Maintenance of computer facilities: Educational and methodical manual. Maintenance of computer equipment and computer networks What types of work relate to the repair of

Basic concepts of TO SVT

Technical
maintenance (TO) (according to GOST
18322-78) - a complex of operations or an operation to
maintenance or serviceability
products when used for their intended purpose,
waiting, storage and transportation.
The task of maintenance of computer equipment
(SVT) is: “Ensuring reliable
(correct and uninterrupted) operation of the SVT,
allowing users to take full advantage of
the volume of information arrays of the organization and
other third party sources of information.

Basic concepts of TO SVT

That is, the concept of TO SVT is inextricably linked with its
reliability (GOST 27.002-89) - property of the object
keep in time within the established limits
values ​​of all parameters characterizing
ability to perform the required functions in
given modes and conditions of use,
maintenance, repair, storage and
transportation.
Reliability may refer to:
reliability,
durability,
maintainability
persistence.

Types of technical condition of the object (according to GOST 27.002-89)

Working condition. The state of an object in which it matches all
requirements of normative-technical and/or design (design)
documentation.
Faulty state. The state of an object in which it does not conform
at least one of the requirements of the regulatory and technical and (or) design
(project) documentation.
Working condition. The state of an object in which the values ​​of all
parameters characterizing the ability to perform specified functions,
comply with the requirements of the normative and technical and (or) design
(project) documentation.
Inoperable state. The state of an object in which the values, although
there would be one parameter characterizing the ability to fulfill the specified
function, does not meet the requirements of regulatory and technical and (or)
design (project) documentation.
Limit state. The state of the object in which its further
operation is unacceptable or impractical, or its restoration
working condition is impossible or impractical.
The transition of an object (product) from one state to another occurs due to:
failure is an event consisting in the violation of a healthy state
object.
damage - an event consisting in the violation of a healthy state
object while maintaining a healthy state.
Defect (according to GOST 15467-79) - each individual non-compliance of the object
established standards or requirements. A defect is a state other than a failure.

Reliability indicators

To quantify reliability, indicators are used - characterizing
readiness and efficiency of use of technical facilities:
The probability of failure-free operation is the probability that within the limits of tasks
operating time failure of the object does not occur.
Mean time to failure - the expectation of an object running to the first failure.
Mean recovery time - recovery time to a healthy state
object after failure.
Comprehensive Reliability Indicators
Availability is the probability that an object will be in
operational state at an arbitrary point in time, except for the planned
periods during which the use of the object for its intended purpose is not
provided. This indicator simultaneously evaluates the properties
operability and maintainability of the object.
The COG operational readiness factor is defined as the probability that
the object will be in a healthy state at an arbitrary point in time (except
planned periods during which the use of the object for its intended purpose is not
provided) and, from that moment on, will work flawlessly for
specified time interval.
Types of dependence of the failure rate on time:
Running-in - the interval is characterized by an increased level of failures, intensity
bounce rate is large, but decreases over time;
Normal operation - failure rate is not significant, failure rate
large almost constant;
Wear - failure rate increases, failure rate increases over time.

Organization of maintenance of SVT

Maintenance and repair system for equipment
(STOiR) - set
related tools, documentation
MRO and performers necessary for
maintaining and restoring quality
products included in this system.

Maintenance tasks

1. Ensuring the operability of the SVT. The control
health and predicting upgrade needs
SVT park. When solving this problem, it is necessary to use
analysis and forecasting of the state of computer hardware, software and existing
tasks, which will allow to solve existing problems in a planned manner;
2. Ensuring the operability of the OS and application software.
Consists of:
correct selection of drivers, solving their problems
interaction with each other and other hardware and software
security,
the need to monitor the performance of the installed
software and predict the needs for its
update;
3. Ensuring the integrity, safety and
performance of information arrays. This
the task is reduced to backup archiving of data,
ensuring their protection against viruses and other distorting
actions;
4. Ensuring the operability of peripheral, network and
communication equipment

Requirements for STOiR

ensuring the specified levels of operational
reliability of the CVT fleet with rational
material and labor costs;
planned and normative nature, allowing
plan and organize maintenance and repair at all
levels;
mandatory for all organizations and enterprises,
owning SVT, regardless of their departmental
subordination;
specificity, accessibility and suitability for
leadership and decision-making at all levels
engineering and technical (service) service;
core principles stability and flexibility
specific standards, taking into account changes
operating conditions, design, quality and
reliability of SVT;
taking into account the variety of operating conditions of SVT.

Methods for the formation of STOiR

The fundamental basis for building STOiR are:
1. the goal that is set for the SVT;
2. level of reliability and quality of SVT;
3. organizational and technical limitations.
techno-economic method (determine such
group periodicity, which corresponds to the minimum
costs for maintenance and repair of computer equipment);
grouping by core maintenance operations (performing
group of maintenance operations is timed to the optimal
periodicity, the so-called. core operations with
the following signs:
1. affect the performance of the SVT;
2. non-fulfillment of them reduces the reliability, efficiency
work of SVT;
3. are characterized by high labor intensity, require
special equipment and tools;
4. are regularly repeated.

maintenance activities

The control
technical condition
SVT
current maintenance
Preventive maintenance.
◦ 1. active (measures aimed at
extended uptime)
◦ 2. passive (measures aimed at
protecting your computer from external
adverse effects)

Active preventive maintenance methods

Reserve
system copy
Cleaning
Installation
chips in place
Cleaning connector pins
Keyboard and mouse cleaning
Preventive maintenance of hard
disks
File defragmentation
Antivirus programs

Passive Preventive Maintenance Techniques

Ergonomics
workplace
Operation under permissible
temperature and humidity range
Optimization of the number of cycles
on and off
Elimination of electrostatic charges
Elimination of interference in the power supply

Types of maintenance

determined by the frequency and
complex of technological operations
to maintain operational
properties of SVT.
Distinguish:
regulated;
periodic;
with periodic control;
with continuous monitoring.

Troubleshooting steps

1.
analysis of the nature of faults according to
the current state of the SVT;
2. control of environmental parameters
and measures to eliminate their deviations;
3. error localization and definition
trouble spots with
hardware and software of SVT and
with the help of additional equipment;
4. Troubleshooting;
5. resuming the solution of the problem.

types of service stations

Planned preventive
service
Advantages
– ensures the highest availability
SVT.
Disadvantages - requires large material and
physical costs.
May include:









control examinations (KO)
daily maintenance (ETO)
weekly maintenance
two-week maintenance
ten-day maintenance
monthly maintenance
two-month maintenance
semi-annual or seasonal
annual maintenance

types of service stations

Service by
Wears an unscheduled
technical condition
character and performed by
as needed
The scope of work is determined by the nature of the
failure and its possible consequences.
The conclusion of SVT for unscheduled prevention can be
also produce when the number of failures,
arising for a certain established
period of time exceeds the allowable values.
Requires presence and proper application
various testing tools (software).
Allows you to minimize the cost of
operation of the SVT, but the readiness of the SVT for
use is lower than when using
preventive maintenance station.

types of service stations

Combined
service.
"Junior types of maintenance" are carried out as
need.
Performing "senior types of maintenance" and
repairs are planned.

Maintenance methods based on organization

Branded
method (manufacturer)
Standalone method (user
on their own)
Specialized method
(service company)
Combined method
(distribution of work between
user and
service/manufacturer)

Maintenance methods by nature of execution

Individual
- maintenance of one SVT
by the forces and means of the personnel of this SVT.
Group - serves for service
several SVT, concentrated in one
place, means and forces of special
personnel.
Centralized technical
service is more progressive
form of service SVT.
◦ reduced maintenance costs for technical
personnel, service equipment and spare parts.
◦ statistics of failures of elements, nodes,
blocks and devices of SVT, which allows predicting
necessary spare parts and provide recommendations on
operation of SVT.

Ongoing maintenance

Service equipment

For troubleshooting and repairing a PC, you need
have special tools that
allow you to identify problems and fix them easily and
fast.
These include:
a set of tools for disassembly and assembly;
chemicals (solution for wiping
contacts),
coolant sprayer and canister
with compressed gas (air) for cleaning parts
computer;
a set of swabs for wiping contacts;
specialized hand tools
(e.g. tools needed to replace
microcircuits (chips));
service equipment.

Service equipment

Service
hardware - a set of devices
specially designed for
diagnostics, testing and repair
SVT. Includes the following items:
Measuring instruments
test connectors for checking
serial and parallel ports;
memory testing devices
evaluate the performance of memory modules,
DIP chips and other memory modules;
PSU testing equipment;
diagnostic devices and programs for
testing computer components
(software - hardware complexes, PAK).

Measuring instruments and test sockets for testing PC ports

For
PC inspection and repair
apply:
digital multimeter;
logic probes;
single generators
pulses to check
digital circuits

Test
connectors provide
testing on software and hardware
PC I/O level
(parallel and serial).

Hardware-software complexes (PAK)

PACK
can be subdivided into:
System Monitoring Boards
Motherboard test PAK
Specialized PAK
PAK checking individual items
systems
HDD check PAK

System monitoring boards (POST boards).

The PC-POST tester board is designed to monitor POST codes (POST - Power On Self Test / self-test by
power on) sent to I/O port 80h
BIOS program during self-test.
The POST board consists of four main blocks:
RG - eight-bit parallel register; intended
for recording and storing the next incoming value
POST code;
DC1 - register write permission decoder; signal to
the output of the decoder becomes active in case of occurrence
on the address bus address of the diagnostic register, and on
control bus - write signal to input-output devices;
DC2 - decoder-converter of binary code to code
seven-segment indicator;
HG - two-digit seven-segment indicator; displays
error code value as hexadecimal characters 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, b, C, d, E, F.

POST boards

The Super POST Code indicator serves
for quick diagnosis and
troubleshooting
PCI bus CHIPSETS and devices
working with this tire

PC POWER PCI-2.2 Motherboard Test PACK

Tester
is an expansion board
computer installed in 33 MHz, 32
bit PCI slot.
The complex allows you to perform a number of
diagnostic tests run from
installed on the board ROM, focused on
detection of system errors and conflicts
equipment, while it includes a wide range of
hardware diagnostic tool kit
motherboard.
Hardware-implemented step-by-step POST mode
diagnostics with real-time decoding
all POST codes. (Hold time of each POST
user-specified code).

Specialized PAK - PAK "RAM Stress Test Professional 2" (RST Pro2).

RAM Stress Test Professional 2, designed for
thorough testing of RAM
computer.
Memory testing with RST Pro2 eliminates
the influence of the operating system, drivers and user
programs, since the device loads its own software when
system startup.
To check the memory modules in the device, more than
30 different algorithms supporting SIMM type memory,
DIMM (SDRAM, DDR, DDR2), RIMM (RDRAM/RAMBus); available
also the ability to test the processor cache
(SRAM). Testing is carried out in a secure mode with
Advanced Physical Addressing (PAE), which allows
operate with memory capacities up to 64 GB.

PAK checks of individual elements of the system

Repair PACK HDD ATA, SATA PC-3000 for Windows (UDMA)
designed for diagnostics and repair of HDD (recovery
operability) with ATA (IDE) and SATA (Serial ATA 1.0, 2.0) interfaces,
capacity from 1 GB to 750 GB.
HDD diagnostics is carried out in the following modes:
normal (custom) mode
in a special technological (factory) mode.
The PACK PC-3000 for Windows (UDMA) includes a set of technological
adapters and adapters that are used to repair HDD and
data recovery.
For the initial diagnosis of the HDD, a universal utility is launched,
which diagnoses the HDD and indicates all its malfunctions.
Next, a specialized utility is launched, which performs
HDD repair.
Specialized utilities allow you to perform the following actions:
test the HDD in the technological mode;
test and restore HDD service information;
read and write the contents of Flash ROM HDD;
download the program for accessing service information;
view tables of hidden defects P-list, G-list, T-list;
hide the found defects on the surfaces of magnetic

Types of conflicts when installing equipment, ways to resolve them

System resources are communication channels, addresses, and
signals used by computer nodes to exchange data using
tires. Typically, system resources mean:
memory addresses;
interrupt request channels (IRQ);
direct memory access (DMA) channels;
I/O port addresses.
All of these resources are required for the various components of the computer. By
as additional boards are installed in the computer, significantly
increases the likelihood of conflicts
use of resources.
A conflict occurs when two or more boards are installed, each of which
an IRQ line or I/O port address is required. To prevent
conflicts on most boards, jumpers are installed or
switches that can be used to change the I/O port address, IRQ number, etc.

Memory addresses
Some devices
for work
buffer needed for temporary storage
used data. Necessary
make sure these areas are not
intersected for different devices.
Interrupts
Interrupt Request Channels (IRQs), or
hardware interrupts are used
various communication devices
system board (processor) that
must be processed
request.

PCI bus interrupts
The local PCI bus was designed with
interrupt sharing.
Because the IBM PC AT computer had only one bus, according to
which devices could talk to the ISA processor and memory. for the distribution of interrupts, the ACPI system was introduced.
The ACPI system deals with:
1. management of computer energy-saving functions
2. automatic distribution of system resources inside
computer. While ACPI is in effect, you cannot change
no interrupt related options. Furthermore,
ACPI system supports advanced controller operation
APIC interrupts.
APIC (Advanced Programmable Interrupt Controller)
interrupts. Used in multiprocessor
multi-core systems, because allows you to distribute
device load.

Direct Memory Access (DMA) channels

DMA
used by devices
implementing high-speed
data exchange (network adapter,
HDD).
One DMA channel can be used
different devices, but
simultaneously. For this, each
adapter needs to allocate its
DMA channel

I/O port addresses

Through the I / O ports to the computer, you can
connect a variety of expansion devices
its possibilities.
I/O ports allow communication between
devices and software in
computer.
Modern systems with automatic self-tuning
(Plug and Play) themselves resolve any conflicts due to
ports by selecting alternate ports for one of the
conflicting devices.
Special programs - drivers -
interact primarily with devices
using different port addresses. Driver must
know which ports the device is using to
work with him.

Avoid conflicts when using resources

Signs of conflict:
Device is not working
data is transmitted with errors;
computer often freezes;
the sound card distorts the sound;
the mouse does not function;
"garbage" suddenly appears on the screen;
the printer prints nonsense;
it is impossible to format a floppy disk;
Windows switches to
safe mode.

Dispatcher
devices in Windows versions
flags conflicting devices
yellow or red icon. This is
fastest way to find
conflicts.
All PC resources are shared twice
- first using the BIOS, then
Windows tools, respectively, and
system resource allocation
possible at two levels (BIOS,
Windows).

Avoiding conflicts manually

1. Allocation of IRQ numbers by means
BIOS
2. Allocation of IRQ numbers by means
Windows
2.1. full use of systems
ACPI and IRQ Sharing.
2.2. refusal to use ACPI and APIC,
but with parallel use of IRQ
Sharing

APIC
(Advanced Programmable Interrupt
Controller) - advanced
programmable controller
interrupts
IRQ Sharing - OS allows two
devices to be at the same time
on one interrupt.

Plug and Play (P&P) systems

Plug and Play (P&P) systems
They first appeared on the market in 1995.
year.
Now Plug and Play specifications
used in ISA, PCI, SCSI standards,
IDE, SATA and PCMCIA.
To realize Plug and
Play, you need the following:
Hardware support Plug and
play;
Plug and Play support in BIOS;
Plug and play support
operating system.

Hardware. Under hardware
means are understood as
computers and adapter boards.
The PnP capabilities in the BIOS are implemented when
perform an extended procedure
POST when the computer is turned on. BIOS
identifies and defines
location of boards in slots, as well as
configures PnP adapters

These actions are carried out in several stages.
1. On the system board and adapter boards
custom nodes are disabled.
2. All ISA and PCI type devices are detected.
PnP.
3. An initial distribution map is created
resources: ports, IRQ lines, DMA channels, and
memory.
4. I/O devices are connected.
5. ROMs in ISA and PCI devices are scanned.
6. Device configuration in progress
bootstrap programs, which are then
participate in the startup of the entire system.
7. Customized devices are sent
information about the resources allocated to them.
8. The boot loader starts.
9. Control transferred to OC

OC PnP

Can be installed on a PC as a new version
Windows and extensions to the existing OC.
OC should tell you about conflicts,
which were not resolved by the BIOS. AT
depending on the capabilities of the OC, you can
configure adapter settings manually (with
screen) or turn off the computer and change
position of jumpers and switches on
the boards themselves. On reboot it will
re-verified and issued
messages about the remaining (or new)
conflicts. After several "visits" all
conflicts are usually resolved.

Typical algorithms for finding faults Troubleshooting the system unit

PSU malfunctions

1.
2.
Obvious: the computer does not work at all,
smoke appears, fuse blows.
Non-obvious (often need additional diagnostics)
♦ any errors and freezes on power up;
♦ Spontaneous reboot and occasional freezes during
regular work;
♦ chaotic parity errors and other memory errors;
♦ Simultaneous stop of hard drive and fan (no
+12 V), computer overheating due to failure
fan;
♦ computer restart at the slightest voltage drop
networks;
♦ strikes el. current when touching the computer case or
connectors;
♦ small static discharges that disrupt the network.

PSU repair methods

Method
organoleptic analysis
installation (extraneous sounds,
odors, damage)
Measurement method
Replacement method
Exclusion Method
Method of influence
Electrical run method
The simple method
Method of equivalents

Typical PC PSU malfunctions

"breakdown" of rectifier bridge diodes
or powerful key transistors,
leading to a short circuit in
PSU primary circuit
control failure
microchips
failure of rectifier diodes
in the secondary circuits of the power supply

Main motherboard malfunctions

Hardware
(disruption of contact in
multilayer printed circuit board or in one
from SP expansion connectors);
Software (overflow of RAM
resident programs, connection
driver software that is incompatible with
connected peripheral
device);
software and hardware (failure
BIOS ROM loss or corruption
CMOS information on the SP).

Troubleshooting

carried out in two ways:
Software (built-in program
POST, special diagnostic
programs (Checkit, Norton Disk Doctor), and
also using
diagnostic boards and PAK MB);
instruments (oscilloscope,
logic probe and analyzer).

Instrument Troubleshooting Technique

consists in a sequential check:
- correct installation of all mode switches
operation of the system board and interface connectors;
- system board supply voltage +5 V and +12 V;
- supply voltage VIP MV
- all crystal oscillators, clock generators and lines
delays;
- operation of the microprocessor (presence of regular signals on
conclusions);
- operation of the address, data and control buses;
- signals on the contacts of ROM and RAM microcircuits;
- signals on the contacts of the expansion connectors of the system
fees;
- timing diagram of the operation of a set of VLSI and small circuits
degree of integration.

GCD malfunctions

A typical GCD drive consists of
electronics boards,
spindle motor,
optical system of the read head
disk loading systems.
Types of faults:
mechanical failures;
malfunctions of the optical system;
malfunctions of electronic components.

Mechanical failures

constitute
80...85% of the total
faults.
lack of lubrication of rubbing parts;
accumulation of dust and dirt on moving
parts of the disc transport mechanism;
salting of friction surfaces;
regulation violations;
mechanical failure of parts
transport mechanism.

Faults
optoelectronic
reading systems.
Despite the small size,
this system is very complex and precise
optical device. By frequency
occurrence during the first one and a half years of operation failures
optical system are
10...15% of the total
faults.

Typical GCD malfunctions

The following typical
malfunctions of NOD components:
The computer does not identify
storage device
Mechanism not working
CD loading/unloading
Do not pass GCD tests

1. Introduction

2. Main body

2.1 Theoretical foundations of the topic under development

2.1.1 Maintenance of computer equipment

2.1.2 The purpose of the maintenance of computer equipment

2.1.3 Importance of computer maintenance

2.1.4 Tasks of technical maintenance of computer equipment

2.1.5 Information base for maintenance

2.1.6 Operational characteristics of serviced ATS

2.2 Practical part

2.2.1 Description of the subject area

2.2.2 Rationale for the need to use the methods inherent in this special discipline

2.2.3 Problem statement

2.2.4 Description of the solution of the problem statement based on the selected methods

2.2.5 Development of operational documentation

Conclusion

Bibliography

LAN - local computing systems.

AIS - automated information system

VS - computer system

VC - computer center

SVT - computer facilities

TO - maintenance

1. Introduction

The relevance of the topic under study lies in the fact that at the moment the development of computer technology has led to the need not only to transfer a large load of paperwork and mathematical calculations to computer equipment, but also to develop methods for maintaining this equipment in working condition.

Maintenance of computer equipment at the workplace consists in diagnosing, collecting and storing information about the characteristics of computers and peripheral devices.

The goal of the project is to develop methods for the maintenance of computer equipment in the workplace

The object of the project is the methods of carrying out maintenance

The subject is the development of methods for carrying out maintenance of computer equipment at the workplace

2. Main body

2.1 Theoretical foundations of the topic under development

2.1.1 Maintenance of computer equipment

This task is solved by different organizations in different ways. In some cases, own service units are created, but this way is very complicated from an organizational and technical point of view, requires serious material costs and can be economically justified only for very large LANs (more than three thousand workstations (AWS)).

Therefore, in most cases, contracts for the maintenance and repair of computer equipment are concluded with external organizations that have the necessary package of licenses, technical equipment, qualified personnel and established channels for the supply of spare parts and components. This path is preferred by budgetary organizations operating small and medium-sized aircraft.

At the request of the customer, other works can be additionally included in the list, for example, testing a PC for the presence of viruses, if necessary, their treatment.

2.1.2 The purpose of the maintenance of computer equipment

Maintenance is a set of organizational measures, including the provision of a PC with the necessary hardware and equipment, designed for the efficient operation and repair of a PC.

The purpose of the maintenance is to prematurely inspect the PC for the state of health. Identification of a problem at the starting level, allows for quick and minor repairs.

2.1.3 Importance of computer maintenance

The importance of maintenance of computer equipment lies in maintaining the operability of the computer as a whole complex, and separately of its components. PC components need constant inspection and monitoring of its technical condition, since the performance of any of the components is limited by a different period of operation, but with timely maintenance, the PC components will serve the prescribed service life.

2.1.4 Tasks of technical maintenance of computer equipment

Maintenance is understood as carrying out preventive maintenance to maintain the operability and appearance of the equipment (including internal and external cleaning).

There are quite a few methods for carrying out maintenance of computer equipment. For the optimal operation of the CVT, it is possible to create your own service units, but this approach requires fairly large financial investments, which makes the scope of this method rather limited and possible only for large LANs. The most common method is the maintenance of the SVT, based on the conclusion of contracts for the maintenance and repair of the SVT with external organizations that have the necessary package of licenses, technical equipment, qualified personnel and established channels for the supply of spare parts and components.

Such contracts provide for regular scheduled maintenance of the entire fleet of ACS in accordance with the approved list.

Lists of routine maintenance are developed for printers, copiers, facsimile and other office equipment.

At the request of the customer, other works can be additionally included in the list, for example, testing a PC for the presence of viruses, if necessary, their treatment.

2.1.5 Information base for maintenance

To maintain the viability of the system, ensure information security and reduce the total cost of ownership of AIS, the most preferred option is:

· Periodic qualified technical maintenance of the SVT, which includes external and internal cleaning using special chemicals, cleaning of magnetic and optical reading heads, testing and configuring the monitor, hard drive, network card, etc.;

· periodic qualified control, condition analysis and maintenance of cable systems;

timely modernization of SVT;

· phased replacement of morally and physically obsolete SVT according to a predetermined schedule.

The configuration of the CVT depends on the financial level of the enterprise or organization, so we can talk about the impossibility of creating a universal optimal configuration of maintenance methods and tools. In most cases, the renewal of the ATC fleet is not economically viable, therefore, maintenance often involves the repair of an existing ATC. Solving the problems associated with maintaining the performance and development of such AIS requires a well-thought-out systematic approach based on economic criteria. This problem on the territory of the Russian Federation has been studied rather poorly at the moment. When building large aircraft, the following factors must be taken into account:

It is impossible to maintain the operability of the existing SVT fleet without repair and modernization. This is due to the constant increase in the complexity of the tasks being solved and the increase in the level of development of computer technology in the world. Efficient and reliable operation of large aircraft is possible only within the framework of planned measures to maintain operability, upgrade, timely commission new computing power and decommission obsolete equipment according to pre-selected schemes.

The creation and introduction of new generations of computer technology is carried out in a three-four-year period. Therefore, the life of a computer for a corporate user is 3-4 years. Subject to the timely and competent modernization of the SVT, this period can be extended to approximately five years. After that, the equipment becomes hopelessly outdated, ceases to meet the level of tasks being solved, does not lend itself to further modernization due to the incompatibility of new components with old ones, and in case of failure, it is practically unrepairable. Of particular importance is the observance of the specified terms for the replacement of SVT in the case of their use for work with critical applications, as well as as part of categorized objects.

When conducting tenders for the purchase of computer equipment, the main emphasis is often placed on the minimum cost of a one-time supply, while the main criterion here should be minimizing the total cost of owning an information system.

The total cost of ownership refers to the sum of the costs of acquiring hardware and software, staff training, configuration, administration, upgrades and technical support in a given period of operation.

The cost of ownership can be conditionally divided into initial costs that are explicit to the user (the cost of purchased equipment, software, staff training) and hidden (costs during operation). According to research by the world's leading computer manufacturers, explicit costs account for only about one-third of all costs associated with owning a computer network for five years (the maximum life of a computer, after which the cost of upgrading is beyond reasonable).

Minimization of the cost of ownership involves the use of a set of measures aimed at reducing the total cost of creating and operating an information system during a given service life. In this case, it is extremely important to be able to think ahead in order to initially determine the costs of maintaining the system during its entire life cycle. In this regard, the main task is to create an optimal configuration of the CVT fleet, taking into account its current cost, the cost of maintenance, repair, provision with additional components, etc.

It is also important to take into account the manufacturer of computer equipment. Well-known brands today sell products at fairly high prices, including subsequent repairs. However, one should take into account the existence of a market for cheap goods, the repair of which will subsequently take a much larger amount of expenses. From the point of view of minimizing the cost of ownership, the best solution is to purchase equipment from the world's leading manufacturers, such as Hewlett-Packard, COMPAQ, SUN and others with a stable high reputation in the world. Such manufacturers adhere to the rule of replacing warranty components free of charge, provide delivery of component materials, and, if possible, have their own service center, which, unfortunately, is not typical for small cities of the Russian Federation. For the consumer, this means not only a reduction in repair and maintenance costs, but also a significant reduction in losses associated with system failures and downtime, as well as the loss or distortion of important information.

To ensure the specified service life of the system, it is necessary to ensure the maximum possible consideration of new design and technological solutions when ordering computer equipment for the needs of AIS. In general, the choice of a manufacturer of computer equipment and components will allow in the future, during operation, to reduce the cost of repairing the CVT fleet, although initially the amount of purchase of the CVT fleet will be higher than the purchase of cheap equipment from little-known manufacturers that have not proven themselves in the computer equipment market.

2.1.6 Operational characteristics of serviced ATS

The degree of suitability of a computer for its intended use and the possibility of its maintenance are determined by the operational characteristics of the PC.

The ability of a computer to function, ensuring the performance of specified functions with the parameters established by the requirements of technical documentation is called working capacity PC. The performance of the PC allows you to judge the state of the machine at a certain point in time. However, when operating a PC, it is important to know its state not only at the moment, but also the ability to perform the tasks assigned to the machine for a given period of time. For these purposes, the concept reliability.

The reliability of a PC is understood as its ability to remain operational for a given period of time under certain operating conditions.

At the storage stage, PCs use such a characteristic as safety, which is understood as the ability of the machine to maintain good condition under specified storage conditions.

During the operation of a PC, maintenance personnel systematically encounter issues such as ease of access to units and installation, machine suitability for troubleshooting, etc. To characterize the machine from the point of view of its suitability for repair, the concept is introduced maintainability. The requirements for the maintainability of the machine are imposed depending on the conditions of its operation.

Under durability understand the property of a PC to remain operational for a certain state with the necessary breaks for maintenance and repairs.

An important feature of a PC is reliability its work - the property to function under the given conditions of maintenance and operation of the PC.

An important factor is the performance of the PC. The results of evaluating PC performance by different methods differ significantly, but to identify the law of parameter change, they use one evaluation method.

2.2 Practical part

2.2.1 Description of the subject area

Carrying out maintenance of SVT at the workplace is carried out directly on the job. The main thing in this matter is the implementation of a preventive inspection of the entire fleet of SVT on a daily basis and the identification of problems that arise in the process of work. If any are observed, it is necessary to eliminate them at the initial stage, because. the development of one problem generates problems in the operation of all equipment, which subsequently leads to downtime and loss of time and potential earnings of the computer center.

The first group includes external inspection, cleaning, lubrication and elimination of defects found during inspection. These works are carried out with the machine turned off. The second group includes control and adjustment work carried out on the switched on machine.

From the point of view of the organization of preventive maintenance, the most widespread is planned preventive maintenance based on the calendar principle. At the same time, a schedule of routine maintenance is drawn up, which indicates the volume and timing of preventive measures.

The current maintenance of the PC is understood as a set of adjustment and repair work aimed at restoring the properties or performance lost by the machine by replacing or restoring its parts, assemblies and blocks.

The efficiency of PC operation largely depends on the level of its organization. The organization of operation is a set of measures aimed at training maintenance personnel, planning work, timely and complete provision of the required consumables, correct and systematic documentation, etc.

The organization of preventive monitoring and troubleshooting of PCs on the job is very important for maintaining the health of both an individual PC and the entire computer center as a whole. To analyze the performance of PCs and CCs, the reference composition of measurements, their constituent parameters and related indicators, given below, is used.

Elementary indicators are - the number of computers (installations), the cost of the computer (full, depreciation, residual), the cost of the application, its maintenance, etc.; time (revisions, purchases, registrations, warranty expiration, etc.): year, quarter, month, week or decade, day or full date. In addition, the indicators of measurement are the lifetimes based on dates.

An important indicator for a PC is the number of users. Ideally, there should be one user per PC. But, due to the insufficient provision of the computer park, several users are allocated for one computer, which increases the occurrence of problems associated with the human factor (user error).

For the VC, an important indicator is its location (through the corporate workplace classifier): country, district, region, city, office, building, floor, room, place. This allows you to identify errors that occur due to improper organization of the PC power supply.

computer maintenance

The presence of a local network is also an effective indicator of the health of a PC. In this case, the system administrator regulates the processes of information exchange within the local network, eliminates software errors, blocks access to irrelevant information, etc. Maintenance of the network is carried out both at the preventive and at the production level. in this case, the failure of one of the PCs will significantly complicate the work of the entire local network.

A computer equipment supplier is one of the main criteria for choosing a PC for a serviced CC. The quality of the supplier's work depends on the timely delivery of components, the quality of delivery, as well as expenditure financing.

The most important thing when choosing a PC, with a certain configuration, is the choice of manufacturer. To date, the number of manufacturers is really large, while preference is often given to well-known brands.

The choice of software also plays an important role in the quality and trouble-free operation of the PC. The use of a non-licensed or non-adjusted software product leads to failures in the process of operation, while restoring performance takes some time, which negatively affects the performance of the entire computer center.

An analysis of the operation of computer facilities by an enterprise is carried out in the context of arbitrarily combined parameters that specify a sequence of nested groupings. For example, branch aggregates can be “decomposed” into departmental aggregates or supplier aggregates, and so on.

2.2.3 Problem statement

To develop a methodology for carrying out maintenance of the SVT at the workplace for the computer center, which has 20 units of computer equipment and 10 units of office equipment at its disposal. Calculate the utilization rate and the coefficient of technical utilization of SVT for an eight-hour working day. Draw up an annual plan for the maintenance of the SVT of this CC. Develop operational documentation for this type of service.

2.2.4 Description of the solution of the problem statement based on the selected methods

The method of equipment redundancy allows you to quickly neutralize the fault that has arisen.

Neutralization of faults actually serves only to delay their manifestation (with constant redundancy, the elements, blocks or nodes of the machine work in parallel and the failure of any of them does not disrupt the operation of the machine until the entire reserve is exhausted). However, over time, faults can accumulate so much that they can no longer be neutralized and errors appear in the calculations.

Therefore, this method is used primarily in systems where the correct operation of the machine must be guaranteed for a certain period of time, and repairs are difficult or simply impossible (for example, control of spaceships). A method based on the detection of a fault combined with a repair is appropriate when machine stops are permissible and faults cannot be left undetected. This corresponds to the case of non-operational operation of the machine in the mode of sequential program processing.

Interrupted jobs in this case, after the detection and elimination of the fault, can be performed again, although this is inconvenient for the user.

In a real-time process control environment and for online information processing (eg time-sharing systems), it is very important to prevent a complete system failure for a very long time. This necessitates the use of means for detecting and diagnosing a malfunction to facilitate its rapid removal during preventive maintenance.

The computer control system is a set of software and hardware designed to determine its technical condition and maintain the required level of PC performance.

The processes of determining the technical condition and maintaining a given level of efficiency of the PC are implemented by means of checks, troubleshooting and rational maintenance. In the process of diagnosis, using the machine control system, a number of sequentially related tasks are solved:

§ control - detection of errors in the PC;

§ classification - determination of the nature of the error (failure or failure);

§ diagnostics - search for the location of the failed element;

§ corrections - elimination of an error, replacement of a failed element.

The listed tasks can be solved in the machine in various modes: operational (simultaneously with the solution of the main task by the machine); preventive checks; automatically or with the involvement of the operator.

In different tasks of control, it is possible to use various technical means. They are: software; hardware; combinations of software and hardware.

The utilization factor K and is the ratio of the time during which the PC is in the on state t on, to the calendar time for the year (for example, for the quarter) t sq.

In our case, taking into account the conditions of the task, the computer is turned on for 8 hours a day during the working week, i.e. 5 days a week. There are 48 weeks in a year, so the utilization factor is:


The utilization rate shows the degree of PC load, i.e. only the organizational side of using a PC on a computer center.

Considering that the CC contains 20 units of computer equipment and 10 units of office equipment, it can be determined that the utilization rate of the CVT fleet in this CC will be:


The coefficient of technical use K t. and is the ratio of the useful time of the PC for a certain period t p. p to the time the machine was in the on state t on:

where t o, t y - time of detection and elimination of faults; t sat - time lost on failures (short-term disruption of the PC) and elimination of their consequences; t sweat - the time of loss of a serviceable PC for organizational reasons (operator's errors, incorrect program, low-quality storage media, etc.); t prof - time spent on maintenance work.

Calculate the coefficient of technical use. When carrying out the calculation, we will use the requirements for the maintenance of computer equipment and office equipment.

Let us calculate the coefficient of technical use of computer equipment during the working day, taking into account all possible losses associated with the repair and inspection of computer equipment.

At the same time, the coefficient of technical use of SVT for the selected CC will be:

The annual maintenance plan for the SVT is presented in Table 1.

Table 1. Annual plan for maintenance of SVT

Types of jobs

One-time check time, h

Time for computing

Time for office equipment

Total time during the year, h

Daily

weekly

monthly

semi-annual


Thus, taking into account all the checks and diagnostics showed that, on average, it is necessary to spend 10.625 hours a day to check the performance of the VC fleet. Therefore, for the efficient operation of the CC, it is necessary to have a team of two technical engineers.

2.2.5 Development of operational documentation

Instructions for use

Choose the most suitable program for diagnostics

2. Test your computer

Based on the results of the diagnostic test, make a decision to correct the problem

Conclusion

In conclusion, we can say that the goal of the work was achieved by identifying the features of methods for diagnosing SVT in the workplace. Achieving the goal became possible due to the implementation of the set technical tasks, as well as the study of theoretical material on the research topic.

In accordance with the theoretical material, the methods of maintenance of the SVT are described, the methodology for the implementation of the maintenance of the SVT at the workplace is identified and proposed, the utilization factor and the coefficient of technical use of the SVT for an eight-hour working day are calculated, and the annual plan for the maintenance of the SVT of this CC is drawn up. When carrying out calculations, it was found that it is possible to maintain the operability of the selected computer center using a team of two technical engineers, although for more efficient work a team of three technical engineers should be used, this will avoid downtime in the event of a critical equipment breakdown.

Bibliography

1. PC Upgrade and Repair - 17th Edition: Scott Muller

2. Certification A + "PC service technician. Organization, maintenance, repair and modernization of PC and OS": Charles J. Brooks

Technical means of informatization: A.P. Artemov

Send your good work in the knowledge base is simple. Use the form below

Students, graduate students, young scientists who use the knowledge base in their studies and work will be very grateful to you.

Posted on http://www.allbest.ru/

Introduction

Goals and objectives of production (professional) practice

The work practice of students of educational institutions of secondary vocational education is an integral part of the educational process and is aimed at consolidating and deepening the knowledge and skills acquired by students in the learning process, as well as mastering the system of professional skills and abilities

The practice is organized in accordance with the State Standard of Secondary Vocational Education in terms of State requirements for a minimum content and level of training of graduates to master the initial experience of professional activity.

The objectives of the practice are to generalize and improve the knowledge and skills in the specialty obtained in the laboratories of the educational institution, as well as at enterprises during practice in the specialty profile; checking the possibilities of independent work of a future specialist; preparation for the final state certification (final interdisciplinary exam in the specialty).

Time budget allocation

The duration of trainee (qualification) practice is 10 weeks.

During the practice, students perform duties in accordance with the job description.

The distribution of the practice time budget is shown in Table 1.

local network software diagnostics

Table 1 Practice Time Budget Distribution

Chapter 1. Familiarization with the goals and objectives of the practice

1.1 Individual practice task

An individual plan for the internship is to familiarize students with technological processes and related equipment at enterprises operating computer equipment and computer networks, as well as to consolidate the knowledge gained in the study of major subjects of a special cycle: “Design, layout of personal computers, maintenance of computers”, “ Network equipment and system software of computer networks”, “Computer peripherals”, “Databases”, “Modern information technologies”, the formation of work culture skills and a conscientious attitude to the assigned work.

As a result of practice, students receive and consolidate skills in maintenance, diagnostics, repair, modernization of electronic computer equipment (installation work, selection of measuring equipment, measurement of electrical parameters in SVT circuits, troubleshooting, reconfiguration of PC, connection of additional devices in order to improve their operating parameters).

In terms of the formation and consolidation of skills in the use of computer software and networks, students must carry out their maintenance, freely using software products.

Application of the studied theoretical skills in creating unified information systems at the enterprise (Local Area Network). Use of advanced software and technological solutions. Industrial practice of students is carried out in accordance with the current State educational standard of secondary vocational education.

The practical training of students is based on the following areas:

· Combination of practical training with theoretical training of students;

· Use in teaching the achievements of science and technology, advanced labor organization, methods of work on modern computer technology with the use of new information technologies;

· Step-by-step construction of practical training according to the increasing complexity of educational tasks. In connection with the development of technical progress and the constant improvement of production, the practice program must be systematically supplemented with materials on new achievements in science and technology, advanced labor methods, new equipment and instruments, etc.

During the practice, students study the role of a technician in production; ways of mechanization and automation of service maintenance and repair work, increasing the productivity of workers; economic performance of the site, workshop, department, etc.

The objectives of the practice in the profile of the specialty are the mastering of professional activities by students (mastering one or more working professions) in the specialty, consolidating, expanding, deepening and systematizing the knowledge gained in the study of disciplines of general professional and special cycles.

Table 2 Accounting for hours of practice

Name

Number of hours

Briefing on safety and fire prevention measures; familiarization with the enterprise

Studying the organizational structure of the enterprise, job descriptions in the workplace, workflow

The study of the main characteristics of computer equipment

Familiarization with the software in the workplace

Computer networks of the organization and their characteristics

Introduction to the server

Production work in the workplace

Internship as an understudy for the head of the maintenance department, studying the organization's management structure

Making a diary - practice report

Chapter 2. Familiarization with the structure of the enterprise, safety precautions

2.1 Acquaintance with the charter of the enterprise

The charter contains:

· Information about the location of OAO VMZ KO;

Information on the competence of the governing bodies of JSC VSW KO;, including issues that are the exclusive competence of the general meeting of participants of JSC VMZ KO;, on the procedure for making decisions by the company's bodies, including on issues, decisions on which are taken unanimously or by a qualified majority vote;

・Size Details the authorized capital of OAO VMZ KO;

· Rights and obligations of JSC VMZ KO participants;

· Information about the procedure and consequences of the participant's withdrawal from the company;

· Information on the procedure for the transfer of a share (part of a share) in the authorized capital of JSC VMZ KO to another person;

· Information about the procedure for storing documents of JSC VMZ KO and about the procedure for providing information by the company to the participants of JSC VMZ KO and other persons;

· Full and abbreviated name of OAO VMZ KO.

2.2 Familiarization with the safety briefing at the enterprise

1. General requirements for labor protection

1.1. Persons at least 18 years of age who have undergone special training, including electrical safety group I, a mandatory medical examination and instruction in labor protection, who do not have contraindications for health reasons, are allowed to work independently with a computer. From the time of pregnancy, women are transferred to work not related to the use of a computer, or the time of working with a computer is limited for them (no more than 3 hours per work shift), subject to the hygiene requirements established by the Sanitary Rules.

Students from the 1st grade who have been instructed in labor protection, a medical examination and have no contraindications for health reasons are allowed to work with a computer under the guidance of a teacher.

1.2. Computer users must comply with the internal labor regulations, established work and rest regimes.

1.3. When working with a computer, the following hazardous and harmful production factors may affect the workers:

· Ionizing and non-ionizing radiation of video terminals;

· Electric shock when working on equipment without protective grounding, as well as with the rear cover of the video terminal removed;

· Visual fatigue, as well as adverse effects on the vision of flickering symbols and the background during unstable operation of the video terminal, fuzzy image on the screen.

1.4. Protective screens must be used when working with a computer.

1.5. The computer room should be equipped with a first aid kit.

1.6. Computer users are required to comply with fire safety rules, know the location of primary fire extinguishing equipment. The computer room should be equipped with two carbon dioxide fire extinguishers and an automatic fire alarm system.

1.7. The windows in the room where computers are used should mainly be oriented to the north or northeast. Window openings must be equipped with adjustable devices such as blinds, curtains, external visors, etc.

1.8. The illumination of workplaces on the surface of the table in the area where the working document is placed should be 300-500 lux. The illumination of the surface of computer screens should not exceed 300 lux. Lighting should not create glare on the surface of the screens. The use of luminaires without diffusers and shielding grilles is not allowed.

1.9. The victim or eyewitness of the accident is obliged to immediately inform the school administration about each accident with an employee. If the equipment malfunctions, stop work and inform the school administration.

1.10. In the process of work, computer users must comply with the rules for the use of personal and collective protective equipment, observe the rules of personal hygiene, and keep the workplace clean.

1.11. Persons who have failed to comply with or violate the instructions on labor protection are subject to disciplinary liability in accordance with the internal labor regulations and, if necessary, are subjected to an extraordinary examination of knowledge of the norms and rules of labor protection.

2. Labor protection requirements before starting work

2.1. Thoroughly ventilate the room with computers, make sure that the microclimate in the room complies with the current sanitary standards for the microclimate of industrial premises.

2.2. Make sure that the workplaces with computers are properly lit.

2.3. Make sure that the protective earth of the equipment is available, as well as the protective screens of video monitors.

3. Labor protection requirements during work

3.1. When working with a computer, the values ​​​​of visual parameters should be within the optimal range.

3.2. The keyboard should be placed on the table surface at a distance of 100-300 mm from the edge facing the user or on a special height-adjustable working surface separated from the main tabletop.

3.3. When the video terminal is running, the distance from the eyes to the screen should be 0.6-0.7 m, the eye level should be at the center of the screen or at 2/3 of its height.

3.4. The image on the screens of video monitors must be stable, clear and extremely clear, without flickering of characters and background, there must be no glare and reflections of lamps, windows and surrounding objects on the screens.

3.5. Do not work with a computer without protective screens.

3.6. The total time of direct work with the computer during the work shift should be no more than 6 hours.

3.7. The duration of continuous work with a computer without a regulated break should not exceed 1 hour. Every 45-60 min. work should take a regulated break lasting 10-15 minutes.

3.8. During regulated breaks, in order to reduce neuro-emotional stress, fatigue of the visual analyzer, eliminate the influence of hypodynamia and hypokinesia, and prevent the development of postural tonic fatigue, it is necessary to perform sets of exercises for the eyes, physical training minutes and physical training pauses.

4. Labor protection requirements in emergency situations

4.1. In the event of a malfunction in the operation of the video terminal, turn it off and inform the school administration about this. Continue work only after the problem has been eliminated.

4.2. If the user experiences visual discomfort and other adverse subjective sensations, one should limit the time spent working with the computer, correct the duration of breaks for rest, or change activities to another activity not related to the use of a computer.

4.3. In case of electric shock to the user, immediately turn off the power supply, provide first aid to the victim, if necessary, send him to the nearest medical institution.

5. Labor protection requirements at the end of work

5.1. Turn off computers, clean their screens from dust.

2.3 Familiarization with the document on the formation of the enterprise

Since I am not an employee of the enterprise, I did not have access to this document

2.4 Familiarization with the structures and management systems in the enterprise

The management structure consists of three levels (Tables 3,4,5):

Intracompany management

· manufacturing control;

· personnel Management.

Table 3 Principal diagram of production control

Principles

Economic Methods

1. Centralization in management

1.Marketing

1.Commercial calculation

2. Decentralization in management

2.Planning

2. Intracompany settlement

3. Combination of centralization and decentralization

3.Organization

3. Prices and pricing mechanism

4. Focus on long-term development goals

4. Control and accounting

4.Financial policy and its most important instruments

5. Democratization of management: participation of employees in the top management

Table 4. Principal diagram of production control

Conducting R&D

Ensuring the development of production

Sales assurance

Organizational structures of production management

1. Development of the scientific and technical policy of the company

1. Development and maintenance of policy in the most important areas of the company's production activities

1. Development of marketing policy

1 .Functional

2. Development and implementation of new products

2. Development of production technology

2. Choice of channels and methods of distribution

2.Linear-functional

3.Organization of scientific and technical activities

3. Providing production with material and technical resources

3. Sales organization

3.Problem-target management

4.Improve the quality and competitiveness of products

4.Matrix structure

5.Improve labor productivity

5. Program-target management

Table 5. Principal diagram of production control

Development and implementation of personnel policy

Pay and incentives

Group management, team relationships

and with trade unions

Socio-psychological aspects of management

1. Principles of selection and placement of personnel

1. Forms of remuneration

1.Involvement of workers in management at the grassroots level

1. Motivation of work of employees and creative initiative

2.Terms of employment and dismissal

2. Ways to increase labor productivity

2. Work teams and their functions

2.Organizational culture of the company

3.Training and professional development

3.Incentive pay systems

3. Relationships in the team

3. The impact of personnel management on the activities of the company and its organization

4. Evaluation of personnel and their activities

4. Relations with trade unions

"Organization management structure" or "organizational management structure" (OSU) is one of the key concepts of management, closely related to the goals, functions, management process, the work of managers and the distribution of powers between them. Within the framework of this structure, the entire management process takes place (the movement of information flows and the adoption of managerial decisions), in which managers of all levels, categories and professional specializations participate. The structure can be compared with the framework of the building of the management system, built to ensure that all processes occurring in it are carried out in a timely manner and with high quality. Hence the attention that leaders of organizations pay to the principles and methods of building management structures, the choice of their types and types, the study of trends in change and assessment of compliance with the tasks of organizations.

The management structure is understood as an ordered set of stably interconnected elements that ensure the functioning and development of the organization as a whole. OSU is also defined as a form of division and cooperation of management activities, within the framework of which the management process is carried out according to the relevant functions aimed at solving the set tasks and achieving the intended goals. From these positions, the management structure is presented as a system of optimal distribution of functional duties, rights and responsibilities, the order and forms of interaction between the governing bodies and the people working in them.

2.5 Enterprise automated control system

Automated enterprise management system (APCS) is a set of software, technical, information, linguistic, organizational and technological tools and actions of qualified personnel, designed to solve the problems of planning and managing various types of enterprise activities.

Automated enterprise management systems are necessary to optimize and increase the efficiency of the work of managers and some other personnel departments of the enterprise. Experts say that managing an enterprise with the help of automated systems contributes to the growth of the competitiveness of any company. Automated enterprise management systems are especially important for managers. According to statistics, an ordinary manager spends about 60% of his precious time on reporting and compiling documentary tasks for staff. An effective database of employees, which is part of enterprise management, allows the manager to quickly access the necessary information and perform actions for the reception and movement of personnel. In addition to everything, enterprise management with the help of modern systems allows for automated payroll calculation based on many parameters. In particular, it provides for a position, individual benefits, sick leave, travel allowance, and more. The available information contributes to the prompt calculation and accounting of wage data in financial statements.

Depending on the functional equipment, the following automated enterprise management systems are distinguished:

· Multifunctional systems that allow you to perform the full range of tasks related to the management of the enterprise;

· Systems of expert analysis, which are aimed at detecting the main trends and directions of development of the enterprise;

· Payroll systems.

Comprehensive programs for personnel management. They allow you to solve a huge list of tasks in the field of personnel management: contact information of employees, work schedules, enrollments and dismissals, salaries, and much more.

The main task of expert programs is to store and compare the various characteristics of the applicant with similar characteristics of the best employees of the company. This approach allows you to find promising employees for a particular department. Due to the high cost of such solutions, it is advisable to use them only within large enterprises. Automated enterprise management systems, which are designed to solve complex problems, are recommended to be integrated with accounting systems. This feature is due to the fact that the manager will be able to make an adequate decision only if there is up-to-date data on the state of the enterprise. The introduction of enterprise management systems contributes to the adoption of effective decisions within the framework of a whole range of tasks.

Automated enterprise management systems (ACS) are usually integrated systems. APCS according to the nature of production is divided into the following types: continuous, discrete (single, small-scale, medium-scale production) and continuous-discrete type (mass-flow and large-scale production). The automated control system of a manufacturing enterprise, as a rule, includes control subsystems:

Warehouses;

· Deliveries;

· Personnel;

· Finance;

· Design and technological preparation of production;

· Nomenclature of production;

· Equipment;

· Operational planning of production needs.

The clients of the Krasny Oktyabr enterprise are private or state organizations (enterprises) that have the 1C Enterprise database. Employees of the Krasny Oktyabr enterprise are updating, configuring and normalizing databases. The same goes for computer repair and diagnostics. The enterprise "Red October" serves both private and public organizations, but to a greater extent this applies to individuals.

2.6 Marketing service in the enterprise

The marketing service at the Krasny Oktyabr enterprise is not conducted, since for the most part the enterprise works with old and regular customers.

2.7 Business ethics at the enterprise. Business ethics when working with clients

Business ethics is a set of informal (not legally established) rules that firms adhere to in their activities. Business ethics includes honesty in dealing with employees, customers (customers), suppliers and competitors.

During the entire internship, the staff and clientele of the enterprise were polite to me, which allowed me to respond with courtesy in their direction. I concluded that the business ethics at the enterprise are fully respected.

2.8 Emergency scheme at the enterprise

I have studied quite a simple scheme of evacuation in emergency situations. An example outline is shown in figure 1.

Rice. 1 Emergency circuit

Chapter 3. Survey of the enterprise

3.1 Computing centers in the enterprise

Computing center (abbr. CC) is an organization, subdivision, or, in a narrower sense, a complex of premises designed to accommodate computer systems and auxiliary equipment.

There is no computer center at the enterprise, but there is a server providing the following services for clients.

Services provided by the server:

3.1.1 System administrator job description

I. General provisions

1. The system administrator belongs to the category of specialists.

2. A person with specialized professional education, experience in maintenance and repair of personal computers and office equipment, who knows the basics of local networks (TCP / IP protocol stack, network equipment, principles of building local area networks) is appointed to the position of system administrator.

3. The system administrator must know:

3.1. Technical characteristics, purpose, operating modes, design features, rules for the technical operation of local area network equipment, office equipment, servers and personal computers.

3.2. Hardware and software of local computer networks.

3.3. Principles of repair of personal computers and office equipment.

3.4. Languages ​​and methods of programming.

3.5. Fundamentals of information security, ways to protect information from unauthorized access, damage or deliberate distortion.

3.6. The procedure for issuing technical documentation.

3.7. Internal labor regulations.

3.8. Fundamentals of labor legislation.

3.9. Rules and norms of labor protection, safety and fire protection.

4. Appointment to the position of a system administrator and dismissal from the position is carried out by order of the director on the proposal of the head of the IT department.

5. The system administrator reports directly to the head of the IT department.

II. Responsibilities of a system administrator

System Administrator:

1. Installs operating systems and software necessary for operation on servers and workstations.

2. Performs software configuration on servers and workstations.

3. Supports the software of servers and workstations in working order.

4. Registers users of the local network and mail server, assigns identifiers and passwords.

5. Provides technical and software support to users, advises users on the operation of the local network and programs, draws up instructions for working with the software and brings them to the attention of users.

6.Sets access rights and controls the use of network resources.

7. Provides timely copying, archiving and backup of data.

8. Takes measures to restore the operability of the local network in case of failures or failure of network equipment.

9. Identifies user and software errors and takes action to correct them.

10. Conducts network monitoring, develops proposals for the development of network infrastructure.

11.Provides network security (protection against unauthorized access to information, viewing or changing system files and data), security of internetworking.

12. Provides anti-virus protection for the local area network, servers and workstations.

13. Prepares proposals for upgrading and purchasing network equipment.

14. Carries out control over the installation of LAN equipment by specialists of third-party organizations.

15. Informs his immediate supervisor about cases of violation of the rules for using the local area network and the measures taken.

III. System administrator rights

The system administrator has the right to:

1. Install and change the rules for using the local area network.

2. Get acquainted with the documents that define his rights and obligations in his position, the criteria for assessing the quality of performance of official duties.

3. Submit proposals for the management to improve the work related to the duties provided for in this job description.

4. Require management to provide organizational and technical conditions necessary for the performance of official duties.

IV. Responsibility of the system administrator

1. The system administrator is responsible for:

1.1. Violation of the functioning of the local area network, servers and personal computers due to improper performance of their duties.

1.2. Untimely registration of users of the local area network and the mail server.

1.3. Untimely notification of management about cases of violation of the rules for using the local area network.

2. The system administrator is held liable:

2.1. For improper performance or non-performance of their official duties provided for by this job description - within the limits established by the current labor legislation of the Russian Federation.

2.2. For offenses committed in the course of their activities - within the limits established by the current administrative, criminal and civil legislation of the Russian Federation.

2.3. For causing material damage to the company - within the limits established by the current legislation of the Russian Federation.

3.2 Information processing methods in the enterprise

In the era of centralized use of computers with batch processing of information, users of computer technology preferred to purchase computers that could solve almost all classes of their tasks. However, the complexity of the tasks being solved is inversely proportional to their number, and this led to inefficient use of the computing power of the computer at significant material costs. One cannot ignore the fact that access to computer resources was difficult due to the existing policy of centralizing computing facilities in one place.

The principle of centralized data processing (Fig. 2) did not meet the high requirements for the reliability of the processing process, hindered the development of systems and could not provide the necessary time parameters for online data processing in multi-user mode. A short-term failure of the central computer led to fatal consequences for the system as a whole, since it was necessary to duplicate the functions of the central computer, significantly increasing the costs of creating and operating data processing systems.

Figure 2 The principle of centralized data processing

Centralized data processing system

The emergence of small computers, microcomputers and, finally, personal computers required a new approach to the organization of data processing systems, to the creation of new information technologies. There was a logical requirement for the transition from the use of individual computers in centralized data processing systems to distributed data processing.

Distributed data processing (Fig. 3) is data processing performed on independent but interconnected computers, representing a distributed system.

Figure 3. Distributed data processing

Distributed data processing system

To implement distributed data processing, multi-machine associations were created, the structure of which is being developed in one of the following areas:

· Multi-machine computing systems (MCC);

· Computer (computer) networks.

A multi-computer complex is a group of computers installed nearby, combined with the help of special interfaces and jointly performing a single information-computing process.

3.3 Use of paperless data processing technologies in the enterprise

The company makes full use of the Microsoft Office 2013 office suite.

Microsoft Office - An office suite of applications created by Microsoft for Microsoft Windows, Apple Mac OS X operating systems. This package includes software for working with various types of documents: texts, spreadsheets, databases, etc. Microsoft Office is a server OLE objects and its functions can be used by other applications as well as by the Microsoft Office applications themselves. Supports scripts and macros written in VBA.

But to a greater extent, they use:

Microsoft Word;

Microsoft Excel;

Microsoft PowerPoint.

3.4 Local network in the enterprise

The company where I did my internship already has a local network. The topology of this network is a star.

A star is the basic topology of a computer network in which all computers on the network are connected to a central node (usually a switch), forming a physical network segment. Such a network segment can function both separately and as part of a complex network topology.

This topology has both its pros and cons.

· Simplicity of laying;

· Ease of maintenance;

· Easy addition of new workstations;

Endurance (if one of the sections of the network transmission medium

· The data breaks or shorts out, then only the device connected to this point loses communication).

· Expensiveness;

· The presence of a separate piece of cable for each device.

The local network at the enterprise is built using a twisted pair cable, category 5e, as well as using a NetGear ProSafe JF5524E switch. Internet access is provided using the D-Link DL804HV access point.

Figure 4. Enterprise local area network

Chapter 4. Technical equipment of the enterprise

4.1 Acquaintance with the complex of technical means of the enterprise computer center, the availability of office equipment and telecommunications

There is no VC at the enterprise.

With regards to office equipment and telecommunications, it looks like this:

· 2 network printers: HP LaserJet P2015n/dn (for printing the necessary information);

· 1 MFP HP LaserJet 3055 (for printing, copying, scanning, as well as for receiving and sending faxes);

· 2 scanners Canon CanoScan LiDE 210;

· Several Siemens radiotelephones.

4.2 Configuration of personal computers in the enterprise

The company has 8 computers that are similar in their characteristics:

Hard drive: Seagate 320Gb

Drive: Asus DRW-24F1ST

Also available 1 server:

AMD Athlon 64 x2 has 4gb of RAM, 1 Tb of hard drive storage.

4.3 Organization of work at the enterprise for information protection

Antivirus: The enterprise uses a commercial version of AVG Antivirus.

AVG Antivirus is a Czech-made anti-virus system that has a file scanner, an email scanner and supports automatic monitoring. AVG's security system is certified by all major independent certification companies such as ICSA AV-TEST, Virus Bulletin, Checkmark (West Coast Labs).

Firewall: iptables is a command-line utility that is the standard interface for managing the operation of the netfilter firewall (firewall) for Linux kernels versions 2.4 and 2.6. Used for packet filtering and NAT enforcement.

Backup on the server is performed using the rsync command utility.

Backup on client PCs is performed using the Cobian Backup utility. This is a multi-threaded utility that allows you to schedule backups of individual files or directories to a specific directory on the same computer or to a remote server on the network. There is also full support for the FTP protocol.

4.4 Inventory of the existing technical equipment of the enterprise

Name

Name / Specifications:

Computer (7pcs)

Chassis: CoolerMaster CM Elite 334U

Motherboard: ASUS H61M-D

Processor: Intel Core i3-3220 3.3GHz BOX

Video card: Asus GeForce 210 1024MB

RAM: Corsair DDR3 4096Mb

Hard drive: Seagate 320Gb

Drive: Asus DRW-24F1ST

Monitor (8pcs)

Acer V236HLbd 23"

Printer (2pcs)

HP LaserJet P2015n/dn

HP LaserJet 3055

Phone (6 pcs.)

Siemens Gigaset A220

Switch/hub (4pcs)

NetGear ProSafe JF5524E, NetGear F5608, D-Link DL804HV, D-Link DWL 2100AD

Scanner (2pcs)

Canon CanoScan LiDE 210

Server (1pc)

AMD Athlon 64 x2 has 4gb of RAM, 1 Tb of hard drive storage

Chapter 5

5.1 Acquaintance with the operating system involved in the enterprise

The enterprise makes full use of Windows 8 Enterprise.

Windows 8 is an operating system belonging to the Microsoft Windows OS family, following Windows 7 in the line and developed by the multinational corporation Microsoft.

Thanks to new developments involved in the process of creating the operating system, the process of loading it after turning on the PC takes a maximum of 8 seconds. The need for a reboot is also minimized, saving IT staff time.

Thanks to UEFI, you can remotely repair your computer by diagnosing and eliminating all interruptions that have arisen in its operation using the network.

The new OS is supported by netbooks, tablets and other devices that have built-in x86 bit processors. This will allow IT staff to create a Windows infrastructure, greatly simplifying the network management process.

In addition to all of the above, the considered OS allows you to transfer the used workspace to any other device. To perform such actions, a regular “flash drive” or other drive is enough, the minimum volume of which will be 32 GB.

Windows 8 simplifies the work of system administrators by modernizing networking features. So, using the network protocol of the so-called application layer, you can manage printers, various files and other resources linked into a single system. To fully achieve the intended goal, the built-in network card is used

And most importantly, Windows 8 is a fairly simple OS, one of those that are on the market.

5.2. Distribution of software on local machines in the enterprise

Software distribution in the enterprise is available thanks to a mapped network drive on all client machines, with installation files for all necessary applications, such as:

· Skype v 6.16.67.10;

· HaoZip v 4.0.1.9380;

· TeamViewer v 9.0;

AVG Antivirus

1C Enterprise 8.2

5.3 Hierarchical software and network model in the enterprise

The hierarchical network model involves the division of the network into separate levels. Each layer provides specific functions that define its role throughout the network. By separating diverse network functions into layers, the network architecture becomes modular, which ensures network scalability and performance. A typical hierarchical network structure is divided into three levels: the access level, the distribution level, and the core level (Fig. 5).

Figure 5. Three-level hierarchical network model

The access layer provides an interface for end devices such as personal computers, printers, IP phones, giving them access to the rest of the network layers. The access layer can contain routers, switches, bridges, hubs, and wireless access points. The primary purpose of the access layer is to provide a means of connecting devices to the network and controlling which devices are allowed to use those means of connection.

The distribution layer aggregates (groups) the data received from the access layer switches before it is passed to the kernel layer for routing to the destination. The distribution layer controls the flow of network traffic based on policies and establishes broadcast domain boundaries by performing routing functions between virtual networks (VLANs) that are defined in the access layer (Figure 6).

Figure 6 Distribution level

The broadcast domain is the collection of all devices that receive broadcast messages from any device in this collection. These domains are usually restricted to routers because routers do not forward broadcast messages.

Virtual networks (VLANs) allow you to segment traffic on the switch into separate subnets. For example, at a university it is possible to divide traffic by faculty, students and visitors (guests). Distribution layer switches are typically high performance devices with high availability and redundancy to provide the required reliability.

The core level (Fig. 7) in the hierarchical network model is the high-speed backbone of the internetwork. The kernel layer is critical to the problem of interconnecting distribution layer devices, so it is very important that the kernel maintains high availability and is built on the principles of communication redundancy. The kernel aggregates traffic from all distribution layer devices, so it must be able to pass large amounts of data with minimal delays.

Figure 7. Network core

In small networks, the use of a model with a collapsed core is practiced - when the presentation layer and the core layer are combined into one.

Chapter 6

6.1 Analysis of the technical equipment and software of the enterprise

The company's computer network is based on the 100BASE-T standard to provide high-speed connection between computer equipment inside the office (100 Mb/s). Used 2 network switches (switch), supporting the 100BASE-T standard. The network is laid with shielded UTP 5e cable. At the same time, server equipment and workstations are equipped with network cards that also support the above standard. The SCS also includes: RJ-45 sockets, patch cords, cable boxes, cable channel.

Server equipment

The enterprise has a server that provides access to network resources (network drives), and also performs archival copying of user information. The server is based on a dual-core processor AMD Athlon 64 x2 has 4gb of RAM, 1 Tb of hard drive memory. The server also has communication properties: providing general access to the global Internet using NAT, FTP server, Firewall (iptables is used), traffic accounting and client administration.

Computer equipment

The computer equipment of the office is represented by 7 workstations for office employees with dual-core processors, complete with 23-inch LCD monitors. They have keyboards, manipulators of the "mouse" type. Additionally, network cards were installed.

Office equipment is represented mainly by models from HP. HP LaserJet P2015n/dn printers, HP LaserJet 3055 MFPs, Canon CanoScan LiDE 210 copiers/scanners.

Licensed Software

To ensure the legal use of software products, it is necessary to use licensed software. The following licensed software was purchased for the enterprises: 1) Microsoft Windows 8 Corporate; 2) 1C-Enterprise v.8.2. Other software products used in the enterprise are freely distributed under the GPL (Freeware) license.

The GNU General Public License (translated as the GNU General Public License, the GNU General Public License or the GNU General Public License) is a free software license created as part of the GNU project in 1988. It is also abbreviated as the GNU GPL or even just the GPL, if it is clear from the context that we are talking about this particular license (there are quite a few other licenses containing the words “general public license” in the title). The second version of this license was released in 1991, the third version, after many years of work and long discussion, in 2007. The GNU Lesser General Public License (LGPL) is a weakened version of the GPL for certain software libraries. The GNU Affero General Public License is an enhanced version of the GPL for programs intended to be accessed over the network.

6.2 Optimal variant of modernization of enterprise computer facilities

Description of the main stages of modernization

The purpose of upgrading computer components is to increase speed, performance, increase the number of disk spaces, gain opportunities to use additional functions, in a word - improve computer performance. The main benefits that you can get from upgrading your computer:

· The upgraded personal computer has the components you need;

· Thanks to modernization, the personal computer works faster and performs current tasks more efficiently;

· Modernization eliminates the hassle of replacing a personal computer.

However, we should not forget that when updated components appear in the computer configuration, a failure may occur due to the incompatibility of devices with each other, while the power supply may fail and you will have only yourself to blame.

There are two ways to plan an upgrade:

· Based on the tasks that the computer should perform;

· Based on the funds that can be invested.

Having decided to upgrade a computer, a person wants to get the maximum benefit, so it is necessary to calculate the costs and figure out which components are needed.

When expanding the capabilities of the system to solve problems, it is necessary to adhere to the following actions:

Determine what tasks the system should perform;

· Assess the capabilities of the current hardware and OS;

· Upgrade those components that do not meet the requirements obtained as a result of the assessment.

With the successful modernization of computer equipment, the main results can be:

· "Bottlenecks" in the system are eliminated;

· It becomes possible to use new software and hardware;

· Improving the quality of current tasks.

As a rule, bottlenecks can be eliminated in one of the following ways:

· Update video card;

· Increase the amount of RAM;

· Increase the speed of the processor;

· Increase the speed of your Internet connection.

The significance of the modernization of computer equipment is to maintain the operability of the computer as a whole complex, and separately of its components. The components of a personal computer need constant inspection and monitoring of its technical condition, since the performance of any of the constituent components is limited by a different period of operation, but with timely maintenance, the devices of a personal computer will last the prescribed working life.

In organizations, these tasks are solved in different ways. In some cases, own service units are created, but this way is very complicated from an organizational and technical point of view, requires serious material costs and can be economically justified only for very large local area networks.

Therefore, in most cases, contracts for the maintenance, repair and modernization of computer equipment are concluded with external organizations that have the necessary package of licenses, technical equipment, qualified personnel and established channels for the supply of spare parts and components. This path is preferred by budgetary organizations that operate small and medium-sized computing facilities.

Such contracts provide for regular scheduled maintenance of the entire fleet of computer equipment in accordance with the approved list.

At the request of the customer, other works can be additionally included in the list, for example, testing personal electronic computers for the presence of viruses, if necessary, their treatment.

The company decided to purchase eight Kingston SV300S37A 240G SSDs. To improve overall system performance.

Table 7. Modernization of equipment at the enterprise

6.3 Plan for the modernization of computers and the local network of the enterprise

The enterprise does not consider large-scale modernization. For a noticeable increase in system responsiveness, it was proposed to buy 8 Kingston SV300S37A/240G SSD drives.

6.4 Approximate amount of required upgrade costs

The approximate amount of necessary costs amounted to 40,048 rubles. (see table 7).

Chapter 7

7.1 Creation of a project of a unified information environment of the enterprise

To create a unified information environment of the enterprise, we needed the shareware program "Expert-SKS v1.5.1".

In order to create a project, you need to do the following:

· Open the program;

· Load the background;

· Set the scale;

· Set up jobs;

· Put a wardrobe;

· Stretch the track;

· Auto-routing the cable;

· Through the master of "cable channels" to make a cable channel.

Figure 8. Ready unified information environment

To create a unified enterprise information environment (see Fig. 8), we needed:

Table 8

Name

Quantity

Price

UTP cat.5e cable

Box 30x30

NETGEAR JGS524 Switch

Patch cord UTP Real cat.6, 1.2 m

RJ45 socket block

Socket 220V

RJ12 socket

RUB 16239.00

Patch panel UTP Real cat.6 24-port.

So, to transmit a frame of the minimum size, which, together with the preamble, has a length of 72 bytes, or 576 bits, it will take a time equal to 576 bt, and if we take into account the inter-frame interval of 96 bt, we get that the frame repetition period will be 672 bt.

At a transmission rate of 100 Mbps, this corresponds to a time of 6.72 µs. Then the frame rate, that is, the number of frames passing through the network in 1 second, will be 1 / 6.72 μs = 148,809 frames / s.

When transmitting a frame of the maximum size, which, together with the preamble, has a length of 1526 bytes or 12208 bits, the repetition period is 12 208 bt + 96 bt = 12 304 bt, and the frame rate at a transmission rate of 100 Mbps will be 1/123.04 µs = 8127 fps.

Knowing the frame rate and the size of the payload carried by each frame, it is not difficult to calculate the useful network bandwidth.

For the minimum frame length, the usable bandwidth is 46 bytes/frame 148,809 fps = 54.76 Mbps, which is only slightly more than half of the total maximum network bandwidth.

For the maximum frame size, the useful network bandwidth is 1500 bytes/frame 8127 fps = 97.52 Mbps.

Thus, in a Fast Ethernet network, the useful bandwidth can vary depending on the size of the transmitted frames from 54.76 to 97.52 Mbps, and the frame rate varies in the range from 8127 to 148809 fps.

If you need to measure network bandwidth, you can use the iperf console utility. Iperf is a cross-platform console client-server program designed to test the bandwidth of the Internet channel between two computers. The measurement is carried out as follows, on one PC we run iperf in the "server" mode, on the second in the "client" mode, indicating the ip-address of the first PC ("server"). Measured information is displayed after the set time. Conclusion:

According to the test results, the throughput in the direction from host 192.168.5.38 to host 192.168.5.39 approximately corresponds to the declared speed of 100 megabits.

Conclusion

The internship showed that this is an important element in the process of training a specialist in the field of computer equipment and computer networks, and I also gained skills in repairing office equipment. During the internship, I got the opportunity to see how various activities in the field of maintenance of VT and KS are carried out, as well as to apply the theoretical knowledge gained earlier. During the internship, I tried to complete the tasks assigned to me: Diagnosing computer problems in the enterprise, creating local networks and setting up active equipment.

Literature

1. Murakhovsky V.I.M91 PC iron. New opportunities. - St. Petersburg: Peter, 2005. - 592 p.

2. Kleymenov S. A. Administration in information systems. - M.: Publishing Center "Academy", 2010. - 272 p.

3. Buchek G. ASP.NET: Tutorial. - St. Petersburg: Peter, 2011

4. Mueller Scott. PC Upgrade and Repair, 18th edition. : Per. from English. -- M. : I.D. Williams”, 2009. -- 1280 p.

5. Popov I.I., Maksimov N.V. Computer networks. Textbook for students of institutions of secondary vocational education. - M.; Forum: Infra-M, 2012

Similar Documents

    Characteristics of the enterprise for the maintenance of computer equipment and computer networks. Consideration of the structure, goals and objectives of the service department, organization of the workplace, forms of remuneration. Learning the rules of working with e-mail.

    practice report, added 06/05/2014

    Features, differences, topology and functioning of local computer networks. Software for information and computing networks. Basic data transfer protocols, their installation and configuration. Authentication and authorization; Kerberos system.

    term paper, added 07/20/2015

    Creation of computer networks using network equipment and special software. Appointment of all types of computer networks. The evolution of networks. Differences between local networks and global networks. The trend towards convergence of local and global networks.

    presentation, added 05/04/2012

    Basic information about printers. The design of the laboratory stand. Software installation. Performance analysis. Goals and functions of the management of CJSC "Tirotex". Security measures in the maintenance of computer equipment.

    thesis, added 12/29/2014

    Architecture of construction of computer networks. Structure of the IEEE 802 standards. Network test programs. Crimping tool for connectors. General local settings of computers. Determination of the composition and structure of personnel. Calculation of the working time budget.

    thesis, added 01/14/2015

    Functions of computer networks (storage and processing of data, user access to data and their transmission). The main indicators of the quality of local networks. Classification of computer networks, their main components. Network topology, equipment characteristics.

    presentation, added 04/01/2015

    The device of computer networks. Systems for information transmission, consisting of terminals, servers and a communication medium. Technical, software and information means of networks. Classification of computer networks. network operating systems.

    term paper, added 07/10/2014

    The concept of a local area network, the architecture of building computer networks. Local computer settings. Setting up an administrator account. Configuring anti-virus security. The structure of the computer network maintenance department.

    thesis, added 01/15/2015

    Classification of computer networks in the technological aspect. The device and principle of operation of local and global networks. Circuit-switched networks, telecom operator networks. Topologies of computer networks: bus, star. Their main advantages and disadvantages.

    abstract, added 10/21/2013

    General information about the organization and its information system. The main and peripheral equipment of employees of the enterprise. Diagnostics and maintenance of computer equipment, its software. Service complex PC-tester.

A modern computer is a complex multi-component hardware and software device that requires appropriate maintenance.

Maintenance- this is a complex of operations to maintain the operability or serviceability of products (in particular, it can be a PC and other VT).

The task of maintenance is to ensure reliable (correct and uninterrupted) operation of computer equipment.

Directions of work on TO SVT:

1. Ensuring the operability of computer equipment.

2. Ensuring the operability of operating systems and application software.

3. Ensuring the integrity, safety and performance of information arrays

4. Ensuring the operability of peripheral, network and communication equipment

All activities within the framework of TO are divided into:

Technical condition control;

preventive maintenance;

Current maintenance.

Technical condition control- serves to control the operation of the SVT, localize the places of malfunction, exclude the influence of random failures. In modern SVTs, such control is carried out mainly with the help of the SVTs themselves.

Preventive Maintenance - measures aimed at maintaining the specified technical condition of the SVT for a certain period of time and extending the technical life.

There are two type of preventive measures : Active; Passive

1.Active preventive maintenance - operations, the main purpose of which is to extend the uptime of the PC. It comes down mainly to periodic cleaning of both the entire system and its individual components.

Active preventive maintenance methods: Backing up the system Cleaning Installing chips in their places Cleaning connector contacts Cleaning the keyboard and mouse Maintenance of hard drives File defragmentation Anti-virus measures

2. Passive Prevention - measures aimed at protecting the computer from external adverse effects (installation of protective devices in the power supply network, maintaining cleanliness and an acceptable temperature in the room, reducing vibration levels, etc.).

Passive preventive maintenance methods: Acceptable, supportive work environment Warming up and cooling down the computer Power cycles and shutdowns Power line noise Electrostatic charges

Types of maintenance (by frequency):

regulated;



periodic;

with periodic control;

with continuous monitoring.

A detailed description of maintenance work is given in the operating instructions for the individual devices supplied by the manufacturer.

Preventive control carried out by hardware and software. Hardware control is carried out with the help of special equipment, instrumentation and stands and software and hardware systems. Program control requires the availability and use of various testing tools (software). Software and hardware control should be considered the most effective in the presence of a developed system of hardware control in the VT.

Methods of maintenance (service) on the basis of organizational measures and a set of technological operations are divided into: corporate; autonomous; specialized; combined.

According to the nature of the implementation, maintenance methods are divided into: individual; group; centralized. Centralized maintenance is a more progressive form of maintenance of VT and is a network of regional service centers and their branches of maintenance points.

Automated control systems Control is a check of the correct operation of an object (element, node, device). Whether the device is working correctly or not, the control circuit generates a signal.

Error detection system(automatic control and diagnostic system) Diagnosis process can be divided into elementary checks elementary check consists in submitting a test impact to the object and in measuring (evaluating) the response of the object to this impact. Diagnostics this is a sequential control aimed at finding a faulty element in the diagnosed object.

Error detection algorithm (system of automatic control and diagnostics) Error signal Recognition (diagnosis) of the nature of the error (failure, failure) Restart of the program (operation) if the error is caused by a failure ) of the failed element



So, main types of control: program; hardware. Modes of use of control: operational (during the operation of the PC), preventive checks, automatic or with the involvement of an operator.

Program control based on the use of special programs that control the operation of the PC. It is divided into: program-logical and test

Program logic control is based on the fact that additional operations are introduced into the main working program, during which redundant information is obtained that is necessary for detecting and correcting errors. It does not require the use of special equipment, but leads to an increase in the time for solving the problem.

Test control designed to check the correct operation of the PC using special test programs. Control with the help of tests is reduced to the performance of certain actions by the machine on the initial numbers and comparing the results with known ones. If the responses do not match, an error is generated.

PC tests are divided into: adjustment, verification, diagnostic.

Hardware controls - are created by introducing special control equipment into the PC (which works independently of the program and OS, and does not reduce performance). However: leads to complication and rise in cost and decrease in the general reliability.

Modern combined control method is a combination of software and hardware.

Romanov VP Maintenance of computer facilities Educational-methodical manual Preventive voltage change allows to identify the weakest schemes of the system. Typically, circuits must maintain their performance when the voltage changes within the specified limits. However, aging and other factors cause gradual changes in the performance of the circuits, which can be detected on prophylactic regimens. CVT proactive voltage testing detects predictable faults, thereby reducing the number of hard-to-locate faults that lead to failures. During the monthly preventive maintenance, all necessary work is carried out, provided for in the operating instructions for external devices. With a semi-annual (annual) maintenance (SRT), the same work is carried out as with a monthly maintenance. As well as all types of semi-annual (annual) maintenance work: disassembly, cleaning and lubrication of all mechanical components of external devices with their simultaneous adjustment or replacement of parts. In addition, the cables and power busbars are inspected. A detailed description of preventive maintenance is given in the operating instructions for individual devices attached to the SVT by the manufacturer. When maintaining on a technical condition, maintenance work is unscheduled and is performed as necessary based on the state of the object (test results), which corresponds to maintenance with continuous monitoring or maintenance with periodic monitoring. Unscheduled preventive maintenance includes extraordinary preventive maintenance, appointed mainly after the elimination of serious malfunctions of the computer. The scope of preventive measures is determined by the nature of the malfunction and its possible consequences. The conclusion of the SVT for unscheduled preventive maintenance can also be carried out when the number of failures that occur over a certain set period of time exceeds the allowable values. The system requires the presence and correct use of various testing tools (software). The system allows minimizing the cost of operating the WTS, but the readiness of the WTS for use is lower than when using a planned preventive service station. With a combined maintenance system, “junior types of maintenance” are carried out as necessary, as with maintenance on condition, based on the operating time and operating conditions of a particular type of computer equipment or the results of its testing. The implementation of "senior types of maintenance" and repairs is planned. The rational organization of the service station should provide for the accumulation of static material based on the results of the operation of the SVT in order to summarize, analyze and develop recommendations for improving the structure of service, increasing the efficiency of using the SVT, and reducing operating costs. 21 Romanov V. P. Maintenance of computer equipment Educational-methodical manual 1.2.2. Methods of maintenance (repair) of SVT Maintenance (service), regardless of the accepted maintenance system, can be organized using known maintenance methods. The method of maintenance (repair) of SVT is determined by a set of organizational measures and a set of technological operations for maintenance (repair). Methods of maintenance (repair) are subdivided on the basis of the organization into: branded; autonomous; specialized; combined. The proprietary method consists in ensuring the operable state of the SVT by the manufacturer, which carries out maintenance and repair of the SVT of its own production. The autonomous method consists in maintaining the working state of the SVT during the period of operation, in which the maintenance and repair of the SVT is performed by the user on his own. A specialized method is to ensure the operable state of the SVT by a service company that performs maintenance and repair of the SVT. The combined method consists in ensuring the operable state of the CVT by the user together with the service enterprise or with the manufacturer and is reduced to the distribution of work on maintenance and repair of the CVT between them. According to the nature of the implementation, the methods of maintenance (repair) are divided into: -individual; - group; - centralized. With individual maintenance, the maintenance of one SVT is provided by the forces and means of the personnel of this SVT. The set of equipment for this type of maintenance includes: - equipment for monitoring the element base of SVT and power supply: - control and commissioning equipment for autonomous testing and repair of SVT facilities; - a set of electrical measuring equipment necessary for the operation of SVT; - a set of programs (tests) for checking the operation of the SVT; - tools and repair accessories; - auxiliary equipment and devices; -special furniture for storage of property and equipment for the workplaces of the operator and adjuster of the element base. 22 Romanov V. P. Maintenance of computer equipment Educational and methodical manual All of the listed equipment provides for the possibility of operational troubleshooting and troubleshooting using bench and instrumentation. This kit, in combination with the necessary spare parts (spare tools, devices) should provide the specified recovery time for the SVT. If the necessary service equipment and qualified technical personnel are available, individual service can significantly reduce the recovery time of the SVT, but at the same time, significant expenses are required for the maintenance of technical personnel and service equipment. Efficiency of the CVT to a greater extent depends on the qualifications of the maintenance personnel, the timeliness of preventive and repair work and the quality of their implementation. Group maintenance is used to service several SVT, concentrated in one place, by means and forces of special personnel. The structure of the equipment composition for a group service is the same as for an individual one, but it assumes the presence of a larger number of equipment, devices, etc., which excludes unjustified duplication. The group service package includes at least a set of CBT individual service equipment, supplemented with equipment and accessories from other CBTs. Centralized maintenance is a more advanced form of CBT maintenance. The centralized maintenance system is a network of regional service centers and their branches - maintenance points. With centralized maintenance, the cost of maintaining technical personnel, service equipment and spare parts is reduced. Such maintenance involves the repair of elements, assemblies and blocks of SVT on the basis of a special workshop equipped with all necessary equipment and instruments. In addition, centralized maintenance allows you to concentrate in one place materials on the statistics of failures of elements, units, blocks and devices of the CVT, as well as obtain operational data from dozens of the same type of CVT with direct reliability control. All this makes it possible to use information to predict the required spare parts and accessories, to issue recommendations for the operation of SVT. 1.2.3. Types of repair of SVT. The type of repair is determined by the conditions for its implementation, the composition and content of the work performed at the SVT. Repair of SVT is divided into types: current; average; capital (for mechanical and electromechanical SVT). Current repairs should be carried out to restore the operability of the SVT without the use of stationary means of technological equipment at the place of operation of the SVT. 23 Romanov V. P. Maintenance of computer equipment Educational and methodical manual During the current repair, the control of the computer equipment for operation is carried out using the appropriate means of verification. Medium repairs should be carried out to restore the operability of the SVT, or components of the SVT using specialized stationary technological equipment. During a medium repair, the technical condition of individual components of the SVT is checked with the elimination of detected malfunctions and bringing the parameters to the prescribed standards. Overhaul should be carried out to restore the operability and resource of the SVT by replacing or repairing the components of the SVT, including the basic ones, using specialized stationary means of technological equipment in stationary conditions. Medium and overhauls of SVT or their components are, as a rule, scheduled and are carried out on products for which overhaul resources are determined and (or) the service life (resource) is limited. 1.2.4. Main characteristics of STO One of the main characteristics of STO is the duration of SVT prevention, which is determined by the formula r n t t profPi t t. . Вj Ф К i1 j1 where tПi is the total time for carrying out preventive measures performed sequentially; tВj is the recovery time for n faults during the preventive maintenance period; tF.C. – time of functional control. The duration of prevention is largely influenced by the degree of qualification of the attendants. An analysis of static data on the operation of a specific SVT makes it possible to give recommendations on replacing less frequent preventive maintenance with more frequent preventive maintenance (for example, daily to weekly). This allows you to increase the time of using the SVT directly for computing work. Another important quantitative characteristic is the coefficient of efficiency of prevention kprof., which characterizes the degree of increase in the reliability of SVT due to the prevention of failures at the time of prevention. Prevention efficiency coefficient is calculated by the formula nprof. kpof. ntotal where nprof. - the number of failures identified during the preventive maintenance; ngeneral + nprof. is the total number of failures of the SVT for the period of operation. 24 Romanov V. P. Maintenance of computer equipment Educational and methodological manual 1.2.5. Calculation of the number of employees involved in service maintenance and current repair of computer equipment Calculation of the number of employees required to perform service maintenance and current repair of PC (Chn) is carried out according to the formula: ; Tob - the total time spent on maintenance of computer equipment is calculated by the formula: where Tr - time standards for a certain type of work; n is the number of types of work performed; K \u003d 1.08 - a correction factor that takes into account the time spent on work that is not provided for by the norms and is of a one-time nature. The standard time spent on a certain type of work is calculated by the formula: where Hvri is the norm of time for performing the i-th operation per unit of measurement in a certain type of normalized work; Vi is the volume of operations of the i-th type, performed per year (determined according to accounting and reporting data). The range of changes from 1 to i is the number of normalized operations in a certain type of work. The basis for compiling the staffing table for the number of employees is the average headcount (Nsp), which is calculated by the formula: Nsp \u003d Chn x Kn, where Kn is the coefficient that takes into account the planned absenteeism of employees during vacation, illness, etc., is determined by the formula: , where % of planned absenteeism is set according to accounting data. 25 Romanov V.P. Maintenance of computer equipment Educational and methodological manual EXAMPLE: CALCULATION OF THE NUMBER OF EMPLOYEES ENGAGED IN THE SERVICE SERVICE OF SVT Table 1 Repair and preventive work Volume Normative Norm of work for e costs Unit of time per No. Type of work performed year in time for measurements unit units amount of work, measurements, h. measurements h. Weekly maintenance 1. Checking the performance of devices on tests in one device 1654 0.13 215.0 in accelerated mode 2. Cleaning the magnetic heads of external memory devices one head 1654 0.09 148.9 (floppy disk drives) 3. Checking and removing computer viruses on one PC 1654 0.20 330.8 external memory devices of the PC 4. Defragmenting drives on hard disks one 1654 0.27 446.6 magnetic disk drive 5. Checking lines and local computing devices one LAN 94 0.19 17.9 network (LAN) using offline tests Monthly maintenance 6. Full testing of all PC devices with the issuance of one PC 382 1.70 649.4 protocol, including LAN, detection and correction of errors in the distribution of disk space 7. Supply of updated anti-virus programs and a complete one PC 382 0.48 183.4 check disk memory for viruses 8. Lubrication of mechanical devices of the vehicle (NGMD, streamers, one 763 0.34 259.4 printers) device 9. Cleaning of dust from the internal volumes of the PC with disassembly one PC 382 0.37 141.3 10. Cleaning of screens of video monitors from dust and dirt, one 382 0.35 133.7 adjustment and adjustment, cleaning of internal volumes from dust video monitor 11. Cleaning and washing of printheads of matrix and one printer 382 0.17 65.0 of inkjet printers 12. Cleaning and washing of pens and lubrication of mechanical components one plotter plotter 13. Cleaning of unused toner of printing elements one printer 5 0.34 1.7 laser printers, cleaning and washing optics and timely refilling of toner 14. Cleaning of dust and other washing of reading element in one scanner 1 0.28 0.28 scanners and lubrication of mechanical parts Six months maintenance for personal computers (PC) and peripheral equipment 15. Dust cleaning of internal volumes of PC power supplies, one PC 64 0.80 51.2 cleaning and lubrication of fans 16. Cleaning the screens of video monitors and LCD panels from dust one 636 0.22 139.9 and dirt, adjusting and adjusting the video monitor 17. Cleaning the internal volumes of external modems from dust, one 256 0.47 120.3 independent power supply devices ( UPS) with subsequent testing of their device Total Tr1 2904.8 1.2.3.4.5.6 3. Full testing of external memory devices on one 516 0.35 180.6 magnetic disk and tape device 4. Repair of PC power supplies with replacement of faulty one unit 318 2.50 795.0 elements and subsequent power adjustment 5. Repair of individual units (boards) PC (video controllers, one block 1908 1.15 2194.2 input-output controllers, modem boards, etc.) with replacement of microcircuits (CHIP) 6. one 318 1.20 381.6 Keyboard repair keyboard 7. Repair of laser printers without optical alignment one printer 4 1.60 6.4 systems 8. Adjustment of laser printers optics one printer 4 0.50 2.0 9. Repair of inkjet printers one printer 12 1.80 21.6 10. Repair and adjustment of graph plotters one - - - 26 Romanov V.P. 11. Repair of flatbed scanners one scanner 1 1.50 1.5 14. Repair of Pentium system board one board 6 1.60 9.6 15. Repair of SVGA 14" video monitor (power supply unit) one monitor 150 1.50 225.0 16. Repair of 14" SVGA video monitor (color block) one monitor 150 0.80 120.0 17. Repair of 14" SVGA video monitor (scanner) one monitor 150 0.70 105.0 18. Repair of 21" SVGA video monitor one monitor - - - 19. Repair of video monitors with CRT replacement, adjustment and one monitor 318 2.30 731.4 adjustment 20. Repair of 9 pin printers (control board) one printer 268 1.90 509.2 21. Repair of 24 pin printers (control board) one printer 50 1.90 95.0 22. Printer repair 9 pin (print head) one printer 268 1.10 294.8 23. Repair of printers 24 pin (print head) one printer 50 1.20 60.0 24. one 318 1.00 318.0 Replacement of printer motors of any type motor 25. Replacement of the control board HDD IDE one board 314 0.40 125.6 26. Replacement of the control board HDD SCSI one board 4 0.40 1.6 28. one 318 1.10 349.8 Repair of HDD 3.5" 1.44 MB drives 29. one 318 0.50 159.0 Repair of manipulators Mouse manipulator Total Tr2 7893.8 Total Tr = Tr1 + Tr2 = 10798.6 Standard time spent on the amount of work per year is: n SUM Tr = Tr1 + Tr2; Tr = 2904.8 + 7893.8 = 10798.6 h. 1 Thus, the total time spent on maintenance of the PC (Tob) is equal to: n Tob = SUM Tr x K; Tob = 10798.6 x 1.08 = 11662.49 h. . Nr.in 2000 The required average number of employees engaged in servicing the PC is equal to: Nsp = Chn x Kn = 5.83 x 1.05 = 6.12 people, where Kn is the coefficient of planned absenteeism of employees during vacation, illness, etc. d. is determined according to accounting data and conditionally in the example 5% is accepted. The number of staff is Nsh = Chsp = 6.12 people. - about 6 people 1.2.6. Material support for the maintenance of the SVT The quality of the operation of the SVT depends on the provision of spare parts, various devices and consumables, the provision of instrumentation, tools, etc. It is also important to create the necessary conditions for the normal functioning of computing facilities (temperature and humidity conditions, power mode, etc. etc.) and for service personnel (climatic conditions, noise level, illumination, etc.). The operation of the CVT must be carefully planned. Planning should cover the whole range of issues related both to the compilation of the general program of work of the CVT, the distribution of machine time, etc., and to the entire work of the maintenance personnel. The rational organization of operation should provide for the accumulation of static material based on the results of the operation of the SVT in order to summarize, analyze and develop recommendations for improving the structure of service, increasing the efficiency of using the SVT, and reducing operating costs. 27 Romanov V. P. Maintenance of computer equipment Educational-methodical manual 1.3. Systems of automated control, automatic recovery and diagnostics, their relationship Control is a check of the correct operation of an object (element, node, device). The device works correctly - the control circuit does not generate any signals (in some systems, however, a normal operation signal is generated), the device does not work correctly - the control circuit generates an error signal. This is where the controls end. In other words, control is a check: right - wrong. The diagnosis process can be divided into separate parts called elementary checks. An elementary check consists in applying a test impact to the object and measuring (evaluating) the object's response to this impact. The diagnostic algorithm is defined as a set and sequence of elementary checks together with certain rules for analyzing the results of the latter in order to find a place in an object whose parameters do not meet the specified values. Consequently, diagnostics is also control, but sequential control, aimed at finding a faulty place (element) in the diagnosed object. Typically, diagnostics begin with an error signal generated by the control circuits of the CBT. An automatic control and diagnostic system is often referred to as an error detection system. The principle of organizing an automatic control system. The occurrence of an error in any CVT device causes an error signal, according to which the execution of the program is suspended. Upon an error signal, the diagnostic system immediately starts working, which, in cooperation with the control system of the SVT, performs the following functions: 1) recognition (diagnosis) of the nature of the error (failure, failure); 2) restarting the program (part of the program, operation) if the error is caused by a failure; 3) localization of the fault location, if the error is caused by a failure, with its subsequent elimination by automatic replacement (or shutdown) of the failed element or replacement with the help of an operator; 4) recording in the memory of the CVT information about all failures and failures that have occurred for further analysis. 1.3.1. Diagnostic Programs There are several types of diagnostic programs for the PC (some of which are included with the computer) that allow the user to diagnose the cause of problems with the computer. The diagnostic programs used in the PC can be divided into three levels: BIOS diagnostic programs - POST (Power-On Self Test - self-test procedure when turned on). Runs every time the computer is turned on. Diagnostic programs for operating systems. Windows 9x and Windows XP/2000 are supplied with several diagnostic programs for 28 VP Romanov Maintenance of Computer Equipment Educational and methodical manual for checking various computer components. Diagnostic programs of firms - manufacturers of equipment. Diagnostic programs for general purposes. Such programs, which provide thorough testing of any PC-compatible computers, are produced by many companies. Power-on Self Test (POST) POST is a series of short routines stored in the ROM BIOS on the motherboard. They are designed to check the main components of the system immediately after it is turned on, which, in fact, is the reason for the delay before loading the operating system. Each time the computer is turned on, it automatically checks its main components: processor, ROM chip, system board accessories, RAM, and main peripherals. These tests are fast and not very thorough when a faulty component is found, a warning or error message (failure) is issued. Such faults are sometimes referred to as fatal errors. The POST procedure usually provides three ways to indicate a malfunction: beeps, messages displayed on the monitor screen, hexadecimal error codes issued to the I / O port. Beep Error Codes from POST When POST detects a problem, the computer emits distinctive beeps that can help identify the failed item (or group of items). If the computer is working properly, then when you turn it on, you will hear one short beep; if a malfunction is detected, a whole series of short or long beeps is issued, and sometimes a combination of them. The nature of the sound codes depends on the BIOS version and the company that developed it. POST Error Messages On most PC-compatible models, the POST procedure displays the progress of the computer's RAM test on the screen. If an error is detected during the POST procedure, a corresponding message is displayed, usually in the form of a numerical code of several digits, for example: 1790- Disk 0 Error. Using the operation and service manual, you can determine which malfunction corresponds to this code. Error Codes POSTed to I/O Ports A lesser known feature of this procedure is that at the start of each test at a specific I/O port address, POST issues test codes that can only be read by a special card installed in the expansion slot. adapter. The POST board is installed in the expansion slot. Two-digit hexadecimal numbers will quickly change on its built-in indicator at the moment of POST procedure execution. If the computer unexpectedly stops testing or "freezes", this indicator will display the code of the test during which the failure occurred. This allows you to significantly narrow the search for a faulty element. Most computers post codes to I/O port 80h. Operating System Diagnostic Programs DOS and Windows contain several diagnostic programs. Which provide performance of testing of components of SVT. Modern diagnostic programs have graphical shells and are part of the operating system. Such programs are, for example: a disk cleaning utility from unnecessary files; utility to check the disk for errors; utility for defragmenting files and free space; data archiving utility; file system conversion utility. All of these programs are also available in Windows. Diagnostic programs of firms - manufacturers of equipment Equipment manufacturers produce special specialized programs for diagnosing specific equipment, a specific manufacturer. The following groups of programs can be distinguished: Hardware diagnostic programs Many types of diagnostic programs are designed for certain types of hardware. These programs are supplied with the devices. SCSI Device Diagnostic Programs Most SCSI adapters have an on-board BIOS that allows you to configure and diagnose the adapter. Network Adapter Diagnostic Software Some NIC manufacturers also offer diagnostic software. With these programs, you can check the bus interface, control the memory installed on the board, interrupt vectors, and also perform a cyclic test. These programs can be found on the floppy disk or CD that came with the device, or you can visit the manufacturer's Web site. General purpose diagnostic programs Most test programs can be run in batch mode, allowing you to run a series of tests without operator intervention. You can create an automated diagnostic program that is most effective if you need to identify possible defects or run the same sequence of tests on multiple computers. These programs check all types of system memory: basic (base), extended (expanded) and additional (extended). The location of a fault can often be pinpointed down to a single chip or module (SIMM or DIMM). thirty