DCSA 3302 Full
DCSA 3302 Full
Writer
Professor Dr. Muhammad Mahbub Alam
Department of Computer Science and Engineering
Islamic University of Technology
Coordinator
Professor Dr. K.M. Rezanur Rahman
School of Science and Technology
Bangladesh Open University
Editor
Dr. Md. Abdur Rouf
Department of Computer Science and Engineering
Dhaka University of Engineering and Technology
Edition
First Edition:September, 1998
2nd and Revised Edition: November, 2016
Published by
Publishing, Printing and Distribution Division
Bangladesh Open University
Gazipur-1705
Cover Design
Md. Monirul Islam
Computer Compose
Sabina Yesmin
Printed by
xxxxxxxxxxx
ISBN: 948-34-4001-3
i
Summary of the Contents
ii
Contents
1 Introduction to Computers 1
1.1 Learning Objectives . . . . . . . . . . . . . . . . . . . . . . . . 1
1.2 Types of Computers . . . . . . . . . . . . . . . . . . . . . . . 1
1.2.1 Supercomputer . . . . . . . . . . . . . . . . . . . . . . 2
1.2.2 Mainframe computer . . . . . . . . . . . . . . . . . . . 3
1.2.3 Minicomputer . . . . . . . . . . . . . . . . . . . . . . . 3
1.2.4 Microcomputer or Desktop Computer . . . . . . . . . . 4
1.2.5 Embedded Computers . . . . . . . . . . . . . . . . . . 5
1.3 Exercise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
1.3.1 Multiple Choice Question . . . . . . . . . . . . . . . . 5
1.3.2 Analytical Question . . . . . . . . . . . . . . . . . . . . 6
2.1 Learning Objectives . . . . . . . . . . . . . . . . . . . . . . . . 6
2.2 How Computer Works . . . . . . . . . . . . . . . . . . . . . . 6
2.2.1 Computers and their Basics . . . . . . . . . . . . . . . 6
2.2.2 Hardware and Software . . . . . . . . . . . . . . . . . . 9
2.3 Exercise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
2.3.1 Multiple Choice Question . . . . . . . . . . . . . . . . 11
2.3.2 Analytical Question . . . . . . . . . . . . . . . . . . . . 12
2 Microcomputer Troubleshooting 13
1.1 Learning Objectives . . . . . . . . . . . . . . . . . . . . . . . . 13
1.2 Troubleshooting Approaches . . . . . . . . . . . . . . . . . . . 13
1.3 Components of a Microcomputer . . . . . . . . . . . . . . . . 14
1.3.1 Central Processing Unit (CPU) . . . . . . . . . . . . . 15
1.3.2 Motherboard . . . . . . . . . . . . . . . . . . . . . . . 15
1.3.3 Power Supply . . . . . . . . . . . . . . . . . . . . . . . 16
1.3.4 Random Access Memory (RAM) . . . . . . . . . . . . 16
1.3.5 Hard Drive . . . . . . . . . . . . . . . . . . . . . . . . 18
iii
CONTENTS
3 Motherboards 28
1.1 Learning Objectives . . . . . . . . . . . . . . . . . . . . . . . . 28
1.2 Motherboard Types and Features . . . . . . . . . . . . . . . . 29
1.2.1 AT Motherboard . . . . . . . . . . . . . . . . . . . . . 29
1.2.2 ATX Motherboard . . . . . . . . . . . . . . . . . . . . 30
1.2.3 Micro ATX Motherboard . . . . . . . . . . . . . . . . . 30
1.2.4 ITX Motherboard . . . . . . . . . . . . . . . . . . . . . 31
1.3 Exercise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
1.3.1 Multiple Choice Question . . . . . . . . . . . . . . . . 31
1.3.2 Analytical Question . . . . . . . . . . . . . . . . . . . . 31
2.1 Learning Objectives . . . . . . . . . . . . . . . . . . . . . . . . 32
2.2 Major Components of a Motherboard . . . . . . . . . . . . . . 32
2.3 How to install or replace motherboard . . . . . . . . . . . . . 33
2.4 Exercise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
2.4.1 Multiple Choice Question . . . . . . . . . . . . . . . . 42
2.4.2 Analytical Question . . . . . . . . . . . . . . . . . . . . 43
iv
1.2 Processor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
1.2.1 Processors and their characteristics . . . . . . . . . . . 45
1.2.2 Generations of Processors . . . . . . . . . . . . . . . . 48
1.2.3 Installing a Processor . . . . . . . . . . . . . . . . . . . 49
1.3 Exercise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
1.3.1 Multiple Choice Question . . . . . . . . . . . . . . . . 52
1.3.2 Analytical Question . . . . . . . . . . . . . . . . . . . . 53
2.1 Learning Objectives . . . . . . . . . . . . . . . . . . . . . . . . 53
2.2 Memory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
2.2.1 Memory Types . . . . . . . . . . . . . . . . . . . . . . 53
2.2.2 Upgrading Memory . . . . . . . . . . . . . . . . . . . . 59
2.3 Exercise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
2.3.1 Multiple Choice Question . . . . . . . . . . . . . . . . 63
2.3.2 Analytical Question . . . . . . . . . . . . . . . . . . . . 65
5 Storage Devices 66
1.1 Learning Objectives . . . . . . . . . . . . . . . . . . . . . . . . 66
1.2 Various Storage Devices . . . . . . . . . . . . . . . . . . . . . 66
1.2.1 Magnetic Storage . . . . . . . . . . . . . . . . . . . . . 67
1.2.2 Optical Storage . . . . . . . . . . . . . . . . . . . . . . 68
1.2.3 Solid State Storage Device . . . . . . . . . . . . . . . . 69
1.2.4 Flash Memory . . . . . . . . . . . . . . . . . . . . . . . 69
1.3 Exercise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
1.3.1 Multiple Choice Question . . . . . . . . . . . . . . . . 70
1.3.2 Analytical Question . . . . . . . . . . . . . . . . . . . . 70
2.1 Learning Objectives . . . . . . . . . . . . . . . . . . . . . . . . 71
2.2 Hard Drive Storage . . . . . . . . . . . . . . . . . . . . . . . . 71
2.2.1 Components of a Hard Drive System . . . . . . . . . . 71
2.2.2 Basic Construction of a Hard Disk . . . . . . . . . . . 73
2.2.3 Standard Interfaces for Hard Drives . . . . . . . . . . . 76
2.2.4 Install and Configure a Parallel ATA Drive . . . . . . . 81
v
CONTENTS
2.2.5 RAID . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
2.3 Exercise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
2.3.1 Multiple Choice Question . . . . . . . . . . . . . . . . 87
2.3.2 Analytical Question . . . . . . . . . . . . . . . . . . . . 89
6 Peripheral Devices 90
1.1 Learning Objectives . . . . . . . . . . . . . . . . . . . . . . . . 90
1.2 Expansion Cards: Classification . . . . . . . . . . . . . . . . . 91
1.2.1 Expansion Cards for Video . . . . . . . . . . . . . . . . 92
1.2.2 Expansion Cards for Multimedia . . . . . . . . . . . . 92
1.2.3 Expansion Cards for I/O . . . . . . . . . . . . . . . . . 93
1.2.4 Expansion Cards for Communication . . . . . . . . . . 95
1.3 Exercise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
1.3.1 Multiple Choice Question . . . . . . . . . . . . . . . . 96
1.3.2 Analytical Question . . . . . . . . . . . . . . . . . . . . 97
2.1 Learning Objectives . . . . . . . . . . . . . . . . . . . . . . . . 97
2.2 Installing and Configuring Adapter Cards . . . . . . . . . . . 98
2.3 Exercise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
2.3.1 Multiple Choice Question . . . . . . . . . . . . . . . . 101
2.3.2 Analytical Question . . . . . . . . . . . . . . . . . . . . 101
vi
1.4.2 Analytical Question . . . . . . . . . . . . . . . . . . . . 107
2.1 Learning Objectives . . . . . . . . . . . . . . . . . . . . . . . . 107
2.2 Troubleshooting at the Startup . . . . . . . . . . . . . . . . . 107
2.2.1 POST Routines Failure . . . . . . . . . . . . . . . . . . 108
2.2.2 STOP (Blue Screen) Errors at Startup . . . . . . . . . 110
2.2.3 Other BIOS Issues . . . . . . . . . . . . . . . . . . . . 112
2.3 Exercise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114
2.3.1 Multiple Choice Question . . . . . . . . . . . . . . . . 114
2.3.2 Analytical Question . . . . . . . . . . . . . . . . . . . . 114
3.1 Troubleshooting Different Components . . . . . . . . . . . . . 115
3.1.1 Troubleshooting Motherboard and Processor . . . . . . 115
3.1.2 Troubleshooting Power Supply . . . . . . . . . . . . . . 116
3.1.3 Troubleshooting Memory . . . . . . . . . . . . . . . . . 117
3.1.4 Troubleshooting Hard Drive . . . . . . . . . . . . . . . 120
3.1.5 Troubleshooting Video Devices . . . . . . . . . . . . . 123
3.2 Exercise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124
3.2.1 Multiple Choice Question . . . . . . . . . . . . . . . . 124
3.2.2 Analytical Question . . . . . . . . . . . . . . . . . . . . 125
vii
CONTENTS
viii
3.2 Network Devices . . . . . . . . . . . . . . . . . . . . . . . . . 159
3.2.1 Network Interface Card (NIC) . . . . . . . . . . . . . . 159
3.2.2 Repeater . . . . . . . . . . . . . . . . . . . . . . . . . . 159
3.2.3 Hub . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159
3.2.4 Bridge . . . . . . . . . . . . . . . . . . . . . . . . . . . 159
3.2.5 Switch . . . . . . . . . . . . . . . . . . . . . . . . . . . 160
3.2.6 Router . . . . . . . . . . . . . . . . . . . . . . . . . . . 160
3.3 Troubleshooting of Network Problems . . . . . . . . . . . . . . 161
3.3.1 Network troubleshooting: An example . . . . . . . . . 162
3.4 Exercise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163
3.4.1 Multiple Choice Question . . . . . . . . . . . . . . . . 163
3.4.2 Analytical Question . . . . . . . . . . . . . . . . . . . . 163
ix
UNIT 1
Introduction to Computers
This unit highlights the working principle of a computer in a very general
point of view. Since there are different types of computers, it also discusses
this issue. Many reader may not have any background on computer technology.
To help them prepare for the course this unit is a foundation work.
Upon completion of this lesson of the Unit you will be able to:
1. Supercomputer
2. Mainframe Computer
3. Minicomputer
4. Microcomputer or Desktop Computer
5. Embedded Computer
1.2.1 Supercomputer
Space Exploration
Earthquake studies
Weather Forecasting
Other scientific research
Supercomputers: Examples
2
IBMs Mira in United States
IBMs SuperMUC in Germany
Mainframe computers are mainly used by large firms and government orga-
nizations to run their business operations. The Mainframe computer can be
fit inside a large air-conditioned room because of its size. These computer
are also very powerful. For example, IBM’s latest Mainframe z13 can process
2.5 billion transactions a day. Mainframes are used by large organizations
for critical applications, massive data processing such as census, industry and
consumer statistics, enterprise resource planning, and transaction processing.
Figure 1 .2 shows the latest Mainframe z13 by IBM.
Mainframe computers: Examples
IBS’s z13
Fujitsus ICL VME
Hitachis Z800
1.2.3 Minicomputer
Minicomputers are used by small businesses & firms. Minicomputers are also
called as “Midrange Computers”. These are small machines and can be ac-
3
Figure 1 .2: z13: Mainframe computer by IBM
Minicomputer: Examples
4
The Micro-computers are specially designed for general usage like edu-
cation, entertainment and office work purposes. Popular manufacturers of
microcomputer are Dell, Apple, Samsung, Sony and Toshiba.
Figure 1 .4: Commodor-64: one of the most popular early microcomputers (1982)
1.3 Exercise
a) It is large in size.
b) Supercomputer is a specialized computer.
c) It is used by common people.
d) It is very expensive.
5
2. Which statement is false about a Mainframe computer?
Upon completion of this lesson of the Unit you will be able to:
Most gadgets are rather simple: A toaster heats bread; a microwave oven heats
water or the water inside of things; a car provides transportation; a telephone
allows you to talk with someone else, from across the globe to sitting across
the table. The purpose of any device can be boiled down to the simplest
description. But what about a computer? It is very hard to make one single
statement on its purposes.
Before we begin to learn the different parts that make up a computer system
it is important to realize the fact that what a computer really does.
What Computers really do! To understand how computers work, it
is important first to realize what they do. In fact, the list would be very
6
very long. To mention a few, they are: word processing, video editing, game
playing, image processing, web surfing and so on. Although these applications
are very diverse in nature there is one thing in common from computer’s
perspective: information processing or simply processing.
To help you grasp the notion of what a computer does, you should under-
stand three basic computer concepts you should remember as shown in the
Figure 1 .7. It has three aspects:
I/O
Processing
Storage
I/O: Input/output is commonly written as I/O which are the two things a
computer does the best. Remember the following points about I/O:
7
Figure 1 .7: How a Computer Works: A General Diagram
– Input devices are used to send information to the computer. The key-
board, mouse, scanner and digital camera are some examples of input
devices.
– Output devices are those the computer uses to show its output, such as
the screen and printer.
– Some devices can do both input and output, such as a hard drive, floppy
disk and a modem. The computer can use those devices to supply input
as well as send output to those devices.
– The processor does not have any processing capacity unless you instruct
it. Telling the computer what to do is the instruction set. By using a lot
of instructions a software is developed.
8
Storage: The final part of the computer equation is storage, which in a com-
puter is referred to as memory. The storage is necessary on the most basic
level because the processor needs a place to perform its operations.
On a modern computer, storage comes in two forms: temporary and per-
manent.
RAM is the temporary storage, where the processor does its work, where
programs run, and where information is stored while it is being used. You can
imagine that RAM is the microprocessors’ playground.
Disk drives provide long-term storage also called secondary storage. The
disks also allow information to be saved and recalled for later use like a
closet or storage unit. Disk storage is the place where things go when the
microprocessor is not directly working on them but from where stuff can be
retrieved later, if needed.
A good analogy of temporary and permanent storage is shown in Figure
1 .8.
9
Hardware: The physical parts of a computer and related devices are collec-
tively called computer hardware. The internal hardware parts of a computer
are often referred to as components, while external hardware devices are usu-
ally termed as peripheral devices or simply peripherals. But in general, they
all fall under the category of computer hardware. Computer case and power
supply are the typical examples of computer hardware. We will explore this
idea in more detail very soon.
10
Figure 1 .9 shows a typical computer system. The big, important pieces
have been labeled for your enjoyment. It is important that you know which
piece does which task and its proper terminology.
– Computer Case: It is the large box that contains most of the essential
components of a computer. In more formal language it is also called
Computer Console. Although in general the term console is used to
indicate the basic terminal where you can issue commands directly.
– Monitor: The monitor is the device where the computer displays infor-
mation, its output.
– Keyboard: It is the device by which you can type something. It is the
most primitive way to communicate with the computer, hence keyboard
is often referred to as an input device.
– Mouse: The computer mouse is a helpful device that lets you work with
graphical objects that the computer displays on the monitor.
– Speakers: For audio output we need speakers, either external or built-in
(mostly for Laptops).
– Printer: It prints and produces hard copy.
2.3 Exercise
a) Gaming
b) Information Processing
c) Video Editing
d) Word Processing
a) Windows 95
b) Windows 7
c) Mirosoft Office
d) Linux
11
a) Mouse
b) Hard disk
c) Linux
d) Keyboard
a) Mouse
b) Hard disk
c) Monitor
d) Keyboard
12
UNIT 2
Microcomputer Troubleshooting
Troubleshooting of microcomputer is a challenging task. This is due to the
fact that computer is a very high-precision and complex system consisting of
a number of different components. A particular problem may be caused by a
number of reasons. This unit describes the general approach of troubleshoot-
ing. It explores the major components of a computer. Before you start the
troubleshooting you must have a number of tools or devices. They are also
summarized here.
Upon completion of this lesson of the Unit you will be able to:
Step 4: Act for the solution. Establish a plan of action to resolve the
problem and implement the solution.
Step 5: Test and prevent. Verify full system functionality and implement
preventative measures
Major objective of this section is to make the reader familiar with the in-
ternal and external components of a typical microcomputer. Details of each
component will be discussed in more details in the subsequent chapters.
The next part of these notes will explore different hardware components of
a typical computer.
It is strongly advisable to finish this lesson in presence of a computer so
that you can readily map the instruction to the corresponding component.
14
1.3.1 Central Processing Unit (CPU)
1.3.2 Motherboard
The motherboard is the main circuit board. It holds the CPU, memory, hard
drive connectors, expansion cards to the video and audio, and connections to
15
other ports (such as USB ports).
The power supply is located at the back of the computer, where the power
cord is connected. It transforms the 240 Volt AC main power supply into the
various DC voltages required by the machine. This is why you will notice a
number of power cables coming out of the power supply and going to various
parts of the computer.
The power supply is the ultimate energy supplier to the computer, so it
runs as long as the machine is on. To prevent overheat damage each power
supply includes a fan that circulates air through the case.
Be careful to open the computer case. You must unplug the computer first
and before touching the inside you should touch a grounded metal object to
discharge any static charge.
16
Figure 2 .3: Computer Power Supply
memory slots rather like expansion slots, but they dont have to be along the
back of the case. Depending on how much memory your computer has, some
of the slots may be empty.
17
How much RAM? RAM is measured in megabytes (MB) or gigabytes
(GB). The computer can finish more tasks in less time if it has higher RAM. On
the other hand, computer without enough RAM often gets sluggish especially
when multiple tasks are run in parallel. In todays desktop and laptop com-
puter, RAM ranges from 4 GB to 16 GB. Additional RAM normally improves
performance of the computer.
Inside the case, you will notice a solid and heavy rectangular metal box as
shown in figure 2 .6. This is called hard drive where data are stored perma-
nently and programs are installed. Hard Drive is called permanent storage
or long-term storage. Since the data stored in hard drive are not lost if the
computer is turned off or rebooted.
When a particular program (e.g. Word Processor) is executed or a file
is opened, some relevant portion of data is copied from the hard disk to the
RAM. This is why computer with faster hard drive can start up and load
program quickly.
18
Video Card: It is responsible for the visual display of your computer
monitor. Now-a-days, most computers do not have dedicated video card,
instead its motherboard has a GPU (graphics processing unit) built into
it.
Sound Card: The sound card is responsible for all sorts of audio sound
in your computer. Most motherboards, in recent days, have their built-in
audio card.
1.4 Exercise
2. Find out the component of a computer which is very smaller in size but
very important in capability:
a) RAM
b) Power Supply
c) Motherboard
d) Processor
19
Lesson 2: Hardware Tools for Troubleshooting, Heat
Management
Upon completion of this lesson of the Unit you will be able to:
Hardware tools are helpful to identify performance trends and problems. This
section describes the most common of these tools which are very helpful in
isolating defective hardware components.
The commonly used tools are :
Multimeter
Cable tester
POST Card
Other Tools
20
Figure 2 .7: A Digital Multimeter
Cable Tester: Many hardware problems are caused by faulty cabling and
connector especially in the networking. Connectivity and functionality can
be tested using some specialized hand-held devices commonly termed as cable
tester. These devices range from moderately priced Data Cabling Testers to
very expensive Time Domain Reflectometers (TDR).
– Data Cabling Tester: Data Cabling Testers are mainly used to perform
a number of different types of tests on twisted-pair and coaxial cables.
Data Cabling Testers normally consist of two units: a master test unit
and a separate load unit, as illustrated in Figure 2 .8.
The master unit is attached to one end of the cable and the other end
is attached with the load unit. The master unit sends patterns of test
signals through the cable and reads them back from the load unit. In
case of twisted-pair cabling this device is used to detect:
Broken wires
Shorted connections
Improperly paired connections
– Time Domain Reflectometer (TDR): TDRs are more advanced and so-
phisticated cable testers that can be used to determine the distance to
a break in a cable. It sends signals along the cable and waits for them
to be reflected. Then the physical distance can be calculated using the
time between sending the signal and receiving it back.
21
Figure 2 .8: Cable Tester
POST Card: POST card is a diagnostic device that displays error codes and
progress during its power-on self-test (POST) process. Hardware technician
uses POST card when the computer does not start up or it can not read from
the hard drive. The system generates codes to a specified I/O port (usually
80 hex) during startup, indicating different stage of startup or error message.
The codes are well-documented, so the technician can easily understand what
is going on.
The value of the card lies in the fact that the tests can be carried out even
if the system is completely disconnected from its hard drive.
22
Screwdrivers
Pliers
Cutters
Torch Light
Heat is a major factor. At first you might think why a hardware trou-
bleshooter is ever careful about the heat inside the computer. May be your
computer runs 1/2 hours a day, not even 7 days a week. But that is not the
general case. Primarily computers specially in university, research center and
corporate service provider run for very long time.
Inside the computer there are components such as CPUs, graphics pro-
cessors, drive motors and power supply circuits. Heat has adverse effects on
these components. For each of these components the manufacturers set the
maximum operating temperature. In most cases, beyond 80°C they may stop
normal functioning. Common symptoms are hard disk read/write error, un-
reasonably slow response time for each program.
Sources of Heat:
The Processor and Graphic card cause the maximum heating in a com-
puter.
23
Each component experiences higher temperature with increasing load
(i.e. more tasks at a time).
Optical Disk Drives also generate excessive heat for reading and writing
from and into CDs and DVDs.
There are a number of cooling methods. Each of them has its own advantages
and disadvantage.
This method can be considered as the cheapest and the most commonly used
method for cooling a computer. It has a cooling plate and a fan. The fan
blows air on the plate over the component to be cooled. The cooling plate
consists of a flat surface that touches the component to be cooled. A number
of fins are attached on the other side and those fins increase the surface of the
plate. As a result, the heat exchange capability of the plate is also increased.
24
the surrounding temperature is very high). In this case the temperature may
not be reduced as required by a particular component.
Advantage: It is very cheap and energy-efficient (i.e. uses less power to
operate). It is easy to maintain the system. One can easily replace the faulty
fan that involves very less cost.
In passive air cooling, a plate is used as mentioned in active cooling. But the
plate is much bigger in size than the ones in active air cooling. This is because
there is no fan to blow within the fins. The fins should be large enough and
should have adequate space between them to allow the natural flow of air.
Disadvantage: Weight and size are the main problems of this system.
Since a heavy and large plates are fixed over a smaller area (i.e. component to
be cooled), it increased the total weight of the computer. It also reduces usable
area inside the case.
Advantage: The reliability of this system is very high. Moreover the
maintenance cost is as low as 0.
Water Cooling
Cooling plates
Hoses that the coolant (that makes component cool) flows within
A small tank for coolant
A circulation pump
25
A radiator
First the components that require cooling are identified. Then each of
these components is connected to a cooling plate which is normally made of
aluminum or copper. It is a hollowed plate with an input and output for the
coolant. The pump circulates the coolant from the radiator, to the cooling
plates, then to the tank and back to the radiator. The coolant will lower its
temperature in the radiator.
2.4 Exercise
a) Scale
b) Multimeter
c) POST Card
d) Cable Tester
a) RAM
26
b) GPU
c) Motherboard
d) CPU
Multimeter
Cable tester
POST
27
UNIT 3
Motherboards
Motherboard is the foundation of a computer. It is the area where most of the
essential components are set. Processor, for instance, is inserted on a specific
area of the motherboard. Therefore it is essential to understand the features of
a motherboard. It is also important to explore different types of motherboard.
These are pre-requisites to successfully troubleshoot the motherboard.
Upon completion of this lesson of the Unit you will be able to:
Motherboards are classified based on its form factor. Let us begin our dis-
cussion about various types of motherboard by understanding the term form
factor.
Form Factor: The specifications for a motherboard’s general shape and
size is determined by its form factor. Various other aspects of motherboard is
also specified by its form factor like supported type of case and power supply,
the placement of mounting holes, the physical layout and organization of the
board etc.
1.2.1 AT Motherboard
29
from the Pentium P5 to the times when Pentium 2 had been started to be
used.
Micro ATX is a form factor that is designed to work in standard ATX cases,
as well as its own smaller cases. Though micro ATX follows the ATX principle
of component placement for enhanced cooling over pre-ATX designs and it has
a smaller footprint. This is because the smaller form comes with some trade-
offs. For the compact use of space, the quantity of memory slots, motherboard
headers, expansion slots, integrated components were decreased. There are
fewer micro ATX chassis bays, although the same small-scale motherboard can
fit into much larger cases if your original peripherals are still a requirement.
Micro ATX systems tend to be designed with lower wattage power supplies
to help keep down power consumption and heat production. This is generally
standard requirement for reduced micro ATX suite of components. However,
as more offboard USB ports are added and larger cases are introduced with
additional in-case peripherals, a larger power supply might be incorporated.
Micro ATX motherboards and their larger cousins, ATX motherboards, share
their width, mounting hole pattern, and rear interface pattern but are shal-
lower and square, measuring 9.6 ′′ × 9.6 ′′ (244mm × 244mm). They were
designed so that they can be fit into full-size ATX cases.
30
1.2.4 ITX Motherboard
The ITX line of motherboard form factors was developed for special uses, such
as home-theater systems and as embedded components by VIA as a low-power,
small form factor (SFF) board. ITX itself is not an actual form factor but a
family of form factors consisting of the following form factors:
1.3 Exercise
1. What is PCB?
a) A programming language
b) Conductive series of laminated paths
c) A speical chipset
d) Non of the above
a) Form Factor
b) Price
c) Color
d) Power Consumption
31
Lesson 2: Components of Motherboard, Installation
of Motherboard
Upon completion of this lesson of the Unit you will be able to:
By this time, you have understood the basic types of motherboards and their
form factors, let us look at the components found on the motherboard and
their locations relative to each other. Many of the following components can
be identified on a typical motherboard as shown in Figure 3 .2.
A CPU socket - this socket houses the actual CPU, directly soldered
into it. There are heat sinks and mounting points for fans right next to
the CPU socket because of the fact that high speed CPUs generate a lot
of heat.
32
A power connector to distribute power to the CPU and other compo-
nents.
Main memory slots, typically in the form of DRAM chips.
The interface between the CPU, the main memory and other components
can be created by a chip which is referred to as the Northbridge on
many types of motherboards. This chip also contains a large heat sink.
A second chip, which controls the input and output (I/O) functions of
a computer, is referred to as the Southbridge. It is not connected
directly to the CPU. Rather it is connected to the Northbridge and the
Northbridge and Southbridge combined are referred to as the chipset.
Slots for one or more hard drives to store files. Integrated Drive Elec-
tronics (IDE) and Serial Advanced Technology Attachment (SATA) are
the most common types of connections.
A Read-only memory (ROM) chip, which contains the firmware,
or startup instructions for the computer system. This is also called the
BIOS.
A slot for a video or graphics card. There are a number of different types
of slots, including Accelerated Graphics Port (AGP) and Periph-
eral Component Interconnect Express (PCIe).
Additional slots to connect hardware in the form of Peripheral Com-
ponent Interconnect (PCI) slots.
Peripherals Connectors. These connectors are the bridge between the
outside of your computer and the inside. External peripherals such as
keyboard, mouse, monitor, speakers and so on are all connected via these
connectors.
Remove both side panels for easy access to the motherboard tray. To avoid
having to work at weird angles, remove the motherboard tray from the case.
33
This will allow you to easily install the motherboard. However, keep in mind
that not all cases have removable motherboard trays.
I/O panel shield is located at the rear of the case, where the connectors for the
motherboard extend out for your monitor, USB devices, and other peripherals.
In most cases, you will find a default panel shield installed, which will need to
be removed and replaced with the panel that came with your motherboard.
34
Figure 3 .4: Motherboard Installing Step 2
Apply pressure to all four corners of the panel and it should snap into
place which secures it into the case.
Installing the panel in the correct direction is very important and you
should be mindful of it. To make sure the panel is in the correct direction,
compare it to the actual layout of the connectors on the motherboard.
a) Find the standoffs. The motherboard should be kept above the case
which is done using standoffs and this prevents the motherboard from
shorting out and helps cooling. In some cases will find standoffs, while
35
others may not have them. Nevertheless, your motherboard should come
with its own standoffs which can be used.
b) Install the standoffs. Match the holes on the motherboard with the
available standoff locations on the motherboard tray. However, every
case and motherboard tray is different with different hole configurations.
Line up the motherboard to find a perfect location from which you can
use standoffs to secure it. Your motherboard should have a standoff in-
stalled on every hole possible.
Most standoffs screw into their holes while some are pushed in like
pegs.
Be advised that not all of the available holes will be attached with
every motherboard. Thus, Connect as many standoffs as possible,
and leave the idea of using any extra standoffs. A standoff should be
installed on a motherboard only with a corresponding hole.
36
c) Place your motherboard on the standoffs. As we mentioned, you
should check whether the holes and the standoffs are all line up. Should
your motherboard tray does not come out of the case, gently force the
motherboard against the I/O panel on the back of the case and check if
it fits. Start securing the motherboard with screws.
Do not over tighten the screws. Make sure it is firm but not too tight.
Using an electric screwdriver will only harm your motherboard.
Holes without metal on them requires cardboard washers between the
screw and the motherboard. In fact, try to avoid using non-metallic
holes at all.
After securing your motherboard, you can start connecting your components
to it. The recommended order to connect the components is that you connect
the power supply first, as the plugs will be difficult to reach later. Make
sure that both the 20/24-pin connector is attached as well as the 4/8-pin 12V
connector.
37
Figure 3 .9: Motherboard Installing Step 5
Refer to your power supplys documentation if you are unsure which cables
to use.
You will need to connect the front panel switches and indicators in order to
turn on your computer with the front power button or see when the hard
drive is being accessed. Locate the following wires and connect them to the
appropriate pins on the motherboard:
Power switch
Reset switch
Power LED
Hard drive (HDD) LED
38
Figure 3 .11: Motherboard Installing Step 7
Speaker
Make sure to connect any front USB ports to the appropriate connectors on
the motherboard. This is easy since these are typically labeled and also make
sure that the correct plugs are placed on the correct pins.
Any case and CPU fans should be connected to the appropriate pins on the
motherboard. There are typically several places to plug in chassis fans, as well
as a two-pin connector near the CPU for the CPU fan.
39
Figure 3 .13: Motherboard Installing Step 9
After making sure that the motherboard is secure and connected, you can
start attaching your drives to it. Make sure that you distinguish betwen your
SATA and optical drives while attaching them to the correct SATA ports on
your motherboard.
One of the last components you should install is the video card. The card will
take up the most space, and will make reaching other areas difficult. Installing
a video card may be optional, depending on your system and needs.
40
Figure 3 .15: Motherboard Installing Step 11
do not get stuck in fans. Tuck excess cable into spare drive bays and use zip
ties to bundle cables together. Be generous to leave enough space for each of
your components to breathe.
As the final step, return the side panels of the case to their original positions
and fix them with screws. Plug your computer and components in and turn
your computer on. Now that you have installed all your components as pre-
scribed, prepare for operating system installation. Follow the guides below for
specific instructions for your operating system:
Linux
Windows
41
2.4 Exercise
a) CPU Socket
b) Power Connector
c) Chipset
d) SATA Hard Disk
a) Northbridge
b) Southbridge
c) ROM chip
d) None of the above
a) SATA port
b) North Bridge
c) Optical Drive
d) CPU slot
a) ROM Chip
b) North Bridge
c) Chipset
d) Hard Disk
42
2.4.2 Analytical Question
43
UNIT 4
Processor and Memory
Processor is called the brain of the computer since all computations are per-
formed by this component. A processor is characterized by a number of fea-
tures such as speed, cores and generations. Although installing a processor is
not a difficult task, but proper methodologies must be maintained to do it.
Memory, on the other hand, is the storage of a computer. Some memory can
store information or data for a very longer duration while other may contain
only for a while.
Lesson 1: Processor
Upon completion of this lesson of the Unit you will be able to:
1.2 Processor
In the previous chapter you have learned the basics of motherboard, its classifi-
cation and installation. Now it is time to learn about the most important com-
ponent of the motherboard: the Processor also termed as Central Processing
Table 1: Number of Transistor in Intel Processors
Processor Number of Transistor
Mobile Intel Core 2 Duo 291 million
Intel Core 2 Duo 410 million
Intel Core 2 Extreme 582 million
Intel Core 2 Quad 820 million
Intel Core i7 731 million
Unit (CPU). Both the terms Processor and CPU will be used interchangeably
in this chapter.
The main task of the Processor is to control and direct all the activities
of the computer. CPU executes all its tasks using both external and internal
buses. Bus is a communication system that transfers data between components
inside a computer system.
CPU is essentially is a processor chip consisting of huge number of transis-
tors, often counted in millions. For example, Intel Core i7 processor contains
731 million transistors. Table 1 presents this number for a number of Intel
processors.
The largest PC-compatible processor manufacturers are Intel and Advanced
Micro Devices (AMD).
There are a number of ways to describe a CPU. It can be, for instance, char-
acterized by: bit width, clock cycles and the number of execution cores used.
Locate the processor in your computer: If you open up the case of your
computer you can locate the position of the processor as shown in the Figure
4 .1.
Speed:
The clock speed is the most common way to characterize a processor. It
is measured in hertz, which is the number of times per second that the
electrical voltage in the processor switches back and forth between low
and high. High value and low value correspond to zero and one which
constitute the binary instructions. The processor uses these oscillations
(from one to zero and vice-versa) to physically carry out the instructions.
In modern processors clock speed is measured is Mhz or GHz. The mega-
45
Figure 4 .1: Location of the processor inside the case (as marked in squire)
herz value, for instance, tells how many million clock ticks a processor
can work with in one second. In the same way, the clock inside a 2.5GHz
processor ticks 2.5 billion times each second.
Cores.
Some processors are dual- or quad-core in single chip. A dual-core or
quad-core indicate that the system has two or four separate processors
to work together. Computers with multi-core arrangement can work more
efficiently because it can assign one or more cores to each particular task
but can leave other cores free for other tasks. Multi-core processors can
carry out a computation-intensive task such as video editing or graphics
programming without significant delay.
Besides the number of core, some processors have features termed as
hyperthreading that allows the operating system to execute more than
one tasks per one physical core in parallel. Each logical subdivision of
the processor is called thread. For this reason in the manual of modern
processors you will find its one of the features marked as # of cores / #
of Threads. For instance in Intel i7-6700T Processor this value is 4/8. It
implies the processor has 4 physical cores and in each core works like 8
46
virtual processors in parallel using multi-threading features.
Host-bus speed: The host-bus speed, also called the Front-Side Bus
(FSB) speed determines the data transfer rate between the processor and
the chipset. A higher FSB contributes to a higher processor performance.
Word Size: It is the largest number of bits that the processor can
process at a time. The evolution of Intel processors has incremented the
word size of the processors from 16 bits to 64 bits.
Data Path Size: It is the number of bits of data that can go into or
out of the processor at a time from the data bus which is usually the
same as the data bus size. Normally the word size and data path size
are often the same, but not necessarily that is always true. Data path
size has increased from 8 bits to 64 bits with the evolution of the Intel
processors.
32-bit and 64-bit processors: The set of data lines between the pro-
cessor and the primary memory of the system can be 32-bit or 64-bit
wide, among other widths. If the bus is wider, more work can be per-
formed, because more data that can be processed per unit of time. For
example, an internal registers size in the processor might be only 32 bits,
but with a system bus of length 64-bit, two separate pipelines can receive
information simultaneously.
Memory Cache: Ordinary RAM is dynamic RAM and cheap but rela-
tively slow. Additionally, there is more expensive but faster static RAM
which is called memory cache. It is a small amount of static RAM that
holds a small portion of dynamic RAM that are currently used (or likely
to be used in near future). Processors have two levels memory cache
such as: Layer 1 (L1) and Layer 2 cache (L2). The size of L1 cache, is
a feature of the processor architecture that cannot be changed without
redesigning the processor while L2 is external to processor core. It means
the manufacturer can make new processor with different amount of L2
cache. Some processors have a third level (L3 cache), which is used to
share data between different processor cores. Figure 4 .2 explains the
concept in simple diagram. Note that L1 cache can either be for Data
(D Cache) or for Instruction (I Cache).
47
Figure 4 .2: Processor Cache: A Conceptual Diagram
The first Pentium V processor from Intel (product code:80501, Code Name:P5)
was officially released in 1993. Its clock speed was 60 MHz!. And today, your
smart phone’s processor speed is more than 1 GHz. The modern processor is
the result of decades of research and innovation. This section summarizes the
history of processors in brief.
1st Generation: The first generation spans from 1971 to 1973. In 1971,
Intel created the first microprocessor 4004 running at a clock speed of
108 KHz. Other contemporary microprocessors in the market included
Rockwell international PPS-4, INTEL-8008 and National semiconductors
IMP-16 were in use.
2nd Generation: During the period from 1973 to 1978, very efficient
8-bit microprocessors like Motorola 6800 and 6801, INTEL-8085 and
Zilogs-Z80 were implemented and were among the most popular ones.
They were costly yet very fast as they were based on NMOS technology
fabrication.
3rd Generation: From 1979 to 1980, 16-bit processors were created and
designed using HMOS technology. Examples of this period are: INTEL
8086/80186/80286 and Motorola 68000 and 68010. These processors were
four times faster in speed than their counterparts from 2nd generation.
4th Generation: From 1981 to 1995 this generation developed 32-bit
48
processors using HCMOS fabrication. Among those processors INTEL-
80386 and Motorolas 68020/68030 were the popular ones.
5th Generation: From 1995 to until now this generation has been
bringing out high-performance and high-speed processors that make use
of 64-bit processors. Such processors include Pentium, Celeron, Dual and
Quad core processors.
– Thinner design.
– 2.5 times better performance.
– 3 times longer battery life.
49
Step 2: Prepare the motherboard.
The chip will be mounted onto the motherboard in a socket and depending on
the type of computer you have, the socket may be shaped in various forms.
Some CPU chips are soldered onto the motherboard and can only be up-
graded by removing and installing a new motherboard. This type of chip is
referred to as the Proprietary CPU Chip.
Before you consider upgrading to a more powerful processor, check your com-
puter’s manual for instructions. Your processor is most likely a propriety
Central Processing Unit, If the manual tells you to consult with the manufac-
turer. What this means is that the processor can only be as specified by the
manufacturer manual.
50
Step 5: Remove Additional Components.
Components like the hard drive or an expansion slot should be removed before-
hand to gain full access to the chip if necessary. Additionally, by only removing
a couple of screws and sliding the panel with the motherboard down, newer
and fancier tower units allow easy access to the chip.
Once you bring the CPU into plain view, grasp the lever on the Zero Insertion
Force sockets and carefully but firmly pull the lever straight up. You can find
this lever on the side of the chip. Be on look for a clamp because some other
chips may contain one and that must be removed as well before you want to
remove the CPU. Consult your owner’s manual to see the components of your
CPU.
Some chips are covered by a Heat Sink and/or a Cooling Fan. Make sure
to remove these components set aside.
51
Step 7: Insert the Chip.
Place the beveled end of the chip to match the beveled end of the socket when
inserting the new chip. This design was incorporated to enable the chip to be
installed in only one direction.
1.3 Exercise
52
a) L1 cache
b) L2 cache
c) L3 cache
d) All of them
Lesson 2: Memory
Upon completion of this lesson of the Unit you will be able to:
2.2 Memory
Just like a human brain, a memory is used to store data and instructions. In
Computer, there are data that are to be processed and instructions that are
required for processing. Memory is the storage space in computer where these
data and instructions are stored. The memory is divided into cells which
are essentially large number of small parts. Each of these cells or memory
locations has a unique address which varies from zero to memory size minus
one. For example if computer has 64k words, then this memory unit has 64 *
1024=65536 memory locations. The address of these locations varies from 0
to 65535.
53
i) Cache Memory
ii) Primary Memory/Main Memory
iii) Secondary Memory
Cache Memory
54
are good candidates for caching. By exploiting these techniques it is possible
to achieve cache hit rates of well over 90%. Hit rates are calculated by mea-
suring the percentage of data required by the CPU is found in the cache and
a DRAM access is not required
55
Figure 4 .10: RAM
Classification of RAM
1. Static RAM
2. Dynamic RAM
Static RAM (SRAM). It stores bits using two-state logical circuits called
flip-flops. These circuits are stable and will retain their states until there
is power. The state can deliberately be changed by software. However, the
contents of SRAM are lost if it loses power.
Dynamic RAM (DRAM). It stores data bits using minuscule electric charges.
These charges leak away rapidly, and so they must be refreshed or rewritten
constantly. Memory module has dedicated circuitry to do so automatically.
Though for large quantities, dynamic RAM is much cheaper than static RAM,
the need to constantly refresh the contents makes it slower than static RAM.
However to cut cost, the main memory of a computer is always DRAM.
56
DRAM physical formats. One of the most important components of the
computer is the dynamic RAM. Overall system performance is critically de-
termined by the amount of DRAM installed in a computer. Dynamic RAMs
are made of silicon chips which are nowadays supplied in the form of memory
modules and are grouped as memory chips mounted on small circuit boards.
They plug into the system board in much the same way as an expansion card.
Two forms of module are in common use:
SIMM (Single Inline Memory Module) has a data path of 32 bits (the
card has 32 data lines).
DIMM (Double Inline Memory Module) has a data path of 64 bits (the
card has 64 data lines).
57
SDRAM: Further Classification.
Single Data Rate SDRAM: With SDR SDRAM, for each data pin,
1 bit of data can be transmitted, for every time the system clock ticks.
This limits the bit rate per pin of SDRAM to the corresponding numerical
value of the clocks frequency.
Double data rate (DDR) SDRAM: It earns its name because it
doubles the transfer rate of ordinary SDRAM; This is achived by double-
pumping the data and transferring a bit per pin on both the rising and
falling edges of the clock signal. This lets the system to obtain twice the
transfer rate at the same FSB clock frequency.
DDR2 SDRAM: The 2 in DDR2 can be thought of as yet another
multiplier of 2 in the SDRAM technology, which uses a lower peak voltage
in order to keep power consumption down (1.8V vs. the 2.5V of DDR).
Still like DDR, double-pumping DDR2, uses both sweeps of the clock
signal for data transfer. Internally, DDR2 further splits each clock pulse
in two which enables the RAM to double the number of operations it
can perform per FSB clock cycle. DDR2 nominally produces four times
the throughput that SDR is capable of producing, through enhancements
in the electrical interface and buffers, as well as through adding off-chip
drivers.
DDR3 SDRAM: This naming convention proved that the 2 in DDR2
was not meant to be a multiplier. Rather it was a revision mark of sorts
for DDR2 was the second version of DDR, and thus DDR3 is the third
version. DDR3 memory type was designed to be twice as fast as the
DDR2 memory but operates with the same system clock speed. Similar
to DDR2, DDR3 is required to lower power consumption to make up for
higher frequencies. In fact, the peak voltage for DDR3 is only 1.5V.
Secondary Memory
58
covered in the next chapter.
Basic Inquiries Before Upgrade. Before you start memory upgrading you
should ask the following questions. The asnwers should govern your decision
to upgrade.
59
iii) How much memory does the computer have now? Does it need to be
replaced?
iv) How much more memory is required? How much memory would be
cost effective. If a computer is only lightly loaded, there is no point in
increasing its memory too much.
Answers to the Basic Inquiries. Question i and ii can be dealt with manual
of the system board. While for the later 2 questions (i.e. iii and iv) we need
to identify the current status of the computer being used. Here we consider
both Windows and Linux operating system to get this information.
In Windows 8 and 10. In window 8 and 10, use the following 2 steps to find
out the RAM status on your computer:
1. Open Task Manager by right-clicking the taskbar, and then clicking Start
Task Manager.
2. Click the Performance tab. The bottom two graphs display how much
memory is being used in megabytes (MB). The percentage of memory
being used is listed at the bottom of the Task Manager window. It is
shown in Figure 4 .12.
In Linux. In Debian Linux family like Ubuntu 14.04 LTS, you need to invoke
the utility called “System Monitor.” It show the performance of your computer
in terms of its processor, memory and network traffic. The middle panel shows
your RAM performance. Figure 4 .13 will appear for this purpose.
Time to Upgrade. Once you have answers to these questions you can start
to add extra memory in your computer. For this purpose, we maintain the
following 8 steps:
Open the case (you may need a screwdriver for this step).
60
Figure 4 .12: Windows Resource Monitor: Shows RAM performance
61
Step 2: Check how many sockets you have for RAM.
Your motherboard has a limit to the number of RAM sticks you can install.
Some motherboards support only two, while others support four, six, or even
more.
Most motherboards have a limit to the amount of memory that they support,
regardless of the number of slots. Consult motherboard manual for further
details.
Most motherboards have 2 or 4 RAM slots. RAM sockets are typically located
near the CPU, though their location may vary depending on the manufacturer
or model. Refer to your motherboards layout diagram in your documentation
if you are having difficulty locating the sockets.
If you are replacing old RAM, remove it by releasing the clamps on each side
of the socket. The RAM will be released from the socket, and you will be able
to lift it straight out of the motherboard with little to no effort.
Carefully remove the Ram from the shielded packaging. Grip it from the sides
to avoid touching the contacts on the bottom or the circuitry on the board.
62
Figure 4 .15: Step 4 of RAM installing: Remove Old One (if upgrading)
Line up the notch in the stick of RAM to the break in the slot. Set the stick
into the slot and then apply equal pressure onto the stick until the clamps on
the side click and lock the RAM in. You may have to apply a fair amount of
pressure, but never force it in.
Make sure matching pairs are inserted into their matching sockets. Most
are labeled on the board or by color, though you may need to refer to your
motherboard layout diagram. Make sure that they are facing the same way.
After the computer is rebooted, right-click on the ”My Computer” icon and
select Properties from the pop-up menu to verify that the computer recognizes
the RAM you’ve just installed.
For Linux users run Details under Settings Option. It shows the total
memory installed in your computer. You should see a similar figure as shown
in Figure 4 .17.
2.3 Exercise
a) SRAM
63
Figure 4 .16: Step 8 of RAM installing: Check new RAM in your OS
Figure 4 .17: Step 8 of RAM installing: Check new RAM in your Linux Machine
b) DRAM
c) Hard Disk
d) ROM
a) 2.5 volts
b) 2.0 volts
c) 1.5 volts
64
d) 1.0 volts
65
UNIT 5
Storage Devices
This unit highlights the working principle of a computer in a very general
point of view. Since there are different types of computers, it also discusses
this issue. Many reader may not have any background on computer technology.
To help them prepare for the course this unit is a foundation work.
Upon completion of this lesson of the Unit you will be able to:
By this time you are familiar with memory technology of a computer. As for
RAM, the main property is that i) it is very fast and ii) they are volatile i.e.
the contents are lost if the computer is turned off. In fact, the most essential
part of a computer is its data. Imagine a situation when you have written
your final year thesis in Microsoft word and just before the final submission
it is no longer available in your working computer. Hence storage devices are
very important components of any computer system.
1.2.1 Magnetic Storage
It is most commonly used storage media because of its availability and price.
The surfaces of these devices are coated with a magnetically sensitive material,
like iron oxide, that reacts to a magnetic field.
When you format a magnetic disk, the disk drive creates a set of concentric
rings, on each side of the disk. These concentric rings are called tracks. The
type of disk governs the number of tracks required. A hard disk may have
several hundred tracks on each side of each platter. Each track is a separate
circle. The tracks are numbered from the outermost circle to the innermost,
starting with 0.
67
Figure 5 .2: Magnetic Storage: Floppy Disk
68
at a specific surface.
Solid state storage devices are unique among today storage devices with no
moving parts and devoid of any disks or tapes. Thus, Solid-state storage
is neither magnetic nor optical. Rather, it utilizes integrated circuits to hold
data. Some solid-state storage devices are nonvolatile, meaning they can retain
their data even when the system’s power is turned off. Others are volatile,
meaning data are lost when the constant supply of electricity is taken off. The
devices volatility depends on the type of memory circuits it uses.
Byte for byte, standard magnetic or optical storage is more cost effective
and reliable than solid-state storage. However, when it comes to the matter of
speed, solid-state storage devices have a big advantage over standard storage
devices. Since Solid-State Memory devices have no moving parts, they can
move data in much less time than any mechanical storage device. Another
advantage of Solid State drive in terms of speed is that it already stores data
electronically which is the way it is used by the CPU. Unlike standard devices,
solid-state devices do not need to move a head or sensor to find data or to
convert it from magnetic or optical form into electronic form.
Flash memory, a special type of memory chip, combines the best features of
RAM and ROM. Like RAM, flash memory can randomly access data when
asked by a user or program. Moreover, flash memory can overwrite any or all
of its contents at any time, just as we can see in a RAM. Additionally, flash
memory is nonvolatile and thus data is not lost even when power is off, which
is essentially a characteristics of a ROM.
69
Figure 5 .6: Flash Drive
1.3 Exercise
3. Which storage device does not have any moving part in it?
a) Floppy Disk
b) CD ROM
c) Solid State Drive
d) Hard Drive
70
Lesson 2: Hard Drive
Upon completion of this lesson of the Unit you will be able to:
When it comes to store data permanently and accessing them quickly, Hard
disk drive (HDD) systems (hard disks or hard drives for short) are used as
one of the most popular options. Although there are instances of external
and removable hard drives, hard disks typically reside inside the computer,
where they are semi-permanently mounted with no external access. HDD can
hold more information than other forms of storage. Hard drives are known as
conventional drives to contrast them from newer and fancier solid-state drives.
HDDs use a magnetic storage medium and thus it has become convention in
today’s world.
Controller
The component that controls the drive to operate and to encode data onto the
platters is known as controller chip. It controls the process of sending signals
from data to the various motors in the drive and receiving signals from the
sensors inside the drive. Most of todays hard disk technologies incorporate the
controller and drive into one assembly. The most common and well-known of
these are PATA and SATA.
71
Hard Disk
This is the physical storage medium where data is stored. The drive systems of
Hard disk store information on small discs which are under 1 inch to 5 inches
in diameter, and called platters which are stacked together and placed in an
enclosure.
This is the translator that converts signals from the controller to signals the
computer can understand. The host adapter is incorporated into the moth-
erboards circuitry which can be found in most modern-day motherboards,
offering headers for drive-cable connection. Legacy host adapters and certain
modern adapters house the hard drive controller circuitry.
72
2.2.2 Basic Construction of a Hard Disk
With every computer the hard disk is sealed to prevent any sort of physical
damage. To describe the basic construction of a hard disk the following list of
terms will be used:
Platters
Read/write heads
Tracks
Sectors
Cylinders
Clusters (allocation units)
Platters, also called surface, lie inside the sealed case of the hard drive,
where the actual data is stored by the read/write heads. Their quantity can
be one or more. Each platter has its own read and write head with each surface
containing a large number of concentric tracks. The heads can move together
along both in and out directions of the radius of the surfaces. If we place
the head in a given position, the corresponding tracks on each surface can be
accessed. This group of tracks is called a cylinder.
The tracks are divided around their length into sectors where inner tracks
are shorter than outer ones which generally have fewer sectors. In other words,
sectors are the magnetic domains representing the smallest units of storage on
the disc platters. Magnetic-drive sectors commonly store only 512 bytes ( 21 KB)
of data each.
73
Figure 5 .8: Hard Drive Components
only the number of tracks on any one writable surface in the assembly, the
number of writable surfaces must be factored into the equation to produce
the total number of tracks in the entire assembly. This is where the number
of heads comes in. There is a single head dedicated to each writable surface,
two per platter. By multiplying the number of cylinders by the number of
heads, you produce the total number of tracks throughout the disk assembly.
By multiplying this product by the number of sectors per track, you discover
the total number of sectors throughout the disk assembly.
Dividing the result by 2 provides the number of kilobytes the hard drive can
store. This works because each sector holds 512 bytes, which is equivalent to
12KB. Each time you divide the result by 1024, you obtain a smaller number
but the unit of measure increases from kilobytes to megabytes, from megabytes
74
to gigabytes, and so on.
cylinders (tracks/surface)
X heads (surfaces/drive)
total tracks (tracks/drive)
X sectors (sectors/track)
total sectors (sectors/drive)
Example: For example, a drive labeled with the maximum allowed CHS ge-
ometry of 16383/16/63, respectively, results in only 7.9GB. Using the equation
and multiplying the number of cylinders by the number of heads, you arrive at
262,128 total tracks on the drive. Multiplying this number by 63, the result is
that there are 16,514,064 total sectors on the drive. Each sector holds 12KB
for a total capacity of 8,257,032KB. Dividing by 1024 to convert to MB and
again by 1024 to convert to GB, the 7.9GB capacity is revealed.
HDD Speeds
The electronics within the HBA and controller get faster and they are capable
of requesting data at higher and higher rates. The platters, spinning at a con-
stant rate, can access information as fast as a given fixed rate. Manufacturers
increase the speed at which the platters spin from one generation of drives to
the next to make information available to the electronics more quickly. Thus,
multiple speeds coexists in the marketplace for an unpredictable period until
demand dies down for one or more speeds.
The following spin rates have been used in the industry for the platters in
conventional magnetic hard disk drives:
5400 rpm
7200 rpm
10,000 rpm
12,000 rpm
15,000 rpm
The higher the RPM, the faster the data can be read from the platters,
which increases overall performance. Hard disks found in today’s personal
75
computer spin around 7200 rmp and 10,000 rmp. Beyond this, it is used by
the servers or workstation systems.
Standard interfaces define the physical and logical means by which a hard
drive is connected to the motherboard.
Basically they are 3 types:
The ATA interface was introduced in 1986 and was the first successful attempt
at standardizing the interface between a motherboard and its hard drives.
During the 1990’s up to the mid-2000’s, virtually every PC manufactured had
an IDE interface to pass information back and forth between the motherboard
and the higher volume storage devices such as hard drives, CDROMs, and
tape drives.
This interface is also referred to as the Integrated Drive Electronics (IDE)
interface. With advent of Serial ATA (will be discussed later) the traditional
ATA is termed as Parallel ATA or simply PATA.
Most of the motherboards that are ATA-equipped will contain one or two
built in 40-pin IDE host adaptors. The image below shows two IDE host
adaptors side-by-side on a motherboard, one labeled IDE1 and other labeled
IDE2. IDE1 is the primary interface. Each interface can handle up to two
devices, so a motherboard with two IDE host adaptors can handle up to four
drives.
IDE standard (or ATA) has a number of enhancements as follows:
IDE (ATA-1): IDE is the original definition where each adapter had
two devices on them, one assigned as a master (device 0) and the other
as a slave (device 1). The devices themselves usually had to have jumper
or some mechanism, to determine which was which. The interface used
76
Figure 5 .9: IDE Adapter in the Motherboard
ATA-5: ATA-5 added auto detection for the cable type and increased
data transfer rates (up to 66.67 Megabytes per second).
IDE Connections: The connection for the IDE interface is a 40-pin connector
on the back of the hard drive. The pins are spaced 0.1" apart and are in two
rows of twenty. The pins are numbered, and typically (but you should verify
this before you connect the drive) pin 1 is located nearest the connector for the
power. The ribbon cable used to connect the hard drive to the motherboard
has a single red wire identifying ”pin 1”. The power connector also has a
red wire. These red wires should be next to each other when connected to a
standard hard drive.
77
Figure 5 .10: IDE Connector Pins
Jumpers: Each IDE interface allows up to two drives on a single cable which
will be needed to be able to configure the drives to make one device as device
0 and the other as device 1. A small plastic clip called a jumper can configure
a device as a primary or secondary drive as an usual approach. A jumper, the
blue block as shown in Figure 5 .11, is used to straddle two pins on a circuit
board to create a ”short circuit” or electrical connection that the hard drive
controller can detect. The jumper with plastic coating on the outside has a
metal strip inside of the plastic which connects the two pins.
Jumper Protocols: Two different protocols can be used for jumpering PATA
devices.
78
to a computer on the same IDE controller, you generally have to assign
one as the primary (master) and one as the secondary (slave).
ii) Cable Select: The second protocol known as cable select is the protocol
where both devices are jumpered as cable select. The position on the
cable dictates which is the master and which is the slave as shown in the
Figure 5 .12. The end device is master while the device on the middle of
the cable is slave. You can use either of these protocols but you cannot
mix them on the same data cable.
Figure 5 .12: Cable Select: Position of Connection select one as Master or Slave
Serial ATA, introduced in 2003, was a replacement for ATA which is now
sometimes referred to as PATA for parallel ATA. The benefits of such technol-
ogy are smaller cabling and faster transfer times. The smaller cabling meant
better air flow unlike ribbon cables which are wide and block air flow inside of
the computer case. Benefits of serial interface include fewer conductors which
resulted in allowing for a smaller cable and more airflow inside the case. Ad-
ditionally, smaller cables means smaller connectors providing more space on
the motherboard and simpler wiring.
As for the faster rates, remember from our description of crosstalk that the
higher the frequency, the worse the transmission of electromagnetic signals.
With fewer conductors running next to each other, crosstalk becomes much
less of an issue.
A brief description of the changes in the SATA interface is presented below.
The original SATA definition allowed for a data transfer rate of 1.5 gi-
gabits per second (Gbit/s). This generation of SATA was not noticeably
faster than the last generation of ATA devices.
The second generation of SATA allows multiple device transactions to
occur simultaneously in addition to increasing the bit rate to 3.0 Gbit/s.
Because of the faster data rate, 3.0 Gbit/s SATA requires a cable that is
capable of supporting the higher rate. (1.5 Gbit/s cables will work, just
not for high demand applications.)
79
Figure 5 .13: SATA Hard Disk Interface
6.0 Gbit/s SATA exists, but for the most part, this data rate far exceeds
that which today’s hard drives are capable of driving.
The initial standardization of the interface was made as SCSI-1 which had
an 8-bit wide data bus and a clock speed of 5 MHz. Two primary evolutions
of the SCSI interface have been present since then, SCSI-2 and SCSI-3. There
are also many sub-variations that defined different speeds and bus widths. The
80
current iteration is the SCSI-3 Ultra 320 which has a 16 bit wide data bus and
a clock speed of 80 MHz. This allows for a transfer rate of 320 Megabytes per
second. In addition, up to 16 devices may be connected to this interface.
SCSI has better support for multiple drives making it a superior interface
for applications such as RAID systems. RAID (Redundant Array of Inde-
pendent Discs) is a system which uses multiple hard drives and make them
appear as one. Different configurations of RAID can be found which are meant
to improve performance and reliability. Aditionally, SCSI can be used as an in-
terface to peripherals like scanners, CD-ROM/RW drives, printers, and other
storage devices. The SCSI interface tends to be more expensive than ATA,
and as such tends to be used for high-performance applications such as servers.
In this section we will explore the steps for installing and configuring Parallel
ATA (PATA) drive. We have already mentioned why the original version of
ATA is now called PATA.
The drive can be mounted in a standard 3.5” device bay in sideways, on end,
or even upside down as long as the mounting screws are used properly. To
support the drive and to prevent vibration and provide additional electrical
grounding, use either the four bottom screws or four of the side mounting
screws.
81
Step 2: Set the Jumper
Now it is the time to select your new hard drive either as master or slave. The
rules have been already discussed in Section 2.2.3. For a new installation of
a hard drive in your computer you need to set it as master. Accordingly you
have to set the jumper. It should look somehow like Figure 5 .16.
Before you install the new drive make sure you unplug the power connector
from the computer.
First open up your computer case. Now you should be able to find an open
3.5” slot somewhere to fit your hard drive.
After the drive is secured by the screws, go ahead and connect the power
and IDE cables. On the edge of one of the cables you will see a line. Normally
it’s red on the grey cables and white on black cables etc there will be some
kind of colored line to indicate pin 1. This pin always goes on the same side
as the power connector. It should look like the Figure 5 .17.
To connect the IDE cable to the motherboard you’ll have to find something
that looks like Figure 5 .18
Once the above steps are done, power on the computer and enter in its BIOS
using the suitable short-cut key (i.e. F1, F2, F12 ) to inspect if the system
82
Figure 5 .17: Install and Configuration of SATA: Step 3
has detected the hard drive correctly. Once you’re in the BIOS you’ll want to
go into standard CMOS where you should see something like Figure 5 .19.
2.2.5 RAID
83
Benefits of RAID:
Classification of RAID
There are a number of RAID levels. Each level ultimately is defined by the
following three ways of RAID storage principles:
i) Striping is the splitting the flow of data into blocks of a certain size
(called ”block size”) then writing of these blocks across the RAID one
by one. No redundant data are stored in stripping.
84
iii) Parity is a storage technique which is utilized striping and checksum
methods. In parity technique, a certain parity function is calculated for
the data blocks. If a drive fails, the missing block are recalculated from
the checksum, providing the RAID fault tolerance. It implies that lost
data can be recovered back from the checksum value.
Based these storage techniques we describe the most popular RAID Con-
figurations in the following way:
Advantage:
– RAID 0 offers great I/O performance, both in read and write opera-
tions. This performance can be enhanced further by using multiple
controllers, ideally one controller per disk. There is no overhead
caused by parity controls.
– All storage is utilized. RAID 0 incurs no additional overhead in
terms of storage.
– It is easy to implement this technology.
Disadvantage:
85
– RAID 0 is not fault-tolerant. If one drive fails, all data in that drive
are lost since it does not provide redundant data storage. It should
not be used for mission-critical systems.
Advantage:
– In case a drive fails, data do not have to be rebuild, they just have
to be copied to the replacement drive.
– It is relatively low cost.
Disadvantage:
86
Figure 5 .21: RAID1: Conceptual Diagram
Advantage:
– Read data transactions are very fast while write data transactions
are somewhat slower since the parity must be computed for each
data block.
– It ensure very high degree of fault-tolerance.
Disadvantage:
2.3 Exercise
1. Which of the system should user a Hard Drive with 15000 rpm?
a) Server System
b) Home PC used for Games
87
Figure 5 .22: RAID5: Conceptual Diagram
c) Netbooks
d) None of them
a) Floppy Disk
b) Hard Disk
c) Solid-State Drive
d) All of them
a. SATA
b. RAM
c. PATA
d. EIDE
a) 1 hard disk
b) 2 hard disks
c) 3 hard disks
d) 5 hard disks
88
a) Stripping
b) Mirroring
c) Parity
d) All of them
89
UNIT 6
Peripheral Devices
When you use your own computer you use a number of components which
are external to the main PC such as mouse, keyboard. These are generally
termed as peripheral devices. These devices add more functionalities to the
computer. Since the devices are external, they must be connected to the
computer through suitable expansion cards.
Upon completion of this lesson of the Unit you will be able to:
91
classified into 4 groups such as:
i) Video
ii) Multimedia
iii) Input Output (I/O)
iv) Communication
A video adapter (also called a graphics adapter) allows the computer to display
information (i.e. text, image and video) on the monitor. It is also termed as
video card. It is responsible for converting the data sent by the processor into
the pixels, addresses and other information needed for display. In some cases,
dedicated chips are used for enhanced display quality.
Although video adapters with PCI (stands for Peripheral Component In-
terconnect) interfaces operate sufficiently, PCIe (PCI Express) offer more re-
sources to the adapter. So, most of the manufacturers today prefer PCIe for
video card attachment. Figure 6 .2 shows an example of a PCIe-based video
card.
The most basic and most widely used multimedia adapter is the sound card
or simply audio card.TV Tuner Card and Video Capture Card are relatively
92
newer types of multimedia adapters. And they are gradually gaining higher
popularity because of deceasing cost and increasing usage of content sharing.
Sound Card: A sound card is an expansion card used for producing sound
on a computer so that it can be heard by the speakers or headphones. Figure
′′
6 .3 shows a typical sound card. A sound card typically has small, round, 81
jacks on the back of it for connecting microphones, headphones, and speakers
as well as other sound equipments.
TV Tuner Cards and Video Capture Cards: The TV tuner card allows
to connect a broadcast signal, such as cable television, to the computer and
display the output on the computer monitor. TV tuner cards are available
both as internal or external. They appear in analog, digital and hybrid va-
rieties. Most of the TV tuner cards are also used as video capture cards. A
video capture card can also be used without a computer (i.e. as a standalone
device) and is often used to store a video stream to the computer for future
manipulation or sharing. These cards often are available in the market with
their own software to aid the processing of such multimedia data stream.
I/O card is a general term often used accommodate a number of I/O devices
to increase the capability of the system. Since they expand the capability of
the computer they are also called I/O expansions. Classical port such as serial
(RS-232) and parallel (such as printer) ports and drive interface connections
are used for I/O expansion.
93
Figure 6 .4: TV Tuner Card
Mouse
Keyboard
Card reader
Biometric devices
Touchscreen
Scanner
Output Devices: An output device is any device used to send data or com-
mand from a computer to another device or user.
Printers
94
Speakers
Display devices
Modem
95
Figure 6 .5: Network Interface Card (NIC)
It has one connector for the expansion bus being used (such as PCI, PCIe)
and the other connector for the telephone line.
Any computer that connects to the Internet using an analog dial-up con-
nection needs a modem. A modem is a device that converts digital signals
from a computer into analog signals that can be transmitted over phone lines
and back again. Figure 6 .6 shows an old ISA modem. It has two RJ-11 ports:
one for telephone line and the other for the telephone set. This is because
a phone can access the same wall jack that the computer connects without
exchanging their cords. Remember, you will not be able to access your phone
while you are using the Internet using the dial-up connection.
1.3 Exercise
a) Processor
b) Mouse
c) Monitor
d) Printer
96
Figure 6 .6: Modem
Upon completion of this lesson of the Unit you will be able to:
97
2.2 Installing and Configuring Adapter Cards
Although most desktop computers are equipped with a wide range of I/O ports
and integrated adapters, it is still often required to install adapter cards to
perform specialized tasks with better performance.
The following sections describe the steps involved in a typical installation
of adapter card.
When both PCI and PCIe slots are available. If your system has
both PCI and PCIe slots available for new hardware it is advisable to
use PCIe because of superior performance of PCIe over PCI.
98
Steps for Installation: The general process of installing an adapter card
involves the following steps:
Step 4. Locate the expansion slot for the device. Notice if any header
cable is attached in the slot cover then it should be removed to another
slot to free this one. Figure 6 .8 illustrates a typical system that has
some available slots.
Step 5. Remove the slot cover corresponding to the slot to be used for
the adapter card.
Step 6. Now unpack the card carefully and hold it by the bracket. An
adapter card has mainly three zones such as:
1. Card Bracket
2. Card Circuit & Chips
3. Card Connector
99
You should hold the card on its Card Bracket part as shown in the Figure
6 .9. Do not touch either Card Circuit & Chips or Card Connector. Now
insert it into the expansion slot. Make sure you push the card connector
firmly into the slot.
Step 7. Secure the card bracket by the set of screw as shown in Figure
6 .10.
Step 10. Connect any cables required for the card. Reconnect the AC
power and restart your computer. After restarting you should provide
the appropriate driver for your newly installed device.
100
2.3 Exercise
2. Which part of an adapter card is safe to hold for installing (i.e. inserting
into the appropriate slot)?
101
UNIT 7
Hardware Troubleshooting
After general conception of the major computer components it is important
to concentrate on the troubleshooting the computer as a whole. Systematic
approach to hardware troubleshooting is very vital for any successful hardware
technician.
Upon completion of this lesson of the Unit you will be able to:
Computer is a very smart and useful device but it may not work as expected
due to many reasons. To solve such problems a hardware troubleshooter should
proceed in systematic way as outlined below:
103
other way of looking the problem. Take a break, have a cup of tea and
relax for sometimes. Then come back again to start it with a fresh mind.
Before we get into specific components, let us find out the common hardware
symptoms and causes.
Any component with its own processor will have a heat sink. It is typically
made of aluminum or other metal and attached to the processor as shown in
Figure 7 .1. Heat sink absorbs heat as much as it can to reduce the processor
temperature. The processor has also a fan attached to it. Generally a processor
temperature should not exceed 50-55 degrees Celsius under heavy load. There
is a thumb-rule for processor temperature: powerful processor produces higher
temperature. Table 2 shows the average temperature for different processors.
If you put your hand at the back of your computer while it is running you
will feel warm air coming out from inside the case. This is due a case fan
which takes hot air from the inside the case and blow it out to reduce overall
104
Figure 7 .2: Case fan for cooling
1.3.2 Noise
There is always noise from the running computer. Some noise are normal
while others are symptom of danger for your computer. The POST beep,
noise from the hard drive and power supply always creates noise. These are
normal noise. Remember that the components that move are likely to generate
noise because of their movement and rotation. If excessive noise come from
any of such components they should be thoroughly examined and tested.
Sometimes, bad smells or smokes come from inside the computer. Although
inside the case the components get heated, but they should never be hot
enough to melt plastic components. Unfortunately it happens very often. On
the other hand, power problem can generate smoke inside the case. When
you smell an odd odor or see smoke you should immediately shutdown the
105
computer and look for the damage inside the case.
Status light indicators attached to the hardware devices help to identify prob-
lems. For instance, when you power on the system, the power light should
appear. If it does not appear, something is wrong with the system. Same
principle applies for external hard drives, printers and wireless routers. Al-
ways apply the first rule of troubleshooting: check the cable connections first.
Apart from power indicators, there are other several types of hardware
devices that have higher number of status indicating LED. These hardware
include network hub, router, switch and so on. Figure 7 .3 shows the LED
layout for Cisco 3800 Series Router. Table 3 describes the meanings of SYS
LEDs that stands for system status of the router. And you will notice here
LED color and style (solid or blinking) are both indicators of different status.
1.4 Exercise
a) Logical thinking
106
b) Do not rely on some assumptions
c) Collecting more information about the problem
d) Problem isolation
Upon completion of this lesson of the Unit you will be able to:
When a system has problems starting, it may display error messages at startup.
107
2.2.1 POST Routines Failure
Beep Code: If the BIOS POST is not successful, the beep code (sound) can
determine the source of the problem. This is a number of beeps from the
computer’s speaker, not from the external speaker of your system. Single beep
indicates successful POST. In case of more beeps, indicating a problem, you
should observe:
Each BIOS has its own beep codes. Table 4 and 5 present the beep codes
for AMI BIOS.
108
Table 4: Beep Codes for AMI BIOS
Beeps Error Meaning
1 short DRAM refresh failure The programmable interrupt timer or pro-
grammable interrupt controller has proba-
bly failed
2 short Memory parity error A memory parity error has occurred in the
first 64K of RAM. The RAM IC is proba-
bly bad
3 short Base 64K memory failure A memory failure has occurred in the first
64K of RAM. The RAM IC is probably bad
4 short System timer failure The system clock/timer IC has failed or
there is a memory error in the first bank of
memory
5 short Processor error The system CPU has failed
6 short Gate A20 failure The keyboard controller IC has failed,
which is not allowing Gate A20 to switch
the processor to protected mode. Replace
the keyboard controller
7 short Virtual mode processor The CPU has generated an exception error
exception error because of a fault in the CPU or mother-
board circuitry
8 short Display memory The system video adapter is missing or de-
read/write error fective
9 short ROM checksum error The contents of the system BIOS ROM
does not match the expected checksum
value. The BIOS ROM is probably defec-
tive and should be replaced
10 short CMOS shutdown register The shutdown for the CMOS has failed
read/write error
109
Table 5: Beep Codes for AMI BIOS (Cont..)
Beeps Error Meaning
11 short DRAM refresh failure The shutdown for the CMOS has failed
1 long, 2 Failure in video system An error was encountered in the video
short BIOS ROM, or a horizontal retrace failure
has been encountered
1 long, 3 Memory test failure A fault has been detected in memory above
short 64KB
1 long, 8 Display test failure The video adapter is either missing or de-
short fective
2 short Hardware Failure One of the hardware tests have failed in
POST
1 long POST has passed all tests Successful Test
POST card: POST process can also be launched from external POST card to
determine a problem during startup. POST card is a circuit board (normally
fits into ISA or PCI slot) that generates numeric codes as the boot process
goes on. Each numeric value corresponds to a specific hardware being checked.
For instance, codes such as 01 and 08 represent processor and RAM testing
namely according to AT&T BIOS POST Codes. Complete list of codes is
beyond the scope of this book. Table 6 presents a number of the most widely
used error codes for AT&T BIOS. The codes are in hexadecimal numbers.
Note that both test and error are indicated by the codes.
When you turn on your computer instead of seeing the Windows Login screen
you might have seen an unexpected blue screen as shown in Figure 7 .5. This
110
Figure 7 .4: POST Card
111
Table 7: STOP error messages
Error No. Error Name Explanation
0xA IRQL_NOT_LESS_OR_EQUAL Check device drivers or services used by
backup or antivirus utilities.
0xD1 DRIVER_IRQL_NOT_LESS_OR_EQUAL Check device drivers or services used by
backup or antivirus utilities.
0x1E KMODE_EXCEPTION_NOT_HANDLED Illegal or unknown instruction; check
the driver referenced in the error mes-
sage.
0x24 NTFS_FILE SYSTEM Test the hard disk for errors.
0x2E DATA_BUS ERROR Test memory modules; disable memory
caching in system BIOS; check hard-
ware configuration.
0x50 PAGE_FAULT_IN_NONPAGED AREA Check printer drivers.
0x7B INACCESSIBLE_BOOT_DEVICE Incorrect or missing hard disk device
driver.
Solution: After an BSOD error occurred, you should record the error
number listed after the STOP message, such as STOP: 0x0000001E. If available
record the name of the error, such as KMODE_EXCEPTION_NOT_HANDLED. Now
you can search the error code and name on the official website of the Microsoft
Support Site (http://support.microsoft.com) for recommended solution.
Table 7 represents a few such STOP error messages.
BIOS performs POST routine to check the different components status. Be-
sides this, BIOS may experience some other issues as depicted below:
112
(like the battery of a watch) on the motherboard to store the settings
when the machine is powered off. When the battery fails BIOS also fails
to preserve its system settings.
Problem: Along with the system settings mentioned above the BIOS
also stores the boot sequence for the system. Boot sequence determines
which is the drive to start up the operating system. The system can
be booted from the First hard drive, the Second hard drive or from CD
ROM. If the computer is attempting to boot from the wrong device, the
boot sequence must be changed appropriately in the BIOS.
Solution: You need to change the boot order from the BIOS. Follow
these simple steps for changing the boot order of your computer:
113
2.3 Exercise
2. Suppose the system clock of your computer is not working and you want
to be sure about the problem. Which of the following is the right indi-
cation for it?
a) 1 short beep
b) 2 short beeps
c) 3 short beeps
d) 4 short beeps
1. The beep (i.e. sound) can determine the source of the problem specially
at the start up of the computer - Explain it with suitable example.
Upon completion of this lesson of the Unit you will be able to:
114
3.1 Troubleshooting Different Components
Motherboard and CPU (processor) are the two essential components of a com-
puter. Failure any of them normally results in a completely dead state of the
machine. Other times, motherboard or CPU failure may completely lock up
or hang the system requiring a hard reboot.
Keep all liquids away from the motherboard, they can cause short cir-
cuits.
Processor: A CPU (also called processor) may fail because of physical dam-
age or short-circuiting. But the most common cause for a CPU malfunction
is improper way to install it. With a PGA- or LGA-style CPU, ensure that
the CPU is oriented correctly in the socket. With an SECC-style CPU, make
sure the CPU is completely inserted into its slot.
Like motherboard processor if physically damaged can not be repaired by
the technicians because of the very advanced and high precision technology
behind the processor manufacturing.
115
3.1.2 Troubleshooting Power Supply
Troubleshooting the power supply basically means isolating the supply as the
cause of problems within a system and, if needed, replacing it with a new one.
It is never recommended that an inexperienced user open a power supply
to make repairs because of the dangerous high voltages present inside. Even
when power supply is unplugged, it can retain hazardous voltage and must be
discharged before any sort of servicing. Internal repairs of power supply are
beyond the scope of this book and are specifically not recommended unless the
technician knows what he/she is doing.
Smoke
116
Group C: Symptoms hard to correlate with the power supply failure.
Apparently the symptoms seem to have very little connection to the power
supply. Only experienced technicians can deal this sort of problems. For
example, a parity check error may indicate power supply problem. Initially
it may seem very strange since the parity check message specifically refers to
memory failure. But the fact is that the power supply powers the memory and
memory with insufficient/faulty power fails.
Solution: If you suspect a power supply problem, some of the simple and
straightforward measurements and the more advanced and sophisticated tests
outlined in this section can help you determine if the power supply is faulty.
Because these measurements might not detect some intermittent failures.
Intermittent failures occurs rarely without any particular pattern or frequency
of occurrence. In this case a spare power supply helps a lot for a long-term
evaluation. If the symptoms and problems disappear when a known good spare
unit is installed, you have found the source of your problem.
Following is a simple flowchart to help you determine common power supply
related problems:
i) Check AC power input. Make sure the cord is firmly fixed in the wall
socket and in the power supply socket. Try a different good and working
cord.
ii) Check DC power connections. Make sure the motherboard and disk drive
power connectors are firmly seated and the contact is good. Check for
loose screws.
iii) Check DC power output. Use a digital multimeter to check for proper
voltages. Replace the power supply if it is below the specified level.
iv) This is the final and most important step of the entire system. Check
the installed peripherals. Remove all boards and drives and retest the
system. If it works, add back in items one at a time until the system fails
again. The last item added before the failure returns is likely defective.
Comparing with other computer problems memory problems are less common
as they have no rotating or moving parts and have fewer points of failure.
For this reason, many RAM problems remain undiagnosed. Normally memory
lasts longer than other computer components.
117
Symptoms of Memory Problem
When you first turn on your computer it runs fine, but over time with
higher loads the overall performance of the computer goes down. The
website takes very longer time to open. Some applications take unusual
amount of time to get launched. This type of slow performance degrada-
tion with memory intensive programs may be caused by a RAM problem.
Computer may randomly restart while you are in the middle of some-
thing. Sometimes it may freeze the entire system (i.e. mouse, key-board
do not work). It may also reboot almost immediately upon opening the
desktop. This could be due to faulty RAM.
A blue screen with white text flashes before restarting the computer.
Blue-screen errors are annoying and hard to trace because you will no
time to read the error message. RAM problem is the main factor of this
situation.
Most frequently accessed files are corrupted due to bad RAM. Situation
can worsen over time.
Attempts to install new applications repeatedly fail for unknown reasons.
You can deduce this fact when you can normally install the same applica-
tion on some other machine with identical configuration. RAM problem
can cause this situation.
i) Hardware-based
ii) Software-based
118
Figure 7 .7: Hardware device for testing RAM
119
Figure 7 .8: RAM Diagnosis: Step 2
Hard drive is another very essential component of a computer where data are
stored permanently. Data include photo, video, document, email and so on.
Most of the components in your computer are electronic devices. They do
not fail with time like a mechanical device such as a car. But the hard drive
120
Figure 7 .10: RAM Diagnosis: Step 3 No Error Found
The adapter (that is, the SATA, IDE, or SCSI interface) is bad.
The disk is bad.
The adapter and disk are connected incorrectly.
The first and last reasons are easy to identify, because in either case the
121
symptom will be obvious: the drive will stop working. You will not be able to
get the computer to communicate with the disk drive.
However, if the problem is a bad disk drive, the symptoms are not very
clear. As long as the POST routines can communicate with the disk drive, they
are usually considered to be good. But the POST routines may not identify
problems related to storing information. Even with good POST diagnosis
result, you may find that you are allowed to save information to a bad disk.
The problem arises when you try to read it back, it gets errors. For the same
reason, the computer may not boot as quickly as expected since it can not
read the boot information successfully each time the computer reboots.
Failure of boot because of any of these reasons means a dead hard drive.
Finally, if the system boots normally but it can not locate the operating
system, the most likely problem with the Master Boot Record (MBR). A
bootable disk can be used to boot the system and repair the MBR with
FDISK (pre-Windows XP), FIXMBR (Windows XP), or BOOTREC
/FIXMBR (Windows Vista and 7).
122
3.1.5 Troubleshooting Video Devices
Followings are some common symptoms and their causes in the context of
video problems:
123
overheat. Although it was more frequent event with CRT displays. But
LCD displays also get overheat in some cases. Take proper precaution so
that the air flow is smooth on the back of the monitor.
Dead pixels or artifacts. These two problems are certainly connected
to monitor. Dead pixels are unwanted spots on a specific area of the
screen. These spots do not fire or light up. It can be tested by setting
the background of the screen as white and observing if those spots are
not still fired up. Artifacts, on the other hand, you will always see the
outlines of a different image no matter what is the background image. In
both cases, the solution is to replace the monitor.
Incorrect colors. This problem occurs when the LCD monitors con-
troller board starts to fail and doe not perform color mapping correctly.
This can also happen if the connector pins are damaged.
Dim or flickering images. This problem is more related to LCD dis-
plays. They are most commonly caused by the backlight starting to fail.
Replacement of the backlight solves the problem.
Other Issues: Other graphics issues are mainly related to memory of the
video card. This memory stores the information of the screens to be displayed
by the monitor. Problems with the memory modules on the video card depends
on how well it works. Occasionally adding more memory to a video card
increases in both quality and performance. Otherwise, you should replace it
with a new one.
3.2 Exercise
124
a) RAM
b) Keyboard
c) Hard drive
d) Mouse
a) RAM
b) Hard drive
c) Power supply
d) CD ROM drive
125
UNIT 8
Operating System Troubleshooting
A computer can run properly in presence of a special software program called
operating system. For instance, probably you are using Windows 7 or Windows
10 in your PC. On the top of an operating system all other programs are
installed. The operating system works like a manager of the computer system.
Upon completion of this lesson of the Unit you will be able to:
Terminology: Before we get too far into our discussion of operating systems,
it is essential to define a few key terms. The following are some terms you will
come across as you study this chapter:
127
Table 8: Version Information of Windows
Operating System Version / Build / Date
Windows Vista 6.0.6000 (08.11.2006)
Windows Vista, Service Pack 2 6.0.6002 (04.02.2008)
Windows Server 2008 6.0.6001 (27.02.2008)
Windows 7, RTM (Release to Manufacturing) 6.1.7600.16385 (22.10.2009)
Windows 10 10.0.11082 (16.12.2015)
subject to purchase.
Shell: A program that runs on top of the operating system (OS) and
allows the user to issue commands. For instance, commands dir and ls
are equivalent for Windows and Linux namely for displaying a list of a
folder’s files and sub-folders.
32-bit & 64-bit: The operating system can be either 32-bit or 64-bit.
As the number of bits increases it ensures two major benefits:
128
– More bits can process larger chunks of data at a time which results
in higher accuracy.
– More bits means system can address a larger number of locations in
physical memory. Addressing larger amount of physical memory is
often needed by computation-intensive applications such as graphics
processing.
Older operating systems (e.g. Windows 95) are 32-bit while new ones
(e.g. Windows 10) are 64-bit.
129
Device Management: Operating system manages device communica-
tion through their respective drivers. The followings are the activities for
device management performed by operating system.
As with any OS installation, we must first plan the installation process. Here
are some of the most important things we should take into consideration when
planning for Windows 7 installation:
130
Select the appropriate version: The very first decision is whether the 32-bit
or 64-bit version of Windows 7 should be installed. As mentioned earlier more
bit means more memory addressing capability, so for machine with higher
amount of RAM (i.e. more than 4GB) is suitable for 64-bit version.
Step 1: Boot from the DVD. When installing on a physical computer insert
your Windows 7 DVD media into your DVD drive and reboot your computer.
If you are asked to press a key to boot from DVD or CD, press any key. For
this purpose, you may need to change the boot sequence from the BIOS.
A black window as shown in Figure 8 .2 will appear while the DVD content
is read. Next, a Starting Windows screen will appear as shown in Figure 8 .3.
131
process. Windows 7 will boot directly into the Graphical User Interface (GUI)
mode.
After a few moments you will see the first prompt like Figure 8 .4
Now click next button and you will see the screen as in Figure 8 .6.
Step 3: License Agreement. After clicking on the Install Now button the
following screen will appear. Mark the checkbox I accept the license terms.
Step 4: Start Installation. Next, unless you are upgrading an existing Win-
dows installation, press the Custom (Advanced) installation type button.
Note that in this case, the Upgrade button is disabled because this specific instal-
lation if performed on a new computer without any previous operating system
on it.
132
Figure 8 .6: Windows Installation Step 3
Step 5: Select the Installation Partition. If the computer has a new hard
disk that has not been formatted before, you will have the option to create a
new partition on it.
The setup process will now begin to copy files from the installation DVD
media to the hard disk. A figure like 8 .9 should appear.
This process may take time depending on the type of hardware your com-
puter uses. The computer will reboot by itself and the you will find the prompt
133
Figure 8 .8: Windows Installation Step 5
to set the user and computer name. By default, the computer name will be
username-PC, where username is the username you have already entered.
134
1.4 Exercise
a) 5
b) 5.5
c) 7
d) 6
135
Lesson 2: Operating System Troubleshooting
Upon completion of this lesson of the Unit you will be able to:
Booting Process: The followings are the sequential steps performed when a
computer starts up:
136
iv) Once BIOS locates the bootsector it loads the image in memory and
execute it. If a valid bootsector is not found, BIOS checks for next drive
in boot sequence until it gets a valid bootsector. In case of failure, it stops
the execution and gives an error message Disk Boot Failure. Bootsectors
load the operating system in memory and execute it.
BSOD: The Blue Screen of Death (BSOD) occurs when Windows fails to
boot properly. At the time of booting various hardware are detected and
loaded. The problem occurs when hardware driver is misconfigured or the
hardware itself is misconfigured.
There are a number of steps that can help to solve this problem such as:
Failure to Boot: In the booting process, Windows requires only a few files
to boot, each of which performs specific tasks. These are discussed next in the
order in which they are loaded:
137
information is then used to create dynamic hardware information in the
Registry.
NTBOOTDD.SYS: On a Windows XP system with a SCSI boot de-
vice, this file is used to detect and load the SCSI interface. For EIDE
systems, this file is not needed.
NTOSKRNL.EXE This is known as kernel image. It is responsible
for various system services such as hardware virtualization, process and
memory management and so on. The corrupted kernel can be replaced
by booting from a startup disk (CD/DVD) and then copy the fresh copy
in the appropriate place where the operating system is installed (i.e nor-
mally it is located at C:\Windows\system32\ directory).
NTBTLOG.TXT This is actually a log file. The log marks each file as
successful (“Loaded driver...”) or unsuccessful (”Did not load driver...”).
Following is the content of such a file:
“Did Not Load Drive” message indicates that Windows could not load
this driver properly at the startup.
Improper Shutdown: Not shutting down properly can result in data loss
from open applications or corrupted operating system files.
It is highly recommended that each time you shut down the computer you
do it in the proper way. And it is important to train specially novice users
about how to shut down the computer properly.
138
Device Fails to Start: When you are using Windows, you are constantly
interacting with a number of different hardware. Each hardware driver must
be loaded to use it properly by the operating system. In addition, the hardware
must be installed and functioning properly.
If the device driver is not installed properly or the hardware is misconfig-
ured, the device will not function properly.
When an updated driver does not function properly, rolling back the driver
installation may solve the problem. To to so, right-click on the device name in
Device Manager and select its Properties. On the Drivers tab, click the Roll
Back Driver button.
Missing DLL: A DLL is a library that contains code and data that can
be used by more than one program in parallel. For example, in Windows
operating systems, the Comdlg32 DLL contains functions related to common
Open Dialog Box. Hence any program can use this DLL to implement an
Open Dialog Box. It enhances code reuse and efficient memory usage.
Most common types of errors you encounter with DLL files is that they
are for some reasons they are missing. And you will see a message like
“... dll file not found”. A straightforward solution is to first search the
missing file in the Internet. An excellent and rich source of DLL files is
http://www.dll-files.com/. You can download the missing file and copy
in your system. Finally restart the system.
Slow System Performance: Over time, the system gets slower for a number
of reasons such as to many drivers installed, lots of background processes,
memory hogs (i.e. most of the memory is used by a specific process) and so
on.
In Windows 7, choose Start =⇒ ControlP anel =⇒ T roubleshooting =⇒
CheckF orP erf ormanceIssues(underSystemAndSecurity). The Performance
Troubleshooter will look for common problems such as more than one anti-
virus programs running, multiple users logged into the same machine and so
on.
If no problems are found, then take the usual steps: uninstall programs that
are rarely used, removing items from startup, defragmenting the hard drive,
and so on. Disk Cleanup can help you free up space by deleting unnecessary
files.
139
Operating System Troubleshooting Tools
This section describes the major tools used to deal with operating system
problems.
Recovery Console: From Recovery Console, you can format drives, stop and
start services, and interact with files. The latter is very important because
many boot/command-line utilities can interact with files stored on FAT or
FAT32 only but not NTFS. The Recovery Console can work with files stored
on all three file systems.
The Recovery Console is not installed on a system by default. To install
it, use the following steps:
140
Table 9: List of Some Recovery Commands
Command Explanation
ATTRIB Check device drivers or services used by backup or
antivirus utilities.
DISABLE Allows you to stop a service/driver.
DISKPART Shows the partitions on the drive, and lets you man-
age them.
ENABLE Allows you to start a service/driver.
FIXBOOT Writes a new boot sector.
FIXMBR Checks and fixes (if possible) the master boot record.
FORMAT Allows you to format media or a partition.
LISTSVC Shows the services/drivers on the system.
LOGON Lets you log on.
Now choose the option Command Prompt. You are now ready to use the
Recovery Console commands.
Some computer manufacturers might customize the menu by adding or re-
moving recovery tools, or including their own tools. Here you see an additional
option of DELL company, the manufacturer of the machine.
Recovery Console Commands: A complete list of commands in recov-
ery console is beyond the scope of this course. Interested readers may explore
them at this website https://support.microsoft.com/en-ie. Here we will
highlight only the most important commands which are very frequently used
for operating system troubleshooting. It is shown in Table 9.
DEFRAG When a file is saved to hard drive, the operating system generally
writes the file into the first available space on the disk. For example, you
first create an Excel spreadsheet and save it. It will be written to available
space in the disk. Now you have create a number of word files and power
point presentations and save them all. Now you re-open your excel file and
populate 20 thousand rows. So, the excel file is now larger. Moving all data
of the excel file in one space on the drive is not possible since there is not
enough continuous free space. Instead the operating system will keep part
of the data in the original location and write the remaining data to another
available space on the hard disk. When a file is in several places on a disk, it
is called a fragmented file. It slows down the overall access time.
Defragmenting a disk involves analyzing the disk for free and occupied
space. Then it collects all fragmented files and folders and place them in a
contiguous space. It increases performance during file retrieval. In Windows
141
there are a few different ways you can get to the Disk Defragmenter:
In Windows 7/Vista, click Start and type defrag into the Start Search
box. Choose Disk Defragmenter from the Programs list.
In Windows, open Computer or My Computer, right-click on a hard
drive, choose Properties, select the Tools tab, and click Defragment Now
(Figure 8 .12.
2.3 Exercise
a NTOSKRNL.EXE
b BOOT.INI
c NTDETECT.COM
d NTBOOTDD.SYS
2. Which system file stores the log information of hardware driver loading?
a NTOSKRNL.EXE
142
b NTBTLOG.TXT
c BOOT.INI
d NTDETECT.COM
a DISKPART
b ENABLE
c FIXBOOT
d FIXMBR
Upon completion of this lesson of the Unit you will be able to:
Basic Terminology
143
Malware:
The term malware is the short form of ”malicious software.” Malware
refers to any computer program that is designed to do things that are
harmful or unexpected or unwanted by a computer’s authorized user.
Virus: A virus is a program that can replicate itself and pass on mali-
cious/harmful code to other nonmalicious programs by modifying them.
The term “virus” has been used because of it behaves like a biological
virus: infecting the healthy computer by attaching itself to the program.
Now this newly infected computer can spread it in the similar way and
the process goes on. The infection usually spreads at a geometric rate,
eventually overtaking an entire computing system and spreading to other
connected systems rapidly.
Worm: A worm is a program that spreads copies of itself using a network
connection. The primary difference between a worm and a virus is that
a worm operates through networks, and a virus can spread through any
medium. Normally virus uses a copied program or data files to spread it.
Spam: While spam is not truly a virus or a hoax, it is one of the most
annoying things. Spam is defined as any unwanted, unsolicited email.
Although in most of the cases it is only annoying but it may open door for
bigger problems. For example, some websites implant virus or worm or
some unwanted program withing their spam mails. If you try to respond
to them it will affect your system.
There are a number of common symptoms you should know for troubleshooting
the security issues.
144
Figure 8 .13: Example of a pop-up
Already we have explored that Recovery Console can be used for troubleshoot-
ing security issues. Apart from it, followings are the general guidelines in this
context since each security problem requires unique treatment.
145
unless there is some major flaws in it. Over time, the operating system
discovers a number of bugs and security holes. To ensure smooth func-
tioning of the operating system the manufacturer often releases general
updates and security updates. Depending upon the type of update it
may take very long time to get completed.
It is strongly recommended that you keep your operating system updated
regularly.
Antivirus Software: To prevent virus-related problems, you can install
one of any number of antivirus programs (such as Norton AntiVirus or
McAfee VirusScan). These programs will periodically scan your com-
puter for viruses and report any suspicious activity that may indicate a
virus. Finally, after a full scanning of the system the antivirus shows a
summary report indicating status of of each detected virus.
3.3 Exercise
a) Malware
b) Virus
c) Worm
d) Spam
1. What is the basic difference between a worm and virus? Prepare a dis-
cussion on the latest five most notorious worm/virus attacks withing the
last decade. Each attack should be mentioned with date,place,attack
mechanism,estimated loss. You should search Internet for this purpose.
146
UNIT 9
Networking and Troubleshooting
Computer and network are now two inseparable entities. This is because the
networking capability offers enormous benefits for the computer users. For in-
stance, you can browse any website from your own computer if it is connected
to the Internet. Because of the ever expanding network size, its inherent com-
plexity and the inter-dependency among various network standards, a major
portion of the computer problems fall in this category.
Upon completion of this lesson of the Unit you will be able to:
A network protocol (or simply protocol) is a set of rules that defines how
network devices communicate. Protocols set the standard for communication
between network devices.
The transmission of data from a computer or its reception in a computer in-
volves a number of entities (hardware and software) and each of which requires
a protocol. The TCP/IP protocol suite is a five layers protocol architecture
defined for the Internet. Figure 9 .1 shows the layers of the TCP/IP protocol
suite.
!!"#$%&#'(
)*%(+!'*&
,(&-*(-&
.-&/'*01,(&-*2%$-
Physical Layer defines the network topology, cabling, encoding for data
into signal etc. Network hardware such as network interface card (NIC),
cables, hubs are associated with the physical layer.
Network Interface Layer(Data Link Layer) handles the framing of
data (known as data frame), error detection and correction, medium ac-
cess control (controls the transmission in a shared medium), etc. This
layer mainly facilitate the transmission of frame between directly con-
nected devices based on their MAC address in a LAN. Example protocols
in this layer are CSMA/CD or CSMA/CA.
148
Internet (Network) Layer interconnects networks (or LANs) to create
an internetwork (or WAN). It facilitates the forwarding of packets from
a computer of one network to a computer of another network. The Inter-
net Protocol (IP) is the most important protocol in this layer. Internet
Protocol uses IP address to identify the connected devices and to forward
data to them. Protocols in this layer are implemented in the operating
system.
Transport Layer provides error-free and in-order data delivery between
applications of two computers. The transmission control protocol (TCP)
provides the above services along with congestion control. Another well-
known protocol in this layer is user datagram protocol (UDP). Both the
protocolsNare implemented in the operating system.
N
Application
N Layer facilitate the applications to access the network.
Well-known
N protocols are FTP, HTTP, DNS, etc.
N
N
1.4 Network Topology and Interconnection
Network topology defines the physical layout of the networking devices. It il-
lustrates the arrangement of the networking devices and their interconnection.
There are various types of network topologies. A network with hybrid
topologies is also possible - the network is built using multiple topologies.
Bus Topology: In a bus topology, a single cable connects all the devices.
The single cable is called the bus and is shared by the devices. At each
end of the bus, a 50-ohm resistor known as the terminator is installed.
Figure 9 .2 shows a network with bus topology.
149
accepts it if it is the ultimate destination or forwards it to the device.
Eventually, the packet reaches the destination.
Hub
1.5 Exercise
1. Which network will you use for connecting computers in your home?
a) MAN
150
are all connected
computer on the
b) WAN
c) LAN
d) All of the above
2. Which layer of TCP protocol suit does the function of error correction?
Upon completion of this lesson of the Unit you will be able to:
151
2.2 Network Media and Connectors
The network media interconnect the network devices according to the network
topology. The signals (data to be transmitted are encoded into signals) are
transmitted through the medium from one network device to another. Differ-
ent types of network media (also known as cables) are used in a LAN, such
as coaxial cable, twisted pair cable, fiber optic cable. Each type of cable uses
a specific connector to connect the cable to a special device known as the
network adapter or network interface card (NIC).
Coaxial cable, also known as coax, was the foundation fo LAN in the 1980ś. It
consists of a central copper core surrounded by an insulator, which is covered
by a braided wire and metal foil. A final layer of insulator covers the braided
wire. Figure 9 .6 shows a coaxial cable and its different layers. Two types of
coaxial cables are available.
Thinnet is a flexible coaxial cable and is used for short distance com-
munications. A British Naval Connector (BNC) is used to connect the
thinnet to the network adapter.
Thicknet is a thicker cable than the thinnet and supports data transfer
over a longer distance. The thinnet cable usually uses a Vampire tap
to connect to a transceiver, which uses a drop-cable to connect to the
adapter unit interface (AUI).
Twisted pair cable consists of color-coded pairs of insulated coper wires. The
cables in a pair are twisted around each other, which helps to reduce the effect
152
Table 10: Characteristics of thinnet and thicknet coaxial cables
of crosstalk. In a twisted pair cable there are usually 4 pairs of cables. Twisted
pair cables are available in two forms.
Unlike coax or twisted pair, both of which use copper, fiber optic cables use
optical fibers, which carry digital signal in the form of light. An optical fiber
consists of a thin cylinder of glass, the core, surrounded by a concentric layer
of glass, the cladding. There are two types of fiber optic cables.
153
Multi-mode Fiber uses multiple rays (frequencies) of light (multi-
modes) to transmit data over a shorter distance.
Fiber optic cables can use many types of connectors. Two major types of
connectors are the straight-tip (ST) and the subscriber(SC) connector.
An UTP cable consists of four pairs of cables. The wiring standards specify
the order in which the pairs are inserted into the RJ-45 connector.
UTP cables can be categorized depending on whether the cable directly in-
terconnects two computers or computers are connected through a hub. Among
the 8 wires of UTP, only four wires are used for sending and receiving data.
Figure 9 .8 shows the necessary four wires according to the pin number of the
connector and their purposes, when the cable is connected to the computer
and hub. When the cable is connected to the computer, wires connected to
pin number 1 and 2 are used for sending data and wires 3 and 6 are used for
receiving data. Whereas if the cable is connected to the hub, wires 3 and 6
are used for sending data and wires 1 and 2 are used receiving data.
154
Computer Hub
Wire Wire
TX 1 1 RX
TX 2 2 RX
RX 3 3 TX
RX 6 6 TX
Computer A Computer B
Wire Wire
TX 1 1 TX
TX 2 2 TX
RX 3 3 RX
RX 6 6 RX
The four pairs of cable in CAT5 have different colors. The pairs are orange,
blue, green and brown. Each pair contains one wire of that color and another
cable with two colors - white and that color. Accordingly, the colors of the
wires are given in Table 11.
The orange pair is used to send data to the hub and the green pair is used to
receive the data from the hub. The following steps can be followed to connect
an RJ-45 connector to a CAT5 cable. For this, a crimping tool (Fig. 9 .11), a
piece of CAT5 cable, and some RJ-45 connectors are required.
1. Cut a little bit of the cable to have a clean-cut end using the wire cutter
(Figure 9 .12)
2. Strip about an inch of hte outer jacket from the cable using the wire-
stripper of the crimping tool. Be sure not to cut any wire.
155
Table 11: Colors of the wires of CAT5 cable
3. Make the cable straight. Order the cable according to the color shown in
Table 12. Place the wires together tightly so that they will enter inside
the RJ-45 connector.
4. Now cut the tips of the wires a bit to make the ends of the wires equal
as shown in Figure 9 .13).
5. Slide the wires into the connector as shown in Figure 9 .14. Make sure
that all wires reach the metal contacts inside the RJ-45 connector.
6. Finally, crimp the wire by inserting the connector into the crimping tool
as shown in Figure 9 .15 and then squeeze the handle tight.
156
Table 12: Colors of the wires of CAT5 cable
2.5 Exercise
a) 100 meters
b) 185 meters
c) 300 meters
d) 500 meters
157
Figure 9 .15: Crimping the wire
a) 100 meters
b) 185 meters
c) 300 meters
d) 500 meters
Upon completion of this lesson of the Unit you will be able to:
158
3.2 Network Devices
Network devices efficiently deliver the data to the correct destination. The
adapter transmits/receives the data to/from the medium and hub, switch,
bridge, and router deliver the data to the correct destination.
The network interface card delivers the data from a computer to the medium
and receives the data from the medium. The functionality of the NIC belongs
to the physical and data link layers. Since the NIC connects the computer to
the network, the type of connector determines the type of cable it can use.
NIC associates a physical address of the communicating device. The ad-
dress is known as MAC (medium access control) address. All communication
within a network use the MAC address.
3.2.2 Repeater
3.2.3 Hub
A hub is a multiport repeater that can connect a device in each port. The
devices can communicate with each other through the hub forming a star
topology. A hub usually have special port to connect the hub to the network
backbone. A hub is a physical layer device. It receive data in one port,
regenerate and amplify the data and then forward the data to all ports. Figure
9 .16 shows a typical hub.
3.2.4 Bridge
A Bridge is a layer 2 device, that is it works in both the physical layer and
the network interface layer. It usually contains at least two ports. A two-port
bridge connects two segments of a network. Each segment can have a number
of computers interconnected by hubs. As a layer 2 device, it can filter packets.
It only forwards a packet from one segment to another if the destination is in
the other segment. Therefore, a bridge can divide the collision domain of a
159
Figure 9 .16: Computers connected by a typical hub
network. Figure 9 .17 shows how a bridge can interconnect different network
segments.
3.2.5 Switch
3.2.6 Router
A router is a layer 3 device and can forward the packet of one network to
another network based on the IP address of the destination. Therefore, a
router can connect two or more network. IP addresses are of 32 bits and have
160
two parts - the network part and the host part. All the computers in a single
network have the same network part in their IP address. Thus, by comparing
the network part of the destination address of a packet with the IP address the
computer, it can understand whether the destination is outside the network or
not. If the destination of the packet is within the same network, then the MAC
address is used to deliver the packet directly. In contrast, if the destination is
outside the network, then the packet is forward to the router and the router
forwards the packet toward the correct destination.
161
give the troubleshooter a clear understanding about the source of the
problem. However, be careful not to recreate a problem that might cause
physical damage of device or data of the network.
5. Verify Physical Connectivity. One of the most straight forward po-
tential flaw in network communications is the physical connectivity of
the network. Physical connectivity might include the cabling between
devices, installation of devices, etc. Physical connectivity problems are
easy to identify and easy to fix.
6. Verify Logical Connectivity. Logical connectivity problems are often
very difficult to isolate and resolve than physical connectivity. A logical
connectivity problem is associated with the software which might include
resource conflict with the NIC configuration, an improperly configured
NIC, network service, network protocol, etc.
7. Consider a Recent Change. Finally consider a recent change of the
system related to the network, which might include introduction of new
equipment, removal of equipment, installment of a new service, address-
ing or protocol changes. Such a change can create problem in the network.
8. Implement a Solution. After finding the problem, a solution can be
implemented.
Perhaps one of the most common problem that a network troubleshooter faces
is the inability of the user to connect to the network or simply unable to
connect or access the network. This problem can be caused by a number
reasons (hardware and software) and situations (user error or changes in the
network infrastructure). The following set of initial information might help
the troubleshooter to identify the problem.
162
5. Whether anyone has worked with any other devices of the computer, for
example the sound card.
If the user answers all the above questions and mentions that someone
actually worked with the sound card while all the other answers do not point
to any problem. For example, the physical connection is perfect. Then the
troubleshooter can guess that a configuration change might have caused the
problem.
3.4 Exercise
a) Bus Topology
b) Ring Topology
c) Mesh Topology
d) Start Topology
a) Repeater
b) Hub
c) Bridge
d) All of the above
a) Hub
b) Bridge
c) Switch
d) Router
163
– Hub
– Bridge
– Router
164
Answer to the Multiple Choice Question
Unit 1
Unit 2
Unit 3
Unit 4
Unit 5
165
Unit 6
Unit 7
Unit 8
Unit 9
166
Further Reading
1. Mark Minasi, Faithe Wempen and Quentin Docter. The Complete PC Upgrade
and Maintenance Guide (16th Edition). Sybex Publication, 2005.
3. Scott Mueller. Upgrading and Repairing PCs (22nd Edition). Que Publishing,
2015.
7. Winn L Rosch. The Winn L. Rosch Hardware Bible, 6th Edition. Que Pub-
lishing, 2003.
167