Computer Hardware and Servicing
Computer Hardware and Servicing
M – Scheme
e-TEXTBOOK
on
for
VI Semester Diploma in Computer Engineering
Tmt.A.Ghousia Jabeen
Principal
TPEVR Government Polytechnic College
Vellore- 632202
Mr. H.Ganesh
Lecturer (SG) / Computer Engineering,
N.P.A. Centenary Polytechnic College,
Kotagiri – 643217
Dr. S.Sharmila
HOD / IT
P.S.G. Polytechnic College,
Coimbatore – 641001.
Validated by
Dr. S. Brindha
HOD/Computer Networks,
PSG Polytechnic College,
Coimbatore – 641001.
CONTENTS
1 MOTHERBOARD COMPONENTS 1
1
Unit-1 Motherboard Components
PGA LGA
Figure 1.2 PGA and LGA Sockets
Pins
Socket Processor Computer Type
2
Unit-1 Motherboard Components
Memory slot, memory socket, or RAM slot allows computer memory (RAM) to be
inserted into the computer. Depending on the motherboard, there may be 2 to 4 memory
slots and it also determines the type of RAM used with the computer. The most common
types of RAM are Synchronous Dynamic RAM (SDRAM) and Double Data Rate (DDR) for
desktop computers and Small Outline Dual Inline Memory Module (SODIMM) for laptop
computers, each having various types and speeds. The different types of memory sockets
are available. Single inline memory module sockets (SIMM) are used to hold DRAM.
Double inline memory sockets (DIMM) are use to hold SDRAM, DDR, etc. Rambus Inline
Memory Module (RIMM) sockets are used to hold RDRAM. Figure 1.3 shows the different
types of memory sockets.
3
Unit-1 Motherboard Components
1.1.4. Cache
Cache memory is small fast memory in between CPU and main memory. It is
otherwise called static RAM (SRAM). Cache memory increases the execution speed of the
computer. During execution, the needed data blocks are loaded from main memory to
cache. It is transferred to CPU. There are three levels of cache. They are
(i) Level 1 cache (Primary cache )
(ii) Level 2 cache
(iii) Level 3 Cache
1.1.5. BIOS
The BIOS is an acronym for Basic Input / Output System and also known as the
System BIOS, ROM BIOS or PC BIOS, is a type of firmware used to perform hardware
initialization during the booting process (power-on startup) on computers. It provides
runtime services for operating systems and programs. The BIOS is the first software run on
the computer when powered on. The fundamental purposes of the BIOSs are to initialize
and test the system hardware components, and to load a boot loader or an operating
system from a mass memory device. The BIOS additionally provides an abstraction layer
for the hardware, i.e., a consistent way for application programs and operating systems to
interact with the keyboard, display, and other input/output (I/O) devices. The different
functions of BIOS are
(i) Start up routines
(ii) Service handling routines
(iii) Hardware interrupt handling routines
4
Unit-1 Motherboard Components
5
Unit-1 Motherboard Components
1.1.7. RTC
A real-time clock (RTC) is a computer clock that keeps track of the current time. RTCs
often have an alternate source of power, so they can continue to keep time while the primary
source of power is off or unavailable. This alternate source of power is normally a lithium
battery in older systems, but some newer systems use a super capacitor because they are
rechargeable and can be soldered.
Power connectors are cables with sockets used to give power supply to the
motherboard components. The size shape and number of pins vary with the type of the
connector. The following are some important type of power connectors
(i) 24 pin ATX power connector
(ii) 16 pin SAT power connector
(iii) 6 pin PCI Express power connector
(iv) 4 pin FDD power connector
1.1.10. Battery
All motherboards contain a CR2032 coin battery. This battery is used to power the
ROM which contains BIOS. Normally batteries last up to 10 years. Incorrect or slow system
date and time or loss of BIOS settings are the signs of a dead battery.
6
Unit-1 Motherboard Components
The keyboard connector is the device at the end of the cable that is used to attach the
keyboard to the system. There are two standard types of connectors. The older style is the
larger of the two, called the 5-pin DIN keyboard connector. The smaller is the 6-pin, so-
called "mini-DIN" keyboard connector. (DIN stands for Deutsches Institut Norm, a German
standards-setting organization.) The smaller connector was introduced on the IBM model
PS/2 and is therefore sometimes called a "PS/2 connector". It has replaced the larger
connector as the standard for modern PCs. Figure 1.5 shows the DIN connectors.
The signal assignments for each connector are found in the table below.
Pin
5-pin DIN Connector 6-pin "mini-DIN" Connector
#
7
Unit-1 Motherboard Components
Jumpers allow the computer to close an electrical circuit, allowing the electricity to flow
through certain sections of the circuit board. Jumpers consist of a set of small pins that can
be covered with a small plastic box (jumper block) as shown in the Figure 1.7. Jumpers are
used to configure the settings for computer peripherals such as the motherboard, hard
drives, modems, sound cards, and other components. For example, in motherboard
supported intrusion detection, a jumper can be set to enable or disable this feature.
• Serial Port header : There are usually two serial port headers. Each has 9 or 10 pins
• Parallel Port header: This header is used for the external parallel port and has 26
pins (25 are actually used).
8
Unit-1 Motherboard Components
USB (Universal Serial Bus): A new technology, USB is proposed to be the new standard
for connecting devices such as keyboards, mice and external modems to the PC. This
header has 10 pins.
IR (Infrared) Port: Some motherboards have a header to allow you to run a connection for
an infrared communications port, typically used for wireless communication to printers and
similar devices. Infrared ports are far more common on laptop computers than desktop
machines. These headers have 4 or 5 pins.
Primary and Secondary IDE/ATA Hard Disk Interface: Most new motherboards have
integrated headers for two IDE Channels. Each has 40 pins.
Floppy Disk Interface: Most newer motherboards provide a 34-pin header for the floppy
disk cable.
SCSI: Some motherboards have integrated SCSI ports or headers; they are either 50 or 68
pins in size, depending on the flavor of SCSI implemented.
The motherboard provides several connectors that are attached to the case LEDs,
indicators, and switches. The physical layout of these connectors can vary a lot as well;
some motherboards physically separate these connectors on the board while others group
many together into a large "multifunction connector”.
The form factor describes the general layout of the case, the positioning of the slots in
the back of the case, and the way that the case matches to the major components that fit
into it. The three main components that must be matched in terms of their form factor are the
case, the power supply, and the motherboard. Table 1.3 shows the form factors for the
different motherboard.
Full AT 12" 11-13" Very Old PCs Full AT, Full Tower
Baby AT 8.5" 10-13" Older PCs All but Slimline, ATX
9
Unit-1 Motherboard Components
Hardware
Hardware is the physical parts or components of a computer, such as the monitor,
keyboard, computer data storage, hard disk drive (HDD), graphic cards, sound cards,
memory (RAM), motherboard, and so on, all of which are tangible physical objects.
Software
Software is a collection of instructions that enable the user to interact with a computer,
its hardware, or perform tasks. There are two types of software. Application software solves
the particular problem and system software controls the operation of the computer.
Firmware
Firmware is a type of software that provides control, monitoring and data manipulation
of engineered products and systems. Typical examples of devices containing firmware are
embedded systems (such as traffic lights, consumer appliances, remote controls and digital
watches), computers, computer peripherals, mobile phones, and digital cameras. Firmware
is held in non-volatile memory devices such as ROM, EPROM, or flash memory. Changing
the firmware of a device may rarely or never be done during its lifetime; some firmware
memory devices are permanently installed and cannot be changed after manufacture.
10
Unit-1 Motherboard Components
Motherboard includes peripherals, interface cards, and daughter cards: sound cards,
video cards, network cards, hard drives, or other forms of persistent storage; TV tuner cards,
cards providing extra USB or FireWire slots and a variety of other custom components. It
has no additional expansions or capability, such as controlling boards in laser printers,
televisions, washing machines and other embedded systems with limited expansion abilities.
11
Unit-1 Motherboard Components
Memory Slots
Located in the upper-right part of the motherboard, the memory slots are used to hold
the memory modules. The low-end motherboards have two memory slots. High end memory
and gaming slots have 8 memory slots. It is important to pay attention on types of memory a
motherboard supports. Newer motherboards support DDR3 memory. The older motherboard
model supports different types of memory with two DDR1 memory slots and 2 DDR2
memory slots, or two DDR2 slots and two DDR3 slots. The number of memory slots
determines the maximum amount of memory.
Video Card Slot
It is available as PCI-Express slot on newer motherboards or AGP on older ones, the
video card slot is situated right below the processor. High-end gaming motherboards come
with multiple video card slots, allowing the installation of multiple video cards in a SLI or
Crossfire configuration.
Expansion Slots
Expansion slots allow installing additional components and to enhance or expand the
functionality of the PC. For example TV tuner, a video capture card, a better soundcard, etc
may be installed. These ports are located under the video card slot, and come in the form of
PCI slots (on older motherboards) or a scaled-down version of PCI-Express slots (on newer
motherboards). Some motherboards come with both types of expansion slots. The number
of slots is usually dependent on the format of the motherboard – larger motherboards (full
ATX) have more, while smaller formats (micro-ATX) have fewer, if any.
IDE and SATA Ports
IDE and SATA ports are used to provide connectivity for the storage devices and
optical drives. The current version of SATA interface achieves maximum speeds of up to
600 MB/s, as opposed to the IDE interface, which can reach a maximum of 133 MB/s.
BIOS Chip and Battery
The BIOS chip contains the basic code that boots the computer up to the point where
the operating system takes over. Since the BIOS code is stored on a memory chip that
needs constant power to function, a battery is also present to keep the chip powered when
the computer is unplugged.
Northbridge and Southbridge
A square metal component located somewhere in the lower-right part of the board.
This metal component is actually a heat sink, and its role is to provide thermal protection for
the Northbridge – one of the most important components of a motherboard. The northbridge
is responsible for coordinating the data flow between the memory, the video card and the
processor. A secondary chip, known as Southbridge, has a similar function, coordinating the
data flow between the processor and peripherals such as sound cards or network cards.
12
Unit-1 Motherboard Components
1.3. Processors
1.3.1. Introduction
A processor is the logic circuit that processes the basic instructions which drives the
computer. It is called as Central Processing Unit (CPU). The four primary functions of a
processor are fetch, decode, execute and write back.
i. The arithmetic logic unit (ALU), carries out arithmetic and logic instructions.
ii. The floating point unit (FPU), also called as math coprocessor or numeric processor
that manipulate numbers.
iii. Registers, which hold instructions and other data. Registers supply operands to the
ALU and store the results of operations.
iv. L1 and L2cache memory. It saves the CPU time compared to having to get data
from random access memory (RAM).
i. All the signals are in the form of binary 0‟s and 1‟s
iii. Processors are based on instruction set and are able to take a decision according to
the input data. The decisions are carried out using logic gates.
iv. The number of binary bits that can be handled at a time is different for different
processors.
v. The number of instructions carried out per second is called the speed of the CPU.
This is different for different processors.
13
Unit-1 Motherboard Components
Core 2 is basically a brand name which refers to the wide range of Intel‟s processors.
These models are embedded on single die or integrated circuit which is embedded on the
two ICs. This technique enables the user to perform multiple tasks simultaneously using
software and processor at the same time. The ranges of products associated with the core 2
Duo technology are listed in table 1.4. Intel core 2 duo processors come in both 45nm and
65nm having virtualization, trusted execution technology and clock speed of about 2 GHz.
TABLE 1.4 Range of Products associated with the Core 2 Duo Technology
Features
i. It has sustained backward compatibility with the software and existing hardware.
ii. It is efficient enough to run two operating systems at a time by help from working
virtual machines. (The virtual machines are smart enough to share physical
hardware, having separate operating system and busy running their own
applications.)
iii. It has advanced security features and enables to set the trusted Platform Module.
iv. It has L2 cache. Its size varies from 1 MB to 6 MB.
v. Its operating speed varies from 1.8 GHz to 3.3 GHz. The speed of front side bus is
533 or 800 MHz or 1066 MHz or 1333 MHz or 1600 MHz.
Figure 1.9 shows the memory structure of core duo processor.
14
Unit-1 Motherboard Components
A quad-core processor is a chip with four independent units called cores that read
and execute central processing unit (CPU) instructions such as add, move data, and branch.
Each core operates in conjunction with other circuits such as cache, memory management,
and input/output (I/O) ports. The individual cores can run multiple instructions at the same
time, increases the overall speed for programs and compatible with parallel processing.
Quad-core and higher multi-core processor configurations are used in general-purpose
computing, PC, mobile devices such as smart phones and tablets. The quad-core CPU has
the ability to do complicated work more quickly than dual-core or single-core processors. It
performs more tasks at the same time. Virus scans, modern 3-D video games, video editing
and graphics programs can run together smoothly. The three key architectural differences
between the current dual core and phase 2 quad core processors are shown in Figure 1.10.
1. Each of the cores in the quad core processor has a slower clock speed compared to
the dual core processor.
2. There is a different cache hierarchy, with smaller L2 caches and a new shared L3
cache.
3. Memory is increased from 6GB to 8GB per processor with an increased transaction
frequency.
Figure 1.10: The architectural differences between the current dual core and
Phase 2 quad core processors.
15
Unit-1 Motherboard Components
With the release of the Nehalem micro architecture in November 2008, Intel
introduced a new naming scheme for its Core processors. There are three variants, Core
i3(low level), Core i5(mid range) and Core i7. Common features of all Nehalem based
processors include an integrated DDR3 memory controller, Quick Path Interconnect or PCI
Express and Direct Media Interface. All these processors have 256 KB L2 cache per core,
plus up to 12 MB shared L3 cache.
Core i3
Intel intended the Core i3 as the new low end of the performance processor line from
Intel. The first Core i3 processors were launched on January 7, 2010.The first Nehalem
based Core i3 was Clarkdale-based, with an integrated GPU and two cores. The Core i3-
3xxM processors are based on Arrandale, the mobile version of the Clarkdale desktop
processor. They are similar to the Core i5-4xx series but running at lower clock speeds and
without Turbo Boost. Intel 5 series chipset supports non-ECC memory only with the Core i5
or i3 processors, using those processors on a motherboard with 3400 series chipsets, it
supports the ECC function of ECC memory. Feature of core i3 series is shown in Table 1.5.
Codename Brand L3
Cores Socket TDP I/O Bus
name Cache
Core i5
The first Core i5 using the Nehalem micro architecture was introduced on 2009, as a
mainstream variant of the earlier Core i3, the Lynnfield core. Lynnfield Core i5 processors
have an 8 MB L3 cache, a DMI bus running at 2.5 GT/s and support for dual-channel DDR3-
800/1066/1333 memory and have Hyper-threading disabled. A new feature called Turbo
Boost Technology was introduced which maximizes speed for demanding applications,
dynamically accelerating performance to match the workload.
16
Unit-1 Motherboard Components
The Core i5-5xx mobile processors are named Arrandale and based on the 32 nm
Westmere shrink of the Nehalem micro architecture. Arrandale processors have integrated
graphics capability but only two processor cores. They were released in January 2010,
together with Core i7-6xx and Core i3-3xx processors based on the same chip. The L3
cache in Core i5-5xx processors is reduced to 3 MB, while the Core i5-6xx uses the full
cache and the Core i3-3xx does not support for Turbo Boost. Clarkdale, the desktop version
of Arrandale, is sold as Core i5-6xx, along with related Core i3 and Pentium brands. It has
Hyper-Threading enabled and the full 4 MB L3 cache. Table 1.6 shows the features of i5
series.
Core i5-7xx 95 W
Lynnfield 4 8 MB Direct Media Interface
Core i5-7xxS LGA 1156 82 W
Core i5-5xxM
rPGA-988A 35 W
Direct Media Interface,
Core i5-4xxM 2
Integrated GPU
Arrandale 3 MB
Core i5-5xxUM
BGA-1288 18 W
Core i5-4xxUM
Core i7
Intel Core i7 as an Intel brand name applies to several families of desktop and laptop
64-bitx86-64 processors using the Nehalem, Westmere, Sandy Bridge, Ivy Bridge, Haswell,
Broadwell and Skylakemicroarchitectures. The first six-core processor in the Core lineup is
the Nehalem-based Gulftown, which was launched on March 16, 2010. Core i7 has family
members using two distinct system-level architectures, and therefore two distinct sockets
(for example, LGA 1156 and LGA 1366 with Nehalem). In each generation, the highest-
performing Core i7 processors use the same socket and QPI-based architecture as the
medium-end Xeon processors of that generation, while lower-performing Core i7 processors
use the same socket and PCIe/DMI/FDI architecture as the Core i5. Table 1.7 shows the
features of core i7 series.
17
Unit-1 Motherboard Components
18
Unit-1 Motherboard Components
ii. AMD supports virtualization, which is known as the virtual extension of AMD 86
processors.
iii. It allows for low voltage and power utilization and hence low temperature of the PC.
iv. Enhanced virus protection prevents the buffer overloading and attack of malicious
viruses. Presidio is a viable feature of AMD processors because it makes use of
particular commands for trusted computations.
v. Hyper transport is a major replacement for front buses and can also be used for
direct connect architecture.
vi. Thermal design power helps the processors to determine the maximum heat.
AMD K10 family is the latest generation of AMD x86 microprocessors. K10 families
cover three main market segments - desktop, mobile and server, and are divided into three
main groups in accordance with processors' price and performance:
ii. Mid-class microprocessors - Athlon X2, Athlon II X2 / X3 / X4, and Athlon II Dual-
Core Mobile.
iv. Server families: Third-Generation Opteron, Six-Core Opteron and Opteron 6100
series.
v. Recent generations of K10 families are built on more modern 0.045 process, which
allows better CPU frequency scaling.
vi. The width of AMD Floating Point unit was increased to 128 bits.
19
Unit-1 Motherboard Components
The CPUs can dynamically adjust frequency of individual cores depending on their
load, change voltage of integrated memory independently from core voltage of CPU cores,
and include other power-saving features
Features
The Phenom II triples the shared L3 cache size from 2MB (in the original Phenom
line) to 6MB. it reduces the effectiveness of over clocking the CPU and RAM, but also
decreases power consumption and heat output. Socket AM3 versions of the Phenom II are
backwards-compatible with Socket AM2+, The AM3 memory controller supports both DDR2
and DDR3 memory (up to DDR2-1066 and DDR3-1333), “Thuban" and "Zosma" Phenom II
20
Unit-1 Motherboard Components
processors support AMD's Turbo Core over clocking performance-boost technology. Some
top-level AM3 processors (x945 125W, x955 and x965) require a special power-supply
feature, often called "dual power-plane". It's supported by default in all native AM3 main
boards, however not in most AM2+ main boards, even those advertised as "AM3 optimized"
or "AM3 ready".
Desktop
AMD K10
Hex-core Quad-core Quad-core Triple-core Dual-core
Date released Apr 2010 Jun 2010 Jan 2009 Feb 2009 Jun 2009
Phenom II CPUs are based on two dies: the original Deneb die with four cores and the new
Thuban die with six. These are divided into five series for marketing. The first two series are
flagships based on full dies. The other three series are formed from Deneb dies by die
harvesting, that is, chips that were produced with some amount of defects. The affected
portions of these chips are disabled and the chips themselves marked as a lower-grade
product. Figure 1.12 shows the die of four-core Phenom II processor
21
Unit-1 Motherboard Components
Xeon features:
i. It has faster L1 and L2cache , either 512 Kbytes or 1 Mbytes, which runs at the same
400 MHz clock speed of the processor.
ii. A faster bus to carry data between the processor, RAM, and I/O devices. The 450NX
PCIset is a chipset that works at a 100 Mhz clock speed and supports up to 8 GB of
extended data output RAM memory.
iii. A larger Accelerated Graphics Port ( AGP ) chip set called the 440GX AGP set that
also runs at 100 Mhz. It supports 2 GB of 100 Mhz SDRAM .
iv. An extended server memory architecture that provide for 36-bit addresses, allowing
up to 64 GB of physical memory to be addressed.
v. It has 32 or 64 bit instruction set. Figure shows the block diagram of Xeon wood
crest processor having two cores.
22
Unit-1 Motherboard Components
1.4 Chipsets
1.4.1 Chipset basics
The term chipset often refers to a specific pair of chips on the motherboard: the north
bridge and the south bridge. The north bridge links the CPU to very high-speed devices,
especially RAM and graphics controllers, and the south bridge connects to lower-speed
peripheral buses (such as PCI or ISA). In many modern chipsets, the south bridge contains
some on-chip integrated peripherals, such as Ethernet, USB, and audio devices.
Manufacturers of chipsets for x86 motherboards include AMD, Broadcom, Intel, NVIDIA, SiS
and VIA Technologies.
North bridge is connected directly to the CPU via the front side bus (FSB) and is
responsible for tasks that require the highest performance. The north bridge is usually paired
with a south bridge, also known as I/O controller hub. These two chips manage
communications between the CPU and other parts of the motherboard, and constitute the
core logic chipset of the PC motherboard. Integrating more functions onto fewer
23
Unit-1 Motherboard Components
ii. ISA bus or LPC bridge. ISA support remains an integrated part of the modern
south bridge, though ISA slots are no longer provided on more recent
motherboards. The LPC bridge provides a data and control path to the super I/O
(the normal attachment for the keyboard, mouse, parallel port, serial port, IR port,
and floppy controller) and FWH (firmware hub which provides access to BIOS
flash storage).
iii. SPI bus. The SPI bus is a simple serial bus mostly used for firmware (e.g., BIOS)
flash storage access.
iv. SM Bus. The SM Bus is used to communicate with other devices on the
motherboard (e.g., system temperature sensors, fan controllers, SPDs).
v. DMA controller. The DMA controller allows ISA or LPC devices direct access to
main memory without needing help from the CPU.
vi. Interrupt controllers such as 8259A and/or I/O APIC. The interrupt controller
provides a mechanism for attached devices to get attention from the CPU.
vii. Mass storage controllers such as PATA and/or SATA. This typically allows direct
attachment of system hard drives.
viii. Real-time clock. The real time clock provides a persistent time account.
ix. Power management (APM and ACPI). The APM or ACPI functions provide
methods and signaling to allow the computer to sleep or shut down to save
power.
Optionally, a south bridge also includes support for Ethernet, RAID, USB, audio
codec, and FireWire. Where support is provided for non-USB keyboard, mouse, and serial
24
Unit-1 Motherboard Components
ports, a machine normally does so through a device referred to as a Super I/O; still more
rarely, a south bridge may directly support the keyboard, mouse, and serial ports. The
architecture of North bridge and South bridge is shown in Figure 1.15.
25
Unit-1 Motherboard Components
Intel hub architecture starting with the 820 chipset, divides control between a
memory controller chip (MCH) and an I/O controller chip (ICH). An illustration of the 850 is
shown in figure.The memory controller is a digital circuit that manages the flow of data going
to and from the computer's main memory. A memory controller can be a separate chip or
integrated into another chip, or as an integral part of a microprocessor called an integrated
memory controller (IMC). A memory controller is also called a memory chip controller (MCC)
or a memory controller unit (MCU). Memory controllers contain the logic necessary to read
and write to DRAM, and to "refresh" the DRAM. Reading and writing to DRAM is performed
by selecting the row and column data addresses of the DRAM as the inputs to the
multiplexer circuit, where the demultiplexer on the DRAM uses the converted inputs to select
the correct memory location and return the data, which is then passed back through a
multiplexer to consolidate the data in order to reduce the required bus width for the
operation. Bus width is the number of parallel lines with range between 8-bit to 512-bit.
Memory controllers, such as the one integrated into Power QUICC II processors, can be
connected to different kinds of devices at the same time, including SDRAM, SRAM, ROM,
and memory-mapped I/O. It has error detection and correction hardware facility.
26
Unit-1 Motherboard Components
Transfer mode is used. It comes out to 364 MB/sec when Burst Data Transfer is
used.
The conceptual diagram of PCI is shown in Figure 1.17.
1.5.2. AGP
27
Unit-1 Motherboard Components
iv. Pipelining: Enables the graphics card to send several instructions together
instead of sending one at a time.
1.5.3. USB
i. Single connector type: It eliminates the need for different cables and connectors
and thus simplifying the design of the USB devices.USB devices can be
connected directly to a standard USB port on a computer.
28
Unit-1 Motherboard Components
iii. Plug and Play: Operating system software automatically identifies, configures,
and loads the appropriate device driver when a user connects a USB device.
iv. High performance: USB offers low speed (1.5 Mbit/s), full speed (12 Mbit/s) and
high speed (up to 480 Mbit/s) transfer rates that can support a variety of USB
peripherals. USB 3.0 (Super Speed USB) achieves the throughput up to 5.0
Gbit/s.
vi. Power supplied from the bus: USB distributes the power to all connected devices
eliminating the need for external power source for low-power devices. High-
power devices can still require their own local power supply. USB also supports
power saving suspend/resume modes.
vii. Easy to use for end user: A single standard connector type for all USB devices
simplifies the end user's task at figuring out which plugs go into which sockets.
The operating system automatically recognizes the USB device attachment and
loads appropriate device drivers.
29
Unit-1 Motherboard Components
The actual maximum throughput may vary depending on the transfer type, maximum
packet size, time reserved for control transfers, the overhead due to signaling imposed bit
stuffing etc.
Processor bus is defined as the bus that provides the path for communication
between the main buses and the central processing unit. It also serves as the
communication medium between the central processing units and other chipboard devices in
the CPU. Size of the processor bus varies with the type of the processor and CPU brand.
But it depends on the length of the data word. The block diagram of the bus is shown below
A system bus is a single computer bus that connects the major components of a
computer system, combining the functions of a data bus to carry information, an address bus
to determine where it should be sent, and a control bus to determine its operation.
Review Questions
PART -A
1. What is the function of motherboard?
2. List the components of the motherboard.
3. List the latest sockets with computer type.
4. What is a chip set?
5. What are the levels of cache memory? Write short notes on it.
6. What are the functions of BIOS?
7. How a real time Clock keeps track of the current time even when the power is off?
8. Define the term power connector. List its types.
30
Unit-1 Motherboard Components
31
Unit-1 Motherboard Components
32
Unit-2 Memory and I/O Devices
Learning Objectives:
➢ Understand the working of hard disk, formatting and to diagnose the problems.
➢ Know the Importance and applications of removal storages and its drives.
33
Unit-2 Memory and I/O Devices
1. Memory Speed
This is simply the speed at which the memory is rated to run. If the memory is rated
at DDR3-1600 (PC3-12800), it's rated to run on a 800MHz Front Side Bus. Since it
processes data on both the rising and falling edges of the clock pulse, it acts as 1600MHz
RAM. The PC3-12800 indicates that the data throughput is 12.8Tb per second. The DDR
part of the name means that it can read/write data at twice the memory bus speed. For
example, this memory is rated at 333MHz. This means that the bus speed is 166MHz. It can
pass data at twice the bus clock speed because it processes data on both the rising AND
falling portions of the clock pulse. DDR-333 RAM labeled as PC2700 RAM. The 2700 in
PC2700 means that it can process 2.7GB (2.7 billion bytes) of data per second.
2. Access time
Access time is the time from the start of one storage device access to the time when
the next access can be started. Access time consists of latency (the overhead of getting to
the right place on the device and preparing to access it) and transfer time. Access time to
RAM is usually measured in nanoseconds. Access time to a hard disk or CD-ROM is usually
measured in milliseconds.
3. Wait states
A pause in the processor's clock cycles while it waits for data, wait states frequently
occur when the computer's processor has a higher clock speed than other components,
such as memory.
4. Main memory
A program is first loaded in the computer memory before it is executed. The
instructions of the loaded program are executed one by one by the CPU. The data and
results of calculations are also stored in the main memory. The main memory is also known
as working area of the computer. A computer cannot work without having main memory. A
computer system consists of two types of memories.
i) RAM
ii) ROM
Structure of Main Memory
The main memory used in modern computer is built in the form of a chip. The chip is
made of a semi-conductor material. The main memory of a computer consists of thousands
0s or 1s. These cells are logically organized into group of 8 bits called a byte. Figure 2.1
shows memory cells organized as a byte.
34
Unit-2 Memory and I/O Devices
Each byte in the memory has a unique number assigned to it. This number is called
the address of that byte. This scheme of arranging cells into bytes is shown in Figure 2.2.
5. Memory types
Primary Memory / Volatile Memory: Primary Memory is internal memory of the
computer. RAM AND ROM both form part of primary memory. The primary memory provides
main working space to the computer.
Random Access Memory (RAM): The primary storage is referred to as random
access memory (RAM) because it is possible to randomly select and use any location of the
memory directly to store and retrieve data. It takes same time to any address of the memory
as the first address. It is also called read/write memory. The storage of data and instructions
inside the primary storage is temporary. It disappears from RAM as soon as the power to the
computer is switched off. The memories, which lose their content on failure of power supply,
are known as volatile memories.
Read Only Memory (ROM): There is another memory in computer, which is called
Read Only Memory (ROM). Again it is the ICs inside the PC that form the ROM. The storage
of program and data in the ROM is permanent. The ROM stores some standard processing
programs supplied by the manufacturers to operate the personal computer. The ROM can
only be read by the CPU but it cannot be changed. The basic input/output program is stored
in the ROM that examines and initializes various equipments attached to the PC when the
power switch is ON. The memories, which do not lose their content on failure of power
supply, are known as non-volatile memories. ROM is non-volatile memory.
PROM: There is another type of primary memory in computer, which is called
Programmable Read Only Memory (PROM). You know that it is not possible to modify or
erase programs stored in ROM, but it is possible for you to store your program in PROM
chip. Once the programmers‘ are written it cannot be changed and remain intact even if
power is switched off. Therefore programs or instructions written in PROM or ROM cannot
be erased or changed.
EPROM: This stands for Erasable Programmable Read Only Memory, which
overcome the problem of PROM & ROM. EPROM chip can be programmed time and again
by erasing the information stored earlier in it. Information is stored in EPROM. Exposing the
35
Unit-2 Memory and I/O Devices
chip for some time to ultraviolet light erases the data. Chip is reprogrammed using a special
programming facility. When the EPROM is in use, information can only be read.
Cache Memory: The speed of CPU is extremely high compared to the access time
of main memory. Therefore the performance of CPU decreases due to the slow speed of
main memory. To decrease the mismatch in operating speed, a small memory chip is
attached between CPU and Main memory whose access time is very close to the processing
speed of CPU. It is called CACHE memory. CACHE memories are accessed much faster
than conventional RAM. It is used to store programs or data currently being executed or
temporary data frequently used by the CPU. So cache memory makes main memory to be
faster and larger than it really is. It is also very expensive to have bigger size of cache
memory and its size is normally kept small.
Registers: The CPU processes data and instructions with high speed; there is also
movement of data between various units of computer. It is necessary to transfer the
processed data with high speed. So the computer uses a number of special memory units
called registers. They are not part of the main memory but they store data or information
temporarily and pass it on as directed by the control unit.
Secondary Memory / Non-Volatile Memory: Secondary memory is external and
permanent in nature. The secondary memory is concerned with magnetic memory.
Secondary memory can be stored on storage media like floppy disks, magnetic disks, and
magnetic tapes. This memory can also be stored optically on Optical disks - CD-ROM.
Magnetic Tape: Magnetic tapes are used for large computers like mainframe computers
where large volume of data is stored for a longer time. In PC also you can use tapes in the
form of cassettes. The cost of storing data in tapes is inexpensive. Tapes consist of
magnetic materials that store data permanently. It can be 12.5 mm to 25 mm wide plastic
film-type and 500 meter to 1200 meter long which is coated with magnetic material. The
deck is connected to the central processor and information is fed into or read from the tape
through the processor. It‘s similar to cassette tape recorder.
Magnetic Disk: You might have seen the gramophone record, which is circular like a disk
and coated with magnetic material. Magnetic disks used in computer are made on the same
principle. It rotates with very high speed inside the computer drive. Data is stored on both
the surfaces of the disk. Magnetic disks are most popular for direct access storage device.
Each disk consists of a number of invisible concentric circles called tracks. Information is
recorded on tracks of a disk surface in the form of tiny magnetic spots. The presence of a
magnetic spot represents one bit and its absence represents zero bit. The information stored
in a disk can be read many times without affecting the stored data. So the reading operation
is non-destructive. New data is overwritten i.e, the existing data is erased from the disk and
new data is recorded. For Example- Floppy Disk.
36
Unit-2 Memory and I/O Devices
Optical Disk: With every new application and software, there is greater demand for memory
capacity. It is the necessity to store large volume of data that has led to the development of
optical disk storage medium. The categories of Optical disks are Compact Disk/ Read Only
Memory (CD-ROM),Write Once Read Many (WORM) and Erasable Optical Disk.
6. Memory errors
The following are some important memory errors
(i) Contact Corrosion: Corrosion occurs on memory module when the contact metal is not
the same as the sockets contact material.
(ii) Parity errors: These errors occur because of the following problems:
a) Poor connection between the memory module and its sockets
b) An intermittent failure or other fault in the power supply.
c) A Bug, Computer Virus etc.
d) A fault in the memory controller chip parity checking circuit present in the
motherboard.
(iii) Incorrect memory size message.
This error occurs if the CMOS setup is not updated to reflect the memory addition. If the
error exists after saving CMOS, then the problem is with the RAM.
(iv) The number 164 error.
This is memory size error. This occurs if the POST does not match with the amount of
memory listed in the systems CMOS setup.
(v) New memory is installed but the system refuses to recognize it.
This error occurs because of wrong setting of jumpers or DIP switches.
7. Hard disk
A hard disk drive (sometimes abbreviated as Hard drive, HD, or HDD) is a non-
volatile memoryhardware device that permanently stores and retrieves information. There
are many variations, but their physical sizes are 3.5" and 2.5" for desktop and laptop
computers respectively. A hard drive consists of one or more platters to which data is written
using a magnetic head, all inside of an air-sealed casing. Internal hard disks reside in a drive
bay, connect to the motherboard using an ATA, SCSI, or SATA cable, and are powered by a
connection to the PSU (power supply unit).
Construction
Hard disk drives are otherwise called Winchester disk. A hard disk consists of
number of disks called platters coated with magnetic material on both sides put together on
a common shaft or spindle. These disks are not removable. It is shown in Figure 2.3
Spindle & Motor
A hard drive's motor rotates the platter (or platters) counter-clockwise at speeds measured in
revolutions per minute (RPM). The speed varies depending on the individual hard drive and
37
Unit-2 Memory and I/O Devices
manufacturer. Spindles spin continuously unless the hard drive is set up to go into a sleep
mode when it is inactive or idle (not being used).
Actuator
The actuator is the device used to position the head arms to different tracks on the surface
of the platter (actually, to different cylinders, since all head arms are moved as a
synchronous unit, so each arm moves to the same track number of its respective
surface).The actuator is a very important part of the hard disk, because changing from track
to track is the only operation on the hard disk that requires active movement: changing
heads is an electronic function, and changing sectors involves waiting for the right sector
number to spin around and come under the head (passive movement). Changing tracks
means the heads must be shifted. So making sure this movement can be done quickly and
accurately is of paramount importance.
38
Unit-2 Memory and I/O Devices
Figure 2.3 shows the organization of hard disk. The surface of the drive platter is
organized with coordinates, much like a map. Data is stored in concentric tracks on the
surfaces of each platter. (A platter has two sides, and thus, two data recording surfaces.)
A typical disk drive can have more than 2,000 tracks per inch (TPI) on its recording
surface. A cylinder describes the group of all tracks located at a given head position
across all platters. To allow for easier access to data, each track is divided into
individually addressable sectors. The process of organizing the disk surface into tracks
and sectors is called formatting, and almost all hard disk drives today come preformatted
by the manufacturer. The process of formatting a hard drive applies addressing data to
the platter's surface. In almost all systems, including PCs and Macintoshes, sectors
typically contain 512 bytes of user data plus addressing information used by the drive
electronics (although some proprietary systems use other sector lengths). The disk drive
controller, which resides on the drive's PCB, uses the formatting information and
addresses - much like a tourist uses a city map - to guide data into and out of a specific
location on the hard drive. Without formatting instructions, neither the controller nor the
operating system would know where to store data or how to retrieve it. In earlier hard
drive designs, the number of sectors per track was fixed and, because the outer tracks
on a platter have a larger circumference than the inner tracks, space on the outer tracks
was wasted.
The number of sectors that would fit on the innermost track constrained the
number of sectors per track for the entire platter. However, many of today's advanced
drives use a formatting technique called Multiple Zone Recording to pack more data onto
the surface of the disk. Multiple Zone Recording allows the number of sectors per track
to be adjusted so more sectors are stored on the larger, outer tracks. By dividing the
outer tracks into more sectors, data can be packed uniformly throughout the surface of a
platter, disk surface is used more efficiently, and higher capacities can be achieved with
fewer platters. The number of sectors per track on a typical 3.5-inch disk ranges from 60
to 120 under a Multiple Zone Recording scheme. Not only is effective storage capacity
increased by as much as 25 percent with Multiple Zone Recording, but the disk-to-buffer
transfer rate is also boosted. With more bytes per track, data in the outer zones is read
at a faster rate. Quantum Corporation is a pioneer in Multiple Zone Recording, and was
the first manufacturer to implement Multiple Zone Recording on 2.5-inch disk drive
products.
39
Unit-2 Memory and I/O Devices
Working Principle
Reading
When the computer wants to read data, the operating system works out where the
data is on the disk. To do this, it first reads the FAT (File Allocation Table) at the beginning
of the partition. This tells the operating system in which sector on which track to find the
data. With this information, the head can then read the requested data. The disk controller
controls the drive‘s servo-motors and translates the fluctuating voltages from the head into
digital data for the CPU.
More often than not, the next set of data to be read is sequentially located on the
disk. For this reason, hard drives contain between 256KB and 8MB of cache buffer in which
to store all the information in a sector or cylinder in case it‘s needed. This is very effective in
speeding up both throughput and access times. A hard drive also requires servo information,
which provides a continuous update on the location of the heads. This can be stored on a
separate platter, or it can be intermingled with the actual data on all the platters. A separate
servo platter is more expensive, but it speeds up access times, since the data heads won‘t
need to waste any time sending servo information.
However, the servo and data platters can get out of alignment due to changes in
temperature. To prevent this, the drive constantly rechecks itself in a process called thermal
recalibration. During multimedia playback this can cause sudden pauses in data transfer,
resulting in stuttered audio and dropped video frames. Where the servo information is stored
on the data platters, thermal recalibration isn‘t required. For this reason the majority of drives
embed the servo information with the data.
Writing:
The computer follows the following steps to write a data onto the hard disk
(i) When a write request is given from the CPU, The O/S reads the FAT from hard disk
and searches for free area.
(iii) The disk controller drives the spindle and head actuator and locates the selected
free sectors (area) under the read/write heads.
(iv) Then the O/S sends write signal to the disk controller.
(v) The disk controller receives the digital data from CPU and converts it into analog
signals.
(vi) According to the analog signals, the heads magnetise the sectors.
To improve the operation, a cache buffer is added to the hard disk drive. The size of
the cache buffer is between 256 KB and 8 MB.
40
Unit-2 Memory and I/O Devices
8. File Systems
A file system consists of two or three layers. Sometimes the layers are explicitly
separated, and sometimes the functions are combined.
The logical file system is responsible for interaction with the user application. It
provides the application program interface (API) for file operations — OPEN, CLOSE,
READ, etc., and passes the requested operation to the layer below it for processing. The
logical file system "manage[s] open file table entries and pre-process file descriptors."This
layer provides "file access, directory operations, [and] security and protection."
The second optional layer is the virtual file system. "This interface allows support for multiple
concurrent instances of physical file systems, each of which is called a file system
implementation". The third layer is the physical file system. This layer is concerned with the
physical operation of the storage device (e.g.disk). It processes physical blocks being read
or written. It handles buffering and memory management and is responsible for the physical
placement of blocks in specific locations on the storage medium. The physical file system
interacts with the device drivers or with the channel to drive the storage device.
File Name:
A filename (or file name) is used to identify a storage location in the file system. Most
file systems have restrictions on the length of filenames. In some file systems, filenames are
not case sensitive (i.e., filenames such as FOO and foo refer to the same file); in others,
filenames are case sensitive (i.e., the names FOO, Foo and foo refer to three separate files)
Directory:
File systems typically have directories (also called folders) which allow the user to
group files into separate collections. This may be implemented by associating the file name
with an index in a table of contents or an inode in a Unix-like file system. Directory structures
may be flat (i.e. linear), or allow hierarchies where directories may contain subdirectories.
Meta data:
The length of the data contained in a file may be stored as the number of blocks
allocated for the file or as a byte count. The time that the file was last modified may be
stored as the file's timestamp. File systems might store the file creation time, the time it was
last accessed, the time the file's metadata was changed, or the time the file was last backed
up. Other information can include the file's device type (e.g. block, character, socket,
subdirectory, etc.), its owner user ID and group ID, its access permissions and other file
attributes (e.g. whether the file is read-only, executable, etc.).
41
Unit-2 Memory and I/O Devices
Utilities:
File systems include utilities to initialize, alter parameters of and remove an instance
of the file system. File utilities create, list, copy, move and delete files, and alter metadata.
They may be able to truncate data, truncate or extend space allocation, append to, move,
and modify files in-place. Depending on the underlying structure of the file system, they may
provide a mechanism to prepend to, or truncate from, the beginning of a file, insert entries
into the middle of a file or delete entries from a file. Utilities to free space for deleted files, if
the file system provides an undelete function, also belong to this category.
File System for Windows Operating System
Windows makes use of the FAT, NTFS, exFAT, Live File System and ReFS file
systems (the last of these is only supported and usable in Windows Server 2012; Windows
cannot boot from it).
Windows uses a drive letter abstraction at the user level to distinguish one disk or
partition from another. For example, the path C:\WINDOWS represents a directory
WINDOWS on the partition represented by the letter C. Drive C: is most commonly used for
the primary hard disk drive partition, on which Windows is usually installed and from which it
boots. This "tradition" has become so firmly ingrained that bugs exist in many applications
which make assumptions that the drive that the operating system is installed on is C. The
use of drive letters, and the tradition of using "C" as the drive letter for the primary hard disk
drive partition, can be traced to MS-DOS, where the letters A and B were reserved for up to
two floppy disk drives. This in turn derived from CP/M in the 1970s, and ultimately from
IBM's CP/CMS of 1967.
FAT:
The family of FAT file systems is supported by almost all operating systems for
personal computers, including all versions of Windows and MS-DOS/PC DOS and DR-DOS.
(PC DOS is an OEM version of MS-DOS, MS-DOS was originally based on SCP's 86-DOS.
DR-DOS was based on Digital Research's Concurrent DOS, a successor of CP/M-86.) The
FAT file systems are therefore well-suited as a universal exchange format between
computers and devices of almost any type and age.
The FAT file system traces its roots back to an (incompatible) 8-bit FAT precursor in
Standalone Disk BASIC and the short-lived MDOS/MIDAS project. Various features have
been added to the file system including subdirectories, codepage support, extended
attributes, and long filenames. Third parties such as Digital Research have incorporated
optional support for deletion tracking, and volume/directory/file-based multi-user security
schemes to support file and directory passwords and permissions such as
read/write/execute/delete access rights. Most of these extensions are not supported by
Windows.
42
Unit-2 Memory and I/O Devices
The FAT12 and FAT16 file systems had a limit on the number of entries in the root
directory of the file system and had restrictions on the maximum size of FAT-formatted disks
or partitions.FAT32 addresses the limitations in FAT12 and FAT16, except for the file size
limit of close to 4 GB, but it remains limited compared to NTFS. FAT12, FAT16 and FAT32
also have a limit of eight characters for the file name, and three characters for the extension
(such as .exe). This is commonly referred to as the 8.3 filename limit. VFAT, an optional
extension to FAT12, FAT16 and FAT32, introduced in Windows 95 and Windows NT 3.5,
allowed long file names (LFN) to be stored in the FAT file system in a backward compatible
fashion.
NTFS:
NTFS, introduced with the Windows NT operating system in 1993, allowed ACL-based
permission control. Other features also supported by NTFS include hard links, multiple file
streams, attribute indexing, quota tracking, sparse files, encryption, compression, and re-
parse points (directories working as mount-points for other file systems, symlinks, junctions,
remote storage links).
exFAT:
exFAT is a proprietary and patent-protected file system with certain advantages over NTFS
with regard to file system overhead. exFAT is not backward compatible with FAT file
systems such as FAT12, FAT16 or FAT32. The file system is supported with newer
Windows systems, such as Windows Server 2003, Windows Vista, Windows 2008, Windows
7, Windows 8, and more recently, support has been added for Windows XP. exFAT is
supported in OS X starting with version 10.6.5 (Snow Leopard).Support in other operating
systems is sparse since Microsoft has not published the specifications of the file system and
implementing support for exFAT requires a license. exFAT is the only file system that is fully
supported on both OS X and Windows that can hold files bigger than 4 GB.
9. Formatting and Troubleshooting
Formatting
Formatting a disk for use by an operating system and its applications typically involves three
different processes.
1. Low-level formatting (i.e., closest to the hardware) marks the surfaces of the disks
with markers indicating the start of a recording block (typically today called sector
markers) and other information like block CRC to be used later, in normal operations,
by the disk controller to read or write data. This is intended to be the permanent
foundation of the disk, and is often completed at the factory.
2. Partitioning divides a disk into one or more regions, writing data structures to the disk
to indicate the beginning and end of the regions. This level of formatting often
includes checking for defective tracks or defective sectors.
43
Unit-2 Memory and I/O Devices
3. High-level formatting creates the file system format within a disk partition or a logical
volume. This formatting includes the data structures used by the OS to identify the
logical drive or partition's contents. This may occur during operating system
installation, or when adding a new disk. Disk and distributed file system may specify
an optional boot block, and/or various volume and directory information for the
operating system.
Troubleshooting hard disk drives
Problem: System is not booting from hard disk drive.
Solution: In CMOS setting drive type may be incorrect or lost. Therefore run SETUP and
auto detect the hard disk type. Boot track maybe corrupted. So reinstall boot tracks using
sys.
Problem: No fixed disk present message on the monitor.
Solution: Enter into CMOS setup and see whether all drive parameters are entered
correctly. If not, enter the parameters and save it. Make sure that there is no IRQ conflicts
between resources.
Problem: Performance of the disk is slow.
Solution: Check the BUFFER setting. If it is too low, increase the values in CONFIG.SYS.
Arrange the data in the hard disk in an order by running SCAN Disk. Interleave may be
incorrect. Therefore do low level formatting.
Problem: Drive may produce high noise during operation.
Solution: Disconnect the drive signal cable and switch on the system. If the noise stops,
there may be a problem with cable or controller. Else back up the data and replace the drive
as early as possible.
Problem: Drive spins, but the system fails to recognize the drive.
Solution:Check whether the interface signal cable is inserted properly and completely at the
drive and the controller. If cable is properly fixed, try with a new cable. Enter the CMOS
setup and check whether all the parameters are entered correctly. Try with auto detect
option. Check the partition on the hard disk by running FDISK from CD drive. There must be
at least one DOS partition. If there is no DOS partition, repartition it and reformat the drive.
Try with a new working hard drive. If it fails, replace the drive controller. If the new drive
works, replace the existing hard drive.
44
Unit-2 Memory and I/O Devices
45
Unit-2 Memory and I/O Devices
(xii) Compact size (easy to handle and store, players can be portable, replication is cheaper)
46
Unit-2 Memory and I/O Devices
2. Recordable DVD
Recordable DVD is a device used to write data once and it can be read many times.
This was introduced in 1997. This was introduced in the autumn of 1997. The important
features are
(i) The storage capacity is 4.7 GB for single sided and 9.4 GB for double sided.
(ii) These disks can be used in DVD-ROM drives of DVD video players
(iii) For reading, it uses a red laser of wave length 635 to 650µm
(iv) The size of pit formed during writing is 0.40µm
(v) The different types of DVR-R are
DVD-R(A) – This refers to DVD-R authoring. This is used by professional DVD users.
In this format writing is done by using 635µm laser beam.DVD-R(G)- This refers to DVD-R
general. In this format writing is done by using 650µm laser
Recording (writing)
Figure 2.5 shows the cross sectional view of double sided DVD. This is made up of a
pregrooved polycarbonate disk . Pregroove is use to guide the laser beam while writing. The
pregroove contains
a) A synchronized signal to control the movement of DVD drive‘s spindle motor during
writing. This signal is also called wobble signal.
b) Land pre-pits in the land area between the grooves. This is used for addressing
purposes.
47
Unit-2 Memory and I/O Devices
Over the polycarbonate disk, a think layer of recording dye is sprayed and is used for
recording. Then a thin reflective layer is coated over this for reflecting the laser beam during
reading operation. Over this a protective layer is coated and is used to protect the disk from
scratch and dust.
3. Rewritable DVD
Rewritable DVD is a device that be erased and written again and again. The Figure
2.6 shows the cross sectional view of a single sided 4 layer DVD
Rewritable DVD uses phase-change technology for reading, writing and erasing. The
phase change medium consists of a grooved polycarbonate substrate. This has four layers.
The phase change (recording) layer namely silver, indium antimony-tellurium is sandwiched
between dielectric layers. This layer changes from crystalline state to amorphous state.
Writing
48
Unit-2 Memory and I/O Devices
During writing, laser beam of wave length 650µm is used to heat selected spots
above 500º -700 ºC. So the spots change to liquid state. Then the spots are allowed to cool.
After cooling the spots becomes amorphous state.
Reading
To read the data in the DVD, a lower power(read power) laser is made to fall on the
surface of the DVD. The amorphous area(pits)reflects less light and crystalline area reflects
more light(land). With the help of the difference in reflectivity, we can read the data.
Erasing
To erase the data on the DVD, a medium power (Erase power) laser of temperature
200º C is made to fall on the recording layer. This melts the amorphous area (pits) and
reverts back to crystalline state.
The important features are
(i) IT uses a 650µm laser for writing.
(ii) This uses land pre-pits between the grooves for addressing.
(iii) The pregroove has a synchronized signal to control the DVD drive‘s spindle motor
during writing. This signal is also called Wobble signal.
(iv) The storage capacity is 4.5 GB.
(v) It is mainly used for data storage and storing movies.
4. Blu-ray
A Blu-ray Disc is a high density optical disc storage medium, which is used for the
storage of all high-definition digital formats like audio, video, and play-station games and so
on. They have the same physical appearance as a DVD. The name ―BLU-RAY‖ is actually a
combination of the colour ―blue‖ and ―ray‖. Here blue refers to the blue colour of the laser
that is used for its reading and ray refers to the optical ray. BD is present in both single layer
and double layer. The single layer Blu-Ray Disc has a capacity of up to 25 GB and double
layer has a capacity of 50 GB. Though this is a practical storage capacity meant for the
present Blu-Ray players, there are BD‘s that have capacities up to 200 GB. The features of
Blu-ray are as follows.
(i) Blu-Ray Disc needs a wavelength of 400 nanometer violet-blue laser for its reading
at different speeds like 4.5 MBPS, 9 MBPS, 18 MBPS, 27 MBPS, 36 MBPS and 54
MBPS.
(ii) Blu-Ray disc can run formats that are encoded in MPEG-4 and MPEG-2.
BD is used for data storage, playing 1080p HD video and audio, 3-D Stereophonic and so on
5. Blu-ray Disc Parameters
Blu-ray disc parameters are measurable factors that define the disc. The important
parameters are Optical, Disk structure and Data Management. Optical parameters include
49
Unit-2 Memory and I/O Devices
laser wavelength, objective lens numerical aperture, protective layer thickness and free
working distance. Data management parameters include data rate, video format, and HDTV
play time and bit‐rate scheme. Disk structure parameters are user data capacity, minimum
beyond a critical writing threshold, changes its reflective properties. Modulation of the
intense light beam is synchronous with the drive signal, so a circular track of data marks is
formed as the surface rotates. Data marks on prerecorded disks are fabricated by first
making a master disk with the appropriate data‐mark pattern. Readout of data marks on the
50
Unit-2 Memory and I/O Devices
disk is illustrated in Figure 2.8, where the laser is used at a constant output power level that
does not heat the data surface beyond its thermal writing threshold. The laser beam is
directed through a beam splitter into the objective lens, where the beam is focused onto the
surface. As the data marks to be read, pass under the scan spot, the reflected light is
modulated. Modulated light is collected by illumination optics and directed by the beam
splitter to servo and data optics, which converge the light onto detectors. The detectors
change light modulation into current modulation that is amplified and decoded to
produce the output data stream. A fundamental limitation to the number of data marks per
unit area is due to the size of the focused laser beam that illuminates the surface. Small
laser spots are required to record and read out small data marks. More data marks per unit
area translate into higher capacity disks, so evolution of optical data storage is toward
smaller spot sizes. Figure 2.9 shows a detailed picture of the laser irradiance approaching
the surface, where irradiance is defined as the laser power per unit area. Ideally, maximum
irradiance is located at the recording material, along with the smallest spot size s. As the
distance increases away from the ideal focus, the spot size increases and the peak
irradiance decreases. A defocus distance δz of only a few micrometers dramatically reduces
peak irradiance and increases spot size. An approximate formula used to estimate the ideal
spot size at best focus is s = λ/(sin θ), where θ is the marginal ray angle of the illumination
51
Unit-2 Memory and I/O Devices
optics, as shown in Fig. 1. Spot size s is the full width of the irradiance distribution at the
1/e2 (13.5%) irradiance level relative to the peak. The value of sin q is often called the
numerical aperture or NA of the optical system.
Instead of focusing directly on the recording surface, optical disks focus through a
protective layer, as shown in Figure 2.10 for a simple CD‐ROM. The protective layer
prevents dust and other contamination from directly obstructing the laser spot at the data
marks. Instead, the out‐of-focus contamination only partially obscures the laser focus cone,
and data can usually be recovered reliably. If the protective layer is scratched or damaged,it
can be cleaned or buffed. As the protective layer gets thinner, the error rate increases to an
unacceptable threshold due to obscuration of the laser beam. This sensitivity decreases as
NA increases, due to the smaller defocus range associated with these systems. In addition,
the free working distance separates the objective lens from the spinning disk. This
separation protects the disk against accidental contact between the objective lens and the
disk. In order to maximize disk capacity, the optical system uses high NA and short
52
Unit-2 Memory and I/O Devices
wavelength. For maximum contamination protection, the protective layer should be as thick
as possible. However, the combination of thick protective layer and high NA is not easily
accomplished. High NA systems are sensitive to changes in substrate thickness and disk tilt.
Manufacturing variations create thickness non-uniformities, which are usually a small
percentage of the total disk thickness.
Motor instabilities induce tilt as the disk spins. Energy from the central portion of the
spot is redistributed to concentric rings, which degrade the quality of the read out signal.
This degrades the read out signal. Tilt causes coma, which is another form of aberration
effect, is called spherical aberration. Sensitivity of the spot to degradation from thickness
variations and disk tilt is plotted in Figure 2.11 as a function of total protective layer thickness
for two values of NA. In order to limit these effects, the substrate is made as thin as possible
without sacrificing contamination protection. The most conservative technology is the Video
CD. Its thick protective layer, relatively low NA and long laser wavelength produce a stable
system that is not very sensitive to environmental factors like dust and scratches. The ideal
spot size is about 0.78/0.5 = 1.6 micrometers. Although the cover layer is thick at 1.2 mm,
the sensitivity to thicknessvariations and disk tilt is low because of the low NA.
53
Unit-2 Memory and I/O Devices
DVD technology uses a shorter wavelength laser, higher NA optics and a thinner
protective layer. The combination of short wavelength and higher NA produce a spot size of
about 1.1 micrometers. The protective layer had to be made thinner, because the sensitivity
to thickness variations and disk tilt is too high otherwise. DVDs are slightly more sensitive to
dust and scratches than CDs. The net effect is not great, because higher NA reduces the
focal depth and DVDs have a more robust error management strategy. The Advanced
Optical Disk and Blu‐Ray systems both use a new blue laser source that emits 0.405
micrometer light. The Advanced Optical Disk system uses the same protective layer
thickness as a DVD, and it uses the same NA objective lens. Due to the short wavelength,
the spot size for the Advanced Optical Disk is about 0.62 micrometers. Sensitivity to dust
and scratches is about the same as a DVD, as well as the sensitivity to thickness variations
and disk tilt. The Blu‐Ray system uses both higher NA and thinner cover layer. The spot size
is 0.405/0.85 = 0.48 micrometers, which is the smallest spot size of all the technologies.
However, because of the high NA, the protective layer had to be made thin to limit sensitivity
to thickness variations and disk tilt. Therefore, Blu‐Ray disks are sensitive to dust and
54
Unit-2 Memory and I/O Devices
scratches. The free working distance is nearly the same for all technologies except Blu‐Ray.
Blu‐Ray systems utilize more complicated lens systems due to the high NA, so working
distance had to be reduced. The integrity of this reduced working distance is not clear at this
time.
(ii) Disk Structure Parameters
The spot size created from the NA and wavelength parameters is the most important
factor to determine the track‐to‐track spacing and the minimum channel bit length along the
track. Several channel bits are encoded into each data mark. The number of channel bits
per data mark depends on the modulation scheme. The relatively large spot produces
relatively large data marks and correspondingly wide tracks and large channel‐bit lengths.
Progressively smaller spot sizes enable smaller track spacing and shorter channel bit
lengths.
55
Unit-2 Memory and I/O Devices
To the user, all generations of optical disks look very similar. They all are round disks
that are approximately 120 mm in diameter, have a central mounting hole and are
approximately 1.2 mm thick.The CD uses a simple 1.2 mm thick substrate, as shown in
Figure 2.12A. Data are recorded on only one side of the disk, through the clear 1.2 mm
substrate, which also serves as the protective layer. DVDs, Warner HD‐DVDs and Advanced
Optical Disks use the format shown in Figure 2.12B, where two 0.6 mm substrates are
bonded together and the data are recorded on the bond side of each substrate. DVDs also
allow two layers. One layer per side (A, B in Figure 2.12B), where the layers are separated
by a thin adhesive spacer. The two layers are fabricated before bonding at the same time as
the individual 0.6 mm substrates. Like the CD, data are recorded and read through the clear
substrates. It is likely that the Warner HDDVD and Advanced Optical Disk will also take
shown in Figure 2.12C, where the protective layers on each side are very thin at 0.1 mm. In
this case, data are recorded on the substrate, which does not serve as the protective layer.
Instead, a protective layer resin is spun on and hardened or a thin protective sheet is
bonded on each side of the substrate. Because of the thin protective layer, the Blu‐Ray disk
must also be used with a cartridge. The only optical disk technology that plans to use a
Cartridge is the Blu‐Ray system. The Blu‐Ray cartridge is necessary for contamination
protection, but the working distance of around 0.1 mm and protective layer thickness of 0.1
mm are large compared to the contact recording. Higher‐resolution mastering machines and
finer control over the injection molding process should produce the required changes without
substantially retooling the industry.
56
Unit-2 Memory and I/O Devices
MPEG‐2. The Advanced Optical Disk exhibits acceptable data rate and reasonable user
data capacity for up to two hours of HDTV per side, compressed with variable bitrate
MPEG‐2. Blu‐ray has slightly higher capacity and data rate. The two‐hour play time for
HDTV with Blu‐Ray is really a specification for realtime recording, which is not easily
compressed into an efficient variable‐rate scheme. Blu‐Ray should easily provide two hours
or longer of prerecorded HDTV per side compressed with MPEG‐2. MPEG‐2 is a technique
for compressing video data and replaying the data associated with certain rules that are
defined in the MPEG‐2 specifications. The action of the optical disk system is not to
compress data or interpret the video information rules. Instead, the optical disk system only
stores and retrieves data on command from the video operating system. Therefore, as video
operating systems and associated compression technology become more advanced, no
fundamental changes are required to the optical disk system. MPEG‐4 technology is an
advanced video compression scheme that utilizes advanced pre‐filtering and post‐filtering, in
addition to a rule‐based algorithm. Estimated improvement in compression is around a factor
of three beyond MPEG‐2.
The structure of the BD is as shown in Figure 2.13. The 0.1mm transparent cover layer is
made of a spin‐coated UV resin. It is formed by sandwiching a transparent layer between a
protective coating and a bonding layer. This layer offers excellent birefringence. Beneath,
57
Unit-2 Memory and I/O Devices
there is a layer of Antis. The layer acts as a heat sink, dissipating the excess heat during the
write process. A spacer layer made of ZnS‐SiO2 comes next. Then, the recording layer
made of Ag, In, Sb, Te, Ge comes. Grooves are formed on this layer for recording.Reflective
layer of Ag alloy falls beneath and finally a plastic substrate comes.
7. Special Drives:
External Drives
External drives are drives which are not mounted on the computer system. But these
are outside the system. These can be connected to the system with the help of USB or
firewire interfaces. These drives can be carried form one place to another and can be used
with any computer instantly.
Memory Stick
Developed by Sony, the Memory Stick is a digital data storage technology with up to
10 times the storage capacity of a 3.5 diskette. Sony is promoting the Memory Stick as a
new way to share and transfer pictures, sound, and other data between different compact
electronic devices such as digital cameras and camcorder. About the size of a flat AA
battery, Memory Sticks are available in 4mb, 8mb, 16mb, 32mb and 64mb sizes. They are
smaller in size than comparable data storage devices, including smart media and compact
flash memory. Figure 2.14 shows the memory stick.
58
Unit-2 Memory and I/O Devices
This 128 MB Memory Stick Duo Media card is the ideal storage solution. Save the files in eight
seconds or less with the super-fast 16 MB/s write speed, then slip it easily into your pocket or
carrying case thanks to the compact, ultra-lightweight design.
59
Unit-2 Memory and I/O Devices
(i) Durability: This means that they are much less vulnerable to damage from shocks
or drops.
(ii) Portability: Average USB drives are typically no longer than two or three inches,
with a width of about one inch.
(iii) Memory Capacity: Most USB flash drives offer memory capacities ranging from 1 to
128 gigabytes.
(iv) The USB drive could be used as a backup, or to store large media files like
photographs, movies, and music.
(v) Transfer Speeds: USB 3.0 devices provide a transfer rate of up to 4.8 gigabytes per
second. Even the highest-performing SD memory cards cannot match this speed,
trailing behind with a maximum rate of 312 megabytes per second. For average
hard-disk drives, the maximum transfer rates range from roughly 50 to 110
megabytes per second.
(vi) Applications and Programs Made Specifically for USB Flash Drives:USB flash
drives offer the option of adding a variety of applications that can be run directly
from the device. There are already a wide range of USB-drive applications,
including portable office software, image editors, web browsers, games, and even
whole operating systems that can be quickly booted from the portable drive.
(vii) Compatibility: The USB interface has become one of the most common ways to
connect an electronic device to virtually any type of computer. Netbooks, laptops,
and desktop computers all feature multiple USB ports.
(viii) Low Power Consumption.
60
Unit-2 Memory and I/O Devices
also known as flash drives or flash cards, are inserted into slots in computer servers referred
to as server-side flash storage or as part of an enterprise flash storage array system.
Sometimes the flash devices are called solid-state hard drives, although that term is
misleading. Unlike a spindled hard disk drive (HDD), an SSD contains no mechanical parts.
A traditional HDD consists of a spinning disk with a read/write head on a mechanical arm,
known as an actuator. An SSD, on the other hand, has an array of semiconductor memory
organized as a disk drive, using integrated circuits rather than magnetic or optical
storage media. The Solid State Storage Initiative has identified three major SSD form
factors for the enterprise:
(i) SSDs that come in traditional HDD form factors and fit into the same slots.
(ii) Solid-state cards that use standard card form factors, such as Peripheral Component
Interconnect Express (PCIe), and reside on a printed circuit board.
(iii) Solid-state modules that reside in a Dual In-line Memory Module (DIMM) or small
outline dual in-line memory module (SO-DIMM), and may use a standard HDD
interface such as Serial Advanced Technology Attachment (SATA).
USB is a serial bus. It uses 4 shielded wires: two for power (+5v & GND) and two for
differential data signals (labelled as D+ and D- in pinout).
In a USB data cable Data+ and Data- signals are transmitted on a twisted pair with no
termination needed. Half-duplex differential signalling is used to reduce the effects of
electromagnetic noise on longer lines. D+ and D- operate together; they are not separate
simplex connections. Features of USB connectors are as follows:
(i) USB supports four data rates:
(ii) Low Speed (1.5 Mbits per second) that is mostly used for Human Input Devices (HID)
such as keyboards, mice, joysticks and often the buttons on higher speed devices such
as printers or scanners;
61
Unit-2 Memory and I/O Devices
(iii) Full Speed (12 Mbits per second) which is widely supported by USB hubs.
(iv) Hi-Speed (480 Mbits per second) was added in USB 2.0 specification. Not all USB 2.0
devices are Hi-Speed.
(v) Super Speed (USB 3.0) rate of 4800 Mbits/s (~572 MB/s).
A USB device must indicate its speed by pulling either the D+ or D- line high to 3.3
volts. These pull up resistors at the device end will also be used by the host or hub to detect
the presence of a device connected to its port. Without a pull up resistor, USB assumes
there is nothing connected to the bus. Pinout for the various connectors are shown Figure
2.16
2 D- White Data -
3 D+ Green Data +
Figure 2.17 shows the Micro-B connector. It is becoming more and more popular on small
devices. Here is the pin out shown in Table 2.1 from the end of the plug
62
Unit-2 Memory and I/O Devices
Wireless Connector
Wireless connector is used to connect the keyboard with the computer without wires,
but is connected to the computer through infrared (IR) or Bluetooth or radio frequency
connection. The signals sent from the keyboard are received by the receiver. The receiver is
either inbuilt or plugged into the USB port. Since the keyboard has no connection with the
computer it must be powered by either battery or AC power. The Signals in the wireless
keyboard are
(i) Radio frequency or infrared or Bluetooth signal sent from the keyboard to the receiver.
(ii) The receiver in the USB port receives the signal and sends it to the CPU. The CPU
converts the scan code into ASCII form.
2. Types of Keys
The following are the types of the keys in the keyboard.
Alphanumeric keys – All of the letters and numbers on the keyboard. A-Z and 0-9.
Punctuation keys – All of the keys associated with punctuation such as the comma, period,
semicolon, brackets, parenthesis and so on. Also, all of the mathematical operators such as
the plus sign, minus sign and equal sign.
Special keys– All of the other keys on the computer keyboard such as the function keys,
control keys, arrow keys, caps lock key, delete key, etc
Function keys – F1-F12 for doing special operations on the programs.
Modifier key - Temporarily modifies the normal action of another key when pressed together.
By themselves, modifier keys usually do nothing; that is, pressing any of the ⇧Shift, Alt, or
Ctrl keys alone does not (generally) trigger any action from the computer.
System Command key – To carry out special actions. The keys are Esc, print screen,
pause.
63
Unit-2 Memory and I/O Devices
3. Keyboard Matrix
Keyboard is a lot like a miniature computer. It has its own processor and circuitry that
carries information to and from that processor. A large part of this circuitry makes up the key
matrix. The key matrix is shown in Figure 2.18.
The key matrix is a grid of circuits underneath the keys. In all keyboards, each circuit
is broken at a point below each key. When key is pressed, it presses a switch, completing
the circuit and allowing a tiny amount of current to flow through. The mechanical action of
the switch causes some vibration, called bounce, which the processor filters out. If a key is
pressed and hold, the processor recognizes it as the equivalent of pressing a key
repeatedly.
When the processor finds a circuit that is closed, it compares the location of that
circuit on the key matrix to the character map in its read-only memory . A character map is
basically a comparison chart or lookup table. It tells the processor the position of each key in
the matrix and what each keystroke or combination of keystrokes represents. For example,
the character map lets the processor know that pressing the a key by itself corresponds to a
small letter "a," but the Shift and a keys pressed together correspond to a capital "A."
A computer can also use separate character maps, overriding the one found in the
keyboard. This can be useful if a person is typing in a language that uses letters that don't
have English equivalents on a keyboard with English letters. People can also set their
computers to interpret their keystrokes as though they were typing on a Dvorak keyboard
even though their actual keys are arranged in a QWERTY layout. In addition, operating
systems and applications have keyboard accessibility settings that let people change their
keyboard's behaviour to adapt to disabilities.
4. Key bouncing
Mechanical switches are used as keys in most of the keyboards. When a key is
pressed the contact bounce back and forth and settle down only after a small time delay
(about 20ms). Even though a key is actuated once, it will appear to have been actuated
64
Unit-2 Memory and I/O Devices
several times. This problem is called Key Bouncing. This problem is eliminated by using
digital filter software.
5. Types of keyboard
There are two types of keyboards depending on the type of the key switches. They
are Simple or membrane keyboard and Mechanical Keyboard.
Membrane keyboards work by electrical contact between the keyboard surface and
the underlying circuits when keytop areas are pressed. The keyboards are quite inexpensive
to mass-produce, and are more resistant against dirt and liquids than most other keyboards.
However, due to a low or non-existent tactile feedback, most people have difficulty typing
with them, especially when larger numbers of characters are being typed. Chiclet keyboards
were a slight improvement, at least allowing individual keys to be felt to some extent.
Aside from early hobbyist/kit/home computers and some video game consoles,
membrane-based QWERTY keyboards are used in some industrial computer systems, and
are also found as portable, even "rollable-collapsible" designs for PDAs and other pocket
computing devices. Smaller, specialised membrane keyboards, typically numeric-and-a-few-
control-keys only, have been used in access control systems (for buildings and restricted
areas), simple handheld calculators, domestic remote control keypads, microwave ovens,
and other similar devices where the amount of typing is relatively small or infrequent, such
as cell phones.Modern PC keyboards are essentially a membrane keyboard mechanism
covered with an array of dome switches which give positive tactile feedback.
In the Figure 2.19, the membrane keyboard basically consists of three layers; two of
these are membrane layers containing conductive traces. The center layer is a "spacer"
containing holes wherever a "key" exists. It keeps the other two layers apart.
65
Unit-2 Memory and I/O Devices
The thickness of the bottom three layers has been exaggerated for clarity; in reality, they are
not much thicker than pieces of paper or thin cardstock.
Under normal conditions, the switch (key) is open, because current cannot cross the
non-conductive gap between the traces on the bottom layer. However, when the top layer is
pressed down (with a finger), it makes contact with the bottom layer. The conductive traces
on the underside of the top layer can then bridge the gap, allowing current to flow. The
switch is now "closed", and the parent device registers a keypress. Typical applications
include; Industrial controls, Access control systems, Medical equipment,
Telecommunications apparatus, Telephone systems, Household appliances and Security
systems.
Mechanical Keyboard
66
Unit-2 Memory and I/O Devices
The vast majority of keyboards used with PCs these days consist of three layers of
plastic membranes lying underneath the set of keys. When the top and bottom layers
connect, they close an electrical circuit that causes the keyboard to send information to the
PC. The middle membrane keeps the two layers separate, but it has holes where the various
keys are positioned. When key is pressed all the way down, that pushes a dome-shaped
piece of rubber or silicone through the holes in the middle membrane to connect the top and
bottom membranes, creating the circuit that causes the keyboard to send the corresponding
input. Technically, the keyboard operates very similarly to the keypad on the microwave
oven or the remote control for your TV. Those devices don't use rubber domes, however,
which is why they don't provide much tactile feedback. Most console gaming system
gamepads use a rubber-dome system, as well.
If the keyboard is connected to PC through a USB port, the most keys you can press
at once and still have the keyboard recognize them is six. Almost all mechanical keyboards
come with PS/2 connectors that don't have this limitation. Figure 2.20 shows the tactile
capacitive switch.
Mouse:
67
Unit-2 Memory and I/O Devices
68
Unit-2 Memory and I/O Devices
(xiii) Return the mouse to it's normal position on the mouse pad.
(xiv) Take a wet cloth with a little bit of rubbing alcohol and cleanse the cord (if a cord is
present).
Troubleshooting flowchart for a mouse
The mouse is not working. The flow chart for troubleshooting the mouse is shown in Figure
2.21.
69
Unit-2 Memory and I/O Devices
1. Types of Printers
There are two types of printers. They are Impact printer and non impact printer.
Impact printer makes contact with the paper. It usually forms the print image by
pressing an inked ribbon against the paper using a hammer or pins. Examples are dot
matrix, daisywheel, line , drum, chain and drum printers.
Impact Printers:
1. Dot Matrix
They create an image on paper by striking pins against an inked ribbon. The ink is
transferred to the paper as closely shaped dots that form each character. Dot matrix printers
are having two important characteristics that include speed which is given in characters per
second (cps). The speed might get varied from about 50 to over 500 cps. Depending on the
quality of print desire, most of the dot matrix printers offer different speeds. Another
characteristic is the quality of print. The quality is determined by the number of pins. It might
get varied from 9 to 24.
Operation of 7 pin printer
The print head of the dot matrix printer consists of a column of 7 small needles. It is
shown in Figure 2.22. Each needle can move freely.Each needle can be made to print a dot
by means of a hammer action that forced the needle to come out and press the ribbon
against the paper. Standard characters are produced in a 5 x 7 dot matrix. (7 dots high and
5 dots wide).
70
Unit-2 Memory and I/O Devices
Thus first column of the characters is got. Then the print head is moved towards right
and once again the pin 1 is made to contact the ribbon. Thus second column of the
character is got. Then the print head is moved to get the third column and so on.
12345
12
34
56
7
Figure 2.23 Sample Output.
In serial dot matrix printers the characters are formed by the print head (or print
head). Such a print head has a number of print wires (pins) arranged in vertical columns and
electro-magnetic mechanism able to shoot these wires.
There are two main print head technologies - in the first one electromagnetic field shoots the
print head's wire. In the second one, the so called permanent magnet printheads, a spring
shoots the print head wire and the magnetic field just holds the spring in stressed and ready
to shoot position. When the electromagnetic field equalizes the magnetic field, the spring is
released to shoot the wire. Both print head mechanisms are shown in action at the picture
bellow.
Classical print head mechanism is showed from the left side and it is shown in figure
2.24.The permanent magnet printer head mechanism. In general the permanent magnet
print heads are faster and are used in heavy-duty printers. Some of the most popular print
heads of this type are: EpsonDFX, IBM 4226, Fujitsu 5600 and 6400, and all Oki print
heads.
71
Unit-2 Memory and I/O Devices
The distance between wires in column may give us the vertical printing resolution.
For example: 9 wire print head with distance 0.35 mm between adjacent wires will result in
25.4/0.35=72.5 dots/inch (dots per inch DPI) vertical printing resolution for one pass printed
line of characters. 24 wire print heads has 2 columns - 12 wires in each, with a vertical
displacement of ½ step. So if the distance between adjacent wires is 0.21 mm, then one
column will print with 25.4/0.21=120.9 dots/inch (DPI) vertical resolution, but since the
second column print between the dots printed from the first one, the overall vertical
resolution will be 240 DPI. The feature and specifications are shown in Table 2.2
Table 2.2 Features and specifications
Print Speed
200 - 1120 CPS (draft)
CPS (characters per second)
72
Unit-2 Memory and I/O Devices
Operation
Inkjet printing is a liquid deposition technique, by which the droplets of the ink were
ejected with the same volume and printed on the substrate. It is a low cost, material-
conserving, non-contact, additive patterning, and maskless approach with the scalability to
large area manufacturing. According to the formation of the uniform drops, printers are
classified into two categories: continuous inkjet printer and drop-on-demand (DOD) inkjet
printer.
For continuous inkjet printer, the ink ejected by the high pressure is broken into
uniform droplets by electromechanical devices, at the same time the droplets are charged
and directed to the desired place in the presence of the deflecting electrode. Figure 2.25
shows the schematic of the continuous inkjet printer. This type of inkjet printer possesses
high-frequency drop generation; however, the cost is also high as its great space
requirement and the complicated ink system. It is best suited for graphic arts and industrial
applications.
73
Unit-2 Memory and I/O Devices
applying voltage on channels, the ink can be ejected as a form of drop and printed on
substrate as the pattern desired.
74
Unit-2 Memory and I/O Devices
75
Unit-2 Memory and I/O Devices
(i) Millions of bytes (characters) of data stream into the printer from the computer.
(ii) An electronic circuit in the printer (effectively, a small computer in its own right)
figures out how to print this data so it looks correct on the page.
(iii) The electronic circuit activates the corona wire. This is a high-voltage wire that gives
a static electric charge to anything nearby.
(iv) The corona wire charges up the photoreceptor drum so the drum gains a positive
charge spread uniformly across its surface.
(v) At the same time, the circuit activates the laser to make it draw the image of the page
onto the drum. The laser beam doesn't actually move: it bounces off a
moving mirror that scans it over the drum. Where the laser beam hits the drum, it
erases the positive charge that was there and creates an area of negative charge
instead. Gradually, an image of the entire page builds up on the drum: where the
page should be white, there are areas with a positive charge; where the page should
be black, there are areas of negative charge.
(vi) An ink roller touching the photoreceptor drum coats it with tiny particles of powdered
ink (toner). The toner has been given a positive electrical charge, so it sticks to the
parts of the photoreceptor drum that have a negative charge (remember that
opposite electrical charges attract in the same way that opposite poles of a magnet
attract). No ink is attracted to the parts of the drum that have a positive charge. An
inked image of the page builds up on the drum.
(vii) A sheet of paper from a hopper on the other side of the printer feeds up toward the
drum. As it moves along, the paper is given a strong positive electrical charge by
another corona wire.
(viii) When the paper moves near the drum, its positive charge attracts the negatively
charged toner particles away from the drum. The image is transferred from the drum
onto the paper but, for the moment, the toner particles are just resting lightly on the
paper's surface.
(ix) The inked paper passes through two hot rollers (the fuser unit). The heat and
pressure from the rollers fuse the toner particles permanently into the fibers of the
paper.
(x) The printout emerges from the side of the copier. Thanks to the fuser unit, the paper
is still warm.
76
Unit-2 Memory and I/O Devices
Features
(i) Quality of printing is high.
(ii) Low printing cost.
(iii) Colour printing is possible.
(iv) It is very easy to print on envelopes, cards and other non-regular media.
(v) Speed of operation is high.
4. Thermal Printers
Most inkjets use thermal technology, whereby heat is used to fire ink onto the paper.
Thermal technology is shown in Figure 2.30.There are three main stages in this process.
The squirt is initiated by heating the ink to create a bubble until the pressure forces it to burst
and hit the paper. The bubble then collapses as the element cools, and the resulting vacuum
draws ink from the reservoir to replace the ink that was ejected. Canon and Hewlett-Packard
favour this method.
Tiny heating elements are used to eject ink droplets from the print head's nozzles.
Most thermal inkjets have print heads containing a total of between 300 and 600 nozzles,
each about the diameter of a human hair (approx. 70 microns). These deliver drop volumes
of around 8 to 10 picolitres (a picolitre is a million millionth of a litre), and dot sizes of
between 50 and 60 microns in diameter. By comparison, the smallest dot size visible to the
naked eye is around 30 microns. Dye-based cyan, magenta and yellow inks are normally
delivered via a combined three-color (cyan, magenta and yellow) print head. Several small
color ink drops - typically between four and eight - are typically combined to deliver a
variable dot size. Black ink, which is generally based on bigger pigment molecules, is
delivered from a separate print head in larger drop volumes of around 35pl.
Nozzle density, corresponding to the printer's native resolution, varies between 300
and 600 dpi, while enhanced resolutions of 1200 dpi are increasingly becoming available.
Print speed is chiefly a function of the frequency with which the nozzles can be made to fire
ink drops and the width of the swath printed by the print head. This is usually around 12MHz
and half an inch respectively, giving print speeds of between 4 to 8 ppm for monochrome
text and 2 to 4 ppm for color text and graphics.
77
Unit-2 Memory and I/O Devices
Thermal technology, meanwhile, imposes the limitation that whatever type of ink is
used; it must be heat-resistant because the firing process is heat-based. Using heat in
thermal printers conversely also creates a need for cooling, which adds to the overall length
of printing time.
5. MFP printer
MFPs are also known as multifunction printers. Multifunction peripheral, a single
device that serves several functions, including printing. Typically, multifunction printers can
act as a printer, a scanner, a fax machine and a photocopier. These devices are becoming a
popular option for Small Office/ Home office users because they're less expensive than
buying three or four separate devices. The downsides to combining all these functions in
one device are:
(i) If the device breaks, all of its functions could be lost at the same time.
(ii) It performs one operation at a time. For example, either it will print a document or
receive a fax at a time.
Benefits
(i) Convenient: The ability to scan and print a document in one device is also
very convenient.
(ii) Cost Savings: More functionalities with less investment.
(iii) Reduce waste: Reduces carbon foot print.
(iv) Space saving: It saves space , energy and time.
8. Troubleshooting
(i) Printer won't print.
If there are no error messages pointing to the problem, check to be sure that the
printer is still connected, via USB or Ethernet cable or—if a wireless model—that the
Wi-Fi is enabled and that printer is connected to the right network. The printer driver
and software needs to be installed on the computer.
(ii) Running out of ink, but printer still can print.
Replace cartridges if the error message is ―low-ink warning‖. Nearly all recent
printers have some sort of ink tank level indicator, and will issue warnings when the ink
is low. The accuracy of these warnings varies widely among manufacturers and
models. Sometimes low-ink warnings indicate that the ink level is critically low.
(iii) Cannot print from mobile device to printer.
Even if printer is old or a non-Wi-Fi model, probably we can print from a phone
or tablet to it. Most new Wi-Fi printers support AirPrint, which lets users of iOS devices
print to them (provided that both the iPhone, iPad, or iPod touch and printer are on the
same Wi-Fi network). Nearly all major printer makers have released apps so that
78
Unit-2 Memory and I/O Devices
iPhone, iPad, Android, and in some cases Windows Phone and BlackBerry users can
print from their devices to that manufacturer's recent models. Printopia requires a Mac,
while Presto! (formerly Fingerprint 2) works either with Macs or Windows machines.
Cloud printing services such as Cortado, ThinPrint Cloud Printer and Google
CloudPrinter work across platforms and device types and with non-WiFi printers as
well. These solutions tend to be limited to printing from a select set of apps. Some new
wireless printers support printing via Wi-Fi Direct, a protocol that lets two compatible
devices make a direct wireless connection without needing a wireless access point.
Although many recent Android devices support Wi-Fi Direct, iPhones do not. Some HP
and Kodak printers support printing via email. In either case, printer gets assigned an
email address, and use an email to attach documents and the printer will automatically
print them out.
(iv) Wi-Fi printing takes too long.
Placing the printer very close to the router should increase throughput and
reduce printing time, but there are other ways to improve Wi-Fi performance while
retaining the flexibility of printer placement that wireless printing promises. Be sure the
router is adequate—it should support 802.11n and offer the 5GHz band as well as 2.4
GHz—and that its firmware is up to date.
(v) Printer too slow.
Some printers are cheetahs and some are sloths, but you may be able to get
even a slow printer to speed up a bit. Unless you need high-quality output for a formal
report or the like, print in draft mode (or whatever the lowest-quality setting is). Avoid
duplex (two-sided) printing, as the printer has to flip the document over to print on both
sides, which can significantly slow it down. Choose printer drivers, print from a host-
based or PCL driver; although PostScript drivers can print photos at higher quality, it
may come at the expense of speed.
(vi) It costs too much to print.
Believe it or not, cost per printed page (based on ink and toner cartridge costs
and yields) has declined in recent years, but that's small comfort to someone having to
pony up for yet another set of cartridges.
(vii) Print those pages that are really needed. Print in draft mode for presentation,
which uses less ink. If the printer supports duplex (two-sided) printing, using it
will save a lot of paper. Just remember to switch back to simplex printing and
quality mode when it requires. The higher capacity cartridges cost more up
front but they have higher yields (can print more pages), and lower cost per
printed page.
79
Unit-2 Memory and I/O Devices
80
Unit-2 Memory and I/O Devices
(viii) Mirrors
(ix) Glass plate
(x) Lamp
(xi) Filters
(xii) Stabilizer bar
(xiii) Belt
(xiv) Cover
Though the configuration of the above components differs according to the
manufacturers design, the basic working is almost the same.
A scanner consists of a flat transparent glass bed under which the CCD sensors,
lamp, lenses, filters and also mirrors are fixed. The document has to be placed on the glass
bed. There will also be a cover to close the scanner. This cover may either be white or black
in colour. This colour helps in providing uniformity in the background. This uniformity will
help the scanner software to determine the size of the document to be scanned. If a page
from a book is to be scanned, you may not be able to use the cover.
The lamp brightens up the text to be scanned. Most scanners use a cold cathode fluorescent
lamp (CCFL).
A stepper motor under the scanner moves the scanner head from one end to the
other. The movement will be slow and is controlled by a belt. The scanner head consists of
the mirrors, lens, CCD sensors and also the filter. The scan head moves parallel to the glass
bed and that too in a constant path. As deviation may occur in its motion, a stabilizer bar will
be provided to compromise it. The scan head moves from one end of the machine to the
other. When it has reached the other end the scanning of the document has been
completed. For some scanners, a two way scan is used in which the scan head has to reach
its original position to ensure a complete scan.
As the scan head moves under the glass bed, the light from the lamp hits the
document and is reflected back with the help of mirrors angled to one another. According to
the design of the device there may be either 2-way mirrors or 3-way mirrors. The mirrors will
be angled in such a way that the reflected image will be hitting a smaller surface. In the end,
the image will reach a lens which passes it through a filter and causes the image to be
focused on CCD sensors. The CCD sensors convert the light to electrical signals according
to its intensity. Take a look at the Figure 2.31
81
Unit-2 Memory and I/O Devices
All scanners work on the same principle of reflectance or transmission. The image is
placed before the carriage, consisting of a light source and sensor; in the case of a digital
camera, the light source could be the sun or artificial lights. When desktop scanners were
first introduced, many manufacturers used fluorescent bulbs as light sources. While good
enough for many purposes, fluorescent bulbs have two distinct weaknesses: they rarely emit
consistent white light for long, and while they‘re on they emit heat which can distort the other
optical components. For these reasons, most manufacturers have moved to cold-cathode
bulbs. These differ from standard fluorescent bulbs in that they have no filament. They
therefore operate at much lower temperatures and, as a consequence, are more reliable.
82
Unit-2 Memory and I/O Devices
Standard fluorescent bulbs are now found primarily on low-cost units and older models.
Xenon bulbs had emerged as an alternative light source. Xenon produces a very stable, full-
spectrum light source that‘s both long lasting and quick to initiate. However, xenon light
sources do consume power at a higher rate than cold cathode tubes.
To direct light from the bulb to the sensors that read light values, CCD scanners use
prisms, lenses, and other optical components. Like eyeglasses and magnifying glasses,
these items can vary quite a bit in quality. A high-quality scanner will use high-quality glass
optics that are colour-corrected and coated for minimum diffusion. Lower-end models will
typically skimp in this area, using plastic
components to reduce costs.
83
Unit-2 Memory and I/O Devices
(ii) CCD (charge-coupled device), the type of sensor used in desktop scanners.
(iii) CIS (contact image sensor), a newer technology which integrates scanning functions
into fewer components, allowing scanners to be more compact in size.
Types of Scanners
There are three types of Scanners. They are Barcode, Handheld and Flatbed Scanner
Barcode Scanner
Barcode scanners have become such a ubiquitous technology that it is easy to take the
complexity of their underlying designs for granted. Barcode scanners require multiple
discrete integrated circuits and an array of passive and active circuitry to provide the
functionality and reliability that end users have come to expect. Many barcode scanners
generally use an optical sensor, such as a charge-coupled device (CCD), which outputs an
analog representation of what is ―visible‖ to the sensor to an analog-to-digital converter
(ADC) controlled by a microcontroller (MCU). The MCU interprets the ADC‘s output as a
sequence of thick and thin black and white bars and processes this sequence further to
derive a string of characters from the pattern. The character sequence may be encoded in
any one of a number of well-defined barcode protocols, such as Code 39.
84
Unit-2 Memory and I/O Devices
Handheld Scanners
Hand-held scanners are used to scan documents by dragging the scanner across the
surface of the document. They are available as document scanners as well as 3-D scanners.
This scanning will be effective only if with a steady hand technique, or else the image may
seem distorted. They have sensors to detect the distortion rate and an indicator will be
provided to alert if the motion of the scanner is too fast.
They also have a START button, which has to be on during the scan duration. They
are synchronized with the computer and also have an automatic optical resolution. The
scanner also has LEDs which light up the image to be scanned. As the image can be
distorted, most of the time there are special reference markers available in the device which
helps in compensating the distortion. Though poor image quality is obtained, fast scanning
of texts can be done with this device.
Hand 3D scanner
Handheld 3D scanners are used in industrial design, reverse engineering, inspection
and analysis, digital manufacturing and medical applications. "To compensate for the
uneven motion of the human hand, most 3D scanning systems rely on the placement of
reference markers, typically adhesive reflective tabs that the scanner uses to align elements
and mark. Handheld scanner is show in Figure 2.34.
85
Unit-2 Memory and I/O Devices
have available transparency adapters, which for a number of reasons, in most cases, are not
very well suited to scanning film. Refer scanner working principle for operation.
CCD Scanner
"A flatbed scanner is usually composed of a glass pane (or platen), under which there is a
bright light (often xenon, LED or cold cathode fluorescent) which illuminates the pane, and a
moving optical array in CCD scanning. CCD-type scanners typically contain three rows
(arrays) of sensors with red, green, and blue filters." Figure 2.35 shows the operation of
CCD Scanner.
Preventive Maintenance
Good indications that scanner requires maintenance are:
(i) Sensor alarms/errors (normally the result of dust build-up preventing sensors from
operating).
(ii) Persistent paper jams despite cleaning and consumable change (normally caused by
residue build-up on rollers or dust inside sensors).
(iii) Degraded image quality such as lines down image or other artefacts (normally caused
by dust and/or residues on the glass guides or inside the optical units).
(iv) Unusual ‗grinding‘ or ‗knocking‘ noises (normally caused by advanced build-up of
residues, dust/toner on rollers and moving parts, or sometimes staples preventing
normal operation).
(v) The frequency of preventative maintenance is governed by how many documents are
scanned within a given period of time. As paper is scanned, dust and chemicals are
transferred to the moving parts and interior of the product. This process is accelerated
on production scanners due to their high speed and high daily duty cycles.
86
Unit-2 Memory and I/O Devices
Troubleshooting
The common problems and solutions of the scanner are shown in Table 2.3.
Problem Solution
Error message similar to • Turn the power switch on the back of the scanner
"Scanner Initialization failed", to OFF.
"Scanner not found" or the • Turn the computer off, wait 60 seconds, and then
TWAIN_32 error , when turn the computer on again.
trying to use the scanner.
• Turn the power switch on the back of the scanner
to ON.
• Reconnect the cable that connects the computer
and the scanner.
• The scanner should be working again. If not, you
may need to contact your technology coordinator.
87
Unit-2 Memory and I/O Devices
88
Unit-2 Memory and I/O Devices
Review Questions
PART-A
1. What is primary memory? What are its Characteristics?
Indicate the Speed of the following memories.
(i) DDR 3 -1600
(ii) PC3-12800
(iii) Memory is rated as 333 MHz
(iv) PC2700
2. Define Access time. How it is measured for RAM and CD-ROM?
3. Define the term latency related to access time.
4. Define wait states.
5. How primary memory is classified?
6. How secondary memory is classified?
7. Mention the important memory errors.
8. How reading is done in hard disk?
9. What is FAT?
10. How many layers does the file system contain?
11. What is File name?
12. Define the term directory and meta data.
13. Expand NTFS.
14. What are the three different processes of formatting?
15. State the features of DVD-ROM.
16. List the features of DVD-video.
17. What are the two types of DVD technology?
18. What is Blu-ray?
19. What are the parameters of Blu ray?
20. List the latest memory sticks with its specifications.
21. What is SSD? What are its three major form factors?
22. Give the pin details of USB connector.
23. State the functions of different keys of the keyboard.
24. Draw the flow chart for troubleshooting the mouse.
25. List the specifications of dotmatrix printer.
26. What are the functions of Multifunction printer.
27. List the different types of scanner.
89
Unit-2 Memory and I/O Devices
PART-B
1. Explain the types of memory in detail.
2. Explain the memory errors.
3. Explain the construction of Hard disk.
4. Explain the working principle of hard disk.
5. Explain the file systems.
6. How to format the hard disk?
7. What are the common problems that occur in Hard disk? What are it‘s solutions?
8. Explain the DVD-ROM in detail.
9. Explain the Recordable DVD.
10. Discuss the Blu ray and its parameters.
11. How recording and playback is done in blu ray.
12. Write short notes on memory stick, USB Flash drive , Solid State Drive.
13. Write short notes on USB and Wireless.
14. Explain the keyboard matrix.
15. Explain the key bouncing.
16. Explain the mechanism of membrane key switches.
17. Explain the operation of optical mouse.
18. How will you clean the optical mouse?
19. Draw the flowchart to troubleshoot the mouse.
20. Explain the Dot Matrix printer in detail.
21. Explain the operation Inkjet printer
22. Explain the working of Laser printer.
23. Explain the common problems encountered in printer and provide its solutions.
24. Explain the scanner mechanism.
25. Explain any type of scanner.
26. Explain the preventive maintenance of scanner.
27. How will you troubleshoot the scanner?
90
Unit -3 Display, Power and BIOS
Learning Objectives
➢ Identify Connectors
Introduction
The output of the computer is shown in display. There are a wide variety of displays
with its own merits and demerits. It’s concepts are presented in this chapter. Technicians
must be aware of the details of power supply in order to troubleshoot the computer. The
concept of switched mode power supply and connector details are briefed. Technician has to
be configuring the computer with the help of BIOS. Certain faults may be identified while
running self testing program. BIOS and POST concepts are explained in this chapter.
1. Displays:
91
Unit -3 Display, Power and BIOS
2. LCD Principles
Introduction:
A liquid crystal display or LCD is combination of two states of matter, the solid and
the liquid. LCD uses a liquid crystal to produce a visible image. Liquid crystal displays are
super-thin technology display screens that are generally used in laptop computer screen,
TVs, cell phones and portable video games. LCD technologies allow displays to be much
thinner when compared to cathode ray tube (CRT) technology.
LCD - Liquid crystal display screen works on the principle of blocking light rather than
emitting light. LCDs require backlight as they do not emits light by them. Cathode ray tube
draw more power compared to LCDs and are also heavier and bigger.
Twisted nematic (TN):
Molecular structure of nematic was naturally twisted. The orientation of the molecules
in the nematic phase is based on the 'director'; this can be anything from a magnetic field,
resulting from the application of an electric current due to an applied voltage across the
glass plates holding the liquid crystal solution, to a surface that has microscopic grooves in
it. In the latter, the molecules at the various layers of the liquid crystal will gradually align
themselves till the molecules at the layer adjacent to the surface will be exactly in line with
the direction of the microscopic grooves on the surface.
Microscopic grooves:
Microscopic grooves in LCD display panels are applied on the surface of the glass
plate that does not have the polarizing film on it to help align the molecular structure of the
liquid crystals as these approaches the glass surface in line with the polarization filters on
either side of the LCD panel.
The Figure 3.1 shows the structure of first principle
92
Unit -3 Display, Power and BIOS
Polarization filters:
The polarization filters on either side of an LCD display are set at 90 degrees to each
other (ref. to above diagram). This means that the crystal lineup will go through a 90 degrees
twist from one panel surface to the other. When a light shines on the glass surface of the
first polarization filter, the molecules in each layer of the liquid crystal solution will guide the
light they receive to the next layer. In the process, they will also change the light's plane of
vibration to match their own angle. When the light reaches the far side of the liquid crystal
substance, it vibrates at the same angle as the final layer of molecules. If the final layer is
matched up with the second polarized glass filter, then the light will pass through.
Operation:
When an electric current is passed through these liquid crystals, they will untwist to
varying degrees, depending on the current's voltage. This untwisting effect will change the
polarization of the light passing through the LCD panel. As the polarization changes in
response to the applied voltage across the glass plates, more or less light is able to pass
through the polarized filter on the face of the LCD display.
Color Liquid Crystal Display:
(i)Colour LCDs are those that can display pictures in colors. Three sub-pixels with red,
green and blue colour filters to create each colour pixel.
(ii) For combining these sub-pixels these LCDs should be connected to a large number
of transistors. If any problem occurs to these transistors, it will cause a bad pixel.
(iii) One of the main disadvantages of these types of LCDs is the size. Most
manufacturers try to reduce the height because more transistors and greater pixels
will be needed to increase the length.
(iv) This will increase the probability of bad pixels. It is very difficult or also impossible to
repair an LCD with bad pixels.
Advantages of LCDs:
(i) LCDs consume less amount of power compared to CRT and LED.
(ii) LCDs consume some microwatts for display in comparison to some milli watts for
LEDs.
(iii) LCDs are of low cost.
(iv) Provides excellent contrast.
(v) LCDs are thinner and lighter when compared to cathode ray tube and LED.
Disadvantages of LCDs:
(i) Require additional light sources.
(ii) Range of temperature is limited for operation.
(iii) Low reliability.
93
Unit -3 Display, Power and BIOS
94
Unit -3 Display, Power and BIOS
When voltage is applied through the gold electrodes the neon gas is split into
independent cells and they start to glow. By applying voltages through the gold electrodes
this glow can be controlled, thus, creating a display. No refresh is required in a Plasma panel
display. This also includes the collision between the ions and electrons resulting in the
emission of photon light.
Plasma TV Resolutions
The resolution of a plasma display varies from the early enhanced definition [ED], to
the modern high-definition displays. The most common ED resolutions were 840*480 and
853*480. With the emergence of HDTV’s the resolution also became higher. The modern
plasma TV’s have a resolution of 1024*1024, 1024*768, 1280*768, 1366*768, 1280*1080,
and also 1920*1080.
Advantages of Plasma Display
(i) Very high contrast ratios [1:2,000,000].
(iv) These displays are not available in smaller sizes than 32 inches.
(v) Glass screen, which is needed to protect the display, is included, weighs more.
A display screen made with TFT (thin-film transistor) technology is a liquid crystal
display (LCD), common in notebook and laptop computers, that has a transistor for each
pixel. Having a transistor at each pixel means that the current that triggers pixel illumination
can be smaller and therefore can be switched on and off more quickly.
TFT is also known as active matrix display technology. A TFT or active matrix display
is more responsive to change.
A more recent development is organic thin-film transistor technology, which makes it
possible to have flexible display surfaces.
95
Unit -3 Display, Power and BIOS
Construction:
The only difference is that, the TFT LCD has a sandwich-like structure with liquid
crystal filled between two glass plates. From the figure, TFT Glass has as many TFTs as the
number of pixels displayed. The Color Filter Glass has color filter which generates color.
Figure 3.3 Shows the TFT Display.
Figure 3.3 TFT Display
The Liquid Crystal Displays (LCDs) have the tendency to change the properties of
light passing through the crystals, when they are stimulated by some external electrical
charge. With this property, the Liquid crystals move according to the difference in voltage
between the Color Filter Glass and the TFT Glass. The amount of light supplied by Back
Light is determined by the amount of movement of the liquid crystals in such a way as to
generate color.
Working:
All that is required for LCD pixels to create color is to place a color filter in front of
each pixel. By using red, green, and blue color filters, the required primary colors are
generated to produce the millions of color variations needed for graphics and video display.
Modern LCD technology uses what is known as Thin-Film Transistor (TFT) technology. Each
pixel has its own transistor and capacitor, which increase the contrast rating of the LCD due
to the increased retention of charge. It is shown in Figure 3.5 .
96
Unit -3 Display, Power and BIOS
This helps to dramatically increase the response time for each pixel as they are
scanned. Control of each pixel is simply a matter of addressing a particular column and
individually activating each pixel in that row with a properly timed address pulse on the
horizontal plane. The higher the pulse level, the more the crystals align, producing a lower
light output.TFT-LCD screens consume a significantly higher amount of energy than other
display technologies and are normally found in LCD computer monitors or lower-end and
older cell phones.
5. LED Displays
97
Unit -3 Display, Power and BIOS
LED display chip can be used for devices such as an LED display screen, LED
display sign, LED display panel, LED backlit display, LED display lighting, outdoor LED
display, LED digital display, LED display board or any other LED display chip for lighting or
programming.
Types of LED TV
Full- or Direct-Lit LED TV
Full - LED televisions, sometimes referred to as full-array or direct-lit LED, have the
LED lights arranged behind the entire LCD panel. They are thicker than edge-lit LCD TVs
and have a picture quality similar to that of CCFL-backlit LCD televisions
Edge-Lit LED TV
Edge - lit LED televisions have a series of LED backlights that run along the outside
edges of the screen, which are dispersed across the entire screen by light guides. By
placing the LEDs along the edges only, manufacturers are able to make screens very thin
and further reduce costs.
Applications for LED Displays:
(i) LED displays are often found outdoors in billboards and store signs. They can also
be found in destination signs on public transportation vehicles or as part of
transparent glass area.
(ii) LED panels can either be used for lighting or for general illumination, task lighting or
stage lighting.
LED displays can be found in sports stadiums, public squares, train stations, airports,
highways, commercial plazas, subways, parks, shopping centers, on tall buildings and for
corporate image promotion and advertising.
6. Graphics Cards:
A graphics card is a type of display adapter or video card installed within most
computing devices to display graphical data with high clarity, color, definition and overall
appearance. A graphics card provides high-quality visual display by processing and
executing graphical data using advanced graphical techniques, features and functions.
A graphics card is also known as a graphics adapter, graphics controller, and graphics
accelerator card or graphics board. A graphics card enables the display of 3-D images,
image pasteurization, higher pixel ratio, a broader range of colors and more. Moreover, a
graphics card includes various expansion ports such as AGP, HDMI, TV and multiple
monitor connectivity. A graphics card can be integrated within the motherboard or be added
on as an extension card.
98
Unit -3 Display, Power and BIOS
3.2 SMPS
Switched Mode Power Supply uses a switching regulator to convert electric power
efficiently. SMPS transfers electric power from a source (AC mains) to the load by
converting the characteristics of current and voltage. SMPS always provides a well regulated
power to the load irrespective of the input variations. SMPS incorporates a Pass
transistor that switches very fast typically at 50Hz and 1 MHz between the on and off states
to minimize the energy waste. SMPS regulates the output power by varying the on to off
time using minimum voltage so that efficiency is very high compared to the linear power
supply.
1. Block diagram
99
Unit -3 Display, Power and BIOS
Basic principle:
Switched-mode power supplies are classified according to the type of input and
output voltages. The four major categories are:
(i) AC to DC
(ii) DC to DC
(iii) DC to AC
(iv) AC to AC
A basic isolated AC to DC switched-mode power supply consists of:
(i) Input rectifier and filter
(ii) Inverter consisting of switching devices such as MOSFETs
(iii) Transformer
3. O/P voltage
In a computer mainly three types of DC voltage are required to run. 12 Volts is
necessary to feed the main board itself as well as any new age graphic cards, 5 Volts is
required for the chassis and CPU fan or USB ports, and 3.3 Volts is used for the CPU itself.
12 Volts is also applicable for specific “smart” chassis fans. Thus in broader sense, a
computer power supply can convert 110 Volt electrical current (or 220 Volt for the European
scheme) to +12V, -12V, +5V, -5V, and +3.3Volt.
100
Unit -3 Display, Power and BIOS
There are three types of SMPSs. They are AT, ATX, BTX. These three types of
SMPSs have different connectors and each wire has different voltages.
101
Unit -3 Display, Power and BIOS
80’s and from 1996 we use ATX power supplies. Here are the AT, ATX and BTX
SMPSs voltages and users. Figure 3.8 and Figure 3.9 shows the details of AT and ATX
connectors.
102
Unit -3 Display, Power and BIOS
6. Power Good
The ATX specification defines the Power-Good signal as a +5 volt (V) signal
generated in the power supply when it has passed its internal self-tests and the outputs have
stabilized. This normally takes between 0.1 and 0.5 seconds after the power supply is
switched on. The signal is then sent to the motherboard, where it is received by the
processor timer chip that controls the reset line to the processor. Cheaper and/or lower
quality power supplies do not follow the ATX specification of a separate monitoring circuit;
they instead wire the power good output to one of the 5 V lines. This means the processor
will never reset given bad power unless the 5 V line drops low enough to turn off the trigger,
which could be too low for proper operation.
1. Common Failures
The following probably account for 95% or more of the common SMPS ailments:
(i) Supply dead, fuse blown - shorted switch mode power transistor and other
semiconductors, open fusible resistors, other bad parts. Supply dead, fuse not blown
- bad startup circuit (open startup resistors), open fusible resistors (due to shorted
semiconductors), bad controller components.
(ii) Supply mostly dead or takes a long time to come alive. There may be an LED
flashing but the equipment doesn't respond to power button (or takes awhile) - bad
electrolytic capacitors.
(iii) One or more outputs out of tolerance or with excessive ripple at the line frequency
(50/60 Hz) or twice the line frequency (100/120 Hz) - dried up main filter capacitor(s)
on rectified AC input.
(iv) One or more outputs out of tolerance or with excessive ripple at the switching
frequency (10s of kHz typical) - dried up or leaky filter capacitors on affected outputs.
(v) Audible whine with low voltage on one or more outputs - shorted semiconductors,
faulty regulator circuitry resulting in overvoltage crowbar kicking in, faulty overvoltage
sensing circuit or SCR, faulty controller.
103
Unit -3 Display, Power and BIOS
3.3 BIOS
The BIOS includes instructions on how to load basic computer hardware and
includes a test referred to as a POST (Power On Self Test) that helps verify the computer
meets requirements to boot up properly. If the computer does not pass the POST, you will
receive a combination of beeps indicating what is malfunctioning within the computer.
The four main functions of a PC BIOS
(i) POST - Test the computer hardware and make sure no errors exist before loading
the operating system. Additional information on the POST can be found on our POST
and Beep Codes page.
(ii) Bootstrap Loader - Locate the operating system. If a capable operating system is
located, the BIOS will pass control to it.
(iii) BIOS drivers - Low level drivers that give the computer basic operational control over
computer's hardware.
(iv) BIOS or CMOS Setup - Configuration program that allows you to configure hardware
settings including system settings such as computer passwords, time, and date.
2. Cold and Warm booting
Cold booting: Alternatively referred to as a hard boot, cold boot is a term used to
describe the process of turning on the computer after it has been powered off. For example,
when you first turn your computer on after being off for the night you are cold booting the
computer.
Warm Booting: Alternatively referred to as a soft boot, a warm boot is one method
of resetting a computer system that is already powered on, commonly used to recover from
errors that cannot be recovered, or when a computer locks. A warm boot can be
accomplished by pressing the CTRL - ALT - DEL keys simultaneously, or by selecting the
restart command from an operating system menu. Warm boots run faster than turning a
computer off and on again.
104
Unit -3 Display, Power and BIOS
A beep code is the audio signal given out by a computer to announce the result of a
short diagnostic testing sequence the computer performs when first powering up (called the
Power-On-Self-Test or POST).
Table 3.1
1 long beep followed Video configuration failure (a faulty video card or no card installed),
by 2 short beeps or an external ROM module does not properly checksum to zero.
1 Refresh failure
105
Unit -3 Display, Power and BIOS
4. BIOS interrupts
Interrupts are used to demand attention from the CPU. There are processor’s
hardware and software driven interrupts. The PC was designed as an interrupt driven
system. Communications between the CPU, hardware and software occurs by means of
flags or interrupts which signal when a device or piece of software needs attention from the
CPU. The PC is limited to 256 interrupts each of which receives a number. The
Programmable Interrupt Controller (PIC) controls which interrupt gets the attention of the
CPU and when. Basically, the lower numbered interrupts receive attention from the CPU
before the higher numbered interrupts. The PC interrupts can be divided into six categories:
(i) Processor Interrupts - Interrupts 00h to 07h are called by the processor directly, but
can also be called from software using the INT instruction.
(ii) Hardware Interrupts - The hardware interrupts differ from all the software interrupts
in that they have a direct channel to the processor thorough an Interrupt Request
Line or IRQ.
(iii) Software Interrupts - These interrupts are generated by the ROM BIOS during the
start up of the computer. These interrupts are used for general low-level services.
(iv) DOS Interrupts - These interrupts are available when DOS is running and provide
additional routines for enhanced access to devices and other resources.
(v) ROM Basic Interrupts - These interrupts are available when BIOS is running.
(vi) General use Interrupts - These interrupts are available for use by other programs.
106
Unit -3 Display, Power and BIOS
107
Unit -3 Display, Power and BIOS
Gate A20 Option: FAST. This feature is made more or less obsolete by Windows XP.
Typematic Rate Setting: Disabled. This feature determines how long the keyboard waits
when holding down a key until it starts repeating it, and how fast that happens.
APIC Mode: Enabled. This is the Advanced Programmable Interrupt Controller, which is
responsible for multi-processor support, more IRQs, and faster interrupt handling.
OS/2 Onboard Memory > 64M: Disabled. This setting only applies to users running the now
defunct OS/2 operating system from IBM.
Full Screen LOGO Show: When enabled, the memory count and Power-On Self-Test
(POST) are hidden behind a "curtain" - a graphic logo. For example, when you first turn on a
Gateway computer, you might see GATEWAY in big letters across the screen. When
disabled, the "normal" initiation sequence is displayed on the screen - the way most
computers look when you first turn them on before the operating system begins to load.
POST Complete Report: Your choice. This setting, when enabled, will display the results of
the POST.
Speech POST Reporter: This setting, when enabled on a PC with speakers, will "talk" over
your speakers at boot time to tell you the status of the POST. The voice quality is a far cry
from that of the computers on Star Trek, but some people think it's cool.
6. Upgrading BIOS
Its quality and modernness determine the features and capabilities of machine to a
large degree. The most famous example of this is support for IDE/ATA hard disks over
504 MB; the only change necessary to support these larger drives in most cases is a BIOS
capable of doing the geometry translation. There are other examples as well; many
motherboard manufacturers are able to expand the capabilities of their boards, or fix
problems with them, by making changes to the BIOS and either giving free downloads or
selling upgrades, just as software application houses like Microsoft, Lotus, etc. do. The BIOS
program in PC is programmed into a read-only memory (ROM). ROMs are, of course, not
rewriteable the way RAM is; that is why they are called "read-only". Fortunately, technology
came to the rescue through the invention of the flash BIOS. Some machines still require the
physical upgrade but by using the flash BIOS, most newer machines can upgrade using
special software without having to open the case at all.
7. Flash BIOS-Setup
Machines with flash BIOS capability use a special type of BIOS ROM called an
EEPROM; this stands for "Electrically Erasable Programmable Read-Only Memory". This is
a ROM that can be erased and re-written using a special program. This procedure is called
flashing the BIOS and BIOS that can do this is called flash BIOS. The advantages of this
capability are obvious; no need to open the case to pull the chip, and much lower cost.
108
Unit -3 Display, Power and BIOS
If your system becomes corrupted to the point where it will not boot, you are in a
catch-22. Your BIOS is corrupted, so you can't boot the PC, and since you can't boot the PC
there's no conventional way to re-flash the BIOS. Fortunately, BIOS chip corruption is quite
rare; the BIOS is a small program and flashing it usually takes only a few seconds. Still, it's
not something to try in the middle of a thunderstorm, and using aUPS when doing this type
of work, is good. And it should be ensuredthat the right BIOS image is being used.
The AMI or Award BIOS id appears at the bottom of the screen after power on,
during memory count up. The PAUSE key should work at that point, allowing one to write
down the BIOS number, the BIOS date, and the version. Another (easier) way to get the
Award/AMI BIOS ID is by downloading the BIOS Agent Plus software (spyware/adware free)
which will scan the PC and return the BIOS ID among other hardware information. Optionally
it'll also find the correct BIOS Update (if available) and offer a paid subscription option to the
BIOS Agent Plus service where one will get access to BIOS Updates and Driver Updates on
PCs(between 1 to 10 PCs for 1 year). (One can perform the scan without buying anything.)
The AMI BIOS id appears at the bottom of your screen after power on, during
memory count up. The PAUSE key should work at that point, allowing you to write down the
BIOS number, the BIOS date, and the version. In this example of an AMI BIOS id: 51-0102-
1101-00111111-101094-AMIS123-P. To find motherboard manufacturer, please look at the
third (3) set of numbers in BIOS string. In this case its 1101 indicates the manufacturer is
SUNLOGIX INC.
109
Unit -3 Display, Power and BIOS
3.4 POST
POST is a series of program routing in the motherboard ROM firmware and is used
to check the system components. This was introduced by IBM in 1981. When we switch on
the computer, POST is executed first and automatically performs a series of tests that check
the various components in the system. The components tested by POST are CPU, ROM,
motherboard support circuitry memory and major peripherals.
Whenever a faculty component is found, it gives an error or warning message. There
are two types of error message. They are Audio error codes and display error codes. The
POST programs are stored in the final 8 KB area of the 1 MB BIOS ROM. Once the
computer is switched on or reset, the microprocessor starts processing POST from memory
address FFFF0.
1. Error
Error is a warning given by the system during POST for a faulty hardware
component.
2. Beep Codes
Some number of short beeps that are sounded by the BIOS upon startup when a
memory, cache or processor error is encountered. There are numerous beep code patterns,
and Phoenix BIOS codes are long and short beeps delivered in groups. The following beep
codes are for AMI BIOSs.
1 Beep - Refresh Failure-Reseat/replace memory, troubleshoot motherboard.
2 Beeps - Parity Error-Reseat/replace memory, troubleshoot motherboard.
3 Beeps - Memory Error (first 64KB)-Reseat/replace memory.
4 Beeps - Timer Failure-Troubleshoot motherboard.
5 Beeps - Processor Failure-Troubleshoot CPU, motherboard.
6 Beeps - Keyboard Controller Failure-Troubleshoot keyboard, motherboard.
7 Beeps - Virtual Mode Exception Error-Troubleshoot CPU, motherboard.
8 Beeps - Display Memory Failure-Troubleshoot graphics card, motherboard.
9 Beeps - ROM BIOS Checksum Failure-Replace ROM BIOS, troubleshoot motherboard.
10 Beeps - CMOS Shutdown Register Failure-Troubleshoot motherboard.
11 Beeps - L2 Cache Failure-Troubleshoot L2 cache, motherboard.
Continuous Beeps - Memory or Video Failure-Troubleshoot memory, graphics card, mother-
board.
3. Error Messages
A POST error message is an error message displayed on the monitor during the
Power On Self Test (POST), if the BIOS encounters some kind of problem while starting the
PC.A POST error message will only display on screen if the computer is capable of booting
this far. If the POST detects an error before this point, a beep code or POST code will be
110
Unit -3 Display, Power and BIOS
generated instead.POST error messages are usually fairly descriptive and should give you
enough information to begin troubleshooting whatever problem the POST found. A POST
error message is sometimes called a BIOS error message, POST message, or POST
screen message.
Examples:"The POST error message that was on my screen said that the CMOS battery
had failed on my motherboard."
4. Post-Fault related to Hardware
The computer POST (power-on self-test) checks a computer's internal hardware for
compatibility and connection before starting the remainder of the boot process. If the
computer passes the POST, the computer may give a single beep (some computers may
beep twice) as it starts and continue to boot. However, if the computer fails the POST, the
computer will either not beep or generate a beep code that tells the user the source of the
problem. If computer has an irregular POST or a beep code not mentioned below, follow the
POST troubleshooting steps to determine the failing hardware component.
111
Unit -3 Display, Power and BIOS
1 short and no
Video cable and /or display
display
112
Unit -3 Display, Power and BIOS
Review Questions:
PART – A
PART – B
3. Explain the working of Plasma display with its advantages and disadvantages.
9. Write Short notes on Cold and warm booting, BIOS error codes, BIOS interrupts, BIOS
advanced setup &Upgrading BIOS
113
Unit -IV Maintenance and Troubleshooting of Desktop and Laptop
Learning Objectives
Introduction
4.1 Laptop
A laptop is an all-in-one machine, with the screen, keyboard and mouse built into the
device. A laptop is a versatile, small and portable computer that gives people access to
internet browsing and files from any location.
114
Unit -IV Maintenance and Troubleshooting of Desktop and Laptop
inches
3 desktop is typically set up on a desk, laptops are designed for portability.
table or counter
4 desktop computer has its central laptop computers are small, self-
processing unit detached from the contained machines, all of the
visual display and other peripheral hardware that is needed to use the
devices computer is bundled into one unit,
including the display and keyboard
5 The separate CPU allows users space the size limits the space available
to install more advanced components inside for hardware and internal
and adequate cooling to achieve high- cooling, which has been a limiting
performance hardware configurations, factor in terms of overall
desirable for applications such as 3D performance
modeling and gaming.
6 Individuals who run their business, Students and traveling
academic or personal affairs from a professionals prefer laptop
fixed home or office location are able to
opt for desktop
Types of laptop computers differ according to functionality, weight and price. The
following are the most common types of laptop computers.
115
Unit -IV Maintenance and Troubleshooting of Desktop and Laptop
(iii) Subnotebooks
This is an ultraportable laptop that is marketed based on its portability since it has
low weight, smallness in size and has a battery with a longer life. It resembles the notebook.
As compared to standard laptops, a subnotebook is smaller and lighter. It weights between
two and five pounds, and its battery life exceeds ten hours. Most subnotebooks do not have
the removable media drive so as to lower the weight. In such cases the laptop is paired with
a docking station. These computers run general-purpose operating systems as opposed to
the specialized software.
(v) Netbooks
Netbooks are economical, light-weight, energy efficient and inexpensive laptops
suited for internet access and wireless communication. They excel in web-based
performance. Netbooks focus majorly on e-mailing and web browsing. Most netbooks do not
have an optical disk, and range from between five and twelve inches and between two and
three pounds. Netbooks usually have light-weight operating systems such as Windows XP
and Linux installed in them. Most netbooks have one memory slot which does not recognize
any memory card beyond 2GB. This limits how the netbook functions beyond the basic
functions i.e. emailing and internet.
116
Unit -IV Maintenance and Troubleshooting of Desktop and Laptop
The figure 4.1 shows the block diagram of laptop. The microprocessor, or CPU,
works with the operating system to control the computer. It essentially acts as the
computer's brain. The CPU produces a lot of heat, so a desktop computer uses circulating
air, a fan and a heat sink -- a system of plates, channels and radiator fins used to draw heat
off of the processor -- to cool off. Since a laptop has far less room for each of these cooling
methods, its CPU usually:
(i) Runs at a lower voltage and clock speed -- This reduces heat output and power
consumption but slows the processor down. Most laptops also run at a higher voltage
and clock speed when plugged in, and at lower settings when using the battery.
(ii) Mounts to the motherboard without using pins -- Pins and sockets take up a lot of
room in desktop PCs. Some motherboard processors mount directly to the
motherboard without the use of a socket. Others use a Micro-FCBGA (Flip Chip Ball
Grid Array), which uses balls instead of pins. These designs save space, but in some
cases mean that the processor cannot be removed from the motherboard for
replacement or upgrading.
(iii) Has a sleep or slow-down mode -- The computer and the operating system work
together to reduce the CPU speed when the computer is not in use or when the
processor does not need to run as quickly. The Apple G4 processor also prioritizes
data to minimize battery drain.
117
Unit -IV Maintenance and Troubleshooting of Desktop and Laptop
(iv) Some laptops use desktop CPUs that are set to run at lower clock speeds. Although
this can improve performance, these laptops typically run much hotter and have a
significantly reduced battery life.
118
Unit -IV Maintenance and Troubleshooting of Desktop and Laptop
Most laptops have graphics capability built into the motherboard or have smaller
graphics cards with a GPU designed specifically for laptop use. GPU manufacturers
ATI and nVidia both make GPUs specifically for laptops. Laptops frequently share
memory between the CPU and the GPU, saving space and reducing power
consumption.
(vii) Many people don't notice a laptop's reduced graphics performance. Laptops have
plenty of processing power for Web surfing and productivity applications. However,
they may struggle with the latest 3-D games. A few specialty laptops, designed for
gaming enthusiasts, include more powerful GPUs and additional video memory.
A laptop displays its graphics on a liquid crystal display (LCD) screen. Most screens
measure between 12 and 17 inches, and the size of the screen affects the overall size of the
laptop. In addition, laptop screens can be:
(i) Black-and-white (16 grayscale) or color (65,536 colors)
(ii) Active or passive matrix
(iii) Reflective or backlit
Active matrix displays have sharper images and are easier to read, and backlit
screens are better for low-level lighting conditions.
Most laptops also have sound cards or integrated sound processing on the
motherboard as well as small, built-in speakers. However, there is generally not enough
space inside a laptop for a top-of-the-line sound card or a high-quality speaker. Gaming
enthusiasts and audiophiles can supplement their laptops' sound capabilities with external
sound controllers, which use USB or FireWire ports to connect to the laptop.
4.1.5 Configuring laptops and power settings
A laptop is purchased with the ability to be configured with many different settings for
security, memory, speed or other options. Follow these steps to configure the laptop for a
variety of settings.
Step 1
Configure the laptop for security by making a startup password. Press the power
button on laptop, press the "F2" key and hold down "Alt" while pressing "P" to scroll through
the pages. Find the page titled "System Security." Use the left and right arrow keys to modify
values. Change the primary password to "Enabled," enter a password and push "Esc" to exit
and confirm your password.
Step 2
Set and configure the laptop speed. Speed up your laptop by upgrading the RAM.
Opt for 1GB RAM, this boost 13 percent of speed and 8 minutes of battery power only may
lose.
119
Unit -IV Maintenance and Troubleshooting of Desktop and Laptop
Step 3
Boost your laptop's speed even more by installing a high-end hard drive. If laptop is
upgrade from a 4,200 rpm drive to a 5,400 rpm drive, 18 percent increase in speed can
acquire and only a 7 minute decrease in the life of the battery.
Step 4
Opt for a 2.13G Hz Pentium M CPU if laptop is used for multimedia applications. The
hard drive should be 60GB and 5,400 rpm. At least 1G of RAM is required.
Step 5
Perform a DHCP configuration on Windows XP. Click "Start," "Control Panel,"
"Network and Internet Connections" and "Network Connections." Select "Local Area
Connection," "Change Settings of This Connection," "Internet Protocol," "Properties," and
then check the boxes for "Obtain an IP Address Automatically" and "Obtain DSN Server
Address Automatically." Click "OK" twice.
Configuring Laptop Power Settings:
To access power plan options, type power settings into the search bar in the Start Menu and
hit Enter. The Figure 4.2 shows the power settings.
120
Unit -IV Maintenance and Troubleshooting of Desktop and Laptop
Click on Choose what the power button does and you can tweak several options such as
Requiring a password on wakeup and what the power button on the computer does. I set
“When I press the power button” to Do nothing, you won’t have a problem with the PC
shutting down when you accidently hit the power button. It is shown in Figure 4.4.
To change any one of the predefined power plans click on Change plan settings. It is shown
in Figure 4.5
121
Unit -IV Maintenance and Troubleshooting of Desktop and Laptop
Then change the amount of inactive time before the monitor is turned off or the computer
goes into Sleep mode. It is shown in Figure 4.7.
Figure 4.6
To revert back to the default settings, simply click on Restore default settings for this plan. It
is shown in Figure 4.7
Figure 4.7
Figure 4.8
122
Unit -IV Maintenance and Troubleshooting of Desktop and Laptop
In the Create a power plan window a predetermined plan that is closest to what you want,
and give the plan a name. It is shown in Figure 4.9
Figure 4.9
In the next screen as shown in Figure 4.10 select the sleep and display settings you want to
use and click the Create button.
Figure 4.10
123
Unit -IV Maintenance and Troubleshooting of Desktop and Laptop
After your plan is created you’ll see it under the preferred plans list. It is shown in Figure 4.11
Figure 4.11
Change advanced power settings; it should only be used by advanced users, as if you turn
off the wrong thing, your computer may not function correctly. Choosing between the
predetermined settings should be adequate for most users. It is shown in Figure 4.12
Figure 4.12
124
Unit -IV Maintenance and Troubleshooting of Desktop and Laptop
If you are having issues where your laptop is draining too much battery power, or you want
to check the overall efficiency of power usage on your computer, Use PowerCfg in Windows
7 to Evaluate Power Efficiency. It is shown in Figure 4.13
Figure 4.13
125
Unit -IV Maintenance and Troubleshooting of Desktop and Laptop
(v) Small errors in component placement are corrected automatically as the surface
tension of molten solder pulls components into alignment with solder pads.
(vi) Better mechanical performance under shake and vibration conditions.
(vii) Lower resistance and inductance at the connection; consequently, fewer unwanted
RF signal effects and better and more predictable high-frequency performance.
(viii) Fewer holes need to be drilled.
(ix) Lower initial cost and time of setting up for production.
(x) Simpler and faster automated assembly. Some placement machines are capable of
placing more than 136,000 components per hour.
(xi) Many SMT parts cost less than equivalent through-hole parts.
(xii) Better EMC performance (lower radiated emissions) due to the smaller radiation loop
area (because of the smaller package) and the smaller lead inductance.
Disadvantages
(i) Manual prototype assembly or component-level repair is more difficult and requires
skilled operators and more expensive tools, due to the small sizes and lead spacings
of many SMDs.
(ii) SMDs cannot be used directly with plug-in breadboards (a quick snap-and-play
prototyping tool), requiring either a custom PCB for every prototype or the mounting
of the SMD upon a pin-leaded carrier. For prototyping around a specific SMD
component, a less-expensive breakout board may be used. Additionally, stripboard
style protoboards can be used, some of which include pads for standard sized SMD
components. For prototyping, "dead bug" breadboarding can be used.
(iii) SMDs' solder connections may be damaged by potting compounds going through
thermal cycling.
(iv) Solder joint dimensions in SMT quickly become much smaller as advances are made
toward ultra-fine pitch technology. The reliability of solder joints becomes more of a
concern, as less and less solder is allowed for each joint. Voiding is a fault commonly
associated with solder joints, especially when reflowing a solder paste in the SMT
application. The presence of voids can deteriorate the joint strength and eventually
lead to joint failure.
(v) SMT is unsuitable for large, high-power, or high-voltage parts, for example in power
circuitry. It is common to combine SMT and through-hole construction, with
transformers, heat-sinked power.
SMT is unsuitable as the sole attachment method for components that are subject to
frequent mechanical stress, such as connectors that are used to interface with external
devices that are frequently attached and detached.
126
Unit -IV Maintenance and Troubleshooting of Desktop and Laptop
Electrostatic discharge (ESD) is the sudden flow of electricity between two electrically
charged objects caused by contact, an electrical short, or dielectric breakdown. A buildup of
static electricity can be caused by tribocharging or by electrostatic induction.
Precautions :
(i) Keep all synthetic materials at least 4 in. away from electronic equipment.
(ii) When cleaning printed circuit boards, use a spray labeled as non-static forming.
(iii) When troubleshooting electronic equipment, always wear a static wrist strap that's
grounded to the frame of the device. Also, wear the wrist strap when handling printed
circuit boards.
(iv) Treat carpets and floors with compounds that reduce the buildup of static charges.
(v) Use static floor mats where necessary.
(vi) Make sure the grounding system for equipment has a low impedance for ESD
currents to dissipate to an earthing reference.
127
Unit -IV Maintenance and Troubleshooting of Desktop and Laptop
The charging units for laptops are known as 'adapters' because they must adapt AC
power to DC power or one type of DC power to another type in order to provide energy to
the laptop unit. There are two types of adaptor. AC power adaptor and DC power adaptor.
AC Power Adapter
A laptop power adapter consists first of a wire which plugs into the wall socket and
accepts AC power. This wire generally travels to a black box, called a transformer, which
converts the AC power provided by wall the outlet to the DC power needed by the electronic
device, the same type of power which is provided by its battery. This electric current it then
carried by a second wire which connects to the device itself.
DC Power Adapters
There are many common types of DC power units, including car power plugs, those
offered on aeroplane flights, and batteries designed to recharge other batteries. Because
laptops run on DC power, it is easy to assume that plugs which provide DC power can be
connected to the outlet directly. However, this is not always a safe or helpful to the laptop
since it is common for DC plugs to provide less voltage than is needed to power the unit.
Therefore, DC power adapters need to store up the power that the plug provides in order to
convert it to a voltage high enough to power the laptop itself.
Universal Power Adapters
The purpose of a universal power adapter is to accommodate all types of laptops and
charging situations through the use of interchangeable tips. There are also various voltages
and sizes offered to make sure that buyers can function in virtually any environment
including AC and DC charging conditions, as well as across multiple brands and types of
laptops.
4.2.2 Battery-types and Basic Problems
Laptop battery provides power to the computer when the user does not have access
to a power outlet. Laptop batteries, like most batteries used in portable devices, are
rechargeable. Most modern laptop batteries hold a charge for between two and five hours of
light-duty use, though that number can drop to less than an hour for power-intensive tasks.
The three main types of batteries used in modern laptops are nickel-metal hydride (NiMH),
lithium ion (Li-ion), and lithium polymer (LiPo) batteries. NiMH batteries are the oldest
technology currently in use, while LiPo batteries represent the cutting edge of portable power
supply technology.
128
Unit -IV Maintenance and Troubleshooting of Desktop and Laptop
129
Unit -IV Maintenance and Troubleshooting of Desktop and Laptop
unplugged. connection with the motherboard. Apply some electronic contact cleaner
on the contacts.
3. If reconnecting the battery doesn’t help, most likely it’s bad and has to
be replaced
4. If you replaced the battery but the problem still exists, this is
motherboard related failure. Apparently the charging circuit on the
motherboard failed. In this case the whole motherboard has to be
replaced (or repaired on the component level).
The battery not 1. Most likely the battery is bad. You have a very good chance to fix this
detected by the problem by replacing it with a new one.
laptop. 2. If replacing the battery doesn’t help, this is motherboard related failure.
The motherboard has to be replaced (or repaired on component level).
The battery This is battery failed. It has to be replaced with a new one.
discharges very
quickly after it
reaches some
critical point.
The battery 1. AC adapter failure. The AC adapter power cable is damaged.
charges only if 2. If the AC adapter works fine, most likely this is power jack (connector
the power plug where you plug power adapter) failure. In this case the power jack has
positioned to be replaced.
correctly.
Laptop memory comes in several shapes and sizes. Laptops rarely use the standard SIMM
and DIMM memory modules used by non-portable machines. The different types of Memory
with its features are listed in Table 4.3
Table 4.3 MEMORY TYPES
144 PIN 32-bit transfer 2.66" wide 3.3V 144-pin Small Outline Dual 128-
SODIMM SO-DIMMs have a single notch near (but not at) Inline Memory 512
the center. Module Meg
130
Unit -IV Maintenance and Troubleshooting of Desktop and Laptop
128-
PC100 100MHz, XFER 800MB/s 168-pin SDRAM Synchronous
SDRAM 512
modules operate at 3.3V or 5V. Dynamic RAM
Meg
128-
PC133 133MHz, XFER 1.1 GB/s 168-pin SDRAM Synchronous
SDRAM 512
modules operate at 3.3V or 5V. Dynamic RAM
Meg
PC4200* DDR2-533. Memory Clock: 133 MHz. Dual Data Rate 512
DDR2
Bus Clock: 266 MHz. Data Transfers/Sec.: Synchronous Meg -
SDRAM
533,000,000. 200p SODIMM, 1.8v RAM 2 GB
PC5300* DDR2-667. Memory Clock: 166 MHz. Dual Data Rate 512
DDR2
Bus Clock: 333 MHz. Data Transfers/Sec.: Synchronous Meg -
SDRAM
667,000,000. 200p SODIMM, 1.8v RAM 4 GB
131
Unit -IV Maintenance and Troubleshooting of Desktop and Laptop
4.2.4 CPU-types
There are different types of laptop processors. The Table 4.4 shows the features of
different processors.
Table 4.4 Features of different processors.
Features Explanation Processors Using
Feature
Intel Features
Hyper-Threading Improves the performance by allowing the Core i7, Core i5,
(HT) operating system to improve its ability to Core i3, Atom
'multitask' processes more intelligently. One
physically present core is treated as two
logical cores which share workloads between
each other. Hence, a dual-core with HT has
4 logical cores and a quad-core has 8 logical
cores.
Turbo Boost Allows the processor to intelligently and Core i7, Core i5
dynamically overclock a core(s) such that (Mobile Dual-Cores
thermal/power constraints are not violated. only)
For example, a dual core processor with
Turbo Boost can overclock one core to much
higher frequencies while decreasing speed
of the other core; in some situations this can
improve performance.
QuickPath An Intel technology which replaced Front Implemented in
Interconnect (QPI) Side Bus (FSB) -- similar in purpose to some fashion across
AMD's competing Hyper Transport all Intel core iX series
technology.
Tri-Gate (3D) A new fabrication technology implemented Ivy Bridge (2012) iX
Transistor for mass production for the first time in 2012 series
with Ivy Bridge. Essentially, increases the
surface area of each transistor on the chip
while also reducing power leakage which on
the whole significantly decreases power
consumption and improves performance.
vPro Synchronizes remote desktop, security, and Current Intel
other multi-station support features. processors
Decreases desk-side maintenance visits.
132
Unit -IV Maintenance and Troubleshooting of Desktop and Laptop
Execute Disable Bit Prevents certain viruses from infecting the Current Intel
system by labeling some data "executable." processors
AMD Features
HyperTransport A feature that helps minimize the number of All current AMD
buses in a system. This can reduce system processors
'bottlenecks' and allow microprocessors to
use system memory more efficiently.
Cool'n'Quiet Reduces heat and noise of processors Phenom I & II,
allowing for increased energy efficiency. Athlon, Sempron
(with exceptions)
Turbo Core Turbo Core allows for contextual Phenom II X6, Trinity
overclocking of the processor to optimize APUs
performance subject to electrical and thermal
requirements/specifications.
Cool Core Limits unused elements of the processor Phenom I & II, Turion
such that power is conserved -- allows for
increased notebook battery life on a single
charge.
The motherboard is the largest card in the computer and it is the one to which all
other cards and the CPU are attached. Both laptops and desktops contain motherboards,
but those in laptops are much more difficult to repair since the components are all packed in
so tightly. The motherboard's primary purpose is to manage all the computer's subsystems.
A chipset manages communications among systems. The motherboard also distributes
power to the systems with low power needs.
Functions
A motherboard contains a socket into which one or more processors can be
attached. It has slots for peripheral cards such as video cards, sound cards or networking
cards. It includes a chipset that acts as an interface between all of a computers subsystems.
It holds the ROM or permanent memory used by the BIOS (Basic Input/Output System) -- a
bit of memory that doesn't get erased when the computer is turned off because it contains
the instructions that reminds the computer what to do when it gets turned back on. In
addition, a motherboard includes a clock generator that is a sort of electronic metronome
that the computer uses to synchronize various operations. It also holds the more active
memory RAM that the machine uses when it runs software. Finally, the motherboard has
133
Unit -IV Maintenance and Troubleshooting of Desktop and Laptop
slots for expansion cards and power connectors which provide power to various components
(high speed graphics cards and disk drives get their power directly from the power supply).
Compatibility
Different motherboards support different types of CPUs, memory, disks drives, video
cards and other peripherals. If you are attempting to replace a motherboard, make sure that
all the components are compatible with the slot and connector types available on the
motherboard. For instance, the CPU socket on a motherboard will vary depending on
whether it supports Intel or AMD and also varies among CPUs by the same maker. Disk
drives have different connectors and standards as well. Most commonly, a motherboard can
support IDE, SATA or both. The slots for expansion cards will vary as well with later versions
of PCI Express being the fastest.
4.2.6 Block Diagram
134
Unit -IV Maintenance and Troubleshooting of Desktop and Laptop
135
Unit -IV Maintenance and Troubleshooting of Desktop and Laptop
136
Unit -IV Maintenance and Troubleshooting of Desktop and Laptop
A typical laptop keyboard layout has typewriter keys, shift keys, function keys, and
cursor control keys. The Figure 4.15 illustrates a typical laptop keyboard layout, where all the
common keys found on the whopping desktop keyboard have been miniaturized to laptop
size.
(i) Alphanumeric, or “typewriter,” keys: These are the basic typing keys, each of
which is labeled with a character (a letter, number, or punctuation symbol).
Pressing a key produces its character on the screen.
(ii) Shift keys: The keyboard sports various shift keys used either alone or in
combination with other keys. These include Shift, Alt, Ctrl, and the special
Windows keys Win and Context. The Win key appears in the bottom row between
the Fn and Alt keys; the Context key appears between Alt and Ctrl. Also note the
Esc (or Escape) key, found at the beginning of the top row of keys.
(iii) Function keys: These keys are labeled F1 through F12 and are found on the top
row of the keyboard, right above the number keys.
(iv) Cursor-control keys: These keys can be anywhere around the keyboard,
although in this example, they’re on the top and bottom right. They include the
four directional arrow keys, usually found in an inverted T pattern, as well as the
Insert (or Ins), Delete (or Del), Home, End, PgUp (or Page Up), and PgDn (or
Page Down) keys.
4.3.1 Formatting
(i) Step 1 - Make sure all essential files of laptop hard drive are backed up on the
back up storage medium. These can be external hard drives, DVDs or Flash drives.
(ii) Step 2 - Check device drivers before starting installation. If laptop came with an
original operating system installation, either you must have the installation CD or
you have to burn it before hand from an existing partition on your laptop.
(iii) Step 3 - You should have a utility or CD burning software on your laptop, which will
allow you to burn the operating system installation files from your hidden hard drive
partition on to a CD. You can confirm the existence of the files by either pressing
F8 or F10 when starting up your computer.
(iv) Step 4 - Check if all essential software installation files are saved on an alternate
storage medium. When downloading any software from the internet ensure that you
have backed up the installation files on an outside medium.
137
Unit -IV Maintenance and Troubleshooting of Desktop and Laptop
(v) Step 5 - Insert the operating system installation CD in the DVD or CD drive on your
laptop. Now boot up the computer. F you are directly formatting from the hidden
partition available on your laptop, start up your system, and then press the shortcut
keys F8 or F10. Now follow the instructions that come up on the screen.
(vi) Step 6 - You should do a full system recovery and install the Windows operating
system to complete re-formatting your laptop.
(vii) Step 7 - Install an antivirus program on the laptop. You should also check and
adjust firewall settings to reinforce your computer’s security system.
(viii) Step 8- Connect the backup storage media to the laptop and transfer all essential
files back on to the system. You should re-install functional software that is most
essential for your work. This conclusively completes full formatting of your windows
laptop
4.3.2 Partitioning and Installation of Operating System
A partition is an area of a hard disk that can be formatted and assigned a drive letter.
On a hard disk, a volume is a formatted primary partition or logical drive. The terms partition
and volume are often used interchangeably. HP and Compaq computers with Windows 7
have hard disk drives that contain at least two partitions: the main partition for Windows and
your work, and a recovery partition to restore the computer back the way it came from the
factory. Here is a list of some of the partitions you may find on your hard drive:
(i) The main partition, usually labeled with the letter C, contains the system files,
program files, and usable file storage space.
(ii) A recovery partition, usually drive letter D and labeled RECOVERY, contains system
recovery information in case the files on the C partition are damaged or unusable.
(iii) A hidden partition may exist called SYSTEM. A SYSTEM partition is used by
Windows to store protected files for troubleshooting and should not be altered.
(iv) computer may also have a partition called "HP_TOOLS". If so, this partition contains
HP tools for UEFI that you can use to help troubleshoot boot problems or test for
hardware failures.
The following steps to be followed to create a new partition in windows 7
1. To open the Disk Management tool, click Start . In the Search field, type Partition.
Then click Create and format hard disk partitions.The Disk Management tool opens
and displays information about the data storage devices on the computer.
2. To create unallocated space on the drive, right-click the drive you want to partition.
For most applications, select the C: drive.
Then click Shrink Volume..It is shown in Figure 4.16
138
Unit -IV Maintenance and Troubleshooting of Desktop and Laptop
139
Unit -IV Maintenance and Troubleshooting of Desktop and Laptop
140
Unit -IV Maintenance and Troubleshooting of Desktop and Laptop
141
Unit -IV Maintenance and Troubleshooting of Desktop and Laptop
8. The Format Partition window displays. To name the drive, type a name in the Volume
label box. Then click Next.
Do not select Perform a quick format or Enable file and folder compression.
Figure 4.22 : Format Partition window
142
Unit -IV Maintenance and Troubleshooting of Desktop and Laptop
10. The Disk Management utility displays, showing the formatting progress.
Figure 4.24 : Formatting
143
Unit -IV Maintenance and Troubleshooting of Desktop and Laptop
specific drive letters. If you change a drive letter, some programs that you have installed on
your hard disk might not work correctly. You cannot change a drive letter if the drive is either
a system partition or a boot partition. If you get an error, the partition or drive you are trying
to change might be in use. Close any program or window that is using the partition or drive
and try again.
Complete the following steps to change a drive letter.
1. To open the Disk Management tool, click Start . In the Search field, type partition.
Then click Create and format hard disk partitions.The Disk Management tool opens
and displays information about the data storage devices on the computer.
2. Right-click the partition or drive to rename and then click Change Drive Letter and
Paths... as shown in Figure 4.26
Figure 4.26
3. In the Change Drive Letter window, click Change.
Figure 4.27 : Change Drive Letter window with Change highlighted
144
Unit -IV Maintenance and Troubleshooting of Desktop and Laptop
caution:
Deleting a volume erases all the data on it. Back up any data you want to keep before
deleting.
1. Back up any data you want to keep from the drive you want to delete.
2. To open the Disk Management tool, click Start . In the Search field, type Partition.
Then click Create and format hard disk partitions.The Disk Management tool opens
and displays information about the data storage devices on the computer.
3. Right-click the drive letter you want to remove. Then click Change Drive Letter and
Paths...
4. In the Change Drive Letter window, click Remove.
145
Unit -IV Maintenance and Troubleshooting of Desktop and Laptop
Caution:
Deleting a volume erases all the data on it. Back up any data you want to keep before
deleting.
1. To open the Disk Management tool, click Start . In the Search field, type Computer
Management. Then click the Computer Management option from the search results.
146
Unit -IV Maintenance and Troubleshooting of Desktop and Laptop
3. Right-click the volume or partition you want to delete, and then click Delete Volume...
Figure : Delete Volume...
4. If you have backed up the data you want to keep, click Yes.
The drive letter disappears and the partition is labeled as Free space.
Figure 4.36
148
Unit -IV Maintenance and Troubleshooting of Desktop and Laptop
5. Right-click the free space. In the menu that displays, click Delete Partition...
Figure 4.37 : Delete Partition...
Figure 4.37
Now the space is shown as Unallocated.
6. Right-click the drive to which you want to add the unallocated space. In the menu
that displays, click Extend Volume...
Figure 4.38 : Extend Volume...
Figure 4.38
149
Unit -IV Maintenance and Troubleshooting of Desktop and Laptop
Figure 4.39
8. The Select Disks window displays. Do not change any settings. Click Next.
Figure : Select Disks window
Figure 4.40
9. Click Finish.
The unallocated space can now be used.
150
Unit -IV Maintenance and Troubleshooting of Desktop and Laptop
151
Unit -IV Maintenance and Troubleshooting of Desktop and Laptop
Tip: All versions of Windows 7, 32- or 64-bit, are included on the same DVD. The
product key that you enter during setup determines which actual version of Windows 7 you
end up with after the installation completes. Keep your Windows 7 DVD and product key in a
safe location after you've performed your installation. It's useful for repairs of all kinds.
A typical clean installation (on a blank hard disk) step-by-step procedure is as follows:
Here’s how to step out of the server closet and into a more robust (and possibly more
rewarding) tech
1. Insert the Windows 7 DVD into your computer's DVD-ROM drive, and restart the
computer. Windows 7 Setup should start automatically. If Setup does not start automatically,
ensure that your computer is configured to boot from the DVD drive.
2. You are asked to select regional options for the Windows 7 installation. Make your
selections and click Next to continue.
3. In the next dialog box, you are prompted to start the installation. Click Install Now to begin
the installation. This produces a screen that tells you that Setup is starting.
4. In the Software License Terms dialog box, ensure that you read and understand the End
User Licensing Agreement (EULA). When you're ready, select the I Accept the License
Terms option and click Next to continue.
5. In the Which Type of Installation Do You Want? dialog box, shown in Figure 2.10, you can
select only the Custom (Advanced) option because you're performing a new installation on a
blank hard disk. Click Custom (Advanced) to continue.
6. In the Where Do You Want to Install Windows? dialog box, select the partition onto which
you'll install Windows 7. When you're ready to proceed, click Next. If you need to provide a
RAID or SCSI driver, now is the time to do it.
7. The Installing Windows dialog box appears and gives you an updated status of the
upgrade process.
8. After some time, your computer restarts and the newly installed Windows 7 loads.
Windows 7 resumes the installation process. Before the restart, a warning appears.
9. After the restart, you'll see a notification telling you that Windows 7 is preparing the new
installation. Windows 7 moves back into a graphical display after a few minutes and tells you
it's updating Registry settings and starting services, after which it lets you know it's
completing the installation.
152
Unit -IV Maintenance and Troubleshooting of Desktop and Laptop
10. After completing the installation, Windows 7 asks you to provide a username and a
computer name. After providing this information, click Next to continue.
11. In the next dialog box, you are asked to supply a password for your user account (which
you must reenter as a double-check) and a password hint to help you remember that string.
After making your selections, click Next to continue. Here’s how to step out of the server
closet and into a more robust (and possibly more rewarding) tech.
12. In the Type Your Windows Product Key dialog box, enter the product key that came with
your Windows 7 DVD. I recommend that you leave the Automatically Activate Windows
When I'm Online option checked to take care of Windows Product Activation within the three
days after the Windows 7 installation. After entering this information, click Next to continue.
You can also leave the Product Key box blank. If you do this, you'll be asked which version
of Windows 7 you want to install, and you can select any version from Starter to Ultimate.
You'll have to provide a valid product key, however, within 30 days for whatever version you
install or else Windows 7 will nag you regularly and often about registration. (If you install a
slip-streamed copy of Windows 7 Service Pack 1, or use the Windows Update service to
upgrade to SP-1, you'll be reminded to register rather than receiving constant nags.)
You can use the no-key method to play around with different versions of Windows 7, but be
careful if you select a version for which you don't have a key; you must perform a clean
install every time you reinstall Windows 7, and you must eventually install a version for which
you have a license, or erase it. You'll lose your applications and data every time you
reinstall.
Caution: You should definitely not play with alternate versions if you are upgrading from an
older version of Windows. After the first such install, there's no way to go back and repeat
the upgrade with your licensed version of Windows 7.
13. In the Help Protect Your Computer and Improve Windows Automatically dialog box, you
configure the base security for Windows 7. In most cases, you should select Use
Recommended Settings. To make your selection, click it.
14. In the Review Your Time and Date Settings dialog box, select your time zone, daylight
savings option, and current date options. Click Finish to complete the upgrade process.
15. In the Select Your Computer's Current Location dialog box, shown in Figure 2.17, tell
Windows where you'll be using your computer. As with Windows Vista, Windows 7
configures your network adapters for DHCP and does not ask you what to do.
16. Windows prompts you one last time-after you click Start, you're finished with the
installation.
17. After a few more minutes, you are finally presented with your brand new Windows 7 login
screen, as shown in Figure 2.18. Congratulations, you've completed the installation of
Windows 7!
153
Unit -IV Maintenance and Troubleshooting of Desktop and Laptop
Tip: If you plan to perform a clean installation on your computer that is currently running
some earlier Windows version, be sure to get your data and other files off the computer
beforehand. You can perform this process manually, or you can opt to use Windows Easy
Transfer to automatically copy all your files and settings to an external hard drive or network
location. After the clean installation of Windows 7 has completed, you can run Windows
Easy Transfer again to reload your files and settings on the new installation of Windows 7.
Figure 4.41: The different location choices correspond to different levels of security on your
Windows 7 computer.
Figure 2.42: The Windows 7 login screen is much different than previous versions.
154
Unit -IV Maintenance and Troubleshooting of Desktop and Laptop
Figure 4.43: For new installations, only the Custom (Advanced) option is available.
If you initiate the Setup routine from within Windows XP or Windows Vista, the step-by-step
procedure is as follows:
Here’s how to step out of the server closet and into a more robust (and possibly more
rewarding) tech
1. Insert the Windows 7 DVD into your computer's DVD-ROM drive. It should AutoPlay and
present the Install Windows dialog box. If not, locate and double-click the setup.exe program
in the Sources folder on the DVD.
2. To download, install, and use the Windows 7 Upgrade Advisor, click the Check
Compatibility Online link. Otherwise, to begin the in-place upgrade to Windows 7, click the
Install Now link.
3. In the Get Important Updates for Installation dialog box, you are asked whether you want
to download updates to the Windows 7 install files. Typically, for computers that have an
active Internet connection, you're better off getting the updates. Make your selection by
clicking it.
4. In the Please Read the License Terms dialog box, ensure that you read and understand
the End User Licensing Agreement (EULA). When you're ready, select the I Accept the
License Terms option and click Next to continue.
5. In the Type Your Product Key for Activation dialog box, you are asked to enter your
Windows 7 product key. Enter the key and ensure that the Automatically Activate Windows
155
Unit -IV Maintenance and Troubleshooting of Desktop and Laptop
When I'm Online option is checked, to enable Windows Product Activation. After entering the
product key, click Next to continue.
6. In the Which Type of Installation Do You Want? dialog box, shown previously in Figure
2.10, select Custom (Advanced) because you're performing a clean installation here on top
of an existing Windows XP installation.
7. In the Where Do You Want to Install Windows? dialog box, shown in Figure 2.20, select
the partition onto which you'll install Windows 7. When you're ready to proceed, click Next.
8. The Setup application warns you that the selected partition contains files from another
Windows installation, as shown in Figure 2.21. After you read this information, click OK to
continue.
9. The Installing Windows dialog box appears and updates the status for the upgrade
process.
10. From here, the rest of the process is just like that for a clean installation (on a blank hard
disk) above, starting with step 9. After some time, your computer restarts and the newly
installed Windows 7 loads.
Figure 4.44.: You need to select an existing partition for the installation of Windows 7.
Figure 4.45: Windows 7 Setup moves all your old Windows files to a new directory - you
must delete that directory later to reclaim that disk space.
156
Unit -IV Maintenance and Troubleshooting of Desktop and Laptop
Here’s how to step out of the server closet and into a more robust (and possibly more
rewarding) tech
• Many users use two or more OSs because of application-compatibility issues. Hardware
support issues occur, too: Windows 2000 and Windows XP might have drivers for older
hardware that Windows 7 doesn't support.
• Some users want to run specific applications or games in an optimal environment for their
use.
• A developer might swap among Windows XP Professional, Windows Vista, and maybe
even several different versions of Windows 7, to test application compatibility.
• Website developers need to use different OS versions to see how pages look and behave
with corresponding web browser versions.
Other than buying multiple computers, there are two ways to accommodate such needs. You
can multiboot (that is, select the desired OS at bootup) or you can run one OS in a virtual
computer inside another OS (that is, in a special application program that lets the alternate
OS think it's running on a PC of its own). A virtual approach can be quite useful.
Windows 7 uses a boot scheme introduced with Windows Vista based on so-called Boot
Configuration Data, usually abbreviated as BCD. BCD is more complex than and
incompatible with the boot scheme used in previous versions of Windows. While Windows
2000 and XP let you set up a boot menu from which you could select any version of
Windows, as well as other OSs, Windows 7's boot menu only lets you select Windows Vista
or 7 versions, or something else, and all something else selections must be managed
separately.
As a result of the boot manager changes, if you want to set up a computer that can boot
several different versions of Windows and/or other OSs, you need to follow these guidelines:
(i) You must install each OS into a separate disk volume (drive letter). To get these
separate volumes, you can create multiple partitions on one disk drive, or use
multiple disk drives, or a combination of these two organizing principles.
(ii) If you install multiple versions of Windows 7 on the same computer, the same rule
applies: You must install each version in a separate disk volume.
(iii) Install versions of Windows starting with the oldest and working toward the newest.
For example, to set up a computer that can boot into Windows Me, Windows XP, and
Windows 7, install Me first, then XP, then Windows 7. You must install Windows 7
last!
(iv) To install OSs other than Windows, such as Linux, you might need a boot manager
that can recognize all the different OSs in use. Linux offers a choice of several
157
Unit -IV Maintenance and Troubleshooting of Desktop and Laptop
different boot managers. Their use is beyond the scope of this book, but you should
be able to find instructions on the Web for multibooting Linux and Windows 7.
Here's a rough sketch of what's changed: In the boot scheme used by the Intel x86
versions of Windows 2000 and XP, the boot partition's boot sector program loaded ntldr,
which read the menu file boot.ini, and then loaded Windows. Aside from the boot sector, all
of the stuff was in super hidden files (files marked with the system and hidden attributes),
stored in the root directory.
The Windows Vista and Windows 7 boot sectors load a file called bootmgr from the root
directory, which loads a set of programs and DLLs in the \boot folder, which then reads the
BCD file (actually a Registry hive), and then loads Windows. The BCD hive is also loaded
into and visible in the Windows Registry after bootup.
In a Windows 7 multiboot configuration, the root directory file bootsect.bak is a copy of
the preWindows 7 boot sector (XP's version of the boot sector). Choosing Legacy from the
Windows 7 boot menu loads and runs the original boot sector program, which carries on as
before.
The reason for making this change was to create a common boot system that would
work on both BIOS-based computers and computers using the newer EFI configuration
system (built around Intel's Extensible Firmware Interface). The impact of this new scheme
is that the Windows 7 boot menu can offer only Windows 7, Windows Vista, and Windows
Server 2008 versions, where anything using the older boot loader gets lumped under the
Legacy entry. The boot.ini file is used only to list and load non-BCD operating systems.
To create a multiboot installation on a computer that already has Windows Vista
installed, follow this procedure. These steps are quite similar to the clean install procedure
described earlier.
1. Insert the Windows 7 DVD into your computer's DVD-ROM drive. It should AutoPlay and
present the Install Windows dialog box. If not, locate the setup.exe program in the Sources
folder on the DVD, and double-click it.
2. To download, install, and use the Windows 7 Upgrade Advisor, as detailed previously,
click the Check Compatibility Online link. Otherwise, to begin the in-place upgrade to
Windows 7, click the Install Now link.
3. In the Get Important Updates for Installation dialog box, you are asked whether you want
to download updates to the Windows 7 install files. Typically, for computers that have an
active Internet connection, you are better off getting the updates. Make your selection by
clicking it.
158
Unit -IV Maintenance and Troubleshooting of Desktop and Laptop
4. In the Please Read the License Terms dialog box, ensure that you read and understand
the End User Licensing Agreement (EULA). When you're ready, select the I Accept the
License Terms option, and click Next to continue.
5. In the Type Your Product Key for Activation dialog box, you are asked to enter your
Windows 7 product key. Enter the key and ensure that the Automatically Activate Windows
When I'm Online option is checked, to enable Windows Product Activation. After entering the
product key, click Next to continue.
6. In the Which Type of Installation Do You Want? dialog box, select Custom (Advanced)
because here you're performing a clean, multiboot installation of Windows 7, not an
upgrade.
7. In the Where Do You Want to Install Windows? dialog box, select the partition into which
you'll install Windows 7. This must be a partition that does not already have a version of
Windows installed on it. When you're ready to proceed, click Next.
8. Follow the rest of the procedure described previously under Typical Clean Setup
Procedure, from step 6 on through the end.
9. If you plan on installing another version of Windows 7 on this same computer, you'll want
to rename the current version's title in the boot menu.
10. You can check out the new Windows 7 boot menu, on the next restart of your computer.
Figure 4.46: You must select an empty partition for multiboot installation of Windows 7.
159
Unit -IV Maintenance and Troubleshooting of Desktop and Laptop
The following are the some common problems and the troubleshooting of Laptop
160
Unit -IV Maintenance and Troubleshooting of Desktop and Laptop
Also, you can remove the hard drive and stat the laptop. If the laptop still
makes noise, most likely it’s bad fan
Laptop shuts Most likely this is heat related issue. It happens because the fan heat sink
down or freezes is clogged with dust and the processor not cooling down properly.
Cleaning the fan and heat sink from dust should fix it
Battery not Failed battery. If it doesn’t charge completely try reconnecting the battery
charging first. Also, try running the laptop just from AC adapter with battery
properly. removed. If it runs fine from AC adapter, most likely it’s either bad battery
or failed motherboard. Try replacing the battery first.
– Failed DC power connector. If the battery charges only after you adjust
the position of AC adapter tip inside the connector, most likely this the DC
jack failed
Screen light Most likely it’s either failed screen inverter or backlight lamp (CCFL)
fails failure. When either one fail, the backlight stops working.
In order to troubleshoot this, you’ll need some spare parts: either new
working inverter or known good backlight lamp
Strange or The graphics card failed. First of all, test your laptop with an external
garbled image monitor or TV. If you see the same garbled image on the external screen,
on the screen. most likely the graphics card failed.
– If the problem appears only on the laptop screen, this can be related to
one of the following: poor connection between the video cable and
motherboard or screen. Also can be failed video cable or screen.
Some keyboard Most likely the keyboard failed and they are not repairable
keys stopped
working
Keyboard has If a key separated from the keyboard, it’s still possible to fix it.
missing or If you have many keys missing, probably it makes sense to replace the
broken keys. whole keyboard.
Repetitive beep Most likely you have stuck keys. In this case you’ll have to replace the
sound on keyboard
startup
Liquid spill. Liquid spills are very dangerous and unpredictable. If it happened, turn off
the laptop ASAP, remove the battery and do not use it until all internal
parts are inspected for liquid damage.
It’s still possible to make it work again.
161
Unit -IV Maintenance and Troubleshooting of Desktop and Laptop
The following are the some common problems and the troubleshooting of Desktop
162
Unit -IV Maintenance and Troubleshooting of Desktop and Laptop
163
Unit -IV Maintenance and Troubleshooting of Desktop and Laptop
(i) POST
POST performs basic diagnostics on computer’s memory and hard drives, checks
for the presence of a keyboard and mouse, and tests the clock and other system
settings. POST resides in a small, permanent memory area called BIOS, which
stands for Basic Input Output System; this contains compact, simple programs the
computer uses when you first turn it on. If a problem exists with the computer’s
hardware, POST signals this through coded audio beeps. Though hardware makers
have produced different versions of POST over the years, they all ensure that the
computer works correctly before it starts the operating system.
(ii) Check Disk
The program “CHKDSK,” or Check Disk, is part of Microsoft’s Windows software. It
tests and repairs the file system information on hard drives. For example, if you work
on your computer during a storm, a sudden power failure may shut your computer
down immediately. Electrical noise from the power line may write random data into
hard drive files that were open as you worked. This random data can corrupt the
Windows file system, making files unreadable. If Windows senses a problem with the
file system, it runs Check Disk automatically when you restart your computer; you
can run it manually from Windows Explorer or a command prompt. Check Disk scans
the file structure, looking for and reporting on problems. If you run it in “fix” mode --
“chkdsk /f” -- the program attempts to repair any damage it finds. Check Disk is
sophisticated and fixes file system problems for the vast majority of cases.
164
Unit -IV Maintenance and Troubleshooting of Desktop and Laptop
window uses more than 20 percent of the computer’s CPU time for a prolonged
period, the program may be caught in an error state. To solve this problem, try
restarting the computer.
(iv) Windows Defender
If your PC has a malware infection, your computer’s performance suffers. Malware
may cause your Web browser to display unwanted pop-up ads and you may
experience other annoyances. The Windows operating system includes a program
called Windows Defender, which scans your hard drives for viruses, spyware and
other malicious programs. Windows Defender reports on the problems it finds,
isolates the malware and removes it. Windows Defender uses a database of known
malware, and the database is continually updated by Microsoft so that the program
catches even the newest viruses.
(v) Drivers
PC uses a variety of devices for data storage, communications, input and display.
Each of these has a program called a driver that carries data between the hardware
and Windows. Frequently, drivers have a diagnostic capability that checks the
device’s operation and troubleshoots problems. Windows organizes these drivers in
its Device Manager, which you can see by clicking the Windows "Start" button, right-
clicking “Computer,” selecting “Properties” and clicking the “Device Manager.
This is simply a chart that shows various maintenance activities, and how often they should
be done, to allow you to setup a calendar. Table shows the Preventive Maintenance
Schedule
165
Unit -IV Maintenance and Troubleshooting of Desktop and Laptop
(i) Set up a workspace, and with adequate lighting. Also, be sure to give enough room
to lay out tools and parts. Good lighting is especially critical if the case has an all-
black interior.
(ii) Prior to disassembling the system, back up the contents of hard drive.
166
Unit -IV Maintenance and Troubleshooting of Desktop and Laptop
(iii) Collect all CD keys. Deactivate or deauthorize any applications that has activated
previously. This includes iTunes and Adobe professional apps (such as Photoshop
and Premiere CS5). In addition, be sure to uninstall or deactivate any games that
required activation.
(iv) Determine which parts need to be removed. Take out the power supply unit (PSU) or
hard drives to make motherboard removal easier. While removing the PSU, take care
to disconnect all power cables first. The ATX12V (a small four- or eight-pin
connector) is easy to overlook.
(v) Take out all cards, the CPU fan, and all memory.
(vi) Prior to removing the old board, disconnect all wiring, including the Serial ATA
connector.
(vii) Disconnect all wiring.
(viii) Remove all the screws holding the motherboard in place. Usually, a number 2
Phillips screwdrivers will fit the screws. Place the old board in an antistatic bag.
(ix) Check to confirm that all of the mounting nuts are firmly screwed into the case.
Sometimes, these nuts will come out or become loose when you remove the
motherboard screws.
(x) Remove the ATX I/O shield, and store it with the old motherboard. It is shown in
Figure 4.47
Figure 4.47
(xi) Don’t forget to remove the old ATX I/O shield, and install the new one in its place.10.
Install the ATX I/O shield for the new board. This step is crucial: It's frustrating to
167
Unit -IV Maintenance and Troubleshooting of Desktop and Laptop
have screwed in the new motherboard and only then realize that you forgot about the
I/O shield.
(xii) if exotic cooler is used, it may require that a special support plate be attached to the
underside of the motherboard.
(xiii) Line up the I/O ports with the holes in the ATX I/O shield. Then align the screw
holes with the motherboard mounting nuts on the interior of the case.
(xiv) Carefully screw in the mounting screws. Do not overtighten them. For an electric
screwdriver equipped with an adjustable clutch, set the clutch to the minimum setting.
If the electric screwdriver doesn't have a clutch, use a hand screwdriver instead. It is
shown in Figure 4.48
Figure 4.48
(xv) Before reattaching the wiring and cables, reinstall any storage devices (like this hard
drive) that has been removed earlier.
(xvi) Reinstall the power supply unit, (if removed it earlier). Also reinstall any storage
devices that has been removed.
(xvii) Reattach all of the wiring and cables that you disconnected earlier: front panel
connectors, USB wiring for the USB case connectors, power cables, wires for the
case fan, and so on. If case allows us to route wiring behind the motherboard, do so
now.
(xviii) Attach the power cables, taking care to connect both the main and the ATX12V
cables.
168
Unit -IV Maintenance and Troubleshooting of Desktop and Laptop
Figure 4.49
(xix) After installing the new motherboard and memory and reattaching the power
cables, add back the CPU cooler and lock it in place with the fan clips.
(xx) Install the CPU and the memory. Don't install the CPU cooler until the memory and
the power connectors are installed.
(xxi) Plug in the data cables and the power connectors to the storage devices.
(xxii) Reinstall cards that have been removed. For installing a high-performance graphics
card, PCI Express power connectors are supposed to be attached.
(xxiii) Connect wall power, the video cable, the mouse, and the keyboard, and give the
system a test boot. If nothing happens, make sure that the PSU switch is on.
(xxiv) When booting the system, we have to wait until Windows accounts for all of the
new motherboard devices. Keyboard and mouse may be unusable during this time.
(xxv) Once Windows has logged all of the devices, reboot.
(xxvi) Take the motherboard CD and install the new motherboard drivers, network
drivers, video drivers, USB 3.0 drivers, and so on. Rebooting may be required
several times.
(xxvii) check to see whether Windows needs to be reactivated. If so, first try activating
over the Internet. If this fails, in the Activation Window. call the toll-free number listed
to activate over the phone, be sure you tell Microsoft that installing this copy of
Windows on one system. This is just an upgrade after all.
(xxviii) Reinstall and reactivate any needed applications.
169
Unit -IV Maintenance and Troubleshooting of Desktop and Laptop
Figure 4.50
170
Unit -IV Maintenance and Troubleshooting of Desktop and Laptop
(iv) Steps 4 and 5: Push down on the latching lever, pull it slightly to the outside, and
release it upward. Lift the socket cover up on its hinge and out of the way. You'll see
a latching lever on the side of the CPU. Push down on the lever, pull it slightly to the
outside, and release it upward.
(v) The socket cover will now lift up. Note that the socket cover for LGA775 swings in a
different direction than it does for other Intel CPU sockets.
(vi) Once the latch cover is open, gently grasp the CPU by the edges. Lift it straight up.
Do not slide it to one side. You may have to angle it a bit to get it out from under the
latch cover, but try not to do this until the CPU is clear of all the pins in the socket.
(vii) Place the CPU in an antistatic container for storage.
Figure 4.51
(viii) Step 8: Align the notches on the opposing edges of the CPU with the tabs on the
socket, and gently lower the CPU into the socket.8. Handling the new CPU only by
the edges, align the notches on the two opposing edges of the CPU with the tabs
on the socket. Gently lower the processor straight down into the socket. Do not
press it.
(ix) With the CPU in place, relatch the CPU socket cover.
(x) If the heat sink has old thermal compound on it, remove the compound with isopropyl
alcohol (rubbing alcohol) and let it dry.
Figure 4.52
171
Unit -IV Maintenance and Troubleshooting of Desktop and Laptop
(xi) Step 11: Apply a tiny bead of thermal compound to the CPU surface.11. Put a tiny
bead of thermal compound on the surface of the CPU. Spread it evenly over the
surface with a knife or screwdriver blade.
Figure 4.53
(xii) Rotate and pull up the heat-sink latch covers.12. Rotate the heat-sink latch covers
to the right and pull them up. Check to confirm that none of the actual split pushpins
are bent.
(xiii) Align the four plastic pushpins with the mounting holes in the motherboard. You
should be able to feel the four pins settling into the mounting holes properly.
(xiv) Steady the heat sink with one hand to keep it level. Push each of the four pushpins
in diagonal order until each is latched in place.
(xv) Attach the heat-sink fan connector to the assembly.
(xvi) Reattach any wires or cables that you may have removed, or reinstall the
motherboard if you removed it at the beginning of the process.
(i) The steps for installing an AMD CPU are fairly similar to those for installing an
Intel CPU. On AMD processors, however, the contact pins are located on the
CPU rather than in the socket.
(ii) The factory AMD heat sink has a hinged lever latch that locks the heat sink in
place. Lift this latch up.
(iii) The heat sink is held in place by one or more tabs on the CPU socket. You
may need to use a thin-bladed screwdriver to release the heat-sink bracket.
(iv) The CPU is often stuck to the heat sink with thermal compound, which helps
transmit accumulated heat from the CPU heat spreader surface to the heat
sink. Gently rotate the CPU back and forth (you're rocking it around the
vertical axis). It will gradually loosen. Eventually the heat sink will come free,
and you can lift it up.
172
Unit -IV Maintenance and Troubleshooting of Desktop and Laptop
(v) The ZIF (zero-insertion force) lever locks the CPU in place. Lift it up and
swing the lever as far as it will go. You may see the CPU shift slightly to one
side.
(i) Gently lift the CPU straight up to remove it.
(ii) Store the processor in an antistatic bag. Since the CPU has pins that can bend,
press it into antistatic foam, if you have any, for storage.
(iii) Grasping the new CPU only by the edges, look for a small gold or silver triangle silk-
screened onto one corner of the processor. Match this with a triangle of similar size
that is engraved in the processor's socket corner.
(iv) Line up the triangles, and gently lower the CPU in place. You should feel the CPU
nestle into position. If it doesn't settle fully, do not force it. Instead, lift the processor
up and try again.
(v) Once the CPU is in place, relatch the ZIF lever.
(vi) If the heat sink has old thermal compound on it, remove the compound with isopropyl
alcohol (rubbing alcohol) and let it dry.
(vii) Put a tiny bead of thermal compound on the surface of the CPU. Spread it evenly
over the surface with a knife or screwdriver blade.
(viii) Reattach the heat sink by latching it to one set of tabs on one side, and then
carefully pushing the other side down while pressing the metal holes into position on
the other set of tabs.
(ix) Swing the heat-sink lock lever into place.
(x) Attach the heat-sink fan connector.
(xi) Reattach any wires or cables that you may have removed, or reinstall the
motherboard if you removed it at the beginning of the process.
(i) Ensure that the machine's power supply is up to the task. My example PC has a
robust 750W Corsair power supply, which should be sufficient. Check the
manufacturer's specs for minimum power requirements before you take the plunge.
(i) Ensure that the case has enough room for the new card. Graphics boards have
become longer over the years, and the space in older cases may be a little tight. In
my example PC, the GTX 560 Ti just barely fits inside the older Antec Sonata
Designer 500 case.
(ii) Download the latest driver for the new graphics card. Don't install it yet.
(iii) Uninstall the older graphics drivers. Even if you're installing a GPU of the same brand
as before, removing the older drivers prior to installing the new card is a good idea.
173
Unit -IV Maintenance and Troubleshooting of Desktop and Laptop
Figure 4.54
(vi) Remove any power connectors from the old graphics card. Also remove the screws
that attach the connector bracket to the case.
(vii) Ensure that no clutter--cables or wiring--surrounds the card. In addition, large CPU
heat sinks can interfere with physical card removal or installation, so you may need
to remove the heat sink. Be sure to detach the monitor cable from the old graphics
card's outside connector, too.
(viii) Hold a latch down with one hand while removing the old graphics card with the
other.
Figure 4.55
(ix) Most motherboards have a little latch that locks the graphics card securely into its
slot. hold this latch down (or aside) while removing the card with your other hand.
(x) If the amount of room inside the case is too constricted, you might have to preattach
the PCI Express power connectors to the new card.
174
Unit -IV Maintenance and Troubleshooting of Desktop and Laptop
(xi) Install the new graphics board, first making sure that no small wires are overhanging
the PCI Express slot. If the card seems difficult to push down, check to see whether
the connector bracket is sliding in properly.
(xii) Once the card is firmly in place, replace the connector-bracket screws.
(xiii) Attach the monitor cable. If you've been using a VGA cable, and your monitor has a
digital input (DVI, HDMI, or DisplayPort), now is a good opportunity to switch to
digital inputs with the right cable. All done! Organizing cables makes it easier to
access the PC's insides later.
Figure 4.56
(xiv) Double-check to confirm that the graphics card's power connectors are in place.
Additionally, verify that no small wires or cables will interfere with any of the fans.
(xv) Power up the PC. power down and check to make sure that no fans have
become blocked.
(xvi) Once the system is powered up and running normally, install the latest drivers
for the graphics card. Reboot the system.
BIOS upgradation
175
Unit -IV Maintenance and Troubleshooting of Desktop and Laptop
(vi) Restart the computer. After the update is completed, many update programs will
automatically restart the computer. Some updaters will request your permission to do
so while others will warn about this before starting the update
(vii) Clear existing BIOS settings if recommended. This is not always necessary,
depending on what features have changed between the existing version and the
updated version.
(viii) Configure the BIOS with the default settings.
System software are programs which makes the computer usage easy. Examples
are compilers, loaders, etc. The important requirements for system software updation are
(i) To make the computer system to run better
(ii) To enforce additional security
(iii) To fix bugs easy
The following steps to be used to update the windows operating system software using
internet.
(i) Connect the system to the internet
(ii) Click on to the start button
(iii) A pull down menu appears. Select windows update option
(iv) Update window opens, Click check for updates on the window
(v) The system check for updates. After checking updates click install button
(vi) When the updates finshed installing, restart the computer.
Updating application software
Application software are programs designed to perform specific tasks or users. The following
steps to be used to update application software (2007 to 2010) using internet.
(i) Download the office 2010 software
(ii) Run the downloaded file and enter the product key in the text box and click the
continue button
(iii) In the next window , accept the license agreement and click the continue button
(iv) In the next window click the upgrade button to upgrade office 2007 to office 2010
(v) In the next window click yes to reboot the system for completing the rebooting
process.
176
Unit -IV Maintenance and Troubleshooting of Desktop and Laptop
Review Questions:
PART –A
PART-B
177
Unit-V Mobile Phone Servicing
Learning Objectives
Introduction
A mobile phone is a portable telephone that can make and receive calls over a radio
frequency carrier while the user is moving within a telephone service area. Mobile phones are
used for a variety of purposes, such as keeping in touch with family members, for conducting
business, and in order to have access to a telephone in the event of an emergency. This
chapter gives the idea of mobile communication and the instrument. To service the phone one
must aware of the tools used to service the instrument and its usage. The tools and instruments
used in mobile servicing are explained in detail manner. Assembling and disassembling of
mobile phones are also explained. This chapter also discusses the troubleshooting of the mobile
phone and software functions such as flashing, formatting, unlocking, secret codes,
downloading and routing. The diagnostic software and viruses are also briefed.
In the first half of the 20th century radio broadcast was used. There is one transmitter, the
so-called radio station. Information, such as news, music, etc. is transmitted from the radio
station to the receiver equipment, the radio device. This type of one-way transmission is called
simplex transmission. The transmission takes place only in one direction, from the transmitter to
178
Unit-V Mobile Phone Servicing
the receiver. The transmission in which information flow can take place in two directions is
called duplex transmission. In Walky-talky transmission of user data take place in two directions,
but there was a limitation: The users were not allowed to transmit at the same time. In other
words, either receive or transmit takes place. This type of transmission is therefore often called
semi-duplex transmission. For telephony services, a technical solutions is required, where
subscribers have the impression, that they can speak (transmit) and hear (receive)
simultaneously. This type of transmission solution is regarded as full duplex transmission.
Figure 5.1 shows the transmission of simplex and duplex.
179
Unit-V Mobile Phone Servicing
Single cell systems are quite limited. The mobile communication service was only available
within the cell. In order to overcome this limitation, cellular systems were introduced. A cellular
mobile communication system consists of several cells, which can overlap. By doing so, a whole
geographical area can be supported with the mobile communication service. Figure 5.3 shows
the cellular system.
180
Unit-V Mobile Phone Servicing
located, it must be paged in all of them. To reduce load on networks, paging in is done in small
parts of a mobile an operators network. Mobile network operators group cells in administrative
units called location areas (LA). A mobile phone is paged in only one location area.
In every cell, system information is continuously transmitted. The system information includes
the location area information. In the idle mode, the mobile phone is listening to this system
information. If the subscriber moves hereby from one cell to the next cell, and the new cell
belongs to the same location area, the mobile stays idle. If the new cell belongs to a new
location area, then the mobile phone has to become active. It starts a communication with the
network, informing it about it new location. This is stored in databases within the mobile
network, and if there is a mobile terminated call, the network knows where to page the
subscriber. The process, where the mobile phone informs the network about its new location is
called Location Update Procedure (LUP).It is shown in Figure 5.5
181
Unit-V Mobile Phone Servicing
182
Unit-V Mobile Phone Servicing
5.1.2 Components:
The components of the cell phone are battery, Antenna, ear piece, Microphone,
Speaker, buzzer, Keyboard, LCD Screen.
183
Unit-V Mobile Phone Servicing
electrical signals which get digitized and then transmitted out through the antenna. When the
signal from another phone strikes the antenna, it first gets un-digitized, and then sent to the
speaker where it converts to sound.
The circuit board is the component of the phone that controls the operation of the phone.
It transforms digital signals to analog and vice versa. It also contains buzzer and vibrator that
alerts the user for incoming calls, a SIM card that shows the phone tower is in the long-distance
carrier or not, and a monitor to check the energy level of the battery so the phone can alert
when the battery needs charging. Figure 5.9 shows the Circuit board of the phone.
184
Unit-V Mobile Phone Servicing
Non- Electrolytic Capacitor: It is found in any section of a mobile phone. Its height is little
more than chip resistance. It can be of gray, yellow or brown in color. It has no Positive (+) or
Negative (-) side. It filters DC current
Electrolytic Capacitor: It is found in any section of a mobile phone. Its size is larger than
non-electrolytic capacitor. It is found in 2 colors – (i) Orange with brown strip: and (ii) Black
with white strip. The side with the strip is Positive (+) and the other side is Negative (-). It
filters and stores current.
Network Capacitor: It is found in any section of a mobile phone. It is made from 2 or more
Non-Electrolytic Capacitors
Coupler: This electronic component is found in the Network Section of a mobile phone. It is of
either black or white and has 6 pins bent inside.
Function: It filters network
Faults: If the coupler is faulty then there will be no network in the mobile phone
Diode: Diodes are of 4 types
Rectifier Diode: It is found in black color and converts AC Current to DC Current. It passes
current in one direction. It does not pass current in reverse direction
LED: It is found in white or light yellow color and emits light
Zener Diode: It is found in charging section. It filters and minimize current and passes
forward. It acts as voltage regulator. Zener diode has fixed capacity like 4V, 6V, 8V etc.
Photo Diode: It is used for Infrared. It captures Infrared Rays
Regulator: This electronic component is found in any section of a mobile phone. It is of black
color and has 5 or 6 legs. It filters current and regulates voltage
Resistance or Resistor: There are 2 types of resistance on the PCB of a mobile phone.
Chip Resistance: It can be found in any section of a mobile phone. It is of black color. In
some sets it is also found in blue and green colour. It is the smallest electronic components on
the PCB of a mobile phone. It Decreases current and passes forward
Network Resistance: It can be found in any section of a mobile phone. It is made from 2 or
more Chip Resistance
Transistor: This electronic component is found in any section of a mobile phone. It is of black
color and it has 3 legs. It does the work of switching.
185
Unit-V Mobile Phone Servicing
186
Unit-V Mobile Phone Servicing
P.F.O: It is found near the Antenna Switch in the Network Section of the Cell Phone PFO. PCB
of Mobile Phone. It is also called P.A (Power Amplifier) and Band Pass Filter
187
Unit-V Mobile Phone Servicing
188
Unit-V Mobile Phone Servicing
189
Unit-V Mobile Phone Servicing
190
Unit-V Mobile Phone Servicing
191
Unit-V Mobile Phone Servicing
Below are the tools and equipment needed for mobile phone servicing
(i) Soldering Iron
Used to solder small components like capacitor, resistor, diode, transistor, regulator, speaker,
microphone, display etc. A 50 watt soldering iron is good enough for most mobile phones
repairing job. Figure 5.27 shows the soldering iorn.
192
Unit-V Mobile Phone Servicing
193
Unit-V Mobile Phone Servicing
194
Unit-V Mobile Phone Servicing
195
Unit-V Mobile Phone Servicing
(xvi) Microscope
It is used to see a magnified view of PCB or electronic components. These are available in
different zoom options. Many microscopes can also be connected to a computer or a monitor. It
is shown in Figure 5.35.
196
Unit-V Mobile Phone Servicing
197
Unit-V Mobile Phone Servicing
Soldering Iron.
A soldering iron is composed of a heated metal tip and an insulated handle. Heating is
often achieved electrically, by passing an electrical current (supplied through an electrical cord
or battery cables) through the resistive material of a heating element. Another heating method
includes combustion of a suitable gas, which can either be delivered through a tank mounted on
the iron (flameless), or through an external flame. Some soldering irons heat up and cool down
198
Unit-V Mobile Phone Servicing
199
Unit-V Mobile Phone Servicing
(v) Pick up the solder wire. Hold a length of solder with your non-dominant hand. Use a
long length to ensure that you'll be able to keep your hand well away from the tip of the
iron.
(vi) Heat the component. Touch the tip of the iron to the component you want to solder.
Only touch it for about one second. This warms the metal so that it can handle the solder
more flexibly.
(vii) Finish the solder. Pull the solder wire away first, wait one second, and then pull the iron
away from the soldering point to let the molten solder cool. Again, this should only take 5
or 10 seconds at most
(viii) Repeat until finished. Repeat the above steps for each point you wish to solder
Soldering Wick
A solder wick (also desoldering wick or desoldering braid) is a tool for removing solder
from any solder joint. Usually, it is a roll of fine, braided 18 to 42 AWG wire, typically
oxygen free copper, which has been treated with a rosin solder flux.
To remove solder with it, one presses the wick onto the solder joint to be removed and
then heats the wick portion that is on the connection with the tip of a soldering iron. As the rosin
melts onto the wick and the connection and the solder reaches its melting point the solder
rushes via capillary action onto the clean copper braid. Once everything has melted and the
solder fuses with the braided copper, the wick is lifted along with the solder and is then cut off
and disposed of. A Photograph of desoldering is shown in Figure 5.39.
The following steps shows how to use the mtultimeter and it shown in Figure 5.40
1. Function and Range Switch: This switch is used to select the function and desired
range as well as to turn the instrument. In order to extend the life of the battery of the
200
Unit-V Mobile Phone Servicing
Multimeter, this switch must be kept in the “OFF” position when the instrument is not in
use.
2. Display or LCD: To display all the readings.
3. Common Jack: Plug in connector for black (negative) test lead or probe.
4. V ? mA Jack: Plug in connector for red (positive) test lead or probe for all voltage,
resistance and current (except 10A) measurements.
5. 10A Jack: Plug in connector for red (positive) test lead or probe for 10A measurement.
Battery Booster
Battery Booster is an all-in-one battery boosting and power management tool for both Android
smartphone and tablet. The following ways boosts the battery power of the mobile phone.
(i) Discipline Your Display: It consume more energy to power the backlight. By limiting screen‟s
maximum brightness, saves cell phone battery life.
Keep A Lid On Bluetooth & Wifi: Some phones will automatically connect to any public
network they encounter, battery power is consumed without the knowledge of the user.
(ii) Beware GPS & Location Requests : Check the FourSquare or adding the location to a tweet
but constant use otherwise this will affect the battery life time. Best to avoid GPS intensive
applications like mapping tools (save then for the car).
(iii) Disable 3G network.
(iv) Manage Power and Avoid Power-Hungry Apps: Multitasking on Anroid and iOS is handled
slightly differently by each operating system. iOS freezes the application in its current state.
Though apps like iTunes and media players will continue downloading or playing in the
201
Unit-V Mobile Phone Servicing
background. Anroid operated similarly but with greater scope for true multitasking with apps
able to stay awake in the background, sucking up power more than iPhone.
(v) Ditch Vibrate & Pointless Notifications: Vibrate setting consumes more than simple audiable
alert. Similarly notifications also consume power.
Each and every cellular phone has a different method to assemble and disassemble, especially when it
comes to smart phones.
Disassembling
(i) Switch off the phone (If it‟s already not switched off).
(ii) Remove battery cover.
(iii) Now remove battery, SIM Card, Memory Card (If any) as per shown in figure.
(iv) Remove all the screws from the phone with the help of screwdriver. .
(v) lift back cover with the help of a flat screw driver.
(vi) After removing back cover, now remove the buzzer strip using plastic separation tool
and then gently remove the assembly in order to proceed further.
(vii) Now remove the strips such as Front Camera,Display, Volume and Speaker button
assembly, camera, Motherboard, Vibrator, Second Camera (after removing screw) and
st Volume & Speaker.
(viii) Remove Ant wire from outside, and it is considered to be important because there is a
slight chance that might damage the wire or connector (or both).
The disassemble parts of the Phone is shown in Figure 5.41.
202
Unit-V Mobile Phone Servicing
Assembling:
Following Steps to be carried out to assemble the mobile phone with photographs.
203
Unit-V Mobile Phone Servicing
5.3.2 Installation of OS
The operating system determines which functions, software and applications are applicable for
the device. Examples of mobile operating systems available include Palm OS, Symbian OS,
MXI, Mobile Lynux and Windows Mobile.
Step 1
Connect the phone to the computer. Establish a connection (through phone management
software) between the mobile phone and the computer. Make sure that the connection is active.
install Windows Mobile operating system, and download a “bootloader” first. Extract the
"bootloader" executable file and run the file to start installation. Follow the instructions as the
bootloader performs a number of checks on the mobile phone. Restart the phone or wait for it to
automatically reboot.
Step 2
Pair the mobile phone to the computer. Insert the mobile OS CD/DVD into the optical drive of
the computer. Extract the operating system file from its location (in this case the CD/DVD-ROM)
onto another location in your mobile phone. In Windows Mobile, extract the “bootloader” to the
same location where you extracted the operating system.
Step 3
Wait for the operating system installation to finish. When the process completes, the phone
will automatically reboot.
1. Settings Faults
2. Software Faults
3. Hardware Faults
204
Unit-V Mobile Phone Servicing
(iv) Network Problem: No network signal or low network or even fluctuating network.
(v) Microphone Problem: No out-going sound.
(vi) Ringer Problem: No ring tone, music and loud speaker sound.
(vii) Speaker Problem: No incoming sound.
(viii) Vibrator Problem: No vibration.
(ix) Display Problem: No graphics on LCD or a broken LCD.
(x) Auto Switch Off: Phone switches off automatically even when its not prompted.
(xi) Restart Problem: Phone restarts automatically.
(xii) Call Cuts Off: Call gets disconnected or cuts off. It may also be due to poor service from
network provider.
(xiii) Charging Problem: No charging or very slow charging.
(xiv) Keypad Problem: Keypad doesn‟t work or some keys do not function. Home button or
volume buttons do not work.
(xv) Touch Problem: Touch doesn‟t work or slow touch.
(xvi) Battery Discharge Problem: Battery gets drained very fast even when fully charged.
(xvii) Bluetooth Problem: Bluetooth does not work.
(xviii) Camera Problem: Camera does not work.
(xix) FM Radio: Radio does not work or no tuning.
(xx) LED Problem: Not back-light on LCD.
(xxi) Memory Card Problem: MMC does not get detected.
(xxii) No Internet
(xxiii) WiFi Problem: WiFi does not function
Following are different electronic parts and components in different sections inside
a mobile cell phone:
a) Network Fault: Antenna Switch, PFO, FEM, RF IC, VCO, RX-Filter, TX-Filter, RF
Antenna, RF Crystal, External Antenna Socket, Network Signal and Supply Control and
Interface Section. If we know about the parts and components present in the Network
section and their function then we can easily repair the fault by looking at the code
number of the faulty component in the Circuit Diagram and the PCB Layout Diagram. In
this way we can easily make good use of circuit diagram for mobile cell phone repairing.
b) Power ON Fault: Battery (3.7V), Battery Connector Jack, Power IC, CPU, Flash IC, S-
RAM IC, RF Crystal, RF Clock Section Component, RF IC, Power ON / OFF Trigger
Components.
205
Unit-V Mobile Phone Servicing
c) Charging Fault: Charger (5-6V), Battery (3.7V), Charger Connector, Charger Volt Fuse,
Coil, Charger Over Volt Protector, Charging IC, Power IC, Charging Regulator, Charging
Volt Output Components, Charger and Charger Volt Detector Components.
d) SIM Fault: SIM Card, SIM Socket, SIM Signal and Supply Interface Components,
Resistance, Coil, Power IC, CPU etc.
e) Ringer Fault: Ringer, Ringer Signal Input and Output Components, Audio Amplifier IC,
Power IC, CPU etc.
f) Ear Speaker Fault: Ear Speaker, Ear Speaker Signal Components, Audio Amplifier IC,
CPU, Power IC etc.
g) Micro SD Card Fault / MMC Fault: Micro SD Card, Micro Card Connector, Micro Card
Detector Switch, Micro Card Detector Signal Components, CPU etc.
h) USB and Bottom Connector fault: USB and Bottom Connector, USB and Signal
Interface Connector Components, USB Signal Interface IC, USB Driver IC, CPU etc.
i) Keypad Fault: Key Tip, Key Pad Dot Sheet, Key Signal Filters, Key Signal Varactors,
Key Board to Key Connector, CPU etc.
j) Display Fault: LCD, LCD Connector, LCD Supply Components, LCD Signal Interface
Filter IC, CPU, LCD Signal Interface Resistance etc.
k) MIC Sound Fault: MIC, MIC Interface Connection, MIC Signal and Supply Components,
Power IC, CPU etc.
l) Backlight (LED) Fault: LED, Backlight Driver IC, Backlight Driver Section Components,
Power IC, CPU etc.
m) Bluetooth Fault: Bluetooth Antenna, Bluetooth Driver IC, Bluetooth Section Crystal,
CPU etc.
n) FM Radio Fault: Fands Free Lead, Hands Free Connector, FM and Bluetooth IC, FM
Driver IC, CPU etc.
o) Vibrator Fault: Vibrator Motor, Vibration Supply Components, Power IC, Vibrator Driver
IC etc.
p) Touch Panel (PDA) Fault: Touch Panel / PDA Panel, Touch Panel Control IC, CPU,
Signal Interface Parts etc.
206
Unit-V Mobile Phone Servicing
Troubleshooting
The Most Common problem in the Cell Phone:
(i) Handset is dead: If the handset is not switching on, it is considered as a dead phone.
(ii) Freezing: In this type of problem, the handset freezes, hangs or gets stuck frequently. It
is most probably because of virus or corrupt software.
(iii) Booting related errors: When switching on the phone gets stuck on the logo of the
manufacturer or starts blinking on the logo screen. Or sometimes, the handset displays a
blank screen without any graphics.
(iv) No outgoing sound: This is because of a faulty microphone (also called mic and mouth
piece) or its connections
(v) No incoming sound: This is because of a faulty speaker (also called ear piece) or its
connections.
(vi) No ringtone or music: This is because of a faulty ringer or its connections.
(vii) No vibration: This is because of a faulty vibrator or its connections.
(viii) No signal: The handset doesn‟t catch the signals from network.
(ix) Call gets cut off: The calls get cut off in middle. This may be because of poor network
coverage or a faulty handset.
(x) SIM card detection failure: The handset doesn‟t detect SIM card and shows the
message „insert SIM‟ or a related error.
(xi) No graphics/ broken LCD: The LCD either doesn‟t show any graphics or it is broken.
(xii) Touch function is not working: This is because of a faulty touch or its connections.
(xiii) Switches off automatically: The cell phone switches off automatically or restarts
frequently without pressing the power button.
(xiv) Keypad doesn’t work: This issue was in older keypad phones. All or some of the keys
do not work.
(xv) Fast draining battery: This may be because of a faulty battery or problems in the
circuit. It also may also occur due to excessive use of online applications installed.
(xvi) MMC Card detection failure: Can be either a faulty memory card or the connector and
its tracks.
207
Unit-V Mobile Phone Servicing
Problems Solutions
1. Use the phone less. The longer you use it continuously and
Battery Overheating the more intensive the task, the hotter it will get. There is no
way around this.
2. Turn the phone off and remove the battery so it can cool
faster.
3. Press and hold the power key up top until the BB Q10
restarts
Battery life is poor 1. Turn off any features you aren‟t using – GPS, NFC, data,
Wi-Fi, Bluetooth, etc.
2. Sync your email and accounts less frequently.
3. Reduce screen brightness and use a black background.
4. Reduce volume, turn off vibrate on notifications
208
Unit-V Mobile Phone Servicing
SIM Not Working 1. Check settings and see if the mobile phone is in Flight Mode
or Not. If it is in “Flight Mode” then change the Mode to
Normal.
2. Clean SIM Card Tips and SIM Connector.
3. If the problem is not solved then change the SIM Card and
Check.
4. If the problem still persists then Change the SIM Connector.
5. If you still do not find solution to the problem then Check
Track of the SIM Section. Refer to the Diagram of the
Particular Model of the Mobile Phone. Books with Diagrams
of Tracks are available in the Market and on the Internet.
6. If the problem is still not solved then Heat or Change the
SIM IC.
7. Finally, Heat, Reball or Change the Power IC
Mobile Phone Ringer 1. Check ringer settings in mobile phone. Check Ringer
Volume and Silent Mode. Adjust or change volume and / or
mode if required.
2. If the problem is not solved then open the mobile phone and
clean ringer point and ringer connector.
209
Unit-V Mobile Phone Servicing
210
Unit-V Mobile Phone Servicing
211
Unit-V Mobile Phone Servicing
5.4 Software
5.4.1 Flashing
(i)For instance, we are able to manually uninstall applications that come pre-installed with the
phone, use a tool like like Nandroid Backup to perform a full backup, and many others.
(ii)Installing a custom operating system (such as Cyanogen instead of Stock Android) in order to
obtain a customized experience; get rid of bloatware or any other reason. Usually done after
installing a custom recovery
(iii)Restoring phone to the stock firmware, in other words, make it as it was originally.
The steps to do flashing depend on operating systems. The most widely used on is android
mobile. The following steps to be followed to perform flashing.
(i) download ROM, move to SD card, Reboot device Custom recovery and then flash the new
ROM and reboot.
(ii) To install custom ROMs all you need a rooted device with custom Recovery installed. Once
both the requirement are completed on your device you can find lots of Free custom ROM
from the internet or you can use GoogManager app to search best ROMs for your android.
The following are some useful android application which helps you to install custom ROMs
on the phone
212
Unit-V Mobile Phone Servicing
ROM Manager
One of the most download applications from the Google play store to Flash ROMs and it
snapshot is shown in Figure 5.41. Reboot in recovery mode and Install ROMs from the SD card.
The user interface of the application is neat and clean and easy to use, select the option from
application settings page. To use this application need a rooted device with ClockworkMod
Recovery.
Works only with rooted phone and tablets. you can easily install, manage, backup, and
restore multiple ROMs from the SD card. The extra features such as Batch backup & restore
apps and their data, Restore apps from android backups, Backup your apps to drop box and
more.
213
Unit-V Mobile Phone Servicing
Flashify
A new Application in Google play store, tested and fully working on the Galaxy Nexus,
Nexus 7. Nexus 4 and Nexus 10. The snapshot of fashify is shown in figure 5.42 Another
simple way to install custom ROMs, recovery images and zip files right away from the android
home screen. Again to use this application root access on the device and custom recovery are
required. This app is free but has a limit of 3 flashes per day.
The term means overwriting phone‟s partitions with an image that may have downloaded
elsewhere, but it usually extends to installing many other things, such as root or another OS in
the phone. Specifically, and in layman's terms, flashing the phone usually means we are doing
one of the following:
(i) Installing a custom recovery (such as TeamWin - TWRP or ClockworkMod), which
allows us to do things like make a backup of any part of your phone, root your phone,
install or flash zips containing a custom operating system and many others.
(ii) Usually done after installing a custom recovery (and depending on the phone), the
recovery allows us to "flash" arbitrary files. One of these may be a file which "roots" your
phone, allowing you to do many things which are usually blocked because they require
"Super user" permission.
5.4.2 Formatting
Formatting
Some cell phones come with expansion slots for memory cards while others have PDA
functions. Due to large data storage options, the performance of a cell phone sometimes
decreases due to cookies and other temporary files that occupy the memory. In such a case,
the best solution is to format the cell phone to keep it in order.
Things required.
Connector cable
Memory card
Stylus or pin
Step 1
Backup all the data and files of the cell phone. Attach a connector cable to one end of the cell
phone and plug the other end into a computer. If the phone has a memory card slot, backup the
data on the memory card.
214
Unit-V Mobile Phone Servicing
Step 2
Download back-up software online for a small fee if cell phone did not come with the software.
Some Pocket PC phones have a backup/restore utility built in to the phone and do not need any
additional software.
Step 3
Format the phone by holding down the power button and using a pin or a stylus to press the
restore button. This step will erase all data on the phone and will take approximately five to
seven minutes. Once the phone has been formatted it will shut down and restart.
Step 4
Turn on the cell phone and follow the on-screen prompts to install the factory settings on the
phone. This will free up storage and ensure optimal performance. Install new programs on your
formatted cell phone or restore original data
5.4.3 Unlocking
It is easy to identify whether the phone is locked or not . Simply insert a SIM card from
another carrier and see if the name of the network appears on the handset. If it does and you‟re
able to use your phone, it‟s unlocked. Unlocking can be done by getting hold of a code or using
a special data cable and software.
215
Unit-V Mobile Phone Servicing
modification to the software, and is not secure at all. But the ability to modify the software on our
phones is precisely why many of us want an unlocked bootloader.
To Unlock Pattern Lock From Android Mobile Phone Without Any Software Or Internet.
Unlock/Disable Pattern Lock From Android Mobile Steps are in below:
1. Turn off/ Shutdown you android mobile phone or Smartphone by pressing turn off button.
2. Turn on your android mobile phone
3. Entering wrong pattern fast one by one .
4. At last your number of wrong attempt, Pattern not working and give message.
5. Then you will find two button “Emergency call” and “Unlock”.
6. Press Unlock then you will find below two options to unlock android pattern lock.
1. “Answer Question”
2. “Enter Google account Details”
7. Select preferred option as of your choice.
8. In first option “Answer question” you have to give security answer which is submitted by
you at pattern lock created time.
9. In second option “Enter Google account Details” you have to submit your Gmail user
name (Email) or Password.
10. After selecting one of two options, you have to draw new pattern as your new pattern
lock.
Know all the most important new secret codes of cell phones. Secret codes are some
strange number combinations in cellular phones which do certain tasks or display information
which may or may not be possible from inside the mobile phone‟s menu. They can be called as
tricks to display some secret information or to tweak your gadget. Some of the important
changes or important information which may not be available through any settings in the menu
options can be done through them. These codes are many times necessary to insert in the
handset to repair certain software related faults. These number combinations are not known to
all mobile phone device users, so it is an added advantage and many a times very helpful to
reset or format or repair your device without opening it
216
Unit-V Mobile Phone Servicing
This code can be used to enter into Service mode. You can run various tests and change settings in the service
mode
217
Unit-V Mobile Phone Servicing
218
Unit-V Mobile Phone Servicing
(i) Press the Menu button on the phone and tap Settings. Scroll down to Security and tap it
to open the Security menu. Scroll down and check the “Unknown Sources” box. This will
install apps directly from the APK file.
(ii) An APK file is the file that Android uses to install a program. File must be APK format.
(iii) Make sure that you download apps from trusted sources. There are a variety of
communities that offer applications that aren‟t available on the Store, often for free.
These can include beta versions of apps that are in progress, or apps that are
purchased outside of the store.
(iv) download an APK file, using the Downloads app on the phone.
Transfer music, videos, and pictures from your computer. Transfer the files from computer
to phone using the USB cable.
(i) For Windows, use Windows Media Player 10 or higher installed to transfer files directly
to phone when plug it in.
(ii) For Mac, install the Android File Transfer before phone can be recognized.
(iii) Copy music to the Music folder, videos to the Videos folder, and images to the Pictures
folder.
Download files from the web. When browsing the web on your phone, you can download files
directly to your phone‟s storage.
(i) To download an image, tap and hold the image in your phone‟s browser for a second, and
then release. A menu will open and you will have the option to save the image to your phone.
(ii) Downloaded files will be stored in your Downloads folder on your phone. You can move
these around by either attaching your phone to your computer and moving the files using
Windows, or by installing a File Manager app.
Method 2 : iOS
(i) Download new applications. Use the App Store button on the Home screen to browse the
apps available to download. There are many free options available.
(ii) Download new music and videos. Use the iTones button on home screen to browse
available music and videos.
(iii) Transfer Music and videos from Computer: Use iTones to transfer the files
(iv) Install apps not found in the App Store: jailbreak the iPhone to install apps from other
sources.
219
Unit-V Mobile Phone Servicing
The first known mobile virus, "Timofonica", originated in Spain and was identified by
antivirus labs in Russia and Finland in June 2000. "Timofonica" sent SMS messages to GSM
mobile phones that read (in Spanish) "Information for you: Telefónica is fooling you." These
messages were sent through the Internet SMS gate of the MoviStar mobile operator. In June
2004, it was discovered that a company called Ojam had engineered an anti-piracy Trojan virus
in older versions of its mobile phone game, Mosquito. This virus sent SMS text messages to the
company without the user's knowledge. Although this malware was removed from the game's
more recent versions, it still exists in older, unlicensed versions, and these may still be
distributed on file-sharing networks and free software download web sites. In July 2004,
computer hobbyists released a proof-of-concept mobile virus Cabir, that replicates and spreads
itself on Bluetooth wireless networks and infects mobile phones running the Symbian OS.
In March 2005, it was reported that a computer worm called Commwarrior-A had been
infecting Symbian series 60 mobile phones.This specific worm replicated itself through the
phone's Multimedia Messaging Service (MMS), sending copies of itself to other phone owners
listed in the phone user's address book. Although the worm is not considered harmful, experts
agree that it heralded a new age of electronic attacks on mobile phones. In August 2010,
Kaspersky Lab reported a trojan designated Trojan-SMS.Android OS.FakePlayer.a. This was
the first malicious program classified as a Trojan SMS that affects smartphones running on
Google's Android operating system, and which had already infected a number of mobile
devices, sending SMS messages to premium rate numbers without the owner's knowledge or
consent, and accumulating huge bills. Currently, various antivirus software companies like
220
Unit-V Mobile Phone Servicing
Trend Micro, AVG, avast!, Comodo, Kaspersky Lab, PSafe, and Softwin are working to adapt
their programs to the mobile operating systems that are most at risk. Meanwhile, operating
system developers try to curb the spread of infections with quality control checks on software
and content offered through their digital application distribution platforms, such as Google Play
or Apple's App Store.
5.5.2 Precautions
Virus is a terrific word that fills terror in us to mind when it comes in front of us. Further,
when we hear that mobiles contain virus then this is the worst thing that can happen to it.
Because the mobile containing virus is at a great risk. Moreover files, documents etc fed inside
the mobile can be destroyed or deleted permanently due to the virus.
(i) Type URL in to the address bar
(ii) Avoid clicking on unknown attachments
(iii) Never click on any untrusted link
(iv) Beware before sharing your memory card.
(v) Be careful about connecting your mobile with an unknown computer
(vi) Be careful about downloading files and documents from the unknown source
(vii) Be careful about opening SMS or MMS from the unknown source
(viii) Keep updating your antivirus and spyware software periodically
(ix) Scan your mobile regularly
(x) Before downloading any app from Internet, check its review
(xi) Diagnosis the type of virus present in the mobile
221
Unit-V Mobile Phone Servicing
Scan Device
This flexible feature offers the following functionalities:
a) Call & Message Filter: It easily block incoming calls and SMSs from unknown or unwanted
numbers.
b) International Call Block: This feature allows to block unknown International calls.
c) Message Exception List: This list displays non-numeric senders that are excluded from
SMS blocking.
d) Register With TRAI: This feature block all types of telemarketing calls by registering the
number in the DND (Do Not Disturb) list. It can also raise a complaint with TRAI (Telecom
Regulatory Authority of India) against unwanted telemarketing calls and SMSs.
(i) Message Center Displays important notifications that require your attention. Latest IT
security news and alerts are also displayed in the Message Center.
(ii) Activity Receive extensive reports on the activities performed by Quick Heal Mobile
Security on your device.
(iii) Call Forwarding Helps us to set a number to which all your incoming calls will get
forwarded. Set this number by sending an SMS or via the Remote Device Management
portal.
(iv) Background Scan Assured protection from all kinds of virus and malware threats.
Automatically detects virus and spyware in real-time. The Background Scan runs silently
without interfering with the normal functionality of your phone.
222
Unit-V Mobile Phone Servicing
(v) Regular Automated Virus Updates Takes automatic virus definition updates, so that your
device is secured from new and emerging threats.
(vi) Share App shares Quick Heal Mobile Security application with other Android devices using
Bluetooth, Wi-Fi Direct, or NFC.
(vii) Anti-Theft Quick Heal's anti-theft technology prevents the device from being misused. It
allows to remotely lock the device, erase its data, and track its location if it gets lost or
stolen.
(viii) Quick Settings Notification Enable this feature to get quick access to device setting
options such as Wi-Fi, Bluetooth, Mobile Data, Brightness, and Torch.
(ix) Remote Device Management This is a portal provided by Quick Heal, where you can easily
manage your device if it gets lost or stolen. Through this portal, remotely lock, unlock, and
delete the data on phone is possible. The Remote Device Management portal also helps to
track the location of the device.
(x) Security Shield The Security Shield displays the security level of the device and data
through a graphical representation. By tapping this shield, It can configure the security
settings of your device.
(xi) Personal Security This new mobile security feature has been introduced keeping safety in
mind. In case of emergency, press device's power button 3-5 times. This will activate this
feature, and an SOS message with the current location will be sent to the alternate contact
numbers set during the time of registration.
(xii) Intruder detection If someone enters a wrong password 2 times consecutively (to unlock
device's lock screen), this feature will take snapshots using the front and rear camera of the
device.
(xiii) Trusted SIMs List Add multiple SIM numbers to Trusted SIMs List. This feature is beneficial
for users using multiple SIMs. When the SIM is changed, the device is not blocked if its entry
is present in the Trusted SIM list. Fifty (50) SIM numbers can be added to this List.
(xiv) News Get latest news on mobile protection, security alerts, and other important information
related to IT security.
223
Unit-V Mobile Phone Servicing
Review Questions
Part-A
1. Define simplex, duplex and semi duplex transmission
2. What is base station?
3. What is uplink and downlink?
4. Define the term handover, location area location update procedure
5. Tabulate the generation of mobile communication system with its benefits and drawbacks
6. Mention the tools used for mobile servicing
7. List the steps to be followed while soldering the component
8. How to use the Multimeter?
9. How battery power may be boosted?
10. List the different types of Mobile Operating System
11. What is fault? How it is classified?
12. What is jumper? What are its solutions
13. What is virus?
14. How can we prevent the virus?
15. How antivirus software is used?
PART-B
1. Explain the basics of Communication
2. Explain the Components of the Mobile Phone
3. How circuit board of mobile phone is designed? Explain
4. Name and explain the functions of different ICs used in mobile phones
5. Explain the tools use to service the mobile phone
6. How soldering and de-soldering is done ?
7. What is the use of Multimeter?
8. What is battery booster?
9. Explain the assembling and disassembling of mobile phone
10. What are the common fault occur in mobile phone?
11. What are the different types of fault related to electronic components of the mobile phone
12. Explain the jumper techniques and solutions
13. Explain flashing and its steps to be do in android phone
14. How formatting is done? Explain
15. What is unlocking? why it is required ?how pattern is unlocked?
16. What is secret codes? explain it with examples?
224
Unit-V Mobile Phone Servicing
225