Maintenance Assignment
Maintenance Assignment
SCHOOL OF INFORMATICS
PREPARED BY
NAME ID
1. Abdulhafiz Kemal SOI/R/191/10
2. Abebe Geremew SOI/R/006/10
3. Sherefa Kedir SOI/R/159/10
4. Misganaw Ashebir SOI/R/048/10
5. Betelehem Habtamu SOI/R/141/10
6. Melesech Teshome NCS/R/576/06
L1 cache is further divided into two sections: L1 Data Cache and L1 Instruction Cache. The latter
contains the instructions that will be consumed by the CPU core while the former is used to
hold data that will be written back to the main memory.
L1 cache not only works as the instruction cache, but it also holds pre-decode data and
branching information. Furthermore, while the L1 data cache often acts as an output-cache, the
L1 instruction cache behaves like an input-cache. This is helpful when loops are engaged as the
required instructions are right next to the fetch unit.
Modern CPUs include up to 512KB of L1 cache (64KB per core) for flagship processors while
server parts feature almost twice as much.
L2 cache is much larger than L1 but at the same time slower as well. They range from 4-8MB on
flagship CPUs (512KB per core). Each core has its own L1 and L2 cache while the last level, the
L3 cache is shared across all the cores on a die.
L3 cache is the lowest-level cache. It varies from 10MB to 64MB. Server chips feature as much
as 256MB of L3 cache. Furthermore, AMD’s Ryzen CPUs have a much larger cache size
compared to rival Intel chips. This is because of the MCM design vs Monolithic on the Intel side
Basically, L1, L2 and L3 caches are different memory pools similar to the RAM in a computer.
They were built in to decrease the time taken to access data by the processor. This time taken is
called latency. The architecture they are built with also differs considerably. For e.g. the L1
cache is built using larger transistors and wider metal tracks, trading off space and power for
speed. The higher level caches are more tightly packed and use smaller transistors.
L1 (Level 1), L2, L3 cache are some specialized memory which work hand in hand to improve
computer performance. When a request is made to the system, CPU has some set of
instructions to execute, which it fetches from the RAM. Thus to cut down delay, CPU maintains
a cache with some data which it anticipates it will be needed.(L1) Level 1 Cache(2KB - 64KB) -
Instructions are first searched in this cache. L1 cache very small in comparison to others, thus
making it faster than the rest. (L2) Level 2 Cache(256KB - 512KB) - If the instructions are not
present in the L1 cache then it looks in the L2 cache, which is a slightly larger pool of cache,
1
thus accompanied by some latency.(L3) Level 3 Cache (1MB -8MB) - With each cache miss, it
proceeds to the next level cache. This is the largest among the all the cache, even though it is
slower, it’s still faster than the RAM. Now you know what cache is and what different level of
cache are. And that 6MB value of the L3 Cache in your Intel 4700MQ microprocessor is actually
the memory size of that Cache. Thus Cache improves the overall performance of the CPU but
these numbers shouldn't be considered while purchasing any system. Look at the benchmarks
of the CPU as a whole. A CPU with similar architecture but with more cache wouldn't make any
noticeable difference. The technology these days have advanced to such a point that the specs
of a CPU are just meaningless.
2
2. Briefly explain 32-bit and 64 bit Systems and their relationship
with Operating System
A 32-bit system can access 232 memory addresses, i.e. 4 GB of RAM or physical memory
ideally, it can access more than 4 GB of RAM also.
The CPU register stores memory addresses, which is how the processor accesses data from
RAM. One bit in the register can reference an individual byte in memory, so a 32-bit system can
address a maximum of 4 GB (4,294,967,296 bytes) of RAM. The actual limit is often less around
3.5 GB since part of the register is used to store other temporary values besides memory
addresses. Most computers released over the past two decades were built on a 32-bit
architecture; hence most operating systems were designed to run on a 32-bit processor.
A 64-bit system can access 264 memory addresses, i.e. actually 18-Quintillion bytes of
RAM. In short, any amount of memory greater than 4 GB can be easily handled by it.
Using 64-bit one can do a lot in multi-tasking, user can easily switch between
various applications without any windows hanging problems.
Gamers can easily play High graphical games like Modern Warfare, GTA V, or
use high-end software like Photoshop or CAD which takes a lot of memory since it
makes multi-tasking with big software, easy and efficient for users. However
upgrading the video card instead of getting a 64-bit processor would be more
beneficial.
3
A 64-bit operating system will not work in a 32-bit computer, but a 32-bit
operating system will run in a 64-bit computer.
The terms "32-bit" and "64-bit" are commonly seen in system requirements and other technical
literature, but few people actually know what these terms mean. Do they refer to hardware or
software specifications? What makes a system 64-bit and what is the difference between a 64-
bit computer and a 32-bit model? In most cases, you simply need to know if your operating
system is 32-bit or 64-bit in order to run a certain program. However, when determining what
software to install on your computer, it is helpful to understand what the terms actually mean.
Hardware
32-bit and 64-bit are commonly used to describe processor architecture or design. A 32-bit
processor includes a 32-bit register, which can store 232 or 4,294,967,296 values. A 64-bit
processor includes a 64-bit register, which can store 264 or 18,446,744,073,709,551,616 values.
Therefore, a 64-bit register is not twice as large as a 32-bit register, but is 4,294,967,296 times
larger. That's a big difference, but how does it affect computing performance?
While 64 bits is far more storage than what modern computers require, it removes all
bottlenecks associated with 32-bit systems. For example, 64-bit systems run more efficiently
since memory blocks are more easily allocated. They also support 64-bit instructions and have
64-bit data paths, which enables them to process more data at once than 32-bit systems can.
Software
So how does 32-bit or 64-bit hardware affect software? Generally speaking, 32-bit programs
can run on a 64-bit system, but 64-bit programs will not run on a 32-bit system. This is because
64-bit applications include 64-bit instructions that will not be recognized by a 32-bit processor.
In order to run a 64-bit program, your operating system must be 64-bit. Around 2008, 64-bit
versions of Windows and OS X became standard, though 32-bit versions were still available.
Therefore, if you bought your computer in 2009 or later, there is a good chance you are running
a 64-bit operating system. In Windows, you can check your OS version by right-clicking My
Computer, selecting Properties, and clicking System to view the system type. If you have a Mac
and you are running OS X 10.7 or later, your OS is 64-bit.
While it is possible to install a 32-bit operating system on a 64-bit system, it is best to install a
64-bit version if possible. The 64-bit OS will allow your computer to access more RAM, run
applications more efficiently, and, in most cases, run both 32-bit and 64-bit programs.
4
Exceptions to this rule include system utilities and antivirus programs that are written
specifically for a 32 or 64-bit operating system. In these cases, you will need to install the
version of the software that corresponds to your OS (which may be different than your
hardware). Additionally, device drivers are often written for specific operating systems, so it is
important to install 32-bit drivers if you are running a 32-bit OS and 64-bit drivers if your
operating system is 64-bit.
Dust and debris will accumulate as a result of air cooling. Any filters used to mitigate this need
regular service and changes. If the cooling system is not filtered then regular computer cleaning
may prevent short circuits and overheating. Computer maintenance involves keeping a
computer in a good state of repair and physical health. Meaning, it’s set of maintenance tasks
and procedures that help to keep the computer software and hardware updated and
operational.
1. PREVENTIVE MAINTENANCE: This is performed even if the computer is still operating at its
efficient level. It is done to prevent degradation of performance.
3. ROUTINE MAINTENANCE: This involves a regular schedule or time table strictly adhered to
by the owner of the computers and the party offering the maintenance service to perform an
overhaul of machinery.
5
Assessing hard disk space
Examining computer folder permissions
Monitoring computer temperature
Ensuring adequate redundancy of computer systems
Examining security features
Examining computer cleaning
Installing security software patches
Reading computer logs for security alerts or evidence of computer hacking
attempts
Updating antivirus software on all computers on the network
Updating critical service packs and software updates
Performing regular comprehensive back-ups to ensure that vital data can be
retrieved from storage in the event of a system failure.
COMPONENTS TO TROUBLESHOOT:
6
MONITOR this is a television-like device which displays the activities of a computer per
time.
PROBLEM 1: Monitor not coming on
SOLUTION: Check the power source and the power cable
PROBLEM 2: Monitor is on, but not displaying
SOLUTION: i. Check the data cable if well connected ii. Check the brightness and the
contrast buttons if they are set zero.
KEYBOARD this is a typewriter-like device which is used for sending signals into the
computer as input.
PROBLEM 1: Keyboard not responding
SOLUTION: Check the cable if properly connected
PROBLEM 2: Keyboard beeping continuously
SOLUTION: Check if no key is hooked
PROBLEM 3: A key or keys hooking always
SOLUTION: Replace the keyboard
MOUSE: This is a hand-held pointing device used for executing commands on the
computer.
PROBLEM 1: Mouse not responding
SOLUTION: i. Check the cable if properly connected ii. The computer should be restarted
iii. The mouse should be clean if it is a ball-bearing type
HARD DISK DRIVE: This is a permanent storage device found on a computer. It is very
fragile.
PROBLEM 1: Strange noise when being accessed
SOLUTION: Back up data and replace the hard disk
PROBLEM 2: Insufficient disk space
SOLUTION: Delete some files or uninstall some programs
PROBLEM 3: No fixed disk found
SOLUTION: Check the data cable and the power connector
CD-ROM DRIVE/DVD DRIVE This is used for accessing data or information stored on
compact disks or DVD disks
PROBLEM 1: Drive cannot be accessed
SOLUTION: Check the data cable and power connector
PROBLEM 2: Disks cannot be read
SOLOUTION: Lens is weak or dirty. Replace the drive or clean the lens.
PROBLEM 3: Indicator LED is on constantly
SOLUTION: Correct the data cable orientation
MEMORY (RAM) The computer memory or RAM is the working storage of the computer.
The higher the capacity, the better the performance of a computer.
7
PROBLEM 1: Computer is working but no display
SOLUTION 1: Check if the RAM is well-seated
PROBLEM 2: Computer not recognizing the RAM
SOLUTION 2: Check if the RAM is compatible
SOFTWARE Computer problems are not only that of hardware malfunctioning. Software
as well can make a computer to misbehave. This often arises from improper shut down
or when new software is added. To correct software problems most times a system
restore should be done or the newly installed software should be removed. If this does
not solve the problem, the operating system could be reinstalled as the last resort.
PRECAUTIONS: A computer should be installed in a well-ventilated room Liquid
substances must not be brought into the computer room. Food particles must not be
left in the computer room so as not to invite pests and rodents. A computer technician
should always guide against static electricity. A computer must not be worked on when
still powered.
As an alternative, a virtual machine allows you to run an operating system within an operating
system.
Testing compatibility
Aside from testing a new operating system, dual-boot is also helpful in determining the
compatibility of an application with your present computing environment. For example, a user
8
could perform a dry run of an application on a separate OS installation. Doing this would ensure
that the software is compatible with both systems, before deleting their previous setup.
Multi-user connectivity
Another advantage of dual-boot is that it can make one computer functional for different users.
For example, in a home setting, dual-boot allows you to keep your work or files from being
infected by questionable software downloaded by your kids. Or, for instance, you may have a
Mac user and a PC user in your home. Dual-booting makes one machine work for both parties.
Location of BIOS:
BIOS is typically placed in a chip known as Read Only Memory (ROM) that comes with the
computer. This ensures that the BIOS will always be available even if the hard disk is formatted
or replaced. However, in many cases the content of the ROM is transferred to the RAM when
the system is started. This is because the RAM allows quicker access as compared to the ROM.
Copying of the content of the ROM to the RAM is known as shadowing
Uses of BIOS
The main use of BIOS is to act as a middleman between OS and the hardware they run on. BIOS
is theoretically always the intermediary between the microprocessor and I/O device control
information and data flow. Although, in some cases, BIOS can arrange for data to flow directly
to memory from devices, such as video cards, that require faster data flow to be effective.
When BIOS boots up a computer, it first determines whether all of the necessary attachments
are in place and operational. Any piece of hardware containing files the computer needs to
9
start is called a boot device. After testing and ensuring boot devices are functioning, BIOS loads
the OS -- or key parts of it -- into the computer's random access memory (RAM) from a hard
disk or diskette drive (the boot device).
Accessing BIOS
With BIOS, the OS and its applications are freed from having to understand exact details, such
as computer hardware addresses, about the attached I/O devices. When device details change,
only the BIOS program needs to be changed. Sometimes, this change can be made during
system setup.
Users can access BIOS and configure it through BIOS Setup Utility. Accessing BIOS Setup Utility
varies somewhat depending on the computer being used. However, the following steps
generally enable users to access and configure BIOS through Setup Utility:
• Reset or power off the computer.
• When the computer turns back on, look for a message that says "entering setup" or
something similar. Accompanying that message will be a key that the user should press to enter
system configuration. Here's an example message a user might see: "Press [key] to enter BIOS
setup." Some keys often used as prompts are Del, Tab, Esc and any of the function keys (F1-
F12).
• Upon seeing the prompt, quickly press the key specified.
Once in BIOS Setup Utility, users can change hardware settings, manage memory settings,
change the boot order or boot device, and reset the BIOS password, among other configuration
tasks.
BIOS security
10
BIOS security is a somewhat overlooked component of cybersecurity; however, it should still be
managed to prevent hackers from executing malicious code on the OS. Security group Cylance,
in 2017, showed how modern BIOS security flaws could enable ransomware programs inside a
motherboard's UEFI and exploit other PC BIOS vulnerabilities.
Another unique exploit involving the manipulation of BIOS was Plundervolt. Plundervolt could
be used to mess with a computer's power supply at the time data was being written to
memory, causing errors that lead to security gaps. Intel released a BIOS patch to defend against
it.
BIOS manufacturers
BIOS, in its beginnings, was originally owned by IBM. However, some companies, such as
Phoenix Technologies, have reverse-engineered IBM's original version to create their own.
Phoenix, in doing this, allowed other companies to create clones of the IBM PC and, more
importantly, create non-IBM computers that work with BIOS. One company that did this was
Compaq.
Today, many manufacturers produce motherboards with BIOS chips in them. Some examples
are the following:
• AMI
• Asus
• Foxconn
• Hewlett Packard (HP)
• Ricoh
Knowing the motherboard manufacturer is important because users may want to update their
BIOS and chipset drivers -- the drivers that enable the OS to work with other devices in the
computer, such as a video card -- to the most recent versions. Driver updates may improve
computer performance or patch recent BIOS-level security vulnerabilities. Each manufacturer
has a unique way of updating these drivers.
11
Advantages of POST
• Automatic Testing Sequence: POST is automatic so no extra command is needed to run them,
they run automatically on the system just after switching ON the system.
• Works as Safety Feature: POST works as a safety feature of the system as it generates warning
before booting the system if anything found faulty.
• Fast in Speed: It takes very little time to run the testing sequence of POST.
• Helps in Fault Detection: POST gives warning about the problem and the name of the device
from where the problem is generated which makes it easy to detect the problem.
Disadvantages of POST:
• The only major disadvantage of POST is that it only checks the internal functioning of the
system; external interface logic is not tested.
The boot sequence is the process of starting a computer/system. The boot process is initiated
when the power button is pressed; it sends power to the boot-loader in the cache memory. The
Boot loader performs POST as a preboot sequence and if everything is working well without any
errors the BIOS (Basic Input Output System) is activated which finds and loads the operating
system.
Finally the software has to interact with the hardware units to complete the process. To avoid
any hardware errors while executing a software program, the pre-boot sequence would test the
hardware and initiate the OS if and only if the basic hardware units are functioning as expected.
The principal duties of the main BIOS during POST are as follows:
2. Initialize BIOS.
3. Identify, organize, and select which devices are available for booting.
6. Verify some basic components like DMA, timer, and interrupt controller.
12
The checks are performed majorly on:
• CPU Registers
• Timer
• Interrupt controller
If there are any errors in the POST the system would fail to proceed towards the next steps
(boot process) as it would throw a fatal error. The POST sequence is executed irrespective of
the Operating System. However, how the POST is handled and the types of errors thrown can
be modified by the Vendor as per the system requirements.
The error message could consist of text messages on the console or audio in the form of beeps.
Irrespective of the vendor there would be a manual describing the types of errors and the error
message mappings to help us troubleshoot. The error messages can vary from a parity error to
a faulty motherboard.
13