Connect Hardwre Peripherials
Connect Hardwre Peripherials
Introduction
This module is designed to equip the required knowledge, skill and attitude to connect
hardware peripherals according to instructions and a workstation or networked computer to the
internet in accordance with the occupational standard.
1
Prepared by B.T
Shashemene Poly Technique Collage
Introduction to computer
What is computer?
It is nothing but any electronic machine w/c can process data without human interaction. It is a
programmable electronic device/machine that accepts data as input, stores and processes it, and
then gives the information as output.
A computer is an electronic device/machine capable of manipulating numbers and symbols by:
I. Taking data as an INPUT (using keyboard or mouse).
II. Storing the input in memory for further use.
III. Process it under the control of a stored set of instruction called a program
IV. Then gives the output (using Monitor) as meaningful information to user.
The parts of a computer that make up the computer systems are consist of Hardware and
Software. Software is a program or set of instructions that make the computer work.
Hardware is the physical body that we can touch, see and feel its existence with our hand.
Computer hardware consists of four basic elements:
Input devices: used to enter data into the system.
Output devices: used to display processed data or result from the system to end users.
Central Processing Unit (CPU): used to perform every tasks performed by
computer. Any data entered to the system must be processed with the help of CPU.
Memory: used to store data within the system before and after processing
temporarily.
Function of a computer
PCs can be used to write letters, balance checkbooks, play games, managing business records,
and even teach children how to read.
The basic operations of a computer fall down to eight basic functions:
Storing: Whatever you enter as input data can be saved and stored for later use.
Retrieving: Anything stored can be retrieved (read) and used again.
Arithmetic operation: You can use computer to add, subtract, divide, multiply and
even higher mathematical operation.
Logical operation: Includes comparing text, work with symbols, and graphical
images
Displaying (out put) :The information you’re working with the computer appears on
a screen or monitor so you can see what you are doing.
Editing : After you are receive the information, you can change it, add to, or erase it.
Printing: One of the greatest capabilities of a computer is that after you finalize your
wok, it can be transferred to paper.
Sending and Receiving: With the development of computer networks, you can
communicate with other computer users by sending them documents or messages,
regardless of where in the world those users are.
History of Computers
2
Prepared by B.T
Shashemene Poly Technique Collage
Over the last few years of man’s existence many discoveries and inventions have directly
and indirectly contributed to the development of the personal computer: Analog devices, Digital
devices, calculators, electronic Materials etcetera. The development of computers is then
assumed to begin with these calculating devices.
In the early days, man used to exchange goods, count with his fingers, sticks and pebbles,
scribble on sands.
But technological development demand faster computing devices. This led to the development of
computers. Charles Babbage, a mathematics professor in Cambridge England, is considered
being the Father of Computers because of his mechanical computing engines invention. His
principles have contributed a lot to the present day computers.
Generation of computers
Depending on the type of materials used and their facilities the earliest generation computers and
the modern generation computers have certain characteristics peculiar to them.
Modern age (1940 to present) computer technology is under continuous improvement.
Computers in the latest generation:
Are getting cheaper in price.
Are getting smaller in volume size.
Dissipate less heat.
Consume less power (up to 200 watt).
Have larger memory capacity and much processing speed
Have better lifespan
They are getting more reliable
Have better programming capability
Have similar maintenance schedule
The programs are becoming more user friendly.
The improvement of computer technology from the early to the latest generation is summarized
in the following table.
Secondary
Generations Circuit Storage Language Operating Access
Element System Time
3
Prepared by B.T
Shashemene Poly Technique Collage
Classification of Computer
We can classify computers based on the following methods:
I. Classification based on the type of data computers process.
A. Digital computers: Such type of computers can Receive and process discrete data
in the form of digits (0 & 1). E.g. calculator and personal computers.
B. Analog Computers: These types of computers used to measure instruments and
reading continuous data .E.g computers with thermometer, Voltmeter.
C. Hybrid Computers: These computers have the combined features of digital and
analogue computers.
II. Classification of computers based on the size, memory, capacity, and speed of
computers.
A. Microcomputers: are called personal computers or just PC. These are smallest in
size and capacity and are applicable for office, home and personal use.
E.g. palmtop computers, notebook computers, laptop computers and Desktop (or
tower top) computers.
B. Minicomputers: are larger in size and capacity than PCs. They are popularly used in
scientific laboratories research centers, universities and colleges.
C. Mainframe computers: these types of computers process a vast amount of
information and have a much higher processing speed and capacity than the above
two. They can be used in higher organizations like Ethiopian airlines designed for
complex operations.
D. Supercomputers: are the most powerful computers, fastest, and the most expensive
type of computers. An example can be computers in NASA & the Earth Simulator in
Yokohama.
III. Classification by purpose of application
Computers can be applied or used for different purposes. Based upon their application, they are
classified as special purpose or general purpose.
4
Prepared by B.T
Shashemene Poly Technique Collage
function. For example Public telephone box, traffic control system and ticket machine, calculator
etc.
B. General purpose computers
They are designed to handle verity of tasks. This is possible by utilizing the “store program
concept”. A program or set of instruction designed to solve problem is read and stored into
memory and then executed by the computer one by one. The same computer can be applied to
solve another set of problem using different program. General purpose computers are more
flexible and versatile. Eg. PCS.
The following are commonly used computers in different work area to perform different tasks
related to us:
Personal Computer
These are the most widely used type of computers for personal, home and office use, educational
training in schools, and in small business enterprises. They are known by their brand names such
as Toshiba, Compaq, Dell, or Hewlett-Packard, IBM etcetera.
Basically they can be grouped into four:
Palmtop computers
Hand-held or palmtop, computers are gaining popularity. Although they become more
sophisticated with each new model, palmtops generally have limited features and capabilities. It
is normally used for limited number of functions as grammar and dictionary checking, calendar
checking notebook, and if possible to connect to other computers over network.
Notebook computers
They are normal textbook sized. Such computers are easily portable.
Laptop computers
They are briefcase sized designed for portability. All are connected to server as a single unit.
We can use laptop computers on top of our lap when going in a car, on airplane, or even in a
café.
Notebook and Laptop computers
These computers are very convenient because they are designed for portability. The system case,
monitor, keyboard, and all internal workings are all in one light, compact case. Plus, although
these computers come equipped with AC adapters they can run on batteries making it very easy
to pick up and go at a moment’s notice.
All of the above listed computers are used to process data by using data processing cycle. Data
processing is “getting the right information to the right person at the right time”. Data is any
collection of basic facts about certain person or thing. Data becomes information after it is
processed by central processing unit (CPU).
Input Process Output
Input: Computer must get input from end users through input devices.
Process: Data is stored on memory and CPU gets that data to perform process
accordingly.
5
Prepared by B.T
Shashemene Poly Technique Collage
Output: Finally the processed data or information is displayed through output devices.
6
Prepared by B.T
Shashemene Poly Technique Collage
webcamera
Scanner
Most full-sized personal computer use a television-like display device called a screen,
monitor or
CRT(Cathode
Ray Tube)
Laptop computers, flat screen displays & handheld computer use a flat panel liquid crystal
display (LCD)
The video display monitor or screen attached to the computer gives you feedback while you
are typing characters from keyboard. The display screen can be used to display both text
(alphanumeric & graphics).
2. LCD PROJECTOR
LCD Projector use as an out device for displaying the computer output in large screen, this
device manly used in conference and class room lecture to display for large number of attendant.
3. PRINTER: Is one of the output devices that used to produce a paper copy by converting
softcopy to hardcopy. It gives information to the user in printed form.
Softcopy: Any document found inside the system that needs to be printed.
Hardcopy: Any document found in paper format or printed documents.
7
Prepared by B.T
Shashemene Poly Technique Collage
Printer
4 Plotter
A plotter is an output device similar to a printer, but normally allows you to print larger images.
Machine used to produce different poster papers.
While we connect peripheral devices, computer can automatically detect it or may need
manual configuration (software to be installed) .Some peripheral deceives are plug and play
and others are Non plug and play.
Plug and play: A set of specifications developed by Intel that allows a computer to
automatically detect and configure a device and install the appropriate device drivers. Keyboard,
mouse and LCD projector are some of plug and play peripheral devices.
Non plug and play: Computers cannot detect such devices automatically. A device, such as a
printer, modem, or game controller, requires manual configuration of hardware settings
before it can be used. We must need to install driver software of such devices to make them
acceptable by the system. Driver software is a program that allows Non plug and play devices,
such as a modem, network adapter, or printer, to communicate with the operating system.
Although a device might be installed on your system, Windows cannot use the device until you
have installed and configured the appropriate driver.
Secondary Storage Devices
Computer storage devices are very important for all computer users because they are used to
store important data that we need to use more or less often. They can store data out of the
system. Some of them are listed as follows:
Floppy disk: Is made from a thin piece of plastic coated with magnetic material on both sides.
The magnetic material is iron oxide most of the time. Data is written to disk by magnetizing and
demagnetizing the magnetic material. Floppy is divided into logical areas for storing data on
them. These are called sectors and tracks. This division is not visible for us. It is a logical
division which is understood by computer only.
Tracks are narrow concentric circles on a disk.
Sectors are pie shaped slice of individual tracks. Sectors form the unit for data storage. Data is
written or read one sector at a time. A single sector can store 512 bytes. The division allows
floppy to be random access device. Data can be read from any sector or track easily. It is
Magnetic storage device w/c stores small amount of data around 1.44MB.
Flash drive: Is a compact and portable electronic storage device w/c we use
to store data. Such storage device can be connected to
the system through USP ports.
8
Prepared by B.T
Shashemene Poly Technique Collage
CD (compact disk): Is also one of secondary storage device used to store data. Unlike that of
floppy disk CD store a huge amount of data.
CD
9
Prepared by B.T
Shashemene Poly Technique Collage
CPU
The CPU contains the control unit and the arithmetic/logic unit.
The control unit directs and coordinates most of the operations in the computer. For every
instruction, the control unit repeats a set of four basic operations called the machine cycle:
Fetching: the transfer of instruction or data item from memory.
Decoding: the conversion of instruction into commands the computer understands.
Executing: the commands, and, if necessary.
Storing, writing the result to memory.
The arithmetic/logic unit (ALU) performs the execution part of the machine cycle.
Specifically, the ALU carries out three operations (mathematical operations):
10
Prepared by B.T
Shashemene Poly Technique Collage
Motherboard
Memory
Memory is used to hold binary strings of data that is going to be manipulated by CPU. There are
two major classes of memory: non-volatile (ROM) and volatile (RAM).
Non-volatile memory keeps the content even if the computer is off or power is gone. The set up
data held in CMOS uses this technique.
In volatile memory, the data is lost when the computer loses power. It keeps data as long as
only computer is on. Random Access Memory is good example of volatile memory. By default,
when we say memory, we mean RAM.
Computer Memory is Measured in terms of :
11
Prepared by B.T
Shashemene Poly Technique Collage
Bit: All computers work on a binary numbering system, i.e. they process data in one's or
zero's. This 1 or 0 level of storage is called a bit.
Byte: 1 byte consists of eight bits.
Kilobyte: 1 kilobyte (KB) consists of 1024 bytes.
Megabyte: 1 megabyte (MB) consists of 1024 kilobytes.
Gigabyte: 1 gigabyte (GB) consists of 1024 megabytes.
RAM
Whenever you run a program on your computer, that program first loads into RAM before
anything happens. It holds temporary instructions and data for manipulation when the system is
running. It is called Random Access because CPU can access or place data to and from any part
of RAM on the system. RAM come in wide variety of modes defined by physical size, access
speed, electrical set up, and width of the bus measured in bits. The bit width of RAM defines the
amount of information your CPU can access or write to your RAM within one cycle.
Memory
Types of RAM
There are two types of RAM based on the way they keep data:
Static RAM (SRAM)
Dynamic RAM (DRAM)
1. DRAM
This memory is dynamic. Because of this, it must be constantly refreshed periodically ( every
few milliseconds). Otherwise the memory will drain and the data is lost. During the process of
refreshing, the CPU can’t access the memory. It is called wait state. Refreshing caused DRAM to
be slower than SRAM. They also use much power than SRAM. But because of their cheapness,
they are the primary RAM in all computers. The memory cells in DRAM use tiny capacitors that
retain charge. Capacitors are devices that can keep charge for some time until discharged. They
use one transistor per bit. Because of this they can be densely packed. This allows more memory
capacity per chip than other types of memory.
Disadvantage:
DRAM is slow, much slower than CPU. This affects the speed of CPU. It may take as much as
10% of CPU time.
2. SRAM
It is called static because it does not require periodic refreshing unlike DRAM. It is much faster
than DRAM and able to keep pace with processor. As long as there is power, SRAM keeps what
is stored. SRAM uses transistors for storage purpose, no capacitors are used. Because of this, no
12
Prepared by B.T
Shashemene Poly Technique Collage
recharging required. It uses 6 transistors per bit. DRAM is lower in density which means they are
larger physically and store fewer bits overall. The high number of transistors used per bit makes
it more expensive and physically larger. This prevented its wide use as computer memory.
SRAM is used to build cache memory.
Power Supply Unit
The basic function of power supply is to convert the type of electrical power available (Alternate
Current-AC) to the type computer circuitry can use (Direct Current). Power supply is designed to
convert 120v (American standard) or 220v (European standard) Alternating Current (AC) into
+3.3v, +5v, and +12 Direct Current (DC) needed by the computer components. Usually the
digital electronic components and circuits in the system (motherboard, adapter cards, drive logic
boards) use +3.3v or +5v power. The motors like disk drive motors, and fans use +12v power. In
addition to supplying power to the system, the power supply also ensures that the system does
not run unless power supply is sufficient to operate the system properly.
In other words, the power supply actually prevents the computer from running (starting up) or
operating until all correct power levels are present.
Hard Disk: Magnetic storage device in the computer w/c have high storage capacity. Hard disk
is the data center of PC. It is here that all your programs and data are stored. A hard disk drive
contains rigid, disk-shaped platters. The platters are usually constructed of aluminum or glass; so
they can’t bend or flex unlike floppy disk. The platters are coated by magnetic substance on both
sides. Data is written to hard disk by magnetizing and demagnetizing the surface of the platters.
Data is stored on both sides of the platter.
Hard disk
Sound Card: The card w/c is used to connects the speakers and microphone to the computer for
displaying and entering sound from and in to the system.
Sound card
13
Prepared by B.T
Shashemene Poly Technique Collage
Modem: Modem card is the place where the computer is connected to the phone line and it is
connected to motherboard on the slot found on motherboard (slots).
Modem card
Network Interface Card (NIC): A circuit board that connects the computer to the rest of
the network usually using special cables called network cable configured with RJ45.
NIC
Video Card: Connects the computer to the monitor. It is a circuit board attached to the
motherboard that contains the memory and other circuitry necessary to send information to
the monitor for display on screen.
Video card
14
Prepared by B.T
Shashemene Poly Technique Collage
Peripheral instruction and will be provided from the client. When we say Peripheral instructions
it mean that how to use, configure or connect peripherals, handling peripherals in appropriate
manner. For example if you need to connect scanner to the system, first you need the system
with full hardware and appropriate software then you try to connect scanner. Since this device is
non plug and play you need to install driver software. At this time there are instructions used to
connect and install software.
Warranty information
Terms and condition
Regulatory information
15
Prepared by B.T
Shashemene Poly Technique Collage
16
Prepared by B.T
Shashemene Poly Technique Collage
17
Prepared by B.T
Shashemene Poly Technique Collage
phone’s RJ11
digital data connector with 2 to 6
Modem transfer over pins is smaller
a telephone than Ethernet’s
line Broadband DSL or ADSL Modem
RJ45 connector
with 8 pins
peer to peer
(so any node
can initiate
networked sending data)
Ethernet computers using Carrier
and printers Cable with an 8-wire RJ45 plug (male Sense Multiple
connector) on each end Access with
Collision
Detection
(CSMA/CD)
Serial RS-
232-C
(this is a
standard for bidirectional
serial binary modem, using one
communicati printer, transmit wire
on by the mouse, and one
Electronic keyboard receive wire;
male 9-pin D-shell RS232C serial connector asynchronous
Industries on a PC
Alliance
[EIA], where
“RS” is an
abbreviation
for
“RETMA a male 25-pin D-shell plug (left) and a female
Standard” 9-pin D-shell connector (right) on a cable for
18
Prepared by B.T
Shashemene Poly Technique Collage
Parallel Centronics or
(IEEE 1284, Standard mode has
where printer, 8 bits out of
“IEEE” is an scanner, and 4 bits into
abbreviation the computer
for the port; Enhanced
“Institute of Parallel Port
Electrical 25-pin D-shell receptacle (EPP) has
and (above) on a computer 8 bits in/out;
Electronic Extended
Engineers”) Capability
Port (ECP)
has 8 bits
Centronics parallel 36-pin plug (above, to a printer) in/out
and a 25-pin D-shell plug (below, to a computer) on
a cable
keyboard, portable flash memory,
printer, scanner, modem, mouse,
up to 127
digital still or video camera,
up to 63
printer, daisy-chained
FireWire scanner, devices up to
19
Prepared by B.T
Shashemene Poly Technique Collage
Enhanced internal
Integrated floppy or
Device hard or 40 wires
Electronics optical disk two EIDE male connectors (right; one
(EIDE) white and the other one blue just below it) on a
motherboard
20
Prepared by B.T
Shashemene Poly Technique Collage
networking
of multiple
Wireless computers,
(Wi-Fi) and Uses the 5 GHz
other Radio frequency
typical Wireless 802.11 access point (which in band
devices such this case also serves as a router to a DSL modem
as printers and as a switch between 4
or file wired Ethernet ports)
servers,
An interface card
that plugs into a PCI slot
Accelerated Monitor
Graphics with located on the
Port (AGP, high-end motherboard
or graphics
Advanced
Graphics
Port) bus AGP connector on a motherboard inside a
Computer
VGA was first marketed
VGA plug (male connector) on a by IBM in 1987; SVGA
cable above and a 15-pin VGA was
Video Graphics
Adapter (VGA) receptacle (female Originally 800600
or Super-VGA pixels, but many
connector) on a computer manufacturers
(SVGA)
upgraded SVGA many
or monitor below times
21
Prepared by B.T
Shashemene Poly Technique Collage
22
Prepared by B.T
Occupational health and Safety (OHS): when we work on computers and need to connect hardware
peripherals we must apply OHS aspects of relevant components.
23
OPERATION SHEET LO3
ICT ITS1 01 0710
Connecting hardware peripherals
MODULE Connecting Hardware Peripherals
INTRODUCTION
The Internet can turn your computer into a powerful tool for research, communications, and sharing.
Connecting to the Internet is easy, and your service provider will do most of the technical work for you.
What is the Internet?
Internet is interconnection of computer networks that enable the computers and the programs they run to
communicate directly or it is network of networks. Internet connection is usually accomplished using
international standards collectively called TCP/IP (Transmission Control Protocol/Internet Protocol), which
are issued by an organization called the Internet Engineering Task Force, combined with a network registration
process, and with the aid of public providers of Internet access services, known as Internet Service
Providers(ISP).
The Federal Networking Council (FNC) agrees that the following language reflects definition of the term
"Internet". Each computer network and connected computer called an Internet host is provided with a unique
Internet Protocol (IP) address 198.105.232.1, for example. For obvious reasons, the IP address has become
known as the “dot address” of a computer. Although very simple and effective for network operation, dot
addresses are not very user-friendly. Hence the introduction of the Domain Name Service (DNS) that allows
for the assignment of meaningful or memorable names to numbers. DNS allows Internet hosts to be organized
around domain names: for example, “microsoft.com” is a domain assigned to the Microsoft Corporation, with
24
Prepared by B.T
the suffix “com” signifying a commercial organization. “ftp.microsoft.com” is an Internet host within that
domain. Each part of the domain still has an IP or dot address, which is used by the network elements to deliver
information. From a user point of view, though, the IP address is translated (or “resolved”) by DNS into the
now familiar format. Internets are constructed using virtually any kind of electronic transmission medium, such
as optical-fiber or copper-wire telephone lines, or radio or microwave channels.
"Internet" refers to the global information system that:
Is logically linked together by a globally unique address space based on the Internet Protocol (IP) or
its subsequent extensions.
Is able to support communications using the Transmission Control Protocol/Internet Protocol (TCP/IP)
suite or its subsequent extensions and/or other IP-compatible protocols.
Provides, uses or makes accessible, either publicly or privately, high level services layered on the
communications and related infrastructure described herein.
Applications of Internet.
Email: Allows a message to be sent from one person to another, or to many others, via computer. Internet
has its own e-mail standards that have also become the means of interconnecting most of the world's e-mail
systems.
World-Wide Web (WWW): library of resources available to computer users through the global Internet. It
enables users to view a wide variety of information, including magazine archives, public and college library
resources, and current world and business news. World Wide Web (WWW) resources are organized so that
users can easily move from one resource to another. The connections to different source computers, or
servers, on the network are made automatically without being seen by the user. WWW connections are
made with the use of hypertext and hypermedia. Users generally navigate through information on the
WWW with the aid of a program known as a WWW browser, or client. We can browse text, images, sound,
or other information in the form of a page, which is obtained from a WWW server. WWW pages are
formatted using Hypertext Markup Language (HTML), and WWW communication among computers
uses the Hypertext Transfer Protocol (HTTP) or Wireless Access Protocol (WAP) for mobile phones.
This communication is usually through the Internet via Transmission Control Protocol (TCP)
connections, but almost any kind of connection can be used.
FTP (File Transfer Protocol) is a set of conventions allowing easy transfer of files between host computers.
This remains the biggest use of the Internet, especially for software distribution, and many public distribution
sites now exist.
Protocol- is asset of rules/instructions that governs the transfer of data and communication between two or
more components in a net work (is the language that the computer used to communicate with each other).
Protocols are software /set of rules and must be installed on network components that need them. Computers
can communicate with each other only if they use the same protocol.
If the protocol used by a computer in a network is not in the same group with the protocol used by another
computer, the two computers cannot exchange information.
Keep the following points in mind when you think about protocols in a network environment.
How Protocols work
The entire technical operation by which data is transmitted over the network has been broken down into
discrete, systematic steps. At each step, certain actions takes places that cannot takes places any other step .
Each step includes its own rules and procedures, or protocol.
25
Prepared by B.T
On source computer
Protocols at this computer can perform the following:
Break the data into smaller sections, called packets that the protocol can handle.
Add addressing information to the packets so that the destination computer on the network can
determine that the data belongs to it.
Prepare the data for the transmission through the NIC and out onto the network cable.
On destination computer
Protocols at this computer can perform the following:
Take the data packet off the cable
Bring the data packet into the computer through the NIC
Strip the data packets of all the transmitting information that was added by the sending computer
Copy the data from the packets to a batter for reassembly; and
Pass the reassembled data to the application in usable form.
When computers are communicating with each other, network is assigned to protocols working as one of three
types:
Application protocols
Transport protocols
Network protocols
► Application protocols: provide data exchange between applications in a network.
Examples of common application protocols include – File transfer protocol (FTP) and Simple mail transfer
protocol (SMTP).
File transfer protocol (FTP) is used to send file from one computer to another under user command. FTP is a
powerful tool, which allows files to be transferred from “computer A” to “computer B” or vice versa.
Simple mail transfer protocol (SMTP) provides a basic electronic mail faculty. It provides a mechanism for
transferring messages among hosts. Features of SMTP include mailing list, return receipts, and forwarding.
► Transport protocols provides communication sessions b/n computer & ensure that data moves reliably
b/n computers. A common transport protocol is transmission control protocol (TCP)
TCP / IP is actually a collection of protocols or rules, that govern the way data travels from one machine to
another across networks. So that it is the standard protocol for communications over the internet.
26
Prepared by B.T
Breaks data up into packets that the network can handle efficiently
Verifies whether all the packets have arrived at their destination
Reassembles the data
► Network protocols used to define network environment. A common protocol that provides network
services is internet protocol ( IP ).
To get information using internet, we must need to Uniform Resource Locater (URL). It is a web address or
internet address. URL describes the location and a method of accessing a resource on the internet. It can also
Represents a Standardized addressing scheme for internet resource.
For Every resource available in the World Wide Web there is a unique URL.
Example: http://www.internet. Com
The most common URL types is:
28
Prepared by B.T
Choose the type of service you would like to use :select Set up my connection manually and click on
next button
Select Connect using a dial-up modem and click on next button
Give the dial-up connection a name (this can be anything you want) click on next button
Enter the telephone number needed to access the internet and click on next button
Enter the user name and password, which will be used for logging into ISP server and click on next
button
Add a short cut icon on desktop and click on finish button
Now test the internet, go to Google or whichever search engine you choose. Look for the phrase "what
you want". Several sites will give you the chance to test download and upload stats in a couple of clicks.
How to use Internet Connection Sharing
To use Internet Connection Sharing to share your Internet connection, the host computer must have one network
adapter that is configured to connect to the internal network and one network adapter or modem that is
configured to connect to the Internet.
29
Prepared by B.T
To connect to the Internet by using the shared connection, you must confirm the LAN adapter IP configuration,
and then configure the client computer. To confirm the LAN adapter IP configuration, follow these steps:
IP Address 192.168.0.2
Subnet mask 255.255.255.0
Default gateway 192.168.0.1
8. In the Local Area Connection Properties dialog box, click OK.
9. Quit Control Panel.
We can configure the client computer to use the shared Internet connection using the following steps:
1. Click Start, and then click Control Panel.
2. Click Network and Internet Connections.
3. Click Internet Options.
4. In the Internet Properties dialog box, click the Connections tab.
5. Click the Setup button.
The New Connection Wizard starts.
6. On the Welcome to the New Connection Wizard page, click Next.
7. Click Connect to the Internet, and then click Next.
8. Click Set up my connection manually, and then click Next.
9. Click Connect using a broadband connection that is always on, and then click Next.
10. On the Completing the New Connection Wizard page, click Finish.
11. Quit Control Panel.
When you start Microsoft Internet Explorer, the client computer will try to connect to the Internet by using the
host computer's shared Internet connection.
Troubleshooting
When you turn on Internet Connection Sharing on the host computer, the host computer's LAN adapter is
automatically assigned the IP address of 192.168.0.1. Therefore, one of the following situations may occur:
IP address conflict
Each computer on the LAN must have a unique IP address. If more than one computer has the same
IP address, an IP conflict occurs, and one of the network adapters turns off until the conflict is
30
Prepared by B.T
resolved. To resolve this conflict, configure the client computer to automatically obtain an IP
address, or assign it a unique IP address.
Loss of network connectivity
If your network is configured with a different IP address range than Internet Connection Sharing
uses, you will lose network connectivity with the host computer. To resolve this issue, configure the
client computers to automatically obtain an IP address, or assign each client computer a unique IP
address in the range of 192.168.0.2 to 192.168.0.254.
31
Prepared by B.T
Select connect to internet and click on next button
Choose the type of service you would like to use :select Set up my connection manually and
click on next button
32
Prepared by B.T
Select Connect using a dial-up modem and click on next button
Give the dial-up connection a name (this can be anything you want) click on next button.
33
Prepared by B.T
Enter the telephone number needed to access the internet and click on next button.
Enter the user name and password, which will be used for logging into ISP server and click on
next button.
34
Prepared by B.T
Add a short cut icon on desktop and click on finish button.
35
Prepared by B.T