Maintenance of computer equipment

Romanov V.P. Maintenance of computer equipment Teaching aid Preventive voltage change allows you to identify the weakest circuits in the system. Typically, circuits must maintain their performance when the voltage changes within the specified limits. However, aging and other factors cause gradual changes in the performance of the circuits, which can be detected on prophylactic regimens. CVT proactive voltage testing detects predictable faults, thereby reducing the number of hard-to-locate faults that lead to failures. During the monthly preventive maintenance, all necessary work is carried out, provided for in the operating instructions for external devices. With a semi-annual (annual) maintenance (SRT), the same work is carried out as with a monthly maintenance. As well as all types of semi-annual (annual) maintenance work: disassembly, cleaning and lubrication of all mechanical components of external devices with their simultaneous adjustment or replacement of parts. In addition, the cables and power busbars are inspected. A detailed description of preventive maintenance is given in the operating instructions for individual devices attached to the SVT by the manufacturer. When maintaining on a technical condition, maintenance work is unscheduled and is performed as necessary based on the state of the object (test results), which corresponds to maintenance with continuous monitoring or maintenance with periodic monitoring. Unscheduled preventive maintenance includes extraordinary preventive maintenance, appointed mainly after the elimination of serious malfunctions of the computer. The scope of preventive measures is determined by the nature of the malfunction and its possible consequences. The conclusion of the SVT for unscheduled preventive maintenance can also be carried out when the number of failures that occur over a certain set period of time exceeds the allowable values. The system requires the presence and correct use of various testing tools (software). The system allows minimizing the cost of operating the WTS, but the readiness of the WTS for use is lower than when using a planned preventive service station. With a combined maintenance system, “junior types of maintenance” are carried out as necessary, as with maintenance on condition, based on the operating time and operating conditions of a particular type of computer equipment or the results of its testing. The implementation of "senior types of maintenance" and repairs is planned. The rational organization of the service station should provide for the accumulation of static material based on the results of the operation of the SVT in order to summarize, analyze and develop recommendations for improving the structure of service, increasing the efficiency of using the SVT, and reducing operating costs. 21 Romanov V. P. Maintenance of computer equipment Educational-methodical manual 1.2.2. Methods of maintenance (repair) of SVT Maintenance (service), regardless of the accepted maintenance system, can be organized using known maintenance methods. The method of maintenance (repair) of SVT is determined by a set of organizational measures and a set of technological operations for maintenance (repair). Methods of maintenance (repair) are subdivided on the basis of the organization into: branded; autonomous; specialized; combined. The proprietary method consists in ensuring the operable state of the SVT by the manufacturer, which carries out maintenance and repair of the SVT of its own production. The autonomous method consists in maintaining the working state of the SVT during the period of operation, in which the maintenance and repair of the SVT is performed by the user on his own. A specialized method consists in ensuring the operable state of the SVT by a service company that performs maintenance and repair of the SVT. The combined method consists in ensuring the operable state of the CVT by the user together with the service company or with the manufacturer and is reduced to the distribution of work on maintenance and repair of the CVT between them. According to the nature of the implementation, the methods of maintenance (repair) are divided into: -individual; - group; - centralized. With individual maintenance, the maintenance of one SVT is provided by the forces and means of the personnel of this SVT. The set of equipment for this type of maintenance includes: - equipment for monitoring the element base of SVT and power supply: - control and commissioning equipment for autonomous testing and repair of SVT facilities; - a set of electrical measuring equipment necessary for the operation of SVT; - a set of programs (tests) for checking the operation of the SVT; - tools and repair accessories; - auxiliary equipment and devices; -special furniture for storage of property and equipment for the workplaces of the operator and adjuster of the element base. 22 Romanov V. P. Maintenance of computer equipment Educational and methodical manual All of the listed equipment provides for the possibility of operational troubleshooting and troubleshooting using bench and instrumentation. This kit, in combination with the necessary spare parts (spare tools, devices) should provide the specified recovery time for the SVT. If the necessary service equipment and qualified technical personnel are available, individual service can significantly reduce the recovery time of the SVT, but at the same time, significant expenses are required for the maintenance of technical personnel and service equipment. Efficiency of the CVT to a greater extent depends on the qualifications of the maintenance personnel, the timeliness of preventive and repair work and the quality of their implementation. Group maintenance is used to service several SVT, concentrated in one place, by means and forces of special personnel. The structure of the equipment composition for a group service is the same as for an individual one, but it assumes the presence of a larger number of equipment, devices, etc., which excludes unjustified duplication. The group service package includes at least a set of CBT individual service equipment, supplemented with equipment and accessories from other CBTs. Centralized maintenance is a more advanced form of CBT maintenance. The centralized maintenance system is a network of regional service centers and their branches - maintenance points. With centralized maintenance, the cost of maintaining technical personnel, service equipment and spare parts is reduced. Such maintenance involves the repair of elements, assemblies and blocks of SVT on the basis of a special workshop equipped with everything necessary equipment and appliances. In addition, centralized maintenance allows you to concentrate in one place materials on the statistics of failures of elements, units, blocks and devices of the CVT, as well as obtain operational data from dozens of the same type of CVT with direct reliability control. All this makes it possible to use information to predict the required spare parts and accessories, to issue recommendations for the operation of SVT. 1.2.3. Types of repair of SVT. The type of repair is determined by the conditions for its implementation, the composition and content of the work performed at the SVT. Repair of SVT is divided into types: current; average; capital (for mechanical and electromechanical SVT). Current repairs should be carried out to restore the efficiency of the computer without the use of stationary means of technological equipment at the place of operation of the computer. 23 Romanov V. P. Maintenance of computer equipment Educational and methodical manual During the current repair, the control of the computer equipment for operation is carried out using the appropriate means of verification. Medium repairs should be carried out to restore the operability of the SVT, or components of the SVT using specialized stationary technological equipment. During a medium repair, the technical condition of individual components of the SVT is checked with the elimination of detected malfunctions and bringing the parameters to the prescribed standards. Overhaul should be carried out to restore the operability and resource of the SVT by replacing or repairing the components of the SVT, including the basic ones, using specialized stationary means of technological equipment in stationary conditions. Medium and overhauls of SVT or their components are, as a rule, scheduled and are carried out on products for which overhaul resources are determined and (or) the service life (resource) is limited. 1.2.4. Main characteristics of STO One of the main characteristics of STO is the duration of SVT prevention, which is determined by the formula r n t t profPi t t. . Вj Ф К i1 j1 where tПi is the total time for carrying out preventive measures performed sequentially; tВj is the recovery time for n faults during the preventive maintenance period; tF.C. – time of functional control. The duration of prevention is largely influenced by the degree of qualification of the attendants. An analysis of static data on the operation of a specific SVT makes it possible to give recommendations on replacing less frequent preventive maintenance with more frequent preventive maintenance (for example, daily to weekly). This allows you to increase the time of using the SVT directly for computing work. Another important quantitative characteristic is the coefficient of efficiency of prevention kprof., which characterizes the degree of increase in the reliability of SVT due to the prevention of failures at the time of prevention. Prevention efficiency coefficient is calculated by the formula nprof. kpof. ntotal where nprof. - the number of failures identified during the preventive maintenance; ngeneral + nprof. is the total number of failures of the SVT for the period of operation. 24 Romanov V. P. Maintenance of computer equipment Educational and methodological manual 1.2.5. Calculation of the number of employees involved in service maintenance and current repair of computer equipment Calculation of the number of employees required to perform service maintenance and current repair of PC (Chn) is carried out according to the formula: ; Tob - the total time spent on maintenance of computer equipment is calculated by the formula: where Tr - time standards for a certain type of work; n is the number of types of work performed; K \u003d 1.08 - a correction factor that takes into account the time spent on work that is not provided for by the norms and is of a one-time nature. The standard time spent on a certain type of work is calculated by the formula: where Hvri is the norm of time for execution i-th operations per unit of measurement in a certain type of normalized work; Vi is the volume of operations of the i-th type, performed per year (determined according to accounting and reporting data). The range of changes from 1 to i is the number of normalized operations in a certain type of work. The basis for drawing up staffing by the number of employees is average headcount (Chsp), which is calculated by the formula: Chsp = Chn x Kn, where Kn is the coefficient that takes into account the planned absenteeism of employees during vacation, illness, etc., is determined by the formula: , where% of planned absenteeism is set according to accounting accounting. 25 Romanov V.P. Maintenance of computer equipment Educational and methodological manual EXAMPLE: CALCULATION OF THE NUMBER OF EMPLOYEES ENGAGED IN THE SERVICE SERVICE OF SVT Table 1 Repair and maintenance work Volume Normative Norm of work for e costs Unit of time per No. Type of work performed year in time for measurements unit units amount of work, measurements, h. measurements h. Weekly maintenance 1. Checking the operability of devices on tests in one device 1654 0.13 215.0 in accelerated mode 2. Cleaning the magnetic heads of external memory devices one head 1654 0.09 148.9 (floppy disk drives) 3. Checking and removing computer viruses on one PC 1654 0.20 330.8 external memory devices of the PC 4. Defragmenting drives on hard disks one 1654 0.27 446.6 magnetic disk drive 5. Checking lines and local computing devices one LAN 94 0.19 17.9 network (LAN) using offline tests Monthly maintenance 6. Complete testing of all PC devices with the issuance of one PC 382 1.70 649.4 protocols, including LAN, detection and correction of errors in the distribution of disk space 7. Delivery of updated anti-virus programs and a complete one PC 382 0.48 183 ,4 checking disk memory for viruses 8. Lubrication of mechanical devices of the vehicle (NGMD, streamers, one 763 0.34 259.4 printers) device 9. Dust cleaning of the internal volumes of the PC with disassembly one PC 382 0.37 141.3 10 Cleaning the screens of video monitors from dust and dirt, one 382 0.35 133.7 adjustment and adjustment, cleaning the internal volumes of dust from the video monitor 11. Cleaning and washing the print heads of matrix and one printer 382 0.17 65.0 inkjet printers 12. Cleaning pen cleaning and lubrication of mechanical components one plotter plotter 13. Cleaning of unused toner of printing elements one printer 5 0.34 1.7 laser printers, cleaning and washing of optics and timely refilling of toner 14. Cleaning of dust and flushing of the reading element in one scanner 1 0.28 0.28 scanners and lubrication of mechanical parts Semi-annual maintenance for personal computers (PCs) and peripheral equipment 15. Dust cleaning of the internal volumes of PC power supplies, one PC 64 0.80 51, 2 cleaning and lubricating fans 16. Cleaning the screens of video monitors and LCD panels from dust and dirt one 636 0.22 139.9, adjusting and adjusting the video monitor device testing Total Tr1 2904.8 6 1. Diagnostics and fault localization one 1080 0.40 432.0 devices 2. Full testing of RAM and detection of faulty one RAM 318 0.30 95.4 modules 3. Full testing of external memory devices per one 516 0.35 180 ,6 magnetic disks and tapes device 4. Repair of PC power supplies with replacement of faulty one unit 318 2.50 795.0 elements and subsequent power adjustment 5. Repair of individual PC units (boards) (video controllers, one used lok 1908 1.15 2194.2 input-output controllers, modem boards, etc.) with replacement of microcircuits (CHIP) 6. one 318 1.20 381.6 Keyboard repair keyboard 7. Repair of laser printers without optical alignment one printer 4 1.60 6.4 systems 8. Adjustment of laser printer optics one printer 4 0.50 2.0 9. Repair of inkjet printers one printer 12 1.80 21.6 10. Repair and adjustment of plotters one - - - 26 Romanov V 11. Repair of flatbed scanners one scanner 1 1.50 1.5 14. Repair of Pentium system board one board 6 1.60 9.6 15. Repair of SVGA 14" video monitor (power supply) one monitor 150 1.50 225.0 16. Repair of 14" SVGA video monitor (color unit) one monitor 150 0.80 120.0 17. Repair of 14" SVGA video monitor (scanner) one monitor 150 0.70 105.0 18. Repair of video monitor SVGA 21" one monitor - - - 19. Repair of video monitors with CRT replacement, adjustment and one monitor nitor 318 2.30 731.4 adjustable 20. Repair of printers 9 pin (control board) one printer 268 1.90 509.2 21. Repair of printers 24 pin (control board) one printer 50 1.90 95.0 22. Repair printers 9 pin (print head) one printer 268 1.10 294.8 23. Repair of printers 24 pin (print head) one printer 50 1.20 60.0 24. one 318 1.00 318.0 Replacement of printer motors of any type engine 25. Replacement of the control board HDD IDE one board 314 0.40 125.6 26. Replacement of control board HDD SCSI one board 4 0.40 1.6 28. one 318 1.10 349.8 Repair of drives on HDD 3.5" 1.44 MB drive 29. one 318 0.50 159.0 Repair of manipulators Mouse manipulator Total Tr2 7893.8 Total Tr = Tr1 + Tr2 = 10798.6 Standard time spent on the amount of work per year is: n SUM Tr = Tr1 + Tr2; Tr = 2904.8 + 7893.8 = 10798.6 hours 1 Thus, the total time spent on maintenance of the PC (Tob) is equal to: n Tob = SUM Tr x K; Tob = 10798.6 x 1.08 = 11662.49 hours 1 The estimated number of employees involved in the maintenance of the PC is equal to: Tob 11662.49 Chn = ---- = -------- = 5.83 people In 2000 1.05 \u003d 6.12 people, where Kn is the coefficient of planned absenteeism of employees during holidays, illness, etc. is determined according to accounting data and is conventionally assumed in the example to be 5%. people - about 6 people 1.2.6. material support maintenance of the SVT The quality of the operation of the SVT depends on the provision of spare parts, various devices, consumables, the provision of instrumentation, tools, etc. The creation of the necessary conditions for normal operation is also of great importance. computing facilities(temperature and humidity conditions, power supply mode, etc.) and for service personnel (climatic conditions, noise level, illumination, etc.). The operation of the CVT must be carefully planned. Planning should cover the entire range of issues related both to the compilation of the general program of work of the CVT, the distribution of machine time, etc., and to the entire work of the maintenance personnel. The rational organization of operation should provide for the accumulation of static material based on the results of the operation of the SVT in order to summarize, analyze and develop recommendations for improving the structure of service, increasing the efficiency of using the SVT, and reducing operating costs. 27 Romanov V. P. Maintenance of computer equipment Educational-methodical manual 1.3. Systems of automated control, automatic recovery and diagnostics, their relationship Control is a check of the correct operation of an object (element, node, device). Works correctly device-diagram control does not generate any signals (in some systems, however, a normal operation signal is generated), the device does not work correctly - the control circuit generates an error signal. This is where the controls end. In other words, control is a check: right - wrong. The diagnosis process can be divided into separate parts called elementary checks. An elementary check consists in applying a test impact to the object and measuring (evaluating) the object's response to this impact. The diagnostic algorithm is defined as a set and sequence of elementary checks together with certain rules for analyzing the results of the latter in order to find a place in an object whose parameters do not meet the specified values. Consequently, diagnostics is also control, but sequential control, aimed at finding a faulty place (element) in the diagnosed object. Typically, diagnostics begin with an error signal generated by the control circuits of the CBT. An automatic control and diagnostic system is often referred to as an error detection system. The principle of organizing an automatic control system. The occurrence of an error in any CVT device causes an error signal, according to which the execution of the program is suspended. Upon an error signal, the diagnostic system immediately begins to work, which, in cooperation with the control system of the SVT, performs the following functions: 1) recognition (diagnosis) of the nature of the error (failure, failure); 2) restarting the program (part of the program, operation) if the error is caused by a failure; 3) localization of the fault location, if the error is caused by a failure, with its subsequent elimination by automatic replacement (or shutdown) of the failed element or replacement with the help of an operator; 4) recording in the memory of the CVT information about all failures and failures that have occurred for further analysis. 1.3.1. Diagnostic Programs There are several types of diagnostic programs for the PC (some of which are included with the computer) that allow the user to troubleshoot the computer. The diagnostic programs used in the PC can be divided into three levels: BIOS diagnostic programs - POST (Power-On Self Test - self-test procedure when turned on). Runs every time the computer is turned on. Diagnostic programs for operating systems. Windows 9x and Windows XP/2000 come with several diagnostic programs for 28 Romanov V. P. Maintenance of computer equipment Educational and methodological manual for checking various computer components. Diagnostic programs of firms - manufacturers of equipment. Diagnostic programs for general purposes. Such programs, which provide thorough testing of any PC-compatible computers, are produced by many companies. Power-on Self Test (POST) POST is a series of short routines stored in the ROM BIOS on the motherboard. They are designed to check the main components of the system immediately after it is turned on, which, in fact, is the reason for the delay before loading the operating system. Each time the computer is turned on, it automatically checks its main components: processor, ROM chip, system board accessories, RAM, and main peripherals. These tests are fast and not very thorough when a faulty component is found, a warning or error message (failure) is issued. Such faults are sometimes referred to as fatal errors. The POST procedure usually provides three ways to indicate a malfunction: beeps, messages displayed on the monitor screen, hexadecimal error codes issued to the I / O port. Beep Error Codes from POST When POST detects a problem, the computer emits distinctive beeps that can help identify the failed item (or group of items). If the computer is working properly, then when you turn it on, you will hear one short beep; if a malfunction is detected, a whole series of short or long beeps is issued, and sometimes a combination of them. The nature of the sound codes depends on the BIOS version and the company that developed it. POST Error Messages On most PC-compatible models, the POST procedure displays the progress of the computer's RAM test on the screen. If an error is detected during the POST procedure, a corresponding message is displayed, usually in the form of a numerical code of several digits, for example: 1790- Disk 0 Error. Using the operation and service manual, you can determine which malfunction corresponds to this code. Error Codes POSTed to I/O Ports A lesser known feature of this procedure is that at the start of each test at a specific I/O port address, POST issues test codes that can only be read by a special card installed in the expansion slot. adapter. The POST board is installed in the expansion slot. Two-digit hexadecimal numbers will quickly change on its built-in indicator at the moment of POST procedure execution. If the computer unexpectedly stops testing or "freezes", this indicator will display the code of the test during which the failure occurred. This allows you to significantly narrow the search for a faulty element. Most computers post codes to I/O port 80h. Operating System Diagnostic Programs DOS and Windows contain several diagnostic programs. Which provide performance of testing of components of SVT. Modern diagnostic programs have graphical shells and are part of the operating system. Such programs are, for example: a disk cleaning utility from unnecessary files; utility to check the disk for errors; utility for defragmenting files and free space; data archiving utility; file system conversion utility. All of these programs are also available in Windows. Diagnostic programs of firms - manufacturers of equipment Equipment manufacturers produce special specialized programs for diagnosing specific equipment, a specific manufacturer. The following groups of programs can be distinguished: Hardware diagnostic programs Many types of diagnostic programs are designed for certain types of hardware. These programs are supplied with the devices. SCSI Device Diagnostic Programs Most SCSI adapters have an on-board BIOS that allows you to configure and diagnose the adapter. Network Adapter Diagnostic Software Some NIC manufacturers also offer diagnostic software. With these programs, you can check the bus interface, control the memory installed on the board, interrupt vectors, and also perform a cyclic test. These programs can be found on the floppy disk or CD that came with the device, or you can visit the manufacturer's Web site. General purpose diagnostic programs Most test programs can be run in batch mode, allowing you to run a series of tests without operator intervention. You can create an automated diagnostic program that is most effective if you need to identify possible defects or run the same sequence of tests on multiple computers. These programs check all types of system memory: basic (base), extended (expanded) and additional (extended). The location of a fault can often be pinpointed down to a single chip or module (SIMM or DIMM). thirty

1. Introduction

2. Main body

2.1 Theoretical foundations of the topic under development

2.1.1 Maintenance of computer equipment

2.1.2 The purpose of the maintenance of computer equipment

2.1.3 Importance of computer maintenance

2.1.4 Tasks of technical maintenance of computer equipment

2.1.5 Information base for maintenance

2.1.6 Performance characteristics serviced by SVT

2.2 Practical part

2.2.1 Description of the subject area

2.2.2 Rationale for the need to use the methods inherent in this special discipline

2.2.3 Problem statement

2.2.4 Description of the solution of the problem statement based on the selected methods

2.2.5 Development of operational documentation

Conclusion

Bibliography

LAN - local computing systems.

AIS - automated information system

VS - computer system

VC - computer center

SVT - computer facilities

TO - maintenance

1. Introduction

The relevance of the topic under study lies in the fact that at the moment the development of computer technology has led to the need not only to transfer a large load of paperwork and mathematical calculations to computer equipment, but also to develop methods for maintaining this equipment in working condition.

Maintenance of computer equipment at the workplace consists in diagnosing, collecting and storing information about the characteristics of computers and peripheral devices.

The goal of the project is to develop methods for the maintenance of computer equipment in the workplace

The object of the project is the methods of carrying out maintenance

The subject is the development of methods for carrying out maintenance of computer equipment at the workplace

2. Main body

2.1 Theoretical foundations of the topic under development

2.1.1 Maintenance of computer equipment

This task is solved by different organizations in different ways. In some cases, own service units are created, but this way is very complicated from an organizational and technical point of view, requires serious material costs and can be economically justified only for very large LANs (more than three thousand workstations (AWS)).

Therefore, in most cases, contracts for the maintenance and repair of computer equipment are concluded with external organizations that have the necessary package of licenses, technical equipment, qualified personnel and established channels for the supply of spare parts and components. This path is preferred budget organizations operating small and medium aircraft.

At the request of the customer, other works can be additionally included in the list, for example, testing a PC for the presence of viruses, if necessary, their treatment.

2.1.2 The purpose of the maintenance of computer equipment

Maintenance is a set of organizational measures, including the provision of a PC with the necessary hardware and equipment, designed for the efficient operation and repair of a PC.

The purpose of the maintenance is to prematurely inspect the PC for the state of health. Identification of a problem at the starting level, allows for quick and minor repairs.

2.1.3 Importance of computer maintenance

The importance of maintenance of computer equipment lies in maintaining the operability of the computer as a whole complex, and separately of its components. PC components need constant inspection and monitoring technical condition, since the performance of any of the components is limited by a different period of operation, but with timely maintenance, the PC components will last the prescribed period of operation.

2.1.4 Tasks of technical maintenance of computer equipment

Maintenance is understood as carrying out preventive maintenance to maintain the operability and appearance of the equipment (including internal and external cleaning).

There are quite a few methods for carrying out maintenance of computer equipment. For the optimal operation of the CVT, it is possible to create your own service departments, but this approach requires quite large financial investments, which makes the scope of this method quite limited and possible only for large LANs. The most common method is the maintenance of the SVT, based on the conclusion of contracts for the maintenance and repair of the SVT with external organizations that have the necessary package of licenses, technical equipment, qualified personnel and established channels for the supply of spare parts and components.

Such contracts provide for regular scheduled maintenance of the entire fleet of ACS in accordance with the approved list.

Lists of routine maintenance are developed for printers, copiers, facsimile and other office equipment.

At the request of the customer, other works can be additionally included in the list, for example, testing a PC for the presence of viruses, if necessary, their treatment.

2.1.5 Information base for maintenance

To maintain the viability of the system, ensure information security and reduce the total cost of ownership of AIS, the most preferred option is:

· Periodic qualified technical maintenance of the SVT, which includes external and internal cleaning using special chemicals, cleaning of magnetic and optical reading heads, testing and configuring the monitor, hard drive, network card, etc.;

· periodic qualified control, condition analysis and maintenance of cable systems;

timely modernization of SVT;

· phased replacement of morally and physically obsolete SVT according to a predetermined schedule.

The configuration of the CVT depends on the financial level of the enterprise or organization, so we can talk about the impossibility of creating a universal optimal configuration of maintenance methods and tools. In most cases, the renewal of the ATC fleet is not economically viable, therefore, maintenance often involves the repair of an existing ATC. Solving the problems associated with maintaining the performance and development of such AIS requires a well-thought-out systematic approach based on economic criteria. This problem on the territory of the Russian Federation has been studied rather poorly at the moment. When building large aircraft, the following factors must be taken into account:

It is impossible to maintain the operability of the existing SVT fleet without repair and modernization. This is due to the constant increase in the complexity of the tasks being solved and the increase in the level of development of computer technology in the world. Efficient and reliable operation of large aircraft is possible only within the framework of planned measures to maintain operability, upgrade, timely commission new computing power and decommission obsolete equipment according to pre-selected schemes.

The creation and introduction of new generations of computer technology is carried out in a three-four-year period. Therefore, the life of a computer for a corporate user is 3-4 years. Subject to the timely and competent modernization of the SVT, this period can be extended to approximately five years. After that, the equipment becomes hopelessly outdated, ceases to meet the level of tasks being solved, does not lend itself to further modernization due to the incompatibility of new components with old ones, and in case of failure, it is practically unrepairable. Of particular importance is the observance of the specified terms for the replacement of SVT in the case of their use for work with critical applications, as well as as part of categorized objects.

When conducting tenders for the purchase of computer equipment, the main emphasis is often placed on the minimum cost of a one-time supply, while the main criterion here should be minimizing the total cost of owning an information system.

The total cost of ownership refers to the sum of the costs of acquiring hardware and software, staff training, configuration, administration, upgrades and technical support in a given period of operation.

The cost of ownership can be conditionally divided into initial costs that are explicit to the user (the cost of purchased equipment, software, staff training) and hidden (costs during operation). According to research by the world's leading computer manufacturers, explicit costs account for only about one-third of all costs associated with owning a computer network for five years (the maximum life of a computer, after which the cost of upgrading is beyond reasonable).

Minimization of the cost of ownership involves the use of a set of measures aimed at reducing the total cost of creating and operating an information system during a given service life. In this case, it is extremely important to be able to think ahead in order to initially determine the costs of maintaining the system during its entire life cycle. In this regard, the main task is to create an optimal configuration of the CVT fleet, taking into account its current cost, the cost of maintenance, repair, provision with additional components, etc.

It is also important to take into account the manufacturer of computer equipment. famous brands today they sell products at fairly high prices, including subsequent repairs. However, one should take into account the existence of a market for cheap goods, the repair of which will subsequently take a much larger amount of expenses. From the point of view of minimizing the cost of ownership, the best solution is to purchase equipment from the world's leading manufacturers, such as Hewlett-Packard, COMPAQ, SUN and others with a stable high reputation in the world. Such manufacturers adhere to the rule of replacing warranty components free of charge, provide delivery of component materials, and, if possible, have their own service center, which, unfortunately, is not typical for small cities of the Russian Federation. For the consumer, this means not only a reduction in repair and maintenance costs, but also a significant reduction in losses associated with system failures and downtime, as well as the loss or distortion of important information.

To ensure the specified service life of the system, it is necessary to ensure the maximum possible consideration of new design and technological solutions when ordering computer equipment for the needs of AIS. In general, the choice of a manufacturer of computer equipment and components will allow in the future, during operation, to reduce the cost of repairing the CVT fleet, although initially the amount of purchase of the CVT fleet will be higher than the purchase of cheap equipment from little-known manufacturers that have not proven themselves in the computer equipment market.

2.1.6 Operational characteristics of serviced ATS

The degree of suitability of a computer for its intended use and the possibility of its maintenance are determined by the operational characteristics of the PC.

The ability of a computer to function, ensuring the performance of specified functions with the parameters established by the requirements of technical documentation is called working capacity PC. The performance of the PC allows you to judge the state of the machine at a certain point in time. However, when operating a PC, it is important to know its state not only at the moment, but also the ability to perform the tasks assigned to the machine for a given period of time. For these purposes, the concept reliability.

The reliability of a PC is understood as its ability to remain operational for a given period of time under certain operating conditions.

At the storage stage, PCs use such a characteristic as safety, which is understood as the ability of the machine to maintain good condition under given conditions storage.

During the operation of a PC, maintenance personnel systematically encounter issues such as ease of access to units and installation, machine suitability for troubleshooting, etc. To characterize the machine from the point of view of its suitability for repair, the concept is introduced maintainability. The requirements for the maintainability of the machine are imposed depending on the conditions of its operation.

Under durability understand the property of a PC to remain operational for a certain state with the necessary interruptions for maintenance and repairs.

An important feature of a PC is reliability its work - the property to function under the given conditions of maintenance and operation of the PC.

An important factor is the performance of the PC. The results of evaluating PC performance by different methods differ significantly, but to identify the law of parameter change, they use one evaluation method.

2.2 Practical part

2.2.1 Description of the subject area

Carrying out maintenance of SVT at the workplace is carried out directly on the job. The main thing in this matter is the implementation of a preventive inspection of the entire fleet of SVT on a daily basis and the identification of problems that arise in the process of work. If any are observed, it is necessary to eliminate them at the initial stage, because. the development of one problem generates problems in the operation of all equipment, which subsequently leads to downtime and loss of time and potential earnings of the computer center.

The first group includes external inspection, cleaning, lubrication and elimination of defects found during inspection. These works are carried out with the machine turned off. The second group includes control and adjustment work carried out on the switched on machine.

From the point of view of the organization of preventive maintenance, the most widespread is planned preventive maintenance based on the calendar principle. At the same time, a schedule of routine maintenance is drawn up, which indicates the volume and timing of preventive measures.

The current maintenance of the PC is understood as a set of adjustment and repair work aimed at restoring the properties or performance lost by the machine by replacing or restoring its parts, assemblies and blocks.

The efficiency of PC operation largely depends on the level of its organization. The organization of operation is a set of measures aimed at training maintenance personnel, planning work, timely and complete provision of the required consumables, correct and systematic documentation, etc.

The organization of preventive monitoring and troubleshooting of PCs on the job is very important for maintaining the health of both an individual PC and the entire computer center as a whole. To analyze the performance of PCs and CCs, the reference composition of measurements, their constituent parameters and related indicators, given below, is used.

Elementary indicators are - the number of computers (installations), the cost of the computer (full, depreciation, residual), the cost of the application, its maintenance, etc.; time (revisions, purchases, registrations, warranty expiration, etc.): year, quarter, month, week or decade, day or full date. In addition, the indicators of measurement are the lifetimes based on dates.

An important indicator for a PC is the number of users. Ideally, there should be one user per PC. But, due to the insufficient provision of the computer park, several users are allocated for one computer, which increases the occurrence of problems associated with the human factor (user error).

For the VC, an important indicator is its location (through the corporate workplace classifier): country, district, region, city, office, building, floor, room, place. This allows you to identify errors that occur due to improper organization of the PC power supply.

computer maintenance

The presence of a local network is also an effective indicator of the health of a PC. In this case, the system administrator regulates the processes of information exchange within the local network, eliminates software errors, blocks access to irrelevant information, etc. Maintenance of the network is carried out both at the preventive and at the production level. in this case, the failure of one of the PCs will significantly complicate the work of the entire local network.

A computer equipment supplier is one of the main criteria for choosing a PC for a serviced CC. The quality of the supplier's work depends on the timely delivery of components, the quality of delivery, as well as expenditure financing.

The most important thing when choosing a PC, with a certain configuration, is the choice of manufacturer. To date, the number of manufacturers is really large, while preference is often given to well-known brands.

The choice of software also plays an important role in the quality and trouble-free operation of the PC. The use of a non-licensed or non-adjusted software product leads to failures in the process of operation, while restoring performance takes some time, which negatively affects the performance of the entire computer center.

An analysis of the operation of computer facilities by an enterprise is carried out in the context of arbitrarily combined parameters that specify a sequence of nested groupings. For example, branch aggregates can be “decomposed” into departmental aggregates or supplier aggregates, and so on.

2.2.3 Problem statement

To develop a methodology for carrying out maintenance of the SVT at the workplace for the computer center, which has 20 units of computer equipment and 10 units of office equipment at its disposal. Calculate the utilization rate and the coefficient of technical utilization of SVT for an eight-hour working day. Draw up an annual plan for the maintenance of the SVT of this CC. Develop operational documentation for this type of service.

2.2.4 Description of the solution of the problem statement based on the selected methods

The method of equipment redundancy allows you to quickly neutralize the fault that has arisen.

Neutralization of faults actually serves only to delay their manifestation (with constant redundancy, the elements, blocks or nodes of the machine work in parallel and the failure of any of them does not disrupt the operation of the machine until the entire reserve is exhausted). However, over time, faults can accumulate so much that they can no longer be neutralized and errors appear in the calculations.

Therefore, this method is used primarily in systems where the correct operation of the machine must be guaranteed for a certain period of time, and repairs are difficult or simply impossible (for example, control of spaceships). A method based on the detection of a fault combined with a repair is appropriate when machine stops are permissible and faults cannot be left undetected. This corresponds to the case of non-operational operation of the machine in the mode of sequential program processing.

Interrupted jobs in this case, after the detection and elimination of the fault, can be performed again, although this is inconvenient for the user.

In a real-time process control environment and for online information processing (eg time-sharing systems), it is very important to prevent a complete system failure for a very long time. This necessitates the use of means for detecting and diagnosing a malfunction to facilitate its rapid removal during preventive maintenance.

The computer control system is a set of software and hardware designed to determine its technical condition and maintain the required level of PC performance.

The processes of determining the technical condition and maintaining a given level of efficiency of the PC are implemented by means of checks, troubleshooting and rational maintenance. In the process of diagnosis, using the machine control system, a number of sequentially related tasks are solved:

§ control - detection of errors in the PC;

§ classification - determination of the nature of the error (failure or failure);

§ diagnostics - search for the location of the failed element;

§ corrections - elimination of an error, replacement of a failed element.

The listed tasks can be solved in the machine in various modes: operational (simultaneously with the solution of the main task by the machine); preventive checks; automatically or with the involvement of the operator.

In different control tasks, it is possible to use different technical means. They are: software; hardware; combinations of software and hardware.

The utilization factor K and is the ratio of the time during which the PC is in the on state t on, to the calendar time for the year (for example, for the quarter) t sq.

In our case, taking into account the conditions of the task, the computer is turned on for 8 hours a day during the working week, i.e. 5 days a week. There are 48 weeks in a year, so the utilization factor is:


The utilization rate shows the degree of PC load, i.e. only the organizational side of using a PC on a computer center.

Considering that the CC contains 20 units of computer equipment and 10 units of office equipment, it can be determined that the utilization rate of the CVT fleet in this CC will be:


The coefficient of technical use K t. and is the ratio of the useful time of the PC for a certain period t p. p to the time the machine was in the on state t on:

where t o, t y - time of detection and elimination of faults; t sat - time lost on failures (short-term disruption of the PC) and elimination of their consequences; t sweat - the time of loss of a serviceable PC for organizational reasons (operator's errors, incorrect program, low-quality storage media, etc.); t prof - time spent on maintenance work.

Calculate the coefficient of technical use. When carrying out the calculation, we will use the requirements for the maintenance of computer equipment and office equipment.

Let us calculate the coefficient of technical use of computer equipment during the working day, taking into account all possible losses associated with the repair and inspection of computer equipment.

At the same time, the coefficient of technical use of SVT for the selected CC will be:

The annual maintenance plan for the SVT is presented in Table 1.

Table 1. Annual plan for maintenance of SVT

Types of jobs

One-time check time, h

Time for computing

Time for office equipment

Total time during the year, h

Daily

weekly

monthly

semi-annual


Thus, taking into account all the checks and diagnostics showed that, on average, it is necessary to spend 10.625 hours a day to check the performance of the VC fleet. Therefore, for the efficient operation of the CC, it is necessary to have a team of two technical engineers.

2.2.5 Development of operational documentation

Instructions for use

Choose the most suitable program for diagnostics

2. Test your computer

Based on the results of the diagnostic test, make a decision to correct the problem

Conclusion

In conclusion, we can say that the goal of the work was achieved by identifying the features of methods for diagnosing SVT in the workplace. Achieving the goal became possible due to the implementation of the set technical tasks, as well as the study of theoretical material on the research topic.

In accordance with the theoretical material, the methods of maintenance of the SVT are described, the methodology for the implementation of the maintenance of the SVT at the workplace is identified and proposed, the utilization factor and the coefficient of technical use of the SVT for an eight-hour working day are calculated, and the annual plan for the maintenance of the SVT of this CC is drawn up. When carrying out calculations, it was found that it is possible to maintain the operability of the selected computer center using a team of two technical engineers, although for more efficient work a team of three technical engineers should be used, this will avoid downtime in the event of a critical equipment breakdown.

Bibliography

1. PC Upgrade and Repair - 17th Edition: Scott Muller

2. Certification A + "PC service technician. Organization, maintenance, repair and modernization of PC and OS": Charles J. Brooks

Technical means of informatization: A.P. Artemov

Send your good work in the knowledge base is simple. Use the form below

Good work to site">

Students, graduate students, young scientists who use the knowledge base in their studies and work will be very grateful to you.

Posted on http://www.allbest.ru/

Introduction

Goals and objectives of production (professional) practice

Industrial practice of students of educational institutions of secondary vocational education is integral part educational process and is aimed at consolidating and deepening the knowledge and skills acquired by students in the learning process, as well as mastering the system of professional skills and abilities

The practice is organized in accordance with the State Standard of Secondary Vocational Education in terms of State requirements for a minimum content and level of training of graduates to master the initial experience of professional activity.

The objectives of the practice are to generalize and improve the knowledge and skills in the specialty obtained in the laboratories of the educational institution, as well as at enterprises during practice in the specialty profile; checking the possibilities of independent work of a future specialist; preparation for the final state certification (final interdisciplinary exam in the specialty).

Time budget allocation

The duration of trainee (qualification) practice is 10 weeks.

During the practice, students perform duties in accordance with the job description.

The distribution of the practice time budget is shown in Table 1.

local network software diagnostics

Table 1 Practice Time Budget Distribution

Chapter 1. Familiarization with the goals and objectives of the practice

1.1 Individual practice task

An individual plan for the internship is to familiarize students with technological processes and related equipment at enterprises operating computer equipment and computer networks, as well as to consolidate the knowledge gained in the study of major subjects of a special cycle: “Design, layout of personal computers, maintenance of computers”, “ Network hardware and system software computer networks”, “Computer Peripherals”, “Databases”, “Modern Information Technologies”, the formation of work culture skills and a conscientious attitude to the assigned work.

As a result of practice, students receive and consolidate skills in maintenance, diagnostics, repair, modernization of electronic computer equipment (installation work, selection of measuring equipment, measurement of electrical parameters in SVT circuits, troubleshooting, reconfiguration of PC, connection of additional devices in order to improve their operating parameters).

In terms of the formation and consolidation of skills in the use of computer software and networks, students must carry out their maintenance, freely using software products.

Application of the studied theoretical skills in creating unified information systems at the enterprise (Local Area Network). Use of advanced software and technological solutions. Industrial practice of students is carried out in accordance with the current State educational standard of secondary vocational education.

The practical training of students is based on the following areas:

· Combination of practical training with theoretical training of students;

· Use in teaching the achievements of science and technology, advanced labor organization, methods of work on modern computer technology with the use of new information technologies;

· Step-by-step construction of practical training according to the increasing complexity of educational tasks. In connection with the development of technical progress and the constant improvement of production, the practice program must be systematically supplemented with materials on new achievements in science and technology, advanced labor methods, new equipment and instruments, etc.

During the practice, students study the role of a technician in production; ways of mechanization and automation of service maintenance and repair work, increasing the productivity of workers; economic performance of the site, workshop, department, etc.

The objectives of the practice in the profile of the specialty are the mastering of professional activities by students (mastering one or more working professions) in the specialty, consolidating, expanding, deepening and systematizing the knowledge gained in the study of disciplines of general professional and special cycles.

Table 2 Accounting for hours of practice

Name

Number of hours

Briefing on safety and fire prevention measures; familiarization with the enterprise

Studying the organizational structure of the enterprise, job descriptions in the workplace, workflow

The study of the main characteristics of computer equipment

Familiarization with the software in the workplace

Computer networks of the organization and their characteristics

Introduction to the server

Production work in the workplace

Internship as an understudy for the head of the maintenance department, studying the organization's management structure

Making a diary - practice report

Chapter 2. Familiarization with the structure of the enterprise, safety precautions

2.1 Acquaintance with the charter of the enterprise

The charter contains:

· Information about the location of OAO VMZ KO;

Information on the competence of the governing bodies of JSC VSW KO;, including issues that are the exclusive competence of the general meeting of participants of JSC VMZ KO;, on the procedure for making decisions by the company's bodies, including on issues, decisions on which are taken unanimously or by a qualified majority vote;

・Size Details the authorized capital of OAO VMZ KO;

· Rights and obligations of JSC VMZ KO participants;

· Information about the procedure and consequences of the participant's withdrawal from the company;

· Information on the procedure for the transfer of a share (part of a share) in the authorized capital of JSC VMZ KO to another person;

· Information about the procedure for storing documents of JSC VMZ KO and about the procedure for providing information by the company to the participants of JSC VMZ KO and other persons;

· Full and abbreviated name of OAO VMZ KO.

2.2 Familiarization with the safety briefing at the enterprise

1. General requirements for labor protection

1.1. To independent work Persons under the age of 18 who have undergone special training, including electrical safety group I, a mandatory medical examination and instruction in labor protection, who do not have contraindications for health reasons, are allowed to use a computer. From the time of pregnancy, women are transferred to work not related to the use of a computer, or the time of working with a computer is limited for them (no more than 3 hours per work shift), subject to compliance hygiene requirements established by the Sanitary Rules.

Students from the 1st grade who have been instructed in labor protection, a medical examination and have no contraindications for health reasons are allowed to work with a computer under the guidance of a teacher.

1.2. Computer users must comply with internal work schedule established work and rest schedules.

1.3. When working with a computer, the following hazardous and harmful production factors may affect the workers:

· Ionizing and non-ionizing radiation of video terminals;

· Electric shock when working on equipment without protective grounding, as well as with the rear cover of the video terminal removed;

· Visual fatigue, as well as adverse effects on the vision of flickering symbols and the background during unstable operation of the video terminal, fuzzy image on the screen.

1.4. Protective screens must be used when working with a computer.

1.5. The computer room should be equipped with a first aid kit.

1.6. Computer users must comply with the rules fire safety know the location of the primary fire extinguishing equipment. The computer room should be equipped with two carbon dioxide fire extinguishers and an automatic fire alarm system.

1.7. The windows in the room where computers are used should mainly be oriented to the north or northeast. Window openings must be equipped with adjustable devices such as blinds, curtains, external visors, etc.

1.8. The illumination of workplaces on the surface of the table in the area where the working document is placed should be 300-500 lux. The illumination of the surface of computer screens should not exceed 300 lux. Lighting should not create glare on the surface of the screens. The use of luminaires without diffusers and shielding grilles is not allowed.

1.9. The victim or eyewitness of the accident is obliged to immediately inform the school administration about each accident with an employee. If the equipment malfunctions, stop work and inform the school administration.

1.10. In the process of work, computer users must comply with the rules for the use of personal and collective protective equipment, observe the rules of personal hygiene, and keep the workplace clean.

1.11. Persons who have failed to comply with or violate the instructions on labor protection are subject to disciplinary liability in accordance with the internal labor regulations and, if necessary, are subjected to an extraordinary examination of knowledge of the norms and rules of labor protection.

2. Labor protection requirements before starting work

2.1. Thoroughly ventilate the room with computers, make sure that the microclimate in the room complies with the current sanitary standards microclimate of industrial premises.

2.2. Make sure that the workplaces with computers are properly lit.

2.3. Make sure that the protective earth of the equipment is available, as well as the protective screens of video monitors.

3. Labor protection requirements during work

3.1. When working with a computer, the values ​​​​of visual parameters should be within the optimal range.

3.2. The keyboard should be placed on the table surface at a distance of 100-300 mm from the edge facing the user or on a special height-adjustable working surface separated from the main table top.

3.3. When the video terminal is running, the distance from the eyes to the screen should be 0.6-0.7 m, the eye level should be at the center of the screen or at 2/3 of its height.

3.4. The image on the screens of video monitors must be stable, clear and extremely clear, without flickering of characters and background, there must be no glare and reflections of lamps, windows and surrounding objects on the screens.

3.5. Do not work with a computer without protective screens.

3.6. The total time of direct work with the computer during the work shift should be no more than 6 hours.

3.7. The duration of continuous work with a computer without a regulated break should not exceed 1 hour. Every 45-60 min. work should take a regulated break lasting 10-15 minutes.

3.8. During regulated breaks, in order to reduce neuro-emotional stress, fatigue of the visual analyzer, eliminate the influence of hypodynamia and hypokinesia, and prevent the development of postural tonic fatigue, it is necessary to perform sets of exercises for the eyes, physical training minutes and physical training pauses.

4. Labor protection requirements in emergency situations

4.1. In the event of a malfunction in the operation of the video terminal, turn it off and inform the school administration about this. Continue work only after the problem has been eliminated.

4.2. If the user experiences visual discomfort and other adverse subjective sensations, one should limit the time spent working with the computer, correct the duration of breaks for rest, or change activities to another activity not related to the use of a computer.

4.3. In case of electric shock to the user, immediately turn off the power supply, provide first aid to the victim, if necessary, send him to the nearest medical institution.

5. Labor protection requirements at the end of work

5.1. Turn off computers, clean their screens from dust.

2.3 Familiarization with the document on the formation of the enterprise

Since I am not an employee of the enterprise, I did not have access to this document

2.4 Familiarization with the structures and management systems in the enterprise

The management structure consists of three levels (Tables 3,4,5):

Intracompany management

· manufacturing control;

· personnel Management.

Table 3 Principal diagram of production control

Principles

Economic Methods

1. Centralization in management

1.Marketing

1.Commercial calculation

2. Decentralization in management

2.Planning

2. Intracompany settlement

3. Combination of centralization and decentralization

3.Organization

3. Prices and pricing mechanism

4. Focus on long-term development goals

4. Control and accounting

4.Financial policy and its most important instruments

5. Democratization of management: participation of employees in the top management

Table 4. Principal diagram of production control

Conducting R&D

Ensuring the development of production

Sales assurance

Organizational structures of production management

1. Development of the scientific and technical policy of the company

1. Development and maintenance of policy in the most important areas of the company's production activities

1. Development of marketing policy

1 .Functional

2. Development and implementation of new products

2. Development of production technology

2. Choice of channels and methods of distribution

2.Linear-functional

3.Organization of scientific and technical activities

3. Providing production with material and technical resources

3. Sales organization

3.Problem-target management

4.Improve the quality and competitiveness of products

4.Matrix structure

5.Improve labor productivity

5. Program-target management

Table 5. Principal diagram of production control

Development and implementation of personnel policy

Pay and incentives

Group management, team relationships

and with trade unions

Socio-psychological aspects of management

1. Principles of selection and placement of personnel

1. Forms of remuneration

1.Involvement of workers in management at the grassroots level

1. Motivation of work of employees and creative initiative

2.Terms of employment and dismissal

2. Ways to increase labor productivity

2. Work teams and their functions

2.Organizational culture of the company

3.Training and professional development

3.Incentive pay systems

3. Relationships in the team

3. The impact of personnel management on the activities of the company and its organization

4. Evaluation of personnel and their activities

4. Relations with trade unions

"Organization management structure" or "organizational management structure" (OSU) is one of the key concepts of management, closely related to the goals, functions, management process, the work of managers and the distribution of powers between them. Within the framework of this structure, the entire management process takes place (the movement of information flows and the adoption management decisions), which involves managers of all levels, categories and professional specializations. The structure can be compared to the frame of the management system building, built to ensure that all processes occurring in it are carried out in a timely manner and with high quality. Hence the attention that leaders of organizations pay to the principles and methods of building management structures, the choice of their types and types, the study of trends in change and assessment of compliance with the tasks of organizations.

The management structure is understood as an ordered set of stably interconnected elements that ensure the functioning and development of the organization as a whole. OSU is also defined as a form of division and cooperation of management activities, within the framework of which the management process is carried out according to the relevant functions aimed at solving the set tasks and achieving the intended goals. From these positions, the management structure is presented as a system of optimal distribution of functional duties, rights and responsibilities, the order and forms of interaction between the governing bodies and the people working in them.

2.5 Enterprise automated control system

Automated enterprise management system (APCS) is a set of software, technical, information, linguistic, organizational and technological tools and actions of qualified personnel, designed to solve the problems of planning and managing various types of enterprise activities.

Automated systems enterprise management are necessary to optimize and improve the efficiency of the work of managers and some other personnel departments of the enterprise. Experts say that managing an enterprise with the help of automated systems contributes to the growth of the competitiveness of any company. Automated enterprise management systems are especially important for managers. According to statistics, an ordinary manager spends about 60% of his precious time on reporting and compiling documentary tasks for staff. An effective database of employees, which is part of enterprise management, allows the manager to quickly access the necessary information and perform actions for the reception and movement of personnel. In addition to everything, enterprise management with the help of modern systems allows for automated payroll calculation based on a variety of parameters. In particular, it provides for a position, individual benefits, sick leave, travel allowance, and more. The available information contributes to the prompt calculation and accounting of wage data in financial statements.

Depending on the functional equipment, the following automated enterprise management systems are distinguished:

· Multifunctional systems that allow you to perform the full range of tasks related to the management of the enterprise;

· Systems of expert analysis, which are aimed at detecting the main trends and directions of development of the enterprise;

· Payroll systems.

Comprehensive programs for personnel management. They allow you to solve a huge list of tasks in the field of personnel management: contact information of employees, work schedules, enrollments and dismissals, salaries, and much more.

The main task of expert programs is the storage and comparison various characteristics an applicant with similar characteristics of the best employees of the company. This approach allows you to find promising employees for a particular department. Due to the high cost of such solutions, it is advisable to use them only within large enterprises. Automated enterprise management systems, which are designed to solve complex problems, are recommended to be integrated with accounting systems. This feature is due to the fact that the manager will be able to make an adequate decision only if there is up-to-date data on the state of the enterprise. The introduction of enterprise management systems contributes to the adoption of effective decisions within the framework of a whole range of tasks.

Automated enterprise management systems (ACS) are usually integrated systems. APCS according to the nature of production is divided into the following types: continuous, discrete (single, small-scale, medium-scale production) and continuous-discrete type (mass-flow and large-scale production). The automated control system of a manufacturing enterprise, as a rule, includes control subsystems:

Warehouses;

· Deliveries;

· Personnel;

· Finance;

· Design and technological preparation of production;

· Nomenclature of production;

· Equipment;

· Operational planning of production needs.

The clients of the Krasny Oktyabr enterprise are private or state organizations (enterprises) that have the 1C Enterprise database. Employees of the Krasny Oktyabr enterprise are updating, configuring and normalizing databases. The same goes for computer repair and diagnostics. The enterprise "Red October" serves both private and public organizations, but to a greater extent this applies to individuals.

2.6 Marketing service in the enterprise

The marketing service at the Krasny Oktyabr enterprise is not conducted, since for the most part the enterprise works with old and regular customers.

2.7 Business ethics at the enterprise. Business ethics when working with clients

Business ethics is a set of informal (not legally established) rules that firms adhere to in their activities. Business ethics includes honesty in dealing with employees, customers (customers), suppliers and competitors.

During the entire internship, the staff and clientele of the enterprise were polite to me, which allowed me to respond with courtesy in their direction. I concluded that the business ethics at the enterprise are fully respected.

2.8 Emergency scheme at the enterprise

I have studied quite a simple scheme of evacuation in case of emergency. An example outline is shown in figure 1.

Rice. 1 Emergency circuit

Chapter 3. Survey of the enterprise

3.1 Computing centers in the enterprise

Computing center (abbr. CC) is an organization, subdivision, or, in a narrower sense, a complex of premises designed to accommodate computer systems and auxiliary equipment.

There is no computer center at the enterprise, but there is a server providing the following services for clients.

Services provided by the server:

3.1.1 System administrator job description

I. General provisions

1. The system administrator belongs to the category of specialists.

2. A person with specialized professional education, experience in maintenance and repair of personal computers and office equipment, who knows the basics of local networks (TCP / IP protocol stack, network equipment, principles of building local area networks) is appointed to the position of system administrator.

3. The system administrator must know:

3.1. Technical characteristics, purpose, operating modes, design features, rules for the technical operation of local area network equipment, office equipment, servers and personal computers.

3.2. Hardware and software of local computer networks.

3.3. Principles of repair of personal computers and office equipment.

3.4. Languages ​​and methods of programming.

3.5. Fundamentals of information security, ways to protect information from unauthorized access, damage or deliberate distortion.

3.6. The procedure for issuing technical documentation.

3.7. Internal labor regulations.

3.8. Fundamentals of labor legislation.

3.9. Rules and norms of labor protection, safety and fire protection.

4. Appointment to the position of a system administrator and dismissal from the position is carried out by order of the director on the proposal of the head of the IT department.

5. The system administrator reports directly to the head of the IT department.

II. Responsibilities of a system administrator

System Administrator:

1. Installs operating systems and software necessary for operation on servers and workstations.

2. Performs software configuration on servers and workstations.

3. Supports the software of servers and workstations in working order.

4. Registers users of the local network and mail server, assigns identifiers and passwords.

5. Provides technical and software support to users, advises users on the operation of the local network and programs, draws up instructions for working with the software and brings them to the attention of users.

6.Sets access rights and controls the use of network resources.

7. Provides timely copying, archiving and backup of data.

8. Takes measures to restore the operability of the local network in case of failures or failure of network equipment.

9. Identifies user and software errors and takes action to correct them.

10. Conducts network monitoring, develops proposals for the development of network infrastructure.

11.Provides network security (protection against unauthorized access to information, viewing or changing system files and data), security of internetworking.

12. Provides anti-virus protection for the local area network, servers and workstations.

13. Prepares proposals for upgrading and purchasing network equipment.

14. Carries out control over the installation of LAN equipment by specialists of third-party organizations.

15. Reports to his immediate supervisor about cases of violation of the rules for using the local area network and the measures taken.

III. System administrator rights

The system administrator has the right to:

1. Install and change the rules for using the local area network.

2. Get acquainted with the documents that define his rights and obligations in his position, the criteria for assessing the quality of performance of official duties.

3. Submit proposals for the management to improve the work related to the duties provided for in this job description.

4. Require management to provide organizational and technical conditions necessary for the performance of official duties.

IV. Responsibility of the system administrator

1. The system administrator is responsible for:

1.1. Violation of the functioning of the local area network, servers and personal computers due to improper performance of their duties.

1.2. Untimely registration of users of the local area network and the mail server.

1.3. Untimely notification of management about cases of violation of the rules for using the local area network.

2. The system administrator is held liable:

2.1. For improper performance or non-performance of their official duties provided for by this job description - within the limits established by the current labor legislation of the Russian Federation.

2.2. For offenses committed in the course of their activities - within the limits established by the current administrative, criminal and civil legislation of the Russian Federation.

2.3. For causing material damage to the company - within the limits established by the current legislation of the Russian Federation.

3.2 Information processing methods in the enterprise

In the era of centralized use of computers with batch processing of information, users of computer technology preferred to purchase computers that could solve almost all classes of their tasks. However, the complexity of the tasks being solved is inversely proportional to their number, and this led to inefficient use of the computing power of the computer at significant material costs. One cannot ignore the fact that access to computer resources was difficult due to the existing policy of centralizing computing facilities in one place.

The principle of centralized data processing (Fig. 2) did not meet the high requirements for the reliability of the processing process, hindered the development of systems and could not provide the necessary time parameters for online data processing in multi-user mode. A short-term failure of the central computer led to fatal consequences for the system as a whole, since it was necessary to duplicate the functions of the central computer, significantly increasing the costs of creating and operating data processing systems.

Figure 2 The principle of centralized data processing

Centralized data processing system

The emergence of small computers, microcomputers and, finally, personal computers required a new approach to the organization of data processing systems, to the creation of new information technologies. There was a logical requirement for the transition from the use of individual computers in centralized data processing systems to distributed data processing.

Distributed data processing (Fig. 3) is data processing performed on independent but interconnected computers, representing a distributed system.

Figure 3. Distributed data processing

Distributed data processing system

To implement distributed data processing, multi-machine associations were created, the structure of which is being developed in one of the following areas:

· Multi-machine computing systems (MCC);

· Computer (computer) networks.

A multi-machine computing complex is a group of computers installed nearby, combined with the help of special interfaces and jointly performing a single information-computing process.

3.3 Use of paperless data processing technologies in the enterprise

The enterprise makes full use of the office suite of applications Microsoft office 2013.

Microsoft Office -- An office suite of applications created by Microsoft for operating systems Microsoft Windows, Apple Mac OS X. This package includes software to work with various types documents: texts, spreadsheets, databases, etc. Microsoft Office is an OLE object server and its functions can be used by other applications, as well as Microsoft Office applications themselves. Supports scripts and macros written in VBA.

But to a greater extent, they use:

Microsoft Word;

Microsoft Excel;

Microsoft PowerPoint.

3.4 Local network in the enterprise

The company where I did my internship already has a local network. The topology of this network is a star.

A star is the basic topology of a computer network in which all computers on the network are connected to a central node (usually a switch), forming a physical network segment. Such a network segment can function both separately and as part of a complex network topology.

This topology has both its pros and cons.

· Simplicity of laying;

· Ease of maintenance;

· Easy addition of new workstations;

Endurance (if one of the sections of the network transmission medium

· The data breaks or shorts out, then only the device connected to this point loses communication).

· Expensiveness;

· The presence of a separate piece of cable for each device.

The local network at the enterprise is built using a twisted pair cable, category 5e, as well as using a NetGear ProSafe JF5524E switch. Internet access is provided using the D-Link DL804HV access point.

Figure 4. Enterprise local area network

Chapter 4. Technical equipment of the enterprise

4.1 Acquaintance with the complex of technical means of the enterprise computer center, the availability of office equipment and telecommunications

There is no VC at the enterprise.

With regards to office equipment and telecommunications, it looks like this:

· 2 network printers: HP LaserJet P2015n/dn (for printing the necessary information);

· 1 MFP HP LaserJet 3055 (for printing, copying, scanning, as well as for receiving and sending faxes);

· 2 scanners Canon CanoScan LiDE 210;

· Several Siemens radiotelephones.

4.2 Configuration of personal computers in the enterprise

The company has 8 computers that are similar in their characteristics:

Hard drive: Seagate 320Gb

Drive: Asus DRW-24F1ST

Also available 1 server:

AMD Athlon 64 x2 has 4gb of RAM, 1 Tb of hard drive storage.

4.3 Organization of work at the enterprise for information protection

Antivirus: The enterprise uses a commercial version of AVG Antivirus.

AVG Antivirus is a Czech-made anti-virus system that has a file scanner, an email scanner and supports automatic monitoring. AVG's security system is certified by all major independent certification companies such as ICSA AV-TEST, Virus Bulletin, Checkmark (West Coast Labs).

Firewall: iptables is a command-line utility that is the standard interface for managing the operation of the netfilter firewall (firewall) for Linux kernels versions 2.4 and 2.6. Used for packet filtering and NAT enforcement.

Backup on the server is performed using the rsync command utility.

Backup on client PCs is performed using the Cobian Backup utility. This is a multi-threaded utility that allows you to schedule backups of individual files or directories to a specific directory on the same computer or to a remote server on the network. There is also full support for the FTP protocol.

4.4 Inventory of the existing technical equipment of the enterprise

Name

Name / Specifications:

Computer (7pcs)

Chassis: CoolerMaster CM Elite 334U

Motherboard: ASUS H61M-D

Processor: Intel Core i3-3220 3.3GHz BOX

Video card: Asus GeForce 210 1024MB

RAM: Corsair DDR3 4096Mb

Hard drive: Seagate 320Gb

Drive: Asus DRW-24F1ST

Monitor (8pcs)

Acer V236HLbd 23"

Printer (2pcs)

HP LaserJet P2015n/dn

HP LaserJet 3055

Phone (6 pcs.)

Siemens Gigaset A220

Switch/hub (4pcs)

NetGear ProSafe JF5524E, NetGear F5608, D-Link DL804HV, D-Link DWL 2100AD

Scanner (2pcs)

Canon CanoScan LiDE 210

Server (1pc)

AMD Athlon 64 x2 has 4gb of RAM, 1 Tb of hard drive storage

Chapter 5

5.1 Acquaintance with the operating system involved in the enterprise

The enterprise makes full use of Windows 8 Enterprise.

Windows 8 is an operating system belonging to the Microsoft Windows OS family, following Windows 7 in the line and developed by the multinational corporation Microsoft.

Thanks to the new developments involved in the process of creating the operating system, the process of loading it after turning on the PC takes a maximum of 8 seconds. The need for a reboot is also minimized, saving IT staff time.

Thanks to UEFI, you can remotely repair your computer by diagnosing and eliminating all interruptions that have arisen in its operation using the network.

The new OS is supported by netbooks, tablets and other devices that have built-in x86 bit processors. This will allow IT staff to create a Windows infrastructure, greatly simplifying the network management process.

In addition to all of the above, the considered OS allows you to transfer the used workspace to any other device. To perform such actions, a regular “flash drive” or other drive is enough, the minimum volume of which will be 32 GB.

Windows 8 simplifies the work of system administrators by modernizing networking features. So, using the network protocol of the so-called application layer, you can manage printers, various files and other resources related to single system. To fully achieve the intended goal, the built-in network card is used

And most importantly, Windows 8 is a fairly simple OS, one of those that are on the market.

5.2. Distribution of software on local machines in the enterprise

Software distribution in the enterprise is available thanks to a mapped network drive on all client machines, with installation files for all necessary applications, such as:

· Skype v 6.16.67.10;

· HaoZip v 4.0.1.9380;

· TeamViewer v 9.0;

AVG Antivirus

1C Enterprise 8.2

5.3 Hierarchical software and network model in the enterprise

The hierarchical network model involves the division of the network into separate levels. Each layer provides specific functions that define its role throughout the network. By separating diverse network functions into layers, the network architecture becomes modular, which ensures network scalability and performance. A typical hierarchical network structure is divided into three levels: the access level, the distribution level, and the core level (Fig. 5).

Figure 5. Three-level hierarchical network model

The access layer provides an interface for end devices such as personal computers, printers, IP phones, giving them access to the rest of the network layers. The access layer can contain routers, switches, bridges, hubs, and wireless points access. The primary purpose of the access layer is to provide a means of connecting devices to the network and controlling which devices are allowed to use those means of connection.

The distribution layer aggregates (groups) the data received from the access layer switches before it is passed to the kernel layer for routing to the destination. The distribution layer controls the flow of network traffic based on policies and establishes the boundaries of broadcast domains, performing the functions of routing between virtual networks(VLAN), which are defined at the access level (Fig. 6).

Figure 6 Distribution level

The broadcast domain is the collection of all devices that receive broadcast messages from any device in this collection. These domains are usually restricted to routers because routers do not forward broadcast messages.

Virtual networks (VLANs) allow you to segment traffic on the switch into separate subnets. For example, at a university it is possible to divide traffic by faculty, students and visitors (guests). Distribution layer switches are typically high performance devices with high availability and redundancy to provide the required reliability.

The core level (Fig. 7) in the hierarchical network model is the high-speed backbone of the internetwork. The kernel layer is critical to the problem of interconnecting distribution layer devices, so it is very important that the kernel maintains high availability and is built on the principles of communication redundancy. The kernel aggregates traffic from all distribution layer devices, so it must be able to pass large amounts of data with minimal delays.

Figure 7. Network core

In small networks, the use of the collapsed core model is practiced - when the presentation layer and the core layer are combined into one.

Chapter 6

6.1 Analysis of the technical equipment and software of the enterprise

The company's computer network is based on the 100BASE-T standard to provide high-speed connection between computer equipment inside the office (100 Mb/s). Used 2 network switches (switch), supporting the 100BASE-T standard. The network is laid with shielded UTP 5e cable. At the same time, server equipment and workstations are equipped with network cards that also support the above standard. The SCS also includes: RJ-45 sockets, patch cords, cable boxes, cable channel.

Server equipment

The enterprise has a server that provides access to network resources (network drives), and also performs archival copying of user information. The server is based on a dual-core processor AMD Athlon 64 x2 has 4gb of RAM, 1 Tb of hard drive memory. The server also has communication properties: providing general access to the global Internet using NAT, FTP server, Firewall (iptables is used), traffic accounting and client administration.

Computer equipment

Office computer equipment is represented by 7 workstations for office staff with dual-core processors, complete with 23-inch LCD monitors. They have keyboards, manipulators of the "mouse" type. Additionally, network cards were installed.

Office equipment is represented mainly by models from HP. HP LaserJet P2015n/dn printers, HP LaserJet 3055 MFPs, Canon CanoScan LiDE 210 copiers/scanners.

Licensed Software

To ensure the legal use of software products, it is necessary to use licensed software. The following licensed software was purchased for the enterprises: 1) Microsoft Windows 8 Corporate; 2) 1C-Enterprise v.8.2. Other software products used in the enterprise are freely distributed under the GPL (Freeware) license.

The GNU General Public License (translated as the GNU General Public License, the GNU General Public License, or the GNU General Public License) is a free software license created as part of the GNU project in 1988. It is also abbreviated as the GNU GPL, or even just the GPL, if it is clear from the context that we are talking about this particular license (there are quite a few other licenses containing the words “general public license” in the title). The second version of this license was released in 1991, the third version, after many years of work and long discussion, in 2007. The GNU Lesser General Public License (LGPL) is a weakened version of the GPL for certain software libraries. The GNU Affero General Public License is an enhanced version of the GPL for programs intended to be accessed over the network.

6.2 Optimal variant of modernization of enterprise computer facilities

Description of the main stages of modernization

The purpose of upgrading computer components is to increase speed, performance, increase the number of disk spaces, gain opportunities to use additional functions, in a word - improve computer performance. The main benefits that you can get from upgrading your computer:

· The upgraded personal computer has the components you need;

· Thanks to modernization, the personal computer works faster and performs current tasks more efficiently;

· Modernization eliminates the hassle of replacing a personal computer.

However, we should not forget that when updated components appear in the computer configuration, a failure may occur due to the incompatibility of devices with each other, while the power supply may fail and you will have only yourself to blame.

There are two ways to plan an upgrade:

· Based on the tasks that the computer should perform;

· Based on the funds that can be invested.

Having decided to upgrade a computer, a person wants to get the maximum benefit, so it is necessary to calculate the costs and figure out which components are needed.

When expanding the capabilities of the system to solve problems, it is necessary to adhere to the following actions:

Determine what tasks the system should perform;

· Assess the capabilities of the current hardware and OS;

· Upgrade those components that do not meet the requirements obtained as a result of the assessment.

With the successful modernization of computer equipment, the main results can be:

· "Bottlenecks" in the system are eliminated;

· It becomes possible to use new software and hardware;

· Improving the quality of current tasks.

As a rule, bottlenecks can be eliminated in one of the following ways:

· Update video card;

· Increase the amount of RAM;

· Increase the speed of the processor;

· Increase the speed of your Internet connection.

The significance of the modernization of computer equipment is to maintain the operability of the computer as a whole complex, and separately of its components. The components of a personal computer need constant inspection and monitoring of its technical condition, since the performance of any of the constituent components is limited by a different period of operation, but with timely maintenance, the devices of a personal computer will last the prescribed working life.

In organizations, these tasks are solved in different ways. In some cases, own service units are created, but this way is very complicated from an organizational and technical point of view, requires serious material costs and can be economically justified only for very large local area networks.

Therefore, in most cases, contracts for the maintenance, repair and modernization of computer equipment are concluded with external organizations that have the necessary package of licenses, technical equipment, qualified personnel and established channels for the supply of spare parts and components. This path is preferred by budgetary organizations that operate small and medium-sized computing facilities.

Such contracts provide for regular scheduled maintenance of the entire fleet of computer equipment in accordance with the approved list.

At the request of the customer, other works can be additionally included in the list, for example, testing personal electronic computers for the presence of viruses, if necessary, their treatment.

The company decided to purchase eight Kingston SV300S37A 240G SSDs. To improve overall system performance.

Table 7. Modernization of equipment at the enterprise

6.3 Plan for the modernization of computers and the local network of the enterprise

The enterprise does not consider large-scale modernization. For a noticeable increase in system responsiveness, it was proposed to buy 8 Kingston SV300S37A/240G SSD drives.

6.4 approximate number necessary costs for modernization

The approximate amount of necessary costs amounted to 40,048 rubles. (see table 7).

Chapter 7

7.1 Creation of a project of a unified information environment of the enterprise

To create a unified information environment of the enterprise, we needed the shareware program "Expert-SKS v1.5.1".

In order to create a project, you need to do the following:

· Open the program;

· Load the background;

· Set the scale;

· Set up jobs;

· Put a wardrobe;

· Stretch the track;

· Auto-routing the cable;

· Through the master of "cable channels" to make a cable channel.

Figure 8. Ready unified information environment

To create a unified enterprise information environment (see Fig. 8), we needed:

Table 8

Name

Quantity

Price

UTP cat.5e cable

Box 30x30

NETGEAR JGS524 Switch

Patch cord UTP Real cat.6, 1.2 m

RJ45 socket block

Socket 220V

RJ12 socket

RUB 16239.00

Patch panel UTP Real cat.6 24-port.

So, to transmit a frame of the minimum size, which, together with the preamble, has a length of 72 bytes, or 576 bits, it will take a time equal to 576 bt, and if we take into account the inter-frame interval of 96 bt, we get that the frame repetition period will be 672 bt.

At a transmission rate of 100 Mbps, this corresponds to a time of 6.72 µs. Then the frame rate, that is, the number of frames passing through the network in 1 second, will be 1 / 6.72 μs = 148,809 frames / s.

When transmitting a frame of the maximum size, which, together with the preamble, has a length of 1526 bytes or 12208 bits, the repetition period is 12 208 bt + 96 bt = 12 304 bt, and the frame rate at a transmission rate of 100 Mbps will be 1/123.04 µs = 8127 fps.

Knowing the frame rate and size useful information carried by each frame, it is not difficult to calculate the net throughput of the network.

For a minimum frame length, the usable bandwidth is 46 bytes/frame 148,809 fps = 54.76 Mbps, which is only slightly more than half of the total maximum network bandwidth.

For the maximum frame size, the useful network bandwidth is 1500 bytes/frame 8127 fps = 97.52 Mbps.

Thus, in a Fast Ethernet network, the useful bandwidth can vary depending on the size of the transmitted frames from 54.76 to 97.52 Mbps, and the frame rate varies in the range from 8127 to 148809 fps.

If you need to measure network bandwidth, you can use the iperf console utility. Iperf is a cross-platform console client-server program designed to test the bandwidth of the Internet channel between two computers. The measurement is carried out as follows, on one PC we run iperf in the "server" mode, on the second in the "client" mode, indicating the ip-address of the first PC ("server"). Measured information is displayed after the set time. Conclusion:

According to the test results, the throughput in the direction from host 192.168.5.38 to host 192.168.5.39 approximately corresponds to the declared speed of 100 megabits.

Conclusion

The internship showed that this is an important element in the process of training a specialist in the field of computer equipment and computer networks, and I also gained skills in repairing office equipment. During my internship, I got the opportunity to see how various activities in the field of maintenance of VT and KS, as well as to apply the theoretical knowledge gained earlier. During the internship, I tried to complete the tasks assigned to me: Diagnosing computer problems in the enterprise, creating local networks and setting up active equipment.

Literature

1. Murakhovsky V.I.M91 PC iron. New opportunities. - St. Petersburg: Peter, 2005. - 592 p.

2. Kleymenov S. A. Administration in information systems. - M.: Publishing Center "Academy", 2010. - 272 p.

3. Buchek G. ASP.NET: Tutorial. - St. Petersburg: Peter, 2011

4. Mueller Scott. PC Upgrade and Repair, 18th edition. : Per. from English. -- M. : I.D. Williams”, 2009. -- 1280 p.

5. Popov I.I., Maksimov N.V. Computer networks. Textbook for students of institutions of secondary vocational education. - M.; Forum: Infra-M, 2012

Similar Documents

    Characteristics of the enterprise for the maintenance of computer equipment and computer networks. Consideration of the structure, goals and objectives of the service department, organization of the workplace, forms of remuneration. Learning the rules of working with e-mail.

    practice report, added 06/05/2014

    Features, differences, topology and functioning of local computer networks. Software for information and computing networks. Basic data transfer protocols, their installation and configuration. Authentication and authorization; Kerberos system.

    term paper, added 07/20/2015

    Creation of computer networks using network equipment and special software. Appointment of all types of computer networks. The evolution of networks. Differences between local networks and global networks. The trend towards convergence of local and global networks.

    presentation, added 05/04/2012

    Basic information about printers. The design of the laboratory stand. Software installation. Performance analysis. Goals and functions of the management of CJSC "Tirotex". Security measures in the maintenance of computer equipment.

    thesis, added 12/29/2014

    Architecture of construction of computer networks. Structure of the IEEE 802 standards. Network test programs. Crimping tool for connectors. General local settings of computers. Determination of the composition and structure of personnel. Calculation of the working time budget.

    thesis, added 01/14/2015

    Functions of computer networks (storage and processing of data, user access to data and their transmission). The main indicators of the quality of local networks. Classification of computer networks, their main components. Network topology, equipment characteristics.

    presentation, added 04/01/2015

    The device of computer networks. Systems for information transmission, consisting of terminals, servers and a communication medium. Technical, software and information means of networks. Classification of computer networks. network operating systems.

    term paper, added 07/10/2014

    The concept of a local area network, the architecture of building computer networks. Local computer settings. Setting up an administrator account. Configuring anti-virus security. The structure of the computer network maintenance department.

    thesis, added 01/15/2015

    Classification of computer networks in the technological aspect. The device and principle of operation of local and global networks. Circuit-switched networks, telecom operator networks. Topologies of computer networks: bus, star. Their main advantages and disadvantages.

    abstract, added 10/21/2013

    General information about the organization and its information system. The main and peripheral equipment of employees of the enterprise. Diagnostics and maintenance of computer equipment, its software. Service complex PC-tester.

MINISTRY OF EDUCATION AND SCIENCE OF RUSSIA

FGBOU VPO "Penza State Technological University"

Zarechensky Technological Institute-branch

federal state budgetary educational institution

higher professional education

"Penza State Technological University"

230113 Computer systems and complexes

COURSE WORK

in the discipline "Maintenance of computer equipment"

on the topic: Service equipment

Completed by: student of group 11KS1 __________ R.A. puppeteers

Project Manager: ____________________V.A.Borisov

The work is protected with an assessment: ___________________________

INTRODUCTION4

2 CLASSIFICATION OF SERVICE EQUIPMENT5

3 MEASURING INSTRUMENTS AND TEST CONNECTORS FOR CHECKING PC6 PORTS

4 SOFTWARE AND HARDWARE COMPLEXES (HARDWARE)8

4.1 System monitoring boards (POST boards).8

4.2 PAK checks motherboard PC POWER PCI-2.29

4.2.1 Principles of operation13

15

4.3.1 Product description16

4.3.2 Functionality17

4.4 HSS for checking individual elements of the system - HSS for repairing HDD ATA, SATA PC-3000 for Windows (UDMA)24

4.4.1 PC-3000 UDMA25 Hardware

4.4.2 Power adapter27

4.4.3 PC-3000 UDMA27 Resource Management

CONCLUSION28

REFERENCES30

ZTI.KR.3.230113.7 PZ

Puppeteer R.

Borisvo V.A.

Service equipment

Explanatory note

INTRODUCTION

Even some 20-30 years ago, people were not so dependent on electronic assistants. At present, it is impossible to imagine a modern office without computer equipment and peripheral devices, which require consumables, maintenance, and, if necessary, repair to maintain their performance. Do I have to wait until the equipment breaks down? The failure of a printer, MFP or computer can significantly complicate, or even completely stop the work of your company's office. That is why you should carefully approach the issue of maintaining computer and office equipment. Many years of practical experience shows that regular preventive maintenance not only prevents breakdowns, but also extends the life of the equipment.

2 CLASSIFICATION OF SERVICE EQUIPMENT

Troubleshooting and repairing a PC requires special tools that allow you to identify problems and fix them quickly and easily.

These include:

a set of tools for disassembly and assembly;chemicals (solution for wiping contacts),a spray bottle with coolant and a can of compressed gas (air) for cleaning computer parts;a set of swabs for wiping contacts;specialized improvised tools (for example, tools needed to replace microcircuits (chips));service equipment.

Service equipment is a set of devices designed specifically for diagnosing, testing and repairing SVT. Service equipment includes the following elements:

Measuring instrumentstest connectors for testing serial and parallel ports;memory testing devices that allow you to evaluate the functioning of SIMM modules, DIP chips and other memory modules;equipment for testing a computer power supply;

diagnostic devices and programs for testing computer components (hardware and software systems).

3 MEASURING INSTRUMENTS AND TEST CONNECTORS FOR CHECKING PC PORTS

The following measuring instruments are used to check and repair a PC:

digital multimeter;logic probes;single pulse generators for testing digital circuits.

The main types of measuring instruments are shown in Figure 7.

Test connectors provide software and hardware testing of PC I/O ports (parallel and serial).

Computer power supply testing equipment provides testing of PC power supplies and determination of their main characteristics. It is a set of equivalent loads, switching elements and measuring instruments. The appearance of the equipment is shown in Figure 3.

4 SOFTWARE - HARDWARE COMPLEXES (PACK) PACs are divided into:

system monitoring boardsMotherboard test PAKspecialized PAKPAK checks of individual elements of the systemHDD check PAK

4.1 System monitoring boards (POST boards).

The POST board consists of four main blocks:

RG - eight-bit parallel register; designed to record and store the next received POST code value;DC1 - register write permission decoder; the signal at the output of the decoder becomes active in the event that the address of the diagnostic register appears on the address bus, and on the control bus - the write signal to the I / O device;DC2 - decoder-converter of the binary code into the code of the seven-segment indicator;HG - two-digit seven-segment indicator; displays the value of the error code as hexadecimal characters - 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, b, C, d, E, F.

Description: The Super POST Code indicator is used to quickly diagnose and troubleshoot PCI bus CHIPSETs and devices working with this bus.

Characteristics: Indicates the state of the bus: Transaction address, Transaction data, Current command on the bus (in the right bit of the command indicator), Bytes participating in the transaction (bite enable) - in the left bit of the command indicator

4.2 PACK test motherboard PC POWER PCI-2.2

The new PC POWER PCI-2.22 is a full-featured software and hardware complex designed for comprehensive testing and repair of motherboards based on Intel processors: 386, 486, Pentium III/IV, etc.; AMD: Athlon, Duron and their counterparts.

The tester is a computer expansion card installed in a 33MHz, 32-bit PCI slot. The complex allows you to perform a number of diagnostic tests launched from the ROM installed on the board, focused on identifying system errors and hardware conflicts, while the composition includes a wide range of tools for hardware diagnostics of the motherboard.

PC POWER PCI-2.22 has a built-in USB interface that allows you to implement a completely remote process of system diagnostics. In the absence of a second computer, the test results can be observed on a digital indicator and LEDs (PASS, FAIL, SKIP). In the new complex, the control of the motherboard supply voltage is carried out by a specialized monitoring chip that controls both the location of the supply voltages within the normal range and the magnitude of the ripple. Visual control of the main system signals of the PCI bus (CLK,RST,#FRAME) is also possible.

The presence of the built-in USB interface is also used to check the USB ports of the tested computer (in this case, the computer port being tested is connected with the supplied cable to the USB port on the tester board).

Interception of control and launch of the control program of the tester, and carrying out a full test of the motherboard is possible in 3 modes:

interception of BIOS code control (forced start mode)at the PCIROM SCAN stage, during POSTby intercepting INT 19h upon completion of POST

This allows you to perform troubleshooting at different stages of system initialization: at the earliest stage of computer boot, during BIOS program initialization (before the appearance of POST codes) and after it, but before loading the operating system by running the built-in code of the control program of the tester "pc =" "power=""pci-2.22="">

The features of the complex include:

Hardware-implemented mode of step-by-step POST diagnostics with real-time decoding of all POST codes. (The retention time for each POST code is user-defined). Within the mode - stop POST diagnostics and switch to step-by-step mode at a specific POST code number, or when a predefined code value appears.The 128 KB RAM located on the board of the tester allows testing in the forced start mode without the computer's RAM. Those. Minimum configuration for full system testing: motherboard, processor, power supply (no BIOS required!).Automonitoring, which allows you to control the supply voltage and ripple in the background within predetermined limits, and issue a signal when they are exceeded or lowered.The ability to visually monitor the status of the PCI bus: address-data (32 bits), to detect a short or open line.A full-featured script mode that allows the user to create and save their own test sequence in the non-volatile memory of the complex based on existing algorithms with individual parameters for each test.PCI bus clock hardware counting mode.The ability to select the bus width of the decoded address for POST codes (8 or 16 bits), which allows you to monitor both port 80h (the standard diagnostic port of most motherboards) and port 1080h (for ATIRS300 / RS350 boards on ASUSTeK Computer, Gigabyte Technology motherboards ) and 2080h (for the same boards from PC Partner, Sapphire, etc.), where this implementation is dictated by the peculiarities of the system logic.Ability to quickly update (about 7 minutes) the internal software of the PC POWER PCI-2.22 board via the USB interface.

4.2.1 Principles of operation

The complex is designed for the fastest possible diagnosis of the state of the motherboard, determining the cause of the malfunction, assessing the rationality of the repair and performing acceptable repair actions.

The full use of the USB interface allows you to make the testing process completely remote and automated, which is convenient in a situation where the video system is damaged or there is no video card or monitor, and in case of BIOS damage when the video system is not initialized. At the same time, the complex is controlled and the results are visualized from a specialized Windows application that contains all the necessary data and tools for a full diagnostics.

The complex contains a wide range of features for diagnosing the motherboard, the state of which does not allow the central processing unit (CPU) to start fetching codes from the ROM and executing them. In this case, the following actions are available, the result of which may indicate the cause of the malfunction:

visual control of the presence of all necessary supply voltages;measurement of values ​​and magnitudes of ripples of all supply voltages;visual monitoring of the state of system signals;monitoring of the states of the address and data lines of the PCI bus;checking the availability and stability of the PCI bus frequency;Possibilities of step-by-step POST diagnostics.

The launch of the internal control program of the complex is carried out from the RAM located on the board, and can be performed depending on the settings in 3 modes. Boost start mode. Useful in case of BIOS code corruption or if diagnostic POST freezes and cannot be completed. In this case, the internal program of the complex, using the RAM located on the board, is initialized and allows you to perform your own testing of all elements and nodes of the motherboard, or use the built-in interactive utilities. In this case, all management and monitoring of results is carried out from a specialized application from the delivery set. If there is no USB connection (in offline mode), the diagnostic process is displayed on the built-in indicators in the format of its own POST codes and their results.Startup mode during PCIROM scan. Useful when the system is unable to complete the execution of initialization sequences due to unresolvable hardware conflicts, obviously incorrect values ​​of system parameters, or a malfunction of any system component. In this case, the internal control program of the complex is launched in accordance with the PCI bus specification at one of the stages of POST diagnostics. Using the motherboard's own video system or USB interface, it allows you to perform a complete system test, individual diagnostics of a separate component, change the values ​​of critical system parameters, use interactive utilities, and obtain additional information about the system. In this mode, all tests are carried out without using BIOS functions, using specialized algorithms, which allows you to test the system for stability and functionality without using BIOS interrupts.Interrupt trigger mode INT 19h. Useful if you need to test the system with a fully completed diagnostic POST sequence, but without booting (or when it is impossible to boot) any OS. Using special software and hardware algorithms, the internal control program redefines the 19h system interrupt, called upon completion of the POST diagnostics, to implement own launch. In this mode, full use of all the diagnostic and information capabilities of the complex is possible, since the BIOS service functions already initialized by this moment are used. In this case, testing is carried out without the participation of specific drivers of any OS.

4.3 Specialized PAC - PAC "RAM Stress Test Professional 2" (RST Pro2).

In practice, it is not uncommon to encounter the task of testing the system as a whole, or its individual components for fault tolerance during its continuous operation under load. Among the most typical examples, one can list "professional" testing of a system to identify defective system components in the production of personal computers and servers, on the one hand, and "amateur" testing of the stability of functioning of serviceable components, but operating in a "freelance", in other words, "overclocked" » mode. One of the most important components, the stability of which largely determines the stability of the system as a whole, are RAM modules. In this regard, testing of this component can be considered one of the most important tasks of testing as such. Currently, there are many software tests of the memory subsystem, designed to work both with "virtual" memory in the Windows OS environment, and with "real" memory in the DOS environment or similar (the division is somewhat arbitrary, because in both cases the physical memory). However, there are also hardware, or, more precisely, “software-hardware” solutions on the market that are designed for the same purpose. Consideration of one of these solutions and its comparison with software solutions is the subject of this article.

4.3.1 Product description

Your proposed feeRAM Stress Test Professional 2(RST Pro2) is a hardware and software solution designed to thoroughly test the computer's RAM. The term "hardware/software" is best suited to describe such devices: this decision, on the one hand, hardware, since it is implemented as a separate physical device connected to the PCI slot of the computer, but, on the other hand, software - due to the fact that testing is carried out not by the device itself, but by some kind of program “firmware” into it, which executed by the CPU.

Memory testing with RST Pro2 eliminates the influence of the operating system, drivers, and user programs as the device loads its own software at system startup. The latter is compatible with various processors such as Intel Pentium 4, Intel Xeon, AMD Operton, AMD Athlon 64/FX, AMD Athlon XP/MP and the like. To check and validate memory modules, the device implements over 30 different algorithms that support SIMM, DIMM (SDRAM, DDR, DDR2), RIMM (RDRAM / RAMBus) memory types, including both parity and error correction (ECC) ), and without them; it is also possible to test the processor cache memory (SRAM). Testing is carried out in protected mode with extended physical addressing (PAE), which allows you to operate with memory sizes up to 64 GB.

The RST Pro2 board also has additional features for temperature monitoring (using two plug-in external sensors not included in the delivery), power supply status monitoring (by monitoring fluctuations in the +5V supply voltage), as well as remote display of test results using HyperTerminal software or similar to it, thanks to the built-in serial port on the board.

4.3.2 Functionality

On this, perhaps, it is worth finishing with the enumeration of the capabilities of the device described in its documentation, and move on to our own consideration of it. So, starting the system - the device intercepts the INT 19h interrupt and transfers control to the built-in firmware (for brevity, we will simply call it the "program" below), after which the main menu is displayed on the screen.

The main menu of the program includes the following functions:

Memory card (Mem Map)SPD Chip Information (SPD)BenchmarksEditing PCI device configuration registers (PCI)Memory Tests (RAM Test)Memory tests in "run" mode (Burn-In)Help information about the program (Help)

The memory map provided by the program looks quite standard: it shows the areas of "basic" (base, conventional) and "extended" (extended) memory, as well as areas of memory reserved for the system BIOS, PCI devices and ACPI information.

The decoding of information from the SPD chip of the selected module (the program supports up to 8 memory modules) impresses with its detail. Impressive is the very possibility of reading this information via the SMBus controller located in the south bridge of the chipset, which should definitely be considered an advantage of the considered hardware and software system. On the other hand, we note that purely software solutions can also provide such information, in particular, our universal test package RightMark Memory Analyzer . In addition, due to the specific implementation of the SMBus controller in a particular chipset, the RST Pro2 software has the same limitations that are encountered in other programs that provide information about the system - the set of supported chipsets is limited. In particular, on a system with a SiS 648 chipset, we were unable to read the SPD information from the memory modules installed in it.

The performance measurement menu provides the ability to measure the performance of three system components - the processor cache, RAM, and the CPU itself.

The measurement of cache performance in the program means the measurement of the throughput of the memory subsystem in the region of small block sizes (1 KB - 4 MB). Measurements are carried out using 32-, 64- and 128-bit registers in read, write and modification modes (obviously, this means reading followed by writing to the same address). The curves look similar to those obtained in the Memory Bandwidth test of the RMMA test package, with the exception of a number of minor differences. Among the shortcomings of the implemented measurement technique, one should note the mediocre optimization of algorithms, which is especially noticeable in the area of ​​minimum block sizes smaller than or equal to the size of the L1 cache of the processor - the smooth growth of the curves in the region of 1-16 KB indicates a significant influence on the measurement results of the processor branch prediction logic due to a small degree of "unrolling" of read-write cycles. Since this feature was taken into account when developing the RMMA test package, the L1 cache throughput curves displayed by it do not have such a drawback.

To measure the performance of RAM, the program uses blocks essentially bigger size- from 1 to 512 MB (total amount of memory installed in the system). As expected, all the "curves" of this test look "straight", except for the initial region, where there is a sharp decline. No wonder, because on the Intel Pentium 4 (Prescott) processor installed in the test bench, the 1 MB block size area falls on the L2 cache of the processor. A more logical decision on the part of the program developers would be to use a minimum block size of about 4 MB (chosen as the upper limit of the previous test).

The purpose of the "processor performance" test is not clear, because it is morally obsolete - both in terms of the Dhrystones and Whetstones used, and in the choice of reference values ​​for comparison.

The built-in PCI device configuration register editor allows you to display and modify the contents of all 256 8-bit registers (represented for convenience as 128 16-bit values) of any PCI device specified by the bus number (0-255), device (0- 31) and functions (0-7). The functionality of this editor is identical to that of utilities like WPCREDIT , as well as the timings auxiliary utility, which is part of the RMMA test package.

The memory test menu (which is what this software and hardware solution is intended for) allows you to select the memory area to be tested. Possible options- test all memory (All Memory), extended memory (Extended Memory, area from 1 MB and above), base memory (Base Memory, area 0-640 KB), processor cache memory (Cache Memory, area 0-1 MB, which is essentially the same as testing the underlying memory in cached mode). Among additional options provided, but is not currently available for video memory testing (Video Memory). Finally, the last in the list of options in this menu is the memory refresh cycle test (Refresh) - it is similar to testing the entire memory, but by default only one type of test with the same name as the name of this menu item is selected.

The settings for the memory test itself include the range of memory addresses to be tested, selection of the memory access mode called "bus width" (8, 16, 32, 64 or 128 bits), data caching mode (full caching, partial caching, no caching), refresh period memory (seemingly without any real effect) and the number of test cycles. Despite the implementation of more than 30 memory testing algorithms declared in the device documentation, on the right side of the settings you can select only up to 25 algorithms used in the test, and one of them (PCI Gen) requires an auxiliary card (PCI Pattern Generator).

The memory test menu in the "run" (Burn-In) mode allows you to create (Create), clear (Clear) and run (Run) a previously created set of tests designed for continuous automated testing of the memory subsystem. The choice of tests, as well as their settings, look exactly the same as those discussed above. The difference between this mode and regular testing lies, first of all, in the ability to automatically run the test at system startup.

The last menu provides background information about the program (control buttons), the manufacturer of the product (Ultra-X) and the products it produces.

4.4 HSS for checking individual elements of the system - HSS for repairing HDD ATA, SATA PC-3000 for Windows (UDMA)

HDD diagnostics is carried out in the following modes:

normal (custom) modein a special technological (factory) mode.

To do this, the PC-3000 for Windows (UDMA) complex includes a set of technological adapters and adapters that are used for HDD repair and data recovery.

For the initial HDD diagnostics, the PC-3000 universal utility is launched, which diagnoses the HDD and indicates all its malfunctions.

Specialized utilities allow you to perform the following actions: test the HDD in the production mode;

test and restore HDD service information;read and write the contents of Flash ROM HDD;download the program for accessing service information;view tables of hidden defects P-list, G-list, T-list;hide the found defects on the surfaces of magnetic disks;change configuration parameters.

The PC-3000 UDMA complex is designed for diagnostics and repair (recovery) of HDDs with SATA (Serial ATA) and PATA (IDE) interfaces, with a capacity of 500 MB to 6 TB, manufactured by: Seagate, Western Digital, Fujitsu, Samsung, Maxtor, Quantum, IBM (HGST), HITACHI, TOSHIBA with form factor 3.5" - desktop PCs; 2.5" and 1.8" - drives for laptops; 1.0" - drives for portable equipment, with Compact Flash interface.

4.4.1 PC-3000 UDMA hardware

The new PC-3000 UDMA controller is a 3-port test board that is installed in the PCI-Express expansion slot of the host computer. Three diagnostic ports of the controller are distributed as follows: 2 SATA ports with a maximum data transfer rate of 133 Mb/s and 1 PATA port with a speed of 100 Mb/s. One SATA port (SATA0) is primary, the other SATA port (SATA1) is switchable with PATA port. Thus, two drives can be connected to the PC-3000 UDMA card at the same time, one of which is SATA, the other depending on the selected SATA or PATA configuration. When developing the PC-3000 UDMA controller on the PCI-Express bus, the experience of operating the previous generation PC-3000 UDMA controller on the PCI bus, which has proven itself well in data recovery centers as an inexpensive, reliable controller with optimal performance, was used.

Supported modes:

SATA x2 - UDMA133, UDMA100, UDMA66, UDMA33, PIO4, PIO3, PIO2, PIO1, PIO0PATA x1 - UDMA100, UDMA66, UDMA33, PIO4, PIO3, PIO2, PIO1, PIO0

The ports are separate, but when two ports are loaded at the same time, they are dependent. There is a slight decrease in performance (no more than 20%) on one of the channels, when the second UDMA channel is fully loaded. This feature of the PC-3000 UDMA controller is due to the use of a single-channel PCI-Express bus, which is the bottleneck in data transfer. On the other hand, such a technical solution can reduce the overall cost of the board and make it more attractive for small service centers.

As you can see from the reading graph, even with simultaneous loading of two ports, the read speed on both channels significantly exceeds the maximum values ​​for the previous generation board - PC-3000 UDMA on the PCI bus.

4.4.2 Power adapter

The tested drives are powered by a 2-channel power management adapter located on the main controller board. It provides protection of diagnosed drives from overvoltage and overcurrent. In case of emergencies, the power from the HDD will be removed automatically. Additionally, for each channel, feedback is organized with the control program of the complex

4.4.3 PC-3000 UDMA Board Resource Management

A fundamentally new feature of the PC-3000 UDMA complex is the ability to run PC-3000 utilities and Data Extractor Tasks as separate operating system processes. For the convenience of work, the complex includes the PC-3000 UDMA Board Resource Manager program, which allows you to: distribute board ports between processes, monitor their status and, if necessary, remove a frozen process. Moreover, when the process starts, any available number of ports of the PC-3000 UDMA board can be allocated to it. For example, you can run two processes per port, or one process with two available ports.

CONCLUSION

In the course of the work, service equipment was considered.

At present, it is difficult to do without equipment, because. PCs crash frequently. Timely diagnosis of such equipment will help save your computer from serious damage. In the process of technical operation, service equipment helps to choose the right consumables and operating materials, and also ensures the timely replacement of small parts.

With LIST OF LITERATURE

1. Romanov V.P. Maintenance of computer equipment, 2008

2. Garyaev P.V. Maintenance of computer equipment, 2012

3. Muller S. PC Upgrade and Repair, 14th edition. Per. English - K .: Dialectics, 2007.

4. Platonov Yu.M., Utkin Yu. G. Diagnostics, repair and prevention of personal computers. - Hotline - Telecom, 2003


As you know, a modern PC is not just a complex device with electronic and electronic-mechanical components, but also a device filled with complex operating systems, software packages, "embedded" programs for testing and self-testing controllers, adapters - all PC components and blocks involved in machine operation.

Firstly, in the past, a typical PC configuration included, in addition to the system unit and keyboard, only a display and a printer. Now it also includes a mouse, modem, sound card, optical disc reader. Secondly, along with the growth of the minimum PC configuration, both the amount of software and its complexity have increased.

This means that behind a large number of names: drivers, utilities, shells and other “bells and whistles”, the so-called synchronous entity has not become visible. Moreover, the multitasking mode allows you to mask these very entities well - the printer prints a document, the user is doing his work at that time, and if a crash or freeze occurs, it is difficult to immediately say what caused these problems. Thirdly, proprietary manuals for a wide range of specialists are not available and often do not take into account a specific PC configuration and a specific software configuration. Although, of course, at the initial stage of diagnosis, such guides can be useful. And finally, in the fourth, the maintenance system created and successfully operating in the Soviet Union was broken in the 90s and is currently in its infancy. It is precisely because of the above reasons that many specialists operating SVT, firstly, cannot “radically” solve their problems and, secondly, there may not be good service centers “at hand” at the right time.

Stages, types, control and maintenance of SVT

Maintenance (TO) is a set of measures aimed at maintaining the equipment in good condition, monitoring its parameters and ensuring preventive maintenance.

The organization of maintenance of computer equipment (SVT) includes not only typical systems of technical and preventive maintenance, frequency and organization of work and logistics, but also automated control and diagnostic systems, automatic recovery systems, as well as various types of software, hardware and combined control, microdiagnostics and diagnostic programs for general and special purposes.

TO SVT includes the following steps

· Service hardware (ApOb) SVT and networks:

v ApOb prevention,

v ApOb Diagnostics,

v ApOb repair;

Maintenance of software (software) of VT facilities and networks:

v Installing the software

v Software maintenance,

v Antivirus prophylaxis.

All types of work related to prevention can usually be carried out by the user of the SVT himself. In addition, enterprises have specialists or even entire information departments that serve the entire range of available CVT. They also perform diagnostic and repair work on hardware in case of failure.

Types of technical maintenance of SVT

The type of maintenance is determined by the frequency and a set of technological operations to maintain the operational properties of the SVT

TO SVT, in accordance with GOST 28470-90, can also be divided into the following types:

regulated;

Periodic

With periodic control;

with continuous monitoring.

Scheduled maintenance should be carried out to the extent and taking into account the operating time provided for in the operational documentation for the SVT, regardless of the technical condition.

Periodic maintenance should be carried out at intervals and to the extent specified in the operational documentation for the SVT.

Maintenance with periodic monitoring should be carried out with the frequency of monitoring the technical condition of the computer and the necessary set of technological operations, depending on the technical condition of the computer, established in the technological documentation.

Maintenance with continuous monitoring should be carried out in accordance with the operational documentation for the SVT or technological documentation based on the results of constant monitoring of the technical condition of the SVT.

Control of the technical condition of the SVT can be performed in static or dynamic modes.

In the static mode, the control values ​​of the voltage and frequency of the sync pulses remain constant throughout the entire cycle of preventive control, and in the dynamic mode, their periodic change is provided. Thus, due to the creation of heavy operating modes of the SVT, it is possible to identify elements that are critical in terms of reliability.

Preventive control is carried out by hardware software. Hardware control is carried out with the help of special equipment, instrumentation and stands, and software and hardware systems.

Troubleshooting activities during preventive control can be divided into the following stages:

analysis of the nature of faults according to the current state of the computer;

control of environmental parameters and measures to eliminate their deviations;

· Localization of the error and determination of the location of the fault with the help of hardware and software of the SVT and with the help of additional equipment;

· trouble-shooting;

Resuming problem solutions.

To implement maintenance, a maintenance system (SRT) is created

Currently, the following types of service stations are most widely used:

scheduled preventive maintenance;

maintenance according to technical condition;

combined service.

Planned preventive maintenance is based on the calendar principle and implements scheduled and periodic maintenance. These works are carried out in order to maintain the CVT devices in good condition, identify equipment failures, prevent failures and failures in the operation of the CVT. The frequency of scheduled preventive maintenance depends on the type of SVT and operating conditions (number of shifts and load).

The advantage of the system is to ensure the highest readiness of the SVT. And the disadvantage is that it requires large material and technical costs.

In general, the system includes the following types of maintenance (preventive maintenance):

1. control examinations (KO);

2. daily maintenance (ETO);

3. weekly maintenance;

4. two-week MOT;

6. monthly maintenance (TO1);

7. two-month MOT;

8. semi-annual or seasonal (STO);

9. annual maintenance;

KO, ETO SVT includes inspection of devices, running a quick test of readiness (operability of devices), as well as work provided for by daily preventive maintenance (in accordance with the operating instructions) of all external devices (cleaning, lubrication, adjustment, etc.).

During the two-week maintenance, diagnostic tests are run, as well as all types of two-week preventive maintenance provided for external devices.

With monthly maintenance, a more complete check of the functioning of the CVT is provided with the help of the entire system of tests that are part of its software. The check is carried out at the nominal values ​​of the power sources by a preventive change in voltage by plus, minus 5%. Preventive voltage change allows you to identify the weakest circuits in the system. Typically, circuits must maintain their performance when the voltage changes within the specified limits. However, aging and other factors cause a gradual change in the performance of the circuits, which can be detected on prophylactic regimens.

CVT checks with preventive voltage changes detect predictive faults, thereby reducing the number of hard-to-locate faults that lead to failures.

During the monthly prophylaxis, all necessary work provided in the operating instructions for external devices.

With a semi-annual (annual) maintenance (SRT), the same work is carried out as with a monthly maintenance. As well as all types of semi-annual (annual) maintenance work: disassembly, cleaning and lubrication of all mechanical components of external devices with their simultaneous adjustment or replacement of parts. In addition, the cables and power busbars are inspected.

A detailed description of preventive maintenance is given in the operating instructions for individual devices attached to the SVT by the manufacturer.

When servicing according to technical condition, maintenance work is unscheduled and is performed as necessary based on the state of the object (test result), which corresponds to maintenance with continuous monitoring or maintenance with periodic monitoring.

With a combined maintenance system, “junior types of maintenance” are carried out as necessary, as with maintenance on condition, based on the operating time and operating conditions of a particular type of computer equipment or the results of its testing. The implementation of "senior types of maintenance" and repairs is planned.

The control of the technical condition of the SVT is used to control the operation of the SVT, to localize fault points, and to exclude the influence of random failures on the results of calculations. In modern SVT, such control is carried out mainly with the help of the SVT itself. Preventive maintenance is a series of activities aimed at maintaining a given technical condition of the SVT for a certain period of time and extending its technical life. Preventive measures taken at SVT can be divided into two groups.

There are two types of preventive measures:

* active

* passive.

Active preventive maintenance performs operations whose primary purpose is to increase the uptime of your computer. They come down mainly to periodic cleaning of both the entire system and its individual components.

Passive prevention usually refers to measures aimed at protecting the computer from external adverse effects. We are talking about installing protective devices in the power supply network, maintaining cleanliness and an acceptable temperature in the room where the computer is installed, reducing the level of vibration, etc.

Active preventive maintenance methods. System backup.

One of the main steps in preventive maintenance is system backup. This operation allows you to restore system performance in the event of a fatal hardware failure. For backup, you need to purchase a high-capacity storage device.

Cleaning One of the most important elements of preventive maintenance is regular and thorough cleaning. Dust that settles inside a computer can cause many troubles.

Firstly, it is a heat insulator, which impairs the cooling of the system. Secondly, dust necessarily contains conductive particles, which can lead to leakage and even short circuits between electrical circuits. Finally, certain substances contained in the dust can accelerate the oxidation process of contacts, which will eventually lead to electrical connection failures.

Putting the Chips in Place In preventive maintenance, it is very important to eliminate the effects of thermal shifts in the chips. Since the computer heats up and cools down when you turn it on and off (hence, its components expand and contract), the chips installed in the sockets gradually "creep out" of them. Therefore, you will have to find all the components installed in the sockets and put them in place.

Cleaning connector contacts Wipe the connector contacts to ensure that the connections between the nodes and components of the system are reliable. You should pay attention to the expansion connectors, power supply, keyboard and speaker connections located on the system board. As for the adapter boards, they need to wipe the printed connectors inserted into the slots on the system board, and all other connectors (for example, installed on the outer panel of the adapter).

Preventive Maintenance of Hard Drives To ensure the safety of data and improve the performance of the hard drive, it is necessary to perform some maintenance procedures from time to time. There are also several simple programs with which you can to some extent insure yourself against data loss. These programs create backups(and, if necessary, restore them) those critical areas of the hard disk, if damaged, access to files becomes impossible.

Defragmenting Files As you write files to HDD and delete them, many of them get fragmented, i.e. are broken up into many pieces scattered all over the disk. By periodically performing file defragmentation, you solve two problems at once. First, if files occupy contiguous areas on the disk, then the movement of the heads during their reading and writing becomes minimal, which reduces wear on the drive and the disk itself. In addition, the speed of reading files from disk is significantly increased.

Secondly, if the File Allocation Table (FAT) and the root directory are seriously damaged, the data on the disk is easier to recover if the files are written as a single unit.

preventive maintenance computer

Automated control systems

Control is a check of the correct operation of the object. The diagnosis process can be divided into separate parts called elementary checks.

An elementary check consists in applying a test action to the object and measuring the object's response to this action. The diagnostic algorithm is defined as a set and sequence of elementary checks together with certain rules for analyzing the results of the latter in order to find a place in an object whose parameters do not meet the specified values.

The occurrence of an error in any CVT device causes an error signal, according to which the execution of the program is suspended.

Upon an error signal, the diagnostic system immediately starts working, which, in cooperation with the control system of the SVT, performs the following functions: 1) recognition (diagnosis) of the nature of the error (failure, failure); 2) restarting the program (part of the program, operation) if the error is caused by a failure;

3) localization of the fault location, if the error is caused by a failure, with its subsequent elimination by automatic replacement (or shutdown) of the failed element or replacement with the help of an operator;

4) recording in the memory of the CVT information about all failures and failures that have occurred for further analysis. For PC, there are several types of diagnostic programs that allow the user to identify the causes of problems that occur in the computer. Diagnostic programs used in PCs can be divided into three levels:

* BIOS diagnostic programs - POST (Power-On Self Test - self-test procedure at power on). Runs every time the computer is turned on.

* Diagnostic programs for operating systems. Windows 9x and Windows XP/2000 come with several diagnostic programs to test various computer components.

* Diagnostic programs of firms - equipment manufacturers.

* Diagnostic programs for general purposes. Such programs, which provide thorough testing of any PC-compatible computers, are produced by many companies.

Power-on Self Test (POST) POST is a series of short routines stored in the ROM BIOS on the motherboard. They are designed to check the main components of the system immediately after it is turned on, which, in fact, is the reason for the delay before loading the operating system. Each time you turn on your computer, it automatically checks its main components:

* processor,

* ROM chips,

* auxiliary elements of the system board,

* RAM and basic peripherals.

These tests are fast and not very thorough when a faulty component is found, a warning or error message (failure) is issued. Such faults are sometimes referred to as fatal errors. The POST procedure usually provides three ways to indicate a malfunction:

* sound signals,

* messages displayed on the monitor screen,

* hexadecimal error codes issued to the I / O port.

Operating system diagnostic programs

DOS and Windows include several diagnostic programs. which ensure the testing of the components of the CVT. Modern diagnostic programs have graphical shells and are part of the operating system. Such programs are, for example: a disk cleaning utility from unnecessary files; utility to check the disk for errors; utility for defragmenting files and free space; data archiving utility; file system conversion utility.

All of these programs are also available in Windows.

General purpose diagnostic programs Most test programs can be run in batch mode, allowing you to run a series of tests without operator intervention. You can create an automated diagnostic program that is most effective if you need to identify possible defects or run the same sequence of tests on multiple computers. These programs check all types of system memory: basic (base), extended (expanded) and additional (extended). The location of a fault can often be pinpointed down to a single chip or module (SIMM or DIMM).

The relationship of automated control systems The PC automated control system is strictly hierarchical.

The first, lowest, level is represented by a variety of PC hardware testing programs. The testing programs are located in the BIOS. The main task of testing programs is to prevent the operation of a PC with faulty hardware in order to prevent damage or loss of information stored in the PC. The programs are executed every time the PC is turned on, the user cannot interfere with the testing process.

The operation of the automated control system starts from the moment the PC is turned on. This sequence of operations is organized into a special process called "loading". First stage booting is performed on all computers in the same way and does not depend on the operating system installed on this computer.

Sometimes when the system boots, a program error message appears. By combining the information obtained with knowledge of the boot process, it is possible to determine where the failure occurred.

The second level is represented by test programs of the operating system. Programs are launched by the user when it is necessary to check the operation of a specific element (for example, a system speaker) or a PC system (for example, an I / O system).

The third level includes test programs of equipment manufacturers and general-purpose programs that allow you to test a PC as a whole or a separate sufficiently large system. The test is thorough, time-consuming, and allows you to localize even individual equipment failures and floating faults.

Top level programs can only be used if the first level tests are successfully passed.

Conclusion

The rational organization of the service station should provide for the accumulation of statistical material based on the results of the operation of the SVT in order to summarize, analyze and develop recommendations for improving the service structure, increasing the efficiency of using the SVT, and reducing operating costs.

Careful implementation of planned preventive maintenance significantly reduces the risk of malfunctions. However, the efficiency of finding and eliminating faults largely depends on the qualifications and experience of the maintenance personnel.

Bibliography

1. Educational and methodological manual "Maintenance of computer equipment" State budgetary educational institution secondary vocational education Perm Polytechnic College named after N.G. Slavyanov

2. Stepanenko O.S. Maintenance and repair of IBM PC. - K: Dialectics, 1994. - 192s.

3. Loginov M.D. Maintenance of computer facilities: textbook -M.: Binom. Knowledge Laboratory, 2013.-319s

Similar Documents

    Information base for maintenance of computer equipment (SVT) at the workplace. Operational characteristics of serviced SVT. Development of operational documentation. Organization of preventive maintenance.

    term paper, added 07/13/2011

    Computer hardware. CPU. Memory as a component of a computer, its typical hierarchical structure. I/O devices, buses. The history of the development of computer technology. Characteristics of systems based on P6.

    abstract, added 02/08/2014

    The device and principle of operation of a personal computer (PC). PC health diagnostics and troubleshooting. Tasks of maintenance of computer facilities. Development of methods for maintaining equipment in working condition.

    term paper, added 07/13/2011

    Problems of ensuring the integrity, safety and performance of computer technology and information arrays. Diagnostics and microdiagnostics of a personal computer. Technological map of semi-annual maintenance laser printer and MFP.

    term paper, added 01/20/2016

    Development of an information-analytical system for analyzing and optimizing the configuration of computer technology. The structure of automated control of computer technology. Software, substantiation of the economic efficiency of the project.

    thesis, added 05/20/2013

    Classification of design procedures. History of the synthesis of computer technology and engineering design. Functions of computer-aided design systems, their software. Features of the use of three-dimensional scanners, manipulators and printers.

    abstract, added 12/25/2012

    Characteristics of the enterprise for the maintenance of computer equipment and computer networks. Consideration of the structure, goals and objectives of the service department, organization of the workplace, forms of remuneration. Learning the rules of working with e-mail.

    practice report, added 06/05/2014

    Basic information about printers. The design of the laboratory stand. Software installation. Performance analysis. Goals and functions of the management of CJSC "Tirotex". Security measures in the maintenance of computer equipment.

    thesis, added 12/29/2014

    Diagnostic analysis of the enterprise management system, its organizational and functional structure. Development of a project for a subsystem for accounting for computer equipment, a description of the technical support of the database. Characteristics of the software product.

    thesis, added 06/28/2011

    General information about the organization and its information system. The main and peripheral equipment of employees of the enterprise. Diagnostics and maintenance of computer equipment, its software. Service complex PC-tester.