Basic System Troubleshooting Task
Basic System Troubleshooting Task
While starting a PC , if you get a red/ yellow light glowing , then there is a problem with
your PC.
[1]We have to initially, check a switch board & a switch is working or not.
[2]We have to check a power cord by using that same cord to a monitor or any other devices ,
by knowing whether it is properly working or not.
Netmetting configuration :
Start run conf next First Name
Last Name
E-mail ID
next Netmetting window tools option advanced calling
Used a gateway to call telephones and video conferencing system.
Gateway: 10.0.0.2 (this is an IP address of that computer from which we will proceed).
OK ok then you have to enter IP address of that computer to which you want to share
your desktop.
Note : For this to be performed, both computers must have a LAN card with drive
installation and must have a same range of IP-addresses.
To access remote desktop of other computer :
Start all programs accessories communicationsremote desktop connection.
Then in remote desktop connection ? window you have to type computer name / IP address
of next computer then it asks for the user name and password of that next computer.
Telnet Configuration
Right click on my computer manage services & application servicesstart the
telnet service.
For this telnet service to be activated we should know the user name and password
of both the computers, so initially run command and then with C:\telnet 192.168.10.5 [IP
address of next computer]
Then whether to from a connection Y/N? Y then enter.
Telnet is a program. It stands for terminal emulation program through which we can manage
networking device (router, wireless access point (WAP), PC, server switches firewalls, etc.)
Port no of TELNET is 23. It manages remote access through the commands given in
command prompt, where remote desktop only provides GUI of another computer.
(1)Internet Explore:
Tools internet options contacts contact advisor enable approved sites In
this types the any website (www.google.com) and make always apply ok .then it ask
for the password and also for hint and then make ok 3 times.It is used to restrict
unauthorized user to access web.
Tools internet option homepage type the website of which you want to set the
homepage after opening internet explorer.
2nd tab in general:
Temporary internet file Delete Cookies OK delete files.
It remove the cookies which are automatically downloaded with the website.
3rd tab history :
It maintains the record of all those websites which we have visited and make the size of this
always short i.e. 1 or 2 website or also you can clear the history using clear history tab.
(A)Security Tab:
Tabs under security:
(1)Internet
Click on custom level.
If your web pages are not downloaded properly then make all the tabs in custom level as
enable.
Trusted sites-This contains those sites which you want to access.
Restricted sites:-This contains those sites which you want to restrict on access.
(B)Privacy Tab:
In privacy tabs, always make medium mode or you can just click on default through which it
will automatically become medium mode.
Pop up Blockers:-It is used to prevent most pop-up windows from appearing.
Block pop-ups. (It is used to restrict the unnecessary adds/ popup that is shown when a site is
accessed.)
If you want to block all popup then choose high option in Settings or low or medium as per
the requirement.
(C)Content tab:
Content adviser
Click on auto complete.
Auto complete removes all the stored ID’s and password which have been visited up to that
date. For this make clear ID’s & Clear password apply OK
(D)Connection Tab:-
LAN Settings- This tab is used for proxy server and to share internet.
Password Policies:
Start control panel administrative tools local security policy account policy
password policy then.
Enforce password history
Maximum password age.
Minimum password age.
Minimum password length.
Password must meet complexity requirements
Store password using reversible encryption for all user in domain.
Minimum Max
0 passwords 24 password
42 days 999 days
0 days 998 days
0 characters 14 characters
Disabled enabled
Disabled enabled
Enforce password history : It will remember your previous & same password can’t be
assigned in case we are using limit more than password i.e. may be 1,2,3,……24.
Max password age: It means you can use your password only up to 42 days by default or if
you may increase the limit up to 99 days.
Min password age: It means you can use your password up to 1 less than max. password.
Here you can even change your password within 1 or 2 days the min limit has been given &
alerts will also be displayed for such a short period.
Minimum Password length: It describe the length of password, where by default policy is 0
char. i.e. you can login without giving password & max 14 characters would work only for
users and for administrators max limit is 128.
Password must meet complexity requirements:-It allows alphanumeric password as wall
as special symbols like * @ etc. by default, it is disable & if it is enabled then you have to
provide & if it is enabled then you have to provide min 3 things i.e. (from A to Z 1 character
from 0 to 9 from any special symbol) even though password length is 0 characters.
Store password using reversible encryption Whenever you create an account the password
is stored in SAM in text format in case this policy is disable but if this policy is enable then
the password is store in Sam in encrypted format.
Password Location - c:/windows/system32/config/sam
LAN
[1] LAN : Structured Cabling :-
RJ45 LAN card- Readymade patch card-One end of this patch card goes to LAN
card of PC and 2nd end goes to I/O RJ45 Rack- In backside of I/O there is punching
by using punching tools. There we are using tags for cable identifications. By using
cascading through wall, cable goes in server room. In server room a cable goes in
rack. Then the cable is punched in jack/patch panel & at the second end of the
patch panel, there is RJ45 jack. Again we are using tags in patch panel for cable
identification & we are using readymade patch cards to connect switch to patch
panel.
Varieties of switches: 8,12,16,24,32,40,48.
LAN
[1] LAN : Structured Cabling :-
RJ45 LAN card- Readymade patch card-One end of this patch card goes to LAN
card of PC and 2nd end goes to I/O RJ45 Rack- In backside of I/O there is punching
by using punching tools. There we are using tags for cable identifications. By using
cascading through wall, cable goes in server room. In server room a cable goes in
rack. Then the cable is punched in jack/patch panel & at the second end of the
patch panel, there is RJ45 jack. Again we are using tags in patch panel for cable
identification & we are using readymade patch cards to connect switch to patch
panel.
Varieties of switches: 8,12,16,24,32,40,48.
[3]Wireless LAN:-
Wireless Frequencies:-
900MHz, 2.4GHz, 5GHz
Wireless Protocols:-
802.11a, 802.11b, 802.11g, 802.11n.
Walls , ceiling and floors rough plaster , carpet on the floor , drop
down ceiling tiles , metal and glasses etc .
WLAN Standards
802.11 standards :-
Wireless is becoming more popular in todays LAN . since little
cabling is required . four basic standards are corrently in used 802.11a , 802.11b ,
802.11g , 802.11n. of the four IEEE 802.11 standards ,802.11b has been
developed the most , with 802.11g being the most common one sold today.
802.11n is very new and commonly found in company network’s
RF BANDS
Ad hoc mode is based on Independent Basic Service Set (IBSS) . In IBSS , client
can set up connections directly to the other clients without an intermediate Access
Point (AP ) . This allow you to setup peer to peer network connection’s .
Infrastructure mode was design to deal with security and scalibility issues .The
infrastructure mode , wireless client can communicate with each other via and
AP .Two infrastructure more are used .Basic Service Set (BSS) , Extented Service
Set (ESS) .
[7]Application Layer :-
[6]Presentation Layer :-
It converts user level language into machine level language by using ASCII &
EBCDIC code.
ASCII (American Standard Code for Information Interchange)
EBCDIC (Extended Binary Coded Decimal for Information Code)
Help=ASCII or EBCDIC
Each character is represented into 8 bit & that number from 0 to 255.
E.g. A=65
i.e. 01000001
[5]Session layer :-
It decides the transmission standard and it keep the different type of data
separately.
It uses following transmission standards.
Half duplex Communication can be established on both sides but only one sided at
a time.
E.g. Walky-talky.
Full duplex Communication can be established on both sides simultaneously.
E.g. Mobile, telephone.
Simplex communication Communication can be done in one way only.
E.g. TV, radio
[4]Transport Layer :- It keeps data ready for transmission. TCP is responsible for
adding transport layer header along with data and in Header there is information
about Breaking, Sequencing and Acknowledgement
[3]Network Layer :-
IP Function - IP creates a packet on network layer & attaches a source IP address
& destination IP address
In Network layer IP protocol is worked and it is responsible for adding Network
layer header along with data and in Header there is information about Source IP
Address and Destination IP Address and Network layer one more protocol is
worked that is ICMP and it is responsible for messaging services like as Name
conflicts, IP address conflicts, Destination host is unreachable and request time
out.
IP for windows.
IPX for Novell Netware.
AppleTalk for Macintosh.
.
[2]Data Link Layer
In Data link layer Ethernet protocol is worked and the job of Ethernet protocol is to
create Frame on Data link layer and in Frame there is data link footer in which you
will get CRC and in Data link Header you will get Source MAC Address and
Destination MAC Address.
Source MAC address – The source computers (from which the request is done)
LAN card’s physical address.
Ex. computer LAN card’s physical address.
DMA (Destination MAC Address)
Data link layer is again divided into 2 sub layers:-
MAC (Media Access Control)
LLC (Logical Link Control)
LLC performs CRC.
MAC is used in case of different types of transmission such as half duplex, full
duplex, simplex communication.
Full duplex has no problem.
Half duplex requires CSMA/CD protocol to transmit data into the network
ARP (Address resolution protocol)-It is used for MAC address to IP address
resolution purpose.
[1]Physical Layers :-
It converts a frame into a stream of bits & transmits it over the network.
Compression
Proper utilization of disc space is compression.
To compress any file, we use a third party s/w like WINZIP, WINRAR, etc.
To perform compression of any file, right click on that file & then choose add to
zip file & then perform the wizard of WINZIP (& perform same for WINRAR).
But without third party s/w, you can compress the file as
Right click on that file
Properties
Advanced
Compress that file
OK
Color of that file change to ‘blue color’ (this indicates that the compression has
been done).
Compression without WINZIP & WINRAR, doesn’t reduce the actual file size,
rather it manages the space in a hard disk.
On the compare WINZIP & WINRAR actually reduces the file size.
Compressing can be performed by any kind of uses.
Suppose a file size is 509 Mb & it takes a space in hard disk as 514 Mb, then why
does it so.
Encryption:-
By using encryption, you can personalize your data without using any third party
s/w.
To hide any folder, right click on that folder – properties – customize – change
icon – choose ‘blank space’ – ok.
Encryption & compression is only done on files & folders.
Steps for encryption.
RC on file & folders
Property
Advanced
Encrypt contents to secure
Data
Ok
Apply
Disadvantage of Encryption:-
Suppose you have encrypted any file or folder with one password, & if after some
time, you are changing your password/ user name then you won’t be able to
decrypt that file or folder.
Note-After encrypting any file / folder, its name appears in green color.
Note- At a time, you can perform only one task on any folder or file, either
encryption or compression.
Disk Quota
We can restrict a user for a specific amount of disk storage is known as disk quota
& it is implemented on partition & only administrative level privilege having
account can assign quota.
RC on any partition – properties – quota – Enable quota
Quota- New quota entry – advanced find now (to select the user from available
user accounts) –Limit disk space set warning level to
Workgroup Networking :-
Steps:-
[1]All computers must have a LAN card & drivers must be installed on that
machine. To check whether the machine has LAN RC on My computer – manage –
device manager –Network adapter
[2]All machines must be connected with each other, either via cables or switch.
To check whether the machine in a network is connected to switch or not.
RC on n/w places – properties – RC on Local Area connection – properties –
Show icon on notification area when connected.
If the symbol is showing Red Cross with
Then it indicates –
1. The cable may be faulty.
2. Connectors may be damaged.
3. LAN card may be damaged.
4. Switch may be powered off.
[3]Give the same range IP-address scheme.
Computer 1
RC on LAN connection – General-
IP address : 192.168.10.1
Subnet mask : 255.255.255.0
Default Gateway
Computer 2
IP address : 192.168.10. 2
Subnet mask : 255.255.255.0
[4] Check the connectivity between the computers. To check the connectivity, we
use the command as -
Ping 192.168.10.2.-t.
Packet internet groper
By default, it is 32 byte.
Suppose you are not getting a reply from both the machines. You have to check the
firewall settings. System may be infected with virus
[5]Now decide the workgroup name steps for assigning machine in workgroup:
Share name:
This option will tell the name of the data to be shared in a network.
Maximum Allowed:
This option gives the max. Users numbers those will share the data in a n/w
Important Commands
[1]Too change the metric weights use the command
Router(config)#router igrp 100
Router(config-router)#default-metric bandwidth delay reliability load mtu
[2] To change the AD of IGRP
Router(config)#router igrp 100
Router(config-router)#distance <1-255>
[3] To change the default timers of IGRP
Router(config)#router igrp 100
Router(config-router)#timers basic update invalid holddown flush sleeptime
[Note]sleeptime-
It is the time at which triggered update will not send until the sleeptime
expires.
[4] To stop the hold down timers.
Router(config)#router igrp 100
Router(config-router)#no metric hold down
[5]To balance the load on the multiple paths [By default RIP uses by default 4
equal cost and maximum 6 equal cost load balancing and IGRP & EIGRP by
default 4 equal and unequal cost and maximum 6 equal and unequal cost load
balancing]
Router(config)#router igrp 100
Router(config-router)#maximum-paths <1-6>
Variance : - it is the multiplier i.e. used to determine what the excepatable
metric for a router is to be included in the routing table.
Router(config-router)#variance multiplier
Eg. :- the path with higher metric is 4 times greater than path with lowest
metric i.e. for every one packet i.e. sent across the higher metric path, 4
packets will have been sent across the lower metric path.
L = 500 H = 2000
Variance = 4
[6] to change maximum paths and hop count use command
Router(config)#router igrp 100
Router(config-router)#metric maximum-hops <1-255>
Everyone can access this information.
Change
Read
Full Control
OK Apply
APPLY OK OK OK YES
Now your machine would be restarted. After restart, the system now asks for
User name :
Password :
Log on to :
‘Log on to’ indicates whether your machine is to be restarted in domain or that
computer itself.
Click on Start – Run –gpupdate /force to save the policy which we have provided.
Process for Assigning Auditing on Folder or File :-
RC on folder or file
Sharing & Security
Security
Select Advanced
Click on auditing
RC on security tabs & clears all events then you will be asked whether to take back
up of these audits as
YES
NO
1. Copy the Msnetmtg.inf file from the %SystemRoot%\Inf folder to your desktop.
2. Click Start, click Run, type the following command, and then press ENTER: