1 / 47

Check Disk

Check Disk. Disk Defragmenter. Using Disk Defragmenter Effectively. Run Disk Defragmenter when the computer will receive the least usage. Educate users to defragment their local hard disks. Analyze the target volume before you install large applications.

Télécharger la présentation

Check Disk

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Check Disk

  2. Disk Defragmenter

  3. Using Disk Defragmenter Effectively • Run Disk Defragmenter when the computer will receive the least usage. • Educate users to defragment their local hard disks. • Analyze the target volume before you install large applications. • After you delete a large number of files or folders, analyze your hard disk. • Consider performing scheduled network-wide defragmentation from a central location.

  4. Data Compression • Compressed files can be read by and written to any Microsoft Windows-based or MS‑DOS-based application. • NTFS allocates disk space based on the uncompressed file size.

  5. Compressing Files and Folders

  6. Selecting an Alternate Display Color • You can select a different display color for compressed files and folders. • You can change the display color by selecting Folder Options from the Tools menu.

  7. Copying and Moving Compressed Files and Folders • Copying a file or folder within an NTFS volume • Moving a file or folder within an NTFS volume • Copying a file or folder between NTFS volumes • Moving a file or folder between NTFS volumes • Moving or copying a file or folder to a FAT volume • Moving or copying a compressed file or folder to a floppy disk

  8. Using NTFS Compression • Select file types to compress based on the anticipated resulting file size. • Do not store compressed files in a compressed folder. • Use a different display color for compressed folders and files. • Compress static data rather than data that changes frequently.

  9. Disk Quotas • Disk quotas track and control disk usage on a per-user, per-volume basis. • Disk quotas have several important characteristics. • You can use disk quotas to perform a number of tasks related to monitoring and controlling hard disk space usage.

  10. Setting Disk Quotas

  11. Determining the Status of Disk Quotas • You can determine the status of disk quotas in the Properties dialog box for a disk. • The traffic light colors indicate the status of disk quotas.

  12. Enforcing Disk Quotas • You can configure the disk space limit and the warning level for one or more specific users. • You can monitor usage for all users who have copied, saved, or taken ownership of files and folders in a volume. • Volume usage is tracked for all users owning files on a volume where the disk quota system is active.

  13. Guidelines for Using Disk Quotas • If necessary, log on as Administrator to install additional Microsoft Windows 2000 components and applications. • You can monitor hard disk usage and generate hard disk usage information without preventing users from saving data. • Set more restrictive default limits for all user accounts, and then modify the limits if necessary. • Set disk quotas on shared volumes to limit storage for users. • Delete disk quota entries for users who no longer store their files on a volume. • Remove files before deleting a quota entry for a user account.

  14. Introduction to Simple Network Management Protocol (SNMP)

  15. Management Systems and Agents • The network management station (NMS) does not have to run on the same computer as the SNMP agent. • The NMS can request information from SNMP agents. • SNMP agents provide information about activities that occur at the IP network layer and respond to requests for information. • Agents do not originate messages except a trap message that is triggered by a specific event.

  16. Management Information Base (MIB) • A MIB is a container of objects that represent a particular type of information. • All the information that a management system might request is stored in various MIBs. • A MIB defines values for each object it contains. • Each object in a MIB has a unique identifier that contains information.

  17. SNMP Messages

  18. Defining SNMP Communities

  19. Managing the SNMP Service

  20. SNMP Service Properties • You can configure how the SNMP service starts, logs on to the system, and recovers from an abnormal termination of the service or operating system. • You can specify a display name, description, startup type, and start parameters. • The Dependencies tab provides a list of services that depend on the SNMP service and those that the SNMP service depends on.

  21. SNMP Agent Properties • The SNMP agent provides the related management system with information on activities that occur at the IP network layer. • You can configure the agent properties on the Agent tab of the SNMP Service Properties dialog box. • The Agent tab lists the services that you can select.

  22. Trap Properties • SNMP traps can be used for limited security checking. • You can configure trap destinations on the Traps tab of the SNMP Service Properties dialog box.

  23. Security Properties • Send authentication traps • Accepted community names • Community rights • Accept SNMP packets from any host • Only accept SNMP packets from these hosts

  24. Event Viewer • SNMP error handling has been improved in Windows 2000. • Improved error handling is integrated with Event Viewer. • Use Event Viewer if you suspect a problem with the SNMP service.

  25. WINS Service • When querying WINS server MIBs, you might need to increase the SNMP time-out period. • If some WINS queries work and others time out, increase the time-out period.

  26. IPX Addresses • An Error message occurs when the IPX address has been entered incorrectly. • The SNMP service does not recognize an address with a comma or hyphen between the network number and Media Access Control (MAC) address. • The address used for an IPX trap destination must follow the IETF defined 8.12 format.

  27. SNMP Service Files

  28. Performance Console

  29. System Monitor Snap-In • Performance Monitor has been replaced by System Monitor. • The System Monitor snap-in allows you to perform a number of tasks. • You can collect and view extensible data about the usage of hardware resources and the activity of system services. • You can define the data that you want the graph to collect.

  30. System Monitor Interface

  31. Monitoring System and Network Performance • Network activity can influence system performance. • System Monitor enables you to track network and system activity. • You should use specific counters as part of your normal monitoring configuration. • Monitoring network activity involves examining performance data at each network layer. • You should begin with the lowest-level components and work your way up. • Establish a baseline for network performance.

  32. Disk Objects and the Diskperf Utility • Two primary disk objects contain counters in System Monitor: PhysicalDisk and LogicalDisk. • The physical disk performance counters are enabled, and the logical disk performance counters are disabled. • Use the Diskperf utility to enable and disable the counters. • There is a small performance cost for running these counters.

  33. Collecting Performance Data • Collect performance data automatically from local or remote computers. • View logged counter data or export the data.

  34. Using the Performance Logs and Alerts Snap-In • Collect data in a comma-delimited or tab-separated format. • View counter data during collection and after collection has stopped. • Define start and stop times, file names, file sizes, and other parameters. • Manage multiple logging sessions from a single console window. • Set an alert on a counter.

  35. Recording Performance Data • Start and stop logging. • Create trace logs. • Define a program that runs when a log is stopped. • Configure additional settings for automatic logging.

  36. Performance Logs and Alerts Interface

  37. Introduction to Network Monitor • Tracks network throughput in terms of captured network traffic • Monitors the network data stream on the local network segment • Can capture all local traffic or a subset of frames • Captures only those frames sent to or from the local computer • Uses a network driver interface specification (NDIS) feature to copy all frames to its capture buffer

  38. Installing Network Monitor Tools • Network Monitor Tools include the Network Monitor snap-in and the Network Monitor driver. • These tools are not installed by default. • You can use the Add/Remove Programs utility in Control Panel to install the Network Monitor Tools.

  39. Capturing Frame Data

  40. Using Capture Filters

  41. Displaying Captured Data

  42. Using Display Filters

  43. Network Monitor Performance Issues • Network Monitor creates a memory-mapped file for its capture buffer. • Although you cannot adjust the frame size, you can store only part of the frame. • You can run Network Monitor in the background to reduce the amount of system resources necessary to operate the program.

  44. Overview of Task Manager • Task Manager provides information about programs and processes running on your computer. • You can use Task Manager to monitor key indicators of your computer’s performance. • The Task Manager interface contains three tabs: Applications, Processes, and Performance. • You can update Task Manager by clicking Refresh Now on the View menu.

  45. Applications Tab

  46. Processes Tab

  47. Performance Tab

More Related