You are on page 1of 330

Wipro - IAS Desktop Certification

Reference Materials

Disclaimer: This document contains proprietary information of Wipro Ltd IAS. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, whether electronic, mechanical, photocopying, recording or otherwise, without the prior written permission of Wipro Ltd. IAS. The information contained herein is confidential to Wipro Ltd. IAS and its Service Partners, shall not be distributed to any persons other than those involved in the assessment & delivery of services. Wipro Ltd. IAS reserves the right to revise and update this document as and when required. Wipro Ltd. IAS reserves the right to withdraw the document excluding customer specific information at the time of termination of services. All product names referenced herein are trademarks of their respective companies.
2010 Wipro Ltd Internal & Restricted

Topics - Overview
Hardware Basics Troubleshooting Networking N Computing Peripherals Software Antivirus Endpoint Apps. Internet/Intranet Linux Basics Mail Clients Toolkit Unistall Windows OS Process Care, Handling & Best Practices Process Basics
Standard Installation Process

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

HARDWARE BASICS

2010 Wipro Ltd Internal & Restricted

HARDWARE BASICS DESKTOP TYPES

1.Intel Processor based PC - Intel & OEM based Mother Boards. Pentium & Celeron Based Processors. 2.AMD Processor Based PC (AMD based Processors.) - OEM based Mother Boards only. 3.Work Stations Thin Clients/Terminals. 4.Customised Small Form Factor PCs. Protos,Rural PC,NCOMP 5.Bundled Applications with the New PCs with Windows OS- Unistall 5 in 1 6.Super Genius Desktops(Windows Based OS) 7.IValue Desktops ( Linux Based OS)
4
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

HARDWARE BASICS DESKTOP COMPONENTS

MEMORY TYPES SDRAM DDR or DDR1 DDR2 DDR3 Power Supply(SMPS) 150 Watts 200 watts 250 watts 300 Watts 350 watts Processors Intel & AMD Processors

ADDON CARDS Network Interface Card (NIC) Video Graphics Adapter (VGA) Modem Cards.. Serial/Parallel Port card Housing ATX HOUSING MATX HOUSING SFF HOUSING Mother Boards Intel and Non-Intel M/B

CD-ROM /DVD ROM /CD-RW/DVDRW IDE and SATA Drive types

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

HARDWARE BASICS DESKTOP COMPONENTS


Processor: The microprocessor, or central processing unit (CPU) as it is known, is the brain and heart of any Microcomputer system. Intel makes most CPUs. In fact, Intel is the company that came up with the name Pentium. Pentium 2, Pentium 3, Pentium 4, Dual Core & Core 2 Duo. Intel actually makes a less expensive version of the Pentium as well, which it calls the Celeron. AMD and VIA Technologies are the two other well-known CPU manufacturers. Their CPUs are less expensive and use a different naming system such as the AMD Athlon : AMD ATHLON PROCESSOR Speed : 850 MHz to 3 GHz + It is equivalent to Pentium processors but less expensive. AMD Duron : AMD Duron Processor Speed 700 MHz to 800MHz Similar to Intels Celeron Processor. It has lesser built-in memory

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

HARDWARE BASICS DESKTOP COMPONENTS

Housing/Chassis AT Housing ATX Housing SFF Housing

Input/Output Devices Keyboard, Mouse, Monitors Printers, Camera, Micro Phone, Head Phones/Speaker, Scanners, Printers, Plotters etc.

Power Supply: Supplies power throughout the computer. Power supplies converts potentially lethal 110-115 or 220-230 volt alternating current (AC) into a steady low-voltage direct current (DC) usable by the computer. A power supply is rated by the number of watts it generates.

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

HARDWARE BASICS DESKTOP COMPONENTS


Floppy Disk Drive: Originally created in 1967 by IBM . The floppy reference is derived from the floppy media that is encased within the protective casing.

Optical Drives:
CD-ROM : A CD-ROM (Compact Disk Read Only Memory) is a drive which reads aluminum-coated round plastic discs however does not write to the discs invented in the United States 1972 OTHER CD TECHNOLOGIES: CD-R /- (CD Recordable) Drive which you are able to write to once. Once the drive is written to it cannot be erased. CD-RW - (CD ReWritable) drive which is a popular alternative to the CD-R drive. CD-RW has the capability of being written to at least one thousand times.
8
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

HARDWARE BASICS DESKTOP COMPONENTS

DVD (Digital Versatile Disc or Digital Video Disc) - Is the new future of computer CD-ROM drives. DVD drives became a new computer standard September of 1995 The DVD technology is very different from the technology used in standard CD-ROM drives. DVD uses shorter wavelength lasers to read smaller pits and lands. Discs also have two layers the first layer is semi-reflective to allow the laser to penetrate it and get to the substance beneath it. DVD drives also spin at a base speed that is about three times as fast as a single speed CD-ROM drive. DVD-ROM : DVD-RAM will be capable of holding 2.6GB per side. DVD-RW : Standard of ReWritable DVD discs being promoted by Hewlett Packard , is capable of holding 4.7 GB of data.

DIVIX: (Digital video express) - New DVD-ROM which was developed and promoted by several large companies including Disney, Dreamworks SKG, The Divix player is more expensive then a standard DVD drive
9
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

HARDWARE BASICS Data Transfer Speeds CD-ROM

Common data transfer speeds for CD-ROM drives Transfer speed 1 2 KiB/s 150 300 Mbit/s 1.23 2.46 200-500 400-1,000 RPM

4
8 10 12 20 32 36 40 48 52 56 72 1,200-3,000 1,920-4,800 2,160-5,400 2,400-6,000 2,880-7,200 3,120-7,800 3,360-8,400 6,750-10,800

600 1,200
1,500 1,800 up to 24.6 up to 39.3 up to 44.2 up to 49.2 up to 59.0 up to 63.9 up to 68.8 up to 88.5

4.92 9.83
12.3 14.7

800-2,000 1,600-4,000
2,000-5,000 2,400-6,000 4,000 (CAV) 4,800 (CAV) 7,200 (CAV) 8,000 (CAV) 9,600 (CAV) 10,400 (CAV) 11,200 (CAV) 2,000 (multi-beam

10

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

HARDWARE BASICS DESKTOP COMPONENTS


SATA HDD SATA DATA CABLE

SATA POWER CABLE

IDE HDD

IDE DATA CABLE

11

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

HARDWARE BASICS DESKTOP COMPONENTS


Desktop Computer Housing Desktop computer cases are the home to all the computer components. Everything including the motherboard, the hard drive, the cd drive, the floppy drive and the power supply go inside a computer case. Computer cases can be different colors and in recent years some have become fancy. Extras, such as front USB have become popular as well. Computer Memory RAM (Random Access Memory) or Computer Memory is another very important component to a computer. Computer Memory is a volatile storage device meaning that when the computer is switched off everything stored on this temporary storage device will be lost. The more computer memory, the better the computer will run and the better it will handle programs and software. RAM is now generally measured in Mhz, and most commonly seen in the types of SDRAM, DDRRAM, DDR2 & DDR3 Hard Drive The hard drive is a permanent storage device. Without a Hard Disk Drive no operating system and would be of very little use. All the information on your computer including the operating system (eg. windows XP), programs and files will be stored on the Hard Drive. Hard Drives Capacity is measured in Gigabytes (one billion bytes).
12
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

HARDWARE BASICS - DESKTOP COMPONENTS


CD/DVD Drives CD/DVD Drives are another storage device in a computer. CD Drives are used to read CD's with information on them such as an operating system, programs or data files. Recently CD-RW and DVD-RW have been included in computers meaning that it is possible to write data to blank disks. CD Drives are measured by their read and write speeds. Video Cards A video card is another compulsory component in a computer. The information goes into the video card and then is transmitted to the monitor where the information is displayed. Motherboards have the graphics card built in, but to get higher resolutions need a seperate card that plugs into the motherboard. Sound Card A sound card translates signals into sounds that can be played back through speakers. Many motherboards have a sound card incorporated in the motherboard.

13

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

HARDWARE BASICS - DESKTOP COMPONENTS


Monitors Computer monitors are another compulsory unit of a computer system. It is possible for the computer to function correctly without a monitor but there would be very little point as you cannot see anything. The computer monitor connects to the graphics card and it displays a picture on the screen. Computer monitors come in two types: CRT (Cathode Ray Tube) which are block monitors and LCD (Liquid Crystal Display) which are very thin. Network Card A Computer Network Card or a LAN (Local Area Network) card is increasingly becoming more and more necessary in world of broadband internet and home networking. LAN ports are often incorporated on the motherboard and it is used for networking computers together or for connecting through a router to the World Wide Web. Other Components There are many other computer hardware components that can be placed onto the motherboard in the PCI-slots. These include, firewire cards, USB cards, TV tuners, and many other components that are specific to their personal needs.
14
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

HARDWARE BASICS OLDER MOTHERBOARD

15

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

HARDWARE BASICS INTEL CORE2 DUO BOARDS


LABEL COMPONENTS 1.LGA775 socket for Intel Kensfield/ Yorkfield/Wolfdale/Core 2 Duo CPUs 2. CPU_FAN CPU cooling fan connector 3. DIMM1~4 240-pin DDR2 SDRAM slots 4. JP4 Reserve header 5. FDD Floppy disk drive connector 6. ATX_POWER1 Standard 24-pin ATX power connector 7. SATA1~6 Serial ATA connectors 8. PANEL1 Front panel switch/LED header 9. MFG UNLOCK ME BIOS protect header 10. USB2~4 Front panel USB headers 11. CHS1 Chassis detect header 12. CLR_CMOS Clear CMOS jumper 13. COM2 Onboard Serial port header 14. SPDIFO SPDIF out header 15. SPK Speaker header 16. AUDIO1 Front panel audio header 17. PCI1~2 32-bit add-on card slots 18. PCIEX1 PCI Express x1 slot 19. PCIEX16 PCI Express slot for graphics interface 20. ATX12V1 Auxiliary 4-pin power connector 21. SYS_FAN System cooling fan connector

16

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

HARDWARE BASICS INTEL P3 BOARDS

17

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Processor
The processor (CPU, for Central Processing Unit) is the computer's brain. It allows the processing of numeric data, meaning information entered in binary form, and the execution of instructions stored in memory. Hyper threading is the technology used in processors which enables one processor to act as a multiple processor. In multi-core architecture, more than one processors are integrated in one physical packaging.
Current Processors:
Dual Core & Core 2 Duo Runs two independent processor cores in one physical package at the same frequency.

Quad Core: Runs 4 independent processor cores in one physical package at the same frequency.

18

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Dual Core v/s Core 2 Duo

Dual Core
Clock Speed Up to 2.33 GHz speed

Core 2 Duo
Greater clock speeds of upto 3.33 GHz is available now.

Power Consumption

Extremely power efficient with max TDP of 15Watts.

Power efficient processor with max TDP of 65Watts.

Cache Support

Max 2MB L2 cache is available.

Can get a max of 6MB L2 cache for Core 2 Duo.

FSB Speed

Max of 667 MHz speed is available.

It is available with front side bus speeds of upto 1333 MHz.

Cost

These processors are priced from $40 to $140 for different versions of processors Low cost

These processors are priced from $120 to $270 for different versions of processors Higher Cost

Over-locking

They can be easily overclocked up to 4.0 GHz with suitable coolers. Even a overclocking at 6.0GHz was made possible with Liquid Nitrogen cooling.

Can be overclocked upto 20-30% of its specified clock speed without much problem.

19

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

HARDWARE BASICS INPUT/OUTPUT DEVICES

Printers: Printer is an electro-mechanical device that receives data from the PC in the form of binary coded characters and prints the characters on the paper

20

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

HARDWARE BASICS INPUT/OUTPUT DEVICES

Output Devices: Monitor, Printer Display Units: CRT: Cathode Ray Tube Color monitors have 3 electron guns that control the display of red, green and blue light. The surface of the CRT is arranged to have these dots placed adjacently in a specific pattern.

LCD: They are lighter, thinner, use less power and do not flicker like their CRT counterparts. LCD should be avoided to extreme light, heat and cold.

21

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

HARDWARE BASICS SATA VS IDE


The SATA cable or Serial ATA cables are only 7 pins wide compared to the IDE Ribbon Cable which is 40 pins. The SATA cables are also longer then the ribbon cables (some up to 1m) which make them more useful in large cases. The PATA or IDE cables are only 45cm long and can connect two hard drives to the M/B while the SATA cable connects only one hard drive to the motherboard. Speed IDE (PATA) transfers data from the speeds of 5MB/sec up to 133MB/Sec (ATA100/133). SATA however data transfer speeds range from 150MB/sec to SATA II which doubles it to 300MB/sec. Jumpers With the IDE cable you need to always mess around with the jumpers since their may be two hard drives or two CD drives or one of each on the one cable. With SATA there is only the one cable so there are no jumpers to mess around with. Summary In summary of SATA vs IDE, the SATA cable is smaller, faster and therefore better. It can reach further than a IDE cable and will also reduce the obstruction to air cooling which IDE cables can contribute to. The cables also transfer data much faster ( if you have two or more hard drives) and are easier to install since their are no jumpers. The only LIMITATION of the SATA is that they easily fall out of their positions and that you can only have one drive per cable.
22
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

HARDWARE BASICS IRDA

In information and communications technology , a standard for communication between devices (such as computers, PDAs and mobile phones) over short distances using infrared signals IrDA is a very short-range example of free space optical communication. IrDA interfaces are used in medical instrumentation, test and measurement equipment, palmtop computers, mobile phones, and laptop computers (most laptops and phones also offer Bluetooth but it is now becoming more common for Bluetooth to simply replace IrDA in new versions of products). For the devices to communicate via IrDA they must have a direct line of sight similar to a TV remote control IrDA was popular on laptops and some desktops during the late 90s through the early 2000s. However, it has been displaced by other wireless technologies such as WiFi and Bluetooth, favored because they don't need a direct line of sight, and can therefore support hardware such as mice and keyboards. It is still used in some environments where interference makes radio-based wireless technologies unusable. IrDA popularity is making a comeback with its highly efficient IrSimple protocols by providing sub 1 second transfers of pictures between cell phones, printers, and display devices. IrDA hardware is still less expensive and doesn't share the same security problems encountered with wireless technologies such as Bluetooth IrDA data communications operate in half-duplex mode because while transmitting, a devices receiver is blinded by the light of its own transmitter, and thus, full-duplex communication is not feasible. The two devices that communicate simulate full duplex communication by quickly turning the link around
23
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

HARDWARE BASICS USB


The Universal Serial Bus (USB) is a standard for peripheral devices. USB was intended to make it fundamentally easier to connect external devices to PCs by replacing the multitude of connectors at the back of PCs, Of Late Can be connected in the Front side of the Housing. Simple Connections as well as permitting greater bandwidths for external devices. The first silicon for USB was made available by Intel in 1995.[5] The USB 1.0 specification was introduced in January 1996. The original USB 1.0 specification had a data transfer rate of 12 Mbit/s.[5] The first widely used version of USB was 1.1, which was released in September 1998. It allowed for a 12 Mbps data rate for higher-speed devices such as disk drives, and a lower 1.5 Mbps rate for low bandwidth devices such as joysticks.[6] The USB 2.0 specification was released in April 2000 and was standardized by the USB-IF at the end of 2001. Hewlett-Packard, Intel, Lucent Technologies (now Alcatel-Lucent following its merger with Alcatel in 2006), NEC and Philips jointly led the initiative to develop a higher data transfer rate, with the resulting specification achieving 480 Mbit/s, a fortyfold increase over 12 Mbit/s for the original USB 1.0. data.
24
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

HARDWARE BASICS USB


Bluetooth is an open wireless technology standard for exchanging data over short distances (using short length radio waves) from fixed and mobile devices, creating personal area networks (PANs) with high levels of security. SERIAL PORT is a serial communication physical interface through which information transfers in or out one bit at a time. serial port" usually identifies hardware more or less compliant to the RS-232 standard, intended to interface with a modem or with a similar communication device. PARALLEL PORT is a type of interface found on computers (personal and otherwise) for connecting various peripherals. In computing, a parallel port is a parallel communication physical interface. It is also known as a printer port or Centronics port. The IEEE 1394 interface is a serial bus interface standard for high-speed communications (400 Mbps) and real-time data transfer, frequently used by personal computers, as well as in digital audio/l video, automotive, and aeronautics applications. The interface is also known by the brand names of FireWire (Apple), i.LINK (Sony), and Lynx (Texas Instruments). IEEE 1394 replaced parallel SCSI in many applications, because of lower implementation costs and a simplified, more adaptable cabling system
25
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

HARDWARE BASICS - MOTHERBOARD


Motherboard or main board is at the center of the PC computer system. Effectively it is a board containing the central processing unit (CPU) and the memory modules (SIMMs/ DIMMs). It allows the CPU to interfaces with other parts of the computer via a 'BUS' system, into which sockets /connectors are fitted, for connection of various 'expansion' boards. Also on the motherboard is the RAM memory, normally in the form of SIMM, or DIMM modules in the modern PC computer, and cache memory in the form of integrated circuits (chips).. Modern boards utilize a CPU with two PCI and three, PCIE expansion slots. Most of the features like Video,Audio,LAN etc are on onboard itself. This free's up a couple of expansion slots for other devices Motherboard and System Devices The motherboard is, in many ways, the most important component in the computer If the processor is the brain of the computer, then the motherboard and its major components (the chipset, BIOS, cache, etc.) are the major systems that this brain uses to control the rest of the computer. Direct memory access (DMA) is a feature that allows certain hardware subsystems within the computer to access system memory for reading and/or writing independently of the central processing unit. Many hardware systems use DMA including disk drive controllers, graphics cards, network cards and sound cards..
26
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

HARDWARE BASICS - MOTHERBOARD


Control: The motherboard contains the chipset and BIOS program, which controls most of the data flow within the computer. Communication: Almost all communication between the PC and its peripherals, other PCs, and you, the user, goes through the motherboard. Processor Support: Choice of processor for use in the system is based on the Motherboard.. Second, the quality of the motherboard circuitry and chipset themselves have an impact on performance. Peripheral Support: The motherboard determines, in large part, what types of peripherals you can use in your PC. For example, the type of video card your system will use (ISA, VLB, PCI.PCIE) is dependent on what system buses your motherboard uses. Northbridge typically handles communications among the CPU, RAM, BIOS ROM, and PCI Express (or AGP) video cards, and the south bridge. Some north bridges also contain integrated video controllers, also known as a Graphics and Memory Controller Hub (GMCH) in Intel systems. Southbridge also known as an I/O controller hub (ICH) in Intel systems (AMD, VIA, SiS and others usually use 'south bridge'), is a chip that implements the "slower" capabilities of the motherboard in a Northbridge / Southbridge chipset computer architecture.
27
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

HARDWARE BASICS - MOTHERBOARD

Performance: First and foremost, the motherboard determines what types of processors, memory, system buses, and hard disk interface speed your system can have, and these components dictate directly your system's performance. Second, the quality of the motherboard circuitry and chipset themselves have an impact on performance. Upgradability: The capabilities of your motherboard dictate to what extent you will be able to upgrade your machine. For example, there are some motherboards that will accept regular Pentiums of up to 133 MHz speed only, while others will go to 200 MHz. Obviously, the second one will give you more room to upgrade if you are starting with a P133. for a new motherboard, you need to open up your existing case and determine whether or not the power supply will be compatible. Many new motherboards require an additional 12V, 4-wire connector for the CPU, which most power supplies older than two years will lack. The newest motherboards for the Intel Socket 775 CPU's may also require a 24 pin ATXe connector, or give you the option to use a third drive connector to suppliment motherboard power.

28

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

HARDWARE BASICS - MOTHERBOARD


Motherboard Form Factors The form factor of the motherboard describes its general shape, what sorts of cases and power supplies it can use, and its physical organization. For example, a company can make two motherboards that have basically the same functionality but that use a different form factor, and the only real differences will be the physical layout of the board, the position of the components, etc. Form Factors Type:AT &BABY AT ATX & Mini ATX NLX & LPX AT and Baby AT Up until recently, the AT and baby AT form factors were the most common form factor in the motherboard world. These two variants differ primarily in width: the older full AT board is 12" wide. This means it won't typically fit into the commonly used "mini" desktop or minitower cases. There are very few new motherboards on the market that use the full AT size. It is fairly common in older machines, 386 class or earlier. One of the major problems with the width of this board (aside from limiting its use in smaller cases) is that a good percentage of the board "overlaps" with the drive bays. This makes installation, troubleshooting and upgrading more difficult.
29
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

HARDWARE BASICS - MOTHERBOARD


Integrated PS/2 Mouse Connector: On most retail baby AT style motherboards, there is either no PS/2 mouse port, or to get one you need to use a cable from the PS/2 header on the motherboard, just like the serial and parallel ports. (Of course most large OEMs have PS/2 ports built in to their machines, since their boards are custom built in large quantities). ATX motherboards have the PS/2 port built into the motherboard. Reduced Drive Bay Interference: Since the board is essentially "rotated" 90 degrees from the baby AT style, there is much less "overlap" between where the board is and where the drives are. This means easier access to the board, and fewer cooling problems. Reduced Expansion Card Interference: The processor socket/slot and memory sockets are moved from the front of the board to the back right side, near the power supply. This eliminates the clearance problem with baby AT style motherboards and allows full length cards to be used in most (if not all) of the system bus slots. Better Power Supply Connector: The ATX motherboard uses a single 20-pin connector instead of the confusing pair of near-identical 6-pin connectors on the baby AT form factor. You don't have the same risk of blowing up your motherboard by connecting the power cables backwards that most PC homebuilders are familiar with.
30
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

HARDWARE BASICS - MOTHERBOARD


"Soft Power" Support: The ATX power supply is turned on and off using signaling from the motherboard, not a physical toggle switch. This allows the PC to be turned on and off under software control, allowing much improved power management. For example, with an ATX system you can configure Windows 95 so that it will actually turn the PC off when you tell it to shut down. 3.3V Power Support: The ATX style motherboard has support for 3.3V power from the ATX power supply. This voltage (or lower) is used on almost allnewer processors, and this saves cost because the need for voltage regulation to go from 5V to 3.3V is removed. Better Air Flow: The ATX power supply is intended to blow air into the case instead of out of it. This means that air is pushed out of all the small cracks in the PC case instead of being drawn in through them, cutting down on dust accumulation. Further, since the processor socket or slot is on the motherboard right next to the power supply, the power supply fan can be used to cool the processor's heat sink. In many cases, this eliminates the need to use (notoriously unreliable) CPU fans, though the ATX specification now allows for the fan to blow either into or out of the case. Improved Design for Upgradability: Its design makes upgrading easier because of more efficient access to the components on the motherboard.
31
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

HARDWARE BASICS - MOTHERBOARD

Conventionally used in mass-produced "name brand" retail systems, the LPX motherboard form factor goes into the small Slim line or "low profile" cases typically found on these sorts of desktop systems. The primary design goal behind the LPX form factor is reducing space usage (and cost). This can be seen in its most distinguishing feature: the riser card that is used to hold expansion slots. Instead of having the expansion cards go into system bus slots on the motherboard, like on the AT or ATX motherboards, LPX form factor motherboards put the system bus on a riser card that plugs into the motherboard. Then, the expansion cards plug into the riser card; usually, a maximum of just three. This means that the expansion cards are parallel to the plane of the motherboard. This allows the height of the case to be greatly reduced, since the height of the expansion cards is the main reason full-sized desktop cases are as tall as they are. The problem is that you are limited to only two or three expansion slots!
32
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

HARDWARE BASICS - MOTHERBOARD

LPX form factor motherboards also often come with on board video display adapter cards built into the motherboard. If the card built in is of good quality, this can save the manufacturer money and provide the user with a good quality display However, if the user wants to upgrade to a new video card, this can cause a problem unless the integrated video can be disabled in the Bios setup. LPX motherboards also usually come with serial, parallel and mouse connectors attached to them, like ATX. While the LPX form factor can be used by a manufacturer to save money and space in the construction of a custom product, these systems suffer from non-standardization, poor expandability, poor upgradability, poor cooling and difficulty of use for the do-it-yourselfer. They are not recommended for the homebuilder, but if you are upgrading one of these systems, you may not have many alternatives.
33
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

HARDWARE BASICS - MOTHERBOARD

Revised design to support larger memory modules and modern DIMM memory packaging. Support for the newest processor technologies Support for AGP/PCIE video/add-on cards. Better thermal characteristics, to support modern CPUs that run hotter than old ones. More optimal location of CPU on the board to allow easier access and better cooling. More flexibility in how the motherboard can be set up and configured. Enhanced design features, such as the ability to mount the motherboard so it can slide in or out of the system case easily. Support for desktop and tower cases. The NLX form factor is, like the LPX, designed primarily for commercial PC makers mass-producing machines for the retail market. Many of the changes made to it are based on improving flexibility to allow for various PC options and flavors, and to allow easier assembly and reduced cost. For homebuilders and small PC shops, the ATX form factor is the design of choice heading into the future. Data Transfer between memory & peripherals is been controlled by DMA Controllers which will not impact any processor performance.
34
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

HARDWARE BASICS - MOTHERBOARD

System Boot Sequence

The system BIOS is what starts the computer running when you turn it on. The following are the steps that a typical boot sequence involves. Of course this will vary by the manufacturer of your hardware, BIOS, etc., and especially by what peripherals you have in the PC. Here is what generally happens when you turn on your system power: The internal power supply turns on and initializes. The power supply takes some time until it can generate reliable power for the rest of the computer, and having it turn on prematurely could potentially lead to damage. Therefore, the chipset will generate a reset signal to the processor (the same as if you held the reset button down for a while on your case) until it receives the Power Good signal from the power supply.

35

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

HARDWARE BASICS - MOTHERBOARD

The BIOS performs the power-on self test (POST). If there are any fatal errors, the boot process stops. The BIOS looks for the video card. In particular, it looks for the video card's built in BIOS program and runs it. This BIOS is normally found at location C000h in memory. The system BIOS executes the video card BIOS, which initializes the video card. Most modern cards will display information on the screen about the video card. (This is why on a modern PC you usually see something on the screen about the video card before you see the messages from the system BIOS itself). The BIOS then looks for other devices' ROMs to see if any of them have BIOS. Normally, the IDE/ATA hard disk BIOS will be found at C8000h and executed. If any other device BIOS are found, they are executed as well. The BIOS displays its startup screen The BIOS does more tests on the system, including the memory count-up test, which you see on the screen. The BIOS will generally display a text error message on the screen if it encounters an error at this point.

36

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

HARDWARE BASICS - MOTHERBOARD

The BIOS performs a "system inventory" of sorts, doing more tests to determine what sort of hardware is in the system. Modern BIOS have many automatic settings and will determine memory timing (for example) based on what kind of memory it finds. Many BIOS can also dynamically set hard drive parameters and access modes, and will determine these at roughly this time. Some will display a message on the screen for each drive they detect and configure this way. The BIOS will also now search for and label logical devices (COM and LPT ports). If the BIOS supports the Plug and Play standard, it will detect and configure Plug and Play devices at this time and display a message on the screen for each one it finds The BIOS will display a summary screen about your system's configuration. Checking this page of data can be helpful in diagnosing setup problems, although it can be hard to see because sometimes it flashes on the screen very quickly before scrolling off the top. The BIOS begins the search for a drive to boot from. Most modern BIOS contain a setting that controls if the system should first try to boot from the floppy disk (A:) or first try the hard disk (C:). Some BIOS will even let you boot from your CD-ROM drive or other devices, depending on the boot sequence BIOS setting.
37
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

HARDWARE BASICS - MOTHERBOARD


BIOS looks for boot information to start the operating system boot process. If it is searching a hard disk, it looks for a master boot record at cylinder 0, head 0, sector 1 (the first sector on the disk); if it is searching a floppy disk, it looks at the same address on the floppy disk for a volume boot sector. If it finds what it is looking for, the BIOS starts the process of booting the operating system, using the information in the boot sector. At this point, the code in the boot sector takes over from the BIOS. If the first device that the system tries (floppy, hard disk, etc.) is not found, the BIOS will then try the next device in the boot sequence, and continue until it finds a bootable device. If no boot device at all can be found, the system will normally display an error message and then freeze up the system with the error "No boot device available" This will also happen if you have a bootable hard disk partition but forget to set it active. This process is called a "cold boot" (since the machine was off, or cold, when it started). A "warm boot" is the same thing except it occurs when the machine is rebooted using Ctrl+Alt+Delete or similar. In this case the POST is skipped and the boot process continues roughly at step 8 above
38
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

HARDWARE BASICS - MOTHERBOARD

Power-On Self Test (POST) :The first thing that the BIOS does when it boots the PC is to perform what is called the Power-On Self-Test, or POST for short. The POST is a built-in diagnostic program that checks your hardware to ensure that everything is present and functioning properly, before the BIOS begins the actual boot. It later continues with additional tests (such as the memory test that you see printed on the screen) as the boot process is proceeding. The POST runs very quickly, and you will normally not even noticed that it is happening--unless it finds a problem. You may have encountered a PC that, when turned on, made beeping sounds and then stopped without booting up. That is the POST telling you something is wrong with the machine. The speaker is used because this test happens so early on, that the video isn't even activated yet! These beep

39

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

HARDWARE BASICS - Processors


Core 2 Quad 1333 FSB ( Q9XXX) Core 2 Duo 1333 FSB ( E8XXX) Core 2 Duo 1066FSB ( E7XXX) Core 2 Quad 1066 FSB ( Q6XXX) Core 2 Duo 1333 FSB ( E6X50) Core 2 Duo 800 FSB ( E4XXX) Pentium Dual Core E5XXX Pentium Dual Core E2XXX Celeron Dual Core E14XX Celeron Conroe-L (4XX) Pentium D Support ( 8XX & 9XX ) Pentium 4 Celeron D (3XX)Support

40

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

HARDWARE BASICS Operating Systems

41

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

HARDWARE BASICS PROCESSOR TECHNOLOGIES

The Intel Pentium 4 processor on 90-nanometer (nm) technology is the first Intel processor to be manufactured on 90nm semiconductor process technology. This new process offers smaller dimensions and more transistors on the same area, allowing us to double the number of transistors while reducing the chip size by over 15 percent.

Intel Pentium 4 processor on 90nm technology contains several micro architecture enhancements such as a larger 1 MB Level 2 (L2) cache, larger 16 KB Level 1 (L1) cache. The processor also has eight write-combining buffers compared to six in the previous generation.
For example, a home user can play an immersive game while encoding audio or video, compressing images or compositing special effects. The 90nm process technology reduces size by more than 15% compared to the previous 130nm process, while more than doubling the number of transistors

42

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

HARDWARE BASICS PROCESSOR TECHNOLOGIES

Intel multi-core technology provides new levels of energy efficient performance, enabled by advanced parallel processing and 45nm technology. Incorporating multiple processor execution cores in a single package Intel Trusted Execution Technology (Intel TXT), is a highly versatile set of hardware extensions to Intel processors and chipsets that, with appropriate software, enhance the platform security capabilities. Trusted Execution Technology will provide a hardware-based security foundation that will help enable greater levels of protection for information stored, processed and exchanged on the PC

43

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

PROCESSOR TECHNOLOGIES HYPER THREADING & VIRTUALISATION

Hyper-Threading Technology allows one physical processor to appear to the operating system as two logical processors [2]., Intel AMT allows to better discover, heal, and protect IT networked computing assets. included better asset management, reduced downtime, and minimized desk-side visits. Intel design teams determined that these issues were best addressed through platform architectural enhancements, resulting in the following features for supporting those needs. Hardware-assisted Intel Virtualization Technology (Intel VT) provides greater flexibility and maximum system utilization by consolidating multiple environments into a single server, workstation, or PC. With fewer systems required for the same tasks, Intel VT delivers Simplified resource management increasing IT efficiency. Greater systems reliability and availability reducing corporate risk and real-time losses from downtime. Lower hardware acquisition costs with increased utilization of the machines already have. Virtualization solutions enhanced by Intel VT allow a platform to run multiple operating systems (OS) and applications as independent virtual machines, allowing one computer system to function as multiple "virtual" systems. For example, IT managers can create a single build with multiple and different OS, software, and legacy applications. With support from the processor, chipset, BIOS, and enabling software, Intel VT improves traditional software-based virtualization
44
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

HARDWARE BASICS - MEMORY


Data transfers per second 200 Million 266 Million 333 Million 400 Million JEDEC standard VDDQ voltage

Standard Memory name clock

Cycle time[2]

I/O bus clock

Module name

Peak transfer rate 1600 MB/s 2100 MB/s 2700 MB/s 3200 MB/s

DDR-200 100 MHz 10 ns DDR-266 133 MHz 7.5 ns DDR-333 166 MHz 6 ns DDR-400 200 MHz 5 ns

100 MHz 133 MHz 166 MHz 200 MHz

2.50.2 V PC-1600 2.50.2 V PC-2100 2.50.2 V PC-2700 2.60.1 V PC-3200

45

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

HARDWARE BASICS MEMORY

SDRAM SDRAM is a dynamic random access memory (DRAM) that has a synchronous interface. Traditionally, dynamic random access memory (DRAM) has an asynchronous interface.

SDRAM is widely used in very old computers; from the original SDRAM further generations of DDR (or DDR1), and then DDR2 and DDR3 have entered the mass market, with DDR4 currently being designed

46

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

HARDWARE BASICS - MEMORY

DDR RAM

47

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

HARDWARE BASICS - MEMORY

DDR2 SDRAM is a double data rate synchronous dynamic random access memory interface. It supersedes the original DDR SDRAM specification and the two are not compatible. In addition to double pumping the data bus as in DDR SDRAM, (transferring data on the rising and falling edges of the bus clock signal). DDR2 employs an I/O buffer between the memory and the data bus so that the data bus can be run at the twice the speed of the memory clock. The two factors combine to achieve a total of 4 data transfers per memory clock cycle. With data being transferred 64 bits at a time, DDR2 SDRAM gives a transfer rate of (memory clock rate) 2 (for bus clock multiplier) 2 (for dual rate) 64 (number of bits transferred) / 8 (number of bits/byte). Thus with a memory clock frequency of 100 MHz, DDR2 SDRAM gives a maximum transfer rate of 3200 MB/s. Since the memory clock runs at half the external data bus clock rate, DDR2 memory operating at the same external data bus clock rate as DDR will provide the same bandwidth but with higher latency, resulting in inferior performance. Alternatively, DDR2 memory operating at twice the external data bus clock rate as DDR may provide twice the bandwidth with the same latency (in nanoseconds). The best-rated DDR2 memory modules are at least twice as fast as the best-rated DDR memory modules.

Standard Memory name clock

Cycle time

DDR2-400 100 MHz 10 ns DDR2-533 133 MHz 7.5 ns DDR2-667 166 MHz 6 ns

Data transfers per second 400 200 MHz Million 533 266 MHz Million 667 333 MHz Million I/O Bus clock 800 400 MHz Million 1066 533 MHz Million

Module name

Peak transfer rate 3200 MB/s 4266 MB/s 5333 MB/s

Timings[2][3] 3/3/3 4/4/4 3/3/3 4/4/4 4/4/4 5/5/5 4/4/4 5/5/5 6/6/6 6/6/6 7/7/7/

PC2-3200 PC2-4200 PC2-43001 PC2-5300 PC2-54001

DDR2-800 200 MHz 5 ns DDR21066 266 MHz 3.75 ns

PC2-6400 PC2-8500 PC2-86001

6400 MB/s 8533 MB/s

48

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

HARDWARE BASICS PORT DETAILS


Parallel ATA (PATA) is an interface standard for the connection of storage devices such as hard disks, solid-state drives, and CD-ROM drives in computers. ATA/ATAPI is an evolution of the AT Attachment Interface, which was itself evolved in several stages from Western Digital's original Integrated Drive Electronics (IDE) interface. As a result, many near-synonyms for ATA/ATAPI and its previous incarnations exist, including abbreviations such as IDE which are still in common informal use. After the market introduction of Serial ATA in 2003, the original ATA was retroactively renamed Parallel ATA. Parallel ATA only allows cable lengths up to 18 in (460 mm). Because of this length limit the technology normally appears as an internal computer storage interface. For many years ATA provided the most common and the least expensive interface for this application. By the beginning of 2007, it had largely been replaced by Serial ATA (SATA) in new systems.

49

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

HARDWARE BASICS ATA's ribbon cables have had 40 wires for most of its history (44 conductors for the smaller form-factor version used for 2.5" drives - the extra four for power), but an 80-wire version appeared with the introduction of the Ultra DMA/33 (UDMA) mode. All of the additional wires in the new cable are ground wires, interleaved with the previously defined wires to reduce the effects of capacitive coupling between neighboring signal wires, reducing crosstalk. Capacitive coupling is more of a problem at higher transfer rates, and this change was necessary to enable the 66 megabytes per second (MB/s) transfer rate of UDMA4 to work reliably. The faster UDMA5 and UDMA6 modes also require 80-conductor cables.
ATA cables: `Though the number of wires doubled, the number of connector pins and the pin-out remain the same as 40-conductor cables, and the external appearance of the connectors is identical. Internally the connectors are different; the connectors for the 80-wire cable connect a larger number of ground wires to a smaller number of ground pins, while the connectors for the 40-wire cable connect ground wires to ground pins one-for-one. 80-wire cables usually come with three differently colored connectors (blue controller, gray slave drive, and black master drive) as opposed to uniformly colored 40-wire cable's connectors (all black). The gray connector on 80conductor cables has pin 28 CSEL not connected; making it the slave position for drives configured cable select
50
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Port Connector Types

AT (Advanced technology): They are similar to the original motherboards found in the IBM AT. The microprocessor, memory and expansion slots are all in line with each other. The advancement in the field of electronics resulted in the design of smaller components that occupied less space. This configuration is known as Baby AT ATX: The ATX motherboard has the microprocessor and memory slots at right angles to the expansion slots. This puts the microprocessor and memory in the same line with the fan output of the power supply allowing the microprocessor to cool. In addition, more space was available, as the microprocessor and memory were not in line with the expansion slots.

51

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

HARDWARE BASICS PORTS & CONNECTORS

SATA POWER CABLE SATA DATA CABLE

A 6-circuit FireWire 400 (IEEE) alpha connector

52

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Various Port Connector Types


IEEE PORT

Serial Port Parallel Port

LPT

DIN Connector

USB
53
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Various Port Connector Types


PS/2 Connector:

Fire ware:

Video:

Power Cord

Mini Jack:

54

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Various Slots and Card Types Used in PC


An expansion card is a circuit board that lets you add new feature to a computers. It is also called an expansion board. Types of Slots: Industry Standard Architecture (ISA) Enhanced Industry Standard Architecture (EISA) Micro Channel Architecture (MCA) Video Electronics Standard Association (VESA) Peripheral Component Interconnect (PCI) Personal Computer Memory Card International Association (PCMCIA) Advanced Graphics Port (AGP) Commonly used Expansion Cards: Video Card Sound Card Modem NIC
55
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Basic Concepts of Network

56

2010 Wipro Ltd Internal & Restricted

Agenda
Basics of Networking Networking Standards Network Devices & Definitions TCP/IP Network Addressing VLAN & ARP Basic Definitions for L2 & L3 Networks

57

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Basics of Networking
What & Why is Network
Distribute pieces of computation among computers (nodes)
Coordination between processes running on different nodes Remote I/O Devices

Remote Data/File Access


Personal communications (email, chat, audio/video conference, messaging) World Wide Web
58
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Basics of Networking

ISO-OSI is standard of network but we commonly use TCP/IP, which has no session/presentation layer
59

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Basics of Networking
Physical Layer: o Standardized protocol dealing with electrical, mechanical and signaling interfaces. o Concerned with the transmission of bits Data Link Layer: o Logical Link Control (LLC) defines how data is transferred over the cable and provides data link service to the higher layers. o Medium Access Control (MAC) defines who can use the network when multiple computers are trying to access it simultaneously (i.e. Token passing, Ethernet [CSMA/CD], etc...). o Handles errors in the physical layer. o Groups bits into frames and ensures their correct delivery. Network: o Concerned with the transmission of packets. o Choose the best path to send a packet (routing). o It may be complex in a large network (e.g. Internet). o Shortest (distance) route vs. route with least delay. o Most popular protocol widely used is x.25 and TCP/IP
60
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Basics of Networking
Transport Layer: o Network layer does not deal with lost messages.Transport layer ensure reliable service. It breaks the message (from sessions layer) into smaller packets, assigns sequence number and sends them. o TCP/IP is widely used for network/transport layer. UDP (Universal Datagram Protocol): Internet connectionless transport protocol. Session & Presentation Layer: o Just theory! Very few applications use it. Application Layer: o Collection of miscellaneous protocols for high level applications o Electronic mail, file transfer, connecting remote terminals, etc. o E.g. SMTP, POP, IMAP, FTP, Telnet, SSH, HTTP, HTTPS, SNMP, etc...

61

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Networking Standards
IEEE 802 IEEE 802.1 IEEE 802.2 IEEE 802.3 IEEE 802.5 IEEE 802.11 IEEE 802.15 IEEE 802.16 IEEE 802.17 : Internetworking : Bridging & Management : Logical Link Control : CSMA/CD (Ethernet) Access Method : Token Ring Access Method : Wireless : Wireless Personal Area Networks : Broadband Wireless MAN : Resilent Packet Rings

62

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Network Devices & Definitions


REPEATORS HUBS

SWITCHES
BRIDGES ROUTERS

FIREWALL

63

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Network Devices & Definitions


Repeater: o A repeater connects two segments of your network cable. It retimes and regenerates the signals to proper amplitudes and sends them to the other segments. Hub: o A type of repeater used on several network architectures which usually connects several stations. Switch: o A network switch is a computer networking device that connects network segments. o The term commonly refers to a network bridge that processes and routes data at the data link layer (layer 2) of the OSI model. Switches that additionally process data at the network layer (layer 3 and above) are often referred to as Layer 3 switches or multilayer switches. o The term network switch does not generally encompass unintelligent or passive network devices such as hubs and repeaters.

64

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Network Devices & Definitions


Bridge: o A bridge reads the outermost section of data on the data packet, to tell where the message is going. It reduces the traffic on other network segments, since it does not send all packets. Bridges can be programmed to reject packets from particular networks. Bridging occurs at the data link layer of the OSI model, which means the bridge cannot read IP addresses, but only the outermost hardware address of the packet. In our case the bridge can read the Ethernet data which gives the hardware address of the destination address, not the IP address. Bridges forward all broadcast messages. bridges use one of: Transparent Bridging - They build a table of addresses (bridging table) as they receive packets. If the address is not in the bridging table, the packet is forwarded to all segments other than the one it came from. This type of bridge is used on Ethernet networks. Source route bridging - The source computer provides path information inside the packet.

65

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Network Devices & Definitions


Router: o A router is used to route data packets between two networks. It reads the information in each packet to tell where it is going. If it is destined for an immediate network it has access to, it will strip the outer packet, readdress the packet to the proper Ethernet address, and transmit it on that network. If it is destined for another network and must be sent to another router, it will re-package the outer packet to be received by the next router and send it to the next router. The section on routing explains the theory behind this and how routing tables are used to help determine packet destinations. Routing occurs at the network layer of the OSI model. They can connect networks with different architectures such as Token Ring and Ethernet. Although they can transform information at the data link level, routers cannot transform information from one data format such as TCP/IP to another such as IPX/SPX. Routers do not send broadcast packets or corrupted packets. If the routing table does not indicate the proper address of a packet, the packet is discarded.

66

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Network Devices & Definitions


Firewall: o A router is used to route data packets between two networks. It reads the information in each packet to tell where it is going. If it is destined for an immediate network it has access to, it will strip the outer packet, readdress the packet to the proper Ethernet address, and transmit it on that network. If it is destined for another network and must be sent to another router, it will re-package the outer packet to be received by the next router and send it to the next router. The section on routing explains the theory behind this and how routing tables are used to help determine packet destinations. Routing occurs at the network layer of the OSI model. They can connect networks with different architectures such as Token Ring and Ethernet. Although they can transform information at the data link level, routers cannot transform information from one data format such as TCP/IP to another such as IPX/SPX. Routers do not send broadcast packets or corrupted packets. If the routing table does not indicate the proper address of a packet, the packet is discarded.

67

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

TCP/IP Network Addressing


Internet Protocol Because TCP/IP networks are interconnected across the world, each computer on the Internet must have a unique address (called an IP address) to make sure that transmitted data reaches the correct destination. (e.g. 192.168.1.1) Classes of IP
Class A addresses can have up to 16,777,214 hosts on a single network. Class A addresses are in this range: 1.x.x.x to 126.x.x.x.

Class B addresses can have up to 65,354 hosts on a single network. Class B addresses are in this range: 128.1.x.x to 191.254.x.x.

Class C addresses can have up to 65,354 hosts on a single network. Class B addresses are in this range: 192.0.1.x to 223.255.254.x.

68

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

TCP/IP Network Addressing


Netmask In each of the address classes previously described, the size of the two parts (network address and host address) is implied by the class. This partitioning scheme can also be expressed by a netmask associated with the IP address. A netmask is a 32-bit quantity that, when logically combined (using an AND operator) with an IP address, yields the network address. For instance, the netmasks for Class A, B, and C addresses are 255.0.0.0, 255.255.0.0, and 255.255.255.0, respectively. By looking at the addressing structures, you can see that even with a Class C address, there are a large number of hosts per network. Such a structure is an inefficient use of addresses if each end of a routed link requires a different network number. It is unlikely that the smaller office LANs would have that many devices. You can resolve this problem by using a technique known as subnet addressing.

69

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

TCP/IP Network Addressing


Netmask Contd The following table lists the additional subnet mask bits in dotted-decimal notation. To use the table, write down the original class netmask and replace the 0-value octets with the dotted-decimal value of the additional subnet bits. For example, to partition your Class C network with subnet mask 255.255.255.0 into 16 subnets (four bits), the new subnet mask becomes 255.255.255.240.

The following table displays several common netmask values in both the dotteddecimal and the mask-length formats.

70

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

VLAN & ARP


VLAN & Its Usage
A virtual LAN, commonly known as a VLAN, is a group of hosts with a common set of requirements that communicate as if they were attached to the same broadcast domain, regardless of their physical location. A VLAN has the same attributes as a physical LAN, but it allows for end stations to be grouped together even if they are not located on the same network switch. Network reconfiguration can be done through software instead of physically relocating devices. VLANs are created to provide the segmentation services traditionally provided by routers in LAN configurations. VLANs address issues such as scalability, security, and network management. Routers in VLAN topologies provide broadcast filtering, security, address summarization, and traffic flow management. By definition, switches may not bridge IP traffic between VLANs as it would violate the integrity of the VLAN broadcast domain. This is also useful if someone wants to create multiple Layer 3 networks on the same Layer 2 switch. For example, if a DHCP server (which will broadcast its presence) was plugged into a switch it will serve any host on that switch that was configured to get its IP from a DHCP server. By using VLANs you can easily split the network up so some hosts won't use that DHCP server and will obtain link-local addresses, or obtain an address from a different DHCP server
71
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

VLAN & ARP


ARP ARP (Address Resolution Protocol) is used to resolve the ethernet address of a NIC from an IP address in order to construct an ethernet packet around an IP data packet. This must happen in order to send any data across the network. An IP address alone cannot be used to deliver data from one LAN device to another. To send data between LAN devices, you must convert the IP address of the destination device to its MAC address. Each device on an Ethernet network has a unique MAC address, which is a 48-bit number assigned to each device by the manufacturer. The technique that associates the IP address with a MAC address is known as address resolution. Internet Protocol uses the Address Resolution Protocol (ARP) to resolve MAC addresses. If a device sends data to another station on the network and the destination MAC address is not yet recorded, ARP is used. An ARP request is broadcast onto the network. All stations (computers, for example) on the network receive and read the request. The destination IP address for the chosen station is included as part of the message so that only the station with this IP address responds to the ARP request. All other stations discard the request.

72

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Basic Definitions for L2 & L3 Networks


Layer 2 Networks: Basically a layer 2 switch operates utilizing Mac addresses in it's caching table to quickly pass information from port to port. A layer 3 switch utilizes IP addresses to do the same. A layer 2 switch is essentially a multiport bridge. A layer 2 switch will learn about MAC addresses connected to each port and passes frames marked for those ports. It also knows that if a frame is sent out a port but is looking for the MAC address of the port it is connected to and drop that frame. Whereas a single CPU Bridge runs in serial, today's hardware based switches run in parallel, translating to extremely fast switching. It includes terms like, VLAN, Spanning Tree etc.

73

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Basic Definitions for L2 & L3 Networks


Layer 3 Networks:

The network layer provides the functional and procedural means of transferring variable length data sequences from a source to a destination via one or more networks, while maintaining the quality of service requested by the Transport layer. The Network layer performs network routing functions, and might also perform fragmentation and reassembly, and report delivery errors. Routers operate at this layer sending data throughout the extended network and making the Internet possible. This is a logical addressing scheme values are chosen by the network engineer.
The best-known example of a layer 3 protocol is the Internet Protocol (IP). It manages the connectionless transfer of data one hop at a time, from end system to ingress router, to router to router, and from egress router to destination end system.
74

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Network Cabling
Ethernet Straight Cabling: The UTP cable contains eight conductors, arranged in four twisted pairs, and is terminated with an RJ45 type connector. A normal straight-through & Cross Over UTP Ethernet cable follows the EIA568B standard wiring as described below.

Straight Through

Cross Over

Note that here on the other end of cable we are using pin 3 & 6 in replacement of 1 & 2 and vice versa
75
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

N Computing

76

2010 Wipro Ltd Internal & Restricted

The NComputing Approach

Host PC (User 1)

User 2

User 3

User 4

User 5

User 6

User 7

Share the excess power of todays PCs with multiple users through Very low cost access devices

77

2010 Wipro Ltd Internal & Restricted

How it Works

NComputing Terminal Services software sets up Virtual Independent Desktops inside one Windows or Linux PC.

NComputing User eXtension Protocol (UXP) delivers an efficient secure, multimedia interface.

NComputing Virtual PCs are small, silent, energy-efficient, reliable, and very inexpensive.

78

2010 Wipro Ltd Internal & Restricted

Ncomputing X300

The X300 access terminal kit enables you to dramatically cut computing costs by sharing the untapped power of PCs. The kit includes three access terminals, one PCI card, and terminal services software that work together to efficiently harness excess computing capacity and enable multiple users to share a single PC. It is easy to manage and is compatible with standard PC applications. The terminal services software for the X300, divides the host PC's resources into independent sessions that give each user their own robust PC experience. One PC can support up to seven users. Supports multiple resolutions 1024x768, 800x600, 16-bit color Small, efficient and eco-friendly With a small footprint and no moving parts, the X300 runs completely silent and saves energy by using only 5 watts. It's design meets strict environmental guidelines and is RoHS compliant.
79
2010 Wipro Ltd Internal & Restricted

How We Get the Cost So Low & the Performance So High

Sophisticated Software Desktop Virtualization


Highly optimized memory performance Windows and Linux versions VMware and Parallels compatible

Simple Hardware Virtual PC (access terminal)

Not a PC!
No CPU No storage No software

80

2010 Wipro Ltd Internal & Restricted

Technology
Minimum System Requirements
For one X300 PCI card, a host PC with at least the following:
A 1.3 GHz processor 512 MB RAM Keyboard, mouse, and monitor required for each access terminal Speakers optional for each access terminal (amplified speakers recommended) For two X300 PCI cards, a host PC with at least the following: A 2.4 GHz processor 1 GB RAM Keyboard, mouse, and monitor required for each access terminal Speakers optional for each access terminal (amplified speakers recommended) Operating Systems Windows Linux

81

2010 Wipro Ltd Internal & Restricted

How it works
The end-user still has their own monitor, keyboard, mouse and speakers Instead of connecting directly to a PC, these peripherals connect to the small NComputing access terminal on their desk. The access terminals then connect either directly (X Series) or over Ethernet (L Series) to the host computer Generally 2D games are supported at the moment. Casual games (Java and Flash), which can be played on the Internet, are also supported. High performance 3D games, which require a high speed GPU (Graphic Processor Unit) and a hardware accelerated function, are currently not supported. Other games including single user games which require a CD for operation are not supported. A game, which is designed to be used only on the same computer by checking the IP, is not supported. Windows itself checks out those specifications and rejects more than one loading, and thus those games are not supported.

82

2010 Wipro Ltd Internal & Restricted

Advantages
The system has been designed to be highly efficient so as not to require x86-class CPUs and chipsets like traditional thin client devices. Very low power requirements (less than 5 Watts) No Obsolescence MTBF - 45 years Low cost of acquisition and Maintenance Zero foot printVESA mounting

83

2010 Wipro Ltd Internal & Restricted

Environmental Impact
Saves 95%

in electricity

No heat and moving parts


Needs Smaller inverters/UPS 90% less eWaste Ultra-low product

failures UL, RoHS, ISO 9001 certified

84

2010 Wipro Ltd Internal & Restricted

Product Overview
X Series
PCI-based X300 Lowest Cost Ultimate multimedia performance PC in same room (10m) 1 watt per user Up to 7 users can share one Low End PC

L Series
Up to 30 users can share one Desktop PC Ethernet = no distance limits Highest # of users per PC 5-6 watts per user

Ethernet-based L230

85

2010 Wipro Ltd Internal & Restricted

X Series Installs in Just 4 Easy Steps


Step 1: Install PCI card into the Host PC

Step 2: Connect access terminal to the students monitor and peripherals

Step 4: Install NComputing software on Host PC directly or via imaging software (like Ghost)

Step 3: Connect access terminal to the PCI card via standard UTP cable
2010 Wipro Ltd Internal & Restricted

86

X Series Installs in Just 4 Easy Steps


Connect each access terminal to a port on the PCI card using the included Ethernet cables. You can also use any standard Ethernet cable. Do not exceed the length limit of 15 feet. Also, do not use any Ethernet equipment, such as a hub or a switch, between the access terminal and the PCI card. Connect peripheral devices to each X300 access terminal. Note: Please use amplified speakers. Note: A LAN cable between the X300 PCI card and the access terminal as long as 33 feet (10 meters) is allowed if the cable is high quality. Category 6 (Cat6) cables are recommended. Lower quality cables can be a maximum of 16 feet (5 meters) long.

87

2010 Wipro Ltd Internal & Restricted

Why NComputing X Series Along Wipro PCs


Bring innovative and proven solution to customers Upto 7 Active Terminals. Affordable computing solution that is unmatched in cost, energy use and maintenance DGS&D certified (almost) Wipro already Supplied NComputing on several large educational Institutions & other customer locations.

88

2010 Wipro Ltd Internal & Restricted

NComputing L Series
Ethernet switch

Highlights
Ideal for business and schools Up to 30 users connected to a high-end PC/server Ethernet-connected, so no distance limitation 5-6 watts per user Windows or Linux

L200

New! L230: Compact size + Monitor Mount


89
2010 Wipro Ltd Internal & Restricted

Why NComputing L Series Along Wipro PCs

90

2010 Wipro Ltd Internal & Restricted

Why NComputing L Series Along Wipro PCs


The L-series access devices do not have a CPU, hard drive or CD-ROM, yet most users find it indistinguishable from a full PC environment since it runs a normal User Account assigned by the hosts OS. The L-series exclusive technology allows you to add up to 30 access devices to your existing PC. Each access device offers a full and independent computing experience. Simultaneous desktop operation Each access device connects to a workspace created by vSpace on the host PC OS and can run its virtual desktop concurrently and independently through Ethernet. Minimal Maintenance Required You only have to maintain and upgrade the host PC since the access devices have no CPU, hard drive, or CD-ROM.

91

2010 Wipro Ltd Internal & Restricted

Why NComputing L Series Along Wipro PCs


Supports multiple resolutions 640x480, 800x600, 1024x768 and 1280x1024, by 16-bit colors. Additionally, the L130 supports 1440x900 by 16-bit colors and the L230 supports 1440x900 by 24-bit colors.

Microphone The L230 includes a microphone port. Minimum System Requirements Host Computer For multiuser applications the host computer operating system can be Windows Server 2003 R2 SP2 (Standard or Enterprise Edition, 32-bit), Windows Server 2008 SP2 (Standard or Enterprise, 32-bit), or supported Linux distributions.
92
2010 Wipro Ltd Internal & Restricted

Why NComputing L Series Along Wipro PCs


Microsoft Windows Licenses. You are licensed by NComputing to use the vSpace software under the terms of the End-User License Agreement (EULA). You must also acquire the appropriate number of Windows Server licenses and Client Access Licenses for each device or user accessing Windows Server software.You cannot use the vSpace software with Windows Client software (i.e., Windows Vista, Windows 7) unless a single user and no other user accesses the same Windows Client software at any one time, or you are authorized to do so under an applicable license from Microsoft or as expressly set forth in the Microsoft Windows Server to Windows XP License Rights section of the NComputing EULA.1 In all cases, your rights and obligations with respect to the use of vSpace software with Windows Server software and Windows Client software are defined by both the NComputing vSpace software EULA and the applicable Microsoft Software License Agreement or EULA. For more information on licensing with Microsoft operating systems see: www.ncomputing.com/mslicensing
93

2010 Wipro Ltd Internal & Restricted

Why NComputing L Series Along Wipro PCs


The host PC must have at least: A 2.4 GHz single core processor or any dual core processor 1 GB RAM (Configurations vary by the number of users; for more info, please see Product Selection Guide at: http://ncomputing.com/Portals/0/docs/guides/en/guide_productselection.pdf) 60 GB hard disk drive Ethernet port Do not use a notebook PC as the host. Notebooks use power-saving features and technologies different than a typical desktop PC. This causes power management and memory incompatibilities. Product does not support 10Mbps or 1Gbps, 100Mbps only supported. Note: Go to http://www.ncomputing.com/support.aspx to see the latest FAQs.

94

2010 Wipro Ltd Internal & Restricted

Windows 7

95

2010 Wipro Ltd Internal & Restricted

Windows 7

Windows 7 is the next version of Windows after Windows Vista. There are 4 editions of Win 7.

Windows 7 Starter Windows 7 Home Premium Windows 7 Professional Windows 7 Ultimate

96

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Flavors in Windows 7

97

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Windows 7
Windows 7 system requirements If you want to run Windows 7 on your PC, here's what it takes: 1 gigahertz (GHz) or faster 32-bit (x86) or 64-bit (x64) processor 1 gigabyte (GB) RAM (32-bit) or 2 GB RAM (64-bit) 16 GB available hard disk space (32-bit) or 20 GB (64-bit) DirectX 9 graphics device with WDDM 1.0 or higher driver

98

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Windows 7

How to install Windows Operating Systems


Please refer the below link: http://windows.microsoft.com/en-IN/windows/help/install-reinstall-uninstall

99

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Up-gradation & Migration


Up-gradation & Migration Please refer the below links: XP to 7 http://windows.microsoft.com/en-IN/windows7/help/upgrading-fromwindows-xp-to-windows-7 Vista to 7 http://windows.microsoft.com/en-IN/windows7/help/upgrading-fromwindows-vista-to-windows-7

100

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

How to activate Windows 7

This menu selection will display the System screen which is displaying basic information about the computer running Windows 7. You can also open this screen by opening the Control Panel and then selecting the System and Security and later System item. Another way to open this is by typing slui.exe in the search programs window. You can see the Windows activation status at the bottom of this screen. The right side picture shows the same.
101
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

How to activate Windows 7


Since you have not activated the Windows 7 setup yet, in the Windows activation section you can see the message "n days to activate. Activate Windows now. To activate Windows 7 by phone if you are not online or by automatic activation if you are online on the internet, click on the "Activate Windows now" message. As mentioned in this screen, you must activate Windows 7 within the left period to continue using all Windows features. If your installed Windows 7 computer can connect to internet, you can continue activating Windows 7 by selecting the first item in the list. "Activate Windows online now. You will get the below screen, Type the product key which is on right side of the Desktop or which is provided by customer. Click next, The windows will automatically get activated.

102

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

How to activate Windows 7


To activate the windows over phone, you can select "Show me other ways to activate" item in order to activate Windows 7 by phone. Its better first to change the product ID. Click on Change product ID in the 2nd screen, Which is already shown. You will get the below screen, Type the product key which is on right side of the Desktop or which is provided by customer. Click next, afterwards.

103

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

How to activate Windows 7?


To activate over Phone Select the Show me other options. In the next screen, Click on Use the Automated Phone System.

104

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

How to activate Windows 7?


After this activation screen is displayed you can change the location for your location in order to make a suitable phone call. Each location automated phone numbers differs from other locations.

105

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

How to activate Windows 7?


When you click Next button, the Windows 7 activation wizard will display the 3 steps you should do in order to complete your Windows 7 setup activation. In the first step, you are listed with available phone numbers. If available a toll-free number, an other toll number again if available and an SMS yet available. You will call given phone number to get a confirmation ID. When you call the toll or toll-free number by phone, you will ask for which Microsoft product group activation you are calling, for Windows Vista, for Windows 7, for Microsoft Office, etc. After you select Windows 7, you are requested to enter the Installation Id by typing on the phone. This is the second step. Installation Id is given on Step 2 section and is about 54 digit long number grouped in 6 digit long 9 items (Shown in the picture in the next slide). After you enter your system installation id, you will given a corresponding 54 digit long Confirmation ID by the activation phone system. Please note this confirmation id on a peace of paper or on your computer use the Notepad application. Since you might type it wrong for the first time. On the phone you can listen the confirmation id again and again and I can suggest you to select the listen again option until your Windows 7 activation is completed.

106

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

How to activate Windows 7?

107

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Windows 7 Administration

The following link is useful for Windows 7 administrators about administrative options.

http://windows.microsoft.com/en-IN/windows7/help/top-solutions

108

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Features - Managing Users


To begin working with Windows 7, you need a user account. Using this user account, you can log on to Windows 7 and run programs, open files, and personalize your desktop. In an office environment, your administrator can create a user account for you. If you work at home, you are prompted to create a user account the first time you start your new Windows 7 computer. If more than one user uses the computer, you can use Fast User Switching to switch between the desktops of two or more logged-on users.

With Windows 7, you can lock your workstation so that no one can access your computer if you are temporarily away from your desk. Whether you are away from your computer for a few minutes, several hours, or an entire day, Windows 7 provides you with an efficient method for safeguarding your computer and the data stored on it.

109

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Features - Managing Users

110

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Features - Managing Users

111

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Features - Searching Programs & Data


Search Capability Description
Using the Start menu search
Searching Control Panel Searching Libraries You can use the search box above the Start button to quickly search for programs, settings, and files. You can use the search box in the upper-right corner of Control Panel to quickly search for Control Panel settings you can configure. You can click the Windows Explorer icon on the taskbar and then use the search box in the upper-right corner of the Windows Explorer window to quickly search for files stored in your libraries. You can also open a specific library, such as Documents, in Windows Explorer and search for files stored in that library. Searching document properties and text with hit highlighting in the results

When you search libraries, both the properties and contents of documents are searched. The results of your search are highlighted so you can see which documents match your search. When searching libraries, you can use a search filter to refine your search. The filter options displayed vary depending on the type of library being searched. Windows maintains a list of your recent searches so that you can quickly rerun them if needed. You can save a search so that you can rerun it later. Saved searches are added to your list of Favorites in Windows Explorer. If your search does not return the results you hoped for, you can search again in other locations, including the Internet.

Searching with filters


Saving recent searches Saving a search Searching again in other locations

112

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Features - Back up in Action Centre


You can select let the Windows to choose the back up or You can chose the things which needs to be taken back up.

You can see the details after the back up about the space used in the targeted device. You can restore later in the next option, Restore which shown down in the picture.

113

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Features - Bit Locker


In Windows 7, you can use Bit Locker to encrypt the operating system drive and any internal data drives on your computer. If Bit Locker detects that your computer has been tampered with, it will lock the operating system and require a special Bit Locker recovery key to start it. To unlock data drives that have been encrypted by using Bit Locker, you need to provide a password or smart card. You can also configure encrypted data drives to automatically unlock when you log on to your computer. Windows 7 includes a new feature called Bit Locker To Go, which extends Bit Locker capability to removable storage devices, such as USB flash drives. Like data drives, removable storage devices that are encrypted by using Bit Locker To Go can be unlocked by providing a password or smart card. Removable storage devices can also be configured to automatically unlock when you connect them to your computer. To configure Bit Locker and Bit Locker To Go, follow these steps: Click Start, and then click Control Panel. In Control Panel, click System and Security, and then click Bit Locker Drive Encryption. In the Help protect your files and folders by encrypting your drives pane, perform one of the tasks described in the following table.
114
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Features - Bit Locker

Task
Enable Bit Locker on the Operating System Drive

Description

By default, a Trusted Platform Module (TPM) version 1.2 or higher chip must be installed on your computer in order for you to use Bit Locker to encrypt the system drive. The TPM chip is used to store the Bit Locker encryption key.

If your computer does not have a TPM chip, your network administrator can configure a policy that allows the Bit Locker encryption key to be stored on a USB removable storage device, such as a flash drive. Enable Bit Locker on a Data Drive

Data drives are internal disk drives that do not have an operating system installed on them. You do not need a TPM chip on your computer to encrypt a data drive by using Bit Locker.

Enable Bit Locker To Go on a USB Removable storage.

USB removable storage devices include external hard drives, flash drives, and other memory devices. You do not need a TPM chip on your computer to encrypt a USB removable storage device by using Bit Locker To Go.

Manage the TPM chip


You can use the TPM Management console to initialize the TPM chip, turn the TPM chip on or off, change the owner password, clear the TPM chip, and perform other actions. You must have administrative credentials on your computer to perform these actions.

115

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Features - Configuring UAC

116

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Features - Networking & Remote Connectivity

Click on the Network Icon in the system tray. You will see the networks available. Open Network Sharing Centre & Check the options available to connect. Click on Set up a New connection on Network to set the new connection/Sharing options as shown below. Click on the Choose Home group & Sharing Options for Local/Public File & Folder sharing in the Local/Public Network.

117

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Features - Remote Connectivity

Feature
What it Does?

Scenario Example

VPN Reconnect Karen is working remotely using her laptop and has a VPN connection established with the corporate network. She has a document on the corporate network open and is working on it when her Internet connection fails. She walks to a nearby coffee shop and establishes a new Internet connection there and continues to work on her open document without losing her work.

Keeps a VPN connection alive when the underlying Internet connectivity changes or is interrupted.

View Available Networks (VAN) Michael is at the airport waiting for his flight. His laptop is connected to the Internet using a wireless hotspot at the airport. He needs to connect to the corporate network to retrieve some files, so he clicks the network icon in the system notification area, clicks the VPN connection, clicks Connect, and moments later he can retrieve his files.

By clicking on the network icon in the system notification area of the taskbar, users can quickly and easily connect to wireless networks and establish VPN connections with remote networks.

118

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Features - Remote Connectivity


Feature
What it Does?

Scenario Example

Mobile Broadband Jacky is travelling and needs to connect to the corporate network to do some work. The hotel she is staying at does not provide Internet access, and there is no nearby public wireless hotspot. Using her Mobile Broadband ExpressCard, she establishes an Internet connection using her cellular phone service provider's network and then establishes a VPN connection to the corporate network. Tony is sitting at a coffee shop with his laptop connected to the Internet using the wireless hotspot there. His company's IT department has implemented DirectAccess. He needs to upload his sales orders to the corporate network, so he opens his sales order application as if his laptop was on the corporate LAN and uploads the orders, without the need of first establishing a VPN connection to the corporate network.

Also know as wireless wide area network (WWAN) technology, this technology provides wireless high-speed Internet access over 2G, 2.5G or 3G cellular networks using a mobile broadband data card, which can be either a PC card, USB card, ExpressCard, or embedded laptop module.

DirectAccess

Enables remote users to seamlessly and securely access the corporate network anytime they have an Internet connection, without the need of first establishing a VPN connection.

119

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Troubleshooting Windows 7
bcdedit is the command to edit boot loader in Win 7. The command perfmon is used to monitor the system performance.

Advance Boot Options for Windows 7

120

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Troubleshooting Windows 7
Advance Boot Options for Windows 7 Continued

121

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Troubleshooting Windows 7

122

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Troubleshooting Windows 7
System Restore
Open the Start Menu.

Click on All Programs, Accessories, System Tools, and System Restore.

123

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Troubleshooting Windows 7

124

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Troubleshooting Windows 7

125

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Troubleshooting Windows 7

126

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Troubleshooting - Windows 7
To make Windows 7 Faster
1. Keeping an eye about the hard drive space. Do not save big files in primary partition. 2. Regularly cleaning out unused files you no longer use, Remove temp files. 3. Removing the applications which are not in use. 4. Limit only necessary files in the start up. 5. Checking errors on a regular schedule. 6. Defragmenting disk regularly. 7. Turn on Automatic Updates & Make sure they are getting installed. 8. You ought to also enable the write cache of hard disk. Write caching implies that windows 7 doesn't flush changed data to the disk before system is idle, which improves performance. Click "Start" and point to "Search". Input "device" into the research box and Press "Search". Select "Device Manager" within the research results. Open the Disk Drives branch. Click the hard disk for its property sheet. Activate "Enable Write Caching" on the Device check box. For maximum performance, activate the "Turn Off windows WriteCache Buffer Flushing on the Device" too. Click "OK" for faster windows 7.
127
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Troubleshooting - Windows 7
How to connect to internet:

http://windows.microsoft.com/en-us/windows7/setting-up-a-home-network

How to share the Internet Connections

http://windows.microsoft.com/en-us/windows-vista/Using-ICS-Internet-ConnectionSharing

To troubleshoot Windows 7 Network related issues http://windows.microsoft.com/en-us/windows-vista/Troubleshoot-network-connectionproblems

128

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Windows Vista

129

2010 Wipro Ltd Internal & Restricted

System Requirements

Basic
Modern 800MHz processor 512MB RAM DirectX 9 Graphics

Premium ready
1 GHz x86 or x64 processor 1GB RAM DirectX 9, WDDM, 128 MB graphics RAM, Pixel Shader 2.0, 32 bits per pixel DVD-ROM Audio Internet Access

130

2010 Wipro Ltd Internal & Restricted

Product Line up - Versions


Vista Business Vista Enterprise
more security and hardware encryption UNIX subsystem for UNIX apps (SUA)

Vista Home Basic


Doesnt include Aero Less searching No DVD burning No Tablet Support

Vista Home Premium Vista Ultimate


Has everything in all the others Top of the range

All available in 32- or 64-bit editions


131
2010 Wipro Ltd Internal & Restricted

Windows Vista

How to install Windows Operating Systems


Please refer the below link: http://windows.microsoft.com/en-IN/windows/help/install-reinstall-uninstall

132

2010 Wipro Ltd Internal & Restricted

Software's
IE7 comes as standard
Note no support from Oracle yet For OSS and Financials

Firefox 2.0 appears to be OK No TSM backup client support yet


There is a beta client scheduled for November OUCS will test it Client is scheduled GA for end of January 2007.

Only some AV products currently available for Vista


http://go.microsoft.com/fwlink/?LinkId=69433

Microsoft is offering Windows Live OneCare There are others including F-Secure and AVG

133

2010 Wipro Ltd Internal & Restricted

Features - Major Changes


Taskbar /Start Menu
No huge changes but look and feel a bit different Similar customisations Adds window previews Run has moved into accessories
Program Explorer is used to see/uninstall the unwanted Applications

134

2010 Wipro Ltd Internal & Restricted

Features - Parental Controls


Control of
Websites Use times Game ratings
Specific Programs

135

2010 Wipro Ltd Internal & Restricted

Features - Windows Aero


3D effects Transparent Windows Easy Windows key + Tab app switching Eg: Windows + Tab for Flip 3D feature Requires a reasonable spec machine Spec measured by Windows Experience Index Minimum 128 MB dedicated Video RAM required.

136

2010 Wipro Ltd Internal & Restricted

Troubleshooting Windows Vista


Q: At random time, Windows Vista throws an error: "Site Advisor Has Stopped Working! A problem caused the program to stop working correctly. Windows will close the program and notify you if a solution is available." A: The error that you are receiving is from your McAfee security suite. You can try to repair the installation or you can just go ahead and uninstall this product and re-install. Q: When trying to update Windows Defender, I receive the following error message:

"Error found: Code 0x80240029"


Is there a way to fix this problem? A: Yes, the error you are receiving is caused by a corrupt SoftwareDistribution folder. To fix the issue, follow the instructions outlined below:
Restart your computer. Once the computer starts to boot, press the F8 key on your keyboard repeatedly until you are taken to the Advanced Boot Options screen. Using your arrow keys on your keyboard, navigate to the "Safe Mode" option and press Enter. Once Windows Vista enters Safe Mode; Click the Start button. Type the following in to the Search textbox above the Start button, then press Enter when finished: %windir% This will take you to the Windows system folder. Open the folder and locate the SoftwareDistribution folder. Right click the SoftwareDistribution folder and select "Rename" from the resulting menu. Type SoftwareDistribution.old and then press Enter. Restart your computer. Once Windows Vista reboots, it will create a fresh SoftwareDistribution folder. Problem is solved.
137
2010 Wipro Ltd Internal & Restricted

Troubleshooting Windows Vista


Q: In XP I could run two commands "fixboot" and "fixmbr" how can I restore Vista's boot loader? A: You can do this by booting to the Vista DVD. Then select the "Repair" option. Follow the on-screen prompts from there. This will replace the boot loader in Vista. Q: Windows Host Process (rundll32) has stopped working A: Please do the following 1. Go to Start. 2. In the Search box, type in: cmd.exe 3. Right click CMD and select Run as administrator from the resulting menu. 4. Type the following command in the command prompt and then press Enter on your keyboard: 5. regsvr32 /u lmpgd10.ax 6. You should receive confirmation that the un-registration was successful.
Q: A vista-compatible flash drive from Microsoft. The user instructions tell me that there will be a message when the flash drive is inserted that displays an option to use the drive with the ReadyBoost feature. When I insert the flash drive, nothing is displayed. A: The likely reason for this is because your system is probably already configured to use this device with ReadyBoost. Therefore the popup message will not be displayed. To double check the settings try this: Go to Start Right click Computer Right click the USB drive letter in question Click the ReadyBoost tab
2010 Wipro Ltd Internal & Restricted

138

1. 2. 3. 4.

Troubleshooting Windows Vista


Q: When we insert DVD/CD in to DVD drive, it is not recognized. It was working fine before, how can this fixed? A: This issue happens for both CD and DVD drives if you have Windows Media Player already running or if you have disable the audio device. To make Vista recognize your CD/DVD drive, make sure that you exit Windows Media Player. Then, insert the disk. Or, to re-enable your audio device follow the instructions below: Go to Start Select Control Panel Double click the Sound entry Select the Playback tab Right click a blank area below the entry titled: Select a playback device below to modify its settings Select "Show Disabled Devices" Right click the disabled device entry Select "Enable This will solve the problem.

139

2010 Wipro Ltd Internal & Restricted

Troubleshooting Windows Vista


Q: Error Message: "STOP: C0000221 unknown hard error" or "STOP: C0000221 STATUS_IMAGE_CHECKSUM_MISMATCH A: You are receiving this error because a file has gone corrupt. A probable cause for the error could be: An improper hardware driver has been installed. You have an Iomega Zip Drive installed on the same IDE cable as your hard disk. You will need to either obtain a good copy of the file in question and replace the corrupt file or reinstall your operating system using your installation media.

140

2010 Wipro Ltd Internal & Restricted

Troubleshooting Windows Vista


Adding Network Printer in Win Vista

141

2010 Wipro Ltd Internal & Restricted

Troubleshooting Windows Vista

142

2010 Wipro Ltd Internal & Restricted

Troubleshooting Windows Vista

143

2010 Wipro Ltd Internal & Restricted

Troubleshooting Windows Vista

144

2010 Wipro Ltd Internal & Restricted

Troubleshooting Windows Vista

145

2010 Wipro Ltd Internal & Restricted

Troubleshooting Windows Vista

146

2010 Wipro Ltd Internal & Restricted

Troubleshooting Windows Vista

147

2010 Wipro Ltd Internal & Restricted

Troubleshooting Windows Vista

148

2010 Wipro Ltd Internal & Restricted

Troubleshooting Windows Vista

149

2010 Wipro Ltd Internal & Restricted

Troubleshooting Windows Vista


To make the Windows Vista faster, Please refer the below link: http://windows.microsoft.com/en-us/windows-vista/optimize-windows-vista-for-betterperformance#section_4 How to connect to Internet: http://windows.microsoft.com/en-us/windows-vista/setting-up-a-home-network How to share the Internet: http://support.microsoft.com/kb/306126 How to set a Wireless Network http://www.microsoft.com/athome/organization/wirelesssetup.aspx For Blank Desktop, Please do the following.

Ctrl+Shift+Esc hotkey opens Task Manager. Task Manager Opens. Click on File > New Task (Run) there allows to type , Type
Explorer.exe & Press enter. Now the desktop appears. Scan for Virus/Malware with the Antivirus & remove the same.
150
2010 Wipro Ltd Internal & Restricted

Internet Explorer

151

2010 Wipro Ltd Internal & Restricted

Internet Explorer
How to install & repair the IE? Please refer the link: http://support.microsoft.com/kb/318378 Other Tips:
Internet Explorer 8 is the default web browser with Windows 7 while IE 7 is the default with Windows Vista. After opening IE, If you click on Help -> About, You will be able to find the exact version of Internet Explorer. In the corporate environment, Customer may be browsing the net through proxy. Some of the sites may be blocked in the office by customer IT Team through proxy. The proxy settings should be done from the Tools Menu - > Internet Options - > Connections -> Proxy Settings. The proxy server name & The default port should be mentioned clearly. In home broadband or through Data Card, This setting should be disabled. Too much temporary files/cookies may lead to the slow browsing or IE not working properly. Go to Tools -> Internet Options & Click on Clear Cookies, Clear Temp Files. Read the following topics as well to understand the Security Zone troubleshooting. http://support.microsoft.com/kb/182569
152
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Mail Clients

153

2010 Wipro Ltd Internal & Restricted

Configuring & Troubleshooting Outlook Express

154

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Configuring & Troubleshooting Outlook Express


Note down the following information

After noting these details, Cancel all the screens. Please take the back up of mails. The easy way to take the back up of the folder is as follows.
155
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Configuring & Troubleshooting Outlook Express


Right Click on the Inbox, Click on Properties. You will get the below screen.

As shown above, Select the folder path, Right click & Copy the same. Close the Outlook Express. Then, Go to run, Paste the same path. Delete Inbox.dbx at the end, As shown in the next slide.

156

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Configuring & Troubleshooting Outlook Express

157

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Configuring & Troubleshooting Outlook Express

158

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Configuring & Troubleshooting Outlook Express

After configuring the account successfully, Make two Folders as shown in the right side. (Please Note: Under Local Folders), Old Inbox & Old Sent Items (Case & Name should match as Renamed last time). After doing this, Please close the outlook Express.
159
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Configuring & Troubleshooting Outlook Express


Now, Copy the Old Inbox.dbx & Old Sent Items.dbx from the saved folder. Open the Outlook Express path.

160

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Configuring & Troubleshooting Outlook Express

One more problem observed, The sent mails will be copied to Outbox & Will not be removed. Every time when new mails sent, The old mail will be sent again. Solution: Close the Outlook Express after copying the folder path. Go to Run & Paste the path, as illustrated above picture. The folder will be opened. Delete the Outbox.dbx file. Close the Folder, Open the Outlook Express & Check now. The problem will be resolved.

161

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Working with Microsoft Outlook


To Set Up Your E-mail Account in Microsoft Outlook
In Microsoft Outlook, from the E-mail Accounts menu, select Tools.

162

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Working with Microsoft Outlook


On the E-mail Accounts wizard window, select Add a new e-mail account, and then click Next.

For your server type, select POP3 or IMAP, and then click Next.

163

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Working with Microsoft Outlook


On the Internet E-mail Settings (POP3/IMAP) window, enter your information as follows:
Your Name Your first and last name. E-mail Address Your email address. User Name Your email address, again. Password Your email account password. Incoming mail server (POP3) POP, Pop.secureserver.net or IMAP, imap.secureserver.net. Outgoing mail server (SMTP) Smtpout.secureserver.net

Click More Settings.

NOTE: "smtpout.secureserver.net" is an SMTP relay server. In order to use this server to

send e-mails, you must first activate SMTP relay on your e-mail account. Log on to your Manage Email Accounts page to set up SMTP relay. If you do not have SMTP relay set up and your Internet Service Provider (ISP) allows it, you can use the outgoing mail server for your Internet Service Provider. Contact your Internet Service Provider to get this setting.

164

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Working with Microsoft Outlook


On the Internet E-mail Settings window, go to the Outgoing Server tab. Select My outgoing server (SMTP) requires authentication. If you did not change the SMTP relay section, select Use same settings as my incoming mail server. If you changed the user name and password in the SMTP relay section of your Manage Email Accounts page, select Log on using and enter the user name and password. The following example assumes you did not change your SMTP relay section in your Manage Email Accounts page.

165

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Working with Microsoft Outlook

Go to the Advanced tab, and then change the Outgoing server (SMTP) port to 80 or 3535, As shown in the right side picture. Click on OK. Click next & Click on Finish. This completes the configuration.
166
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Working with Microsoft Outlook


Storing mails and managing .pst files. Microsoft Outlook automatically stores messages, contacts, appointments, tasks, notes, and journal entries in one of the following two locations: In a personal storage folder, also known as a .pst file, on your hard disk drive. In a mailbox that is located on the server. Your mailbox is located on a server if you use Outlook with Microsoft Exchange Server. You can use a backup of your .pst file to restore or move your Outlook data if you experience a hardware failure, lose data unexpectedly, have to transfer data from one computer to another computer, or have to transfer data from one hard disk drive to another hard disk drive. How to make a backup copy of a .pst file If you do not use Outlook with Microsoft Exchange Server, Outlook stores all its data in a .pst file. You can use the backup copy to restore your Outlook data if the original .pst file is damaged or lost. This section explains how to create a copy of your whole .pst file, with all the default items in the file.
167
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Working with Microsoft Outlook


If you have no Personal Folders Services in your profile and you can store information such as messages, contacts, or appointments in Outlook, your information is probably being stored in a mailbox on an Exchange Server. Try using the instructions in the "How to back up .pst file data that is located on a Microsoft Exchange Server" section. 8. Click Settings, and then note the path and file name that appears. Note Because the .pst file contains all data that is stored in the MAPI folders that Outlook uses, the file can be very large. To reduce the size of the .pst file, click Compact Now in the Settings window. 9. Close all the Properties windows. 10. Use Windows Explorer or My Computer to copy the file that you noted in step 8. You can copy the file to another location on the hard disk drive or to any kind of removable storage media, such as a floppy disk, a CD-ROM, a portable hard disk drive, a magnetic tape. How to export .pst file data If you want to back up only some of your Outlook data, you can create a new backup .pst file of only the data that you want to save. This is also known as exporting .pst file data. For example, you might want to use this section if you have important information in only some folders and you have other, less important items in much larger folders. You can export only the important folders or contacts and omit folders like Sent Mail.
168
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Working with Microsoft Outlook


Follow these steps to export a specific folder: 1. Open Outlook. 2. On the File menu, click Import And Export. If the menu item is not available, hover your pointer over the chevrons at the bottom of the menu, and then click Import and Export. 3. Click Export To File, and then click Next. 4. Click Personal Folder File (.pst) , and then click Next. 5. Click the folder that you want to export the .pst file to, and then click Next. 6. Click Browse, and then select the location where you want the new .pst file to be saved. 7. In the File Name box, , type the name that you want to use for the new .pst file, and then click OK. 8. Click Finish. Note Folder design properties include permissions, filters, description, forms, and views. If you export items from one .pst file to another, no folder design properties are maintained. How to import .pst file data into Outlook You can use the backup copy of your .pst file to restore your Outlook data if the original .pst file is damaged or lost. Everything that is saved in the .pst file is returned to Outlook. Follow these steps to restore, or import, your data into Outlook: 1. If the .pst file that you want to import is stored on a removable device, such as a floppy disk, a portable hard disk drive, a CD-ROM, a magnetic tape cassette, or any other storage medium, insert or connect the storage device, and then copy the .pst file to the hard disk drive of the computer.
169
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Working with Microsoft Outlook


When you copy the .pst file, make sure that the Read-Only attribute is not selected. If this attribute is selected, you might receive the following error message: The specified device, file, or path could not be accessed. It may have been deleted, it may be in use, you may be experiencing network problems, or you may not have sufficient permission to access it. Close any application using this file and try again. If you receive this error message, clear the Read-Only attribute, and then copy the file again. 2. Open Outlook. 3. On the File menu, click Import And Export. If the command is not available, rest the pointer over the chevrons at the bottom of the menu, and then click Import and Export. 4. Click Import from another program or file, and then click Next. 5. Click Personal Folder File (.pst), and then click Next. 6. Type the path and the name of the .pst file that you want to import, and then click Next. 7. Select the folder that you want to import. To import everything in the .pst file, select the top of the hierarchy. 8. Click Finish. How to transfer Outlook data from one computer to another computer You cannot share or synchronize .pst files between one computer and another computer. However, you can still transfer Outlook data from one computer to another computer. Use the instructions in the "How to make a backup copy of a .pst file" section to copy the .pst file to a CD or DVD-ROM or other portable media, or copy the file to another computer over a LAN/WAN link.
170
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Working with Microsoft Outlook


Note Connecting to .pst files over LAN/WAN links is not supported and problems connecting to .pst files over such links can occur. You might also want to create a new, secondary .pst file that is intended for transferring data only. Save the data that you want to transfer in this new .pst file and omit any data that you do not want to transfer. If you need to make a secondary .pst file to store data for transfer between two different computers, or for backup purposes, use the following steps: 1. On the File menu, point to New, and then click Outlook Data File. 2. Type a unique name for the new .pst file, for example, type Transfer.pst, and then click OK. 3. Type a display name for the Personal Folders file, and then click OK. 4. Close Outlook. Follow these steps to copy an existing .pst file: 1. Use the instructions in the "How to make a backup copy of a .pst file" section to make a backup copy of the .pst file that you want to transfer. Make sure that you copy the backup .pst file to a CD-ROM or other kind of removable media. 2. Copy the backup .pst file from the removable media to the second computer. 3. Follow the steps in the "How to import .pst file data into Outlook" section to import the .pst file data into Outlook on the second computer.

How to find a .pst file If you do not know where an old or existing .pst file resides on your computer and you want to add this .pst file to your Outlook profile, this section explains how to search for the .pst file and then add it to your Outlook profile.
171
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Working with Microsoft Outlook


To search for the .pst file, follow these steps: 1. To search for the .pst files: o If you are running Windows Vista: Click Start, and then Computer. Locate the search window in the top right corner. o If you are running Windows XP: Click Start , and then click Search . o If you are running Microsoft Windows 95 or Microsoft Windows 98: Click Start , point to Find , and then click Files or Folders . o If you are running Microsoft Windows 2000 or Microsoft Windows Millennium Edition (Me): Click Start, point to Search, and then click For Files or Folders . 2. Type *.pst, and then press ENTER or click Find Now. Locate the desired .pst file you want to add to Outlook. Record the location of the .pst file. 3. Close the search window and start Outlook. Click on the File menu, and then select Data File Management. 4. Click on the Add button, and then choose the correct type of .pst file to add: If your .pst file was created in Outlook 2007, then choose Office Outlook Personal Folders File (.pst). If your .pst file was created in an older version of Outlook, such as Outlook 97, 2000, or XP, then choose Outlook 97-2002 Personal Folders File (.pst). 5. Navigate to the location of the desired .pst file that you found during your search above. Select the .pst file and click OK. 6. Either type a custom name for the .pst file or accept the default name. Click OK. Click Close to exit the current window.
172
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Working with Microsoft Outlook


Inbox Repair tool: The Inbox Repair tool is automatically installed with all English-language Microsoft Outlook installation options depending on your operating system. This can be used to scan and repair pst file errors. For Microsoft Windows NT and Microsoft Windows 2000: C:\Program Files\Common Files\System\Mapi\1033\NT For Microsoft Windows 95 and Microsoft Windows 98: C:\Program Files\Common Files\System\Mapi\1033\95
The Inbox Repair Tool installs automatically during Microsoft Outlook 2002 and Microsoft Office Outlook 2003 setup. Unlike the Microsoft Office 97 version of the tool, Microsoft Office 2000 does not place the Inbox Repair tool on a menu. To use the Inbox Repair tool, locate one of the folders by using Microsoft Windows Explorer, and then double-click the Scanpst.exe file. The Scanpst.exe file is typically located in one of the following folders: <disk drive>:\Program Files\Common Files\System\Mapi\1033\ <disk drive>:\Program Files\Common Files\System\MSMAPI\1033 The Scanpst.exe file for Outlook 2007 is is typically located in the following folder: <disk drive>:\Program Files\Microsoft Office\Office12

To run the Inbox Repair Tool, follow these steps:


1. Click Start, and then point to Find or to Search, depending upon your operating system. 2. In the Search for files or folders named box, type scanpst.exe 3. Double click the Scanpst.exe file to open the Inbox Repair Tool. 4. Type the path and the file name of the personal folders (.pst) file or click Browse to locate the file by using the Windows file system. 5. Click Start. It will run the set up & Complete the work
173
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

End User Applications

174

2010 Wipro Ltd Internal & Restricted

Open Office

175

2010 Wipro Ltd Internal & Restricted

Open Office

In case you want to remove the borders, in the same above window, Go to the Borders tab and select None.
176
2010 Wipro Ltd Internal & Restricted

Open Office

177

2010 Wipro Ltd Internal & Restricted

Open Office

178

2010 Wipro Ltd Internal & Restricted

Open Office
8. Find & Replace Ctrl+F is used for "Find and Replace". 9. Header and Footer To add a header to a page, choose Insert - Header, and then select the page style for the current page from the submenu. To add footer to a page, choose Insert - Footer, and then select the page style for the current page from the submenu. You can also choose Format - Page, click the Header or Footer tab, and then select Header on or Footer on. Clear the Same content left/right check box if you want to define different headers and footers for even and odd pages. To use different headers or footers in your document, you must add them to different Page Styles (explained below in Section 11), and then apply the styles to the pages where you want the headers or footer to appear.

179

2010 Wipro Ltd Internal & Restricted

MS Office

To know about MS Office installation & repair, Please refer the below link: http://support.microsoft.com/kb/924611

180

2010 Wipro Ltd Internal & Restricted

Peripherals

181

2010 Wipro Ltd Internal & Restricted

Printers

Before starting the troubleshooting, Please check the physical connectivity of the Printer & also ensure that the device is online, No error indication from the printer. Also ensure that the papers are in place properly. Printer Self Test Most printers have a way of printing a test page. This page allows you to determine if the printer is physically working or not. This test is usually accomplished by holding down a series of keys. If you are not sure if your printer has this feature or how to perform it refers to your manual or visit the printer manufacturers web site. If this is not giving the printout does mean there is a problem with the device. If its printing properly with the key combinations, It does mean that the device is working fine, Need to check connectivity & Driver or even the LPT/USB Port. In addition to testing the printer using the printer self-test Microsoft Windows users can also perform software self-test to determine if their computer is able to see the printer and it's able to print. Follow the below steps to perform this test.

182

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Printers
Printer Self Test: Microsoft Windows XP, 2003, and Vista users Click Start, Settings, and open Control Panel. Double-click the Printers or Printers and Fax Icon. Right-click on the Printer you wish to test and click Properties. If you do not see your printer listed your printer is not installed In the Printers Properties window click the Print Test Page button. If the printer is able to print a test page, you're printer is installed and setup properly. However, if you're unable to print in other programs it's possible that the program you're attempting to print from, has issues. You can also test by printing Print a test page from MS DOS, If you suspect a problem in Driver settings. Get to a MS-DOS prompt Type cmd in run or from programs search. Get to the root directory - Type cd\ Reroute dir to printer - Type dir >prn or dir >lpt1 If the device is printing from MS DOS & Not printing from Windows, Its the problem with the driver. Else you can check the connectivity or the problem with the device. In case of USB Printer, You have to check the USB port is working properly or not. Check with other USB Ports & Even try uninstalling all the USB Ports from Device Manager & Restart the desktop.
183
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Linux Basic Installation


RHEL 5 Installation

184

2010 Wipro Ltd Internal & Restricted

Installation Guide for RHEL 5

The below URL is having all deployment guide/Admin guide for RHEL5 32bit and 64 Bit OS. Manual will guide you steps by steps on Installing RHEL 5 on Certified Hardware.

URL for downloading Manuals: http://www.redhat.com/docs/manuals/enterprise/RHEL-5manual/index.html

185

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

TSG Toolkit CD
Manual

186

2010 Wipro Ltd Internal & Restricted

TSG Boot CD Version 2.0


Overview TSG Tool CD runs independently of any operating system. It will boot from any machine, regardless of whether DOS/Windows/Linux/Unix OS is installed on the machine. This tool is mainly designed for Checking the hardware of Desktop and Laptop. You can also run this tool on the server Platform for checking CPU/Memory. If your HDD is able to detect through this CD then you can use this utility for checking Drive Fitness in your server.

187

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Features
Features This CD contains various tools which help you to diagnosis your hardware.

Tools Included :
CPU Stress Test a) CPU Burn-in b) Stress CPU Memory Test a) Memtest86+ Ver. 2.11 Ver. 1.0 Build date 24Oct- 05

b) Windows Memory Diagnostic test Peripheral Test : Monitor a) CHZ monitor Test CPU information a) Intel Processor Frequency ID ( P3 and below) Ver. 7.2.20041115 Ver. 1.01

b) Intel Processor Identification Utility ( P4 and above) Ver. 4.1


188
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Features: Contd.
System Information Tool
ASTRA ( Limited Feature) Ver 5.31

HDD Diagnostic Tools


a) b) Drive Fitness Test ( IBM/Hitachi/WD) Diagnostic Tool ( Fujistu) Ver 4.15 Ver. 7.0

c)

Seatools for DOS ( Seagate/Maxtor) GUI based

Ver. 2.13b

Note: you have to reboot the Machine after testing of one tool. Dont continue from DOS applications
189

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

How TSG Tool CD will work


Boot From CD ,You will get Screen mentioned Below : Press Enter

190

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Menu
Once you Press Enter ,You will get TSG Tool Ver 2.0 CD Menu Screenshot is showing ver 1.1 but screen will remain same in ver 2.0 Sometimes in new Machines , you are not able to see screen given below and machines will hangs then in this case , Please enable the AHCI Mode in BIOS.

191

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Submenu
Press Enter On Motherboard tools ( For Tool Number 1 to 5 which is mentioned in Features paragraph. Once you press Enter you will get Menu of different Tests

192

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

CPU Test
Select CPU Tests for checking Load test/Heat issue with CPU and Heatsink.You can select any CPU test and This test will continue run until you reboot the Machine. We recommended to run it for atleast 30 minutes.

193

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Memory Test

Suppose you want to run Memtest86+ then Select this option and press Enter, It will start Checking RAM modules of the system. We recommended to use this tool for checking Memory modules of the System. Please run the test upto 10 cycle. We suggested you to run it for 2-3 times for better clarity. Note : for 512MB RAM it takes around 2030 minutes.
194
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

For Checking Monitor , Please Select Peripheral Menu.

Press Enter and select CHZ Monitor test and Press Enter;

195

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Monitor Test : Contd.


Test will check Monitor by displaying different colours and for displaying you have to press each time after display of one colour. Please check for any Black Spot on Monitor if Monitor is faulty.

196

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

CPU Information
For Checking CPU information ,Select CPU information Menu

197

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

CPU Information Contd.


Once you select , Press Enter , It will run and give you the Specifications of your CPU. Dont select anything , it will take default options and continue .

198

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

For System Information , Please select System Information menu

This tool will give you full information but in a limited manner but thats sufficient for you.

Now Select the test ASTRA and press Enter This Test will take default Option, So Dont select any option during expansion of Image of Test.
199
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Hard disk Diagnostic tool


Select hard disk tool for HDD diagnostic tool

Once you press Enter on the Menu, you will get submenu of diagnostic tool ,Select the Menu and press enter.
200
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Hard disk Diagnostic tool-Contd.


When you Press Enter then you will get Three options and on basis of your HDD model, Select the test and Press Enter,

Suppose your HDD is Seagate or Maxtor then select Seatools and press Enter

201

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Hard disk Diagnostic tool-Contd.


Dont Select Any other Test without Knowledge as it may destroy the Data of HDD.

Select Drives to Test --------------------After SeaTools loads, the Drive List will show the different storage devices in your system. The first drive detected will be described as Device 0. Select the drive you would like to test. Make sure to choose the correct drive! A check mark in the Model ID column will indicate which drive is selected.

This screen also displays information about the drives such as the Model Number and Serial Number. Seagate model numbers begin with the letters "ST". Seagate serial numbers are alpha numeric and eight characters long.

202

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Hard disk Diagnostic tool-Contd.

Select the Tests to Run -----------------------A menu of the possible diagnostic tests is shown. Select the tests that you would like to perform. Basic Tests Advanced Features Help SHORT Test Set Capacity Contents LONG Test Erase Drive License Acoustic About When you launch the "SHORT Test" most drives will run Drive Self Test. Drive Self Test (DST) is a thorough diagnostic routine that is built in to the hard drive's firmware. Firmware is the machine language programming the controls the disc drive. DST is completely data safe

203

The "SHORT Test" is adequate for most situations. Consider running the "LONG Test" which reads each sector on the drive if you need to run a more comprehensive test. The "LONG Test" test will take a long time to complete. Because the "LONG Test" reads every sector on the drive, the amount of time required will depend on the speed and capacity of the disc drive. The highest capacity drives often take 2 to 3 hours to complete. At any time, feel free to Cancel the test without harming the drive. The "LONG Test" will collect information about possible defects. If any defect are found, a list will be offered at the end or after aborting the scan. You will have the opportunity to attempt to repair the problem
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Hard disk Diagnostic tool-Contd.


Running of the Diagnostics -------------------------The SeaTools performs a data-safe test of the selected hard disc drive or device for possible malfunctions. Long tests may be aborted at any time. Press the ESC (escape key) from the keyboard. During the "LONG Test" only, bad sectors (LBAs) may be detected. They could be part of a data file or even part of the operating system directory structure. Sometimes, problem sectors are empty or not in use. It is important to know that when the sector is bad and unreadable then any data in it is already lost.

204

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Hard disk Diagnostic tool-Contd.


Test Information and Results ---------------------------Upon completion of running the diagnostics, the test results will be given. A log for each drive is saved to the RAM drive. The following conditions may apply: - Passed - Passed after Repair (Seagate and Maxtor only) - Failed - User Skipped Repairs - Aborted "Passed after Repair" is a special condition where bad sectors were detected as unreadable and the user gave permission to SeaTools to attempt to reallocate blank replacement sectors which was successful. The drive is now considered a good drive. A few defects are usually not a cause for concern. For example, there are nearly four hundred million sectors on a 200GB drive. Nonetheless, you should run the LONG Test more often to see if there is a trend of growing defects

205

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

TSG Utility CD
Antivirus Tools :

AVAST Antivirus Removal Tool:- This tool will help you to remove the AVAST antivirus from your system
Avert Stinger:- It is an Antivirus scanner from Mcafee. It can be used under scenarios when you suspect infections in your system.

AVG Antivirus Removal Tool:- This tool can be used to remove AVG Antivirus from your system.
Avira Antivirus Removal Tool:- This tool can be used to remove Avira antivirus from your system.

Bit Defender Removal Tool:- This tool can be used to remove Bit defender antivirus from your system.
Brontok Removal Tool:- Brontok is a computer worm and can be removed using this tool.

206

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Antivirus Tools Contd:


Downadup Removal tool:- W32.Downadup or W32.Conficker was the most annoying worm of its kind. This can be effectively removed using this tool. Drive autoplay fix:- This tool is used to remove the virus, w32.fujacks. Hijackthis:- This is a trendmicro tool that can be used to generate list of suspicious files in your system. Kaspersky Removal Tool:- This tool is used to Kaspersky Antivirus from your system. Mcafee Antivirus Removal Tool:- This tool can be used to remove Mcafee Antivirus from your system. Microsoft Malicious Software removal tool:- This Tool from Microsoft is used to identify and delete malicious software from your system. Nonav:- This tool can be used to remove any symantec antivirus product from your system. Nroton Antivirus removal tool:- This tol can be used to remove norton antivirus from your system.

207

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Antivirus Tools-Contd:
Push Deploymet wizard:- This tool is used to remotely push SEP 11 Clients to a remote location. Registry Cleaner:- This tool is used to clean up the registry from malicious content and broken links. Sylink Drop:- This tool is used to remotely Drop Sylink.XML files to Unmanaged SEP clients. Symantec Antivirus removal tool:- This tool is used to remove symantec antivirus from your system. Symantec definition remover: -This tool is used to backdate corrupt definition for symantec Antivirus. Symantec Endpoint Protection Support Tool:- This tool is used to check the dependency if any and to identify issues associated with symantec endpoint protection tool.

208

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Antivirus Tools-Contd.
Symantec Makedrop:- This tool is used to drop GRC.dat in the old version of symantec antivirus product. Symantec XDB down:- This tool is used to download XDB files which is the definition files for symantec antivirus product.

Sysinternals autoruns:- This tool is used to checkup the system startup, processes, and internet explorer BHO's in your system.

Trend Micro removal Tool: -This tool is used to uninstall trend micro Antivirus. Unhide folder:- This tool is used to unhide the hidden folders for effective virus troubleshooting. Virus Effect Remover:- This tool is used to remove the After effects of the virus infections.

209

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Battery Status Tool


It's a systray application which uses the smart battery support in Windows Vista, XP and 2000 to monitor power usage, battery charge, CPU speed, CPU usage, and power events such as standby/hibernate/resume, battery events, etc. Additionally, it's capable of monitoring CPU temperature (via Intel Core internal sensors, or ACPI thermal sensors), hard drive temperature (if the drive supports it), and even control hard drive APM/AAM/spindown settings, like the Hitachi PowerBooster does. The binary is about 270KB and requires no installation, dll's, etc. It can be autorun from the registry with a checkbox.

The systray icon resembles PowerPanel rather strongly, but integrates battery capacity, AC power status, and CPU speed in a single icon. It has a graphical display window that can be popped up on-demand, which graphs up to 7 parameters over a several hour period, and shows instantaneous status in a window (which is also available in a systray tooltip). It estimates runtime when discharging, and charge time when charging.
In addition to the systray and main window graph, it has a toolbar-style window that can float anywhere on the screen which compactly integrates the systray icon, a charge meter and summary of runtime. It has a programmable hotkey to turn off the screen, which can be used to save significant power when running on battery if you need to turn away for a short time, it's also nice as a "privacy key" if you need to blank your screen instantly. The program can run a program or batch file any time the system switches power source, or resumes from standby or hibernation, something I find useful to perform certain checks automatically to recover state that many programs blissfully ignore. There's a detailed battery display for up to two batteries, with names, voltages, temperature, design capacities, wear percentages, etc, as provided by the batteries themselves
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

210

Disk Image Tool


DiskImg : version of this tool is 1.4.5 Creates and restores images of disks to files

ImgMaker : version of this tool is 1.1 Create backup images of your Hard drive Using ImageMaker To make an image of a disk and save it to a file: - Log on as an Administrator, or another user with administrative privileges. ImageMaker will produce a warning screen if it was started with no administrative privileges.

- Run ImageMaker.You will see a list of hard drives and partitions on the screen. Select a drive or partition you want to back up, and click the MakeImage button in the toolbar. Alternatively, you may right-click and select "Make Image" in the pop-up menu.
- The "Make Image" dialog will appear. Select a file where you want to save image to (WARNING: This file should not be located on the same partition that is being imaged!) - Click the "Start" button on the dialog.You will see a progress indicator showing the progress of the imaging process. The time it needs to complete depends on the size of your hard disk, the location of the saved image (see below), and the operating system you use.
211
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Disk Image Tool-Contd.


Rawcopy :Version of this tool is 1.0 Used to transfer data directly to another drive when the original is faulty. Performs sector by sector disk transfer with data recovery.

Raw Copy copies a disk as a raw image from one drive directly to another.
Raw Copy was designed for users who have faulty drive and would like to transfer the data directly to another drive without doing a file by file copy.

This saves the need for operating system re-installs and allows drives with an unknown file system to be copied (including from console game machines, data recorders, mac etc).
The program has a built in data recovery function which will attempt to recover data from bad sectors to ensure all the available data is restored from the drive. This program is designed to run under NT/XP/2000 or later operating systems. It will run under windows 95/98/Me operating systems but only windows logical drives can be copied

212

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

HDD Health Checkup Tools


Fijustu HDD tools : Version 1.12 only double click need to run this program This diagnostic tool is available for them who feel their Fujitsu hard drive may operating normally. It is only designed for use with Fujitsu ATA/IDE hard drives. There are diagnostic modes: a). Quick Test About 3 minutes, does random seek/read tests. b) Comprehensive Test About 30 to 100 minutes, also performs surface scan. Hitachi HDD tools :Version 4.15

This diagnostic tool can be used for checking any HDD issues. For more details please refer the documents in USERGUIDE folder in CD named dft32_user_guide_4.15.pdf
Seagate HDD tools :Version 1.2.0 Sea Tools for Windows is a comprehensive, easy-to-use diagnostic tool that helps you quickly determine the condition of the disc drive in your external hard drive, desktop or notebook computer. It includes several tests that will examine the physical media on your Seagate or Maxtor disc drive and any non-Seagate disc drive. Sea Tools for Windows should run on both internal and external hard drives For More details Please refer the documents in USERGUIDE Folder in CD named Seatools.pdf.
213
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

CPU Identification Utility: Version 1.6 : Double click will run this program
Purpose of this Utility The Intel(R) Processor Identification Utility is provided by Intel Corporation to enable customers to identify the brand, features, package, intended frequencies and actual operating frequencies of their Intel microprocessor. Customers can also use the utility to discern whether or not an Intel processor is being operated above its Intel rated frequency. The main features of the utility are available via the menu items at the top of the screen: The Frequency Test section of the utility provides information regarding the operating status of the selected processor. The CPU Technologies section of the utility displays the Intel processor technologies and features present in the selected processor. The CPUID Data section of the utility identifies the Intel processor(s) in the system. The Save feature enables the processor information to be saved into a text file. The Web Update feature enables updating to the latest version of the Intel Processor Identification Utility. The Intel Processor Identification Utility is not intended to identify microprocessors manufactured by companies other than Intel.

214

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Network Tool IPSCAN :Version 1.6 : Double click will run this program

Overview Free IP scanner is a very fast IP scanner and port scanner. It is intended for both system administrators and general users to monitor and manage their networks. Powered with multi-thread scan technology, it can scan hundreds computers per second. It simply pings each IP address to check if it's alive, determines hostname, MAC address, NetBIOS information, scans ports, etc. The information obtained can be exported into a file as plain text file. Start Guide Step 1: Run the program

Follow Start > All Programs > Free IP Scanner > Free IP Scanner. Or just double click the Free IP Scanner icon on your Desktop.
Step 2: Select ip scan range and start scanning Use two fields of IP Range to enter first and last IP addresses. The last IP address can be less than the first one there is no problem with translating your input. To begin the scan, press the 'Start Scanning' button.When the program is scanning, this button becomes the 'Stop Scanning' button. Below at the picture there is the main program interface.

215

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

CPU Load Testing Tool Linux OS : version 10.0.4

Tool is available in Compressed and uncompressed Version. Download the compressed version and go into linpack folder which is also extracted separately and available for download. Change the permission 777 to all folders of linpack folders .Change the file input values mentioned under lininput_xeon32/lininput_xeon64 depends upon your OS. Once you change the input file , execute the file runme_xeon32 or runme_xeon64.Output can be seen in lin_xeon32.txt or lin_xeon64.txt depends upon your execution file.

For More details , please refer the userguide which is given in CD.

216

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

ManageEngine Free Tools


Desktop Central - Free Windows Tools 2 Desktop Central provides a set of free Windows tools that Windows Administrators might require on a day-to-day basis. It has a set of 12 tools, viz: Remote Task Manager Tool, Wake on LAN, Software Inventory Tool, Remote Command Prompt Tool, GPO Update, Shutdown/Restart Tool, Join/Unjoin Computer Tool, , Currently Logged On User, Hard Disk Space Detector Tool, Local Users/Groups List Tool, Network Share Browser Tool, and Laptop Battery Power Monitor Tool. This is very handy as it can be performed on multiple computers simultaneously.These tools are made available from the Desktop Central family and is provided as a separate download, which is absolutely free to use. Remote Task Manager Tool Utility to view the processes running in a remote computer along with its details like, Process ID, Memory Usage, Session ID, Priority, etc. It also provides an option to select the parameters to view. Apart from just viewing the processes, the administrators can also terminate a process. . To use this tool, follow the steps below: Click the Remote Task Manager tool from the Launcher to invoke the tool. Specify the Domain name, user name and password to connect with the remote computer. Please note that the user name and password specified here should have the necessary privileges to do this operation in the remote computers. Specify the Computer name from which currently running programs and processes should be retrieved. Click Get Processes to retrieve the currently running programs and processes from the remote computer.

217

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

ManageEngine Free Tools Contd.


Wake on LAN Tool
Utility to boot computers in the network (LAN) from remote. It allows the administrators to boot multiple computers simultaneously.The Administrator has to just specify the IP Address, MAC Address and the Subnet Mask of the computers to wake them up.
The free Wake on LAN tool can be used to boot machines in the LAN from remote. It allows you to boot multiple machines simultaneously.To wake-up a machine from remote, follow the steps below: Click the Wake on LAN tool from the Launcher to start the tool. Click the Add Computers button and specify the following:
Specify the IP Addresses of the machines that you wish to wake-up. You can add multiple IP Addresses here as comma separated values. Specify the MAC Addresses of the machines. If you are adding more than one machine, ensure that the order of the MAC Addresses specified is same as the IP Addresses specified above. Specify the Subnet Mask and click OK.

The specified machines will get added to the list.


Select the machines that you wish to wake-up and click Wake Up. To select all the machines from the list, click Select All.

218

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

ManageEngine Free Tools Contd.


Software Inventory Tool
Utility to retrieve the details of the software installed in the computers of a Windows Domain. The Software details include Software Name,Version, Manufacturer and Usage statistics. The software details can be exported as txt and csv formats. To collect the Software installed in a given computer, follow the steps below: Click the Software Inventory tool from the Launcher to invoke the tool. Specify the Domain name, user name and password to retrieve the details of the software installed in that computer. Please note that the user name and password specified here should have the necessary privileges to do this operation in the given computer. You can either specify the computer name manually or use the Browse button to select a computer to from Domain. When you browse to select the computers, specify the following in the pop-up dialog.
Specify the name of the Domain Controller and click Get Computers. It will list all the computers that domain. Select the Computer from which Software details have to be collected and click OK.

The selected computer will be displayed in the Computer field. Click Get Details button to get the Software details. The Total number of Software and Software names, versions, manufacturers and usage statistics will be shown in the result. The results can be exported in text or CSV format by clicking on the respective icons in result

219

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

ManageEngine Free Tools Contd.


Remote Command Prompt Tool
Free tool to open a command prompt of a remote computer and execute a command. The remote computer can be in the domain or a workgroup.The administrator has to specify a credential that has necessary privileges to execute the commands.The computer can be either specified manually or selected by speciying the Domain Controller. To use this tool, follow the steps below: Click the Remote Command Prompt Tool from the Launcher to invoke the tool. Specify the Domain / Workgroup name, user name and password to access the remote computer. Please note that the user name and password specified here should have the necessary privileges to access the remote computer. You can either specify the name of a remote computer name manually or if the domain setup is Active Directory, use the Browse button to select a particular computer from the domain. When you browse to select the remote computer, specify the following in the pop-up dialog.
Specify the name of the Domain Controller and click Get Computers. It will list all the computers of that domain. Select a computer from the list and click OK.

The selected computer will get displayed in the Computer Name field. Click Execute to bring the remote computer's command prompt. You can now execute the required command.

220

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

ManageEngine Free Tools Contd.


GPO Update Tool
Utility to perform a GPO Update in the computers of a Windows Domain. GPOs are used to send configuration instructions to user and computer objects in the Windows Active Directory. By default, the GPO updates happen periodically, every 90 minutes.This utility helps the Administrators to perform a GPO Update on-demand on multiple domain computers simultaneously. To update the GPOs, follow the steps below: Click the GPO Update tool from the Launcher to invoke the tool. Specify the Domain name, user name and password to perform a GPO update. Please note that the user name and password specified here should have the necessary privileges to do this operation in all the computers. You can either specify the computer names manually as comma separated or use the Browse icon to select the computers to update the GPOs. When you browse to select the computers, specify the following in the pop-up dialog.
Specify the name of the Domain Controller and click Get Computers. It will list all the computers of that domain. Select the Computers for which you wish to do a GPO update and click OK.

The selected computers will get added to the Computers field. Click Do GPO Update to update the GPOs in the selected computers.

221

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

ManageEngine Free Tools Contd.


Shutdown / Restart Tool
Utility to shutdown or restart the computers of a Windows Domain. The Administrator can specify a common credential to perform this operation on multiple computers and can select the computers by specifying the Domain Controller. To shutdown/restart computers remotely, follow the steps below: Click the Shutdown/Restart tool from the Launcher to invoke the tool. Specify the Domain name, user name and password to shutdown or restart a computer. Please note that the user name and password specified here should have the necessary privileges to do this operation in all the computers. You can either specify the computer names manually as comma separated or use the Browse icon to select the computers to shutdown/restart.When you browse to select the computers, specify the following in the pop-up dialog.
Specify the name of the Domain Controller and click Get Computers. It will list all the computers of that domain. Select the Computers that you wish to shutdown/restart and click OK

The selected computers will get added to the Computers field. Click Shutdown or Restart to shutdown or restart the selected computers respectively.

222

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

ManageEngine Free Tools Contd.


Join/Unjoin Computer Tool
Utility to move a computer from one domain to another or from a domian to a workgroup or from a workgroup to a domain. It also provides the ability to restart the computer after this operation. The status of the operation is also displayed at the bottom of the window. Moving a computer from one domain to another To move a computer from one domain to another, follow the steps below: Select the Domain to Domain option. Specify the name of the domain from which the computer is being moved. Specify the Domain Admin user name and password of the old domain. Specify the name of the domain to which the computer is being moved. Specify the Domain Admin user name and password of the new domain. Specify the name of the computer that is being moved. Specify the IP Address of the DNS Server of the new domain Select the "Restart the Client computer after Moving" option, if the computer has to be restarted. Click Move. Check the status of the operation displayed at the bottom.

223

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

ManageEngine Free Tools Contd.


Currently Logged On User
Utility to retrieve the details of the users logged on to a remote computer. The Administrator can specify a common credential to perform this operation on multiple computers and can select the computers by specifying the Domain Controller. To use this tool, follow the steps below: Click the Currently Logged On User tool from the Launcher to invoke the tool. Specify the Domain name, user name and password. Leave the Domain name empty in the case of workgroup computers. Please note that the user name and password specified here should have the necessary privileges to do this operation in all the computers. You can either specify the computer names manually as comma separated or use the Browse icon to select the computer. When you browse to select the computers, specify the following in the pop-up dialog.
Specify the name of the Domain Controller and click Get Computers. It will list all the computers of that domain. Select the Computers for which you wish to get logged on user and click OK.

The selected computers will get added to the Computers field. Click Get Users to get the currently logged on users on the selected computers.

224

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

ManageEngine Free Tools Contd.


Hard Disk Space Monitor Tool
Utility to retrieve the information about the Hard Disk like Partition/Drives,Volume Name, Total Size, Free Space, and File System. The Administrator can specify a common credential to perform this operation on multiple computers and can select the computers by specifying the Domain Controller.The results can be exported to a CSV or Text format for a later reference. . To use this tool, follow the steps below: Click the Hard Disk Space Detector Tool tool from the Launcher to invoke the tool. Specify the Domain name, user name and password. Specify Workgroup name in the case of workgroup computers. Please note that the user name and password specified here should have the necessary privileges to do this operation in all the remote computers. You can either specify the computer names manually as comma separated or use the Browse icon to select the computer. When you browse to select the computers, specify the following in the pop-up dialog.
Specify the name of the Domain Controller and click Get Computers. It will list all the computers of that domain. Select the Computers for which you wish to get the hard disk details and click OK.

The selected computers will get added to the Computers field. Click Get Details to get the hard disk details in selected computers.

225

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

ManageEngine Free Tools Contd.


Local Users/Groups Tool
Tool to get the information about local users and groups in the remote computers.The user details include, Computer Name, User Name, Full Name, Caption, Status, etc. The group details include, Computer Name, Group Name, Caption, Description, and Status. The Administrator can specify a common credential to perform this operation on multiple computers and can select the computers by specifying the Domain Controller. The results can be exported to a CSV or Text format for a later reference. To use this tool, follow the steps below: Click the Local Users/Groups Tool from the Launcher to invoke the tool. Specify the Domain name, user name and password. Specify Workgroup name in the case of workgroup computers. Please note that the user name and password specified here should have the necessary privileges to do this operation in all the computers. You can either specify the computer names manually as comma separated or in case of Active Directory setup use the Browse icon to select the computers.When you browse to select the computers, specify the following in the pop-up dialog.
Specify the name of the Domain Controller and click Get Computers. It will list all the computers of that domain. Select the Computers for which you wish to get local users/groups and click OK.

The selected computers will get added to the Computers field. Click Get Details to get the local users and groups present in selected computers. To fetch the domain users present in the computers, Domain Users check box should be selected

226

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

ManageEngine Free Tools Contd.


Network Share Browser Tool Tool to get the information about the files, folders and Active Sessions of the shares in a remote computer. The results can be exported to a CSV or Text format for a later reference. To use this tool, follow the steps below: Click the Network Share Browser tool from the Launcher to invoke the tool. Specify the Domain name, user name and password. Please note that the user name and password specified here should have the necessary privileges to do this operation in all the computers. NOTE: In case of Workgroup Computers either give the Workgroup name or the Remote Computer name in the Domain Name field. Specify the remote computer's name in Computer Name field Click Get Details button to get the files and folders that are shared in the remote computer. Shared Folders tab displays the remote computer shares and their attributes. Double click each share to view the Share Permissions, Active sessions and Accessed files details. Active Session tab displays the sessions that are established to the computer to access the shares. Accessed Files tab displays the path and permissions of the files that are currently accessed in shares. Show Hidden Shares option can be enabled / disabled to view the hidden shares along with normal shares.

227

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

ManageEngine Free Tools Contd.


Laptop Battery Power Monitor Tool Tool to monitor the battery power of the portable computers in the network periodically and alert by playing a sound when the power falls below a specified percentage. The Administrator can specify a common credential to perform this operation on multiple computers and can select the computers by specifying the Domain Controller. The results can be exported to a CSV or Text format for a later reference To use this tool, follow the steps below: Click the Laptop Battery Power Monitor Tool tool from the Launcher to invoke the tool. Specify the Domain name, user name and password. Please note that the user name and password specified here should have the necessary privileges to do this operation in all the computers. NOTE: In case of Workgroup Computers specify the Workgroup name in the Domain Name field. Click Add Computers button and give the remote computer names in comma separated format. Click Add to add the computers that are to be monitored. Once the computers are added, the battery performance and common battery information of the added computers are monitored. Battery performance interval, in minutes, can configured through the Refresh interval component. To Alert low battery performance, Beep component should be configured. To remove unwanted computers being monitored, select the computers and click Remove Computers.

228

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Monitor Tool : Dead Pixel Test Ver. 2.50


Double click will run this test. Usage * Left mouse click : Quick color selector * Middle mouse click : Moves to next color (Cycle is White/Black/Red/Blue/Green) * Right mouse click : Closes application

229

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

PDF Reader Tool : Version 3.0


Double click will run the program Start reading PDF files without installing Acrobat Reader. User Guide is available in CD in USERGUIDE folder named Foxitreader30_manual.pdf

230

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Scripts : Newping scripts and Scriptomatic2.0 is available


Ping Scipt Documents Make a folder( from where you have to run script ) and in that folder create servers.txtfile . In this file you have to mentioned all IP which you want to check . Once you mentioned that IP then execute the newping script file.

Press Ok button

It will generate the OUTPUT file in EXCEL sheet with date and time.

231

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Scriptomatic 2.0
Works with all the WMI namespaces on your computer.The old version only worked with the root\cimv2 namespace. That was fine for Windows 2000 computers, but just didnt cut it with Windows XP or Windows Server 2003 computers

For more details please refer the Userguide given in Utility CD.

232

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Putty and WinSCP :


Putty Ver. 0.53b : Double click can run this program Putty is a free (MIT-licensed) Win32 Telnet and SSH client. This manual documents Putty, and its companion utilities PSCP, PSFTP, Plink, Pageant and Puttygen.

For More details Please refer the User Guide available in CD named as a Userguide\puttydoc\index.html

WinSCP :Ver. 4.0.2 : Double click can run this program.

WinSCP is an open source SFTP client and FTP client for Windows. Its main function is the secure file transfer between a local and a remote computer. Beyond this, WinSCP offers basic file manager functionality. It uses Secure Shell (SSH) and supports, in addition to Secure FTP, also legacy SCP protocol

233

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

PsTools : System Internal tools :Version 2.44


Requirements Some of the tools require that the default admin$ share be available and/or that the Remote Registry service be active The Windows NT and Windows 2000 Resource Kits come with a number of command line tools that help you administer your Windows NT/2K systems. Over time, I've grown a collection of similar tools, including some not included in the Resource Kits. What sets these tools apart is that they all allow you to manage remote systems as well as the local one. The first tool in the suite was PsList, a tool that lets you view detailed information about processes, and the suite is continually growing. The "Ps" prefix in PsList relates to the fact that the standard UNIX process listing command-line tool is named "ps", so I've adopted this prefix for all the tools in order to tie them together into a suite of tools named PsTools. All of the utilities in the PsTools suite work on Windows NT, Windows 2000, Windows XP, and Server 2003 and none of the tools requires any special installation.You don't even need to install any client software on the remote computers at which you target them. Run them by typing their name and any command-line options you want. To show complete usage information, specify the "-?" command-line option.

234

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

PsTools : System Internal tools Contd:


The tools included in the PsTools suite are: PsExec - execute processes remotely
PsExec

Utilities like Telnet and remote control programs like Symantec's PC Anywhere let you execute programs on remote systems, but they can be a pain to set up and require that you install client software on the remote systems that you wish to access. PsExec is a light-weight telnet-replacement that lets you execute processes on other systems, complete with full interactivity for console applications, without having to manually install client software. PsExec's most powerful uses include launching interactive commandprompts on remote systems and remote-enabling tools like IpConfig that otherwise do not have the ability to show information about remote systems. Installation Copy PsExec onto your executable path. Typing "psexec" displays its usage syntax. Usage usage: [\\computer[,computer[,...] | @file][-u user [-p psswd]][-n s][-l][-s|-e][-i [session]][-c [-f|-v]][-d][-w directory][-<priority>][-a n,n,...>] cmd [arguments]

Please refer the Userguide for getting more details on options used in Psexec

235

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

PsTools : System Internal tools Contd:


You can enclose applications that have spaces in their name with quotation marks e.g. "psexec \\marklap "c:\long name\app.exe". Put arguments directed at the application outside of the parenthesis. Input is only passed to the remote system when you press the enter key, and typing Ctrl-C terminates the remote process. If you omit a username the remote process runs in the same account from which you execute PsExec, but because the remote process is impersonating it will not have access to network resources on the remote system. When you specify a username the remote process executes in the account specified, and will have access to any network resources the account has access to. Note that the password is transmitted in clear text to the remote system. The following command launches an interactive command prompt on \\marklap: psexec \\marklap cmd

This command executes IpConfig on the remote system with the /all switch, and displays the resulting output locally: psexec \\marklap ipconfig /all This command copies the program test.exe to the remote system and executes it interactively: psexec \\marklap -c test.exe Specify the full path to a program that is already installed on a remote system if its not on the system's path: psexec \\marklap c:\bin\test.exe

236

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

PsTools : System Internal tools Contd:


PsFile - shows files opened remotely
PsFile

The "net file" command shows you a list of the files that other computers have opened on the system upon which you execute the command, however it truncates long path names and doesn't let you see that information for remote systems. PsFile is a command-line utility that shows a list of files on a system that are opened remotely, and it also allows you to close opened files either by name or by a file identifier. Installation Copy PsFile onto your executable path and type "psfile". Usage The default behavior of PsFile is to list the files on the local system that are open by remote systems. Typing a command followed by "-?" displays information on the syntax for the command. usage: psfile [\\RemoteComputer [-u Username [-p Password]]] [[Id | path] [-c]]

237

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

PsTools : System Internal tools Contd:


PsGetSid - display the SID of a computer or a user
PsGetSid

Have you performed a rollout and only to discover that your network might suffer from the SID duplication problem? In order to know which systems have to be assigned a new SID (using a SID updater like Sysinternals' own NewSID) you have to know what a computer's machine SID is. Up until now there's been no way to tell the machine SID without knowing Regedit tricks and exactly where to look in the Registry. PsGetSid makes reading a computer's SID easy, and works across the network so that you can query SIDs remotely. PsGetSid also lets you see the SIDs of user accounts.
Installation Copy PsPsGetSid onto your executable path and type "psgetsid". Usage Usage: psgetsid [\\computer[,computer[,...] | @file [-u username [-p password]]] [account] If you want to see a computer's SID just pass the computer's name as a command-line argument. If you want to see a user's SID, name the account (e.g. "administrator") on the command-line and an optional computer name. Specify a user name if the account you are running from doesn't have administrative privileges on the computer you want to query. If you don't specify a password as an option PsGetSid will prompt you for one so that you can type it in without having it echoed to the display.

238

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

PsTools : System Internal tools Contd:


PsInfo - list information about a system
PsInfo

PsInfo is a command-line tool that gathers key information about the local or remote system, including the type of installation, kernel build, registered organization and owner, number of processors and their type, memory size, the install date of the system, and if it's a trial version, the expiration date. PsInfo commandline switches also let you view installed hotfixes and software applications. Installation Copy PsInfo onto your executable path and type psinfo. Usage By default PsInfo shows information for the local system. Specify a remote computer name to obtain information from the remote system. Since PsInfo relies on remote Registry access to obtain its data, the remote system must be running the Remote Registry service and the account from which you run PsInfo must have access to the HKLM\System portion of the remote Registry. In order to aid in automated Service Pack updates, PsInfo returns as a value the Service Pack number of system (e.g. 0 for no service pack, 1 for SP 1, etc). usage: psinfo [\\computer[,computer[,...] | @file [-u username [-p password]]] [-h] [-s] [-d] [-c [-t delimter]]

239

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

PsTools : System Internal tools Contd:


PsKill - kill processes by name or process ID
PsKill

Windows NT/2000 does not come with a command-line 'kill' utility.You can get one in the Windows NT or Win2K Resource Kit, but the kit's utility can only terminate processes on the local computer. PsKill is a kill utility that not only does what the Resource Kit's version does, but can also kill processes on remote systems.You don't even have to install a client on the target computer to use PsKill to terminate a remote process. Installation
Copy PsKill onto your executable path and type pskill with command-line options defined below. Usage Running PsKill with a process ID directs it to kill the process of that ID on the local computer. If you specify a process name PsKill will kill all processes that have that name. usage: pskill [-t] [\\computer [-u username] [-p password]] <process name | process id>

240

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

PsTools : System Internal tools Contd:


PsList - list detailed information about processes
PsList

Most UNIX operating systems ship with a command-line tool called "ps" (or something equivalent) that administrators use to view detailed information about process CPU and memory usage. Windows NT/2K comes with no such tool natively, but you can obtain similar tools with the Windows NT Workstation or Server Resource Kits. The tools in the Resource Kits, pstat and pmon, show you different types of information, and will only display data regarding the processes on the system on which you run the tools. PsList is utility that shows you a combination of the information obtainable individually with pmon and pstat.You can view process CPU and memory information, or thread statistics. What makes PsList more powerful than the Resource Kit tools is that you can view process and thread statistics on a remote computer. Installation Copy PsList onto your executable path and type "pslist". Usage The default behavior of PsList is to show CPU-oriented information for all the processes that are currently running on the local system. The information listed for each process includes the time the process has executed, the amount of time the process has executed in kernel and user modes, and the amount of physical memory that the OS has assigned the process. Command-line switches allow you to view memory-oriented process information, thread statistics, or all three types of data. usage: pslist [-?] [-d] [-m] [-x][-t][-s [n] [-r n] [\\computer [-u username] [-p password]] [[-e] name | pid]
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

241

PsTools : System Internal tools Contd:


PsLoggedOn - see who's logged on locally and via resource sharing
PsLoggedOn

You can determine who is using resources on your local computer with the "net" command ("net session"), however, there is no built-in way to determine who is using the resources of a remote computer. In addition, NT comes with no tools to see who is logged onto a computer, either locally or remotely. PsLoggedOn is an applet that displays both the locally logged on users and users logged on via resources for either the local computer, or a remote one. If you specify a user name instead of a computer, PsLoggedOn searches the computers in the network neighborhood and tells you if the user is currently logged on. PsLoggedOn's definition of a locally logged on user is one that has their profile loaded into the Registry, so PsLoggedOn determines who is logged on by scanning the keys under the HKEY_USERS key. For each key that has a name that is a user SID (security Identifier), PsLoggedOn looks up the corresponding user name and displays it. To determine who is logged onto a computer via resource shares, PsLoggedOn uses the NetSessionEnum API. Note that PsLoggedOn will show you as logged on via resource share to remote computers that you query because a logon is required for PsLoggedOn to access the Registry of a remote system. Installation Copy PsLoggedOn onto your executable path and type "psloggedon". Usage usage: psloggedon [-?] [-l] [-x] [\\computername | username]

242

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

PsTools : System Internal tools Contd:


PsLogList - dump event log records
PsLogList

The Resource Kit comes with a utility, elogdump, that lets you dump the contents of an Event Log on the local or a remote computer. PsLogList is a clone of elogdump except that PsLogList lets you login to remote systems in situations your current set of security credentials would not permit access to the Event Log, and PsLogList retrieves message strings from the computer on which the event log you view resides. Installation Copy PsLogList onto your executable path and type "psloglist". Usage The default behavior of PsLogList is to show the contents of the System Event Log on the local computer, with visually-friendly formatting of Event Log records. Command line options let you view logs on different computers, use a different account to view a log, or to have the output formatted in a string-search friendly way. usage: psloglist [-?] [\\computer[,computer[,...] | @file [-u username [-p password]]] [-s [-t delimiter]] [-m #|-n #|-h #|-d #|-w][-c][-x][-r][-a mm/dd/yy][-b mm/dd/yy][-f filter] [-i ID[,ID[,...] | -e ID[,ID[,...]]] [-o event source[,event source][,..]]] [-q event source[,event source][,..]]] [-l event log file] <eventlog>

243

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

PsTools : System Internal tools Contd:

PsPasswd - changes account passwords


PsPasswd

Systems administrators that manage local administrative accounts on multiple computers regularly need to change the account password as part of standard security practices. PsPasswd is a tool that lets you change an account password on the local or remote systems, enabling administrators to create batch files that run PsPasswd against the computer's they manage in order to perform a mass change of the administrator password. Installation Copy PsPasswd onto your executable path and type pspasswd with command-line options defined below. Usage You can use PsPasswd to change the password of a local or domain account on the local or a remote computer.

244

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

PsTools : System Internal tools Contd:


PsService - view and control services
PsService

PsService is a service viewer and controller for Windows NT/2K. Like the SC utility that's included in the Windows NT and Windows 2000 Resource Kits and Windows XP, PsService displays the status, configuration, and dependencies of a service, and allows you to start, stop, pause, resume and restart them. Unlike the SC utility, PsService enables you to logon to a remote system using a different account, for cases when the account from which you run it doesn't have required permissions on the remote system. PsService includes a unique service-search capability, which identifies active instances of a service on your network.You would use the search feature if you wanted to locate systems running DHCP servers, for instance. Finally, PsService works on both NT 4 and Windows 2000, whereas the Windows 2000 Resource Kit version of SC requires Windows 2000, and PsService doesn't require you to manually enter a "resume index" in order to obtain a complete listing of service information. Installation
Copy PsService onto your executable path and type "psservice". Usage

245

The default behavior of PsService is to display the configured services (both running and stopped) on the local system. Entering a command on the command-line invokes a particular feature, and some commands accept options. Typing a command followed by "-?" displays information on the syntax for the command. usage: psservice [\\computer [-u username] [-p password]] <command> <options>
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

PsTools : System Internal tools Contd:


PsShutdown - shuts down and optionally reboots a computer
PsShutdown

PsShutdown is a similar to the Resource Kit and Windows XP shutdown tools, providing you the same options and ability to shutdown, and optionally reboot, local and remote Windows NT/2K/XP/2003 systems. It also provided additional options that make it more powerful and flexible. Installation Copy PsShutdown onto your executable path and type "psshutdown" with command-line options defined below. Usage
You can use PsShutdown to initiate a shutdown of the local or a remote computer, abort an imminent shutdown, logoff a console user, or lock the desktop. usage: psshutdown [\\computer[,computer[,...] | @file [-u username [-p password]]] -s|-r|-h|-d|-k|-a|-l|-o [f] [-c] [-n s] [-t nn|h:m] [-e [u|p]:xx:yy] [-m "message"]

246

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

PsTools : System Internal tools Contd:


PsSuspend - suspend and resume processes
PsSuspend

PsSuspend lets you suspend processes on the local or a remote system, which is desirable in cases where a process is consuming a resource (e.g. network, CPU or disk) that you want to allow different processes to use. Rather than kill the process that's consuming the resource, suspending permits you to let it continue operation at some later point in time. Installation
Copy PsSuspend onto your executable path and type "pssuspend" with command-line options defined below. Usage Running PsSuspend with a process ID directs it to suspend the process of that ID on the local computer. If you specify a process name PsSuspend will suspend all processes that have that name. Specify the -r switch to resume suspended processes. usage: pssuspend [-r] [\\computer [-u

username] [-p password]] <process name |

process id>

247

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

System Information tool :


ManagePC version 2.5.018 What is ManagePC? ManagePC is an open source application for PC management and inventory in Windows environments. Using ManagePC you can inventory all aspects of PCs on your domain including: Hardware Services Software Hot-Fixes Processes Local Users and Groups Manage PC also lets you take control of PCs through familiar interfaces. Use remote desktop,VNC, reboot, start/stop services, uninstall software and more directly from the ManagePC interface. Requirements : .NET 2.0 Framework Administrative Privilidges on the PC(s) being queried No expensive database is required. Data is stored in XML

248

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

System Information tool : Contd.

CPUZ :Ver 1.50 Double click cpuz.exe can run this program.
CPU-Z is a freeware that gathers information on some of the main devices of your system

ASTRAWIN32 :Version 2.0.3 ( Limited edition) double click on Astra32.exe file to execute it. ASTRA32 is an ideal solution for providing comprehensive information about your computer hardware and software. Not only does ASTRA32 provide a detailed analysis of your system, it also offers diagnostics and comes with some powerful features such as Drivers Troubleshooter and quick HDD Health Status checker. It obtains data directly from hardware so it is very accurate. SpeedFAN :Version 4.39 SpeedFan is a freeware program that monitors voltages, fan speeds and temperatures in computers with hardware monitor chips. SpeedFan can even access S.M.A.R.T. info for those hard disks that support this feature and show hard disk temperatures too, if supported. SpeedFan supports SCSI disks too. SpeedFan can even change the FSB on some hardware (but this should be considered a bonus feature SpeedFan works fine with Win9x, WinME, WinNT, Win2k and WinXP. SpeedFan can be minimized to the tray and does its best to be compatible with other hardware monitoring softwares. Supported MB is given in URL : http://www.almico.com/forummotherboards.php
249
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Temp. File Clean tools


CleanTemp.exe : version 1.0 : Double click can run this program

Easy Cleaner : version 2.0.5 Ability to clear IE temporary files, history and cookies Ability to clear the most recently used list Lots of more options in unnecessary file finder (IE cookies, history and temp files, temp dirs, MS Office CC Cleaner :Version 2.22 Program Summary: CCleaner is a freeware PC optimization tool. It combines a system cleaner that removes unused and temporary files from your system and also a fully featured registry cleaner!

250

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

VNC-Viewer : Tight VNC Version 1.3.9.0


TightVNC is a free remote control software package. With TightVNC, you can see the desktop of a remote machine and control it with your local mouse and keyboard, just like you would do it sitting in the front of that computer.

TightVNC is: Free, GPL-licensed, with full source code available; Useful in remote administration, remote customer support, education, and for many other purposes; cross-platform, available for Windows and Unix, compatible with other VNC software. Double Click on the .exe file and start using VNC software

251

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Windows based Load testing Tool


Windows Linpack :Version 10.0.4 Intel Optimized LINPACK Benchmark for Windows* Intel Optimized LINPACK Benchmark is a generalization of the LINPACK 1000 benchmark. It solves a dense (real*8) system of linear equations (Ax=b), measures the amount of time it takes to factor and solve the system, converts that time into a performance rate, and tests the results for accuracy. The generalization is in the number of equations (N) it can solve, which is not limited to 1000. It uses partial pivoting to assure the accuracy of the results. This benchmark should not be used to report LINPACK 100 performance, as that is a compiled-code only benchmark. This is a shared memory (SMP) implementation which runs on a single platform and should not be confused with MP LINPACK, which is a distributed memory version of the same benchmark. This benchmark should not be confused with LINPACK, the library, which has been expanded upon by the LAPACK library. Intel is providing optimized versions of the LINPACK benchmarks to make it easier than using HPL for you to obtain high LINPACK benchmark results on your systems based on genuine Intel processors. Use this package to benchmark your SMP machine.

252

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Windows based Load testing Tool :Contd.


HPCREATE Data :Version 1.2.3 Utility program used to generate different file sizes with different data contents (up to 3:1 compression ratio) as a means of "controlling" the data to be backed up by an ISV or other backup application, or to generate load on a disk sub-system. Only double clicking will run this tool.

HPReadDATA :Version 1.2.4 Allowing the simulation of multiple stream access to data. This tool is checking for any IO related problem in HDD. Only double-clicking will run this tool.

253

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

UNISTALL - 5 IN 1

254

2010 Wipro Ltd Internal & Restricted

UNISTALL 5 IN 1 BUNDLED PACKAGES

BIT DEFENDER
CRASH PROOF PC REPORTER PORT LOCKER DATA WIPER

255

2010 Wipro Ltd Internal & Restricted

UNISTALL 5 IN 1 BIT DEFENDER


System Requirements You may install Bit Defender Antivirus 2009 only on computers running the following operating systems: Windows XP with Service Pack 2 (32/64 bit) or higher Windows Vista (32/64 bit) or Windows Vista with Service Pack 1 Windows Home Server Before installation, make sure that your computer meets the minimum hardware and software requirements. Note To find out the Windows operating system your computer is running and hardware information, right-click My Computer on the desktop and then select Properties from the menu. 1.1. Hardware Requirements For Windows XP 800 MHz or higher processor 256 MB of RAM Memory (1GB recommended) 170 MB available hard disk space (200 MB recommended) For Windows Vista 800 MHz or higher processor 512 MB of RAM Memory (1 GB recommended) 256 170 MB available hard disk space (200 Internal & Restricted 2010 Wipro Ltd MB recommen

UNISTALL- CRASHPROOF
Crash Proof is data loss prevention software, which once installed in the system, prevents data loss against logical crashes. At the time of installation, Crash Proof calculates the system parameters and stores them in the same hard disk in a protected area.In the event of a disk crash or data loss, Crash Proof revives the data /disk. Crash Proof recovers data even if the computer does not start-up (due to partition corruption, boot corruption etc), if the folders show junk or if files are deleted accidentally or by certain virus etc. Causes of Data Loss: The main causes of data loss are viruses, accidental format or deletion, wrong file transfer, faulty software, incorrect operation of certain disk management utilities, voltage glitches, incorrect shutdown or switch off etc. Every disk crash is unique in itself because, the disk capacities are different, so are their partitioning methods, volumes creation, virus attacks, file management or application utilities etc. Data is stored on the disk but is linked to the operating system using the system area that contains Directory Structures, File Allocation Tables, Data Runs, Boot Record and Partition Table.when these areas get corrupted - data is assumed lost, whereas data is physically present in the disk! And the Operating System is unable to locate it and present it since the file links are lost.Any slight difference in values or bytes in system area will render data inaccessible! also note that data is present physically. Data will be available for recovery until it is overwritten.
257
2010 Wipro Ltd Internal & Restricted

UNISTALL 5 IN 1 PC REPORTER
PC Reporter - is a utility that acts as an Asset Tagging, Tracking & Early Warning System for pending hard disk problems. The system is based on SelfMonitoring Analysis and Reporting Technology (S.M.A.R.T). The hard disk's integrated controller works with various aspects or parameters to monitor various aspects of the drive's / disk's performance and determines from this information if the disk is behaving normally or not PC Reporter Software Offers Asset Tracking Option to track software activities that are installed in the hard disks. Runs constantly in the background. Hence, provides real information. Provides standard hard disk information such as Serial/Model Number, Number of cylinders, and so on. Provides information on various hard disks attributes and also displays their fitness level. Able to scan and display bad sectors on hard disk(s). Scheduler to configure software parameters such as Temperature Warning, Temperature Update, and Log Scheduling. Maintains log reports of disk scans, disk status and so on. Can clone hard disks (that is, it can paste the contents of a potentially fatal diskonto a healthy disk). Provides graphical comparison of temperature fluctuations in relation to warning /shutdown levels. Displays real time 'Benchmark' graph showing the Hard Disk data transfer rate and CPU usage. Can test any IDE/SATA disk. Simple and easy to use, with no loss in system performance.
258
2010 Wipro Ltd Internal & Restricted

UNISTALL 5 IN 1 PORT LOCKER


Port Locker prevents vital & important data to be transferred from one PC to another using Flash drive, DVD/CD writers, PCMCIA ports and Ethernet ports (Network ports). Features: Lock USB, Network, WiFi, Infrared etc ports. Options to open single or multiple ports with authorized password. Block ports to prevent unauthorized access. Block ports when PC is idle. Block ports in scheduled duration. Port Locker - System Requirements Microsoft Windows operating system (i.e. Windows NT/2000/XP/2003 Server/Vista) Hardware Requirements Minimum 64 MB of RAM At least 25 MB of Disk Space

259

2010 Wipro Ltd Internal & Restricted

UNISTALL 5 IN 1 DATA WIPE


To Erase Magnetic Media, we need to overwrite it many times with alternating patterns in order to expose it to a magnetic field oscillating fast enough that it does the desired flipping of the magnetic domains in a reasonable amount of time. Data Wipe is designed with tested algorithms that erase data from the media to make it impossible to retrieve. The file or portion of media selected by user will be accessed by Data Wipe physically and then each and every byte of this portion is overwritten multiple times by special and random characters. The process makes it impossible to recover this overwritten data using special tools or even equipments.

260

2010 Wipro Ltd Internal & Restricted

HARDWARE TROUBLE SHOOTING

261

2010 Wipro Ltd Internal & Restricted

TROUBLE SHOOTING-POST
Symptom: Computer beeps irregularly when the computer is turned on. Computer turns on but does not boot. Turn on the computer but doesn't do anything. Cause: New hardware conflicting with old hardware. Bad or failing hardware device. Connections not connected. Recent electrical storm that caused a surge that damaged computer. Other hardware issue Diagnose / Probe: Make sure your computer is turning on, if you press the power button and nothing happens (no lights, no sound, no fans, etc.) then this issue is not a NO POST but is an power related issue.
262
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

TROUBLE SHOOTING-POST
Resolution: 1. Remove /Refix, CD's, DVD's, HDDs, RAM,SMPS that are in the computer and if any USB devices (iPods, drives, phones, etc) are connected disconnect all of them as well. Reboot the computer and see if anything changes. 2. If any new hardware has been recently added to the computer, remove that hardware to make sure it is not the cause of your issue. If after removing the new hardware your computer works it's likely the computer is either not compatible with the new hardware or a system setting needs to be changed to work with the new hardware device. 3. Remove All the connections from the back of the computer except the power cable. Turn on the computer and see if it beeps normally. If the computer has never beeped keep the monitor or display connected to see if any change occurs. 4. Check for beep codes to identifying what computer component is failing or bad.
263

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

TROUBLE SHOOTING-POST
4. Make sure all fans are running in the computer. If a fan has failed (especially the heat sink fan for the CPU) your computer could be overheating and/or detecting the fan failure causing the computer not to boot.Verify that all the cables are properly connected at that there are no loose cables by firmly pressing in each cable. All disk drives should have a data cable and power cable connected to them. 5. Your power supply should have at least one cable going to the motherboard. Many motherboards may also have additional cables connected to them to supply power to the fans 6. If the above recommendations still have not resolved the irregular POST attempt to disconnect the Riser board (if applicable) and/or each of the expansion cards. If this resolves the issue or allows the computer to POST connect one card at a time until you determine what card is causing the issue.

264

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

TROUBLE SHOOTING-POST
7. If you were unable to determine by the beep code what is failing or do not have a beep code disconnect the IDE, SATA, SCSI, or other data cables from the CD-ROM, hard drive, and floppy drive from the Motherboard. If this resolves your irregular post or you now get an error message attempt to re-connect each device one at a time to determine which device and or cable is causing the issue. Re-insert the memory into the same slot. If you have more than one stick of memory remove all but one stick of memory, try rotating through each stick. Try one stick of memory in each slot.

8.

9.

10. If after doing all of the above recommendations you continue to have the same issue unfortunately it is likely that you have bad Motherboard, PSU, CPU and/or RAM. The next step would be either to replace these components and/or have the computer serviced.
265

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

SYSTEM FREEZES OR STOPS RESPONDING FREQUENTLY


Symptom: Windows freezes while working / Stops responding frequently Cause: Driver related issue/Operating system related issue/Software related issue. Heat related issue/Hardware issue/Windows related Issues/Hardware failure. Probing: Check by pressing Num Lock //CAPS Lock button on the keyboard and watch Num Lock/CAPS Lock LED is turns off and /or on. Resolution: 1. If you're able to get the light to turn off and on, press CTRL + ALT + DEL and attempt to end task the unwanted program. If Light is not going on/off, then restart the machine with Selective Startup and also try in safe mode. 2. If you're encountering lockups when the computer is opening a particular program, make sure you have all the latest updates for that program and ensure the program is not corrupted, If corrupted Re-install the Program.You can find the latest updates for your software through the software developer or publisher.
266
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

SYSTEM FREEZES OR STOPS RESPONDING FREQUENTLY 3. If there is an issue that exists with your video drivers a computer could lock up while . playing a game or displaying any other type of video. Make sure you have the latest drivers for all major devices in your computer (video, sound, modem, and network.) 4. Make sure your operating system has all of the latest updates installed on it. 5. If the computer processor is getting too hot it can cause the computer to freeze. Need to check the heat sink compound availability and Processor FAN is functioning properly. If you heard any abnormal noises coming from your computer recently such as a high squealing, this could indicate a fan may be failing in your computer. 6. If you have recently added any new hardware into the computer, try temporarily removing it to make sure it is not the cause of your issue. Before attempting to remove any hardware, make sure you are not encountering this issue because of hardware conflicts by viewing Device Manager for errors. Its possible that Windows may be seriously corrupt. We suggest you backup all information and reinstall Windows on your computer. 7. If after reinstalling your Operating system or during the installation of your operating system, your computer turns off abnormally, it is very likely that other hardware is failing in the computer. Often this could be RAM, CPU, Motherboard, and/or Power Supply.
267
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Windows restarts without warning


Cause:
This issue could be caused by any of the below possibilities. Software issue Hardware issue or error. Heat related issue. Computer virus. Issue with operating system.

Software issue:
1. Errors generated by software programs can cause a computer to reboot unexpectedly or without warning. 2. If you are not running Windows XP or following the below steps still cause your computer to reboot without warning. Boot your computer into Safe Mode, and let the computer run in Safe Mode. Additional information and help with getting into Safe Mode. 3. If the computer is still rebooting in Safe Mode the issue is likely not with the software but something else, It is recommended to run the basic troubleshooting section for your operating system.

268

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

WINDOWS RESTARTS WITHOUT WARNING


Hardware issue or error 4. . Any failing hardware component in your computer could cause your computer to unexpectedly generate 5. an error and/or reboot without warning. If you have recently Installed a new hardware device, remove that device to make sure it is not causing your issues. 6. Make sure you are not encountering any hardware conflicts by viewing Device Manager New drivers can also cause this issue, if you have recently performed any hardware driver updates you may wish to try an earlier version of the drivers. Additional information and help with computer drivers can be found on our drivers page. 7. If you have updated drivers and removed any hardware that could be causing this issue and continue to experience random reboots, it's possible that the memory is bad in the computer. hardware devices that are not installed properly in the computer can also cause random reboots. Make sure all the cables and expansion cards are connected properly to the computer. To determine this is to disconnect and reconnect all cables and expansion cards. 269 2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

WINDOWS RESTARTS WITHOUT WARNING


8. Computer viruses such as the blaster virus are written to reboot your computer without warning. Usually these viruses will make the computer reboot every 5, 10, 15 or 30 minutes. 9. If you believe your computer may be infected with a virus or are uncertain if your computer is infected with a virus make sure your virus scanner definitions are up to date.. Many computer today are designed to turn off or automatically reboot if the computer, processor, or other device in your computer gets to hot. If you have heard any abnormal noises coming from your computer recently such as a high squealing this could indicate a fan may be failing in your computer. 10. You can first start by verifying the fan on the power supply is working For all other fans in the computer you will need to either open the computer and make sure the fan are working (processor fan and case fan) and/or if your BIOS monitors the RPM of the fans enter BIOS and make sure the BIOS does not report any errors.

270

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

WINDOWS RESTARTS WITHOUT WARNING


11. If after following each of the above recommendations your computer still continues to reboot it is likely that you are experiencing a Microsoft Windows . operating system related issue that cannot be explained.
To help make sure this is the case please try the below steps. 12. Reboot the computer and enter CMOS setup as the computer is booting. If you are not familiar with how to enter CMOS After you have loaded the computer in CMOS setup let the computer be running in CMOS mode. 13. If the computer does not reboot in CMOS mode it is likely that you are in fact experiencing an issue with Microsoft Windows and it is recommend that if you have followed all of the above recommendations that you reinstall your version of Microsoft Windows.

271

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

SYSTEM RUNNING SLOW


Cause:
This issue can be caused by any of the below possibilities. .

Hard disk space not available:


Several software programs have been installed/uninstalled leaving behind bad files and/or confusing the software. Data Corruption. Missing Windows updates / Outdated drivers. Computer is overheating. Corrupt OS.

Bad Hardware:
1. Verify that there is at least 200-500MB of free hard disk drive space. This available space allows the computer to have room for the swap file to increase in size as well as room for temporary files. 2. Run Scandisk or something equivalent to help ensure that there is nothing physically wrong with the computer hard disk drive.
272

3. Run Defrag to ensure that data is arranged in the best possible order
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

SYSTEM RUNNING SLOW


1. If you've got an anti-virus scanner on the computer, spyware protection program or other security utility make sure it's not running in the background as you're trying to work. Often when these programs begin to scan the computer it can decrease the overall performance of your computer. 2. Verify that the Device Manager has no conflicts. If any exist resolve these issues as they could be the cause of your problem. Make sure you have all the latest Windows updates installed in the computer. 3. Make sure you've got the latest drivers for your computer. Especially the latest video drivers. Having out-of-date drivers can cause an assortment of issues. 4. Make sure your computer and processor is not overheating,

273

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

SYSTEM RUNNING SLOW


5. Excessive heat can cause a significant decrease in computer performance some processors will even lower the speed of the processor automatically . to help compensate for the heat related issuesIf you've had your computer for more than one year it's likely you're computer is not meeting the memory requirements for today. We suggest at a minimum the computer have 1GB of memory. Additional information about determining how much RAM is installed in your computer. 6. Finally, if none of the above solutions resolve your issues, it is recommended that you either reinstall Windows. 7. Still after re-installing Windows, system is slow, it could be due to malfunction of a hardware.

274

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

No power or computer does not turn on.


.Cause: No power from the computer can be caused by any of the below possibilities. Connections not connected properly. Third-party hardware. Bad power cable. Incorrect power supply. Bad battery. Bad power supply, power button, Bad MBD

Solution:
1. Note: If the computer is turning on but is not posting (beeping) or giving any type of picture on the display,.pls check the processor is properly connected and Fan is rotating. 2. If you are uncertain if the computer is turning on or not, this can be easily checked by seeing fans in the computer or visible from the outside of the computer. If these fans are spinning and the computer is receiving power.
275

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

No power or computer does not turn on.


3. Verify that the power connection is connected properly to the wall and the back . of the computer.
4. If the connections appear to be connected properly, attempt to disconnect and reconnect both ends of the cable. 5. If you have a power strip (surge protector) or switch used to turn everything on at once, temporarily disconnect the computer from that switch and connect that cable directly to the wall.

6. This will help verify that the strip or switch is not bad.Verify that the outlet works by connecting a different component to that switch

276

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

NO DISPLAY ON MONITOR
Cause:
. This issue can be caused by any of the below possibilities. Monitor is not on Computer is asleep Connections not connected properly. Monitor settings are not correct. No Post. Hardware issue.

Monitor is On/OFF:
Make sure the monitor is on. If no power light (green or orange light) is seen on the monitor display try pressing the power button until it comes on. If no light comes on after several attempts check the Power connections are connected properly.

Computer Sleep:
If your computer monitor was on and you stepped away from the computer and upon returning it was black it's likely that the computer is asleep. Try moving your mouse, clicking the mouse buttons, and/or pressing any key (space bar) on the keyboard to wake it up.
277
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

NO DISPLAY ON MONITOR
Connections not connected properly: Make sure that you are connecting .
the monitor to the back of the computer in the 15-pin connector as shown to the right or older computer 9-pin connection. If the computer is properly plugged in, make sure it's getting getting power.

If you are not receiving power from a wall outlet replace it with another one or exchange the computer and monitor Cable. If the monitor still does not get power, would need repair.

278

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

BASIC NETWORK TROUBLESHOOTING Cause:


If a computer is unable to connect to a network or see other computers on a . network, it may be necessary to troubleshoot the network. A network may not work because of any of the below reasons. Network card not connected properly. Bad network card drivers or software settings. Firewall preventing computers from seeing each other. Connection related issues. Bad network hardware.

Solution:
1. Verify that the network cable is properly connected to the back of the computer. In addition, when checking the connection of the network cable, ensure that the LEDs on the network are properly illuminated. For example, a network card with a solid green LED or light usually indicates that the card is either connected or receiving a signal. Note: generally, when the green light is flashing, this is an indication of data being sent or received. If, however, the card does not have any lights or has orange or red lights, it is possible that either the card is bad, the card is not connected properly, or signal from the 279 that the card is not receiving a2010 Wipro Ltd Internal & Restricted network. 2009 Wipro Ltd - Confidential

BASIC NETWORK TROUBLESHOOTING


2. If you are on a small or local network and have the capability of checking a hub or switch, verify that the cables are properly connected and that the . hub or switch has power. 3. Ensure that if this is a new network card being installed into the computer that the card's resources are properly set and/or are not conflicting with any hardware in the computer. Users who are using Windows 95, 98, ME, 2000 or XP, verify that Device Manager has no conflicts or errors 4. Verify that the network card is capable of pinging or seeing itself by using the ping command. Windows / MS-DOS users ping the computer from a MS-DOS prompt. Unix / Linux variant users ping the computer from the shell. To ping the card or the local host, type either ping 127.0.0.1 or ping local host This should show a listing of replies from the network card. If you receive an error or if the transmission failed, it is likely that either the network card is not physically installed into the computer correctly, or that the card is bad. 5. Verify that the correct protocols are installed on the computer. Most networks today will utilize TCP/IP, but may also utilize or require IPX/SPX 280 and NetBEUI. 2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

BASIC NETWORK TROUBLESHOOTING


6. If your computer network utilizes a firewall, ensure that all ports required are open. If possible, close the firewall software program . or disconnect the computer from the firewall to ensure it is not causing the problem. 7. In some cases it may take a computer some additional time to detect or see the network. If after booting the computer you are unable to see the network, give the computer 2-3 minutes to detect the network. Windows users may also want to try pressing the F5 (refresh) key when in Network Neighborhood to refresh the network connections and possibly detect the network. 8. If after following or verifying the above recommendations you are still unable to connect or see the network, attempt one or more of the below recommendations. If you have installed or are using TCP/IP as your protocol you can attempt to ping another computer's IP address to verify if the computer is able to send and receive data. To do this, Windows or MS-DOS users must be at a prompt and Linux / Unix variant users must open or be at a shell.
281
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

BASIC NETWORK TROUBLESHOOTING


9. If you receive a response back from this address (and it is a different computer), this demonstrates that the computer is communicating over the network 10. Another method of determining network issues is to use the tracert command if you are a MS-DOS or Windows user or use the traceroute command, if you are a Linux / Unix variant user. To use this command you must be at the command prompt or shell This should begin listing the hops between the computer and network devices. When the connection fails, determine which device is causing the issue by reviewing the traceroute listing Eg: tracert 102.55.92.2(IP NO) or traceroute 102.55.92.2(IP NO)

282

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

MISSING OR LOST SOUND IN WINDOWS


Cause:
This issue could be caused by any of the below possibilities. Bad software settings. Corrupt or missing sound drivers. Compatibility issues with the operating system and/or other hardware. Speaker related issues. Bad or missing sound card.

Solution:
1. First verify you see a small speaker icon in the Systray (generally at the bottom right hand corner of your screen). If this icon is missing follow the below section.

Windows XP
2. Open the Control panel Open the "Sounds and Audio Devices" icon. Verify the "Place volume icon in the taskbar" checkbox is checked. If this option is not available or is grayed out, skip to the next section of this document. If you were able to check this box, click ok and close out of this window and the Control Panel. Double-click the sound icon in the Systray and verify that all the sound volumes are mid-way or higher. If other devices are listed, it is possible that these other devices could be the sound card or other devices conflicting with the sound card. If any other devices are listed it is recommended you remove those devices, reboot the computer and let Windows redetect the devices. If this does not work, attempt to determine which device is not being detected and resolve that issue first. 283
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

MISSING OR LOST SOUND IN WINDOWS


3. If you are missing the "Sound, video and game controllers" category in Device Manager, it is likely that the sound card drivers are not installed properly, sound card has been disabled, sound card is bad, or no sound card is available in the computer. First, verify no conflicts or other devices are present in the Device Manager; if these are present it is likely they are the sound card and/or devices causing the sound card not to be detected. 4. Second, verify that the computer has a sound card and/or that the sound card is enabled on the computer.If this is an on-board sound card you can verify that it is enabled in BIOS setup 5. If you have no adapters and/or cannot click the down arrow to select the correct adapter, close out of this Window. In Control Panel double-click the System icon / click the Device Manager tab within Device Manager and ensure there are no yellow ! or red X. 6. If you have either of these on any of your sound devices, attempt to remove everything under Sound Video game controllers and reboot the computer.
284

7. Verify the speakers settings and 2009 Wipro Ltd - Confidential not at fault speakers are 2010 Wipro Ltd Internal & Restricted

MISSING OR LOST SOUND IN WINDOWS


8. If you have followed the above recommendations and you are still unable to get the sound card to work, in Device Manager remove all sound video and game controllers and reboot the computer. This should cause Windows to reinstall all missing drivers and often can correct corrupt drivers. If this does not work after rebooting the computer download and install the latest sound card drivers from the computer or sound card manufacturer

9. Finally, if all of the above recommendations do not resolve your issue it is likely that either the sound card is physically bad or that the operating system is severely corrupt

285

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

System Care and Handling: Best Practices

286

2010 Wipro Ltd Internal & Restricted

System Care and Handling: Best Practices.

Always keep your Windows up-to-date with the latest Microsoft patches Keep less files on Desktop, always keep files in folders. Keep only minimal programs which are required to you only in your computer. Keep your antivirus definitions updated Regularly. While opening E-Mail attachments, ensure the attachment is scanned before opening. Periodically clean your temporary folders/internet files/Cache and cookies. Use the Start Button on the Windows Taskbar to shutdown your computer. It is also necessary to save files & Close all application which are running in the taskbar. Keep CD's in a cover and handle them by the edges. Try to keep floppy disks in proper storage box and perform a full format on the disk before copying important data

287

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

System Care and Handling: Best Practices.

Do not download freeware and also Dont use software that isnt certified and legally not licensed. Downloading software from a unauthorised site, or accepting a shared copy, is not legal and may take valuable information from your system over a period of time. Do Not move your computer, even a few centimeters when system is on, always shutdown the computer before any movements. This applies to the Monitor and other Peripherals attached to the system. Unnecessary shock can cause fatal breakdown of sensitive parts or reduce the expected lifetime of the computer and its spares. Do Not Place any equipments or other objects on top of a Desktop or the peripherals attached to the Desktops. Do Not Operate the computer on a fully closed enclosures preventing the airflow to the cooling vents on the sides or back, which will cause the system to overheat and can lead to failure

288

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

System Care and Handling: Best Practices.


Moving the System or pulling the AC adapter cord while the it is plugged in, may cause the plug to break off /or damage the socket and even can lead to personal injury. Hard-mounting the system in a vehicle or surface that it is subject to strong vibration can result in data corruption and disk failures.

Inserting a floppy disk into a drive at an angle or upside down, may cause the drive to jam and make it unreadable. Placing more than one label on a floppy disk, which also causes the jam in the drive.
Touching the CD-ROM tray and the media which may contaminate the lens and/or throw it out of alignment Avoid Placing the system closer than about 5 inches (13cm) from any electrical device that generates a strong magnetic field, such as electric motors, TVs, refrigerators, and large audio speakers. Avoid Placing your computer on the floor. The fans in the computer that pull air through the case to cool processor & SMPS will pull all the stuff that settles out of the air, and onto the floor, into your computer.
289
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

System Care and Handling: Best Practices.


Avoid bringing liquids near to system, which can accidentally fall and may contaminate the internal components and/or cause a malfunction or even short circuit When transporting a computer, we recommend you to consider the following guidelines in order to protect the system:

Remove all floppy disk and/or CD/DVD disc media from all the drives.
Make sure all covers of the computer are in position and are Properly closed. Also ensure appropriate carton box and packing materials are used If original packing material which has comw with the computers are available, it is better to use them.. Following the above simple guidelines during transportation or shipping the system will help in ensuring the machine reaching the destination in safe and working condition.
290
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

System Care and Handling: Best Practices.


Delete Cookies, Delete Files, Clear History. Internet Explorer creates temporary internet files. It is best to clear them out regularly. Load Internet Explorer. Select Internet Options from the Tools menu. On the General tab, choose Delete Cookies, Delete Files, and Clear History. If you have cookies or passwords that you like to keep, It will make this cleanup easier. Take out the trash. Empty your Recycle Bin daily. Reboot your computer once a day. Use Start/Shut Down/Restart. Not all programs you run release memory and resources fully when you quit them. Restarting once a day will fix this.

291

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

System Care and Handling: ESD AND EOS


ESD/EOS Electrostatic Discharge (ESD) Electrostatic discharge (ESD) costs the electronics industry millions of dollars each year in damaged components, non-functional circuit boards and scrambled or missing information. ESD can occur in the manufacturing, shipping, receiving, and field handling of integrated circuits or computer boards with no visible signs of damage. A malfunction in these components or boards can occur immediately or the apparatus may perform for weeks, months, or even years before an unpredictable and premature breakdown causes a field failure. Why Should we Care About Electrostatic Discharge? When we incorporate electronic components or boards into the products, ESD damage can have a direct impact on your companys reputation and profits. That is because electrostatic damage directly affects the quality and reliability of our products. However, for a small investment in time, manpower, and equipment, you can virtually eliminate ESD-caused problems. The tangible benefits to you include:

292

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

System Care and Handling: ESD


Higher manufacturing yields Less rework and inventory Reduced overall costs Fewer field failures and warranty calls Increased product reliability More repeat business resulting in greater profits Eliminate ESD Damage Manufactures and uses electronic components, and has implemented a comprehensive ESD prevention program to ensure that our products are delivered to customers with the highest possible reliability. Using this information, we can implement similar preventive practices in our facilities and warehouses. As a result, component failures can be minimized. What is ESD? ESD is the transfer of electrical charge between two bodies at different potentials, either through direct contact or through an induced electrical field. It gives you a mild shock when you walk across a carpeted floor and then touch a doorknob. While this discharge gives a harmless shock to humans, it is lethal to sensitive electronics. For example, the simple act of walking across a vinyl floor can generate up to 12,000 V of static electricity.. Several technical failure mechanisms are due to ESD which causes huge damages.
293
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

System Care and Handling: ESD


ESD Occurs at All Levels of Integration Electrostatic discharge is not selective when affecting your products. It can strike components directly or indirectly by passing to the component via connectors and cables. Components mounted on circuit boards are also susceptible.

ESD never kills, but Injures What Can we Do To Prevent ESD? Fortunately, preventing ESD can be relatively easy and inexpensive. Two areas of focus are: Eliminating static charges from the workplace. Properly shielding components and assemblies from static fields. Eliminating static electricity in the workplace is accomplished by grounding operators, equipment, and devices (components and computer boards). Grounding prevents static charge buildup and electrostatic potential differences. Electrical field damage is averted by transporting products in Special electrostatic shielding packages.
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

294

System Care and Handling: ESD


Electronic Component ESD Sensitivity (ESDS ESD Class 0: Damage we cant feel : 0 to 199 Volts ESD Class 1: Damage we cant feel : 200 to 1,999 Volts ESD Class 2: Damage we might feel : 2,000 to 3,999 Volts ESD Class 3: Damage we can probably : 4,000 to 15,999 Volts Detect as spark with our own body: The following table shows some typical situations. Please note that humidity has a significant effect on the induced charge. It is not recommended to have relative humidity (RH) that is too low, say, below 30%. ESD control becomes especially challenging at low RH levels. A relative humidity between 40% to 60% is recommended for the typical assembly area
Means of static generation Walking across a carpet Walking on a vinyl tile floor Vinyl envelopes for work instructions Worker at bench 295 RH 1020% 35,000 V 12,000 7000 6,000 RH 6590% 1,500 V V 250 V V 600 V V 100

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

ESD GROUNDING METHODS

Ground ESD floor mats via ground cord to equipment ground

Foot Grounders
296

test wrist strap daily


2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Test foot grounder daily

ESD - PREVENTION
Test Wrist Straps & ESD Footwear daily Keep wrist band snug, foot grounder grounding tab in shoe, & ESD Smocks buttoned Up Only trained or escorted people to be allowed in ESD Protected Area

An Effective Workplace:
An effective workplace should be outfitted with the following items: 1.ESD protective clothing/smocks. Street clothing must not come in contact with components or computer boards since the various materials in clothing can generate high static charges. ESD protective smocks, manufactured with conductive fibers, are recommended. 2.Electrostatic shielding containers or totes. These containers (bags,boxes, etc.) are made of specially formulated materials which protect sensitive devices during transport and storageAntistatic or dissipative carriers. These provide ESD protection during component movement in the manufacturing process. It must be noted that antistatic materials alone will not provide complete protection. They must be used in conjunction with other methods such as totes or electrostatic shielding bags. 4.Dissipative table mat. The mat should provide a controlled discharge of static voltages and must be grounded. The surface resistance is designed such that sliding a computer board or component across its surface will not generate more than 100 V. 297 2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

ESD - PREVENTION
5.Personal grounding. A wrist strap or ESD cuff is kept in constant contact with bare skin and has a cable for attaching it to the ESD ground. The purpose of the wrist strap is to drain off the operators static charge. The wrist strap cord has a current-limiting resistor for personnel safety. Wrist straps must be tested frequently to ensure that they are undamaged and operating correctly. When a wrist strap is impractical, special heel straps or shoes can be used. These items are effective only when used in conjunction with a dissipative floor.

Heel Straps

Wrist Straps

Floor Mats

298

6.ESD protective floor or mat. The mat must be grounded through a currentlimiting resistor. The floor or mat dissipates the static charge of personnel approaching the work bench. Special conductive tile or floor treatment can be used when mats are not practical or cause a safety hazard. Chairs should be conductive or grounded with a drag chain to the flooring, if we touch or handle the components by sitting on that.
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Antivirus

299

2010 Wipro Ltd Internal & Restricted

Different types of threats


Virus Trojan Horse Worm Blended attack Expanded threat False Positives

300

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

What is a virus?
A program written to alter the way a computer operates. It will self execute its own code and place itself in the path of execution of another program. It must replicate itself For example, it can replace other executables with a copy of the virus infected file. It can infect desktops and network servers alike.

301

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Types of viruses
File infectors :They infect any program files, they come in through .exe and .com files. Examples are Jerusalem and cascade. Boot sector viruses:It infects the system are of a disk, basically the boot record a floppy disk or a hard disk. Examples are Michelangelo and disk killer. Master boot record viruses:They are almost same as the boot sector viruses, the only difference between them is that where they load themselves. Such infectors saves a copy of the MBR in a different location. The Pcs infected with boot sector viruses and MBR viruses will not boot. Example:-Unashamed, NYB, Antiexe .

302

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Types of viruses
Multipartite Viruses:These are infections that infect both the program files and boot records. These are difficult to remove, the infections from both the locations should be removed or else they might re-infect any one of the locations back again. Example:-One_Half,Emperor. Macro viruses:These type of Viruses infect data files. They Have cost Corporations millions. The Evolution Of Visual Basic in 97,a macro Virus can be written that can infect data files. It infects MS Word, Excel, Power point. They are circulating good numbers across the world because of the ease with which they can be created. Ex:W97M.Mellisa,W97M.NiceDay.

303

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

What is a Trojan Horse?


Trojan horses are impostors- files that claim to be something desirable but, in fact, are malicious. A major distinction between a Trojan and a virus is that the former do not replicate themselves. Trojans contain malicious code that when triggered causes loss of data and even theft. To get infected by a Trojan you must invite such programs to your computer. Example :By downloading an E-mail attachment. Trojan.Vundoo is one of the Trojans that once infected becomes difficult to clean or delete.

304

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

What is a Worm?
Worms replicate from system to system without use of a host file. Worms Usually reside inside word or excel documents & the worm will release a document that has the worm macro inside it. The document will now move from computer to computer.

305

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Troubleshooting Virus Infection


Case I: - Unknown Infection Suspicious activity observed and no files detected Activities such as pop ups, file creation, URL redirection, network congestion are observed.

Troubleshoot/Locate the files responsible Check netstat output for connections made to any unknown IP addresses. View files based on their modified dates to check for recent changes made on the system ,typically in folders like /Windows/System32 , /Windows/System32/drivers Check the registry HKeyLocalMachine\SOFTWARE\Microsoft\Windows\CurrentVersion\Runfor any startup entries made by the virus Check the task manager for any unknown, random name processes running Enable view for hidden files and folders

306

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Troubleshooting Virus Infection


Case II: - Unable to clean Virus detected but unable to clean/delete/quarantine As seen in the virus logs files are detected but not cleaned/removed from the affected machines.

Troubleshooting If files are in the temporary internet folder then would be in use and may not get deleted. We recommend you to delete the contents of the temporary internet files folder. Boot machine in safe mode and run a manual scan Use tools from recognized AV vendors like Symantec, Mcafee and Trend Micro like:Mcafee Avert Stinger. Trend Micro House call 7.1 Norton Security Scanner from Symantec.
307
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Troubleshooting Virus Infection


Case III: - Re-infection Virus detected but reinfection occurring in the network. As seen in the virus logs files are detected and cleaned/removed from the affected machines but reinfection occurring through shared folders/mapped drives or infected USB drives. Troubleshooting Since malware are detected and taken care of in such a way that you may need to check the sources of reinfection and security holes in the network responsible for them. Check virus logs to look for the infection source of the malware. Infection level in the network will not reduce until infection sources are eliminated.

308

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Best Practices
Ensure the latest Virus Pattern and Scan Engine versions are loaded in the Antivirus used. Disable system restore Option on windows XP/Vista. Apply latest Microsoft Patches on all windows machines. Enable mapped drive scanning especially during outbreaks of malware that Spread using Shared/mapped Folders.

Use a firewall that will prevent incoming and outgoing malicious traffic.
Enable schedule scanning daily in case of huge network outbreaks.

Keep Temp, temporary internet files, prefetch and startup clean.


Use a password on shares if the shares are commonly used or else remove the shares because this will reduce the spread of infections.
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

309

Best Practices on SEPM Installation

310

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Best Practices on SEPM Installation


2. Open the IIS Manager as below:

3. Expand Local computer as below:

311

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Best Practices on SEPM Installation


4. Expand to default website as below:

5. Right click on default website, click browse:

312

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Best Practices on SEPM Installation


6. On clicking browse, the following screen will appear. You shall proceed to install SEPM now

7. Click setup to start the SEPM installation:

313

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Best Practices on SEPM Installation


8. Select the install location and proceed:

9. Select the custom website option and ensure TCP port is set to 8014:

314

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Best Practices on SEPM Installation


10. Click Install to proceed with SEPM Installation & Complete it by clicking Finish:

315

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Best Practices on SEPM Installation


10. Management server config. window will pop-up next, select Advanced and click next:

11. Select number of users based on site requirement:

316

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Best Practices on SEPM Installation


12. Select Install my first site and click next:

13. Prefer keeping the default details & click next:

317

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Best Practices on SEPM Installation


14. Give the Site name and click next:

15. Give an Encryption password and store it somewhere as its used for Disaster recovery purpose:

318

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Best Practices on SEPM Installation


16. Select the Database, based on the clients size and proceed:

17. Enter the SEPM console Admin password & click next:

319

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Best Practices on SEPM Installation

18. Select No for Migration deployment wizard & Finish the SEPM Installation:

320

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Best Practices on SEP client Installation


1. Go to SEPM & click on Migration and Deployment wizard & click next :

2. Select Deploy the client & click next:

321

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Best Practices on SEP client Installation


3. Specify the group name for which the SEP client has to be installed:

4. Prefer leaving the default options and click next:

322

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Best Practices on SEP client Installation


5. Specify the Install package options & click next:

6. Click No to proceed with creating Install package:

323

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Best Practices on SEP client Installation


7.You can push out the software from the push deployment wizard., thru the following exe file: C:\Program Files\Symantec\Symantec Endpoint protection Manager\Tomcat\Bin\clientremote.exe

8. Click Next on the Push deployment wizard:

324

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Best Practices on SEP client Installation


9. Browse the created package, specify the concurrent deployments and click next:

10. Select the machine(s) for SEP client deploymentt and click Add:

325

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Best Practices on SEP client Installation


11. Enter the remote client authentication and click Finish:

12. SEP Software will start rolling out to the selected client(s):

326

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Desktop Standard Installation Process

327

2010 Wipro Ltd Internal & Restricted

UPS / Voltage Regulator Availability Line - Neutral Voltage Neutral - Ground Voltage Line - Ground Voltage

Should be available with the reqd power rating between 200V to230V More than 0V but less than or 3V Sum of Line-Neutral and Neutral Ground Voltage

AC Main is ON
AC Main is OFF and UPS is providing power. - Suggested Action , Not mandatory if not possible Voltages Should be Checked when
Site Inspection

Consealed wiring and High Voltage lines should pass near to the system Installation Place Generator is ON and providing power - Suggested Action , Not mandatory if not possible

Ambient Temperature Dust Level Air Flow Systems Placement

Ambient temperature at peak time should not be more that 32 degree Should ensure low dust level Proper Space required to ensure the hot air is blowing out properly Ensure table / rack is good enough to bear the System load.

Before Unpacking ensure the package is not damaged - Check for Physical damages
Ensure the sealed tape is intact and the tapes are with Wipro Logo Unpack the Box Physical Damage
Unpacking and Inspection

Any damaged packets should be informed to Installation team before opening the same
Any changes on this to be brought to Installation team before opening the Box Unpack as per the guide lines in the Box Check the Physical damages on system chasis, monitor and other components. If any Inform Installation team. Box will contain a List of Devices sheet available in the box - Take the same for ref. Verify LOD with the contents in the BOX - Any deviation raise short shipment or wrong shipment Verify the Boxes / Items is available as per PIR / Invoice / Bill of Material - Any deviation raise Short Shipment or wrong shipment

Check for LOD in the Box LOD verification

PIR / BOM Verification

328

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Install the Hardware Basic Power On Test Check correct Configuration Install Add on if available Install External devices if available Configure RAID if available as per customer sign off and requirment Install basic OS with customer approved partition scheme Install Service packs and updates Assign IP for Network, If Applicable Check the network connectivity by pinging gateway Check the connectivity to all Ports. Eg Front sound prot, USB Port etc Basic Installation Check all the Drivers & Inf is installed and the latest available as per supplied driver cd. Check in device manager for errors Check Unistall and default AV installed and working properly. If customer provide AV software, uninstall the default one and install the customer specific and enusre it is activated. Enusre the AV Client has thebest possible update mechanism is configured and latest AV signature is loaded. Take the configuration using OS Utility confirm the complinace. Eg. System Info - for Windows XP. Ensure OS Activation has to be check before final Sign Off. For Windows XP "Go To RUN---Type oobe/msoobe /a and press Enter" and for Windows Vista "Go to RUNType SLUI and press Enter Key" Additional Installation As per the Sign off and communicated Task Demonstrate the system startup and shutdown to customer Demo and Sign off Share the call logging process and escalation matrix with the customer Sign off the ATP or PIR

329

2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted

Thank You

2010 Wipro Ltd Internal & Restricted

You might also like