Interview Questions (1) - Praful
Interview Questions (1) - Praful
1. System continuously reboots and doesn't start unless the power button is pressed to reboot the system.
2. System occasionally reboots or crashes.
3. System stops booting completely.
4. Temperature of the system (chassis) is warm to hot
5. Noisy fan (grinding noises when fan spins, knocking, ticking, like a fan blade is hitting something).
1. Check the power cord that is connected from the fan to the motherboard. Processor’s fan might be incorrectly installed.
2. Try plugging the fan heatsink cable into a different header on the motherboard.
3. Clean up the dust. When the system is used for a long time, sometimes in dry and hot conditions, the fan can accumulate
dust.
4. Check to see if the fan stopped working. Fans do have lifespans that may end when used for a long time. Poor quality fans
can also stop working.
5. Check to see if the fan is drawing air in the same direction as the overall system airflow.
6. Check to ensure the processor is properly installed in the system. The fan will start but will shut down shortly, causing the
system to shut down to protect the processors from the heat damage.
7. Check the hotspots of the chassis that are significantly warmer than the rest of the chassis air. Such areas can be created
by improper positioning of the exhaust fan, adapter cards, cables, or chassis brackets and subassemblies. These can block
the airflow within the system. To avoid hotspots:
o Place exhaust fans as needed.
o Re-position full-length adapter cards or use half-length cards.
o Reroute and tie cables.
o Ensure space is provided around and over the processor
8. Try using another working fan if you have one.
BIOS
BIOS (basic input/output system) is the program a computer's microprocessor uses to start the computer system after it is powered
on. It also manages data flow between the computer's operating system (OS) and attached devices, such as the hard disk, video
adapter, keyboard, mouse and printer.
Uses of BIOS
The main use of BIOS is to act as a middleman between OSes and the hardware they run on. BIOS is theoretically always the
intermediary between the microprocessor and I/O device control information and data flow. Although, in some cases, BIOS can
arrange for data to flow directly to memory from devices, such as video cards, that require faster data flow to be effective.
BIOS comes included with computers, as firmware on a chip on the motherboard. In contrast, an OS like Windows or iOS can
either be pre-installed by the manufacturer or vendor or installed by the user. BIOS is a program that is made accessible to the
microprocessor on an erasable programmable read-only memory (EPROM) chip. When users turn on their computer, the
microprocessor passes control to the BIOS program, which is always located at the same place on EPROM.
When BIOS boots up a computer, it first determines whether all of the necessary attachments are in place and operational. Any
piece of hardware containing files the computer needs to start is called a boot device. After testing and ensuring boot devices are
functioning, BIOS loads the OS -- or key parts of it -- into the computer's random access memory (RAM) from a hard disk or
diskette drive (the boot device).
These tasks are each carried out by BIOS' four main functions:
1. Power-on self-test (POST). This tests the hardware of the computer before loading the OS.
3. Software/drivers. This locates the software and drivers that interface with the OS once running.
4. Complementary metal-oxide semiconductor (CMOS) setup. This is a configuration program that enable users to alter
hardware and system settings. CMOS is the name of BIOS' non-volatile memory.
Accessing BIOS
With BIOS, the OS and its applications are freed from having to understand exact details, such as computer hardware addresses,
about the attached I/O devices. When device details change, only the BIOS program needs to be changed. Sometimes, this
change can be made during system setup.
Users can access BIOS and configure it through BIOS Setup Utility. Accessing BIOS Setup Utility varies somewhat depending on
the computer being used. However, the following steps generally enable users to access and configure BIOS through Setup Utility:
When the computer turns back on, look for a message that says "entering setup" or something similar. Accompanying
that message will be a key that the user should press to enter system configuration. Here's an example message a user
might see: "Press [key] to enter BIOS setup." Some keys often used as prompts are Del, Tab, Esc and any of the
function keys (F1-F12).
Once in BIOS Setup Utility, users can change hardware settings, manage memory settings, change the boot order or boot device,
and reset the BIOS password, among other configuration tasks.
BIOS security
BIOS security is a somewhat overlooked component of cybersecurity; however, it should still be managed to prevent hackers from
executing malicious code on the OS. Security group Cylance, in 2017, showed how modern BIOS security flaws could enable
ransomware programs inside a motherboard's UEFI and exploit other PC BIOS vulnerabilities.
Another unique exploit involving the manipulation of BIOS was Plundervolt. Plundervolt could be used to mess with a computer's
power supply at the time data was being written to memory, causing errors that lead to security gaps. Intel released a BIOS patch
to defend against it.
BSOD
What is Bsod and how to fix it?
The BSOD is a warning you see when your computer interrupts operations and displays this warning on a blue screen. Officially,
it’s called a “Stop error.” The warning informs you of a critical issue that’s forcing Windows to reboot. Before rebooting, Windows
usually saves a “minidump” file on your computer, carrying data about the error. To fix BSOD, it's best to get your device checked
for software and hardware issues.
An input/output (I/O) device is any hardware used by a human operator or other systems to communicate with a computer. As the
name suggests, input/output devices are capable of sending data (output) to a computer and receiving data from a computer
(input).
Input devices allow users to interact with a computer by providing data or commands. Some common input devices include
keyboards, mice, microphones, webcams, and scanners.
Output devices allow users to see, hear, or otherwise perceive the results of the computer's processing. Some common output
devices include monitors, printers, speakers, and headphones.
I/O devices are essential for the operation of any computer system. They allow users to interact with the computer and provide the
computer with the data it needs to function.
A CMOS sensor is different—it's used by digital cameras to convert images into digital data.
Other Names for CMOS CMOS (pronounced see-moss) is sometimes referred to as Real-Time Clock (RTC), CMOS RAM, Non-
Volatile RAM (NVRAM), Non-Volatile BIOS memory, or complementary-symmetry metal-oxide-semiconductor (COSMOS).
CMOS is also an abbreviation for other terms that are unrelated to what's talked about on this page, like cellular management
operation system and comparison mean opinion score.
Clearing CMOS Most talk of CMOS involves clearing CMOS, which means to reset the BIOS settings to their default levels. This is
a really easy task that's a great troubleshooting step for many types of computer problems.
For example, maybe your computer is freezing up during the POST, in which case clearing the CMOS to reset the BIOS settings to
factory default levels, might be the easiest solution. Or maybe you need to clear CMOS to reset misconfigured BIOS settings to fix
certain hardware-related error messages, such as Code 29 errors.
Other CMOS errors revolve around low battery voltage, CMOS checksum, battery failure, and read error.
How BIOS and CMOS Work Together
The BIOS is a computer chip on the motherboard like CMOS except that its purpose is to communicate between the processor and
other hardware components like the hard drive, USB ports, sound card, video card, and more. A computer without a BIOS wouldn't
understand how these pieces of the computer work together. The BIOS firmware is also what performs the Power On Self Test to
test those pieces of hardware, and what ultimately runs the boot loader to launch the operating system.
Opening the CMOS setup is how you can change the settings it's storing, like the date and time and how the different computer
components are first started up. You can also use CMOS setup to disable/enable some hardware devices. CMOS chips are
desirable for battery-powered devices like laptops because they use less power than other types of chips. Although they use both
negative polarity circuits and positive polarity circuits (NMOS and PMOS), only one circuit type is powered on at a time. The Mac
equivalent to CMOS is PRAM, which stands for Parameter RAM. You can also reset your Mac's PRAM.
IP
OP devices
Primary and secondary storage devices:-
Difference between Primary and Secondary Memory – Comparison Table
Primary memory is used for temporarily storing data that is actively being used by the computer's CPU, while secondary memory
(storage) is used for long-term data storage, such as files and programs that are not currently in use. Listed below are some other
primary and secondary memory differences.
Comparison
Primary Memory Secondary Memory
Parameters
Data is stored inside costly Data is stored on external hardware devices like hard
Storage
semiconductor chips. drives, floppy disks, etc.
It saves the data that the computer It can save various types of data in various formats
Stored data
is currently using. and huge sizes.
History of Firmware:
Early days, every firmware was written in ROM (Read only memory). The problem raised to systems when that firmware gets
outdated and there was no option to update it because of the program of firmware written in ROM. So afterward firmware has now
started written on EPROM, EEROM which can be erased and reprogrammed. But another problem was there. These storage
devices are too expensive. Then cheap memory storage flash memory is used for writing the firmware.
Types of Firmware:
EEPROM is Electrically Erasable Programmable Read-Only Memory, it is a non-volatile memory chip, used in computers,
microcontrollers, and remote systems. It allows small bytes of data to be stored, erased, and reprogrammed. This article covers
everything about Electrically Erasable Programmable Read-Only Memory, also called EEPROM. This article covers the necessary
reason for the invention of EEPROM and the different memory interfaces of EEPROM.
Origin of EEPROM
EEPROM was developed from the standard technology of EPROM, which is most widely used in the late 1970s. Data is stored in
EPROM memory chips, which is mostly machine software; it is later erased by exposing the chip to UV light if the software needs to
be changed. This erasing process nearly takes an hour, and this was acceptable for development environments. These memories
could not be erased electrically, and an electrical arrangement to erase these memories would be more convenient.
In 1983, Intel developed a technology, modifying the existing technology EPROM. With the same attributes of EPROM, EEPROM is
developed in which memory can be erased and written again electrically. The first EEPROM device to be launched was Intel 2816.
Later many experienced EEPROM developers from Intel dropped and started their own company named Seeq.
To those who have experience with RAM, EEPROM is much slower compared to it, while erasing and writing. So, the data is stored
in EEPROM memory, such that it does not affect the operation of the overall system. In EEPROM the erase and write operations
are done on a byte per-byte basis. EEPROM uses the same technology used by EPROM memory. Even though the memory cell
configuration differs, the basic idea behind every memory cell is similar.
The memory cell has two transistors that are field effective:
· Storage transistor
· Access transistor
Storage transistor:
A storage transistor is also called a floating gate. Electrons are stored in this gate, the number of electrons that are present or
absent in this gate determines the data that has been stored.
Access transistor:
EEPROM uses serial and parallel interfaces for data input and output. The actual method in which the memory device is used
depends on the memory type and its interface.
The most commonly used serial interfaces are Microwire, I2P, SPI, and 1-Wire, UNI/O. The serial EEPROMs are difficult to
operate, as data is transferred in a serial fashion, this makes the process much slower than their parallel EEPROM interface.
An EEPROM serial protocol has three phases: OP-code phase, address phase, and data phase.
Every EEPROM device has its own set of OP–code instructions connected to different functions. Common operations performed by
Serial Peripheral Interface EEPROM devices are:
· Program
· Sector Erase
· Chip erase
EEPROM devices, which are in parallel have an address bus and an 8-bit data bus, which covers the entire memory. These
devices have chip-protect pins. Microcontrollers use parallel EEPROM. The operation of Parallel EEPROM is simple and efficient.
Parallel EEPROM is faster compared to serial EEPROM, but the size of these devices is huge because of the large pin count,
nearly 28 pins, so it has been used less, and serial EEPROM is used. Flash memory has better performance at a similar cost to
EEPROM, while serial EEPROM offers a small size.
Disadvantages of EEPROM
There are two major limitations in EEPROM, one is reliability. Due to this reason, EEPROM is used less, as other memory devices
provide better reliable memory storage. Limitations of EEPROM
· Data Endurance
· Data Retention
Conclusion
EEPROM is a type of ROM that can be erased and written. This can regain memory even without power. It is reprogrammable and
cost-effective. The data inside the chip can be erased and reprogrammed any number of times. The time that is taken to erase data
is between 5 to 10 milliseconds. Compared to other memory units, in EEPROM a particular byte of data can be erased and written,
without deleting the entire memory unit.
OS installation.
Troubleshooting and identifying issues with an operating system are essential for many IT professional companies and can be a
valuable skill for anyone in the tech sector. Furthermore, knowing operating systems and how to use them can give you an edge in
the competitive field of software development and engineering. Learning operating systems can help you stay ahead of the curve in
an ever-evolving technological world.
Desktop Operating systems: These are designed for use on personal computers. They contain all the utilities and
applications that the users might need. They are usually updated with the latest software versions to provide a better user
experience.
Mobile Operating systems: These are designed for use on cellular phones and other portable devices. They contain only the
essential software and minimalistic utilities. The advantage of using a mobile OS is that it is easier to update and maintain.
Server Operating systems are updated with the latest software versions, versioning to support multiple users, and security
features. They run applications such as email servers, file sharing servers, and web servers.
Operating systems provide a platform on which the users can carry out their various activities.
Operating systems are essential for the security and stability of the computer. They contain the latest security patches and
updates to protect the computer from malicious threats.
The table below lists the different types of operating systems that are commonly used.
The operating system for those computers which support only one computer. In this operating system, another user can not
interact with another working user. The core part of the single-user operating system is one kernel image that will run at a time i.e
there is no other facility to run more than one kernel image.
Advantages:
Disadvantages:
Advantages:
Uses less area in memory
Cost efficient
Disadvantage:
Less Optimized
Single-User Multi-Tasking: Operating system allows a single user to execute multiple programs at the same time, the single
user can perform multiple tasks at a time. This type of operating system is found on personal desktops and laptops. The most
popular single-user multi-tasking is Microsoft windows. This single-user multi-tasking can be pre-emptive or cooperative.
Pre-emptive: The operating system shares the central processing time by dedicating a single slot to each of the
programs.
Co-operative: This is attained by relying on each process to give time to other methods in a defined manner. Some
example taking photos while capturing video, a user can perform different tasks such as making calculations in excel
sheets.
Example: Windows, Mac
Advantages:
Time-saving
High productivity in less time frame
Less memory is used
Disadvantage:
Require more space
More complexity
An operating system is software that acts as an interface between the user and the computer hardware which does multiple
functions such as memory management; file management and processor management. The operating system should have to
meet the requirements of all its users in a balanced way so that if any problem would arise with a user, it does not affect any
other user in the chain.
In a multiuser operating system, multiple numbers of users can access different resources of a computer at the same time. The
access is provided using a network that consists of various personal computers attached to a mainframe computer system. A
multi-user operating system allows the permission of multiple users for accessing a single machine at a time. The various
personal computers can send and receive information to the mainframe computer system. Thus, the mainframe computer acts as
the server and other personal computers act as clients for that server.
Multi-user Operating system
Distributed system:
The distributed operating system also known as distributed computing is a collection of multiple computers located on different
computers. Communicate and coordinate their actions by passing messages to one another from any system. These all systems
emulate a single coherent system to the end user. The end user will communicate with them with the help of the network. This
system is divided in a way that multiple requests can be handled and in turn, the individual request can be satisfied eventually.
Examples: Electronic banking, Mobile apps
Time-sliced system:
It is the system where each user talk is allocated to a short span of cpu time. A small time duration is allotted to every task. CPU
time is divided into small time slices, and one time is assigned to each other. The decision to run the next piece of the job is
decided by the schedule. This schedule executes the run instructions that need to be executed. The user can take turns and thus
the operating system will handle the user’s request among the users who are connected. This feature is not applicable in the
single-user operating system. They use the mainframe system concurrently
Example: Mainframe, a partial exam of the time-sliced system.
Multi-processor system:
It involves multiple processors at a time. Enhance the overall performance. If one processor fails other continues
working. Example: Spreadsheets, Music player
Features:
The multi-user operating system has the following features:
Resource sharing: This maps to time slicing, multiple peripherals such as printers can be shared different files or
data.
Time-sharing
Background sharing
Invisibility: Many functions of multi-user operating systems are invisible to the user.
Advantages:
It helps in the sharing of data and information among different users.
It also helps in the sharing of hardware resources such as printers.
It avoids disruption if any one computer fails it does not affect any other computer present on that network.
Users can share their work with other users.
The multi-user operating system is very helpful in economic improvement.
Backing up data can be done in the multi-user operating system.
The services of the multi-user operating systems are very stable and systematic.
Disadvantages:
It requires expensive hardware to set up a mainframe computer
When multiple users log on or work on the same system it reduces the overall performance of the system.
Information is shared with the public so privacy becomes a concern here.
PLEASE PREPARE THESE TOPICS AND ALSO PLEASE DO SELF STUDY AS QUESTIONES MIGHT BE ASKED OUTSIDE
THESE TOPICS TOO....
what is harddrive &functions of hard drive
what is storage device and functions of storage devices
what is OS
what is LAN & WAN
what is BIOS & functions of bios
what are the input output components of comp
what is brain of computer
What is CPU and what are the functions
cust scenario - laptop / desktop not powering up - what is the 1st resolution u will give to the cust
laptop not getting connected to television - what is the first resolution - screen sharing
what would u do if every time u switch on the computer and date and time shows incorrect on ur computer
what is "no boot" process - Ans -No Boot means the computer powers on, successfully completes the Power-On Self-Test, and
displays the Dell logo onscreen but cannot access the operating system.
If computer does not boot up it could be several reasons if it is getting stucked at blue screen than bsod comes in picture or else
it can be a black screen issue as well
Everything stored on a hard drive is measured in terms of its file size. Documents (text) are generally very small whereas
pictures are large, music is even larger, and videos are the largest. A hard drive determines the size of digital files in terms of
megabytes (MB), gigabytes (GB), and terabytes (TB).
what is OS
Operating system
An operating system (OS) is system software that manages computer hardware and software resources and provides common
services for computer programs. Nearly every computer program requires an operating system to function. The two most
common operating systems are Microsoft Windows and Apple's macOS.
BIOS (basic input/output system) is the program a computer's microprocessor uses to start the computer system after it is
powered on. It also manages data flow between the computer's operating system (OS) and attached devices, such as the hard
disk, video adapter, keyboard, mouse and printer.
Input/Output Devices
A computer is an electronic device that operates data or information and can store, retrieve, and process data. Computers can be
used to create documents, play games, send emails, and browse the web. They are also used to edit or create spreadsheets,
presentations, and videos. To perform such useful operations on a computer, we need input and output devices to give
instructions to the system and receive information. Commonly used input and output devices include the keyboard, mouse,
scanner, printer, monitor, and speaker.
Share
The computer system is designed to perform tasks given by the user and produce results efficiently. It takes in the instructions (in
the form of inputs), performs the computing tasks (also known as processing) and gives back results (in the form of outputs). The
computer’s software is designed to do this task with the help of components of a computer, including an input unit, a processing
unit, and an output unit. The computer performs the tasks with the combination of input and output devices to give instructions to
the computer and receive the respective results of the operations performed.
Input Devices
An input device is a hardware device that takes instructions from the user and passes it to a processing unit, such as a CPU.
Input devices can transmit data to other devices by taking it from one device but cannot receive data—for example, the keyboard
or the mouse.
Monitor: It is a device through which we see and operate our software. All icons, text, and images are displayed here. We see all
the outputs on this screen.
Printer: It produces hard copies or prints of images, text, or documents on the computer.
Speakers: They yield output in the form of audio and allow users to listen to music, game sounds, etc. Speakers can be wired
and wireless.
Projector: It produces output by projecting images and videos on a big screen. When connected to a computer, the image on the
monitor will only be displayed on the screen.
Headphones: These devices also produce audio outputs but are only for personal use.
Input/Output Devices
An input/output device can perform the job of both input and output devices. In other words, it can receive data from other
devices or users (input) and send it to other devices (output).
CD/DVD drives: They copy data received from the computer and store it. They can also transfer data on the drive and pass it to
the computer’s storage
USB/Flash drives: They receive and send data from the computer to the drive and vice-versa
-
what are the input output components of comp
Central Processing Unit (CPU) ... The CPU is the brain of a computer, containing all the circuitry needed to process input, store
data, and output results.
cust scenario - laptop / desktop not powering up - what is the 1st resolution u will give to the cust
laptop not getting connected to television - what is the first resolution - screen sharing
What would u do if every time u switch on the computer and date and time shows incorrect on ur computer ?
>>To troubleshoot this issue, you can try the following steps:
Check the time zone settings on your laptop to make sure they are correct. To do this, right-click on the clock in the taskbar and
select "Adjust date/time". Then, make sure the correct time zone is selected.
Check the time synchronization settings in Windows. To do this, go to "Settings" > "Time & Language" > "Date & Time". Make
sure that "Set time automatically" is turned on, and that the correct time server is selected.
Check the CMOS battery (CR2032) on your laptop's motherboard. This battery is responsible for keeping the date and time
settings even when the laptop is turned off. If the battery is dead or dying, it could be causing this issue. You may need to replace
the battery to fix the problem.
what is "no boot" process - Ans - If computer does not boot up it could be several reasons if it is getting stuck at blue screen than
bsod comes in picture or else it can be a black screen issue as well
Apart from redX symbol the device manager may also display yellowX symbol what does that indicate??
>>>A red X indicates the device is not installed correctly or disabled by the user or administrator.
A yellow exclamation point indicates a problem with the device.
A VPN, or Virtual Private Network, is a service that helps protect your online privacy and security. It does a few things:
Encryption: It encrypts your internet traffic, which means your data is turned into a code that is unreadable without a decryption
key. This protects your information from hackers and other malicious entities.
Masking IP Address: A VPN masks your IP address, making your online actions practically untraceable. This is especially useful
for accessing content that might be geo-restricted.
Secure Connection: It creates a secure connection between your device and the VPN server. This means your browsing activity is
protected even when you're using public Wi-Fi.
it as a tunnel between your device and the internet, shielding you from prying eyes. How do you feel about online privacy?
Exactly, it’s like having your own secret passage on the internet. Online privacy, in my view, is like a fundamental right. With so
much of our lives being lived online, it’s critical to have some control over who gets to see our personal information and activities.
Do you take any other steps to protect your online privacy, like using strong passwords or two-factor authentication? I promise not
to snoop if you share!
Hard Disk Drive HDD
A hard disk drive (HDD) is an internal or external computer component that stores data, such as the operating system,
applications, and user files.
HDDs are “non-volatile” storage devices, meaning they retain stored data even when power isn't being supplied.
An HDD includes two main elements; a spinning platter and an actuator arm.
The platter is a circular magnetic disk containing tracks and sectors that retain data.
The actuator arm moves across the platter to read and write data.
The platter spins (hence the name) on a spindle to help speed up the read/write process as the actuator arm moves across it.
The data sectors are spread out randomly (also known as fragmented) across the platter, and below we'll discuss defragmenting a
hard drive to boost performance.
Here's what an internal HDD looks like beneath its metal casing. You can see the spinning platter and the actuator arm, and how
they work together to read and write the data upon request.
Instead of an HDD, newer computers are usually fitted with an SSD (solid state drive).
If you’d like to learn more, check out our article comparing SSDs and HDDs.
As time goes on, you may start to experience HDD lagging, with slow start-ups and longer load times.
You can help prevent this by occasionally doing a little maintenance work, which should improve performance immediately after
you follow these steps:
1. Defrag your hard disk drive – this reorganizes the data to store it sequentially for faster read times.
2. Delete temporary files – programs and apps can store temporary data that can take up a lot of storage space on your drive.
Depending on what Windows version you’re using, these steps may be slightly different:
a. In the search box on the taskbar, type disk cleanup, and select "Disk Cleanup."
b. Select the drive you want to clean up and select OK.
c. Under "Files to delete," select the file types you want to remove. You can also select a file type to read a description of what
it is.
d. Select OK when you have made your selections.
3. Remove unnecessary data – freeing space is a great way to improve storage performance. This could be deleting old programs
and apps you no longer use or moving photos, films and games over to an external storage device until you need them. These
are the steps to remove apps and programs, but this may differ depending on the Windows version in use:
a. In the search box on the taskbar, type programs, and select "Add or remove programs,"
b. Select the programs you want.
c. Then select “Remove.”
4. Enable write caching –this step enables the volatile memory (RAM) to collect data in a cache before writing it to the storage
device. The cache can process the data faster, resulting in fast load times. Again, these steps may differ depending on the windows
that you're using.
5. Upgrade your storage – the quickest way to improve performance is to upgrade to an SSD (solid state drive), which we'll talk
about in the next section.
You now have a good idea of how HDDs work, but there's also a new generation of computer storage available – the SSD.
SSDs are storage drives that fulfil the same purpose as an HDD, only using a more advanced technology.
Upgrading to a solid state drive can help boost the performance of your PC or laptop, but one thing to consider when doing so is
compatibility.
SSDs come in different forms, whether that be SATA or NVMe. The Crucial® System Selector or System Scannercan help you
find a suitable SSD for your computer.
External storage
If you want to increase your data capacity without replacing your internal hard disk, adding an external storage drive is a quick
and easy way to expand your storage capabilities.
What is an SSD?
An SSD, or solid-state drive, is a type of storage device used in computers. This non-volatile storage media stores persistent data
on solid-state flash memory. SSDs replace traditional hard disk drives (HDDs) in computers and perform the same basic functions
as a hard drive. But SSDs are significantly faster in comparison. With an SSD, the device's operating system will boot up more
rapidly, programs will load quicker and files can be saved faster.
A traditional hard drive consists of a spinning disk with a read/write head on a mechanical arm called an actuator. An HDD reads
and writes data magnetically. The magnetic properties, however, can lead to mechanical breakdowns.
By comparison, an SSD has no moving parts to break or spin up or down. The two key components in an SSD are the flash
controller and NAND flash memory chips. This configuration is optimized to deliver high read/write performance for sequential and
random data requests.
SSDs are used anywhere that hard drives can be deployed. In consumer products, for example, they are used in personal
computers (PCs), laptops, computer games, digital cameras, digital music players, smartphones, tablets and thumb drives. They
are also incorporated with graphics cards. However, they are more expensive than traditional HDDs.
Businesses with a rapidly expanding need for higher input/output (I/O) have fueled the development and adoption of SSDs.
Because SSDs offer lower latency than HDDs, they can efficiently handle both heavy read and random workloads. That lower
latency stems from the ability of a flash SSD to read data directly and immediately from stored data.
High-performance servers, laptops, desktops or any application that needs to deliver information in real-time can benefit from solid-
state drive technology. Those characteristics make enterprise SSDs suitable to offload reads from transaction-heavy databases.
They can also help to alleviate boot storms with virtual desktop infrastructure, or inside a storage array to store frequently used data
locally using a hybrid cloud.
An SSD reads and writes data to underlying interconnected flash memory chips made out of silicon. Manufacturers build SSDs by
stacking chips in a grid to achieve different densities.
SSDs read and write data to an underlying set of interconnected flash memory chips. These chips use floating gate transistors
(FGTs) to hold an electrical charge, which enables the SSD to store data even when it is not connected to a power source. Each
FGT contains a single bit of data, designated either as a 1 for a charged cell or a 0 if the cell has no electrical charge.
Every block of data is accessible at a consistent speed. However, SSDs can only write to empty blocks. And although SSDs have
tools to get around this, performance may still slow over time.
SSDs use three main types of memory: single-, multi- and triple-level cells. Single-level cells can hold one bit of data at a time -- a
one or zero. Single-level cells (SLCs) are the most expensive form of SSD, but are also the fastest and most durable. Multi-level
cells (MLCs) can hold two bits of data per cell and have a larger amount of storage space in the same amount of physical space as
a SLC. However, MLCs have slower write speeds. Triple-level cells (TLCs) can hold three bits of data in a cell. Although TLCs are
cheaper, they also have slower write speeds and are less durable than other memory types. TLC-based SSDs deliver more flash
capacity and are less expensive than an MLC or SLC, albeit with a higher likelihood for bit rot due to having eight states within the
cell.
Several features characterize the design of an SSD. Because it has no moving parts, an SSD is not subject to the same
mechanical failures that can occur in HDDs. SSDs are also quieter and consume less power. And because SSDs weigh less than
hard drives, they are a good fit for laptop and mobile computing devices.
In addition, the SSD controller software includes predictive analytics that can alert a user in advance of a potential drive failure.
Because flash memory is malleable, all-flash array vendors can manipulate the usable storage capacity using data reduction
techniques.
Quicker boot times and better performance. Because the drive does not need to spin up as an HDD would, it is more responsive
and provides better load performance.
Durability. SSDs are more shock-resistant and can handle heat better than HDDs because they do not have moving parts.
Power consumption. SSDs need less power to operate than HDDs due to their lack of moving parts.
Quieter. SSDs produce less audible noise because there are no moving or spinning parts.
Size. SSDs come in a variety of form factors whereas HDD sizes are limited.
Performance. Limitations on the number of write cycles cause SSDs to decrease in performance over time.
Storage options. Because of cost, SSDs are typically sold in smaller sizes.
Data recovery. This time-consuming process can be expensive, as the data on damaged chips may not be recoverable.
NAND and NOR circuitry differ in the type of logic gate they use. NAND devices use eight-pin serial access to data. Meanwhile,
NOR flash memory is commonly used in mobile phones, supporting 1-byte random access.
Compared with NAND, NOR flash offers fast read times, but is generally a more expensive memory technology. NOR writes data in
large chunks, meaning it takes longer to erase and write new data. The random-access capabilities of NOR are used for executing
code, while NAND flash is intended for storage. Most smartphones support both types of flash memory, using NOR to boot up the
operating system and removable NAND cards to expand the device's storage capacity.
Solid-state drives. Basic SSDs deliver the least performance. SSDs are flash devices that connect via Serial Advanced Technology
Attachment (SATA) or serial-attached SCSI (SAS) and provide a cost-effective first step into the solid-state world. For many
environments, the performance boost in sequential read speeds from a SATA or SAS SSD will suffice.
PCIe-based flash. Peripheral Component Interconnect Express-based flash is the next step up in performance. While these devices
typically offer greater throughput and more input/output operations per second, the biggest advantage is significantly lower latency.
The downside is that most of these offerings require a custom driver and have limited built-in data protection.
Flash DIMMs. Flash dual in-line memory modules reduce latency, going further than PCIe flash cards by eliminating the potential
PCIe bus contention. They require custom drivers unique to flash DIMMS, with specific changes to the read-only I/O system on the
motherboard.
NVMe SSDs. These SSDs use the non-volatile memory express (NVMe) interface specification. This accelerates data transfer
speeds between client systems and solid-state drives over a PCIe bus. NVMe SSDs are designed for high-performance non-
volatile storage and are well-suited for highly demanding, compute-intensive settings.
NVMe-oF. The NVMe over Fabrics protocol enables data transfers between a host computer and a target solid-state storage
device. NVMe-oF transfers data through methods such as Ethernet, Fibre Channel or InfiniBand.
Hybrid DRAM-flash storage. This dynamic random access memory (DRAM) channel configuration combines flash and server
DRAM. These hybrid flash storage devices address the theoretical scaling limit of DRAM and are used to increase throughput
between application software and storage.
SSD manufacturers offer diverse form factors. The most common form factor is a 2.5-inch SSD that is available in multiple heights
and supports SAS, SATA and NVMe protocols.
The Solid State Storage Initiative, a project of the Storage Networking Industry Association, identified the following three major SSD
form factors:
SSDs that come in traditional HDD form factors and fit into the same SAS and SATA slots in a server.
Solid-state cards that use standard add-in card form factors, such as those with a PCIe serial port card. A PCIe-connected SSD
does not require network host bus adapters to relay commands, which speeds the performance of storage. These devices include
the U.2 SSDs that are generally considered the eventual replacement for drives used in thin laptops.
Solid-state modules that reside in a DIMM or small outline dual in-line memory module. They may use a standard HDD interface
such as SATA. These devices are known as non-volatile DIMM (NVDIMM) cards.
Two types of RAM are used in a computer system: DRAM, which loses data when power is lost, and static RAM. NVDIMMs provide
the persistent storage a computer needs to recover data. They place flash close to the motherboard, but operations are carried out
in DRAM. The flash component fits into a memory bus for backup on high-performance storage.
Both SSDs and RAM incorporate solid-state chips, but the two memory types function differently within a computer system.
Two newer form factors worth noting are M.2 and U.2 SSDs. An M.2 SSD varies in length -- typically from 42 millimeters (mm) to
110 mm -- and attaches directly to a motherboard. It communicates via NVMe or SATA. The small size of an M.2 limits the surface
area for heat dissipation which, over time, will reduce its performance and stability. In enterprise storage, M.2 SSDs often are used
as a boot device. In consumer devices, such as notebook computers, an M.2 SSD provides capacity expansion.
A U.2 SSD describes a 2.5-inch PCIe SSD. These small form-factor devices were formerly known as SFF-8639. The U.2 interface
enables high-speed NVMe-based PCIe SSDs to be inserted in a computer's circuit board, without the need to power down the
server and storage.
SSD manufacturers
Crucial
Intel
Kingston Technology
Samsung
SanDisk
Seagate Technology
SK Hynix
These manufacturers produce and sell NAND flash chipsets to solid-state drive vendors. They also market branded SSDs based on
their own flash chips. Factors to consider when shopping for SSDs include:
Durability. Every SSD warranty covers a finite number of drive cycles, determined by the type of NAND flash. An SSD used only for
reads does not require the same level of endurance as an SSD intended to handle mostly writes.
Form factor. This determines if a replacement SSD works with existing storage and the number of SSDs that can fit in a single
chassis.
Interface. This determines maximum throughput and minimum latency thresholds, as well as the expansion capabilities of the SSD.
Manufacturers qualify their SSDs for NVMe, SAS and SATA.
Power usage. The drive interface also specifies the maximum power of an SSD, although many enterprise SSDs are engineered to
be tuned while in operation.
Historically, SSDs cost more than conventional hard drives. But due to improvements in manufacturing technology and expanded
chip capacity, SSD prices had been dropping, enabling consumers and enterprise customers to view SSDs as a viable alternative
to conventional storage. However, prices are increasing due to chip shortages and a general volatile market -- more recently in
2020 and 2021, due to COVID-19-related supply chain issues. Fluctuating demand for flash chips has kept pricing for SSDs
variable, but the price for an SSD remains higher than an HDD.
SSDs are considered much faster than the highest performing HDDs. Latency is also substantially reduced, and users typically
experience much faster boot times.
Several factors influence the lifespan of SSDs and HDDs, including heat, humidity and the effect of metals oxidizing inside the
drives. Data on both types of media will degrade over time, with HDDs generally supporting a higher number of drive writes per
day. Industry experts recommend storing unused or idle SSDs at low temperatures to extend their life.
The moving parts of HDDs increase the chance of failures. To compensate, HDD manufacturers have added shock sensors to
protect drives and other components inside PCs. This type of sensor detects if the machine is about to fall and takes steps to shut
down the HDD and related critical hardware.
Read performance of an HDD can suffer when data is split into different sectors on the disk. To repair the disk, a technique known
as defragmentation is used. SSDs do not store data magnetically, so the read performance remains steady, regardless of where
the data is stored on the drive.
SSDs have a set life expectancy, with a finite number of write cycles before performance becomes erratic. To compensate, SSDs
employ wear leveling, a process that extends the life of an SSD. Wear leveling is typically managed by the flash controller, which
uses an algorithm to arrange data so write/erase cycles are distributed evenly among all the blocks in the device. Another
technique, SSD overprovisioning, can help minimize the impact of garbage collection write amplification.
An embedded MultiMediaCard (eMMC) provides the onboard flash storage in a computer. It is installed directly on the computer
motherboard. The architecture includes NAND flash memory and a controller designed as an integrated circuit. EMMC storage is
typically found in cellphones, less expensive laptops and IoT applications.
An eMMC device delivers performance roughly equivalent to that of an SSD. But they differ in capacity, as a standard eMMC
typically ranges from 1 GB to 512 GB, and SSD sizes can range from 128 GB to multiple terabytes. This makes eMMCs best suited
for handling smaller file sizes.
In portable devices, an eMMC serves as primary storage or as an adjunct to removable SD and microSD multimedia cards.
Although this is the historical use of eMMC devices, they are increasingly deployed in sensors inside connected internet of things
devices.
Although not as widely used as a standard solid-state drive, an alternative is a hybrid hard drive (HHD). HHDs bridge the gap
between flash and fixed-disk magnetic storage and are used to upgrade laptops, both for capacity and performance.
HHDs have a conventional disk architecture that adds approximately 8 GB of NAND flash as a buffer for disk-based workloads.
As such, an HHD is best suited for computers with a limited number of applications. The cost of a hybrid hard drive is slightly less
than an HDD.
The earliest solid-state drives generally were designed for consumer devices. This changed in 1991 when SanDisk released the
first commercial flash-based SSD. Commercially designed SSDs were made with enterprise multi-level cell flash technology, which
enhanced write cycles.
The debut of the Apple iPod in 2005 marked the first notable flash-based device to broadly penetrate the consumer market.
Toshiba announced 3D V-NAND in 2007. 3D flash devices boost capacity and performance.
EMC -- now Dell EMC -- is credited with being the first vendor to include SSDs in enterprise storage hardware, adding the
technology to its Symmetrix disk arrays in 2008. This spawned the creation of hybrid flash arrays that combine flash drives and
HDDs.
Toshiba introduced triple-level cells in 2009. TLC flash is a type of NAND flash memory that stores three bits of data per cell.
IBM is considered the first major storage vendor to release a dedicated all-flash array platform, called FlashSystem, based on
technology from its acquisition of Texas Memory Systems in 2012. Around that time, Nimbus Data, Pure Storage, Texas Memory
Systems and Violin Memory began pioneering the adoption of all-flash arrays, relying on SSD storage to replace hard disks.
In 2012, EMC acquired XtremIO and now ships an all-flash system based on the XtremIO technology.
Components needed for using OS Virtualization in the infrastructure are given below:
The first component is the OS Virtualization server. This server is the center point in the OS Virtualization
infrastructure. The server manages the streaming of the information on the virtual disks for the client and also
determines which client will be connected to which virtual disk (using a database, this information is stored). Also the
server can host the storage for the virtual disk locally or the server is connected to the virtual disks via a SAN (Storage
Area Network). In high availability environments there can be more OS Virtualization servers to create no redundancy
and load balancing. The server also ensures that the client will be unique within the infrastructure.
Secondly, there is a client which will contact the server to get connected to the virtual disk and asks for components
stored on the virtual disk for running the operating system.
The available supporting components are database for storing the configuration and settings for the server, a
streaming service for the virtual disk content, a (optional) TFTP service and a (also optional) PXE boot service for
connecting the client to the OS Virtualization servers.
As it is already mentioned that the virtual disk contains an image of a physical disk from the system that will reflect to
the configuration and the settings of those systems which will be using the virtual disk. When the virtual disk is created
then that disk needs to be assigned to the client that will be using this disk for starting. The connection between the
client and the disk is made through the administrative tool and saved within the database. When a client has a
assigned disk, the machine can be started with the virtual disk using the following process as displayed in the given
below Figure:
First we start the machine and set up the connection with the OS Virtualization server. Most of the products offer
several possible methods to connect with the server. One of the most popular and used methods is using a PXE
service, but also a boot strap is used a lot (because of the disadvantages of the PXE service). Although each method
initializes the network interface card (NIC), receiving a (DHCP-based) IP address and a connection to the server.
When the connection is established between the client and the server, the server will look into its database for
checking the client is known or unknown and which virtual disk is assigned to the client. When more than one virtual
disk are connected then a boot menu will be displayed on the client side. If only one disk is assigned, that disk will be
connected to the client which is mentioned in step number 3.
After the desired virtual disk is selected by the client, that virtual disk is connected through the OS Virtualization server
. At the back-end, the OS Virtualization server makes sure that the client will be unique (for example computer name
and identifier) within the infrastructure.
As soon the disk is connected the server starts streaming the content of the virtual disk. The software knows which
parts are necessary for starting the operating system smoothly, so that these parts are streamed first. The information
streamed in the system should be stored somewhere (i.e. cached). Most products offer several ways to cache that
information. For examples on the client hard disk or on the disk of the OS Virtualization server.
Advertisement
5) Additional Streaming:
After that the first part is streamed then the operating system will start to run as expected. Additional virtual disk data
will be streamed when required for running or starting a function called by the user (for example starting an application
available within the virtual disk).
In other words, Virtualization is a technique, which allows to share a single physical instance of a resource or an application among
multiple customers and organizations. It does by assigning a logical name to a physical storage and providing a pointer to that
physical resource when demanded.
Creation of a virtual machine over existing operating system and hardware is known as Hardware Virtualization. A Virtual machine
provides an environment that is logically separated from the underlying hardware.
The machine on which the virtual machine is going to create is known as Host Machine and that virtual machine is referred as
a Guest Machine
Types of Virtualization:
1. Hardware Virtualization.
2. Operating system Virtualization.
3. Server Virtualization.
4. Storage Virtualization.
1) Hardware Virtualization:
When the virtual machine software or virtual machine manager (VMM) is directly installed on the hardware system is known as
hardware virtualization.
The main job of hypervisor is to control and monitoring the processor, memory and other hardware resources.
After virtualization of hardware system we can install different operating system on it and run different applications on those OS.
Usage:
Hardware virtualization is mainly done for the server platforms, because controlling virtual machines is much easier than controlling
a physical server.
Usage:
Operating System Virtualization is mainly used for testing the applications on different platforms of OS.
3) Server Virtualization:
When the virtual machine software or virtual machine manager (VMM) is directly installed on the Server system is known as server
virtualization.
Usage:
Server virtualization is done because a single physical server can be divided into multiple servers on the demand basis and for
balancing the load.
4) Storage Virtualization:
Storage virtualization is the process of grouping the physical storage from multiple network storage devices so that it looks like a
single storage device.
Usage:
Virtualization plays a very important role in the cloud computing technology, normally in the cloud computing, users share the data
present in the clouds like application etc, but actually with the help of virtualization users shares the Infrastructure.
The main usage of Virtualization Technology is to provide the applications with the standard versions to their cloud users,
suppose if the next version of that application is released, then cloud provider has to provide the latest version to their cloud users
and practically it is possible because it is more expensive.
To overcome this problem we use basically virtualization technology, By using virtualization, all severs and the software application
which are required by other cloud providers are maintained by the third party people, and the cloud providers has to pay the money
on monthly or annual basis.
Conclusion
Mainly Virtualization means, running multiple operating systems on a single machine but sharing all the hardware resources. And it
helps us to provide the pool of IT resources so that we can share these IT resources in order get benefits in the business.
Types of icons
Disabled device
A disabled device has either been manually disabled by a user or by some way of error. In Windows 95 through XP, this is denoted
by a red X. In Windows Vista and Windows 7, this was replaced by a grey downward pointing arrow in the lower right-hand corner
of the device's icon.
Error Codes
Cod
Meaning
e
3 The driver for this device may be corrupted, or the system may be running low on memory.
24 This device is not present, does not have all its drivers installed, or is not working properly.
29 The firmware of the device did not give it the required resources.
33 Windows cannot determine which resources are required for this device.
35 The computer's firmware does not include enough information to properly configure and use this device.
36 This device is requesting a PCI interrupt but is configured for an ISA interrupt (or vice versa).
38 Windows cannot run the driver for this device because a previous instance of the driver exists.
39 Windows cannot load the driver for this device. The driver may be corrupted or missing.
40 Windows cannot access this hardware because its service key information in the registry is missing or corrupted.
41 Windows successfully loaded the device driver for this hardware but cannot find the hardware device.
42 Windows cannot run the driver for this device because there is a duplicate device already running in the system.
46 Windows cannot gain access to this hardware device because the operating system is in the process of shutting down.
Windows cannot use this device because it has been prepared for safe removal, but it has not been removed from the
47
computer.
48 The driver for this device has been blocked from starting because it is known to have problems with Windows.
49 Windows cannot start new hardware devices because the system hive is too large and exceeds the Registry Size Limit.
Windows cannot verify the digital signature for the drivers required for this device. A recent hardware or software change
52
might have installed a file that is signed incorrectly or damaged.
An IP address represents an Internet Protocol address. A unique address that identifies the device over the network. It is almost
like a set of rules governing the structure of data sent over the Internet or through a local network. An IP address helps the Internet
to distinguish between different routers, computers, and websites. It serves as a specific machine identifier in a specific network
and helps to improve visual communication between source and destination.
IP address structure: IP addresses are displayed as a set of four digits- the default address may be 192.158.1.38. Each number
on the set may range from 0 to 255. Therefore, the total IP address range ranges from 0.0.0.0 to 255.255.255.255.
IP address is basically divided into two parts: X1. X2. X3. X4
1. [X1. X2. X3] is the Network ID
2. [X4] is the Host ID
1. Network ID–
It is the part of the left-hand IP address that identifies the specific network where the device is located. In the normal
home network, where the device has an IP address 192.168.1.32, the 192.168.1 part of the address will be the network
ID. It is customary to fill in the last part that is not zero, so we can say that the device’s network ID is 192.168.1.0.
2. Hosting ID–
The host ID is part of the IP address that was not taken by the network ID. Identifies a specific device (in the TCP / IP
world, we call devices “host”) in that network. Continuing with our example of the IP address 192.168.1.32, the host ID
will be 32- the unique host ID on the 192.168.1.0 network.
Version of IP address:
Currently there are 2 versions of IP addresses are in use i.e IPV4 and IPV6
1. IPV4 (Internet Protocol Version 4): It is the first version of Internet Protocol address. The address size of IPV4 is 32 bit
number. In this Internet Protocol Security (IPSec) with respect to network security is optional. It is having 4,294,967,296
number of address still we are seeing a shortage in network addresses as the use of network & virtual devices are
increasing rapidly.
2. IPV6 (Internet Protocol Version 6): It is the recent version of Internet Protocol address. The address size of IPV6 is 128
bit number. In this Internet Protocol Security (IPSec) with respect to network security is mandatory. It allows 3.4 x 10^38
unique IP addresses which seems to be more than sufficient to support trillions of internet devices present now or coming
in future.
IP Address Types:
There are 4 types of IP Addresses- Public, Private, Fixed, and Dynamic. Among them, public and private addresses are derived
from their local network location, which should be used within the network while public IP is used offline.
1. Public IP address–
A public IP address is an Internet Protocol address, encrypted by various servers/devices. That’s when you connect
these devices with your internet connection. This is the same IP address we show on our homepage. So why the second
page? Well, not all people speak the IP language. We want to make it as easy as possible for everyone to get the
information they need. Some even call this their external IP address. A public Internet Protocol address is an Internet
Protocol address accessed over the Internet. Like the postal address used to deliver mail to your home, the public
Internet Protocol address is a different international Internet Protocol address assigned to a computer device. The web
server, email server, and any server device that has direct access to the Internet are those who will enter the public
Internet Protocol address. Internet Address Protocol is unique worldwide and is only supplied with a unique device.
2. Private IP address–
Everything that connects to your Internet network has a private IP address. This includes computers, smartphones, and
tablets but also any Bluetooth-enabled devices such as speakers, printers, or smart TVs. With the growing internet of
things, the number of private IP addresses you have at home is likely to increase. Your router needs a way to identify
these things separately, and most things need a way to get to know each other. Therefore, your router generates private
IP addresses that are unique identifiers for each device that separates the network.
3. Static IP Address–
A static IP address is an invalid IP address. Conversely, a dynamic IP address will be provided by the Dynamic Host
Configuration Protocol (DHCP) server, which can change. The Static IP address does not change but can be changed as
part of normal network management.
Static IP addresses are incompatible, given once, remain the same over the years. This type of IP also helps you get
more information about the device.
4. Dynamic IP address–
It means constant change. A dynamic IP address changes from time to time and is not always the same. If you have a
live cable or DSL service, you may have a strong IP address. Internet Service Providers provide customers with dynamic
IP addresses because they are too expensive. Instead of one permanent IP address, your IP address is taken out of the
address pool and assigned to you. After a few days, weeks, or sometimes even months, that number is returned to the
lake and given a new number. Most ISPs will not provide a static IP address to customers who live there and when they
do, they are usually more expensive. Dynamic IP addresses are annoying, but with the right software, you can navigate
easily and for free.
Types of Website IP address:
Website IP address is of two types- Dedicated IP Address and Shared IP Address. Let us discuss the two.
1. Dedicated IP address–
A dedicated IP address is one that is unique for each website. This address is not used by any other domain. A dedicated
IP address is beneficial in many ways. It provides increased speed when the traffic load is high and brings in increased
security. But dedicated IPs are costly as compared to shared IPs.
2. Shared IP address–
A shared IP address is one that is not unique. It is shared between multiple domains. A shared IP address is enough for
most users because common configurations don’t require a dedicated IP.
IP Address Classification Based on Operational Characteristics:
According to operational characteristics, IP address is classified as follows:
1. Broadcast addressing–
The term ‘Broadcast’ means to transmit audio or video over a network. A broadcast packet is sent to all users of a local
network at once. They do not have to be explicitly named as recipients. The users of a network can open the data
packets and then interpret the information, carry out the instructions or discard it. This service is available in IPv4. The IP
address commonly used for broadcasting is 255.255.255.255
2. Unicast addressing–
This address identifies a unique node on the network. Unicast is nothing but one-to-one data transmission from one point
in the network to another. It is the most common form of IP addressing. This method can be used for both sending and
receiving data. It is available in IPv4 and IPv6.
3. Multicast IP addresses–
These IP addresses mainly help to establish one-to-many communication. Multicast IP routing protocols are used to
distribute data to multiple recipients. The class D addresses (224.0.0.0 to 239.255.255.255) define the multicast group.
4. Anycast addressing–
In anycast addressing the data, a packet is not transmitted to all the receivers on the network. When a data packet is
allocated to an anycast address, it is delivered to the closest interface that has this anycast address.