maintain net perif notes

50
IT VET 99 IT VET 99 Administer Network Administer Network Peripherals Peripherals Study Notes for 1999 (Updated Study Notes for 1999 (Updated 2002) HSC Syllabus Unit of Work 2002) HSC Syllabus Unit of Work

Upload: pmhs

Post on 04-Jul-2015

209 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: Maintain Net Perif Notes

IT VET 99IT VET 99

Administer Network Administer Network PeripheralsPeripherals

Study Notes for 1999 (Updated Study Notes for 1999 (Updated 2002) HSC Syllabus Unit of Work2002) HSC Syllabus Unit of Work

Page 2: Maintain Net Perif Notes

Part 1Part 1

ContentsContents

Page 3: Maintain Net Perif Notes

Key Terms and ConceptsKey Terms and Concepts

file server, workstation, network operating systemfile server, workstation, network operating system users, groupsusers, groups security, permissions, resource sharingsecurity, permissions, resource sharing peripheral device support, device driversperipheral device support, device drivers network protocolsnetwork protocols remote login and managementremote login and management consumablesconsumables queues, spooling, poolingqueues, spooling, pooling print serverprint server device management softwaredevice management software

Page 4: Maintain Net Perif Notes

Part 2Part 2

Page 5: Maintain Net Perif Notes

The IT EnvironmentThe IT Environment

What is a What is a FILE SERVERFILE SERVER In the In the client/serverclient/server model, a file server is model, a file server is

a computer responsible for the central a computer responsible for the central storage and management of storage and management of datadata files so files so that other computers on the same network that other computers on the same network can access the files. can access the files.

A file server allows users to share A file server allows users to share information over a information over a networknetwork without having without having to physically transfer files by to physically transfer files by floppyfloppy diskette or some other external storage diskette or some other external storage device.device.

Page 6: Maintain Net Perif Notes

IT EnvironmentIT Environment

What is a What is a WorkstationWorkstation?? A A historical viewhistorical view is that is that workstationworkstation

is a computer intended for individual is a computer intended for individual use that is faster and more capable use that is faster and more capable than a than a personal computerpersonal computer. It's . It's intended for business or professional intended for business or professional use (rather than home or use (rather than home or recreational use).recreational use).

Page 7: Maintain Net Perif Notes

What is a workstationWhat is a workstation

In IBM and other corporations, the term In IBM and other corporations, the term "workstation" is sometimes used to mean "workstation" is sometimes used to mean "any individual personal computer location "any individual personal computer location hooked up to a hooked up to a mainframemainframe computer." computer."

In In today's corporate environmentstoday's corporate environments, , many workers have many workers have workstationsworkstations. They're . They're simply personal computers attached to a simply personal computers attached to a local area network (local area network (LANLAN) that in turn ) that in turn shares the resources of one or more large shares the resources of one or more large computers. computers.

Page 8: Maintain Net Perif Notes

Warning!Warning!

Here is a complete syllabus definitionHere is a complete syllabus definition A A workstationworkstation is a computer that is is a computer that is

connected to a connected to a file serverfile server or or mainframe computer. It is often used mainframe computer. It is often used by by individual workersindividual workers who need to who need to access access file serversfile servers, , shared hard shared hard drivesdrives through Local and Wide Area through Local and Wide Area networks.networks.

Page 9: Maintain Net Perif Notes

Network operating systemNetwork operating system

A network operating system (NOS) is a A network operating system (NOS) is a computer computer operating systemoperating system system that is system that is designed primarily to support designed primarily to support workstationworkstation, , personal computerpersonal computer, and, in some , and, in some instances, older instances, older terminalterminal that are that are connected on a local area network (connected on a local area network (LANLAN). ).

Novell's Novell's NetWareNetWare, and Microsoft's LAN , and Microsoft's LAN Manager are examples of network Manager are examples of network operating systems. operating systems.

Page 10: Maintain Net Perif Notes

Network operating systemNetwork operating system

DefinitionDefinition A A network operating systemnetwork operating system

(NOS) provides printer sharing, (NOS) provides printer sharing, common file system and database common file system and database sharing, application sharing, and the sharing, application sharing, and the ability to manage a network name ability to manage a network name directory, security, and other directory, security, and other housekeeping aspects of a network. housekeeping aspects of a network.

Page 11: Maintain Net Perif Notes

UsersUsers

UserUser in a in a computingcomputing context refers context refers to one who uses a computer system. to one who uses a computer system.

Users are also said to be people that Users are also said to be people that use a system without complete use a system without complete technical expertise required to fully technical expertise required to fully understand the system.understand the system.

Page 12: Maintain Net Perif Notes

UsersUsers

In order to identify oneself, a user In order to identify oneself, a user has an has an accountaccount (a (a user accountuser account) ) and a and a usernameusername (also called a (also called a screen namescreen name, , handlehandle, , nicknamenickname, , or or nicknick on some systems), and in on some systems), and in most cases a password.most cases a password.

Page 13: Maintain Net Perif Notes

GroupsGroups

groupgroup generally refers to a grouping of generally refers to a grouping of users. In principle, users may belong to users. In principle, users may belong to none, one, or many groups.none, one, or many groups.

The The primary purposeprimary purpose of using groups is of using groups is to simplify access control arrangements to to simplify access control arrangements to manage clusters of users whom are given manage clusters of users whom are given the same scope of access and usage rights the same scope of access and usage rights across a network.across a network.

Page 14: Maintain Net Perif Notes

GroupsGroups The primary uses of groups are:The primary uses of groups are: access controlaccess control - use groups to simplify - use groups to simplify

the policies on who is allowed to access the policies on who is allowed to access what what

accountingaccounting - how much disk space are - how much disk space are the students using? how much disk space the students using? how much disk space is being used by the staff? is being used by the staff?

content selectioncontent selection - only display content - only display content relevant to group members - e.g. this relevant to group members - e.g. this portal channel is intended for students, portal channel is intended for students, this mailing list is for the chess club this mailing list is for the chess club

Page 15: Maintain Net Perif Notes

SecuritySecurity

In information technology, security is In information technology, security is the protection of information assets the protection of information assets through the use of technology, through the use of technology, processes, and training. processes, and training.

Page 16: Maintain Net Perif Notes

PermissionsPermissions

Methods of administering Methods of administering permissionspermissions or or access rightsaccess rights to specific to specific usersusers and groups and groups of users. of users.

These systems control the ability of the These systems control the ability of the users affected to users affected to viewview or or make changesmake changes to the contents of the to the contents of the file systemfile system that that they are working within.they are working within.

Grants or restricts access to information Grants or restricts access to information and applications on a network.and applications on a network.

Page 17: Maintain Net Perif Notes

Resource SharingResource Sharing

There are hardware assets attached to There are hardware assets attached to most networksmost networks

Printers, Faxes, Plotters, DVD Duplicators, Printers, Faxes, Plotters, DVD Duplicators, Large format printers etc.Large format printers etc.

Also software – knowledge bases for Also software – knowledge bases for technical information can be sharedtechnical information can be shared

Allows several users or groups to share Allows several users or groups to share one device, most common is the ‘office one device, most common is the ‘office printer’.printer’.

Page 18: Maintain Net Perif Notes

Part 3Part 3

Page 19: Maintain Net Perif Notes

peripheral device supportperipheral device support

Peripheral Device Support refers to the Peripheral Device Support refers to the maintenance of that device by an ‘expert’ maintenance of that device by an ‘expert’ or though sufficient documentation that or though sufficient documentation that the device can be ‘looked after’.the device can be ‘looked after’.

For example: High Volume printers may For example: High Volume printers may need a periodic ‘service’ in which a need a periodic ‘service’ in which a technician replaces or services technical technician replaces or services technical components beyond the ability of users.components beyond the ability of users.

Page 20: Maintain Net Perif Notes

What are Device DriversWhat are Device Drivers

A device driver is a A device driver is a programprogram that that controls a particular type of controls a particular type of devicedevice that is attached to your computer. that is attached to your computer.

There are device There are device driverdrivers for printers, s for printers, displays, CD-ROM readers, diskette displays, CD-ROM readers, diskette drives, and so on.drives, and so on.

Page 21: Maintain Net Perif Notes

Why do we need Device DriversWhy do we need Device Drivers

When you buy an When you buy an operating systemoperating system, , many device drivers are built into the many device drivers are built into the product.product.

However, if you later buy a new type However, if you later buy a new type of device that the operating system of device that the operating system didn't anticipate, you'll have to install didn't anticipate, you'll have to install the new device driver. the new device driver.

Page 22: Maintain Net Perif Notes

Are Device Drivers ‘special’Are Device Drivers ‘special’

A device driver essentially converts the A device driver essentially converts the more general input/output instructions of more general input/output instructions of the operating system to messages that the the operating system to messages that the device type can understand.device type can understand.

Upgrading an operating system can lead Upgrading an operating system can lead to drivers no longer functioning ‘normally’. to drivers no longer functioning ‘normally’. This is often the issue with Windows This is often the issue with Windows operating systems. operating systems. New OS? New Drivers!New OS? New Drivers!

Page 23: Maintain Net Perif Notes

Part 4Part 4

Page 24: Maintain Net Perif Notes

Network ProtocolsNetwork Protocols

Protocols are not limited to computingProtocols are not limited to computing Opening doors for womenOpening doors for women Giving up your seat for old people on a busGiving up your seat for old people on a bus Shaking HandsShaking Hands Smiling at people and they smile backSmiling at people and they smile back Hand GesturesHand Gestures Starting a football gameStarting a football game Eating a 3 course mealEating a 3 course meal Ways of doing thingsWays of doing things

Page 25: Maintain Net Perif Notes

IT ProtocolsIT Protocols

In information technology, a protocol In information technology, a protocol (from the Greek (from the Greek protocollonprotocollon, which , which was a leaf of paper glued to a was a leaf of paper glued to a manuscript volume, describing its manuscript volume, describing its contents) is the contents) is the special set of rulesspecial set of rules that facilitates a telecommunication that facilitates a telecommunication between from one point node to between from one point node to another.another.

Page 26: Maintain Net Perif Notes

Network ProtocolsNetwork Protocols

For example, there are protocols for For example, there are protocols for the data interchange at the hardware the data interchange at the hardware device level and protocols for data device level and protocols for data interchange at the application interchange at the application program level.program level.

How one ‘thing’ interacts, How one ‘thing’ interacts, handshakes or communicates handshakes or communicates successfully with another.successfully with another.

Page 27: Maintain Net Perif Notes

NPs Working togetherNPs Working together

A common, understood method of A common, understood method of use and communication of data and use and communication of data and informationinformation

Hardware or software may come Hardware or software may come from different manufacturers or even from different manufacturers or even be on different platforms entirely.be on different platforms entirely.

A PC running Linux transferring data A PC running Linux transferring data to a Apple Server running OSX.to a Apple Server running OSX.

Page 28: Maintain Net Perif Notes

Internet ProtocolsInternet Protocols

Use these to illustrate your Use these to illustrate your understanding of network protocols.understanding of network protocols.

To answer a question which requires To answer a question which requires you to EXPLAIN what is meant, then you to EXPLAIN what is meant, then do it in do it in two partstwo parts like this. like this.

Page 29: Maintain Net Perif Notes

Model Answer – NPs … Part 1Model Answer – NPs … Part 1

……A workstation uses a network A workstation uses a network protocol to establish a protocol to establish a communication link between itself communication link between itself and other nodes on the network. This and other nodes on the network. This NP is a set of commonly understood NP is a set of commonly understood methods understanding the methods understanding the messages being sent around the messages being sent around the network …network …

Page 30: Maintain Net Perif Notes

Model answer NPs .. Part 2Model answer NPs .. Part 2 On the Internet, there are the On the Internet, there are the TCP/IPTCP/IP protocols, protocols,

consisting of: consisting of: Transmission Control ProtocolTransmission Control Protocol (TCP), which uses a (TCP), which uses a

set of rules to exchange messages with other set of rules to exchange messages with other Internet points at the information packet level Internet points at the information packet level

Internet ProtocolInternet Protocol (IP), which uses a set of rules to (IP), which uses a set of rules to send and receive messages at the Internet send and receive messages at the Internet address level address level

Additional protocols that include the Additional protocols that include the Hypertext Transfer ProtocolHypertext Transfer Protocol (HTTP) and (HTTP) and File Transfer ProtocolFile Transfer Protocol (FTP), each with defined sets (FTP), each with defined sets of rules to use with corresponding programs of rules to use with corresponding programs elsewhere on the Internetelsewhere on the Internet

Page 31: Maintain Net Perif Notes

Part 5Part 5

Page 32: Maintain Net Perif Notes

Remote Login & ManagementRemote Login & Management

Any device on a network that has a Any device on a network that has a STATIC address, ie it is known, can STATIC address, ie it is known, can theoretically be controlled remotely.theoretically be controlled remotely.

Remote Login is the term used to Remote Login is the term used to described connecting to a machine described connecting to a machine over a network protocol, typically over a network protocol, typically TelNet or IP.TelNet or IP.

To do this To do this softwaresoftware is needed at both is needed at both ‘ends’ to allow the process to operate‘ends’ to allow the process to operate

Page 33: Maintain Net Perif Notes

Remote Access and ManagementRemote Access and Management

Windows uses REMOTE DESKTOP to Windows uses REMOTE DESKTOP to connect to a machine with a STATIC connect to a machine with a STATIC IP address. From here you can IP address. From here you can connect to the machine – by remote connect to the machine – by remote control.control.

Control the machine OSControl the machine OS View filesView files Amend, Delete, Move files etc.,Amend, Delete, Move files etc.,

Page 34: Maintain Net Perif Notes

Remote Access and ManagementRemote Access and Management

Management of Remote Access Management of Remote Access meansmeans

Controlling who has access into a Controlling who has access into a networknetwork

What devices the can accessWhat devices the can access What they can do on those machinesWhat they can do on those machines Where they can go from one Where they can go from one

machine to anothermachine to another File permissions and access rightsFile permissions and access rights

Page 35: Maintain Net Perif Notes

Part 6Part 6

Page 36: Maintain Net Perif Notes

ConsumablesConsumables

Devices often need parts to function.Devices often need parts to function. Parts which may be depleted or worn Parts which may be depleted or worn

out by use.out by use. Whilst it is true, epecially in IT, that Whilst it is true, epecially in IT, that

things wear out. The syllabus is things wear out. The syllabus is speaking about items that are not speaking about items that are not intended to last the life of other intended to last the life of other componentscomponents

Ink Cartridges, Floppy Discs, Paper.Ink Cartridges, Floppy Discs, Paper.

Page 37: Maintain Net Perif Notes

Queuing, Spooling, PoolingQueuing, Spooling, Pooling

All print related terms. Do not talk All print related terms. Do not talk about them in any other context.about them in any other context.

Page 38: Maintain Net Perif Notes

SpoolingSpooling

To spool (which stands for To spool (which stands for "simultaneous peripheral operations "simultaneous peripheral operations online") a computer document or online") a computer document or task list (or "job") is to read it in and task list (or "job") is to read it in and store it, usually on a store it, usually on a hard diskhard disk or or larger storage medium so that it can larger storage medium so that it can be printed or otherwise processed at be printed or otherwise processed at a more convenient time (for a more convenient time (for example, when a printer is finished example, when a printer is finished printing its current document). printing its current document).

Page 39: Maintain Net Perif Notes

Spooling (where from) Spooling (where from) The idea of spooling originated in early The idea of spooling originated in early

computer days when input was read in on computer days when input was read in on punched cards for immediate printing (or punched cards for immediate printing (or processing and then immediately printing processing and then immediately printing of the results). of the results).

Since the computer operates at a much Since the computer operates at a much faster rate than input/output devices such faster rate than input/output devices such as printers, it was more effective to store as printers, it was more effective to store the read-in lines on a magnetic disk until the read-in lines on a magnetic disk until they could be conveniently printed when they could be conveniently printed when the printer was free and the computer was the printer was free and the computer was less busy working on other tasks. less busy working on other tasks.

Page 40: Maintain Net Perif Notes

Spooling DefinitionSpooling Definition

In In computer sciencecomputer science, , spoolingspooling refers refers to putting jobs in a to putting jobs in a bufferbuffer, a special , a special area in area in memorymemory, or on a , or on a diskdisk where where a device can access them when it is a device can access them when it is ready. ready.

Page 41: Maintain Net Perif Notes

Pooling PrintersPooling Printers

Printer Pooling is a standard feature of Printer Pooling is a standard feature of Windows NT, 2000 and XP which in theory Windows NT, 2000 and XP which in theory lets you spread your printed output across lets you spread your printed output across a pool of several printers.a pool of several printers.

The main benefits of pooling printers are The main benefits of pooling printers are that it is often that it is often cheaper to runcheaper to run two two smaller printers rather than a single large smaller printers rather than a single large device and you also have some device and you also have some backupbackup if if one of the printers fails.one of the printers fails.

Page 42: Maintain Net Perif Notes

Queue-ingQueue-ing

most well known operation of the most well known operation of the queue is the First-In-First-Out (queue is the First-In-First-Out (FIFOFIFO) ) queue process. In a FIFO queue, the queue process. In a FIFO queue, the first element in the queue will be the first element in the queue will be the first one out; this is equivalent to the first one out; this is equivalent to the requirement that whenever an requirement that whenever an element is added.element is added.

Your job is in the queue!Your job is in the queue!

Page 43: Maintain Net Perif Notes

Queue-ingQueue-ing

Theoretically, one characteristic of a Theoretically, one characteristic of a queue is that it does not have a queue is that it does not have a specific specific capacitycapacity. Regardless of how . Regardless of how many elements are already many elements are already contained, a new element can always contained, a new element can always be added. It can also be empty, at be added. It can also be empty, at which point removing an element will which point removing an element will be impossible until a new element be impossible until a new element has been added again. has been added again.

Page 44: Maintain Net Perif Notes

Downsides of QsDownsides of Qs

If a job ahead fails, it may crash the If a job ahead fails, it may crash the printer and loose your data.printer and loose your data.

If your workstation is unable to If your workstation is unable to multi-task (called background task multi-task (called background task printing) then you workstation printing) then you workstation cannot be used until your job has cannot be used until your job has made it to the head of the queue and made it to the head of the queue and completed.completed.

Page 45: Maintain Net Perif Notes

Part 7Part 7

Page 46: Maintain Net Perif Notes

Print ServerPrint Server

A computer and/or software to provide A computer and/or software to provide users or a network with access to a central users or a network with access to a central printer. printer.

The printer server acts as a buffer, holding The printer server acts as a buffer, holding the information to be printed out in the information to be printed out in memory until the printer is free. memory until the printer is free.

It is possible to program the printer server It is possible to program the printer server to print jobs in the order they arrive or to to print jobs in the order they arrive or to give priority to particular users who, in give priority to particular users who, in effect, jump the queue effect, jump the queue

Page 47: Maintain Net Perif Notes

Part 8Part 8

Page 48: Maintain Net Perif Notes

Device Management SoftwareDevice Management Software

Usually a set of applications that Usually a set of applications that operate together to control a deviceoperate together to control a device

Consider there is a standard Consider there is a standard application on a mobile phone that is application on a mobile phone that is used to manage multiple aspects and used to manage multiple aspects and uses of the phoneuses of the phone

It often provides technical It often provides technical information that is understood by information that is understood by experts not users.experts not users.

Page 49: Maintain Net Perif Notes

Device Management SoftwareDevice Management Software

It can schedule maintenance tasks or It can schedule maintenance tasks or altersalters

Give you feedback on the status of Give you feedback on the status of the device (heat, cycles, hours, the device (heat, cycles, hours, copies etc.,)copies etc.,)

Allow you to check that it has the Allow you to check that it has the latest FIRMWARE – small programs latest FIRMWARE – small programs that control the devices functionsthat control the devices functions

Debugging problems etc.,Debugging problems etc.,

Page 50: Maintain Net Perif Notes

SummarySummary This presentation is intended as a guide to This presentation is intended as a guide to

the KEY TOPICS and WORDS covered in the KEY TOPICS and WORDS covered in this unit of workthis unit of work

It is NOT absolute or exhaustiveIt is NOT absolute or exhaustive You should NOT copy this presentation in You should NOT copy this presentation in

whole or in part without written whole or in part without written permission of the author.permission of the author.

EO&E. Copyright Dean Groom 2007. All EO&E. Copyright Dean Groom 2007. All rights reserved.rights reserved.

You can contact me : You can contact me : [email protected]@gmail.com