CHAPTER 13
MONITORING AND OPTIMIZATION
Lesson 1:
Disk Monitoring and Optimization
Windows 2000 includes several tools that you can use to diagnose disk problems, improve
performance and compress data such as Check Disk, the Disk Defragmenter snap-in, data
compression, and disk quotas.
Check Disk
The Check Disk tool, also referred to as the Error-checking tool, allows you to check for file
system errors and bad sectors on your hard disk. To use Check Disk, open the Properties
dialog box for the specific disk you want to check.
All running applications or open files on the disk being checked must be closed in order of the
Check Disk process to be able to automatically fix file system errors.
If a volume is formatted with NT file system (NTFS), Windows 2000 logs all file transactions,
replaces bad clusters automatically, and stores copies of key information for all files on the
NTFS volume.
Disk Defragmenter Snap-in
Windows 2000 saves files and folders in the first available space on a hard disk and not necessarily
in an area of contiguous space. This leads to file and folder fragmentation. When your hard disk
contains a lot of fragmented files and folders, your computer takes longer to gain access to them
because it requires several additional reads to collect the various pieces.
Defragmenting disks
The process of finding and consolidating fragmented files and folders is called defragmenting.
The Disk Defragmenter snap-in is used to locate fragmented files and folders and then
defragment them.
The Disk Defragmenter
defragments FAT16, FAT32, and NTFS volumes.
========================================================================
winser13.html PAGE 2 2002/02/01
Red = Fragmented
files
Dark Blue =
contiguous (nonfragmented files)
White = free space on
the disk.
Green = system files,
which Disk Defragmenter cannot move.
To analyze or defragment a volume, you can choose one of the options described in the following
table.
========================================================================
Option Description
========================================================================
Analyze Click this to analyze the disk for defragmentation.
Defragment Click this button to defragment the disk. You will see the
Visual difference once the disk has been defragmented.
========================================================================
Use Disk Defragmenter Effectively
The following list provides guidelines for using the Disk Defragmenter snap-in:
Run Disk Defragmenter when the computer will receive the least usage. During defragmentation,
data is moved around on the hard disk. The defragmentation process is CPU intensive and
will adversely affect access time to other disk-based resources.
Recommend users defragment their local hard disks at least once a month to prevent
accumulation of fragmented files. Analyze the target volume before you install large
applications, and then defragment the volume if necessary. Installations are completed more
quickly when the target medium has adequate contiguous free space. Additionally, gaining
access to the application after it is installed is faster.
When you delete a large number of files or folders, your hard disk might become excessively
fragmented, so be sure to analyze it afterwards. Consider using a disk defragmentation utility
that allows you to perform a regularly scheduled network-wide defragmentation from a central
location.
Data Compression
Data compression enables you to compress files and folders on NTFS volumes. Compressed
files and folders occupy less space on a NTFS-formatted volume, which enables you to store
more data. The compression state for each file and folder on a Ntfs volume is set to either
compressed or uncompressed.
========================================================================
winser13.html PAGE 3 2002/02/01
Compressing Files and Folders
You can set the compression state of folders and files in Windows Explorer or by using the
compact command-line utility. For information on compact utility syntax, go to a command
prompt and type compact/?.
Copying and Moving Compressed Files and
Folders
There are rules that determine whether the compression state of files and folders is retained
when you copy or move them within and between NTFS and FAT volumes.
Copying a File Within an NTFS
Volume
When you copy a file within an NTFS volume, the file inherits the compression state of the target
folder.
Moving a File or Folder Within an
NTFS Volume
When you move, the file or folder retains its original compression state.
Copying a File or Folder between NTFS Volumes
The file or folder inherits the compression state of the target folder.
Moving a File or Folder between NTFS Volumes
The File or folder inherits the compression state of the target folder. Because Windows
2000 treats a move or a copy and then a delete, the files inherit the compression state of
the target folder.
Moving or Copying a file or Folder to a FAT volume
Windows 2000 supports compression for NTFS files only. Because of this, when you move or
copy a compressed NTFS file or folder to a FAT volume, Windows 2000 automatically
uncompresses the file or folder.
========================================================================
winser13.html PAGE 4 2002/02/01
Moving or Copying a Compressed File or Folder to a Floppy
Disk
When you move or copy a compressed NTFS file or folder to a floppy disk, Windows 2000
automatically uncompresses the file or folder.
NOTE: When you copy a compressed NTFS file, Windows 2000 uncompresses the file,
copies the file, and then if the target folder is marked for compression, compresses the file
again as a new file. This might cause performance degradation.
Using NTFS Compression
The following is a list of best practices for using compression on NTFS volumes:
anticipated resulting file size.
will attempt to compress the file, wasting system time and yielding no additional disk space.
folders and files.
files incurs some system overhead.
Disk Quotas
You can use disk quotas to manage storage growth in distributed environments. Disk quotas
allow you to allocate space usage to users based on the files and folders that they own. You
can set disk quotas, quota thresholds, and quota limits for all users and for individual users.
You can also monitor the amount of hard disk space users have used and the amount they
have left against their quotas.
Managing Disk Quotas
Windows 2000 disk quotas track and control disk usage on a per-user, per-volume basis.
Windows 2000 tracks disk quotas for each volume, even if the volumes are on the same hard
disk. Because
quotas are tracked on a per-user basis, every user’s disk space is tracked
regardless of the folder in which the user stores files. Third-party disk quota management
ools provide granular quota management capabilities like tracking disk usage on per-user,
per-folder basis.
========================================================================
winser13.html PAGE 5 2002/02/01
The following list describes several important characteristics of Windows 2000 disk quotas:
volume is the amount of space remaining within the user’s disk quota limit. For example, a
user whose files occupy 50 MB of an assigned disk quota limit of 100 MB will show 50 MB
of free space even if the volume contains several gigabytes of free space.
NOTE: Disk quotas can be applied only to Windows 2000 NTFS volumes
Determining the Status of Disk Quotas
You can determine the status of disk quotas in the Properties of a disk by checking the traffic
light icon and reading the status message to its right. The traffic light colors and the status they
indicate are as follows:
A red traffic light indicates that disk quotas are disabled.
A yellow traffic light indicates that Windows 2000 is rebuilding disk quota information.
A green traffic light indicates that the disk quota system is active.
Enforcing Disk Quotas
To enforce different quota limits for one or more users, click the Quota Entries button to
open the Quota Entries.
By default, quota limits are not applied to the Administrators local group.
========================================================================
winser13.html PAGE 6 2002/02/01
Best Uses of Disk Quotas
If you enable disk quota settings on the volume where Windows 2000 is installed and your
user account has a disk quota limit, log on as Administrator and install additional Windows
2000 components and applications. When you do so, Windows 2000 will not charge the
disk space you use to install applications against the disk quota allowance for your user account.
You can monitor hard disk usage and generate hard disk usage information without preventing
users from saving data. To do so, clear the Deny Disk Space To Users Exceeding Quota
Limit check box when you enable disk quotas. Set more restrictive default limits for all user
accounts, and then modify the limits from the Quota Entries. Generally, you should set disk
quotas on shared volumes to limit storage for users.
Delete disk quota entries for users who no longer store their files on a volume. You can delete
quota entries for a user account only after all files that the user owns have been removed from
the volume or another user has taken ownership of the files.
Before you can delete a quota entry for a user account, all files that the user owns must be
removed from the volume or another user must take ownership of the files.
Lesson Summary:
system errors and bad sectors on a disk.
defragment them.
they own.
users.
========================================================================
winser13.html PAGE 7 2002/02/01
Lesson 2:
Simple Network Management Protocol Service
To meet the challenges of designing an effective network management platform for
heterogeneous TCP/IP-based networks, the Simple Network Management Protocol
(SNMP) was defined in 1998 and approved as an Internet standard in 1990 by the
Internet Activities Board (IAB).
Overview of SNMP
SNMP is a network management standard widely used with TCP/IP networks and more
recently, with Internetwork Packet Exchange (IPX) networks.
To perform its management services, SNMP uses a distributed architecture of management
systems and agents.
Management network nodes are referred to as SNMP agents.
The agent reports hardware status and configuration information to a database called a
Management Information Base (MIB). The MIB defines the hardware and software
information in the host that should be collected by the SNMP agent.
Network management is critical for resource management and auditing. SNMP can be
used in several ways:
To configure remote devices. You can configure information so that it can be sent to each
networked host from the NMS.
To monitor network performance. You can track the speed of processing and network
throughput and collect information about the success of data transmissions.
To detect network faults or inappropriate access. You can configure trigger alarms on
network devices that alert you to the occurrence of specific events. The shutdown or
restart of a device, the detection of a link failure on a router, the inappropriate access to
a network mode.
To audit network usage. You can monitor overall network usage to identify user or group
access or types of usage for network devices or services.
========================================================================
winser13.html PAGE 8 2002/02/01
Management Systems and Agents
The NMS does not have to run on the same computer as the SNMP agents. The NMS
can request the following information from SNMP agents:
In exception is an alarm message triggered by a specific event. An alarm message is known
as a trap message. A trap is an alarm-triggering event on an agent computer, such as a system
reboot or illegal access.
Management Information Base
A Management Information Base (MIB) is a container of objects, each of which represents
a particular type of information.
A MIB defines the following values for each object it contains:
Each object in a MIB has a unique identifier that contains the following information:
SNMP Messages
SNMP messages are sent via the User Datagram Protocol (UDP). By default, UDP port
161 is used to listen for SNMP messages and port 162 is used to listen for SNMP traps.
The management system and agent programs use the following types of messages:
========================================================================
winser13.html PAGE 9 2002/02/01
within the given restraints of message size.
The communication process is as follows: (see page 784)
acceptable. The SNMP service calls the appropriate subagent to retrieve the session information
requested from the MIB.
a return SNMP message that contains the number of active sessions and the destination, the
management system’s IP address (131.107.7.29).
Installing and Configuring the SNMP Service
The SNMP agent is not installed by default on Windows 2000 Server. It is installed from the
Control Panel Add/Remove Windows Programs applications.
NOTE: The SNMP Trap Service is also installed when SNMP is installed. The trap service
passes traps from a local or remote computer to a trap destination, typically an NMS, running
on the local computer.
SNMP Service properties
By default, the SNMP service depends on Event Log.
Windows 2000 SNMP Agent Properties.
The SNMP agent provides the related management system with information on activities that occur
at the IP network layer. The SNMP service sends agent information in response to an SNMP
request or in an SNMP trap message.
========================================================================
winser13.html PAGE 10 2002/02/01
=====================================================================
Agent Service Conditions for selecting this
service
=====================================================================
Physical The computer manages physical devices, such as a
Hard disk partition.
Applications The computers uses any applications that send data
Via TCP/IP. This service should always be enabled.
DataLink and The computer manages a bridge.
Subnetworking
Internet The computer is an IP gateway (router).
End-to-end The computer is an IP host. This service should always
Be enabled.
======================================================================
Trap Properties
SNMP traps can be used for limited security checking. When configured for an agent, the SNMP
service generates trap messages any time specific events occur. These message are sent to a trap
destination, typically an NMS. Trap messages can also be generated for events such as host system
startup or shutdown.
Security Properties
You can configure SNMP security on the Security tab o the SNMP Service Properties.
Send Authentication trap. This is the default setting.
Accepted community names. The name Public is generally used as the community name. If no
community names are defined, the SNMP agent denies all incoming SNMP requests.
Community Rights. You can select permission levels that determine how an agent processes
SNMP requests from the various communities.
Accept SNMP packets from any host. This option is enabled by default.
Only accept SNMP packets from these hosts. This option provides limited security.
========================================================================
winser13.html PAGE 11 2002/02/01
Troubleshooting SNMP
This section contains methods for determining the cause of SNMP-related communication
problems. Run normal workloads during your testing to gain realistic feedback.
SNMP time-out period on the SNMP management system. If some WINS queries
work and others time out, increase the time-out period.
computer.
SNMP Service Files
For your convenience and assistance in troubleshooting, use this list.
======================================================================
File Description
======================================================================
Wsnmp32.dll Windows 200 based SNMP manager APIs. These APIs listen
For manager requests and send the request to SNMP agents and
Receive responses from them.
*.dll Extension agent DLLs such as Inetmib1.dll for IIS,
Mib.bin Installed with the SNMP service.
Snmp.exe SNMP agent service; a master (proxy) agent. This program
Accepts manager program requests and forwards the requests
to the appropriate extension-subagent DLL for processing.
Snmptrap.exe A background process. The program receives SNMP traps
From the SNMP agent and forwards them to the SNMP
Management API on the management console.
========================================================================
winser13.html PAGE 12 2002/02/01
Lesson Summary:
such as servers, workstations, routers, bridges, and hubs from a centrally located host.
managed computers (SNMP agents).
information.
snap-in or through the Services snap-in in the Administrative Tools program group.
Lesson 3:
Performance Console
The Performance Logs and Alerts snap-in allows you to collect performance data from local or
remote computers.
With System Monitor, you can collect and view real-time data about memory, disk, processor,
network, and other activity in graph, histogram, or report form. Through Performance Logs and
Alerts, you can configure logs to record performance data and set system alerts to notify you when
a specified counter’s value is above or below a defined threshold.
You can use performance data for the following:
upgrades.
The System Monitor snap-in and the Performance Logs and Alerts snap-in provide detailed data
about the resources used by specific components of the operating system and by server programs
that have been designed to collect performance data.
========================================================================
winser13.html PAGE 13 2002/02/01
System Monitor Snap-in
In Windows 2000, Performance Monitor has been replaced by System Monitor. With System
Monitor, you can measure the performance of your own computer or other computers on a
network. System Monitor allows you to perform the following tasks:
With System Monitor, you can collect and view extensive data about the usage of hardware
resources and the activity of system services on computers you administer. You can define
the data you want the graph to collect in the following ways:
Type of Data. To select the data to be collected, you can specify one or more counter instances
of performance monitor objects.
Source of Data. System Monitor can collect data from your local computer or from other
computers on the network where you have permission. You must be the Administrator to have
the proper permissions.
Sampling parameters. System Monitor supports manual, on-demand sampling or automatic
sampling based on the time interval you specify. When viewing logging data, you can also
choose starting and stopping times so that you can view data spanning a specific time range.
System Monitor Interface
When you open the Performance console, the graph view and toolbar appears by default and
the graph area is blank.
Graph Area
You can choose to have the updated automatically or on demand. For updating on demand,
use the Update Data button to start and stop the collection intervals.
========================================================================
winser13.html PAGE 14 2002/02/01
You can also define the following attributes of the graph:
To draw attention to a particular counter’s data, use the highlighting feature. Press Ctrl + H
or click the Highlight button on the toolbar.
Monitoring System and Network Performance
Network activity can influence the performance not only of your network components but of
your system as a whole. You should monitor other resources along with network activity, such
as disk, memory and processor activity. System Monitor enables you to track network and
system activity by using a single tool.
You should use the following counters as part of your normal monitoring configuration:
========================================================================
winser13.html PAGE 15 2002/02/01
In Classroom Exercises:
710 Pro and 715Server Tests
ar500.exe (install the dolby for the troytech)
troytech study guides
BFQ – advanced Exam
Procert 2000, Server Cert.Tests folder
Binary List
1 1 1 1 1 1 1 1
128 64 32 16 8 4 2 1
2 8th = 256
2 8th –2 = 254 (subnet 254 networks on one octect)
CLASSES:
A = 1-127
B = 128-191
C = 192-223
Bit Chart:
128 1
192 2
224 3
240 4
248 5
252 6
254 7
255 8
MODE:
1. SAFE Mode. Enable Boot Logging, use ntbtlog.txt.
Safe Mode with N/W – Forest03. Has no VGZ driver loaded, long to boot up 10
minutes.
other users, works okay. View the ntbtlog.txt E:\Winnt\ntbtlog.txt.
Recovery Console (at boot-up):
G:\I386\WINNT32 ^ cmdcons
Reboot, select Recovery console from the menu.
Choose C:\WIN2KSA Administrator and the password, type help
========================================================================
winser13.html PAGE 16 2002/02/01
Performance:
CPU Processor if >75% worry about it.
RAM
Network
Page File (paging) 4K pages
To see the system press Ctrl/alt/del
to get into Task Manager.
The following table provides information about the network layers and their associated performance
objects.
======================================================================
OSI Layer Performance
objects
======================================================================
Application Browser, Server, Redirector, and Server Work Queues
Presentation Session NBT connection.
Transport Protocol objects: TCP for the Transmission Control
Protocol; UDP for the User Datagram Protocol,
NetBEUI for NetBIOS, AppleTalk (installed by
Protocol).
Network Network Segment (installed when you install the
Network Monitor driver, IP for Internet Protocol,
NWLink (IPX/SPX.
Data Link, Physical Network Interface. These counters are maintained
by the driver and can report inaccurate or zero
values because of problems with implementation
of counters by the driver.
====================================================================
When monitoring performance data for your network, you should begin with the lowest-level
components and work your way up. Monitor then objects over periods ranging from days to
weeks to a month. Using this data, determine a performance baseline, the level of performance
you expect under typical workloads and usage.
For this reason, the best approach to monitoring a server is to watch network counters in conjunction
with Processor\%Processor Time, Physical Disk\%Disk Time and Memory\Pages/sec.
========================================================================
winser13.html PAGE 17 2002/02/01
Disk Objects and the Diskperf
Utility
Two primary disk objects contain counters in System Monitor, the Physical Disk, and Logical disk
objects. The physical disk performance counters are enabled and the logical disk performance
counters are disabled by default on Windows 2000 Server.
Use the diskperf^-yv command to enable Logical Disk performance counters.
After this command is run, the computer must be rebooted. On reboot, the logical disk and physical
disk performance counters will start. These counters are contained in the System Monitor-Physical
Disk and Logical Disk objects respectively.
There is a small performance cost for running these counters. If you are not monitoring disk
performance, type diskper^-n to disable both disk objects and their counters.
You can selectively enable or disable both physical and logical disk performance counters using
Diskperf.
Performance Logs and Alerts Snap-ins
With Performance Logs and Alerts, you can collect performance data automatically from local
and remote computers. Note that, because logging runs as a service, data collection can occur
regardless of whether any user is logged on to the computer being monitored.
The Performance Logs and Alerts snap-in allows you to perform the following tasks:
programs.
generation.
or a log be started when the selected counter’s value exceeds or falls below a specified setting.
========================================================================
winser13.html PAGE 18 2002/02/01
Performance Logs and Alerts also offers
these other options related to recording
performance data:
defined schedule.
record data when certain activities such as disk I/O operations or page faults occur.
setting parameters for stopping and starting a log based o n the elapsed time or the file size.
NOTE: You can work with data from a log file while the service is collecting data and has the
log file locked. For example, Microsoft Excel can import an active log file, but it will open a
read-only version of the locked log.
Performance Logs and Alerts Interface
You can define settings for counter logs, trace logs, and alerts.
To see the parameters defined for each log, select the log name in the details pan and then
select properties, from the action menu.
If a log is currently running and collecting data (based on the schedule you defined for the log
or alert), a green data icon appears next to the log or alert. If a red icon appears, the log or
alert has been defined but is not currently running.
NOTE: You can configure more than one type of log to run at a time. One log can generate
multiple log files if the restart option is selected or if you start and stop the log multiple times.
However, you will not see these individual log files listed in the console window. Use
Windows Explorer to view a listing of these files.
Lesson Summary:
monitoring resource usage on your computer: The System Monitor snap-in and the
Performance
========================================================================
winser13.html PAGE 19 2002/02/01
resources and the activity of system services on computers you administer. There are three
main areas in the System Monitor interface: the graph area, the legend, and the value bar.
presents a value corresponding to a particular aspect of the performance defined for the
performance object.
local or remote computers.
Lesson 4:
Network Monitor
Unlike System Monitor, which is used to monitor anything from hardware to software, Network
Monitor focuses exclusively on network activity.
Network application developers can use Network Monitor to monitor and debug network
applications as they are developed.
Overview of Network Monitor
Network Monitor tracks network throughput in terms of captured network traffic. Network Monitor
monitors traffic only on the local network segment. To monitor remote traffic, you must use the
version of Network Monitor that ships with Microsoft Systems Management Server (SMS)
version 1.2 or 2.0.
Network Monitor monitors the network data stream, which consists of all information transferred
over a network at any given time. Prior to transmission, this information is divided by the network
software into smaller pieces, called frames or packets. Each frame contains the following information:
The process by which Network Monitor copies frames is
referred to as capturing.
After you have captured data, you can view it in the Network Monitor user interface. Network
Monitor does much of the data analysis for you by translating the raw capture data into its logical
frame structure.
========================================================================
winser13.html PAGE 20 2002/02/01
For security, Windows 2000 Network Monitor captures only those frames, including broadcast
and multicast frames, sent to or from the local computer.
When Network Monitor detects other Network Monitor installations running on the network, it
displays the following information:
Network Monitor uses a network driver interface specification (NDIS) feature to copy all frames it
detects to its capture buffer, a resizable storage area in memory. The default size is 1 MB; however,
you can adjust the size manually as needed. The buffer is a memory-mapped file and occupies disk
space.
NOTE: Because Network Monitor uses the local-only mode of NDIS instead of promiscuous mode
(in which the network adapter passes on all frames sent on the network), you can use Network
Monitor even if your network adapter does not support promiscuous mode. Networking performance
is not affected when you use an NDIS driver to capture frames. (Putting the network adapter in
promiscuous mode can add 30% or more to the load on the CPU.)
Installing Network Monitor Tools
Network Monitor Tools include both the Network Monitor console and the Network Monitor driver.
These tools are not installed by default on Windows 2000 Server.
You can install them from the Control Panel Add/Remove Windows Programs application.
Capturing Frame Data
To capture frame data, Network Monitor and the Network Monitor driver must be installed on your
Windows 2000 computer.
When the user of a computer running SMS Network Monitor connects remotely to a computer on
which the Network Monitor driver has been installed, and that user initiates a capture, network
statistics are captured locally on the computer running the network monitor driver and the data from
the capture is viewed from the managing computer.
========================================================================
winser13.html PAGE 21 2002/02/01
NOTE: Network Monitor drivers for other Windows operating systems other than Windows 2000
are provided with SMS. When you install Network Monitor on a Windows 2000 computer, the
Network Monitor driver is automatically installed.
To capture data, open Network Monitor and select Start from the Capture menu. As frames
are captured from the network, statistics about the frames are displayed in the Network Monitor
Capture Window.
Network Monitor displays session statistics from the first 100 unique network sessions it detects.
To reset statistics and see information on the next 100 network sessions detected, select Clear
Statistics from the capture menu.
Using Capture Filters
A capture filter functions like a database query. You can use it to specify the types of networks
information you want to monitor. By filtering frames, you save both buffer resources and time.
Later, if necessary, you can load the capture filter file and use the filter again.
To open the Capture Filter, click the funnel toolbar icon,
or press F8.
Filtering by Address:
To capture frames from specific computers on your network, specify one or more address pairs
in a capture filter. You can monitor up to four specific address pairs simultaneously.
An address pair consists of the following:
respond to a frame that meets a filter’s specifications.
Regardless of the sequence in which statements appear in the
Capture Filter, EXCLUDE statements
are evaluated first.
========================================================================
winser13.html PAGE 22 2002/02/01
Filtering by Data Pattern:
By specifying a pattern match in a capture filter, you can:
When you filter based on a pattern match at a specific point in the data, you must specify where the
pattern occurs in the frame (how many bytes from the beginning or end). If your network medium
uses variable-sized frames, specify to begin counting in for a pattern match from the end of the
topology header.
Displaying Captured Data
To simplify data analysis, Network Monitor interprets raw data collected during the capture and
displays it in the Capture window.
Using Display Filters
You can use a display filter to determine which frames to display. Like a capture filter, a display
filter functions like a database query, allowing you to single out specific types of information.
You can filter a frame by the following information:
header.
Although capture filters are limited to four address filter expressions, display filters are not. With
display filters, you can also use AND, OR, and NOT logic.
Protocol properties are information that defines a protocol’s purpose. Because the purpose of
protocols varies, properties differ from one protocol to another. Suppose, for example, that you
========================================================================
winser13.html PAGE 23 2002/02/01
have captured a large number of frames that use the SMB protocol, but you want to examine only
those frames in which the SMB protocol was used to create a directory on your computer. In this
instance, you can single out frames where the SMB command property is equal to the Make
Directory command.
Network Monitor Performance Issues
Network Monitor creates a memory-mapped file for its capture buffer. For best results, make sure
you create a capture buffer large enough to accommodate the traffic you need.
Running Network Monitor in the background is the way to reduce the amount of system resources
necessary to operate the program. To run Network Monitor in the background, choose Dedicated
Capture Mode from the Capture Menu. This is one strategy to reduce resource use if network
packets are being dropped rather than captured.
Lesson Summary:
throughput in terms of captured network traffic.
information transferred over the network segment at any given time.
displays it in the Frame Viewer Window.
specific types of information.
Lesson 5:
Task Manager
Windows Task Manager provides summary information about computer performance as well as
about programs and processes running on the computer.
Overview of Task Manager
Task Manager provides information about programs and processes running on your computer. It also
displays the most commonly used performance measures for processes.
========================================================================
winser13.html PAGE 24 2002/02/01
You can use Task Manager to monitor key indicators of your computer’s performance. You can
quickly see the status of programs that are running and end programs that have stopped responding.
To open Task Manager,
right click on an empty space on the taskbar and then click Task manager.
You can also open Task Manager by pressing Ctrl+Alt+Delete and then clicking the Task Manager
button.
To update Task Manager data, click Refresh Now on the View menu. You can also change the
frequency at which the data is automatically updated. On the View menu, click Update Speed and
then click the option that you want.
Applications Tab
The Applications tab shows the status of the programs running on your computer.
Using Task Manager to start a program is identical to using the Run command on the Start menu.
Of a program stops responding, press Ctrl+Alt+Delete to start Task Manager, select the program
that is not responding, and then click End Task. Any data entered or changes made that were not
saved will be lost.
Processes Tab
The Processes tab shows information about the processes running on your computer. For example,
you can display information on CPU and memory usage, page faults, handle count, and a number of
other parameters.
On the processes tab, you can sort the list of processes and display other process counters. For a
description of each type of counter that you can monitor, see Task Manager Help. To see the available
process counters, click the Processes tab and then choose Select Columns from the View Menu.
NOTE: Task Manager does not allow you to end a process that is critical to the operation of
Windows 2000. Utilities on the Windows 2000 Resource Kit will allow you to end critical
processes. However, this procedure is likely to cause operating system instability.
========================================================================
winser13.html PAGE 25 2002/02/01
The Processes tab also allows you to assign a process to a processor by using the Set Affinity
command. However, the command is available only on multiprocessor computers.
Performance Tab
The Performance tab displays a dynamic overview of your computer’s performance. This view
includes graphs for CPU and memory usage; totals for the number of handles, threads and
processes running on the computer; and totals, in kilobytes, for physical, kernel, and commit
memory.
If you select the Show Kernel Times option from the View Menu, a red line is added to the
CPU Usage graph and to the CPU Usage History graph. The red lines indicate the amount of
CPU resources consumed by kernel operations.
Lesson Summary: