You are on page 1of 70

ABOUT THE EXAM

Successful candidates will have the knowledge required to assemble components based on customer
requirements, install, configure and maintain devices, PCs and software for end users, understand the
basics of networking and security/forensics, properly and safely diagnose, resolve and document
common hardware and software issues, apply troubleshooting skills, provide appropriate customer
support, and understand the basics of virtualization, desktop imaging, and deployment.

Four major topics make up the CompTIA A+ Certification. The topics are as follows:
• Hardware
• Networking
• Mobile Devices
• Hardware & Network Troubleshooting

This guide will walk you through all the skills measured by the exam, as published by CompTIA.
OBJECTIVES

CHAPTER 1: HARDWARE
1.1 Given a scenario, configure settings and use BIOS/UEFI tools on a PC.
1.2 Explain the importance of motherboard components, their purpose, and properties.
1.3 Compare and contrast various RAM types and their features.
1.4 Install and configure PC expansion cards.
1.5 Install and configure storage devices and use appropriate media.
1.6 Install various types of CPUs and apply the appropriate cooling methods.
1.7 Compare and contrast various PC connection interfaces, their characteristics and
purpose.
1.8 Install a power supply based on given specifications.
1.9 Given a scenario, select the appropriate components for a custom PC configuration,
to meet customer specifications or needs.
1.10 Compare and contrast types of display devices and their features.
1.11 Identify common PC connector types and associated cables.
1.12 Install and configure common peripheral devices.
1.13 Install SOHO multifunction device / printers and configure appropriate settings.
1.14 Compare and contrast differences between the various print technologies and the
associated imaging process.
1.15 Given a scenario, perform appropriate printer maintenance.

CHAPTER 2: NETWORKING
2.1 Identify the various types of network cables and connectors.
2.2 Compare and contrast the characteristics of connectors and cabling.
2.3 Explain the properties and characteristics of TCP/IP.
2.4 Explain common TCP and UDP ports, protocols, and their purpose.
2.5 Compare and contrast various WiFi networking standards and encryption types.
2.6 Given a scenario, install and configure SOHO wireless/wired router and apply
appropriate settings.
2.7 Compare and contrast Internet connection types, network types, and their features.
2.8 Compare and contrast network architecture devices, their functions, and features.
2.9 Given a scenario, use appropriate networking tools.

CHAPTER 3: STORAGE
3.1 Install and configure laptop hardware and components.
3.2 Explain the function of components within the display of a laptop.
3.3 Given a scenario, use appropriate laptop features.
3.4 Explain the characteristics of various types of other mobile devices.
3.5 Compare and contrast accessories & ports of other mobile devices.
CHAPTER 4: HARDWARE AND NETWORK TROUBLESHOOTING
4.1 Given a scenario, troubleshoot common problems related to motherboards, RAM,
CPU and power with appropriate tools.
4.2 Given a scenario, troubleshoot hard drives and RAID arrays with appropriate tools.
4.3 Given a scenario, troubleshoot common video, projector and display issues.
4.4 Given a scenario, troubleshoot wired and wireless networks with appropriate tools.
4.5 Given a scenario, troubleshoot and repair common mobile device issues while
adhering to the appropriate procedures.
4.6 Given a scenario, troubleshoot printers with appropriate tools.
CHAPTER 1 – HARDWARE
1.1 GIVEN A SCENARIO, CONFIGURE SETTINGS, AND USE BIOS/UEFI TOOLS ON A PC.
Firmware upgrades – flash BIOS

BIOS stands for Basic Input/Output System. It is a type of firmware used to initiate the RAM, hard drive, optical
drive, and CPU for booting in a process known as bootstrapping.

Modern BIOS, also called flash BIOS, is stored on electronically erasable programmable read-only memory
(EEPROM) and can be updated, erased, and rewritten by a process called flashing.

BIOS configuration settings are saved on the Complementary Metal-Oxide Semiconductor (CMOS). CMOS is
volatile memory; that is, it loses the contents stored on it as soon as it is powered off. Therefore, a lithium
battery, often called the CMOS battery, provides uninterrupted power to ensure that CMOS settings are intact
when the computer is shut off.

You can access the BIOS by pressing a key after you switch on the computer and before the operating system
loads. This is the stage when the computer is running Power-On Self-Test (POST), a process performed by
firmware or software routines immediately after a computer is powered on. Common keys used for accessing
the BIOS at this stage are F1, F2, F10, and DEL.

Modern operating systems, such as Windows 8.1 and above, and Intel-based Mac computers, use an improved
specification called Unified Extensible Firmware Interface (UEFI) in place of BIOS. Compared to BIOS, UEFI
provides lower boot time, improved stability, support for larger drives, and better security. UEFI also supports
remote diagnostics and repair of computers, even without an operating system.

To access UEFI in a Windows 10 computer:

1. Click the Start menu and select Settings.


2. Select Update and Security.
3. Click Recovery.
4. Under Advanced startup, click Restart now....
5. Select Troubleshoot.
6. Choose Advanced options.
7. Select UEFI Firmware Settings.
8. Click Restart to restart the system and enter UEFI (BIOS).

BIOS component information


(RAM, Hard Drive, Optical Drive, CPU)

BIOS contains information about the components installed in the computer and some of their attributes.

Some of the common component information items that are displayed in the BIOS:

• CPU: Displays the information about CPU manufacturer, speed, and the number of installed processors.
• RAM: Displays the RAM manufacturer and speed. It may also display the number of slots and the slots
on which the RAM modules are installed.
• Hard Drive: Displays the manufacturer, size, and type of the hard drives. The type and number of hard
disk controllers may also be displayed.
• Optical Drive: Displays the manufacturer and type of optical drives.

A hardware engineer can use the BIOS information to troubleshoot hardware that is not working properly and to
determine upgrade options.

BIOS configurations
(Boot sequence, Enabling and disabling devices, Date/time, Clock speeds, Virtualization support, BIOS
security, passwords, Drive encryption: TPM, lo-jack, secure boot)
You can configure the boot sequence, date and time, clock speed, virtualization support, and security features in
BIOS. The boot sequence specifies the sequential order of devices in which the computer gets booted. By
default, the computer boots from the hard drive. However, you can change the default boot sequence in the
computer’s BIOS settings with the help of the following steps:
1. Start the computer.
2. Press ESC, F1, F2, F8, or F10 keys on the keyboard to load the BIOS Setup.
3. Select the Boot tab. The system devices are listed in the order of priority. You can move the CD or DVD
drive up the order and specify the priority of devices for booting.
4. Save the settings.
5. Exit the BIOS Setup.
6. The computer restarts with the modified boot sequence.

You can enable or disable the boot devices in the BIOS Setup with the help of the following steps:
1. Load the BIOS Setup.
2. Select the device that needs to be disabled.
3. Press Ctrl + 1. An exclamation mark will appear beside the device name. For example, if you are
disabling the DVD drive, it will be: !DVD Drive.
4. Repeat the steps to enable the device.

The BIOS has System Time and System Date fields. You must set the correct date and time in the BIOS. The
operating system and other applications access these fields to display the date and time. You can either increase
or decrease the CPU clock speed in BIOS. If the CPU clock speed is decreased, the computer runs slower and the
fan emit less noise. If the CPU clock speed is increased, the computer runs faster and the fan emits more noise.
If you want to run multiple operating systems on the computer, enable the virtualization support technology in
the BIOS Setup. Virtualization technology enables the computer to run multiple operating systems in different
hard drive partitions.

BIOS settings and configurations are very critical and sensitive. Unauthorized sources should not have access to
the BIOS settings. There are different types of security features that can be implemented to protect the BIOS
such as:
• Passwords: You can set Supervisor/Administrator and User passwords in BIOS.
• Drive encryption: You can implement full-disk encryption to protect the data. In full-disk encryption, all
the files including the operating system files are encrypted using the encryption software.
• TPM: Trusted Platform Module (TPM) is another way of implementing hardware security in computers.
This feature provides protection to the chips in the microprocessors.
• LoJack: The BIOS in laptops can be protected using the security feature of LoJack for laptops. The Lojack
feature for laptops was earlier called CompuTrace. This feature is installed along with the operating
system. It allows you to trace your laptop’s physical location.
• Secure boot: Another security feature that can be implemented is secure boot. This feature is built-in to
the UEFI BIOS. The secure boot feature prevents the entry of malicious software into the system.

Built-in diagnostics
Every operating system has built-in diagnostic tools to check the computer’s health. These tools help you to
diagnose the hardware problems and fix them. Some of the tools are as follows:
• Start test: You can do this test if the system does not boot properly. This test checks the smooth
working of the major system parts.
• Battery test: You can do this test if the system’s battery is not working properly. This test checks the
effective working of the battery.
• Memory test: You can perform this test to check the working of the system’s memory.
• Hard drive test: You can conduct this test to identify any faults in the working of the hard drive.

Monitoring
(Temperature monitoring, Fan speeds, Intrusion detection/notification, Voltage, Clock, Bus speed)

The BIOS has built-in monitoring features for the computer’s hardware elements, such as:
• Temperature: The heat sensors present in the motherboard helps you to monitor the temperature of
the CPU, RAM, and chipsets.
• Fan speeds: BIOS allows you to monitor CPU fan speeds. The fan speed can be at various levels such as
standard, silent, manual, and turbo.
• Intrusion detection/notification: BIOS helps you to identify, analyze, monitor, and assess system
configurations and abnormal virus attacks.
• Voltage: BIOS settings help you to monitor the voltage of the CPU. High or low voltages are not
recommended for the effective working of the computer.
• Clock: BIOS helps you to monitor the clock speed of the CPU.
• Bus speed: BIOS settings allow you to monitor the speed of the internal buses.

1.2 EXPLAIN THE IMPORTANCE OF MOTHERBOARD COMPONENTS, THEIR PURPOSE,


AND PROPERTIES.
Sizes
(ATX, Micro-ATX, Mini-ITX, ITX)

The motherboard is the main integrated circuit board in a computer. All computer components must be
compatible to function properly with a specific motherboard.

Motherboards are manufactured in a variety of sizes and shapes called computer form factor. The following
table lists some of the most common form factors and their features:

Form Factor Features


ATX • Most common form factor
• Developed by Intel in 1995
• Dimension: 305mm x 244mm
• Power: 20 pin connector; 24 pin connector; additional 4/8 pin connector
• Port types: Optional I/O backplate (optional)
Micro-ATX • Very popular form factor
• Dimension: smaller than an ATX motherboard; 244mm x 244mm
• Power: 20 pin connector; 24 pin connector; additional 4/8 pin connector
• Limited expansion slots
• Backward compatibility
• Lower cost than ATX
ITX • A series of low-power consumption motherboards
• Designed by VIA Technologies in year 2001
• Include mini-ITX (170mm x 170mm); nano-ITX (120mm X 120mm); pico-ITX (72mm x
100mm) and mobile-ITX (45mm x 75mm)
• Largely used in small form factor (SFF) computer systems
Mini-ITX • Most popular in ITX series of motherboards
• Dimension: 170mm x 170mm
• Can be used in places designed for ATX, micro-ATX and other ATX variants
• Offers one expansion slot

Expansion slots
(PCI, PCI-X, PCIe, MiniPCI)

An expansion slot is a connector on the motherboard that may be used for adding more memory, graphics
capabilities, and support for special devices in a computer system.

Few types of expansion slots that your PC may have include:


• PCI: Short for Peripheral Component Interconnect. PCI is the most common form of internal expansion
for a computer. It is a local bus standard developed by Intel Corporation. It is a 64-bit parallel
communication bus that yields a throughput rate of up to 133 MBps.
• PCI-X: Short for PCI extended, PCI-X is an enhanced PCI bus designed jointly by IBM, HP, and Compaq to
increase performance of high bandwidth devices, such as Gigabit Ethernet and Fibre Channel, and
processors that are part of a cluster. PCI-X is backward-compatible with existing PCI cards and improve
upon the speed of PCI from 133 MBps to as much as 1 GBps.
• PCIe: Short for PCI Express, PCIe is an I/O interconnect bus standard that expands on and doubles the
data transfer rates of original PCI. Unlike traditional PCI, PCIe is a two-way serial connection with data
transfer rates of approximately 200MB/s. PCIe was developed to provide an I/O architecture suitable for
high-speed interconnects such as 1394b, USB 2.0, InfiniBand, and Gigabit Ethernet.
• MiniPCI: A subset of the PCI interface that uses a significantly smaller card form factor. It is
implemented as 32 bits of the PCI specification. It was mainly designed for peripherals such as network
adapters in laptops.

RAM slots
The RAM is connected to the motherboard with the help of RAM slots. The RAM slots are vertical slots located
at the top right corner of the motherboard.

CPU sockets
The CPU socket holds the CPU on the motherboard. It is also called the processor socket.

Chipsets
(North Bridge, South Bridge)
A chipset is a group of chips located on the motherboard. The chipset includes instructions for the CPU and
other system hardware. The chipset is divided into multiple tiers called the north bridge and the south bridge.
The north bridge is an integrated circuit. It controls the memory and processor activities. The south bridge is a
single chip that manages the input/output (I/O) activities in the computer.

CMOS

The CMOS holds the crucial system data and ensures that the data is not lost whenever the system is turned off.
It lasts for many years and can be replaced when worn out.

Power connections and types


The power supply connectors play a very important role in the working of the system. The following table lists
the various types of powers supply connectors used in the computer.

Type of Power Supply Connector Description


SATA Power Connector It is also called the SATA or serial-ATA power cable that connects to
the SATA hard drives.
(6 Pin) PCI Express Connector It is also called the PCI Express power cable, PCI-E connector, or PCIe
connector that connects to the PCI graphics cards.
(20 + 4 Pin) ATX Power Connector It is also called the main power connector that connects to the ATX
motherboard power supply.
(4 Pin) Floppy Drive Connector It is also called the FDD connector that connects to the floppy disk
drives. It is rarely used nowadays.
(4 Pin) Molex Connector It is also called the peripheral connectors that connect to the hard or
optical drives.
(4+4 Pin) ATX 12V Power It is also called the CPU or the P4 power connector.
Connector

Fan connectors
The system fans provide some cooling effect to the system. There are different types of fan connectors such as
2-wire, 3-wire, and 4-wire.
Front/Top panel connectors
(USB, Audio, Power button, Power light, Drive activity lights, Reset button)
The front panel connector on the motherboard includes the connectors of the USB drives, audio controls,
computer’s power supply, on/off light, and reset button.

Bus speeds
Bus speed is the speed of the front-side bus that connects the CPU to the north bridge on the motherboard. The
front-side bus speed is usually in the range of 66 MHZ to 800 MHZ.

1.3 COMPARE AND CONTRAST VARIOUS RAM TYPES AND THEIR FEATURES.
Types
(DDR, DDR2, DDR3, SODIMM, Parity vs. non-parity, ECC vs. non-ECC, Ram configurations (Single channel vs.
dual channel vs. triple channel), Single sided vs. double sided, Buffered vs. un-buffered)

The following table lists the various types of RAM and its features.

Type of RAM Feature


DDR It doubles the rate of data transfer in the computer.
DDR2 It functions at twice the speed of DDR. It supports 4GB per module.
DDR3 It is faster than DDR2 and supports 8GB per module.
SODIMM A 72 pin SODIMM RAM supports 32-bit data transfer. A 144 pin SODIMM RAM
supports 64-bit data transfer.
Parity vs. non-parity Parity memory adds one bit extra for every data byte. Non-parity memory uses 8 bits
of data for every data byte. It is also called the regular memory.
ECC vs. non-ECC ECC memory has more chips than a non-ECC memory. It is used to hold critical and
sensitive data. It identifies and rectifies the errors that are encountered. Non-ECC
memory is used in home computers. It is less expensive than ECC memory.
Ram configurations Single channel memory use single line of data for transfer. Dual channel memory
(Single channel vs. dual uses twice the data lines used by the single channel. Triple channel memory uses
channel vs. triple thrice the data lines used by the single channel.
channel)
Single sided vs. double Single-sided memory chips are denser than double-sided memory chips. Single-sided
sided memory chips have more capacity. Double-sided memory chips are placed on both
sides of the motherboard.
Buffered vs. un- Buffered memory is also known as registered memory. There exists a register
buffered between the RAM and the memory controller. It is durable but expensive than
unregistered memory. Un-buffered memory is also known as unregistered or
conventional memory. There is no register between the RAM and memory
controller. It is more efficient than the registered memory.

RAM compatibility
If you want to upgrade the system RAM, the new memory must be compatible with the motherboard. There are
different tools available that can provide information on the size, slots, speed, frequency, latency, and
specifications of RAM.
1.4 INSTALL AND CONFIGURE PC EXPANSION CARDS.
(Sound cards, Video cards, Network cards, USB cards, Firewire cards, Thunderbolt cards, Storage cards,
Modem cards, Wireless/cellular cards, TV tuner cards, Video capture cards, Riser cards)

The following table lists the features of the various types of PC expansion cards.

Type of Card Feature

Sound card It provides input and output of audio signals in the computer.

Video card It provides input and output of graphics in the computer.

Network card It connects the computer to a network, usually a local area network.

USB card It is used to read and copy data from portable flash memory cards such as SD card, Mini SD
card, Micro SD card, or SIM card.

Firewire card It allows you to connect firewire devices to the computers. Examples of firewire devices are
digital camcorders and external hard drives.

Thunderbolt card It allows you to connect thunderbolt devices to the computers. Thunderbolt devices are the
external storage devices.

Storage card It is also called the memory card or flash card. It stores digital information. It is used in
portable devices such as mobiles and tablets.

Modem card It is a type of internal modem that acts as a communication device for data transfer in the
network.
Wireless/cellular It provides wireless network access to the computer.
card

TV tuner card It helps to connect the television with the computer.

Video capture It captures the video signals from devices such as video camera and converts the signals
card into a digital format.

Riser card It helps to add additional expansion card slots in the motherboard.

To install and configure the PC expansion cards, you need to perform the following generic steps:

• Note down the card details such as the model and serial numbers.

• Power off and unplug the computer.

• Verify the availability of the expansion slot in the motherboard.

• If the card has jumpers, set them properly.

• Install the card in the expansion slot by fixing it with the screw in the right position.

• Attach internal and external cables, if required.

• Power on and plug in the computer.

• Install the appropriate software drivers for the card.

1.5 INSTALL AND CONFIGURE STORAGE DEVICES AND USE APPROPRIATE MEDIA.
(Optical drives (CD-ROM/CD-RW, DVD-ROM/DVD-RW/DVD-RW DL, Blu-Ray, BD-R, BD-RE), Magnetic hard disk
drives(5400 rpm, 7200 rpm, 10,000 rpm), Hot swappable drives, Solid state/flash drives(Compact flash, SD,
Micro-SD, Mini-SD, xD, SSD, Hybrid, eMMC), RAID types(0, 1, 5, 10), Tape drive, Media capacity(CD, CD-RW,
DVD-RW, DVD, Blu-Ray, Tape, DVD DL))

To install and configure the storage devices, you need to perform the following generic steps:

• Note the storage device details such as the model and serial numbers.

• Power off and unplug the computer.

• Set the jumpers properly.

• Attach the internal and external cables.

• Power on and plug in the computer.

• Enter the CMOS setup and verify the drive settings.

• Reboot the computer.

• Install the appropriate software drivers for the storage devices.

Hot swappable drives

Hot swappable drives can be disconnected from the computer without the computer being powered off, or
other drives being affected. Solid state/flash drives

The Solid State Drives (SSD) store data on solid state flash memory. Silicon based memory chips are inserted in
the solid state drives. Examples of solid state or flash drives are compact flash, SD, micro-SD, mini-SD, xD, SSD,
Hybrid, and eMMC.

RAID types

A Redundant Array of Independent Disks (RAID) is a storage device that can store large amounts of data. There
are different RAID levels such as 0, 1, 5, and 10.

Tape drive

In tape drives, data is stored on magnetic tapes. They can store huge amount of data and are economical as
compared to hard disks.

1.6 INSTALL VARIOUS TYPES OF CPUS AND APPLY THE APPROPRIATE COOLING
METHODS.
(Socket types (Intel: 775, 1155, 1156, 1366, 1150, 2011, AMD: AM3, AM3+, FM1, FM2, FM2+), Characteristics
(Speeds, Cores, Cache size/type, Hyperthreading, Virtualization support, Architecture (32-bit vs. 64-bit),
Integrated GPU, Disable execute bit), Cooling (Heat sink, Fans, Thermal paste, Liquid-based, Fanless/passive))

You need to perform the following generic steps to install the CPU in sockets:

1. Unclip the lever of the socket.

2. Open the load plate.

3. Remove the protective cover from the load plate.

4. Fix the processor in the socket gently.

5. Close the load plate.

The speed of the CPU is determined in Hertz. It is a cycle per second. The number of cores inside the chips
handles the instructions. Processors can have multiple cores that act as independent processing units. Cache
memory is very useful to store data.

Hyperthreading, an Intel term, is related to the performance of the CPU. In this, a single CPU acts as two
different processing units. Hyperthreading boosts the CPU speed.

Multiple operating systems can run on the same computer due to the virtualization technology. CPUs support
the virtualization technology. A 64-bit processor can handle more data and process the data faster than 32-bit
processor.

Every processor has an integrated graphic processing unit or GPU. The graphic processing is done within the CPU
itself.

CPUs generate a lot of heat, and it is recommended to implement cooling techniques to keep the CPU in a cool
state. A heat sink is a common method for cooling the CPU. In this method, a copper or aluminum piece is put
on the hot chips present on the motherboard. The metal pulls up the entire heat of the chips. A thermal paste is
placed between the heat sink and the chip. This paste acts as a conductor between the heat sink and the chips.
Heat sinks can have fans to push off the heat outside. You can also have liquid based cooling where the liquid
acts as a coolant.

1.7 COMPARE AND CONTRAST VARIOUS PC CONNECTION INTERFACES, THEIR


CHARACTERISTICS, AND PURPOSE.
(Physical connections (USB 1.1 vs. 2.0 vs. 3.0 (Connector types: A, B, mini, micro)), Firewire 400 vs. Firewire
800, SATA1 vs. SATA2 vs. SATA3, eSATA, Other connector types (VGA, HDMI, DVI, Audio (Analog, Digital
(Optical connector)), RJ-45, RJ-11, Thunderbolt), Wireless connections (Bluetooth, RF, IR, NFC), Characteristics
(Analog, Digital, Distance limitations, Data transfer speeds, Quality, DRM, Frequencies))

There are many interfaces in the computer. Each interface has its own speed and distance specifications.
Physical interface connections include USBs, Firewire, SATA, and other connector types. USB 1.1 has two speeds;
low and high. The low speed runs at 1.5 megabits per second. The high speed runs at 12 megabits per second.
USB 2.0 runs at 480 megabits per second. USB 3.0 runs at 4.8 gigabits per second.
Firewire connections are also known as IEEE 1394. It allows you to connect up to 63 devices on a single
interface. FireWire 400 runs at 100, 200, or 400 megabits in half duplex. FireWire 800 runs at 800 megabits per
second in full duplex. The serial ATA or SATA standard is another interface connection. SATA1 runs at 1.5 gigabits
per second. SATA2 runs at 3.0 gigabits per second. SATA3 runs at a speed of 6.0 gigabits per second.

Wireless interface connections include Bluetooth, RF, IR, and NFC. They possess different characteristics. IR runs
at 4 megabits per second. Bluetooth runs at 3 megabits per second.

1.8 INSTALL A POWER SUPPLY BASED ON GIVEN SPECIFICATIONS.


(Connector types and their voltages (SATA, Molex, 4/8-pin 12v, PCIe 6/8-pin, 20-pin, 24-pin), Specifications
(Wattage, Dual rail, Size, Number of connectors, ATX, Micro-ATX, Dual voltage options))

It is necessary to install the computer’s power supply based on the required specifications. There are different
types of power connectors in the computer. The motherboard has one of the largest power connectors. It has
either a 20-pin or 24-pin power connector. Some older motherboards have 4-pin ATX 12 volt connector. Such
connectors are also called ATX 12 V advanced technology extended motherboard connector.

The 15-pin SATA connection comes in 3.3, 5, and 12 volts. A Molex connector is one of the commonly used 4-pin
power connectors. You can connect storage devices and peripherals using the Molex connector. The 8-pin
connector is used in computers that have multiple processors. 8-pin connector has 150 watts of voltage. 6-pin
connector has 75 watts of voltage.

1.9 GIVEN A SCENARIO, SELECT THE APPROPRIATE COMPONENTS FOR A CUSTOM PC


CONFIGURATION, TO MEET CUSTOMER SPECIFICATIONS OR NEEDS.
(Graphic / CAD / CAM design workstation (Multicore processor, High-end video, Maximum RAM),
Audio/Video editing workstation (Specialized audio and video card, Large fast hard drive, Dual monitors),
Virtualization workstation (Maximum RAM and CPU cores), Gaming PC (Multicore processor, High-end
video/specialized GPU, High definition sound card, High-end cooling), Home Theater PC (Surround sound
audio, HDMI output, HTPC compact form factor, TV tuner), Standard thick client (Desktop applications, Meets
recommended requirements for selected OS), Thin client (Basic applications, Meets minimum requirements
for selected OS, Network connectivity), Home Server PC (Media streaming, File sharing, Print sharing, Gigabit
NIC, RAID array))

You can customize the PC configurations based on specialized requirements or customer specifications. You can
configure the PC as graphic workstations, home theaters, and virtualization workstations, etc...

Graphic workstations are used for running design applications such as Computer Aided Design (CAD) or
Computer Aided Manufacturing (CAM). Graphical data consume huge disk space and memory. Such
workstations usually have the following requirements:

• Multicore processors with high computing power are required to perform effective data processing.

• Video card is required to handle complex graphics.

• High memory is required to manage the computing activities.

• Efficient secondary storage device is necessary to handle the data load.


Workstations can be configured as audio and video editing PCs also. Such workstations require the following
components:

• Video card with high-end video memory

• Effective and efficient audio system

• High capacity storage devices to store the audio/video content

• Multiple monitors to view the graphical content simultaneously on more than one screen for easy
editing

Virtualization workstations run multiple operating systems at the same time. The following requirements need
to be considered to configure the virtualization workstations:

• Specialized virtualization software is required to enable the technology.

• Upgraded memory is necessary to handle the load of multiple operating systems.

• Additional CPU cycles or multicore processors are required to manage multiple operating systems.

PCs can be exclusively configured for gaming purposes. Such PCS will require high-end video cards, high-
definition audio system, sufficient memory to handle the graphical load, and fans to keep the system cool.

You can configure the PC as a home theatre. You need to consider the following requirements for the
configuration:

• The system must have high-end audio components that can provide effective sound signals.

• The video card must be able to receive high-dimension television signals through the cables.

• TV tuner cards are necessary to capture the signals that come from the television to the system.

You can configure a system as a thick or thin client. Thick clients are a traditional computer that has its own CPU,
memory, and operating system. The entire processing and execution of applications take place on the system
itself. A Thin client is a remote system. The data processing and execution happens on the remote system in a
network. The workstation connected to the remote device has a keyboard, mouse and a monitor. The processed
data results are displayed on the workstation for the end user.

Home server PCs are gaining importance in recent times. The home server PC acts as a centralized server to
store media in the digital format. Pictures or videos can be stored on the home server PC and everyone
connected to the server can easily access them. Print server can also be configured for centralized printing of
documents. A RAID 5 array keeps the data intact on the home server PC.

1.10 COMPARE AND CONTRAST TYPES OF DISPLAY DEVICES AND THEIR FEATURES.
(Types (LCD, TN vs. IPS, Flourescent vs. LED backlighting, Plasma, Projector, OLED), Refresh / frame rates,
Resolution, Native resolution, Brightness/lumens, Analog vs. digital, Privacy/antiglare filters, Multiple
displays, Aspect ratios (16:9, 16:10, 4:3))

Display devices are the output units of the computers. There are various types of display devices. Each device
has its own set of features. Liquid Crystal Display (LCD) is one of the most popular types of display for computers
and televisions. In LCD display, the light shines from the backlight through liquid crystals and colored polarizing
filter. There are two kinds of LCD display; Twisted Nematic (TN) LCD and In Plane Switching (IPS) LCD. The
following table compares both the types of LCD displays.

TN LCD IPS LCD

It is the most common type of display for gaming PC It is very popular with graphical content display such as
and lower end systems. mobile devices and higher end systems.

The response time is faster. The response time is comparatively slower.

Power consumption is on the lower side. Power consumption is higher as compared to TN LCD.

It has a small viewing angle. It has good representation of color.

It is reasonably cheap as compared to IPS LCD. It is a bit expensive as compared to TN LCD.

The backlight that helps to view the content on the LCD screen comes in the form of two technologies; Code
Cathode Fluorescent Lamp (CCFL) and LED. The following table compares CCFL and LED technologies.

CCFL LED

It requires more power than LED display. It requires less light as compared to CCFL.

It requires a power converter to convert the AC It does not require a power converter.
current to DC current.

It is not commonly used because of its limitations. It is commonly used nowadays because of its
advantages.

Another type of display is the plasma display. In this, there are a series of tiny cells that contain noble gas and
mercury. To this combination, if voltage is added, UV light is produced. The UV light is sent through a colored
phosphor to enable you to see the content.

Another popular display technology is the use of LCD projectors in conference rooms or home theaters. -LCD
projectors help to display the video content on the wall using hot lamps inside the devices. The lamps are very
expensive. Fans are available inside the devices to cool off the hot lamps.

Organic Light Emitting Diode (OLED) is another form of thin, and very light, form of content display. The small
diodes of organic material light up when the current is passed through the diodes. This helps to display the
content. The life span of OLED display is less than the life span of LED display.

In - earlier days, cathode ray tubes were used in - display devices. The screen content was updated many times
in a single second. This screen update is referred to as refresh rate. The refresh rate in earlier display devices
was measured in Hertz. Even today, in LCD devices, the refresh rate is still measured in Hertz.

Resolution is an important feature of display devices. Resolution is the number of pixels that is available for
display. The number of pixels available horizontally and vertically determines the aspect ratio of the display. The
standard traditional monitors have an aspect ratio of 4:3, which means 1600 pixels horizontally and 1200 pixels
vertically. The most common aspect ratio for LCD televisions is 16:9, which is also known as High Definition (HD)
resolution.

The brightness of a display device is very important for clarity viewing. The brightness is also called luminance. It
is measured in candela per square meter. Lumens are another unit to measure the brightness. The higher the
lumens, the better a device’s display .

The display signals from the devices are transmitted either in analog or digital format. The analog signal is sent
as one continuous signal. The digital signal is sent in the form of one or zero. Some of the display devices have
filters to enable clear viewing. One of the types of filters is the privacy filter. This type of filter is more popular in
laptops. This filter allows you to view the content only if you sit right in front of the display device. If you sit on
the side of the device and try to view the content, you will not see anything due to the privacy filter.

1.11 IDENTIFY COMMON PC CONNECTOR TYPES AND ASSOCIATED CABLES.


(Display connector types (DVI-D, DVI-I, DVI-A, DisplayPort, RCA, HD15 (i.e. DE15 or DB15), BNC, miniHDMI,
miniDin-6), Display cable types (HDMI, DVI, VGA, Component, Composite, Coaxial), Device cables and
connectors (SATA, eSATA, USB, Firewire (IEEE1394), PS/2, Audio), Adapters and convertors (DVI to HDMI, USB
A to USB B, USB to Ethernet, DVI to VGA, Thunderbolt to DVI, PS/2 to USB, HDMI to VGA))

There are different types of display connectors, display cables, adapters, and convertors. One of the most
popular types of display interface is the Digital Visual Interface (DVI). There are two types of DVIs; single link and
dual link. The single link can run up to 3.7 gigabits per second. The dual link has a higher resolution and runs at
7.4 gigabits per second. DVI comes in different models such as DVI-Analog (DVI-A), DVI-Digital (DVI-D), and DVI-
Integrated (DVI-I). DVI-A supports the transmission of analog signals. DVI-D supports the transmission of digital
signals. DVI-I supports the transmission of both analog and digital signals.

DisplayPort is another type of video interface. It is a Video Electronics Standards Association (VESA) royalty-free
standard. You can connect DisplayPort to devices without paying extra licensing fees. This interface is
compatible with HDMI DVI.

RCA Corporation in the 1940s designed the RCA connector. This connector is an audio/video connector. It is also
called a phone connector. You can use composite video to connect the RCA connectors in display devices. You
can use component video to send HD signals over the RCA connectors.

You can send only analog video signals over the Video Graphics Array (VGA) connectors. These are known as DB-
15 connectors, There are 15 pins inside the connector, and DB stands for d-subminiature size B. This connector is
also known as DE-15 or HD-15 in the industry.

One of the most popular display cable types is the High-Definition Multimedia Interface (HDMI). This is a single
cable that can carry both audio and video signals simultaneously. It can carry only digital signals.

Another type of video connector which you can use is the Bayonet Neill-Concelman (BNC) connectors. The
Bayonet is the locking mechanism present in the connector. Paul Neill and Carl Concelman designed the
connector. BNC connectors are usually used to send higher-end and composite videos.
Mini-DIN connectors are used to send Separate (S) videos. There are various models of Mini-DIN connectors
available. These models are based on the number of pins in the connectors such as Mini-DIN-4 (with 4 pins),
Mini-DIN-7 (with 7 pins), and Mini-DIN-9 (with 9 pins).

SATA devices require distinct connectors and cables. There are two types of SATA connections present on the
motherboard; internal SATA and external SATA (eSATA). The internal SATA connector is an L-shaped connector.
The eSATA connector is a square shaped connector.

USB connectors are present on the back side of the motherboard. Usually, there are four USB interfaces
available. USB 1.1, USB 2.0, and USB 3.0 are the different types of USB connections. USB 1.1 and USB 2.0
connectors are black in color. USB 3.0 connector is blue in color.

Firewire or IEEE 1394 connectors provide power supply to the motherboard. They are large connectors available
in different types such as six-pin Alpha powered connector, four-pin Alpha unpowered connector, and 800
megabit nine-bit Beta connector.

In the earlier days, to connect the mouse and keyboard on IBM PS/2 computers, PS/2 connectors were used.
Purple colored connectors were used for keyboards and green colored connectors were used for mouse.
Nowadays, USB is used for the peripheral devices instead of PS/2 connectors.

You can use adapters and converters to connect audio, video, peripheral, and network devices to the
computers. Adapters and converters provide a consistent and common platform across all types of devices and
connections. You can convert the following signals using the adapters/converters:

• Video signals from DVI to HDMI

• USB A connections to USB B connections

• USB to Ethernet on laptops to enable wireless connectivity

• DVI to VGA

• Thunderbolt to DVI

• PS/2 to USB

• HDMI to VGA

1.12 INSTALL AND CONFIGURE COMMON PERIPHERAL DEVICES.


(Input devices (Mouse, Keyboard, Scanner, Barcode reader, Biometric devices, Game pads, Joysticks, Digitizer,
Motion sensor, Touch pads, Smart card readers, Digital cameras, Microphone, Webcam, Camcorder, MIDI
enabled devices), Output devices (Printers, Speakers, Display devices), Input & Output devices(Touch screen,
KVM, Smart TV, Set-Top Box))
There are various types of input devices available such as mouse, keyboard, scanner, barcode reader, biometric
devices, game pads, joysticks, digitizer, motion sensor, touch pads, smart card readers, digital cameras,
microphone, webcam, camcorder, and Musical Instrument Digital Interface (MIDI) enabled devices.

The following table lists the requirements to install and configure the input devices.

Input Device Installation/Configuration

Mouse USB or a wireless link to a USB interface

Keyboard/biometric reader/gamepad/ USB connector


joystick/digitizer/motion sensor/touchpad/smartcard
reader/digital camera/

Scanner USB connector or 802.11 wireless link

Barcode reader Serial or USB connection, 802.11 wireless link

Microphone Analog microphone – Tip Ring and Sleeve (TRS)

Digital microphone – USB

Webcam USB connector or 802.11 wireless link


Camcorder USB or Firewire

MIDI device Traditional MIDI – 5-pin DIN connector

Modern MIDI - USB, Firewire, or Ethernet connection

There are different types of output devices such as printers, speakers, and display devices. You can connect
printers directly with the help of USB connectors or through a wireless link. You can also use Infrared and
Bluetooth for printer connectivity.

Speakers can be connected using a TRS jack. Display devices can be connected using USB connectors or
expansion cards. There are some devices that act as input and output devices such as touch screen, Keyboard,
Video, and Mouse (KVM), smart TV, and set top box. These devices require USB connectors or wireless
connections.

1.13 INSTALL SOHO MULTIFUNCTION DEVICE / PRINTERS AND CONFIGURE


APPROPRIATE SETTINGS.
(Use appropriate drivers for a given operating system (Configuration settings (Duplex, Collate, Orientation,
Quality)), Device sharing (Wired (USB, Serial, Ethernet), Wireless (Bluetooth, 802.11(a, b, g, n, ac),
Infrastructure vs. adhoc), Integrated print server (hardware), Cloud printing/remote printing), Public/shared
devices (Sharing local/networked device via Operating System settings (TCP/Bonjour/AirPrint), Data privacy
(User authentication on the device, Hard drive caching)))

Nowadays, multifunction devices can perform many tasks. They can print, scan, fax, copy, and connect to
networks. Small Office Home Office (SOHO) can have multifunction devices that can work without huge servers.
You must know the correct way of installing and configuring multifunction devices. Every operating system has
its own set of drivers for the devices. The device drivers for 32-bit and 64-bit operating systems differ in many
aspects. The multifunction devices have different print settings such as:

• Duplex: In this setting, the printer prints on both sides of the paper simultaneously.

• Collate: This setting is useful to print many copies of a document that has multiple pages. In this, the
printer prints the pages and then automatically places the pages in sequential order.

• Orientation: This setting prints the document either in a portrait or landscape mode.

• Quality: This setting prints the document in either black and white or color mode.
You can use the USB connectors to connect the printer or the multifunction device to the computer. USB A
connector is on the computer and the USB B connector is at the back of the printer. You can also connect the
printer to the network using Ethernet RJ45 connection. Printers can be connected through wireless connections
using Bluetooth or 802.11 a/b/g/n/ac connections.

The new multifunction devices support cloud based printing. This style of printing is also known as remote
printing. You can print any document from any remote location using the Transmission Control Protocol (TCP) in
Windows operating system. Apple systems use the Bonjour protocol for remote printing. Apple mobile devices
such as iPad, iPhone, which has iOS operating system, use the AirPrint protocol to facilitate remote printing.

Proper authentication of printers in the network must be done to protect the data. Only authorized users must
be given the access rights to print in the network. The printers usually have a cache memory of its own to queue
up the pending print jobs. This memory must be deleted once the print operation is over. Else, sensitive and
critical data’s privacy might get affected in the network.

1.14 COMPARE AND CONTRAST DIFFERENCES BETWEEN THE VARIOUS PRINT


TECHNOLOGIES AND THE ASSOCIATED IMAGING PROCESS.
(Laser (Imaging drum, fuser assembly, transfer belt, transfer roller, pickup rollers, separate pads, duplexing
assembly, Imaging process: processing, charging, exposing, developing, transferring, fusing and cleaning),
Inkjet (Ink cartridge, print head, roller, feeder, duplexing assembly, carriage and belt, Calibration), Thermal
(Feed assembly, heating element, Special thermal paper), Impact (Print head, ribbon, tractor feed, Impact
paper), Virtual (Print to file, Print to PDF, Print to XPS, Print to image))

There are various print technologies present such as laser, inkjet, thermal, impact, and virtual. Each of these
technologies has their associated imaging processes.

Laser printers

Laser printers are complex devices that provide high quality output at a faster rate. It requires high voltage and
ample amount of memory. Laser printers have the following components/mechanisms:

• Imaging drum: It is one of the major components of the laser printer. It is a photosensitive drum that
spins around inside the printer.

• Fuser assembly: It is a component that applies heat and pressure to enable printing.
• Toner cartridge: In color laser printers, there are four different colors such as cyan, yellow, magenta,
and black. The toner cartridge produces the required colors.

• Transfer belt: This component transfers the content onto the paper from the toner cartridges.

• Rollers: This rubbery type component picks up single page at a time from the document and sends it to
the printer.

• Separation pad: This component pulls the top most paper from the paper tray and sends it to the
printer. It does not send all the papers at one time. It is an inexpensive component and can be replaced
on wear and tear.

• Duplexing assembly: This mechanism helps to print on both sides of the paper without manual
intervention. It is built into the bottom part of the paper tray.

The laser printing involves seven phases :

1. Processing: In this phase, the entire page that needs to be printed is stored in the memory of the printer.

2. Charging: In this phase, the wire inside the printer sets a negative electrical charge to the imaging drum to
enable the drum to spin around.

3. Exposing: In this phase, the actual printing/writing of the content on to the drum takes place.

4. Developing: In this phase, the toner from the cartridge is applied on to the imaging drum.

5. Transferring: In this phase, the toner is transferred on to the paper.

6. Fusing: In this phase, the heat and pressure is applied on to the toner to enable printing.

7. Cleaning: In this phase, the imaging drum is cleaned to facilitate the next set of printing process.

Inkjet printers

Inkjet printers use ink drops to print the content on the paper. It is also called ink dispersion technology printer.
It is an inexpensive and quiet printer. One of the limitations of using this type of printer is the cost of the ink.
The ink used in this printer is inexpensive and fades quickly over time. The ink clogs very easily. It is
recommended to calibrate the printer. The calibration process will ensure high quality output without the colors
overlapping on each other.
The following are the main components of an inkjet printer:

• Ink cartridge: The ink comes from the ink cartridge. It consists of different colors of ink.

• Print head: It allows the printer to interact with the ink cartridge.

• Roller: The feed roller pulls the paper from the paper tray and sends it to the printer.

• Carriage: The cartridge is placed inside the carriage.

• Belt: It is used to pull the carriage back and forth while printing.

Thermal printers

A thermal printer prints with the help of heat. It does not use ink or toner. The page that needs to be printed is
heated and the page turns black. The printing takes place with the help of the heating element. Thermal printer
is a quiet printer but it is sensitive to heat and light. The feed assembly component inside the printer pulls up
the paper and sends it to the printer. You require a special kind of thermal paper for thermal printers. You
cannot use normal papers for printing. The thermal paper is coated with a special type of chemical that becomes
black when it gets heated. The content is then printed.

Impact printers

Dot matrix printer is a type of impact printer. The impact printer directly creates a literal impact on the paper.
The tiny pins inside the print head push through a ribbon and hit the paper to create an impression. This creates
sufficient noise while printing. The ink used in impact printers is not as expensive as other types of printers. A
dot matrix printer has a single print head. The ink comes from the printer ribbon, which is a fabric ribbon
bundled up inside the cartridge. The tractor feed mechanism provides the continuity of paper while printing. In
an impact printer, single sheets of paper are not provided. Long and continuous sheets of paper with
perforations between the sheets are provided.

Virtual printers

Nowadays, you can have virtual printing instead of physical printing. In virtual printing, the output is going to be
stored in a file on the computer. You can send the virtual outputs over the network to any remote location or
user. There are different ways to virtually print the output such as:

• Print to file: You can print the output to a file. The print driver has an option to print the output to a file
in a specific print language.

• Print to PDF: You can print the output to a Printable Document Format (PDF) that is compatible across
multiple operating systems.

• Print to XPS: XPS is XML Paper Specification. It is somewhat similar to PDF. You can print the output to
XPS in Windows operating system. You need an XPS driver to print the output.

• Print to image: You can print the output in the graphics format. This option is not available in the print
driver. It is built into the application itself. You can edit the image and send it across the network.

1.15 GIVEN A SCENARIO, PERFORM APPROPRIATE PRINTER MAINTENANCE.


(Laser (Replacing toner, applying maintenance kit, calibration, cleaning), Thermal (Replace paper, clean
heating element, remove debris), Impact (Replace ribbon, replace print head, replace paper), Inkjet (Clean
heads, replace cartridges, calibration, clear jams))

The following tasks are included in the maintenance of laser printers:

• Cartridge replacement: The printer sends out warning messages when the ink in the cartridge needs
replacement. You can replace the toner cartridge after unplugging the printer from the power sources.

• Maintenance kits: The laser printer manufacturers develop the maintenance kits that include all the
components that require standard maintenance. Components such as feed rollers and fuser kits are
included in the kit.

• Printer calibration: This task allows the color densities to be adjusted based on the requirement of the
output.

• Printer cleaning: You can clean the printer using a damp cloth or some cold water. The dust
accumulated inside the printer can be cleaned using a specialized toner vacuum.

The following tasks are included in the maintenance of thermal printers:


• Thermal paper replacement: It is very easy to replace the thermal paper just like how you do it in
another printer. You should keep the thermal paper in stock because thermal printers will not work with
normal papers.

• Heating element cleaning: The heating element is a long piece of metal. You can clean it with Isopropyl
Alcohol (IPA).

• Debris removal: You must remove the residue generated by the thermal paper from the printer. You can
blow air inside the printer and remove the dust or use a specialized vacuum cleaner to clean the printer.

The following tasks are included in the maintenance of the impact printers:

• Ribbon replacement: When the ink gets over in the ribbon, the print is not clear. You can replace the
worn out ribbon with a new one.

• Print head replacement: You can replace the print head when you replace the printer ribbon. The print
head becomes very hot and you must be careful while replacing it.

• Tractor fed paper replacement: You must insert long and continuous sheets of paper in the tractor feed
component.

The following tasks are included in the maintenance of inkjet printers:

• Cleaning print heads: You must clean the print heads regularly to remove the clogging caused by the
ink. You can use IPA and carefully clean the print head.

• Replacing inkjet cartridges: You can pop out the faded cartridge and pop in the new cartridge once the
ink is over.

• Calibrating printer: The printer performs the calibration process on replacing the cartridge. It is an
automatic process. You can also perform the calibration process manually.

• Clearing jams: Paper jams are very common in inkjet printers. You must remove the paper from the tray
and insert it all over again to clear the jam.
CHAPTER 2 – NETWORKING
2.1 IDENTIFY THE VARIOUS TYPES OF NETWORK CABLES AND CONNECTORS.
Fiber

Fiber is a type of cable which uses pulses of light to transmit information. It consists of several extremely thin
strands of glass or plastic threads which are covered with multiple layers of protective covering. These fibers
guide the light that pass through them with minimal loss. Each end of the fiber cable is terminated with optical
fiber connectors. These connectors help to attach the cable to a transmitter, receiver or another cable.

Some types of fiber optical connectors include:


• SC: Uses pull-push latching mechanism. It has a 2.5 mm ferrule. Also known as “snap and click”.
• ST: Uses twist-lock mechanism. It has a 2.5 mm ferrule. It is reliable and durable.
• LC: Developed by Lucent Technologies. It has a 1.25 mm ferrule which makes it ideal for high-density
applications.

Twisted Pair

Twisted pair is a type of cable in which two insulated wires are twisted together to reduce crosstalk and
electromagnetic interference. There are two types of twisted pair cables – Shielded Twisted Pair (STP) and
Unshielded Twisted Pair (UTP). STP cables are used in telephone networks to reduce signal interference. UTP
cables are commonly used in Ethernet installations.

A few types of twisted pair cable connectors include:


• RJ-11: It is a Six Position Four Contact (6P4C) connector. It is used to connect telephone equipment.
• RJ-45: It is an Eight Position Eight Contact (8P8C) connector. It is used in Ethernet cables and networks.

The two main wiring standards used for RJ-45 are T568A and T568B. Both provide four pairs of twisted cables
which are color-coded. The four colors used are blue, orange, green and brown. Each twisted pair is made up of
a solid-colored wire and a wire of the same color which is striped with white. The order of the colors is different
in these two standards. T568A is backward compatible with both one-pair USOC and two-pair USOC wiring
scheme. T568B is backward compatible with only one-pair USOC.

Coaxial

Coaxial is a type of cable that consists of an inner wire surrounded by an insulated layer which in turn is
surrounded by a concentric conducting tube. It is termed “coaxial” because both the conducting channels run
along the same axis. It can be used to carry information to long distances when placed in an outer insulating
sheath.
It is less susceptible to electrical and radio frequency interference. It is often used in the cable TV industry.
A few types of coaxial connectors include:
• F-connector: Used in customer premises to connect TV with antennas and set-top boxes .It is a 75 Ω
connector which comes in both threaded and unthreaded forms.
• BNC: Bayonet Neill–Concelman connector. It is a radio frequency connector that has a center pin
surrounded by a metal tube. The center pin and the metal tube are connected to the center cable
conductor and the outer shield, respectively. It is widely used in amateur radio antennas and aviation
electronics.

2.2 COMPARE AND CONTRAST THE CHARACTERISTICS OF CONNECTORS AND CABLING.

Fiber

Types of cables Features


Single mode cable • Narrow diametric core
• Allows only one mode of light to propagate
through it
• Very low signal attenuation
• Signal can travel longer distances
• Used for TV broadcasting and
telecommunications
Multi-mode cable • Large diametric core
• Allows multiple modes of light to propagate
through it
• High signal attenuation
• Ideal for short distance transmission
• Used in LAN systems and audio-video
applications.

Twisted Pair

Types of cables Features


STP • Is surrounded by a metal shield which
decreases electrical interference
• Durable
UTP • Is surrounded by PVC or plenum coating which
does not help in decreasing interference
CAT3 • Can transmit data up to 10 Mbps speed
CAT5 • Can transmit data up to 100 Mbps speed
CAT5e • Can transmit data up to 1 Gbps speed
CAT6 • Can transmit data up to 10 Gbps speed up to a
distance of 55 meters
CAT6e • Can transmit data up to 10 Mbps speed up to a
distance of 10 meters
CAT7 • Can transmit data up to 10 Mbps speed up to a
distance of 10 meters
• Every pair of wire is shielded

UTP and STP can be categorized based on the outer sheath used – Plenum and PVC. PVC is less expensive and
commonly used. Plenum is used in plenum spaces of buildings. It offers great resistance to fire.

A splitter is a small device which is used to split an existing single cable to provide two active connections. It
saves the cost of running a new cable.

Coaxial

Types of cables Features


RG-6 • Inner conductor is of large diameter
• Thick rubber shielding
• Offers higher bandwidth
• Ideal for long distance transmission
• Used in satellite receivers
• Can be used for high-speed transmission
• Not ideal for applications which operate at
frequencies below 50MHz
RG-59 • Inner conductor is of small diameter
• Ideal for short distance transmission
• Can be used for applications which operate at
frequencies below 50MHz
• Used for transmitting video signals
• Not ideal for high-speed transmission

A coaxial cable splitter looks like a “Y” or a “T”:. A splitter takes one input and provides more than one output
that can be used in multiple devices. Usage of a cable splitter degrades the quality of signal being transmitted.
For example, a TV signal splitter can be used to split one input signal to multiple output signals that can be used
as input to multiple televisions. This splitting causes the signal to become weak.

There are a few types of coaxial splitters available such as three-way splitter, four-way splitter, switch splitter,
high frequency splitter, and low frequency splitter.

2.3 EXPLAIN THE PROPERTIES AND CHARACTERISTICS OF TCP/IP.


IPv4 vs. IPv6

IPv4 IPv6
• 32-bit addressing • 128-bit addressing
• Mandatory header length is 20 bytes • Header length is 40 bytes
• Is divided into five classes (A to E) • Is classless
• Less secure • Offers encryption and authentication services

Public vs. private vs. APIPA/link local

• Public: Are globally unique IP address which can be accessed through the Internet. They belong to class
A, B and C addresses.
• Private: Are reserved addresses which can be assigned to devices that do not access the Internet
directly. Devices using private addresses are connected to a LAN. It is assigned by a router or a user.
Address translation methods such as NAT (Network Address Translation) and PAT (Port Address
Translation) must be used to provide Internet access to the hosts that have assigned private addresses.
• APIPA (Automatic IP Addresses): Is a feature supported by Windows-based operating systems where a
host automatically assigns itself a reserved private class B address. It saves the process of manually
assigning IP addresses in case of unavailability of DHCP (Dynamic Host Configuration Protocol).

Static vs. dynamic

• Static: A permanent IP address assigned to a device. It implies that a device with static IP address always
uses the same IP address to connect to the Internet. It should be manually configured. It is assigned by
an ISP. Static IP address provides great speed and reliability. It is ideal for web servers and email servers.
• Dynamic: A temporary IP address which is automatically assigned to a device. When a device connects
to a network, the DHCP server chooses an address from a pool of available addresses and assigns it to
the device. It provides security as it is difficult to trace a device based on a temporary IP address. It
supports reusability of IP addresses thereby, increasing the number of devices that can be connected to
the network.

Client-side DNS settings

Domain Name System (DNS) is a hierarchical naming system which translates user-friendly domain names to
numerical IP addresses. A DNS client machine must execute a set of dynamic library routines called “DNS
resolver” to resolve the IP address queries. A resolver initiates and sequences the DNS queries to translate a
domain name into an IP address. The first step to configure client side DNS is to create resolve.conf file. Every
client must have a resolve.conf file. The resolver searches in resolve.conf file for the name of servers. It then
sends a query package to those servers. These servers provide information about the required domain name.
The next step is to enable the device to use DNS. This is done based on the type of naming service specified in
nsswitch.conf file. The options for naming services are NIS, NIS+ and DNS files. After the nsswitch.conf file, the
client is fully enabled to use DNS.

Client-side DHCP

Configuring a device to obtain its IP address dynamically is a simple process. While configuring the IP address of
your machine, you have to choose the option, ‘Obtain an IP address automatically’. When a DHCP client
connects to the network, it sends a request for an IP address to all the DHCP servers in the connected networks.
All the DHCP servers offer an address to the client. The client accepts one of the offers that usually is the first
offer. This address is reserved by the server until it receives a formal request from the client. The client sends a
formal IP address request that is confirmed by the DHCP server.
Subnet mask vs. CIDR

Subnets help in logically organizing a network into groups. The process of dividing and grouping a network is
called subnetting. Subnetting improves security and performance of a network.

An IP address consists of two components – the network address and the host address. It is a 32-bit number
which enables easy identification of networks. Subnet mask splits the address into two parts – extended
network address and the host address. The leftmost bits (network bits) in a valid subnet mask must be set to 1
and the rightmost bits (host bits) must be set to 0.

Classless Inter-Domain Routing (CIDR)

CIDR is a method to represent IP addresses and the routing mask. It allows you to specify the number of bits
that represent network routing. For example, the IP address 192.160.0.14 with a netmask 255.255.255.0 can be
represented in CIDR as 192.160.0.14/24. This indicates that 24 bits are used for the network portion.

Gateway

Gateway is a network node that connects two networks, both of which use different protocols. Tasks performed
by a gateway include:

• Protocol conversion
• Traffic inspection and filtering
• Signal translation
• Fault isolation

2.4 EXPLAIN COMMON TCP AND UDP PORTS, PROTOCOLS, AND THEIR PURPOSE.
Ports

A port is a communication endpoint that is identified by a number, called as the port number. A port number is a
16-bit integer that ranges from 0 to 65535.

A few different types of port number and their associated purposes include:

• 21 – FTP: It is the port that is used by FTP clients to establish a session with an FTP server. This port is
only for connection control. After the FTP server responds and the session gets established, the files are
not sent through this port.
• 22 –SSH: It is the port that is used by Secure Shell (SSH) servers to listen for connection requests.
• 23 – TELNET: It is the port that is used by Telnet applications.
• 25 – SMTP: It is the port used by SMTP applications to route emails.
• 53 – DNS: It is the port used by DNS clients and servers to exchange domain related information.
• 80 – HTTP: It is the most commonly used port to browse the Internet.
• 110 – POP3: It is the port used to collect emails from a server.
• 143 – IMAP: It is the port used by clients to access emails on a remote IMAP server.
• 443 – HTTPS: It is port used for communication by SSL encrypted connections.
• 3389 – RDP: It is the default port used by Microsoft applications for remote desktop connections.
• 137 – 139, 445 – SMB: These ports are used by NetBIOS protocol to search for other computers in a
network.
• 548 or 427 – AFP: It is the port used by AFP applications in Mac OS.

Protocols

• DHCP: It is a network protocol used by the DHCP server that dynamically provides configuration
parameters for the devices attached to the network.
• DNS: It is the protocol used by the DNS messages. The three types of DNS messages include queries,
replies, and updates.
• LDAP: It is a software protocol used to access and maintain directory information services about
organizations, individuals, files and servers in a network.
• SNMP: It is the protocol used in network management to configure and monitor devices such as servers,
switches, routers and hubs in a network.
• SMB: It is a file sharing protocol that enables the clients in a network to access the files in a server.
• CISF: It is a file sharing protocol that works on the client-server model. It is a variation of SMB protocol.
• SSH: It is a cryptographic network protocol that provides strong authentication and encryption. It
provides secured services in an unsecured network.
• AFP: It is a proprietary protocol that offers file transfer services and was initially used in Mac OS.

TCP vs. UDP

TCP UDP
• Connection-oriented protocol. • Connectionless protocol.
• Data transfer is slower than UDP. • Faster.
• Highly reliable. • Not so reliable.
• Data is received in the same order in which it • Data packets may be lost in transmission.
was sent.
• Header size is 20 bytes. • Header size is 8 bytes.
• True streaming protocol. No distinguished • Packets are distinguished with definite
data blocks used for transmission. boundaries.
• To initiate and set up a connection, TCP uses • No such set up is required. It is a simple
three packets. protocol.
• Does error checking. Retransmits erroneous • Does error checking. Discards erroneous
packets. packets.
• Has an acknowledgement segment. • No acknowledgement segment.
• Implements flow control method. It does not • Does not adopt flow control method.
transfer data until the previously transferred
data has been received successfully.
• Used in applications that need high reliability. • Used in time-sensitive applications.
2.5 COMPARE AND CONTRAST VARIOUS WIFI NETWORKING STANDARDS AND
ENCRYPTION TYPES.

Standards

The 802.11 standards are a set of specifications developed by IEEE (Institute of Electrical and Electronics
Engineers) for Wireless Local Area Network (WLAN) communication. It was first developed in 1997 and was
subsequently revised. The various versions include 802.11a, 802.11b, 802.11g, 802.11n and 802.11ac.

o 802.11:

• Was developed in 1997


• Offers a network bandwidth of 2 Mbps
• Transmits in 2.4 GHz band

o 802.11a:

• Is an extension to 802.11
• Offers a network bandwidth of 54 Mbps
• Transmits in 5 GHz band

o 802.11b:

• Is an extension to 802.11
• Offers a network bandwidth of 11 Mbps
• Transmits in 2.4 GHz band

o 802.11g:

• Used for short distance transmissions


• Offers a network bandwidth of 54 Mbps
• Transmits in 2.4 GHz band

o 802.11n:

• Uses Multiple Input Multiple Output (MIMO) technology to enhance the bandwidth supported
• Offers a network bandwidth of up to 300 Mbps
• Transmits in 2.4 GHz or 5 GHz band

o 802.11ac:

• Uses eight spatial streams of MIMO technology to enhance the speed


• Offers a network bandwidth up to 1.3 Gbps
• Transmits in 5 GHz band

Encryption Types
The encryption protocol used to protect a network determines its level of security. These protocols protect the
network from external unauthorized access as well as encrypt the outgoing data. A few such protocols include
WEP, WPA, WPA2, TKIP, and AES.

• WEP:
WEP is an outdated security protocol that has been established later as the most vulnerable protocol. It
is a 40-bit encryption standard which can be easily attacked.

• WPA:
WPA is an intermediate standard introduced to replace WEP. It implements Temporal Key Integrity
Protocol (TKIP) to protect message integrity. There are two versions of WPA available – WPA-P (WPA-
Personal) and WPA-E (WPA-Enterprise). Small networks such as home networks use WPA-P. It uses Pre-
Shared Key (PSK) for authentication. Large networks use WPA-E which uses RADIUS server for
authentication.

• TKIP:
TKIP is a type of encryption used for wireless networks. It was a temporary protocol to improvise and
replace WEP. Though it was more secure than WEP, it later became prone to security attacks.

• AES:
AES is an encryption specification developed by Joan Daemen and Vincent Rijmen. It was originally
called Rijndael. It has three ciphers with different key lengths: 128, 192 and 256 bits. It uses symmetric-
key algorithm where the same key is used for encryption as well as for decryption. It is considered very
secure and has been adopted by the U.S government.

2.6 GIVEN A SCENARIO, INSTALL AND CONFIGURE SOHO WIRELESS/WIRED ROUTER


AND APPLY APPROPRIATE SETTINGS.

Channels

Small Office / Home Office (SOHO) is a type of LAN designed for small businesses and homes. SOHO routers are
used by the computers to access Internet and other resources in the network.

The 802.11 workgroup has legally allowed five frequency ranges to WLAN channels namely 2.4 GHz, 3.6 GHz, 4.9
GHz, 5 GHz, and 5.9 GHz bands. These bands are divided into a range of channels. The range is from 1 to 14. The
default wireless channel for WLAN is 6.

The protocol indicates that a separation of three to four channels is ideal to prevent interference from
overlapping.

NAT / DNAT

Network Address Translation (NAT) translates a single IP address assigned to a network into multiple global IP
addresses that can be used for multiple devices in the network. It also provides security by translating the real IP
address of the source device on a packet to a global address before the packets are forwarded to external
networks.
There are two types of NAT – Static and dynamic. Static NAT performs a one-to-one mapping of the real IP
address to the global address. It is a permanent mapping of a real IP address to a global address and the
mapping does not expire after the session. The number of global addresses available must be equal to or greater
than the number of internal devices intended to be present in the network. Static NAT uses IP addresses to
forward the packets to the corresponding internal device. When an internal device requests for a connection
outside the network, Dynamic NAT (DNAT) assigns a global address to the internal device from a pool of
reserved global addresses. It can be used when the number of public IP addresses available is less than the
number of users inside the network.

Port forwarding, port triggering

PAT (Port Address Translation) is a type of NAT. PAT maps the real address and source port of a device in the
network to a mapped address and a unique port. When an external host sends a packet to the internal device,
PAT routes or forwards the packets based on the unique port number. This is called port forwarding. This is done
to facilitate the hosts, which reside outside a protected network, to access services from devices inside the
protected network.

Port triggering is a division of port forwarding where access to services inside the network is provided
dynamically to hosts that are outside the network. With port triggering, whenever there is an outbound traffic
from a host H1 in the network on predetermined ports, the inbound traffic on specific ports get automatically
forwarded to host H1 that initiated the traffic.

DHCP

The DHCP option in the wireless router configuration can be set to ON or OFF based on the requirements of the
network. If turned ON, it allows the DHCP server to automatically assign IP addresses and domain settings to the
devices in the network. When the DHCP option is turned OFF, the IP address of the devices in the network have
to be manually configured.

DMZ

DMZ is a zone that lies between a secured network and an unsecured public Internet. The hosts that are
vulnerable to attacks in a network are separated from the protected network and placed in DMZ. Even if the
security of these vulnerable hosts is compromised, the rest of the devices in the network remains protected.

The connectivity between the hosts in the DMZ and the protected network is restricted as the hosts in the DMZ
are vulnerable. Similarly, the connectivity between the hosts in DMZ and the Internet is also restricted so that
these hosts do not get attacked easily. Web servers, Email servers and DNS servers are the common servers that
are placed in DMZ.
Basic QoS

The Quality of Service provided by the router can be modified according to your needs. The priority can be
configured based on applications, MAC address or physical ports in the routers.

Firmware

Firmware refers to a component inside the router. The firmware provides routing, control and monitoring
functionality as well as methods to ensure that the network is reliable and secure.

UPnP

UPnP (Universal Plug'n'Play) is a protocol that facilitates applications running on a host to automatically
configure port forwarding on the NAT-enabled router. This poses as a great security risk to the network.

2.7 COMPARE AND CONTRAST INTERNET CONNECTION TYPES, NETWORK TYPES, AND
THEIR FEATURES.

Internet Connection Types

The method used to connect to the Internet has evolved based on the technology used and the requirement for
speed. Some types of Internet connection methods include cable, DSL, Dial-up, fiber, satellite, ISDN, cellular, and
line of sight wireless Internet service.

o Cable:
• The technology to provide last mile access to the Internet is integrated into the infrastructure of
cable TV.
• It provides broadband Internet access.
• It requires a modem at the customer premises which is connected using a coaxial cable.
• Offers fast access to the Internet. Speed ranges from 512 kbps to 20 Mbps.

o DSL:
• The Internet access is provided through telephone lines.
• It provides broadband Internet access.
• It requires a cable modem at the customer premises that is connected using copper telephone
wires.
• Offers fast access to the Internet. Speed ranges from 512 kbps to 20 Mbps.

o Dial-up:
• The Internet access is provided through telephone lines.
• It provides analog Internet access.
• It requires a modem connected to the computer that dials a number to connect to the Internet. It
also converts the digital signals from the computer to analog signals before transmission.
• Data is transmitted through analog network.
• Speed ranges from 2400 bps to 56 Kbps.

o Fiber:
• The Internet access is provided through fiber optic cables.
• It provides broadband Internet access.
• It requires a modem at the customer premises that is connected using fiber optic cables.
• Offers fast access to the Internet. Speed ranges from 500 Mbps to 1 Gbps.

o Satellite:
• The Internet access is provided using geostationary satellites.
• It provides broadband Internet access.
• It requires an antenna with transceiver and a modem at the customer premises to receive the
satellite signals.
• Latency of signal is high. It implies that the time taken for the signal to travel from the earth to the
satellite and back to the earth is more. This makes it less suitable for applications that require real-
time responses.
• Speed ranges from up to 50 Mbps.

o ISDN:
• The Internet access is provided through telephone cables.
• It provides broadband Internet access.
• It requires a modem and ISDN adapter at the customer premises.
• Offers fast access to the Internet. Speed is around 128 kbps.

o Cellular
• The Internet access is provided through cellular phone towers.
• It provides broadband Internet access.
• Tethering is a technology that allows cellular phones or tablets to share the Internet connection
with other devices. The connection can be shared using Bluetooth, Wi-Fi, or using a cable.
• Tethering done with the help of Wi-Fi connection is called mobile hotspot. The cellular phone or
tablet acts as a router and enables other devices to connect to the Internet.

o Line of sight wireless internet service


• The Internet access is provided through microwave towers. Requires a clear line of sight from the
provider’s facility to the customer premises.
• It provides broadband Internet access.
• It requires a modem and an antenna at the customer premises. Modem and antenna are connected
using coaxial cables.
• Offers fast access to the Internet. Speed ranges around 256 kbps to 10 Mbps.

Network Types

A network is a group of devices that are linked together using communication paths to exchange data. The
devices in a network can be connected using several methods that determine the type of network. A few types
of network include LAN, WAN, PAN and MAN.
LAN

LAN is a group of devices that are physically confined to a small area such as a room, building or a premise. The
devices in a LAN are connected to switches. A router in the LAN enables the devices to connect to the Internet.

Based on topology, LANs can be of various types such as, ring, bus, mesh, star and hybrid. This classification is
done based on the layout of cables that are used to connect the devices in a LAN.

The devices in a LAN can be connected using twisted pair cables, coaxial cables, fiber optic cables or wireless
media. Coaxial cables and wireless media are the most common methods used for connection of devices.

WAN

WAN is a group of one or more LANs that can extend over a large geographical area. Routers are used to
establish connection between two or more LANs. Leased lines can be used to connect the routers of each LAN.
WAN connection can also be established using circuit-switched lines, fibers or wireless media. The transmission
speed in WANs ranges from 1 Gbps to 100 Gbps.

PAN

PAN is a network established between the personal devices such as a cellular phone, tablet or laptop. The
connection between these devices can be established using Infrared light, Bluetooth or wireless media.
Connection using Infrared light has become outdated.

MAN

MAN is a network of LANs that are geographically in proximity with each other. It is a network that is larger to be
implemented using LAN, and smaller for a WAN. Typical examples where MANs are used include University
campus or two branches of an organization located in the same city.

2.8 COMPARE AND CONTRAST NETWORK ARCHITECTURE DEVICES, THEIR FUNCTIONS,


AND FEATURES.

A network is built using several devices that are individual building blocks required to design and deploy the
network. A few of such devices include:

o Hub
Hub is a simple device that connects devices to each other in a LAN. It can contain several ports and can
be stacked to increase the number of ports. Stacking of hubs can be done by connecting a port of a hub
with another hub. When a hub receives a frame in one of its ports, it is blindly copied to all the other
ports on the hub. This causes bandwidth wastage of ports.
o Switch
Switch is a multiport network device that connects devices in a network. In contrast to a hub that
broadcasts the frames to all ports, a switch reduces the broadcasting of traffic by implementing learning
and forwarding.

When a frame arrives in a port, the switch looks up the MAC address table. If an entry is found in the
table, the switch forwards the frame to one or multiple ports based on the MAC entry. The switch also
learns the source MAC address of the received frame and adds an entry into the MAC address table. If
an entry is not found in the MAC address table for the received frame, the frame is flooded to all the
ports of the LAN.

o Router
Router is a multiport network device that is used to connect two networks. It operates at Layer 3 of the
OSI model. When a packet arrives, it looks up the routing table based on the IP address that provides the
next hop for reaching the destination. The router creates and maintains the routing table with the
available routes and distance using the routing protocol. The information in this table is used to
determine the best route to forward a packet.

o Access point
Access point is a network device that interconnects the users in a WLAN (Wireless LAN). It can also act as
a device to connect WLAN users with a fixed wire network. A WLAN network will need one or many
access points depending on the number of users, the size or the area that the network needs to cover.

o Bridge
Bridge is a network device that connects two LANs together that use the same communication protocol.

o Modem
The modem performs modulation and demodulation. The computers can communicate with each other
on a twisted pair or telephone line using the modems. The digital signals from the computer is
modulated to analog and carried over the physical medium and demodulated back to digital signals by
the modem on the other side.

o Firewall
Firewall is an application that protects a network from malicious intrusion. It is usually built into the
router in a network.

o Patch panel
Patch panel is a box which connects incoming and outgoing coaxial, twisted pair or fiber cables.

o Repeaters / Extenders
Repeaters or extenders are devices that are used to amplify the strength of wireless signals.

o Power over Ethernet (PoE)


It is a technology which uses a device called power line Ethernet bridge to enable transmission of
Ethernet frames through power lines.

o Power over Ethernet injector


It is a technology that uses certain twisted pair cables to carry power for supplying power to devices that
are placed far away from a traditional power source.

2.9 GIVEN A SCENARIO, USE APPROPRIATE NETWORKING TOOLS.

Crimper
Crimper is a tool that is used to fix a connector to the end of a cable. There are two types of crimpers namely
RJ45 crimping tool used for twisted pair and compression crimping tool used for coaxial cable.

Cable stripper
Cable stripper is used to remove the outer covering of a cable to reach the inner wire pairs.

Multimeter
A multimeter is a combination of a number of tools such as voltmeter, ohmmeter and ammeter.

Toner generator and probe


A toner generator and probe has two parts – a tone generator and a probing device. When turned on, the tone
generator generates a tone that is sent through the length of the cable. The probing device senses and picks the
tone.

Cable tester
A cable tester is used to verify the wires in a cable to ensure that these are wired appropriately.

Loopback plug
Loopback plug can be connected to the network adapter of a device to simulate a network and ensure that
TCP/IP and the network adapter are functioning properly.

Punch down tool


Punch down tool is used to attach wires to connectors available in the patch panel.

Wi-Fi analyzer
Wi-Fi analyzer is a tool or a smart phone app that is used to get the list of available channels in a wireless
spectrum and to select the best channel to set on the router.
CHAPTER 3 – MOBILE DEVICES
3.1 INSTALL AND CONFIGURE LAPTOP HARDWARE AND COMPONENTS.

Laptops are convenient, portable and compact personal computers. The compact design of laptops restricts the
availability of certain features that are usually found in PCs. However, there are options available to enhance the
functionality of a laptop. Expansion is one of them.

Expansion option

The expansion option allows you to add some extra functionality such as a modem or more memory space.
Expresscards, flash, ports/adapters and SODIIM are some of the other expansion options.

Express card is an interface that enables you to connect additional external devices to the laptop. The
specifications for the slots provided in the laptop and the Express cards that are to be inserted in these slots,
were developed by the Personal Computer Memory Card International Association (PCMCIA). The slots come in
two dimensions namely 34 mm and 54 mm.

Express cards were created to replace PC Card and PC CardBus. Express cards provide better speed and
bandwidth, consume less power and are cheaper than PC Card.The two interconnect technologies used by
Express cards are USB 2.0 and PCI Express (PCIe). Express cards that utilize PCIe 1X can provide a speed of
2.5Gbps per direction. Express cards that utilize USB 2.0 are used for simple applications. These cards can
provide a maximum throughput of 480 Mbps. Express cards operate at voltage levels of 1.5 V and 3.3 V.

Express cards are available in two form factors: Express card /34 and Express card /54.

o Express card /34:


Express card /34 has a length of 75 mm, thickness of 5 mm, and a uniform width of 34 mm. It is
rectangular in shape. It is inserted into the card slot of a laptop along its 34 mm wide portion. Express
card/34 fits into the 34 mm slot as well as well as the 54 mm slot. When Express card /34 is inserted into
54mm slot, the card does not properly fit into the slot. The extra space in the slot causes the card to be
dislodged from the slot. The card may get disconnected or even damaged. The slot may also get
damaged. You can use SlotGuardExpress to prevent this. It is an inexpensive product that can be
inserted into the slot to prevent free movement of the Expresscard.

o Express card /54:


Express card /54 has a length of 75 mm, thickness of 5 mm and a width of 34 mm at the connector end
and 54 mm at the external end. The card is inserted into the card slot along its 34 mm side. These cards
fit only into 54 mm slot. The shape of the card looks like a ‘fat-L’.

o SODIMM
Small Outline Dual In-line Memory Module (SODIMM) is a type of memory module that is used in
laptops, notebook computers and routers. SODIMM is available in various versions based on the number
of pins in it. SODIMMs can be differentiated by the number and position of notches in them. The
memory size offered by SODIMMs varies. The most common are 512 MB and 1 GB. SODIMM can be
easily inserted into the slot available in the laptop. It gets automatically installed once inserted and does
not require any further configuration.

o Flash
Flash is an extended memory that can be inserted in the USB slot of the laptop. It provides additional
portable storage. The data in flash memory can be electronically erased. This property of flash memory
allows it to be reused. Storage of data in a flash memory is easier and faster than in hard drives. There
are two types of flash memories available, namely, the NAND-type and the NOR-type.

o Ports/Adapters
A port is an interface between the laptop and other devices that can be connected to the laptop. There
are a wide variety of ports available in the laptops to connect peripheral devices such as monitors,
printers, speakers, and webcam. The colors of laptop ports are standardized with specific colors for
specific devices. An adapter is the wire that is inserted into the port to establish contact between the
laptop and a peripheral device. Some examples of ports/adapters are:

Thunderbolt:
• Developed by Intel.
• Connects peripheral devices to a computer.
• A single port supports up to six peripheral devices.
• Combines signals from PCIe and Display Port devices into a single serial signal.
• Signals from multiple devices are multiplexed and are transmitted through a single duplex
Thunderbolt lane. These signals are demultiplexed at the other end of the lane.

DisplayPort:
• Developed by Video Electronics Standards Association (VESA).
• Used to transmit audio and video from a source device to a display device.
• Transmits data in the form of packets.
• Capable of transmitting both audio and video signals simultaneously as well as individually.

USB to RJ-45 dongle:


• Used for laptops without RJ-45 ports.
• Connects the USB ports available in laptops to RJ-45 ports.

USB to Wi-Fi dongle:


• Used to provide Wi-Fi networking for laptops without RJ-45 ports.
• Connects the USB ports available in laptops to Ethernet ports.

USB to Bluetooth:
• Used to establish communication between Bluetooth devices and a laptop without a built-in
Bluetooth connectivity.

USB Optical Drive:


• It is an external storage device with an USB interface that can be plugged into the USB port of
the laptop.
Hardware/device replacement

Replacing components in a laptop can be a challenging process as all the components, such as display, keyboard
and network hardware, are integrated in the laptop.

To replace the hardware components, you have to remove the screws, or frames in a few cases, that holds the
component within the device. Then, place the new hardware component and replace all thescrews that were
used to connect the component with the laptop. The replacement procedures of a few components are
explained below.

o Keyboard:
• Remove the screws that attach the keyboard with the laptop carefully.
• Remove the keyboard to spot a thin, wide data cable.
• Remove the data cable that connects the keyboard with the system board at the bottom.
• Connect the data cable of the new keyboard to the system board using the plastic connectors.
• Replace all the screws.

o Hard Drive:
• Remove the screws that attach the cover of the hard drive with the laptop.
• Remove the cover by sliding it.
• Remove the screws that hold the hard drive with the laptop.
• Remove the drive by sliding it.
• Remove the drive from the drive frame.
• Place the new hard drive in the drive frame.
• Replace all the screws.

o DC Jack:
The DC Jack can be replaced by removing the solder that connects the jack with the connector. Replace
it with a new DC Jack and solder it.

o Memory:
• Remove the cover of the memory module and the screws that attach the memory module with the
connector.
• Remove the old memory module by pulling back the latches on both sides of the memory module.
• Insert the new memory module and ensure that it makes a proper connection with the connector.

o Battery:
The Battery can be replaced by removing the old battery bay from the laptop, and then by removing the
battery from the battery bay. Then, replace the battery with a new one and place the battery bay in its
position.

o Touchpad:
Remove the hard drive, RAM and wireless card and CD-ROM. Remove the keyboard. Detach the video,
antenna and touchpad cables from the motherboard. Remove the touchpad from its casing and install
the new touchpad. Place all the components back in their positions.
o Speakers:
Remove the hard drive, battery pack and detach the screen from the body of the laptop without
removing the wires that connect it with the motherboard. Unscrew the speakers and disconnect them.
Connect the new speakers. Place all the components back in their positions.

o System board:
Remove the hard drive, memory, battery, touchpad, speakers and DC Jack. Remove the processor.
Unscrew the motherboard and remove it. Replace it with the new motherboard. Place all the
components back in their positions.

o CPU:
If the CPU is independent of the motherboard, it can be replaced. If it is a built-in CPU, it has to be
replaced along with the motherboard. Remove the laptop’s case, keyboard and display. Unscrew and
remove the graphic card and heat sink of the CPU. Unscrew the CPU and remove it. Insert the new CPU
and screw it. Place all the components back in their positions.

3.2 EXPLAIN THE FUNCTION OF COMPONENTS WITHIN THE DISPLAY OF A LAPTOP.

Types

There are different technologies used in laptop displays. The most common are Liquid Crystal Display (LCD) and
Organic Light-Emitting Diode (OLED).

o LCD:
There are two types of LCDs namely Twisted Nematic (TN) and In-plane Switching (IPS). TN is the more
common type of LCD that is used.

Twisted Nematic In-Plane Switching


• Low response time makes it suitable for game • High response time
applications
• Low manufacturing cost • Low manufacturing cost
• High refresh rates • Low refresh rates
• Limited viewing angles • Wider viewing angles
• High color distortion • Superior color accuracy
• Sharp pictures • Sharp pictures with high contrast

LCDs do not generate their own light. Therefore, LCD screens require illumination to make the display visible.
This illumination is called backlighting. Backlighting can be sourced from an LED or a fluorescent lamp.

Fluorescent lamp LED


• High power consumption • Less power consumption
• Poor color accuracy • Better color accuracy
• Thick panel design • Thin panel design
• Ages faster • Lasts for a long time
• High response time • Low response time

OLED:

• OLEDs are self-illuminating, flat panel screens that are based on organic semiconductors.
• Are thin and weigh less.
• Do not need backlighting.
• Response time of OLEDs is fast.
• Consume more power for screens with white background. Consume less power for black or other colors.
• No color distortion even in wider angles.

Wi-Fi antenna connector/placement:


The wireless antenna is part of the display screen of the laptop.

Webcam:
• Webcams can either be built-in or can be a peripheral device.
• Built-in webcams are placed in the center of the screen’s top edge.
• To replace a built-in camera, detach the screen from the body of the laptop. Unscrew and remove the
LED screen. Remove the camera cable and the camera. Replace it with a new webcam. Place all the
components back in their positions.
• External webcams are connected to the laptop through the USB slot.

Microphone:
• Microphones can be either built-in or an external device.
• Built in microphones are placed as part of the screen.
• To replace a microphone, the microphone cable has to be removed. Then, the microphone can be
replaced with a new one.
• External microphones come as a part of the headphones that can be plugged into the USB slot.

Inverter:
• Inverter is an important component of the LCD screen.
• It converts DC power into AC power to supply power to the LCD screen.
• Failure of the inverter results in a dim display screen.
• To replace the inverter, the stored power in it must be discharged initially.

Digitizer:
A Digitizer is the layer that is present on the screen’s surface in touch screen displays.
It detects the pressure applied when being touched with fingers or stylus. Then it transmits the touch signals to
the processor.
Digitizers can be individually replaced without replacing the display panel.
3.3GIVEN A SCENARIO, USE APPROPRIATE LAPTOP FEATURES.
Laptops offer many technical features that are unique. Some of these features are special function keys, docking
station, physical laptop lock and cable lock, and rotating screens.

Special function keys

The size of a laptop keyboard restricts the number of keys that can be placed on it. Therefore, laptop keyboards
include special function keys to provide laptop-specific functions.

• Dual displays: An additional display device can be connected to the laptop. Function keys can be used to
toggle between the primary monitor and the additional display device.

• Wireless: Wireless adapter can be enabled or disabled using the functional keys that are available in a
laptop keyboard. A few laptops have a separate physical switch to perform this function.

• Volume settings: The volume settings can be changed to increase or decrease the volume using special
function keys.

• Screen brightness: The brightness settings of the display screen can be changed using the functional
keys.

• Bluetooth: Some laptops have built in Bluetooth feature. Bluetooth can be enabled or disabled using the
function keys.

• Keyboard backlight: Some laptops are provided with a backlight under the keyboard. This helps you to
view the keys when you are in a dark area. The keyboard backlight can be enabled or disabled using the
function keys. The brightness of the keyboard backlight can also be adjusted using the function keys.

• Touch pad: Some laptops provide the option of keeping the touch pad on or off. This allows you to
disable the touch pad to prevent any unintentional mouse clicks.

• Screen orientation: Some laptops allow the screen orientation to be changed from landscape to portrait
and vice versa. This can be done using a special key provided in the keyboard.

• Media options: When playing an audio or a video, you might want to rewind or fast forward it. Most of
the laptop keyboards have a function key that performs this operation.

• GPS: Most laptops are provided with built in GPS these days. This function can be enabled or disabled
using a special key.

• Airplane mode: The adapters can be disabled to prevent any communication when you are in an
airplane. A switch provided in the keyboard can be used to enable or disable airplane mode.
Docking station

Docking stations help you to plug-in the laptop in an environment with all the necessary peripheral devices. A
docking station is connected to the peripheral devices such as keyboard, printer and has USB ports to support
other peripheral devices. When the laptop is placed in the docking station, it is automatically connected to these
devices. A docking station extends the functionality of a laptop without compromising on its mobility.

Physical laptop lock and cable lock

Laptops can be prevented from being lost by locking it with a physical lock. A cable lock can also be used. Some
laptops have the ability to insert the cable lock wire. The laptop can be tied to a physical structure using a cable
lock.

Rotating/Removable screens

Some laptops are provided with screens that rotate by 180 degrees. In a few laptops, the screen can be
detached from the body of the laptop. This feature makes such laptops a hybrid between a notebook and a
tablet.

3.4 EXPLAIN THE CHARACTERISTICS OF VARIOUS TYPES OF OTHER MOBILE DEVICES.


Unlike olden days, there are many forms of computing devices available now in the market. While laptops
widened the possibility of carrying a computer wherever we go, continuous advancement in technology has
given birth to more sophisticated, smaller devices such as tablets, smart phones, wearable, phablets, e-Readers
and so on.

Tablets

A tablet is a mobile computing device smaller than a laptop but larger than a phone. It resembles a book. Initially
these were made with a pen stylus as an input device. However, the advent of touchscreen also paved way for
the introduction of touchscreen tablets. There is a built-in keyboard available that displays on the screen.

Tablets can be used very much like a laptop or computer to check and reply to emails, develop and organize
content, download and read e-books, browse the Internet, watch videos, and play games.

Smart phones

Smart phones help us to check and reply to emails, edit documents or spreadsheets, create events and
reminders, play games, and browse the Internet, in addition to sending and receiving messages, and making and
receiving calls. Therefore, it functions as a cell phone and a PDA. It has a QWERTY keyboard, in which the keys
layout is displayed as seen in any device keyboard. This keyboard can be a part of the physical hardware of the
phone or as a touchscreen software as part of the phone’s display.

Most smart phones are based on the Android operating system, which is an open source that was originally
developed by Google. Few other operating systems include iOS, Windows 10 Mobile, and Ubuntu Touch OS.
Another key characteristic is that the screens of smart phones are almost end-to-end.
Wearable technology devices

Wearable technology devices include all electronic or computing devices that can be affixed to apparels or
accessories. These apparels or accessories can be easily worn by humans and hence, the name Wearables. A
specific example for this is a pedometer that can measure physiological changes and count the number of steps
walked by a human being, the calories burnt and so on. These devices generally have a display unit to
communicate with the wearer. Wearables are available in almost all fields such as, medicine, gaming, education,
fitness, disabilities, music and transportation.

o Smart Watch
A smart watch is a computerized wrist watch. These watches can do much more than just indicating
time. Various smart functions included in a smart watch are gaming, FM radio, portable media players,
organizers, calculators, and maps. A watch phone is a special type of smart watch with mobile phone
capabilities in it.

A few of these watch models support GPS, Bluetooth and Wi-Fi. Google has developed a special
operating system for use in these devices known as Android Wear.

o Fitness Monitors
Fitness monitors are devices designed to track and report fitness related metrics such as heart rate,
distance walked, and calories consumed and spent. These devices can be tuned or synced with mobiles
or computers that in turn can compare and provide a holistic picture.

These devices were made possible by the advent of Wearable sensors. The sensors are capable of
detecting any normal/abnormal physiological change in the human body. Fitness monitors have
transformed the health care scene tremendously.
o Glasses and Headsets
Smart glasses or Digital eye glasses have the capability of adding information to what is visible to a
viewer’s eye. These glasses are capable of projecting a virtual image that helps the user to view it or
view beyond it more vividly. These glasses use both internal and external sensors including gyroscope,
accelerometer and magnetometer. The information gathered is often synced with a computer, a laptop,
or a smart phone. These devices often support GPS, Wi-Fi, and Bluetooth.

Smart Headsets can locate where you are, which direction you are facing apart from playing sounds.
The headsets don’t have any glasses or screen attached to them. These look like normal headphones
and only contain sensors that can relay information back to a computer or laptop. Wearable headsets
are used by the handicapped, and in the gaming and tourism industry. For example, these headsets can
give audio directions to those who are completely or partially visually impaired.

Phablets

Smart phones are smaller and tablets are larger in size to carry. Hence, Phablets were introduced that are bigger
than phones but smaller than tablets. They are typically smartphones that are greater than 6 inches in size.
These offer the size advantage of a tablet and dynamism of a smart phone. Their advantages include increased
performance and display, powerful cameras, and multitasking. All functions of smartphones such as GSM, 4G,
Wi-Fi, Bluetooth, FM, CDMA, SIM, Dual-SIM, touchscreen, virtual keyboard, and camera are part of phablets.
e-Readers

Reading is an age-old hobby. The Internet provides lots of information to read. However, nothing can be
compared to reading a book. Carrying books wherever we go can be inconvenient. e-Readers combine the best
of both the books and the Internet worlds.

e-Readers are electronic devices that can be used to read electronic versions of books, articles, and newspapers.
The major advantages of an e-Reader include portability, readability and reducing strain on eyes with paperback
illumination.

An e-Reader has both hardware and software components. The hardware component of an e-Readers is
extremely light and can store thousands of books. It looks like a tablet and cannot be used as mobile phones. E-
Reader software is available for many operating systems including iOS, Android, and Windows 10.

Smart Camera

Other than taking pictures, smart cameras are capable of analyzing pictures and extracting information from
them. The cameras contain all the required electronic gadgets such as Ethernet, image sensors, image
digitalization circuits, image memory, and built-in illumination device. These are widely used in the healthcare
industry, gaming applications, and in tourism.

GPS

GPS is the abbreviation for Global Positioning System. The US defense system has introduced 24 satellites to
collect data. GPS provides locations and time information in even adverse weather conditions. GPS is not
dependent on Internet or telephonic cables. It calculates the exact location, time and speed of a specific entity
(vehicle). Maps is the application that uses GPS to locate and navigate vehicles.

3.5 COMPARE AND CONTRAST ACCESSORIES & PORTS OF OTHER MOBILE DEVICES.

Connection Types

Communication or connection denotes the interaction between two or more devices. It is mostly two-way
indicating that what goes from one side can come back through the same path. There are a variety of
communication techniques available for wireless mobile devices such as Bluetooth, NFC, Hotspot / Tethering
and many more.

o NFC

Near Field Communication is a set of communication rules. If there are two electronic devices out of which
at least one is a portable device, they can use this connection type if they are within 10 cm reach of each
other. It operates in a particular frequency. NFC uses electromagnetic induction for exchange of information
between the two devices.

NFC devices can operate in three modes:


• NFC card emulation: In this mode, NFC-enabled devices such as smartphones act like smart cards;
Users can perform transactions, such as making card payments or for ticketing.
• NFC reader/writer: In this mode, NFC-enabled devices read information stored on inexpensive NFC
tags embedded in smart posters.
• NFC peer-to-peer: In this mode, two NFC-enabled devices communicate with each other to
exchange information in a random fashion.

o Proprietary vendor specific ports (Communication / Power)

Even though mobile devices are highly portable, they still need to be wired and docked for recharging or
communicating with computers. Proprietary vendor specific ports are ports that offer wired connection
facilities to the host devices for power or communication.

Every mobile device has its own connector port types. For example, the power port in a Samsung smart
phone is different from a power port in an apple iPhone. However, the other end of a connector cable is
always a standard USB port which facilitates the plugging of these devices to a computer or a laptop. In case
you are not sure about the port connecter type, it is always better to use the connecting wire given with the
device or refer the manual for the type of the connector port.

o microUSB/miniUSB connector ports

As discussed earlier, the connection ports in an assorted set of smart devices are not usually the same. For
example, the port in a smart camera and a phablet may not be the same.

USB connector ports initially were of two types: type-A and type-B. A standard USB port has the type-A
connector. This connector is flat and is found in USB hubs and computers. The type-B connector is designed
for the peripheral smart device by the vendor and hence, is vendor specific. Therefore, USB applications
require an A-B cable where one end is type-A port and the other end is vendor specific type-B port. Later
type-C connector ports were added. These different types of ports are designed to support the smaller
smart devices.

The standard USB type-A port is often modified by the vendors to create their own mini USB ports suitable
for their specific devices such as, camera and mobile phones. The smart devices required smaller connector
ports as and when the devices became smaller. Thus, the micro USB ports are smaller in size than the mini
connectors and have been designed to replace them.

o Lightning

Lightning is the proprietary vendor specific connector introduced by Apple, Inc. This connector is mainly
used to connect the various apple mobile devices such as iPhone, iPad and iPods to computers, laptops or
external peripheral devices. Lightning connector port cables cannot be used with its predecessors without
adapters.

o Bluetooth
Bluetooth adapters are connector ports that are capable of sending and receiving Bluetooth wireless signals.
A Bluetooth enabled device normally has an in-built adapter.

Bluetooth dongle adapters, on the contrary, help in transforming any non-Bluetooth enabled device into a
Bluetooth enabled device. These adapters can just be plugged into the USB ports to communicate with
other Bluetooth enabled devices such as a mouse, keyboard, and speakers. They are small and mostly half
an inch in size.

o IR

IR wireless indicates the use of infrared radiations for wireless communication of data. The radiations used
are created using electromagnetic fields. The wavelength of IR wireless is longer than the wavelength of red
light.

IR wireless is used for short or medium range communication. An example of an IR wireless device is the
television remote control. This communication depends totally on the availability of an unobstructed
straight line between the IR transmitter (Remote control) and the IR receiver device (Television).

o Hotspot / Tethering

Connecting one mobile smart device to another is called tethering. This can be done with a wired or a
wireless (WLAN) connection.

When computers and smart devices are connected to each other through WLAN (Wi-Fi), then the smart
mobile devices are said to be serving as Hotspots. In a pool of devices connected through the same Wi-Fi
connection, the smart mobile device becomes capable of routing information. Thus, the smart mobile
devices function as portable routers. Such mobile hotspots can be secured with a PIN / password.

Accessories

The wide variety of connection types discussed above has also paved way for the availability of a wide range of
smart accessories. In addition to these, a laptop has a number of accessories. Some of them include headsets,
speakers, memory cards, and gaming pads.

o Headsets
Headphones paired with a microphone are called a headset. Headphones allow you to hear clearly and
ensure the reception has the same clarity of speech when the other person is hearing your voice. It is
available in a wide variety of style such as mono, stereo, surround and headband. Wireless headsets are
used worldwide for various types of communications.

o Speakers
Speakers are devices that help you listen to audio files from a computer, laptop or a smart device. Wireless
speakers contain two units: a receiver and a transmitter. A receiver receives the signals from the computer
and a transmitter amplifies and transmits it to the listener.

o Game pads
A gamepad is a primary peripheral device that can be connected with a computer or a console gaming
system for playing video games. You can play a wide gamut of games with game pads. It usually contains a
mix of colorful buttons and one or two mini joysticks. Some portable gaming systems can even include an
inbuilt gamepad in it.

o Docking stations
A docking station is an extension hardware frame that enables your laptop to function as a desktop
computer. For example, a docking station with a Network Interface Card (NIC) facilitates the laptop to join a
LAN network. This interface is mainly used to extend the capabilities of the laptop like facilitating
communication with the printer or allowing extra storage.

o Extra battery packs/battery chargers


The latest smart mobile devices are power hungry. Thus, if you are traveling and require your gadget to hold
on through the journey, it is better to own an external battery charger or pack. The capacity of such battery
charger is measured in mAh (milliampheres) of current it can supply. You must keep this battery charger
charged in order to use it as a portable charger.

o Protective covers / water proofing


Waterproof protective covers help you protect your smart device from scratches or water related damages,
making it shock resistant.

o Credit card readers


Memory card readers are used to read smart card or memory cards. Nowadays, mobile devices are
equipped with hardware that allows them to read and interpret credit card information, if used with an
appropriate card reading software.

o Memory/MicroSD
Memory cards or MicroSD cards are removable miniaturized storage cards that can be used to extend the
memory of your smart phone or laptop. These are available in a wide variety of sizes such as 16GB, 32GB,
64GB and so on.
CHAPTER 4 – HARDWARE AND NETWORK TROUBLESHOOTING
4.1 GIVEN A SCENARIO, TROUBLESHOOT COMMON PROBLEMS RELATED TO
MOTHERBOARDS, RAM, CPU, AND POWER WITH APPROPRIATE TOOLS.
(Common symptoms (Unexpected shutdowns, System lockups, POST code beeps, Blank screen on boot up,
BIOS time and settings resets, Attempts to boot to incorrect device, Continuous reboots, No power,
Overheating, Loud noise, Intermittent device failure, Fans spin – no power to other devices, Indicator lights,
Smoke, Burning smell, Proprietary crash screens (BSOD/pin wheel), Distended capacitors), Tools (Multimeter,
Power supply tester, Loopback plugs, POST card / USB))

Troubleshooting common hardware problems related to system motherboards, memory, and CPU is an
important task that you will need to perform after you have assembled a computer and start working with the
computer. It is a challenging task and requires good knowledge of the various components and working of the
computer. Some of the common symptoms related to the hardware problems are unexpected shutdowns,
system lockups, post code beeps, blank screen on boot up, continuous reboots, and no power. There are other
problems such as overheating, loud noise, intermittent device failure, smoke emission, burning smell, and
distended capacitors. Now, let us look at how some of these issues can be identified and corrected.

At times, the computer may suddenly turn off without displaying any warning or error messages. A blank screen
may be displayed unexpectedly. In such situations, you can check the Event Logs in the Windows Event Viewer.

The Event Viewer keeps track of all the system related activities. From the Event Logs, you can identify the exact
reason for the unexpected shutdown of the computer. One major reason for the unexpected shutting down of
the system is overheating of the components. Heavy CPU and memory activities can cause overheating. You
need to ensure that the system fans are working correctly to provide the required cooling to the CPU. You also
need to ensure that the air is freely flowing through the computer and does not have any obstructions such as
dust and dirt.

Heat sinks are very important to cool the CPU. You must inspect the heat sinks.
Check whether they are still in good condition. Otherwise, the very purpose of having the heat sinks inside the
motherboard is defeated. Replace the heat sinks if they are worn out.

In some computers, the BIOS provides information about the CPU temperature. You can boot the system
through the BIOS, know the internal temperature of the system, and can take appropriate measures to prevent
overheating.

Incompatible or improper installation of hardware devices can also cause unexpected shutdown of the system. If
the computer shuts down without displaying any warning or error messages, check the hardware installation
before restarting the system. Uninstall the hardware devices one by one to identify the exact device that is
causing the problem. You can use Windows Device Manager to know the status of the hardware components.

You can also execute the hardware diagnostics tool to identify the cause of hardware problems. The hardware
diagnostic tools are built into every operating system.

System lockups can occur suddenly. A system can get locked without any warnings or error messages. In a
locked scenario, the mouse and the keyboard stop working. There is no black or blank screen on the monitor.
The system just freezes and becomes unavailable for use. In such situations, you must check the hard drive
access lights. Some indicator lights may show informative status. Try to press Ctrl + Alt + Delete keys on the
keyboard if possible, to bring up the Task Manager. You can then end the hung tasks in the Task Manager.
If system drivers are causing the problem, you can update the drivers with the latest version. If the update of
system drivers is causing problems, you can try uninstalling them. You also need to ensure that the appropriate
software patches or Service Packs are installed on the computer. You must ensure enough hard drive space and
memory in the system. These are some of the ways to come out of the system lockup scenarios.

The system runs the Power on Self-Test (POST) when it is started for the first time. POST is a basic hardware test
of the system. This test checks whether the hardware devices and CPU are working fine.
If the POST does not run properly, the BIOS displays error messages on the screen along with a series of beep
codes. The length of the beep codes determines the type of error. For example, on some systems, three short
beeps usually indicate a problem with RAM, while five short beeps indicate a CPU problem, and one long and
eight short beeps indicate problem with the video card. These beep codes differ between one manufacturer to
another. You must refer to the manufacturer’s system manual to decipher the errors based on the codes.

POST also raises errors if there is a problem with the system’s display. Error messages cannot be displayed if the
screen is blank. Therefore, with the help of beep codes, you can figure out a display problem. You can check the
BIOS configurations to fix the display problem.

The system boots in the order of the storage devices listed in the BIOS. If the booting does not happen in the
defined order, then you need to enter the BIOS setup and modify the boot sequence as required.

Sometimes, a system may continuously restart automatically. You can either see the BIOS setup screen or the
operating system’s splash screen. The system does not proceed after these screens. In such situations, you must
check the drivers that are installed by pressing the F8 key during the booting process. Pressing the F8 key boots
the system in Safe Mode. In this mode, you can revert to the last working configuration of the system to ignore
the drivers that were installed or disable automatic restart settings in Windows operating system.

At times, the system may not start because there is no power supply. You must check the plugged in
connections at the source and ensure that there is uninterrupted flow of power to the system. You must also
check the power supply that comes to the motherboard.

You can test the voltages using tools such as multimeter. The system fans may run even if the motherboard is
not working. It is because the fans require less voltage as compared to the motherboard.

Problematic systems emit different kinds of noises. You may hear a rattling noise if the system components are
loosely connected. Scraping or grinding noise can be heard in case of loosened hard drives. Clicking noise may
come from fans that are not spinning properly. You must ensure that the components are connected properly to
avoid inappropriate sounds. Blown up capacitors may emit a loud popping sound. The sound is accompanied by
smoke and smell. Bulged or deformed capacitors must be repaired immediately.

Operating systems such as Windows and Mac OS may crash because of problems related to hardware driver and
memory addressees. You may have to reinstall the operating system in case of a crash.
After identifying the problems and adopting troubleshooting measures, you will require the right tools to solve
the system hardware issues. Tools such as multimeters, power supply testers, loopback plugs, and POST cards
are used to fix the hardware problems.

A multimeter is a tool used to measure the electric current, resistance, and voltage.

A multimeter is used to perform the following tasks:


• Check the DC power of the computer’s internal supply
• Test the power of the system batteries
• Determine the continuity of electric wires inside the system
• Verify the AC power voltage of the electric sockets
• Identify the faults in the fuses

Apart from multimeter, you can test the voltages of individual system components using another tool called the
power supply tester.

This tool enables you to determine the voltages of all the connections. The LCD panel displays the voltages.
Power supply tester is relatively inexpensive and easy to use.

A loopback plug is another type of troubleshooting tool.


This tool tests the physical interfaces that are connected to the computer. You can use loopback plugs to test
the serial and network connections. You can have different loopback plugs for each type of network ports such
as Ethernet, fiber, or T1.

POST cards are tools that display error or warning messages in a LED panel during the booting process.

This tool is a type of an external card which you can connect to the PCI express bus. POST cards can be
connected to various ports through the USB.

4.2 GIVEN A SCENARIO, TROUBLESHOOT HARD DRIVES AND RAID ARRAYS WITH
APPROPRIATE TOOLS .
(Common symptoms (Read/write failure, Slow performance, Loud clicking noise, Failure to boot, Drive not
recognized, OS not found, RAID not found, RAID stops working, Proprietary crash screens (BSOD/pin wheel),
S.M.A.R.T. errors), Tools (Screwdriver, External enclosures, CHKDSK, FORMAT, File recovery software,
Bootrec, Diskpart, Defragmentation tool))

Hard drives are an integral part of any computer. They store a /huge amount of critical and sensitive data. If the
hard drives crash, data will be lost if it has not been properly backed up. Troubleshooting hard drives is an
extremely challenging task. Some of the common symptoms of hard drive failures are read/write failure, slow
performance, loud clicking noise, failure to boot, drive not recognized, OS not found, raid not found, and raid
not working.
Sometimes the hard disk cannot perform the read or write operation successfully. It displays an error message
stating that there is a read/write disk failure. The hard drives might work slowly at times and the read or write
operation might take a lot of time to complete. This can result in the overall slow performance of the system.

If there is any mechanical issue with the hard drive, it starts producing loud noises. This is a serious issue and
must be corrected on priority. Overheating of the hard disks due to constant running, overloading of the hard
disks due to more number of components, inadequate power supply to the hard disks, and loose connections
are some of the major hard drive problems.

Before you fix any of the hard drive problems, the first thing that should be done is to take a backup of the data
to any other storage medium. Data once lost cannot be easily recovered.

When you boot the system, you may get messages such as “operating system not found” if the system is unable
to recognize the operating system. If the system is not able to boot from the hard disk due to loose connections,
it may display an error message such as “unable to boot from the disk”. If the system is not able to recognize the
hard disk due to some reason, it may display an error message such as “drive not recognized” and so on.

You must perform the following tasks to identify the cause of hard disk failures:
• Check the connections of the various system components and fix any loose or hanging connections.
• Verify the sequence of the booting process. Find out if the boot sequence is in the preferred order.
• If the booting process takes place from another drive instead of the hard drive, you must enter the BIOS
setup and modify the sequence.
• Check the system’s hardware configuration.
• Identify and fix any faulty hardware or improper hardware installation.
• Confirm that adequate power supply is reaching the hard drives.
• Check whether the hard drives are disabled in the BIOS setup. In case, they are disabled, enable them.

Systems configured with RAID arrays have multiple drives. In such situations, you may need to troubleshoot
multiple drives and check for the operation of the RAID controller. The RAID controller is an adapter card that
can be faulty. You may have to fix the adapter card before checking for hard drive problems.

The different RAID levels throw up various kinds of errors. You will have two or more disks in RAID 0. If one of
the drives goes bad, the entire array gets affected and the data is lost. You must back up the entire data, replace
the bad drive, and restore the lost data.

In RAID 1, if one of the drives fails, the other disk will still work because it is a mirrored disk. You need to replace
the bad drive and the good drive will copy all the related data on the new drive and keep it in sync. In RAID 5,
there are three disks in the array. If one of the drive fails, you need to replace the bad drive with a new drive and
the drive will rebuild itself. In RAID 10, there are four disks in the array. Each set of disks is mirrored and striped.
If one of the drives fails, the RAID array still operates in its full capacity.

Self-Monitoring Analysis and Reporting Technology (S.M.A.R.T) is a function that provides heads up on the errors
that can cause hard disk failures.

You will require both hardware and software utilities to fix the hard drive issues. The following are some of the
hard drive troubleshooting tools:
• Screwdrivers:
You require a good set of flat, cross point, and torx connected screwdrivers to open up the drives for
replacement or repair. The screwdrivers are not magnetic and hence they will not attract any other system
components.
• External disk enclosure:

If you are unable to boot from the hard drive because of bad hard disk, you can remove the drive from the
computer and put it in an enclosed case. You can access the enclosure with the help of a USB drive.
• CHKDSK: This is the check disk command available in Windows operating system. This command checks the
hard disk for any errors and fixes the issues. There are various parameters for this command. For example,
the ‘/f’ parameter scans the file system and determines logical problems. Similarly, the ‘/r’ parameter scans
the entire drive and identifies the bad sectors.
• FORMAT: This command removes the entire file system from the hard drive partitions. It also initializes a
partition with the file system.
• File recovery software: If you delete some files accidentally from the hard disks, the file recovery software
can help retrieve the data. You can also retrieve data from the hard drives if they are corrupted or damaged.
• Bootrec: It is an executable file which you can use to troubleshoot and repair any startup issues related to
the Windows operating system.
• Diskpart: It is a disk-partitioning utility available in the Windows operating system. You can use this utility to
partition the hard drives.
• Defragmentation tool: This tool helps to defragment the hard drives. Defragmentation improves the hard
disk’s performance, capability, and durability. You can run the tool from the command line by using the
‘defrag’ command ‘defrag’. You can schedule the defragmentation process on a weekly or monthly basis.
Latest versions of Windows operating system schedules the defragmentation process by default and does
not require any user intervention.

4.3 GIVEN A SCENARIO, TROUBLESHOOT COMMON VIDEO, PROJECTOR, AND DISPLAY


ISSUES.
(Common symptoms (VGA mode, No image on screen, Overheat shutdown, Dead pixels, Artifacts, Color
patterns incorrect, Dim image, Flickering image, Distorted image, Distorted geometry, Burn-in, Oversized
images and icons))
The display devices can encounter hardware issues such as no image on screen, overheat shutdown, dead pixels,
artifacts, incorrect color patterns, dim image, flickering image, distorted image, distorted geometry, burn-in, and
oversized images and icons. There are various troubleshooting measures that you can take to prevent such
display issues.

If there are issues with the Windows operating system drivers, you may get a black screen when Windows loads.
To resolve this issue, you must press the F8 key when Windows is loading and start the system in VGA mode. In
this mode, you can identify the root cause of the problem.

Sometimes you may not be able to see anything on the screen. This could be due to the loose connections of the
display devices. You need to ensure that the devices are connected properly to the computer. You can also swap
the monitors and check if the image is displayed properly. Incorrect display driver can also cause this problem.
You should ensure that the appropriate display driver is installed. At times, the ‘no image on screen’ problem
could be due to the damaged monitor rather than the drivers or the connections.

Monitors can work with different input modes such as High Definition Monitor (HDM), Digital Video Interface
(DVI), Video Graphics Array (VGA), and so on. Selection of appropriate input mode also solves many display
problems. You must select the correct mode of input for the monitor. Almost all monitors support the VGA
mode.

The components inside the computer may get overheated because of extensive usage. Display devices are the
most affected due to high-end video content and graphics. The computer may unexpectedly shut down if it is
overheated. You must take proper precautions to avoid the problem of system overheating. Provide adequate
rest to the system to cool off.

Many times, the display of images get stuck at the pixel level. If the pixels are stuck, the screen will look black
except for one lighted pixel. You can also see dead pixels on your screen. Dead pixels are always black in color.
The pixel problems are related to hardware. You may need to replace the monitor in such cases.

Unusual graphics may begin to appear on the screen. These are called artifacts. They appear because of video
adapter issues. You need to install the latest display drivers and check the physical connections of all the related
components.

Adjust the brightness of the monitor to ensure a bright and accurate display. If the brightness control is not set
properly, the images may either look very dim or bright.

You may encounter flickering images on screen. This could be due to the physical problems with the connections
or interfaces. Sometimes the images on screen may appear distorted or fuzzy. Such images may cause irritation
to the user’s eyes. You need to check the operating system’s display settings and the refresh rate in the
resolution settings.

Screen burn-in is a common issue with display devices. This issue occurs in all types of popular monitors. In
screen burn-in, images are permanently placed on the screen and discoloration of images take place. Majority of
the display devices shift the location of pixels on the screen to avoid the screen burn-in problems. You can also
switch off the display device for some extended period of time to avoid the burn-in issue.

Screen resolution is very important for perfect display. If the display drivers are inappropriate or are not loaded
properly, the screen’s resolution settings can get affected. The images and icons on the screen may look
oversized. You must ensure that there is a proper balance between the native resolution of the system, the
display drivers, and the operating system settings.

4.4 GIVEN A SCENARIO, TROUBLESHOOT WIRED AND WIRELESS NETWORKS WITH


APPROPRIATE TOOLS.
(Common symptoms (No connectivity, APIPA/link local address, Limited connectivity, Local connectivity,
Intermittent connectivity, IP conflict, Slow transfer speeds, Low RF signal, SSID not found), Hardware tools
(Cable tester, Loopback plug, Punch down tools, Tone generator and probe, Wire strippers, Crimper, Wireless
locator), Command line tools (PING, IPCONFIG/IFCONFIG, TRACERT, NETSTAT, NBTSTAT, NET, NETDOM,
NSLOOKUP))

Wired and wireless networks can encounter many types of issues. Critical and sensitive network issues must be
immediately resolved otherwise the data may get affected. One of the common network issues is the
connectivity issue, such as no connectivity, limited connectivity, local connectivity, and intermittent connectivity.
The next major network issue is with respect to the signals. There can be IP conflicts, slow transfer speeds, low
RF signal, SSID not found, and so on.

If the computer connected to a network faces connectivity or signal problems, the first thing that needs to be
checked is the physical connection. Check the cables and wires from the router, modem, or server to the
workstation or client system. Ensure the network lights are blinking steadily on the router or modem.

You need to ping the system internally and check the Internet Protocol (IP) configuration. Use the universal
loopback IP address which is 127.0.0.1. If there is connectivity, the system will give a response. Else, you may
have to verify the Transmission Control Protocol/IP (TCP/IP) settings.

You must check the physical connection of the wired or wireless adapter which is connected to the network.
Ping the IP address of the adapter and wait for the response. Check the local configuration of the IP address.
Verify that the link lights on the adapter are on. You can also try to ping from the system to the default gateway.
You can also ping to a device that is outside the local network. These actions may provide you with solutions to
rectify the problem of no connectivity.

Automatic Private IP Addressing (APIPA) is a unique feature of the Windows operating system. This feature is
enabled by default. It is designed for small networks. If Dynamic Host Configuration Protocol (DHCP) server is
unavailable, the client systems can automatically configure itself with the required IP address and subnet mask
using APIPA. The range of IP addresses is from 169.254.0.1 through 169.254.255.254. The client uses the self-
configured IP address until the DHCP server becomes available.

The APIPA continuously checks the availability of the DHCP server. As soon as the DHCP server is available, the
APIPA stops working. The DHCP server takes the control of IP addressing feature and replaces the self-
configured IP addresses with dynamic addresses. The main issue with APIPA is that the system cannot
communicate outside the purview of the local subnet. This indicates limited connectivity. You can identify the
limited connectivity option with the help of a yellow icon in the system tray.

Limited connectivity can also arise with dynamic IP addresses. To resolve the problem of limited connectivity,
you must ping the local system, local gateway, and remote IP address and identify the exact location of the
problem.
Another problem that can occur in the network is of intermittent connectivity. The network connection
frequently fluctuates, resulting in intermittent network access. You must check the Local Area Network (LAN)
connection of the system. Verify the physical connections of the local systems such as cables and adapters. The
routers and servers at the other end of the network could also pose problems and hamper the connectivity.

Usually, every system in the network is assigned a unique IP address. However, sometimes two systems may
have the same IP addresses. This may lead to IP conflict. DHCP resolves the problem of IP conflicts in most of the
scenarios. In some cases, the operating system identifies IP conflicts. The systems with IP conflicts have
intermittent connectivity. You can reset the LAN card or the IP address and reboot the devices to resolve the
problem of IP conflict.

Many a times, you may have experienced slow download, upload, or data transfer speeds. It can be quite
frustrating for a system user to work with slow-speed network connectivity. The problem of slow-speed
connectivity could be due to data overload causing traffic jams in the network. It could also be due to the slow
performance of the routers, switches, servers, adapters, or connectors. Incorrect configuration settings on the
adapter and connectors, improper or faulty wiring, faulty connection, or faulty crimping can also slow down the
network’s performance. You must check all these symptoms to resolve the problem of slow performance.

Malware or viruses can also hamper the networks. They can affect the operating system of the servers and
clients. The network administrator must safeguard the network from suspicious applications by installing
effective anti-virus and anti-malware utilities.

In case of wireless networks, signal strength is very important. Poor or fluctuating signals can lead to
obstructions in the smooth transmission of data. You must check the frequency of the sent and received signals.
Verify the position and configuration of the antennas. You can also move the antennas closer to the
workstations to transmit strong signals. Determine the access point in your network and maintain its
configuration.

Signal interference is another major problem in wireless networks. Electronic devices such as consumer durables
can cause signal interference. Ensure that there are no electronic devices near your wireless networks that can
hamper the transmitted signals. There is specialized software that can measure the signal strength in wireless
networks.

Service Set Identifier (SSID) is a feature in wireless networking. It is a case sensitive, 32 alphanumeric-character,
unique identifier attached to every data packet transmitted over the wireless networks. It basically provides a
name to the Wide LAN (WLAN). You can see the list of SSIDs displayed when the system searches for available
wireless networks in the vicinity. To connect to any SSID, you require a password. Sometimes, when you try to
connect to a particular SSID, it may not be available. Either the administrator must have disabled the SSID from
appearing in the list of networks or the desired SSID may be out of coverage.

There are various hardware tools that can be used to troubleshoot network issues. Some of these tools are cable
tester, loopback plug, punch down tools, tone generator and probe, wire strippers, crimper, and wireless
locator. The following table lists the features of the hardware tools.

Hardware Tool Feature


Cable tester The features of this tool are as follows:
• It is a simple and inexpensive tool.
• It is used for basic testing of network cables.
• It determines the continuity of the cable from one end to the other.
• It identifies the missing pins on both ends of the cable.

Loopback plug The features of this tool are as follows:


• It is an inexpensive tool.
• It can be plugged into a port.
• It is used to check the physical interfaces on the devices.
• It is used to test the different types of ports such as serial, parallel, and network ports.
• It is used to identify the issues in networks.
• This tool is different for each type of network. For example, loopback plug for Ethernet
is different from the loopback plug for fiber connection.
Punch down tool The features of this tool are:
• It is used to identify the issues in punch down blocks.
• It cuts through the insulation and inserts wires into the punch down blocks.
• It enables a permanent link to the wires in the network.

Tone generator and The features of this tool are:


probe • It is basically used to test the telephone wires in a network.
• It helps to find the required wires from a set of wires in the network.
• It helps to identify the different ends of the wire.

Wire stripper The features of this tool are:


• It is a small handy tool.
• It is used to remove the insulation from the electrical wires.
• There are different types of wire strippers such as manual, automatic, and laser.

Crimper The features of this tool are:


• It is used to perform the process of crimping.
• You can use this tool to rectify the faults in the network connections related to bad
crimping.

Wireless locator The features of this tool are:


• You can use this tool to locate the wireless network.
• It can be a piece of hardware or a software utility.
• It displays information on the wireless configuration, signals, frequencies, and so on.

Apart from hardware tools, there are various command-line tools that can be used to identify and rectify
network issues. These tools include PING, IPCONFIG/IFCONFIG, TRACERT, NETSTAT, NBTSTAT, NET, NETDOM,
and NSLOOKUP. Most of these command-line tools are available in almost all operating systems. The following
table lists the various command-line tools used to troubleshoot the network issues.

Command Line Tool Description


PING The features of this command-line tool are:
• It is one of the most commonly used command-line
network tool.
• It is used to receive response from the other device in
the network.
• It tries to connect with the other device in the network.
• It tests the reachability of the other device in the
network.
• It uses the Internet Control Message Protocol (ICMP) for
communication in the network.
• The syntax is “ping <IP address of the other device or
fully qualified domain name>”.
• The output of this command-line tool is a list of the data
packets four times on the screen.
IPCONFIG/IFCONFIG The features of this command line tool are:
• It lists the IP configuration of the devices in use.
• It lists the information on the subnet mask, default
gateway, and network interfaces.
• It also displays the name of the device, primary DNS, and
the Ethernet adapter details.
• IPCONFIG is used in the Windows operating system.
• IFCONFIG is used in the Linux operating system.

TRACERT The features of this command line tool are:
• It helps to find information about the network route
between two communicating devices.
• It displays information about the Web server and the
different routers.
• It uses the Internet Control Message Protocol (ICMP) for
network communication.
• It determines the number of hops that is required for the
data packet to reach from the source device to the
destination device.
NETSTAT The features of this command line tool are:
• It stands for Network Statistics.
• It displays the list of active connections, applications,
binaries, and IP addresses that are in use.
NBTSTAT The features of this command-line tool are:
• It stands for NetBIOS Statistics.
• It displays the list of devices and their names that are in
use in the network.
• It enables you to query the devices in the network.

NET The features of this command-line tool are:


• The ‘net start’ command enables you to start the
Windows services.
• The ‘net stop’ command enables you to stop the
Windows services.
• The ‘net use’ command allows you to map a drive to the
network.
• The ‘net view’ command lists the shared devices on the
network.
NETDOM The features of this command-line tool are:
• You can install the Remote Server administrator tool in
Windows 8 and later versions to enable this tool.
• It helps you to manage all the Windows devices through
the Active Directory database.
• It is integrated with the Active Directory server.
• It allows you to add a device into a domain, add a
domain account, and remove the devices from the
domain.
• It displays the domain related information of the devices
in the network, such as name of the domain,
workstation, and organizational units.
NSLOOKUP The features of this command-line tool are:
• It queries the DNS server.
• It displays the information on IP addresses and device
names.
4.5 GIVEN A SCENARIO, TROUBLESHOOT AND REPAIR COMMON MOBILE DEVICE ISSUES
WHILE ADHERING TO THE APPROPRIATE PROCEDURES.
(Common symptoms (No display, Dim display, Flickering display, Sticking keys, Intermittent wireless, Battery
not charging, Ghost cursor/pointer drift, No power, Num lock indicator lights, No wireless connectivity, No
Bluetooth connectivity, Cannot display to external monitor, Touchscreen non-responsive, Apps not loading,
Slow performance, Unable to decrypt email, Extremely short battery life, Overheating, Frozen system, No
sound from speakers, GPS not functioning, Swollen battery), Disassembling processes for proper re-assembly
(Document and label cable and screw locations, Organize parts, Refer to manufacturer resources, Use
appropriate hand tools))

The various issues related to mobile devices include no display, dim display, flickering display, no power, no
Bluetooth connectivity and no sound from speakers. There are various troubleshooting measures that you can
adopt to repair the issues with mobile devices.

Sometimes, there is no display on the mobile device or phone. The phone is very slow or goes into a ‘not
responding’ mode. It can be either a hardware or software issue. You need to reset the phone by switching it off
and restarting it all over again. You can also reset the phone by removing the battery and inserting it again. A
small loose connection can also cause display problems. You can also update the applications that go into the
‘not responding’ mode. You can clear the trash or the junk files to free the memory and speed up the device
performance.

You can have a dim or flickering display on the mobile device. You must check the resolution settings of the
device. Sometimes, intermittent wireless connectivity can cause disruptions in the device. You need to ensure
that the mobile device has been configured correctly according to the settings received from the network
provider. The wireless connectivity in the device must be strong enough to catch the signals.

Another issue with mobile devices is that the battery of the phone starts to deplete or drain out at a faster rate
than expected. This can happen if the device is trying to connect to the service provider constantly. There may
be few applications that are constantly running and they may use up the phone’s battery. You can disable these
applications is you do not use them frequently. You can also disable features such as Bluetooth, navigation, or
location to free the memory space and decrease the battery usage.

At times, the device can go out of range or out of coverage area. Wireless and Bluetooth connectivity can
disappear totally. You must check the settings and, if required, reset the phone to enable the connectivity.

Mobile devices can get overheated because of high memory usage, over charging of battery, usage of heavy
applications such as games, and exposure to direct sunlight. In such situations, the device automatically turns off
to prevent any damage to the internal components.

The mobile devices are also used as audio/video players. Sometimes, the audio components may not function
properly. In case there is no sound from the speaker, you need to check the volume settings of the device and
the applications. You can plug in the headphones and check for the audio from the speakers. You may uninstall
the audio app and reinstall it to fix the speaker issue. If reinstallation of the audio app does not work, you can
perform a device reset.
The location mode in the mobile device helps to identify the phone’s physical location. The Global Positioning
System (GPS) feature enables you to reach the required destination without getting lost. At times, the GPS
functionality may not work properly due to network or software issues. You must turn on the location and GPS
features in the phone. You must check the network configuration of the device and ensure that the device
receives the signals properly.

If the battery gets swollen or bulges out, it is a potential danger. It can explode or catch fire. Such batteries must
be replaced immediately without any delay. A recommended technician must perform the replacement of
batteries.

It is not a difficult task to dismantle or disassemble the mobile devices to fix up any hardware issues. However, it
is not an easy task to reassemble the mobile device as it is very important to place the components or parts
appropriately. You cannot use a lot of physical force while reassembling because the components may break.
You must perform the task of reassembling with a great detail and effort. Adequate time is required to complete
this task.

While disassembling the device, you must document the entire process, the minutest parts, and its locations in
detail. Keep the document as a ready reckoner with you. This document will be useful during the process of
device reassembly. It is a good practice to label the location of all the cables and screws while disassembling the
device. This will help you to fix them back quickly and correctly at the right place. You can also take the images
of all the parts and the process before disassembling. The images will be helpful during reassembling.

During the process of disassembling, you must keep or store the parts, screws, cables, antennas, circuits, and
other components in an organized manner. You can have separate bins or boxes for each one of the category.
You can label the bins or boxes. This organized setup will help you reassemble the device quickly.

Some manufacturers provide a detailed manual for disassembly and reassembly of the device. You must refer
the manual during the process to avoid any errors. If there is no manual, you can check the online resources to
know the correct steps in the process.

You must use the appropriate tools to disassemble and reassemble the device. Wrong tool usage can lead to
fatal errors. You cannot reuse the same set of tools for all the types of devices. Every device has its own
specialized set of tools. For example, to disassemble and reassemble a laptop, you need precision screw drivers
and precision pliers. Similarly, to assemble or disassemble a mobile phone, you might need LCD opening pliers, a
SIM card ejector pin, and a SIM card cutter.

4.6 GIVEN A SCENARIO, TROUBLESHOOT PRINTERS WITH APPROPRIATE TOOLS.


(Common symptoms (Streaks, Faded prints, Ghost images, Toner not fused to the paper, Creased paper, Paper
not feeding, Paper jam, No connectivity, Garbled characters on paper, Vertical lines on page, Backed up print
queue, Low memory errors, Access denied, Printer will not print, Color prints in wrong print color, Unable to
install printer, Error codes, Printing blank pages, No image on printer display), Tools (Maintenance kit, Toner
vacuum, Compressed air, Printer spooler))

Printers often encounter issues, such as paper jams, no connectivity, creased paper, faded prints, denied access,
no image on printer display, vertical lines on page, or low memory errors. If the printer starts having problems,
the first thing that you need to do is to print a test page from the operating system itself. Do not use any
application. The printer will use the drivers of the operating system to print the test page. If the printing of the
test page is successful, the printer is working fine.

Sometimes the color printer may print the colors incorrectly. You must check the toner or cartridge to print the
right color. If you are unable to install the printer, you log in as an administrator. Only an administrator can
install the printer. If the printer is giving out blank pages instead of printed pages, it indicates that the printer
has not detected the paper or the print command is not successful.

The following table lists the various common issues that can occur in printers and the ways to troubleshoot the
issues.

Issue Description
Streaks If you find streaks or blurs in the printed output:
• In an inkjet printer, clean the print heads.
• In a laser printer, the issue of streaks could be due to a scratched
imaging drum.
Faded prints To solve the issue of faded prints:
• Replace the ink cartridge in the inkjet printer.
• Replace the toner in the laser printer.

Ghost images If you find ghost images in the output, clean the toner and the imaging
drum in a laser printer.

Toner not fused to the paper If the toner is not fused to the paper in a laser printer, replace the fuser.
Creased paper If the output appears on a creased paper, check the paper path and ensure
the usage of correct type of paper in the printer.
Paper not feeding If the printer is not able to pick up a paper from the tray for printing, check
the paper tray and ensure the smooth working of pickup rollers on the
paper tray.
Paper jam If the papers are getting jammed inside the printer, remove the jammed
paper pieces very carefully without causing any damage to the internal
components of the printer.
No connectivity/Printer will not If there is no connectivity to the printer, the printer will not print. You need
print/ to:
• Check the power supply.
• Identify if there are any error messages on screen.
• Verify the cables and connections.
• Ping and determine the IP address configuration.
• Check the user rights to configure, manage, and print the files.
Garbled characters on paper To solve the issue of garbled characters on paper, you need to install the
correct printer driver or update the existing printer driver.
Vertical lines on page If vertical lines are printed on the page, you need to:
• Check the cartridge or the toner.
• Remove the cartridge and insert it back.
Backed up print queue If the print queue is full, you must clear the back log first and then send the
files to the queue.
Low memory errors/Error codes Error codes are displayed if there are issues in printing due to low memory.
To free up the memory space, you need to:
• Upgrade the printer memory.
• Reduce the printing of complex and heavy graphics.
Access denied Access denied can occur due to insufficient privileges. Check the user rights
to print.

You must use the right tools to solve the printer issues. There are various tools available to troubleshoot the
printer problems. Some of these tools are:
• Maintenance kit: This tool is available as part of the maintenance process of a laser printer. The kit
contains feed rollers, fuser units, and other components. To perform the maintenance of the laser
printer, you must unplug the printer from the power sources and replace the worn out parts.
• Toner vacuum: You can use a specialized toner vacuum to clean the toners. Wipe away the dust
carefully without damaging any other component. Use a damp cloth if required to clean the inner and
outer areas of the printer.
• Compressed air: It is a good practice to use compressed air to clean the printer. The compressed air will
remove the dust and dirt particles from the printer without damaging the other parts. You can use an
external air compressor to blow the required amount of air into the printer and clean the printer.
• Printer spooler: It is a service included in the Windows operating system. You can start or stop this
service like any other Windows service. It runs continuously in the background without any user
intervention. It manages the print jobs sent from the computer. It can crash at times due to a heavy load
of print jobs or operating system issues. If the print spooler service stops working, you must restart the
service and check for the recovery options of the data.

You might also like