Getting Started With Computer Repair - Peter Paskowsky
Getting Started With Computer Repair - Peter Paskowsky
Repair
Microprocessors come in many shapes and sizes, and are used for one
purpose or another. Sometimes you need the fastest processor available, for
example when playing demanding video games or doing scientific
calculations. Other times performance is less of a factor but power
consumption is of utmost importance, for example in your smart phone or
tablet. One type of processor is unable to fulfill all of these criteria, so there
are many types of processors used for different purposes.
You may be familiar with Intel and AMD microprocessors. These are found
in most common desktop and laptop systems you are probably familiar with.
Both of these microprocessors are members of one type of instruction set
architecture (ISA), namely x86. An ISA defines how a microprocessor
works internally and computer programs are written for it. This is much like
the "language" the processor speaks. Processors from Intel and AMD
"speak" the same language, but there are many other ISAs and thus
microprocessor "languages"
Another common ISA you are probably familiar with - even if you don't
know it yet - is called ARM. ARM processors are incredibly common, found
in low power portable devices, such as your smart phone or tablet. Odds are
your phone has an ARM processor inside it right now, playing your music,
rendering your web pages, and sending your text messages. ARM processors
are designed to be very power efficient, so while they are much less
powerful than a typical x86 processor found in a desktop computer, they can
run on a small battery for hours or even days at a time.
Figure 1 - The Apple A6, an ARM processor found in the iPhone 5
The amazing thing is while we are all so familiar with desktop and laptop
processors, these make up only a tiny fraction of the microprocessors
shipped today. For every one desktop and laptop processor made by Intel
and AMD, there are ninety nine (99!) processors of other ISAs used in
everything from tablets to microwave ovens! Of course the processors made
by Intel and AMD are much quicker, expensive, and flashy but even your
dish washer needs a processor these days!
Below is a table which lists some common ISAs and their uses.
Table 1 - Instruction Set Architectures
The x86 Architecture is the most common in typical laptop and desktop
computers. x86 was designed by Intel corporation, and while they own the
rights to the ISA they license it to two other vendors, Advanced Micro
Devices (AMD), and the relatively small VIA Technologies. Below is a table
listing the x86 processor vendors, their market share, and their common
uses.
Table 2 - x86 Processor Vendors
Fabrication
Clock Data
Name Date Transistors Technology MIPS
speed width
(Micrometers)
2
8080 1974 6,000 6 8 bits 0.64
MHz
16
5 bits
8088 1979 29,000 3 0.33
MHz 8-bit
bus
6 16
80286 1982 134,000 1.5 1
MHz bits
16 32
80386 1985 275,000 1.5 5
MHz bits
25 32
80486 1989 1,200,000 1 20
MHz bits
Pentium 1993 3,100,000 0.8 60 32 100
MHz bits
64-bit
bus
32
Pentium 233 bits
1997 7,500,000 0.35 ~300
II MHz 64-bit
bus
32
Pentium 450 bits
1999 9,500,000 0.25 ~510
III MHz 64-bit
bus
32
1.5 bits
Pentium 4 2000 42,000,000 0.18 ~1,700
GHz 64-bit
bus
32
Pentium 4 3.6 bits
2004 125,000,000 0.09 ~7,000
"Prescott" GHz 64-bit
bus
Random Access Memory (RAM) stores programs which are being executed,
as well as data used by these programs. For example, when you are using
Microsoft Word or Internet Explorer on your computer, these programs are
being held in RAM.
There are many different types of memory you may find in a computer. They
all have cryptic names which are long acronyms. Here are some of the types
listed in order from oldest to newest: EDO, SDRAM, RDRAM or
“RAMBUS”, DDR , DDR 2, and DDR 3.
These types of memory differ in the physical package (number of pins used),
speed, capacity, voltage, etc. Speed and capacity have generally increased
from generation to generation, voltage requirements typically decreased, and
each generation has required different slots and thus different motherboards
which could support them.
Reading memory speeds can be very confusing. Speeds ratings are listed
with values like “PC 100” or “PC 2 5300”; normally the higher the number
the higher the performance. The actual clock speed the memory runs at can
be calculated from this number using a different formula based on the type
of memory.
For example, for SDRAM a rating may look like this: PC 100. PC 100
translates into clock speed pretty easily, like this: 100 * 1 = 100MHz. But
things get more complicated for modern memory types. For DDR 2 a rating
may looks like this: PC 2 5300. This is more difficult to decipher, to find the
clock speed first divide by eight, so 5300 / 8 = 667 Mhz. Now, because it is
DDR memory (double data rate) you must divide this number by two 667 / 2
= 333 MHz. Are you confused yet? Don't worry about it too much, because
typically higher numbers mean higher frequencies and higher performance.
There are several types of memory in a computer, and they are arranged
in a hierarchy ranging from fastest but smallest to slowest but largest.
They are also arranged from most expensive to least expensive.
Figure 4 - Memory Hierarchy
Main memory or RAM is the next layer and is where the majority of
running applications and data used by them are stored.
Virtual memory is the last layer of memory and it is the process of using
other storage mediums (flash memory, hard drives, solid sate drives) as
computer memory. This is by far the slowest form of memory, but it can
be very large (and cheap).
There are two types of disk drives available today: mechanical hard disk
drives (HDDs) and solid state drives (SSDs). Conventional mechanical
drives which feature a rotating magnetic disc and magnetic heads to store
data. Solid state drives utilize flash memory for storing data. In general,
SSDs are much faster but offer less storage capacity for much more money.
SSDs are a much newer technology.
Figure 5: Dissembled Hard Disk Drive (left) and Solid State Drive (Right)
Table 7 - HDD vs. SSD
There are two main interface types for hard drives, IDE and SATA. IDE uses
a ribbon cable with 40 or 80 wires and can support up to two devices per
channel. The two devices on a channel are called Master and Slave. You may
only have one master and one slave per channel. IDE devices can be
configured master or slave using jumper caps located on the back of the
drive. SATA uses a seven wire cable and only supports one device per
channel. In general, most new computers use SATA which allows for higher
transfer speeds than IDE.
Figure 7 - IDE Master / Slave configuration
Note: 80 wire IDE cables should be used for Hard disk drives, as they allow
for higher transfer speeds. Save 40 wire cables for low speed devices such as
optical drives.
There are several other interfaces such as SCSI and Fibre Channel which are
usually used in servers. SCSI and Fibre Channel can both connect multiple
devices per channel, and allow easy configuration of many hard drives as
well as data preservation methods.
Optical drives are used to read optical media, such as CDs, DVDs, and Blu-
Ray Discs. These types of discs are often used to store music, videos, and
computer software.
Optical drives function by reflecting light off the disk which has different
reflectivity, one representing zero and the other representing one. Optical
drives use light in the visual spectrum (ROYGBIV), the newer standards use
smaller wavelengths and thus can fit more data per disk.
In general there are two types of drives, disc readers and disc readers/writers.
Disc readers can only read data on discs, they cannot create new discs.
However, disc readers/writers can both read and write to blank media.
A CD read only drive is known as a CD-ROM drive and a CD read/write
drive is known as a CD-RW drive. This naming convention is also true for
DVD and BD drives as well.
Newer drives are backwards compatible with older medium types, but older
drives are not compatible with newer media types. For example, a CD-RW
drive can read/write CDs but not DVDs or Blu Ray Discs. Conversely a BD-
RW drive can read/write CDs, DVDs, and Blu Ray Discs.
Capacity Uses
CDs (compact disc) 700 MB Music, Data
DVDs (digital video disc) 4.7 – 9 GB Video, Music, Data
BDs (blu ray discs) 25 – 50 GB Video, Data
1.5 Motherboards
Although many computers use the ATX form factor, you will likely run
across many systems with non standard form factors. These form factors are
not compatible with ATX which can make switching out motherboards
difficult, requiring a motherboard of the same non standard form factor,
which will most likely be very difficult to find.
A power supply unit (PSU) converts alternating current from the wall (220
or 110 Volts) into the direct current used by digital electronics, such as a
computer. Computers use many voltage levels, commonly 3.3 V, 5 V, and 12
V, -5 V, and -12 V DC.
Figure 12 - A Power Supply Unit (PSU) with the Case Removed
There have been several types of power supplies used over the history of
computing. Early computers used AT power supplies, which provide direct
power. With these early power supplies the power button was the only
source for turning on or off the computer. When you “shut down” the PC,
the power supply would still be running until you pressed a button on the
power supply to turn it off.
This problem was later addressed through the introduction of ATX power
supplies, which allow for soft power. When you touched the power button on
the motherboard of an ATX power supply, the motherboard would send a
signal to power on the machine. This allowed software to control the power
supply. Now when you “shut down” the machine, the motherboard sends a
signal to the PSU to power off. No need to press any buttons.
Aside from the main power connector, you can also find:
4 pin Molex connectors for connecting IDE hard drives and optical
drives
4 pin SATA connectors for connecting SATA hard drives and optical
drives
6 or 8 pin PCI-E connectors used for powering high end graphics cards
Floppy connectors used for connecting floppy drives (now obsolete)
There are four main types of expansion slots you will commonly see. The
oldest is ISA, which is used for computers mostly below the Pentium 3 era.
Next is PCI, which has been used for a very long time and is still common
even on new motherboards. AGP connectors were used for graphics cards
until superseded by PCI express. The newest standard is PCI Express, which
can be found in all modern computers. PCI Express comes in 1x, 4x, and 8x,
and 16x slots. The higher the number the more data lanes are available, the
higher the bandwidth, and the larger physical connector is needed. Most
graphics cards use 8x or 16x slots, and most other add in cards use 1x or 4x
slots.
Table 9 - Expansion Slots
Slot Description
Type
ISA General connectivity, 16 bit interface, now obsolete
PCI General connectivity, 32 bit interface, very common even in
new computers, many devices available
AGP Special purpose slot for graphics cards, superseded by PCI
Express
PCI General connectivity, serial interface, found in all new PCs,
Express many devices available, comes in 3 physical connectors 1x, 4x,
and 8x
LAPTOP DESKTOP
ISA (obsolete)
PCMCIA PCI
EXPRESS CARDS (2 types) PCI EXPRESS (3 slots)
34 and 54 1x, 4x and 8x (increases in speed)
Networking cards come in two main types, wired (Ethernet) and wireless
(802.11). Network adapters are rated by their transfer speeds in bits per
second. For example Fast Ethernet operates at 100 Mbps (megabits per
second, 1 megabit = 106 bits = 1000000 bits).
Wired Ethernet cards come in three speeds, which are backwards compatible
with older standards, 10 Mbps, 100 Mbps, and 1000 Mbps. Wireless cards
(technically referred to as 802.11 after the IEEE standard which defines
them) come in four main speeds: 802.11a, 802.11b, 802.11g, 802.11n, and
802.11ac. Their top speeds are 54 Mbps, 11 Mbps, 54 Mbps, 150 Mbps, and
1Gbps respectfully.
Higher speeds are backwards compatible with older standards, however all
equipment operates at the speed of the lowest common denominator. To use
for example 1 Gbps Ethernet, you need a 1 Gbps switch and 1 Gbps ethernet
card, while using 802.11n requires a 802.11n access point and a 802.11n
wireless adapter. Below is a table summarizing the different wireless
protocols.
Wired Wireless
Ethernet 802.11
10 Mbps, 802.11a 54Mbps same Hz as phones
100Mbps and 5GHz
1000Mbps or 1Gbps
802.11b 11Mbps
802.11g 54Mbps 2.4GHz
802.11n 150Mbps
Cheap but less Not as reliable and slower but more flexible
flexible
There are three main vendors for graphics cards, Intel, NVIDIA, and AMD.
Intel only supplies integrated graphics cards, and because most computers
use Intel processors, most computers also use Intel integrated graphics.
AMD and NVIDIA supply both integrated and discrete cards, and are
focused on high performance cards for gaming and photo/video editing.
There are 5 main graphics connector types. The oldest is VGA, a 15 pin
connector used on most CRT (cathode ray tube, big and bulky) monitors.
The replacement for VGA is DVI, a digital connector used for LCD
monitors. SVideo is a connector used specifically to connect a graphics card
to an analog television. HDMI is a newer connector which is compatible
with DVI and used to connect to digital TVs. The newest connector type is
called display port, which hopes to standardize connectors across PC
monitors and televisions.
Table 12 - Graphics Connectors
The main idea here is to find and separate the part causing the problem, so
that you can verify were the problem lies and correct it.
General advice
The BIOS (Basic Input/Output System) is used for configuring basic options
on your computer, such as boot order, power options, and enabling/disabling
onboard components. Many problems can be solved through making
changes in the BIOS or by resetting the BIOS to its factory defaults.
Problem 1 – Computer does not start (no lights, fans are not moving)
If the machine does not seem to respond at all when pushing the power
button, there is most often a problem with the power coming to the
computer. This can manifest itself in many ways, it could be as simple as a
power outage, an unplugged power cord, an incorrect setting on the power
supply, a broken power button, or as serious as a broken power supply or
motherboard.
First check to see if all the connections on the power supply are firmly
connected to the motherboard and other components. A simple loose cable
could cause your computer not to boot.
If you don’t have other known parts to work with you can still try to assess
the problem by testing the power supply directly. To test the power supply
separate from the computer, you must first disconnect the power supply from
all other devices (motherboard, optical drives, hard drives, etc).
Note: This is a dangerous procedure and listed for educational value only.
This can break your PSU or could hurt you. Perform this at your own risk.
Next, connecting the green wire and any black wire on a standard ATX
power supply will cause it to turn on. Note that you can break non standard
supplies using this method! This process can be done with a paper clip rather
easily. Make sure to unplug the power before connecting black and green.
Afterwards connect power and see if the fan spins. If the fan spins the power
supply is likely functional, although not always. You can use a multimeter to
measure the voltage outputs of the pins which should give you a good idea if
the PSU is functioning correctly.
If you have not found a problem with the power supply at this point, then it
is unfortunately most likely a problem with the motherboard.
Figure 20 - Testing an ATX power supply
Although even without the manual you can troubleshoot this problem. It is
most likely a problem with the CPU, memory, or graphics card. First
disconnect all parts besides the CPU, memory, and graphics card. If the
problem persists, check that the CPU, memory, and graphics card are well
connected. Next, try swapping out the memory graphics card, and CPU with
known working components, one at a time. If one of the replacements works
then you have found the problem. Remember to always power off the
computer before changing hardware components!
If changing out the components does not work, it is often a problem with the
motherboard.
If the computer is rebooting often, there can be three culprits – poor cooling,
low voltage, or bad memory.
Memtest86 can be run on any computer from the CDROM drive. Simply
place the disc in the drive while the computer is booting and the application
will run automatically. It will report if there are memory errors. These could
be solved as simply as reseating your memory or they could be caused by
defective memory chips. If the chips have errors, they should be sent back to
the manufacturer for replacement if still under warranty or else tossed out.
This problem is often caused simply because of poor connections. Make sure
all connections are well attached, including the IDE/SATA cables, power
cables, memory modules, etc.
If your computer seems to be booting fine but you are seeing problems with
your monitor there could be many problems.
Most likely it is simply a problem with the connection between the video
card and the monitor. Try firmly connecting the cables. If this does not solve
the problem, it could be caused by the monitor itself. Check the
brightness/contrast settings through the menu on the monitor.
If the monitor is a CRT model and the image is fuzzy, it is often just a
problem caused by age. There is no solution to this problem aside from
getting a new monitor.
If the monitor sometimes turns black, or shows strange moving dots or lines,
it could be a problem with the graphics card. Try another graphics card you
know is working to see if the problem is caused by the GPU.
Summary
In summary, here is a list of some common hardware problems and their
solutions:
Today there are three main operating systems in use on desktop computers:
Microsoft Windows, Apple Macintosh Operating System (Mac OS), and
GNU/Linux. The most commonly used is Microsoft Windows by a large
margin, followed by Mac OS, and then by Linux. Windows has about 90%
of the PC OS market share, followed by apple at around 9% and about 1%
for Linux. Other Operating systems such as UNIX and BSD are designed for
and often run on servers.
For the most part, an application written for one operating system cannot be
executed on another. Therefore a windows application (such as Winzip)
cannot be installed on Linux or Mac OS. Some applications are cross
platform, meaning they can be run on several of these operating systems,
although you do need the correct installer for your operating system. This is
the case for most common internet browsers (such as firefox, chrome, and
opera) and some audio/video players (such as VLC and Mplayer).
Different Operating Systems also use different file systems (the method of
storing data on a hard disk) so data stored by one operating system is often
unreadable by another operating system. It is as if different operating
systems use different "languages" to speak to the hard drive. However,
certain third party software can allow interoperability between different file
systems acting as "interpreters". Modern Windows versions use NTFS,
modern Mac OS versions use HFS+, and modern Linux versions use Ext 4.
Windows 3.1 came with a graphical user interface (GUI) like we are
accustomed to today. Windows 3.1 was based on DOS but with added
graphical features. Windows 95 and 98 and Windows ME (millennium
edition) followed Windows 3.1 with the same software base but with
improvements to usability and performance.
Windows is known for its near domination of the industry, everywhere one
goes you see Microsoft Windows. And because of this widespread use
Microsoft Windows has excellent hardware support and many applications
have been written for it.
The Apple Macintosh Operating System (Mac OS) is designed by Apple Inc.
Mac OS can only be run on specific Apple branded hardware. That is to say
that a machine which was not built by Apple cannot run Mac OS.
Figure 24 - Mac OS X
Apple Inc. has used several computer architectures over the years, each
switch eliminated software compatibility with older software, although
emulation was used to provide some software compatibility at reduced
performance. Early Macs such as the Apple II used a Motorola based
microprocessor, second generation Macs, such as Power Macs, used IBM
Power PC processors, and current third generation Macs use Intel x86
processors which are the same as the processors found in most PCs.
OS X is known for its ease of use and intuitive interface. For example it
utilizes intuitive features such as hand gestures to improve the user
experience and it uses a streamlined system for application installation,
where an installation file is simply dragged into the application folder to
install it. It has less software compatibility than Windows but also is more
protected from viruses by its design and because of its smaller market share.
Unlike Windows or Mac OS, there is not one provider of Linux. Instead
there are many different organizations which create different “distributions”
of Linux. All of these distributions can run the same applications.
Differences between these distributions can range from package
management systems (how to install applications) to different graphical user
interfaces. Popular distributions include Ubuntu, Fedora, SUSE, and Debian.
They can all be downloaded and installed for free, so if you are interested
please give Linux a try.
Linux is also known for its stability and security. Because of its design, it is
less prone to viruses, and because of its small market share very few viruses
are written for Linux. Linux is also often used for servers, such as web
servers, because of its stability, security, and adaptability. Linux machines
are known for their ability to run for years without requiring rebooting, a
feature very important on enterprise servers.
3.4 Advantages and Disadvantages of Operating Systems
Installations for different operating systems vary, although they have many
common features. It is necessary to choose the location for the OS to be
installed, and to partition (divide) the hard drive accordingly. This can be
done automatically by the installer, which often results in using the entire
disk in one partition. Following this method you would destroy any existing
data on the hard drive.
A more advanced method of installing an operating system involves using
two disk partitions. When using this method, you create two logical drives
on your one physical hard drive. That is to say you can have a C: and a D:
drive on the same physical hard drive by allocating a certain amount of
space to one and the remainder to another.
By using one partition solely for the operating system, data can safely be
stored on the other. If the operating system becomes corrupt, one can
reinstall the OS only, destroying data on the first partition while keeping all
data intact on the second partition.
3.5.1 Installing multiple operating systems
More than one operating system can be installed on a computer; however
only one operating system may be running at the same time. To install
multiple operating systems at least two partitions must be created on the
disk, one for each OS. As stated before, Mac OS can only run on Apple
branded computers, so unless the computer is an Apple Mac, you are limited
to Windows and Linux.
This method can be used to install Windows and Linux together, multiple
Windows versions, or multiple Linux distributions.
The order of installation is important, as it can avoid problems with the boot
loader. The boot loader is a piece of software that selects which operating
system will be loaded. When installing multiple Windows operating systems
they should be installed in order of oldest to newest. This is because newer
versions of Windows can recognize older versions and update the boot
loader accordingly, but older ones cannot.
When installing both Windows and Linux, its best to install Windows first.
This is because Windows cannot recognize Linux partitions, whereas Linux
will find any Microsoft operating systems and update the boot loader
accordingly. Windows does not recognize Linux partitions by default, so
more work is required to edit the Windows boot loader to recognize Linux
partitions.
To dual boot, simply install the operating systems to different partitions. It is
important to partition your hard drive accordingly when installing the first
OS (leaving space for the second OS), so that it will not be necessary to
repartition the disk after installing the first time.
Below is an image of the GRUB boot loader, used by many Linux
distributions. You can see options to boot Ubuntu (a Linux distribution), or
Windows XP.
Figure 27 - A boot loader with multiple OS selections
Antivirus software should always be the first thing installed after the
operating system and then kept up to date using automatic updates.
There are many free antivirus programs, such as AVG, Avira, Avast,
Clamwin, Comodo, Microsoft Security Essentials, and more. You can also
purchase commercial products such as Norton 360 and McAffe Total
Protection which may suit your needs.
All of these products have various strengths and weaknesses and you should
try multiple to see which one works best for you. For example, Microsoft
Security Essentials is installed by default on Windows 8 and you may like its
easy integration with Windows. On the other hand, maybe you like the free
and open source nature of Clamwin. Or perhaps you have a free trial of
McAffe and want to give it a try.
For extra protection a specialized tool such as Malware Bytes (a malware
detection program) should be used. Scans with this software should be run
regularly to ensure that the system is virus and malware free.
Antivirus and Antimalware should be used in conjunction with one another.
Antimalware is not a replacement for antivirus, but an addition to it.
4.4.2 - System Cleanup Software
Disk Cleanup is used to remove old unused files from a computer. This can
free up hard drive space for other uses and increase performance.
Note: When using System Cleanup you are permanently deleting
information on your hard drive. Make sure you don't delete something you
need!
Windows comes with basic cleanup program that can be accessed by going
to Start Menu Accessories System Tools Disk Cleanup.
Once you have opened Disk Cleanup, select the files you would like to
delete and press OK to free up the hard drive space.
You can also use the services tab to disable startup services. To do this, click
on the services tab and choose “hide all Microsoft services.” Disabling
Microsoft services could render the machine unusable. The services that
remain can be disabled one by one, or one can press the disable all button
and choose the services which will remain.
Figure 32 - MSCONFIG Services
Using ad blocking software can give you cleaner web pages and lower
bandwidth usage on your computer, but remember that many web sites
depend on ad revenue for funding. You should decide what amount of ad
blocking is right for you.
4.4.7 – Advanced performance options
Windows performance can be fine-tuned using the advanced performance
options found in the control panel. To access advanced performance options,
first open system properties. To do this, enter the control panel and double
click on the system icon. This will show the system properties box. To
change the performance options, click on the tab named advanced.
Here is where performance settings can be altered. The first tab called visual
effects allows choosing between best appearance and best performance. If
the machine is slow and unresponsive, adjusting for best performance can
help improve performance.
Figure 34 - System Properties (left) Performance Options (right)
The advanced tab allows for changing the size of the page file. To change
these settings, click on the advanced tab and then choose the change… box
under virtual memory.
Normally this should not be altered unless you have a computer with very
little memory (less than 512 MB), where altering this setting could increase
performance.
A star network is by far the most common today. It is very rare to see other
types of networks outside of obsolete hardware or enterprise environments.
A star network functions by having each machine connect to one centralized
point on the network. This centralized point can be a hub or a switch.
Modern Ethernet networks are based on star topologies. The cost of this
network is low and a break in a cable will only compromise one machine.
However, there is one centralized point of failure. If the hub/switch is
compromised, the entire network will cease to function.
In a ring network, each computer is connected to its two neighbors, forming
a circle with all the machines. Because each computer is connected to the
next, a fault (break) anywhere in the cable will usually cause the entire
network to fail. However some ring networks are able to detect faults and
continue working by passing information in the opposite direction.
A bus network simply uses one backbone cable to connect all machines
together. This means that the communication medium is shared, because all
the machines have only one wire on which to communicate. This can cause
many problems when many computers want to use the network at the same
time. When many computers attempt to transmit at the same time, collisions
can occur which prevents that data from being read. If the bus cable is
compromised in a bus network the entire network will fail. In old Ethernet
networks the two ends of the Bus cable require terminators installed.
Without these on the two ends the network will not function.
A mesh network is formed when each computer in the network has a direct
connection to each other computer. This allows for great speed of
communication between the machines, but also requires much more
hardware. This is the most expensive type of network, but for machines
which will be communicating regularly (such as servers) it is the fastest and
the most fault tolerant.
Table 15 - Network Topology Comparison
802.11 wireless networks are used where portability is needed. For example,
education inspectors who go in to the office or out into the field would
benefit from a wireless network. When the inspectors are in the field, they
can bring their work laptops to take notes. When they return to the office,
they can use the wireless network to work and share files. This way the same
computer can be used for tasks in the office and in the field, without having
to worry about wires.
Wireless networks can have problems with reception due to environmental
obstacles (walls, doors, rain, etc.) and other electronic devices (wireless
phones, microwaves). These problems can cause wireless networks to
sometimes not function as reliably as wired networks. Even in the best case
scenario wireless networks are slower than their wired counterparts. The cost
is often higher as well, as laptops are more expensive than desktops and
most desktops do not come with wireless cards installed by default.
Therefore both a wireless card and wireless access point are needed.
802.11a 802.11b 802.11g 802.11n
Bandwidth 54 11 54 150
Mbps Mbps Mbps Mbps
Frequency 5 GHz 2.4 GHz
Figure 40 - Common 802.11 Wireless Standards
The connectors used on Ethernet cables are called RJ-45 connectors. These
are normally clear plastic, have 8 pins, and small tab of plastic on top for
snapping into an Ethernet card. For shielded cables, the connectors are made
of metal to allow for electrical grounding.
Figure 41 - Ethernet Cable with RJ-45 Connectors
There are two main types of Ethernet cables, straight through cables and
crossover cables. straight through, also known as patch cables, are used for
connecting a machine to a switch or hub. Crossover cables are used to
connect two computers or switches together directly. Straight through cables
are generally used unless you are directly connecting two devices together.
Standard Ethernet cables have orange, green, blue, and brown wires. Half of
these are striped with white leaving you with orange/white, orange,
green/white, green, blue/white, blue, brown/white brown, and brown wires.
To create a normal straight through or crossover cable, the colored wires are
arranged in the order shown in the images below.
Figure 42 - Ethernet Cable Wiring
To make your own Ethernet cable, you need a crimping tool like the one
showed below. This tool helps you strip category 5 cable, and firmly attaches
the RJ-45 connector to the cable once the wires have been arranged
correctly.
To connect many computers to the internet only one public internet address
is needed for the internet connection. All other machines can use private IP
addresses to conserve the total number of IP addresses available. One public
IP address can be shared to many computers by using NAT (network
address translation) and is done commonly in most home/office routers.
To access the shared files from another computer, simply open an explorer
window and choose network. Here you will see the names of all the
machines on the network. Choose the computer you wish to connect to, and
double click. Here you will find a listing of all the files and folders shared to
the user. You can copy these files to your computer or even execute these
files over the network if need be.
There are some caveats with Windows file sharing. For example, older
versions of windows may have trouble connecting to newer versions, such as
a Windows XP machine attempting to connect to a Windows 7 shared folder.
Often, the permissions just need to be tweaked to allow access from these
systems.
5.9 – Internet sharing
Sometimes you do not have access to a router but need to share your internet
connection to multiple computers. For example when you are using your
tethered mobile phone to access the internet the go and you want many
computers to be able to access it.
To share a network connection in windows, open network connections from
the control panel. Right click on the connection to be shared and choose
properties and select the sharing tab. To share the connection, select “allow
other computers to connect through this computers internet connection.” The
local interface also needs to be selected, normally the Ethernet or 802.11
adapter in the computer. This will share the internet connection from your
phone to your 802.11 or Ethernet connection.
To connect to the internet with other machines, simply connect all the
computers to the local network. The other machines should be assigned an IP
address automatically (because your computer is now acting as a DHCP
server) and they will use your computer as their default route to the internet.
OceanofPDF.com