 300h31Fh Prototype adapter
060h063h PPI 8255 320h32Fh Hard disk controller
080h083h DMA page register 378h37Fh Parallel interface
0A0h0AFh NMI mask register 380h38Fh SDLC adapter
0C0h0CFh Reserved 3A0h3AFh Reserved
Monochrome
0E0h0EFh Reserved 3B0h3BFh
adapter/parallel interface
100h1FFh Unused 3C0h3CFh EGA
200h20Fh Game adapter 3D0h3DFh CGA
210h217h Extension unit 3E0h3E7h Reserved
220h24Fh Reserved 3F0h3F7h Floppy disk controller
278h27Fh Parallel printer 3F8h3FFh COM1
AT Port Used By AT Port Used By
000h00Fh First DMA chip 8237A 278h27Fh Second parallel interface
020h021h First PIC 8259A 2B0h2DFh EGA
040h043h PIT 8253 2F8h2FFh COM2
Keyboard controller
060h063h 300h31Fh Prototype adapter
8042
070h071h Real-time clock 320h32Fh Available
080h083h DMA page register 378h37Fh First parallel interface
0A0h0AFh Second PIC 8259A 380h38Fh SDLC adapter
Second DMA chip
0C0h0CFh 3A0h3AFh Reserved
8237A
Monochrome
0E0h0EFh Reserved 3B0h3BFh
adapter/parallel interface
Reserved for
0F0h0FFh 3c0h3CFh EGA
coprocessor 80287
100h1FFh Available 3D0h3DFh CGA
Run the Jumpers video located in the Demos folder on the CD accompanying
this book to view a presentation of how jumpers are used to configure
expansion cards.
If a device is not a basic device, and does not conform to the PCI Plug and Play
specification on a Plug and Play–compatible system, read the manual that
came with it. The manual will explain how to set the I/O address and define
the limits for that device.
On non-Plug and Play devices, I/O addresses are often set by changing
jumpers, changing DIP switches, or through use of software drivers. DIP
switches are like mini-rocker panel switches. Jumpers are small caps that are
used to link pairs of pins to close a circuit. Devices using these techniques
should have instructions on how to configure the settings and locate the switch
block or jumpers.
On Plug and Play systems, PCI cards are self-configuring, and usually no
intervention is needed to set I/O addresses for those cards. It is possible for
Plug and Play cards to conflict with older ISA cards that don't recognize the
Plug and Play devices. If you are confronted with this problem, refer to the
cards and the motherboard manual for possible resolution.
NOTE
Because the CPU has only one INT wire and must handle many peripheral
devices, a specific type of chip, called the 8259 chip, is present on the system
to help the CPU detect which device is asking for attention. Every device that
needs to interrupt the CPU is provided with a wire called an IRQ. If a device
needs to interrupt the CPU, it goes through the following steps:
1. The device applies voltage to the 8259 chip through its IRQ wire.
2. The 8259 chip informs the CPU, by means of the INT wire, that an
interrupt is pending.
3. The CPU uses a wire called an INTA (interrupt acknowledge) to signal the
8259 chip to send a pattern of 1s and 0s on the external data bus. This
information conveys to the CPU which device is interrupting.
4. The CPU knows which BIOS to run.
The 8088 computers used only one 8259 chip (see Figure 8.9), which limited
these computers to using only eight available IRQs. Because a keyboard and
system timer were fixtures on all computers, these IRQs were permanently
wired into the motherboard. The remaining six wires were then made part of
the expansion bus and were available for use by other devices.
Figure 8.9 8259 chip with IRQ assignments
Starting with the generation of computers based on the 80286 chip, two 8259
chips were used to add 8 more available IRQs (see Figure 8.10). These new
wires were run to the extension on the 16-bit ISA expansion slot (the 8-bit XT
slot was extended to a 16-bit XT slot). Because the CPU has only one IRQ wire,
one of the IRQs is used to cascade the two 8259 chips together. This gives a
total of 15 available IRQs.
NOTE
Notice that the cascade removes IRQ 2. IRQ 9 is directed to the old IRQ 2 wire.
Any older device designed to run on IRQ 2 will now run on IRQ 9. Some
important facts to remember about IRQs include the following:
Setting IRQs
Devices lacking a fixed or standard IRQ (except for newer PCI cards in
compatible PCs) must have their IRQs set during installation. Read the
accompanying manuals to learn about these devices. Setting IRQs is one of the
first topics discussed in any device's installation instructions. The manual will
tell you not only how to set the IRQ, but also the limits, if any, of the device.
Just like I/O addresses, IRQs can be set using hardware, software, or a
combination of both. The best way to ensure that no two devices share the
same IRQ is to document the IRQs for each device you install in a computer
and file that documentation in a location where you can find it easily if
needed. As an example, suppose one of your customers has recently installed
a sound card that now locks up when a parallel-port tape backup unit is used
on the system. This strongly indicates an IRQ conflict. You need merely to
check the sound card and the tape backup IRQ settings you have on file and
change one if necessary.
IMPORTANT
To reduce this waste, another chip is installed to work with the system CPU
called a DMA chip. The only function of the DMA chip (the 8237 chip) is to
move data. It handles all the data passing from peripherals to RAM and vice
versa.
DMA transfers are not automatic. Hardware and device drivers must be
designed to take advantage of this chip. Originally, DMA was used only to
transfer data between floppy disk drives and RAM; early computers had only
four wires and one DMA chip. Any device requiring DMA had to send a request,
just like an IRQ.
DMA channels use the same rules as IRQs. Just as with the 8259 chip, DMA
availability soon became a problem because an insufficient number of channels
was available. A second DMA chip was added for 80286-based computers. Just
like the second IRQ chip, these two are cascaded, allowing a total of eight DMA
channel assignments (usually referred to simply as DMA channels). Every
computer uses DMA 2 for the floppy disk drive.
Fortunately, not many devices use DMA, but sound cards, a few SCSI
controllers, and some CD-ROM drives and network cards do require DMA. Just
as with IRQs and I/O addresses, DMA can be set by means of either hardware
or software. However, manufacturers started using DMA for devices other than
the floppy disk drive only recently. As a result, almost all devices set DMA
through software (although some still use jumpers). If two devices share the
same DMA channel and "talk" at the same time, the computer will lock up. The
following table provides DMA channel assignments.
Managing DMA
DMA and IRQ work in the same way; therefore, DMA conflicts look and act
exactly like IRQ conflicts. Always check for IRQ conflicts first (although it is
possible for a computer professional to spend hours trying to solve IRQ
problems when the source of the problem is actually the DMA). If you are sure
all IRQs are correct, yet the computer continues to experience a problem,
check the DMA. There is very little diagnostic software for resolving DMA
problems, so it is important to maintain careful documentation.
COM and Ports
IBM created preset combinations of IRQs and I/O addresses for serial and
parallel devices. These preset combinations are called ports. The word port
simply means a portal or two-way access. The preset combinations are called
COM ports for serial devices and LPT (line printer) ports for parallel devices.
Most computers are manufactured to offer built-in physical ports with cable
connections available either directly to the motherboard or in an expansion
slot. In this case, the standard port addresses and IRQs are assigned to them.
This makes it possible to install an external device simply by plugging in the
port and assigning addresses to the device. If necessary, these ports can be
disabled (by using CMOS setup), freeing their I/O addresses and IRQs for
another device.
For example, suppose you want to install a new internal modem on a machine
that has two external serial ports on the motherboard. By disabling one of
these ports, you have made its address and IRQ available for use by the
internal device. Simply assign the device to the port that is now free.
Assume you have a modem set to COMl. You buy a network card that comes
out of the box with a default setting of IRQ4. You realize the network card and
the modem will conflict, and the computer will lock up. What should you do?
You should change the IRQ on one of the devices. The network card is
probably the best choice, because the modem is installed and already working.
COM Ports
The original 8088-based IBM PCs were equipped with two serial ports: COMl,
set to IRQ4, and COM2, set to IRQ3. Although those two IRQs are still the
standard for COM ports 1 and 2, many BIOS routines will allow different IRQ
assignments or even allow an unused port to be disabled. Because of the
limited number of IRQ addresses available, any additional COM ports would
have to share IRQs with existing ports. COM3 shared the interrupt of COM1
(IRQ4), and COM4 shared the interrupt of COM2 (IRQ3). To enable use of
these additional ports, COM3 was assigned I/O address 3E8-3EF, and COM4
was assigned I/O address 2E8-2EF. This sharing was possible because the IRQ-
sharing devices would be unlikely to use them at the same time.
Today we have many other ways of adding printers and other peripherals to
PCs, but such conflicts can still be a problem with modems and UPS
(uninterruptible power supply) devices that might need simultaneous access.
NOTE
The first rule for setting IRQs is to ensure that two devices never
share the same IRQ. The only exception is that two (or more)
devices can share an IRQ if they never "talk" at the same time.
Common IRQ conflicts occur among a serial mouse, sound card,
modem, and/or serial printer. (Remember that PCI devices can
share an IRQ if the IRQ is managed by the same PCI controller.)
LPT Ports
LPT ports are for parallel data connections. The name is derived from their
original use with printers. The original IBM standard LPT port did not provide
bidirectional communications (talkback) and was designed solely for one-way
data streams to a printer. The standard addresses are IRQ7 for LPT1 and IRQ5
for LPT2, if it is present. IRQ5 quickly became the favorite for devices like
sound cards and other add-ons. Today, many devices are made that can use
the parallel plug in the back of a computer, thus reducing costs. These devices
(tape backups, SCSI drives, or modems) use bidirectional communication and,
therefore, need an interrupt. This situation is easing as USB connections
replace many of the parallel designs.
Installing Expansion Cards
The rules for installing expansion cards are simple:
Windows 95, Windows 98, Windows Me, and Windows 2000 support Plug and
Play. In most cases, you can insert a Plug and Play card into the proper type of
expansion slot and turn on the computer. Windows will find the card and guide
you through the setup. The savvy computer professional documents and keeps
track of the IRQ, DMA, and I/O addresses, in case a conflict arises with a Plug
and Play device on the system.
Windows 95, Windows 98, and Windows Me use Hardware Properties, under
the System option in the Control Panel, which does a good job of identifying
(and allowing) changes to these settings. To view assignments, from Control
Panel, select System, select the Device Manager tab, and then click Properties.
TIP
NOTE
For Plug and Play to work, the computer must have a Plug and
Play BIOS, and the operating system and the device card must be
Plug and Play–compliant.
Lesson Summary
The following points summarize the main elements of this lesson:
The original parallel port was designed only to send information to printers and
was unidirectional. However, some bidirectional communication was possible
by manipulating the handshaking lines. Today, computer manufacturers have
developed updated versions that allow better bidirectional communication
while maintaining the original Centronics specification. The Institute of
Electrical and Electronic Engineers (IEEE) developed a standard—IEEE 1284—
to oversee the standardization of these ports.
The EPP and ECP standards often have to be enabled in the CMOS
setup before the specified port can use them.
A vast array of printers is available, and to ensure that you are obtaining
optimum performance, the printer, the printer driver, and the software using
the printer must be configured for the same mode. The following table
describes various printing modes and their capabilities.
Just like modem cables, it is important for printer cables to have the correct
pin connections. The following table describes the standard parallel pin
assignments for the computer-end (25-pin) and the printer-end (Centronics)
connectors.
Computer Direction of Printer Name ID Function
DataFlow
Sends data to
1 → 1 Strobe STROBE
printer
2 → 2 Data bit 0 DB0
3 → 3 Data bit 1 DB1
4 → 4 Data bit 2 DB2
5 → 5 Data bit 3 DB3
6 → 6 Data bit 4 DB4
7 → 7 Data bit 5 DB5
8 → 8 Data bit 6 DB6
9 → 9 Data bit 7 DB7
Printer
acknowledges
10 ← 10 Acknowledge ACK
receipt of
data
11 ← 11 Printer busy BUSY
12 ← 12 Paper error PE
Indicates
13 ← 13 Select SLCT printer is
online
14 ← 14 Autofeed AUTOFD
15 ← 32 Error ERROR
Initialize
16 → 31 INIT
printer
SLECT
17 ← 36 Select input
IN
5 volts
— ← 18 5v available from
some printers
16, 19- Sometimes to
18-25 ← Ground
30, 33 pin 17
Serial Port Cables
A serial port allows a computer to send data over long distances by converting
parallel data to serial data. Typical computers will have one or two serial ports,
usually designated as COM1 and COM2. The "standard" port is a 9-pin male
connector on the computer, shown in Figure 8.12. (There are also 25-pin
cables available.)
The following table describes the pin connection for the 9-pin and 25-pin serial
cable connectors.
9- 25-
Name ID Function
Pin Pin
1 Shield
3 2 Transmit data TD Data sent from computer
2 3 Receive data RD Data sent to computer
7 4 Request to send RTS Computer is ready to send
8 5 Clear to send CTS "Other end" is ready to receive
6 6 Data set ready DSR "Other end" is ready to receive
5 7 Signal ground SG GND
Data carrier Modem detects a signal from another
1 8 DCD
detect modem
Data terminal
4 20 DTR Computer is ready to send
ready
9 22 Ring indicator RI Modem detects line ringing
Null Modem Cables
Null modem cables are used to directly connect two computers together
without the need for a modem. The transmit and receive wires in the cable
(wires 2 and 3) are switched to make the computers "think" they are using
modems.
SCSI Cables
SCSI cables come in a variety of sizes depending on the type of SCSI used and
the manufacturer of the device. Typically, internal cables are flat ribbon types
and external cables are shielded bundles.
Keyboard Cables
Another peripheral device with a cable that we encounter and yet never think
about is the keyboard. Because there are different types of keyboard cables
(and connectors) and because, on occasion, the technician might encounter a
problem with a keyboard connector, they are worthy of mention.
Keyboards are manufactured in two different styles with different cables and
connectors. Earlier versions used a 5-pin DIN connector (DIN stands for
Deutsch Industrie Norm, the German national standards organization), and
most new keyboards use a 6-pin DIN connector, the same used on a PS/2
mouse. Connectors are available to convert the 5-pin DIN to a 6-pin mini-DIN.
Although they have a different number of pins, they use the same wires and
pinouts. Data is sent serially to the keyboard using the keyboard interface.
Data is written to the controller's input buffer to accomplish this. Keyboard
data passes through pin 2 of the connector, and clocking signals move through
pin 1. A keyboard reset, which can be connected to the system's reset line, is
included at pin 3. Ground and +5-volt DC connections are applied to the
keyboard through pins 4 and 5.
Identifying Cables and Connectors
Because printers and modems can both use 9-pin and 25-pin connectors and
cables, a computer technician must be able to identify the function of the
cables by their connectors. Other devices, such as monitors and game ports,
use 15-pin connectors. Cable identification can be confusing, but it is
important. The following table summarizes how to identify common cables and
connectors.
Name Uses
DB-9 Serial ports—external modem, mouse, printer.
DB-25 Parallel port—printer, scanner, removable drive.
RJ-11 Standard telephone connector—2 wires.
Standard telephone connector—4 wires—used with dual
RJ-12
phone connections.
RJ-45 Network connector.
PS/2
(mini- Mouse, scanners, and some keyboards.
DIN)
Centronics Printers.
Technology that allows multiple peripherals to be attached to
USB one cable. Popular devices are keyboards, mouse devices,
modems, video cameras, and external Zip drives.
Lesson Summary
The following points summarize the main elements of this lesson:
For a CPU to keep track of its devices and communicate with them, a
unique I/O address must be assigned to each device.
To prevent devices from "talking" to the CPU at the same time, an IRQ
number is assigned to the devices to inform the CPU which device is
requesting its attention. It is recommended that you memorize as many
of the typical IRQ assignments as possible.
The DMA chip moves data, handling all the data passing from peripherals
to RAM and vice versa.
To avoid problems similar to IRQ conflicts, no two devices should have the
same DMA channel assignment. COM ports are used for serial devices
(such as modems) and LPT ports are used for parallel devices (such as
printers). COM ports put these devices in direct communication with the
CPU and make installation easier.
3. What happens if two non-PCI devices use the same I/O address?
6. Identify the two divisions of the external data bus and describe the
purpose of each.
11. Describe ways in which the PCI bus is better than previous technologies.
17. Why is it important not to assign an IRQ to more than one device?
18. What is the difference between COM ports and LPT ports?
21. What type of connector is used for a parallel port on the computer?
22. Describe a null modem cable.
23. What type of connector is used for a parallel port on the printer?
Answers
3 4
Chapter 9
Basic Disk Drives
About This Chapter
This chapter is all about drives—disk drives—that come in assorted sizes and
shapes. The first disk drives were physically large, small in capacity (limited in
the amount of data they could store), and very expensive. Today, disk drives
are physically small, large in capacity, and (compared to early drives) very
inexpensive.
The history of disk drives is long and complex. In this chapter, we begin our
exploration by first looking briefly at the history and development of disk
drives. We start with the most basic of drives (the floppy disk drive), and
continue through the early hard disk drives, examining their complexities and
limitations along the way.
Before You Begin
Before starting this chapter, you should review the discussions of memory,
hexadecimal notation, and basic input/output system (BIOS) operations in
Chapter 6, "Motherboard and ROM BIOS," and Chapter 7, "Memory."
3 4
Lesson 1: Floppy Disk Drives
The most basic input device is the floppy disk drive. It is perhaps the only
computer component that has retained its original technology. Other than
increased storage capacity and the adoption of a hard plastic shell, the floppy
disk drive still works essentially the same way (in terms of cabling and BIOS
configuration) it did 15 years ago. In this lesson, we explore this venerable
standard.
When IBM introduced the personal computer (PC) in 1981, it came standard
with a 5.25-inch floppy disk drive. Floppy disks were included in PCs before
hard disk drives, mostly out of economic considerations. The cost of an early
PC hard disk drive was more than the total cost of a system today and took
half of a day to prepare and install. Some very old PCs may have a 5.25-inch
drive installed. The only reason a newer machine might need one is to
maintain compatibility with an old program or data stored on such disks.
Today's 3.5-inch floppy disks (see Figure 9.1) are made of flexible plastic and
coated with a magnetic material. To protect the disk from dust and physical
damage, it is packaged in a plastic or coated paper case. The main reason for
the popularity of floppy disk drives and disks is that they provide inexpensive
read/write (R/W) removable media. The data stored on a floppy disk can be
moved from one computer to another, provided both have the same type of
drive. In general, it is a good idea to protect your data by always keeping two
copies of any data file that you create (the original and a backup), and the
floppy disk is an excellent medium for backing up, storing, or distributing
copies of relatively small files, such as word processing documents.
The following table describes various floppy disks and their capacities.
Disk
Capacity Description
Size
5.25
160 KB Single-sided, single-density—the first model.
inch
5.25
360 KB Double-sided, single-density.
inch
5.25
720 KB Double-sided, double-density.
inch
5.25
1.2 MB Double-sided, high-density.
inch
3.5
720 KB Double-sided, double-density.
inch
3.5
1.44 MB Double-sided, high-density—today's standard.
inch
Double-sided, quad-density. This format has never really
3.5
2.88 MB gained in market share and is not common on today's
inch
PCs.
The only major differences between the 5.25-inch and the 3.5-inch disk drives
(other than physical size) are that the 5.25-inch drive has a slot connector and
the 3.5-inch drive has a pin connector for engaging and spinning the disk, and
they use different power plugs and voltages.
All floppy disk drives are connected to the motherboard's external data bus by
a 34-lead ribbon cable, shown in Figure 9.2. This cable has a seven-wire twist
in lines 10 through 16. This ensures that when two floppy disk drives are
attached, the drive-select and motor-enable signals on those wires can be
inverted to "select" which drive becomes the active target. The remaining
wires carry data and ground signals. The connector end of the cable with the
twist always goes toward the drives.
Figure 9.2 Floppy disk drive cable with a twist
Early PC BIOS logic was developed to recognize one or two floppy disk drives.
In such systems, no more than one 34-pin cable for floppy disk drives can be
installed in the computer without resorting to special hardware. When a floppy
disk drive is installed on the end connector (near the twist), the drive is
logically designated as the first or primary or A drive by the BIOS. The drive
attached in the middle of the cable is always the secondary or B drive. The
BIOS will not recognize a B drive unless an A drive is physically installed.
The number 1 red wire must be connected to the number 1 pin on the drive. If
this is not correctly installed, the drive will not work (although no permanent
damage can be done by installing the connector backward).
TIP
If you install a new drive and notice that the indicator light comes
on and stays on, the cable is most likely backward.
The power connection for a floppy disk drive, shown in Figure 9.3, is either the
large, Molex-type connector on the 5.25-inch drive (see Lesson 1 of Chapter 5,
" Power Supplies," for details) or the smaller mini connector on the 3.5-inch
drive. Older power supplies may only have the Molex connections, and you will
need an adapter to attach a 3.5-inch drive. Newer power supplies, and all
power supplies for the ATX-style cases, should have both Molex and the two-
strand connection for providing a 5-volt power connection to the 3.5-inch
drive.
Figure 9.3 Floppy disk drive cable connections
After you physically install a floppy disk drive, you need only use the BIOS
Setup program to adjust the proper CMOS (complementary metal-oxide
semiconductor) settings for the type and position (first or second), and the
installation will be complete. In CMOS setup, select the drive (A or B) and
enter the correct capacity.
NOTE
Very old CMOS chips won't have settings for 1.44-MB or 2.88-MB
3.5-inch floppy disk drives because they were developed before
these drives were introduced. Today the 5.25-inch drives are
obsolete, and the CMOS of the future might not have settings for
them. Several third-party utilities will allow the CMOS to accept
the necessary values to support these drives.
Keeping a Floppy Disk Drive Running
Although floppy disk drives are usually rugged and dependable, they do take a
lot of abuse and sometimes they fail. Some failures are simply caused by
improper use, some by overuse combined with a lack of cleaning, and some-
times the mechanism just stops working.
Floppy disk drives are one of the most fragile parts of a computer system.
They are highly susceptible to failure because their internal components are
directly exposed to the outside world. Often, there is only a small door or slot
that separates the R/W heads from dust, grime, and cigarette smoke. Floppy
disk drives are often the victims of inverted disks, paper clips, and other
foreign objects that can cause mechanical damage.
The good news is that floppy disk drives are inexpensive and easy to replace.
The only preventive maintenance required is to keep the floppy disk drive
clean! Excellent cleaning kits are available in most computer and discount
stores. To achieve the best performance from a floppy disk drive in a high-use
or industrial environment, schedule monthly cleaning.
Always an Exception
One unusual floppy disk drive solution that appeared during the time that the
3.5-inch models gained dominance was the hybrid 3.5/5.25 drive. This married
the slots for both formats in a single housing. These installed just like a single
drive, but the chances of coming across such a drive today are pretty rare.
Errors Caused by the Floppy Disk
If a floppy disk drive doesn't work, the first thing you should suspect is the
floppy disk. To check a floppy disk, use the following procedure:
1. First, make sure the disk is not write protected. The hole on the right top
corner of a 3.5-inch disk (viewed from the front) should be closed. On a
5.25-inch disk, the notch on one side should be visible (not covered).
2. Try another disk.
3. Try a new (formatted) disk.
4. Try someone else's disk—one that is known to work on another computer
(first make sure there is no critical data on the disk).
5. If two or more disks are unreadable, the drive is suspect; try going to MS-
DOS and reading a directory using the DIR command.
CAUTION
If you can read data from one disk, but not another, or if a disk is very slow
reading or writing data, the problem is the floppy disk. Throw the offending
disk away. Data errors on floppy disks generally result in an error message
that ends with the words "Abort, Retry, Fail." The system will make 10
attempts to read data from a drive before reporting an error. If you get an
error, it indicates that the disk is in pretty bad shape. Transfer the data as best
you can to another drive, and discard the old disk.
The process for repairing floppy disks is identical to the process for repairing
hard disk drives, should there be data on the disk that must be recovered (see
"ScanDisk" in Lesson 2, later in this chapter).
Occasionally, the CMOS settings for floppy disks cause problems with drive
operations. Any of the following errors indicates a possible CMOS setup
problem:
General failure reading drive A: (or B:)
Not ready error reading drive A: (or B:)
Insert disk for drive A: (or B:) and press any key when ready
BIOS makers often use the 3.5-inch high-density disk drive as the default
CMOS setting for the A drive. With this BIOS, failure of the CMOS battery, or
even accidental erasure of the CMOS, will still allow most floppy disks to work.
Always double-check the CMOS if you are experiencing a recurrent floppy disk
drive failure. It is quick, easy, and might save you time.
TIP
Cables wear out, work themselves loose, and are sometimes improperly
installed. Check out both the data cable and the power jack as possible causes
of the errant floppy disk drive before moving on to the controller.
Today, most floppy drive controllers are built onto the motherboard. These are
quite reliable. In the event one does fail, however, you will usually have to
disable the on-board controller and add a separate controller on an expansion
card or replace the motherboard. It's actually less expensive to replace the
entire motherboard than to repair the floppy-related components.
Separate floppy disk drive controller cards are durable and highly resistant to
failure. Left alone, they generally cause no problems. However, cards that
have recently been handled, such as during a move or repairs to the
computer, can be suspect. They are extremely sensitive to shock and static
discharge.
In the event of a loose data cable or power plug, the power-on self test (POST)
will return "FDD Controller Failure" or "Drive Not Ready" errors. (For more
information about POST, refer to Chapter 6, "Motherboard and ROM BIOS.")
Verify all the connections and try again. If the connections are sound, try
removing and reseating the controller (being careful of electrostatic
discharge). If the same errors continue, replace the controller. Floppy disk
drives and controllers are inexpensive.
When replacing a floppy disk drive controller (see Figure 9.4), keep in mind
that most of these controllers on pre-Pentium machines (486 and older) are
bundled as part of a combination input/output (I/O) card. These cards include
some (often all) of the following: hard disk drive controllers, serial ports,
parallel ports, and joystick ports. If the new card contains any duplicate ports
(they already exist elsewhere on the computer), a potential for conflict exists.
TIP
When replacing floppy disk drives, be sure to throw away the old drive. Floppy
disk drives are inexpensive compared to other components in the computer.
Consider purchasing them in quantity to save money. It is a good idea to have
a spare floppy disk drive and I/O card available for testing purposes.
Lesson Summary
The following points summarize the main elements of this lesson:
The original concept behind the hard disk drive was to provide a storage
medium that held large amounts of data and allowed fast (random) access to
that data. Data on a hard drive can be accessed directly, without requiring the
user to start at the beginning and read everything until finding the data
sought.
The first IBM hard disk drives came out in the late 1970s and early 1980s and
were code-named "Winchester." The original design concept included two 30-
MB units in one enclosure: 30-30 (hence Winchester, after the well-known
rifle cartridge popular in western movies). The PC-XT was the first personal
computer to include a hard disk. They were called fixed disks because they
were not removable by the end user, like a floppy. (Old mainframe computers
had hard platters that were removable by a trained technician.) The
Winchester technology is the forerunner of all PC fixed disks.
The platters are often made of an aluminum alloy and have a thin magnetic-
media coating on both sides. After coating, the platters are polished and given
another thin coating of graphite for protection against mechanical damage
caused by physical contact between the data heads and the platter surface.
The R/W heads "float on a cushion of air" above the platters, which spin at
3500 to 12,000 revolutions per minute (rpm). The distance (flying height)
between the heads and the disk surface is less than the thickness of a
fingerprint.
Storing Data
As noted in previous chapters, data is stored using binary code. Within the
computer's memory, 1s and 0s are stored as electrical impulses. On magnetic
media, the 1s and 0s can be stored as either magnetic or nonmagnetic areas
on the drive surface. Although there are magnetized and nonmagnetized
positions on the hard disk drive, the 1s and 0s of the binary code are stored in
terms of flux reversals. These flux reversals are actually the transitions
between magnetized and nonmagnetized positions on the hard drive surface.
Early hard disk drives used a method of encoding called frequency modulation
(FM). FM technology is based on timing. To differentiate a 1 from a 0, it
measures the time the drive head spends in a magnetized state. For FM to
work, it requires every 1 or 0 to be preceded by a timing bit. The early FM
drives worked well, but all the extra bits added to the work and slowed the
process of data transfer. To improve efficiency and speed of the data transfer,
FM was replaced by an improved version that reduced the number of timing
bits required. This new technology was called modified frequency modulation
(MFM). MFM uses the preceding data bit to indicate whether the current bit is
a 1 or a 0, thus reducing the number of timing bits by more than 50 percent.
Another method used to place data on hard disk drives is run-length limited
(RLL) encoding. RLL replaces the timing bits with patterns of 1s and 0s that
represent longer patterns of 1s and 0s. Although this looks inefficient, the
elimination of the timing bits speeds overall performance.
TIP
Early hard disk drives used a stepper motor to move the actuator arms in fixed
increments or steps. This early technology had several limitations:
The interface between the stepper motor and actuator arm required that
slippage be kept to a minimum. The greater the slippage, the greater the
error.
Time and physical deterioration of the components caused the positioning
of the arms to become less precise. This deterioration eventually caused
data transfer errors.
Heat affected the operation of the stepper motor negatively. The
contraction and expansion of the components caused positioning accuracy
errors. (Components expand as they get warmer and contract as they
cool. Even though these changes are very small, they make it difficult to
access data, written while the hard drive is cold, after the disk has
warmed up.)
The R/W heads need to be "parked" when not in use. Parking moves the
heads to an area of the disk that does not contain data. Leaving the
heads on an area with data can cause that data to be corrupted. Old hard
disk drives had to be parked with a command. Most drives today
automatically park the heads during spin-down.
NOTE
Older hard disk drives (pre-EIDE or SCSI-2) require that the heads
be parked before moving the computer. With these units it is
recommended that you use the appropriate command to park the
heads. The actual command can vary depending on the drive
manufacturer, but you can try typing park at an MS-DOS prompt.
Newer computers, including laptops, do not require that the drives
be parked.
Hard disk drives with stepping motor actuator arms have been replaced by
drives that employ a linear motor to move the actuator arms. These linear
voice coil motors use the same type of voice coil found in an audio
loudspeaker, hence the name. This principle uses a permanent magnet and a
coil on the actuator arm. By passing electrical current through the coil, it
generates a magnetic field that moves the actuator arm into the proper
position.
The lack of mechanical interface between the motor and the actuator arm
provides consistent positioning accuracy.
When the drive is shut down (the power is removed from the coil), the
actuator arm, which is spring-loaded, moves back to its initial position,
thus eliminating the need to park the head. In a sense, these drives are
self-parking.
There is a drawback to this design: Because a voice coil motor can't accurately
predict the movement of the heads across the disk, one side of one platter is
used for navigational purposes, and so is unavailable for data storage. The
voice coil moves the R/W head into an approximate position. Then the R/W
heads on the reserved platter use the "map" to determine the head's true
position and make any necessary adjustments. This is why hard drive
specifications list an odd number of heads.
Head-to-Disk Interference
Head-to-disk interference (HDI) is a fancy term for head crash. These terms
describe the contact that sometimes occurs between the fragile surface of the
disk and the R/W head. This contact can cause considerable damage to both
the R/W head and the disk. Never move—or even pick up—a hard disk drive
until it is completely stopped; the momentum of the drive can cause a crash if
it is moved or dropped during operation.
Picking up a disconnected hard disk drive that is still spinning is not a good
idea either. The rotation force of the platters can wrench it out of your hands,
and the drive is not likely to survive the trip to the floor.
Geometry
Hard disk drives are composed of one or more disks or platters on which data
is stored. The geometry of a hard drive is the organization of data on these
platters. Geometry determines how and where data is stored on the surface of
each platter, and thus the maximum storage capacity of the drive. There are
five numerical values that describe geometry:
Heads
Cylinders
Sectors per track
Write precompensation
Landing zone
Write precompensation and landing zone are obsolete, but often seen on older
drives. Let's take a look at each of these components.
TIP
All hard disk drives have geometry factors that must be known by
the BIOS to read and write to the drive. Knowledge of the
geometry is required to install or reinstall a hard drive. New PCs
and drives often have technology that lets the BIOS get the
information directly from the drive. You still need to know the
figures, however, in case this technology fails.
Heads
The number of heads is relative to the total number of sides of all the platters
used to store data (see Figure 9.5). If a hard disk drive has four platters, it can
have up to eight heads. The maximum number of heads is limited by BIOS to
16.
Figure 9.5 Drive heads
Hard disk drives that control the actuator arms using voice coil motors reserve
a head or two for accuracy of the arm position. Therefore, it is not uncommon
for a hard disk drive to have an odd number of heads.
Some hard disk drive manufacturers use a technology called sector translation.
This allows some hard drives to have more than two heads per platter. It is
possible for a drive to have up to 12 heads but only one platter. Regardless of
the methods used to manufacture a hard drive, the maximum number of heads
a hard drive can contain is 16.
Cylinders
Data is stored in circular paths on the surface of each platter. Each path is
called a track. There are hundreds of tracks on the surface of each platter. A
set of tracks (all of the same diameter) through each platter is called a cylinder
(see Figure 9.6). The number of cylinders is a measurement of drive
geometry; the number of tracks is not a measurement of drive geometry.
BIOS limitations set the maximum number of cylinders at 1024.
A hard disk drive is cut (figuratively) into tens of thousands of small arcs, like
a pie. Each arc is called a sector and holds 512 bytes of data. A sector is shown
in Figure 9.7. The number of sectors is not important and is not part of the
geometry; the important value is the number of sectors per track. BIOS
limitations set the number of sectors per track at 63.
Figure 9.7 Sector
Write Precompensation
All sectors store the same number of bytes—512; however, the sectors toward
the outside of the platter are physically longer than those closer to the center.
Early drives experienced difficulty with the varying physical sizes of the
sectors. Therefore, a method of compensation was needed. The write
precompensation value defines the cylinder where write precompensation
begins.
NOTE
Landing Zone
A landing zone defines an unused cylinder as a "parking place" for the R/W
heads. This is found in older hard disk drives that use stepper motors. It is
important to park the heads on these drives to avoid accidental damage when
moving hard disk drives.
CHS Values
Cylinders, heads, and sectors per track (see Figure 9.8) are known collectively
as the CHS values. The capacity of any hard disk drive can be determined from
these three values.
Figure 9.8 Cylinders, heads, and sectors per track
1024 cylinders
16 heads
63 sectors per track
512 bytes per sector
Therefore, the largest hard disk drive size recognized directly by the BIOS is
504 MB. Larger drive sizes can be attained by using either hardware or
software translation that manages access to the expanded capacity without
direct control by the system BIOS:
There are many hard disk drives that are larger than 504 MB. These drives
manage to exceed this limitation in one of two ways: Either they bypass the
system BIOS (by using one of their own) or they change the way the system
BIOS routines are read. (For a fuller discussion of this, refer to Chapter 10,
"Advanced Disk Drive Technology.")
Hard Disk Drive Types
The original PC design did not include hard disk drives. Hard disk drives were
reserved for large mainframe computers and remained highly proprietary in
design. Today, there are four types of hard drives, each with its own method of
installation.
ST506
The very first hard disk drives for personal computers used the ST-506/412
interface. It was developed by Seagate Technologies in 1980 and originally
appeared with the 5-MB ST-506 drive. The ST-506 was priced at $3,000 and
had a capacity of 5 MB. The ST-506/412 was the only hard drive available for
the IBM computer and was the first to be supported by the ROM BIOS chip on
the motherboard.
ESDI
The ESDI (Enhanced Small Device Interface) was introduced in 1983 by the
Maxtor Corporation. This technology moved many of the controller functions
directly onto the hard disk drive itself. This greatly improved data transfer
speeds. Some ESDI controllers even offered enhanced command sets, which
supported automatic sensing of the drive's geometry by the motherboard's
ROM BIOS. The installation of ESDI drives was almost identical to the
installation of ST-506 drives. Their high performance made them the darlings
in their day for power users and network servers, but the high cost of ESDI
drives and advances in other drive technologies spelled their doom. Today they
are obsolete.
IDE/EIDE
The IDE (Integrated Device Electronics) drive arrived on the scene in the early
1990s and incorporated the benefits of both its predecessors. IDE quickly
became the standard for computers. It supports the ST-506 standard command
set, and its limited controller functions build directly on the drive's logic board.
This results in a much less expensive design. Most new motherboards have the
IDE connections built in; thus, the chips are part of the board design.
Western Digital and Compaq developed the 40-pin IDE ISA (Industry Standard
Architecture) pinout specification. ANSI (American National Standards
Institute) standards committees accepted the standard as the Common Access
Method (CAM) Advanced Technology (AT). The official name for these drives is
now ATA/CAM (Advanced Technology Attachment/Common Access Method).
The terms IDE and ATA/CAM are interchangeable.
NOTE
EIDE is the standard for most hard disks in today's PCs. A new
type of EIDE, Ultra DMA/66, doubles the base speed of existing
EIDE drives on motherboards that have a 66-MHz bus (hence the
name).
SCSI
SCSI (Small Computer System Interface, pronounced scuzzy) has been around
since the mid-1970s in one or more forms. It is the most robust of the hard
disk drive interfaces, and it is popular on network servers and high-
performance workstations. Apple adopted SCSI as its expansion bus standard.
The original SCSI standard allowed up to seven peripheral devices to be daisy
chained (connected in a series) to one common bus through a single host
adapter connected to the computer bus. SCSI-2 upped that to 15, and some
adapters allow multiple chains for even more devices. (See Chapter 10,
"Advanced Disk Drive Technology," for more information on SCSI technology.)
NOTE
Most SCSI cards can be configured to mimic the ST-506 hard disk
drive and talk directly to the PC BIOS. This lets you install a SCSI
hard drive without additional drivers. You will need the ASPI or
CAM software to get full use of advanced SCSI performance
features or to attach non-hard disk drive SCSI peripherals to the
system.
SCSI usually costs more than other hard disk drive interfaces, but is the only
one that allows both internal and external connections on the same adapter. It
also allows you to attach more types of devices than any other interface. A
single chain can include hard drives, CD-ROM and other optical drives,
scanners, and tape drives.
Installation and Setup
All boot devices must be configured outside the operating system (MS-DOS or
Windows 95, Windows 98, Windows Me, Windows NT, or Windows 2000)
regardless of the level of Plug and Play compatibility. (Devices such as disk
drives and CD-ROM drives that are used to boot must be configured at the
BIOS and hardware levels because they typically contain the operating system
and must run properly before the operating system can be started.)
Cabling
Just as there are different types of drives, there are different cabling
requirements for each. Let's look at the three most common types.
ST-506
The ST-506 uses a 34-connector control cable (daisy chained for dual drives)
and a 20-connector data cable for each drive. The 34-wire control cable has a
twist in it for line 25 through 29 configuration (similar to the floppy disk drive
cable); this twist determines which hard disk drive is hard drive 0 and which is
hard drive 1. The drive at the end is drive 0.
CAUTION
IDE/EIDE
IDE uses a simple 40-pin cable that plugs into the controller and into the drive
(see Figure 9.9). There are no twists. IDE controllers identify the two drives as
either master or slave. Drive makers use different methods to set up their
drives. The most common system uses jumpers. Setting these jumpers serves
the same function as the twist used with other drive cables: It identifies
whether the drive is a master or slave. Other drives use switches, and some
new drives use software to determine which is the dominant drive. Be sure to
check the manufacturers' specifications to properly set up the drive.
Ultra DMA/66
A special version of the 40-pin IDE cables is used for Ultra DMA/66. Be sure to
obtain and install it if you are working with one of these newer drives. It is
also 40-pin, but it has a blue connector on one end and a black one on the
other. All the other installation and cabling procedures are the same as for
traditional IDE devices.
TIP
After a hard disk drive has been installed physically, the geometry of the drive
must be entered into the CMOS through the CMOS setup program before the
PC will recognize the new device. This information must be entered exactly as
specified by the manufacturer. Figure 9.11 shows hard disk drive configuration
information in a typical CMOS. Figure 9.12 shows a subscreen of the main
hard drive setup screen.
Originally, CMOS would allow for only two drives. Later versions allow up to
four drives, because most new PCs have two IDE channels, but you still have
to contend with IDE's limit of two devices per channel. Another thing to be
aware of is the number of non-hard drive devices (tape, CD-ROM, CD-R, and
so on) that may also be attached to a PC. When configuring a new system, it's
a good idea to ask customers if they plan on upgrading before making a final
decision on how to attach the drives. In most cases, the primary hard disk can
take the master position on the primary IDE channel, and the CD drive the
primary position on the second channel. For best performance, only hard
drives should be placed on the primary IDE channel, if possible.
The CHS, along with write precompensation and landing zone, determine how
the hard disk drive controller accesses the physical hard drive. The creators of
the first CMOS routines for the 286 AT believed that the five different
geometry numbers would be too complicated for the average user to configure,
so they established 15 preset combinations of hard drive geometries. These
preset combinations are called types. With types, the user simply enters a
hard drive type number into the CMOS.
This system worked well for a period of time, but with each new hard disk
drive that manufacturers designed, a new type also had to be created and
added to the list. BIOS makers continued to add new types until there were
more than 45 variations. To deal with this issue, setup routines now include a
user type. This allows manual entry of the geometry values, increasing both
the flexibility and complexity of hard drive installation.
CMOS setup is easy with IDE drives. Most CMOS chips today have a setting
known as IDE autodetection, which runs the IDENTIFY DRIVE command,
gathering and setting the proper geometry values. To use it, simply connect
the drive to the computer, turn it on, and run the CMOS. The IDENTIFY DRIVE
command instructs the drive to transmit a 512-byte block of data containing
the following information:
Manufacturer
Model and serial numbers
Firmware revision number
Buffer type indicating sector buffering or caching capabilities
Number of cylinders in the default translation mode
Number of heads in the default translation mode
Number of sectors per track in the default translation mode
Number of cylinders in the current translation mode
Number of heads in the current translation mode
Number of sectors per track in the current translation mode
IMPORTANT
Be sure to save your settings before you exit the setup program.
What happens if wrong data is entered into the CMOS? For example, what if a
1.2-GB hard disk drive is installed and the CMOS is set up to make it a 504-
MB hard drive? When you boot the computer, you will see a perfect 504-MB
hard drive. You will need to correct the entry to obtain proper use of the drive.
It should always make sure you go back and enter the correct information or it
could render the drive inaccessible by the system.
If the computer you are working on does not support autodetection, you must
be able to determine the geometry of a drive before you can install it.
There are many ways to determine the geometry of a hard disk drive:
Check the label. The geometry or type appears on the label of many hard
drives.
Check the documentation that came with the hard drive. All drives have a
model number that can be used to obtain the geometry parameters either
from the manufacturer or a third party. The hard drive manufacturers
usually reserve a section of their Web sites for providing configuration
data and the setup utilities available for download.
Contact the manufacturer. Many manufacturers have toll-free phone
numbers.
After a drive is installed, it must be assigned a drive name or letter that is
unique. There are several drive-naming conventions that help identify this
unique name. If only one hard disk drive is installed, it must be configured as
drive 0, or master. If a second drive is installed, it is recognized as hard drive
1, or slave. Many CMOS configurations use the terms C and D. Under all
versions of MS-DOS and Windows, hard drive 0 is recognized as C and hard
drive 1 is recognized as D.
As more drives are added to a system (including tape, CD-ROM, and network
drives), the names of existing drives might change. For example, installing a
portable drive such as an Iomega Zip drive can change a CD-ROM drive from
the D drive to the E drive. When the portable drive is removed, the CD-ROM
drive will once again be the D drive. Keep in mind the difference between
logical and physical drives. A physical drive is the hardware—it can be divided
into two or more logical drives. (See the "Partitioning" section later in this
lesson.) Drives on a network server are also logical drives. Write down the
configuration and keep track as changes in the system are made. The only
drive letters that are fixed are the A and B drives, which are always the floppy
disk drives, and the C drive, the boot drive where the operating system
resides.
NOTE
Low-Level Formatting
Low-level formatting means creating all the sectors, tracks, cylinders, and
head information on the drive, and this is the third step in installing hard disk
drives; generally, it applies only to older drives. Low-level formatting by the
end user has virtually been eliminated with today's drives (it's done at the
factory).
It creates and organizes the sectors, making them ready to accept data.
It sets the proper interleave (records the sector header, trailer
information, and intersector and intertrack gaps).
It establishes the boot sector.
Every hard disk drive arrives from the factory with bad spots on the platters.
Data cannot be written to these areas. As the sectors are being created, the
low-level format attempts to skip over these bad spots. Sometimes, it is
impossible to skip over a spot, so the sector is marked as "bad" in the ID field.
CAUTION
IDE drives use a special type of low-level formatting called embedded servo.
This type of low-level formatting can be done by the manufacturer only, or
with a special utility provided by the manufacturer. When installing an IDE
drive, go straight to the partitioning step after the CMOS is set up. To continue
with hard disk drive installation for MS-DOS and Windows 3.x, Windows 95,
Windows 98, and Windows Me versions, you will need a bootable floppy disk
containing several programs that are required to prepare the new drive. (For
Windows NT and 2000, there are options that will allow you to prepare a drive
from the bootable CD-ROM.)
format a: /s to
This will copy system files to the disk, making it a bootable disk.
The next step is to copy the necessary files from the MS-DOS directory to the
floppy disk. The default location for these files is the C:\DOS directory for MS-
DOS and the C:\Windows\Command directory for Windows 95, Windows 98,
and Windows Me. Copy these files:
FDISK.COM
This bootable disk can be used for partitioning and high-level formatting as
discussed in the following sections.
Partitioning
Partitions are logical divisions of a hard drive. A computer might have only one
physical hard drive (called hard drive 0), but it can have anywhere from 1 to
24 logical drives, identified as C to Z.
To divide the disk into several drive letters to make it easier to organize
data files. Some users separate data, programs, and operating system
files onto different drives.
To accommodate more than one operating system.
When MS-DOS was first designed to use hard disk drives, the largest hard
drive that could be used was 32 MB (because of the way MS-DOS stored files
on the hard drive). Partitioning was included in MS-DOS 3.3. This allowed for
the development of larger physical hard drives by creating multiple logical
drives of up to 32 MB each. Starting with MS-DOS 4.0, the partition size was
increased to 512 MB. Beginning with MS-DOS 5.0, the partitions could be as
large as 2 GB. Windows 98, Windows Me, and Windows 2000 support much
larger drive sizes, and many new disks exceed 20 GB.
NOTE
Some hard disk drives that exceed 4 GB might not work with an
older computer, BIOS, or operating system. They will physically
function, but the whole drive cannot be accessed—disk access will
be limited to the largest size that can be recognized by that
system.
There are two types of partitions: primary and extended. The primary partition
is the location where the boot information for the operating system is stored.
To boot from a hard disk drive, the drive must have a primary partition.
Primary partitions are for storage of the boot sector, which tells the computer
where to find the operating system. The primary partition is always identified
as drive C.
The extended partition is for a hard disk drive, or part of a hard disk drive,
that does not have an operating system. The extended partition is not
associated with a physical drive letter. Instead, the extended partition is
further divided into logical drives starting with D and progressing until drive
letter Z is created. (Remember: A and B are reserved for floppy disk drives.)
Newer operating systems can use all of the drive as a single primary partition.
The logical drive concept was invented to allow older versions of MS-DOS and
Windows to make use of drives that exceeded their maximum drive size.
How to Partition
The fdisk utility is used to partition a drive under DOS, Windows 3.x, Windows
9x, and Windows Me. After the drive is installed and the CMOS is updated, run
fdisk to partition the drive(s). Figure 9.13 shows the fdisk startup screen.
Windows NT and 2000 have options during setup that are offered to partition a
drive during installation of a new operating system. Follow the prompts for
these environments as they appear.
You also have the option of using a third-party utility to partition the hard
drive, which often provides more sophisticated and graphical methods for
partitioning a drive, thereby simplifying the partition process.
Figure 9.13 The fdisk startup screen
The function of lines 1, 3, and 4 is clear. Line 2 sets the active partition. The
active partition is the partition where the BIOS will look for an operating
system when the computer is booted.
Don't confuse the primary partition with the active partition. On a computer
with a single operating system, the primary and active partitions are usually
the same. A computer with dual-boot capability might have separate partitions
for each operating system. In that case, the active and primary partitions
might not be the same.
The primary partition is where MS-DOS (or the Windows boot information) is
stored on the hard disk drive, and the active partition is where the operating
system is stored on the hard drive. (If MS-DOS is the only operating system,
the primary partition and active partition are the same.) Other operating
systems—Windows NT, Windows 2000, and LINUX, for instance—can exist on
an extended partition.
NOTE
High-Level Formatting
The high-level format is simply called "format" (the program used to perform a
high-level format is called FORMAT.COM). This is the same format command
used to prepare floppy disk drives. The high-level format performs two major
functions:
The base storage unit for drives is a sector. Each sector can store between 1
byte and 512 bytes of data. Any file less than 512 bytes is stored in a single
sector, and only one file can be assigned a sector. Therefore, any part of a
sector left unfilled is wasted. When files are stored in more than one sector (if
they are greater than 512 bytes), MS-DOS needs a way to keep track of each
location and the order in which data is stored. MS-DOS also needs to know
which sectors are full and which sectors are available for data, so it uses the
FAT to keep track of this information.
There are several versions of FAT, as well as other disk allocation schemes
used by operating systems like Windows NT, 2000, and various versions of
LINUX and UNIX. We will consider these versions in later chapters as we
examine operating system issues. For our current discussion we will focus on
the basics of FAT to show how data is stored on a disk drive. All operating
systems must use some well-defined method of writing, addressing, and
reading data in a way that is compatible with the drive technology being used.
In some cases, as with SCSI drives (see Chapter 10, "Advanced Disk Drive
Technology"), the hardware may actually "pretend" to use a system like FAT
but translate its own addressing scheme into FAT when it communicates with
the operating system.
The FAT is simply an index that keeps track of which part of the file is stored
in which sector. Each partition (or floppy disk) has two FATs stored near the
beginning of the partition. These FATs are called FAT #1 and FAT #2. They are
identical. Each FAT can be looked at as a two-column spreadsheet.
As mentioned, the CHS values limit the maximum size of a hard disk drive to
504 MB under the older PC operating systems. The 16-bit FAT can address
64,000 (2l6) locations. Therefore, the size of a hard drive partition should be
limited to 64,000 × 512 bytes per sector or 32 MB. With this limitation, you
might ask, how are larger hard drives possible?
There are two solutions to this problem. The first method, used with earlier
drives (under 100 MB), was to use fdisk to break the drive up into multiple
partitions, each less than 32 MB.
NOTE
Remember, for this table, a sector is not the basic unit of storage—
it is now the cluster.
1. MS-DOS starts at the beginning of the FAT and looks for the first space
marked "open for use" (0000). It begins to write to that cluster.
2. If the entire file can be saved within that one cluster, the code FFFF (last
cluster) is placed in the cluster's status field and the filename is added to
the directory.
3. The cluster number is placed with the filename.
4. If the file takes more than one cluster, MS-DOS searches for the next
open cluster and places the number of the next cluster in the status field.
MS-DOS continues filling and adding clusters until the entire file is saved.
5. The last cluster then receives the end-of-file code (FFFF).
FAT32
When deciding whether to use FAT32, take the following into consideration:
Fragmentation
Fragmentation is the scattering of parts of the same disk file over different
areas of the disk. During PC use, files are opened and then saved back to disk.
As mentioned earlier, the file is often stored in several small sections.
Fragmentation is caused by the following:
This is an acceptable way to operate and causes no problems for the computer
itself. However, excessive fragmentation slows down the hard disk drive
because it has to access two or more areas to retrieve a file. It is possible for a
single file to be fragmented into hundreds of pieces, forcing the R/W heads to
travel all over the hard disk drive.
Most operating systems have either native or third-party applications that will
defragment a drive. These should be used on a regular basis to improve
performance and save wear and tear on the drive.
The elimination of fragmentation improves the speed of the hard disk drive
dramatically. Running a program to eliminate fragmentation is called
defragmenting a drive. The slang term "defrag" is often used. MS-DOS
installations include a defragmentation program called DEFRAG. Windows 95,
Windows 98, and Windows Me include a defragmentation program, which can
be accessed by clicking Start, selecting Programs, then Accessories, then
System Tools, and then Disk Defragmenter.
NOTE
CAUTION
Disk Compression
Disk compression is offered as part of the Microsoft Plus add-on product for
Windows 95, but is included in Windows 98 as the DriveSpace 3 program
(Windows Me includes DriveSpace 3, but does not support compression). It
works by creating a single large file (called a compressed volume file, or CVF)
that acts like a virtual disk drive (with its own drive letter). Files you write to
the CVF will become records within the one large file. This process is normally
transparent to the user.
NOTE
When the data is retrieved from the file, the real values are extracted
from the special references. The result can be a dramatic reduction in the
disk space occupied by files, especially with uncompressed graphics files
and word processing documents.
Using compression introduces some risk because an error in the CVF can make
data inaccessible. It is safest not to use a compressed file for critical data, and
some older programs (particularly games) might not work with compression.
With DriveSpace 3 you can use the Troubleshooter to identify and fix
problems.
Compression is less necessary today because of the advent of large hard disk
drives and the availability of the FAT32 file system with its smaller cluster
sizes.
Maintaining a Disk Drive
Being prepared for a potential failure before a hard disk drive fails to work
properly can save lost data and time. How fully you should prepare depends on
the answers to two questions:
With this in mind, to minimize the impact of a hard disk drive failure:
You should have the following tools on hand to perform hard disk repairs:
A list of the hard disk drive's parameters and the correct CMOS settings
required.
A bootable floppy disk with the fdisk, format, chkdsk, and mscdex (if using
a CD-ROM) command files. Adding EDIT or another text editor is handy
for tweaking the CONFIG.SYS and AUTOEXEC.BAT files. Windows users
can create a startup disk with these files by clicking Start, selecting
Settings, then Control Panel, double-clicking Add/Remove Programs, and
clicking the Startup Disk tab. Third-party utilities also provide the ability
to create these "emergency" disks.
Drivers needed to get the operating system running with any primary
expansion cards (drive controllers, SCSI card, display adapter, and so on).
Good cables for the kinds of drives you might have to repair.
Chkdsk or other hard disk inspection programs that are part of the
operating system on the drive in question. Be sure to use the right
version.
A number of third-party programs are also available for use with older
hardware and operating systems. These programs are available at most
computer software stores.
CAUTION
When using any third-party programs to troubleshoot or repair a
drive, be sure they are certified for the hard disk drive and
operating system in question. Use uncertified third-party programs
only when such a step is the last resort before discarding the
drive. Even then, be aware that the program may cause problems
of its own. Keep the software up to date; changes in the operating
system or bugs found in the utility can render the product more of
a problem than a cure. If possible, back up any critical data before
using the software.
The most common drive errors begin with "Abort, Retry, Fail," or "Abort,
Retry, Fail, Ignore." When you see any of the following errors, you have a
drive problem:
These errors are the easiest to fix and can usually be attributed to a bad sector
on the drive. When this happens, try the following.
ScanDisk
MS-DOS, Windows 3.x, Windows 95, Windows 98, and Windows Me contain
versions of the ScanDisk program. ScanDisk performs a battery of tests on a
hard disk, including searching for invalid filenames, invalid file dates and
times, bad sectors, and invalid compression structures. In the file system,
ScanDisk looks for lost clusters, invalid clusters, and cross-linked clusters.
Regular use of ScanDisk can help prevent problems as well as fix them.
Windows 95-, Windows 98-, and Windows Me-based computers will
automatically run ScanDisk any time the operating system is improperly shut
down—that is, when the power is turned off before the system is allowed to
complete its shutdown procedures.
Most SCSI drives have a program built into the controller that will verify the
hard disk drive and make repairs if a sector has become unusable or unstable.
Boot the PC and watch for a prompt to enter the SCSI BIOS setup (usually
Ctrl+A). Then choose Disk Utilities and the option to verify or inspect the
drive. Do not select the low-level format option. After the program is finished,
reboot the computer and see if the problem is resolved. If the disk fails
verification, it might need to undergo low-level formatting or be replaced.
CMOS Errors
At times, the system CMOS becomes unstable. This can result in the following
error messages:
Checking the CMOS is quick and easy. It is a good idea to always have a
backup of the CMOS data on paper.
NOTE
Connectivity Errors
TIP
It is possible for a drive to lose partition information. Look for these errors:
Boot and partition information is stored on sectors and can fail. If the partition
table or boot sector is corrupted, the best solution is to restore the data on the
drive from a backup copy after repartitioning the drive and reloading the
operating system.
Lesson Summary
The following points summarize the main elements of this lesson:
The first disk drives were floppy disk drives. The technology of floppy
disks has changed little in the past decade.
Floppy disk drives are designated as A or B. The drive letter designation is
determined by the location of the drive on the cable.
Floppy disk drives fail more than any other part of a computer system.
The three major steps in installing a hard disk drive are to partition the
drive, set the CMOS settings, and format the drive.
Fdisk is used to partition hard disk drives. A computer technician should
be familiar with the use of fdisk and partitioning.
The geometry of a hard disk drive (CHS values) determines its storage
capacity.
There are two types of partitions: primary and extended. The operating
system must be on the primary partition.
The active partition is where the operating system is stored. The active
partition is usually (but not always) the primary partition.
3 4
Review
4. What three things should be checked when a floppy disk drive fails?
5. What is the best way to ensure long life from a floppy disk drive?
6. When you purchase a new floppy disk drive controller, what can you
expect to receive with it?
7. Other than physical size, what are the only differences between a 5.25-
inch floppy disk drive and a 3.5-inch floppy disk drive?
8. What type of cable is used to connect a floppy disk drive to the external
data bus?
9. What is the proper way to install a floppy disk drive cable?
10. To which pin must the number 1 wire of the floppy disk drive cable be
connected?
11. You've received the following error message: "General failure reading
Drive A:". What is the most likely problem?
13. You receive an error message that ends with "Abort, Retry, Fail?". What is
the most likely cause of the error?
14. Why is a voice coil actuator arm better than a stepper motor actuator
arm?
16. What is the best way to determine the geometry of an unknown drive?
24. Name the characteristics of the three different hard disk drive types.
29. How can you minimize the impact of a hard disk drive failure?
Answers
3 4
Chapter 10
Advanced Disk Drive Technology
About This Chapter
This chapter picks up where the previous chapter left off; we continue our look
at disk drives, moving on to more advanced technologies. The lessons in this
chapter cover CD-ROM/DVD drives, newer and larger hard disk drives, and
Small Computer System Interface (SCSI) drives. In the final lesson, we also
explain the basics of the SCSI interface.
Before You Begin
Before starting this chapter, you should review Chapter 9, "Basic Disk Drives."
3 4
Lesson 1: CD-ROM and DVD Drives
Both CD-ROM (compact disc read-only memory) and DVD (digital video disc)
drives are based on technology taken directly from the multimedia world, and
both have become standard equipment for computers. This lesson covers the
basics of installing and using CD-ROM drives.
Both CD-ROM and DVD technologies make use of high-capacity optic media in
the form of a silvery platter that holds digital data that is decoded by striking it
with a laser beam. To the casual observer, the discs used by both are the
same. In fact, most new DVD technology employs a shorter wavelength laser
to read the data than the type found in CD-ROM drives. That lets
manufacturers cram more data (like an entire movie, including the
soundtrack) on a single platter.
Many new PCs come with a DVD drive that can also read CD-ROMs. To play
movies effectively, they must also have decoding hardware, either on the drive
or on a companion card (sometimes part of the display adapter). Without the
performance boost the additional hardware provides, the playback will be
choppy with lost frames and erratic sound.
One CD can store an entire software package. While early versions of the
Microsoft Office Suite were supplied on 32 floppy disks, today the entire
program suite and its manuals are stored on a single CD. It is also much faster
to install a CD. The user simply starts it up, enters any required information,
and comes back later; it is no longer necessary to feed disk after disk into the
computer. When they were introduced, CDs held large databases such as
encyclopedias. Today, they are used for every possible type of data, from
national phone directories and software libraries to collections of clip art,
music, and games. The following table lists the advantages of storing data on a
CD.
Advantage Description
Large
storage Up to 650 MB of data fit on a single 5-inch disc. (Smaller
capacity
compared than the original 5.25-inch floppy disk, a CD holds almost
to floppy- 2000 times as much information.)
type media
Portability The CD is a portable medium.
Data
A CD is read-only, which prevents accidental erasure of
cannot be
programs or files.
changed
More durable than the standard 5.25-inch or 3.5-inch disks,
CDs are not magnetic media and thus are not subject to the
Sturdiness same dangers posed by proximity to electrical sources or
magnets (although you need to handle them carefully to
avoid finger prints and scratches).
CD-ROMs are audio-capable, allowing special compression of
Special audio, image, and video data. They can be used to play
capabilities standard audio CDs and have the capacity to store and
record video data.
Development of the CD
The development of the computer CD roughly paralleled the audio (music) CD:
With the cost of hard disk drives falling and the amount of available data
storage rising, the hard drive is still king of the storage media. Optical data
storage devices hold their place as removable media and as the media of
choice for archival data storage.
NOTE
Data is written by creating pits and lands on the CD's surface. A pit is a
depression on the surface, and a land is the height of the original surface. The
transition from a land to a pit or a pit to a land represents a binary character
of 1. Lands and pits represent binary 0. The reading of data is based on timing
—the speed at which the CD is rotating—and the reflection of light. If no data
is on the disk, the reflectivity will not change and the CD will read a series of
binary 0s. There are approximately 4 to 5 million pits per CD, arranged in a
single outward-running spiral (track) approximately 3.75 miles (6 kilometers)
long. The distance between each element is 1.6 thousandths of a millimeter.
DVD: A Super CD-ROM Alternative
As already noted, DVD drives are becoming more popular and are usually
backward compatible with CD-ROMs. They come in several varieties, both
internal and external. The most popular in the PC market is the Enhanced IDE
(EIDE) internal style. While this product looks much like a CD-ROM drive, and
installs virtually the same way, you need to be at least somewhat familiar with
the different standards that exist in the DVD arena.
DVD Formats
DVD-ROM
This a data read-only format, much like a CD-ROM disc, that can be
engineered to hold up to 17 GB of digital information by encoding data on both
sides of the disc.
DVD Video
DVD-R
The R stands for recordable. This type of DVD media is similar in use to the
single record type of CD-R platter and contains up to 3.95 GB of data per side.
Like CD-R, you can only record to the disc once.
DVD RAM/RW
There are several Read/Write (RW) DVD drives on the market. Because of the
incompatibilities among vendors, this DVD technology has been very slow in
gaining acceptance. Keep in mind that the "Write" aspect is not unlimited and
that the actual number of changes varies based on the technology.
Connecting CD-ROM and DVD Drives
In most cases, there is no difference in attaching a CD-ROM or DVD drive. The
speed rates described later (like 4X) are based on the speed of the original CD-
ROM drives and are used to gauge the relative speed of both CD-ROM and DVD
products. Depending on the features and design, you may have to install an
add-on decoder card with a DVD product to improve performance when playing
movies. Both types of drives are peripheral devices and must be connected to
the bus of the computer through a controller. There are several ways to install
them.
Adapter Boards
Many add-on sound cards have built-in CD-ROM controllers. Most sound cards
come with a 15-pin female connector known as the MIDI (Musical Instrument
Digital Interface) connector. Some of the newer cards come with a SCSI
interface. Sound cards with the built-in controller interface were very useful
for earlier computers that did not have a controller available on the
motherboard. Because today's motherboards have the ability to connect four
IDE devices, a sound card with a controller is generally not required.
TIP
EIDE
Most computers have primary and secondary EIDE connectors as part of the
motherboard and BIOS (basic input/output system) setup. It is becoming
commonplace to install CD-ROM drives on the secondary controller.
Audio Capability
Any CD-ROM drive that meets the Yellow Book standards (created by the audio
industry for sound and adopted by the computer industry) has the ability to
play back audio. Most CD-ROM drives contain the circuitry and chips to convert
digital audio data into sound data. Most drives and sound cards also have a
headphone jack, as well as audio jacks to connect to a stereo system. The only
requirement is that the drive support the ISO 9660 standard, also known as
the High Sierra specification, for the file system. The ISO 9660 format is a
standard for writing data to a CD-ROM for use in a cross-platform
environment. This standard is compatible with MS-DOS, Microsoft Windows,
UNIX, Macintosh, and other operating systems.
Access Time
When purchasing or recommending a CD-ROM drive, you need to consider two
values. The first is data transfer rate. The longtime standard for transfer rate
has been 150 KB per second, and this is the basis for measuring CD-ROM
drives today. A 2X CD-ROM drive operates at 300 KB per second, a 4X at 600
KB per second, and so on. A typical CD-ROM drive today will operate at 24X,
32X (4.8 MB per second), or faster. A hard disk drive typically operates
between 800 KB and 1.8 MB per second.
The second value you should look at is the drive's mean access time, the time
it takes the head to move over half the tracks. Typical access time is 200 to
400 milliseconds (ms). Today's CD-ROM drives can have faster data transfer
speeds than many hard drives, but their mean access time is 20 or so times
slower. This means that, although a CD-ROM drive will outperform the hard
disk drive for copying or loading a large chunk of contiguous data, the hard
drive will perform better on random access tasks.
Although the transfer rate increases in multiples, the mean access time does
not. The following table lists transfer rates and access speeds for some
common CD-ROM drives.
Controller Cards
A quick review of how the computer is currently equipped will guide you in the
selection of the proper card. In most cases, there will be a SCSI or IDE
interface available. Whatever card arrangement you choose, be sure to disable
any other possibly conflicting cards. Confirming the extent of the computer's
resources before purchasing a new CD-ROM drive can save you the time and
frustration of having to return or exchange it.
You should select the controller card before buying the CD-ROM drive because
it must be compatible with both the CD-ROM drive and the motherboard's
expansion slot. There are several ways to ensure a proper connection:
You can mount both CD-ROM and DVD drives easily in any computer that has
an open bay for a 5.25-inch disk drive. Physical installation is as simple as
installing a floppy disk drive. Most new drives come with a hardware kit that
includes a combination of screws and brackets.
Make sure you have all the tools and parts before beginning. These include:
The drive
The correct cables
The appropriate hardware (including special mounting rails for the PC's
case)
A flat-head screwdriver
A Phillips screwdriver
Needle-nose pliers or tweezers (for jumper settings)
The cabling for a DVD drive can be a little more complex. Check the
documentation to see how the sound and video are cabled. In some cases you
will have to link the decoder to the video display adapter and link another
loopback to bring the sound through the sound card to the speakers.
If you are adding an IDE-style drive, be sure to set the master/slave jumper as
required (see Lesson 2 of Chapter 9, "Basic Disk Drives"). For SCSI drives, you
must set the proper SCSI ID using either a jumper or switch and make sure
the chain is properly terminated.
Software Setup
The file structure for a CD-ROM or DVD drive is different from the directory
used by the MS-DOS file allocation table (FAT). Therefore, you will need a
special driver for MS-DOS to be able to recognize this device as a drive. A
standard device driver supplied by the manufacturer (for BIOS) might also be
required.
Windows 3.x
Changes to CONFIG.SYS
To load the device driver, type the following line and include the directory
and driver for the CD to be installed. (The exact name and location of
your driver file might be different from what is shown in this example.)
device=C:\CDROM\MTMCDAI.SYS /D:MSCD001
To ensure drive number assignment space, type the following line. (Note
that the last drive letter assignment and, therefore, the number of drives,
can be limited by assigning a lower value letter.)
lastdrive=z
This instruction provides the location of the driver and should include any
switches required to set up the driver. You might have to consult the
documentation for the CD-ROM drive to determine exactly which, if any,
switches are required.
Many CD-ROM drive installation disks will make these changes automatically.
(You can find additional information for configuring CONFIG.SYS and
AUTOEXEC.BAT in Chapter 16, "Operating System Fundamentals.")
Windows 95, Windows 98, and Windows Me use a 32-bit protected-mode driver
called VCDFSD.VXD. This driver replaced MSCDEX.EXE, the MS-DOS real-mode
driver. When adding a new CD-ROM drive after Windows 95 has been
installed, be sure to use the Add New Hardware Wizard. This wizard will
properly identify and set up the CD-ROM drive. With later versions of Windows
that support the Plug and Play feature, installing a new CD-ROM drive is
simple—the operating system will recognize the new drive and run the install
wizard automatically.
NOTE
TIP
You can use a Windows 98 Startup disk to obtain the files required
to recognize a CD-ROM drive. Be sure that the PC has the proper
software licenses to use those files.
The Windows 2000 operating system offers native Plug and Play support for
most CD-ROM drives. Many can also be configured as bootable devices,
allowing you to install the operating system directly from the installation CD-
ROM. If not, you will have to use the startup floppy disk, along with driver
disks from the vendor to complete an initial installation. For adding a new
drive to an existing system, most new products should have the needed
drivers, and many older products will have drivers as part of the operating
system release. Keep in mind that Windows NT was not as widely supported for
multimedia products, so older DVD drives may not have drivers available, or
some of the features (such as playing movies) may not be supported.
Multimedia
The term multimedia embraces a number of computer technologies, but refers
primarily to video, sound, and the storage required by these large files.
Basically, multimedia is a combination of graphics, data, and sound on a
computer. In all practicality, the concept of adding multimedia simply means
adding and configuring a sound card, a video card, and a CD-ROM or DVD drive
to a system.
Video-Capture Software
File editing functions such as zoom, undo, cut, paste, crop, and clear can be
used to edit audio and visual files. Users can also set the compression controls
to the type of format desired and determine the capture rates. The capture
rate for full-motion video (equivalent to what you would find on TV or on the
big screen) is 30 frames per second (fps), but some systems might not be able
to reach this potential. Professional systems include very large, fast hard disk
drives for data buffering. A typical user of video-capture software might realize
a frame-capture rate of only up to 15 fps without adding an arsenal of
hardware to enhance the system.
Lesson Summary
The following points summarize the main elements of this lesson:
IDE drives have been in use since the late 1980s. The purpose of the IDE was
to integrate the drive controller with the drive itself rather than use a separate
controller card. The Advanced Technology Attachment (ATA)—the official name
for IDE drives—standard is based on the original IBM AT standard for hard disk
drives. ATA drives use the same interface command set as the original ST-506
drives and are handled by the system BIOS built into the original IBM AT. ATA
was, and is, a good command set, but its limitations led to its decline as a
viable hard drive interface. These limitations set the stage for the development
of EIDE. The EIDE drive system was developed with two essential objectives:
increasing the size of available disk drives and increasing the speed of data
transfer between the host and the disk drive.
NOTE
These remarks apply only to IDE-style drives. SCSI drives and how
they deal with the size and number of drive issues are covered
later in this chapter.
Number of Drives
The ATA standard allows two hard disk drives to connect to one common
controller. IBM set aside (reserved) I/O address 1FOh and IRQ 14 for the use
of hard disk drive controllers. IBM also reserved I/O address 170h and IRQ 15
for a second controller (two more hard drives). Early computers had no BIOS
support for this second controller. The BIOS installed on newer computers
takes full advantage of both controllers, allowing up to four EIDE devices.
(You'll find a fuller discussion of addresses and IRQs in Chapter 8, "Expansion
Buses, Cables, and Connectors.")
Most SCSI controllers offer the ability to use IRQ 13 for hard disk drive
support without the use of special drivers. To do so, set the SCSI card with
boot BIOS enabled and make sure the hard disk drive is properly formatted for
the operating system in question.
ATA drives transfer data to and from the hard disk drive and memory using
standardized protocols called PIO (Programmed Input/Output) modes. With
PIO, data is exchanged between the main memory and a peripheral device, not
by means of direct memory access (DMA), but with in-and-out instructions
through the central processing unit (CPU). The Small Forms Factor (SFF)
standards committee defined these data transfer rates as PIO mode 0, PIO
mode 1, and PIO mode 2. ATA drives can use PIO mode 0, 1, or 2. With each
improved PIO standard, the efficiency and speed of data transfer increased.
The original ATA drives could transfer data from the hard disk drive to RAM at
a maximum rate of roughly 3.3 MB per second. Speed increases to 5.2 MB per
second, and then 8.3 MB per second and beyond, followed shortly thereafter.
The original controllers allowed only for hard disk drives—and just two of
them. An independent industry group developed the AT Attachment Packet
Interface (ATAPI) to allow non-hard disk drives (CD-ROM drives and high-
speed streaming tape units) access to the ATA interface.
The 528-MB Limit
Early BIOSs had a limitation on the maximum cylinder, head, and sector (CHS)
values allowed, and the ATA standard added to that. As a result, for several
years the maximum hard disk drive size was restricted to 528 MB. The
following table shows how CHS limits are determined.
IMPORTANT
IMPORTANT
The new, super-large hard disk drives might not work with some
older machines. They will run, but will not take advantage of the
extra high capacity.
With LBA:
When the computer boots up, an enhanced drive parameter table is loaded
into memory. When data is transferred, this table intercepts the request and
converts the system's CHS values to LBA values that the computer's BIOS can
handle.
Enhanced CHS is a standard that competes with LBA. This standard allows
drives to be manufactured a little faster and more easily than LBA. IBM and
other manufacturers support this standard.
Fast ATA
Fast ATA uses PIO mode 3, while Fast ATA-2 uses PIO mode 4. It is a
technique used by Seagate Technologies (and others) to compete with EIDE.
Fast ATA drives will support either LBA or CHS drive translation to break the
528-MB barrier.
Logical cylinders, heads, and sectors (LCHS) is a value used by the operating
system (MS-DOS, Windows 95, Windows 98, OS/2, and so forth) to determine
the size of the hard disk drive. Physical cylinders, heads, and sectors (PCHS) is
a value used within the device to determine its size. A translating BIOS and
the operating system use different algorithms to determine the address of the
data.
DMA Transfer
DMA is a transfer method that, although not a PIO mode, also works to
overcome the size limitations of hard disks. DMA bypasses the CPU to transfer
data directly into memory. This is the preferred way to move large chunks of
data in a multitasking environment. UNIX and Windows NT take advantage of
DMA transfers. These transfers can function by using either the DMA controller
on the Industry Standard Architecture (ISA) bus or a bus-mastering controller
that takes over the expansion bus and bypasses the built-in DMA controller.
DMA data transfers can be either 16 bits (single word) or 32 bits (double word)
wide. The transfer width depends on the data bus used—ISA, EISA, or VLB
(see Chapter 8, "Expansion Buses, Cables, and Connectors" for details). DMA
data transfer for ATA hard disk drives is extremely rare.
Be warned, however, that using DMA data transfer can lead to data loss,
although this should be a concern only when transferring partitioned and
formatted hard disk drives between computers that use different BIOSs to
make the translation. The following table shows the various DMA modes.
Depending on the system BIOS, you might not be able to display the entire
size of the drive while in BIOS/CMOS Setup. Check the manual for the BIOS
and operating environment for more details.
The procedures just described will let the system recognize the drive, but the
maximum partition size will still be determined by the operating system in
question. Be sure to check the procedures for the version you will be using
with any third-party software. Newer versions of Windows (98, Me, NT, and
2000) allow very large partitions.
If you use an older version of the MS-DOS FDISK utility to prepare the drive,
you will not be able to use the entire contents as a single volume. If you use
Microsoft's FAT12- or FAT16-based FDISK, the largest single partition will still
be 2.1 GB unless a third-party partitioning program is used. Newer versions of
Windows can access partitions greater than 2.1 GB, but if you plan to use a
dual-boot configuration, be sure that any partition is compatible with the
operating system you want to use to view the files it contains. NTFS and
FAT32 partitions are not visible to older versions of Windows, MS-DOS, or
UNIX.
Ultra DMA
Although questions about the latest incarnation of ATA/DMA drives are not
likely to appear on the current A+ Exam, a good computer technician should
be conversant with them and expect to see them as part of the certification
renewal process. Ultra DMA/33 is a faster drive technology that can be used on
virtually any Pentium motherboard. Ultra DMA/66 offers raw data transfers at
twice the speed of its older DMA/33 sibling. It requires a compatible system
bus on the motherboard (or a special controller card), BIOS, and special IDE
cable certified for that speed. They are easy to identify. One 40-pin connector
is blue, and the other is black. Most are also labeled for Ultra DMA/66.
Installing EIDE Drives
Installing an EIDE drive is similar to installing an ATA drive, but in your
presetup examination, you should consider secondary controllers, proper
translations, and verifying PIO modes on older systems. Before undertaking an
installation, you should collect all the information from the new drive as well
as from the existing drive. Consider all the options on paper before removing
any screws. If you don't have enough information on hand, consult the drive
manufacturer or resources on the Internet. If you are installing a very new
EIDE or Ultra DMA drive on an old system, make sure the motherboard,
Peripheral Component Interconnect (PCI) bus, cables, and IDE interface are
compatible with the drive specification.
Secondary Controllers
Many EIDE I/O cards support secondary controllers, allowing for up to four ATA
devices, as mentioned earlier. Before installing a card, be sure that jumper
settings are set properly (see Figure 10.2). Secondary controllers are always
set at I/O address 170h and IRQ 15.
Many cards come preset with the secondary controller disabled. Also check the
advanced CMOS settings to make sure that any secondary controller enable/
disable options are set to enabled.
NOTE
Some EIDE controller cards require that the CMOS options for
secondary port hard disk drives be left as "Not Installed." Be sure
to read all documentation that comes with these cards.
LBA or CHS?
Most BIOSs can support both LBA and CHS. Enhanced BIOS allows the system
to get around the MS-DOS limitation of 528 MB per hard disk and is the
easiest way to install an EIDE drive. An enhanced BIOS will support either the
Western Digital LBA mode or the Seagate Extended CHS mode.
NOTE
What if a computer does not support either CHS or LBA? Most newer, large-
capacity drives will provide a disk manager disk, or the ability to make one
from the drive itself. (If the information is on the disk, you will be able to
access a small MS-DOS partition with the data. The instructions for accessing
this data are very specific and must be followed according to the
manufacturer's requirements.) This software, when installed properly,
performs the same task as CHS or LBA. When using this method, you need to
first answer this question: Is the drive in the master or slave position?
There are some drawbacks to using this method rather than LBA or CHS:
Microsoft no longer supports the use of DDO software.
When booting up from a floppy disk, for the hard disk drive to be
accessible, the device must be loaded from the floppy disk's CONFIG.SYS
file.
A virus might attack the master boot record, where this file resides. This
can cause serious problems and at the very least will require
reinstallation of the DDO file. Always keep a bootable, virus-free floppy
disk on hand.
The driver that allows use of a large hard disk drive might also use a
large chunk of conventional memory. The trade-off might not be worth it.
Many hard disk drive repair programs cannot be used with DDO.
The software might cause conflicts with the operating system or other
drivers.
There are five PIO modes. A drive must be set properly to achieve the best
performance. The following table shows the parameters of PIO modes.
CAUTION
The maximum achievable PIO will be limited by the slowest
component. Setting a mode that is too fast will not damage the
driver, but it might damage your data.
Determine the PIO of the drive. This is preset by the manufacturer and
cannot be changed. See the documentation that comes with the product
or visit the vendor's Web site for details if it is not on the drive or handled
by the system BIOS.
Determine the fastest speed your controller can handle. Most hard disk
drives can support PIO mode 2. If you're using an ISA card, PIO mode 2 is
the highest PIO available. The two fastest PIO modes, 3 and 4, must be
run from either a VESA local bus (VLB) or a PCI controller. Be careful
with on-board controllers! On PCI systems, almost all on-board controllers
are PCI; on VESA machines, they are VLB.
Use the BIOS Setup program to adjust the CMOS settings. If auto setup
(where the firmware can auto-detect the drive parameters and set the
BIOS) is available, use it.
PIO modes 3 and 4 use a hardware flow control called IORDY (I/O
ReaDY), also known as IOCHRDY. This setting allows the drive to slow
down the data transfer as the head moves across the disk.
Other Settings
There are several other drive settings that are not necessarily limited to EIDE
but are generally associated with these larger hard disk drives.
The ATA standard requires each drive to activate its IRQ (see Chapter 8,
"Expansion Buses, Cables, and Connectors" for details of IRQ) every time it
sends one sector of data. This process helps to verify good data transmission,
but it slows down the computer. Multiple block reads speed up the process by
reading several sectors of data at a time.
Many BIOS chips have multiple block read as an advanced feature. Enabling
multiple block read can be done with third-party utilities as well. Multiple block
read can also be installed using a device driver that comes with a hard disk
drive controller. Always use multiple block read, if possible.
32-Bit Access
Providing 32-bit disk access is a major speed improvement over MS-DOS for
the Windows 3.x and Windows for Workgroups 3.11 environments. Every time
an operation is performed under Windows, Windows must use the BIOS
routines to access the hard disk drive. To do this, it creates a virtual MS-DOS
world, a "bubble" of conventional memory that looks and runs just as if the
machine were running MS-DOS.
Enabling 32-bit file access allows later versions of Windows 3.x to talk directly
to the ROM BIOS, using a protected-mode driver called VFAT.386 (found in the
Windows\System directory). VFAT.386 is loaded using the [386Enh] section of
the SYSTEM.INI file. With the 32-bit file loaded, Windows does not have to
create an MS-DOS "bubble" to talk to the hard disk drive.
device=c:\windows\ifshlp.sys
into your CONFIG.SYS file. This loads the 32-bit file access driver.
2. In the SYSTEM.INI file, add two lines to the [386enh] section:
device=vfat.386
device=vcache.386
NOTE
There are some other potential problems with Windows 3.x and large drives.
Windows 3.x uses a file called *WDCTRL for 32-bit disk access. This file is
enabled from the SYSTEM.INI [386enh] section. This driver predates LBA and
will generate the error: "32 file access validation failed." If this happens,
*WDCTRL needs to be updated. Most EIDE controllers and all drives now come
from the factory with a software disk that should include the latest drivers. If it
is not available on your disk, look up the Web site of the hard disk drive
manufacturer and download the driver.
Whenever possible, check the CMOS, look for a 32-bit disk access option, and
enable it.
Lesson Summary
The following points summarize the main elements of this lesson:
Originally, hard disk drives were limited to storage capacity that did not
exceed 528 MB.
Using new technology, the old hard disk drive limit has been exceeded.
Modern computers allow up to four IDE drives to be installed on built-in
controllers.
Properly setting PIO will enhance the performance of a drive.
32-bit disk access provides a major speed improvement for disk drives.
3 4
Lesson 3: SCSI Drives
SCSI has become the mass-storage device of choice for large network
installations. SCSI, first introduced in Lesson 2 of Chapter 9, "Basic Disk
Drives," has many advantages over standard IDE and EIDE drives. SCSI is the
favored drive for high-end workstations, network and Internet servers, and the
Macintosh line of personal computers. In many installations, the advantages
far outweigh the slight extra effort in configuration. In this lesson, we explore
the advantages and uses of a SCSI system.
At its core, SCSI is a simple design. A single card, the host adapter (or a chip
set on the motherboard) connects up to 15 devices. These devices can be
attached inside or outside the PC using standard cables and connectors. SCSI
is the only interface that can connect such a wide variety of devices.
Communication between the devices and the host adapter is done without
involving the CPU or the system bus until data must be passed to one or the
other.
This design frees expansion slots and reduces the number of interrupts and
memory addresses needed, while cutting down the number of drivers required.
Less robust solutions, such as IDE and EIDE, are little more than switching
stations, relying on the PC's CPU to manage the data bus. SCSI host adapters
are true subsystems with advanced commands that can order and route data
to improve performance.
SCSI-1
In the late 1970s, Shugart Associates developed an interface to handle data
transfers between devices, regardless of the type of device. The interface
operated at the logical—or operating system—level instead of at the device
level. This new interface was called the Shugart Associates System Interface
(SASI)—the precursor to SCSI.
SCSI-1 supported up to seven devices on a chain (plus the host adapter), each
of which transferred data through an 8-bit parallel path. Compatibility of SCSI
drives was nearly impossible because many SCSI devices had their own
custom commands on top of the limited SCSI standard.
You might encounter older SCSI adapters, drives, and peripherals that are
based on the original SCSI-1 standard. In reality, this standard amounts to
little more than a few agreed-on commands. The wide range of proprietary
drivers, operating system interfaces, setup options, and custom commands
made true compatibility a real problem and gained SCSI a bad reputation on
the PC platform. It was, however, popular with Apple and UNIX developers,
who could work with a limited range of devices.
One of the most important parts of the SCSI-2 specification is a larger (and
mandatory) standard command set. Recognition of this command set (18
commands) is required for a device to be SCSI-2 compliant. The Common
Command Set (CCS) made compatibility of multivendor devices possible. The
CCS also introduced additional commands to more easily address devices such
as optical drives, tape drives, and scanners.
Fast SCSI-2
This standard uses a fast synchronous mode to transfer data, doubling the data
transfer speed from 5 MB/s to 10 MB/s. Wide SCSI doubles that again.
Plug and Play SCSI adapters first arrived with the advent of the SCSI-2
standard. Today, all new SCSI host adapters are Plug and Play. The SCSI-2
standard took a long time to gain final approval, requiring agreement by many
vendors. As a result, you might run into products labeled "Draft SCSI-2." In
almost all cases, you can get these products running on any SCSI-2 or later
system if you get the appropriate drivers from the vendor or the maker of the
host adapter or operating system.
SCSI-3
To speed the pace of development, the SCSI Committee approved a "fast-
track" system for the SCSI-3 standard. A subcommittee handled most of the
work, and new subsections were adopted without waiting for the publication of
the entire SCSI definition.
That bright idea, plus the advent of the PCI bus and mature Plug and Play
operating systems, has made it easy to install components and has given users
excellent control and flexibility. All SCSI-3 cards have ways to support existing
SCSI-2 devices. Some of the highlights of current state-of-the-art SCSI
technology on the desktop include the following seven features.
High-Performance Products
The success and stability of the SCSI standard makes it an ideal platform for
developing high-performance products. SCSI's robust, reliable interface and
advanced commands allow manufacturers to build "best-of-breed" products to
take advantage of its power. The fastest hard disk drives and CD-ROM devices
traditionally show up first, sporting a SCSI interface. The most advanced
scanners are SCSI-based, and many optical products come only in SCSI
versions. Even when non-SCSI versions reach the market, they generally
underperform their SCSI siblings.
Simple Expansion
Advanced Management
SCSI products generally offer a range of tools to tune the bus and devices
attached to it. For example, many host adapters have firmware that provides
the ability to format and inspect hard disk drive reliability and define custom
settings for each device on the chain. Operating system utilities are provided
to check the status of a device and enable advanced features.
SCAM Support
SCAM stands for "SCSI configured auto-magically." Most new SCSI products
are SCAM-enabled, meaning that the user does not have to worry about
setting the ID numbers for them because they will configure themselves using
an open ID position on the SCSI chain.
NOTE
Connect/Disconnect
SCSI devices with this feature can reorder how blocks of data are moved on
the bus to speed transfer. This function compares to letting a shopper with
only a few items move to the head of the checkout line to reduce the average
wait time per shopper.
The table below offers a quick guide to the basic differences between SCSI and
IDE.
Ultra
Feature SCSI
DMA/IDE
Devices per channel 7/15 per chain 2 per chain
66 MB per
160 MB per second (Ultra
second (Ultra DMA)
160) 33 MB per
Maximum potential throughput for
major classes of SCSI and IDE 80 MB per second (Ultra
second (Ultra2) DMA)
40 MB per 16.7 MB per
second (Wide second (Fast
SCSI) ATA)
Internal and
Connection types Internal only
external
True bus mastering Yes No
Operate more than one I/O device at a
Yes No
time?
Advanced commands (such as tag
command queuing, Yes No
connect/disconnect)
Noise and SCSI
Any electrical signal other than data is called noise. Due to the many signals
and electrical devices present, the interior of a computer is a noisy place.
Computer manufacturers do many things to contain the noise inside the case,
including adding shielding and grounding. Anything inside, or directly
connected to, a computer is either a contributor to or a victim of the noise.
Because of the high data transfer speed, products using the SCSI-2 and later
standards can be very sensitive to noise. Cables tend to act as antennae for
noise. For this reason, proper cabling and minimizing of cable length are
needed to maintain low noise in a SCSI system. Any noise spread through
either the electrical power cables or the data cable is called common-mode
noise.
CAUTION
Here are some ways to correct the problem after you've found it:
Look in the manuals or Readme files of both devices. The problem might
be a common one with a known solution.
Try a variety of switches to see if any of them solves the problem.
Attempt to find an updated driver for one or both of the devices (the
Internet is a good place to look).
If none of those solutions fixes the problem, you might be forced to
choose between the devices or go to a multiple boot configuration.
Memory Management
SCSI host adapters typically have their own ROM chips. For MS-DOS systems,
put the appropriate "X=" statements in the EMM386.EXE line of the
CONFIG.SYS and the appropriate EMMEXCLUDE= statement in the SYSTEM.INI
file. (For more details about configuring these files, see Chapter 16,
"Operating System Fundamentals.") A missing or erroneous "exclude"
statement can cause intermittent lock-up problems.
Costs and Benefits of SCSI
Initially, the cost of a SCSI system and SCSI devices is greater than the costs
involved in IDE. However, there are several environments in which a SCSI
system might justify the increased cost. Some ideal uses for SCSI include:
File servers
Workstations (both graphical and audio)
Multitasking systems
Systems moving large amounts of data among peripheral devices
Systems with a large number of peripheral devices
Systems requiring fault tolerance (mostly file servers)
The Future of SCSI
SCSI continues to be the device of choice for systems in which speed and
compatibility are important. The ability of the SCSI format to provide fast and
efficient fault tolerance for network systems through the use of redundant
array of independent disks (RAID) will keep it the drive of choice for networks.
Although it is not required, the SCSI drive is generally preferred over IDE by
Windows NT and 2000 system designers for its performance and flexibility.
SCSI continues to be more expensive than IDE, but SCSI's ability for RAID, hot
swapping (changing drives without shutting down a system), and machine
independence will keep it popular for workstations and servers.
SCSI cards come in a wide variety of sizes, shapes, and configurations. Some
offer one connection, whereas others have four. Options include secondary or
even tertiary channels—RAID, cache RAM, and so forth. Be sure that the card
will be able to service the devices planned for it. Begin by setting the jumpers,
then install the SCSI adapter card in the appropriate expansion slot.
External devices usually use some form of switch to set the ID. Most allow
setting IDs from 0 through 7 only. You might need to adjust that with internal
devices that often allow a wider range of ID numbers. Cable types include 50-
pin Centronics type, SCSI-2 D-Shell 50, and 68-pin type connectors. Make
sure the last device in the chain is properly terminated.
Internal SCSI devices are installed inside the computer and are connected to
the host adapter through an interior connector on the host adapter. Check the
connection diagram to be sure the fitting is the right one for that type of
device. The options are a 50-pin ribbon cable (similar to a 40-pin IDE cable)
and two similar 68-pin cables. Be sure to use the right type of 68-pin cable:
One is for ultra-low voltage differential and the other is for single-ended
drives. They are not interchangeable.
IMPORTANT
It is good practice to connect the power to one device, power up, and check for
problems. Power up additional devices one at a time and make sure everything
is working and without conflict.
Finally, load any software required to allow the operating system to recognize
the new hardware and take full advantage of its features.
Using a cable with enough connectors enables you to easily link multiple
internal devices. You can have up to eight (numbered 0–7) devices, or 16
(numbered 0–15, depending on the host adapter and the devices) on a single
SCSI chain. Don't forget that the host adapter takes up one position in each
SCSI chain. Figure 10.3 shows a SCSI chain.
Figure 10.3 SCSI chain
CAUTION
If you plan to utilize a SCSI drive as your C drive (this is required if you want
to boot from this drive), it must be configured as a bootable drive. You can do
this by either specifying the host adapter as the "bootable" SCSI ID or setting
the host adapter to emulate a standard AT-style controller.
Logical Unit Numbers
It is possible to have a single SCSI ID support more than one device. Logical
unit numbers (LUNs) can be used to provide a unique identifier for up to seven
subunits per ID number. These are used primarily in hard disk drive arrays to
create one large logical drive out of several smaller physical drives. LUNs
require highly specialized software and are most often found in network
servers running Novell NetWare, Windows NT, Windows 2000, or UNIX.
Termination
Whenever you send a signal through a wire, some of that signal will reflect
back up the wire, creating an echo. To terminate a device simply means to put
a terminating resistor on the ends of the wire. The purpose of this terminator
is to prevent the occurrence of this echo. Two kinds of termination are used in
SCSI technology: active and passive. Most older (and all SCSI-1) devices use
passive termination. Proper termination of a SCSI device requires special
consideration. Older hardware can be damaged by improper termination but,
more often, lack of proper termination will result in a boot failure or the failure
of the system to recognize a device that has been connected to the SCSI
chain.
Most new SCSI host adapters are equipped with autotermination circuitry,
which polls the chain and sets the proper termination at their ends (or
middles). On older cards, you might have to set jumpers. Check the manual
for any SCSI device you are installing for instructions on how to set
termination and ID before powering it up.
Lesson Summary
The following points summarize the main elements of this lesson:
CD-ROM data transfer rates are based on a factor of 150 KB per second.
Before a processor can access a CD-ROM drive, the proper drivers must
be loaded.
To run a CD-ROM drive from MS-DOS, the real-mode drivers must be
loaded.
CD recordable technology allows end users to create their own CD-ROM
disks using a variation of write-once, read many.
CD RW (read/write) takes CD recordable one step further with CD platters
that can incorporate write-many, read-many.
DVD is an extension of CD-ROM technology, allowing a much more
densely packed disk.
DVD can be used to store data, multi-media, and full-length motion
pictures with multiple soundtracks.
For many years, hard disk drives were limited to 528 MB.
There are four ways to overcome the 528-MB barrier: LBA, Enhanced
CHS translation, Fast ATA, and DMA transfer.
EIDE controllers and I/O cards support up to four EIDE drives including
hard disk drives, tape drives, CD-ROM drives, and removable disk drives.
SCSI Drives
SCSI chains can have up to 8 devices, including the host adapter (or 16,
depending on the configuration) connected together.
SCSI chains must be terminated at both ends.
Each device in a SCSI chain must have a unique ID.
RAID uses SCSI drives to provide improved data storage and fault
tolerance.
3 4
Review
5. Sometimes the SCSI device driver conflicts with other drivers. What steps
need to be taken to resolve the problem?
10. Why would you use the MSCDEX.EXE real-mode driver with Windows 95?
11. Instead of using magnetic energy for storing data, a CD-ROM uses
___________________ technology.
Answers
3 4
Chapter 11
The Display System
About This Chapter
Early personal computers employed text-based displays, offering green, white,
or amber characters against a black background. Today the average PC
monitor can provide life-like colors and reproduce images of near-photographic
quality. In some cases, more compact flat-panel displays have replaced bulky
monitors. This dramatic change is the result of radical improvements in
monitors and the display-adapter technology that drives them. This chapter
discusses how these devices work in unison to provide an acceptable display
for applications ranging from simple desktop productivity tools like word
processors to advanced graphics workstations that can create life-like
animations for big-screen movies.
Before You Begin
An understanding of the principles of memory, expansion bus types, and
expansion cards is essential. If you need a refresher course on these subjects,
review Chapter 7, "Memory," and Chapter 8, "Expansion Buses, Cables, and
Connectors."
3 4
Lesson 1: Monitors
In this lesson, we discuss today's most obvious and necessary computer output
device: the display screen. For most desktop users, this is a monitor. It is
important for the computer technician to understand the basics of how
monitors work and how they are adjusted. In many cases, a simple
modification can correct a problem; in others, the intervention of a specially
trained technician is required. This lesson focuses on traditional monitors,
which still have the lion's share of the display device market.
CAUTION
The CRT
The wide end of the CRT is the display screen, which has a phosphor coating (a
substance that can emit light when hit with radiation). When active, the guns
beam a stream of charged electrons onto the phosphorus coating. When the
coating is hit with the right amount of energy, light is produced in a pattern of
very small dots. This same technology is used in X-ray imaging, oscilloscopes,
and other CRT devices. Similarly, monitors emit X-radiation. There is one dot
for each primary color (RGB), and the dots are grouped in patterns close
together. The name for a collection of all dots in a specific location is a pixel
(which stands for picture element).
The human eye perceives the collection of pixels painted at the front of a CRT
as a compound image, in much the same way as it interprets the pattern of ink
dots in a newspaper halftone as a photograph. The term persistence is used to
define how long the phosphors on the screen remain excited and emit light.
The image on the screen is not painted all at once. The stream is directed in
rows, usually starting in an upper left corner. A series of raster lines are drawn
down the face of the screen until the beam reaches the lower right, whereupon
the process starts over. The persistence rate (how long a given line is visible)
must hold for long enough to allow formation of a complete image, but not so
long that it blurs the dots painted in the next pass.
These raster passes take place very quickly. The time required to complete a
vertical pass is called the vertical refresh rate (VRR); the time required to pass
once from left to right is known as the horizontal refresh rate (HRR). Generally
speaking, faster is better. If the vertical rate is too slow, it can cause flicker,
which is not only annoying, but can lead to eye strain. The larger the CRT, the
faster the refresh rate must be to cover the entire area within the amount of
time needed to avoid flicker. At 640 × 480 resolution, the minimum refresh
rate is 60 Hz; at 1600 × 1200, the minimum rate is 85 Hz. Both the monitor
and the display adapter produce the refresh rate, shown in Figure 11.1.
Early monitors had fixed refresh rates. In 1986, NEC introduced the first
multifrequency monitor that could automatically adjust the refresh rate to take
advantage of the highest rate supported by the display adapter of that time.
NEC used the term "MultiSync" to trademark name its line of multifrequency
monitors. Today, this feature is standard on most monitors.
CAUTION
Do not exceed the approved refresh rate for a monitor, even if the
adapter can produce a higher scan of the screen. The result will be
an unstable or unreadable image, which can damage a monitor
very quickly.
The direction and point of contact of the electron stream on the phosphor
display are determined by deflection coils coupled with a series of magnetic
fields generated by a ring of electromagnets placed around the narrow end of
the tube. This collection is called the yoke, because it forms a yoke around the
tube. Figure 11.2 shows a cathode-ray tube.
NOTE
The CRT-based monitor has been around for a long time; recently,
its successor, the liquid crystal display (LCD) monitor, commonly
found on laptop computers, has started to show up on desktops
(although its high price has limited its impact on the monitor
market).
The term resolution refers to the degree of detail offered in the presentation of
an image. The method of measurement varies, based on the medium—
photographic lenses, films, and paper are measured using lines per inch,
whereas computer monitor manufacturers express resolution in pixels per
inch. The greater the number of pixels per inch, the smaller the detail that can
be displayed and, consequently, the sharper the picture.
Dot pitch is a term used to define the diagonal distance between the two
closest dots of the same color, usually expressed in hundredths of millimeters
(see Figure 11.3). For example, you might see .25 dot pitch. Generally
speaking, the smaller the pitch, the greater the number of dots, and the
sharper the resulting image. The values for dot pitch are generally reflected in
the monitor's price, and they are getting smaller as manufacturing technology
improves. You should match the monitor's dot pitch and maximum resolution
numbers to the needs of the customer, and install a graphics display card that
will meet or exceed them.
NOTE
Do not confuse pixels with dots. A pixel is the smallest image unit
the computer is capable of printing or displaying. It is usually the
first number given in screen resolution: horizontal pixels ×
vertical raster lines. For example, 640 × 480 is the standard VGA
resolution of 640 pixels per line, 480 lines deep.
There is a direct link between the size of the picture tube and the cost of the
monitor. The CRT is the most expensive part of the monitor. Graphical user
interface (GUI) operating systems have increased the demand for bigger
screens, to allow for more working area so that users can have more
applications open at once or more working room for graphics.
Bandwidth
Interlacing
Interlacing refreshes the monitor by painting alternate rows on the screen and
then coming back and sweeping the sets of rows that were skipped the first
time around. This increases the effective refresh rate but can lead to eye
strain. Interlacing is found on less expensive monitors, and it should be
avoided unless achieving the very lowest initial cost is the client's key concern.
Power-Saving Features
Because they are the highest consumers of electrical current in the average
PC, most new monitors provide some level of power-saving technology.
Consequently, VESA (the Video Electronics Standards Association) has
established a standard set of power economy controls to reduce power use
when the monitor is idle. These are collectively referred to as DPMS (Display
Power Management Signaling) modes.
DPMS technology uses monitors to gauge activity levels of the display. If there
is no change in the data stream from the adapter, as set in either the BIOS
(basic input/output system) or operating system controls, the monitor is
switched to inactive status. The goal is to reduce power consumption while
minimizing the amount of time required to restore the display to full intensity
when needed. The following table lists DPMS stages, arranged in order from
most to least power used.
Horizontal
Allows the image to be horizontally centered.
center
CAUTION
When using the degaussing button, hold it down for only one or
two seconds; longer use could harm the monitor.
Some monitors offer advanced adjustment screws that allow the user, without
opening the monitor shell, to tune the settings that are usually available only
with interior controls. Adjust these tools only if you understand the process
and after you have reviewed the instructions in the product's manual. Any
internal repairs or adjustments to the monitor that require opening the shell
should be left to technicians with the appropriate tools and training.
CAUTION
Monitor Maintenance
Monitor care and troubleshooting are usually simple tasks. Here are some
general guidelines to follow:
With all those advantages, it would seem that only cost (they are much more
expensive than CRT solutions) keeps them from sweeping the market. Not so.
All technology has its pluses and minuses, and FPDs are no exception.
Take viewing angle, for example. If several people look at a CRT screen at
angles up to 50 degrees off the center, they will all experience the same image
—unless glare from a bright light source is reflected in someone's eyes. FPDs
have limited optimal viewing angles, usually much narrower than CRTs.
Most FPDs also lack the range of resolutions of their CRT-based kin. To drive
them, you will need a digital graphics adapter that is tuned to that FPD. The
limited choice means an upgrade will usually require the purchase of a new
card, and the cost will often be greater than a similar card for a comparable
CRT monitor. The following table highlights the differences between FPD and
CRT technology.
Type of
FPD CRT
Display
More expensive, few Wider range of vendors,
manufacturers; less lower initial cost; high cost
Cost
expensive to operate due to to operate due to higher
lower power consumption electrical power demands
Limited selection of display Wide range of display
Compatibility adapters, fewer supported adapters and drivers for
resolutions most popular resolutions
Flicker-free operation at all No fall-off of image quality
resolutions; better at reasonable viewing
Ergonomics brightness and contrast at angles; wider range of
optimal viewing angles; no resolutions to meet user's
noticeable distortion at needs and working
edges conditions
Smaller "footprint" on desk, Larger for given screen size,
Size
lighter weight much heaver construction
Electron gun and phosphors
Lower radio and virtually no create both RFI (radio
Emissions
magnetic emissions frequency interference) and
radiation
How Flat Panels Work
FPDs create an image made of pixels, just like their CRT counterparts, but they
use different technology to accomplish that task. Several different types of
FPDs are available today, varying in cost, image quality, and several other
factors that affect both suitability to different computing applications and user
acceptance.
The filters are set at a 90-degree angle to each other. In an uncharged state
(no current applied), the crystals are aligned so that light can pass through the
top filter. When a current is added, the crystals align to the electric field,
blocking the transmission of light. Not all LCD panels are created equal. The
greater the twist angle, the higher the contrast and the more responsive the
display is to changes in current.
Color light-emitting diode (LED) displays have three adjoining cells, each
equipped with a different color filter: one red, one blue, and one green. This
allows a display that makes use of the RGB color system.
There are several different types of LCD displays, varying in quality of output
and cost. Passive-matrix displays (PMDs) are the simplest, and they have been
used in calculators and watches since 1970. PMDs are too slow for today's
demanding multimedia PCs.
Active-matrix displays use TFTs (thin film transitors; TFT also describes this
type of display) at each pixel to control each pixel's on_off state. TFT makes up
the majority of both laptop and desktop FPDs today. The image is formed by an
array of LCDs on a wire grid. The result is a faster response than the passive
array.
Emerging Flat-Panel Technologies
Electroluminescent Displays
Plasma display panels (PDPs) work much like the fluorescent lights found in
most offices by energizing an inert gas. Phosphor films are used to produce a
color image. This technology is used to manufacture very large FPDs. Like
fluorescent lights, PDPs are relatively inexpensive to produce, but lower
contrast and brightness, as well as higher relative power consumption, have
thus far limited their use for PC applications.
Installing and Maintaining FPDs
In most respects there are few differences between adding and using an FPD
and adding and using a traditional CRT monitor. Add the display card to the
computer if the existing one is not compatible. Attach the cables, load the
proper driver, then make any resolution and color adjustments needed for a
proper display. Finally, adjust the brightness and contrast to comfortable
levels.
You will need a compatible display card, the appropriate cables (power and
display, usually supplied with the product), and drivers for the operating
system involved. Be sure the drivers are available for the operating system
before promising to add an FPD for a customer. Older operating systems may
never have drivers, and some versions of new operating systems may not
have enough sales in the right market segments to warrant the added cost to
the vendor.
NOTE
Due to the need for special cables, multisystem switches that allow
one display to be used with several computers may not be
compatible. You will need to take extra care to ensure that the
placement of the case and the display are within reach of the
cables. Some FPDs are designed to sit next to the computer, and a
tower case on the other side of a desk may be too far away.
There is little involved in maintaining an FPD. Wipe the screen with a dry, soft
cloth (per vendor recommendations) if the unit becomes dusty. Never use any
commercial cleansers or fluids on or near the screen. The unit should be
plugged into a properly selected and maintained UPS (uninterruptible power
supply) or surge protector to ensure a clean and safe electrical current.
Lesson Summary
The following points summarize the main elements of this lesson:
The two "official" video cards for the early 8088-based IBM personal computers
(the PC and XT) were matched to the limited capabilities of the early monitors.
The MDA (Monochrome Display Adapter) offered a simple text-based
monochrome display. This adapter produced an 80-character-wide row of text
at a resolution of 720 × 350 pixels. Shortly after that, the CGA
(Color/Graphics Adapter) card appeared, providing up to four "colors"
(actually, just different intensities of the monitor's active color: amber, green,
or white). In four-color mode, CGA provided a resolution of 320 × 200 pixels.
Using just two colors allowed a resolution of 640 × 200 pixels.
With the release of the EGA (Enhanced Graphics Adapter) card, the IBM PC AT
became the first PC with the actual capability to use color. This adapter was an
improved version of CGA, offering a top resolution of 640 × 350 with 16 colors
in text-only mode, and 640 × 200 with two colors in graphics mode. The EGA
also ushered in the era of video conflicts. It was not fully backward-compatible
with CGA and MDA, and some programs would display improperly or even lock
up the system. The MDA, CGA, and EGA cards all shared the same connection,
a 9-pin d-shell, male fitting.
The human eye can distinguish 256 shades of gray and about 17 million
variations of color in a scene, the minimum required to produce true
photographic realism on a screen. EGA did not even come close. Its aim was to
offer the ability to incorporate color in pie charts and other forms of business
graphics. Although the first graphics programs came about to make use of the
EGA's graphics capability, serious computer graphics had to wait for better
hardware.
A brief digression to explain pixel depth and video memory demands will help
you understand what follows. Both the MDA and CGA adapters were equipped
with 256 KB of dynamic RAM (DRAM). The amount of memory on a display
card determines the amount of color and resolution that it can image and send
to the monitor. As the desire for better graphics and color displays increased,
so did the complexity of graphics cards, and with them, memory requirements
and cost.
Remember that the image on the monitor is a collection of dots called pixels.
Each image placed on the screen requires that code be placed in the adapter's
memory to describe how to draw it using those dots and their position in the
grid. The MDA cards featured a lookup table for each character. For MDA
adapters, a code number for that symbol and each position on the grid was
stored in memory, and the card had a chip set that told it how to construct
each of those items in pixels. The MDA and CGA cards each had 256 KB of
memory, just enough to map the screen at their maximum resolution. That's
why the CGA card had two different modes: the more colors were used, the
more memory was required. When it displayed four colors instead of two, the
resolution had to drop.
The MDA card was a 1-bit device. In other words, each pixel used 1 bit, valued
either 0 or 1 to represent whether a given position on the screen (a pixel) was
on or off. To represent colors or shades of gray, a card must use memory to
describe color and intensity. This attribute of the display, measured in bits, is
known as color depth. Color depth multiplied by resolution (the number of
horizontal pixels multiplied by the number of vertical rows on the screen)
determines the amount of memory needed on a given display adapter.
The adapters that followed the EGA cards to market all offered more colors
and, very quickly thereafter, higher resolution. That, in turn, required more
processing. The MDA, CGA, and EGA cards all relied on the host computer's
CPU (central processing unit). Although that was sufficient in the days before
widespread use of graphical interfaces and lots of color, with the advent of the
GUI, all that changed.
The new generation of display cards started the practice of including their own
display coprocessors. Coprocessors, which have their own memory, are tuned
to handle tasks that would usually slow down the PC, and many display cards
use bus mastering to reduce the amount of traffic on the system bus and to
speed display performance. Video coprocessing is also called hardware
acceleration. This process uses one or more techniques to speed up the
drawing of the monitor image. For example, one or more screen elements can
be described without using calculations that have to determine the placement
of every pixel on the screen.
These new graphics chips were designed to do one thing: push pixels to the
screen as efficiently as possible. At first, the cards that used them were
expensive and often prone to memory conflicts with the host CPU. Their
growing popularity led to rapid advances in design. In the mid-1990s, a new
graphics card was introduced on the market almost every day, and a new
processor almost every ten days.
One reason for the demise of the PGA was the advent of the VGA (Video
Graphics Adapter) standard. All the preceding cards were digital devices, but
the VGA produced an analog signal. That required new cards, new monitors,
and a 15-pin female connector. Developers were then able to produce cards
that provided the user with up to 262,144 colors and resolutions up to 640 ×
480.
The VGA card quickly became commonplace for a PC display system, and the
race was on to produce cards with more colors, more resolution, and additional
features. VESA agreed on a standard list of display modes that extended VGA
into the high-resolution world of color and photographic quality we know
today, known as SVGA (Super Video Graphics Array). The SVGA set
specifications for resolution, refresh rates, and color depth for compatible
adapters. On Pentium and later PCs, an SVGA adapter is the minimum
standard for display systems. The lowest resolution needed for SVGA
compatibility is 640 × 480 with 256 colors, and most modern adapters usually
go far beyond that. The other standard SVGA resolutions are 800 × 600 and
1024 × 768. High-end systems with large monitors are sold at 1600 × 1200
resolution at high refresh rates.
High Color, True Color, Photo-Realism, and Multimedia
Displays
The SVGA specification for 256 shades of gray is one of the basic SVGA
specifications for true photographic reproduction of monochrome images; it's
the number of shades that the human eye expects in a grayscale photo. Color
requires the same number of shades for each color in the image to achieve the
same level of visual realism. To get 256 shades requires an 8-bit memory
address system inside the card (28 = 256). In the early days of SVGA, vendors
worked to increase color quality without significantly increasing cost.
In color mode, an 8-bit card can't display all the colors in a full-color picture,
so a lookup table is used to figure the closest match to a hue that can't be
represented directly. Although this method isn't ideal, it was, for several years,
state of the art on desktop PCs. Then, early in the era of the 80486 processor,
came the 16-bit SVGA card, which allowed approximately 64,000 colors. More
bits require more memory, more processing requirements, a larger lookup
table, and a higher cost. These cards were designed to be used with larger
monitors, 15 to 17 inches at 800 × 600 or 1024 × 768 resolution. The new
systems were too expensive for average users, but graphics professionals and
power users generated a large enough market to fuel development.
Short-Lived Standards
During the early days of VGA and SVGA, three other graphics-card standards
were introduced by IBM for the PS/2. Although they never gained significant
market share or full support among adapter developers, they did increase the
demand for higher resolution and faster performance. The following list
highlights these three standards and their role in the evolution of PC graphics
standards:
True-color cards originally sold for $3,000 or so, but within two years, prices
dropped under $800. These cards are now available for $150 or less. To add
value, the better cards now have TV output ports that send an NTSC (National
Television Standards Committee) signal that can be used to record images
from the monitor onto a VCR or TV set. Multimedia cards are equipped with a
TV tuner, letting the owner view TV programs on the monitor or watch DVD
(digital video disc) movies on a PC. The dramatic cost reduction and added
features result from the mass production of the coprocessors—which reduced
their cost to the manufacturer—along with the decreasing cost of video
memory.
Video Memory
As mentioned earlier, the amount of memory on a display adapter is a major
factor in determining the screen resolution and color depth that the card can
manage. Just as with system RAM (random access memory), the video
memory must be able to operate at a speed that can keep up with the
processor and the demands of the system clock. If the display adapter is too
slow at updating the image on the monitor, the user is left waiting or is
presented with jerky mouse movements and keystrokes that appear in delayed
bursts rather than as typed.
Early video cards used fast page-mode RAM (FPM RAM), a series of chips that
were basically the same as the RAM used on the early PC's motherboard. This
memory form was fine for MDA and CGA cards, and even the 8514/A, but with
the higher resolution, increasing pixel depth, and faster refresh rates of VGA
displays and beyond, vendors sought improved memory models to get
maximum performance out of their video coprocessors.
Video RAM
Enter dual-ported memory in the form of video RAM (VRAM). It can read and
write to both of its input/output (I/O) ports at the same time. It allows the
processor to talk to the system bus and the monitor simultaneously: fast, but
very expensive. VRAM showed up in the best cards, but vendors wanted a low-
cost option as well. Some vendors just used FPM RAM, leaving the user to
discover that, at high resolution, the display was too slow for efficient
operation. These cards did sell well in the low-end market, as they allowed the
budget-minded user to operate in low-color modes for most tasks, switching
only to higher color depth for projects that required high-color or true-color
mode. Users who regularly worked in high-color or true-color mode often
quickly considered an upgrade.
EDO DRAM
An alternate is EDO DRAM (extended data out DRAM), which can begin reading
a new set of instructions before the preceding set of instructions has been
completed. This is a common form of system DRAM that boosts performance to
about 15 percent above conventional DRAM.
WRAM
WRAM (window random access memory, unrelated to the Microsoft operating
system) is a high-speed variant of VRAM that costs less to produce and boosts
performance by about 20 percent beyond regular VRAM. VRAM and WRAM
have become the standard memory types for high-end display adapters.
MDRAM
Multibank DRAM (MDRAM) is the final stop on our tour of memory acronyms. It
uses interleaving (the dividing of video memory into 32-KB parts that can be
accessed concurrently) to allow faster memory I/O to the system without
expensive dual porting. It is also a more efficient type of chip that is practical
to produce in sizes smaller than a full megabyte. A vendor can save money by
just buying the amount needed to actually draw the screen. This saves about
1.75 MB per card for a resolution of 1024 × 768.
The following table lists the standard memory requirements for the most
common resolutions and pixel depths used today. As stated previously, keep in
mind that the minimum amount of memory for MDRAM is usually less than for
other types of RAM. Some graphics cards offer additional memory and even
incorporate different types of RAM on the same card. In such cases, some of
the memory might be used for features other than merely imaging the picture
to be sent to the CRT in pixels.
When installing a new card or operating system for a client, be sure to check
the manufacturer's Web site for the latest display drivers. You will reduce the
likelihood of problems in using the new addition, and you will find that most
new cards incorporate setup routines that can make quick work of getting a
new display running.
Lesson Summary
The following points summarize the main elements of this lesson:
Display adapters have gone through significant changes since the first PCs
entered the marketplace.
SVGA is considered the standard for applications today. The increasing
use of graphical operating systems fueled the need for bigger monitors,
higher resolutions, and more colors.
The coprocessor is a key factor in graphics-adapter performance.
24-bit cards are required to offer photo-realistic color displays.
Memory is a limiting factor in resolution and color depth.
Drivers are the link between the display hardware and the operating
system.
The type and amount of memory have a direct impact on video
performance. Less memory means fewer colors, and slower memory types
mean poorer performance.
3 4
Lesson 4: Choosing and Troubleshooting Display
Systems
Matching the components of the display system to the needs of the computer
owner is critical to user satisfaction when upgrading or purchasing a system.
Knowledge of the basic steps in troubleshooting a display is the key to making
a quick repair when a component fails to operate properly. In this lesson, we
set out the basic steps to follow in selecting the right class of display hardware
for a client, proper care, and troubleshooting common problems.
One major consideration is the maximum viewable area. For users who will
work in only one program at a time, or who don't need high resolution, a basic
monitor should suffice. Graphics-intensive applications and multitasking call
for larger monitors with faster refresh rates, and display cards to match.
Multimedia systems can benefit from cards that offer TV out (usually in the
form of an RCA jack that lets the signal be displayed on a regular TV set using
the NTSC format), TV tuner, and hardware DVD acceleration.
The usual trade-offs between cost and performance apply, but less so now than
in the days of $3,000 high-end cards. Today, a user can purchase a fast, high-
quality adapter for $250 to $300, and an adapter of acceptable speed with
true-color display for $150 without the extras and expensive memory types.
Consider offering an FPD, especially if the customer has limited desktop space.
Remember that the FPD may require the purchase of a special display adapter.
Verify that both the power and monitor-display adapter cables are
properly attached. Failure to attach them properly can lead to no picture
at all or to an erratic image with incorrect colors. If the monitor cable has
been removed and reseated, bent pins could be the problem. Make sure
power is reaching both the PC and the monitor and that they are turned
on.
Make sure that the adapter is properly seated in the expansion slot.
Boot the system. If you get an image during the power-on self test
(POST) but the computer does not load the operating system, suspect
memory or driver problems. The same is true if the system repeatedly
hangs during Windows operation. Try working in safe mode. If that
succeeds, reinstall the drivers and use Device Manager in the Control
Panel System utility to resolve any hardware or memory conflicts. (From
Start, select Settings, click Control Panel, double-click System, and then
select the Device Manager tab.)
Reset the card to the 640 × 480 resolution in 16-color VGA mode at the
60-Hz refresh rate. If the card works in normal mode, in Windows, at
these settings, but fails at higher resolution, color depth, or refresh rates,
check the drivers and the capabilities of the display components.
CAUTION
Do not exceed the approved refresh rate for a monitor, even if the
adapter can produce a higher scan of the screen. The result will be
an unstable or unreadable image, which can damage a monitor
very quickly.
If all these enumerated attempts fail, try a different display adapter or monitor
or test the hardware set on a different PC to see if one of the components has
failed and requires repair or replacement. In most cases, an out-of-warranty
card is not worth repairing; a specialist should examine a monitor that has
failed.
Lesson Summary
The following points summarize the main elements of this lesson:
Displays
The CRT is the main component of most monitors. The slender end of the
cylinder contains an electron gun, and the larger end is the display
screen.
Resolution is a measurement of the detail of images produced by the
monitor. It is measured in dots or pixels per inch.
Flat-panel displays are becoming a viable alternative to CRT monitors.
Although they offer real advantages in some applications, drawbacks
include higher price and limited resolution options.
The monitor is the primary power consumer in a computer system.
A monitor can be dangerous and should never be worked on without
being discharged first. In fact, in most cases, you should leave monitor
repair to a trained professional.
Video Cards
The video card is the interface between the expansion bus and the
monitor.
The PGA, VGA, and SVGA monitors each use a 15-pin, three-row, female
DB connector.
Coprocessors are used to speed up graphics-intensive displays.
Video Memory
4. What is the "standard" type of video card used with today's computers?
5. What is the formula for calculating the required memory for a monitor-
video card combination?
8. Define resolution.
9. What is bandwidth?
10. Why is it dangerous to open the monitor's cover?
12. Explain one similarity and one difference between VRAM and WRAM.
Answers
3 4
Chapter 12
Printers
About This Chapter
This chapter discusses one of the most important add-ons to the typical PC
(personal computer). After monitors, printers are the second most common
output devices.
Before You Begin
It is a good idea to familiarize yourself with parallel ports, covered in Chapter
8, "Expansion Buses, Cables, and Connectors," before studying this lesson.
3 4
Lesson 1: Printers
Printers are considered standard PC components; they are often bundled with
computers and sold to consumers as part of a complete package. The most
common add-ons, printers are manufactured in several popular forms. Like
other devices, each type has unique advantages and disadvantages. This
lesson covers all types and aspects of printers.
List the various types of printers and their advantages and disadvantages
Possess a working knowledge of laser printers
Troubleshoot printer problems
Identify the differences between parallel and serial printers
Understand expansion cards and how to use them
When evaluating printers, you should keep the following issues in mind:
You should familiarize yourself with these basic terms used with printer
communication:
The standard parallel port uses cable with a 25-pin female connector on one
end and a Centronics-compatible D-Shell fitting on the other. You simply
connect the Centronics-compatible end of the printer cable to the printer and
attach the 25-pin plug to an LPT port on the computer. Although parallel ports
are relatively trouble-free, they have some disadvantages:
The data transfer rate is 150 KB. This is slow compared to network cards
and other high-speed interfaces.
Parallel communication consumes system resources because it relies on
the PC's system bus and CPU (central processing unit) for transport and
management.
There are no standards for parallel cables or ports. Although parallel port
configurations follow a few common practices, this form of communication
remains the source of compatibility problems.
Parallel cables usually have a maximum effective length of 10 feet. This
can be extended by using a booster device, but at an added cost.
Impact Printers
In the early days of PC printing, the most commons forms of printers were dot-
matrix and daisy-wheel designs. Both these designs create an impression by
striking an inked ribbon with enough force to place ink on the page. In this,
they function very much like typewriters. Except for a few special cases,
impact printers (one is shown in Figure 12.1) have been replaced by ink and
laser technology.
Dot-Matrix Printers
A quick trip through a consumer electronics store might lead the average
person to believe the age of the dot-matrix printer is over. The home and
home office segments of the market are now the domain of the ink-jet and
low-cost laser products. Still, in business locations, where the ability to print
several copies at once is a driving factor, the loud and lowly dot-matrix still
rules. As a result, you must understand how they work and how to maintain
them.
Run the Inkjet video located in the Demos folder on the CD accompanying this
book to view a presentation of ink-jet printers.
Ink-jet printers have replaced dot-matrix printers in the low-end market and
thermal wax printers (not covered in the exam) in the low-end color market.
Many computer manufacturers and large computer stores offer an ink-jet
printer as part of a computer system package deal.
Ink-jet printers spray ink onto paper to form images. They produce good-
quality printing and—compared to dot-matrix and wax printers—they are
relatively fast. They also require little maintenance beyond cleaning and ink
cartridge replacement. Their ability to easily produce color as well as standard
black-and-white images makes them attractive.
IMPORTANT
You might find it cost-effective to equip an office with more than one kind of
printer. Many offices have a heavy-duty, high-speed, black-and-white laser
printer for text printing, an aging dot-matrix printer for forms and labels, and
a color ink-jet printer for graphics. It is also common to find several printers
available on a local office network.
If a printer fails to operate, the first step in determining the source of the
problem is to decide if the problem lies with the printer or with the computer.
The best place to start is at the printer, with a visual inspection. Look for
simple issues, like a tray out of paper or a paper jam. Most printers have
either a light-emitting diode (LED) panel or lights that warn of common
problems.
If visual inspection of the printer does not turn up an obvious fault, proceed to
the printer's self-test program. In most cases, you can initiate this routine by
holding down a specified combination of control keys on the printer (check the
owner's manual for diagnostic procedures) while you turn it on. If a test page
prints successfully, the problem is most likely associated with the computer,
the cabling, or the network. The following table lists some typical problems
encountered with ink-jet printers and possible causes.
Run the Laser video located in the Demos folder on the CD accompanying this
book to view a presentation of laser printers.
The laser printer has become the dominant form of computer output device,
with models ranging from personal, low-volume, desktop printers to
behemoths that fill half a room and serve hundreds of users, churning out
reams of pages every day.
All laser printers follow one basic engine design, similar to the one used in
most office copiers. They are nonimpact devices that precisely place a fine
plastic powder (the toner) on paper. Although they cost more to purchase than
most ink-jet printers, they are much cheaper to operate per page, and the
"ink" is permanent. (Most ink-jet images are, at best, water-resistant.)
Primary Components of a Laser Printer
A laser printer is a combination of mechanical and electronic components.
Although the internal workings of the printer generally are not a concern for
the average PC technician, you should be familiar with the parts and processes
involved in their operation.
Paper Transport
The paper path for laser printers ranges from a simple, straight path to
complicated turns in devices with options such as duplexers, mailboxes, and
finishing tools like collators and staplers. All these devices have the same goal:
to move the paper from a supply bin to the engine where the image is laid on
the paper and fixed to it, and then to a hopper for delivery to the user. Most
printers handle a set range of paper stocks and sizes in the normal paper path,
and a more extensive range (usually heavier paper or labels) that can be sent
though a second manual feed, one sheet at a time. When users fail to follow
the guidelines for the allowed stocks, paper jams often result.
Logic Circuits
Laser printers usually have a motherboard much like that of a PC, complete
with CPU, memory, BIOS (basic input/output system), and ROM (read-only
memory) modules containing printer languages and fonts. Advanced models
often employ a hard disk drive and its controller, a network adapter, a SCSI
host adapter, and secondary cards for finishing options. When upgrading a
printer, check for any updates to the BIOS, additional memory requirements
for new options, and firmware revisions.
User Interface
The basic laser printer often offers little more than a "power on" LED and a
second light to indicate an error condition. Advanced models have LED panels
with menus, control buttons, and an array of status LEDs.
Photosensitive Drum
The photosensitive drum is a key component that is usually part of the toner
cartridge. The drum is an aluminum cylinder coated with a photosensitive
compound and electrically charged. It captures the image to be printed on the
page and also attracts the toner to be placed on the page.
IMPORTANT
The Laser
The laser beam paints the image of the printed page on the drum. Before the
laser is fired, the entire surface of the photosensitive drum and the paper are
given an electrical charge carried by a pair of fine wires.
Primary Corona
The primary corona charges the photosensitive particles on the surface of the
drum.
Transfer Corona
The transfer corona charges the surface of the paper just before it reaches the
toner area.
Fuser Rollers
The toner must be permanently attached to the paper to make the image
permanent. The fuser rollers—a heated roller and an opposing pressure roller
—fuse toner onto the page. The heated roller employs a nonstick coating to
keep the toner from sticking to it. The occasional cycling heard in many laser
printers is generated when the fuser rollers are advanced a quarter turn or so
to avoid becoming overheated.
Erase Lamp
The erase lamp bathes the drum in light to neutralize the electrical charge on
the drum, allowing any remaining particles to be removed before the next
print is made.
Power Supply
Laser printers use a great deal of power and so should not be connected to a
UPS (uninterruptible power supply) device. The high voltage requirements of
the imaging engine and heater will often trip a UPS. In addition to the motors
and laser print heads, the printer also has a low direct current (DC) voltage
converter as part of the power package for powering its motherboard, display
panel, and other more traditional electronic components.
Most laser printers ship with a variety of software that includes the basic
drivers that communicate with the operating system, diagnostic programs, and
advanced programs that allow full control of all options and real-time status
reporting. New advances in network laser printing allow print-management
tools and printing to work over the Internet. A user can send a print job to an
Internet site or manage a remote print job using a Web browser.
The Mechanics of Laser Printing
Now that you know the major parts of the printer, here's a quick survey of
how the laser printer works and the components needed to handle each task.
(Some of these tasks occur simultaneously in actual printing.)
Communicating
1. The operating system sends a request to the printer and is informed that
the printer is online and ready to accept data.
2. The PC starts sending data.
3. During the printing process, the printer—if it is able to handle
bidirectional communications—informs the computer of any problems
encountered while handling the print job so the user can address the
complaint. These messages might include an out-of-paper condition,
paper jam, or low toner.
4. After the entire job has been sent, the printer acknowledges the receipt
of all data and waits for the next request.
Many printers can store more than one job, and network printers often have
hard disk drives that can hold common jobs to allow the printer to print
without being connected to a PC.
Warming Up
The printer might delay accepting the job or printing the first page while it
warms up its rollers and the imaging drum.
The image (text and graphics) to be made is converted into a series of raster
lines that can be drawn much the same way as the image is formed on the
PC's monitor. The data is stored in memory, waiting for the send command.
Paper Feeding
The printer moves a sheet of paper from the proper tray onto a series of
rollers, through the imaging and fixing areas, and to the output hopper.
Drum Cleaning and Charging
Any residual toner from past jobs is scraped from the printer's photosensitive
drum. A fine wire (the primary corona) produces a negative electrical charge
across the entire face of the drum. The image is set in raster lines as a series
of fine dots on the drum.
The information from the raster image processor is read from memory and
sent to the print engine one line at a time. The laser sets a positive charge in
the areas of the image to be filled with toner.
A film of fine plastic powder is placed on the toner transfer roller, which is
turning close to the photosensitive drum. This toner is then attracted to the
positively charged areas of the drum.
The corona wire places a positive electrical charge on the paper as it moves
close to the drum. The toner is attracted to the page, forming an image.
The page passes through a pair of rollers. The roller on the side toward the
toner that has been placed on the page is heated just enough to melt the
plastic toner particles onto the page without smearing. The roller on the other
side supplies the needed pressure.
After the toner has been fused to the paper, the next step is usually to
transport the page to the output tray. However, if other options—such as a
duplexer or collator—are available, the page might be routed through a
separate path, based on the options for the current print job, and then sent to
the output tray. Figure 12.3 shows the process of laser printing.
Figure 12.3 The laser printing process
The quality of a laser printer is directly related to its resolution, given in dpi.
Horizontal resolution is determined by how fine a line can be focused on the
drum by the laser (the number of dpi across the page); vertical resolution is
based on the increment by which the photosensitive drum is turned for each
pass of the raster line.
In most cases, resolution is given as a single number, indicating that both the
horizontal and vertical increments are the same. The first laser printers
provided 300 dpi resolution; printers today commonly provide 600 and 1200
dpi. The higher the number, the sharper the detail and the more memory
required to image the page. In general, the human eye cannot distinguish
between 600 dpi and 1200 dpi text on bond paper, but the higher resolution
does benefit images and drawings by providing a smoother transition between
tones and curved lines.
TIP
Many laser printers offer a "toner saver" setting that uses a lower-
resolution draft mode, thereby extending the life of a toner
cartridge by placing less toner on each page.
Ghosting
The term ghosting is used to describe unwanted images that are produced on
the printed page at regular intervals. This usually occurs when the drum is not
fully discharging or is being saturated with excess toner. One remedy is to
print one or two totally black pages; this will pull the toner off the drum and
onto the paper. If the problem persists, try using a new toner cartridge (if the
toner is part of the cartridge assembly). If those steps fail, the printer will
require servicing by a trained technician who is able to adjust the internal
settings that regulate toner levels during printing.
Printing on Transparencies
CAUTION
Hardware Problems
Most laser printers offer the ability to print a page or more of diagnostic and
configuration information. If you suspect a hardware problem, print these
sheets. Check for status lights, menu warnings, or error messages. The
manual should list steps to be taken in troubleshooting common problems that
are indicated by the printer's display. The variety of error codes that exist, the
result of different options on printers, even from the same vendor, makes a
detailed listing beyond the scope of this volume and beyond the skills required
for the exam. Refer to the printer's manual for details concerning codes for a
given printer.
Lesson Summary
The following points summarize the main elements of this lesson:
The three most common printers are dot-matrix, ink-jet, and laser
printers.
Computer technicians can expect to encounter printing problems
regularly.
3 4
Chapter Summary
The following points summarize the key concepts in this chapter:
Printers
Most printer problems can be resolved quickly by checking for paper jams,
expended consumables, or improper use.
The key components of a laser printer are the power supply,
photosensitive drum, eraser lamp, primary corona, laser, transfer corona,
and fuser.
3 4
Review
1. Name the three most common types of printers and describe their
advantages and disadvantages.
5. What causes black spots to appear on a document that has been printed
on a laser printer? How can this problem be resolved?
Answers
3 4
Chapter 13
Portable Computers
About This Chapter
Portable computers, once a novelty, are now a part of everyday business life.
Portable computers work and act just like larger systems, except they are very
compact. In this chapter, we look at those elements that make a portable
computer unique.
Before You Begin
Although there are no prerequisites for this chapter, you should be familiar
with all aspects of the hardware presented in earlier chapters.
3 4
Lesson 1: Portable Computers
Portable computers are a growing part of everyday life, both for users and
technicians. In general, the A+ technician has a very limited role in repairing
these machines. Still, you must understand how to deal with minor problems
and answer user questions about proper operation and care.
The first "portable" computers were often called "luggables." The size of a
portable sewing machine, they tipped the scales at 30 pounds. Equipped with a
small CRT (cathode-ray tube) display, they were actually a traditional PC in a
slightly smaller case.
The real change in portable computers came with the advent of the flat-panel
display, allowing the portable to take on the now-familiar slim design. Laptop
is the term used for the heavier version, usually offering most of the features
of a full-fledged PC but with a folding flat-panel display and integrated
keyboard. Notebooks are slender devices that often lack the full range of
storage as part of the normal configuration. PDAs, a special group of products
offering a subset of features including e-mail, schedule tracking, contact
records, and limited note taking and Web browsing, are beyond the scope of
this chapter.
Laptop Computers
When laptops originally appeared on the market, they were the smallest
portable computers made. Today, they are high-end machines that offer
features and performance comparable to a desktop system.
Notebook Computers
Docking Ports
Docking ports (also known as docking stations) are specialized cases into which
an entire notebook computer can be inserted. This allows the notebook to be
connected to desktop I/O devices such as full-sized keyboards, CRT monitors,
and network connections. At minimum, a docking station provides an
alternating current (AC) power source for the notebook. Docking stations are
highly proprietary items designed for use with specific computer models. They
are handy for the user who wants to maintain only one computer system and
avoid the necessity of transferring information between two systems. With a
docking port and a well-equipped notebook computer, it is possible to have the
best of both worlds.
Even smaller than the notebook computers are subnotebook computers, also
known as palmtops or handhelds. These tiny systems are 7 inches wide × 4
inches deep × 1 inch high. Due to their size, they are rather limited in
function. Keyboards, for example, are too small to permit touch-typing. With
notebooks decreasing in cost and weight, palmtops have been losing market
share and popularity.
Computer Cards
To provide laptop and notebook computers with the same expandability
associated with desktop computers, the PCMCIA (Personal Computer Memory
Card International Association) established several standards for credit-card-
sized expansion boards that fit into small slots on these smaller machines.
These expansion boards are now commonly referred to as PC Cards. The
PCMCIA standards have revolutionized mobile personal computers, providing
them with the ability to add memory expansion cards, network interface cards
(NICs), SCSI (Small Computer System Interface) devices, communication
hardware (for instance, modems and faxes), and many other devices that were
previously unavailable to laptop and notebook computer users.
Compatibility problems surfaced along with the development of the PC Card for
portable computers. To overcome these incompatibilities, PCMCIA standards
were created. The following table outlines the four PCMCIA types and their
guidelines.
The PC Card itself is usually sealed in a thin metal case. One end contains the
interface to the PC Card adapter (68 tiny pinholes); the other end might
contain a connector for a telephone line, a network, or another external
device.
PC Card is part of the Plug and Play standard, which means it allows you to
add components without first shutting off or rebooting the computer. In short,
PC Cards are not configured with jumper settings (because they don't have
any) but with software.
Portable Computer Hardware
Although many components in a portable computer are similar to those of a
desktop system, some components are very different. The major difference
between a portable system and desktop system is the display screen.
Displays
Portable computers have a flat LCD screen that is about .5 inch thick. The
display is typically the most expensive component in a portable system. Often
it is more economical to replace the entire computer than to replace the
screen. An LCD display is designed to operate at a specific resolution because
the size of the pixels on an LCD panel cannot be changed. On a desktop
system, by contrast, the signal output from the video adapter can change the
resolution on the monitor, thereby changing the number of pixels on the
screen. An LCD panel should be thought of as a grid ruled to a specific
resolution. Transistors control the color that is displayed by each pixel. The
two major types of LCD displays used in portable systems today (dual-scan and
active-matrix) are defined by their arrangement of transistors.
Dual-Scan Displays
If a transistor fails, the entire line of pixels is disabled, leaving a black line
across the screen. There is no way to repair this problem except to replace the
display. The term dual-scan is derived from the fact that the processor redraws
half of the screen at a time, which speeds up the refresh rate a little.
Active-matrix displays are also known as TFTs (thin film transistors). They
differ from dual-scan screens because they have a transistor for every pixel on
the screen rather than just at the edges. Electrodes apply voltages at the
perimeter of the grid to address each pixel individually.
Because each pixel is powered individually, generating its own light and the
appropriate color, a much brighter and more vivid picture results. Creating
light instead of altering reflection provides a wider viewing angle, which allows
more than one viewer to see the screen at a time. The refreshes are faster and
the display lacks the fuzziness associated with the dual-scan systems.
Naturally, the cost of having 480,000 transistors instead of merely 1400 (on
an 800 × 600 screen) makes the active-matrix screen more expensive. It also
requires a lot more power and drains batteries faster. Failure of a transistor
causes individual "dead pixels," but this is far less noticeable than the black
line caused by a transistor failure of the dual-scan screen.
Larger screens and higher resolutions mimicking that of desktop models have
become the standard on high-end laptops. Many portable systems today also
include PCI (Peripheral Component Interconnect) bus video adapters. These
screens come very close to the quality of a desktop display, but lack some of
the fine controls available on fixed units.
Screen Resolution
Processors
Chip manufacturer Intel's solution to the size and heat problems is the Tape
Carrier Package. This method of packaging reduces the size, power
consumption, and heat generated by the chip. A Pentium mounted on a
motherboard using Tape Carrier Packaging is much smaller and lighter than
the pin grid array (PGA) used in desktop systems. The 49-mm square of the
PGA is reduced to 29 mm, the thickness to approximately 1 mm, and the
weight from 55 grams to less than 1 gram.
After being tested, the tape is cut to the proper size and the ends are folded
into a "gull wing" shape that allows the leads to be soldered to the
motherboard while the processor is suspended slightly above it. A thermally
conductive paste is inserted between the processor chip and the motherboard,
allowing heat to be dissipated through a sink on the underside of the
motherboard, keeping it away from the soldered connections. Of course,
because Tape Carrier Packaging processors are soldered to the motherboard,
they usually cannot be upgraded.
Voltage Reduction
Mobile Pentiums have operated at 3.3 volts from the days of the original 75-
MHz chip, but the newer and faster models have reduced the voltage to only
2.9 volts for internal operations, retaining the 3.3-volt interface with the
motherboard. This translates into a processor that uses as little as 60 percent
of the power of a desktop system.
Memory
As with desktop systems, adding memory is one of the most common upgrades
to portable computers. Unlike desktop computers, which offer only three basic
types of slots for additional RAM (random access memory), there are dozens of
different memory-chip configurations designed to squeeze memory upgrades
into the small cases of portable systems.
Some portables use memory cartridges that look a lot like PC Cards, but they
plug into a dedicated IC memory socket. Others use extender boards like
SIMMs (single inline memory modules) and DIMMs (dual inline memory
modules). In any case, it is strongly recommended that you only install
memory modules that have been designed for your system, and only in the
configurations recommended by the manufacturer. This does not necessarily
limit you to products made by your system's manufacturer, however, because
a number of companies manufacture upgrade modules for dozens of systems.
Portable computers use the same types of dynamic RAM (DRAM) and static
RAM (SRAM) as desktops and, thanks to advances in thermal management,
today's high-end portable systems usually include SRAM cache memory.
Except for its size and packaging, portable hard disk drive technology is similar
to desktops. EIDE (Enhanced Integrated Drive Electronics) drives are standard
in portable computers with the exception of the Macintosh computer, which
uses SCSI. Internal hard drives, depending on the size of the system, are
typically 12.5 mm or 19 mm tall, and use 2.5-inch platters. As with memory
modules, hard drives are also mounted in the system a little differently by
manufacturers; this can cause upgrade compatibility problems.
Some manufacturers use a caddy to hold the drive and make connections to
the system. This makes upgrading as simple as inserting a new hard disk drive
into the caddy and then mounting it in the system. Other systems require
purchase of a specifically designed drive, complete with the proper connections
built into it. Replacing the hard drive can be much easier in many portable
systems than in their desktop counterparts.
The result is that multiple users can share a single machine by simply
snapping in their own hard drives. However, because laptops are specialized
equipment, any servicing beyond batteries, hard drives, and memory is usually
left to specialists or the manufacturer.
Removable Media
Portable systems are now equipped with other types of storage media that can
provide access to large amounts of data. CD-ROM and Zip drives are now
available, as well as standard floppy disk drives. Just as in desktop
counterparts, CD-ROM is becoming standard on portables.
The swappable drive bay is increasing in popularity. This product allows the
user to switch one of several types of components in the unit. For example,
you might not need a floppy disk drive when traveling, so you can insert an
extra battery.
Keyboards
Portable keyboards are integrated into the one-piece unit and are therefore
very difficult to repair or replace. Unfortunately, the keypad is almost always
the first component to fail in a portable. The functionality and durability of the
keyboard should be an important concern when purchasing a portable system.
Pointing Devices
Today's portable computers come with built-in pointing devices. Most of these
pointing devices are one of three types: trackball, trackpoint, or trackpad.
The oldest of the three technologies, nickel cadmium (NiCad) batteries are
rarely used today. They have a short life and are sensitive to improper
charging and discharging. After being charged, NiCad batteries hold a charge
very well. How-ever, their life can be severely shortened if they are not fully
discharged before recharging or if they are overcharged.
Nickel metal hydride (NiMH) batteries have a longer life than NiCad batteries
(about 50 percent longer) and are less sensitive to improper charging and
discharging. They are also more expensive than NiCad batteries and don't hold
a charge as well when not used. They usually cannot be recharged as many
times. They are, however, used in most portable systems, especially those at
the lower end of the market.
Lithium ion batteries cannot be overcharged, hold a charge well when not in
use, and last longer than the other two types of batteries. They are also
proficient at handling the heavy-duty power requirements of today's higher-
end portables. Because they are the most expensive of the three battery
technologies, lithium ion batteries are usually found only in high-end systems.
Unfortunately, these batteries can be used only in systems specifically
designed for them.
CAUTION
Never install a lithium ion battery in a system designed for a
NiCad or NiMH battery. Doing so could result in a fire.
Buying a system with a lithium ion battery does not necessarily ensure a
longer battery life. Some manufacturers take the opportunity to make the
battery smaller because it is more powerful, thereby saving some space inside
the computer while delivering the same performance as a NiCad or NiMH
battery.
New Technology
Battery technology has trailed behind nearly all the other advances of the
portable system. A battery life of two hours is considered very good even when
a system's power-saving features are utilized. Some manufacturers are
designing systems that hold two batteries to try to overcome this limitation.
TIP
Generally, the suspend mode virtually shuts down the entire system after a
certain period of inactivity. However, power continues to be supplied to RAM,
and the system can be reawakened almost immediately.
The hibernate mode writes the entire contents of memory into a special swap
file and then shuts down the system. When reactivated, the file is read back to
memory. The hibernate mode takes a little longer to reactivate than the
suspend mode, but it conserves more battery life. In some systems, the swap
file used for the hibernate mode is located in a special partition of the hard
drive. If it is inadvertently destroyed, it might require a special utility from the
manufacturer to re-create it.
Early "portable" computers were heavy and usually more worthy of the
term "luggable."
Today's laptops and notebooks have most of the features of a desktop
machine in a very compact package—but at a much higher cost.
A computer technician should know the four types of PC Cards and their
uses.
Batteries and power management are key factors to consider when
maintaining portable computers.
3 4
Review
Answers
3 4
Chapter 14
Connectivity and Networking
About This Chapter
The ability to expand beyond the limit of a single computer in a single office
has extended the reach of the PC to global proportions. Two technologies have
driven this expansion: computer networking and the global network known as
the Internet. While we cover modems and simple Internet connections in
Chapter 15, "Telecommunications and the Internet," some of the basic
concepts of Internet addressing are covered in this chapter. (The Internet uses
the same protocol as many PC LANs.)
Before You Begin
Although there are no prerequisites for this chapter, you should be familiar
with all aspects of the hardware presented in earlier chapters.
3 4
Lesson 1: Networks
A network is defined as two or more computers linked together for the purpose
of communicating and sharing information and other resources. Most networks
are constructed around a cable connection that links the computers. This
connection permits the computers to talk (and listen) through a wire. More
recently, a number of wireless solutions have become available. Infrared ports,
Bluetooth radio links, and other protocols allow a variety of new devices to link
with PCs.
Connections
Communications
Services
A service defines those things a computer shares with the rest of the network.
For example, a computer can share a printer or specific directories or files.
Unless computers on the network are capable of sharing resources, they
remain isolated, even though physically connected.
Networking
Next we look at how the basic elements of connections, communications, and
services work together to make networks function properly.
The connections must operate so that any computer can send or receive
electrical signals (data) across the physical media that link them.
Communications must function so that when one computer sends a
message, the receiving computer can listen and understand the message.
Computers on a network must either provide a service to other computers
or make use of a service provided by other computers.
Local Area Networks
A LAN (local area network) is a network that covers a limited distance (usually
a single site or facility) and allows sharing of information and resources. A LAN
can be as simple as two connected computers or as complicated as a large site
connecting many computers. This type of network is very popular because it
allows individual computers to provide processing power and utilize their own
memory, while programs and data can be stored on any computer in the
network. Some older LANs also include configurations that rely totally on the
power of a mini- or mainframe computer (a server) to do all the work. In this
case, the workstations are no more than "dumb" terminals (a keyboard and a
monitor). With the increased power of today's PC, these types of networks are
rare.
The primary benefit of a LAN is its ability to share. The following table lists
some of the benefits of sharing the most common resources on a LAN.
Resource Benefit
The sharing of data files that reside in a common location
makes multiple-user access easier. Also, it's much easier to
Data maintain data integrity when there is a single, central
database. Large customer databases and accounting data are
ideal for a LAN system.
Sharing printers, for example, allows more than one user to
send jobs to a single printer. This is useful when there is
only one high-quality printer in an office and the entire office
needs to use it. It also allows one user to access multiple
Peripherals
printers, providing cost savings in hardware and redundant
resources in case one device fails. Other low-usage
peripherals, such as scanners and plotters, will be better
utilized.
Sharing a single copy of an application can be cost-effective
(many software manufacturers provide site licenses—licenses
Software
for multiple users on a server). It also allows easier
maintenance and upgrading.
Larger, faster disk systems can be used cost-effectively for
Storage
easy backups.
In addition to the ability to share resources, LANs offer many other benefits
that include:
Resilience. Regular backups of the entire system greatly reduce the risk
of data loss. Copying data to backup servers allows network operations to
continue in the event of a primary server failure.
Communication gateways. Low-cost access to fax and Internet
connections.
Electronic mail. Cost-effective and convenient communication
throughout the network.
Wide Area Networks
A wide area network (WAN) spans relatively large geographical areas.
Connections for these sites require the use of ordinary telephone lines, T1
lines, ISDN (Integrated Services Digital Network) lines, radio waves, cable, or
satellite links. WANs can be accessed through dial-up connections, using a
modem or leased-line direct connection. The leased-line method is more
expensive but can be cost-effective for transmission of high volumes of data.
Types of Networks
There are essentially two types of networks that differ in how information is
stored, how security is handled, and how the computers on the network
interact.
NOTE
Star Topology
In a star network (see Figure 14.1), all devices are connected to a central
point called a hub. These hubs collect and distribute the flow of data within the
network. Signals from the sending computer go to the hub and are then
transmitted to all computers on the network. Large networks can feature
several hubs. A star network is easy to troubleshoot because all information
goes through the hub, making it easier to isolate problems.
Bus Topology
In a bus network (see Figure 14.2), all devices are connected to a single linear
cable called a trunk (also known as a backbone or segment). Both ends of the
cable must be terminated (like a SCSI [Small Computer System Interface]
bus) to stop the signal from bouncing. Because a bus network does not have a
central point, it is more difficult to troubleshoot than a star network. A break
or problem at any point along the bus can cause the entire network to go
down.
NOTE
Ring Topology
In a ring network (see Figure 14.3), all workstations and servers are
connected in a closed loop. There are no terminating ends; therefore, if one
computer fails, the entire network will go down. Each computer in the network
acts like a repeater and boosts the signal before sending it to the next station.
This type of network transmits data by passing a "token" around the network.
If the token is free of data, a computer waiting to send data grabs it, attaches
the data and the electronic address to the token, and sends it on its way.
When the token reaches its destination computer, the data is removed and the
token is sent on.
NOTE
The NIC takes data from the computer, packages the data for transmission,
and acts as a gatekeeper to control access to the shared network cable.
Because the NIC functions as an interface between the computer and the
network cabling, it must serve two masters. Inside the computer, it moves
data to and from RAM (random access memory). Outside the computer, it
controls the flow of data in and out of the network cable system. Because the
computer is typically much faster than the network, the NIC must buffer the
data between the computer and cable. This means it must temporarily store
the data coming from the computer until it can place it on the network.
Installation of the NIC (see Figure 14.4) is the same as for any other
expansion card. It requires setup of the system resources: IRQ (interrupt
request), address, and software. Most cards today allow connection for either
thin Ethernet or UTP (unshielded twisted-pair) cabling. Thin Ethernet uses a
round BNC (bayonet-Neill-Concelman) connector, and UTP uses an RJ-45
connector (similar to a telephone jack).
Installing an NIC is just like installing any other expansion card. If you are
installing a Windows 95-compliant Plug and Play card in a Windows 95 or
Windows 98 machine, you'll simply need to physically install the card and boot
up the computer. The card will be detected and, more than likely, install itself.
You might only need to answer a few questions along the way. It requires a
little more work to install an NIC in an operating system that is not Plug and
Play-compliant. Installing network cards includes the following steps.
If you are replacing (upgrading) an existing NIC, follow the same steps as just
described, with one addition. Before removing the card, document all its
settings. Figure 14.5 shows an example of an NIC information card. You can
use these cards to create a file documenting the specifics of the cards in your
network.
Figure 14.5 Information card
IMPORTANT
Twisted-Pair Cable
Twisted-pair wiring comes in two types: STP (shielded twisted pair) and UTP.
STP has a foil or wire braid wrapped around the individual wires of the pairs;
UTP does not. The STP cable uses a woven-copper braided jacket, which is a
higher-quality, more protective jacket than UTP.
Of the two types, UTP is more common. UTP cables can be divided further into
five categories:
Twisted-pair cable has several advantages over other types of cable (coaxial
and fiberoptic): It is readily available, easy to install, and inexpensive. Among
its disadvantages are its sensitivity to electromagnetic interference (EMI), its
susceptibility to eavesdropping, its lack of support for communication at
distances of greater than 100 feet, and its requirement of a hub (multiple
network connection point) if it is to be used with more than two computers.
Coaxial Cable
Coaxial cable (see Figure 14.7) is made of two conductors that share the same
axis; the center is a copper wire that is insulated by a plastic coating and then
wrapped with an outer conductor (usually a wire braid). This outer conductor
around the insulation serves as electrical shielding for the signal being carried
by the inner conductor. A tough insulating plastic tube outside the outer
conductor provides physical and electrical protection. At one time, coaxial
cable was the most widely used network cabling. However, with improvements
and the lower cost of twisted-pair cables, it has lost its popularity.
Coaxial cable is found in two types: thin (ThinNet) and thick (ThickNet). Of the
two, ThinNet is the easiest to use. It is about .25 inches in diameter, making it
flexible and easy to work with (it is similar to the material commonly used for
cable TV). ThinNet can carry a signal about 605 feet (185 meters) before
signal strength begins to suffer. ThickNet, on the other hand, is about .38
inches in diameter. This makes it a better conductor, and it can carry a signal
about 1640 feet (500 meters) before signal strength begins to suffer. The
disadvantage of ThickNet over ThinNet is that it is more difficult to work with.
The ThickNet version is also known as standard Ethernet cable.
When compared to twisted-pair cable, coaxial cable is the better choice even
though it costs more. It is a standard technology that resists rough treatment
and EMI. Although more resistant, it is still susceptible to EMI and
eavesdropping. Use coaxial cable if you need
A Mixed-Cable System
Many networks use both twisted-pair and coaxial cable. Twisted-pair cable is
used on a per-floor basis to run wires to individual workstations. Coaxial cable
is used to wire multiple floors together. You should also consider coaxial cable
for a small network because you can purchase prefabricated cables (with end
connectors installed) in various lengths.
Fiberoptic Cable
When both material and installation costs are taken into account, fiberoptic
cable can prove to be no more expensive than twisted-pair or coaxial cable.
Fiber has some advantages over copper wire: It is immune to EMI and
detection outside the cable and provides a reliable and secure transmission
media. It also supports very high bandwidths (the amount of information the
cable can carry), so it can handle thousands of times more data than twisted-
pair or coaxial cable.
Cable lengths can run from .25 to 2.0 kilometers depending on the fiberoptic
cable and network. If you need to network multiple buildings, this should be
the cable of choice. Fiberoptic cable systems require the use of fiber-
compatible NICs.
The preceding table covers the basic cable requirements for the A+ networking
objective; however, there are many other forms of network connections. For
example, you'll find microwave links; forms of radio; and, for small offices and
homes, power-line networks (whose NICs have connectors that plug into wall
sockets, allowing regular wiring to carry the signal), and telephone-line
networks that use standard phone jacks to plug into existing lines. These have
relatively short ranges (generally limited to one office or one floor of a
building).
LAN Communication
A LAN is similar to a telephone system with one party line—not everyone can
talk at the same time. The difference is that, with a LAN, the speed is so fast
that it fosters the perception that many transactions are taking place at the
same time. Just like a one-lane road, the heavier the traffic, the slower it
moves.
Ethernet
Token Ring
As described earlier, a token ring network uses a token as the basis for
deciding who can communicate on the network. Token rings transmit at 4 or
16 Mbps.
Network Protocols
A network protocol is a set of rules that govern the way computers
communicate over a network. For computers using different software to
communicate, they must follow the same set of networking rules and
agreements, called protocols. A protocol is like a language; unless both
computers are speaking and listening in the same language, no communication
will take place.
Depending on the operating systems and the function of the network you work
on, you will probably use more than one network protocol. It's important to get
and install LAN drivers that can switch between protocols as needed. The
aforementioned protocol information provides you with a rudimentary
understanding of basic network techniques and terminology. However,
networks are a very complicated subject, and you should obtain additional
training resources before installing a network on your own.
Extending a LAN
The previous section on network cables mentioned some limits to the length of
cables. The requirements of today's LANs will often exceed the capability of
these cables. The following table lists several devices that can be used to
extend a LAN network beyond its normal limits.
Devices Description
The main purpose of a repeater is to extend the length of a
network beyond its normal cable lengths. A repeater works
like an amplifier to increase or boost the signal to allow
transmissions over longer distances. Repeaters are used to
Repeaters
connect network segments (groups of computers on the same
network). They can also be used to connect segments
composed of different media (for instance, a ThinNet segment
to a fiberoptic segment).
Bridges work like repeaters, but offer additional advantages.
They can isolate network traffic or problems. Should any
problems occur within one segment, the bridge will isolate
Bridges that segment and not affect other segments on the network,
thereby reducing the load on the network as a whole. Bridges
can also link segments that are not alike (such as Ethernet
and token ring).
Routers provide interconnectivity between like and unlike
devices on the LAN and WAN. Routers work like bridges, but
can connect networks using different protocols. They are able
to select the best route from one network to another network
Routers based on traffic load. Routers determine the flow of data
based on such factors as lowest cost, minimum delay,
minimum distance, and least congestion. Routers are
generally used to create a WAN and connect dissimilar
networks.
Gateways provide all the connectivity of, and even greater
functionality than, routers and bridges. A gateway usually
resides on a dedicated computer that acts as a translator
Gateways between two completely dissimilar systems or applications.
Because gateways are both translators and routers, they tend
to be slower than bridges or routers. Gateways also provide
access to special services such as e-mail or fax functions.
Maintaining and Troubleshooting Networks
Maintaining and troubleshooting networks differ according to the operating
system. Therefore, you will need to refer to the operating systems' manuals
for detailed troubleshooting procedures. A thorough understanding of network
troubleshooting is not a requirement of the A+ Certification program. (The
section that follows describes some advanced certification programs that focus
on networks.) As an A+ technician, you should be familiar with some generic
troubleshooting concepts as presented in the following table.
The CNE certification is currently one of the most popular credentials in the
field of networking. It can give a tremendous boost to the career of any
serious networking professional. Novell's certification curriculum is 50 percent
industry-generic—as a CNE, you are qualified to support Novell-specific
products as well as non-Novell products.
Lesson Summary
The following points summarize the main elements of this lesson:
Networks
2. The primary benefit of a LAN is its ability to share resources. Name some
of the other benefits of networking.
7. Name the three main types of network cabling. What are their
advantages?
12. Your network is showing signs of reduced bandwidth. What is causing this
problem?
Answers
3 4
Chapter 15
Telecommunications: Modems and the Internet
About This Chapter
The rapid advance of the Internet into modern life has made
telecommunications activity a key function of the personal computer both at
work and home. The laptop user relies on the modem to link the mobile
machine to e-mail and the online world. This chapter covers the use of
modems, the fundamentals of the Internet, and configuration of a PC for
accessing the World Wide Web.
Before You Begin
This chapter assumes basic familiarity with the Microsoft Windows user
interface and PC serial ports. Some experience using the Internet and
telecommunications is helpful, but not necessary.
3 4
Lesson 1: Modems
Once an expensive and complicated option, the modem is now an integral part
of the modern PC, thanks to the popularity of the Internet, faxes, and e-mail.
The following table defines some basic terms used with modem
communication.
Term Definition
The number of events, or signal changes, that occur
in one second. It was used as an early
measurement of how fast a modem could send data,
because, at that time, modems transmitted data at
Baud rate a speed equal to the baud rate (1 bit per cycle).
Today's high-speed modems use complex signals to
send more data; therefore, data transfer can exceed
baud rate. The baud rate is limited by the capability
of copper wires to transmit signals.
Stands for bits per second—the speed at which a
modem transmits data. Typical rates are 14,400,
bps 28,800, 33,600, and 56,600 bps. These numbers
represent the actual number of data bits that can be
transmitted per second.
Software used to explore sites on the World Wide
Browser
Web using HTTP (Hypertext Transfer Protocol).
Interactive software that offers the user the ability
to log on directly to a remote computer to post and
Bulletin board retrieve messages and to upload and download files.
system (BBS) Some BBSs offer the opportunity to chat live with
other members who are online at the same time.
The Internet has changed the very nature of BBS
software, replacing it with discussion boards.
The act of transferring a file from a remote
Download computer (host) to a local computer (client). When
downloading, you are receiving a file.
Stands for Dual Tone Multiple Frequency, the
DTMF
technology behind the tones of a touch tone phone.
A worldwide, online network that links computers
by means of the TCP/ IP (Transmission Control
Internet
Protocol/Internet Protocol) protocol. (See TCP/ IP,
later in this table.)
A computer and software combination that provides
Internet server a gateway and supporting services for linking other
computers to the Internet.
Internet Protocol; the network protocols used to
IP
define how data is transmitted on the Internet.
Internet Protocol address; a unique, 32-bit address
that identifies every network and host on the
Internet. (A host is the TCP/IP network interface
IP address within the computer, not the computer itself; a
computer with more than one network interface
card [NIC] can have more than one IP address, one
for each card.)
A digital telephone connection like a modem that
uses digital links and offers speeds about five times
ISDN that of an analog modem. The ISDN system is a
packet system that can also handle voice
communication.
Internet service provider; a company or server that
ISP
provides the connection gateway to the Internet.
The process of sending the appropriate signals and
Logging on gaining access to a remote computer over a modem
or other remote connection.
Communication
Two basic problems arise from using modems to transmit data. The first
problem is that, as we saw in Chapter 4, "The Central Processing Unit,"
computers transfer data using 8, 16, or 32 parallel wires or buses, whereas
telephone systems use only two wires (see Figure 15.1). The second problem
is that telephone and radio systems use analog signals (based on waveforms),
and computers use digital signals, either on or off, as shown in Figure 15.2.
Figure 15.1 Serial and parallel communication
Figure 15.2 Analog and digital signals
Serial/Parallel Conversion
The UART has gone through several major changes during the PC era, and
there are many different types of UARTs with different functions. The following
table lists several of the more common ones.
Chip Description
The original chip used in the IBM PC, the INS8250 operated at
speeds up to 56 kilobits per second (Kbps). The 8250A and
INS8250
8250B incorporated fixes for minor bugs in the original design,
but the 8250 series was unreliable at speeds over 9600 bps.
Designed for 286-based PCs, the 16450 was the first UART that
16450
reliably operated at 9600 bps and higher.
The 16550 allowed use of more than one direct memory access
16550 (DMA) channel to achieve improved throughput over the
16450.
An improved version of the 16550, the 16550A is the only
UART installed on today's computers. It adds support for first
16550A in, first out (FIFO) communication. This is the only UART that
should be installed in current PCs or add-on cards that are used
to provide expansion-card-based COM ports.
Today, virtually all systems are equipped with UART devices fast enough for
the current range of modems and other telecommunications devices. That is
not true of all older systems. The newer versions of Windows are all very
adept at configuring modems for use with the Internet. DSL, ISDN, and cable
connections may require custom setup and configuration.
You can easily determine settings and, often, which UART chip is installed in a
computer by using the System Information utilities or Control Panel functions
that come with the various versions of Windows or the MSDs (Microsoft
Diagnostics) that are a part of DOS. Open the Communications Port (COM1)
Properties dialog box to review settings (see Figure 15.3).
Digital Communication
The movement of data from one computer to another over telephone lines is a
multistep process. The first step is conversion of the data from parallel to
serial form. The digital information must then be broken into uniquely marked
packets (this allows the receiving computer to distinguish one byte from
another).
Asynchronous Communication
Asynchronous communication is any data transmission that does not link the
two devices with a common data clock. This is useful because the length of
time between sending a packet and its receipt on the other end can vary
between the communicating devices. A signal called a start bit is sent at the
beginning of each segment, and a signal called a stop bit is sent at the end.
These let the receiving device note the boundaries (beginning and end) of a
transmission packet. Early PC modems were almost always asynchronous
devices operating at speeds of no more than 18,000 bps.
Synchronous Communication
NOTE
Parity
Asynchronous communication packets have an optional parity bit that is used
for error detection. The receiving port uses the parity bit to verify whether the
data is intact or has been corrupted. There are two types of parity:
Even parity. The sending computer counts the 1s in the data part of the
packet; if the number of 1s is even, the parity bit is 0—this makes the
total number of bits even. If the number of 1s in the data part of the
packet is odd, the parity bit is set to 1—again making the total number of
bits even. The receiving port counts the data bits and compares its
answer to the parity bit. If the two fail to match, an error is reported, and
a request to retransmit the packet is passed to the sending computer.
Odd parity. This works in exactly the same way as even parity, except
that the total number of bits must be odd.
The use of parity bits is optional. The quality of data transmission and
telephone lines has improved to the extent that parity bits are no longer
required. However, if data accuracy is critical or telephone-line quality is
questionable, use parity.
Hardware
Now that we've seen how modems send and receive data, we'll examine the
hardware involved.
Internal Modems
The entire modem and even its serial port can be accommodated on a single
expansion card. This configuration offers lower cost than that of an external
modem, but it is more prone to compatibility problems with either the on-
board UART or the COM port IRQs (interrupt requests).
USB Modems
Most new PCs offer two universal serial bus (USB) ports, either of which can be
used to attach a modem. USB is a hot swap (the device can be added or
removed without powering down the PC), Plug and Play interface (see Chapter
8, "Expansion Buses, Cables, and Connectors") well suited to this task. To
install a modem this way, usually all that is required is to attach a USB cable
between the modem and PC, connect the phone-line cable between the modem
and a wall jack, and load the modem-driver software from the manufacturer's
configuration disk when prompted.
External Analog Modems
The original modems used a pair of cups to cradle a telephone handset over a
built-in speaker and microphone; in this way, the modem would send and
receive tones acoustically, and the telephone handset would relay the tones.
Today, the external modem is usually a rectangular box with a row of status
lights on the front, a speaker to give audible feedback, and a number of ports
on the back. Two of those ports are telephone jacks—one to connect to the
wall line and the other to pass the telephone signal to a phone for regular
voice conversations when the modem is not in data mode. A third port on the
back of the modem is a serial port using a standard 25-pin RS-232 connector
that passes data to and from a serial port on the PC.
Until about 30 years ago, the North American telephone network was an
analog system connecting phones by means of a grid of copper wires. Today,
the long line sections (intercity telecom lines) are part of a packet-based,
digital switching system, but the final run from the local switch to most homes
is the aged copper-wire POTS line.
NOTE
ISDN is more complicated to install than a modem and should be set up using
the help of a vendor or the local telephone company. After installation, ISDN
functions like a high-speed modem, offering not only faster data transfers, but
faster connections to remote ISDN providers such as ISPs. Because each TA
unit is completely digital, there is no testing of the nature of the remote
source by the hardware to establish the maximum connection rate (as with a
modem), and links are typically established in less than 3 seconds.
External modems and TAs communicate with their host computers by means of
an RS-232 communications port. The EIA (Electronic Industries Association)
developed the RS-232 standard for low-speed data communication; the
standard defines a series of signals that are sent between two
telecommunications devices to indicate line and transmission status. The
following table shows the most common signals.
Signal Definition
CTS Clear To Send
DCD Data Carrier Detected
DSR Data Set Ready
DTR Data Terminal Ready
RI Ring Indicator
RTS Request To Send
RTSRD Request To Send/Receive Data
RS-232 Cables
Modem connections to the telephone service are made using two wires (ring
and tip) that are used in a standard telephone jack. The wires are named for
the plug wires used in the original telephone lines by which telephone
operators would manually connect two telephones at the phone company
switchboard. There are two versions of the telephone jack:
Half-duplex. The RJ-11 has only two wires, which make up one line.
Therefore, only one signal can be sent or received at a time.
Full-duplex. The RJ-12 uses four wires to make up two lines; it can be
used to simultaneously send and receive.
Multifunction Modems
Most modems offer some form of fax capability, along with software that adds
functions beyond the average, small, stand-alone fax machine. Such a modem
is usually labeled a fax modem. They can store faxes, both incoming and
outgoing, for reference or online reading. Most allow direct faxing of a
document from a word processor, generally by using the print command to
send the pages to the modem, where they are converted on the fly to the
bitmap form used to send and receive fax transmissions. Many programs let
you automatically attach a predesigned cover sheet with each fax.
Another addition to the basic data out/data in modem is voice mail. Here, the
PC and telephone work just like an answering machine. If the phone rings and
the modem does not detect either a data or fax tone, it switches modes and
streams a recorded message (the outgoing message). The caller can be
prompted to record a message for the owner, and in some cases the modem
will even forward a pager call or fax with the message contents.
Modem Installation
With the advent of Plug and Play technology; Windows 98, Windows Me, and
Windows 2000; and the growing popularity of the USB port, installing a
modem has become a generally simple process. Summaries of the general
installation process for both internal and external modems follow.
NOTE
As with installing any card or internal board, remember to take the proper
precautions against electrostatic discharge (ESD), and, of course, back up your
data before you open the computer case. Follow these steps:
1. Check and document the current IRQ settings and I/O (input/output)
addresses in the computer. Make a note of available IRQs and addresses.
2. Configure IRQ and I/O settings for non–Plug and Play–compliant systems:
Set the modem to an unused COM port and IRQ.
3. Install the board. Physically install the board in an available expansion
bus slot.
4. Install any software. Follow the software setup routine and, if needed, fill
in the modem settings and any dial-up connections the user requests for
Internet access or for logging on to a remote system. To avoid generating
any security concerns, do not ask for or accept account passwords. Show
the user how to set that part of the connection personally.
[386enh]
COM3Irq=5
COM3Base=03E8
5. Set up the command set. Any software that will access the modem must
know the correct command set to use for that modem. This means
identifying the type of modem so the software will use the correct AT
commands. When all else fails, try using a Hayes-compatible modem
setting.
6. Document your work. Write down all the new settings and changes.
External Modem
External modems are easier to install than internal modems because they do
not run the risk of conflicting COM ports.
Baud Rate
As mentioned earlier, baud rate refers to how fast a modem can transmit data.
Technically, the baud is the number of voltage or frequency changes that can
be made in one second. When a modem is working at 2400 baud, this means
that the basic carrier frequency has 2400 cycles per second. Due to
restrictions imposed by the physics of the wiring, a dial-up phone line can go
up to 2400 cycles, a baud rate of 2400.
If each cycle is one bit, the fastest rate at which data can be transmitted is
2400 bps. However, by using different types of modulation, more than one bit
can be transmitted per cycle. Earlier modems used the baud rate to measure
their speed (see Figure 15.4).
NOTE
Groups 1 and 2
Group 3
Group 3 is for digital equipment and can use the same modem for data and
fax. Not all modems in this group are compatible. Group 3 is comprised of
several subclasses, as shown in the following table.
Group 4
All the necessary protocols should be included with the software that came
with the modem. After communication is established with the host (usually the
computer that receives the call), it can be asked what type of protocol to use.
The call initiator can then select the matching protocol before starting a file
transfer. Both computers must use the same protocol. There are five basic
protocols used by modems.
ASCII
This protocol uses the standard ASCII (American Standard Code for
Information Interchange) character set, just like typing directly from a
keyboard. ASCII protocol has no error-checking or compression features. It is
simple, uncomplicated, and is used with simple character-based data. It is not
a good protocol for transferring program files.
Xmodem
Xmodem is the next level of protocol. Xmodem includes error detection, which
makes it more suitable for transferring program files. It transfers 128-byte
blocks of data and one checksum (error-checking) character. The receiving
computer calculates a new checksum and compares it to the one transmitted.
If they are the same, the receiving computer transmits an ACK. If they are
different, it sends back an NAK, and the transmitting computer then
retransmits the data block. The protocol uses parity error checking, which is
not perfect. If two errors were to occur—that is, if the first error were to
change the parity bit, and the second error were to change it back to its
original state—the second would cancel the first, and no error would be
reported. The result can be a corrupted file or random characters on the
display.
Ymodem
Zmodem shares all the features found in Xmodem and Ymodem protocols. It
also adds a few new features, including crash recovery, automatic
downloading, and a streaming file transfer method. This is the protocol of
choice for most situations.
Kermit
The Kermit protocol is rarely used today. It was the first of the synchronous
protocols for uploading and downloading data to and from a mainframe
computer.
Handshaking
Did you ever wonder what all the noise that occurs when analog modems or
fax machines begin to communicate means? The devices are handshaking, or
negotiating, the rules (protocols) of communication. Because all modems and
computers are not exactly the same, there must be some way for the two
machines to determine how to communicate. That is what happens in that
short burst of information between the two modems: Decisions are made about
what transmission speed to use (the fastest speed of the slowest device), how
the data will be packaged, and which device will control the transfer. If both
machines cannot satisfy any of the parameters, the negotiations will fail and
both parties will disconnect.
TIP
Hardware flow control. This takes advantage of some of the extra wires
in the serial connection between the modem and the COM port. These
wires are used to let the other device know that the DCE is ready to send
or receive data. The wires are named RTS and CTS. Hardware
handshaking is sometimes referred to as RTS/CTS.
Software flow control. This uses special characters known as XON and
XOFF to let the other device know that the DCE is starting to send data or
that the data transmission is finished. Software handshaking is slower
and not as dependable as hardware handshaking. Only some very old
modems use software handshaking. If given a choice, always use
hardware flow control.
Modem Standards
As with every other communication device, standards are needed to ensure
that both sides speak the same "language." Modems have their own set of
standardized communication conventions.
Error Detection
Some modems offer various forms of hardware error detection and correction.
Such features usually require matching firmware in the modems at both ends.
Data Compression
Communication Standards
There were no standards during the early days of modem communication. The
only way to ensure data transmission was to place identical modems at the
sending and receiving ends of the transmission. Compatibility was a great
concern, and proprietary modems were the norm.
Today, modems comply with several standards. There are two sources for
these standards:
Bell Telephone produced the first generally accepted modem standards (103
and 212A); they developed out of the market-dominant position of the
telephone company in telecommunications. To compete, other vendors offered
products that would recognize the Bell command set. This scenario occurred
more than once with subsequent standards.
CCITT Standards
The CCITT modem standards are commonly known as Vdot standards because
each is named using the letter V followed by a decimal point and a number.
The Vdot standards set out detailed requirements for the use of various
modem speeds, incorporation of data-compression schemes, and error
correction.
MNP Standards
56-Kbps Modems
Originally, there were three 56-Kbps modem standards: K56flex, x2, and V.90.
Unfortunately, these standards were not compatible at 56 Kbps, so to achieve
the highest possible speed, both modems needed to use the same standard.
Several companies developed the K56flex standard, and U.S. Robotics
developed the x2 standard. Currently, the V.90 standard has replaced both the
K56flex and the x2, and most 56-Kbps modems can be upgraded to this
standard. If you have a 56-Kbps modem and want to upgrade to V.90, check
the manufacturer's Web site for instructions and download the appropriate
software.
Modem Commands
Just like the early computers that needed MS-DOS commands to tell them
what to do, modems also need commands. Programmers also needed a
standard command set to incorporate the use of modems into their software.
Unfortunately, there are no true standard command sets for modems because
manufacturers are free to create their own. There is, however, one set of
commands that has been accepted as a de facto standard. Most modems today
are Hayes-compatible. In the early 1980s, Hayes developed the AT command
set.
These commands are very useful as diagnostic tools for today's computer
professional. To use these commands, make sure the communication software
is loaded and the computer is in terminal mode. Unless the modem is set up to
autoconnect (online mode), it will be in command mode and ready to accept AT
commands. The following table lists some of the more useful AT commands
used by computer professionals.
Command Function
Lets you know that your modem is plugged in and turned on.
AT
The mode should respond with OK.
ATE1 Echoes the command on the screen.
Turns off the echo to the screen. Some modems will not run
ATE0
correctly when the echo is on.
Takes the telephone off the hook. Should elicit a reply of OK
ATH or 0 from the modem, or a dial tone and an OH indicator if
it's an external modem.
Turns the speaker on for the dial tone. ATL0 is the lowest
ATM1
volume and ATL2 is medium volume.
ATM0 Turns the speaker off.
Takes the phone off the hook and dials a number if one is
included with the command (for example, ATDT555-2222).
The second T is for tone; substitute P for a pulse phone.
ATD
Include a W (ATDTW) to instruct it to wait for a dial tone
before dialing. Include a comma anywhere after the
command to instruct it to pause before continuing to dial.
Enables result codes. A troubleshooting aid. Type ATV1 prior
ATQ0 to this command and you will get back verbose result codes
(OK-BUSY-CONNECT 2400,9600-COMPRESSION:V.42bis).
ATQ1 Disables result codes.
ATH, ATH0 Hangs up the modem.
This resets your modem to a predefined state. You can
ATX configure your own reset state. If it wasn't set previously, it
can be reset to the factory's default setting.
Troubleshooting
It can be very frustrating when a modem does not function as expected.
However, you can follow these simple guidelines to determine whether the
modem is really broken or something else is the culprit.
Modems convert parallel digital data to and from serial analog data.
Modem speeds are based on bps.
CCITT (now ITU-T) establishes standards for modem communication.
AT commands are used to manually communicate with and test a modem.
Modems can be installed internally or externally.
The primary modem problem is IRQ conflicts.
Modems and ISDN TAs do similar things but are not the same kind of
device.
3 4
Lesson 2: The Internet and Web Browsers
Once the domain of academics and defense contractors, the Internet is now a
part of everyday life. Browsing for news, chatting with online friends, and
exchanging e-mail are common PC activities for young and old.
Most LANs make use of passwords and other forms of security, but the Internet
is one of the most open networks in the world. Some common Internet uses
include communication; locating lost friends and family; researching
information for school or work; and locating businesses, products, or services
(such as travel). The Internet can be a valuable resource for virtually anything
and everything.
Internet Basics
The Internet is really a collection of services. Let's take a look at the most
important services and the major concepts behind them.
When people say they are "surfing" the Net, they are probably visiting the
collection of hyperlinked Web sites known as the World Wide Web ("the Web"
or WWW). These Web sites are located around the world, and their numbers
continue to grow by the thousands every day. Each Web site within the Web
has a unique address called a URL (Uniform Resource Locator).
NOTE
The Web is a network of host sites that can be accessed for information. Most
pages provide information to clients using the Hypertext Transfer Protocol
(HTTP— this is the http:// seen in the full address line in a browser).
Pages can be hyperlinked so that, when a user clicks on a text string or image
that has been coded as a link, they are shown the contents of the linked page.
All Web pages use some derivative of SGML (Standard Generalized Markup
Language) to code pages so the browser can "read" the instructions on how to
display and link material on the pages. A committee of government and
industry experts in networking, information systems, and publishing designed
this standard.
Some purists lament how open the design of HTML is, but that openness allows
for additional plug-ins that let browsers handle animation, sound, streaming
video, and other enhancements to the Web experience.
Browsers
A browser is the most common Internet application for the end user. The two
most popular are Microsoft Internet Explorer and Netscape Navigator. These
programs "open" Web pages for viewing, can access and download remote files
using FTP, and perform other routine online tasks. Figure 15.5 shows a
browser in action viewing the Microsoft Web site.
Figure 15.5 Surfing the Web with Microsoft Internet Explorer
Electronic Mail
Electronic mail, usually known as e-mail, is the most commonly used function
of the Internet, allowing users to send and receive messages (and files)
electronically to and from millions of people all over the world. Electronic
mailing lists allow users to join group discussions with people who share their
interests. Like regular mail (now often called snail mail), e-mail is also sent to
an address (a virtual one).
To make use of e-mail, one must have access to an e-mail server, an account
on that server, and a program to send and receive messages. Microsoft
Windows includes Microsoft Outlook Express as an e-mail client. Several
others, like Eudora and Hotmail, are available online. You can also find several
products either as stand-alone software or bundled (as in Office 2000) as
commercial software products in stores. Virtually all ISPs offer e-mail as part
of their packages, and free accounts are available as well.
To set up an account, you will need to know the address information for both
the inbound and outbound mail servers (obtained from the provider), as well
as the account address (usually in the form of
mailto:[email protected]). The account will have a password that can
usually be stored so the user does not have to enter it each time mail is sent
or received. Check with the vendor and program documentation for detailed
information on setting up specific programs to handle e-mail and connecting to
an ISP. (Windows 95 and 98 and Windows Me all include an Internet
Connection Wizard that makes it easy to connect to the Internet by prompting
you for all of this information.)
NOTE
FTP
FTP is a special application used for uploading and downloading files to and
from the Internet. Programs like Win-FTP and Cute_FTP offer an easy-to-use
interface for moving files to a remote computer and are popular with
Webmasters. Most new browsers support downloading files via FTP
automatically.
TCP/IP
IP Address
ISPs
ISPs furnish the connection between dial-up (modem) users and the Internet.
Although some are big names with millions of users, there are many more that
serve local areas with both dial-up and hosting plans.
URLs
As mentioned, the URL is the Web's address system. To access a Web site, the
user must enter the designated URL on the network. Each URL begins with the
character sequence http://. The letters HTTP are an acronym for the Hyper-
text Transfer Protocol, which identifies the Web site as an address. The rest of
the URL is the name of the site. For example, Microsoft's URL is
http://www.microsoft.com. (Because it is universal, it is seldom necessary to
first type the characters "http://" when typing a URL in a browser; most
engines take it for granted.)
Domain
Domain Description
.com Commercial organizations
Internet core networks (also used by some Internet-related
.net
enterprises)
.edu Educational institutions
.org Nonprofit organizations
.gov U.S. government nonmilitary institutions
.mil U.S. government armed services
Two-letter country code (for example, .ca for Canada, .de for
.xx
Germany)
NOTE
DNS
DNS (Domain Name System) is the hierarchical naming system used for
identifying domain names on the Internet and on private TCP/IP networks.
DNS maps DNS domain names to IP addresses, and vice versa. This allows
users, computers, and applications to query the DNS to specify remote systems
by their domain names rather than by IP addresses.
DNS Server
A DNS server is a computer that does the job of matching names and
addresses in the DNS system.
Getting Connected
These days, many computer professionals are involved in getting their clients
online. Before actually setting up the system, you need to determine just how
the computer will access the Internet. Once that was as simple as choosing a
modem. Today that job has become a bit more complicated with the advent of
faster alternatives to POTS. If the customer is planning to use ISDN, then you
will need an ISDN TA. DSL (Digital Subscriber Line) satellite and cable
connections will also require special hardware. Some connections, such as DSL
and cable, may be "always on," meaning that the computer is constantly
connected (when the computer is on). Most modem and ISDN customers make
use of dial-in service, and a connection is only active when the user opens an
application that accesses the Internet. One practice that is becoming more
common is adding a firewall between a computer and the Internet to improve
security. A firewall may be another computer or a stand-alone device that acts
as a gateway to the Internet, monitoring incoming traffic. It can help prevent
the introduction of a virus or attempts to "hack" into the protected system or
network. Firewalls have long been employed in network environments.
Most people use a dial-up connection to the Internet via independent ISPs that
provide local community-based service to users, but popular national ISPs such
as The Microsoft Network (MSN) are useful if you travel because many of them
have toll-free numbers for dial-up access or many local numbers throughout
the country. Local ISPs are appropriate for customers who are looking for a
cost- effective company that offers local (including technical) support.
You also need to consider which browser(s) to set up to "surf" the Internet.
Most ISPs (especially local ones) provide only the connection or gateway to the
Internet. Others provide their own browser software package. Most ISPs allow
you to use your choice of browsers. Some local and national ISPs provide
startup software that includes their recommended browser, as well as FTP tools
and other Internet utilities. From time to time, Web surfers will encounter
pages that work well only with a specific browser or with a specific plug-in like
a Flash! player. In this case, it might be necessary to install additional
software or more than one browser.
Using Ping
Under Windows this program can be run in a DOS window accessed by typing
command in the Run dialog box. The syntax is ping -switches address. For
example, entering ping -t 12.12.122.255 would search for and ping TCP/IP
address 12.12.122.255 until you press Ctrl+C to end the action because you
set the -t switch. The following table shows the switches for the ping
command.
Switch Function
-a Resolves addresses to host names.
-f Sets a "Don't Fragment" flag in outgoing packets.
-i
Specifies the Time to Live for outgoing packets.
<TTL>
-j
<host- Loose source routing along host-list.
list>
-k
<host- Strict source routing along host-list.
list>
-l
Sends packets to the size set in the brackets.
<size>
-n Sets the number of echo requests to the value given within the
<count> brackets.
-r
Records the route for count hops.
<count>
-s
Time stamp for count hops.
<count>
Pings the specified address until stopped. You can view
-t statistics and then continue pinging by pressing Ctrl+Break.
Stop completely without statistics by pressing Ctrl+C.
-v
Specifies type of service.
<TOS>
Sets the length of the wait periods (in milliseconds) for a
-w response before showing a timeout error. You may need to set
this if the host is slow in responding.
Lesson Summary
The following points summarize the main elements of this lesson:
Modems convert parallel digital data to and from serial analog data.
Modem speeds are based on bps.
CCITT (now ITU-T) establishes standards for modem communication.
AT commands are used to manually communicate with and test a modem.
Modems can be installed internally or externally.
The primary modem problem is IRQ conflicts.
The Internet is a vast ad-hoc computer network.
The most active portion of the Internet for the average user is the Web,
but many other services are available as well.
The Internet gateway most people use is a dial-up connection and a
browser.
The Internet uses the TCP/IP protocol and DNS to route traffic.
Any technician who services an Internet connection should understand
how to use the ping utility to check TCP/IP connections.
3 4
Review
4. What is the name of the chip that converts data from parallel to serial?
7. Define handshaking.
8. What are AT commands and how can a computer technician use them?
Answers
3 4
Chapter 16
Operating System Fundamentals
About This Chapter
In this chapter, we shift our attention from the realm of hardware to the
software that lets us put the computer to work. There are literally thousands
of software packages on the market, ranging from productivity tools like word
processors to simple reminder note functions, but the most fundamental type
of software is the operating system.
User Interface
The user interface is one of the most important, yet underappreciated, parts of
any operating system. A correctly designed interface allows the user to
interact with the computer, accessing its power without having to learn
complicated control methods. Today, the Windows-based environment, making
use of a mouse, a keyboard, drop-down menus, and scrolling content areas, is
the dominant form of user interface.
The operating system is responsible for creating and maintaining files, placing
them on storage media, reorganizing them, ensuring their integrity, and
erasing them as needed. The design of the operating system determines the
naming convention for files. For example, MS-DOS originally limited the name
of a file to eight characters with a three-character extension following a period
to denote the file type.
Device Management
The operating system does not automatically know the nature of the computer
components that exist on the system. To control hard drives, accept display
information from graphics adapters, or communicate with printers and other
peripheral devices, the operating system must be enabled with drivers and
command sequences.
The operating system needs to provide methods for preparing storage media,
like floppy and hard drives, and to work with its file system. It controls all the
machine's hardware and its functions, tracking the status of communications
ports, printer ports, and remote devices like Iomega Zip drives or printers;
providing memory management; interacting with any TSR (terminate-and-
stay-resident) programs; and maintaining the integrity of its own operation.
Most operating systems are loaded as software. They must include boot
sequence code that can be accessed during system startup so that they can be
loaded into memory and made functional when the computer is turned on.
They must be provided with installation routines as well as troubleshooting
and recovery techniques for reinstallation in the event components become
corrupted during use.
Error-Handling Capability
Problems ranging from severe damage to simple user error can cause a system
to become unstable. A well-designed operating system will be able to detect
such problems, display error messages to alert the user, and provide the
ability to recover without significant loss of data or corruption of the operating
system.
Housekeeping Utilities
Networking Capability
There were once many variations of DOS, some with proprietary labels, but
today, most references to DOS are synonymous with MS-DOS. The following
table provides a thumbnail overview of the history of MS-DOS, showing the
development of features as each new version was released. You can use this
information to get a general picture of the development of the PC operating
system as it matured.
In spite of improvements with each new version, MS-DOS was never able to
overcome critical limitations. DOS was designed to work as a stand-alone
operating system, lacking any native networking support. The need to
maintain backward compatibility with early Intel processors forced DOS
developers to contend with the severe memory limitations left over from the
original 8080 design.
In fact, DOS always had the ability to keep within the hardware limits of the
basic PC of its day. That meant a very low memory overhead and a simple user
interface that assumed no more than the most basic display system. All
versions used a command-line user interface and required few files present on
the system to run basic services. The command prompt was a standard part of
PC life during the days of DOS for those who did not use Windows (and very
few people did until the release of Windows 3.1). The user interface involved
simply typing an appropriate command following the prompt in the proper
syntax and pressing Enter.
The command prompt could vary, but the most common form was C:\>
(usually known as the C prompt), where the letter stood for the active drive
and a flashing cursor line indicated that the system was ready to accept a
command. Technicians and power users working on Windows-based systems
still need to be comfortable with the DOS command prompt. As you will see in
Lesson 2, using this prompt is still a fundamental requirement in setting up a
new system or hard drive.
MS-DOS includes three core programs that are required to make a drive or
floppy disk bootable and load the operating system into memory:
IO.SYS. The interface between the hardware and the operating system
code
MSDOS.SYS. The main operating system code
COMMAND.COM. The interface between the user and the operating
system code
These three files can be seen as layers, each taking an area of responsibility.
Virtually all operating systems work this way. Because MS-DOS is a relatively
simple operating system, examining its approach provides insights into how
more complicated operating systems function.
Although these three core files would make a system operational, MS-DOS had
limitations. One of the great advantages in the PC design is its open
architecture. No two computers have to be exactly alike, so supporting these
variations means having custom device drivers, memory configurations, and
some way of recognizing and managing exactly what is on each system.
Microsoft developers came up with a simple solution: MS-DOS used two
optional startup files to process custom commands required by the user,
hardware devices, or applications. These files were the following:
CONFIG.SYS. Loads extra hardware and device drivers not built into
IO.SYS
AUTOEXEC.BAT. Loads TSR programs selected by the user and sets up
environment variables such as TEMP and PATH
Windows uses a boot process that is quite similar to DOS (we look at it later),
and some versions can actually use the AUTOEXEC.BAT and CONFIG.SYS files.
Booting the system is a term that originated in the early days of computer
operations, coming from the saying "pulling yourself up by the bootstraps."
Here is a summary of the steps involved and how the core files described work.
1. When power is first applied to the system, the computer performs the
POST, a series of self-checks stored in permanent read-only memory. The
POST code includes instructions that cause the machine to locate and
invoke an operating system if it exists.
2. The ROM BIOS (read-only memory basic input/output system) on the
motherboard looks for an operating system. It checks for the presence of
IO.SYS and MSDOS.SYS. The locations to be checked are defined in the
CMOS (complementary metal-oxide semiconductor) and usually involve
first searching the A (floppy disk) drive and then the C drive.
3. The operating system processes the CONFIG.SYS file (if present on the
boot drive). CONFIG.SYS contains information to configure the system
environment, including special memory management overlays and
hardware drivers.
4. COMMAND.COM is loaded.
5. The operating system processes the AUTOEXEC.BAT file (if present).
AUTOEXEC.BAT loads programs and user-defined settings.
6. If no programs (such as Windows) are invoked by AUTOEXEC.BAT,
COMMAND.COM presents the active-drive prompt and waits for a
command.
In MS-DOS, the file was the primary unit of data storage on the computer,
allowing the system to distinguish what represented a single collection of
information from another. Files were organized into directories. File and
directory names were up to eight characters long and files could have a three-
letter extension following a period. Names were not case-sensitive, and,
internally, the system made no distinction between uppercase and lowercase
characters in naming conventions. When operating in DOS mode, the same
restrictions apply.
Most DOS users quickly came to understand the basic naming conventions of
the operating system. Several extensions were universally used and a number
of others gained wide acceptance. These naming conventions have carried over
into the Windows environment. The following table presents several
extensions that all computer technicians should be able to recognize and use.
Extension File Type Used For/Meaning
Program/application
.exe Executable files.
files
.com Program files Command files.
.sys System files To define and configure options.
A text file that can be run to execute a
series of commands or launch programs.
.bat Batch files DOS offered a series of options that
could be used to perform a wide variety
of tasks automatically.
Plain ASCII (American Standard Code
.txt Text files
for Information Interchange) data.
Word processing file text with
.doc Document files
formatting.
Software that configures a hardware
.drv Driver files
device.
Windows Version 1.0 was released in 1985, providing a graphical interface and
little else. Version 2.0 followed in 1987, and it was popular in the engineering,
design, and graphics and desktop publishing communities. It wasn't until the
release of Windows 3.1 in 1992 that this operating environment became
popular.
Microsoft Windows 95 took its name from the year of its release. With it,
Microsoft changed more than the naming convention; it changed Windows into
a full-fledged 32-bit operating system.
The menu system offers the same basic commands for file, print, copy,
and save operations.
Selecting text or objects with the pointing device or keystroke commands
is done in a consistent manner.
Clicking and dragging mouse functions are the same.
The sides of most application areas provide scroll bars for displaying text
and graphics not currently visible in the window.
Windows can be overlapped and resized to make the best use of the
screen area.
Data can be cut and pasted among applications, and data held in one file
can be accessed and used by another program.
This common approach shortens the user's learning curve for unfamiliar
applications. On a programming level, application developers have access to a
toolbox of Windows routines, so they do not have to reinvent the wheel every
time they want to invoke a menu or dialog box.
The multitasking capability of Windows allows the user to have more than one
application open and switch among them, even cutting and pasting data from
one open window to another. DOS was designed to run on 8086 class
machines, with a conventional memory limit of 640 KB of RAM. Windows
overcomes this restriction by implementing new modes of memory utilization.
You should be familiar with how these modes operate for the exam.
Operating Modes
Real Mode
This MS-DOS mode, called real mode, is now virtually obsolete. However, some
older MS-DOS applications and hardware still require the use of real mode.
Support of real-mode applications and hardware is part of downward
compatibility. Even in the Windows 95 and Microsoft Windows 98
environments, you will encounter terms, such as real-mode driver, which refer
to operating at this level.
NOTE
Standard Mode
Windows 2.0 broke free of the MS-DOS 1-MB barrier by making use of the
286-level protected mode of operation. Protected mode Windows could address
up to 16 MB of RAM. Although MS-DOS programs could run only in the first
megabyte of memory, specialized programs were written that would run in
(and only in) the extended memory controlled by Windows. The term protected
mode refers to the use of protected memory. (Standard mode is run with the
processor in protected mode.) Along with Windows protected mode came the
now-famous General Protection Fault (GPF). Encountering this error generally
means that some portion of the Windows protected mode has been violated
(for example, the program is trying to write data outside the portion of
memory allocated to it).
MS-DOS programs can run only under Windows in real mode. Running 286
protected mode worked well for the special programs, but once in protected
mode, it was not possible to return to real mode without resetting the CPU
(only the CPU—not the computer). The MS-DOS program would unload when
the user switched back to Windows. These versions (1.0 and 2.0) of Windows
could run only one MS-DOS program at a time.
Windows Runtime Version
Introduced with the Intel 80386 CPU, the 386 protected mode allowed
addressing up to 4 gigabytes (GB) of memory, supported virtual memory, and
allowed multiple MS-DOS programs to run simultaneously. Beginning with
Windows for Workgroups 3.11, only 386 enhanced mode operation allowed for
use of the operating system's features. Real mode was still used in a limited
way for advanced diagnostics and development, but this method of operation
restricts the system's performance dramatically.
Applications are resource consumers that must request access to any resource
using standardized subroutines called the application programming interface
(API). Another file called a dynamic-link library (DLL) can address the Windows
core directly. These small files store subroutines that either come with the
compiler that created the application or are created by the programmer. DLL
files always end with the extension .dll. Loss or corruption of DLL files will
cause an application to lock up or be prevented from loading.
NOTE
RAM is the most important resource that Windows must manage. Windows
provides a way to gain memory when there is none using virtual memory, the
ability to make something other than RAM chips hold data. Windows can create
a special file (called a swap file) on the hard disk drive to act as a "virtual"
RAM chip. Although this allows Windows to access additional resources, the
hard drive is much slower than actual RAM. To compensate for this difference
in speed, Windows prioritizes programs and caches the less frequently used
ones to the slower hard drive, thus allowing the most active program to use
the speedier RAM chips.
To get around the problem of resetting the CPU to run an MS-DOS program,
later versions of Windows have the ability to run what is known as virtual
8086 mode, an extension of 386 protected mode that allows for the creation of
virtual 8086 machines. A virtual 8086 machine is a segment of RAM that
operates as if it is an 8086 computer. Windows will run itself in one virtual
machine (VM) and allocate another VM to an MS-DOS program. Using several
VMs, Windows can overcome the limitations of running only one MS-DOS
program at a time.
Windows for Workgroups 3.11
Microsoft Windows for Workgroups was an upgrade to Windows 3.1. It works
and runs like Windows 3.1 with a few enhancements, such as better
networking capabilities for sharing files and printers. It also includes two utility
programs: Schedule+ and Mail Service.
Windows 95, Windows 98, and Windows Me
Unlike earlier versions of Windows, Windows 95 became a true operating
system in its own right. In addition, Windows 95 ushered in the era of Plug
and Play technology, which allows the operating system to detect new
hardware automatically. These versions of Windows overcome the limits of
DOS and the 640-KB memory limits, can easily be networked, make use of the
Internet, and are aimed at the home and general office markets. Windows Me
is the most recent mass-market edition of the Windows 9x family and offers
improved reliability and recovery, enhanced Plug and Play support, and
extended multimedia capability.
Windows NT
In 1993, Microsoft released another operating system aimed primarily at the
professional scientific, engineering, and design markets. When it was first
introduced, Microsoft Windows NT was used in relatively simple network
installations. Over several revisions, it has been enhanced to support the
needs of corporations ranging in size from small to large and, more recently,
the needs of the Internet and intranets.
NOTE
Lesson 1 presented the basics of operating systems—what they are and what
they do. It also provided a summary of the development of mainstream PC-
based operating systems: MS-DOS and Windows. This lesson takes us one step
further, into the realm of configuring an operating system and using core
applications to maintain the system and investigate its performance using
command-line applications and tools. It is not intended to be a complete
course in command-line operations or all the fine points of the applications
that are available from it. Both are well beyond the scope of this book.
NOTE
NOTE
Type the command mem. You can use uppercase, lowercase, or mixed case;
DOS commands are not case-sensitive. The result should look somewhat like
the example in Figure 16.1, an illustration that shows how the command
interface works.
Figure 16.1 The command prompt and MEM application
The basic concept of command interface operation is quite simple. You type in
a command, and when you press Enter, the operating system loads and
executes the command. That's exactly what happens, as shown in Figure 16.1.
The information displayed on the screen shows the memory usage of the
current system configuration. It was obtained by the memory command
MEM.COM. Once the program has executed, the prompt with a blinking cursor
reappears. It shows where characters will appear when you type them and
indicates that the system is ready to accept a command.
You can modify the appearance and information presented by the command
prompt in several ways to meet your personal preferences and needs. Working
with this feature will help you understand how the command interface works
and make you more familiar with using it. If you have access to a computer,
you should have it running Windows with a DOS session window open. If you
are running DOS, you should have an active command prompt with flashing
cursor displayed. (The instructions that follow assume that you are working at
the computer.) Provide the information displayed on the screen, if you can, to
make it easy to follow along.
Type the command PROMPT /? or HELP PROMPT, then press Enter (the
syntax varies with the version of Windows or DOS; it's OK to try one and then
the other). Commands are shown here in uppercase to make them stand out,
but you can type them in uppercase, lowercase, or any combination, as DOS is
not case-sensitive. After executing the command, something similar to the
following information should be displayed on your screen (the exact
information will vary with the version of DOS being used):
C:\>help prompt
Changes the command prompt.
PROMPT [text]
text Specifies a new command prompt.
Prompt can be made up of normal characters and the following special cod
$D Current date
$G > (greater-than sign)
$N Current drive
$P Current drive and path
$S (space)
$T Current time
Press any key to continue . . .
We used the DOS HELP command to find out how to use the PROMPT
command. HELP is an internal command, meaning the user doesn't have to
know exactly where it resides; it is always available when the user has a
prompt. The listing generated when the program executed started by
explaining what the command does. The rather terse reply shows how this
command can be used to customize how the prompt appears and the
information it provides. The next line shows the syntax that must be used to
actually enter the command. In this case, it is the command followed by the
desired text that is to be the new prompt. Do not enter the brackets when you
actually use the command.
The listings given later show some of the special options that can be added to
the text string. The final line in the preceding example, Press any key to
continue, tells you that more information on the command is still coming but
cannot fit on the screen. You must press a key to display the rest of the
information before the system will return an active prompt because the
program has not finished executing.
To show you exactly how this command works and make you comfortable with
the syntax used at the command line, we will experiment a bit. In the
command line type
then press Enter. Your screen should look similar to the following example:
Try a few more strings, maybe your name with the date, and so on. Once you
feel you understand how the command and the syntax work, change the
prompt by typing the command prompt$P$G (which will give a prompt that
looks like C:\>, where C is the active drive letter), and move on to the next
part of the lesson.
External commands are programs that exist as separate files. To use them you
must already be in the directory where the file exists, or tell the system
exactly where to find the file by typing in the complete path to its location. You
should be familiar with external commands because they are also common to
the Windows environment. DOS mode provides several external programs and
commands.
NOTE
Keep in mind that the exact options and operation of MS-DOS and
DOS mode under Windows will vary from version to version.
Command Function
CHDIR or Changes the directory (for example, cd\word would take you
CD to the Word subdirectory).
Examines the file allocation table (FAT) and directory
structure on a drive, checking for errors and inconsistencies
CHKDSK that can keep you from accessing a file. It also locates lost
clusters and can convert them into files for later deletion. It
can also reclaim wasted space.
CLS Clears the screen.
Copies files or disks. To copy all files from the myfiles
subdirectory to the A (floppy) drive, the command would be
COPY copy c:\myfiles\*.* a: Note that an asterisk (*) designates a
wild card in DOS. In this case, you are copying all files with
all extensions to the floppy drive.
DATE Changes the system date.
DEL Deletes files (for example, c:\del MYFILE.TXT).
DIR Lists a directory of files.
Views directories one page at a time. This allows you to view
DIR /P a subset of the directories when you cant see all of the files
on a single screen. (Directories can be quite long.)
Displays wide format in columns: Only the filename is listed,
DIR /W
not size, date, or time.
DIR /W /P Displays large directories in columns one page at a time.
Compares two disks. The syntax is: a:\ diskcomp a: b: or
DISKCOMP diskcomp a: a: (the computer will prompt you to insert the
second disk to be compared).
MKDIR or
Makes a directory.
MD
PROMPT Changes the appearance of the cursor.
RENAME
Renames a file.
or REN
RMDIR or Deletes a directory. This works only if the directory is empty
RD of all files, including hidden ones.
TIME Changes the system time.
TYPE Displays (types) a text file.
VER Displays the version of MS-DOS in use.
Command Function
Makes a copy of a complete disk. Requires that both the
DISKCOPY
source and the destination disk have the same format.
Invokes the text editor program. This program is useful for
EDIT making changes to text files, such as editing CONFIG.SYS
and AUTOEXEC.BAT.
Prepares a disk for receiving files. Places a root directory on
FORMAT
the disk.
FORMAT
Formats a disk as a system disk.
/S
Sometimes recovers a deleted file; works only if the disk has
UNDELETE
not been modified since the file was deleted.
Copies the contents of one disk to another disk. Does not
XCOPY require both disks to have the same format. (Note that it will
not copy hidden files unless you use the /h switch.)
Command mode is a good bit different from Windows, in which you can click
(or double-click) on an icon to launch a program. In DOS mode, you have to
know the name of the program you want to run and the directory where the
program resides. There is very little information on the screen, and navigation
is much different from within Windows. To use the command interface
effectively, you must understand the concept of path and the syntax for
entering commands and navigating the file system.
DOS Mode Navigation and File Management
The DOS file system uses a tree structure for its directories, which is based on
a concept of root and branches. The primary volume on a drive is called the
root; it can contain both files and directories. Each directory creates another
branch, which can also contain files and directories. A nested directory is a
subdirectory of the level above it.
The best way to become familiar with directory structure under DOS is to
actually work with it. Because DIR is a system-level command, you don't have
to provide the full path to it. Open up a command window, if you do not
already have one open on your desktop. Type dir, and then press Enter. The
result should be similar to the one shown here, which has been edited as an
example.
C:\WINNT>dir
Volume in drive C has no label.
Volume Serial Number is 7CF4-ED00
Directory of C:\WINNT
12/07/2000 06:13a <DIR> .
12/07/2000 06:13a <DIR> ..
09/06/2000 01:45p 16,214 Active Setup Log.txt
02/22/2000 03:47p 161 mmdet.log
12/07/1999 07:00a 50,960 NOTEPAD.EXE
12/09/2000 08:18a <DIR> system32
12/07/1999 07:00a 44,816 twain_32.dll
09/02/2000 07:05a 262 wcx_ftp.ini
97 File(s) 4,665,353 bytes
31 Dir(s) 13,901,348,864 bytes free
C:\WINNT>_
DIR provides a wealth of information if you know how to read it. The first two
lines identify the drive for which the directory was requested, and the third
gives the actual location involved. The actual listing of the files is presented as
a table with four columns. The leftmost column shows the date on which the
file was created; the second column gives the system time at which it was
written to disk. The third column indicates if the item is a subdirectory (which
is, in reality, a file that holds other files), and the fourth column provides the
file size and the name of the file. The final two lines display the total number
of files in the directory and their aggregate size in bytes, followed by the total
number of subdirectories on the drive and the number of subdirectories with
the total amount of free space on the drive.
NOTE
DOS does not support Windows long filenames. Some files may
appear truncated, with something like a ~1 used to show the fact
that the filename is actually different—for example, longna~1.doc.
Also be aware that different versions of Windows and MS-DOS will
have listings that may vary from the ones shown in this lesson.
Notice the first two directory listings. Their names seem to be made up of dots.
They are not actually directories but placeholders for navigation. The best way
to see how they work and get practice with DOS mode file operations is to
create a directory and file, then navigate a bit. To do so, perform the following
steps:
1. Change to the C drive, if you are not already logged on to this drive, by
typing C: at the command prompt.
2. Type in cd .. until the prompt shows that you are in the root directory of
the C drive with the prompt C:\>.
3. Next, create a directory named Test. Type md test. MD is the Make
Directory internal command, and test is the name we are giving it. So the
syntax is md [new directory name].
4. Use the DIR command and make sure the new directory is there. Now
type DIR test. The result should look like this:
C:\>dir test
Volume in drive C has no label.
Volume Serial Number is 7CF4-ED00
Directory of C:\test
12/09/2000 10:04a <DIR> .
12/09/2000 10:04a <DIR> ..
0 File(s) 0 bytes
2 Dir(s) 13,883,142,144 bytes free
C:\>
The DIR command gave the contents of Test because you asked it to by
following the command with the name of the directory.
PATH [[drive:]path[;...][;%PATH%]
PATH ;
C:\>path
PATH=C:\WINNT\system32;C:\WINNT;C:\WINNT\System32\Wbem;C:\PROGRA~1\RESOU
Your result will vary based on the way your system is configured. Any
programs in any of the listed directories can be run from any location on the
machine. Any other programs can only be run in their own native directories
or be activated by typing in the full path before the program name. Listings
with the ~ as part of the name, like RESOUR~1, are truncated. The name has
been shortened because DOS mode does not support the long filenames used
in newer versions of Windows. Experiment with the PATH command until you
are comfortable with it, and then move on to the next exercise.
TIP
Use the PATH command to set the active path to include the drive
and directories of any programs you are troubleshooting in
command mode. That lets you run them without changing to that
location or typing the full path. Once the machine is rebooted, the
path will return to its default setting.
Creating a Batch File
To create a new file in your test directory using the COPY command, perform
the following steps:
1. Have a DOS window open. Make sure you are still in the test directory
with the DIR command by making sure the prompt reads C:\TEST>. (If
not, type CD \Test.)
2. Type the following at the command prompt:
The ^Z at the end of the list is made by pressing Ctrl while you press Z.
This writes the file to disk. Be sure to press Enter after each line to make
the line breaks. After you type ^Z, press Enter. The system should
respond with:
1 file(s) copied
3. Repeat the DIR command. You should see the test file in the directory of
C:\Test:
4. Now type newfile, then press Enter. You should see the batch file you
just created run, showing first the version of Windows being used and
then the system memory configuration.
5. Type CLS (another internal command) at the prompt; the screen output
will clear and you should be back at the C:> in the test directory
(C:\Test>).
In this exercise, you created a file by typing commands in a plain ASCII file
and giving it the name NEWFILE.BAT. A batch file is a program that will run a
series of existing commands or applications when you enter its name at the
DOS prompt.
Renaming a File
By now, you should be getting comfortable with the command prompt. There
are some additional skills you should have before taking the exam. One of
these is the simple act of renaming the file. The test file we just created
doesn't really explain what it does and it is a bit long. To rename a file,
perform the following steps:
The syntax of the rename command should be obvious by now. (You can
also use the shortened ren.) Enter the RENAME command followed by the
original filename, then the new filename. Next, do a little navigation.
C:\>vm.bat
vm.bat is not recognized as an internal or external command,
operable program or batch file.
C:\>
The exact wording of the error message will vary based on the versions of
DOS and Windows you are using. Earlier versions will simply show "File
not found." DOS was never known for verbose help or error messages.
5. To run a program or use a file that is not in the current directory, you
must provide the full path to the location of the file when you issue the
command. In this case, you can run your batch file by pointing the
operating system to the test directory like this: C:\test\vm.bat. First
provide the drive letter, then use back slashes (\) to tell a system to
move down into subdirectories, and finally give the full filename.
6. Try it, then clear the screen with the CLS command.
7. Now move back into the test directory, erase the test file, and remove the
new directory to leave your system in the same condition it was in when
you started this exercise. Once again, use the CD command to move into
another directory. Type the following:
cd \test
erase vm.bat
cd..
rd test
dir
When you give the ERASE VM.BAT command, depending on the version of
DOS you are using, you may be prompted to confirm your command. Just
press Y to confirm the operation and continue.
Now run a final directory command to check and make sure that the
action has been completed. The directory should not be in the listing.
Using Edit
At times you may need to edit text files like AUTOEXEC.BAT, CONFIG.SYS,
SYSTEM.INI, or other primary configuration files in DOS mode. You could use
the COPY command techniques employed earlier, but there is an easier way.
All versions of DOS and Windows that you are likely to encounter include a
text editor called Edit that you can use to create and modify text files. Figure
16.2 shows Edit open in a DOS window.
Any computer technician should be able to operate a basic word processor and
should find Edit quite familiar to use. Because of that, we won't dwell on its
finer points. There are a few things that you should be aware of, however, if
you are not used to the DOS environment:
If the path to the file you wish to edit is not defined, you will have to
enter it to run Edit and display the file you wish to edit.
Unless you have a mouse driver for DOS mode installed in
AUTOEXEC.BAT (or as part of native DOS operation), you will not have
mouse support in Edit. Press Alt plus the first letter of the menu desired
to open a menu, then the cursor keys and Enter to select and use a
function.
We work with additional DOS commands in the next lesson and in Chapter 17,
"Introducing and Installing Microsoft Windows," Chapter 18, "Running
Microsoft Windows," and Chapter 19, "Maintaining the Modern Computer," in
conjunction with very important troubleshooting techniques. The following
table presents a quick reference of some of the important terms and concepts
you should be familiar with when working in DOS mode, as well as for the A+
certification exam. Some items are a review of the previous discussion; some
expand on the material just presented and will be used as we continue.
Term Description
A symbol used to separate each directory level, for instance
Backslash
C:\Windows\Utilities. For this reason, it is a reserved
(\)
character and cannot be used as part of a filename.
The ability of the operating system to distinguish between
uppercase and lowercase letters. MS-DOS commands are not
Case case-sensitive. Traditionally, MS-DOS commands have been
sensitivity represented in documentation as uppercase. You can type
MS-DOS commands in either uppercase or lowercase (they
are shown in this book as uppercase).
Anytime you are entering data, whether in an application or
in an MS-DOS command, the cursor (usually a small flashing
Cursor line) indicates the place where the next character will be
inserted. It is a good idea to always know where your cursor
is.
Each drive in a computer has its own letter designation. The
default drive is the active drive. Unless otherwise specified,
any commands act on the default drive. The current default
Default
drive is indicated by the MS-DOS prompt. For example, if you
drive
want to see a directory (the command is DIR) of files on the A
drive and the default drive is C, you need to type DIR A:.
Otherwise, you will see a directory of the C drive.
Directoriesknown as folders in the Windows and Macintosh
environmentsare locations for storing files. Every disk
Directory contains a main directory known as the root directory. Below
the root directory is a hierarchical structure of other
subdirectories.
The DOS prompt usually displays the active drive letter (for
DOS instance, C) and directory. This indicates that the operating
prompt system is ready to accept the next command. (The prompt is
user-changeable.)
Drive
DOS assigns letters to each drive during the boot process.
pointers
You can type a command and press Enter to execute it. If you
Entering make a mistake, correct it by using the Backspace or Del
commands keys. Use Esc to start a command again. Press F3 to repeat a
command.
Error Brief technical messages that are displayed when an error
messages occurs.
A filename is made up of three parts—a name of up to eight
Filenames characters, a period, and an extension of up to three
(also characters. The name can include any number, character, or
filespecs) the following symbols (reserved characters): _ ( ) ~ ! % $ &
#. You cannot use spaces in MS-DOS filenames.
This symbol is used to indicate that a command can be
Greater
redirected to an output device. For example, to redirect the
than (>)
directory command to a printer, type DIR > LPT1.
The address to a file. The path consists of the drive name, the
Path location of the file in the directory structure, and the
filename (for example, C:\Mystuff\MYFILE.DOC).
The command promptuser interface provided by
Prompt COMMAND.COM to signal to the user that the computer is
ready to receive input (for example, C:\> or A:\>).
Many MS-DOS commands can be used with a switch (/
followed by a letter) to invoke special functions. Because no
comprehensive MS-DOS manuals are available as part of the
Switches
shipping product for versions later than MS-DOS 5, when you
follow a command with a space and /, a list of parameters and
switches available for that command is displayed.
Syntax is the arrangement and interrelationship of words in
phrases and sentences. In computer jargon, it is the correct
format in which to type a command. In MS-DOS, every letter,
Syntax number, and space has a value. The most common problem
when typing MS-DOS commands is adding or leaving out a
letter or character. Simple typing mistakes are the most
common cause for Bad command or filename errors.
These can be used to expand a search for a file with the DIR
command, and allow the user to locate files of a similar type
or name. The question mark (?) matches any character in a
specified position, and the asterisk (*) matches any number
Wildcards of characters up to the end of the filename or extension. For
example, to search for files beginning with the letter A, the
command would be DIR A*.* or A?????.* (the second
command would find a file that starts with the letter A and
any other five characters).
Working with CONFIG.SYS and AUTOEXEC.BAT
As mentioned in Lesson 1, the CONFIG.SYS and AUTOEXEC.BAT files can be
used during the boot process to execute commands and load legacy drivers in
many versions of Windows (although their use diminished beginning with
Windows 95). The CONFIG.SYS file is run first. It sets up and configures the
computer's user-defined hardware components. The AUTOEXEC.BAT file
executes commands and loads TSR programs.
NOTE
TSRs were very popular during the heyday of MS-DOS and were
often used to adjust how the operating system used memory. If
these programs improperly adjust the system memory stack or
cause a conflict, they can cause a variety of difficult to isolate
problems. The problem gets worse if more than one program is
being used. In the Windows environment, you should generally
stay away from using TSRs unless they are absolutely necessary.
We cover their operation with different versions of Windows in
Chapter 17, "Introducing and Installing Microsoft Windows," and
troubleshooting in Chapter 18, "Running Microsoft Windows."
CONFIG.SYS Commands
The following table lists several CONFIG.SYS settings and their functions. Keep
in mind that not all settings are available (or recommended) in all versions of
Windows.
Setting Function
Allocates reserved memory for transferring information to
BUFFERS
and from the hard disk.
Enables MS-DOS to use country conventions for times,
dates, and currency. Example:
COUNTRY COUNTRY=044,437,C:\DOS\COUNTRY.SYS. (You do not
need to use this in the United States unless you wish to
use an alternate convention.)
Loads a device driver into memory. Example:
DEVICE
DEVICE=C:\DOS\EMM386.EXE
DEVICEHIGH Loads a device driver into upper memory.
Loads part of MS-DOS into upper memory area. Example:
DOS
DOS=HIGH, UMB
Specifies the number of file control blocks (FCBs) that MS-
FCBS
DOS can have open at the same time.
Specifies the number of files that MS-DOS can hold open
FILES
concurrently. Example: FILES=60
Loads a memory-resident program. Example:
INSTALL
INSTALL=C:\DOS\SHARE.EXE/F:500 /L:500
Specifies the maximum number of drives the computer can
LASTDRIVE
access. Example: LASTDRIVE=Z
MOUSE.SYS Loads a mouse driver.
Specifies whether the Num Lock key is on or off when MS-
NUMLOCK
DOS starts.
Specifies the name and location of the command
SHELL interpreter. The interpreter converts the typed command to
an action. The default for MS-DOS is COMMAND.COM.
Specifies special options in MS-DOS. The /n switch will
SWITCHES disable the use of the F5 and F8 keys to bypass startup
commands (used for security).
DEVICE=C:\WINDOWS\HIMEM.SYS
DEVICE=C:\DOS\EMM386.EXE NOEMS
DOS=HIGH, UMB
BUFFERS=20
FILES=80
FCBS=4,0
LASTDRIVE=Z
DEVICE=C:\CDROM\NEC2.SYS /D:MSCD001 /V
AUTOEXEC.BAT Commands
The following table lists several commands that are often used in an
AUTOEXEC.BAT file.
Setting Function
Displays commands as they are executed. ECHO OFF
ECHO
suppresses the display of commands as they are executed.
Stops the execution of AUTOEXEC.BAT and displays the
PAUSE
message Strike any key to continue.
PATH Defines the search path for program commands.
SET Displays, sets, or removes MS-DOS environment variables.
SMARTDRV Provides disk caching.
KEYB Configures a keyboard for a specific language.
Starts the Share program, which will install the file sharing
SHARE
and locking capabilities.
Loads the DOSKEY program. You can use the DOSKEY
DOSKEY program to view, edit, and carry out MS-DOS commands
that you have used previously.
MOUSE.EXE Loads a mouse driver.
PROMPT Sets the display of the command prompt.
@ECHO OFF
PATH C:\DOS;C:\WINDOWS;C:\
DOSKEY
SMARTDRV
UNDELETE /LOAD
VSAFE
MSAV
TIP
DOS mode programs offer tools for working with a Windows system that
is not properly loading the user interface or 32-bit modes and cannot be
repaired using safe mode.
DOS mode is still used for performing low-level disk operations like
partitioning hard drives and running some virus test and recovery
programs.
A+ technicians should know how to navigate in DOS mode and perform
basic file operations.
CONFIG.SYS and AUTOEXEC.BAT are two files that allow custom settings
during the boot phase but are not fully supported (or even recommended)
with some 32-bit versions of Windows.
3 4
Lesson 3: File Systems
One of the most important roles that an operating system plays in computer
operations is defining and managing the file system. This lesson examines the
major file systems in use today. In configuring a system or performing a new
upgrade, it is often necessary to choose the appropriate file system for best
performance, full access to operating system features, system security, data
reliability, and compatibility.
Explain the differences among the major file systems used on today's PCs
Understand why different types of media (magnetic, CD-ROM, and so on)
have different file systems and attributes
Understand how to choose which file system to use on a new hard drive
or floppy disk
Understand file attributes and how they are used
The file system defines many things including file naming conventions, file
size, and, in some cases, the capacities of the storage products themselves. In
the case of products like CD-ROMs, digital video discs (DVDs), and Zip drives,
the manufacturer or a standards committee defines the capacities.
Magnetic media like floppy drives and hard disks employ several different
types of file systems, depending on the operating system on the target
computer. Choosing the right operating system is an important step during the
installation or upgrade process.
Key Terms
The following table provides definitions for key words that are necessary to
understand the operation of file systems. Most should already be familiar from
earlier lessons, but a quick review is in order.
Term Definition
A set of contiguous bits that make up a definable quantity of
Block
information on storage media.
A system device (usually a hard drive, floppy drive, or CD-
Boot disk ROM drive) that is used to start a computer. Usually, but not
always, this device also contains the operating system code.
The sector on a disk containing a small amount of information
Boot
that defines the devices layout, identifies the file system, and
sector
allows the drive to be declared a boot device.
The number of disk sectors that can be treated as a single
Cluster
object by the operating system.
Dual boot A hard disk or system that has been configured so that it can
operate using more than a single operating system or file
system.
A method of encoding data, usually to prevent unauthorized
Encryption use, in a form that can be read only by using the decoding
mechanism.
End-of-file This is the last bit of information contained in the file. In the
(EOF) preceding lesson, when you created a batch file, the Ctrl+Z
marker character was the EOF marker.
Data collected and stored as a single unit on some form of
File
mass storage medium.
The linked list system used to track disk space currently in
use. This was the fundamental method used by early DOS
FAT
operating systems, and is still available today in several
formats.
File The way the file content is formatted for individual files
format within a file system.
File
An integer value set by the file system to denote an open file.
handle
A feature in a network file system that allows an individual
File
file to be locked so that two instances cannot be open for
locking
modification at the same time.
The identifier used to label the individual file for use by the
operating system or user. Different file systems have
Filename
different naming convenions, allowed lengths, and reserve
characters that cannot be used in naming a file.
The equivalent of a directory that is used to hold a collection
Folder
of files in the Windows file system.
The act or program used to prepare a disk for use by a file
system. Also referred to as a high-level format, it requires
Format that the hardware already be prepared with a low-level
format and be partitioned. This usually involves dividing the
media into a series of tracks and sectors.
An initial preparation of a hard disk used to prepare the
Low-level media for partitioning and high-level formatting by a file
format system. Low-level formatting is usually performed using
firmware or software provided by the drive or disk controller
manufacturer.
Master A specific sector on the first partition of the drive containing
boot executable code and information about the operation of the
record start process for a given operating system.
Indicates the logical structure (partitions) of a hard disk.
Partitions are used to divide a large physical drive into
Partition smaller virtual sections. Each section can then be described
table as a logical drive and have its own individual drive letter. The
partition table is kept in the same location as the master boot
record.
The key partition on a hard disk. Most systems only have one
Primary
primary partition, which holds the boot sector and operating
partition
system. This volume is usually designated the C drive.
Sector The smallest storage unit on a disk.
A series of sectors residing on a disk and arranged so that
Track they lie at the same horizontal distance from the center of
the disk.
Volume A physical or virtual drive designated on a storage system.
Comparing and Choosing File Systems
There are several file systems commonly used on today's PCs. For most end
users, the operating system of choice is Microsoft Windows, of which several
varieties are available, including Windows 95, Windows 98, Windows Me,
Windows NT, and Windows 2000. All offer two or more options for choosing a
file system. As an A+ technician, you will be expected to help users select the
right operating system, install an appropriate file system, and explain the
differences among them. The actual choice of which file system to use can
involve several factors, as follows:
There are three basic varieties of the FAT file system in use today. All start
with the letters FAT, followed by numbers designating the number of bits
required for a single FAT entry. For example, the floppy drive version known
as FAT12 uses a 12-bit table. FAT16 was introduced with MS-DOS 3.0 to
enable support for large drives. FAT32 is the preferred file system for Windows
95 and later versions and supports long filenames.
FAT-based file systems are quite popular and perhaps the most widely used
PC-based file system. Reasons for their popularity include ease of installation,
a wide range of management tools, and compatibility with a wide range of
operating systems including all versions of Microsoft Windows, OS/2, and
many PC versions of UNIX.
Deciding to use FAT and choosing which version to use was simple in the past.
In the days of MS-DOS, FAT16 was just about the only option. FAT32
complicated matters. It offers several enhancements but lacks some of the
broad compatibility of its earlier sibling.
The following table compares the various features of FAT16 with FAT32.
FAT16 FAT32
Widest range of compatibility with
Limited compatibility with operating
operating systems, supported by
systems.FAT32 for Windows 95
all versions of DOS, Windows 95,
OSR2 (Operating System Release 2)
Windows 98, Windows NT,
and Windows 98 are only compatible
Windows 2000 and several
with those operating systems.
versions of Unix.
MS-DOS bootable floppy can be
Cannot use a DOS or Windows 95
used to boot a problem system and
(other than OSR2) disk to boot and
access all files on a viable FAT16
access files on the hard drive.
hard drive.
FAT32 allocates disk space more
Small system footprint offers efficiently than FAT16, allowing the
performance advantages on system to make more efficient use of
volume smaller than 250 MB. disk space. It often allows storing of
much more data compared to FAT16.
Requires manual intervention to
Can automatically employ a backup
make use of the backup copy of
copy of a volume's FAT if the master
the FAT if the original becomes
copy becomes corrupt.
corrupted.
No backup provided of the boot Provides automatic backup of the
sector.If the boot sector becomes boot sector, providing a way to
corrupt, all data on the volume possibly recover the volume in the
may be lost. event of a boot sector failure.
Individual volume size cannot
Supports drives up to 2 terabytes
exceed 2 GB and still maintain full
(TB) in size; largest volume size is
compatibility with all supported
32 GB.
operating systems.
No version of the FAT file system provides built-in security or data
compression methods.
Offers much better performance if
Smaller cluster size can result in
the system must use real-mode
faster load times for applications and
MS-DOS or Windows 98 operating
large data files.
in safe mode.
Dual boot of DOS and Windows,
Dual boot with non-FAT32-supported
Windows NT, and Windows 98 is
operating systems is not supported.
possible with FAT16
FAT16 is limited in the length of
file names to the 8.3 convention of FAT32 supports long filenames of up
an eight-character name with a to 255 characters with the ability to
three-character extension and no use spaces.
spaces
FAT16 volumes can be converted to FAT32 using the Drive Converter
Wizard. Once done, the drive cannot be returned to FAT16 operation.
The NTFS File System
With the advent of Windows NT, Microsoft introduced the NTFS (NT file
system). Like FAT32, it supports long filenames and the use of spaces in
names. Unlike FAT, NTFS is optimized for multiuser environments. It provides
an extra level of file security, and is more reliable than previous file systems.
This technology was improved with the release of Windows 2000. As with the
advances in the FAT system, there are some minor incompatibilities among
versions due to the changes needed to allow for improved features. As a
result, not all file system operations available in the Windows 2000 version of
NTFS can be used when accessed by systems running Windows NT. Microsoft
recommends using the new version of NTFS on all machines running Windows
2000 unless there is some overriding reason to use an alternate file system.
The following lists detail the advantages and disadvantages of the NTFS file
system.
NTFS volumes are not directly accessible under MS-DOS, Windows 95, or
Windows 98.
NTFS volumes cannot be used as a primary partition for dual boot system
configurations with those operating systems.
For volumes smaller than 400 MB that consist mainly of small files, the
additional overhead required for NTFS features may result in slower
performance than under a FAT file system.
File System Size Limitations
Different file systems are available on PCs developed during different points in
hardware development. As a result, their capabilities relative to hard disk size
mirror the increasing capacity of the hardware at the time the operating
system was released. The following table shows the supported volume size and
default cluster size for the various operating systems. Keep in mind that under
FAT, drives smaller than 16 MB are created using the FAT12 mode. Another
consideration is that MS-DOS, Windows 95, and Windows 98 cannot access
FAT16 volumes larger than 2 GB.
As you can see from the data here, the size of the volume to be formatted and
used has a direct bearing on which operating systems are available.
File System Security
Maintaining the security of files on an operating system is another
consideration when choosing a file system. Generally speaking, NTFS offers
significant security advantages over other PC-based file systems. FAT offers
the advantage of less overhead plus greater OS compatibility and may be
better suited when advanced security mechanisms are not needed.
FAT was developed without any direct consideration of multiple users on the
system, so designers had no concern about prying eyes. You cannot lock a file
so that it can be kept from anyone who has access to the system. Instead of
passwords and locked files and directories, FAT offers a set of attributes that
provide a method to prevent overwriting files that need to stay in the same
form, to hide files from being shown in regular directory listings, and to denote
if a file has been backed up. The FAT maintains a marker for each file noting
whether or not an attribute is set.
In DOS mode, you can set file attributes using the attribute command. In
Windows, you can adjust attributes by right-clicking a file and choosing the
Properties option from the shortcut menu. The following listing shows the
syntax and options when using the attribute command in DOS mode:
ATTRIB [+R | -R] [+A | -A ] [+S | -S] [+H | -H] [[drive:] [path] filenam
+ Sets an attribute.
- Clears an attribute.
R Read-only file attribute.
A Archive file attribute.
H Hidden file attribute.
/S Processes matching files in the current directory (folders)
and all sub directories.
/D Processes directories as well as files.
NTFS uses the concept of permissions rather than attributes to control access
to files and folders contained within the file system. These vary somewhat
from version to version, but regardless of the version, permissions are set
using a dialog box that can be accessed by right-clicking on the file or folder
involved and choosing the appropriate options from the dialog box. Once set,
the permissions apply to both local users and anyone accessing the system
over the network. Figure 16.3 shows the Security tab in the AUTOEXEC
Properties dialog box. It lists the names of the individuals and roles (such as
the system administrator) that have been granted permissions to the file, as
well as the permissions involved. Select options by clicking the appropriate
button.
Figure 16.3 The Windows 2000 AUTOEXEC Properties dialog box's Security tab
The basic options include Full Control, Modify, Read and Execute, Read, and
Write. A more extensive collection of options including who can delete
subfolders, create files within a folder, modify permissions, and take ownership
of a file or directory are included in the Advanced Permissions dialog box
(shown in Figure 16.4), which is accessed from the Properties dialog box by
clicking the Advanced button.
Figure 16.4 The Advanced Permissions dialog box
Lesson Summary
The following points summarize the main elements of this lesson:
File Systems
5. What are the two MS-DOS user-definable startup files and their purpose?
6. Which DOS command is used to show the amount of free space left on a
disk?
11. Your customer wishes to have a machine configured for both the Linux
operating system and Microsoft Windows 2000 Professional. The computer
has only one hard drive. Identify which file system you would recommend
and explain the reasons for your choice.
12. Explain the steps involved in preparing a new hard drive to accept an
operating system.
13. Why didn't the designers of the FAT file system provide a method for
limiting access to files and folders?
Answers
3 4
Chapter 17
Introducing and Installing Microsoft Windows
About This Chapter
This chapter describes the different members of the Microsoft Windows family
and covers both the planning and installation procedures of a Windows
deployment for both Microsoft Windows 98 and Microsoft Windows 2000 as
required for the A+ Certification Exam. It is a prerequisite for Chapter 18,
"Running Microsoft Windows," which focuses on operating and managing these
popular PC environments. To gain the high level of proficiency required of
today's computer professional, you should obtain advanced training in these
operating systems and build a library of references after completing this
chapter.
NOTE
Although end users are often only familiar with the version of Windows loaded
on their computers, as a computer technician you must be familiar with the
entire line of current Windows editions. You must be able to recommend the
correct product to clients and to install and support it. The following sections
provide a quick overview of the Windows operating systems currently on the
market.
Windows 95
Windows 98
Three years after the introduction of Windows 95, Microsoft released Windows
98. This version of Windows was the first to really take advantage of Plug-and-
Play technology. Hardware meeting the Plug-and-Play requirements is
automatically detected and configured by the operating system after
installation. It eliminated the need to set jumpers and memory addresses for
direct memory access (DMA) channels and it added internal support for new
hardware standards including USB (universal serial bus) and IEEE (Institute of
Electrical and Electronics Engineers) 1394.
The most recent edition of Windows designed for home and general office use
shipped in the third quarter of 2000. Once again modifying the naming
convention, the product is called Windows Me. It continues the trend in
Windows development toward improved ease of use, ease of maintenance, and
support for the newest PC hardware.
Windows Me is closely linked with the Internet. Users can elect to have the
system automatically updated over the Internet via the Microsoft Web site.
The System Restore feature makes it just as easy to undo configuration
changes and return a computer to a preupdate condition. Windows help is now
presented in a browser window, and the user interface can be tailored to mimic
browser operation in many respects. The Windows Media Player is now a full-
fledged multimedia tool. Local area networking has been simplified with
increased use of wizards for setup of devices like printers and scanners that
can be shared. Internet settings can be copied from browser to browser so that
multiple computers can share the same logon information and favorites.
Windows NT
Power users and those using computers for scientific and technical applications
often require more powerful systems than the average office worker. Network
servers require higher degrees of reliability, security, and advanced
management tools. To meet those needs, Microsoft developed another series of
operating systems, calling the initiative New Technology (NT). The result was
the Windows NT platform.
Windows 2000
Windows 2000 is actually a family of four products that all offer the same basic
features, user interface, and core technology. The basic features and
differences of these versions are
The following table lists the minimum hardware requirements for the versions
of Windows you are likely to encounter as an A+ technician. Keep in mind that
many users will actually need a system that exceeds these requirements
(especially for technical, multimedia, or graphics applications) to run
effectively. Evaluating those needs is a topic for the next chapter.
NOTE
Windows
Windows
Hardware Windows Me 2000 Remarks
98
Professional
Intel Pentium
Pentium 150
Pentium 133 processor with
300–400 MHz
(Pentium II MMX or
recommend
486 300 equivalent
Processor for full
DX/66 recommended); required to
multimedia
will support take full
and video
dual CPUs advantage of
editing
multimedia.
All 32-bit
versions of
64 MB (can Windows
Memory 16 MB 32 MB support up to 4 benefit greatly
GB) from
additional
RAM.
Typical
installations
often exceed
2 GB with 650
Disk space 120 MB 480 MB twice the
MB free
minimum disk
space
required.
Many
VGA or higher;
applications
SVGA Plug-
Display VGA with need at least
VGA or higher and-Play
system 16 colors 256 colors,
monitor
many 24-bit
recommended
color modes.
CD-ROM or
digital video CD-ROM or
disc (DVD); DVD; 12X or
CD-ROM Optional
8X or faster faster drive
drive recommended
recommended
Input devices Keyboard and Windows 98-compatible pointing device
Other Modem, sound card, and additional RAM, plus network
recommended card if the system is to be used as part of a LAN (local
devices area network)
NOTE
The amount of RAM necessary on any Windows system depends on the user
and which applications are to be run. The system requirements are just a
starting point. Typical Microsoft Office users can usually work quite well with
32 MB of RAM. Moderate users of the COPY and PASTE commands will need to
increase RAM to at least 64 MB. If users require their applications to be a click
away (all running at the same time), they will need at least 128 MB of RAM. In
the 32-bit Windows world, additional RAM always boosts performance.
The recommended CPUs in the preceding table are obviously the bare
minimum. Intended use of the computer is the best guide to the appropriate
CPU. For general productivity applications with little or no multitasking, the
minimum processor requirement may suffice. This is especially true if a good
graphics adapter with its own coprocessor is also installed on the system.
Machines slated for use in scientific, technical, and graphics-intensive
applications, or machines intended for multitasking will need more power.
Machines using multimedia applications will benefit from a Pentium with MMX
capability. Remember that adding more RAM often provides a bigger boost
than the next bump in CPU power.
Storage Space
The task headings that follow work equally well for Windows 2000, Windows
98, Windows 95, and virtually any other operating system. Specific
information for Windows 2000 and Windows 98 is contained under each
heading as appropriate. Some of the tasks are identical; others vary somewhat
to take advantage of the strengths of each platform. Having both compared
side by side underscores the differences and highlights key features of the two
operating environments.
Some platforms are more forgiving than others, reducing the possibility of
problems during installation. An old saying from the early days of advanced PC
operating systems is, "If a computer is running DOS it only proves that the
machine is not on fire." The MS-DOS environment is a very simple design,
without multiple processes running in the background. Today's environments
must monitor the status and memory usage of several programs at the same
time. In general, the more complicated the computer or operating system, the
more care must be taken during installation.
Decide on the Boot Method(s)
Many people are unaware that more than one operating system can run on a
single computer. Computer technicians, however, may be called on to install
two or even three operating systems on the same machine. Both Windows 98
and Windows 2000 support dual boot operation. Each does so slightly
differently, and the exact configuration depends on the operating systems
involved. These might include various versions of Windows 95 or Windows 98,
one or more editions of Windows 2000, Windows NT, UNIX, and in rare cases,
even OS/2.
Dual boot installations require going through all setup steps for an individual
operating system setup, and the complexity of ensuring that one installation
doesn't damage the other, that file systems are compatible, and that all
hardware devices and software required by each operating system are properly
accessible.
You can dual boot Windows 2000 with the following operating systems:
MS-DOS, Windows 3.x, OS/2, Windows 95, Windows 98, Windows Me,
and Windows NT Workstation 3.51 and 4.0.
Each operating system must reside on a different disk partition.
In most cases, it is necessary to use the FAT16 file system.
You need to install application software under each operating system on
the computer so that it will be entered in the appropriate registry. You do
not have to actually install it to two locations unless you load it on a file
system that one of the operating systems can't read. When setting up a
dual boot system involving MS-DOS or Windows 95 with Windows 2000
Professional, Windows 2000 Professional must be installed last.
If you are using a dual boot machine in a Windows NT domain or a
Windows 2000 Active Directory network, each operating system must
have its own machine name to be properly recognized on the domain.
The C drive must be a FAT16 partition and include enough free space for
the Windows 98 installation.
The two operating systems must reside in different partitions or hard
disks.
Dual boot systems combining Windows 98 and Windows NT are
discouraged because the two operating systems do not use the same
registry settings or device drivers. If you choose to attempt this, you need
to set up all programs twice, separately loading any required drivers.
Dual booting Windows 98 and Windows 95 is not possible because both
operating systems use the same boot file and the second installation will
overwrite the first.
Windows 98 cannot access files on NTFS partitions, and Windows NT
cannot access files on FAT32 drives.
Confirm Hardware Requirements and Compatibility
As mentioned in the last lesson, to ensure both proper performance and
reliability, a computer's system components must meet or exceed the system
requirements of the operating system involved. Minimum requirements are
just that: minimums (and only in the most basic application environment are
they enough to operate efficiently). With Windows 2000, it is also advisable to
choose components from Microsoft's hardware compatibility list. In general,
with Windows 98 and Windows Me, choosing products that are certified to work
with the operating system and display the appropriate certification logo is
sufficient.
Obtain and Perform Updates to Firmware or Components
Before performing an installation, check the system BIOS (basic input/output
system) firmware for devices like graphics cards, SCSI (Small Computer
System Interface) controllers, and any third-party drivers for updates. It is not
uncommon for businesses to update their code to reduce problems or improve
performance. Any updates that do not require the operating system should be
performed before the installation process begins, and drivers should be made
available for those that do.
Choose Between an Upgrade or a Clean Install
During a clean install, an operating system is installed on a hard disk that is
either brand new or has recently been formatted and is currently without an
operating system. An upgrade simply adds new components and updates
existing ones. Each approach has advantages. The clean install ensures that
there is no difficulty with old files and drivers, offering a "fresh start."
Depending on the existing operating system, an upgrade can simply transfer
many of the existing system settings, user preferences, and network
connections to the operating system.
NOTE
The reason for this step should be clear. Although Windows 2000 and Windows
98 offer Plug-and-Play installation, not all hardware will be recognized
properly, and you may be confronted with device conflicts. In many network
environments, you need to know the machine name, domain name, IP
(Internet Protocol) address, printer locations, and so on. With an open
dialogue waiting for data input, you don't want to have to shut down the
machine to obtain the needed information.
It is also a good idea to make copies of any batch files, user profile files (like
Favorites from the Internet browser), and so on, and save them on a floppy
disk so they can be easily migrated to the new system.
Remove or Disable Possible Conflicts and Verify Existing
Settings
Now it's time to eliminate potential trouble spots. Many programs, like
antivirus scans, third-party memory managers, TSRs (terminate-and-stay-
resident programs), and legacy 16-bit device drivers may interfere with this
program or cause it to improperly configure the system. Be especially careful
of any third-party disk partitioning software.
If you are upgrading from an earlier version of MS-DOS or Windows that has
active CONFIG.SYS and AUTOEXEC.BAT files, remove any unwanted 16-bit or
legacy entries, then leave the files in place. Both Windows 98 and Windows
2000 can use those files to make appropriate listings in their registries.
NOTE
If you plan on using either a FAT16 or FAT32 file system, and need to either
create or change partitions, you will have to use the Fdisk utility to prepare
the drive. Fdisk is a command-line utility that dates to the early days of MS-
DOS. Before using Fdisk, be sure to back up any needed data that exists on
the target drive. Any modification using Fdisk immediately results in the
destruction of all data on the partition.
CAUTION
The Windows 98 and Windows 95 startup disks, along with all versions of MS-
DOS, provide copies of Fdisk. If possible, use the same version of the program
as the operating system you are installing. (This is not possible with Windows
2000.) The program can be run from inside a DOS command window in
Windows 98, but cannot be operated on the drive that was used to boot the
system. You will most commonly run the program at a regular DOS command
prompt. The complete syntax is
FDISK [/STATUS] /X
/X indicates that it ignores extended disk access support. Use this switch if you
receive disk access or stack overflow messages.
With many versions of Fdisk, if you are working with a hard disk with a
capacity greater than 512 MB, you will be asked if you wish to enable FAT32's
large drive support. Answering Yes enables the 32-bit FAT file system. If you
answer No, the system uses FAT16, which limits partitions to 2 GB, even if it is
a larger drive. Although FAT32 offers many enhancements over the older 16-
bit mode, as already discussed, it is not widely compatible with other file
system formats.
Make sure you are working on the drive you want to modify if there is more
than one physical hard disk on the system. Check the Current Fixed Disk Drive
listing. The first fixed disk is followed by the number 1. A second physical drive
would be noted with the number 2.
Once partitions are deleted, you may go through the process of creating a
partition to actually use for the new installation. Once that is completed, you
need to mark one of the partitions as the primary partition. In general, this is
the first partition, which will be the C drive. With some operating systems or in
a dual boot configuration, this may not always be true. Once you have
completed the modifications, the program verifies the disk integrity and
requires a restart of the system.
With the hard disk and file system prepared, the computer is ready for its new
installation and you can start the setup process.
Lesson Summary
The following points summarize the main elements of this lesson:
Choose the best method for setting up Windows 98 and Windows 2000
Describe the issues and features with the different types of setup
approaches
Install Windows 98 and Windows 2000
Troubleshoot problems in installation with both operating systems
Running Setup
Running an upgrade allows you to maintain settings that already exist under
Windows 95, Windows 3.x, or Windows for Workgroups. If you are using one of
these operating systems, you should usually run the Setup program from
within the Windows interface.
If you do not wish to keep any of the current settings; if you are loading the
operating system on a new computer or a freshly prepared disk drive; or if you
are recovering from a failed setup procedure, then you should run the program
from a command prompt under MS-DOS. The necessary files are available on
CD-ROM (preferred) or on floppy disks (special order), or they can be copied to
a network location that is available to the target computer. Keep the following
points in mind:
A CD-ROM drive to be used for setup must be accessible from the DOS
prompt. The Windows 98 startup disk includes drivers needed to run both
typical IDE (Integrated Device Electronics) and SCSI CD-ROM drives. If
the CD-ROM is attached to the system via a sound card, it may not be
able to run Setup.
Except for necessary device drivers, network card drivers, and any TSR
programs needed to actually operate the systems, no other application
should be running when you begin Setup. Be sure to disable any third-
party memory managers or antivirus programs.
Running Setup over a network will require about 170 MB of storage space
on the server.
If you are performing a new installation and have the full Windows 98
package for use on a new computer, it will contain a Windows 98 startup
disk. If you are using the upgrade-only package, the program will only
operate if you are installing on a machine that already has a recognized
operating system for improved upgrade, or if you have the disks for one
of those operating systems available to prove that you are performing a
legitimate upgrade.
The Windows 98 Setup program is much improved over the version that was
provided with Windows 95. The earlier product required 12 steps, and Plug-
and-Play technology was in its infancy. It was often necessary to break the
installation routine or restart under Windows 95. That problem has largely
disappeared with Windows 98, which offers much more robust Plug-and-Play
support and a more compact five-step installation.
Making Use of Windows 98 Setup's Command-Line Switches
There are a variety of options available when running Windows 98 Setup in
command-line mode from the DOS prompt that are unavailable when
performing installation from within the Windows environment. The following
list provides most of the switches in alphabetical order along with an
explanation of their function. The syntax is:
Unless overridden, the first thing Setup does is run ScanDisk. If run from MS-
DOS, Setup will run the real-mode version of a program. ScanDisk inspects the
directory structure, FAT, and the integrity of the file system. If you are
installing from within a 32-bit version of Windows, the program will also fix
any long filename errors found.
Once the media have been verified, Setup prompts you to provide several
pieces of information needed before the files can be copied:
It makes the user verify agreement with the end user license provisions.
It prompts the user to enter the product key that verifies that this is a
legal copy of Windows 98. Setup cannot continue unless this is properly
entered. It is usually found on the back of the CD case. In some cases,
the product key step is not required (see Figure 17.1).
Figure 17.1 The Product Key dialog box
It prompts the user for the directory into which Windows 98 will be
installed. Once entered, the program confirms that there is adequate
space for the installation. If unsuccessful, you are prompted to specify
another location or remove enough files so that Setup may proceed.
NOTE
Once a directory structure has been set up, the next step is to choose the type
of installation to be performed. Four choices are offered. Typical installation
provides a standard set of features most suitable for the computer's
configuration. Portable installation includes options useful for laptop users.
Compact installation provides a minimal set of features. Custom installation
provides another dialog box that lets the installer choose the specific options
to be installed. Figure 17.2 shows the dialog box offering these options.
Figure 17.2 The Setup Options dialog box
Another dialog box appears, requiring the user to enter his or her name and
the company name. When the next button is clicked, the user is given the
option to install or remove optional components from the list of features to be
copied to the disk.
The next dialog box requests the computer name, workgroup, and physical
location of the machine. This name must be unique to the network and can
contain up to 15 characters. Names cannot contain punctuation or blank
spaces. The workgroup name has the same limitations. The computer
description cannot contain commas but can be up to 40 characters in length.
This entry is not needed if the computer will not be attached to a network.
Now the user is prompted to provide the geographic location at which the
computer will reside. This is used to allow Web sites to deliver content based
on the region in which the computer is operated. This step does not occur in all
versions of Windows (see Figure 17.3).
Figure 17.3 The Location dialog box
This step requires a 1.44-MB floppy disk or two 1.2-MB floppy disks. The
Startup disk contains all the real-mode files, CD-ROM device drivers, and
utilities needed to start the computer in DOS mode, along with a suite of
diagnostic programs. In the event the system uses specialized SCSI drivers or
a sound card to access the CD-ROM drive, you will need to manually copy
these drivers to the startup disk and adjust the CONFIG.SYS and
AUTOEXEC.BAT files for proper operation. The Windows 98 Startup disk should
be considered a critical part of your technician toolkit, and understanding its
operation is required for both your day-to-day work and for taking the exam.
We cover it in detail in Chapter 18, "Running Microsoft Windows."
File Copy
This stage is when the actual files are extracted from their compressed archive
files (noted by a .cab extension) and copied to the hard drive. There is no need
for user input during this part of the process.
CAUTION
You should not interrupt the copy process for any reason. If the
procedure does not finish normally, the operating system will be in
an unstable state and you may have to repeat the process.
Tuning the Configuration
Once the copy process is done, the computer will be restarted. At this point,
Windows goes through a tuning process to set up the system based on the
devices found on the computer and any settings migrated from a previous
installation of Windows. The program finalizes the Control Panel and Start
menu and asks the user to select the proper time zone. Once the process is
finished successfully, you will see the Welcoming dialog box, which offers
access to information about the features of Windows 98 (see Figure 17.4).
If you have installed Windows 98 over an earlier version of Windows that was
already set up on a network, the appropriate network settings and protocols
should already be loaded. When Windows reboots after Setup is complete, you
should see the appropriate network logon. If you installed Windows into a new
directory or performed a clean install, you will have to use the Control
Panel/Network setting to install protocols and configure the network settings in
order to make the computer a part of the network.
Troubleshooting a Windows 98 Installation
If you follow the detailed planning steps covered earlier in this chapter, the
majority of Windows 98 installations will execute properly and the system will
be ready for use after the Setup routine is completed. However, things don't
always go as planned. As a technician, you need to have an understanding of
what the routine is doing behind the scenes, and know how to troubleshoot a
failed installation. At several points the Setup routine examines the system to
determine the hardware and Windows-related software already installed. It
generates several files that track the actions taken, creating logs that can be
used if either automatic or manual intervention is necessary.
Safe Recovery is a process built right into the Windows 98 Setup code. During
the entire installation, Windows is tracking virtually every action taken. This
information is used if Setup fails in a way that prevents the operating system
from loading successfully due to hardware conflicts, software conflicts, failure
to meet system requirements, system shutdown during the copying process, or
a component failure. Given the wide variation in system configurations, the
failure could be due to any number of reasons. Fortunately, automatic Safe
Recovery often resolves the problem.
Running Safe Recovery is very simple. If you are sure that Setup has hung the
system (there are some components that take a good bit of time to identify
and configure; the system may be busy, or not stopped), wait an additional
three to four minutes, then press Ctrl+Alt+Delete to restart the computer. If
this does not reboot the system, turn off the computer's power, wait ten
seconds, and turn the unit back on. Let the boot process continue normally.
You may be returned to Setup and offered the Safe Recovery option. If so,
select it and proceed with the installation. If not, run Setup again and select
the Safe Recovery option when it appears.
NOTE
If you fail to select Safe Recovery when offered the dialog box,
Setup will repeat the entire Windows 98 Setup process.
Most setup failures are due to hardware detection and system or software
configuration problems. To get around them, Windows uses an iterative
process. When a fatal incident occurs, Windows logs the point of failure and
bypasses the point at which the failure occurred. This method allows Windows
to continue the installation, even when a system has a problematic device.
Windows disables the problem product, so it may not show up as properly
identified in the Device Manager list. You may be able to make the offending
device operational by accessing Device Manager from the Control
Panel/System icon and changing the settings manually. If Setup hangs again,
repeat the process. If the problem is software-related, the Setup Wizard may
suggest removing the software product that is causing problems. In extreme
cases Safe Recovery may not be able to fix a problem, and a dialog box will
appear telling you that Setup cannot continue. If the message offers a
suggestion of the problem's cause, remove the device or software from the
system and start Setup from the beginning.
Beyond Safe Recovery
Sometimes Safe Recovery is not sufficient and manual intervention is
required. In such cases, you should first review the planning process to make
sure no critical issues have been overlooked. If your system meets all
requirements stated by Microsoft and there are no obvious problems, the
information generated by the failed installation can help you pinpoint the
problem. To use it, you must understand both the Windows hardware detection
process and the recovery files generated during installation.
Setup attempts to detect devices that are already installed on the computer
when Windows is added to the system. For devices that support the Plug-and-
Play initiative, an interactive set of queries is used to identify both the product
and its required resources. These devices can include everything from the
motherboard, CPU, and BIOS, to display adapters, mouse, and network
adapters.
Older devices that do not support the Plug-and-Play initiative are also
investigated. Memory addresses, DMA channels, and IRQs are cataloged.
During this process, Windows 98 examines device information and settings
from files like WINDOWS.INI and CONFIG.SYS. Buses (PCI [Peripheral
Component Interconnect], SCSI, and so on) and hardware devices are grouped
into classes and listed in the Registry.
BOOTLOG.TXT is a very useful file for more than just installation issues. It
creates and holds a record of the entire boot process, including which drivers
were loaded and initialized and their status. It is automatically generated
during the setup process, but you can also create it by pressing F8 during a
regular Windows 98 startup, or using the /b switch if you start Windows from a
DOS prompt using the WIN.COM command.
DETLOG.TXT is generated every time the detection process runs, either during
a new Windows installation or by invoking the Add New Hardware Wizard from
Control Panel. It is a user-readable version of the information contained in
DETCRASH.LOG. This file is very useful for a technician, because it can quickly
pinpoint the likely cause of a device that generates an error during
initialization. The following table shows how the entries appear and what they
mean.
Report
Provides Information on
Category
Parameters = Shows the command-line switches specified when Setup
"xxxxxx" was invoked.
WinVer =
######## Shows that environment detection is run.
AvoidMem = Shows the UMB (upper memory block) address range
#####h- specified to be avoided during the detection phase (if
#####h entered)— for example, AvoidMem=c4000-c800
DetectClass: Indicates that detection found no hints that the computer
Skip Class might have a particular class of device present, so it
Media skipped that class.
When one or more skip class entries appear in
DETLOG.TXT, the Analyzing Your Computer screen is
DetectClass:
presented during Setup to allow a manual override of the
Override
decision. Related DetectClass Override lines appear in
DETLOG.TXT for the classes checked.
Describes your selection for the devices the user told
Custom Mode
Windows 98 not to detect.
Shows the number of devices verified from the Registry.
Devices
If the number is 0, there was no existing Registry or it
Verified =
was empty.
System
Device
Listings
Shows that detection looked for that device, followed by a
Checking For description of the device or class. If the device is
detected, Detected shows its resource information.
Network
Adapters
Listings
This section lists the attempts to detect network
Checking For
adapters.
PROTOCOL.INI If detection finds a PROTOCOL.INI file, it saves the
Section [net_card] section in DETLOG.TXT.
NCD: Detection found a network adapter using safe detection
Detecting (usually PROTOCOL.INI) and the system had information
Network for verifying this adapter. If verified, a Detected line is
Adapter included.
NOTE
As you can see, the recovery files store a wealth of valuable information you
can use in the event of a Setup failure. When confronted with an elusive
installation problem, consider opening the appropriate file in a text editor to
help pinpoint where the installation failed. You may have to remove, or
remove and replace, a problematic hardware product.
Chapter 19, "Maintaining the Modern Computer," covers techniques you can
use to troubleshoot a Windows installation when it appears the installation was
successful but the system becomes unstable soon after loading the operating
system. There are a variety of additional tools available that fall outside the
scope of this discussion.
Performing a Windows 2000 Installation
The NTFS file system is a good deal more complicated than the FAT file
systems found in Windows 98, Windows Me, and earlier Microsoft operating
systems. Employing it—which Microsoft recommends with Windows 2000—
involves different installation and management procedures.
The more robust security provided within Windows 2000 adds a few extra
steps, because user and administrative accounts must be present on the
computer for users to gain access to it. There are some other minor
differences, but anyone familiar with the Windows 98 installation process
should have no difficulty installing Windows 2000.
Before proceeding with the actual installation, you should go through the
planning procedure outlined in Lesson 2, paying particular attention to system
requirements. Hardware compatibility is much more important with Windows
2000 than with Windows 95 or Windows 98, and you should be sure that the
system components are all included on the Windows 2000 hardware
compatibility list if at all possible. A copy of the list is included on the Windows
2000 CD (HCL.TXT, located in the Support folder). If a product isn't listed, you
can check the Microsoft Web site at http://www.microsoft.com/hcl. The final
alternative is to visit the vendor's Web site and see if a Windows 2000 driver
or support notes are available there.
It is also a good idea to check the vendor's site to see if new software or device
drivers are available for use with Windows 2000. In many cases the drivers
provided on the Windows 2000 CD will not be the most current. If new drivers
are available, you should obtain them and have them available on floppy disk
for use during installation.
You should make sure that the major system components—especially the
motherboard, display adapter, and hard drive or SCSI controller—have the
most recent version of available firmware. For Windows 2000 Plug-and-Play
and power management features to work properly, the system bus must
support the ACPI standard.
CAUTION
Some software products, especially those that control hardware (like scanners
or sound cards), may require updates to work properly with Windows 2000.
They also must support 32-bit drivers. Many vendors provide upgrade packs
for use with Windows 2000 to convert existing Windows 98 and Windows 95
products. Information on compatibility can be found at
http://microsoft.com/Windows/professional/deploy/compatible/.
Gathering Information
If you are installing Windows 2000 on a computer that already has an existing
installation of Windows 95, Windows 98, Windows NT Workstation 3.51, or
Windows NT Workstation 4.0, you will be offered the option during installation
of having Setup save your existing settings and applications for use with the
new operating system.
You may also choose to configure the system to dual boot and support both
operating systems, as previously discussed. This approach can be useful if
there are older programs or hardware devices that the client wishes to access
on the computer that are not supported under Windows 2000.
If a computer does not support a bootable CD-ROM, you can create a set of
Windows 2000 boot disks or make the contents of the CD available over a
network. If you choose the network approach, the system must be bootable in
such a fashion that you can access the network with privileges to use the
directory where the files are located. Given the wide range of variables in
networks, describing all permutations is beyond the scope of this book. The
following section discusses the steps required to create the floppy disks needed
for Windows 2000 installation if you choose this method.
Creating Windows 2000 Setup Disks
If you decide to start Setup from floppy disks, you will need a set of boot disks.
Here's how to create them from the distribution CD-ROM. Have a computer
with access to a CD-ROM drive running any version of MS-DOS or Windows.
Have four blank, formatted, 3.5-inch, 1.44-MB disks and label them Windows
2000 Setup Disks 1, 2, 3, and 4. Place the Windows 2000 CD-ROM into the
CD-ROM drive. At a command prompt (either MS-DOS or Windows
COMMAND.COM), type d:\bootdisk\makeboot a: (where d: is the drive
letter of the CD-ROM drive). Insert the first floppy into the primary floppy disk
drive (A) when prompted, and follow the instructions when asked to remove
and insert the remaining three disks.
Starting Setup
There are three ways to start the Setup program. As already mentioned, you
can perform an upgrade from within a supported version of Windows. You can
boot the computer directly into the installation routine using either the
distribution CD or the startup floppies. Both of these options turn control
immediately over to the routine. The third option is to run Setup from a
command line using a variety of switches to invoke the process. As with
Windows 98, there are a variety of switches that provide access to the number
of sophisticated options that can be used to fine-tune the setup process.
NOTE
NOTE
Because Windows 2000 supports a variety of file systems, it will prompt you to
specify which you wish to use. If the system will be used only for Windows
2000 operations, Microsoft recommends using NTFS5 for all drives and
partitions. This is the only file system that offers full support for all of Windows
2000's features and provides access to all of the security functions. You can
upgrade existing FAT and NTFS partitions during the setup process, or later
after the new system is up and running.
Keep in mind that you only need to actually create or size the partition that
will hold Windows 2000. If you are planning a dual boot system, a total NTFS
may not be the best approach. The computer must have a FAT file system on
the primary partition for MS-DOS, Windows 95, and Windows 98 access. If you
have any existing DriveSpace or DoubleSpace volumes on the system, they
must be converted prior to starting an upgrade to Windows 2000. Accessing
the new file system using a dual boot system with Windows NT 4.0 requires
that the Windows NT system have Service Pack 5 installed.
No matter which file system you choose, it is important make sure there is
enough hard disk space available beyond the minimum installation
requirements to leave room for system upgrades, utilities, a virtual memory
paging file, and any applications planned for that drive.
From this point on, the setup process continues using the familiar Windows
interface. There may be a delay of several minutes while Setup conducts an
inspection of the target computer and installs and activates devices like the
keyboard and mouse.
Several dialog boxes are then presented to the user to verify the installation
key, customize regional settings, collect the user's name and company name,
set the computer name and administrative password, collect the date and time
settings from the system clock, and obtain information about any existing
network, workgroup, and domain environments the new system will be joining.
CAUTION
Once all that information is gathered, Setup presents a dialog box offering
optional components like IIS (Internet Information Services) and advanced
management and monitoring tools. Clicking OK causes the Windows 2000
installer to actually install those operating system components. This step also
includes setting up the Start menu configuration, setting Registry entries for
the selected components, saving system settings, and removing the temporary
files used during the setup process. Once these tasks are complete, Setup
restarts the system.
Postinstallation Tasks
The official installation process is now finished, but you must perform some
additional tasks before the job is actually complete. When the system restarts,
a dialog box appears, allowing access to the system. You must press
Ctrl+Alt+Delete to proceed to the user logon screen. This step is a security
method to prevent a program from running in the background that can capture
logon information.
Pressing the key combination produces a logon screen that asks you for a user
name and password. Entering a new name and password creates a basic user
account that will provide simple access to this computer. For full rights you
must log on using an account that has administrative privileges. At this point
the only such account is the one you created during the setup process.
Both the administrative account and the new user account are specific to this
computer, and they do not grant access to any network or domain that you
have specified during installation. To gain full access to the network you must
now join the computer to any desired workgroup or domain and set up the
appropriate domain or workgroup user accounts needed to access them. That
may require administrative access to the servers for those networks.
The final task is to create an emergency repair disk (ERD). This disk contains
three files needed to restore the original registry created during the setup
process. This is a change from Windows NT 4.0, which actually saved a copy of
the registry on the ERD.
The ERD is not a bootable disk, and by itself cannot repair anything. It is the
last line of defense if the system becomes corrupted, and the Registry must be
restored. The details of this process are covered in more detail in Chapter 19,
"Maintaining the Modern Computer."
To create an ERD, click the Start menu and choose
Programs/Accessories/System Tools/Backup. Insert an empty, high-density,
3.5-inch floppy disk into the floppy drive. Click the Welcome tab from the open
application and follow the prompts to create the ERD disk. When the process is
complete, remove the disk, label it with both the date and the computer name,
and then store it in a safe place.
Troubleshooting
Given the rigid hardware compatibility requirements and the thorough nature
of the Setup routine, the majority of Windows 2000 installations should
perform as the manufacturer intended—without problems. The following
sections provide suggested troubleshooting tips in case the process fails.
Once you have finished the compliance check, repeat the installation routine.
If it fails a second time, you must take further steps to identify and resolve the
issue.
Windows 2000 creates several logs during the installation process that can be
accessed with a text editor. They are usually located in the \Winnt directory.
They include the following:
Setupact contains an action log describing every step that Setup performs
in chronological order. It also includes the errors that are written into the
error log. A quick scan of this file can often pinpoint a device driver that
did not load or a file that was not copied.
Setupapi is a log of the installation of the different device classes on the
computer.
The Events Log can be accessed if the installation completes but you are
still having trouble with a service that fails to start. This utility can be
accessed from the Control Panel under Administrative Tools. It is covered
in more detail in Chapter 19, "Maintaining the Modern Computer."
Windows 2000 provides a recovery console that can provide basic repairs to a
corrupted system, as well as offering command-line access to a variety of
utilities for inspecting and repairing components. This program is covered in
detail in Chapter 19, "Maintaining the Modern Computer."
Lesson Summary
The following points summarize the main elements of this lesson:
Installing Windows
Superficially, the installation process appears the same for both Windows
98 and Windows 2000. In reality, they are quite different.
During Setup, the installer must have ready information concerning
system configuration and software drivers. You must be ready to answer
all prompts needed to configure the system.
With the maturation of Plug-and-Play technology, most Windows
installations proceed without difficulty.
In the event that an installation does encounter problems, the Windows
environment provides a number of tools for troubleshooting and
producing a successful outcome.
The installation process installs the operating system, but additional tasks
are often required after the process is completed to set the system up on
networks, customize settings, and ensure that third-party applications run
successfully.
3 4
Review
3. Where can you find information about what hardware can be used with
Windows 2000?
5. What is an ERD?
8. What is Fdisk?
9. What are the four setup options offered after Windows 98 Setup prepares
the installation directory?
10. Can Setup be run for both Windows 98 and Windows 2000 from MS-DOS?
11. What is the purpose of the Check Upgrade Only function during Windows
2000 installation and how is it invoked?
12. What should be the first step in troubleshooting any failed Windows
installation?
13. What is the first step required to log on to a Windows 2000 machine (not
during installation, but at any time the system is accessed after Setup is
complete)? What is the purpose of this step?
14. What are the basic minimum system requirements required to run
Windows 2000?
Answers
3 4
Chapter 18
Running Microsoft Windows
About This Chapter
This chapter focuses on operating and managing Microsoft Windows 98 and
Microsoft Windows 2000 with emphasis on the skills needed for the A+
Certification Exam. To gain the high level of proficiency required of today's
computer professional, you should go on to obtain advanced training in these
operating systems and build a library of references after completing this
chapter.
NOTE
Windows 98, like its predecessor Microsoft Windows 95 and the newer
Microsoft Windows Me, is a natural successor to the MS-DOS and Microsoft
Windows 3.1 environments. It is a true 32-bit operating environment offering
improved performance, preemptive multi-tasking and multi-threading
operation, advanced hardware support, better operating system stability, and
the ability to manage large amounts of memory.
The operating system can be broadly broken down into two major components:
the core and ancillary systems. The Windows 98 core consists of four
components: the Graphical Device Interface (GDI), the kernel, the user
component, and the user interface. These four elements all have a matching
pair of two 32-bit and one 16-bit dynamic-link libraries (DLLs). This allows
Windows 98 to use the 32-bit mode of operation to improve performance, also
allowing backward 16-bit compatibility for old devices and applications.
All of the ancillary systems operate using 32-bit mode. Windows 98 comes
with a collection of 32-bit file system drivers that support FAT16, FAT32, and
ISO 9660 format CD-ROM (compact disc read-only memory) discs, and the
DVD (digital video disc) Universal Disc Format. The following sections provide a
closer look at the four primary components and some key subsystems.
The GDI is an imaging system that draws all the objects displayed on the
screen or reads the information to devices like printers that can receive
graphical output. The GDI is also the component responsible for interacting
with the display system and its related drivers. The average user often takes
the generation of the user interface for granted; in reality, it is one of the
most complex tasks performed by the operating system. Many of the memory
problems associated with earlier versions of Windows could be traced back to
graphics display problems and GDI management.
User Interface
The Windows 98 user interface is a 32-bit shell that includes a variety of tools
to make use of the file system and gain access to system services. These
include My Computer, the Network Neighborhood, and Windows Explorer. All
Windows applications can make use of the shell services, including dialog
boxes and the ability to list and view files.
User Component
This core element of the operating system is the I/O (input/output) manager.
It receives and routes input from the mouse, keyboard, microphone, and other
input devices. It also routes traffic to and from the communications ports, the
system timer, and the sound card. In addition, it acts as the output coordinator
for the GDI by controlling the output of display elements like menus, dialog
boxes, and icons.
Kernel
The kernel can be thought of as the core of the core of the operating system.
It controls all tasks: When an application opens, it is the kernel that invokes
the executable file and terminates it when it is done. It loads and manages all
DLLs and allocates memory. The kernel is also responsible for all preemptive
multi-tasking and multi-threading operations.
Process Scheduler
Like Windows 2000, Windows 98 offers support for the Windows Driver Model
(WDM), allowing compatible devices to use the same driver for both operating
systems. Its Plug-and-Play feature is much improved over Windows 95,
allowing for dynamic hardware configuration and all but eliminating the need
for jumpers and manual configuration of adapter cards.
The Virtual Machine Manager (VMM) oversees the key resources required by
both applications and system processes. These include process scheduling,
memory management, exception handling (issuing General Protection Faults
or GPFs), and mapping access to the system BIOS (basic input/output system),
device drivers, and TSR (terminate-and-stay-resident) programs.
The VMM manages the system's virtual machine, the environment in which all
system processes operate. All 32-bit applications are provided their own
individual virtual machines, as are any MS-DOS programs that run in a
protected space. Legacy 16-bit Windows applications are all grouped together
in a single 16-bit virtual machine that emulates an 8086 processor. This 16-bit
machine is said to be operating in V86 mode.
The Windows 98 Virtual Memory Model
Using virtual memory, Windows 98 can provide more functional memory to
applications than the amount of RAM (random access memory) actually
present on the computer. When an application or process needs more memory
than is actually available, the operating system moves data between virtual
memory and the system's hard disks to free RAM for the active process.
With MS-DOS and versions of Microsoft Windows prior to Windows 95, all
processes and active applications shared a single address space. Without the
use of special memory managers, all applications and most system code had to
reside in the first 640 KB of physical memory (RAM). If any process corrupted
the memory stack, the entire system would fail. This memory model
significantly limited how much memory was actually available to both the
operating system and any application and compromised the integrity of the
operating environment.
0–640 KB. The first 640 KB is reserved for real-mode device drivers and
TSRs. This allows backward compatibility for older applications, which
expect to see RAM in this location.
4 MB–2 GB. This region is the province of Win32-based applications.
Each program is in its own private address space.
2 GB–3 GB. This 1-GB space contains the shared Windows 98 core
components and DLLs. This region can be read by any application or
process that needs these resources.
3 GB–4 GB. This is the privileged-mode space, holding the system kernel
code, which controls and directs access to all hardware and memory
addresses.
The Memory Pager actually handles moving blocks of data to and from virtual
memory into the physical address space by dividing the data in equal blocks
known as pages. The code contained in specific pages is moved into RAM when
needed. This approach allows any given application access to the full 2 GB of
memory space provided for it in the Windows 98 memory model.
DOS mode support allows a legacy application to gain exclusive access to the
system resources it needs to operate. Windows 98 does this by creating an
exclusive operating environment known as MS-DOS mode. Applications
running in this space have access to the resources they need as long as their
process is running. This is an exception to the multi-tasking feature mentioned
earlier. Windows 98 provides for this by the use of separate virtual machines
for each MS-DOS mode session.
The WDM
The WDM is the device driver architecture that first appeared in Windows 95
OSR2 and has been improved to work with both Windows 98 and Windows
2000. Some drivers originally designed for use with Windows 95 using the
WDM may not be compatible with these newer operating systems. This
architecture was designed to create a single driver that can be used across the
range of Windows operating systems. This offers several benefits: It reduces
the cost of providing device drivers, makes devices available on a wider range
of platforms, and simplifies distribution.
Device class drivers contain class-specific functions. They are not specific
to a given piece of hardware or system bus, but provide a more generic
function. These are used for classes of products like mice, joysticks, and
keyboards.
Bus class drivers are available for both USB (universal serial bus) and
IEEE 1394 buses on a system. They work to speed up communications
between the hardware layer and the minidrivers.
Minidrivers are hardware-specific and generally operate a class of devices
operating on a specific type of bus. This class includes support for SCSI
(Small Computer System Interface), USB, DVD, IEEE 1394, and network
adapters. Minidrivers can be written to support multifunction cards like a
video capture card that includes both video and sound functions on a
single product. Windows 98 dynamically loads and unloads minidrivers as
they are needed or released to save on memory and avoid usage
conflicts.
Virtual device drivers (VxDs) are 32-bit protected mode drivers
responsible for managing a system resource (either hardware or
software). These drivers do not directly control the hardware device, but
act as an interpreter between the hardware and the application, ensuring
that only one system process controls the resource at any specific time.
Like minidrivers, VxDs are only held in memory when they are actually in
use. Some VxDs are also used with legacy hardware and software to allow
them to function within the Windows 98 environment.
NTKERN.VXD is the operating system services layer for Windows 98. This
layer is always system-specific and allows the minidrivers to function with
more than one operating system. Under Microsoft Windows NT, the
operating system services layer is the hardware abstraction layer (HAL).
32-Bit VFAT
Disk access is provided through the 32-bit VFAT (Virtual File Allocation Table).
Unlike the 16-bit file allocation table (FAT) used before Windows 95, VFAT is a
virtual device driver that operates in protected mode. This provides more
reliability and works with a greater variety of hardware. Don't confuse 32-bit
VFAT with 32-bit FAT, which has to do with how data is stored on a hard disk
partition (the cluster size). VFAT has to do with how files are accessed.
Like the older 16-bit FAT, VFAT links clusters of files together. In the old 16-
bit system, the largest number of clusters on a drive was 65,525; with 32-bit
operation the maximum cluster size is now 268,435,445.
The first 8 bytes of the FAT32 table are reserved for system use. The value of
the final byte is normally 0, set to that value during system startup. When you
issue a proper shutdown command on the system, the value is changed to 1.
If, during startup, Windows detects that the value of the eighth byte is 0, it
assumes the system shut down improperly and ScanDisk runs during the boot
process.
NOTE
In MS-DOS and Windows 3.x, filenames were limited to an 8.3 format; that is,
the filename itself was restricted to a maximum of eight characters in length,
and the extension to a maximum of three characters in length. Filename and
extension are connected by a period, or dot. Beginning with Windows 95, the
operating system added long filenames (LFNs) support. The LFN removes the
8.3-filename limitations of older MS-DOS and Windows operating systems. In a
regular MS-DOS 8.3 file specification directory, all file records are stored in
32-byte records. Of the 32 bytes, 10 are reserved. The other 22 bytes are
used to store information on starting clusters, creation date, and creation
time, and 11 bytes are for the filename itself. LFNs exist on FAT partitions by
chopping the filename into 12-byte chunks (stealing one of the reserved
bytes) and allowing up to 13 chunks, creating a filename of up to 255
characters.
When an LFN is saved, the system creates a short name that conforms to the
8.3 standard. Then, each group of 12 characters is cut off and stored in its own
directory section. The directory entries that make up the LFN are called LFN
entries. These must be backward compatible with MS-DOS programs and with
MS-DOS itself.
NOTE
To make LFNs compatible with MS-DOS means to make sure that MS-DOS
ignores the LFN entries in the directory structure. This is achieved by giving
LFN entries the bizarre attribute combination of hidden, read-only, system,
and volume label. There is nothing in the MS-DOS code that tells it what to do
if it encounters a file with this combination of attributes, so MS-DOS does not
interfere with it.
CAUTION
Older disk utilities are incompatible with LFNs and will try to erase
the LFN entries. It is critical that any disk utility that tries to
diagnose the directory structure, including the Scandisk utility that
is included with MS-DOS 6 and earlier, should never be run on a
computer with LFNs. The Scandisk versions that come with
Windows 98 and Windows Me are compatible with LFNs.
The Windows 98 Boot Process
Understanding the boot sequence for the operating systems you encounter
during your work is a necessary skill. The rest of this lesson is devoted to the
sequence of steps that begins when power is supplied to the computer or the
RESTART command is issued and ends when control of the system is returned
to the user interface. This process can be broken down into three broad
phases.
The BIOS Initialization Phase
During the BIOS initialization phase, the computer's BIOS and the embedded
power-on self test (POST) code hold system control. Just how this phase
affects Windows depends on the type of BIOS the system has. Older machines
that do not support Plug-and-Play enable devices in a static mode based on the
device settings. Computers with a Plug-and-Play-enabled BIOS initializes and
completes the configuration of the Plug-and-Play-capable devices before the
POST begins, resolving possible conflicts. It then looks for the existence of an
operating system. At this point, Windows 98 begins taking control of the
operating environment.
Hardware Profile and Real-Mode Driver Loading Phase
The initial phases of Windows 98's startup are actually conducted in real mode.
In the real mode environment, Windows 98 operates much like MS-DOS. The
Windows 98 IO.SYS is the first system file loaded into memory. It actually
incorporates many of the features of the old MS-DOS IO.SYS, as well as much
of the functionality of the MS-DOS MSDOS.SYS file. As the following table
indicates, it loads many of the core settings that once were the province of
CONFIG.SYS.
Entry Function
Specifies that MS-DOS is to load in the high
memory area (HMA). Also, the upper memory
dos=high block (UMB) value is included if EMM386 is loaded
from CONFIG.SYS. (IO.SYS does not load
EMM386.)
Enables access to the HMA and loads and runs the
HIMEM.SYS real-mode memory manager. HIMEM.SYS is
loaded by default in Windows 98.
The 32-bit Installable File System Manager uses
the services provided by this driver to assist in
IFSHLP.SYS
trapping real-mode file system and network-
related application programming interfaces (APIs).
Optional TSR-type device included for
compatibility. Some MS-DOS-based applications
require a specific version of MS-DOS to be
SETVER.EXE
running. This file responds to applications that
query for the version number and sets the version
number required.
Specifies the number of file handle buffers to
create. This is specifically for files opened using
files= MS-DOS calls and is not required by Windows 98.
It is included for compatibility with older
applications. The default value is 60.
Specifies the last drive letter available for
assignment. This is not required for Windows 98
but is included for compatibility with older
lastdrive=
applications. If Windows 98 Setup finds this entry,
it is moved to the registry. The default value is z.
Specifies the number of file buffers to create. This
is specifically for applications using IO.SYS calls
buffers=
and is not required by Windows 98. The default
value is 30.
Specifies the number and size of stack frames.
This is not required for Windows 98 but is
stacks=
included for compatibility with older applications.
The default value is 9256.
Indicates what command process to use. By
default, the /p switch is included to indicate that
the command process is permanent and should
shell=COMMAND.COM not be unloaded. If the /p switch is not specified,
AUTOEXEC.BAT is not processed and the
command process can be unloaded when quitting
the operating system.
Specifies the number of file control blocks that
can be open at the same time. You should use this
fcbs= line in CONFIG.SYS only if you have an older
program that requires such a setting. The default
value is 4.
There is still an MSDOS.SYS file employed in Windows 95 and Windows 98, but
it is not the same as in MS-DOS. It actually replaces the functions of
CONFIG.SYS. This is the proper place to make custom boot configuration
settings unless there is some overriding reason to use CONFIG.SYS and
AUTOEXEC.BAT for backward compatibility. They are not actually necessary
unless you need to load them to support older MS-DOS applications or
hardware.
NOTE
;FORMAT
[Paths]
WinDir=C:\WINDOWS
WinBootDir=C:\WINDOWS
HostWinBootDrv=C
[Options]
BootMulti=1
BootGUI=1
DoubleBuffer=1
AutoScan=1
WinVer=4.10.1998
;
;The following lines are required for compatibility with other programs.
;Do not remove them (MSDOS.SYS needs to be >1024 bytes).
;xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxa
;xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxb
In Windows 98, you can use a text editor to adjust the settings in MSDOS.SYS
just as you could with CONFIG.SYS under DOS. The following table provides a
list of entries and their function. You may wish to examine the contents of this
file on your system (assuming you are using Windows 98). To do so, you will
need to enable viewing hidden files, as MSDOS.SYS is a hidden system file. If
the value setting uses a Boolean operator, set it to 1 to enable the option and
0 to turn it off.
CAUTION
Be sure not to change any values you don't completely understand
because they will alter the method and ability of the system to
start. Normally, when modifying this file you should save the
original version under another name so that it can be easily
restored if undesirable results are obtained.
Entry Description
[Paths] Section
HostWinBootDrv=c Defines the location of the boot drive root directory.
Defines the location of the necessary startup files.
WinBootDir= The default is the directory specified during Setup;
for example, C:\Windows.
Defines the location of the Windows 98 directory as
WinDir=
specified during Setup.
[Options] Section
Enables ScanDisk to run automatically when your
computer restarts. The default is 1. When this value
is set to 1, ScanDisk prompts you to indicate if you
want to run ScanDisk; if you do not respond after 1
AutoScan=
minute, ScanDisk runs automatically. Setting this
value to 0 disables this feature. Setting it to 2
launches ScanDisk automatically (if needed)
without prompting you.
Sets the initial startup delay to n seconds. The
default is 2. BootKeys=0 disables the delay. The
BootDelay=n only purpose of the delay is to give the user
sufficient time to press F8 after the Starting
Windows message appears.
Enables safe mode for system startup. The default
BootFailSafe= is 0. (This setting is typically enabled by equipment
manufacturers for installation.)
Enables automatic graphical startup into Windows
BootGUI= 98. This is equivalent to putting the win statement
in AUTOEXEC.BAT. The default is 1.
Enables the startup option keys (that is, F5, F6, and
F8). The default is 1. Setting this value to 0
BootKeys= overrides the value of BootDelay=n and prevents
any startup keys from functioning. This setting
allows system administrators to configure more
secure systems.
Enables automatic display of the Windows 98
Startup menu, so that the user must press Ctrl to
BootMenu=
see the menu. The default is 0. Setting this value to
1 eliminates the need to press Ctrl to see the menu.
Sets the default menu item on the Windows Startup
menu; the default is 3 for a computer with no
BootMenuDefault=#
networking components and 4 for a networked
computer.
Sets the number of seconds to display the Windows
BootMenuDelay=# Startup menu before running the default menu
item. The default is 30.
Enables dual-boot capabilities. The default is 0.
Setting this value to 1 enables you to start MS-DOS
BootMulti=
by pressing F4 or by pressing F8 to use the
Windows Startup menu.
Enables the safe mode startup warning. The default
BootWarn=
is 1.
Enables Windows 98 as the default operating
system. Setting this value to 0 disables Windows 98
BootWin=
as the default; this is useful only with MS-DOS
version 5 or 6.x on the computer. The default is 1.
Enables automatic loading of DBLSPACE.BIN. The
DblSpace=
default is 1.
Enables loading of a double-buffering driver for a
SCSI controller. The default is 0. Setting this value
DoubleBuffer=
to 1 enables double buffering if required by the
SCSI controller.
Enables automatic loading of DRVSPACE.BIN. The
DrvSpace=
default is 1.
Enables loading of COMMAND.COM or
DRVSPACE.BIN at the top of 640 K memory. The
LoadTop= default is 1. Set this value to 0 with Novell NetWare
or any software that makes assumptions about what
is used in specific memory areas.
Enables display of the animated logo. The default is
1. Setting this value to 0 avoids a variety of
Logo=
interrupts that can create incompatibilities with
certain third-party memory managers.
Safe mode with networking is not supported in
Network= Windows 98. This value should be set to 0 or left
blank to disable this feature.
The boot process loads a series of static and dynamic VxDs, including
VMM32.VXD. This file is a composite VxD that contains the VMM and the real
mode loader. It also invokes any other VxDs that reside in the
Windows\System\Vmm32 directory. The exact list of VxDs loaded at this point
varies based on the machine configuration. It is possible to see which ones are
called by examining the [386enh] section of the WINDOWS.INI file.
Once the virtual machine is running, the SYSTEM.INI file is processed, and the
system is fined tuned with those settings. Next, the configuration manager is
started, employing information from the Plug-and-Play BIOS, or if the system
does not have one, by developing its own device list and loading the
appropriate drivers. The configuration manager resolves any conflicts and then
initializes the drivers. If a conflict cannot be resolved, one or more of the
devices may be disabled.
With the hardware structure defined and appropriate VxDs in place, the final
system components can be loaded. These include: KERNEL32.DLL (which
provides the main Windows 98 components), KRNL386.EXE (which loads
device drivers), GDI.EXE and GDI32.EXE (which manage and provide the GUI),
and USER.EXE and USER32.EXE (which provide the user interface code).
If the system was shut down improperly, the Startup menu should appear the
next time the operating system loads. It can also be invoked manually by
pressing Ctrl while the system is booting. Choose the appropriate mode for the
desired system startup. The exact options available from this menu vary based
on the system configuration and the reasons for which it was brought up. The
following table shows the most common options and their functions. Note that
the Start In Safe Mode With Network option available in Windows 95 has been
removed in Windows 98.
You can also use the startup disk that was created during the initial system
installation or use the Start menu. The startup disk provides the drivers
necessary to access the CD-ROM drive, enable 32-bit file system access, and
start the system in command mode—even if you can't access the hard drive
normally—if it is intact. Booting this way also provides access to a number of
utilities that are covered in Chapter 19, "Maintaining the Modern Computer."
Once a command prompt is available, you can attempt to load Windows with
the WIN.COM command and one or more of its switches to start Windows 98.
Keep in mind that you may have to provide the path to the command. It is
usually in the C:\Windows or C:\Windows98 directory. The following table
shows the WIN.COM syntax and the uses of the switches.
Switch Purpose
Used to start Windows in safe mode with one of the following
/d
options to troubleshoot the operating system.
Disables 32-bit disk access. This is equivalent to disabling the
hard disk controller(s) in Device Manager. Try this if the
/f
computer appears to have disk problems or if Windows 98 stalls.
This is equivalent to 32BitAccess = FALSE in SYSTEM.INI.
/m Starts Windows 98 in safe mode.
Specifies that Windows 98 should not use ROM (read-only
memory) address space between F000:0000 and 1 MB for a
/s break point. Try this if Windows 98 stalls during system startup.
This is equivalent to SystemROMBreakPoint = FALSE in
SYSTEM.INI.
Specifies that the ROM routine will handle interrupts from the
/v hard disk controller. This is equivalent to VirtualHDIRQ = FALSE
in SYSTEM.INI.
Excludes all of the adapter area from the range of memory that
Windows 98 scans to find unused space. This is equivalent to
/x EMMExclude = A000-FFFF in SYSTEM.INI. If this switch resolves
the issue, you may have a conflict in the upper memory area
(UMA) that requires an Exclude statement.
Windows 95, Windows 98, Windows NT, and Windows 2000 all provide the
ability to create a boot log. One of the Start menu options offers the ability to
generate this file as the system is started. It is not unusual to have this file
run as long as 15 or 20 pages on even a simple system. The following sample
shows portions of an actual BOOTLOG.TXT file. As you can see, it depicts in
sequence each action the start process makes and whether or not it executes
successfully. This file is a powerful tool for determining exactly where a
problem with a driver or setup process occurs. In the event of an obscure or
difficult problem loading the operating system, it can prove invaluable. We
discuss its use further in Chapter 19, "Maintaining the Modern Computer."
Kernel Mode
The kernel mode is the portion of the operating system that has direct access
to both the physical hardware devices and the system data that runs on it.
This is the layer that provides access to memory and prioritizes access to
system resources like memory and hardware devices, so its operations are
contained in a protected memory area. The kernel mode consists of several
components.
The hardware abstraction layer (HAL) is the key to Windows 2000's ability to
support multiple processors and to run on platforms built on different CPU
architectures. The HAL is responsible for operating the interface among all the
different I/O devices on the system, interrupting controllers, and providing
platform-specific hardware support for every device on the system. This
component operates basically the same way it did under Windows NT.
The Windows 2000 Executive acts as the interface between the HAL and the
system components contained in user mode. The components of the Windows
2000 Executive provide core services through a set of internal routines that
make sure that two devices, like an application, virtual machine, or CPU, are
not allowed to access the same device at the same instant. You can see from
the descriptions of Windows 2000 Executive components that follow that the
operating system processes in Windows 2000 are more compartmentalized
and, therefore, more fault-tolerant than similar functions found in Windows 98
and Windows Me. They are also more extensive.
The I/O Manager processes commands issued through the user mode into I/O
request packets and services I/O operations related to device drivers. Its
subcomponents include the Cache Manager, which improves disk performance
by performing reads to disks in the background and holding recent disk reads
in system memory, and low-level device drivers that directly manipulate
hardware I/O.
The GDI and Window Manager are the two Windows 2000 System Executive
components that manage the display system. Both are contained within the
WIN32K.SYS device driver. The GDI component manages the functions
required for drawing and manipulating graphics on the screen or graphics that
are output directly to devices like a printer. The Window Manager controls
screen output and window displays, as well as accepting and forwarding signals
from the keyboard and pointing devices to the active application.
The Security Reference Monitor (SRM) is responsible for enforcing all security
policies that are in force on the local computer.
The Power Manager performs a similar function with power management APIs,
coordinating events, generating IRPs (Interrupt Request Packets), and starting
and stopping devices that make use of power management functions.
The Virtual Memory Manager provides a private virtual memory address space
for each process or thread and protects that space against encroachment by
other system objects. The Virtual Memory Manager controls this function for
both physical RAM and hard disk space, as well as managing demand paging.
These concepts should already be familiar from our discussion of Windows 98.
The structure and function of device driver operations within Windows 2000 is
much more complex than that found within Windows 98. In general, hardware
devices are objects managed by the I/O Manager, and the logical, physical,
and virtual drivers for devices are represented as objects within the system.
Kernel mode drivers act as an interface between the HAL and the Windows
2000 Executive. The direct control of these drivers is the province of the I/O
Manager.
Kernel mode drivers are divided into three layers based on their function and
how close they come to directly controlling the hardware.
Low-level drivers are usually used to exert direct physical control over
devices like a Plug-and-Play hardware bus. This class of drivers also
includes legacy Windows NT device drivers.
Intermediate-level drivers include WDM drivers like those discussed in the
preceding lesson that are employed with Windows 98. These are generally
Plug-and-Play function drivers designed to control specific peripheral
devices and mini drivers, and they are used for tasks like disk mirroring.
High-level drivers include those that operate translations between
different file system devices such as FAT, NTFS, and CDFS (CD-ROM File
System) and the operating system. This class of drivers is known as file
system drivers. They cannot act on their own; they depend on support
from one or more intermediate-level drivers.
User Mode
User mode can be thought as a layer of insulation between kernel mode and
users and their programs. User mode handles all conversations with the kernel
and provides the APIs needed to emulate application and network
environments. It is the user mode that enables Windows 2000 to run
applications written for Windows 95, Windows 98, MS-DOS, and POSIX. User
mode is comprised of a series of subsystems.
This phase of system startup is identical to that of Windows 98, as this portion
of the process is hardware dependent.
This phase also is directly under control of the hardware and behaves just as it
does in Windows 98. The system BIOS institutes a search for an operating
system. In most cases, it searches first on the floppy drive, then the system
hard disks. It searches the active partition of the first hard drive and looks for
code that loads an operating system. When the Windows 2000 code is located,
the startup routine diverges from that of Windows 98 and Windows Me.
Bootstrap Loading
Microsoft Windows 2000 does not automatically assume that it is the only
operating system on the computer. It also does not require that all the primary
files reside on the primary partition of the first hard drive, as is the case with
MS-DOS, Windows 95, Windows 98, and Windows Me. Instead, it uses a
bootstrap loading process to allow the user to choose which operating system
to initialize and to locate the required operating system files.
The primary partition of the boot drive on a Windows 2000 computer contains
at least four system-specific startup files, and as many as eleven.
NTLDR
BOOT.INI
NTDETECT.COM
CDLDR
This file must also be present in the root on multiple boot systems:
BOOTSEC.DOS
This file may exist on systems with very large SCSI or EIDE drives:
NTBOOTDD.SYS
HYBERFILL.SYS
NTOSKRNL
HAL.DLL
SYSTEM KEY
NTLDR is responsible for offering a menu with the available operating systems,
for taking action based on the selection, and for performing the startup
procedures that must take place before the kernel is loaded. To do so, it
performs the following tasks:
[boot loader]
timeout=30
default=multi(0)disk(0)rdisk(0)partition(1)\WINNT
[operating systems]
multi(0)disk(0)rdisk(0)partition(1)\WINNT="Microsoft Windows 2000 Pr
C:\CMDCONS\BOOTSECT.DAT="Microsoft Windows 2000 Recovery Console /cm
If the user selects an operating system other than Windows 2000 Professional,
control is passed over to the BOOTSECT.DAT file. In the example above, it
invokes the Recovery Console located in C:\Cmdcons. During this phase, the
user may also invoke the last known good configuration or choose an alternate
boot process to perform troubleshooting tasks. If the user does not,
NTDETECT.COM is invoked to handle the initial hardware detection phase.
NTLDR remains in operation throughout this process.
NTLDR begins loading the kernel and the hardware abstraction layer into RAM.
At this point, control is passed to the kernel and the user is presented with the
Windows 2000 Professional Startup screen. The NTOSKRNL file examines a
configuration and collects information about network logons and connections.
The kernel service controller starts any system services that are configured to
load automatically, and the registry settings for hardware operation of the
local machine are confirmed and initialized. At this point, the user logon
screen appears.
User Logon
Windows 2000, like Windows NT, requires a user to actually log on before
system startup is complete. To do so, press Ctrl+Alt+Del and enter any
appropriate user account name and password. Windows 2000 provides for two
types of users: local and workgroup, or domain.
Local accounts, as the name implies, are those set up directly on the system.
The local security subsystem verifies the user account, checks the password,
and grants or denies access based on local settings. Workgroup and domain
accounts reside on a security server, often a domain controller. The account
information and user rights are then verified at the server or an authorized
alternate location. Once the account has been validated using one of these
methods, the system is operational.
Lesson Summary
The following points summarize the main elements of this lesson:
Understand the functions of the Registry Control Panel and the Microsoft
Management Console
Understand how to configure system settings and add new hardware
using the Control Panel
Understand basic use of the Windows 2000 Administrative Tools
Know the fundamentals of how to edit the Registry
NOTE
Microsoft Windows treats all the devices, device drivers, software services, and
applications that use it as objects. The System Registry tracks and makes
available to the kernel information on all the those objects, hardware, network
settings, user preferences, and storage systems—virtually everything related
to system operation.
A Major Change in Approach
Windows 3.x made use of two kinds of initialization (.ini) files: system and
private. System initialization files were used to control the Windows
environment and included SYSTEM.INI and WIN.INI, and their settings were
globally available. Private initialization files were more specific in scope and
included CONTROL.INI, PROGMAN.INI, WINFILE.INI, and PROTOCOL.INI, as
well as any application-specific .ini files. Initialization files created a bridge
between the application and the Windows operating environment.
In addition to .ini files, Windows 3.1 used a host of other text files to manage
operations. The files included two holdovers from MS-DOS: AUTOEXEC.BAT
and CONFIG.SYS. Some systems had more than 150 files responsible for the
operation of the computer and the Windows environment, many of them from
third-party providers. This situation often resulted in confusion and erratic,
unreliable operation. It also made writing drivers and installation routines
much more difficult than necessary.
NOTE
The binary file REG.DAT was bundled with its editor, REGEDIT.EXE. This began
the process of centralizing computer operations, but REG.DAT had serious size
limitations. It could not exceed 64 KB, the same limit established for the .ini
files in Windows 3.11.
Since then, development of the registry concept has matured and, in the
modern Windows 98, Windows NT, and Windows 2000 era, knowing how to
adjust the Registry settings is as critical for a technician as understanding
CONFIG.SYS and upper memory management was in the days of MS-DOS.
A Critical Central Repository
It's convenient to think of the Widows Registry as "data central." During
system startup and regular operation, the kernel, system services, background
hardware detection devices for Plug-and-Play operation, device drivers, and
applications are checking with the Registry to confirm settings. Anytime you
install a new piece of software or hardware, make use of the functions of
Control Panel, or do something as simple as changing the View options used to
control information display in folders, you are modifying the Registry.
If the Registry becomes corrupt or has the wrong data for an object, it can
degrade or even halt system operation. With that in mind, Windows provides
work tools and safeguards to make it easy to safely modify settings, while
ensuring integrity of the Registry files. There are some differences in the
Registry structure and tools provided between Windows 95, Windows 98,
Windows Me, Windows NT, and Windows 2000. In spite of that, it is possible to
learn the basics of working with the Registry for both families of Windows at
the same time. Windows 2000 and Windows NT offer some extra controls and
tools that are not found in the Windows 9x family.
NOTE
The Registry is seen by the operating system as if it was a single data store,
but, in reality it is comprised of several files. Hardware- and application-
specific settings are stored in one file, user-specific data (such as user profiles)
are stored in another, and system-specific policies (which can be used to
locally override elements of settings in the other two files) form a third. During
system operation, the active elements of the Registry are brought into RAM as
a single repository.
Windows Configuration and Management Tools
The most commonly used tool for modifying the Registry or adjusting the
system configuration is the Windows Control Panel. The fundamental use and
operation of the Control Panel is virtually the same in all versions of Windows.
There is a slight difference in the organization and number of tools contained
within the Control Panel. The Windows 98 Control Panel contents are very
similar to those in Windows 95. Windows 2000 has some additional folders and
icons. The Windows Me Control Panel is very similar to that of Windows 2000.
Figure 18.3 shows the contents of both the Windows 98 and Windows 2000
control panels. You may wish to work through the rest of this lesson seated at
the computer and follow along with the discussion by opening and examining
the system tools as they are presented. You can open the Control Panel by
accessing the Start menu. Choose Settings, and then choose Control Panel. A
window similar to one of those shown in Figure 18.3 should appear.
As you can see from Figure 18.3, most of the icons are identical in both
editions, and many of these are self-explanatory. For example, the Mouse and
Game Controllers icons are used to define active buttons, define their use, and
perform calibrations.
The System Properties icon is one of the most useful Control Panel
components. This utility quickly provides detailed information on the system
configuration and often helps pinpoint components that are not working
properly or do not have properly functioning drivers. To access it, double-click
the System icon, which shows an image of a CPU with monitor, keyboard, and
mouse. Figure 18.4 shows the Windows 2000 Professional System Properties
utility open to the General tab. The General tab is similar for all the different
versions of Windows currently in use, but the other options tabs offered vary.
In some cases, they may vary between two computers running identical
operating systems, depending on the hardware that is installed. All share one
attribute: They quickly let you locate information about specific devices on the
system.
The General tab provides three basic pieces of information: the version of the
operating system in use; if it is registered and to whom; and a quick run-down
of the CPU, computer type, and amount of RAM on the system. The string of
numbers in the registration information portion uniquely identifies this
installation of Windows and is tied to the registered user. You need this
number to call Microsoft for support in connection with this machine.
If you are following along using Windows 2000, click the Hardware tab, and
then click Device Manager, found in the middle of the window. In Windows 9x,
click the Device Manager tab in the System Properties dialog box. The
Windows 2000 Device Manager window is shown in Figure 18.5. Although the
detailed appearance of the window that now opens may vary based on the
version of Windows being used and the display options set, its basic function
remains the same.
The Device Manager is one of the most useful tools in the Control Panel. It can
be used to identify the components on the system, determine if they are
considered functional by the operating system, and provide detailed
information about the device driver.
The main portion of the Device Manager window contains a series of icons. If a
plus sign (+) appears to the left of the icon, you can click on it to see devices
and subcategories nested within that listing. For example, in Figure 18.5, both
the Disk Drives and SCSI and Raid Controllers listings are open to show their
contents. In the information bar just above the main window area in the
figure, notice that it says "Device Manager on local computer." This is one
difference between Windows 9x and Windows 2000. With Windows 2000, you
can use Device Manager to manage the Registry on remote computers if you
have the proper administrative credentials to work on the remote system and
it is configured to provide this feature. If your work entails providing support
to remote computers over a local area network (LAN), you may wish to learn
more about this feature.
This dialog box has tabs of its own, starting with a General tab. Notice the
device status area of this dialog box. If the device is shown as working
properly, it indicates that Windows is satisfied that the driver can communicate
with the device. Depending on the version of Windows and the type of device,
you may be offered a Troubleshooting button. Clicking it will usually activate a
wizard that will walk you through a series of options to try to resolve any
problems you might have with the device.
The Driver tab in Windows 2000, depicted in Figure 18.7, shows how the
Device Manager is increasing in usefulness as Windows matures. Early
versions of the operating system did little more than provide the name of the
driver file and the date it was produced. As you can see, the newest versions
of Windows allow you to inspect more driver details and update or install a
driver directly from within the Driver tab if needed. Device Manager has a
number of wizards that simplify the process of updating driver information and
adding and removing devices in the system.
If the device is not working properly, has been disabled, or has produced a
conflict with another device on the system, its icon appears with either a
yellow caution or a red warning circle placed over a portion of the icon. Figure
18.8. shows a number of buttons used for obtaining properties, refreshing the
device list, removing a device, and printing a report. These tabs are found
when working with the Windows 98 Device Manager.
Windows offers several ways besides the Control Panel to access some Control
Panel functions. For example, right-clicking in any open area of the Windows
desktop and selecting Properties launches the same Display Properties dialog
box. You can also access this dialog box by double-clicking the Display icon in
the Control Panel. This utility allows quick adjustment of display adapter
settings, changes in the appearance of the desktop, and setup of screen savers
and effects. It can be used to troubleshoot display problems, set color depth,
and fine-tune the interaction between the graphics adapter and the monitor.
The Display Properties dialog box is shown in Figure 18.8.
The Windows 2000 Administrative Tools
Windows 2000 provides additional tools beyond those found in Windows 98.
The easiest way to access these tools is to open up the Administrative Tools
folder found inside the Windows 2000 Control Panel. Figure 18.9 shows the
basic contents of the Administrative Tools folder. Windows 2000 ships with a
common set of administrative tools, but these are only a starting point. Third-
party vendors and administrators can build custom consoles and utilities called
snap-ins.
The console shown in Figure 18.10 is open on the Device Manager. The left
window pane shows the tree with the different management applications that
are available. The section of the window on the right provides the same
functionality the Device Manager does when accessed from within the Control
Panel, because the Device Manager has been selected. Right-clicking on a
device in the right panel presents the same dialog boxes and options as the
Device Manger will from the Control Panel.
Clicking System Information on the left side of the MMC displays a tree
structure in the right side of the window, depicting all the devices and services
on the system. You can see that it is very easy to use the MMC to quickly
examine and work on a system.
The time spent learning to use the MMC is time well spent. Microsoft has
shown a commitment to using the MMC as the core of future management tool
development. It offers a single user interface for a wide variety of system
tools, which has become even more important in a network environment. In
addition to the system tools and storage tools shown in our example in Figure
18.10, the server editions of Windows 2000 offer a variety of tools for
administering network, Internet, and server services within the MMC.
As you can see in Figure 18.11, the operation of the Event Viewer is similar to
that for other snap-ins that operate within the MMC. The Event Viewer tree in
the left pane contains three branches, one for each log. Clicking on one of the
branches opens the appropriate log in the pane on the right. The entry
includes the date stamp for the time the event was launched, the source, and
an event code that can be used to aid in troubleshooting or for more
information about the type of event. The leftmost column provides the name of
the type of event. Those most likely to demand operator intervention are
flagged with color-coded icons. In our example, the error messages on the first
two lines have red flags with Xs, indicating the failure of a device. Not all
warnings actually demand intervention. In this case, a removable storage
device merely did not have media installed.
Microsoft Windows 2000, like Windows NT, offers a wide range of performance
monitoring and tuning tools. These can be set to actively track in real time
virtually every performance indicator of the system, memory usage, and
primary systems (like the display, drives, and system processes). The
information can be presented in a set of graphs or stored in spreadsheet or
database format for later review.
The MMC serves another important function. The Disk Management snap-in is
used to mount drives, create partitions, set up or convert file systems, and
dynamically allocate storage space. These tools far outperform those found in
the Windows 9x environment, which are based on MS-DOS.
Windows 2000 supports two types of hard disk storage. Basic storage is
identical to that found on most other operating systems. Physical hard drives
are partitioned and then initialized for the use of storage. Basic storage uses a
program like Fdisk to divide the drive into partitions. Once created, these
partitions cannot be modified without destroying the data on them. Dynamic
storage is a method of disk utilization unique to Windows 2000. Drives
initialized using the dynamic method are set up as a single partition that spans
the entire physical disk, but is not limited to a single disk; therefore, a single
volume can span several disks. In addition, you can create mirrored and
striped volumes to improve performance or combine several of these into a
Level-5 RAID (redundant array of independent disks) to increase data security.
All hard drives start as a basic disk, and they can be divided into primary
extended partitions as normal. If you plan on dual booting a system with a
non-Windows 2000 operating system, the primary partition should be
formatted with the FAT file system. Volumes that do not need direct access to
that operating system can be formatted using NTFS and become part of a
dynamic storage environment.
The Windows 9x Registry consists of six root keys, each of which reflects a
different aspect of the configuration. Windows NT and Windows 2000 make use
of only five of the keys due to differences in the way the system accesses and
holds the Registry in memory.
Like the information display of the MMC, the Registry is presented as a series
of trees and branches arranged in a hierarchical order. Each branch of the
Registry (known as a key) groups information that logically belongs together.
All top-level keys are called root keys and are defined and named by Windows;
these cannot be changed. Root keys are named HKEY_XXX and can be followed
by several subkeys. All other keys in the Registry are subkeys of these six
primary keys. Subkeys can be added, deleted, or renamed. The six primary
keys are described in the following sections.
HKEY_CLASSES_ROOT
In Windows 9x, this section of the Registry defines the standard-class objects
used by Windows. Do not make any changes to this section unless you are
absolutely sure you need to do so! This is a link to the
HKEY_LOCAL_MACHINE\ SOFTWARE\Classes, which provides compatibility
with the Windows 3.1 registration database. This compatibility is important if
you want to run Windows 3.1 16-bit applications in Windows 9x. In Windows
2000, this key contains software configuration data, file class associations, and
any information needed for OLE support.
HKEY_CURRENT_USER
This section serves the same functions in both Windows 9x and Windows 2000.
It defines the current user settings, so it is usually not important for repairing
computers. Personalized information like fonts, some icons, and colors can be
changed here. This is a link to the HKEY_CURRENT_USERS key. This key
provides Windows 9x compatibility to applications using the Windows NT
Registry structure.
HKEY_LOCAL_MACHINE
This portion of the Registry contains all the data for the system's non-user-
specific configurations (including every device in the computer). This is the
largest key in the Registry and the portion where you will perform the bulk of
your system edits to optimize Windows performance. Information stored here
includes hardware configuration, peripheral devices, installed software, OLE
compatibility, software configuration, and Windows operating system
configuration. In Windows 9x this data is stored in the SYSTEM.DAT file.
HKEY_USERS
This section of the Registry is where both Windows 9x and Windows 2000 keep
track of different user settings. If your computer is not configured for multiple
users, you will have a single subkey named DEFAULT. If your computer has
been configured for multiple users, two profiles are created when you log on:
HKEY_USERS\DEFAULT and HKEY_USERS\user name\USER.DAT. If it is a two-
user system, the other user's settings are held in memory. This makes it
impossible to alter user settings without logging on under that user's name
and password.
HKEY_CURRENT_CONFIG
This key handles Plug and Play and contains information about the current
configuration of a multiple-hardware-configured computer. On Windows 9x
machines, this key works in conjunction with
HKEY_LOCAL_MACHINE\Config\xxxx, where xxxx is the subkey that
represents the numeric value of the current hardware configuration. On
Windows 2000 machines, it contains the data stored with the active hardware
profile, which is used to configure device drivers.
HKEY_DYN_DATA
In Windows 9x, this is the Registry data, which is stored in RAM to speed up
system configuration. A snapshot of all hardware in use is stored here. It is
updated on startup and when any changes are made in the system
configuration file. This portion of the Registry is dynamic. It is where VxDs are
installed, where Plug and Play hardware information is maintained, and where
performance statistics are calculated. Because this information is accessed and
changed constantly, this portion of the Registry is never written to the hard
disk. It resides in the computer's RAM. This key does not exist in Windows
2000.
Accessing and Managing the Registry
Most modifications of the Registry should be done using the Windows Control
Panel in the Windows 9x environment. With Windows 2000, you should use
either the MMC or the Control Panel to modify Registry settings. The fact that
the Registry is the central system configuration repository means it is also a
key system weakness—once it has been corrupted, it's hard to recover settings
if they haven't been backed up. Only very knowledgeable users should directly
view or change entries.
You can view or change the entries using one of the two Registry editors that
ship with Windows 2000, REGEDT32.EXE or REGEDIT.EXE. Only the latter is
included with Windows 9x. The Registry itself is stored in binary format, so you
can't open, view, or edit the contents directly. Don't look for either editor on
the Start menu because they are considered too potent for the average user.
You must enter the appropriate command name in the Run dialog box to start
the editor. Although both programs ship with Windows 2000, REGEDIT.EXE
lacks a security menu and does not support several commands available in
REGEDT32.EXE.
You edit the Registry in real time using either of these editors. As soon as you
enter a setting, the effect of your action is immediate. During the remainder of
this lesson, some examples are shown with the Registry editor open. Be sure
not to make any modifications to the Registry itself without being sure of the
actions being taken.
CAUTION
NOTE
The Edit command doesn't include the typical Copy, Cut, and Paste
options. If you need to copy and paste in REGEDIT, you need to
use the Windows keyboard commands. Press Ctrl+C for Copy and
Ctrl+V for Paste. These two commands are a necessity if you do a
lot of searching and replacing in the Registry.
REGEDIT is more than a Windows utility program. It can be used from inside
real-mode MS-DOS. This is particularly important if you have a seriously
corrupted Registry file and Windows won't start. During installation, Windows
9x puts a copy of REGEDIT.EXE on the startup disk. When running REGEDIT in
real mode, it doesn't have an interface—it uses a command-line format to
carry out instructions. The following table lists the most common REGEDIT
switches.
Switch Function
/? Displays the REGEDIT command-line syntax
/L:system Provides the location and filename of SYSTEM.DAT
/R:user Provides the location and filename of USER.DAT
/E filename
Creates a Registry (.reg) file
<regpath>
Replaces the entire Registry with the contents of
/C filename
your .reg file
To use REGEDIT in real mode, you need to tell it where your SYSTEM.DAT and
USER.DAT files are located, if they are in a directory other than Windows.
These are the two key Windows 9x Registry files. Here is the syntax needed to
replace an existing, corrupt Registry with the contents of the .reg file you
created (remember, this command is typed in full at the MS-DOS prompt):
Remember that before modifying any critical keys in Registry, you should
always create a back-up. When you edit the Registry, consider using the
Control Panel applications to make Registry edits. The Control Panel is
essentially the wizard for updating specific parts of the Registry. A corrupted
Registry is not something you can easily recover, and the system may be
rendered useless.
You can make edits directly to Registry using either the menu bar commands
or the right mouse button. Add keys by simply right-clicking the key you want
to add to and entering your information. Windows 9x has some restrictions
you need to be aware of when adding keys:
You cannot add a top-level key. Windows 9x creates these and you cannot
modify the existing entries or create new ones.
Within a parent key, each subkey name must be unique, but you can use
the same subkey name in different parent keys.
Modifying the value section of the Value entry by double-clicking the
value in the Value window. After you double-click the value, you will see
one of three different dialog boxes.
Windows 9x uses multiple registries for multiuser operations, and it can
be difficult to know exactly where pieces of information are stored. The
System Policy Editor allows network administrators to locate where
information is stored.
Editing the Registry with REGEDT32 in Windows 2000
You can use REGEDIT to perform basic Registry modification tasks in Windows
2000, but it is not recommended. REGEDT32 is the editor of choice if you must
modify the Registry directly. Its menus and commands are quite simple,
belying the program's power. The following table provides the primary
commands, their locations, and a brief description of how they are used. The
rest of the menus and options are either demonstrated in the following
exercise, covered in the REGEDIT.EXE material, or are easy enough to
understand by their names and menu locations.
CAUTION
We are now going to take a step that you should take every time you use
REGEDT32 or REGEDIT. Open the Options menu and adjust the Read Only
option so that there is a check mark in front of it. Remove the check mark
from in front of Save Settings On Exit found below it. This precaution prevents
you from saving any changes you make.
The subwindows inside the main Registry Editor window each hold one of the
five files used by Windows 2000 to store the registry data. Choose the one
labeled HK_USERS on Local Machine, and work your way down the hierarchy
to the Default\Control Panel\Mouse folder. With the mouse folder selected, you
should see a display similar to that shown in Figure 18.14.
From reading the entries, it is quite easy to see why editing the Registry is not
a job for amateurs, and why most settings should be managed from the
Control Panel. Most of the mouse settings are the same ones controlled by the
Control Panel Mouse utility. Figure 18.15 shows one of the tabs in the Mouse
Properties dialog box that controls three of the settings. The Snap To Default
option in Figure 18.15 is not selected. In the Registry editor, the
SnapToDefaultButton: REG_SZ: has a value of 0. If you access the Mouse
Properties dialog box and enable Snap To Default, the value in the Registry
changes to 1. If you change the value in the Registry manually to 1, the Snap
to Default check box in the Mouse Properties dialog boxes becomes checked.
Obviously, changing a simple mouse setting in error is not likely to bring the
average machine running Windows crashing down. Still, it is not wise to make
changes to the Registry without knowing exactly what the effect is, and the
exact setting and syntax necessary to gain the desired effect. For example, the
range for setting mouse double-click speed is quite wide. In our example, it is
currently set to 500. Without a reference, it would be difficult to know exactly
what the correct range would be.
Figure 18.15 Local machine mouse settings as shown in the Mouse Properties
dialog box
In spite of warnings about the dangers of editing the Registry, the ability to do
so is a valuable tool for a technician. In some cases, it is possible make
adjustments to the Registry that can save hours of work on rebuilding a
system. To become proficient, you should obtain a reference detailing the
Registry settings and a manual with further instructions on editing techniques,
then practice on a system that is not being used for critical work.
Lesson Summary
The following points summarize the main elements of this lesson:
The structure and function of the system Registry is basically the same
for all versions of Windows after Windows 95.
The Registry is a database stored in a binary format containing all the
details of the system configuration.
The preferred way to edit the Registry is to use configuration tools such
as the Control Panel and the MMC.
In the event the Registry must be edited manually, you must do so using
the appropriate editor for your version of Windows.
Addition of elements to the Registry should be handled by properly
trained technicians with an appropriate reference.
3 4
Chapter Summary
The following points summarize the key concepts in this chapter:
Understanding the boot process for both the computer hardware and the
operating system is key to being able to properly maintain and
troubleshoot a system.
Windows 98 is built on the foundation of MS-DOS and earlier versions of
Windows and uses similar startup files.
Although it is still possible to use configuration files like CONFIG.SYS and
AUTOEXEC.BAT to manage Windows 98 system settings, they should only
be used if necessary for legacy data.
Managing Windows
Both Windows 9x and Windows 2000 use the Registry to enable system
configuration.
The Control Panel and MMC are the preferred ways to edit settings within
the Registry. The Registry should not be modified directly unless it
impossible to do so with those tools.
The Registry is a database stored in binary format.
In the event that the Registry must be edited manually, use the editor
provided with the operating system specifically for this purpose.
3 4
Review
2. What is the kernel, and what is its function within the operating system?
6. What is a minidriver?
7. Briefly explain the two core files needed to boot Windows 98.
8. Can you use CONFIG.SYS and AUTOEXEC.BAT in Windows 98? Are there
any special considerations?
14. What is the preferred editor for working with the system Registry and
Windows 2000?
Answers
3 4
Chapter 19
Maintaining the Modern Computer
About This Chapter
The modern personal computer and its operating system are a far cry from the
earliest PCs. The array of sophisticated hardware and the advanced features of
the Microsoft Windows environment have become essential parts of everyday
home and office life. Keeping this vital tool running efficiently requires the
right skills, the right tools, and regular routine maintenance. Properly
performed regular maintenance can prevent problems.
This chapter deals with the necessary tools and general practices used in
performing such maintenance. Keep in mind that your situation may call for
different programs than the one presented here, based on the user population,
system configuration, and the tasks for which the computers are used. The
information in this chapter is based on the average desktop workstation.
Complicated networking environments for advanced operating systems may
entail additional procedures.
Before You Begin
Before starting this chapter, you should read the previous chapters that cover
the physical components of a computer and the fundamentals of the Windows
operating system. In addition, if you are unfamiliar with the procedures for
dealing with the risks of electrostatic discharge (ESD), you should review
Chapter 22, "The Basics of Electrical Energy," especially Lesson 2,
"Electrostatic Discharge."
3 4
Lesson 1: The Right Tools for the Job
In this lesson, we look at the tools and resources needed to function effectively
as an A+ certified computer technician. Working on computers requires tools
and resources in addition to skill. The material in this lesson details the
elements of an A+ technician's toolkit. We also review the basic safety
considerations that are part of the job when working with electrical and
electronic equipment in a repair facility.
Identify and describe the basic tools required to be equipped for working
on computers
Describe the outside resources available to make your work more
productive and effective
Explain the safety considerations and basic policies to be used when
working with computer equipment
One thing that can make any job easier is having the right set of tools and
reference materials on hand at all times. With the availability of information
on the Internet and CD-ROM, plus the expansion of the laptop into a full-
fledged computer, it's easy to carry a whole library in a small bag and have
online access to virtually any driver you might need.
Tools of the Trade
Nothing is more important than having the right tools for the job. Being an
effective computer professional requires owning or having access to four sets
of tools:
Hardware toolkit. Common hand and electronics repair tools. Use this to
take things apart and put them back together.
Software toolkit. Use this to troubleshoot and correct operating
systems, hardware, drivers, and application problems. These days, your
software toolkit should also include good, routinely updated virus
checkers and a bootable disk with key diagnostic and system files for each
operating system you work with.
Technical library. Use this to help you keep track of the ever-growing
base of information and provide answers to "I never saw that before"
problems.
Spare parts. Keep a basic set of the most commonly replaced computer
system components—such as power supply, floppy drive, display card, and
cables—so that they can be easily replaced when you're on location.
When in doubt, exchanging a problematic part with a known-to-be
working part will help you troubleshoot. Be careful to collect only parts
that you're sure work. Exchanging a bad part with another bad part won't
help the troubleshooting process and can even make matters worse. A
"goodie bag" with screws, jumpers, expansion plate covers, and so on can
save time when one goes missing.
Recommended Tools and Resources
A computer professional does not need a large toolbox; only a few basic hand
tools and a handful of floppy disks are required to solve most computer
problems. Most PCs can be opened and most parts removed and replaced with
a pair of screwdrivers. Be careful when working on a proprietary machine,
however—special tools are often required. A small canvas bag or a briefcase is
generally sufficient to carry everything you need.
The following table lists and describes the hand tools that will meet most
needs.
Tool Description
Two (one large and one small) flathead (regular) and
Phillips (sometimes called a cross) screwdrivers are usually
sufficient. Avoid magnetic screwdrivers. Although they are
Screwdrivers convenient for picking up lost screws, their magnetism can
cause problems. A power screwdriver can be a real time-
saver when you have new cards to add to several
machines.
Used to remove the odd star-shaped screws found on some
Torx driver proprietary computers and components. Sizes T-10 and T-
15 should meet the needs of most computers.
This variation on the screwdriver fits over the hexagonal
collar on many computer screws. Sizes 3/16-inch, 7/32-
Nut driver
inch, and 1/4-inch will handle most jobs. Sets with snap-on
heads that can be adjusted for several sizes are handy.
Very convenient for picking up small parts (for instance,
screws). You might consider the long plastic variety; these
Tweezers
don't conduct electricity and hence won't create any short
circuits.
Needlenose Can be used to pick up dropped items and to hold or loosen
pliers screws, nuts, and bolts.
Although optional, these are very useful when changing
Chip
video RAM (random access memory) or other (older) RAM
removers
chips that are pushed into a socket.
Tube or
plastic bag A short plastic tube (with caps on both ends) will keep
for small loose screws and small parts from getting lost.
parts
Compressed
A can of compressed air is helpful to remove dust.
air
An antistatic wristband is an essential tool. Antistatic mats
ESD tools and antistatic bags are also helpful to reduce the risk of
ESD.
A small, digital meter that is capable of measuring volts
Multimeter (alternating current [AC] and direct current [DC]) and
ohms (resistance or continuity) is all that is needed.
A small (bright) light is necessary for illuminating those
Flashlight
hard-to-see places.
Good for picking up and holding small parts. Straight
hemostats will work most of the time. However, curved
Hemostats
ones will get into those small places that the straight ones
cannot reach.
Power-on A POST card can be used to see what the error messages
self test during system start are when no data is being sent to the
(POST) card display.
This combination can save hours of time. It can be used to
download drivers from the Internet. With the right
Laptop,
collection of CDs you can access virtually any system file
blank
that you might need, the help screens for command
floppies, and
syntax, and a wide array of information from the Microsoft
CD-ROM
Knowledgebase. You can use the blank floppies to move
folder
files to and from an ailing computer. Be sure to have a
phone cord to connect the laptop modem to the wall jack.
Recommended Software
Don't feel compelled to carry an entire arsenal of arcane software. At the same
time, assemble a collection of the software that supports the computers you
normally work on. That includes the operating system disks and common
drivers. Use the items that follow as a guide.
You should compile and carry bootable floppy disks for each operating system
that you encounter. These should contain the following files:
NOTE
These files will barely fit on one 3.5-inch high-density floppy disk.
Files listed in bold are essential.
The Microsoft Windows 98 and Microsoft Windows Me startup disks are also a
good item to carry. These are bootable disks that load all drivers needed to run
a CD-ROM on most PCs, and they include most of the files just listed as well.
TIP
Make sure copies of the original operating system CDs or floppy disks are
available. If it becomes necessary to install one or more components that were
left out during the original installation, the computer might require verification
of serial numbers from the original disk before any additional files can be
installed. Microsoft Windows 95, Windows 98, Windows Me, Microsoft Windows
NT, and Microsoft Windows 2000 have associated rescue disks (more about
those in the next chapter) in case there are any problems with corrupt files in
the operating system. It is a good practice to ensure that you have these disks
available.
NOTE
Software Utilities
There are many good-quality utility programs available today that allow the
experienced user to find and correct a multitude of problems. However, use
caution when "correcting" a problem that has been identified by the software.
The software might consider something a problem simply because it does not
recognize it, on the assumption that, "if I don't know what it is, it must be
bad." In some cases, the cure is worse than the disease. Also, keep in mind
that one utility will not solve every problem. As a computer professional, you
will do far better to master one good software system than to have a box full
of utilities that you don't know how to run effectively. Don't forget good old
MS-DOS; it is full of useful commands that are often forgotten or never used.
CAUTION
Networking
Join a local computer users' group—one can easily be found by asking around
local computer stores. These groups are great places to meet and share
common interests with others.
Make yourself available to other technicians. The person you help to solve a
problem (from your base of knowledge and experience) today will be there to
help you tomorrow. The best time to learn about problems and their solutions
is before they happen to you.
Usenet
Newsgroups are also invaluable when you come across a situation that stumps
you. Write up the problem and post it to an appropriate newsgroup (or more
than one, but don't cross-post). You may be amazed at the responses you will
get from helpful colleagues—everything from "try this" suggestions to the
actual solution to your problem from someone who has encountered it before.
The Web has quickly become the best place to get computer information. Most
suppliers have a presence on the Web, and they often provide upgrades,
patches, and workarounds for problems users encounter with their products.
Many maintain technical databases full of information about both their legacy
products and the most current ones. This information is usually free, but the
fact that it exists is not always advertised. It is not uncommon today for a
supplier to post a fix or upgrade on its Web site without notifying registered
users.
Finding the correct Web site can often be challenging. A good starting place is
a portal site that caters to technicians who frequently upgrade computers.
These sites help you search for a source for buying parts and have links to the
major computer industry manufacturers.
If you don't have luck with portals, use search engines. You might feel
overwhelmed at first with your search results, because responses can literally
number in the thousands. Learn how to use "advanced" search techniques and
try suppliername.com to find the correct domain (it works more often than
not).
Commercial Networks
Practice
Knowledge that does not get used gets lost. Practicing is the only way to keep
your skills sharp. However, use caution when trying things out for the first
time or when experimenting (especially on someone else's computer).
Explaining that you crashed because you were "playing" with a new technique
or piece of hardware can be a painful experience for all involved.
However, it doesn't hurt to keep some equipment on hand for the sole purpose
of playing. For many technicians, extra equipment at work is rare and their
personal machines become their test machines, constantly being ripped apart
and experimented on. If a system or two can be kept around for
experimentation and education, you can greatly enhance the value of any
other training you receive and reduce overall costs. Given the cost of PCs
today, a test machine is a worthy addition to your lab.
Read, Read, and Read Some More
Keep up with the computer industry press. There are many good computer
books available, but remember, computer books have a relatively short shelf
life. Magazines and subscription services like Microsoft Tech-Net are great
resources. Don't forget that most print magazines have online editions, and
some excellent magazines exist only online. These e-zines offer in-depth
reviews and industry advice long before it appears in hard-copy publications.
Telephone Support
Many telephone-based support systems are geared toward novice and home
users, not to knowledgeable, well-trained technicians, and many try to walk all
callers through basic installation procedures. Exercise patience when talking to
someone at this level, who probably had to complete a basic troubleshooting
procedure required by his or her employer; that person must follow the rules
and procedures of the company. Also, don't be blinded by how much you think
you know. The individual providing phone support just might cover something
that you missed or lead you in another, more fruitful direction. If the problem
remains unresolved, you will usually have to convince support personnel to
send you to the next level of support.
After you get to that next level, always ask the "level 2 technician" to give you
the phone number for the direct technical-support line. Some technicians are
reluctant to give out that number unless the caller promises not to distribute it
and not to call about trivial matters. Every computer technician should build
up a collection of technical-support phone numbers, including as many direct
numbers that bypass the usual voice-mail routing system as possible. The
major drawback to technical-support lines is the amount of time callers often
spend on hold. If you are going to rely on telephone support, it may be
worthwhile to consider priority support for critical incidents. These are fee-
based hotlines, often with toll-free numbers that provide quicker service—for a
price.
TIP
Online Support
Online technical support is becoming a better option. Most free phone support
today is only provided to registered owners for a limited time. If you want
ongoing support, you will have to subscribe to a service or use a pay-as-you-
go phone line. Checking vendors' Web sites or online forums on commercial
networks such as MSN often provides a solution without the need to contact
the company. Many forums have libraries of technical support questions that
have been posed about particular products. By searching these libraries, you
can often get immediate answers to your questions. Some sites also have
troubleshooting "wizards" that walk you through a diagnosis and solution to
your problem. If not, post questions and hope for an answer, either from the
OEM or from another user.
Remember, if support is essential to you and your OEM does not provide the
level of service you need, you can always change OEMs (if you work in a large
company, inform your supervisor of the problem). Before taking that step, tell
the OEM you are considering another OEM and explain why. You could also
point out that if the way you've been treated is typical of their service and
support, you will post it as a cautionary tale in a newsgroup or two.
Working Safely
When working with computers, part of the expanded "toolkit kit" is providing a
safe working environment for both humans and the hardware. Computers and
their peripheral devices are electronic equipment, so most safety issues relate
to electrical power. However, when you work on this equipment, there are
several other concerns to take into consideration, as listed in the following
table.
Problem Prevention
Some equipment, such as printers, monitors, and even the
computer itself, can weigh several pounds (10–20 pounds or
more for newer, larger monitors). This might not seem like
much; however, improperly picking up (or dropping) the
Back
equipment can result in back or other injuries. Be especially
injuries
careful when removing a component from its original
packaging. These components are generally packaged very
tightly to provide protection during transport and can be
difficult to remove.
Be very careful when removing covers from computer
components. The frames of the cases are often made of thin
metal with sharp edges. Also, poorly cut or stamped parts
Cuts
might still have metal burrs, which are very sharp. Devices
such as scanners and monitors have glass components that can
break.
Computers tend to have many cables and wires. If not properly
installed, these wires and cables can constitute a serious
Tripping tripping hazard. Use cable ties to bundle up cables and reduce
the "spaghetti" effect. Also avoid running cables under carpets
and areas where people walk.
When installing or working on any equipment, make sure that the work done
conforms to all applicable local and national safety codes, such as Occupational
Safety and Health Administration (OSHA) and National Electric Code (NEC)
standards. Many companies have their own internal safety departments and
safety manuals. Be sure that you are familiar with them as well.
Power and Safety
Power is the primary safety hazard encountered when servicing a computer.
Be familiar with the following guidelines when working with electrical devices
and components.
ESD
Grounds
High Voltages
For the most part, a computer uses ±5 and ±12 volts DC. However, two
devices use much higher voltages: power supplies and monitors. With these
two exceptions, there are generally no electrical hazards inside a computer.
Power Supplies
The power supply uses 120 volts AC. This voltage is found inside the power
supply case. In most cases, there is no need to open the power supply case
and work on the power supply. The cost of a new power supply is low enough
that it is generally easier to replace than repair. However, should you decide
to open the case, be careful. Remember, the power switch on most computers
(usually located on the front of the computer) also uses 110 volts AC to turn
the power supply on or off. If you are working on a computer and leave it
plugged in to provide proper grounding, this could present a hazard.
Monitors
Monitors use very high voltages (30,000 volts) to drive the CRT (cathode-ray
tube). Remember that monitors are dangerous even when unplugged. They
can store this high voltage and discharge it if you touch the wrong parts.
Working inside the monitor case should be left to a properly trained technician
with the necessary tools.
The following are some general guidelines to observe when working around
computers:
There are three basic types of fire extinguishers for nonprofessional use, as
shown in Figure 19.1.
Batteries
Toner and cartridge kits
Circuit boards
Chemical solvents
Monitors (CRTs)
When purchasing or using any kind of chemicals (cleaners, for example) that
you are not familiar with the proper use and disposal of, be sure to check the
material safety data sheet (MSDS). This form that describes the nature of any
chemicals manufactured. It includes generic information about the product's
chemical makeup and any recognized hazards (including what to do and who
to call if there is a problem). These forms are required by law, so ask to see
them. Chemical suppliers must provide the purchaser with the MSDS for
products, if requested. Also consider purchasing sprays with a manual pump
dispenser or compressed air rather than chlorofluorocarbons (CFCs) or other
propellants that can be harmful to the environment.
Lesson Summary
The following points summarize the main elements of this lesson:
Let's define the terms plan and procedure. A plan is the broader scope of care,
and it can contain several procedures. For example, a periodic maintenance
plan can detail the activities and tasks that should take place at regular
intervals (daily, monthly, annually, and so on), or relative to some specific
activity, like a system upgrade. A procedure is a detailed list of steps that
should be performed, often in the form a checklist. This list can also include
the necessary tools, parts, and remarks about important issues regarding the
procedure.
Automated Tasks
Windows includes some form of Task Scheduler in the current versions. It can
be set to automate the performance of many common jobs like disk
defragmentation during hours of no or low use.
A simple set of records with essential information and a work history for each
computer you work on can make identifying tasks, settings, and potential
problems much easier. Excel or Access can be used to make virtual quick
references. Keeping it on a laptop makes it both easy to maintain and easy to
access when out on a call. Be sure to back up the data and keep a hard copy
on file for quick reference. The following table provides some suggestions
about the information you might want to keep.
Suggestion Usage
The actual name you choose does not matter, but make it
unique and descriptive. One idea is to use the same name
that Windows uses to identify the computer on a network.
Name each
You may have to add some notes about who the related
computer.
client is or the location. Establish naming conventions to
make remembering them easier. Use names in addition to
serial numbers.
Include the operating system name and version, startup
and configuration files, hardware IRQs (interrupt requests),
Document I/O (input/output) base address, direct memory access
all technical (DMA) channels, device driver names, processor type and
information. speed, size of cache, RAM (random access memory), BIOS
(basic input/output system), monitor, video card, modems,
and sound cards.
Save startup
data to Include the startup disk (based on the current version of
floppy disks the operating system), device driver disks, and recovery
(unique disks—as required by an antivirus program or system.
data).
In your log of events for each computer, include such
Keep an things as the user, application installations (date and
incident log. version), upgrades (hardware), and problems (cause of
failure and actions taken for resolution).
Set up a
local and
Include in the front part of the log a list of the tasks that
specific
are to be performed and how often. Note the dates when
maintenance
they have been performed and by whom.
task
schedule.
Basic Hardware Maintenance
Cleaning
For the most part, computer equipment is very reliable and lasts a long time.
However, dirt and other airborne contaminants will greatly accelerate the
deterioration of computer equipment. Therefore, part of a good preventive
maintenance regimen is keeping the equipment clean.
In the event that the location of a computer is not as desirable as it should be,
the frequency of preventive maintenance (cleaning) should be accelerated. In
these instances, consideration should be given to establishing a computer-
friendly zone around the computer, for instance, installing it into a cabinet and
providing a source of clean fresh air. The following table describes what a
computer technician should include in a basic cleaning kit.
Item Usage
Lint-free
chamois
A cloth is useful for cleaning the outside surfaces.
cloth or
old t-shirt
Standard household cleaning solutions (not extra-strength)
can be used in moderation. The solution should be applied to
Cleaning a lint-free cloth and then applied to the computer surface. Do
solution not use aerosol sprays. These generally use solvents as a
propellant, which can dammage the plastic as well as the
electrical components of a computer.
Use these with cleaning solutions to clean small parts such as
Foam the wheels inside a mouse. (Cotton swabs are not
swabs recommended, because the cotton fibers can come off and be
a contaminant themselves.)
An antistatic spray or solution should follow any cleaning in
Antistatic envi- ronments with a risk of ESD. A solution composed of 10
spray parts water to 1 part common household fabric softener will
do.
Small
paintbrush
Use to remove dust from around the computer and inside its
or small
cabinet. The vacuum can be used to remove dust from the
hand-held
keyboard and other input devices.
vacuum
cleaner
Use to remove dust from the power supply fan or from inside
Canned a computer. These cans can be purchased from any computer
air supplier; they are made especially for removing dust from
electronic equipment.
CAUTION
Monitors
Hard disk drives are another type of device that requires very little
intervention to keep running. Mechanical failure of hard drives is rare, and,
when it does occur, the solution is generally replacement. We cover operating-
system-related maintenance issues in the next lesson. Here are a few
suggestions for preventing mechanical problems with hard drives:
Floppy disk drives are highly susceptible to failure. This is due mostly to the
fact that they are exposed to the environment (through the disk slot) and to
mechanical damage from insertion and removal of disks. When they fail, the
best solution is usually to replace them because they are inexpensive and
simple to install. Here are a few tips to increase the life of floppy drives and
disks:
Keeping a keyboard and mouse clean is the key to prolonging their lives.
Never place drinks (coffee, soda, tea, and so on) around a keyboard; spilling
liquids is a common cause of keyboard failures. Here are a few tips to increase
the life of a keyboard, mouse, or other pointing device:
Use a handheld vacuum cleaner to remove dust from the small crevices.
Never use spray cleaners.
Clean a mouse or trackball by removing the ball and cleaning the rollers
(if it has a ball inside).
When using a light pen, never touch the ends with your finger.
Printers
Printers are more mechanical than other peripherals and therefore require
more attention. Because they use paper, ink, or carbon, printers generate
pollutants that can build up and cause problems. Always check the
manufacturer's recommendations for cleaning. Following are a few steps for
cleaning the most popular types of printers.
Dot-Matrix Printers
Adjust the print-head spacing.
Check the tension on the print-head positioning belt. Use a nonfibrous
swab dipped in alcohol to clean the print head.
Clean the printer's roller surfaces.
Clean the surface of the platen.
Clean the gear train of the paper-handling motor.
Apply light oil to the gears using a foam swab.
Turn the platen to distribute the oil.
Apply a light coating of oil to the rails.
Move the carriage assembly to distribute the oil.
Ink-Jet Printers
Laser Printers
Vacuum to remove dust buildup and excess toner from the interior.
Remove the toner cartridge before vacuuming.
Clean the laser printer's rollers using a damp cloth or denatured alcohol.
Clean the gear train of the paper-handling motor using a foam swab.
Apply light oil to the gears using a foam swab.
Distribute the oil throughout the gear train.
Clean the writing mechanism thoroughly using compressed air. If
possible, wipe the laser lens with lint-free wipes to remove fingerprints
and stains.
Clean the corona wires using a foam swab dipped in alcohol. Be careful
not to break any of the strands because, if you do, your printer will be
rendered useless until they are repaired.
Preventive Maintenance Schedule
There are no universal preventive maintenance schedules that work on every
computer. Each schedule must be individualized to meet the needs of the work
environment. Use the following suggestions as maintenance guidelines for
developing your own polices and procedures.
Do This Daily
Back up data.
Check computer ventilation to ensure that it is clear. Remove any paper,
books, or boxes that might impede the flow of air into or out of the
computer.
Do This Weekly
Do This Annually
Reformat the hard disk drive and reinstall all software. Don't forget to
back up data first.
Check all floppy disk drives.
Consider an upgrade to your computer. Check to see that your
components can handle your workload.
Lesson Summary
The following points summarize the main elements of this lesson:
The modern microcomputer is very reliable, but still requires regular care.
Regular preventive maintenance can reduce the need for repairs.
Part of preventive maintenance is keeping a computer clean.
Never use solvent-based cleaners on a computer.
Never use liquids on the electrical components inside a computer.
Create and implement a regular maintenance plan for each computer
under your care.
3 4
Lesson 3: Maintaining the Windows System
Environment
This lesson describes the basic steps required to provide proper periodic
maintenance to the operating system and data files contained on a Windows-
based computer.
It's not just the outside of a computer that needs to be cleaned; regular
housekeeping of the operating system and hard disks is critical to safe, robust
performance. The data on the hard disks also requires periodic maintenance
and tidying up. The Windows environment is constantly undergoing change.
Every time a file is created, opened, or closed, and every time a new software
application or hardware device is added, the content of the file system, and
often the nature of the Registry, is changed. Over time, the underlying
organization of files on the machine becomes fragmented. This fragmentation
reduces system performance because the system must work harder to
assemble the files so that they may be used.
Numerous temporary files are also created on the system on a regular basis.
These are not always removed as often as they should be and they can clutter
the storage system. If a disk used for virtual memory paging gets too full,
scratch file size is reduced and overall system performance degrades. User
data, along with system files, must be backed up on a regular basis to prevent
loss in the event critical files become corrupted or the hard disk fails.
Over time, the magnetic media's format weakens. It must be inspected and
refreshed before the aging results in data loss or system failure.
Early versions of Windows lacked robust support for managing these tasks, but
that has changed. Both Windows 98 and Windows 2000 offer a variety of tools
that can do the job. There is one other preventative maintenance task for
which you might want to consider a third-party solution: virus detection and
elimination. With the widespread use of the Internet and e-mail, a computer
virus can spread faster than the flu. They are also difficult to detect as idle,
malicious minds seem to keep finding new routes of infection.
Periodically, Microsoft offers updates to the code for its operating systems, and
many vendors offer periodic patches to their software as well. Some of these
updates fix specific problems, whereas others are designed for use on virtually
every computer running the operating system or program. This type of file
update does not necessarily occur at regular intervals, but it is a good idea to
regularly check for appropriate updates. When a worthy upgrade is released, it
should be deployed on all computers that would benefit from it.
With these topics in mind, we can identify several things that should be done
on a regular basis to keep the Windows operating and file systems secure and
running at peak performance, and designate an order in which to perform
them:
There is no sure defense against viruses, and the whole software industry has
devoted great effort over the last few years to designing detection and
remedial software. These programs can be purchased and downloaded from the
Internet or obtained through regular distribution channels. Because viruses
change rapidly and new ones appear almost daily, it is best to shop for an
antivirus utility that comes with free or low-cost regular upgrades that are
easy to apply. The following are some general guidelines for virus programs:
Make sure your choice is compatible with the specific version of Windows
on the system, including any upgrades. The wrong antivirus program
might do more damage than good.
If the computer has a BIOS setting that allows you to disable boot-sector
writes (prevent applications from writing to the boot sector of the hard
disk), consider enabling it. This setting must be disabled before installing
Windows updates and some other programs as well. Keep in mind these
BIOS-level virus checkers are very limited in ability and should not be
relied on for total protection.
Viruses are often transmitted by floppy disks. Be careful when reading a
floppy disk of unknown origin or using your disk on an unfamiliar
machine.
Currently, many viruses and macro viruses are transmitted over the
Internet. Use extreme caution when you download files, especially if they
come from sources other than a manufacturer's Web site. The most
secure protection against Internet-distributed viruses is to have an
antivirus program running at all times (or at least when you're
downloading and first running new files).
Trust no one when it comes to loading programs on your machine. Be
aware that any program you load on your computer could contain a virus.
Be sure to keep your antivirus program updated. Hundreds of new viruses
are written and transmitted each month.
When designing an antivirus program, you need to take into consideration the
needs of the user and the level of risk. A computer that does not have a
connection to the Internet or a LAN (local area network) and rarely receives
files from outside sources is at little risk. A file server that gets files from a
variety of sources, some downloaded from outside, should be equipped with
very robust virus detection. In the latter case, it's good if the software has the
capability to alert a system administrator with an e-mail message or page
when a virus is detected.
Disk Cleanup
Cleaning up old files not only saves on media and reduces copy time during
backups; it also frees up disk space and improves file system performance.
Both Windows 98 and Windows 2000 offer Disk Cleanup wizards available on
the System Tools menu that make cleaning up old files on a disk easy. Simply
invoke the routine and direct it to the desired drive. Wait for the utility to
prepare a list of various temporary files, unnecessary program files, files that
have been moved to the Recycle Bin, and Internet files that are cached locally
on the disk. You can then determine which of these files you wish to delete.
Simply click OK and the files are removed. Figure 19.2 shows the wizard ready
to delete the files.
Figure 19.2 The Disk Cleanup Wizard operating in Windows 2000 Professional
Checking Drive Integrity with ScanDisk
ScanDisk is an incredibly useful program, and, in the early days of MS-DOS,
many people bought utilities like this to keep their system running properly. It
inspects the file system and fixes problems and can do so when the system is
in use. ScanDisk is built into all the currently shipping versions of Windows.
You should be very careful to make sure that any version of ScanDisk you use
is actually the one that is compatible with the version of Windows and the file
for the PC to be checked and corrected. On most systems, ScanDisk is
available in both a command-line version and one that operates within the
Windows graphical user interface (GUI).
The ScanDisk utility can both detect and fix problems on local hard disks,
floppy drives, RAM drives, and some memory cards. It works with compressed
drives set up using DoubleSpace and DriveSpace, but offers only limited
support for third-party compression software. Among the operations you can
perform on a ScanDisk are
Windows 2000 has a similar tool that is accessed in the Properties dialog box
for a disk. Open the Tools tab and select the Error-Checking option. Click OK
to start the program if the disk is not shared and in use. If it is, the program is
automatically run the next time the computer is started.
Keeping Files Orderly with Disk Defragmenter
An operating system as complex as Microsoft Windows constantly opens and
closes files, as do applications and users. Due to design issues, the file systems
do not necessarily place data on storage media as a single block when they
write a file to disk. As a result, over time, the files on the drive can become
severely fragmented (spread out across different sectors of the hard drive).
This fragmentation can seriously degrade system performance, as each time a
file is opened it must be gathered from several places and stored in memory.
You can schedule the defragmentation to take place when the computer is not
being used, so the speed of its operation is generally not a concern. Some
screen savers or other programs that involve disk activity can slow down the
operation of the defragmenter, so for best performance they should be
disabled during its operation. Windows offers a Maintenance Wizard to
automate this and other common disk care tasks.
File Backups
Hard drives fail. Critical files become corrupted. Data loss is not a matter of if,
but when. As a computer professional, one of the most valuable services you
can perform is ensuring that your client's critical data is secure. The best way
to do that is by developing a good backup plan and making it as automatic as
possible. In the days of MS-DOS and in the early days of Windows, Microsoft
provided a floppy disk-based backup utility. It was cumbersome to use, and
floppy disks were unreliable. Creating a backup volume that spanned from 10
to 20 disks was asking for trouble.
Today, Windows comes with built-in backup software that supports a variety of
media. You can back up to tape, another hard drive, or removable media.
Third-party vendors provide additional backup software that can write to CD-R
(CD-recordable), CD-RW (CD-rewritable), and other forms of inexpensive,
high- volume media. Given that today's hard drives provide multigigabyte
storage, advanced backup strategies have to be simple and effective.
There are generally accepted practices and common methods used for data
backup, and both Windows 98 and Windows 2000 ship with integrated backup
software. Tailoring a backup plan that works for individual needs based on this
software is a simple process, but must take into consideration the amount of
data to be backed up, the frequency of backup, and the equipment available.
The various Windows file systems provide an attribute that can be attached to
a file to indicate when it was backed up. This can be used to filter which files
are copied based on the last time they were backed up or if they have been
backed up at all.
There are five different common types of backups based on frequency and
which files are added to the archive. With some versions of software, you must
select the files manually, whereas in others a wizard or a predefined file list
determines what data is moved to the archive. The backup types are
The amount of data and the backup frequency will also dictate the type of
hardware to be used. Inexpensive external storage devices like a Zip drive
work fine for low-volume applications. For high-volume, high-speed archiving,
one or more high-speed SCSI (Small Computer System Interface) tape drives
or an equally expensive redundant array of independent disks (RAID) may be
employed.
NOTE
Be sure both the device and the media are compatible with the
operating system, file system, and backup software that will be
used on the system.
Many companies use a rolling backup plan, which provides a full normal
backup of the entire contents of system drives at regular intervals, with
incremental or differential backups occurring between those archiving backups.
There is a wide variety of media used for backups. These include various tape
formats, optical discs, and hard drives. Magnetic media is notably unreliable.
As insurance, many people rotate a series of tapes to be used for a given
backup. For example, if backups are done on Monday, Wednesday, and Friday,
then a different set of tapes might be used for each day.
Backup plans are a form of system security, and it is wise to prepare for the
unexpected. There are a few things to consider when setting up policies:
Make sure that your backup copies are stored in a safe, environmentally
sound location. It is generally wise to keep a second set off site in the
event of fire or other disaster.
Keep the copies in a secure location. Sensitive data can be stolen from a
copy almost as easily as from the computer itself.
Backups are sometimes your last line of defense against a virus attack.
Because some types of viruses can reside on a system for a long time
before being detected, it is a good idea to keep one or more long-term
backups (from the preceding month or so) available in the case infection
and data loss.
Most backup software is unable to copy files that are currently open and
may be trained to skip certain files unless given specific instructions. Be
sure the plan includes a method that allows all targeted files to be copied.
Backup technology changes over time, and so does compatibility. When
upgrading hardware, software, or the operating system, be sure that the
new components and the old components will work together and allow the
restoration of backed up data when needed.
The Windows 98 and Windows 2000 operating systems ship with bundled
backup software that is located under System Tools. In Windows 98, you must
add it, as it is not automatically installed as part of the regular setup. The
features and hardware supported vary from platform to platform. Most offer
the ability to predefine jobs, which are collections of files, or drives, that are
targeted for backup. This allows you to designate groups of files, which can
then be backed up at regular intervals. Most also support the various backup
types mentioned earlier. For more information on just which hardware
products are supported as backup devices, how to use the program, and the
specific feature sets included in a given version of Windows Backup, refer to
your operating system help file and related documentation. Figure 19.5 shows
the Windows 2000 Backup program at work.
Figure 19.5 The Windows 2000 Backup utility in action in the backup
NOTE
In Windows 2000, any time you perform a backup and check the System State
option in the Backup Tab, the Registry is backed up automatically. Windows
2000 actually considers more than just the Registry as part of its core file
suite, because Windows 2000 needs more than just the Registry data to
restore an operating system to the same state as it was at a given point in
time. The full set of files is referred to collectively as the system state data,
which includes:
You can also use the Backup Wizard to save the system state data; it offers
you the option during its queries. Keep in mind that you must be logged on
with administrator privileges or be a member of the backup operators' group to
have access to the Backup tool or the Backup Wizard. With the proper
permissions, you can back up data files on remote computers over a network,
but you can only back up system state data on a local machine.
Whenever you save data with the Backup tool, it is a good idea to have it
verify the files (automatically compare the new copy with the original) and to
visually inspect the report that it generates by clicking Export. The report is
displayed in Notepad, and you can print a copy of the report as a record of the
backup. Here is an example portion of such a report:
Backup Status
Operation: Backup
Active backup destination: 4mm DDS
Media name: "Media created 01-Jan-01 at 6:34 PM"
The bold and italicized text in this example points out three reasons for
keeping a copy of the backup report. It provides a record showing the media
name for a given backup, so you can quickly locate it in your archive to
restore files. It shows that date and type of backup, which can both be used to
verify that a scheduled activity took place. It also shows the amount of space
used on the media, which is handy for calculating how much space remains on
the tape.
Verifying and Backing Up the Windows 98 Registry
Windows 98 also offers a utility for backing up the registry, built into a
program called the Registry Checker. This is a command-line application. Once
again, we see that Windows likes to hide Registry-related tools from the casual
user—you have to know exactly where and how to find it.
Just as with Windows 2000, it's a good idea to do a backup of the Registry
before performing any operation (like installing a new application or piece of
hardware). Windows 98 includes a backup utility within a tool that lets you
examine the Registry and make sure that it is in proper condition.
To run the Registry checker, open a command-line prompt and run the
Start\Run Menu, and type SCANREGW.EXE in the Run dialog box. The
program first scans the contents of the Registry and makes sure that the files
are sound. If everything checks out, it offers to back up the Registry. This
makes the program copy the Registry files and store them in a .cab (Windows
cabinet) file in the \Windows\Sysbckup directory.
Every time you run the program, it creates a new cabinet. The filenames end
in a number, and the most recent version has the highest number just before
the .cab extension. Of course, there are more system files than just the
Registry to be concerned about, and that leads us to another tool.
Checking Critical Files with the Windows System File Checker
System files can be corrupted for a variety of reasons, including improper
system shutdown, problems with disk media, or a new application improperly
overwriting a necessary driver with its version. To minimize both problems and
risks associated with this behavior, the Microsoft developers included a
combination "guardian angel" and administrator utility.
The WFP system tracks all changes to system files and makes sure that any
new files assigned to replace a protected file are valid. It also sends a message
to the system administrator when an improper file replacement of one of these
protected files is attempted.
There are times you may wish to examine the status of these core system files
yourself; for example, if Windows is getting error messages that a certain file
is a problem, or some system service starts behaving improperly. The WFP
system includes the System File Checker (SFC) utility in both Windows 98 and
Windows 2000, which can be run at the command prompt to verify manually
the versions of all system files under protection and reload saved copies from a
hidden cache.
You can use the SFC to verify the integrity of your system files. Open the SFC,
choose Scan For Altered Liles, and click Start. The program reports any files
that do not match the SFC DEFAULT.SFC file. If you know a specific system file
shown on the list is corrupt or missing or you expect it is the cause of some
problem, you can extract it from the Windows installation disk using the SFC
Extract option. In SFC, choose Extract One File From Installation Disk, enter
the full filename when prompted, and click Start. Then give the program the
location of the disk with the file and where you want it to be copied. When you
click OK, the SFC extracts the file to the desired location. The SFC options are
shown in the table below.
SFC
Function
Option
Update the file data in DEFAULT.SFC. Choose this option
Update The when you have updated a system file without running the
Verification SFC and are certain that you want to update DEFAULT.SFC
information to use the updated information about the file the next time
the SFC is run.
Specify the source location of the file to restore and where
Restore to save the new copy of the file. You are also prompted to
File back up the existing file to the \Windows\Helpdesk\SFC
folder. Choose to back up the file in case there are problems
using the new file.
Skip the file. The next time the SFC is run, this file will
Ignore cause the File Changed dialog box to appear because it was
not added to DEFAULT.SFC and it was not restored.
Creating Emergency Repair and Startup Disks
Every Windows computer should have either a Startup disk (Windows 95 or
Windows 98) or an ERD (Windows 2000 and Windows NT) nearby. The
Windows 95 or Windows 98 Startup disk is the same for all computers using
that version of the operating system. In other words, you can use the Windows
98 Startup disk for all Windows 98 computers. You can use Windows 98's
Startup disk to start a Windows 95 or even a Windows 2000 or Windows NT
machine. As long as the file system is compatible, you'll also be able to view
and work with files on the computer. You should use the utilities on a disk for
only that specific version of Windows with which the system Startup disk was
created.
The Windows 2000 and Windows NT ERD is a different matter. These disks are
specific for the computer on which they were created. The ERD contains three
files: AUTOEXEC.NT, CONFIG.NT, and SETUP.LOG. These are copies of the files
with the same name that are contained in the %SystemRoot%\ Repair folder.
The first two files are used to initialize the MS-DOS environment, and the third
is used by the Windows 2000/NT emergency repair process.
The ERD should be updated any time a change is made to the structure of the
operating system (new drivers, service pack, and so on), or when new
hardware is added to the computer.
The ERD should not be used to repair Registry problems. We cover that
process in the next chapter. It should be used if the system becomes so
corrupted that you must restore the original Registry created during startup to
gain access to the system.
Lesson Summary
The following points summarize the main elements of this lesson:
The tools needed for computer care and repair are quite simple hand
tools.
Your toolkit should include a collection of startup disks and other software
needed for the types of machines generally worked on.
Accurate information is a critical component of a technician's resources.
Ongoing education is essential.
Creating a safe working environment is part of the job to protect both you
and the equipment.
Planning can save time and ensure that proper care is provided.
Documentation tracks work and make follow-ups more effective.
Each class of hardware has its own maintenance tasks and procedures.
Viruses are a risk to all computers.
Backups of data must be done in a systematic way on a regular basis.
The hard drive should be cleaned of old files to improve performance and
avoid clutter.
Regular testing and repair of the file system, as well as defragmenting
disks, can improve performance and avoid downtime.
3 4
Review
5. What is an ERD?
6. What is the best way to remove old, unused files from a Windows-based
computer?
Answers
3 4
Chapter 20
Upgrading a Computer
About This Chapter
Computer upgrades are among the most common tasks performed by a
computer technician. With new technology being introduced every day, it is a
constant struggle to stay up to date. Before you can upgrade or repair a
computer, you must know how to take it apart. A thorough understanding of
how to disassemble a computer and put it back together is required of any
computer professional. This chapter provides guidelines for successfully
disassembling, reassembling, and upgrading a computer.
Before You Begin
Before starting this chapter, you should review the previous chapters that
cover the physical components of a computer. Also, if you are not already
familiar with the risks and issues concerning electrostatic discharge (ESD),
review Lesson 2, "Electrostatic Discharge," in Chapter 22, "The Basics of
Electrical Energy."
3 4
Lesson 1: Computer Disassembly and Reassembly
In this lesson, we look at the tools and practices required by a computer
technician to physically take apart a computer and successfully put it back
together.
The following list provides examples of the types of documentation you should
assemble before you begin a repair:
Carefully consider the following questions before you open the case of any
computer:
Is this the right computer?
Why am I taking it apart?
Do I have everything necessary to do the job?
Do I need more information before starting this job?
Are there any proprietary hardware components in this machine? If so, do
I have the right tools, parts, and drivers to complete the job?
Do any of these tasks require the assistance of a third-party technician—
for example, internal monitor adjustments?
Tools and Components
Standard Toolkit
Assemble the tools and components identified in the planning stage. If the
update is a major one, make sure you have properly backed up any user data,
as well as the system files and Registry, to be prepared in the event of a
serious problem.
Make sure copies of the original operating system disk (or CD) are available. If
it becomes necessary to install one or more components that were left out
during the original installation, the computer might require verification of
serial numbers, installation IDs, or the original distribution disk before any
additional files can be installed. You should also create a rescue disk for your
version of Windows for the machine you are repairing in case there are any
problems with corrupt files in the operating system. It is a good practice to
ensure that you have this disk available.
NOTE
Often, manuals don't provide a lot of technical information, but they usually
tell you how to remove the cover. The extent to which you have to
disassemble a computer depends on the specific problem or repair. Following
the procedure outlined here will help you establish a routine for completely
and efficiently disassembling most computers:
Run the Preassem video located in the Demos folder on the CD accompanying
this book to view a presentation of all the hardware components that go into a
personal computer.
Do not force connectors into place—if they don't fit easily, they are
probably in the wrong place.
Expansion cards often require some force or side-to-side movement to fit
into place, but do not force them.
When removing cables, remember the pin 1 locations. Check notations on
the circuit boards and look for the red wire on the ribbon cables.
Connect the cables to the drives before installing them in the bays.
Test the system before replacing the cover.
Lesson Summary
The following points summarize the main elements of this lesson:
Run the Mboard video located in the Demos folder on the CD accompanying
this book to view a presentation of a personal computer's motherboard
subsystem.
Run the Assembly video located in the Demos folder on the CD accompanying
this book to view a presentation of components being assembled into a
personal computer.
As discussed in Lesson 1, before you begin to upgrade any computer, you need
to document the system. You should create and maintain files that document
all computers for which you are responsible. Figure 20.1 provides a sample
configuration sheet. Use it as a model to create your own.
Figure 20.1 Sample configuration sheet
Memory, Memory, Memory
Does this computer have enough memory? This is the question that most
frequently causes users to seek a computer upgrade. As programs and
hardware get faster and are required to process more graphics and animation,
the need for memory is as important as the need for speed.
Memory upgrades are perhaps the simplest to perform, but they can be very
confusing without advance planning. Purchasing the right memory for the job
is more than half the process of the upgrade. Before installing memory, there
are five things to consider:
NOTE
You can add memory with SIMMs (single inline memory modules)
or DIMMs (dual inline memory modules).
SIMM Formats
SIMMs come in two basic, physical formats: a 30-pin and a 72-pin chip. Format
is the first consideration, because the chips must fit into the motherboard. This
configuration, along with the size of the processor, determines how many
SIMMs are required to fill one bank.
The 30-pin formats contain memory in 8-bit chunks. This means that a 32-bit
processor requires four SIMMs to fill one bank. Typical 32-bit processors
consist of two banks of SIMMs and, therefore, eight slots (see Figure 20.2).
A 72-pin format is larger and supplies memory in 32-bit chunks. Only one
SIMM is required for a 32-bit machine. Pentium processors have a 64-bit data
path and require a 72-pin SIMM (see Figure 20.3).
DIMM Formats
DIMMs are much easier than SIMMS to install or remove, because they come
in a single card, which is simply pushed into a module slot. The "key" cut into
the edge that goes into the slot prevents the card from being inserted the
wrong way. The one problem you face is choosing from the wide variety of
memory types available. When ordering a new DIMM, you must know exactly
the memory type supported by the system on which you wish to install the
memory. DIMMs are found in larger memory sizes than SIMMs, ranging to 256
MB and beyond for single cards.
Memory Speed
Memory speed is the amount of time required to access data measured in
nanoseconds (ns); each nanosecond equals one billionth of a second. Two
important considerations arise when addressing memory speed:
Typical chip speeds are 50, 60, 70, and 80 ns. Be sure to check the
motherboard documentation or the existing chips to determine the correct
speed to use.
EDO RAM
The EDO RAM chip is used extensively with Pentium processors. This chip can
improve read times and overall performance by up to 30 percent. This
performance gain is possible because the chip continues to output data from
one address while setting up a new address.
Parity
Parity is used to check the reliability of data. It requires one additional bit
(chip). Memory can be purchased with or without parity. With parity, it will
cost about 10 percent more. Be sure to check the machine specifications or the
existing chips to determine if parity is required. Parity and nonparity chips
cannot be mixed; however, some computers allow parity to be turned on or off
in the BIOS (basic input/output system) setup.
Cache
Cache memory can be found as either L1 or L2. The L1 cache is built into the
processor and cannot be changed. The L2 cache, on the other hand, can be
built into the processor, built onto the motherboard, or sometimes both. In
most cases, cache memory is fixed, but some machines allow the L2 cache to
be upgraded or expanded. Cache memory is sometimes found on older
motherboards (as DIPs, or dual inline packages). Check the motherboard
documentation to determine what, if any, upgrades can be made to the cache.
IMPORTANT
Take special care when installing DIP chips. They are sensitive to
ESD, can easily be installed backwards (look for pin 1 alignment),
and the pins can be broken or bent during insertion.
Installing RAM
Installing RAM is a simple process. The only problem is that the slots are not
always easily accessible. Sometimes you will need to relocate wires
temporarily or even remove expansion cards. This simple procedure usually
works:
7. When the SIMM is in an upright position, be sure that the metal retaining
clip snaps into position. This clip holds the SIMM in place and must be
opened before any SIMM can be removed.
8. Replace any temporarily removed or relocated wires or expansion cards.
Check others to make sure they have not been loosened or disconnected.
9. Replace the cover of the computer.
10. Reconnect the power, monitor, and any other needed external devices,
and start the computer.
The computer should recognize the new memory and either make the
correction or automatically go to the CMOS Setup program. In many cases,
you need only exit Setup to save the changes.
CPU Upgrades
Installing a new CPU is becoming less common as prices of new
motherboard/CPU combinations, and even new machines, continue to drop. In
many cases, installing additional memory is a more effective upgrade than
installing a new CPU. Still, as a technician, you need to know how to update
the CPU in an existing machine.
In many cases, upgrading a CPU is as simple as removing the old one and
inserting the new one. First, you need to determine whether the CPU can be
upgraded and, if so, which CPU upgrade is appropriate. The answer to this
question lies in the motherboard, which must have the appropriate socket,
data bus, address bus, and crystal to support the new CPU. Consult the
documentation that comes with the motherboard—this documentation usually
contains a table that defines which CPUs are compatible. If you are unable to
find the documentation, or if the processor that you want to install is not listed
(because it's of newer vintage than the documentation), consult the
motherboard manufacturer by accessing the company's Web site or calling the
company's technical support department. Be sure to check on any required
jumper settings and BIOS upgrades at the same time.
A small upgrade, going from one level of the same CPU family to another, is
usually no problem. However, if you want to upgrade a 386 to a Pentium, or a
Pentium to a Pentium III, a new motherboard is the only answer. The same is
true if the CPUs are from different chip manufacturers. Refer to Lesson 2,
"Replacing and Upgrading a CPU," in Chapter 4, "The Central Processing Unit,"
for possible scenarios.
Perhaps the most difficult part of upgrading a CPU is determining the limits
imposed by the motherboard. However, after that decision is made and you
have the new processor in hand, the actual installation is quite easy. Follow
this general procedure to install a CPU:
Some CPU upgrades also require the installation of a new voltage regulator
and cooling fan. Be sure to check the motherboard and CPU documentation for
this possibility. Failure to install these parts with the new CPU might destroy
it.
NOTE
If you are working with a motherboard that has the ability to hold
more than one CPU, both CPUs must be of the same type and from
the same manufacturer if more than one is actually installed. In
addition, on Pentium II and later systems, most such
motherboards have a special card that must be inserted in any
empty CPU slot, and the appropriate slot must be used for a single
CPU configuration.
Expansion Cards
Installing an expansion card is one of the most common system upgrades.
Adding faster video cards, adding more ports, or improving sound quality are
common reasons for plugging in a new card (see Figure 20.5). Before installing
(or purchasing) an expansion card, it is a good idea to make sure it will work
in the system to be upgraded, and that appropriate drivers are available for
the operating system to be used.
Is adding a new card the most cost-effective way to make this upgrade,
given the type of device and performance or capacity desired? In some
cases a USB (universal serial bus) peripheral can offer the same features
without requiring the case to be opened.
Are there any expansion slots available? If no slots of the type required
are available, you will have to make some room. To do that, you will need
to do one of three things: replace separate, single-port cards with one
multifunction card that provides all port connections; use a SCSI (Small
Computer System Interface) card and a chain of SCSI devices, if
available; or use USB, if available.
Will the card fit in the type of slot available? Does it match the bus type
of the motherboard?
Are there any available I/Os (input/outputs) and IRQs in the system? If
so, write them down.
Is there enough memory (RAM and hard disk) available to run the device
and its software?
Does the card require a DMA (direct memory access) channel? If so, is
one available?
What are the potential conflicts with other cards and devices?
Will the operating system support this card? If so, are all the necessary
drivers included with the operating system or do they come with the card
(or do you need to download the most recent driver from the
manufacturer's Web site)?
After you have determined that the expansion card will work, the installation
is a simple three-step process:
1. Set any jumpers or switches for IRQ and I/O addresses. (If you are
installing the card on a "Plug and Play" PC, the operating system can
usually determine a proper IRQ and I/O address without your
intervention, although there may be times you will need to adjust this
choice because of a conflict with an installed device.)
2. Install the card and cables.
3. Install any software for the card.
Step 1 (IRQ and I/O setup) is perhaps the most confusing and frustrating part.
This is especially true if the computer has not been properly documented.
IMPORTANT
Installing a card that is not Plug and Play capable is a bit more complicated
than installing one that is:
1. Read the documentation that comes with the card and note any special
requirements or limitations before you start the installation.
2. Check the computer documentation (run MSD or other diagnostic
program) and determine which IRQs and I/O addresses are available. In
Windows, the best way to identify settings is usually the Device Manager.
3. Configure any jumpers or switches on the card (see Figures 20.6 and
20.7). Note that some cards might require changes to prevent conflicts
and allow all devices to work.
The latest technology available for installing expansion cards is called Plug and
Play. This is an independent set of specifications, developed by a group of
hardware and software companies, that allow the user to make configuration
changes with minimal adjustment. Simply install the card, turn on the
computer, and use the device.
For Plug and Play to work, the device must be able to identify itself and its
system requirements to the system. The operating system then sets the device
and makes any other adjustments, such as reconfiguring other devices, as
required. For a Plug and Play device to work immediately, you must be sure
that the computer hardware—motherboard, BIOS, and other components—the
operating system, and the device are Plug and Play–compliant.
NOTE
In many systems you must enable Plug and Play features in the
system CMOS. Failure to have the right settings makes installing a
Plug and Play card a difficult task.
Drives
Installing a new drive is not difficult. However, you must answer a few
questions before purchasing a new drive:
Will the drive physically fit inside the computer? Some desktop cases
have only enough space for one hard disk drive, or the available space
might be occupied by another device (a CD-ROM drive or floppy disk
drive). If there is not enough space, you will have to consider alternatives
such as external SCSI drives, USB drives, and parallel port interface
drives.
Will the computer's BIOS and operating system support the size (storage
capacity) of the drive?
Will the drive controller support the new drive? A second or updated
controller might be required.
Are there sufficient cables (data and power) to install the drive?
1. Collect all the necessary documentation for the drive and the computer.
2. Back up any data you wish to use again.
3. Turn off the computer and unplug the power cord.
4. Follow the appropriate ESD safety procedures.
5. Open the case of the computer.
6. Set the jumper for the drive. Consult the documentation that came with
the drive. It must be set to single use or master or slave. If this is a
second drive, both drives might require jumper settings.
7. Connect the cable to the drives. The end connector should be plugged into
the master drive. Be sure the cable orientation is correct (pin 1 goes to
the red wire).
8. Connect the power cable (see Figure 20.9).
NOTE
1. Boot the computer from the bootable floppy disk and run Fdisk to set the
partition (or partitions).
2. Format the drive. If it is the only drive or the bootable drive, it must be
formatted with the system files.
3. Replace the cover of the computer.
Before deciding to undertake this major overhaul, there are several questions
you should answer:
Will the motherboard fit into the existing case? Check the size and
alignment of mounting holes (plastic standoffs that keep the circuitry
from contacting the case).
Does the motherboard have the same built-in COM and LPT ports?
Does the motherboard have a built-in video card?
Will the existing expansion cards fit the motherboard's expansion bus
slots? Are there enough slots available to accommodate the existing
cards? The expansion slots should go toward the back of the computer,
where the openings are located.
Is the power connector located on the same side as the power supply? It
should be as close to the power supply as possible.
Will the existing drives (CD-ROM, IDE, or SCSI) work with the controllers
on the motherboard?
Will the memory on the old motherboard work with the new
motherboard?
Will the upgrade meet your current and future requirements?
Replacing a Motherboard
1. Complete an installation checklist and make sure all the necessary parts
are available and will fit into the computer. It's also a good idea to back
up all data on the system hard drives and update any rescue disks.
2. Follow the steps for disassembling a computer set out in Lesson 1; these
include removing all the screws and standoffs (taking care to keep them
in a safe place) and the old motherboard.
3. Check all the settings on the new motherboard.
4. Install the new motherboard. Position the standoffs and make sure they
align with the case and the motherboard. Verify that the motherboard is
positioned correctly (expansion slots facing the back of the computer).
Carefully tighten the screws. Visually check to be sure that the
motherboard does not touch the case (see Figure 20.12).
Figure 20.12 Motherboard in case
5. Reconnect the case switches. Use the notes taken during disassembly to
verify they are in the right place.
6. Follow the steps for computer reassembly set out in Lesson 1.
7. Test the computer to be sure it boots up.
8. Complete the final testing and close the case.
Lesson Summary
The following points summarize the main elements of this lesson:
Upgrading a Computer
Memory upgrades are probably the simplest and most common upgrades
performed by a computer technician.
Installing a new CPU is a common way to upgrade older computers.
Installing a new expansion card is another common upgrade.
Before installing (or purchasing) new parts, make sure the parts will work
with the system you intend to upgrade.
Installing a new hard drive is not difficult. However, certain procedures
need to be followed.
Installing a new motherboard is one way to completely overhaul a
computer.
3 4
Review
2. You are only going to check the memory chips. Do you need to follow ESD
safety practices?
3. What is parity?
5. Your client wants to install an internal modem. How would you determine
whether this internal modem could be installed on your client's machine?
6. A friend just got a bargain on a new Plug and Play sound card and wants
to install it on a non-Plug and Play computer. Will it work?
Answers
3 4
Chapter 21
Troubleshooting Techniques and Client Relations
About This Chapter
Although Plug and Play hardware and more mature PC operating systems have
taken much of the work out of troubleshooting computers and programs, there
are still times when hardware and software don't work correctly.
Troubleshooting is as much an art as a science, and we often have to deal with
an unhappy or frantic client on a call—one who is worried about his or her
data, loss of productivity, and the size of the bill. This chapter covers the care
of both the technology and the user by a technician on the job.
NOTE
Understanding the following five phases of troubleshooting will help you focus
on the cause of the problem and lead you to a permanent fix.
The first phase is the most critical and, often, the most ignored. Without a
complete understanding of the entire problem, you can spend a great deal of
time working on the symptoms instead of the cause. The only tools required
for this phase are a pad of paper, a pen (or pencil), and good listening skills.
Listening to the client or coworker (the computer user) is your best source of
information. Don't assume that just because you are the expert, the operator
doesn't know what caused the problem. Remember, you might know how the
computer works and be able to find the technical cause of the failure, but the
user was there before and after the problem started and he or she is likely to
recall the events that led up to the failure.
Ask a few specific questions to help identify the problem and list the events
that led up to the failure. You might want to create a form that contains the
following standard questions (and other questions specific to the situation) for
taking notes:
At this point, it's often a good idea to examine the computer and verify the
client's statements as much as possible. In frustration, people sometimes
overlook the obvious or forget important details. On more than one occasion
the problem of a "dead computer" has turned out to be a power switch on a
surge protector or monitor not turned on. When you examine the computer,
reassure the user that you will work to resolve the problem, but don't promise
any miracles you can't deliver. If the solution is both obvious and simple, don't
make the person feel like they wasted your time. Use it as an opportunity to
perform some minor—but useful—periodic maintenance task.
The next step involves the process of isolating the problem. There is no
particular correct approach to follow, and there is no substitute for experience.
The best method is to eliminate any obvious problems and work from the
simplest problems to the more complex. The purpose is to narrow your search
down to one or two general categories. The following table provides 14
possible categories you can use to narrow your search.
Category Problem Symptom
Electric utility Dead computer
Fuse box Intermittent errors on
Electrical Wiring power-on self test (POST)
power Plugs and cords Intermittent lock ups
Power supply Device not working or not
Power connectors found
Device not working
External cables
Device not found
Internal cables
Intermittent errors on a
Properly seated cards
device
(chip and boards)
Connectivity Device failure or failure to
SCSI (Small Computer
boot
System Interface) chain Front
Check if improperly
panel wires (lights and
connected or real failure
buttons)
or warning
Boot ROM (read-only
Dead computer
memory)
If not, may not be
All products on the hardware
supported with proper
abstraction layer (HAL) list
drivers
(Windows 2000 and Microsoft
Boot Consistent errors on POST
Windows NT)
Beep errors
CMOS (complementary metal-
CMOS text errors, hard
oxide semi-conductor; chip
disk drive, floppy disk
and settings) CMOS battery
drive, and video errors
Flash ROM
DRAM (dynamic RAM); proper
Dead computer
type and setup
Parity errors
DRAM CMOS settings SRAM
General Protection Fault
Memory (static RAM); proper type and
(GPF) with consistent
setup
addresses
SRAM CMOS settings
HIMEM.SYS errors
Motherboard jumpers
Hard disk drives, floppy disk
drives, CD-ROM drives Zip Error messages:
drives, tape drives Missing Operating System
Partitions File Not Found
Mass storage File structure No Boot Device
File allocation tables (FATs)
Directory structure Abort, Retry, Fail
Filenames and attributes
IRQ (interrupt request)
settings I/O address
Direct memory access (DMA) System locks up
Input/output settings Device not responding
(I/O) Serial port settings Bizarre behavior from a
Parallel port settings device
SCSI settings
Card jumper settings
BUFFERS
Error messages:
FILES
Missing Operating System
File Control Blocks (FCBs)
Bad Or Missing Command
Stacks
Operating Interpreter
IO.SYS/MSDOS.SYS
system Insert Disk With
Set statements
COMMAND.COM
Paths and prompts
Stack Overflow
External MS-DOS commands
Insufficient File Handles
Multiboot CONFIG.SYS
Proper installation Application doesn't work
Proper configuration properly
Knowledge of capabilities Application-specific errors
Applications
Knowledge of bugs, Application-specific GPFs
incompatibilities, work- Lock ups only in specific
arounds application
All devices in the Windows
Registry, .ini files, Device lock ups on access
CONFIG.SYS, SYSTEM.INI, Intermittent lock ups
Device drivers
called in AUTOEXEC.BAT Computer runs in safe
Proper versions mode only
Proper configuration
Not Enough Memory error
HIMEM.SYS settings Missing extended memory
EMM386.EXE settings specification(XMS) and
MSDOS.SYS options (Win9x) Expanded Memory
Memory SYSTEM.INI/WIN.INI Specification (EMS)
management Virtual memory Device lock ups
Windows resource usage GPFs at KRNL386.EXE
UMB (upper memory block) GPFs at USER.EXE or
management GDI.EXE
Programs refuse to do
something they should
Configuration/ Files used for initialization
Missing options in
setup Basic layout of initialized files
program
Missing program or device
Computer runs slow
Failure to boot or
Virus-management
intermittent lock ups
procedures
Viruses Storage problems
Knowledge of virus symptoms
Operating-system
Virus-removal procedures
problems
Mysterious symptoms
Lack of training or
"I didn't touch it!"
Operator understanding
"It always does that!"
interface Fear of the computer
Multiple users
Poor attitude
User forgets password
Expired password
Logon errors
Network Cable or NIC network
Communication errors
interface card (NIC)
problems
Intermittent problems are the most difficult ones to isolate. They never seem
to occur when you are present. The only way to resolve them is to re-create
the set of circumstances that causes the failure. Sometimes, moving step by
step to eliminate the possible causes is all you can do. This takes time and
patience. The user will have to keep a detailed record of what is being done
before and when the failure occurs. In such cases, tell the user not to do
anything with the computer when the problem recurs, except to call you. That
way, the "evidence" will not be disturbed.
TIP
For a totally random, intermittent problem, always suspect the
power supply.
Make a Plan
Repair or Replace
After locating the problem, either repair or replace the defect. If the problem is
software-oriented, be sure to record the "before" and "after" changes.
Make sure that the problem no longer exists. Ask the user to test the
solution and confirm client satisfaction.
Make sure that the fix did not create other problems. You have not done a
professional job if the repair has been completed at the expense of
something else.
Finally, document the problem and the repair. There is no substitute for
experience in troubleshooting. Every new problem presents you with an
opportunity to expand that experience. Keeping a copy of the repair procedure
in your technical library will come in handy later when the problem (or one
like it) occurs again. This is one way to build, maintain, and share experience.
The record can also help if there are later questions about the service
performed from a client or insurance company.
Lesson Summary
The following point summarizes the main elements of this lesson:
Gather Information
Start with the user's complaint. Determine if the system has ever worked and
if the problem is random or reproducible. Find out as much about the system
configuration and the operating system in use as possible. Locate any backups,
emergency repair disk (ERD), or other external diagnostic or recovery tools.
Find out if the user was presented with any error messages and exactly what
was going on when the system failed. If there appears to be a hardware
problem, that must be resolved before any work on the operating system
proceeds.
Attempt to start the system. If that works, try to generate the fault yourself. If
the system does not boot into normal operation, attempt to boot into safe
mode. Identify any obvious problems. If the system boots, determine if you
need to move or back up data files for the user before proceeding with repairs.
The only difference in this step between an operating system problem and a
hardware problem is the kinds of tools that you will use. Instead of
screwdrivers, you will use a variety of software tools provided with the system
for much of your diagnosis and repair. A good habit to develop is linking
elements of the action plan to specific tools and procedures.
With the plan in place, the next step is implementation. If you resolve the
problem, work with the system until you are sure that there's not an
underlying problem that caused the problem you just worked on. The last
thing you want is to return on another call right away.
If the problem was due to lack of regular maintenance, operator error, or some
other easily identifiable cause, take steps to eliminate the potential for further
harm to the system.
Both during the operation and at its conclusion, be sure to document your
findings, the steps you take, the results, and any requirements for follow-up
action. If there are things the user should do, be sure to write them down and
present the person with a copy.
Performing a Differential Diagnosis
To identify a problem and pinpoint a resolution, it's often useful to employ a
technique known as differential diagnosis. Although this may sound technical
and complicated, in reality it is a fancy phrase for examining the behavior of
the system, matching that behavior with possible problems, and filtering out
the most likely culprit. It is the same technique that physicians employ when
attempting to diagnose illness in a human patient. For example, if a person
complains of a runny nose and a fever, and it is flu season, then flu is the
most likely suspect. The doctor can rule out unrelated problems, but based on
the patient's history, the doctor may also need to investigate similar ailments,
like an upper respiratory infection.
The same thing holds true for work with computers. If someone complains of a
computer that freezes every time a certain application is launched, then that
application is a likely starting point for investigation. At the same time, the
real problem might lie in a new video driver or a corrupted data file in use by
the program. Listening carefully, using a stepby-step procedure to eliminate
other potential causes, and experience (not to mention good documentation),
in many ways, are your most valuable tools.
Experience can often be a guide to the problem. If you have a good hunch,
check it out as part of the early examination. If it does not pan out, go through
the plan in a step-wise fashion.
In some cases, you will find the operating system has been seriously
corrupted, or the hard drive has crashed and must be replaced. In such cases,
you will have to institute a disaster recovery plan. It is often possible to
rebuild the operating system and recover data, but not always. Hopefully,
there will be backups of critical data and system files.
Many times the failure to properly load the operating system is actually a
hardware problem or difficulty related to new drivers or software. The first
step in resolving a problem like this is to identify any changes that have been
made to the operating system or the components contained within the
computer. You should also ask for copies of the system configuration,
emergency startup or recovery disks, and backups of core system files.
While gathering this information, it's a good idea to ask questions that can
help identify other causes that might be at work. Even if there is a most
obvious cause, it may not be the culprit in this case. Assess the computer skill
level of the user. Is it possible that a novice shut down the system improperly
or erased critical files? If the system is connected to the Internet or LAN (local
area network), or the user has just loaded files from another system, a virus
may be at work.
Both Windows 2000 and Windows 98 offer some tools to gain access to the
system even when the full-fledged operating environment cannot be loaded.
These may not work in all cases, but they usually work if it is only a software
issue or if the hardware problem can be resolved without having to reformat
the hard disk or replace it. We deal with the actual techniques and tools
shortly.
Operational Issues
Shutdown Issues
Computers that unexpectedly hang during normal operation, shift into restart
mode without warning, or refuse to close when a proper shutdown command
has been given are often some of the most difficult to diagnose and repair.
This type of problem can stem from faulty device drivers, runaway system
processes or applications, memory management problems, or hardware
problems.
Working Through the Phases
Before actually attempting to boot a system that is exhibiting operating system
problems, you should make sure that the computer meets the system
requirements for running the operating system involved and that the
components are all compatible. This information is available on the Microsoft
Web site. While you are checking, you should also obtain the latest drivers for
major system components (like the display adapter and any hard disk
controllers) if you do not have them with you.
TIP
If the user reports an error message you can get details on likely
causes and resolutions from the Knowledge Base on the Microsoft
Web site. This information is also contained in several reference
materials and is available by subscription on CD-ROM from
Microsoft.
You should also make sure that the system is receiving adequate, clean power.
If there are no obvious hardware problems, you may wish to enable the BIOS
(basic input/output system) virus checker or use a third-party program to see
if a virus is infecting the system and inhibiting its ability to load the operating
system. If the system manages to boot properly, you can proceed to the
operating phase.
During startup you should observe all messages on the screen and make sure
that the POST executes properly. Problems during this phase are directly
related to hardware in virtually all cases. If new hardware has just been
added, try removing it and then restarting the system. If that removal does
not fix the problem or there have been no recent additions, you can use an
alternate way to start the operating system—safe mode.
Both Windows 98 and Windows 2000 offer a safe mode, which loads the
operating system with only a minimal set of drivers and a simple 16-color VGA
display. To enter this mode press F8 just after the POST concludes. A menu
appears, offering several alternate methods of booting the system. This mode
is automatically invoked on startup in some versions of Windows if the system
was shut down improperly.
If core system files have been corrupted, it may be impossible to gain access to
the system even in safe mode. If the hard disk is still functional, you may
attempt to start the system in command mode. This is another option on the
alternate start menu accessed by pressing F8. If possible, you should try to
work within safe mode, rather than using the command mode alone. Safe
mode offers access to a wider variety of tools to help isolate and repair
problems. Many of the regular Windows system management tools are
available in safe mode, whereas in command mode most of the diagnostic and
recovery tools are variations on the old MS-DOS utility programs. The
Recovery Console, a command mode program available for Windows 2000, is
examined later in this lesson.
NOTE
Operating
Tool Remarks
System
This is one of the most useful diagnostic
tools available under Windows. It can
quickly display virtually every aspect of a
system's settings and resources. The exact
Microsoft
features available vary with the operating
System
Both system involved. Anyone working as a
Information
technician on any Windows system should
(MSI)
become familiar with this tool. In Windows
2000 the MSI is a Microsoft Management
Console (MMC) snap-in. It is covered in
detail in the next section.
An MMC snap-in that provides easy access
to a variety of maintenance and
Computer Windows
management tools including the MSI tool
Management 2000
mentioned above and Device Manager
introduced next.
Available by selecting System in the
Control Panel, this tool provides some of
Device the same functionality found in the MSI
Both
Manager tool, but it does not offer a complete and
collected set of reports, or a number of
other troubleshooting tools.
Often incorporated into the help structure,
System these tools provide interactive
Configuration troubleshooting support. By answering
Utility and Both
System questions, the user is presented with
Troubleshooter various possible resolutions to common
problems.
This utility is available through
administrative tools. It shows what
System
Windows services are running on the machine, their
Services
2000 current status, and how they are started.
Window
It can be used to stop services for
troubleshooting.
This is a program that installs a minimal
Windows 98 environment that, unlike safe
mode, provides full access to 32-bit
Microsoft application programming interfaces (APIs)
System Windows 98 and device drivers, and works with
Recovery Microsoft backup to recover files. It is
located on the Windows 98 distribution
disk in the \Tools\Sysrec directory, with
the filename PCRESTOR.BAT.
The Windows 98 Close Program tool is
Windows
Task Manager accessed the same way and offers a very
2000
limited subset of Task Manager's features.
These are scheduling tools that can be
Windows
used to automatically run tools such as
Maintenance
Both Backup, ScanDisk, and DiskDefragmenter
Wizard/Task
at regular intervals. There are operating
Scheduler
system-specific variations.
This system utility can be routed to track
system events when application faults
occur. It creates a log with a .wig
Dr. Watson Both extension in the \Windows\Drwatson
directory. The log includes an indication of
the application that caused the error and
the related memory addresses.
As discussed in Chapter 16, "Operating
System Fundamentals," all current
versions of Windows can produce a
complex log detailing every aspect of
Boot log Both system startup. The contents of this log
can be examined in a text editor. They are
invaluable in trying to track down random
system startup problems.
Both (not This program exists in various editions in
Microsoft automatically both Windows 98 and Windows 2000, and
Backup installed in can be used to both back upand restore
Windows 98) the entire system or selected files.
Both Windows and DOS-based versions of
the Registry Checker are available for
Registry
Both performing a wide variety of Registry-
Checker
related tasks including editing, backing up,
and restoring this vital system component.
There are two versions of the registry
editor. Windows 98 includes REGEDIT, and
Windows 2000 includes both REGEDIT and
Registry Editor Both
REGEDT32. Ideally, the latter should be
run under Windows 2000 for full-featured
editing capability.
The MMC is a single-point interface for
operating a variety of system maintenance
Windows
MMC and troubleshooting tools. Over time,
2000
Microsoft intends to make the MMC the
standard interface for all such applications.
The Windows Update tool offers an online
method of quickly identifying and applying
updates to various Windows components
Windows
Both and related applications such as Microsoft
Update
Internet Explorer. It works in conjunction
with special Web pages at the Microsoft
Web site.
The Recovery Console is a special text-
mode operating environment separate
from the one you're familiar with for DOS
operations. In spite of the simple
interface, it offers a sophisticated tool to
Recovery Windows start and stop services, repair the
Console 2000 operating system, and fix damaged drive
volumes. It allows access to FAT16,
FAT32, and NTFS (Windows NT file
system) volumes. It is covered in detail
later in this chapter.
NOTE
Many of the tools listed here are available in both operating
systems, but that does not mean they are the same. Keep in mind
that Windows 2000 and Windows 98 have radically different
system architectures. Although they share many common design
elements, and many of these utilities both look and work alike, it
is important to become familiar with both operating systems and
their idiosyncrasies.
Using the Windows Troubleshooting Tools
The Computer Management component of the MMC is a very useful tool for
monitoring system events, managing system services, accessing MSI,
accessing the Device Manager, and monitoring remote systems. Keep in mind
that for full access to all of Computer Management's features, you will need
administrator privileges.
Figure 21.1 The Tools menu in the Windows 2000 Computer Management tool
Those following the lesson at a computer will benefit from examining some of
the different tools before continuing. Unless you are very familiar with the
Registry and computer settings, you should not make any actual modifications
at this point.
If you are having trouble starting a system and can enter safe mode, this
should be one of your first stops. Figure 21.3 shows the System Configuration
utility open in front of the System Information Manager and the dialog box for
the General tab's Advanced Controls option. A series of radio buttons and
check marks help you quickly decide which options and settings will be
activated during startup and which will be disabled.
Figure 21.3 The System Configuration utility in Windows 98
You can use the System Configuration utility from the Startup menu (press F8
just after POST completes) by selecting the Step By Step Confirmation option
to debug problems with Windows startup. You can narrow the problem area by
disabling certain options (for example, all options in WIN.INI) during startup
using System Configuration. Once you have narrowed the field, enable the
offending section and choose a step-by-step confirmation mode. In most cases,
the system hangs just after you select the offending driver or device. You can
then disable it and resolve the issue in normal startup mode.
NOTE
All current versions of Windows offer some version of the Device Manager. In
Windows 98, this utility is available as a tab on the System utility found in
Control Panel. Windows 2000 places a button in the Hardware tab and makes
it available directly through the Computer Management MMC snap-in. If you
suspect a hardware device is not loading properly or has stopped functioning, a
quick check of the Device Manager will quickly show if this is the case.
Windows 2000 offers Task Manager, a utility that is not available in Windows
9x. You can access this utility by pressing Ctrl+Alt+Del while the system is
running. It offers three tabs: Applications, Processes, and Performance. Task
Manager lets you quickly see which applications and processes are running and
how the system is using CPU (central processing unit) and memory resources.
Extremely high CPU usage is an indication that something is not running right
or that the system is running low on resources and needs to be reconfigured.
If you suspect an application is causing a problem, close it and observe the
relative change in system resources. Task Manager is shown in Figure 21.5
with the Processes tab selected and in 21.6 with the Performance tab selected.
Figure 21.5 The Windows 2000 Task Manager with the Processes tab selected
Figure 21.6 The Windows 2000 Task Manager with the Performance tab
selected
You can also use Task Manager to shut down a runaway application or process
that refuses to close normally. In Windows 9x there is a less functional Close
Program utility that merely lets you end a specific task or shut down the
computer.
Resource Loss and System Monitoring
The Task Manager Performance tab provides a way to quickly see how busy the
system is in real time. You can leave it running on top of other applications to
track just how starting and stopping a program or service taxes the system.
Windows 2000 offers a very sophisticated performance meter in the Control
Panel. Using this sophisticated tool takes some study, but is worth the effort if
you work on Windows 2000 systems often and especially if you work on the
server versions of the product.
The Windows 98 System and Resource Monitor
Windows 98 also offers performance metering similar to that offered by Task
Manager in two separate utilities, System Monitor and Resource Meter. System
Monitor provides real-time reports about how various system processes are
performing. It displays various functions in a line, bar, or a numeric graph. To
run System Monitor, from the Start menu, select Programs, Accessories,
System Tools, and System Monitor. By default, the System Monitor shows only
the Kernel Process Usage setting (the percentage of time the processor is
busy). You can control the items you monitor by selecting Add Items from the
System Monitor Edit menu or by clicking the Add Items button in the toolbar.
Two useful items are the kernel (which tracks CPU usage) and the Memory
Manager (which tracks allocated memory, cache size, and swap file size),
shown in Figure 21.7.
Both tools can help you determine whether it's time to upgrade a computer.
For example, start the computer and open all the files and applications that
are normally used at the same time. Turn on System Monitor and run the
system for a while. If the processor is constantly running at more than 75
percent, it might be time to upgrade. Also, if the total allocated memory (RAM,
swap file, and cache) exceeds the amount of RAM in the system, it might be
time to get more RAM.
Resource Meter
The Resource Meter is used to monitor (in real time) the use of system
resources. When activated, it adds a small bar graph to the system tray
indicating the percentage of free resources based on the computer's total
resources. As the bar gets smaller (fewer resources available), it changes color
to indicate a potential problem. If the color changes to yellow, this means that
resources have dropped to 30 percent. If the color changes to red, the
resources have dropped to 15 percent. If the resources drop to 10 percent,
Windows warns you that the computer is in imminent danger of hanging
(unable to respond to user input), so you must close some applications to
avoid losing data.
For more details, hold the mouse over the Resource Meter icon for a second or
two. This activates a banner showing the individual resource percentages. You
can also double-click the icon to display the Resource Meter dialog box, shown
in Figure 21.8.
System monitoring tools are valuable applications for both troubleshooting and
evaluating the need for a system upgrade. You might use these tools if a
customer complains of getting out-of-memory errors or if the computer's disk
drives seem to run all the time. By monitoring memory use, you can
determine how much memory is required to run all the applications and which
applications are consuming the most memory. From that information, you
should be able to determine the best course of action. If a client is trying to
decide whether or not to upgrade a processor, you can also monitor the CPU
kernel to determine just how busy it is. If it is working more than 80 percent
of the time, a new processor might be warranted.
Registry Recovery
Registry recovery is a necessary skill for any technician working regularly in
the Windows environment. As with hard disk failure, Registry corruption is a
fact of life. The steps that must be taken to restore a corrupted or damaged
Registry vary based on whether the computer is using Windows 98 or Windows
2000.
If the fault creates a situation where there's not enough memory to properly
run the Registry Checker, you are prompted to reboot the system and run the
program yourself. To do so you must start it at a DOS prompt with the /fix
option. Reboot the system and press F8 as soon as the POST is completed.
Choose the Start With Command Prompt Only mode option, and type scanreg
/fix when the DOS prompt appears.
Select the last known good backup of the Registry. If you recently installed
new hardware, which may be causing the problem, you may wish to remove it
from the system before attempting the registry repair. Registry files are stored
with filenames of RHXXX.CAB, where the xs stand for a sequential number
that is attached to the filename. The system default for a maximum number of
Registry backups is five, although an administrator can change this using the
Scan Registry program.
The Windows 2000 Recovery Console
If you ever intend to use the Recovery Console, it is a good idea to install it
before problems occur. Remember it is not automatically installed during a
normal Windows 2000 setup. See Chapter 20, "Upgrading a Computer," for
information on how to install Recovery Console.
CAUTION
To perform the procedure, start the system and start the Recovery Console
rather than the regular operating system.
cd repair\regback
In the second string, the word filename should be replaced with the name of
the file you wish to restore from the backup. The word drive should be
replaced with the letter of the drive on which the file exists, and systemroot
should be replaced with the directory in which your Windows 2000 operating
system is installed.
To completely restore the Registry you must copy the following files from the
backup directory: Default, SAM (Security Account Management), Security,
Software, and System. Once you've finished copying the files, make sure that
they were copied by examining the date and time stamps with a backup copy
you moved to a safe location before starting the process. If everything
matches up, exit the Recovery Console by typing exit and restart the system.
MS-DOS Application Incompatibilities
In spite of attempts to make Windows 9x and Windows 2000 backward
compatible, they can still experience problems running MS-DOS applications.
Most MS-DOS applications run better in newer versions of Windows than in
Windows 3.11 thanks to improved memory management, but very few users
pushed the envelope by running MS-DOS applications with earlier versions of
Windows. (Most users simply updated their applications and learned to use the
new software.) Often, MS-DOS applications refuse to run under Windows
because they cannot find a version of MS-DOS they recognize. Some older MS-
DOS applications make use of system resources in ways that are not
compatible with Windows 9x or Windows 2000 and will not run. They can also
hang the system if they are started in some rare cases.
One of the most common causes for MS-DOS and Windows application crashes
in Windows 95 and 98 is that many applications check the version number of
MS-DOS before running. If the software reads the wrong version number or a
version number in the wrong range, an error occurs and the program crashes.
To get around this, Windows 95 and 98 "lies" to applications and passes the
right version number.
device=c:\windows\setver.exe
Tricking an old Windows 3.x application is a two-step process. First, find the
module name for the application that is crashing. To find an application's
module name, start Windows Explorer and then right-click the application's
executable (.exe) file. Using QuickView, find the module name. For example,
the module name for Microsoft Word is winword.
NOTE
QuickView is not included in a typical Windows 95 and 98
installation. To load QuickView, open the Control Panel and
double-click the Add/Remove Programs icon. In the Add/Remove
Programs dialog box, click the Windows Setup tab, then select
Accessories. Click Details, check QuickView on the Components
list, click OK, then follow the on-screen prompts to install
QuickView.
Next, add a section to your Windows 95 and 98 WIN.INI file. Open WIN.INI
using a text editor and add the following lines:
[Compatibility]
compiled_module_name = 0x00200000
winword = 0x00200000
1. Open Windows Explorer and find the troublesome MS-DOS .exe file.
2. Right-click that file and select Properties.
3. Click the Program tab.
4. Click Advanced. The Advanced dialog box presents the following options:
Prevent MS-DOS-Based Programs From Detecting Windows.
This hides Windows in memory so MS-DOS programs can't detect it.
Suggest MS-DOS Mode As Necessary. This is an on-the-fly MS-
DOS-mode diagnostic. If Windows detects an application that's likely
to run better in MS-DOS, it starts a wizard so that you can customize
the application to run in MS-DOS.
MS-DOS Mode. If this option is selected, the application runs in MS-
DOS mode. Within this setting are three additional options:
Warn Before Entering MS-DOS. When entering MS-DOS
mode, you should close any open Windows applications and
files. This warns you to save files and close any applications
that are running.
Use Current MS-DOS Configuration. This uses all the current
system settings that have been passed along, including settings
in CONFIG.SYS, AUTOEXEC.BAT, IO.SYS, and the Registry.
Specify A New MS-DOS Configuration. This allows you to
modify CONFIG.SYS and AUTOEXEC.BAT for MS-DOS mode.
This Properties tab is the Windows 9x replacement for the .pif files used in
Windows 3.x. There are five other tabs for configuring the properties of this
MS-DOS application, as follows:
If the Print Troubleshooter doesn't solve the problem, you can try the
Enhanced Print Troubleshooter (EPTS) that ships with some versions of
Windows. This program is found on the distribution CD in the EPTS folder.
Copy it with its files from the CD to the hard disk drive. Then start the
program EPTS.EXE. This program operates in the same way as the standard
version, but is much more detailed.
The following are some further troubleshooting tips if the printer won't print:
If the printer takes a long time to print, try these troubleshooting tips:
Be sure the printer language and type is correctly identified for the job.
Verify that there is enough printer memory to carry out the job. It's not
always easy to tell how much printer memory you need—the printer may
just give you an out-of-memory error. It may be useful to either
eliminate graphics from the document or select a lower print resolution
(you can configure the printer from the application's Print dialog box).
This can both speed up printing and possibly eliminate errors due to
limited printer memory.
Print directly to the printer. Go to an MS-DOS prompt and send a text file
directly to the printer, thus bypassing any application.
Use raw spooling instead of Enhanced Metafile Spooling (EMF).
Print one job only at a time.
Make sure the printable region isn't larger than what is supported by the
printer.
If the File menu's Print command is dimmed, try this troubleshooting tip:
If you cannot print from an MS-DOS program, try the following tip:
How much time does it take you to check IRQs every time you install a new
card on the same computer? Do you spend too much time rebuilding
CONFIG.SYS and AUTOEXEC.BAT files when an end user accidentally erases
them? Spending a few minutes reviewing and updating your records each time
you install a new system or perform maintenance can save you hours in the
long run.
Keep a simple set of documents that contains essential information for each
computer you work on. Create a database, spreadsheet, or word processing file
to make updating easy. Be sure to back up the data and keep a hard copy on
file for quick reference. The following table provides some suggestions about
the information you might want to keep.
Suggestion Usage
The name you choose does not matter, but make it unique
Name each and descriptive. Establish naming conventions to make
computer. remembering them easier. Use names in addition to serial
numbers.
Include the operating system name and version,
Document CONFIG.SYS, AUTOEXEC.BAT, IRQs, I/O base address, DMA
all technical channels, device driver names, processor type and speed,
information. size of cache, RAM, BIOS, monitor, video card, modems,
and sound cards.
Save
startup data Include the startup disk (based on the current version of
to floppy the operating system, AUTOEXEC.BAT, and CONFIG.SYS),
disks device driver disks, and recovery disks—as required by
(unique antivirus programs or the system.
data).
In your log of events for each computer include such things
Keep an as the user, application installations (date and version),
incident log. upgrades (hardware), and problems (cause of failure and
actions taken for resolution).
Levels of Support
In an organization or corporate environment with a large number of computers
and peripheral devices, it is often wise to separate support functions into
several levels or categories. Depending on the size of the organization and the
degree of knowledge of the end users, some technical support can be
delegated or handled over the phone. By properly delegating responsibility for
technical support, you can avoid being tied up with trivial problems, saving
time for you and your end users.
How you apply this level of support depends on your situation. If, for example,
you are an independent consultant or working at a service desk for a computer
supplier, you most likely will be dealing with the owner or user and this won't
apply.
Handle as many problems as possible over the phone. Phone support offers the
quickest solution to many common problems. In addition, by getting as much
information about the problem as possible over the phone, you can be sure to
have the right tools on hand and an appropriate plan if and when you arrive
on the scene.
For those jobs that cannot be handled over the phone, you need to decide
whether to service the machine on-site or bring it back to your own
workspace. Consider these questions when making this decision:
TIP
If the work will take more than a few minutes, you might do better
to take the machine back to your own workspace.
Spare Parts
Having available a large supply of spare parts can definitely shorten the time
to complete a repair; however, having too many spare parts can be a problem
as well. Maintaining a large inventory is expensive, especially if you have 100
items that just became obsolete. You need to keep spare parts in stock and
you need to manage them. Consider the following tips when determining how
to manage your spare parts inventory:
In cases such as this, you can standardize what you have control over and
group the rest as best as you can. If you have several identical systems, by
using an identical configuration with standard CONFIG.SYS, AUTOEXEC.BAT,
and IRQ assignments, you can simplify the troubleshooting process. Even if
you have many computers with little in common, adopting certain standards
can be worthwhile. For example, establish common IRQs for standard
equipment such as modems, sound cards, network cards, and mouse and SCSI
devices.
Customer Service
The bottom line in computer repair is customer service. Whether you work for
a large organization or as an independent consultant, the end user is your
customer. This section discusses general guidelines for setting up and
managing customer service.
Support Calls
There are generally two methods for handling initial support calls to a
technical service department. The first method, and perhaps the most
common, is the help desk. Each call is routed through a central location or
phone. At this point, the call is evaluated, classified according to the nature
and urgency of the problem, and then routed to the appropriate member of the
support team for action.
In the second method, any member of the support team can respond to a call
and attempt to solve the problem. If that fails to resolve the issue, the
problem is passed on to a more knowledgeable team member for action.
It is at this stage that you have the opportunity to put your customer service
skills to use. The person who calls you will be sensitive not only to how you
resolve the technical problem, but how you treat that individual personally.
Chances are that if someone needs to call you, that person's day is already
going badly. Your demeanor and expertise can improve it or make it worse.
This is especially important if you are in business for yourself; it can mean the
difference between building your business with repeat calls and referrals—or
bankruptcy.
When you receive a call requesting technical support, going through the
following four simple steps should lead to a successful conclusion of the
encounter.
Take the time to create a form or a database for tracking calls that provides a
source of information for future use. Basing the form on keywords chosen to
describe the problem briefly allows easy creation of reports.
If you work independently, you should also keep a client profile log that
includes a few paragraphs describing each of your clients and their business.
Include notations of any relevant facts about clients that you can use in future
conversations with them. Also take note of any client plans for future
expansion or equipment upgrades that might require your help. It is best to
get in the habit of writing this down as soon as possible after your service call,
when the important details and observations are still fresh in your mind.
Referrals are the lifeline of any small business. If you feel that your client is
satisfied with your work, do not hesitate to ask for referrals and ask if you can
use the client's name as a reference. Keep a written record of referrals you
receive and contact the referred individual with a phone call or letter as
quickly as possible. Also, leave a few business cards with your clients and
encourage them to give the cards to anyone who might need your services.
Call your clients within a few days after you have serviced their equipment to
confirm that their problems have been resolved. They will appreciate it.
Technicians who work in a corporate setting find this procedure helpful as well.
Difficult Clients and Coworkers
You will inevitably encounter difficult clients or coworkers. Keep in mind that it
is your job to identify and try to resolve these problems, too, not just those
that are mechanically based. The following are a few suggestions for handling
difficult clients and coworkers:
Escalating Problems
Because new devices and software are introduced every day, it is not
uncommon to encounter problems that are outside the scope of the support
group or your current level of experience. In such cases, addressing the
problem requires gaining the assistance of the hardware or software supplier.
Whether you turn to a more experienced team member or an original
equipment manufacturer (OEM), be sure to track the progress of the problem
and who retains responsibility.
Of course, if you are an independent service person, you are responsible for
doing the research to find a solution to the problem. Keep a record of your
resources (phone numbers, individual and company names, Internet
addresses, documentation sources) for future reference.
If the problem is resolved by making previously undocumented changes (such
as a patch or upgrade by the OEM), be sure to pass along the information to
other team members. Also, be sure to keep good documentation of the
solution because you may need it for future reference.
Conclusion
After a service call is concluded (successful or not), there is one more action to
take: Document the closure. Make this report as detailed as possible. Include
what was done to resolve the problem—or what steps were taken to try to
resolve the problem—and the results of your efforts. If the problem was not
resolved, explain to the user why it could not be fixed and provide some
alternatives. This might include advising the user to return the computer to
the dealer from which it was purchased, if it is a relatively new unit. If you are
unable to resolve the problem, do not be afraid to pass it on to someone with
more experience or someone who specializes in that type of problem.
Lesson Summary
The following points summarize the main elements of this lesson:
Windows 2000 and Windows 98 are two different operating systems, but
they share many common troubleshooting tools.
Two very valuable tools are system information and the Device Manager.
To effectively troubleshoot the Windows environment you must
understand the boot process and the functions of the Registry.
The basic principles of troubleshooting apply to operating system
problems the same way as they do to hardware issues.
Maintaining a healthy Registry and keeping good backups of these critical
files is an important part of maintaining a secure Windows system.
Client Relations
1. What is the tool used to restore the Registry in Windows 9x? Is it the
same as the one used in Windows 2000?
4. Explain some possible uses for the Windows 2000 Task Manager in
troubleshooting, and name a corollary tool available in Windows 98.
6. What is the purpose of the ping command, and how do you use it?
8. What four stages should you go through when you receive a service call?
Answers
3 4
Chapter 22
The Basics of Electrical Energy
About This Chapter
Computers run on electrical energy. Without it, a computer might as well be a
paperweight. Because every component of a computer needs power to run
(whether plugged into a wall outlet or a battery), a computer professional
must understand the basic principles that govern electricity and electrical
energy. This chapter introduces you to these principles.
Before You Begin
There are no prerequisites for this chapter.
3 4
Lesson 1: Power
The energy or power to drive a computer is derived from electricity. Whether it
uses 110 volts alternating current (AC), the U.S. standard; 220 volts AC, the
European standard; or direct current (DC) from a battery, a computer is
useless without a steady, reliable source of power. When we encounter
problems with a computer, it is crucial to be able to test the entire power
system. This lesson covers the basics of power and electricity.
For our discussion, we talk mainly about the flow of energy used to run
computers—electrical energy—and do not worry about the fine points of
scientific philosophy.
Some Definitions
Ohm's Law
Ohm's law states that the current (electrons) flowing through a conductor, or
resistance, is linearly proportional to the applied potential difference (volts). A
conductor is any medium, usually metal, that allows the flow of electrical
current. Resistance is any device or medium that resists the flow of electrons.
In mathematical terms, this means:
Resistance: R = V/I
Current: I = V/R
Volts: V = IR
NOTE
AC Power
AC power is what most people think of as electricity. It comes from the wall
and powers most of our lights and household appliances.
AC power is man-made, using generators. As the wire coil inside the generator
rotates, it passes by each pole of unit magnet(s) producing an electric current.
When it passes the opposite pole, the current reverses, or alternates, the
direction of flow (see Figure 22.1). The number of revolutions made by the
generator per minute is called its frequency. In the United States, power
companies run their systems at 60 turns per second to produce a high-voltage,
60 Hz (cycles per second) AC as they rotate. The power system drops the
voltage in stages before it is connected to the consumer's home or business.
The power company delivers AC power to our homes or businesses with three
wires. Two of the wires are hot, meaning that they carry a charge. One, the
bare wire that runs from the breaker box to the power pole, is neutral. The
measured voltage between the two hot wires is between 220 and 240 volts AC
(VAC), and the measured voltage between either of the hot wires and the
neutral wire is between 110 and 120 VAC. These voltages, which are called
nominal voltages, can vary by plus or minus (±) 10 percent (see Figure 22.2).
Figure 22.2 AC volts
Typical electrical outlets are connected between one of the hot wires and the
neutral wire. These outlets are usually three-prong connections. The smaller
rectangular hole is the hot, the larger rectangular hole is the neutral, and the
small round hole is called the ground. The ground wire is used as a safety
wire. In the event of a short circuit, a large flow of current (amps) is
discharged all at one time. This short, strong flow of current will burn out
circuits unless it can be safely sent somewhere else. Electricity will always
seek the path of least resistance to ground. By providing this wire, a short
circuit will cause less damage by providing a path for safe dissipation of the
current. To provide a safe working environment for the computer and yourself,
make sure that the ground wire is properly installed.
Older structures might have two-wire electrical outlets without the ground
wire. An electrical outlet without grounded plugs and the third ground wire is
unacceptable for use with a computer (see Figure 22.3). An extension cord
without a ground wire is also unacceptable.
DC Power
The Multimeter
AC voltage
DC voltage
Continuity
Resistance
Testing AC Power
In any new building installation, failure to properly test AC outlets can result
in damaged or destroyed equipment, as well as possible injury and
electrocution. In the event a wiring error was made that causes the voltage to
be outside of the specifications (either two high or too low), problems are sure
to arise. Don't take for granted that the building power supply provides the
correct voltage or that all of the other inputs are wired correctly.
Is the hot wire sending the correct voltage, and is it wired to the correct
pin?
Is the neutral wire connected to ground and to the correct pin?
Is the ground wire connected to ground and to the correct pin?
The first step when testing an AC outlet is setting up the multimeter. Then you
need to know how to read the meter. You can also use special equipment if the
multimeter does not provide enough information.
1. Attach the black test lead to the negative (–) marked hole. In some low-
cost meters, leads are permanently attached to the meter.
2. Attach the red test lead to the volts (+) hole. Be careful—if this lead is
placed in the wrong hole (ohm or amp) it can cause permanent damage to
the meter.
3. Set the selector switch to AC volts (this choice is often denoted by red
lettering). If there are multiple selections, use the highest setting possible
(if voltage is unknown), or select one level higher than the estimated
voltage. For standard household outlets, 200 VAC is a good selection.
Some digital meters use "auto-range" and don't need any selection except
AC volts.
After the meter is set up, you are ready to test a wall outlet. There are three
tests to perform. With AC voltage, it does not matter which lead is placed in
which connector.
Hot to neutral. Place one lead in hot (smaller of the two vertical slots)
and the other in neutral (larger of the vertical slots). The reading should
be between 110 and 120 VAC.
Hot to ground. Place one lead in hot (smaller of the two vertical slots)
and the other in ground. The reading should be between 110 and 120
VAC.
Neutral to ground. Place one lead in neutral (larger of the two vertical
slots) and the other in ground. The reading should be 0 volts.
Using AC Testers
Testing AC Ripple
Testing Resistance
NOTE
Testing Continuity
Continuity is a term used to indicate whether or not a connection exists
between one point in a circuit and another. It is used to determine the
presence of breaks in wires and electrical circuits.
Testing DC Voltage
Testing for DC voltage is the same as testing for AC voltage, with one
important difference: DC voltage is sensitive to polarity. As mentioned earlier,
DC voltage has a positive pole (+) and a negative pole (–). When measuring
DC voltage, it is important to place the positive (red) lead on the positive side
and the negative (black) lead on the negative side of the circuit. If the leads
are positioned backward, the polarity of the reading will be the opposite of
what it should be.
CAUTION
NOTE
Find out if the client is having any problems with flickering lights
or intermittent problems with other appliances, or if he or she is
using a power strip with too many connections for the rated use.
Improper loading of the circuit, not the PC itself, can be the
problem.
A bad power supply can cause intermittent lockups and unexpected computer
reboots. Erratic problems encountered during booting and changed or erased
CMOS (complementary metal-oxide semiconductor) information can also be
traced to a failing power supply. Bad power supplies have been known to
destroy data on mass-storage devices (such as hard drives, tape drives, and so
on). There are two types of tests for power supplies: a basic test used to verify
voltages and an advanced test for checking its internal components.
The only purpose of this test is to verify the existence and value of voltages.
With time, most power supplies show their age by a reduction in voltage. This
voltage drop will show itself in both the 5-volt and the 12-volt outputs, but is
more pronounced on the 12-volt side.
1. Connect the black lead to the common (–) connector and the red lead to
the voltage (+) connector.
2. Turn the test selector to DC volts. If the meter has an AC/DC switch, be
sure it is set to DC. If the meter does "auto-range," set the range to 15–
20 volts.
The best place to check voltage is at the power supply's P8/P9 or ATX power
connectors (see Chapter 5, "Power Supplies"). For P8/P9 systems, use the
following instructions:
1. Place the meter's black (ground) lead on the black wire connection and its
red (positive) lead on the yellow (+12 volt) connection.
2. Record the voltages. A good power supply will provide a voltage between
11 and 13 volts DC.
3. Replace the power supply if the voltage reading is less than 10.
NOTE
If you have completed the basic voltage test and no voltage is present, the
problem may not be the power supply. It might, instead, be caused by an
excessive load on the system due to another piece of hardware. To determine
if that is the case, try the following procedure.
Advanced Testing
The basic test is designed to quickly isolate the power supply as a problem. In
most cases, if the test proves the power supply to be defective, it may be more
cost-effective to replace the power supply than to try to repair it. Advanced
testing requires a working knowledge of power supplies and removal of the
power supply and its cover.
There are three sections to a power supply: the switching network, the
transformer, and the voltage regulator (see Figure 22.6).
To smooth out the power sent to the electronic components, a PC has basic
line conditioning capability—a switching network. The better the power supply,
the more sophisticated the network. The main components found in a
switching network are a fuse, capacitors, rectifiers, and switching transistors.
The transformer reduces the voltage of the square wave DC into separate 12-
volt and 5-volt square wave AC circuits (see Figure 22.7).
Do not open the power supply while it is plugged in, and do not
open the power supply until it has been discharged. The power
supply can carry dangerous levels of power even when
disconnected. Only a properly trained technician should ever open
a PC power supply. Given the cost of a power supply, there is no
good reason to disassemble one; defective units should be
replaced.
Electronic Components
As a computer professional, you should be familiar with the more common
types of electronic components found in a computer design.
Fuse
Before the advent of the circuit breaker, fuses were common in the home and
office. A fuse serves one purpose—to fail, and thus cut the flow of power in the
event of a current load that has exceeded the safe capacity that the system
components can absorb. Fuses come in many shapes and sizes, but a PC fuse
is almost always a small, clear, glass tube with metal caps on each end and a
wire inside the tube to electrically connect the two caps (see Figure 22.9). In
general, the thicker the wire, the more current a fuse can conduct before
failing. When a fuse fails, the wire will melt or be broken. You can check for a
"blown" fuse by determining if the wire is intact or broken. The amperage (A)
rating (stamped on the metal cap) indicates the maximum current the wire is
rated to conduct. Be sure not to exceed to the rated limits of the PC design for
a fuse, because an excess power load can damage or destroy the system.
If a fuse in a specific location fails more than once or repeatedly, the system is
being overloaded, and you need to isolate the problem causing the failure.
Fuses are often found on power supplies and many external components. If a
fuse fails, first try to replace it with another fuse of the same rating. If the
replacement also fails, the fault probably lies with the motherboard or another
internal component.
Capacitors
A capacitor is an electrical component used to hold an electrical charge. In
photography, electronic flashes use capacitors to build up power before a
picture is taken and to vary the amount of power used in a flash to control the
exposure. In PCs, they are often used to regulate the flow of current to areas
of the system circuits for a short period of time. Some are fixed-capacity
models, whereas others can absorb or hold variable amounts of power. The
amount of electrical current a capacitor can control is called capacitance,
measured in microfarads (see Figure 22.10).
CAUTION
Before you test a capacitor you must discharge the power supply.
Failure to discharge can create a serious hazard to you and your
equipment.
Normally, a computer technician does not test at this level; however, diodes
can be tested with a multimeter. With the power turned off, test for resistance
across both leads of the diode. Then reverse the leads of the multimeter and
test again. A good diode will exhibit low resistance in one direction and high
resistance in the other.
Transistors
Transistors can be tested, although, this often requires special equipment. Due
to the reliability of transistors, a computer technician normally does not need
to perform this level of testing.
Transformers
Testing a Transformer
A good transformer will show a reading of low resistance. A very high reading
could indicate that one of the coils is broken.
Inductors (Coils)
Testing a Coil
Define ESD
Avoid ESD
The actual amount of energy in a given ESD event depends on the types of
materials involved (wool fabrics generate less than nylon), the humidity (low
humidity offers less resistance to the discharge), the amount of physical
energy (friction) involved, and how quickly the energy is released.
NOTE
ESD Damage
Over the years, engineers have produced smaller and smaller components,
which operate at lower and lower voltages. Their goal is to reduce size, cost,
and operational heat production. Those are worthy goals but, because of
reduced component size, they present a smaller target with less resistance to
power surges. This makes the parts more susceptible to damage from ESD.
The amount of damage and resulting problems caused by ESD can be divided
into three categories:
All repair shops and workbenches should have proper ESD suppression
devices, and technicians should use them whenever working with exposed
parts. These devices include:
CAUTION
In the United States, common AC wiring uses the color coding given in the
following table.
Connection Color
Live or hot Black
Neutral White
Ground Green or bare copper
CAUTION
Color codes for AC wires and DC wires can be different. For
example, the ground wires on the P8 and P9 connector for an AT-
style motherboard are black.
Lesson Summary
The following point summarizes the main elements of this lesson:
Power
Electrostatic Discharge
Answers
3 4
Appendix A: Questions and Answers
Chapter 1
2. What are the three roles that today's computer service professional needs
to assume?
8. Define a byte.
The central processing unit (CPU) is the heart and brain of the
computer. This one component or "chip" does all the number
crunching and data management.
The CPU and the chip set process information inside a computer.
8. What is I/O?
Many devices can handle both input and output functions. These
devices are called I/O devices.
The floppy disk drive, hard disk drive, modem, and network
interface card are examples of I/O devices.
Chapter 4
The external data bus is the primary bus for handling the flow of
data. All devices that process data are connected to the external
data bus.
Faster speeds
A 32-bit address bus and 32-bit registers
A 64-bit data path to improve the speed of data transfers
A dual pipeline, 32-bit data bus that allows the chip to
process two separate lines of code simultaneously
A write-back cache of at least 8 KB for data and an 8 KB write-
through cache
Branch prediction—the program cache attempts to anticipate
branching within the code
6. What is the difference between SX and DX in a 386 chip?
The 80386DX was a true 32-bit processor with a 32-bit external
data bus, 32-bit registers, and a 32-bit address bus (enabling 4 GB
of memory to be accessed). The 80386SX was similar to the DX
except that it had a 16-bit external data bus and a 24-bit address
bus (it could address only 16 MB of memory).
8. Define microprocessor.
14. If a customer brought you an old Pentium 60-based computer and asked
you to install a new processor, what would your advice be?
2. What are the two types of power supply connectors to the motherboard?
AT style with two plugs—P8 and P9, and the ATX style with a
single connector.
3. What are the two types of power supply connectors for devices such as
drives?
The Molex, a 5-volt connector, is used for hard disk drives, and the
mini 3.3 volt is used for floppy disk drives and similar devices.
6. When you purchase a UPS, what is the most important thing to consider?
The UPS offers enough time to power the computer until all data
can be saved and the computer can be properly shut down.
10. Explain the difference between the mini connector and the Molex
connector.
11. Describe the best way to make sure a new power supply matches the one
you are replacing.
Take the old one with you and match its physical size, as well as
the power ratings and number of connectors, to the new one.
Mini connectors are primarily used for 3.5-inch floppy disk drives.
13. A computer power supply has both 5-volt and 12-volt outputs. The 5-volt
output is used to power _____________, and the 12-volt output is used
to power _____________.
The 5-volt output is used to power devices that manage data only,
and the 12-volt output is used to power devices that have moving
parts, such as drives and fans.
Chapter 6
3. What is EMI?
The first type of ROM chip is called the core chip and includes
hardware that is common, necessary, and unchanging. The second
type of ROM chip is hardware that is common, necessary, and
changeable; these chips are called updatable chips. The third type
of chip includes any chip other than the first two types of chips.
6. Describe what makes the CMOS special.
The CMOS chips are updatable, and that makes them special. They
do not store programs like other ROM chips do; they store only
data that is used by the BIOS for the programs needed to
communicate with changeable hardware. The CMOS chip also
maintains date and time information when the computer is
powered off.
The purpose of the first POST (power-on self test) is to check the
most basic components. Because the video integrity has not been
confirmed, any errors that occur in this phase are indicated by a
series of beeps. A technician can use the beep codes to interpret
any problems that occur before the video is confirmed.
Shadow RAM rewrites (or shadows) the contents of the ROM BIOS
and/or video BIOS into extended RAM memory (between the 640-
KB boundary and 1 MB). This allows systems to operate faster
when application software calls for any BIOS routines.
6. What is DRAM?
10. One of the differences between DRAM and SRAM is that SRAM does not
have to be refreshed. What does this mean, and how does it affect the
cost of each type of chip?
The available expansion buses are: ISA, MCA, EISA, VESA, AGP,
and PCI.
3. What happens if two non-PCI devices use the same I/O address?
If the first modem had been using COM1, the failure would be the
result of an IRQ conflict. Devices assigned to COM1 and COM3
both make use of IRQ4. If the first modem has already been
assigned to COM1, a conflict will occur when both modems make
use of IRQ4.
6. Identify the two divisions of the external data bus and describe the
purpose of each.
The two divisions of the external data bus are the system bus and
the expansion bus. The system bus supports the CPU, RAM, and
other motherboard components. The system bus runs at speeds
that support the CPU.
The expansion bus supports any add-on devices via the expansion
slots.
11. Describe ways in which the PCI bus is better than previous technologies.
IRQ Function
IRQ 0 System timer
IRQ 1 Keyboard controller
IRQ 2/9 Available
IRQ 3 COM2, COM4
IRQ 4 COM1, COM3
IRQ 5 LPT2
IRQ 6 Floppy disk controller
IRQ 7 LPT1
IRQ 8 Real-time clock
IRQ 10 Available
IRQ 11 SCSI/available
IRQ 12 Available
IRQ 13 Math coprocessor
IRQ 14 Primary IDE controller
IRQ 15 Secondary IDE controller
17. Why is it important not to assign an IRQ to more than one device?
If two devices have the same IRQ and try to communicate with
the CPU at the same time, the resulting conflict will lock up the
computer.
18. What is the difference between COM ports and LPT ports?
COM ports are for serial communications, and LPT ports are
parallel ports normally used with printers.
Name Uses
DB-9 Serial ports—external modem, mouse, printer
DB-25 Parallel port—printer, scanner, removable drive
RJ-11 Standard telephone connector—2 wires
Standard telephone connector—4 wires—used with dual
RJ-12
phone connections
RJ-45 Network connector
PS/2
(mini- Mouse, scanners
DIN)
Centronics Printers
Universal serial bus—technology that allows multiple
USB
peripherals to be attached to one cable
21. What type of connector is used for a parallel port on the computer?
23. What type of connector is used for a parallel port on the printer?
4. What three things should be checked when a floppy disk drive fails?
Three things to check when a floppy disk drive fails are the floppy
disk itself (not the drive), the CMOS setup, and the drive
controller/power supply cables.
5. What is the best way to ensure long life from a floppy disk drive?
6. When you purchase a new floppy disk drive controller, what can you
expect to receive with it?
Floppy disk drive controller cards also include some or all of the
following: hard disk drive controllers, serial ports, parallel ports,
and game ports. If the new card contains any ports that duplicate
ports already present elsewhere on the computer (on the
motherboard, for instance), a potential conflict exists, and you
should disable the duplicates prior to installation.
7. Other than physical size, what are the only differences between a 5.25-
inch floppy disk drive and a 3.5-inch floppy disk drive?
8. What type of cable is used to connect a floppy disk drive to the external
data bus?
The connector end of the cable, with the twist, always goes
toward the drives.
10. To which pin must the number 1 wire of the floppy disk drive cable be
connected?
11. You've received the following error message: "General failure reading
Drive A:". What is the most likely problem?
The CMOS settings for the A drive are the most likely cause.
Always double-check the CMOS if you are experiencing a recurrent
drive failure. Checking is quick, easy, and can save you time.
12. Are floppy disk controllers sensitive to ESD?
13. You receive an error message that ends with "Abort, Retry, Fail?". What is
the most likely cause of the error?
14. Why is a voice coil actuator arm better than a stepper motor actuator
arm?
A voice coil actuator arm has several advantages over the stepper
motor actuator arm. The lack of mechanical interface between the
actuator arm and the motor provides consistent positioning
accuracy. When the drive is shut down (the power is removed
from the coil), the actuator arm (which is spring-loaded) moves
back to its initial position, thus eliminating the need to park the
head. In a sense, these drives are self-parking.
16. What is the best way to determine the geometry of an unknown drive?
24. Name the characteristics of the three different hard disk drive types.
The first hard disk drives for personal computers used the ST-
506/412 interface. The ST-506/412 was the only hard drive
available for the IBM computer and the first to be supported by
the ROM BIOS chip on the motherboard.
The FAT (file allocation table) is simply an index that keeps track
of which part of the file is stored in which sector. Each partition
(or floppy disk) has two FATs stored near the beginning of the
partition. These FATs are called FAT 1 and FAT 2. They are
identical. Each FAT can be looked at as a two-column spreadsheet.
29. How can you minimize the impact of a hard disk drive failure?
The third method utilizes Fast ATA, which uses PIO mode 3, and
Fast ATA-2, which uses PIO mode 4.
The fourth method utilizes logical cylinders, heads, and sectors (L-
CHS)—a value used by the operating system to determine the size
of the hard drive.
The ATA standard requires each drive to activate its IRQ every
time it sends one sector of data. This process helps to verify good
data transmission, but it slows down the computer. Multiple block
reads speed up the process by reading several sectors of data at a
time.
5. Sometimes the SCSI device driver conflicts with other drivers. What steps
need to be taken to resolve the problem?
Often, the only way to tell if there will be a conflict is to try the
driver and see what happens. Remember to document every step
you take so that you can undo any changes. Load only the device
drivers for the SCSI devices.
No, it is not. The 16X CD-ROM data transfer rate will be 16 times
faster, but the mean access time is not 16 times faster.
11. Instead of using magnetic energy for storing data, a CD-ROM uses
___________________ technology.
The driver that came with the CD-ROM and the Microsoft
MSCDEX.EXE program are two files often required for a CD-ROM
drive installation. The exact files and drivers will vary with the
operating system and, in some drives, may require special drivers
to fully take advantage of advanced features.
Chapter 11
One dot of color is made up of three smaller dots: one red, one
green, and one blue.
4. What is the "standard" type of video card used with today's computers?
5. What is the formula for calculating the required memory for a monitor–
video card combination?
8. Define resolution.
9. What is bandwidth?
The CRT part of a monitor acts like a large capacitor and is capable
of holding a very large charge (30,000 volts). (You should
therefore leave monitor repair to a specially trained professional
technician.)
12. Explain one similarity and one difference between VRAM and WRAM.
Both offer dual port reads and writes, but WRAM is faster and less
expensive.
The PGA, VGA, and SVGA monitor each use a 15-pin, three-row,
female DB connector.
The TFT screen is brighter and has better contrast than the older,
passive displays. TFT provides much better image quality for a
system used in an environment with glare or high levels of
illumination.
Chapter 12
1. Name the three most common types of printers and describe their
advantages and disadvantages.
5. What causes black spots to appear on a document that has been printed
on a laser printer? How can this problem be resolved?
You should always consider the total operating cost, including the
cost of paper and ink or toner.
Chapter 13
Type III cards are primarily for computers that have removable
hard disk drives. This standard was introduced in 1992. Type III
cards are 10.5 mm thick, but they are compatible with Type I and
Type II cards.
Type IV cards are intended to be used with hard disk drives that
are thicker than the 10.5 mm Type III card.
A PC Card is part of the Plug and Play standard. Plug and Play–
compatibility provides the means to add components without
turning off or rebooting the computer in computers with
compatible operating systems. PC cards are not configured with
jumper settings (because they don't have any) but with software.
Except for the size and packaging, hard disk drive technology is
similar to desktop technology. EIDE drives are standard in
portables, with the exception of Macintosh, which uses SCSI.
Chapter 14
2. The primary benefit of a LAN is its ability to share resources. Name some
of the other benefits of networking.
Thin Ethernet uses a round BNC connector and UTP uses an RJ-45
connector (similar to a telephone jack).
7. Name the three main types of network cabling. What are their
advantages?
12. Your network is showing signs of reduced bandwidth. What is causing this
problem?
4. What is the name of the chip that converts data from parallel to serial?
7. Define handshaking.
In half-duplex, the RJ-11 plug has only two wires; therefore, only
one signal can be sent or received at a time. Half-duplex is used to
send messages in only one direction, like a fire alarm signal.
In full-duplex, the RJ-12 plug uses four wires (for two phones). It
is the same size as the RJ-11 but with two additional wires. This
enables users to send and receive data simultaneously.
5. What are the two MS-DOS user-definable startup files and their purpose?
CONFIG.SYS loads extra hardware and device drivers not built into
IO.SYS, and AUTOEXEC.BAT loads environment variables such as
TEMP and PATH as well as running any other batch file commands.
6. Which DOS command is used to show the amount of free space left on a
disk?
DIR (directory) returns a list of all the files on the drive and
indicates the amount of free space available.
11. Your customer wishes to have a machine configured for both the Linux
operating system and Microsoft Windows 2000 Professional. The computer
has only one hard drive. Identify which file system you would recommend
and explain the reasons for your choice.
FAT16 is the proper choice for the boot partition because it is the
only file system compatible with both operating environments.
Depending on the size of a hard disk it may be desirable to
partition a second volume on the hard drive with NTFS to provide
access to the advanced security features and performance
enhancements of the newer file system.
12. Explain the steps involved in preparing a new hard drive to accept an
operating system.
First, the drive must be low-level formatted. The manufacturer
often does this during the production of the drive itself. If not, it
will require software for this routine provided by the
manufacturer. Once the system is completed, the drive must be
partitioned and one partition must be designated as the boot
partition or primary partition. Finally, a high-level format prepares
the drive for the specific operating system and file system to be
used.
13. Why didn't the designers of the FAT file system provide a method for
limiting access to files and folders?
3. Where can you find information about what hardware can be used with
Windows 2000?
5. What is an ERD?
This is the Windows 2000 emergency repair disk. It contains files
needed to restore the Registry to the same state as when the disk
was created. The ERD is used as part of the emergency repair
procedure if the Registry becomes corrupted or the file system
becomes unstable.
8. What is Fdisk?
9. What are the four setup options offered after Windows 98 Setup prepares
the installation directory?
10. Can Setup be run for both Windows 98 and Windows 2000 from MS-DOS?
Yes, Setup can be run for both operating systems. The user will
need access to the CD-ROM drive, and the installation program
must be manually invoked from the command prompt. In the case
of Windows 98, this is WIN.EXE. For Windows 2000 you must use
a 16-bit version of the installer named WINNT.EXE.
11. What is the purpose of the Check Upgrade Only function during Windows
2000 installation and how is it invoked?
12. What should be the first step in troubleshooting any failed Windows
installation?
Recheck all required system components and make sure that the
product and the target system are compatible with the operating
system involved.
13. What is the first step required to log on to a Windows 2000 machine (not
during installation, but at any time the system is accessed after Setup is
complete)? What is the purpose of this step?
14. What are the basic minimum system requirements required to run
Windows 2000?
2. What is the kernel, and what is its function within the operating system?
7. Briefly explain the two core files needed to boot Windows 98.
8. Can you use CONFIG.SYS and AUTOEXEC.BAT in Windows 98? Are there
any special considerations?
Yes, they can be used in Windows 98, but they are not
recommended except to enable backward compatibility for legacy
equipment or software. If they are used, the following actions
should be taken: Don't enable any mouse drivers or disk caching
software. Don't reference older versions of Windows or MS-DOS.
Be sure the path to the current Windows directory is included in
any path statements. Leave any hardware customization settings
to be handled by the Registry whenever possible.
This file is a key startup manager for Windows 2000, and must
reside in every directory of the primary disk partition. It controls
system startup until the kernel is loaded or another operating
system has been invoked if the machine has a dual-boot system. If
this file is not present or has become corrupted, Windows 2000
cannot load.
14. What is the preferred editor for working with the system Registry and
Windows 2000?
5. What is an ERD?
6. What is the best way to remove old, unused files from a Windows-based
computer?
10. Why is it useful to keep long-term archival files, even if you're making
regular periodic backups on a short-term basis?
2. You are only going to check the memory chips. Do you need to follow ESD
safety practices?
3. What is parity?
5. Your client wants to install an internal modem. How would you determine
whether this internal modem could be installed on your client's machine?
6. A friend just got a bargain on a new Plug and Play sound card and wants
to install it on a non–Plug and Play computer. Will it work?
9. What are the four requirements that must be addressed before installing
a new drive in a computer?
Will the drive physically fit inside the computer?
Will the computer's BIOS and operating system support the
size (storage capacity) of the drive?
Will the drive controller support the new drive?
Are there sufficient cables (data and power) to install the
drive?
Chapter 21
1. What is the tool used to restore the Registry in Windows 9x? Is it the
same as the one used in Windows 2000?
4. Explain some possible uses for the Windows 2000 Task Manager in
troubleshooting, and name a corollary tool available in Windows 98.
8. What four stages should you go through when you receive a service call?
The four stages of a service call are the greeting, the description,
the interview, and the closing.
To test for ripple, set a meter to read AC. Then connect a .1mfd
capacitor to the red lead. With the power turned on, measure the
DC voltage to ground. Any ripple present will be displayed as an
AC voltage.
AC alternating current
AGP Accelerated Graphics Port
ALU arithmetic logic unit
ANSI American National Standards Institute
ASCII American Standard Code for Information Interchange
ASPI Advanced SCSI Programming Interface
BBS bulletin board system
BIOS basic input/output system
BPS (bps) bits per second
CAM Common Access Method
Comité Consultatif International Télégraphique et
CCITT
Téléphonique
CD-ROM compact disc read-only memory
CGA Color/Graphics Adapter
CHS cylinder, head, and sector
CISC complex instruction set computing
CMOS complementary metal-oxide semiconductor
COM port serial communications port
CPU central processing unit
CRT cathode-ray tube
DC direct current
DDE Dynamic Data Exchange
DIMM dual inline memory module
DIP dual inline package
DLL dynamic-link library
DMA direct memory access
DOS disk operating system
Dpi dots per inch
DPMI DOS Protected Mode Interface
DPMS Display Power Management Signaling
DRAM dynamic random access memory
DTE Data Terminal Equipment
DVD digital video disc
EDB external data bus
EDO extended data out
EGA Enhanced Graphics Adapter
EIDE Enhanced Integrated Drive Electronics
EISA Extended Industry Standard Architecture
EMI electromagnetic interference
EMS Expanded Memory Specification
ESD electrostatic discharge
ESDI Enhanced Small Device Interface
ETX end-of-text
FAT file allocation table
FPM fast page-mode
FTP File Transfer Protocol
GB gigabyte
GDI Graphical Device Interface
GPF General Protection Fault
GUI graphical user interface
HMA high memory area
HRR horizontal refresh rate
HTTP Hypertext Transfer Protocol
I/O input/output
IDE Integrated Device Electronics
IEEE Institute of Electrical and Electronics Engineers
IOR input/output read wire
IOW input/output write wire
IP Internet Protocol
Internetwork Packet Exchange/Sequenced Packet
IPX/SPX
Exchange
IRQ interrupt request
ISA Industry Standard Architecture
ISDN Integrated Services Digital Network
International Organization for Standardization (often
ISO incorrectly identified as International Standardization
Organization)
ISP Internet service provider
International Telecommunications Union—
ITU-T
Telecommunication Standardization Sector
KB kilobyte
LAN local area network
LBA Logical Block Addressing
LIM Lotus/Intel/Microsoft
LPT line printer, now refers to a parallel printer port
MB megabyte
MCA Micro Channel Architecture
MCC memory controller chip
MDA Monochrome Display Adapter
MDRAM Multibank DRAM
MFM modified frequency modulation
MHz megahertz
MMC Microsoft Management Console
ASCII file Commonly used term to refer to a text file that contains only data
as set forth by the American Standard Code for Information Interchange
to conform to their standard.
attachment A file attached to e-mail; most e-mail clients allow the user to
append files (for instance, graphics files like .gif or .jpeg files) to e-mail as a
handy way of sending information to other people.
B
backslash (\) Symbol used to separate each directory level, for instance
C:\Windows\Utilities. For this reason, it is a reserved character and cannot be
used as part of a filename.
baud Roughly speaking, a measurement of how fast data can be sent over
telephone lines.
BBS (bulletin board system) A local computer system that is not part of the
Internet. It allows users to dial in and chat with others and download or upload
files.
binary file A file type in the form of pure data (1s and 0s) that needs to be
converted to an image, sound, or application to be used. See also ASCII file.
bps (bits per second) The speed at which a modem transmits data. Typical
rates are 14,400, 28,800, 33,600, and 56,600 bps. This represents the actual
number of data bits that can be transmitted per second.
browser Software used to navigate the World Wide Web, such as Microsoft
Internet Explorer and Netscape Navigator.
bus mastering The ability of a device to control its own data bus, only making
use of the main system bus when data must be sent to the CPU or another
device. This reduces CPU and system bus traffic, improving overall
performance.
CGA (Color Graphics Adapter) An early color graphics adapter standard with
resolutions of 320 pixels by 200 pixels or 640 × 200. CGA supported no more
than four colors.
chip The ultimate integrated circuit; contains the complete arithmetic and
logic unit of a computer. See microprocessor.
chip set A group of computer chips or integrated circuits (ICs) that, when
working in harmony, manage and control the computer system. This set
includes the CPU (central processing unit) and other chips that control the flow
of data throughout the system. Typical chip sets consist of a bus controller, a
memory controller, data and address buffer, and a peripheral controller.
client A computer that connects to a network and uses the available resources
provided by the server.
clock Establishes the maximum speed at which the processor can execute
commands. Not to be confused with the clock that keeps time.
CMOS battery Prevents unique information about the setup of the computer
from being lost when the power is turned off. Also maintains the external clock
time (not to be confused with the CPU's clock).
coaxial cable Made of two conductors that share the same axis. The center is
a relatively stiff copper wire encased in insulating plastic. A wire-mesh tube
around the insulation serves as shielding. The outside is a tough insulating
plastic tube.
cold boot The process of restarting a computer after it has been powered
down.
COM1, COM2 The names assigned to the first two serial ports on a PC.
compression "Squeezing" a file down in size by getting rid of all the bits that
are not really needed. Many files (especially those with graphics) are very
large and require a long time to travel over the Internet, so they are best
compressed before sent.
CPU (central processing unit) The part of a computer that controls the
arithmetic and logical operations and decoding and executing instructions.
CRT (cathode-ray tube) The main component of a monitor. One end of the
tube is a very slender cylinder containing an electron gun(s). The wider end is
the display screen.
default drive The active drive on the computer. Each drive has its own letter
designation. Unless otherwise specified, any commands are performed on the
default drive.
directory A location where files are grouped together on the disk. In the
Microsoft Windows environment and Apple Macintosh operating systems, these
are known as folders.
DOS prompt Displays the active drive letter (for instance, C:) and directory.
This indicates that the operating system is ready to accept the next command.
dpi (dots per inch) Units used to measure the resolution of images on many
printers and scanners. Keep in mind that dpi is an exact measurement in laser
printers but often used as an approximation in ink-jet printers.
EPP (Enhanced Parallel Port) Features 2 MB per second data transfer rates,
bidirectional 8-bit operation, and addressing to support multiple (daisy-
chained) peripherals on a single computer.
File Transfer Protocol (FTP) (1) An application used for transferring files to
and from another computer, usually over the Internet. (2) The protocol by
means of which these transfers take place.
Internet A system that links computer networks all over the world.
I/O address A unique name assigned to each device that allows the CPU
(central processing unit) to recognize the device with which it is
communicating.
IRQ (interrupt request) A wire used by the CPU (central processing unit) to
control the flow of data. It prevents devices from trying to communicate with
the CPU at the same time by "interrupting" and temporarily stopping the CPU
to deal with a particular request.
ISP (Internet service provider) A host computer that users can dial into
over a modem to connect to the Internet.
K
keyboard A primary input device much like a typewriter, used for entering
text and command function shortcuts into a computer.
LPT1, LPT2, LPT3 The names assigned to the parallel printer ports on a PC.
M
mailing list A list of subscribers to a particular discussion group. This
database can also be used to distribute e-zines (electronic magazines).
megahertz (MHz) One million hertz (one million cycles per second). A
measurement of CPU clock speed.
memory The area within a computer where information is stored while being
worked on. It stores information (in the form of data bits) that the CPU
(central processing unit) and software need to keep running.
Microsoft Control Panel The new interface for system management tools
that was introduced with Microsoft Windows NT. It offers a single interface to
access and utilize a variety of tools.
Molex connector Type of power supply connector primarily used for devices
that need both 12-volt and 5-volt power (floppy disk drives). The most
common type of connector.
mouse Device used with graphical environments to point and select objects on
the system's monitor. They come in a variety of shapes and sizes.
online The state in which two or more computers are connected to each other,
making data transmission possible.
operating system The program that controls a PC and makes it possible for
users to run their own applications. The operating system provides the built-in
routines that allow the computer to recognize commands, manage files,
connect devices, and perform I/O (input/output) operations.
P
packet A group of consecutive characters transmitted from one computer to
another over a network.
parallel The transmission of several bits at the same time over separate
wires.
parity bit A very basic type of error-correcting code that uses the value of an
extra bit sent at the end of a data string. The bit must have a set value based
on an algorithm to verify that the data at the receiving end is correct.
path The address to a file. The path consists of the drive name, the location of
the file in the directory structure, and the filename. Example:
C:\Mystuff\MYFILE.DOC.
pixel Short for "picture element." One of the dots that make up a graphical
image.
plotter Similar to a printer, but uses pens to draw an image. Used most often
with graphics and drawing programs.
port Specific channel used by a network service. For example, Gopher often
uses port 70, while some Web sites use port 80.
power The strength or force actually put forth by electricity. Electrical power
is measured in watts, which is measured by multiplying voltage by current.
power supply Takes alternating current (AC) power from a local source (a
wall outlet) and converts it to direct current (DC) for on-board electronics use.
protocol A set of rules that govern the transfer of information. The format
used to upload or download files to allow two different computers to
communicate in a standard format.
R
RAID (redundant array of independent disks) The combining of several
drives using either hardware or software controls to make them seem to be
one drive.
real mode An MS-DOS mode in which a computer can perform only one
operation at a time and an application expects full control of the system. Real
mode operates within the MS-DOS 1-MB limitation.
register Temporary memory storage areas located inside the CPU (central
processing unit). Used to hold the intermediate results of calculations or other
operations.
Registry A file or set of files in Microsoft Windows 95 and later versions that
stores information about a computer's hardware and software configuration.
ring network A type of network in which all the servers and clients are
connected in a closed loop.
RISC (Reduced Instruction Set Computing) Uses a smaller and simpler set
of instructions to control the processor, thereby greatly enhancing the
processing speed.
router A device that works like a bridge but is able to select the best route
from network to network based on traffic load. A router can also connect
dissimilar networks.
S
scanner A peripheral that converts information from the written page (or a
printed graphic) to digital information that can be used by the computer.
Works in a manner similar to the scanning process in a photocopy machine.
server The computer that runs the network operating system, manages
security, and administers access to resources; strictly speaking, any computer
that stores information and allows outside users to get copies of that
information.
shadow RAM Many high-speed motherboards use shadow RAM to improve the
performance of a computer. Shadow RAM rewrites (or shadows) the contents
of the ROM BIOS and/or video BIOS into extended RAM (between the 640-KB
boundary and 1 MB). This allows systems to operate faster when application
software calls BIOS routines. In some cases, system speed can be increased up
to 400 percent.
switch box Allows the user to manually (or automatically) switch cable
connections so that one computer can use several different printers or devices
with one parallel port.
sysop (system operator) The system operator of a small BBS (bulletin board
system). (Pronounced "SIS-op.")
system bus Supports the CPU (central processing unit), RAM (random access
memory), and other motherboard components that provide the controlling
element to the computer. It is responsible for coordinating the operation of the
individual system components and central to the communications system of a
computer. Also called the control bus.
topology The layout scheme that describes the way in which network nodes
are wired in relation to each other.
twisted-pair cable Consists of two insulated wires twisted around each other
to form a pair. One or more twisted pairs are used in a twisted-pair cable.
U
UMA (upper memory area) The area from 640 KB to 1024 KB that is
designated for hardware needs such as video RAM, BIOS, and memory-mapped
hardware.
UMB (upper memory block) Unused spaces in upper memory that can be
divided into blocks. These empty blocks have no RAM associated with them and
are simply reserved space. This unused space is valuable because, unlike
expanded and extended memory, MS-DOS can run programs in UMB.
upload The ability to transfer (send) a file from one computer to a remote
computer.
USB (universal serial bus) A new external expansion bus that is popular for
use with low-speed mass storage devices such as Zip drives, modems, and
printers.
virtual memory Hard disk space that can be used as additional memory for
holding data not immediately required by the processor.
volts The unit of electromotive force, or the potential energy, that will
produce a current of 1 ampere when steadily applied against a resistance of 1
ohm. Voltage is also considered the potential energy of a circuit.
W
WAN (wide area network) A network that spans a large geographical area.
The network is connected by means of telephone lines, ISDN (Integrated
Services Digital Network) lines, DSL, cable, radio waves, or satellite links.
word The largest amount of data that can be handled by the microprocessor in
one operation and also, as a rule, the width of the main data bus.
X
XMS (extended memory specification) RAM (random access memory)
above the 1-MB address. Extended memory is accessed through an extended
memory manager (HIMEM.SYS for DOS).
3 4
About This Electronic Book
Every effort has been made to ensure that the text of this eBook matches the
text of the paper version as closely as possible. For usability reasons,
formatting changes may have been made to the eBook version.
Tell Us What You Think
We need to hear from you regarding your experience with our eBooks. Tell us
what you like, don't like; which features you use, and which features you
would like to see in future versions of our eBooks. Send your comments to
[email protected]. Please note that technical support is not offered
through this alias.
3 4
Create a List of Favorite Topics
1. Locate the topic you want to make a favorite topic.
2. Click the Favorites tab, and then click Add.
NOTE
If you want to rename a topic, select the topic, and then type a
new name in the Current topic box.
For more information about accessibility features and services, visit the
Microsoft Accessibility Web site.
To Press
Close the eBook. ALT+F4
Switch between the eBook and other open
ALT+TAB
windows.
Right-click in the Topic
Print a topic.
pane.
Move back to the previous topic. ALT+LEFT ARROW
Move forward to the next topic (provided
ALT+RIGHT ARROW
you have viewed it just previously).
Refresh the topic that appears in the Topic
pane (this is useful if you have linked to a F5
Web page).
Switch between the Navigation pane and
F6
the Topic pane.
UP ARROW and DOWN
Scroll through a topic. ARROW, or PAGE UP and
PAGE DOWN
Scroll through all the links in a topic or
through all the options on a Navigation TAB
pane tab.
To Press
Open and close a book PLUS SIGN and MINUS SIGN, or LEFT ARROW
or folder. and RIGHT ARROW
Select a topic. DOWN ARROW and UP ARROW
Display the selected
ENTER
topic.
To Press
Display the Search tab. ALT+S
ALT+W, and then
Type a keyword to search for.
type the word
Start a search. ALT+L
ALT+T, and then UP
Select a topic in the results list. ARROW and DOWN
ARROW
Display the selected topic. ALT+D
Search for a keyword in the result list of a prior
ALT+U
search.
Search for words similar to the keyword. For
example, to find words like "running" and "runs" ALT+M
for the keyword "run."
Search only through topic titles. ALT+R
To Press
Display the Favorites tab. ALT+I
Add the currently displayed topic to
ALT+A
the Favorites list.
ALT+P, and then UP ARROW and
Select a topic in the Favorites list.
DOWN ARROW
Display the selected topic. ALT+D
Remove the selected topic from the
ALT+R
list.
NOTE
There are also shortcut menu commands that can be accessed
through the keyboard.
Every time you use a shortcut key in the Navigation pane, you
lose focus in the Topic pane. To return to the Topic pane, press F6.
The Match similar words check box, on the Search tab, will be
selected if you used it for your last search.
3 4
Use the Shortcut Menu Commands
There are several commands on the shortcut menu that you can use to display
and customize information.
Command Description
Right-click in the table of Opens all books or folders in the table of
contents, and then click contents. This command works only if the
Open All. Contents tab is displayed.
Right-click in the table of
Closes all books or folders. This command
contents, and then click
works only if the Contents tab is displayed.
Close All.
Right-click, and then
Prints the topic.
click Print.
NOTE
To resize the Navigation or Topic pane, point to the divider between the
two panes. When the pointer changes to a double-headed arrow, drag the
divider right or left.
To proportionately shrink or enlarge the entire eBook, point to any corner
of the eBook. When the pointer changes to a double-headed arrow, drag
the corner.
To change the height or width of the eBook, point to the top, bottom, left,
or right edge of the eBook. When the pointer changes to a double-headed
arrow, drag the edge.
To reposition the eBook on your screen, click the title bar and drag the
eBook to a new position.
NOTE
When the eBook is opened again, it will appear with the last size
and position settings you specified.
3 4
Print the Current Topic
Right-click a topic, and then click Print.
NOTE
If you print from the Contents tab (by right-clicking an entry, and
then clicking Print) you will see options to print only the current
topic, or the current topic and all subtopics.
3 4
Full-Text Search
The Search tab allows you to search through every word in the Library to find
a match. For example, if you do a full-text search on the word "database,"
every topic that contains the word "database" will be listed.
The Search tab in this Library also contains advanced full-text search
functionality that allows you to search using boolean, wildcard, and nested
expressions.
3 4
Use Full-Text Search
1. Click the Search tab, and then type the word or phrase you want to find.
2. Click List Topics, select the topic you want, and then click Display.
3 4
Advanced Full-Text Search
Advanced full-text search allows you to search using boolean, wildcard, and
nested expressions. You can also limit the search to previous results, match
similar words, or search topic titles only.
3 4
Search for Information
A basic search consists of the word or phrase you want to find. You can use
wildcard expressions, nested expressions, boolean operators, similar word
matches, a previous results list, or topic titles to further define your search.
NOTE
If you are searching for a file name with an extension, you should
group the entire string in double quotes, ("filename.ext").
Otherwise, the period will break the file name into two separate
terms. The default operation between terms is AND, so you will
create the logical equivalent to "filename AND ext."
3 4
Find Information with Advanced Full-Text Search
1. Click the Search tab, and then type the word or phrase you want to find.
2. Click to add boolean operators to your search.
3. Click List Topics, select the topic you want, and then click Display.
4. To sort the topic list, click the Title, Location, or Rank column heading.
NOTE
You can request similar word matches, search only the topic titles,
or search the results of a previous search.
3 4
Search for Words or Phrases
You can search for words or phrases and use wildcard expressions. Wildcard
expressions allow you to search for one or more characters using a question
mark or asterisk. The table below describes the results of these different kinds
of searches.
NOTE
Both terms in the same dib AND Topics containing both the words "dib"
topic. palette and "palette."
raster
Topics containing either the word
Either term in a topic. OR
"raster" or the word "vector" or both.
vector
The first term without ole NOT Topics containing the word "OLE," but
the second term. dde not the word "DDE."
NOTE
The basic rules for searching help topics using nested expressions are as
follows:
NOTE
If you use this option, all topic files will be searched, including any
that are not listed in the table of contents.
3 4
Find Words Similar to Your Search Term
This feature enables you to include minor grammatical variations for the
phrase you search. For example, a search on the word "add" will find "add,"
"adds," and "added."
1. Click the Search tab, type the word or phrase you want to find, and then
select the Match similar words check box.
2. Click List Topics, select the topic you want, and then click Display.
NOTE
1. On the Search tab, select the Search previous results check box.
2. Click List Topics, select the topic you want, and then click Display.
NOTE
The Search tab will open with this check box selected if you
previously used this feature.
3
About Microsoft Press
Microsoft Press is a division of Microsoft Corporation and the leading source of
comprehensive self-paced learning, training, evaluation, and support resources
to help everyone from developers to IT professionals to end users get the most
from MicrosoftŽ technology. Choose from more than 250 current titles in print,
multimedia, and network-ready formats—learning solutions made by Microsoft,
with the most timely and accurate information available. For more
information, visit http://mspress.microsoft.com/.
3 4
About This Electronic Book
Every effort has been made to ensure that the text of this eBook matches the
text of the paper version as closely as possible. For usability reasons,
formatting changes may have been made to the eBook version.
Tell Us What You Think
We need to hear from you regarding your experience with our eBooks. Tell us
what you like, don't like; which features you use, and which features you
would like to see in future versions of our eBooks. Send your comments to
[email protected]. Please note that technical support is not offered
through this alias.