Summary

This document provides information about laptop hardware, including components like batteries, keyboards, and memory. It also covers topics such as LCD technologies, wireless and Bluetooth, biometrics, and other computer components.

Full Transcript

A+ Six Steps of Methodology. Identify the problem, Establish a theory of probable clause, Test the theory to determine the clause, Establish a plan of action to fix the problem and implement the solution, Verify full system functionality, Document the finding, actions, and outcome. 1.1 Laptop...

A+ Six Steps of Methodology. Identify the problem, Establish a theory of probable clause, Test the theory to determine the clause, Establish a plan of action to fix the problem and implement the solution, Verify full system functionality, Document the finding, actions, and outcome. 1.1 Laptop Hardware Engineered to precise specifications can sometimes be a challenging repair. Some Laptops tend to be easier than others. Many manufactures will give service information. Laptop Batteries Can be easy replaced or some require a teardown. Most Laptop batteries today are Lithium Ion (Li-ion) or Lithium Ion polymer (LiPo). No memory effect for either but each time the battery is charged it loses capacity. Each Laptop has a different form factor. Battery types can vary for each. Laptop Keyboards Easily replaceable. Some repairs require removal or replacement of keys. Very easy to break a key on accident. Laptop Memory / Storage If ever needed to increase memory on laptop would need to use a SO-Dimm. Some laptops are unable to upgrade memory. Older laptops use magnetic disks. Newer laptops use SSDs instead because of the advantages. When needing to replace storage everything is internal for the laptop meaning you would have to open up the back of the laptop. Some can be very easy to access. Wireless and Bluetooth Wireless functions are built into laptop, older laptops include mini pci and mini pci express. Mini PCI and Mini PCE give access to bluetooh and wireless and 802.11 functions for devices that have them built in. Biometrics Biometrics allow you to unlock your laptop with face id or touch id. It requires additional configuration in the operating system for access. Hardware is needed for both options Near Field Communications NFCs allow you to transfer data or authenticate without physically touching said system. Such as paying with Apple pay or using badge to authenticate yourself at a jobRA 1.2 Laptop Displays Many of the laptops we use have a Portable LCD display (Liquid Crystal Display) , where the light shines through the crystals to give an image. The advantages of an LCD are that it is lightweight and uses little power. The disadvantages are that it requires a separate backlight and the lights are difficult to replace. LCD Technologies TN LCD (Twisted Nematic) the original LCD tech Fast response times Low color quality Low viewing angles IPS LCD (In Plane Switching) High color quality Wide viewing angles Slow response times VA(Vertical Alignment) LCD High contrast ratios Moderate color quality Moderate viewing angles OLED Displays Known for high contrast, vibrant colors, and the ability to turn off individual pixels for deeper blacks. Wireless Displays Can connect to peripheral devices, wires wrap around laptop screen Webcams Many laptops have webcams built into them same with a microphone with specialized drivers and software. Backlight Fluorescent vs LED Backlights Fluorescent Lamp , Specifically a CCFL - Cold Cathode - higher voltage and more power needed , More thickness to display , Not a common backlight , Mostly used for older laptops. LED - backlit LCD display Backlight is all LEDs not florescent , LEDs around the edge of the screen , An array of LEDs behind the screen, All newer laptops have an LED Backlight. Digitizer A digitizer is a device or technology that converts analog signals (like touch inputs) into digital data. Inverters Inverters are used to turn DC into AC power. 1.3 USB-C: The most common modern connector, used for charging and data transfer. Reversible design and supports high-speed data and power delivery. Micro-USB: Older standard, commonly used in many devices. Not reversible and slower than USB-C. Lightning: Proprietary connector used by Apple devices for charging and data transfer. 1.4 Cellular Networks Cellular Networks separate land into cells with antennas as they cover cells with certain frequencies. 2G NETWORKS - GSM - Global System for Mobile Communications. CDMA - Code Division Multiple Access. 2G networks however have poor data support when it comes to sending data over the network. GSM The Mobile networking standard for phones. GSM makes up 90% of the market with worldwide coverage. Its used by T-Mobile and AT&T in the US. It allows for all configurations on phone in a sim card. Uses multiplexing allowing everyone to send data. CDMA Everyone can communicate at the same time , each call use a different code, codes are used to filter each call on the receiving end. Used by Verizon and Sprint. 3G Introduced in 1998 , upgraded connectivity over 2G , 3G updates improve speeds. Bandwidth improvement allowed new functionality with GPS and mobile tv. LTE and 4G LTE is a 4G technology and a converged standard. Based on GSM and Edge. Standard supports download rates of 150 mbs LTE - A supports download rates of 300mbs 5G 5G introduced greatly improved speeds up to 10gbs per second in the future. Speeds between 100-900mbs. Bandwidth becomes less of a problem , Larger Data Transfers , Additional Cloud Processing. PRL - Preferred Roaming List Allows your phone to understand where all towers are an connect to the right one GPS Allows for precise navigation , determines location based on longitude latitude and altitude. MDM - This allows for the management of company owned devices. Can set policies on apps , data , etc. MDM can restrict app installation and prevent unauthorized app usage. MAM Dedicated to mobile app management. 2.1 IP - Internet Protocol. Between Server and Client Most popular protocol TCP AND UDP Encapsulated inside IP Two ways to move data , different features for different applications. Operates at the transport Layer or OSI Layer 4 Multiplexing , use different applications at the same time. TCP - Transmission Control Protocol Connection-oriented protocol. Ensures reliable transmission of data. Guarantees delivery and correct order of packets. UDP- User Datagram Protocol Connectionless protocol. Does not guarantee delivery or order of packets. Faster but less reliable than TCP. Lots of Ports IPV4 sockets, Server Ip Address, protocol, server application port number, Client IP Address, protocol, client port number. Non Ephemeral Ports - Permanent port numbers. Ports 0 through 1,023, usually on a server or service. Ephemeral ports - Temporary port numbers Ports through 1,024 - 65,535. Port Numbers TCP and UDP ports can be any number between 0 an 65,535. Most servers use non ephemeral port numbers. Port numbers are for communication not security. Service port numbers should be well known. TCP port numbers arent the same as UDP port numbers. Well known port numbers - client and server need to match. Important for firewall rules, port based security. Primary Port Numbers Port 20: Used for transferring files (data connection). Port 21: Used for sending commands (control connection). Transfers files between client and server. Port 22: Secure Shell Provides secure access to a remote computer. Used for secure logins, file transfers, and executing commands remotely. Port 23: Telnet Allows remote access to a computer over a network. Used for unencrypted command-line interface connections (less secure than SSH). Port 25: Simple Mail Transfer Protocol (SMTP) Used for sending emails from a client to a server or between servers. Primary protocol for email transmission. Port 53: Domain Name System (DNS) Translates domain names (like [www.example.com]into IP addresses. Essential for browsing the internet by resolving URLs to IP addresses. Port 67/68: Dynamic Host Configuration Protocol (DHCP) Port 67: Used by the DHCP server to listen for requests from clients. Port 68: Used by clients to receive IP address assignments from the server. Automatically assigns IP addresses to devices on a network. Port 80: Hypertext Transfer Protocol (HTTP) Used for transmitting web pages on the internet. Main protocol for web traffic (not secure). Port 110: Post Office Protocol 3 (POP3) Used by email clients to retrieve emails from a server. Downloads emails to the client and typically deletes them from the server. Port 137/139: Network Basic Input/Output System (NetBIOS) Port 143: Internet Mail Access Protocol (IMAP) Used by email clients to retrieve and manage emails on a server. Allows multiple devices to access the same email account without downloading (keeps emails on the server). Port 161/162: Simple Network Management Protocol (SNMP) Port 161: Used for sending queries to manage devices on a network. Port 162: Used for receiving trap messages from devices. Monitors and manages network devices (routers, switches). Port 389: Lightweight Directory Access Protocol (LDAP) Used for accessing and managing directory information services. Commonly used for authentication and storing user information in directories. Port 443: Hypertext Transfer Protocol Secure (HTTPS) Secure version of HTTP, used for transmitting web pages securely. -Encrypts data exchanged between the client and server to ensure privacy. Port 445: Server Message Block (SMB) / Common Internet File System (CIFS) Used for file sharing and printer sharing in Windows networks. Facilitates access to shared files and resources over a network. Port 3389: Remote Desktop Protocol (RDP) Allows remote desktop access to Windows computers. Provides a graphical interface to connect to another computer over a network. 2.2 Routers Directs and filters traffic between networks Connects different networks such as home networks to the internet Switches A switch enables connected devices to share information and talk to each other. Switches determine where something should be sent by the DMAC Address. Forwards traffic based on data link address. Switches are the core of an enterprise network. Unmanaged switches Simple, plug-and-play devices. No configuration required, used for small networks. Managed Switches Offer advanced features like VLANs, Quality of Service (QoS), and remote management. Used in larger, more complex networks. Access Point Provides a link between the wireless network and wired network. Makes forwarding decisions based on DMac Address. Patch Panels Centralized point for cable management in networks. Connects network cables to switches or routers. Firewalls Filters traffic based on rules. Can be hardware or software. POE Sends power and data over a single Ethernet cable. 802.3af standard, Up to 15.4W. POE+ 802.3at-2009: Enhanced PoE standard. Power Output: 25.5 watts (DC). POE ++: 802.3bt-2018: Further enhancement of PoE. Power Output: Type 3: Up to 60 watts (DC). Type 4: Up to 100 watts (DC). Hub Provides a central connecting point for multiple media segments on the same subnet. Also known as a multiport repeater Traffic going in one port is repeated to all ports. Outdated and only available on a secondary market. Cable Modem Broadband 4 Mbits/s through 250 Mbits/s Transmission across multiple frequencies over a single wire with different traffic types Data on the cable network DOCSIS(Data Over Cable Service Interface Speculation) High speed Networking, speeds up to 1 gigabit are available. Multiple Services, Data, Voice, Video. DSL Modem ADSL(Asymmetric Digital Subscriber Line) Uses telephone lines Download speed is faster than the upload speed ~10,000 foot limitation from the central office (CO) 52 Mbit/s downstream / 16 Mbit/s Faster speeds may be possible if closer to the CO ONT Optical Network Terminal is used to connect to the fiber network. Fiber to the premises Connect the ISP fiber network to the copper network. Demarcation in the data center, fiber cable connects to box outside location to convert it to copper ISP fiber line stretches to demarc point at which your in-home copper wire takes over. NIC Network Interface Card A device that serves as an interface between the computer and the network. Specific to the network type Can be pinged with localhost, ::1. and 127.0.0.1 SDN Allows devices to be changed to a software based platform that can run on the cloud. Splits the functions into separate logical units. Extends the functionality and management of a single device. Infrastructure Layer / Data Plane Processes the network frames and packets Forwards, trunks, encrypts, etc. Control Layer / Control Plane Manages the actions of the Infrastructure Layer Routing Tables, session tables, NAT tables Dynamic routing protocol updates Application Layer Configures and Manages devices SSH, Browser. 2.3 Wireless standards Wireless networking (802.11) Managed by the IEEE LAN/MAN Standards Committee (IEEE 802) Many updates over time_** Check with IEEE for the latest The Wi-Fi trademark_** Wi-Fi Alliance handles interoperability testing 802.11a Original 802.11 wireless standard founded in October 1999. Operates in the 5 Ghz range, runs at 54 megabits per seconds (Mbit/s) Smaller range than 802.11b, frequency is absorbed by other objects 802.11b Another original 802.11 standard, made October 1999 Operates in the 2.4 Ghz range Operates at 11 megabits per second Better range than 802.11a, less absorption problems. More frequency conflict with other devices. 802.11g Released June 2003 Operates in the 2.4 Ghz range 54 megabits per second Backwards compatible with 802.11b Same frequency conflict as 802.11b 802.11n(Wi-Fi 4) Update to all previous 802.11, released October 2009 Operates at 5ghz and 2.4ghz with more bandwidth 600 megabits per second Max throughput per stream 150 megabits Uses MIMO(multiple input multiple output) Can transfer much more information between the end station and access point 802.11ac(Wi-Fi 5) Released in January 2014 with improvements from 802.11n Operates at 5ghz exclusively, less crowded with 160 bandwidth. Increased channel bonding, more bandwidth usage meaning more data can be transferred Denser signaling modulation, faster data transfers 8 MU-MIMO downlink streams. twice as many as 802.11n up to 7 gigabits per second. 802.11ax (WIFI 6) Upgrade to Wi-Fi 5 Released February 2021. Operates at 5GHz and 2.4 Ghz 20 40 80 and 160 MHz bandwidths 1,201 megabits per second per channel 8 bi directional MU-MIMO Orthogonal Frequency-Division multiple access(OFDMA) Works similar to cellular communication Improves high density installations. Long Range Fixed Wireless Wireless Access point in a house with stock antennas, Range of 40 to 50 meters. Minimal Signal Absorption Focused point to point connection Powerful signal strength but with regulations. RFID (Radio Frequency Identification ) Everywhere in the world Access Badges, Line Tracking, in anything that needs to be tracked. Radar Tech, uses no batteries but signals. Signal is captured by antenna and then converted to power. NFC Two Way Wireless communication Used for payment systems 802.11 Technologies Channels, groups of frequencies numbered by the IEEE. *Bandwidth Amount of frequency in use 20 MHz, 40 MHz, 80 MHz, 160 MHz 802.11a - 20 MHz 802.11b - 22 MHz 802.11g - 20 MHz 802.11n 20 MHz or 40 MHz (two contiguous 20 MHz bonded channels) Bluetooth uses the 2.4Ghz range High speed communication over short distances PAN (Personal Area Network) Unlicensed ISM(Industrial Scientific Medical) Short Range ZigBee Internet of Things, Open Standard - IEEE 802.15.4 PAN Alternative to WiFi and Bluetooth Uses less energy and power than WiFi with longer distances than bluetooth. All devices can communicate through eachother to expand network Uses the ISM Band - 900 Mhz and 2.4GHz frequencies. Z-Wave Proprietary home automation network Internet of Things, Controls lights ,locks, garage doors. Wireless mesh networking same as ZigBee Uses the ISM band as well 900 MHz frequencies in the US. Cellular Networks Mobile Devices (Cell Phones) Separate land into cells of communication. Began with 2G networks like GSM(Global System for Mobile Communications) and CDMA (Code Division Multiple Access) Poor data support 2.4 DNS Domain Name System Converts names to IP addresses Distributed naming system balanced across many servers Usually managed by the ISP or IT department DHCP Dynamic Host Configuration Protocol Automatic IP address configuration. Very common service Usually running on multiple servers to ensure redundancy. File Server Centralized storage device for all files Standard for file management SMB, Server message block is used for Windows AFP, Apple Filing Protocol is used for MacOS Front end hides protocol. Print Server Provides printing services for all network devices May be a software in computer May also be built into printer Uses printing protocols like SMB, IPP, and LPD Mail Server Stores incoming mail, Sends outgoing mail Managed by local IT team or ISP or cloud based service. One of the most important servers. Syslog Standard for message logging with diverse systems Usually a central logging receiver or a SIEM Web server Responds to browser requests Uses standard web browsing protocols like HTTP/HTTPS Pages are built with HTML, HTML5 Web pages are stored on the server Authentication Server Login authentication to resources Centralize management Almost always an enterprise service Usually a set of redundant servers, always available. Spam puts unsolicited messages into spam folder Spam gateways Stops unsolicited mail at gateway before it gets to the user. All in one security Next generation firewall Unified Threat Management (UTM)/Web Security Gateway URL Filter/ t inspection built into device Malware Inspection Spam Filter CSU/DSU Act as router and switch Act as IDS and IPS Load Balancers Distributes the load across multiple servers Web Server Farms Database farm Fault tolerance, server outages have no effects When a server fails it takes it off the load and moves on Proxy Server An intermediate server Client makes request to the proxy, the proxy performs the request, the proxy provides the results. can access control, can perform caching Has URL filtering and content scanning SCADA/ ICS Supervisory Control and Data Acquisition System Manages industrial machines like manufacturing equipment or power generation. Gives real time information and system control Requires extensive segmetation Embedded systems Alarm systems, door security. Dont Have OS IOT devices Appliances like Fridges Smart devices like speakers Air control like thermostats May require a segmented network. 2.5 IP Addressing IPv4 is the primary protocol for everything IPv6 is now apart of all major OS IPv4 addresses 32 bits = 4 bytes of an IPv4 address 4 separate numbers separated with a period Operates at OSI layer 3 Max value is 255 IPv6 addresses 8 groups of 16 bits = 2 bytes = 2 octets 128 bits = 16 bytes of an IPv6 address 128 bit address Addressed in hexadecimal format First 64 bits is the network prefix Last 64 bits is the host network address Networking with IPv4 Every device needs a unique Address Subnet masks are assigned by the network administrator an used by the local device to determine what subnet its on. Default gateway- the ip address of your router that allows communication outside your subnet DNS Servers Translates between names and IP addresses. DHCP Provides automatic address/ ip configuration for almost all devices. DHCP assigns an IP from the first available pool of addresses DHCP Process Discover - find a dhcp server Offer - get an offer Request - lock in the offer Acknowledge DHCP server confirmation APIPA A link local address Any device that has an APIPA it can only communicate within the network Reserved 169.254.0.0 through 169.254.255.255 Automatically Assigned Local device picks a random address. 2.6 DNS There are many DNS Servers that work on a Hierarchy 13 root server clusters that consists of 1000+ servers DNS records The database records of domain name services Over 30 record types IP addresses, certificates, host alias names, etc. These are important configurations Address record (AAAA) (A) Defines the IP address of a host A records are for IPv4 Address AAAA record are for IPv6 Mail exchanger record (MX) Determines the host name for the mail server This is a name not an IP Address Text Records (TXT) Human readable text information Stores text information Public Information Can be used for verification Commonly used for email security Sender Policy Framework (SPF) A list of all servers authorized to send emails from personal domain. Helps prevent spoofing by verifying the sender's IP address. DKIM Digitally sign a domains outgoing mail Validate by mail servers Public key added to text record DMARC Prevents unauthorized email use An extension of SPF and DKIM You decide what servers do with emails that aren't validated Scope properties IP address range,Subnet Mask,Lease durations Subnet pool a range of addresses from which subnets can be allocated DHCP IP address range and excluded addresses subnet mask lease duration all needed for DHCP server DHCP Automatic assignment when the DHCP server keeps a list of past assignments so you'll always get assigned the same IP address DHCP Static The process of assigning IP addresses by manually typing them into client computers. DHCP pools Grouping of IP addresses A scope is a pool of contiguous IP addresses. DHCP Dynamic Assignment Assignment of IP addresses from a pool and addresses are reclaimed after a lease period DHCP address reservation when a device connecting to the network always gets the same reserved IP address based on the devices MAC address Also known as - static DHCP assignment, static DHCP, static assignment, IP reservation. DHCP leases When a device is assigned an address it is only temporary Lease times depend on the administrator DHCP renewal T1 timer Checks in with DHCP server to renew the devices IP address at 50% of the original lease time T2 timer If DHCP server doesn't respond first time, second check at 87.5% of the original lease time LAN A group of devices in the same broadcast domain VLANS keeps subnets on a network separate at the switch, separated logically not necessarily physically like different departments at an office VPNS Allows us to securely send information over a public network encrypted. NAT The process where a network device, usually a firewall, assigns a public address to a computer (or group of computers) inside a private network 2.7 Satellite networking a high-latency service, useful for remote destinations, that connects to the Internet via satellite Non terrestrial communication 50 Mbit/s down 3 Mbit/s up is common High cost relative to terrestrial networking High latency - 250 ms up, 250 ms down High frequencies - 2GHz Fiber High speed data communication using frequencies of light Converged Services Voice Video and Data 1 Gbit internet 1 tera cloud storage 2 terabyte dvr Communication over long distances' Supports high data rates Cable modem a broadband modem that transmits across multiple frequencies different traffic types Data on the "cable" network DOCSIS (Data Over Cable Service Interface Specification) High-speed networking 4 Mbits/s through 250 Mbits/s are common Gigabit speeds are possible Multiple services - data, voice DSL Modem (Digital Subscriber Line) Uses existing telephone lines to provide high speed Download speed is faster than upload speed 200 Mbit/s downstream 20 Mbit/s upstream is common Has a limitation on speed depending how far away it is from the central office Cellular Networks Uses mobile networks to send data Tethering - turns phone into a wireless router WISP (Wireless Internet Service Provider) Mostly found in rural or remote locations Uses Meshed 802.11, 5g, or proprietary wireless Outdoor antenna needed to send an receive data to WISP Speeds can range from 10 to 1000 megabits per second LAN (Local Area Network) Usually a building or a group of buildings near by High speed connection with High Bandwidth Usually Ethernet networks and 802.11 networks WAN (Wide Area Network) One local area network connected to another LAN that is far away Many different WAN technologies Much slower than LAN Can be point to point or MPLS Satellite or Non Terrestrial PAN (Personal Area Network) Own personal network Bluetooth or NFC Common in cars MAN (Metropolitan Area Network) Larger than LAN but smaller than WAN A geographic network that covers a larger geographic area such as a city or community; may be used to connect computers in libraries, government agencies, etc. together - no more than 30 miles in size Common within government SAN (Storage Area Network) Looks and feels like a storage device Very efficient reading and writing Requires alot of bandwidth Often isolated on own network WLAN (Wireless Lan) Uses 802.11 Technologies Often used inside a building or a localized area Can extend coverage with access points 2.8 Cable Crimpers A tool used to attach a terminator or connector to the end of a cable. Different types of crimpers for each cable - Coaxial, twister pair, fiber. WiFi Analyzer Tool for checking/diagnosing issues on a wireless network. Tone Generator associates an analog signal with a specific wire Probing Device Can pick up the tone anywhere along the cable length and at the termination point. Punch down tool Punches a wire into a punch down block Trims the wires during the punch Cable testers a device placed on the ends of a cable to verify the electrical connections of it are present and correctly wired Loopback plugs a cable used to test physical ports for transmission capabilities Network taps Intercepts network traffic 3.1 Cables Fundamental to network communication Make sure to use the right cable Ethernet Uses twisted pairs of copper wire. It may be shielded or unshielded. Each category of cable has specific physical characteristics and a maximum data rate. Ethernet cables have a maximum length of 100 meters. Twisted Pair Copper Cabling Commonly used for ethernet 4 pairs inside cable Transmit+, Transmit- Ethernet cable uses two or four pairs of copper wire. It uses a foil or braided shield to reduce electromagnetic interference. Depending on the type of cable, each twisted pair may be shielded or a single shield covers all twisted pairs. CAT 5 Category 5 wire, a TIA/EIA standard for UTP wiring that can operate at up to 100 Mbps. Uses RJ-45 Connector CAT 5E Category 5e wire; TIA/EIA standard for UTP wiring that can operate at up to 1 Gbps. Uses RJ-45 Connector CAT 6 Category 6 wire; TIA/EIA standard for UTP wiring that can operate at up to 10 Gbps up to 100 meters CAT 6A Can also handle 10Gbps speed, but at longer distances (up to 100 meters) Coaxial Cables Single copper wire cable surrounded by plastic used in wired networks Two or more forms that share a common axis Commonly used on Cable Modem networks and TV/Digital cable with RG-6 Plenum Cable Fire resistant and non-toxic; it must be used when wiring above ceiling tiles. PVC cable cannot be used to wire above ceilings because it is toxic when burned. UTP (Unshielded Twisted Pair) Most home networks use UTP cable, which is most susceptible to interference. STP(Shielded Twisted Pair) Cable consists of twisted wire pairs that are not only individually insulated, but also surrounded by a shielding made of a metallic substance such as foil. Fiber Transmission by light through glass or plastic core. No radio frequencies meaning the data is more secure Has great range better than copper cable Multimode fiber Short Range communication up to 2km 568A The older wiring color scheme Associated with horizontal cabling 568B A wiring color scheme more common than the older 568A USB used for charging and data transfers type of serial connection one of the most common peripheral connectors USB 1.1 Low speed - 1.5 megabits per second, 3 meters Full speed - 12 megabits per second, 5 meters USB 2.0 480 megabits per second, 5 meters USB 3.0 Superspeed 5 gigabits per second, 3 meters Does not specify cable length USB C Used on many different connectors Can send video and data signals 24-pin, double sided connector USB 3.1 maximum speeds of 10 gigabits per second (single lane) superspeed+ was, USB 3.1 Gen 2 now, USB 3.2 Gen 2 Twice the speed of USB 3.0 USB 3.2 Released Sept. 2017 uses USB to provide an extra lane of communication, and double it's bandwidth Also known as USB 3.2 Gen 1 or Superspeed USB 5 Gbps USB 3.2 Gen 1x2 10 Gbps using two "Gen 1" lanes USB 3.2 Gen 2x2 20 Gbps using two "Gen 2" lanes Thunderbolt High speed serial connector Provides data and power on the same cable Thunderbolt v1 Two Channels 10 Gbits per channel 20 Gbits total Mini DisplayPort Connector Thunderbolt v2 20 Gbits aggregated channels Also a Mini Display port connector Thunderbolt v3 40 Gbits aggregated throughput Uses a usb c connector Maximum length of 3 meters with copper 60 meters if optical Serial Console Cables DB-9 - 9-pin connector DB-25 25-pin connector commonly used for RS 232, for serial communication Built for modem communication Modems, printers, mice, and networking VGA DB-15 connector Supports video displays no audio Analog signal Image degrades after 5 to 10 meters HDMI Video and audio stream All digital 20 meter distance before losing signal 19 pin connector Display port Digital information sent in packetized form Carries both audio and video Compatible with HDMI and DVI DVI (Digital Visual Interface) Can send video signals with Signal and dual link Single link, 3.7Gbps(HDTV at 60 fps) Dual Link, 7.4 Gbps (HDTV at 85 fps) DVI - A sends analog signals DVI - D Digital signals DVI - I Integrated Digital and analog in the same connector SATA(Serial AT Attachment) Interface for connecting storage devices like hard disks. One-to-one connections for power and data Single cable supports a single storage device Smaller 7-pin connector for data transfer Larger 15-pin connector for power SATA Revision 1.0 1.5 Gbits 1 meter SATA Revision 2.0 3.0 Gbits/Meter SATA Revision 3.0 6.0 Gbits 1 meter SATA Revision 3.2 16 Gbits/ 1 meter eSATA Matches the SATA version/2 meters Used to connect storage devices externally. SATA on motherboard SATA connectors on motherboard Different colors to designate different versions Colors can vary depending on the motherboard SATA connections go directly from motherboard to storage device Power connections required for each storage drive eSATA Cables External version of SATA Physically similar to internal connector but different layout Requires eSATA cable for connection The SCSI standard parallel and serial connectivity, depending on the format not just for hard drives Set of standards used to connect peripherals to computers. Commonly used for SCSI hard disks and/ or tape drives. Many different formats Fast SCSI, Ultra SCSI, Ultra Wide SCSI, Ultra2 SCSI, Ultra3 SCSI, Ultra-320 SCSI, Ultra-640 SCSI, iSCSI (SCSI over IP) SCSI advantages Not exclusive to hard drives can be used for scanners, tape drives, cd rom devices. Can daisy chain up to 16 on wide bus and 8 on narrow bus Standard drive for virtual systems SCSI ID and logical unit Every SCSI device will have a separate ID number Logical units - method for identifying logical partitions on a SCSI drive SCSI terminator allows you to communicate with multiple devices on a cable at once. Serial Attached SCSI move from parallel to serial point-to-point connection no daisy chains or terminator required, unlike parallel SCSI The PATA standard a standard for connecting hard drives to computer systems speeds from 16 MB/s through 133 MB/s a legacy technology PATA Cabling Ribbon shaped with a motherboard connection on one side. 40 wires or 80 wires. Two drives per cable. First device is called Device 0 and the end device is "Device 1" Swapped when using an 80-pin cable PATA connector the missing pin allows us to properly orient the cable into the connector DVI to HDMI Electrically Compatible No signal conversion required No loss of video quality DVI to VGA DVI-A includes analog signals Backward compatible with VGA Only 640x480 is officially supported May only need an adapter Analog to analog VGA to DVI digital will need a converter USB to Ethernet Some laptops don't have an Ethernet connection Convert USB to Ethernet USB Hub Connects many devices with high speed connectivity RJ11 Connector 6 Position 2 conductor connectors Used for telephones or modems RJ45 Connector 8 Positions, 8 conductor registered jack type 45 commonly used for ethernet F Connector Used on a coaxial cable Mostly used for Cable Modems Punchdown Block Wire to Wire patch panel Molex Connector 4-pin power connector provides +12V and +5V provides power to many devices, particularly storage devices and fans 3.2 RAM Temporary place to store material that works quickly. Erased when computer turns off. Volatile. The little black boxes are the RAM. DIMM Dual inline memory module One side of memory module is different than other 64 bit data width SO-DIMM Half the width of DIMM Used in laptops and mobile devices DRAM The memory on the DIMM Needs constant refreshing or data disappears Any storage location can be accessed directly SDRAM Runs synchronized with the system clock two notches uses 168 pins. DDR3 Twice the data of DDR2 Larger chip capacities Max 16Gb per DIMM No backwards compatibility DDR4 Speed increase over DDR3 Faster frequencies Max 64GB per DIMM No Backwards compatibility DDR5 Fast transfer between module and motherboard 64 GB per DIMM No Backwards combability Virtual Memory Space on a hard disk or other storage device that simulates random access memory. Managed automatically by the operating system. Multi Channel Memory increases throughput by spreading the load across multiple memory modules memory combinations should match Single Channel One memory module with one memory slot/ 64-bit data bus Dual Channel two memory modules with two slots on the motherboard (128-bit data bus) Triple Channel three memory modules with three slots on the motherboard (192 bit data bus) Quad Channel Uses four memory modules and four memory slots (256-bit data bus) Memory that checks itself Used on critical computer systems Uses Parity memory Can Identify errors ECC A type of memory that uses and error detection code to detect and correct internal memory errors 3.3 HDD Non Volatile magnetic storage Rotating Platter Retrieve any data from any part at any time info stays on device even if not powered 15,000 rpm - 2 ms latency 10,000 rpm - 3 ms latency 7,200 rpm - 4.16 ms latency** 5,400 rpm - 5.55 ms latency** HDD Form Factors 3.5 inch commonly found in larger desktops. 2.5 inch commonly found in smaller desktops and laptops. SSD Non volatile memory No moving parts Fast performance 2.5 SATA interface SSD Form Factors 2.5 inch SATA Drive revisons 3 throughput up to 600mbs mSATA (Mini Sata) - made for smaller devices, was replaced by M.2. allows for different form factors NVMe Designed to keep up with SSD speeds to transfer information to the memory on the motherboard. Connected to SSD using and M.2 interface. Faster than SATA. M.2 replaced msata no sata data or power cables can use a pcie bus connection 4bg throughput M.2 isn't always connected using NVMe, the motherboard may only connect using on type of key check documentation. B key - uses PCIe x 2 (uses 2 lanes at max) M key - uses PCIe x 4 (uses 4 lanes at max)** Flash Drives small storage device that uses flash memory and connects to the computer through a USB port, no power needed to retain data. **Has a limited number of writes. Non Volatile memory Optical Drives Not common anymore, small bumps in a disk read by a laser, relatively slow. Most commonly seen as: CD-ROM, DVD-ROM, and Blu-Ray. RAID 0 - Striping Files are split between two or more drives High performance Data written quickly No redundancy RAID 1 - Mirroring File blocks are duplicated between two or more physical drives High redundancy High disk space utilization RAID 5 Data is striped across all of the disks in the array Efficient use of disk space Minimum of 3 drives needed High redundancy RAID 10 Splitting the data between at minimum 4 drives like RAID 0, but like RAID 1 the data is also mirrored onto a different set of drives. 3.4 ATX Standardized in 1995 20 Or 24 Pin connectors +3.3V +5V +12V -12V outputs 5V standby output MicroATX Designed to keep the same benefits of ATX but reduce overall cost. Less I/O slots and smaller motherboard. Still good for games. Backward compatibility ITX Low Power motherboards Fit for small form factors Single purpose computing, streaming media They are commonly used in small-configured computer systems Bus A communication pathway transfers data between components inside a computer, or between computers PCI Created in 1994 32 and 64 bit bus width Common interface on legacy devices Parallel Communication PCIe Replaces PCI Communicates serially Uses x1, x2, x4, x8, x16, x32 full duplex lanes. 4 Pin ATX provides additional power to the CPU provides +12V power Header Simple electrical interface. Connector is attached to the header. Power, lights, keys.. Server Motherboards Multiple socket Supports multiple CPU packages Supports 4 memory modules Includes expansion slots Designed for rack mounted system Desktop Motherboards Can range from full size to compact or monitor only systems Single CPU Two to four memory slots 1 to 2 expansion slots Mobile Motherboards Small and Light Limited in speed, better power and efficiency Thermal Throttling Limited modification Low power consumption System Board Built to fit specific model Replacement isnt easy BIOS Firmware used to start computer Initializes the memory and CPU Stored in flash memory Legacy BIOS OS would talk to hardware through bios instead of directly Limited Hardware support UEFI BIOS Replacement for legacy BIOS. Graphical and text-based. Fast Startup hibernates windows instead of complete shutdown, does not allow for boot into BIOS Disable by: msconfig tool, holding shift on restart, interrupting the boot 3x, or going to settings - update&security - recovery - advanced startup - restart now Boot Options Can disable hardware Modify the boot order USB Permissions Enable / Disable USB Ports through the BIOS USBs are a Security challenge cause of easy they are to steal and how much they hold Fans Configurable in the BIOS, sometimes motherboards have an integrated fan controller that detects temperatures as well. Cools CPU and entire chassis Secure Boot Uses digitals signatures to verify software Supported with Windows and Linux Limits the scope of the malware during boot Password Management System wont start without password Prevents unauthorized users Can add supervisor password to prevent changes to BIOS settings TPM Hardware that helps w/cryptographic functions like keygens and RNGs, usually has a processor attached to it. Has persistent memory Password protected against brute force attacks HSM Used in large environments High end cryptographic hardware Used as a key backup for servers With cryptographic accelerators, offload the CPU which increases throughput OS Technologies 2^32 = 4GB Can't run 64 bit processors 2^64 = 17GB can run 32 bit processors Hardware drivers are specific to the OS version ARM (Advanced RISC Machine) CPU designed by ARM Efficient and fast processing Less power and heat Used for mobile and IoT devices Processor Cores Main processing of CPU. Dual-core, quad-core, multi-core. Each core has own cache or entire chip shares cache. Multithreading Hyper Threading Technology One CPU operates likes two Slight performance improvement OS must be written for HTT Virtualization Support Runs other operating systems within a single hardware platform Hardware is faster and easier to manage Virtualization in software is limited Sound Card Enhances audio output quality. Provides better sound performance compared to integrated motherboard audio. Provides audio input and output capabilities. Video Card Provides high quality signal output for monitors Embedded memory that enhances system performance by offloading tasks. Capture Card Allows video as an input to capture and display video High performance PCI Express connection NIC Ethernet connection Facilitates network connectivity by enabling communication between devices. Supports speeds up to 1Gbps for Ethernet connections. Supports fiber optic connections through ST/SC/MT-RJ connectors. Case Fans Pulls cool air through the computer case to push warm air out There are a bunch of choices that offer different styles, sizes, and volume levels Standard sizes of fans -80mm, 120mm, 200mm Different speeds -Variable Speeds Different noise levels On board fans Designed to cool an adapter card High-end graphics cards generally have this Passive cooling No fans = no noise Common for smaller systems Low power components Heat Sink Get rid of heat through thermal conduction Metals used for this are generally copper or aluminum alloy Thermal Paste Improves thermal conductivity Moves the heat away from the component Thermal Pad Conduct heat without a mess Easy to use, dosent leak or damage other parts Almost as effective as thermal paste Liquid Cooling Coolant is circulated through a computer Used for high end computers like gaming computers and video editing computers Provides overclocking 3.5 Computer Power Supply Converts AC to DC 120V AC or 240V AC to 3.3V DC, 5V DC, and 12V DC Ampere The rate of electron flow past a point of one second Voltage Electrical pressure pushing the electrons Power Measured in Watts - measurement of real power use volts x amps = watts AC Can be sent over very long distances US/Canada: 110 to 120 VAC 60 Hz rate of alternation Europe: 220 to 240 VAC, 50 Hz rate of alternation Use a power supply with a dual-voltage input option as voltage varies by country Dual voltage input allows you to manually switch between 120 and 230 Volts UPS Provides short-term emergency power during a main power source outage Power Supply Output +12V for most modern components +5V for legacy components +3.3V for M.2 slots, RAM slots, and motherboard logic circuits +5V (standby voltage, used when in hibernate mode) -12V for integrated LAN, older serial ports, some PCIe cards -5V for lsa adapter cards (may not always be provided by the power supply) 24 Pin motherboard power These connectors supply power to the motherboard. Newer motherboards typically use 24-pin connectors, while older ones may use 20-pin. Redundant power supplies Used in servers or high-availability systems to provide continuous power even if one power supply fails. Usually two or more power supplies that are internal to the server Each supply can handle 100% of the load Modular power supply Modular power supplies allow users to attach only the cables they need, improving airflow and cable management. Wattage rating Ensure the power supply's wattage is sufficient for the computer's components. Higher-end systems with powerful CPUs and GPUs may require more wattage (e.g., 500W or higher). 3.6 MFD A device that combines two or more devices, such as a printer, scanner, and fax machine. PCL Created by Hewlett-Packard Commonly used within the industry PostScript Created by Adobe Popular with High end devices/printers Make sure the drivers match the printer Wired device sharing USB Type B - most common connector USB Type B used on the printer, Type A on the computer Ethernet - RJ45 connector Wireless Device Sharing Bluetooth - limited range 802.11 Infrastructure mode - Many devices using an access point 802.11 AD Hoc mode - no access point - direct link between devices Printer Share Printer is connected to a computer and the computer shares the printer allowing everyone to print through the computer. Printer Server Software that runs on the printer allowing print directly from the printer. Jobs are queued and managed on printer Duplex Printer prints on booth sides of the page to save paper Not all printers have this option Orientation Portrait vs Landscape printing Tray Settings Printers can have multiple tray Each tray has a different type of paper Quality Resolution Color, Greyscale Color Saving User Authentication Allows you to set rights and permissions Determines what access they have with the printer Badging Authenticate when using the printer with ID badge Audit Logs See who printed and what they printed and what they used. May be built into the printer Secured prints Can create a pin code to protect printing Use the passcode at the printer then it will print Flatbed scanner All in one multifunction device Uses different form factors Sometimes includes an ADF Scans papers and saves them as digital files Scan to email scans are sent to your email Scan to Folder Scans are sent to folder using SMB Scan to cloud Moves scans to google drive or Dropbox 3.7 Laser printer Combines high voltages with powered toner heat and pressure to create output Very high quality with fast printing speeds Very complex process Imaging Drum Image is drawn onto a drum and painted with the laser Transfers toner to paper Can be separate from toner cartridge or combined Fuser Assembly Uses heat and pressure to melt toner and make it part of the page. Transfer belt and roller Transfer the toner from the imaging drum to the paper. Four separate toner cartridges Image is transferred from belt then to the roller Pickup roller Rollers grab a piece of paper from the paper tray to start the printing process. Should be cleaned and replaced periodically Separation pad Pulls just the top sheet from the paper tray Small and inexpensive Duplexing Assembly The duplexing assembly in a laser printer is responsible for printing on both sides of a sheet of paper without requiring the user to manually flip the paper. Laser Printer Process Processing The printer receives the document data from the computer and prepares it for printing. Charging A high-voltage power supply charges the imaging drum with a negative charge using a primary corona wire or roller. Exposing A laser beam is used to create a latent image on the drum by discharging certain parts of it, where toner will stick creating a positive charge Developing The charged toner particles are applied to the exposed areas of the drum, sticking to the areas where the laser has changed the charge. Transferring The toner is transferred from the drum to the paper via a transfer roller or transfer belt. Fusing The fuser assembly heats and presses the toner into the paper, ensuring it is permanently fused. Cleaning After printing, the printer cleans the drum and removes any excess toner to prepare for the next print cycle. Laser Printer Maintenance Toner Cartridge Replacing the toner cartridge is one of the most frequent maintenance tasks. When the toner is low, print quality starts to degrade, and faint or incomplete prints may appear. Maintenance Kit Laser printer manufacturers offer maintenance kits containing parts that need replacement after a certain number of pages printed (e.g., 100,000 pages). These kits typically include: Fuser Unit -Rollers - Separation Pads Calibration Calibration adjusts the alignment of the printer's internal components to ensure sharp and accurate prints. Can be automatic or manual Cleaning Use water or IPA Dont use harsh chemicals Outside use damp cloth Inside - clean rollers with IPA Dont use vacuum or compressed air Inkjet Printer Relatively Inexpensive Quiet compared to others Provide color and high resolution Expensive ink and only sold by printer manufacturer Clogs easily Ink Cartridges These hold liquid ink, typically in separate cartridges for black and color (cyan, magenta, yellow). Places Ink onto pages Print Head Some printers integrate the print head into the ink cartridge Others separate them Feed Rollers Pull paper from the tray and feed it into the printer Duplexing Allows for automatic double sided printing by flipping the paper inside the printer Carriage and Belt The carriage holds the print head and moves it back and forth across the paper, driven by a belt. As it moves it puts small drops of ink to create output Calibration Calibration corrects the position of the print head relative to the paper. Calibration ensures that the nozzles on the print head spray ink with the right precision and at the correct intervals Inkjet Printer Maintenance Print Heads Inkjet printers can suffer from clogged nozzles due to dried ink, leading to poor or uneven printing results. Most inkjet printers have a built-in cleaning utility that can be accessed through the printer’s control panel or software on your computer. Cartridges If anyone of the color runs out you have to replace the entire cartridge Takes a few seconds and a few minutes to calibrate Jams Turn off your printer and open your printer and clear the jam. Thermal Printers Feeds specially coded white paper into printer Heats certain parts and any part that is heated turns black Uses no ink or toner only heat Very quiet Paper is sensitive Feed Assembly Moves paper through printer Heating Element Uses heat to create images or text on special thermal paper. Thermal Paper Paper covered with chemical Changes color when heated Used on cash registers Thermal Printer Maintenance Thermal Paper Inexpensive but has to be the exact paper and dimensions Heating Element Use a thermal printer cleaning pen or isopropyl alcohol on a soft cloth to clean the heating element periodically Removing Debris Paper dust or small particles can accumulate inside the printer. Use compressed air or a soft brush to remove any debris from the feed assembly and paper path. Heat sensitivity Store paper in a cool, dry place to prevent premature darkening or fading. Over time, printed thermal paper may fade, so it's not ideal for long-term records. Impact Printers Uses a matrix of pins (9-pin, 24-pin) in the print head to strike the ribbon and form characters on paper. Low cost per page Good for multiple/carbon copies Loud with poor graphics Printer Head Contains pins or hammers that physically strike the ribbon against the paper. Pins are arranged in a grid (e.g., 9-pin or 24-pin). Ribbon A cloth ribbon soaked in ink, placed between the print head and paper. Ribbon presses into the page leaving output Easy to replace Tractor Feed Continuous paper feed Ensures precise alignment and feeding for consistent printing Impact Printer Maintenance Ribbon Ribbons wear out over time, producing lighter text. Replace the ribbon regularly to maintain dark, clear prints. Ensure proper tension when installing new ribbons to avoid poor print quality. Print Head Over time, pins may wear out or break, requiring the replacement of the print head or repair of individual pins Paper Paper must feed perfectly Forms must be positioned correctly Paper must feed without constraint 3D printers Print in 3 dimensions Additive manufacturing Build in layers to create object Rapid prototyping Filament FDM - The material used to create 3D objects, typically made of plastic such as PLA (Polylactic Acid), ABS (Acrylonitrile Butadiene Styrene), or others like nylon. Good all around printer - easy to manage filament - fewer disposal issues Resin Printing A container that holds the liquid resin used for printing. Has a transparent bottom (usually made of a material like FEP film) to allow the UV light or laser to cure the resin layer by layer. Resin must be handled properly Print Bed The print bed (or build platform) is the surface where the object is created in a resin printer. The bed is designed to provide a surface for the resin to adhere to as it cures. 4.1 Cloud Computing Practice of using a network of remote servers hosted on the internet More than just a server hosted somewhere Create and tear down as you need Can be deployed anywhere in the world Private Cloud a cloud that is owned and operated by an organization for its own benefit, controlled environment Public Cloud Resources avail to everyone over the Internet Hybrid Cloud A combination of public and private clouds Community Cloud Allows cloud services to be shared by several organizations Share resources and costs IaaS sometimes called hardware as a service (HaaS) allows you to outsource your equipment you are still responsible for management and security your data is still out there, but more within your control web server providers SaaS provider hosts applications Central Management of Data an Applications no local installs, access over internet ex: google mail, outlook web, payroll third party maintains apps and data security PaaS Someone provides you with a platform to build your own application. Allows developers to create, test, and run their solutions on a cloud platform without having to purchase or configure the underlying hardware or software Cloud Characteristics

Use Quizgecko on...
Browser
Browser