The words you are searching are inside this book. To get more targeted content, please make full-text search by clicking here.
Discover the best professional documents and content resources in AnyFlip Document Base.
Search
Published by aasiya99, 2020-10-20 15:31:04

cover -Comptia A+

Motherboard bus




(expansion) slots












For example, if the motherboard doesn't already have a




built-in sound card, then you can add a sound card by




inserting one into one of these bus slots, which gives




your computer the ability to produce sound. Or let's say




the motherboard doesn't have enough USB ports to suit




your needs, well then you can add a USB expansion





card in one of the bus lots to add more USB ports.






A common bus type today is




called PCI, which stands for




peripheral component





interconnect. PCI has




been around since 1993 and




was a standard bus slot for




modern motherboards until




PCI-express came out,




which we'll talk about





shortly. PCI slots are much




faster when compared to the




very old ISA slots, with a PCI




data path of 32 or 64 bits,





and speeds ranging from




133 to 533 MB/s. They are



half the physical length of an ISA slot.
also about




99

PCI Express is the latest




version of bus slots. It's




faster than its




predecessor, with speeds





up to 4 GB/s. Unlike




standard PCI, which




transfers data in parallel,




PCI Express transfers data





in serial. Transferring data




in serial is much faster

PCI Express than parallel because







serial data is transferred in




packets.
PCI Express was designed to succeed all other PCI bus




slots and the older AGP. However, it is not backward




compatible with standard PCI, because the architecture





is very different.







There are four different




slot sizes in PCI Express.




There is PCI Express 1,




4, 8, and 16. PCIe x1 has




one lane for data. A lane




has 4 wires. Two are for





sending, and two are for




receiving. PCIe x4 has




four lanes. PCIe x8 has




8 lanes. And the fastest PCIe x16


PCIe x8
slot is PCIe x16, which PCIe x4





has 16 lanes and has PCIe x1




also succeeded the AGP




slot for the video card.






100

There is also the PCI-X




slot, where the X stands for




it extended. The PCI-X slot




is basically an extension of




the old standard PCI slot





and it's almost twice the




length. The PCI-X is a 64-




bit bus, and it's backwards




compatible with the




standard PCI slot.




PCI-X









It was mainly designed to work with servers and high-





speed computers.












There is also the mini PCI




slot and this is what is used




in laptops. It's approximately





one quarter the length of a




standard PCI slot. The mini Mini PCI slot




PCI slot is a subset of the




standard PCI bus, but it's a




lot smaller. Now you can





insert a regular PCI card into




a mini PCI slot, but you




would have to use a mini




PCI to PCI converter. The




mini PCI is a 32-bit, 33 MHz


Mini PCI card
bus.












101

Mobile Issues















Phones & Laptops



















You may come across some




issues when you're dealing with




mobile devices, such cell phones.




And two of the biggest cell phone





operating systems are Apple and




Android. A lot of cell phones




today are touchscreen, and one of




the common problems that you




may encounter with touchscreens




is that sometimes they are not


Touchscreen cell

responsive. You touch the

phone

screen, and nothing happens. So



when this happens, the best thing to do is to power off





the phone and then turn it back on, and a lot of times




this fixes the problem. Or if you still have the issue,




you can try and eject your




SIM card and then reinsert





it. If that doesn’t work, you




may have to do a hard





Phone SIM card reset on your cell phone.



And you can refer to the




manufacturer's documents for specifics on how to do a




hard reset for your specific device.









Sometimes you may have issues when you touch an




app and the app won't load, or you may have an









102

issue with the performance of




your device and you find it to be




running very slow. A lot of this




could be caused by having too





many apps open already, and




those apps are eating up




memory and CPU resources




and slowing the performance of




the device or even freezing it.




So the first thing you should try







Phone with a lot is to kill any apps that you have



of apps open. open and see if that fixes the



issue. For example on an




Apple device, the way to kill apps, is to double click




the home button and swipe up each app that’s open,




and it will close that app.









Also with cell phones, you may encounter issues




where your GPS is not working. Certain applications




on your phone require your GPS. So if a certain app




is not working, it could be that your GPS is turned off.




So the first and most obvious




thing to do is to go into the




settings on the phone and





make sure that the GPS is




turned on. Or if your GPS is




turned on, and you're still




having issues, you have to




remember, that your GPS uses





satellites for communication.




So for example, if there's a






103

cloudy day, then that could interfere with satellite




communication.






As far as troubleshooting




issues with laptops; one of





the main problems is that




sometimes when you turn on




the power, but your screen is




blank. Nothing shows up on




the screen. You may hear




the fans running, you may




see the LEDs turn on, but No display (blank





your screen is still blank. screen) on a laptop.




This is called a no display




issue. Now, this could happen for a few reasons. But




the best thing to do right from the start is if you have an




external monitor, go ahead and connect an external




monitor to your laptop and see if an image shows up on





an external monitor. Now if an image does show up on




your external monitor, then that means your LCD




monitor on your laptop is bad, and it needs to be




replaced.























































Laptop connected to external monitor







104

Another problem is that




when you turn on the





laptop, you see an image




that's very faint. The




display is very dim.




In this case, most likely




you would have to replace




the inverter. The inverter





Dim display is a small circuit board




that supplies power to the




LCD monitor. It converts




DC current to AC current.




The inverter is usually





Inverter mounted inside the




display panel, just below




the screen.




If you press the power button on your laptop and let's




say that nothing happens. In other words, you don't




see any power LEDs, your screen is blank, and you





don't hear any fans turning. One of the first things to




check is making sure your battery charger is plugged




into the wall and to your laptop. Once you verify that,




and still nothing happens? Well then most likely your




laptop’s motherboard is dead and needs to be





replaced.

Laptop plugged into




a wall outlet

































105

A flickering monitor can also be related to a bad LCD





or inverter, especially if the failure is related to




movement; in other words, if the flickering happens




when you physically move the laptop. So most likely it




is a hardware failure.







Problems with keys sticking is




another issue that can happen





with laptops. One thing you'll




notice is that laptop keyboards




are not as durable as regular




desktop keyboards. So they are




more susceptible to wear and




tear, and tend to wear out a lot faster. So if you're





going to repair a laptop keyboard or replace the




keyboard, you need to be extra careful.






Another issue on laptops, is sometimes people




complain that as their typing on the keyboard, the




mouse cursor moves all by itself. This is known as




ghost cursor.

















Palms of hands or



sleeves on a shirt,



touching the




touchpad, could



cause a ghost cursor.
















The main reason (especially in my personal




experience in dealing with my customers) is that when










106

a person types on the laptop keyboard, a lot of times




they don't realize that the palms of their hands or the




sleeves on their shirt are touching the touchpad.




Which will move the cursor. So the best way to solve




this problem is to go into the software touchpad




settings on the laptop and disable the tap





feature. Another issue that could cause a ghost




cursor could be improper touchpad drivers. So the




best thing to do is to go to the manufacturer's website




and download the correct and latest drivers for the




touchpad.










A very common issue that





happens with laptops is




overheating. A lot of




people complain that as




they are working on their




laptop, the laptop shuts




down or freezes. Which is a





very common symptom of




overheating. Laptops have




air vents either on the side




or on the bottom of a laptop,




along with fans. And air




passes through these vents and fans to help cool the





laptop. But if these vents are blocked, for example




with dust, it will hinder the laptop’s cooling ability. So




the best way to fix this problem is to get a can of




compressed air and blow out the vents and fans and




free them from any dust or debris.












107

Use a can of compressed air to free the laptop's



fans and vents from dust and debris.












But another issue that causes a laptop to overheat is




a lot of times people use their laptops, and they're not




placing them on a flat hard surface. For example,





they're using them on soft surfaces like their couch or




on their bed. When this happens, a lot of times the




vents and fans will get blocked and will hinder air




circulation, especially if the fans and vents are on the




bottom of the laptop.



















































Hard surface Soft surface



GOOD BAD










108

You may also encounter an issue with your laptop





where the battery is not being charged. Your battery




is in the laptop and a battery charger is plugged in,




but you'll notice that there was an indicator informing




you that the battery is not charging.












































































Now most likely this could be a problem with the




battery itself, and it needs to be replaced. Or it could




also be a problem with the laptop's motherboard. Or





in another scenario, let's say your battery is fully




charged, but the battery only lasts a few minutes




before it discharges. Now, this is a very common




issue with older laptops. Often times when laptops




reach around 5 years old, the battery will only last a




few minutes on a full charge, for example, they may





only last about 10 minutes. And this happens




because batteries lose their capacity to hold a charge




as they get older. So all you have to do is replace the




battery for the laptop.











109

All laptops have the capability of wireless networking.




And a lot of times you may have a situation where you




have an intermittent wireless connection. This could




be due to a problem where there is interference




between your laptop and your wireless router, or it




could be that you might be out of range of your





wireless router.

















































Out of range or interference issues could cause



intermittent wireless problems.









Another intermittent wireless issue could be that you




would need to update your wireless network card




drivers. Especially when there's a new operating





system that's been released. In fact, I have personally




found this issue to be common with the release of




Microsoft Windows 10, where a common fix for




an internment wireless issue, is to go to the laptop




manufacturer's website and update your wireless





network card drivers.




































110

BIOS / CMOS
























BIOS stands for basic input




output system. The BIOS





is software that is built into




the motherboard that




initializes the computer’s




peripherals as the computer




is being booted. Some of




these peripherals include the





keyboard, mouse, video




card, optical drives, and so




on. After it initializes the BIOS initializing the




peripherals, it then searches computer at startup.





for a boot device, like an



optical drive, USB drive, or a hard drive, to boot software





or an operating system.




The BIOS software is stored on the BIOS chip on the




motherboard. The BIOS chip is non-volatile, which




means that the software and settings are retained even




after the power is turned off.

















































BIOS chip stores the BIOS



software (firmware).






111

Some popular vendors of BIOS software are American




Megatrends and Phoenix Technologies.









After a computer is turned off, and if the power cable is




unplugged, the computer needs to maintain certain




settings. Such as the date, time, and hardware




settings. And these setting are stored on the





motherboard in a special chip called a CMOS chip.




CMOS stands for complementary metallic oxide




semiconductor. And in order for the CMOS chip to




maintain these settings, it needs a battery. This battery




is called the CMOS battery.

























































CMOS battery







The CMOS battery is a small button cell battery, which




can be seen on the surface of the motherboard. It's




usually located on the bottom right-hand corner. The





CMOS battery is basically the same type that is typically




used in wrist watches.







When you turn on a computer, the computer does





what’s called a power on self test or POST, which is




run by the BIOS. It tests the computer to make sure all









112

the requirements are met and the hardware is working




correctly before continuing.
































































BIOS doing a POST (power on self test).






So after POST has passed, and as stated before, the




BIOS searches for something to boot from such as an





operating system, which is typically loaded on the hard




drive. But the computer doesn’t necessarily have to




boot to an operating system.























Hard drive
Optical drive


USB


FLOPPY





























Boot priority screen in CMOS setup.







It can also boot from other things such as an optical




drive or a USB drive, just as long as those drives





113

have the necessary boot files on them. And how the




BIOS determines which device to boot from, depends





on the boot priority in the CMOS settings. The boot




priority screen is where you can make changes in the




boot order.





So for example, If the optical drive is set as the first




boot device, then the BIOS will check that first and look




for booting software and if it doesn’t find anything, it will





move on to the 2nd device on the list and check that




next. Then it will continue down the list until it finds




something to boot from. But, you can change the boot




priority in the CMOS setup and put in any order you




choose. Then once you make the change, you just





save the settings and the next time you reboot the




computer, the settings will take effect.
































































The BIOS will go down the list of boot




devices, based on the order, to find a drive



that has boot software on it.







Now there are certain things you can do while you're in




the BIOS. For example, you can set the date and




time.




114

The data and time should be accurate because the




operating system does reference it.



































































Setting the date and time in the BIOS.









Other things you can do in the BIOS, is enable or




disable certain devices. For example, if your




motherboard has a built-in video, network, or sound




card, you can disable these devices to save resources





if you're not using them. But that's only if you already




have separate adapter cards installed on the




motherboard that already gives you these capabilities.







The BIOS also allows you to modify the CPU clock




speed by either increasing the clock speed to make the





computer run faster, (which will increase the




temperature) or by reducing the clock speed which will




make the computer run slower (which will lower the




temperature). Reducing the clock speed can be





especially useful if your computer is having overheating




issues. And speaking of temperature, the BIOS can




also monitor the temperature of the CPU.






115

The BIOS has a built-in safety




mechanism, that if the CPU




reaches a certain temperature





threshold, it will automatically




shut down the computer. Or if




it detects that the CPU fan is




not spinning, it will shut down




the computer to prevent




damage to the CPU from





overheating.

































































You can change the clock speeds in the BIOS.








But these temperature thresholds can be modified in




the BIOS if you want to, by either increasing or





decreasing the temperature threshold. And you can




also modify the fan speeds of the computer.







You can also enable or disable virtualization in the




BIOS. Virtualization is a technology that enables your




computer to run multiple operating systems in different




partitions. The operating systems are not actual, but




they are virtual. So if your computer is preventing you






116

from installing or running virtualization software, it




could be that virtualization is disabled in the BIOS.











One way to protect your computer from unauthorized




users is by using password protection in the BIOS.





Using a BIOS password not only prevents changes to




the settings, but it also protects the system from




booting. A user cannot boot up the computer or make




any changes in BIOS without the password.


































































Password protection in the BIOS.









Another BIOS security measure is drive lock. Drive




lock prevents the hard drive from being accessed by




using password protection. When drive lock is





enabled in the BIOS, a user cannot access the drive




without the password. The password is stored on the




hard drive, but it cannot be read or removed.








Some BIOS systems have an intrusion detection




feature. This feature detects if the computer case has




been opened and alerts the user.








117

ALERT! COVER HAS BEEN OPENED.






























































Intrusion detection system alerts you if the



computer case has been opened.








And some computers,




especially laptops, can be





equipped with LoJack, which




is a service that can locate




your computer if it has been

THIEF!

stolen.














When you turn on a computer, the computer does




what’s called a power on self test, or POST. It tests




the computer to make sure




all the requirements are met




and if the hardware is





working correctly before




starting the operating




system. If the computer




passes the test, the internal





speaker will make a short

A single beep indicates a

single beep, which indicates
successful POST


118

the computer has passed the test and is booting up




normally. However, if there are no beeps or multiple




beeps, then that means




that the computer failed




the test and something is





wrong, and the computer




needs further trouble




shooting to find out what




the problem is.






Whether there are no




beeps or multiple beeps,
Multiple beeps indicates a


the computer will generate problem.




a beep code to help you




pinpoint the problem. For example, if the computer




generates 3 long beeps, then that could indicate a





keyboard error. Or if the computer generates a




continuous short beep, then that could indicate a




problem with a RAM module. Whatever BIOS is




installed on your computer’s motherboard, you can




refer to the manufacturer’s documentation to find a list





of beep codes and what they mean.







A new type of BIOS is called UEFI. UEFI stands for




unified extensible firmware interface. Now most, if




not all new motherboards, are shipped with his newer




type of BIOS. UEFI has several advantages over the





old BIOS. And the first and most obvious, just by




looking at it, is that it has a user-friendly graphical user




interface that supports different colors and even




animations. Whereas the old BIOS has your typical




blue screen that resembles the Windows blue screen of






119

BIOS (OLD) UEFI (NEW)









death. UEFI can also recognize larger hard drives, and




you can even use a mouse in the UEFI interface, as




compared to the old BIOS, where mouse support was




not even available and you had to use your keyboard




only. UEFI also has a built-in feature called secure





boot. Secure boot stops any digitally unsigned drivers




from loading and it helps to stop malicious software




such as rootkits.


















































































Larger view of a UEFI



interface












120

Front Panel Connector




























Typically located at the bottom right-hand corner of the




motherboard, you'll find what's called the front panel




connector. And this is where you would plug and wires




that connect to items that are in the front bezel of the





computer case. So for example, there is a power button




connector, and this turns a computer on or off. There's




also the power LED, which indicates when the computer




is on or off, or in standby mode. There is also the hard




drive LED, which indicates when there is hard drive




activity. There is also the reset switch, which restarts




the computer by doing a hard boot. And there is also a





speaker connector, which is used to plug in the internal




speaker of the computer. Often times the front panel




connector will be color-coded to help identify where the




wires connect to, which makes knowing where to





connect the wires a lot easier.






















































Color-coded, front panel



connector on a



motherboard.










121

Most computers today will have certain common




connections on the front panel of the computer case, for




easy access. For example, you may find some USB




ports. You may also find some audio ports, one for




headphones or speakers, and another one for a





microphone. You will also find on the front panel, the




power button, which is used for turning on or off the




computer. You will also see a reset button, which is




used for doing a hard reboot. And there is also the hard




drive activity light. And when this light blinks, it means




that there is activity in the computer. In other words, the





hard drive is being accessed.






































































































Easy access connections, and LEDs on



the front panel of the computer case.














122

RAID

























Storage is another very important part of fault




tolerance. If something were to happen to a company's




data, such as a disk failure that results in data loss,




then that is going to have a serious impact on how a





company performs. That's why we need to make sure




that if a disk does fail, that




no data loss will occur. So




one of the best ways to




prevent data loss is RAID.




RAID stands for redundant





array of independent




disks. In a RAID set up, the




data is copied on multiple




disks. So that in the event of




a disk failure, no data will be lost. Now there are 4




common levels of RAID. There is RAID 0, RAID 1,




RAID 5, and RAID 10.








Now RAID 0 is not fault tolerant. In fact, RAID 0





shouldn't even be called RAID, because not only does




it not provide fault tolerance, but it actually increases a




chance for data loss. Because in a RAID 0, the data is




not duplicated, but it's actually spread or striped across




two separate disks. So if just one of these disks fails,





then all the data will be lost. So the only reason why




you would want to use Raid 0, is speed. Because




when you have two disks controllers working instead of




one, then accessing data is much faster.








123

Spread or



striped,




over two



disks.













DISK 1 DISK 2





RAID 0 is not fault tolerant.




It's only for speed.













Now RAID 1 is fault tolerant. In a RAID 1 setup, the




data is copied to more than one disk. So disk 2 would





have the exact same copy of the data, as disk 1. So in




the event of a single disk failure, no data loss would




happen, because the other disk has a duplicate copy.




There are also two different setups in RAID 1,




mirroring and duplexing. Mirroring is when all the




disks use the same controller. But duplexing is when





each disk has their own controller. So duplexing is




more fault tolerant of the two setups, because it would




still continue to function if a controller goes down.







124

Each disk



has the




same



data.
















DISK 1 DISK 2





RAID 1 - the data is copied on




more than 1 disk.








Now RAID 1 is fault tolerant. In a RAID 1 setup, the





data is copied to more than one disk. So disk 2 would




have the exact same copy of the data, as disk 1. So in




the event of a single disk failure, no data loss




would happen, because the other disk has a duplicate




copy. There are also two different setups in RAID 1,





mirroring and duplexing. Mirroring is when all the




disks use the same controller. But duplexing is when




each disk has their own controller. So duplexing is




more fault tolerant of the two setups, because it would




still continue to function if a controller goes down.














125

Next, we'll talk about RAID 5. In order to use RAID 5,




you need to have 3 or more disks. RAID 5 is probably




the most common setup that is used, because it's fast




and it can store a large amount of data. In a RAID 5




setup, the data is not duplicated, but it's striped or





spread across multiple disks. And in addition to the




data, there was another very important piece of




information that is being evenly spread across all the




disks. This information is called parity. And parity is




used to rebuild the data in the event of a disk failure.





But there is a downside to RAID 5, because since the




equivalent of an entire disk is used to store parity, it




reduces the collective amount of data that can be




stored in this array. So for example, if all four of these




disks (see graphic below) were 1 TB each, then that




totals 4 TB. But in a RAID 5 setup, the total amount





that would be used for data storage would be 3 TB,




because the equivalent of 1 entire disk (1 TB) would be




used to store parity.










































































DISK 1 DISK 2 DISK 3 DISK 4





126

RAID 5 - the data is spread or striped across



multiple disks. In addition to parity.







Finally, there is RAID 10. RAID 10 is basically what





the name says. It's combining RAID 1 and RAID 0




together, and you need to use a minimum of four disks.




So in a RAID 10 setup, a set of 2 disks are mirrored




using a RAID 1 setup. Then both sets of the two disks





are striped using RAID 0. So RAID 10 benefits from




the fault tolerance of RAID 1, and the speed of RAID 0.




But the downside in a RAID 10, is that you can only




use 50% of the capacity for data storage. So if you are




using 4 disks in a RAID 10 setup, you can only use two




of them for actual storage.



























































































DISK 1 DISK 2 DISK 3 DISK 4






RAID 10 - combines RAID 1 & RAID 0. In RAID 10, a set of



2 disks are mirrored using RAID 1. Then both sets of the




2 disks are striped using RAID 0.




127

Networking Cables
& Connectors










































This is the RJ-11 connector. RJ




stands for registered jack. This is




a 4 wire connector, used mainly to




connect telephone equipment. But




as far as networking, the RJ-11 is





used to connect computers to local




area networks through the RJ-11




computer's modem. The RJ-11




locks itself and to place by a single locking tab, and it




resembles an RJ-45, but it's a little bit smaller.









Now the RJ-45 is by far the





most common network




connector. This is an 8 wire




connector, used to connect




computers to local area




networks. And like the RJ-





11, it also locks itself into





RJ-45 place by a single locking



tab, and it also resembles




or RJ-11, but it's a little bit




larger.








The BNC connector is a common type of RF connector




that is used on coaxial cable. BNC stands for bayonet










128

neill concelman. And the





BNC is used for both analog




and digital video




transmissions, as well as




audio.





BNC











This connector is called the F-




type. Now, this is a threaded




connector, typically used on





coaxial cables. These are




primarily used by cable




providers to attach to cable



F-type modems. The F-type hand





tightens by an attached nut.















This is the IEEE 1394




connector, and this is also




known as firewire. Firewire




is recognized by its D shape.





This type of connection is




becoming less popular on




desktops and laptops. It's Firewire




commonly associated with




attaching peripheral devices




such as digital cameras and printers, rather than being




used as network connections.











This is the USB connector. The USB is very common




on desktops and laptops. Just about every kind of





129

peripheral connects to a computer, using the USB




connector. There are also several different types of




USB connectors. There is the type A, type B, the mini





USB, and the micro USB.





































TYPE A TYPE B MINI MICRO









A newer type of interface for attaching external





peripherals is called Thunderbolt. Thunderbolt is a




high-speed technology




interface that outputs one




serial signal from a




combination of PCI express




and the DisplayPort.





Thunderbolt was released in Thunderbolt




2011, and was mainly used in




Apple products. And now it has become available to




PCs. There are three different versions of




Thunderbolt. Versions 1 and 2, use the same




connector as the mini DisplayPort. And version 3,




uses a USB type C connector.









Version 1 & 2 Version 3
















Another type of connector is called RCA. The RCA is




an older type connector that was produced in the







130

1940s. These were




primarily used to carry




video and audio signals. A




lot of times you may see





RCA connectors in a group




of 3, a yellow, a white, and




a red. The white and red




are used for audio, such as




a left and right speaker. RCA connectors




And the yellow would be





used for video.







Our next connector is




called the LC or local




connector. And this is a




fiber optic connector. It





uses a jack similar to the




RJ-45. This type of






LC connector is commonly


used between floors in a




building.








This fiber optic connector




is called the ST or straight





tip. This uses a half-twist




bayonet type of lock and is




commonly used with single ST




mode fiber optic cable.







Our last fiber optic connector is called the SC or




standard connector. And this uses a push-pull





connector similar to audio and video plugs. And like






131

the LC connector, this is also commonly used





between floors in a building.







































SC






The term plenum refers to a space in a building where




there is open airflow circulation. And this is usually




between the drop ceiling and the structural ceiling.




Buildings that don't have plenum spaces have air ducts




encapsulating the airflow. So as a result, buildings that





have plenum spaces, where there is adequate open




airflow, are more prone to fires than buildings that don't




have plenum spaces.


























































Plenum Non Plenum



Open air flow (dangerous) Encapsulated air flow (safer)









And because of this, cables that run through plenum




spaces must meet certain requirements. First, they







132

must be more fire-resistant. And secondly, they must




not produce any toxic fumes if they are burned.










Sometimes there might be cases in your home or office,




where you wanted a certain computer in a certain part of




the building, to be able to access the internet or to be





networked. And for whatever reason, network cabling




or Wi-Fi just wasn't an option in that part of the building.




Maybe because of difficulties in the structure of the




building, interference, or whatever. So a new




technology gave the ability to network using the existing




electrical system of the building. Ethernet over





powerline gives the ability of Ethernet networking over




power.















































Powerline



network adapter































So, for example, let's say you needed a computer to be




able to access the internet. But for some reason, you





can't get any network cables or any Wi-Fi signal to









133

reach that computer. So, in this case, we're going to





use Ethernet over power. So we're going to need a




couple of powerline adapters. These powerline




adapters plug directly into a power outlet and they have




a built-in Ethernet port for an RJ-45 connector.


















































Computer plugged into a powerline




network adapter.





So one adapter plugs into a power outlet next to the





computer that you want to have internet access




(above). Then you would connect a network cable from




the adapter to the computer. Then the other adapter




plugs into the power outlet next to the modem or router




(below) and then connected with a network cable.




















































Modem plugged into a




powerline network adapter.






134

So now Ethernet data will use the building's electrical




wiring to deliver networking data to the other





powerline adapter so that the computer can access




the internet.







Another standard is called




Ethernet over HDMI. The





HDMI 1.4 specification adds




another channel to an HDMI




cable for data, which will




have the capability of
Wiring Standards


network communication. So




the connected devices that HDMI cable





use this feature will have the



ability to send and receive data at 100 Mb/s Ethernet.





So, in addition to video and audio on a single cable, the




HDMI cable will have another ability of Ethernet




networking.

































The terms 568A and 568B, refer to a set of wiring




standards developed by TIA / EIA, which is also known




as the Telecommunications




Industry Association. And




these terms define the





rules on how twisted pair




cables should be wired to




RJ-45 connectors.









135

The 568A standard is wired in this order: White/green,





then green, white/orange, blue, white/blue, orange,




white/brown, and brown.











White - Green


Green


White - Orange


Blue



White - Blue


Orange


White - Brown


Brown









568A wiring standard














And the 568B standard is wired in the following order:




white/orange, then orange, white/green, blue,




white/blue, green, white/brown, and brown.













White - Orange


Orange



White - Green


Blue


White - Blue


Green


White - Brown


Brown










568B wiring standard








There is no difference in the functionality as to which





standard is used.




















136

Whether you choose to use the A or B wiring standard,





if both ends of the cable are wired using the same




standard, then this is known as a straight cable. For




example, this cable is wired on both ends using the




568A standard.




































Straight cable






A straight cable allows signals to pass straight through




from end to end. This is the most common type of




cable and it's used to connect computers to hubs,




switches, or modems.








Another type of cable is called a crossover. A




crossover cable is created when both ends of the cable




are wired using the two different standards. For




example, one end is wired using the A standard, and




the other end is wired it using the B standard.








































Crossover cable






Crossover cables are used to connect two similar




devices together. For example, you can use a










137

crossover cable to connect two computers directly to





each other without using a hub or switch. They are also




used to connect hubs or switches to each other.








A rollover cable is created when both ends are wired




completely opposite of each other. These are used to




connect a computer or a terminal, to a router’s console





port.




























Both ends are wired



completely opposite




from each other.



























Rollover cable











A loopback cable is used for testing purposes. It’s to




make a computer think that it's connected to a network.




To make a loopback cable, you connect pin 1 to pin 3





and pin 2 to pin 6.





































Loopback cable







138

Firewalls
























A firewall can be either software or hardware. It's a





system that is designed to prevent unauthorized access




from entering a private network, by filtering the




information that comes in from the internet. It blocks




unwanted traffic and permits wanted traffic. So




basically it filters the incoming network data packets




and determines by its access rules if it is allowed to





enter the network. In today's high tech world, a firewall




is essential to every business to keep their network




safe.
















































Firewall in a private network.














Firewalls come in different types. One type is called a




host-based firewall. A host-based firewall is a





software firewall. This is the kind of firewall that is




installed on a computer and it protects that computer




only and nothing else. For example, later versions of




Microsoft operating systems come pre-packaged with a




host-based firewall. You can turn a host-based firewall




on or off, and you can also create exceptions to the








139

firewall based on the application name on the





exceptions tab (see below). And of course, you can




always purchase a third-party firewall and install it on




your computer.





































Media Types































Host-based Firewall on Exceptions tab on a host-



Microsoft Windows. based firewall.



































Today there are several different categories of twisted




pair cables that you're going to need to know for the




exam. The difference between these is the maximum





speed that can handle without having any crosstalk




(interference). The numbers of these categories




represent the tightness of the twists that are applied to




the wires. And you can see an illustration below of the




categories and speeds of different twisted pair cables.










140

CATEGORY SPEED









10 Mbps











100 Mbps










1,000 Mbps e = enhanced









1,000 Mbps 10,000 Mbps (cable


length under 100 meters)






10,000 Mbps a = augmented









10,000 Mbps Added shielding to the

wires.



















Unshielded twisted pair (UTP) is by far the most




common type of table that is used today. It consists of




4 pairs of unshielded wires twisted around each other.




The wires are twisted to prevent electromagnetic




interference or crosstalk. This type of cabling is mainly





used on local area networks.

































Unshielded twisted pair (UTP) cable















Now shielded twisted pair (STP) is very similar to




unshielded twisted pair, except that it has a foil shield







141

that covers the wires. This shielding adds a layer of




protection against electromagnetic interference,




leaking into and out of a cable.





























Shielded twisted pair (STP) cable adds a



foil shield that covers the wires.














This is a coaxial cable. This




is used today primarily by




cable providers to provide a




computer with broadband




internet connection. Early on




it was used as a backbone





for networks, such as a bus


Coaxial cable
network. There are also




two common types of




coaxial cable. The first type is RG-6. RG-6 is made for




long distances and is commonly used for cable




television and internet connection. The second type is





RG-59, and this is made for short distances and is




commonly used for high definition and high quality




video.






Now we're getting into fiber optic cables. Below, are




cutaway views of fiber optic cables and a light source.





Fiber optic cable uses pulses of light to send data, and




as a result, it is very fast and it can span for great




distances.







142

Now there were two different modes in fiber optics:




Single-mode fiber and multi-mode fiber. Single-mode





fiber is a fiber optic cable that allows light to enter only at




a single angle. So when this type of transmission of light




enters at this angle, it can span for long distances.









































Single-mode fiber - Light enters at a single



angle. Made for long distances.

















Below is multi-mode fiber. The difference between




multi-mode and single-mode, is that in multi-mode, light





travels in multiple beams that reflect off the walls of the




cable. And unlike single-mode fiber, multi-mode fiber is




made for short distances.







































Multi-mode fiber - Light reflects off the walls of



the cable. Made for short distances.























143

Network
Components










































Those of you who have




broadband cable internet will




recognize this device. And yes,




this is your typical DOCSIS





cable modem. DOCSIS stands




for data over cable service




interface specifications. The




DOCSIS 3.1 specification




supports speeds of 10 gigabit





downstream and 1 gigabit




upstream. The DOCSIS modem




handles both incoming and


Cable modem
outgoing data signals, including




internet, video, and voice.














A hub is a device that has




multiple ports that accepts




Ethernet connections from





network devices. A hub is




considered not to be




intelligent because it does




not filter any data or has any Hub




intelligence as to where




data is supposed to be sent. When a data packet









144

arrives at one of the ports, it is copied to all other ports,




so all the devices on that hub sees that data packet.





So this not only creates security concerns, but it also




creates unnecessary traffic on the network.











Now a switch is very similar to a hub. It's also a device




that has multiple ports that accepts Ethernet




connections from network devices. But unlike a hub, a





switch is intelligent. A switch can actually learn the




physical addresses of the




devices that are connected




to it, and it stores these




addresses in a table. So




when a data packet is sent





to a switch, it’s directed




only to the intended




Switch destination port. That's the




major difference between




a hub and a switch. So




as a result, switches are far more preferred over hubs,




because they reduce any unnecessary traffic on the




network.













A bridge is used to divide a network into separate





collision domains. For example, if you have a network




that is segmented into two by a couple of hubs, then all




the broadcast traffic from the two segments are seen by




all the computers. And this causes unnecessary traffic.




So that is where a bridge can be helpful. If you add a




bridge to this network, it will reduce any unnecessary








145

traffic between the two segments by filtering the data




based on their MAC address. The bridge only allows




data to crossover if it meets the required MAC address





of the destination, because a bridge keeps a record of




all the MAC addresses of the NICs that are connected




to it. And it will also block all data from crossing over if




it fails to meet this requirement.




























Bridge































Segment 1 Segment 2








Bridges reduce unnecessary traffic on a network by




allowing or blocking data based on their MAC address.







A segment is part of a network that is separated




from the rest of the network by a device, such as a



hub, switch, bridge, or router.















Now a router does exactly what its name implies. A




router is a device that routes or forwards data from one





network to another based on their IP address. When a




data packet is received from the router, the router




inspects the packet and determines if the packet was




meant for its own network or if it's meant for another






146

network. If the router determines that the data packet




is meant for its own network, it receives it. But if it's




not meant for its own network, it sends it off to another




network. So a router is essentially the gateway for




network.












































Router







Networking devices need electrical power to function,




and that's why they have a separate power cable. But




some networking devices don't have a power cable.





It’s not that they don't need electrical power, it's just




that they get their power and data from the same




cable, which is through the Ethernet cable. And this




technology is known as PoE, which stands for power




over Ethernet.















































Here is a switch and a hub that receive power from



the network Ethernet cable, instead of a separate




power cable.






147

A wireless access point is basically a wireless hub




that is used by wireless devices. It connects to a wired




network and relays data between the wired network





and the wireless device for communication purposes.




In the illustration below, you see a wireless access




point that's wired to a network so that the wireless




laptop can communicate with the network.



























Wireless access




point (WAP)


















































A network interface card or NIC, is used to connect a




computer to a network. It is basically a circuit board




with a network adapter that is installed on your




computer. Its job is to convert




incoming serial data into parallel




data, so that the computer can





understand it. A NIC provides a




constant dedicated connection to a




network. And every NIC has its




own unique identifier, called a NIC





MAC address.




148


Click to View FlipBook Version