0% found this document useful (0 votes)
11 views

ITCNA1-B12_Week-3&4 (1)

The document outlines troubleshooting methodologies for PC hardware, including steps for identifying problems, establishing theories, and implementing solutions. It also covers configuring BIOS/UEFI settings, troubleshooting power and disk issues, and addressing system and display problems. Additionally, it compares various local networking hardware and network types, including LANs, WANs, and the differences between unmanaged and managed switches.

Uploaded by

libhongomemese79
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views

ITCNA1-B12_Week-3&4 (1)

The document outlines troubleshooting methodologies for PC hardware, including steps for identifying problems, establishing theories, and implementing solutions. It also covers configuring BIOS/UEFI settings, troubleshooting power and disk issues, and addressing system and display problems. Additionally, it compares various local networking hardware and network types, including LANs, WANs, and the differences between unmanaged and managed switches.

Uploaded by

libhongomemese79
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 97

Computer Network

& Security
ITCNA1-12
Computer Network
& Security
ITCNA1-12
Lesson 3

Troubleshooting PC Hardware
Objectives
• Apply troubleshooting methodology

• Configure BIOS/UEFI

• Troubleshoot power and disk issues

• Troubleshoot system and display issues

3
Lesson 3

Topic 3A
Apply Troubleshooting Methodology

4
Best Practice Methodology
• Problem solving • CompTIA troubleshooting
model
• Causes, symptoms,
consequences 1. Identify the problem
• Context 2. Establish a theory

• Corporate policies, procedures, 3. Test the theory


impacts
4. Establish an action plan
5. Verify full system functionality
6. Document findings

5
Identify the Problem
• Gather information from users
• Identify user changes
• Inquire regarding environmental or infrastructure changes

• Perform backups before making changes

6
Establish and Test a Theory

• Establish a theory
• From possible causes to probable cause

• Conduct internal or external research


• Physical inspection
• Internal documentation and support resources
• External vendor and forum resources

7
Establish and Test a Theory

• Question the obvious


• Attention to detail
• Step through what should happen
• Compartmentalize the issue
Establish a New Theory or Escalate
• Establish a new theory
• Question the obvious (again)
• Consider alternatives/workarounds
• Take system “back to base”

• Escalate
• Escalation paths
• Communicate support case status
Implement a Plan of Action

• Next steps
• Repair, replace, workaround
• Risks from costs and impacts

• Example: If a laptop battery fails, a repair might involve replacing


only the cells, while a full replacement would mean buying a new
battery. If both options are expensive, a workaround could be using
the laptop plugged into power.
Implement a Plan of Action

• Establish a plan of action


• Consider impacts
• Consider corporate policies, procedures, and impacts before
implementing changes
• Implement the solution
• Change management and scheduling
• Refer to vendor instructions
Verify and Document

• Verify full system functionality


• Perform tests
• Obtain user acceptance
Verify and Document

• Implement preventive measures


• Document findings, actions, and outcomes
• Ticketing systems
Review Activity: Troubleshooting Methodology
• Best Practice Methodology
• Identify the Problem
• Establish and Test a Theory
• Establish a New Theory or Escalate
• Implement a Plan of Action
• Verify and Document
Lesson 3

Topic 3B
Configure BIOS/UEFI

15
BIOS and UEFI
• System firmware
• Basic Input/Output System
(BIOS)
• Unified Extensible Firmware
Interface (UEFI)
• Accessing system setup

16
Boot and Device Options

• Boot device selection and


priority
Boot and Device Options

• USB permissions
• Fan considerations
Boot Passwords and Secure Boot
• System password
• User password
• Secure boot
Trusted Platform Modules
• Encryption and cryptographic
keys
• Hashes
• Trusted platform module (TPM)
• Root of trust
• Secure key storage

• Hardware security module


(HSM)
20
Review Activity: BIOS/UEFI
• BIOS and UEFI
• Boot and Device Options
• Boot Passwords and Secure Boot
• Trusted Platform Modules
Lesson 3

Topic 3C
Troubleshoot Power and Disk Issues

22
Troubleshoot Power Issues
• No power symptoms
• No indicator lights
• Fans do not start
• Possible causes
• Circuit fault or power blackout
• Socket fault
• Switches and cables/connectors
• Overloaded and faulty devices
• Power supply testing Konstantin Malkov @123RF.com
Troubleshoot POST Issues
• Power-on self-test (POST)
• Black screen
• Failed firmware update
• Faulty cabling/connector/device
• Faulty PSU or CPU

• Beep codes
Codes for the original IBM PC are listed in this table
Troubleshoot Boot Issues
• Boot device
• Boot sequence
• Power and data connectors and
cabling

Screenshot courtesy of Microsoft

26
Troubleshoot Boot Issues

• Boot sector
• Damage to boot/partition records

Screenshot courtesy of Microsoft

27
Troubleshoot Boot Issues

• OS errors and crash screens


• Hardware fault or OS/driver fault

Screenshot courtesy of Microsoft

28
Troubleshoot Drive Availability
• Unusual noises
• Light-emitting diode (LED) status indicators
• No LED activity
• Constant LED activity

• Missing drives in OS
• Read/write failure
• Blue Screen of Death (BSoD)
Troubleshoot Drive Reliability and Performance
• Self-monitoring, Analysis, and
Reporting Technology (SMART)
• Report errors

• Vendor and third-party diagnostic


utilities
• Input/output operations per second
(IOPS) measurement
• Benchmark performance without
interference from OS/app causes

• Data loss/corruption
• Bad sectors and bad blocks

• Backup and data recovery


Troubleshoot RAID Failure
• RAID array degraded
• Backup
• Replace failed device

• RAID device not found


• Controller
seating/cables/connectors
• Drivers
• RAID configuration utility
Review Activity: Power and Disk Issues
• Troubleshoot Power Issues
• Troubleshoot POST Issues
• Troubleshoot Boot Issues
• Troubleshoot Drive Availability
• Troubleshoot Drive Reliability and Performance
• Troubleshoot RAID Failure
Lesson 3

Topic 3D
Troubleshoot System and Display
Issues

33
Troubleshoot Component Issues

• Intermittent shutdown and application crashes


• Software versus hardware causes
• Overheating and burning smells
• Clean chassis, heatsinks, and fans
• Verify airflow
Troubleshoot Component Issues

• Physical damage
• Bent pins and other connector/cabling damage
• Component/adapter seating (chip creep)
• Capacitor swelling
Troubleshoot Performance Issues
• Check for overheating
• CPU throttling/overheating

• Check for misconfigurations


• What has changed?

• Verify the problem


• Use diagnostic software to quantify performance loss
• Identify best opportunity for upgrade (compute, storage, networking)

• Rule out operating system/app/configuration/networking issues


Troubleshoot Inaccurate System Date/Time
• Problems caused by inaccurate
date/time
• Real time clock (RTC) battery
replacement

Image @123RF.com
Troubleshoot Missing Video Issues
• Incorrect data source
• Adapter outputs and monitor
inputs
• On-screen display (OSD)

• Physical cabling issues


• Damaged connectors
• Cable application/performance

• Burned-out bulb
Image @123RF.com
• Intermittent projector shutdown
Troubleshoot Video Quality Issues (Slide 1 of 2)
• Dim image
• OSD controls
• Power saving modes
• Backlight failure

• Fuzzy image
• Flashing screen
• Faulty connector, display elements/backlight, or video card
Troubleshoot Video Quality Issues (Slide 2 of 2)
• Dead pixels
• Burn-in
• Incorrect color display
• Accurate calibration
• Connector/adapter/cable faults

• Audio issues

Screenshot courtesy of Microsoft


Review Activity: System and Display Issues
• Troubleshoot Component Issues
• Troubleshoot Performance Issues
• Troubleshoot Inaccurate System Date/Time
• Troubleshoot Missing Video Issues
• Troubleshoot Video Quality Issues
Computer Network
& Security
ITCNA1-12
Lesson 4
Comparing Local Networking Hardware

Objectives
• Compare network types

• Compare networking hardware

• Explain network cable types

• Compare wireless networking types

43
Lesson 4

Topic 4A
Compare Network Types

44
LANs and WANs: Network Infrastructure
LANs and WANs
Wide area network (WAN)

• A WAN (Wide Area Network) is a network that connects multiple LANs (Local
Area Networks) over long distances. It allows computers in different cities,
countries, or even worldwide to communicate.

• WANs connect LANs using the internet, leased cables, satellites, or radio signals.
A company or ISP (Internet Service Provider) manages the connection.
• Unlike LAN, WANs cover large areas (cities, countries, or even the world).
Metropolitan area network (MAN)
A network covering a city or municipality (larger than a LAN, smaller than a
WAN).
Example: A city’s government offices sharing a network across different
buildings.
SOHO
• Small Office Home Office
(SOHO)
• The SOHO network allows
computers in a home office or a
remote office to connect to a
corporate network, or access
centralized, shared resources.

• Single appliance provides


Ethernet, Wi-Fi, and Internet
connectivity
Image © 123RF.com
SOHO and Enterprise Networks
• Enterprise networks
• Reliability and scalability
• Modular design

Image © 123RF.com
SOHO
Datacenters and Storage Area Networks
• Datacenter
• Facility dedicated to hosting servers
• Networking, power, climate control, and physical access control features

A Data Center is a large facility designed to store, manage, and process


data. It contains many powerful computers (servers) that provide services
like websites, cloud storage, and online applications.
Datacenters and Storage Area Networks
Storage area network (SAN)
A Storage Area Network (SAN) is a special network just for
storing data. Instead of keeping data on each computer, all data is
stored on a shared system that multiple computers (servers) can
access.
• Network hosting configurable pool of storage devices
• Clients of the network are application servers (not ordinary workstations)
• Clients treat storage as logical disk
• Fiber Channel and Internet SCSI (iSCSI)
Personal Area Networks
A Personal Area Network (PAN) is a small network that connects devices close to
you (within a few meters). It allows your phone, laptop, smartwatch, and other
devices to communicate wirelessly.
• Wireless and cellular connections over a few meters
• PC and smartphone
• PC/smartphone and peripheral devices
• Internet of Things and wearable technology
Lesson 4

Topic 4B
Compare Networking Hardware

57
Network Interface Cards

A Network Interface Card (NIC) is a hardware component that allows a computer,


laptop, or other device to connect to a network (like the internet or a local
network). It acts like a bridge between your computer and the network.

1. Establishing a Physical.
2. Supporting Different Ethernet Types
3. Increasing Network Speed

Data Framing and Addressing

MAC Address
Network Interface Cards
• Media type (transceiver)
• Electrical versus optical

• Number of ports
• Framing and addressing
• Media access control (MAC)
address
• Source and destination
Screenshot courtesy of Wireshark
• Hex notation
Patch Panels
• Back
• Terminate cabling from wall ports
to insulation displacement Image by plus69 © 123RF.com

connector (IDC) blocks

• Front
• Modular RJ-45 connectors
• Use patch cords to connect to
switch ports

Svetlana Kurochkina © 123RF.com


60
Hubs
• Star topology wiring
• Concentrator repeats signals over
all cabled segments

• Hub
• All ports are in same collision
domain
• Performance reduced by
contention
Image © 123RF.com
• Half-duplex 10/100 Mbps
Ethernet only
Hubs
Feature Hub (Old Technology) Switch (Modern Technology)
Device Type Broadcasts data to all devices Sends data only to the intended device

Communication Type Half-Duplex (Send or receive, not both) Full-Duplex (Send and receive at the same time)

Sends data to all connected devices (causing Sends data only to the intended recipient
Data Transmission
network congestion) (efficient)
Collision Handling Collisions occur frequently No collisions due to intelligent forwarding
Faster because each device has dedicated
Speed Slow due to shared bandwidth
bandwidth
MAC Address Usage Does not use MAC addresses Uses MAC addresses to send data efficiently
Works well in large networks with many
Network Size Works best in small networks with a few devices
devices

Scalability Not scalable for modern networks Scalable for enterprise and high-speed networks

Supports Fast Ethernet, Gigabit, and even 10-


Ethernet Compatibility No support for Gigabit Ethernet
Gigabit Ethernet

62
Switches

A switch is a network device that connects multiple devices and directs data only to the
intended recipient. Unlike a hub, which blindly sends data to all connected devices, a switch
is intelligent. It reads the MAC address (a unique hardware identifier) of each device and
forwards data only to the device it is meant for.

How Does a Switch Work?

1.A computer sends data across the network.


2.The switch receives the data and checks the destination MAC address.
3.It looks up its internal table to see which port is connected to that MAC address.
4.The switch forwards the data only to that specific device, rather than sending it to all
connected devices.
Switches
• Same star topology—each host
cabled to a switch port
• Switch forwards traffic to
specific destination port by
learning MAC addresses
• Allows each port to operate at
full-duplex and full speed
• Required for Gigabit Ethernet
Image © 123RF.com and better
Unmanaged and Managed Switches

Unmanaged switch

Unmanaged Switches enable Ethernet devices such as computers and printers to


communicate with each other.
Unlike Managed Switches, Unmanaged Switches come with a fixed configuration
that is not editable.
Primarily Unmanaged Switches are used in small networks where network traffic
is light and flows unrestricted between devices without the need for giving
priority to packets.
Unmanaged and Managed Switches

Managed switch
A managed switch allows network administrators to configure settings,
monitor performance, and control traffic.
These are used in larger businesses where security, performance, and reliability
are critical.

Images at © 123RF.com
Unmanaged and Managed Switches

Managed Switches
I. Configuration Options: Administrators can control traffic, security, and performance.
II. Remote Management: Can be accessed via a dedicated management port or over
the network.
III. More Ports: Commonly have 24 or 48 ports to connect multiple devices.

I. Security Features: Can implement firewalls, VLANs (Virtual LANs), and traffic
monitoring to protect data.
II. Rack-Mounted: Designed to fit in network racks used in data centres or enterprise
networks.

Images at © 123RF.com
Power over Ethernet

Power over Ethernet (PoE) is a technology that allows both power and data to be
transmitted over a single Ethernet cable. This eliminates the need for separate power cables,
making it efficient and cost-effective for networking devices such as:

VoIP phones (used for internet-based calls).


Security cameras (CCTV and IP cameras).
Wireless access points (APs) (used for Wi-Fi coverage).
Power over Ethernet

• PoE standards
• 802.3af (~ 13 W)
• 802.3at (PoE+) (~ 25 W)
• 802.3bt (Ultra PoE) (~ 51 W (Type 3) or 73 W (Type 4)
Power over Ethernet
There are two ways to supply PoE:

1.PoE Switch (Endspan PSE)


1. A switch with built-in PoE support supplies power directly through the Ethernet
cable.
2. Example: A corporate office installs a PoE switch to power Wi-Fi access points,
so they don’t need separate power adapters.
2.Power Injector (Midspan PSE)
1. If a switch does not support PoE, a PoE power injector (or midspan injector) is
used.
2. The injector is placed between the switch and the device, adding power to the
Ethernet cable.
3. Example: A small business has a non-PoE switch but wants to install a security
camera that requires PoE. Instead of replacing the switch, they use a power
injector.
Lesson 4

Topic 4C
Explain Network Cable Types

73
Unshielded Twisted Pair (UTP)
• Copper wire cabling carrying
electrical signals
• Four balanced wire pairs
• Twisted at different rates and
balanced to reduce
interference
• Signal attenuation limits
maximum distance to 100 m
Image © 123RF.com
Shielded Twisted Pair
• Screening or shielding as extra protection
against interference
• Used for 10G Ethernet+ in datacenters for
higher reliability

• Used when cabling is near external interference


sources (fluorescent lighting, power lines,
motors, and generators)

• Screened cable has one thin outer foil shield


around all pairs (ScTP, F/UTP, FTP)
• Fully shielded cabling has a braided outer
screen and foil-shielded pairs (S/FTP and
Public domain image by Baran Ivo F/FTP)
• Shield elements in cable, connector, and
patch panels must be bonded
Cat Standards

23
Copper Cabling Connectors

Images © 123RF.com

24
Copper Cabling Installation Tools

• Patch cords are crimped to RJ-45


connectors
• Structured cable is terminated to
insulation displacement connect (IDC)
blocks in wall ports and patch panels

25
Copper Cabling Installation Tools

• Cable stripper
• Remove insulation

25
Copper Cabling Installation Tools

• Punchdown tool
• Terminate to IDCs

25
Copper Cabling Installation Tools

• Crimper
• Add RJ-45 connector

25
Copper Cabling Test Tools

• Validate and test cable


installation
• Cable tester
• Verify termination
Copper Cabling Test Tools

• Cable tester
• Verify termination

• Toner probe
• Trace a cable

• Loopback plug
Image by samum © 123RF.com Images © 123RF.com
• Test NIC or switch port
Copper Cabling Test Tools

• Trace a cable

• Loopback plug
• Test NIC or switch port

Image by samum © 123RF.com Images © 123RF.com


Copper Cabling Test Tools
• Validate and test cable
installation
• Cable tester
• Verify termination

• Toner probe
• Trace a cable

• Loopback plug
• Test NIC or switch port
Network Taps
• Capture network traffic
• Passive test access point (TAP)
• Active TAP
• Mirror port
Copper Cabling Installation Considerations
• Installation to plenum spaces
• Building/fire safety regulations
• Plenum rated cable

• Installation as outside plant (OSP)


• Aerial, conduit, and direct burial
• Protection against weathering
Copper Cabling Installation Considerations
Optical Cabling
• Fiber optic cable types
Image by atrush © 123RF.com • Single-mode fiber (SMF)
• Multi-mode fiber (MMF)

• Connector types
• Straight tip (ST)
• Subscriber connector (SC)
Image by YANAWUT SUNTORNKIJ ©
123RF.com • Lucent connector (LC)
Coaxial Cabling
• Coaxial cable
• Construction

Image by destinacigdem © 123RF.com • Uses

• F-type connector

Image © 123RF.com 30
Lesson 4

Topic 4D
Compare Wireless Networking Types

92
Access Points
• IEEE 802.11 / Wi-Fi
• Infrastructure mode WLAN
• Access point interconnects wireless
clients (stations)
• Infrastructure Basic Service Set
(BSS)
• Basic Service Set Identifier (BSSID)
• MAC address of AP radio
• Can bridge with wired network via
a switch
Image © 123RF.com
802.11a and the 5 GHz Frequency Band
• 2.4 GHz
• Better propagation, but fewer
channels and greater interference
risk
• 5 GHz
• Shorter range, but less congested
• IEEE 802.11a (54 Mbps)
• 23 x non-overlapping 20 MHz
channels
• Dynamic Frequency Selection (DFS)
and regulatory impacts
802.11b/g and the 2.4 GHz Frequency Band
• IEEE 802.11b (11 Mbps)
• 14 x 5 MHz channels
• Wi-Fi still needs 20 MHz channel
bandwidth
• Channels require careful
configuration to avoid overlap

• IEEE 802.11g (54 Mbps)


• 802.11b compatibility mode
802.11n
• Dual band radios
• 5 GHz or 2.4 GHz

• 40 MHz channel bonding


• Multiple input multiple output
(MIMO)
• Use of multiple antennas to improve
reliability and bandwidth
• 72 Mbps per stream

• Wi-Fi 4
Wi-Fi 5 and Wi-Fi 6
• Wi-Fi 5 (802.11ac)
• 5 GHz only

• Tri-band radios

• 80 and 160 MHz channel bonding

• Multiuser MIMO
• Connect stations simultaneously

• Wi-Fi 6 (802.11ax)
• 2.4 GHz or 5 GHz (plus new 6 GHz band)

• Downlink and uplink MU-MIMO

• Orthogonal frequency division multiple access


(OFDMA)
Wireless LAN Installation Considerations
• Network name or Service Set
Identifier (SSID)
• Frequency band use
• Same SSID or different SSID per
band
• Operation mode (legacy standards
support)
• Channel usage
• Non-overlapping
• Channel width/bonding
Screenshot courtesy of TP-Link
Wi-Fi Analyzers
• Software installed to mobile device
• Reports configuration of nearby wireless
networks

• Signal strength on each channel

• Signal strength
• Decibels-milliwatt (dBm)

• Negative values with closer to zero better


performance

• Logarithmic scale

• 3 dBm difference represents halving or


doubling
MetaGeek, LLC. © Copyright 2005-2021
• Signal-to-noise ratio (SNR)
Long Range Fixed Wireless
• Wireless bridges configured using microwave antennas
• Line of sight
• High gain
• Licensed spectrum use
• Legal right to remove interference sources
• Unlicensed spectrum
• Shared use of frequency band
• Regulatory requirements on power
• Transmit power, gain, and Effective Isotropic Radiated Power (EIRP)
Bluetooth, RFID, and NFC
• Bluetooth
• Connectivity for wireless
peripherals

• Radio Frequency ID (RFI)


• Wireless asset tags
• Inventory control

• Nearfield Communications
Image © 123RF.com
(NFC)
• Contactless payments
Bluetooth, RFID, and NFC
• What are the indicators
that show this is email
spoofing
• List what you see
• Discuss in pairs the steps
you need to take when you
receive an email like this
• Share in class what you
would do
• Each pair share 1 point and
explain

You might also like