T305-14 System Check - RevC
T305-14 System Check - RevC
TABLE OF CONTENTS
1 / 14
864459466.doc
3.1.1 Objectives
On completion of this chapter you will be able to:
Check computer hardware
Check status of MS Windows
Check System 800xA status
14.1.1 Legend
<> Indicates a key name.
| Indicates when you go from one menu to a sub-menu.
Bold Indicates a menu name or an option in a menu, or file structures
“ “ Indicates dialog box buttons, tabs, instructions etc.
2 / 14
System 800xA training
Look for any items that have yellow or red icons. By right clicking on that device and
selecting “Properties” more information about the type of error can be accessed. There
may be an incompatible driver, a resource conflict, or the device may not be
responding.
3 / 14
864459466.doc
4 / 14
System 800xA training
The Event Log service starts automatically when you start Windows XP. Application
and system logs can be viewed by all users, but security logs are accessible only to
administrators.
By default, security logging is turned off. You can use Group Policy to enable security
logging. The administrator can also set auditing policies in the registry that cause the
system to halt when the security log is full.
5 / 14
864459466.doc
The status column may say not responding when a program is “off in the weeds”. In
that case the End Task button can be handy. The “New Task” button is just like the
Start | Run command. It asks for a program to run.
6 / 14
System 800xA training
Processes can be stopped from the Task Manager Processes tab. But the real value of
this tab is the information it provides about what is taking the computer’s resources. If
a computer bogs down, the first thing to do it open Task Manager and see how much
idle time is available.
You can sort on any of the columns by clicking on the heading. Clicking a second
time will reverse the sort order. That way you can sort by the largest users of CPU or
by the largest users of memory.
Although the default view with memory and CPU per process is very useful, the
columns can be customized. Click View | Select Columns:
7 / 14
864459466.doc
For example some faulty applications may “leak” memory, but they may also leak
handles, threads, or other things listed in these optional columns. A “leak” is when an
application allocates (or reserves) resources it needs temporarily, but does not release
them. The next time it needs resources, another allocation is made so that the
resources the task uses continually grows. This is a design problem, but in order to get
it fixed, a user might need to find the flaw and report it to the vendor.
Other examples of some columns we might need to choose are GDI Objects and User
Objects. There are a maximum number of these (10,000/PC) allowed at any one time
in Windows. 800xA graphics use these, and if we are having a problem with graphics
call ups, we might want to check how many are in use.
8 / 14
System 800xA training
Some of the memory figures on the Performance tab may need a little explaining
although others are quite obvious:
Physical Memory: Total
The total amount of RAM installed in the computer.
Physical Memory: Available
The amount of memory available to applications. You will notice this is never the
same as the total installed because the operating system has many processes
running. It is a good idea to record the approximate amount that is available when
things are running normally so that you will have some reference when things
don’t seem to be running right. This will vary depending on what type of node is
running and how much is installed.
Physical Memory: System Cache
The section of memory that allows Windows to reduce disk operations by reading
larger chunks of data at a time than asked for and storing them in cache in
anticipation of additional requests. The System Cache is tuned by Windows
dynamically. There is not much a user can do to influence how much is allocated
other than shut down other applications to free up memory.
Kernel Memory
The amount of memory used by the operating system components in highly
privileged mode. This is further broken down into paged and non-paged. Paged is
the portion that can be swapped to disk when applications require more memory.
Non-paged is the portion that must remain in memory all of the time.
Commit Charge
The amount of virtual memory in use by all processes. The limit is the amount that
can be committed without enlarging the page file and the peak is the maximum
amount that has been used in this session.
Handles
Consist of access control information and a pointer to an object such as a file. One
type of flaw that can occur in a program is called a handle leak. This is what
happens when handles are not deallocated when they are no longer needed. It is a
type of memory leak. They build up and consume memory.
Threads
Are single sequences of executable instruction within a process. A process may be
a multi-threaded process where the threads can run in parallel or at different rates
or priorities and perform different tasks. The number of threads includes one idle
thread per processor.
Processes
The executable programs that are seen on the processes tab incl. the idle process.
9 / 14
864459466.doc
Or you could use the information button on the plant explorer menu and choose the
system info in the next window.
10 / 14
System 800xA training
Press “System Info” in order to get information about the system same as winmsd in
Run menu.
You will now have a window showing system information. The information can also
be saved. (Menu: File | Save)
11 / 14
864459466.doc
Here we can see a redundant system that is OK. In the Status column a green circle
means status OK, a red circle with a white cross means there is a problem. A yellow
icon is a warning.
A green triangle in the node column means the connection is currently used (current
affinity selection). A grey triangle means it is not currently used, but may be used if
fail-over should be needed. You will see that all services are OK but most of the
connections are active on the ConsultIT-26 node.
The spark symbols show the status of the network connection for that service provider.
The first column is the primary network. The second is the secondary network. When
this picture was taken the secondary network was not present so the sparks all show
red with a white line through them.
12 / 14
System 800xA training
In the next picture one of the two Aspect and Connectivity Servers is down. You will
see that the ConsultIT-26 node is down. Only the service providers on ConsultIT-24
node are green. You can also see a warning in the fifth row of the viewer. It has an
exclamation mark in the icon.
13 / 14
864459466.doc
The next picture shows a system with only one service OK, one warning and the rest
is in error. The red square with a hole in it means an error was propagated. This means
that if you expand the branch in the tree containing the icon, you can see where the
error originated from.
14 / 14