Chantal Bell 157563 CNET 201/205 - CompTIA A+ - Chapters 1-5 MIDTERM NOTES Chapter 1 – Taking a Computer Apart and Putting it Back Together Port Electrostatic Discharge (ESD) is a name for static electricity, which can damage chips, destroy motherboards, or harm you. An ESD strap dissipates any ESD between you and a system Computer cases are sometimes called chassis; houses the PSU, mobo, PCU, memory modules, expansion cards, hard drives, optical drives, and other drives o Tower cases sit UPRIGHT o Desktop cases lies FLAT Description VGA (Video Graphics Array); DB-15; HD15; 15-pin female transmits analog video DVI (Digital Video Interface) transmits digital or analog; 3 types exist (DVI, DVI-D, DVI-I) HDMI; transmits digital video and audio DisplayPort; digital and audio; replacing VGA and DVI, was thought to replace HDMI Thunderbolt 3; transmits video, data, and power; up to 6 peripherals can use the same port Audio ports; can transmit analog or digital audio in/out SPDIF sound port; external home theatre audio, digital audio output; when connected to a fiber-optic cable, is called an optical connector USB (Universal Serial Bus); multiple purpose; can be USB, USB 2.0, or Super-Speed 3.0 eSATA; used by external hard drives generally PS/2; purple = keyboard, green = mouse Serial Port/DB9 port; mostly replaced by USB; sometimes seen on a router for technicians for monitoring/using Modem port; RJ-11; used to connect dial-up phone lines; right port in image is an RJ-11 port and left is a network port Network port; RJ-45; Ethernet port; connects to a wired network, Fast Ethernet ports run at 100 Mbps, Gigabit Ethernet runs at 1000 Mbps (1 Gbps) 1 Chantal Bell 157563 Loopback plugs are used to test network ports or other devices to ensure the port is working, can also test the throughput or speed of the port (can also do with USB loopbacks for USB ports) Steps to open a computer case: o Back up important data o Have a container for loose o Power down and unplug screws o Drain the PSU by holding the o Open the case cover power button for 3 seconds o Clip your ESD to the side of the case Main internal components of a computer: Motherboard (main board, system board): largest and most important circuit board; hosts a socket to host the CPU Central Processing Unit (CPU, processor): processes most of the data and instructions for the entire system Heat sink: consists of metal fins that draw heat away from a component A fan and heatsink together are called the processor cooler Expansion cards (adapter card): a circuit board that provides more ports than those provided by the mother board Memory slots (DIMM): holds memory modules RAM (random access memory): temporary storage for data and instructions as they are being processed by the CPU HDDs: permanent storage to hold data and programs PSU: receives and converts the current; most have a dual-voltage selector switch to switch from 115V (US) to 220V (EU) Form factors are the standards that describe the size, shape, screw hole positions, and major features of these interconnected components Assures mobo, PSU, attachment holes for mobo and ports, allows for wires for switches/lights in front of the case, and anchoring holes ATX (advanced tech extended): most common, originally developed by Intel microATX (mATX): reduces the total cost of the system by reducing the number of expansion slots on the board; reduces power supplies and allows for a smaller case 2 Chantal Bell 157563 20-pin P1 connector: main mobo power connector used in early ATX systems 24-pin P1: main mobo power connector used today 20+4 pin: has four pins removed so it can fit into a 20-pin P1 mobo connector if needed 4-pin 12V connector: aux mobo connector, used for extra 12V power to the processor 8-pin 12V connector: aux mobo connector used for extra 12V power to the processor, providing more power than the older 4-pin aux connector 4-pin Molex connector: used for older IDE drives, some newer SATA drives, and for extra video card power. Provides +5V and +12V SATA power connector: used for SATA drives, 15 pins, provides +3.3V, +5V, and +12V, although +3.3V seldom used PCIe 6-pin connector: provides extra +12V for high end video cards using PCIe PCIe 8-pin connector: provides extra +12V for high-end video cards using PCIe PCIe 6/8-pin connector: used by high end video cards using PCIe x16 slots, can accommodate a 6-hole or 8-hole port A PSU that provides a 4-pin 12V power cord is called an ATX12V Power Supply o Later boards replaced the 4-pin 12V with an 8-pin aux connector for more amps for the processor 3 Chantal Bell 157563 If fine traces on the mobo touch the case, a short would result; plastic or metal pegs that separate the board from the case are called spacers or standoffs and are used to prevent this POST diagnostic cards help report computer errors after you first turn on a computer but before the OS is launched o The POST (Power on self-test) is a series of tests performed by the startup BIOS/UEFI when you first power on a computer Mobos use firmware, which has to do with the programs and data stored on the board o Consists of the older BIOS (Basic Input/Output System) and the newer UEFI (Unified Extensible Firmware Interface) o Manages essential devices before the OS is launched, starting the computer, and managing mobo settings o UEFI allows for a secure boot, which prevents rogue malware of OS hijacks on the system o The firmware chip contains the BIOS/UEFI, flash ROM, and CMOS RAM. CMOS RAM is powered by the coin battery located near the chip, generally a CR2032 A Power Supply Tester is used to measure the output of each connector coming from the PSU A Multimeter can measure several aspects of electricity in a variety of devices; can measure voltage, continuity, or match pins to a cable The front panel header of a motherboard has these general labels: o Power SW: controls mobo power, must be connected for PC power o HDD LED: controls drive activity light when the HDD is in use o Power LED+ / Power LED- : positive and negative LED controls for the power light o Reset SW: Switch used to reboot Laptops can use a docking stations to provide ports to allow a laptop to easy connect to different peripheral devices A port replicator provides ports to allow a laptop to connect to more peripheral devices that is accessible on the mobo Laptop replacement parts cost more than desktop parts because their components are designed to be more compact and stand up to travel An example of diagnostic software is PC-Doctor to help test components In a laptop, some ribbon cables are ZIF connectors (zero insertion force) and some have plastic screws that are only meant to be used once For laptops with built-in batteries, put the laptop into Ship mode (generally accomplished using Fn + S + V) to disable the battery stop power supply to components Laptops use SO-DIMMS (small outline dual inline memory modules) for more compact RAM and mini PCI Express cards 4 Chantal Bell 157563 Chapter 2 – All About Motherboards When putting a computer together, you start by deciding with processor and mobo you will use o When selecting a mobo, pay attention to form factor, processor socket, chipset, expansion slots, and ports The three form factors are ATX, microATX (mATX), and min-ITX (mITX; small form factor) o SFF’s are often used in low-end computers or home theatre systems. Use Celeron and Atom processors o An ATX is rectangular, a mATX is square, and the mITX is the smaller square Chipset: set of chips on the mobo that work with the PCU to control the memory, buses, and some peripherals Socket: rectangular with pins or pads to connect the PCU to the mobo and hold it the PCU in place o Chipset and socket determine which PSU a board can use Intel Chipsets: o Coffee Lake: 8th gen, use LGA1151 v2 socket, uses DDR4 memory, and falls into Coffee Lake H-Series or Kaby Lake Refresh o Kaby Lake: 7th gen desktop processors and chipsets, use LGA1151 v1 socket o Skylake: 6th gen, use LGA1151 socket, use DDR4 memory, can use low voltage DDR3 o Broadwell and Haswell: 5th and 4th gen respectively, work with the LGA1150 and LGA2011 sockets First four digits in an Intel processor dictate the generation (ex. Core i5-7500 is 7th gen) Intel uses LGA (land grid array) sockets AMD Chipsets: o TR4 (Threadripper 4): LGA, uses AMD X399, use the Ryzen CPUs o AM4: Used with AMD Ryzen and Athlon PSUs, include the A300, B300, and X300. Socket has 1331 pins and uses a pin grid array (PGA), which means the 1331 pins fit into 1331 socket holes o AM3+ / AM3: Used with AMD Piledriver and Bulldozer PCUs and the 9-series chipsets, used in high-end gaming systems and these are interchangeable socket-wise o FM2+: Older PGA socket used with AMB Athlon, Steamroller, and Excavating CPUs and A-series chipsets If you install a processor on a mobo that can fit the socket but has the wrong chipset, you can damage both the mobo and CPU Traces: circuits that enable data, instruction, timing signals, and power to move from component to component on the board o These pathways and the protocol methods used for transmission are called a bus PCI Express (PCIe) comes in four different slot sizes: x1, x4, x8, x16 o Each slot size indicates the number of lanes available for data transmission o You can connect a shorter card into a larger slot and it will only use the slots connected o v4 PCIe is the fastest o A GPU in a x16 might require as much as 450 watts, and a typical PCIe x16 slot provides 75 watts, so mobo’s generally have power connectors near this slot Might be a 6+2 connector 150W, a 4-pin molex connector, or a SATA connector 5 Chantal Bell 157563 Riser cards provide a slot for an expansion card installed parallel to the mobo Onboard ports: ports directly on the mobo Headers: group of pins sticking up on the board M.2 connector uses PCIe, USB, or SATA interface to connect a mini addon card; commonly used for wireless cards and SSDs IDE (integrated drive electronics) was used to interface storage devices with mobos, was a 40pin connector UEFI is required for 2-TB drives o Master Boot Record (MBR) allows for four partitions and is limited to 2-TB drives o GUID Partition Table (GPT) allows for any size of drive and can have up to 128 partitions o For backward compatibility, UEFI can boot from a MBR hard drive and provide Compatibility Support Mode (CSM) that use BIOS S.M.A.R.T. (Self-Monitor Analysis and Reporting) monitors statistics reported by a hard drive and can predict when the drive is about to fail Platform Key (PK): Digital signature that belongs to the mobo or computer manufacturer to authorize secure boot enabling/disabling and updating the KEK database Power-on Passwords prevent unauthorized access to the computer or BIOS/UEFI utility o If supervisor and user passwords are both set, you can lock down a computer from unauthorized access LoJack and Computrace Agent are embedded in firmware to protect against theft; helps locate it through internet signal and can give remote commands to lock it Hard drive passwords do not encrypt all of the data, only a few organizational sectors and are not as secure as drive encryption8 Mobos have TPM (Trusted Platform Module) chip and use Bitlocker Encryption to prevent unauthorized access; the Bitlocker relies on the TPM key in the mobo to be unlocked o If the mobo fails, you will need a backup copy of the startup key to access the data on the drive 6 Chantal Bell 157563 Device drivers are small programs on the board drive that an OS uses to communicate with a specific hardware device Flashing BIOS/UEFI – upgrading or refreshing the programming and data on the firmware chip o Might do this if: system hangs during boot, mobo functions have stopped working or cause problems, errors when trying to install new OS, incorporate new features or component to the board Back flash: reverting to an earlier BIOS/UEFI version Jumpers: two small ports or metal pins used to hold configuration information o Jumpers 1 and 2 closed – normal booting o Jumpers 2 and 3 closed – BIOS/EUFI setup can be cleared on the next boot o No jumpers closed – BIOS/UEFI recovers itself on the next boot from a failed update CMOS RAM: small amount of memory stored on the mobo that retains data even when the computer is turned off due to the CMOS battery o If the CMOS battery is disconnected or fails, setup information is lost o Indication that CMOS battery is weak is system date and time are wrong after power has been disconnected to the PC o CMOS battery considered FRU Chapter 3 – Support Processors and Upgrading Memory Features that affect CPU performance and compatibility with mobos: o Frequency: the speed the processor operates measured in GHz o Lithography: average space between transistors printed on the surface of the silicon chip, ranges from 14nm to 35nm and the lower the better o Socket and chipset o Multiprocessing: using two processing units (known as ALUs) installed within a single processor; can execute two instructions at once o Multithreading: each processor or core processes two threads at the same time; there are two logical processors for each physical processor or core Intel refers to it as Hyper-Threading and AMD calls it HyperTransport o Multicore Processing: multiple processors installed in the same housing; might contain up to 8 cores o Dual processors: a server mobo might have two processor sockets called dual processors or multiprocessor platforms o Memory cache: amount of memory within the processor, all have some memory on the chip called a die, also referred to as Level 1 Cache (L1 Cache). Can have 4 to 12 MB and up to L3 cache o If it can support DDR, DDR2, DDR3, or DDR4 Some Intel processors use Centrino technology, where the processor, chipset, and wireless network are all connected as a unit for laptops to improve performance (or silver and gold for laptops) 7 Chantal Bell 157563 High end servers often use Xeon, Xeon Phi, and Itanium o These are more expensive because they are more stable and error-free than desktop processors When installing the processor, make sure that cables and cords don’t obstruct fans or airflow near the processor or video card If power comes on but the system fails, the processor is likely not seated or some power cord has not yet been connected If the system comes up and begins the boot process but suddenly turns off, the processor is likely overheating RAM has three main memory modules currently: o DDR4: 288-pin and the fastest with lower voltage requirements, can support quad, dual, or single and has one notch near the centre o DDR3: 240-pin can support quad, triple, dual, or single channels, has an offset notch farther from the centre than DDR2 o DDR2: 240-pin can support dual or single, has one notch near the centre SIMM is older tech that has pins only on one side DIMM speeds are measured in MHz or PC rating o PC Rating is a measure of the total bandwith (MB/s) of data moving between the module and CPU; to calculate, multiply speed by 8 because DIMM has an 8-byte or 64bit data path DIMM in servers is generally ECC (error correcting code): ECC compares bits written to what is later read from the module, and can detect and correct an error in a single bit, if there are 2 errors in 2 bits it can detect it but cannot correct it o Cannot mix ECC and non-ECC RAM Older SIMMS and DIMMS used parity o A ninth bit was stored with every 8 bits to make the bits either odd or even, if it reads back and if the bits were not odd for odd parity, it would provide a parity error o Parity Error 1 – mobo, Parity Error 2 – expansion card Buffers increase memory performance in servers; cannot mix buffered with unbuffered CAS Latency refers to the number of clock cycles to write or read a column of data; lower values are better. CL 8 > CL 9, for example o Sometimes given in a string of timing numbers, such as 5-5-5-15; where the first is the CAS Laptops use DDR4, DDR3L, DDR3, or DDR2 SO-DIMM memory: o DDR4: 2.74” 260-pin, notch is offset from the center o DDR3: 2.66” 204-pin, notch offset from centre DDR3L: uses less power than a normal DDR3 o DDR2 SDRAM: 2.66” 200-pin, notch is near the side of the module Adding more RAM might solve slow performance, applications refusing to load, or an unstable system SPD (serial presence detect) is a DIMM technology that declares the module’s size, speed, voltage, and data path width to the system If you mix memory speeds, the modules will perform at the slowest speed 8 Chantal Bell 157563 Chapter 4 – Supporting the Power System and Troubleshooting Computers There are several ways to keep a system cool: keep the case closed, clean the inside, and move the computer if in a hot or dusty area Cooler: sits on top of the CPU and consists of a fan and a heat sink Heatsink: made of metal that draws heat away from the processor into the fins o can be made of aluminum or copper, copper is more expensive but a better conductor If a fan has a 4-pin header, it can support pulse-width modulation (PWM) to control fan speed to reduce overall noise When replacing a PSU, pay attention to the capacity for the +12V rail (used to describe each circuit provided by the PSU) Video cards draw the most power and draw from the +12V output The PSU should be rated about 30% higher than expected needs Can view logs about the system using Event Viewer Some companies use expert systems, which is a software designed to help solve problems using databased of known facts and rules to simulate human experts’ reasoning and decision making Possible Symptoms or Error Messages and their Causes System shuts down unexpectedly System shuts down unexpectedly and starts back up System locks up with an error message on a blue screen System locks up with an error message on a black screen System freezes or locks up without an error message POST code beeps No power Blank screen when you first power up the computer, and no noise or indicator lights Blank screen when you first power up, and you can hear the fans spinning and see indicator lights BIOS/UEFI loses its time and date settings: “CMOS battery low” error System reports less memory than you know is installed System attempts to boot to the wrong boot device Fans spin, but no power to other devices Smoke or burning smell Overheating, faulty RAM, mobo or CPU failure Overheating (processor thermal trip error) Problems with devices, device drivers, or corrupted OS installation Error at POST Application not responding 1 or no beeps = good, more than that, check mobo website Check outlet, check on button, dual-voltage, PSU connectors, and PSU integrity Likely electrical if power is getting to the PC Troubleshoot video subsystem Replace CMOS battery RAM not seated or has failed Change boot priority Check PSU, check voltage outputs Serious electrical issue, unplug immediately 9 Chantal Bell 157563 Loud whining noise Clicking noise Intermittent device failures Distended capacitors Error appears during boot: Intruder detection error Error appears during boot: Overclocking failed. Please enter setup to reconfigure your system Possible error messages: No boot device available Hard drive not found Fixed disk error Invalid boot disk Inaccessible boot device or drive Invalid drive specification Possible error messages: Missing operating system Error loading operating system Continuous reboots PSU or failing hard drive, might be a short HDD is failing, replace ASAP Overheating, failing RAM/mobo/CPU/HDD Replace mobo Computer case was opened, suspect security breach Discontinue OC, can occur if PSU is failing Did not find a device to load, ensure proper booty priority Windows programs corrupted or missing Press the key combo to get into BIOS/EUFI, if can’t then it may be an OS update issue – might need to do a clean reinstall If a system overheats, turn it off for at least 30 minutes before trying to power it up again and check the temperatures upon reboot o If there is a significant difference from time of boot to 10 minutes after, this is an overheating problem Laptops are powered by an AC adapter and/or battery pack that uses lithium ion; most AC adapters can auto-switch from 110V to 220V AC power Chapter 5 – Supporting Hard Drives and Other Storage Devices Hard drives are rated by its physical size, capacity, speed, internal tech, and interface standards Magnetic hard drives have a read/write head, and the spindle rotates at 5400, 7200, 10,00 or 15,000 RPM; faster spindles = better performance o Data is organized in concentric circles called tracks that are divided into sectors o Form factors are 3.5” for desktops, 2.5” for laptops; 1.8” exist for low-end laptops and MP3 players Solid state drives has no moving parts and are built using NVRAM; it does not lose its data even after the device is turned off o Memory inside a SSD is called NAND flash memory o Flash memory is expensive, so SSDs are more expensive than HDDs; however they are faster, more reliable, last longer, and use less power 10 Chantal Bell 157563 o Form factors are 2.5” in desktops and laptops, M.2 SSD that uses the M.2 mobo slot, or a PCIe SSD expansion card that uses NVMe Hybrid hard drives exist and are known as H-HDD or SSHD; the magnetic drive houses data with the flash component buffers to improve drive performance Before HDDs leave a factory, sector markings are written to it in a process known as low-level formatting. The firmware, BIOS/UEFI on the mobo, and OS use a simple sequential numbering system called logical block addressing to address these sectors o The size of each block and the total number of blocks determine the drive capacity; HDDs are generally larger in capacity than SSDs IDE (integrated drive electronics) connectors followed the PATA standard and produced 40-pin connector cables up to a maximum length of 18” SCSI (small computer system interface) was used for high end work stations and used a PCIe slot to provide an external connector for external SCSI devices (printers) and internal devices (drives); they were 68-pin ribbon cables SATA interfaces can be hot-swappable, meaning you can swap them while the system is running. They are more expensive and generally in servers or network storage devices NVMe (Non-Volatile Memory express) standards are only used by SSDs; they use the fastest x4 PCIe o Might be used for a PCIe expansion card, a U2 slot (2.5” SSD advertised as a PCIe drive, U.2 drive, or NVMe SSD), or M.2 port and M.2 ports are more common that U2 ports To get the best system performance, mobo and drive must support the same interface standard, otherwise they will use the slowest standard or the drive will not work Sometimes SATA drives have jumpers, but should not change them as they were set by the manufacturer SATA drives may have two connectors (SATA power connector or 4-pin Molex), choose between the two but never use both because it could damage the drive When you first remove a drive from the static-protective package, touch the package containing the drive to a screw holding an expansion card or cover for at least two seconds to drain static electricity from the package and your body Fault tolerance is a computer’s ability to respond to a fault or catastrophe to prevent lost data RAID (redundant array of inexpensive/independent disks) helps improve performance and fault tolerance; requires a PCIe x16 slot o There are four types of RAID – RAID 0, RAID 1, RAID 5, and RAID 10 11 Chantal Bell 157563 Spanning (JBOD) uses two hard drives to hold a single Windows volume; when the first disk is full, it writes to the second RAID 0 uses 2+ disks and writes to each disk evenly so neither disk performs all the activity; Windows refers to it as a striped volume o This is preferred to spanning RAID 1 is a type of mirroring that duplicates data from one drive to another and is used for fault tolerance, each drive has its own volume and these drives are hot swappable. If one drive fails, the other continues to operate and data is not lost. Windows calls this a mirrored volume RAID 5 stripes data and parity information across 3+ drives and uses parity checking so if one drive fails, the others can re-create the data stored using parity information; this increases performance and provides fault tolerance. These drives are hot swappable and referred to as RAID 5 RAID 10 is mirrored data, where two disks are striped and requires 4 disks or more (even numbers); it is the most expensive and provides the best redundancy and performance and allows for hot swapping RAID should be implemented before Windows is installed because all data on the assigned RAID drives will be lost when you configure it File system: overall structure the OS uses to name, store, and organize files on a drive Formatting: a process that erases all data on a device or drive File types: o NTFS: hard drives o exFAT: large capacity removable devices like USB flash drives, memory cards, and external hard drives o FAT32 / FAT: used by smaller capacity devices o CDFS or UDF: used by CDs, a newer version of the UDF file system is used by DVDs and Blue-ray discs Know the difference between CD/DVD ROM (read only memory), R (recordable once), RW (rewritable), DL (dual layer to allow double storage), RAM (re-writable and erasable), RE (rewritable), TL (triple layer), QL/XL QL (quad layer – used in data centers and cloud computing) For the best performance, don’t allow an SSD to exceed 70% capacity and a magnetic drive to exceed 80% capacity The chkdsk C: /r command is immensely useful and allows you to repair the drive and recover data The bootrec /RebuildBCD allows you to ensure Windows can enter a successful boot o bootrec /FixBoot command can be used to fix a corrupted boot sector o bootrec /FixMBR command can be used to fix problems with the MBR program to start Windows 12 Chantal Bell 157563 Max. Read Speed (if not listed in numbers) Min. video write speed Min. Write Speed Laptops have memory slots provided by a built-in smart card reader Most popular type of memory cards are Secure Digital (SD) cards The three standards for memory cards are 1.x (regular), 2.x (SD high capacity or SDHC), and 3.x (SD eXtended Capacity or SDXC) 4 Speeds can be 2, 4, 6, 10, UHS class 1, or UHSC class 3 o Class 4 or 6 is good for digital cameras o HR video recording should use class 10 o The higher the speed, the more expensive the card 13 Chantal Bell 157563 Chapter 6 – Supporting I/O Devices An I/O or storage device can either be internal or external Every device is controlled by software, and device drivers must be written for the OS o Some simple devices are controlled by BIOS/UEFI When it comes to installing or supporting a device, the manufacturer knows best Some devices need application software to use the device A device is no faster than the port or slot it is designed to use Use an administrator account in windows when installing hardware devices Problems with a device can sometimes be solved by updating the device drivers Install only one device at a time Device Manager is the primary windows tool for managing hardware and lists nearly all devices and the drivers they use When deciding the connection standard to use for a new device, the speed of transmission standard is often the best comparison tool: Port or Wireless Type Thunderbolt 3 Thunderbolt 2 SuperSpeed+ USB (3.2) SuperSpeed+ USB (USB 3.1) eSATA Version 3 (eSATA-600) SuperSpeed USB (USB 3.0) eSATA Version 2 (eSATA-300) eSATA Version 1 (eSATA-150) Wifi 802.11ac – 5.0 GHz Wifi 802.11n – 2.4 or 5.0 GHz Lightning Hi-Speed USB (USB 2.0) Original USB (USB 1.1) Wifi 802.11g – 2.4 GHz Wifi 802.11a – 5.0 GHz Wifi 802.11b – 2.4 GHz Bluetooth – 2.45 GHz NFC – 13.56 GHz Maximum Speed 40 Gbps 20 Gbps 20 Gbps 10 Gbps 6.0 Gbps 5.0 Gbps 3.0 Gbps 1.5 Gbps/1500 Mbps 1.3 Gbps/1300 Mbps Up to 600 Mbps 480 Mbps 480 Mbps 12 Mbps / 1.2 Mbps Up to 54 Mbps Up to 54 Mbps Up to 11 Mbps Up to 3 Mbps Up to 424 Mbps Wireless Range Copper up to 2m, requires USB-C Copper up to 100m 1m, requires USB-C Up to 3m Up to 2m Up to 3m Up to 2m Up to 2m Up to 70m Up to 70m Up to 2m Up to 5m Up to 3m Up to 100m Up to 50m Up to 100m Up to 10m Up to 4cm USB Implementors Forum, Inc is the organization responsible for developing USB o As many as 127 USB devices can be daisy chained together o USB uses serial transmission and are hot swappable o USB cables have four wires – two for power, two for communication o Three general USB port categories are Mini USB, micro USB, and regular USB 14 Chantal Bell 157563 USB Cables and connectors: Cable Type A Cable Description Flat, wide, and connects to a USB port Micro-A Has five pins, smaller than the Mini-B and is used on cells phones and other small devices B Cable Square, connects to a USB 1.x or 2.0 device such as a printer Mini-B Has 5 pins and is often used to connect small electronic devices to a computer Micro-B Has 5 pins and has a smaller height than the Mini-B connector. Used on tablets, cell phones, and other small electronic devices C Cable Flat with rounded sides, do not have a specific orientation and are backward compatible with USB 2.0/3.0. This is required to reach maximum speeds with USB 3.2 Most mobo’s sold today have one or more video ports integrated called onboard ports; make sure you can disable the video port if it gives you trouble Video card can use a PCI or PCIe slot, with PCIe x16 being the fastest Types of Video Ports: Cable Type VGA Description 15-pin analog video port and transmits 3 signals of red, green, and blue. DVI-D Transmits only digital data DVI-I Supports both digital and analog Display Port/Mini Designed to replace DVI and can transmit digital video and audio, uses data packet transmission. Expected to replace VGA, DVI, and HDMI HDMI/Mini Transmits both digital video and audio, designed for home theatres 15 Chantal Bell 157563 RG-6 coax used for cable TV, having replaced the RG-59 o Often uses a BNC connector RS-232 have been replaced by USB, once were used with mice, keyboards, dial-up and other peripherals o All RS-232 connectors today use 9 pins and are often called a DB-9 connector A graphics tablet is often called a digitizing tablet or digitizer A KVM (keyboard, video, mouse) switch allows you to use one keyboard, monitor, and mouse for multiple computers and does not require that you install device drivers to use it Laptops contain Mini PCI Express slots that use 52 pins on the edge connector o Often used to enhance communication options for a laptop, including wifi, cellular WAN, video, and Bluetooth. The primary output device of a computer is a monitor o Two necessary components for video output are the monitor and the video card o LCD (liquid crystal display) – flat panel monitor, uses liquid crystal to produce an image and uses pixels to form an image o OLED (organic light-emitting diode) – uses thin LED and does not use backlighting, produces deeper blacks and better contrast, but have more glare. Often used by mobile devices. o Laptop displays almost always use LCD technology Monitor characteristics: Monitor Description Characteristic Screen Size Diagonal length of the screen in inches Refresh Rate Number of times a monitor screen is refreshed in 1 second, measured in Hz. The higher, the better. Response time is the time it takes to build 1 frame, measured in ms. The lower, the better Pixel pitch Dot on the screen that can be addressed by software – pixel pitch is the distance between adjacent pixels on the screen. The smaller, the better Resolution Number of spots or pixels on a screen Contrast Contrast between true black and true white – the higher, the better ratio Viewing Angle at which a monitor becomes difficult to see from the side angle Backlighting Measured in cd/m2, the best LED backlighting is class IPS as it provides the most or brightness accurate colour Connectors VGA, DVI-I, DVI-D, HDMI, DisplayPort, Thunderbolt Other features LCD can provide privacy or antiglare; some are also touchscreens 16 Chantal Bell 157563 Things that can go wrong when installing a video card and what to do: o Hear whining sound - caused by lack of power, check PSU and wires o Black screen – onboard video not being disabled in BIOS/UEFI o Series of beeps – cannot detect video card o Error messages about video appear when Windows starts – conflict between onboard video and video card o Games crash/lock up – update drivers for mobo, video card, and sound card. Install the latest version of DirectX Burn-in is when a static image stays on a monitor for many hours, leaving a permanent impression of that image o Can try to prevent this by using a moving screen saver or rotating various images Distorted geometry is where images are stretched ClearType helps improve the quality of text on a screen Dead pixels are often caused by dead transistors, which cannot be fixed If you see artifacts on the screen before Windows loads, the problem is not caused by the drivers and potentially by the monitor o Overclocking can cause artifacts Chapter 7 – Setting Up a Local Network A network is created when two or more computers can communicate with each other Categories of networks based on size, from smallest to largest: o PAN – Personal area network, generally 802.11 or Bluetooth o LAN – Local area network, covers a small local area such as a home, office, or small group of buildings o WMN – Wireless mesh network, commonly used for IoT o MAN – Metropolitan area network, covers multiple buildings in a large campus or portion of a city o WAN – wide area network, covers large geographical areas and is made up of many smaller networks. Best known WAN is the Internet Bandwidth – theoretical number of bits that can be transmitted over a network connection at a time Throughput – average of the actual speed Latency – measured by the round-trip time it takes for a message to travel from source to destination and then back Wireless wide area network (WWAN), also called a cellular network, is provided by companies o Two established cellular connections are GSM (global system for mobile communications) and CDMA (code division multiple access) o LTE (long term evolution) will replace GSM and CDMA o Devices that use GSM or LTE require a SIM (subscriber identification module) card You can tether computers or other devices to cellphones to provide communication to the tethered device Universal Plug and Play (UPnP) helps computers on the local network automatically discover and communicate with services provided by other computers on the local network 17 Chantal Bell 157563 Technology Maximum Speed Description Wireless Connections: Satellite and WiMAX Satellite Up to 15 Mbps Requires a dish in a relative fixed position WiMAX Up to 30 Mbps Requires transmitter to send and receive from a tower up to 30miles away. Being replaced by LTE Wireless Internet connection: Cellular 3G cellular At least 200 Kbps, Allows for transmitting data and video. Uses either can be up to 4 Mbps CDMA or GSM phone services 4G cellular 100 Mbps to 1 Gbps Higher speeds achieved when in a fixed position, generally uses LTE (long term evolution) 5G cellular 10-50 Gbps and beyond Wired Internet connections: Telephone Dial up or POTS Up to 56 Kbps Slow access to ISP using modem and dial-up over phone lines ISDN 64/128 Kbps ISDN (integrated services digital network) is outdated business-use connections to ISP over dial-up SDSL (Symmetric Up to 22 Mbps Equal bandwidth in both directions, type of Digital broadband (carries more than one type of signal); Subscriber Line) uses regular phone lines ADSL 640 Kbps up and up Most bandwidth allocated for data coming from ISP to 24 Mbps down VDSL (very-high- Up to 70 Mbps Type of asymmetric DSL that works only over short bit-rate-DSL) distances Other wired connections Cable internet Up to 160 Mbps Connects home or SOHO to ISP Dedicated line Up to 43 Tbps Dedicate fibre line from ISP using fibre Wired local network: Ethernet Fast Ethernet 100 Mbps Used for local networks (100BaseT) Gigabit Ethernet 1 Gbps Fastest Ethernet standard for small, local networks (1000BaseT) 10-Gigabit 10 Gbps Typically requires fibre media, mostly used on the Ethernet backbone of larger enterprise networks, can only be (10GBaseT) used on WAN connections Wireless local network: Wifi 802.11a Up to 54 Mbps Not used 802.11b Up to 11 Mbps Experiences interference from cordless phones and microwaves 802.11g 2.4 GHz Up to 54 Mbps Compatible with and has replaced 802.11b 802.11n 2.4/5.0 Up to 600 Mbps Uses MIMO (can have up to 4 antennas) 802.11ac 5.0 Up to 8 Gbps, but at Supports up to 8 antennas and supports GHz 1.3 beamforming (detects connected devices and increases signal strength in that direction) 802.11ad Up to 7 Gbps Only achieved when within 3.3m of AP 18 Chantal Bell 157563 Port address – applications defined by the port they are sent out of o Most applications used on the internet or local network are client/server applications o Port forwarding – opening certain ports to certain computers so that activity initiated from the internet can get past the firewall DMZ (Demilitarized zone) – a network not protected by a firewall or has limited protection Ranges and frequencies for wireless standards: o 802.11a – 50m, 5.0 GHz o 802.11b – 100m, 2.4 GHz o 802.11g – 100m, faster than 11b at 54 Mbps o 802.11n – Indoor range of 70m, outdoor of 250m, can be 2.4 GHz or 5.0 GHz o 802.11ac – Indoor range of 70m, outdoor of 250m, only 5.0 GHz and has stronger performance at the edge of its reach compared to 802.11n Three main security standards for 802.11 wireless are: o WEP (wired equivalent privacy) – no longer consider secure, key is static o WPA (wifi protected access) – stronger than WEP and designed to replace it, typically uses TKIP (temporal key integrity protocol), no longer considered secure o WPA2 (wifi protected access 2) – also called 802.11i standard, current standard. Typically uses AES (advanced encryption standard), which is faster and more secure encryption than TKIP o WPA3 (wifi protected access 3) – better encryption, can securely configure a nearby wireless device, eliminating the need for a wired connection to configure it. Includes IDE (individual data encryption) SSID (service set identifier) – name of a wireless network Channel – specific radio frequency within a broader frequency. To avoid overlap, the 2.4 GHz pick channels 1, 6, or 11. The 5 GHz band offers up to 24 channels. Some high-end access points allow radio power level adjustment to reduce interference, save on electricity, or limit the range of the network to your own property Wifi protected setup (WPS) – generates the SSID and security key using a random string of hard-to-guess letters o can be a security risk if not managed well ping command: o ping <network> - tests connectivity using an IP address o ping -a <network> - tests for name resolution to verify DNS is working o ping -t <network> - continues pings until interrupted o ping 127.0.0.1 – the IP address 127.0.0.1 always refers to the local computer. This is a loopback address. If the local computer does not respond, there is a problem with network config o ping cengage.com – uses a host name to find out the IP address of a remote computer ipconfig command: o ipconfig /all – displays a network connection’s configuration information o ipconfig /release – releases IP address and other TCP/IP assignments o ipconfig /release6 – releases IPv6 and other TCP/IP assignments 19 Chantal Bell 157563 o o o o ipconfig /renew – leases a new IP address from DHCP ipconfig /renew6 – leases a new IPv6 address from DHCP ipconfig /displaydns – displays info about name resolution ipconfig /flushdns – flushes the name resolution cache, might solve problems with browser cannot find a host on the internet nslookup (namespace lookup or name server lookup) – used to test name resolution with DNS servers allowing you to request information from a DNS server’s zone data, which is the portion of the DNS namespace that the server knows about tracert - useful when trying to resolve a problem reaching a destination host such as an FTP site or website netuse – requires elevated command prompt access, connects or disconnects a computer from a shared resource or can display information about connections netuser – manages user accounts netstat – gives statistics about network activity and includes several parameters: o netstat – list stats about network connection, including IP addresses of active connections o netsat >> netlog.txt – direct output to a text file o netsat -b – lists programs using the connection, useful for finding malware o netsat -b -o – includes process ID of each program listed to use taskkill command o netsat – a – lists stats about all active connections and the ports the computer is listening on Chapter 8 – Network Infrastructure and Troubleshooting *NOTE: Several notes have been left out of this chapter due to coverage in the Network+ and CCNA course. Types of IPv6 Addresses: o Link: local area network o Node: any device that connects to the network o Neighbors: nodes on the same LAN o Multicast address: delivers messages to all nodes in a targeted multicast group o Anycast address: delivered only to the closest destination o Unicast address: send messages to a single node. Three types of unicast addresses are: Link local: used for limited communication with neighboring nodes on the same link. Begin with FE80::/64 and end in % Unique local: private addressed assigned by a DHCP6 server that can communicate across subnets within a private network. Always begins with FC or FD Global address: can be routed on the internet, the first 48 bits of the address is the Global Routing Prefix IPv6 uses subnetting but doesn’t need a subnet because the subnet ID is a part of the address 20 Chantal Bell 157563 FQDN is a fully qualified domain name and must be associated with an IP address TCP/IP protocols used by applications: o HTTP: used for the internet by web browsers and servers to communicate o HTTPS: refers to HTTP using a secure socket layer (SSL) or Transport Layer Security (TLS) to create a secure socket, TLS is better than SSL. A socket is a connection between a browser and a web server o SMTP – simple mail transfer protocol is used to send mail o POP and IMAP – used to receive mail. POP3 downloads email to the client from an email server. IMAP4, the client manages the email while it is still stored on the server o RDP – remote desktop o SSH – secure shell encrypts communicate to prevent hacking o FTP – file transfer protocol, used to transfer a file between two computers over a WAN or LAN. FTP is not secure. FTPS uses SSL encryption, and SFTP uses SSH encryption o SMB – server mail block is a file access protocol to share files and printers on a network. SMB3 and CIFS are the latest versions o AFP – apple filing protocol is a file access protocol o LDAP – lightweight directory access protocol used when applications need to query a data base for things such as the email addresses for all employees, is not encrypted. o SNMP – simple network management protocol is a protocol used to monitor network traffic and manage network devices Ethernet over Power uses power lines in a building to transmit data, but this data is sent out on a network that you cannot necessarily contain because power lines are not confined to a single building o Powerline adapters offer 128-bit AES encryption activated by pairing the adapters Power over Ethernet allows power to be transmitted over Ethernet cable, and can provide up to 25.5 watts from a single port o If a switch does not offer PoE, you can attach a PoE injector which adds power to an ethernet cable Chapter 9 – Supporting Mobile Devices *NOTE: Several notes have been left out due to the familiarity with mobile devices. IMEI – internal mobile equipment identity is a unique number that identifies each mobile phone or tablet device worldwide IMSI – international mobile subscriber identity is a unique number that identifies a cellular subscription for a device or subscriber along with its home country and mobile network PRL is a preferred roaming list database file that lists the service providers or radio frequencies your carrier wants the device to use when outside your home network S/MIME (secure/multipurpose internet mail extensions) is a more secure protocol than SMTP, which encrypts the email and includes a digital signature to validate the identity of the sender End of life limitations – a device that ages out of the vendor’s updates Product release instructions – describe new features or patches the update provides and how long the update will take 21 Chantal Bell 157563 Back up and recovery: o File level backup – syncing information through online accounts or to your computer o Partial image – backs up settings, native app data, Wifi password, account profile, and device/app configuration o Combination of file-level and partial image – prepares for catastrophic failure or loss by using both file level and partial image o Image level – includes everything on the device and can completely restore the device to its previous state. Some OS don’t support this Internet of Things: o Z-wave – transmits around 900 MHz band and requires less power than wifi, reaches up to 100m o Zigbee – 2.4 GHz or 900 MHz band, requires less power than wifi, generally reaches an inside range of 20m Both can connect in a mesh network Zigbee is generally for large-scale commercial/industrial o RFID – radio frequency identification is traditionally used in small tags that attach to and identify clothing inventory, car keys, bags, luggage, etc. Contains a microchip and antenna Chapter 10 – Virtualization, Cloud Computing, and Printers Virtualization is when one physical machine hosts multiple activities that are normally done on multiple machines. There are two types: o Application – one computer can serve up to multiple apps o Desktop – also called client-side virtualization. This is when one computer provides multiple desktops for users, each virtual desktop is contained in its own virtual machine Software called a hypervisor creates and manages virtual machines (VMs) that have their own virtual hardware Hypervisor software can be type 1 or type 2, the main difference being whether the host computer has its own OS: o Type 1: installs on a computer before any OS and is called a bare-metal hypervisor Ex: XenServer, KVM, ESXi For server-hosted desktops, most likely the hypervisor used is a type 1 o Type 2: installs a host OS as an application and is sometimes called a hosted hypervisor Ex: Hyper-V, Oracle VirtualBox, VMware Workstation Not as powerful as type 1 because it is dependent on the host OS to allot its computing power Developers us VMs to test applications, help-desk techs use it to switch from one OS to another when a user asks for help Honeypots are used to lure hackers to protect the real network Hardware-assisted virtualization (HAV) must be enabled on the processor settings to enhance processor support for virtual machines 22 Chantal Bell 157563 Cloud computing is when a vendor or corporation makes computing resources available over the internet, such as cloud file storage and synchronization apps on mobile devices and computers to sync data o Public cloud – provided over the internet to the general public o Private cloud – services established on an organization’s own servers for private use o Community cloud – services are shared between multiple organizations with a common interest, but not available publicly o Hybrid cloud – combination of public, private, and community clouds used by the same organization All cloud computing service models incorporate the following elements: o On-demand services o Rapid elasticity to scale up or down o Support for multiple client platforms – refers to the OS o Resource pooling and consolidation – services to multiple customers are hosted on shared physical resources o Measured service – measured or metered for billing purposes Cloud computing service models: o o IaaS (infrastructure as a service) – customer rents hardware, including servers, storage, and networking, and can use these hardware services virtually Ideal for fast-changing applications, to test software, or for start up businesses PaaS (platform as a service) – customer rents hardware, OS, and some applications Popular with software devs Ex: Google Cloud Platform and Microsoft Azure 23 Chantal Bell 157563 o SaaS (software as a service) – customers use applications hosted on the service provider’s hardware and operating systems, and typically access the applications through a web browser Ex: Gmail, Yahoo mail o XaaS (Anything as a service or Everything as a service) – cloud can provide any combination of functions depending on a customer’s exact needs Thick client – fat client; regular desktop computer or laptop that is sometimes used as a client by a hypervisor server Thin client – has an OS but little computing power of its own and might only need to support a browser o Reduce cost by meeting only minimum requirements for a basic OS, support basic apps required for interaction with server, and support high-speed network connectivity Zero client – dumb terminal; does not have an OS and is little more than an interface to the network with a keyboard, monitor, and mouse o Ex: Wyse Zero Persistent VDI – user owns the virtual desktop and can customize it Nonpersistent VDI – user receives a desktop from a pool and each time the user signs on, the desktop reverts to its original state 7 steps of laser printing: 1. Processing – firmware inside the printer processes the incoming data to produce a bitmap 2. Charging/Conditioning – drum condition by roller that places an electrical charge of -600 to -1000 V on the surface; roller is called the primary charging roller or primary corona 3. Exposing/Writing – laser beam controlled by motors and a mirror scans across the drum until it completes the correct number of passes 4. Developing – developing cylinder applies toner to surface of drum, toner is charged between -200 to -500 V to stick to the developing cylinder; a control blade prevents too much toner from sticking to the drum 5. Transferring – strong electrical charge draws the toner off the drum onto the paper; the transfer roller puts a positive charge on the paper to accomplish this 6. Fusing – the fuser assembly uses heat and pressure to fuse the toner to the paper 7. Cleaning – sweeping blade cleans the drum of any residual toner The charging, exposing, developing, and cleaning steps use the most printer components that undergo the most wear Transfer belt – does the transferring and can be replaced in some printers Pickup roller – pushes a sheet of paper forward Separation pad – ensures that only one page of paper is moving forward into the printer Inkjet printers use ink-dispersion using a print head o Highly dependent on paper quality Impact printer – creates a printer image using a mechanism that touches or hits the paper, such as a dot matrix printer Thermal printer – use heat to create an image 24 Chantal Bell 157563 o Can be direct that burns dots onto specially coated paper called thermal paper o Can be transfer that uses a ribbon that contains wax-based ink o Suggested to clean the head with isopropyl wipes Local printer – connects directly to a computer by a physical port Network printer – has an ethernet port connected directly to the network or uses wifi to connect to a wireless access point Wifi adhoc mode is when a wifi printer can connect directly to a nearby computer using a wifi hotspot, a computer hotspot, or a device-to-device connection called an ad hoc network Integrated print server – printers that connect directly to a router or switch so devices can find the printer Computer as a print server – a computer shares its local printer with other computers on the network 25