Check Disk - PowerPoint PPT Presentation

1 / 47
About This Presentation
Title:

Check Disk

Description:

Run Disk Defragmenter when the computer will receive the least usage. ... an address with a comma or hyphen between the network number and Media Access ... – PowerPoint PPT presentation

Number of Views:29
Avg rating:3.0/5.0
Slides: 48
Provided by: MicrosoftC125
Category:
Tags: check | disk | hyphen

less

Transcript and Presenter's Notes

Title: Check Disk


1
Check Disk
2
Disk Defragmenter
3
Using Disk Defragmenter Effectively
  • Run Disk Defragmenter when the computer will
    receive the least usage.
  • Educate users to defragment their local hard
    disks.
  • Analyze the target volume before you install
    large applications.
  • After you delete a large number of files or
    folders, analyze your hard disk.
  • Consider performing scheduled network-wide
    defragmentation from a central location.

4
Data Compression
  • Compressed files can be read by and written to
    any Microsoft Windows-based or MS-DOS-based
    application.
  • NTFS allocates disk space based on the
    uncompressed file size.

5
Compressing Files and Folders
6
Selecting an Alternate Display Color
  • You can select a different display color for
    compressed files and folders.
  • You can change the display color by selecting
    Folder Options from the Tools menu.

7
Copying and Moving Compressed Files and Folders
  • Copying a file or folder within an NTFS volume
  • Moving a file or folder within an NTFS volume
  • Copying a file or folder between NTFS volumes
  • Moving a file or folder between NTFS volumes
  • Moving or copying a file or folder to a FAT
    volume
  • Moving or copying a compressed file or folder to
    a floppy disk

8
Using NTFS Compression
  • Select file types to compress based on the
    anticipated resulting file size.
  • Do not store compressed files in a compressed
    folder.
  • Use a different display color for compressed
    folders and files.
  • Compress static data rather than data that
    changes frequently.

9
Disk Quotas
  • Disk quotas track and control disk usage on a
    per-user, per-volume basis.
  • Disk quotas have several important
    characteristics.
  • You can use disk quotas to perform a number of
    tasks related to monitoring and controlling hard
    disk space usage.

10
Setting Disk Quotas
11
Determining the Status of Disk Quotas
  • You can determine the status of disk quotas in
    the Properties dialog box for a disk.
  • The traffic light colors indicate the status of
    disk quotas.

12
Enforcing Disk Quotas
  • You can configure the disk space limit and the
    warning level for one or more specific users.
  • You can monitor usage for all users who have
    copied, saved, or taken ownership of files and
    folders in a volume.
  • Volume usage is tracked for all users owning
    files on a volume where the disk quota system is
    active.

13
Guidelines for Using Disk Quotas
  • If necessary, log on as Administrator to install
    additional Microsoft Windows 2000 components and
    applications.
  • You can monitor hard disk usage and generate hard
    disk usage information without preventing users
    from saving data.
  • Set more restrictive default limits for all user
    accounts, and then modify the limits if
    necessary.
  • Set disk quotas on shared volumes to limit
    storage for users.
  • Delete disk quota entries for users who no longer
    store their files on a volume.
  • Remove files before deleting a quota entry for a
    user account.

14
Introduction to Simple Network Management
Protocol (SNMP)
15
Management Systems and Agents
  • The network management station (NMS) does not
    have to run on the same computer as the SNMP
    agent.
  • The NMS can request information from SNMP agents.
  • SNMP agents provide information about activities
    that occur at the IP network layer and respond to
    requests for information.
  • Agents do not originate messages except a trap
    message that is triggered by a specific event.

16
Management Information Base (MIB)
  • A MIB is a container of objects that represent a
    particular type of information.
  • All the information that a management system
    might request is stored in various MIBs.
  • A MIB defines values for each object it contains.
  • Each object in a MIB has a unique identifier that
    contains information.

17
SNMP Messages
18
Defining SNMP Communities
19
Managing the SNMP Service
20
SNMP Service Properties
  • You can configure how the SNMP service starts,
    logs on to the system, and recovers from an
    abnormal termination of the service or operating
    system.
  • You can specify a display name, description,
    startup type, and start parameters.
  • The Dependencies tab provides a list of services
    that depend on the SNMP service and those that
    the SNMP service depends on.

21
SNMP Agent Properties
  • The SNMP agent provides the related management
    system with information on activities that occur
    at the IP network layer.
  • You can configure the agent properties on the
    Agent tab of the SNMP Service Properties dialog
    box.
  • The Agent tab lists the services that you can
    select.

22
Trap Properties
  • SNMP traps can be used for limited security
    checking.
  • You can configure trap destinations on the Traps
    tab of the SNMP Service Properties dialog box.

23
Security Properties
  • Send authentication traps
  • Accepted community names
  • Community rights
  • Accept SNMP packets from any host
  • Only accept SNMP packets from these hosts

24
Event Viewer
  • SNMP error handling has been improved in Windows
    2000.
  • Improved error handling is integrated with Event
    Viewer.
  • Use Event Viewer if you suspect a problem with
    the SNMP service.

25
WINS Service
  • When querying WINS server MIBs, you might need to
    increase the SNMP time-out period.
  • If some WINS queries work and others time out,
    increase the time-out period.

26
IPX Addresses
  • An Error message occurs when the IPX address has
    been entered incorrectly.
  • The SNMP service does not recognize an address
    with a comma or hyphen between the network number
    and Media Access Control (MAC) address.
  • The address used for an IPX trap destination must
    follow the IETF defined 8.12 format.

27
SNMP Service Files
28
Performance Console
29
System Monitor Snap-In
  • Performance Monitor has been replaced by System
    Monitor.
  • The System Monitor snap-in allows you to perform
    a number of tasks.
  • You can collect and view extensible data about
    the usage of hardware resources and the activity
    of system services.
  • You can define the data that you want the graph
    to collect.

30
System Monitor Interface
31
Monitoring System and Network Performance
  • Network activity can influence system
    performance.
  • System Monitor enables you to track network and
    system activity.
  • You should use specific counters as part of your
    normal monitoring configuration.
  • Monitoring network activity involves examining
    performance data at each network layer.
  • You should begin with the lowest-level components
    and work your way up.
  • Establish a baseline for network performance.

32
Disk Objects and the Diskperf Utility
  • Two primary disk objects contain counters in
    System Monitor PhysicalDisk and LogicalDisk.
  • The physical disk performance counters are
    enabled, and the logical disk performance
    counters are disabled.
  • Use the Diskperf utility to enable and disable
    the counters.
  • There is a small performance cost for running
    these counters.

33
Collecting Performance Data
  • Collect performance data automatically from local
    or remote computers.
  • View logged counter data or export the data.

34
Using the Performance Logs and Alerts Snap-In
  • Collect data in a comma-delimited or
    tab-separated format.
  • View counter data during collection and after
    collection has stopped.
  • Define start and stop times, file names, file
    sizes, and other parameters.
  • Manage multiple logging sessions from a single
    console window.
  • Set an alert on a counter.

35
Recording Performance Data
  • Start and stop logging.
  • Create trace logs.
  • Define a program that runs when a log is stopped.
  • Configure additional settings for automatic
    logging.

36
Performance Logs and Alerts Interface
37
Introduction to Network Monitor
  • Tracks network throughput in terms of captured
    network traffic
  • Monitors the network data stream on the local
    network segment
  • Can capture all local traffic or a subset of
    frames
  • Captures only those frames sent to or from the
    local computer
  • Uses a network driver interface specification
    (NDIS) feature to copy all frames to its capture
    buffer

38
Installing Network Monitor Tools
  • Network Monitor Tools include the Network Monitor
    snap-in and the Network Monitor driver.
  • These tools are not installed by default.
  • You can use the Add/Remove Programs utility in
    Control Panel to install the Network Monitor
    Tools.

39
Capturing Frame Data
40
Using Capture Filters
41
Displaying Captured Data
42
Using Display Filters
43
Network Monitor Performance Issues
  • Network Monitor creates a memory-mapped file for
    its capture buffer.
  • Although you cannot adjust the frame size, you
    can store only part of the frame.
  • You can run Network Monitor in the background to
    reduce the amount of system resources necessary
    to operate the program.

44
Overview of Task Manager
  • Task Manager provides information about programs
    and processes running on your computer.
  • You can use Task Manager to monitor key
    indicators of your computers performance.
  • The Task Manager interface contains three tabs
    Applications, Processes, and Performance.
  • You can update Task Manager by clicking Refresh
    Now on the View menu.

45
Applications Tab
46
Processes Tab
47
Performance Tab
Write a Comment
User Comments (0)
About PowerShow.com