IDP00504 -Chp1 (Introduction to PC and Mobile Computer).pdf

Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

Full Transcript

Chapter 1: Introduction to Personal Computer Hardware IT Essentials 7.0 Chapter 1 - Sections & Objectives ▪ 1.1 Personal Computers Explain how to keep personal computer components safe. Explain components in a computer. Explain electrical and ESD safety. ▪ 1.2 PC C...

Chapter 1: Introduction to Personal Computer Hardware IT Essentials 7.0 Chapter 1 - Sections & Objectives ▪ 1.1 Personal Computers Explain how to keep personal computer components safe. Explain components in a computer. Explain electrical and ESD safety. ▪ 1.2 PC Components Explain the features and functions of computer components. Describe cases and power supplies. Describe motherboards. Describe CPUs. Explain types of memory. Describe adapter cards and expansion slots. Describe hard disk drives and SSDs. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2 Chapter 1 - Sections & Objectives (Cont.) ▪ 1.2 PC Components (Cont.) Describe optical storage devices. Describe ports, cables and adapters. Describe input devices. Describe output devices. ▪ 1.3 Characteristics of laptops and other mobile devices Describe the features of mobile devices. Describe the features of laptop components. Compare the types of laptop displays. ▪ 1.4 Other Mobile Device Hardware Overview Describe common mobile device hardware. Describe the hardware components of specialty mobile devices. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3 Chapter 1 - Sections & Objectives (Cont.) ▪ 1.5 Network Connectivity and Email Explain how to configure wireless and cellular data settings. Explain how to pair Bluetooth devices. Explain how to configure email settings. Explain how to synchronize data. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4 1.1 Personal Computer © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5 Personal Computers Electrical Safety ▪ Electrical devices have certain power requirements. ▪ AC adapters are manufactured for specific laptops. Exchanging AC adapters with a different type of laptop or device may cause damage to both the AC adapter and the laptop. ▪ Some printer parts, such as power supplies, contain high voltage. Check the printer manual for the location of high-voltage components. Follow electrical safety guidelines to prevent electrical fires, injuries, and fatalities. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6 Electrical and ESD Safety ESD ▪ Electrostatic discharge (ESD) can occur when there is a buildup of an electric charge that exists on a surface which comes into contact with another differently charged surface. ▪ ESD can cause damage to computer equipment if not discharged properly. ▪ At least 3,000 volts of static electricity must build up before a person can feel ESD. Follow these recommendations to help prevent ESD damage: ▪ Keep all components in antistatic bags until you are ready to install them. ▪ Use grounded mats on workbenches. ▪ Use grounded floor mats in work areas. ▪ Use antistatic wrist straps when working inside computers. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7 1.2 PC Components © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8 PC Components Cases ▪ The case houses the internal components such as the power supply, motherboard, central processing unit (CPU), memory, disk drives, and assorted adapter cards. ▪ The term form factor refers to the physical design and look of a case. Common desktop computers are available in form factors including: Horizontal case Full-Size Tower Many case manufacturers may have their own naming Compact Tower conventions, including super tower, full tower, mid All-in-one tower, mini tower, cube case, and more. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9 PC Components Power Supplies ▪ Computers use a power supply to convert AC power into a lower voltage DC power required by internal components. ▪ Desktop computer power supply form factors include: Advanced Technology (AT) – original power supply for legacy computer systems AT Extended (ATX) – updated version of the AT ATX12V – the most common power supply on the market today EPS12V – originally designed for network servers but is now commonly used in high-end desktop models. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10 PC Components Connectors ▪ A power supply includes several different connectors. They are used to power various internal components such as the motherboard and disk drives. ▪ Some examples are: 20-pin or 24-pin slotted connector SATA keyed connector Molex keyed connector Berg keyed connector 4-pin to 8-pin auxiliary power connector 6/8-pin PCIe power connector © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11 PC Components Power Supply Voltage ▪ The different connectors in a power supply also provide different voltages. ▪ The most common voltages supplied are 3.3 volts, 5 volts, and 12 volts. ▪ The 3.3 volt and 5 volt supplies are typically used by digital circuits, while the 12 volt supply is used to run motors in disk drives and fans. ▪ Power supplies can also be single rail, dual rail, or multi rail. ▪ A rail is the printed circuit board (PCB) inside the power supply to which the external cables are connected. A computer can tolerate slight fluctuations in power, but a significant deviation can cause the power supply to fail. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12 PC Components Motherboards ▪ The motherboard is the backbone of the computer. ▪ It is a printed circuit board (PCB) that contains buses, or electrical pathways, that interconnect electronic components. ▪ These components may be soldered directly to the motherboard, or added using sockets, expansion slots, and ports. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13 PC Components Motherboard Components ▪ Major components on a motherboard include: Central Processing Unit (CPU) Random Access Memory (RAM) Expansion slots Chipset Basic input/output system (BIOS) chip and Unified Extensible Firmware Interface (UEFI) chip SATA connectors Internal USB connector © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14 PC Components Motherboard Form Factors ▪ The form factor of motherboards pertains to the size and shape of the board. ▪ There are three common motherboard form factors: Advanced Technology eXtended (ATX), Micro-ATX, and ITX. The choice of motherboard form factor determines how individual components attach to it, the type of power supply required, and the shape of the computer case. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15 PC Components What is CPU? ▪ The central processing unit (CPU) is responsible for interpreting and executing commands. ▪ The CPU is a small microchip that resides within a CPU package. ▪ The CPU socket is the connection between the motherboard and the processor. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16 PC Components Cooling Systems ▪ Computer components perform better when kept cool. ▪ Computers are kept cool using active and passive cooling solutions. ▪ Active solutions require power while passive solutions do not. ▪ Passive solutions for cooling usually involve reducing the speed at which a component is operating or adding heat sinks to computer chips. ▪ A case fan is considered as active cooling. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17 PC Components Types of Memory ▪ A computer might use different types of memory chips. ▪ All memory chips store data in the form of bytes. A byte is a block of eight bits stored as either 0 or 1 in the memory chip. ▪ Read-Only Memory (ROM) – such as ROM chip. ▪ Random Access Memory (RAM) is the temporary working storage for data and programs that are being accessed by the CPU. RAM is volatile memory. ▪ Adding more RAM in a computer enhances the system performance. However, the maximum amount of RAM that can be installed is limited by the motherboard. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18 PC Components Types of ROM ▪ Types of Read-only Memory (ROM) include: ROM chips. PROM chips. EPROM chips EEPROM chips. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19 PC Components Types of RAM ▪ Types of Random Access Memory (RAM) include: Dynamic RAM (DRAM) Static RAM (SRAM) Synchronous Dynamic RAM (SDRAM) Double Data Rate Synchronous Dynamic RAM (DDR SDRAM) DDR2 Synchronous Dynamic RAM (DDR2 SDRAM) DDR3 Synchronous Dynamic RAM (DDR3 SDRAM) DDR4 Synchronous Dynamic RAM (DDR4 SDRAM) GDDR Synchronous Dynamic RAM (GDDR SDRAM) © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20 PC Components Memory Modules ▪ Memory chips are soldered to a circuit board to create a memory module which is placed into a memory slot on the motherboard. ▪ Different types of memory modules include: DIP, SIMM, DIMM memory, and SODIMM. ▪ The speed of memory has a direct impact on how much data a processor can process in a given period of time. ▪ The fastest memory is typically static RAM (SRAM) which is used as cache memory © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21 PC Components Adapter Cards ▪ Adapter cards increase the functionality of a computer by adding controllers for specific devices or by replacing malfunctioning ports. ▪ Common adapter cards include: Sound adapter Network Interface Card (NIC) Wireless NIC Video adapter or display adapter Capture card TV tuner card Universal Serial Bus (USB) controller card eSATA card © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22 PC Components Adapter Cards (Cont.) ▪ Computers have expansion slots on the motherboard to install adapter cards. ▪ The type of adapter card connector must match the expansion slot. ▪ Common expansion slots include: Peripheral Component Interconnect (PCI) Mini-PCI PCI eXtended (PCI-X) PCI Express (PCIe) Riser card Accelerated Graphics Port (AGP) © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23 PC Components Types of Storage Devices ▪ Data drives provide non-volatile storage of data. ▪ Some drives have fixed media, and other drives have removable media. ▪ Data storage devices can be classified according to the media on which the data is stored: Magnetic – like hard disk drive and tape drive Solid state – like solid state drive Optical – like CD and DVD © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24 PC Components Magnetic Media Storage ▪ This type of storage represents binary values as magnetized or non-magnetized physical areas of magnetic media. ▪ Common types of magnetic media storage drives: Hard Disk Drive (HDD) – the traditional magnetic disk devices with storage capacity ranging from gigabytes (GBs) to terabytes (TBs). Tape Drive – most often used for archiving data. Tape drives use a magnetic read/write head and removable tape cartridge. Common tape storage capacities vary between a few GBs to many TBs. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25 PC Components Semiconductor Storage ▪ Solid-state drives (SSD) store data as electrical charges in semiconductor flash memory. This makes SSDs much faster than magnetic HDDs. ▪ SSDs have no moving parts, make no noise, are more energy efficient, and produce less heat than HDDs. ▪ SSDs come in three form factors: Disc drive form factor – similar to an HDD Expansion cards – plugs directly into the motherboard and mounts in the computer case like other expansion cards mSata or M.2 modules – these packages may use a special socket. M.2 is a standard for computer expansion cards. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26 PC Components Types of Optical Storage Devices ▪ Optical drives are removable media storage devices that use lasers to read and write data on optical media. ▪ They were developed to overcome the storage capacity limitations of removable magnetic media such as floppy discs. ▪ There are three types of optical drives: Compact Disc (CD) - audio and data Digital Versatile Disc (DVD) - digital video and data Blu-ray Disc (BD) - HD digital video and data © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27 PC Components Video Ports and Cables ▪ A video port connects a monitor to a computer using a cable. ▪ Video ports and monitor cables transfer analog signals, digital signals, or both. ▪ Video ports and cables include: Digital Visual Interface (DVI) DisplayPort High-Definition Multimedia Interface (HDMI) Thunderbolt 1 or 2 Thunderbolt 3 Video Graphics Array (VGA) Radio Corporation of America (RCA) © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28 PC Components Other Ports and Cables ▪ Input/output (I/O) ports on a computer connect peripheral devices, such as printers, scanners, and portable drives. ▪ A computer may have other ports: Personal System 2 (PS/2) Audio and game port Network Serial AT Attachment (SATA) Integrated Drive Electronics (IDE) The Universal Serial Bus (USB) © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29 PC Components Adapters and Converters ▪ There are many connection standards in use today. These components are called adapters and converters: Converter – performing the same function as an adapter but also translates the signals from one technology to the other. Adapter – physically connecting one technology to another ▪ Example of adapters include: DVI to VGA Adapter USB to Ethernet adapter USB to PS/2 adapter DVI to HDMI adapter Molex to SATA adapter HDMI to VGA converter © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30 PC Components The Original Input Devices ▪ Input devices all the user to communicate with a computer. ▪ Some of the first input devices include: Keyboard and Mouse – these are the two most commonly used input devices ADF / Flatbed Scanner – these devices digitize an image or document Joystick and Gamepad – these devices are used for playing games KVM Switch – a hardware device that can be used to control more than one computer while using a single keyboard, monitor, and mouse © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31 PC Components New Input Devices ▪ Some new input devices include touch screen, stylus, magnetic strip reader, and barcode scanner: Touch screen – input devices with touch or pressure sensitive screens Stylus – a type of digitizer that allows a designer or artist to create artwork by using a pen- like tool Magnetic strip reader – a device that reads information magnetically encoded on the back of plastic cards Barcode scanner – a device that reads the information contained in the barcodes affixed to products © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32 PC Components More New Input Devices ▪ A few newer input devices: Digital camera – devices that capture digital images and videos Webcams – video cameras that can be integrated into a computer Signature pad– a device that electronically captures a person’s signature Smart card reader – a device used on a computer to authenticate the user. A smart card may be the size of a credit card with an embedded microprocessor that is typically under a gold contact pad on one side of the card. Microphone – a device that allows a user to speak into a computer and have their voice digitized © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33 PC Components Most Recent Input Devices ▪ The newest input devices include NFC devices and terminals, facial recognition scanners, fingerprint scanners, voice recognition scanners, and virtual reality headsets: NFC devices and terminals – Near Field Communication (NFC) tap to pay devices Facial recognition scanners – devices identifying a user based on unique facial features Fingerprint scanners – devices identifying a user based on unique fingerprint Voice recognition scanners – devices identifying a user based on unique voice Virtual reality headset – used with computer games, simulators, and training applications with virtual reality functionalities. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34 PC Components What are Output Devices? ▪ An output device takes binary information from the computer and converts it into a form that is easily understood by the user. ▪ Examples of output devices include monitors, projectors, VR headsets, printers, speakers, and headphones. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35 PC Components Monitors and Projectors ▪ Most monitors use one of three types of technology: Liquid crystal display (LCD) Light-emitting diode (LED) Organic LED (OLED) ▪ Most video projectors use LCD or DLP technology. DLP stands for Digital Light Processing Different projectors have different numbers of lumens, which affects the level of brightness of the projected image. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36 PC Components VR and AR Headsets ▪ Virtual Reality (VR) uses computer technology to create a simulated, three-dimensional environment. ▪ A VR headset completely encases the upper portion of users’ faces, not allowing in any ambient light from their surroundings. ▪ Augmented Reality (AR) uses similar technology but superimposes images and audio over the real world in real time. ▪ AR can provide users with immediate access to information about their real surroundings. ▪ An AR headset usually does not close off ambient light to users, allowing them to see their real life surroundings. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37 PC Components Printers ▪ Printers are output devices that create hard copies of files. ▪ A hard copy might be a on a sheet of paper. It could also be a plastic form created from a 3D printer. ▪ Different types of printers: Inkjet, impact, thermal, laser, and 3D printers Printers use wired or wireless connections All printers require printing material (such as ink, toner, liquid plastic, etc.) Printers use a driver to communicate with OS © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38 PC Components Speakers and Headphones ▪ Speakers are a type of auditory output device. ▪ Most computers and mobile devices have audio support either integrated into the motherboard or on an adapter card. ▪ Headphones, earbuds, and the earphones found in headsets are all auditory output devices. ▪ These may be wired or wireless. Some are Wi-Fi or Bluetooth-enabled. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39 Laptops and Other Mobile Devices IT Essentials v7.0 1.3 Characteristics of Laptops and Other Mobile Devices © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 41 Mobile Device Overview Mobility ▪ Mobility in information technology means the ability to access information electronically from different locations outside of the home or office. ▪ Mobile connectivity is limited only by the availability of cellular or data networks. ▪ Mobile devices: have self-contained power (rechargeable batteries) are generally small and lightweight do not rely on other connected peripheral devices to operate. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 42 Mobile Device Overview Laptops ▪ Laptops are portable computers that usually run full versions of operating systems such as Microsoft Windows, iOS or Linux. ▪ Laptops can have the same computing power and memory resources as desktop computers. ▪ Laptops integrate a screen, keyboard, and a pointing device, such as a touchpad, in one portable device. ▪ Laptops can be run from an internal battery or from an electrical outlet. ▪ They offer connectivity options such as wired or wireless Ethernet networking and Bluetooth. ▪ Laptops offer device connection options such as USB and HDMI, but may lack the expansion capability of desktops. In order to make laptops more portable, some peripheral connection options may require additional hardware, such as a dock or port replicator. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 43 Mobile Device Overview Smartphone Characteristics ▪ Smartphones run special operating systems that are designed for mobile devices. ▪ Smartphones may have limited OS upgradability and can require the purchase of a new model to take advantage of the latest OS features and apps. ▪ Software for smartphones is usually limited to apps that can be downloaded from stores such as Google Play or the Apple App Store. ▪ Smartphones use cellular connectivity options for voice, text, and data services. ▪ Other data connections include Bluetooth and Wi-Fi. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 44 Mobile Device Overview Smartphone Features ▪ Most smartphones include global positioning system (GPS) functionality. A GPS receiver in the phone uses satellites to determine the geographic location of the device. Some apps allow a smartphone to act as a navigational GPS that provides guidance for driving, biking, or walking. ▪ Devices without a GPS service can still determine the location, in a less precise way, by using info coming from nearby mobile service antennas or nearby Wi-Fi access points. ▪ Another feature of some smartphones is the ability to "tether", or share, the cellular data connection with other devices. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 45 Mobile Device Overview Tablets and E-Readers ▪ Tablets are similar to smartphones in that they use special mobile operating systems like Android or iOS. ▪ Tablets usually offer Wi-Fi and Bluetooth connectivity and most have USB and audio ports. ▪ Most of the apps that work on phones are also available for tablets. ▪ Unlike smartphones, tablets normally have larger touch-screen displays. ▪ Most tablets do not have the ability to access cellular networks and they usually do not include GPS receivers. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 46 Mobile Device Overview Tablets and E-Readers (Cont.) ▪ E-readers, such as the Amazon Kindle, are special purpose devices with black and white displays that have been optimized for reading text. ▪ Although they resemble tablets, they lack many of the features and functions that tablets provide. ▪ Many have touch displays that make it easy to turn pages, change settings, and access eBooks online. ▪ For connectivity, some offer free cellular data connections for downloading books from a specific store, but most rely on Wi-Fi. ▪ E-reader battery life is usually longer than tablets. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 47 Mobile Device Overview Wearables: Smartwatches and Fitness Trackers ▪ Wearables are smart devices that are meant to be worn on the body or attached to clothing. ▪ Smartwatches are a type of wearable that includes a microprocessor, a special operating system, and apps. Sensors in the smartwatch can gather data about various aspects of the body and use Bluetooth to report this information back to another device Some smartwatches can connect directly to a cellular network, utilize GPS location services, provide convenient displays for notifications from apps, and store and play music and playlists. ▪ Fitness trackers are similar to smartwatches but are limited to monitoring the body such as physical activity, sleep, and exercise. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 48 Mobile Device Overview Wearables: Augmented and Virtual Realities ▪ In Augmented Reality (AR), computer graphics are integrated with what is seen in the real world. The graphics overlays can range from cartoon characters in a game application to information for emergency management training for first responders. ▪ In Virtual Reality (VR), a user wears a special headset which displays graphics from a separate computer. The graphics are immersive 3D and create very realistic worlds. The VR user's motions are detected by sensors which allow the user to interact with and move around in the virtual environment. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 49 Laptop Components Motherboards ▪ The compact nature of laptops requires a number of internal components to fit in a small amount of space. The size restrictions result in a variety of form factors for a number of laptop components, such as the motherboard, RAM, CPU, and storage devices. Some laptop components, such as the CPU, may be designed to use less power. ▪ Desktop motherboards have standard form factors. The standard size and shape allow motherboards from different manufacturers to fit into common desktop cases. Laptop motherboards vary by manufacturer and are proprietary. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 50 Laptop Components Internal Components ▪ Laptop internal components are designed to fit into the confined spaces of the laptop form factor: RAM – Laptops use Small Outline Dual In-line Memory Modules (SODIMM) CPUs – Laptop processors are designed to use less power and create less heat than desktop CPUs SATA drives- Laptop storage devices are typically 1.8in or 2.5in in width. Solid-state drives – Laptops use SSD drives for high performance, small size, and low power consumption. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 51 Laptop Components Special Function Keys ▪ The purpose of the Function (Fn) key is to ▪ Some examples of functions that can be activate a second function on a dual-purpose accessed: key. Dual displays ▪ The feature that is accessed by pressing the Volume settings Fn key in combination with another key is Media options such as fast forward or rewind printed on the key in a smaller font or different Keyboard backlight color or with an icon. Screen orientation Screen brightness WiFi, cellular, and Bluetooth on or off Media options such as play or rewind Touchpad on or off GPS on or off Airplane mode © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 52 Laptop Display Components Laptop Display Features ▪ Some common laptop display features include: Detachable screens – Some laptops permit the touchscreen to be used like a tablet when the display is detached. Touch screens – Laptops with touchscreens have a special glass attached to the front of the screen known as a digitizer. Cutoff switches – A cutoff switch helps conserve power by turning off the display. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 53 Laptop Display Components Wi-Fi Antenna Connectors ▪ Wi-Fi components include: Wi-Fi antenna connectors – Wi-Fi antennas in laptops are typically located above the screen. Wi-Fi antenna leads – The Wi-Fi antenna is connected to a wireless card by an antenna wire and antenna leads. Wi-Fi antenna wire guides – The wires are fastened to the display unit by wire guides located on the sides of the screen. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 54 Laptop Display Components Webcam and Microphone ▪ Most laptops today have a webcam and microphone built-in. ▪ The webcam is normally positioned at the top, center of the display. ▪ The internal microphone can often be found next to the webcam. Some manufacturers may place the microphone next to the keyboard, or on the side of the laptop. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 55 Wireless Configuration Bluetooth The Bluetooth technical specification is described by the Institute of Electrical and Electronics Engineers (IEEE) 802.15 standard. Bluetooth devices are capable of handling voice, music, videos, and data. The distance of a Bluetooth personal area network (PAN) is limited by the amount of power used by the devices in the PAN The most common Bluetooth technology has a range of approximately 33 ft (10 m). Security measures are included in the Bluetooth standard. The first time that a Bluetooth device connects, the device is authenticated using a PIN. This is known as pairing. Bluetooth supports both 128-bit encryption and PIN authentication. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 56 Wireless Configuration Bluetooth Laptop Connections ▪ Windows activates connections to Bluetooth devices by default. If the connection is not active, look for a switch on the front face or on the side of the laptop. Some laptops may have a special function key on the keyboard to enable the connection. ▪ If a laptop does not include Bluetooth technology, you can purchase a Bluetooth adapter that plugs into a USB port. ▪ Before installing and configuring a device: 1. Make sure that Bluetooth is enabled in the BIOS. 2. Turn on the device and make it discoverable. 3. Use the Bluetooth Wizard to search and discover Bluetooth devices that are in discoverable mode. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 57 Wireless Configuration Cellular WAN ▪ Laptops with integrated cellular WAN capabilities require no software installation and no additional antenna or accessories. Some laptops may use a special function key on the keyboard to enable the connection or a physical switch on the front or side of the laptop. ▪ Many cell phones provide the ability to connect other devices to the Internet. This connection, known as tethering, can be made using Wi-Fi, Bluetooth, or by using a USB cable. ▪ When a cellular phone allows Wi-Fi devices to connect and use the mobile data network, this is called a hotspot. You can also access a cellular network by using a cellular hotspot device. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 58 Wireless Configuration Wi-Fi ▪ Laptops usually access the Internet by using wireless adapters. ▪ Wireless adapters can be built-in or attached through a USB or expansion port Mini-PCI cards are capable of 802.11a, 802.11b, and 802.11g wireless LAN connections. Mini-PCIe and PCI Express Micro cards support the above standards and 802.11n and 802.11ac. Mini-PCI PCI Express Micro Mini-PCIe © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 59 1.4 Other Mobile Device Hardware © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 60 Other Mobile Device Hardware Cell Phone Parts ▪ The cell phone contains one or more of these field replaceable parts: Memory, a SIM card, and a battery. ▪ A SIM card contains information used to authenticate a device to mobile telephone and data providers. The card can also hold user data such as personal contacts and text messages. ▪ A Secure Digital (SD) card is used to add memory to many mobile devices. ▪ When a mobile device malfunctions, it is usually sent to the manufacturer for repair or replacement. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 61 Other Mobile Device Hardware Wired Connectivity ▪ A mini-USB cable is used to connect a mobile device to an electrical outlet charger or to another device in order to charge and/or transfer data. ▪ A USB-C cable and port can be plugged in either direction and are used on mobile devices to connect to an electrical outlet charger or to another device in order to charge and/or transfer data. ▪ A micro-USB cable is used to connect a mobile device to an electrical outlet charger or to another device in order to charge and/or transfer data. ▪ A Lightning cable and port is used to connect Apple devices to host computers and other peripherals such as USB battery chargers, monitors, and cameras. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 62 Other Mobile Device Hardware Wireless Connections and Shared Internet Connections ▪ Besides Wi-Fi, mobile devices also use the following wireless connections: Near field communication (NFC) – NFC enables mobile devices to establish radio communications with other devices by placing the devices close together or by touching them together. Infrared (IR) – If a mobile device is IR enabled, it can be used to control other IR controlled devices remotely, such as a TV, set top box, or audio equipment. Bluetooth – This allows data exchange over a short distance between two Bluetooth-enabled devices or connect to other Bluetooth-enabled peripheral devices, such as speakers or headphone ▪ A smartphone’s internet connection can be shared with other devices. Tether – This uses your cellular phone as a modem for another device, such as a tablet or laptop. Mobile hotspot – A hotspot is where devices connect using Wi-Fi to share a cellular data connection. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 63 Specialty Mobile Devices Wearable Devices ▪ Wearable devices are clothing or accessories that have miniature computing devices. Smartwatches, fitness monitors, and smart headsets are some examples. ▪ Fitness monitors measure and collect activity data and can connect with other Internet-connected devices to upload the data for later review. ▪ VR headsets provide the wearer with a complete immersion experience shutting out the physical world. ▪ Augmented reality (AR) headsets overlay digital elements to a live view of the physical world often using the camera of a smartphone. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 64 1.5 Network Connectivity and Email © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 65 Wireless and Cellular Data Networks Wireless Data Networks ▪ The ability of a laptop, tablet, or cell phone to wirelessly connect to the internet has provided people with the freedom to work, learn, communicate, and play wherever they want. ▪ Mobile devices typically have two wireless internet connectivity options: Wi-Fi - Wireless network connection is provided using local Wi-Fi settings. Cellular - Wireless network connection is provided for a fee using cellular data. Cellular networks require cellular towers and satellites to create a mesh of global coverage. ▪ Wi-Fi is usually preferred over a cellular connection because it is usually free and Wi-Fi radios use less battery power than cellular radios. ▪ Many businesses, organizations, and locations now also offer free Wi-Fi connections to attract customers. ▪ It is important to take precautions and secure home Wi-Fi networks. Use the highest Wi-Fi security framework possible and use encryption such as a VPN connection. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 66 Q&A © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 67

Use Quizgecko on...
Browser
Browser