54
Maichew Polytechnic College Training, Teaching and Learning Materials Development Learning Guide Date: Dec 9,2013 Page 1 of 54 2 st Revision Author: Haftamu Hailu MPC-ITD MAICHEW POLYTECHNIC COLLEGE under Ethiopian TVET-System INFORMATION TECHNOLOGY SUPPORT SERVICE Level II Unit of Competence : Administrate Network and Hardware peripherals Module Title :Administrating Network and Hardware peripherals LG Code : ICT ITS2 L03 03 TTLM Code : ICT ITS2 TTLM 0313

Administare Netwrok and Peripheral Devices Information Sheet

Embed Size (px)

DESCRIPTION

Administare Netwrok and Peripheral Devices Information Sheet

Citation preview

  • Maichew Polytechnic CollegeTraining, Teaching and Learning Materials Development

    Learning Guide Date: Dec 9,2013 Page 1 of 542st Revision Author: Haftamu Hailu MPC-ITD

    MAICHEW POLYTECHNIC COLLEGEunder

    Ethiopian TVET-System

    INFORMATION TECHNOLOGYSUPPORT SERVICE

    Level II

    Unit of Competence : Administrate Network and Hardware peripheralsModule Title :Administrating Network and Hardware peripheralsLG Code : ICT ITS2 L03 03TTLM Code : ICT ITS2 TTLM 0313

  • Maichew Polytechnic CollegeTraining, Teaching and Learning Materials Development

    Learning Guide Date: Dec 9,2013 Page 2 of 542st Revision Author: Haftamu Hailu MPC-ITD

    LO 1: Confirm Requirements of Clients

    INTRODUCTION Learning Guide # 1

    This learning guide is developed to provide you the necessary information regarding the followingcontent coverage and topics

    Introduction to Computer and Connecting Peripherals Identify Client Requirements

    This guide will also assist you to attain the learning outcome stated in the cover page.Specifically, upon completion of this Learning Guide, you will be able to

    Identify and confirm client peripherals requirements in accordance with organizationalstandards

    Document client requirements and peripherals needed in line with organizational standards andreport findings to the appropriate person

    Verify client requirements with appropriate person in line with organizational standards andreporting procedures

    Take action to ensure client support expectations are covered by vendor warranty and supportservices

    Your teacher will evaluate your output either satisfactory or unsatisfactory. If unsatisfactory,your teacher shall advice you on additional work. But if satisfactory you can proceed to the nexttopic.

  • Maichew Polytechnic CollegeTraining, Teaching and Learning Materials Development

    Learning Guide Date: Dec 9,2013 Page 3 of 542st Revision Author: Haftamu Hailu MPC-ITD

    Information Sheet 1 Introduction to Computer and Connecting Peripherals

    Definitions of computer peripherals

    External or tangible devices which are attached to the external part of the computer Any device connected internally or externally to a computer and used in the transfer of data. A personal

    computer or workstation processes information and, strictly speaking, that is all the computer does. Any input, output or storage device connected externally or internally to the computer's CPU, such as a

    monitor, keyboard, printer, disk, tape, graphics tablet, scanner, joy stick, paddle or mouse.

    Device driver

    It is a small program that tells the computer how to communicate with input/output (peripheral) devices. Everyperipheral device needs device driver to communicate with the computer system.

    Computer peripherals were grouped into several categories: The Input Devices, The Output Devices,the Processors, The Storage Devices.

    The Input device - is a device thats been used as a means of input. It is any peripheral used toprovide data and control signals to an information processing system such as a computer orother information appliance. The common input devices are keyboard, mouse, scanner.

    Keyboard - The computer key board is used to input, or enter,letters, numbers, symbols, punctuations and commands into thecomputer. The standard keyboard layout is sometimes calledQWERTY layout and it is the most common layout.

    Mouse or a pointing device is any human interface device that allows auser to input spatial data to a computer. In the case of mice and touchscreens, this is usually achieved by detecting movement across aphysical surface. Analog devices, such as 3D mice, joysticks,or pointing sticks, function by reporting their angle of deflection.Movements of the pointing device are echoed on the screen bymovements of the cursor, creating a simple, intuitive way to navigate a computer's GUI.

    Types of mouse

    Opt mechanical mouse - The optical-mechanical or Opto-mechanical mouse consists of a ball thatrolls one of two wheels inside the mouse.

    Optical mouse - Computer mouse that utilizes light-emitting diodes (LED) or laser as a method oftracking movement. These mice are more proficient than other computer mice. These mice are

  • Maichew Polytechnic CollegeTraining, Teaching and Learning Materials Development

    Learning Guide Date: Dec 9,2013 Page 4 of 542st Revision Author: Haftamu Hailu MPC-ITD

    easily identified by examining the bottom of the mouse. If the mouse has no ball or has a lightemitting from the bottom it's most likely an optical mouse.

    Scanner : Is a device that can scan or digitize images on paper andconvert them to data that the computer can use. They can then bestored in a file, displayed on the screen, added to documents, ormanipulated.

    Imaging and Video input devices

    Video input devices are used to digitize images or video from the outside world into the computer. Theinformation can be stored in a multitude of formats depending on the user's requirement.

    digital camera Webcam Image scanner Fingerprint scanner Barcode reader 3D scanner Laser rangefinder

    Audio input devices

    In the fashion of video devices, audio devices are used to either capture or create sound. In some cases,an audio output device can be used as an input device, in order to capture produced sound. MicrophoneMIDI keyboard or other digital musical instrument

    Output DeviceAn output device is any piece of computer hardware equipment used to communicate the results of dataprocessing carried out by an information processing system (such as a computer) to the outside world.

    In computing, input/output, or I/O, refers to the communication between an informationprocessing system (such as a computer), and the outside world. Inputs are the signals or data sent to thesystem, and outputs are the signals or data sent by the system to the outside.

    Examples of output devices:

    Speakers Computer speakers range widely in quality and in price. The computerspeakers typically packaged with computer systems are small, plastic, and havemediocre sound quality. Some computer speakers have equalization featuressuch as bass and treble controls.

    Headphones: are a pair of small loudspeakers, or less commonly a singlespeaker, held close to a user's ears and connected to a signal source such asan audio amplifier, radio, CD player or portable media player. They are alsoknown as stereo phones, headsets or, colloquially cans. The in-ear versionsare known as ear phones or ear buds.

  • Maichew Polytechnic CollegeTraining, Teaching and Learning Materials Development

    Learning Guide Date: Dec 9,2013 Page 5 of 542st Revision Author: Haftamu Hailu MPC-ITD

    Screen (Monitor) A monitor or display (sometimes called a visualdisplay unit) is an electronic visual display for computers. The followingare Type of Monitor

    Cathode ray tubes (CRTs), LCD monitors Printer In computing, a printer is a peripheral which produces a text

    and/or graphics of documents stored in electronic form, usually on physicalprint media such as paper or transparencies.

    The Processor

    The Processor or the central processing unit (CPU) is the portion of a computer system thatcarries out the instructions of a computer program, to perform the basic arithmetical, logical, andinput/output operations of the system. The CPU plays a role somewhat analogousto the brain in the computer.

    Two typical components of a CPU are the arithmetic logic unit (ALU), whichperforms arithmetic and logical operations, and the control unit (CU), whichextracts instructions from memory and decodes and executes them, calling on theALU when necessary.

    Example of Processors are: Pentium 4, Core Duo, Dual Core, Core i3, Core i5, Corei7

    The Storage devicesComputer data storage, often called storage or memory, refers to computer components and recordingmedia that retain digital data. Data storage is one of the core functions and fundamental components ofcomputers.

    There are 3 types of storage devices:

    1. Primary Storage is also known as the main memory or a temporary storage device. It is fast innature but can accommodate only few data. Data that has been stored in memory flushes off whenyou restart your computer, thus called temporary storage device.

    It is the only one directly accessible to the CPU. The CPUcontinuously reads instructions stored there and executes them as required.Any data actively operated on is also stored there in uniform manner.

    2. Secondary Storage Secondary storage (also known as externalmemory or auxiliary storage), differs from primary storage in that itis not directly accessible by the CPU. Secondary storage does notlose the data when the device is powered downit is non-volatile.Examples of a secondary storage device are Internal Hard drive,external Hard Drive, Flash Disk, CD/DVD, Floppy disk, Memorycard.

  • Maichew Polytechnic CollegeTraining, Teaching and Learning Materials Development

    Learning Guide Date: Dec 9,2013 Page 6 of 542st Revision Author: Haftamu Hailu MPC-ITD

    3. Tertiary Storage - Tertiary storage or tertiary memory, provides a third level of storage. Typically itinvolves a robotic mechanism which will mount (insert) and dismount removable mass storagemedia into a storage device according to the system's demands; this data is often copied to secondarystorage before use.

    Connectivity devices : The majority of external peripheral devices connect to the back of the computerssystem unit with cables. The computers system unit has a variety of ports available for use by differentperipheral device cables. A port is a socket that is used to connect the cables from peripheral devices tothe computer.

    Computer connectivity devices were grouped into several categories:

    Ports

    Ports at the back of a computer Power supply

    There exist several types of ports like serial port, parallel port, USB port, AGP port, power supply port.

    Serial Port: As the name suggests, the serial port transfers data serially a bitat a time. As a result, the serial port needs only wire to transmit 8 bits. Thedisadvantage is that it takes 8 times longer to transmit a byte. Serial ports comein the form of 9-pin or 25-pin male connector. Serial ports are often known ascommunication ports or RS232C ports. They are typically used to connect devices like old mouse andmodem.

    Parallel ports can send or receive a byte (8-bit) at a time. Unlike the serialport, these 8-bits are transmitted parallel to each other. Parallel ports come inthe form of 25-pin female connector. Parallel ports are popularly used to connect printer, scanner, CD writer, zipdrive, external hard disk drive, tape backup drive, etc.

    To spare the user botheration of 8-pin, 25-pin, male, female connectors, the USBhas been designed. It gives you a single, standardized, easy-to-use way to connectup to 127 devices to a computer. These devices include printers, scanners, mice,joystick, digital camera, web cameras, speakers, telephones, zip drives, networkconnections, scientific data acquisition devices, etc.

  • Maichew Polytechnic CollegeTraining, Teaching and Learning Materials Development

    Learning Guide Date: Dec 9,2013 Page 7 of 542st Revision Author: Haftamu Hailu MPC-ITD

    AGP (Accelerated Graphics Port) port is used to connect to graphic card that provides high-speedvideo performance typically required in games and other multimedia applications.

    Ethernet port, the LAN port is a port connection that allows a computer toconnect to a network using a wired connection. In the picture to the right, is a closeup example of what a LAN port looks like for a network cable using an RJ-45connector. In the case of this example, the two led lights will blink when that port isactive and receiving activity.

    PS/2 connector is a 6-pin Mini-DIN connector used for connectingsome keyboards and mice to a PC compatible computer system. Itsname comes from the IBM Personal System/2 series of personalcomputers. The PS/2 designs on keyboard and mouse interfaces areelectrically similar and employ the same communication protocol.However, a given system's keyboard and mouse port may not be interchangeable since the two devicesuse a different set of commands. Today this connector has all but beenreplaced by USB

    Power Supply : is a device that supplies electrical energy to one ormore electric loads. A regulated power supply is one that controls theoutput voltage or current to a specific value; the controlled value is heldnearly constant despite variations in either load current or the voltagesupplied by the power supply's energy source.

    Video Graphics Array (VGA) connector is a three-row 15-pin DE-15 connector. The 15-pin VGA connector is found on many videocards, computer monitors, and some television sets. On laptopcomputers or other small devices, a mini-VGA port is sometimes used in place of thefull-sized VGA connector.

  • Maichew Polytechnic CollegeTraining, Teaching and Learning Materials Development

    Learning Guide Date: Dec 9,2013 Page 8 of 542st Revision Author: Haftamu Hailu MPC-ITD

    Connectors

    CAT5 NETWORK CABLE - This cable allows the computer to communicateto other computers over a network. It also provides networked computersaccess to the Internet

    MONITOR CABLE - This cable is usually permanently connected to a monitor.Small screws hold the cable in place

    USB CABLE - Most PC's now have these fast and versatile ports on the front and back.They can be used for portable storage devices, digital cameras, scanners, video cameras,printers, keyboards and mice - just about everything!

    POWER CORD - This is a standard "kettle cord" that connects the computer to the ACoutlet on the wall and the power supply of the computer. This MUST be unplugged if youare ever doing any maintenance work inside the computer.

    PRINTER CABLE - This is a 25-pin "D" shaped connector that connect printers tothe parallel port on a computer. (Newer printers may connect with a USB plug.)

    PS2 CABLE - On most computers these days, this connection is usedfor both the Mouse and the keyboard. This plug has 6 pins-

    VGA CABLE This is use to connect the monitor to the VGA port.

    AUDIO CABLE This is use to connect the speaker to the Audio port.

  • Maichew Polytechnic CollegeTraining, Teaching and Learning Materials Development

    Learning Guide Date: Dec 9,2013 Page 9 of 542st Revision Author: Haftamu Hailu MPC-ITD

    Information Sheet 2 Confirm Client Requirements

    System development life cycle

    To determine appropriate hardware peripheral devices needed within an organization, it is importantto clearly understand what your client needs. Often clients dont have a clear idea of what they wantuntil they have been presented with a series of options. Working out clients needs requires carefulplanning and organisation.

    The system development life cycle is a methodology that computer consultants often follow to helpthem properly investigate the clients information technology needs. The first three stages of the systemdevelopment life cycle are:

    1. Planning

    2. Analysing

    3. Designing.

    Planning

    This stage involves identifying the clients current technology and taking into account any limitations. During theplanning phase it is necessary to find out information including:

    system specifications

    connections available

    budget constraints

    available timeframe

    availability of physical space.

    A feasibility study can be performed to provide a preliminary report to the client about benefits, costs and impactto the organisation. Additionally, a project request form allows a client to document their initial request.

    System specifications

    It is important to find out the specifications of the computer system you are planning to connect theperipheral device to. Many newer types of peripheral devices require a specific amount of memory, CPUspeed, hard disk space, and may only be compatible with certain operating systems.

    You also need to be aware of the peripherals system requirements. The manual for the peripheral deviceas well as the manufacturers website will help you determine the minimum system specifications.

  • Maichew Polytechnic CollegeTraining, Teaching and Learning Materials Development

    Learning Guide Date: Dec 9,2013 Page 10 of 542st Revision Author: Haftamu Hailu MPC-ITD

    Computer peripherals requirement considerations

    Desktop hardware, such as a desktop computer itself, is the most common type of IT hardwarepurchased by a small business. The cost of hardware depends on its specification, which in turn isdetermined by some key components. When you buy desktop hardware, you will need to decidewhat the specification of these key components should be.

    The processor is the driver of the computer. Processors are usually differentiated by speed,measured in gigahertz (GHz). The higher the GHz, the faster the computer will run. You should buythe fastest processor you can afford, but a 3 GHz processor will normally be enough for mostbusiness functions, e.g. word processing and spreadsheets, together with some multimedia.

    Memory is used by the processor to run programs. Generally, the more random access memory(RAM) you have, the better your computer will run when using several programs at once. Yourcomputer should have enough memory to make the most of the processor speed. For a 3 GHzprocessor, for example, you should have around 2-3 gigabytes (GB) of RAM.

    The hard disk is used to store the data you create in your business, as well as the programs you use.Its capacity is much greater than the RAM. An office computer with a 3 GHz processor should haveat least 200 GB of hard disk space, but if you intend to use a single desktop PC as the main storagelocation for all your business data, you will need at least 500 GB.

    External plug-ins, such as rewritable DVD, DVD-Read Only Memory (ROM), or CD-RW(rewritable) drives can be used to supplement your computer's memory.

    The monitor is the computer's display screen. Liquid Crystal Display (LCD) or flat screen monitorsoffer reduced bulk and lower power consumption, relative to cathode ray tube (CRT) monitors.Monitors are normally measured diagonally in inches - typically 19, 22 or 24. Larger or wide-screenmonitors allow you to compare two documents on-screen. Many monitors have an aspect ratio - theproportion of image width to height - of 16:10, although screens with a 16:9 ratio are becoming morewidely available and offer higher resolution.

    Display adapter Software requiring a better than average computer graphics display, like graphicseditors and high-end games, often define high-end display adapters in the system requirements.

    Software requirements

    Software Requirements deal with defining software resource requirements and pre-requisites that needto be installed on a computer to provide optimal functioning of an application. These requirements orpre-requisites are generally not included in the software installation package and need to be installedseparately before the software is installed.

    1. Platform: In computing, a platform describes some sort of framework, either in hardware orsoftware, which allows software to run. Typical platforms include a computer's architecture, operatingsystem, or programming languages and their run time libraries.

  • Maichew Polytechnic CollegeTraining, Teaching and Learning Materials Development

    Learning Guide Date: Dec 9,2013 Page 11 of 542st Revision Author: Haftamu Hailu MPC-ITD

    2. APIs and drivers: Software making extensive use of special hardware devices, like high-end displayadapters, needs special API or newer device drivers. A good example is DirectX, which is a collection ofAPIs for handling tasks related to multimedia, especially game programming, on Microsoft platforms.3. Web browser: Most web applications and software depending heavily on Internet technologies makeuse of the default browser installed on system. Microsoft Internet Explorer is a frequent choice ofsoftware running on Microsoft Windows, which makes use of ActiveX controls, despite theirvulnerabilities.Other requirements

    Hardware Requirements for Windows 7 systemIf you want to run Windows 7 on your PC, here's what it takes:

    1 gigahertz (GHz) or faster 32-bit (x86) or 64-bit (x64) processor 1 gigabyte (GB) RAM (32-bit) or 2 GB RAM (64-bit) 16 GB available hard disk space (32-bit) or 20 GB (64-bit) DirectX 9 graphics device with WDDM 1.0 or higher driver

    The minimum hardware requirements for Windows XP Home Edition are: Pentium 233-megahertz (MHz) processor or faster (300 MHz is recommended) At least 64 megabytes (MB) of RAM (128 MB is recommended) At least 1.5 gigabytes (GB) of available space on the hard disk CD-ROM or DVD-ROM drive Keyboard and a Microsoft Mouse or some other compatible pointing device Video adapter and monitor with Super VGA (800 x 600)or higher resolution Sound card Speakers or headphones

    After you have determine your organization needs, you can now start documenting yourhardware needs, to help you decide on the specifications, canvassing would be a great idea. There wereseveral sites in the net where you can browse and compare the price of the different medium range tohigh end computer peripherals. One by one you can list down the hardware specs for your client. Thelist below will help you in documenting your chosen hardware:

    Processor :RAM or Memory :Hard Disk size :Video Card :LAN Card :DVD drive :Sound Card :Mouse :Keyboard :Monitor :

  • Maichew Polytechnic CollegeTraining, Teaching and Learning Materials Development

    Learning Guide Date: Dec 9,2013 Page 12 of 542st Revision Author: Haftamu Hailu MPC-ITD

    One deciding factor to consider in buying computer peripherals is the warranty and after sales support service.A cheaper price would vary greatly on the performance, durability and warranty. Mostly, the cheaper it gets, theless durable and less warranty you could expect. Oftentimes, the good warranty and after sales service theyprovide, the better the quality of the products they have. Do not risk buying the cheaper one if youre not sure ofthe quality.

    After you have finalized your hardware specifications, you can now forward it to the right person for budgetconsiderations and finally for procurement.

    Budget constraints : While planning the connection of hardware peripheral devices, it is important to beaware of the clients available budget. A client needs to determine whether the benefits that will begained from the peripheral device justify the financial outlay. Factors including the organizations size,the necessity of the peripheral device to the organization, number of people requiring the device, will allcontribute to the organizations allocation of a budget. Costs will sometimes prohibit an organizationfrom proceeding with the purchase of equipment.

    Another cost to consider is ongoing maintenance. A laser printer, for example, may initially be moreexpensive to purchase than an inkjet printer. However when you consider that some inkjet cartridges cancost nearly as much as an inkjet printer, it may be more practical to choose a laser printer, where tonercosts are more reasonable.

    Available timeframe: The time available to complete a task also needs to be considered when identifyingclient requirements. If, for example, a peripheral device is needed urgently, it will be necessary toquickly find out which suppliers can immediately provide the peripheral equipment.

    Physical space restrictions: Before considering acquiring any peripheral device, planning needs to bedone to work out where and how the peripheral will reside. The following questions need to beconsidered:

    What physical space is available to accommodate the device?

    Are power points in a near proximity if the device needs them?

    If a peripheral does not have access to a suitable power source, problems may occur including theoverloading of power boards and power leads causing dangerous obstructions to users of the equipment.

    Will the installation of the device mean other equipment needs to be relocated?

    Could the device cause disruption or impact on the safety of users?

    Feasibility study: A feasibility study can be carried out to show the client benefits, approximate costs ofthe new equipment and the impact on the organisation. Several hardware devices can also berecommended to the client. The aim of the feasibility study is to recognise the best solution under thecircumstances by identifying the effects of this solution on the organisation.

    After undertaking a feasibility study, it may be discovered that a simple solution is possible. Take theexample of an organisation that would like to update their monitors so that they can have better screen

  • Maichew Polytechnic CollegeTraining, Teaching and Learning Materials Development

    Learning Guide Date: Dec 9,2013 Page 13 of 542st Revision Author: Haftamu Hailu MPC-ITD

    resolution. Changing the monitors internal settings could be a very simple solution to obtain animproved resolution.

    A feasibility study can also reveal that a clients peripheral requirements are not achievable. Therequirements may exceed budget, or the requested peripheral devices may not be compatible with the currentcomputer system. The results of a feasibility study can determine whether or not an organisation proceeds withthe purchase and installation of the peripheral devices.

    Project request form

    An initial request for hardware peripheral devices can be documented using a project request form. This formdocuments information from both the client and the computer consultant in order to document preliminaryrequirements.

    Typical information requested on a project request form includes: project title date received

    completion date

    project number description of problem

    objectives anticipated benefits

    person requesting

    constraints.

    Analyzing:

    In the analysis phase, the clients requirements are investigated in more depth. It is important to try togain as much information from the client as possible, in order to obtain an accurate understanding of thesituation. Detailed client requirements, such as:

    specific features of the device required the number of people who will need to use device support expectations training requirements can all be obtained during this phase.

    Interviews, questionnaires, checklists and observations are some methods that consultants use to gatherinformation. If a device is to be used by a large group of users, a questionnaire or checklist could beconstructed to find out what features are required by the majority of users. Interviewing users canprovide a better way of finding out specific information.

    Interviews: A well-prepared interview can help provide you with valuable information about your clientrequirements. Information that has been collected during the planning stage can also give you someuseful background information when preparing questions.

    Questions asked of a client may be specific or open ended. Specific questions generally mean that the client willgive either a yes/no response or a specific answer. Open-ended questions, however, generally commence with

  • Maichew Polytechnic CollegeTraining, Teaching and Learning Materials Development

    Learning Guide Date: Dec 9,2013 Page 14 of 542st Revision Author: Haftamu Hailu MPC-ITD

    how or why. These types of questions help to discuss and clarify issues and establish a firmer understanding ofclient requirements.

    For example, some questions you may want to ask during an interview to replace an existing printer couldinclude:

    How will a new printer solve existing printer issues?

    Who will be using the new printer the majority of the time? What will be the new printer key purposes? Eg:

    letters

    advertising brochures

    information from the Internet.

    Why do you need colour printing?

    What is the approximate number of pages that would be printed each day?

    Questionnaires

    Questionnaires are helpful when you need to gather information from a number of clients. Anumber of questions incorporating short answers, multiple choice and true/false choices can help youquickly determine what kinds of features the majority of clients are requiring.Here is a sample questionnaire to help establish a suitable mouse:

    1. Trackball feature Would a trackball device be helpful for you to manipulate images? Yes/No

    2. Would you prefer a wireless mouse? Yes/No

    3. List any other features you would like to be able to have available with your mouse:

    _____________________________________________________________

    _____________________________________________________________

    Checklists

    In a similar manner to questionnaires, checklists that ask clients to choose what features they would likefrom a specific peripheral device can also provide an efficient way to determine a set of popular requirements.

    Observations: Even informal observations of current business procedures can provide another way ofdetermining client needs. Observing users as they go about their day-to-day tasks, can confirm if currentperipheral devices are not working properly or assessing the need for a new peripheral device.

    Designing: The design phase enables you to figure out an effective solution. All the information youhave gathered via questionnaires, interviews, observations and during planning can be assessed todetermine the best way of satisfying client requirements.

    There will often be several peripheral devices that are capable of performing the job satisfactorily. Anevaluation grid can be created to show the client each devices functionality.

  • Maichew Polytechnic CollegeTraining, Teaching and Learning Materials Development

    Learning Guide Date: Dec 9,2013 Page 15 of 542st Revision Author: Haftamu Hailu MPC-ITD

    The example below illustrates an evaluation grid that could be used for appraising scanners.

    Specifications Scanner 1 Scanner 2 Scanner 3PriceOptical resolution (dpi)DimensionsOperating systemSoftware includedComments

    Once client requirements have been clarified, all requests for hardware peripherals need to bedocumented clearly in a concise form. An organisation will often have its own organizational standards(for example, report templates, guidelines) to which you will need to adhere. The documentation willalso need to be checked and confirmed by the client before a request for purchase in sent to the preferredsupplier.

  • Maichew Polytechnic CollegeTraining, Teaching and Learning Materials Development

    Learning Guide Date: Dec 9,2013 Page 16 of 542st Revision Author: Haftamu Hailu MPC-ITD

    LO 2: Obtain Required Peripherals

    Obtaining a peripheral

    The first step in obtaining a peripheral device is to locate suppliers of that device. Then, there are factorsyou need to consider about the supplier and the devices on offer, such as support provided and purchase price.This will help you to compare and choose the most appropriate supplier and the exact model of the deviceaccording to client requirements. Finally, you are ready to place an order for your organisation or client topurchase the device.

    Locating a supplier

    There are many ways to find a supplier of peripheral equipment. Some ways include:

    Searching the Internet

    The Internet provides different methods for searching for suppliers. Using search engines such as Googleor Yahoo can help you find a hardware supplier anywhere in the world. Suppliers will often have their ownwebsites that can provide you with catalogues of available equipment. Other ways to investigate suppliers are tofollow links from a website such as a manufacturers website, or to browse website directories that may be linkedto search engine home pages.

    PC magazines

    Computing magazines often contain a large section devoted to advertising current hardware suppliers.

    Newspapers

    Major newspapers have computer/IT sections or classified advertisements which can be a source forfinding suppliers.

    Brochures/advertising material

    Many larger hardware suppliers use television, radio or leaflet deliveries to inform potential customers oftheir latest hardware.

    Telephone directory

    A telephone directory is useful if you need to find a hardware supplier located within your local area.

    Information Sheet 1 Obtaining hardware peripherals

  • Maichew Polytechnic CollegeTraining, Teaching and Learning Materials Development

    Learning Guide Date: Dec 9,2013 Page 17 of 542st Revision Author: Haftamu Hailu MPC-ITD

    Contacting the manufacturer directly

    Manufacturers generally have their own websites. These may list major suppliers in your area. Emailingor telephoning the manufacturer may also be a way to find out names of local suppliers.

    Choosing a supplier

    With so many choices of suppliers available, how do you find the right one? There are a few factors toconsider:

    How long has the supplier been operating? It is a good idea to find a supplier who will still be around forthe lifetime of the hardware.

    Does the supplier offer suitable support and training? If the client will be requiring a lot of additionalassistance, training could be a major contributing factor for choosing a particular supplier.

    Does the supplier offer competitive pricing? Considering the support and stability, it is also important toweigh up these factors in relation to price. For a client with a strict budget, price may be a big issue whendetermining where to purchase hardware.

    Is the supplier a preferred supplier for your organization? Some organizations have arrangements thatequipment must be purchased from suppliers who are considered to be the preferred provider for theorganization. Organisations create these agreements because customer loyalty offers substantial discounts,extended warranties and additional support.

    Selecting a peripheral

    Once you have selected suitable suppliers you need to contact each supplier. Information you should findout from the supplier includes:

    model and manufacturer names of peripherals that will satisfy the majority of your clients requirements(including system specifications, physical dimensions, support)

    price of each model

    availability of each model.

    You may find it helpful to keep a record of any details that you collect so you refer to this information quicklyand easily.

    Placing an order

    Depending on the type of organisation you work for, placing an order for a hardware peripheral devicecould be done in a variety of ways. In a small organisation you may be responsible for ordering the deviceyourself. However, in a larger organisation there may be employees who are responsible for purchasing newequipment. You may need to fill out an order form that can be given to the purchasing department.

    Before an order is submitted, it could also be necessary to obtain final approval from senior staff. Oftenan order form might require signatures from the manager or supervisor before it can be processed. A purchasing

  • Maichew Polytechnic CollegeTraining, Teaching and Learning Materials Development

    Learning Guide Date: Dec 9,2013 Page 18 of 542st Revision Author: Haftamu Hailu MPC-ITD

    department might require written quotes from three suppliers, a recommendation and justification for thechosen supplier.

    Make sure that you find out from your supervisor or manager what procedures you need to follow when placingan order within your organisation.

    Sample order form

    From:____________________________

    Date: ____________________________

    Code Quantity Description Price Supplier Name

    COSTGSTTOTAL

    Delivery point: _________________________________________________

    Budget holders signature : _______________________________________

    Please return to the Purchasing Department

  • Maichew Polytechnic CollegeTraining, Teaching and Learning Materials Development

    Learning Guide Date: Dec 9,2013 Page 19 of 542st Revision Author: Haftamu Hailu MPC-ITD

    Information Sheet 2 Hardware inventories

    Hardware inventories

    The purpose of a hardware inventory (or registry) is to keep detailed information about all the hardwareequipment within an organization. Every piece of hardware, including each computer and peripheral device,should be recorded on the inventory. As well as providing an excellent quick reference guide to the organizationshardware, an inventory can be very useful for insurance, warranty and service purposes.

    In order for an inventory to be a valuable source of information, it is vital that the information bemaintained regularly. New devices need to be entered into the inventory as soon as they have been obtained. Youmust also adjust the inventory frequently, to delete hardware that is no longer functional or has been removed.Some organizations do random checks or yearly audits of their hardware inventories to ensure that all informationis current.

    There are a number of tools available to create hardware inventories. Databases and spreadsheets areoften used to store the information. There are also software programs that you can purchase, designed specificallyfor recording hardware and software details. Although these programs are good for keeping a soft copy of theinformation, it is also essential that you keep a current hard copy (printed version) of the inventory. In this way,if the computer system ever fails you will still have the information.

    Details that should be included within a hardware inventory include:

    description of hardware device

    manufacturer

    supplier

    model number

    serial number

    warranty or maintenance conditions

    components

    location

    number and identity of authorised users

    purchase price

    date of purchase.

  • Maichew Polytechnic CollegeTraining, Teaching and Learning Materials Development

    Learning Guide Date: Dec 9,2013 Page 20 of 542st Revision Author: Haftamu Hailu MPC-ITD

    Documenting peripherals used with each computer

    If the peripheral is an essential part of the computer system (for example mouse, keyboard or monitor) itis logical to record information about the device within the documentation for the computer to which it isconnected. Individual computer inventories will often contain detailed information about the computers relatedhardware and software. It may also be more practical to record information about the peripheral inside thecomputers record, if the device is also permanently connected to a computer (for example a printer or scanner).

    Hardware inventory (Example 1)

    Details for Administration ComputerManufacturer: DellModel: OptiPlex GX280MT MinitowerPowerOperating System: Windows XPSerial number: 12345RAM: 128 MbHard disk space: 160 GbMonitor: Dell UltraSharp 1905FP flat panel,Printer: HP LaserJet IIDKeyboard: Dell USB keyboardPointing device: Dell USB 2-button optical mouse with scroll

    Individually documenting each peripheral device

    If the device is shared between several computers, it makes more sense to keep information about theperipheral as an individual entry in an inventory. Devices such as digital cameras, data projectors and USB driveswould more likely to be used by many computers, thus it would make more sense to record their details separateto the computer details.

    Hardware inventory (Example 2)

  • Maichew Polytechnic CollegeTraining, Teaching and Learning Materials Development

    Learning Guide Date: Dec 9,2013 Page 21 of 542st Revision Author: Haftamu Hailu MPC-ITD

    Checking contents

    When unpacking any peripheral device, an organized and methodical approach needs to be taken.Randomly ripping open boxes and packaging without carefully identifying each component can potentially causemany problems later on.

    Prepare a suitable work area before you begin unpacking. This should include a large sturdy flat areawith no carpet so that small components will not be lost.

    Before commencing to open any packaging, find the manual for the device. Check instructions for anyprecautions or specific unpacking procedures. Most manuals will also contain a section that tells you a list ofincluded components. It is useful to create a checklist based on the component list. You will then be able to usethe checklist to mark off the components when they have been identified.

    Below is a sample checklist for a typical inkjet printer. printer

    cartridge

    power cable

    USB cable

    sample paper

    feeding device

    CD driver

    Be attentive when unpacking a peripheral device handle the packaging and contents with care, as you do notwant to damage your new device. Remove any packing material surrounding and also within the device. Someprinters, for example, have soft foam and plastic pieces inside the device to ensure that parts are locked into thecorrect position. Make sure that you remove these pieces and foam before installation.

    Inspect the equipment for damage that may have occurred during transport. If the equipment has beendamaged, report the damage to the supplier immediately.

    If possible, try to keep all the original packing material that came with your computer and its peripherals.Often this packaging gets thrown out because it is so bulky. It can be very useful, however, if you need to returnthe item within the warranty period as some manufacturers will request original packaging. It can also be goodprotection when transporting sensitive peripheral devices. For example, equipment such as digital cameras, videocameras and data projectors have delicate lenses which can break very easily.

    Storing peripherals

    Peripheral devices need to be located in a suitable environment otherwise there may be potentialproblems. It is a good idea to refer to the manufacturers manual to determine what guidelines should be followed.When storing peripherals it is important to:

    make sure equipment is kept in ideal working conditions

    adhere to current Occupational Health and Safety guidelines

    ensure the electrical safety of the device

    consider security of the device

  • Maichew Polytechnic CollegeTraining, Teaching and Learning Materials Development

    Learning Guide Date: Dec 9,2013 Page 22 of 542st Revision Author: Haftamu Hailu MPC-ITD

    Keeping equipment in ideal working conditions

    Each manufacturer will have their own recommendations on how to store their peripheral equipment. Inorder to guarantee that a peripheral will function correctly throughout its life it is important to follow guidelinesthat have been recommended by the manufacturer. Some common recommendations may include:

    Keep equipment in the correct position After unpacking, most devices will usually have a properresting position. If a device is not kept in its natural position, there could be problems when trying tooperate the device later on. For example, when a printer is stored in a vertical position, components such asthe ink cartridges could leak or be dislodged.

    Keep equipment away from weather, dust and other harmful material When finding a storagelocation, consider what kind of elements the device may be subjected to. If, for example, you store a USBdrive in a cabinet next to chalk, dust from the chalk could potentially damage the storage devices USBconnection.

    Do not expose equipment to extreme temperatures and high humidity Sudden changes intemperature can cause condensation in many peripheral devices. For instance, if a video camera is takenfrom a cold place to a warm place, condensation may form on the lens and internal parts.

    Avoid storing the device in direct sunlight Exposure to direct sunlight could damage many of theexternal components of a device as well as subject the device to high temperatures.

    Do not expose equipment to water or moisture If water gets inside many peripheral devices there is arisk of electric shock.

    Adhering to OH&S guidelines

    When positioning peripherals in their permanent locations it is important to take into account manyOH&S considerations as follows.

    Positioning of the monitor

    It is essential to position a monitor correctly to ensure it will suit the needs of the user. Tips include:

    Try to make sure that monitor is in a position away from the glare of sunlight.

    Check that the brightness and contrast controls of the screen have been adjusted to suit lighting conditionsin the room.

    The top of the screen should be the same level as the users eye level.

    Positioning of the keyboard

    A keyboard also needs to be positioned carefully to be of adequate comfort and safety for the user. Sometips include:

    Position the keyboard directly in front of the monitor and at the same height as the mouse.

    The keyboard should allow the users forearms to be parallel to the floor.

    Allow space for the computer user to rest their wrists.

  • Maichew Polytechnic CollegeTraining, Teaching and Learning Materials Development

    Learning Guide Date: Dec 9,2013 Page 23 of 542st Revision Author: Haftamu Hailu MPC-ITD

    Positioning of other equipment

    Some general Occupational Health and safety guidelines to consider when positioning other peripheral equipmentare:

    Make sure that you can reach the peripheral device and its components without having to strain your back.

    Place equipment such as scanners and printers at a suitable height so a user is easily able to reach papertrays, open scanner lids, etc.

    Make sure that equipment such as speakers is easily accessible if settings such as volume control need to bechanged.

    Ensuring electrical safety

    Some tips to ensure electrical safety are:

    Do not be tempted to add too many extension cables or double socket adapters to your existing electricalsockets.

    Never use damaged plugs or leads.

    If possible, ask an electrician to check the safety of your system.

    Position electrical leads where they will not cause tripping hazards to people.

    Physical security of devices

    In many situations it is important to consider the physical security of the peripheral devices. Somedevices, such as digital cameras, data projectors and USB drives, may not be permanently connected to acomputer so it will be necessary to find a secure location to store the device. Make sure that these kinds of devicesare secured in a lockable storage cupboard, cabinet or safe when not required. Some organisations install securitydevices onto desks to guarantee that computers are secure and will not be able to be taken from their positionunless unlocked.

    Storing consumables

    The term consumables refers to a product that is used once and then replaced. Examples of consumablesinclude printer cartridges, CDs and paper. As well as for computer equipment, consideration also needs to begiven to the way consumables for peripheral devices are stored.

    Paper

    Paper needs to be stored in an area which is cool and dry, to prevent moisture from fusing pages together.

    Ink cartridges and toner

    Make sure to store cartridges/toner in a cool dry place, away from sparks and open flames, with adequateventilation and do not expose the device to high temperatures. Also ensure that the cartridges are not taken out oftheir packaging until they will be used within the printer, as the ink will dry out before use.

  • Maichew Polytechnic CollegeTraining, Teaching and Learning Materials Development

    Learning Guide Date: Dec 9,2013 Page 24 of 542st Revision Author: Haftamu Hailu MPC-ITD

    CDs

    When possible, make sure that CDs are kept in their protective case, to minimise the chances of beingscratched. Also keep them out of direct sunlight and extreme temperatures.

    Summary

    There are several steps that you must go through when you obtain a peripheral device. The first stepinvolves working out where to obtain the device, whether it is from a supplier who regularly provides equipmentto the organization, or a supplier found from searching the Internet, magazines or telephone directory.

    Depending on the organization, placing an order for a device may be done in different ways. Somesmaller organizations may not have strict guidelines, while larger organizations may have strict procedures thatneed to be followed.

    Once the device has arrived it is always a good idea to keep a record of the device in a hardwareinventory. Recording details such as manufacturer, supplier, model, date of purchase and purchase price, can bevery useful especially if you need to send a device back within the warranty period.

    It is also a good idea to unpack the contents in an organized manner. Find a clear space to unpackcontents and create a checklist of equipment that should be supplied.

    Once the device has been unpacked, storage is another consideration. Make sure to look at themanufacturers guidelines, consider the security of the device and any occupational health and safety issues.

  • Maichew Polytechnic CollegeTraining, Teaching and Learning Materials Development

    Learning Guide Date: Dec 9,2013 Page 25 of 542st Revision Author: Haftamu Hailu MPC-ITD

    LO 3: Connect hardware peripherals

    INTRODUCTION Learning Guide # 3

    This learning guide is developed to provide you the necessary information regarding the following contentcoverage and topics

    Avoiding disruption to the client

    Connecting and configuring hardware peripherals Testing devices and creating a test plan

    This guide will also assist you to attain the learning outcome stated in the cover page.Specifically, upon completion of this Learning Guide, you will be able to

    Verify timeframe for installation schedule with the client in accordance with the organizationrequirements

    Remove and/or replace old peripherals with minimum disruption to clients taking into accountenvironmental considerations and OHS standards

    Connect new peripherals with minimum disruption to clients and taking into account the operating systemprocedures

    Configure the computer to accept the new peripherals Test hardware peripherals and confirm client satisfaction, particular attention must be paid to possible

    impact on other systems and adjustments are made as required

  • Maichew Polytechnic CollegeTraining, Teaching and Learning Materials Development

    Learning Guide Date: Dec 9,2013 Page 26 of 542st Revision Author: Haftamu Hailu MPC-ITD

    Information Sheet 1 Avoid disruption to the client

    Minimal disruption to the client

    One of the most important considerations when installing a new hardware peripheral is to try and install thedevice with the least amount of disruption to the client. A client may not be very happy if you install a piece ofhardware equipment while they are creating an urgent report. It is important to schedule installation times that are:

    1. also suitable to the clients or computer users schedules

    2. sufficient length to install and thoroughly test the hardware device.

    To achieve this, make sure that you are aware of:

    common organizational procedures that regularly need to be performed on the computer (for example, endof month processing or weekly backups) and plan installations outside these periods

    current projects, deadlines and schedules of the client/user.Installations should be scheduled for times such as:

    quiet periods (for example, during holiday periods) before or after normal office hours

    while the client/user is out of the office

    when the client will not be needing their computer.

    It can be difficult to work out how long it will take to install a peripheral device. It will vary according tothe type of device, current operating system, problems requiring troubleshooting and the experience of theinstaller. If you will be regularly performing installations, keeping a log of installations noting the timerequired and problems experienced could help to estimate the time spent on future installations.

    Once you have arranged a suitable time, make sure you adhere to it or give advanced notice if you will bedelayed. Remember that clients may have scheduled their daily workload around the installation.

    Also consider the timeframe expected by client when installing new hardware. If you work for a busyorganization it may be necessary to work out a daily to-do list. Order tasks with priority given to installations thatperform critical functions or have been waiting to be done for the longest amount of time.

  • Maichew Polytechnic CollegeTraining, Teaching and Learning Materials Development

    Learning Guide Date: Dec 9,2013 Page 27 of 542st Revision Author: Haftamu Hailu MPC-ITD

    Information Sheet 2 Testing devices and creating a test plan

    Testing

    In addition to ensuring a device is able to perform a basic task (such as printing a test page or scanning animage) it is also necessary that all functionality required by the client is tested. When new peripheral equipment isnot tested for critical functions before being used, it can lead to malfunction, causing large disruptions to clientsand potentially damage other parts of a computer system. If, for example, a new external zip drive has not beentested to check it will be capable of making backups of specific files, it could mean that vital information of theclients could be destroyed if those backups were not successful.

    Ensure that all new installations are thoroughly tested after initial setup and prior to use by the client.Depending on the device, different functions will need to be tested.

    Devices that have components that are known to degrade with time, especially printers, should also betested periodically. Printers need to be routinely tested, as components such as the ink cartridges and toner cancause deterioration of print quality and may require maintenance and/or cleaning.

    All tests should be completed according to a documented test plan.

    Some suggestions of functions that may be tested for a printer, scanner and digital camera devices areincluded below.

    Printer

    Printer functions that may be tested are:

    Can the printer handle different paper types (for example A4, A5, foolscap, thick, thin, overheadtransparencies)?

    Will the printer work successfully on different computers?

    Will the printer work successfully with different software packages (for example, word processing,spreadsheets and desktop publishing)?

    Is black and white print quality acceptable to clients?

    Is colour print quality acceptable to clients?

    Scanner

    Scanner functions that may be tested are:

    Is the resolution of a scanned image an acceptable quality?

    Does the scanner work correctly with different software packages (e.g. a word processor or desktoppublishing package)?

    Can the scanner handle items of unusual size and thickness (e.g. a large book or cardboard poster)? Does the OCR software scan a document successfully?

    Will the scanner work successfully on other computers?

  • Maichew Polytechnic CollegeTraining, Teaching and Learning Materials Development

    Learning Guide Date: Dec 9,2013 Page 28 of 542st Revision Author: Haftamu Hailu MPC-ITD

    What is a test plan?

    A test plan is used to work out a structured process to ensure that a new device will work under allexpected circumstances. It logically describes:

    1. Functions that need to be tested

    2. An example test case scenario

    3. Expected results for each scenario

    4. What actually happened once the test has been performed.

    Example test case scenarios should simulate realistic work patterns ie the scenario should realisticallydemonstrate if a function will be satisfactory after implementation.

    Because testing is so critical to the successful implementation of the new device, it is important that a testplan is comprehensive and considers every way a device will need to function after implementation. It is useful torefer back to the client requirements so that you will remember functions that will regularly be expected by theclient.

    On the next page is a test plan, with selected scenarios, to ensure that a printer is working to acceptableclient requirements.

  • Maichew Polytechnic CollegeTraining, Teaching and Learning Materials Development

    Learning Guide Date: Dec 9,2013 Page 29 of 542st Revision Author: Haftamu Hailu MPC-ITD

  • Maichew Polytechnic CollegeTraining, Teaching and Learning Materials Development

    Learning Guide Date: Dec 9,2013 Page 30 of 542st Revision Author: Haftamu Hailu MPC-ITD

    Operation Sheet 1 Connecting Computer Peripherals

    Connecting and configuring hardware peripherals

    With the large variety of computer systems, operating systems, peripheral types and features, andmanufacturers, each peripheral device will have its own individual installation procedure. It is important to referto manufacturer guidelines and manuals when installing any hardware device to ensure that all procedures arecorrectly followed.

    Procedures which are generally followed when installing any new peripheral device include:

    1. plugging in the cables between the device and the computer

    2. installing any drivers

    3. troubleshooting installation when necessary

    4. customising the device

    5. testing the device for satisfying required conditions.

    What are drivers?

    Whenever you install a hardware peripheral device, you will also have to install a driver. A driver is asoftware program that allows the hardware device to talk to the operating system.

    Generally, driver software will be included within the packaging of a new device. Sometimes operatingsystems, such as Windows XP, automatically provide their own drivers if you dont provide one. At times it maybe necessary to find a newer version of a driver than the one that has been provided by the manufacturer. It is agood idea to regularly check the manufacturers website to see if any new drivers have been developed.

    What is plug and play?

    Plug and play is a hardware technology that enables many operating systems to automatically recognisenew hardware devices and configure them automatically. Most USB devices support plug and play.

    Computer Peripheral Ports Power Supply

    Plugging in the cables between the device and the computer

  • Maichew Polytechnic CollegeTraining, Teaching and Learning Materials Development

    Learning Guide Date: Dec 9,2013 Page 31 of 542st Revision Author: Haftamu Hailu MPC-ITD

    To make your computer work, you need to connect all the hardware peripherals to the ports at the back ofthe CPU case, as shown above.

    Before connecting all the peripherals to its corresponding ports, see to it that the power cord was unpluginto the power source to prevent electrical related injury.

    You should be able to connect the Mouse, Keyboard, Monitor, Printer, Scanner, Speaker and power upyour computer by connecting the power cord to the power supply. After doing so, you can now start using yourcomputer.

    To do it, you connect the Monitor by using the VGA cord connector to the port

    Comparison of VGA and DVIMonitors will either have a VGA or a newer DVI plug (see picture, as they are a lot less apparent

    than PS/2 / USB by comparison). Most monitors use VGA connectors, and so most graphics cards haveVGA output. If you have one type of plug and the graphics card has another, you can easily buy anadapter. Some cards even come with one.

    Connecting the Mouse and the Keyboard

    There are two standard connectors for mice and keyboards; PS/2 connectors and the more modernUSB connectors. Plug the mouse and keyboard in the appropriate slot.

    PS2 Cable

  • Maichew Polytechnic CollegeTraining, Teaching and Learning Materials Development

    Learning Guide Date: Dec 9,2013 Page 32 of 542st Revision Author: Haftamu Hailu MPC-ITD

    To connect the scanner to the PC, you will use also use the USB cable.

    USB Cable

    For audio devices such as speaker or headset, you can connect it o and mic

    Speaker/headset

    mic

    Before powering up your PC, make sure that the power cable was connected to the power supply

    To connect the Printer to the PC, you will use the cable below via printer port.A USB able is now also being use to connect the new printer to the computer especially the colored andlaser printer.

    Installing a printer

    Printer cable

  • Maichew Polytechnic CollegeTraining, Teaching and Learning Materials Development

    Learning Guide Date: Dec 9,2013 Page 33 of 542st Revision Author: Haftamu Hailu MPC-ITD

    1. Obtain the correct printer cable

    In many cases a printer wont automatically have a cable included with the original purchase. Check theprinter specifications you will probably need to buy either a parallel or USB cable.

    2. Plug in the cable

    1. Turn off the power to both the printer and the computer.

    2. Plug the printer cable into the correct port of the PC depending on the type of printer the port will mostlikely to be either a USB or a parallel port located on the back of the computer. If you are plugging thecable into a parallel port connection you will need to secure the cable by either tightening small screws orsnapping in wire connectors.

    3. Install ink

    Depending on the printer you have you may need to install an ink cartridge (for inkjet printers) or tonercartridge (for laser printers). Turn the computers power on and follow the manufacturers guidelines to install anew cartridge.

    4. Install the printer driver

    At some point the computer will either recognise that new hardware has been installed (for example if theoperating system is plug and play compatible) or you will need to tell the computer that a new device has beenadded. In either case, you will at some stage be asked for the printer model and a printer driver. Make sure youinstall the printer driver at this stage. Sometimes the installation CD will automatically run, installing the printerdriver at the same time.

    5. Print a test page

    Often at the end of the driver installation you will be asked if you would like to print a test page. This is agood idea because you can quickly determine if the printer is working correctly. If not you can troubleshoot theinstallation.

    6. Troubleshoot printer installation (when necessary)

    If a page is not able to print it is necessary to go back and determine why the printer is not working. Thereare a number of factors that can contribute to printer problems including:

    cables between printer and computer are not properly connected

    printer driver is not suitable for the current operating system

    paper is loaded incorrectly

    ink cartridge or toner is not correctly installed

    printer power switch is off.

    Suggested solutions for common printer problems

  • Maichew Polytechnic CollegeTraining, Teaching and Learning Materials Development

    Learning Guide Date: Dec 9,2013 Page 34 of 542st Revision Author: Haftamu Hailu MPC-ITD

    A blank page is coming out of the printer You may have run out of ink or toner. Replace ink cartridge or toner.

    Make sure that your printer has been set to the default setting.

    The document is printing on the wrong part of the page Check that you have aligned printer to the correct orientation (portrait or landscape). Make sure the margins have been set correctly in the software program you are using (eg the word

    processor or desktop publishing package). Make sure that the paper has been loaded correctly.

    The quality of the printout is poor If the printer is an inkjet the heads of the ink cartridge may need to be cleaned. Some printers have software that allows you to change the quality of the printout from draft to best quality.

    Customizing the printer

    Depending on your clients needs, there may be a need to alter the default printer settings. Some settingsthat may be customised include:

    Changing the Page Layout a page may need to be printed in either landscape or portrait orientation.

    Changing the Paper Source depending on the complexity of the printer there may be a variety of traysthe printer has available to use.

    Changing the Print Quality depending on the printer use, a client may require best, normal or draftquality of print.

    Setting the Default Printer if there is more than one printer attached to a computer, you may need tochange the settings so that the newer model is considered the default model.

    Installing a scanner

    Scanners can attach to a computer generally via a USB or a parallel port connection.

    1. Turn off the computer and position the scanner

    Before commencing installation, turn of power to the computer and place the scanner on a level surface,close enough to the computer so that the cable will be able to attach to both devices.

    2. Unlock the scanner

    Many scanners have a lock on the bottom to make sure that components are not dislodged whentransporting. Make sure that you unlock the scanner before commencing installation.

    3. Plug in the cable

    Plug the cable into either the USB or parallel port connection, depending on the type of scanner.

  • Maichew Polytechnic CollegeTraining, Teaching and Learning Materials Development

    Learning Guide Date: Dec 9,2013 Page 35 of 542st Revision Author: Haftamu Hailu MPC-ITD

    4. Turn on the scanner: Some scanners will have a power cord that will need to be plugged into a power outlet.Other scanners are dependent on power from the computer. Some scanners will also have an on/off switch, whichwill also need to be turned on.

    5. Turn on the PC: When you turn on your computer, most operating systems will recognise that newhardware has been added (eg it is plug and play compatible). If it hasnt recognised the new scanner youmay need to tell your computer that a new device has been added.

    6. Insert the scanner driver : At some point you will be asked if you have a disk for your scanner. Thisgenerally means the computer is requesting you provide it with the disk containing the driver software.

    7. Scan a test image: Ensure that the scanner is working by performing a scan of a book or magazine page.

    8. Troubleshoot scanner installation (if necessary)Suggested solutions for common scanner problems

    Scanner making a clicking sound

    Check that the scanner lock is in the unlock position.

    Unable to scan anything: Make sure that the scanner is plugged in and all cables are connected properly.

    Customize the scanner

    Many scanners will also have extra software you can use for scanning. Check the scanner manual to seewhether your scanner has additional software. Install the additional software it will probably be useful forscanning text and performing basic image editing functions. The software may also allow you ability to adjustsettings such as dpi (dots per inch), colour, black and white or greyscale. Make sure you modify settings fornormal scanning requirements.

  • Maichew Polytechnic CollegeTraining, Teaching and Learning Materials Development

    Learning Guide Date: Dec 9,2013 Page 36 of 542st Revision Author: Haftamu Hailu MPC-ITD

    LO 4: Install peripherals to a networkINTRODUCTION Learning Guide # 3

    This learning guide is developed to provide you the necessary information regarding the following contentcoverage and topics

    Planning the placement of printers Connecting to the network Adding upgrades

    This guide will also assist you to attain the learning outcome stated in the cover page.Specifically, upon completion of this Learning Guide, you will be able to

    Location of peripherals are planned to provide appropriate services to users and to take intoconsideration OHS standards.

    Peripherals are connected to network, using vendor-approved method and technology.

    Peripherals are connected to computers in the network using parallel, serial or other directconnection methods appropriate for the job order.

    Peripherals are tested for correct operation based on clients specifications.

  • Maichew Polytechnic CollegeTraining, Teaching and Learning Materials Development

    Learning Guide Date: Dec 9,2013 Page 37 of 542st Revision Author: Haftamu Hailu MPC-ITD

    Information Sheet 1 Planning the placement of printers

    What should you consider when locating a peripheral? This reading looks at the occupational, health andsafety requirements you should follow, from opening the box to placing the device, and therepercussions on users in the workplace.

    The first computers needed a special environment and power supply to function. Today, mostcomponents function in a normal office environment. They dont need special air conditioning or cleanpower supplies, although these will always allow them to work at their best. In the 1970s, mainframecomputers were often placed behind locked doors and only a privileged few allowed access. Even today,because of security concerns, you may find some network devices are stored in a restricted area.

    Instruction and installation manualsWhen purchasing a new peripheral, you need to read the instruction manual before unpacking it; themanual will usually display a diagram and describe how you should unpack it without damagingcomponents. Any components that might shift during transit are often protected by a polystyrene shieldor cardboard and are taped down. Sometimes this cover protection can be hidden underneath or be quitesmall and not easily seen. For some peripherals it may be necessary to wear protective clothing, such asgloves when opening monitor boxes so if fingers accidentally touch the screen, no finger marks are left.Pressure by fingertips on LDC monitors, for instance, can damage the screen.

    The instruction manual will detail how to unpack the peripheral and check all components first. If thereis any damage to any component or any are missing, then this is the time to contact the vendor for areplacement.

    General requirements for peripherals

    There are many different types of peripherals and each has its own operational requirements. These willnormally be fully documented in an installation manual, which should be carefully read before you planthe location. The following points then need to be considered:

    the space available and minimum area required for the device power supply requirements ease of access for users (including, for instance, the space around a printer) ease of access for installation and maintenance access to the closest LAN point physical security of the device (such as number key on the door or a locked door) sturdy, level surface well-ventilated room no exposure to direct sunlight or chemicals, including ammonia-based cleaning solutions

  • Maichew Polytechnic CollegeTraining, Teaching and Learning Materials Development

    Learning Guide Date: Dec 9,2013 Page 38 of 542st Revision Author: Haftamu Hailu MPC-ITD

    stable environment with no abrupt temperature or humidity changes.Other occupational health and safety issues to be considered when deciding on where to placeperipherals can include:

    the noise level of the peripheral and if it affects users floor loading, for extremely heavy devices cables kept away from walking areas.

    Placing printers in a particular locationVarious peripherals, according to the equipment and the consumables they use, can require specificconditions. For example, printers often jam if they are over-used and become too hot, or the paper is toodry. Some specific requirements to consider when placing printers include:

    a relative humidity level from 20% 80% a steady room temperature of 10 32.5 C.

    Reflection activityLook around in an environment to which you have access to computers and peripheral equipment. Thiscould be in your own home, at a learning place, such as TAFE, or in a workplace where you areemployed or have access. Consider answers to the following questions.

    Are the peripherals located in the best place to address user needs? Are occupational, health and safety issues addressed for the user? Is the peripheral placed where it can be easily maintained and kept in peak

    condition?

  • Maichew Polytechnic CollegeTraining, Teaching and Learning Materials Development

    Learning Guide Date: Dec 9,2013 Page 39 of 542st Revision Author: Haftamu Hailu MPC-ITD

    Information Sheet 2 Connecting to the network

    Now well look at connecting peripherals either to a host computer or directly on the network, and viawireless connection. Well also consider the performance levels of the different connection types.

    Some peripherals can only connect by a network cable and protocols. Others may only connect to acomputer or other host device such as a print server. Yet others will allow you a choice of connectionmethods. For example, network attached storage (NAS) devices will connect to the network cable.Scanners will normally require connection to a computer, and printers will usually give you a choice.

    In most cases, peripherals attached to a host computer on a network slow the performance of thecomputer when the peripheral is being activated over the network. In a stand-alone environment, theremay be no other choice. But in a network environment, the host computer that connects the peripheral tothe network should not be operated heavily as a workstation.

    Peripherals such as speakers are only connected to the local host computer and cannot be used over thenetwork. Speakers use little resources but peripherals that heavily use resources should be turned off ifother peripherals such as a printer are being used over the network.

    Web cams used for individual staff attending interstate meetings require a good amount of bandwidth.They also use a lot of the computers processing power and should only be fixed to computers that arenot used as a network resource for other peripherals.

    Physical network connections

    The most common network standard in use today is Ethernet. The IEEE (Institute of Electrical andElectronic Engineers) sets Ethernet standards for the physical devices and the protocols. It is a mediumthat consists of coaxial copper cable, twisted pair or fibre optic cable, on which electronic signals traveland to which computer devices are attached.The Ethernet protocol sets the rules for constructing frames that are transferred around the network.Frames are short messages that hold information, and include the destination and source address of eachcomputer.

    Most organisational networks are now running at a speed of 100 Mbps using CAT5 UTP (unshieldedtwisted pair) cables. However, a CAT6 cable can transfer data at 1000Mbps, and is used in some largerorganisations. A new standard IEEE 802.3ak-2004 will transfer data at 10 Gbs.

    A peripheral will normally connect directly to a hub or switch, or into a wall connection that is wired aspart of the network.

  • Maichew Polytechnic CollegeTraining, Teaching and Learning Materials Development

    Learning Guide Date: Dec 9,2013 Page 40 of 542st Revision Author: Haftamu Hailu MPC-ITD

    Figure 1: Connecting with RJ-45 connection

    Physical connections to a host computer

    A peripheral can be connected to a host device such as a computer or print server. As mentioned above,if the peripheral is heavily used over the network, then the workstations performance is reduced. Forexample, if it is a printer, the user will find the computer runs more slowly as others print documentsover the network. In cases where the peripheral is used constantly, it is best not to use the computer as aworkstation.

    As with connections directly to the network, Universal Serial Bus (USB) is becoming very popular.USB uses plug and play technology and reduces the configuration time, as it is usually not necessary toadjust configurations. There is no need to reboot the computer each time a new device is added.

    Figure 2: Parallel cableFigure 3: Serial cable

    Figure 4: USB

    Figure 5: Firewire

    Figure 6: SCSI

  • Maichew Polytechnic CollegeTraining, Teaching and Learning Materials Development

    Learning Guide Date: Dec 9,2013 Page 41 of 542st Revision Author: Haftamu Hailu MPC-ITD

    Wireless connectionsWireless connection is becoming very popular in home and office technology. It eliminates thespaghetti trap, where cables entwine and it creates an uncluttered environment. However, wirelessnetwork communication can be slower, and insecure, leaving data more easily open to hackers.

    Cordless peripherals are now available at affordable prices for most users. They include keyboards,mice, game pads, joysticks and pointing devices to interact with host devices. Host devices are not onlycomputers but can be home appliances, game machines and televisions. The peripheral requires batterypower to operate, and are more easily accessible to potential thieves.

    Cordless peripherals are usually controlled by a short-range communication method such as theinfrared standard IrDA (Infra-red Data Association) that sets the standards for both the physical devicesand the protocols they use to communicate. IrDA requires line-of-sight access between devices for datatransfer.

    New developments in other short distance communication such as Bluetooth technology, which useradio frequency to communicate, have proved to be more efficient and faster than IrDA. IrDA andBluetooth are not network technologies, but simply different methods of connecting.

    LAN wireless communication requires a wireless router and a transmitter connected to each device thatis connected to the network. These are becoming more economical. The main problem is their lack ofsecurity.

    Wireless LANs use the standard 802.11. One type of wireless LAN can transfer data at 11Mbps andanother at 54 Mbps. But if interference is detected or the radio signal is weak, the transfer rate isreduced.

    Configuring a wireless networkhere are two methods of configuring a wireless network:

    1 Infrastructure2 Ad Hoc.

    In the Infrastructure mode, the wireless LAN connects to an access point that covers a fixed area usingan antenna. The wireless access point converts the data into wired Ethernet data, acting as a bridgebetween the wired LAN and wireless clients. Access points connect to a wired Ethernet backbone andextend the wireless network coverage. For example, as a mobile user moves out of range of one accesspoint, they move into the range of another.Ad Hoc wireless networks are similar to a peer-to-peer workgroup where computers communicate withother computers, and there is no structure or fixed point. The computer devices need to be within rangeof each other and it is cheaper and easier to set up than the Infrastructure mode.

  • Maichew Polytechnic CollegeTraining, Teaching and Learning Materials Development

    Learning Guide Date: Dec 9,2013 Page 42 of 542st Revision Author: Haftamu Hailu MPC-ITD

    Reflection activity

    Look around in an environment to which you have access to computers and peripheral equipment. Thiscould be in your own home, at a learning place such as TAFE, or in a workplace where you areemployed or have access. Consider answers to the following questions.

    What peripherals are connected to computers, and is the computer a standalonedevice or part of a network?

    What cables are used for connecting the device, or is wireless technology beingused?

    Are there other options to use another type of connection to improve efficiency?

  • Maichew Polytechnic CollegeTraining, Teaching and Learning Materials Development

    Learning Guide Date: Dec 9,2013 Page 43 of 542st Revision Author: Haftamu Hailu MPC-ITD

    Information Sheet 3 Adding upgrades

    Peripherals range from basic inexpensive models to more expensive models with extra options, highspeeds and high quality output.

    Some peripherals can help lift organisational efficiency by simply incorporating an extra device on theperipheral a much cheaper option to buying a new peripheral.

    Not all peripherals can be upgraded, but many can be expanded. For example, network attached storagedevices can usually take additional disk drives to increase capacity. Scanners may be able to take a filmor transparency holder so photographs can be scanned. Printers can have more memory or extra sheethandling features added.

    Some upgrades may be incorporated at the time of purchase while others are added on after the user hashad the device for some time.

    Typical upgrades for the some larger printers include: duplex units for two-sided printing envelope feeders more memory extra input trays and output stackers cabinets and stands.

    Reflection activity

    Look around in an environment to which you have access to computers and peripheral equipment. Thiscould be in your own home, at a learning place such as TAFE, or in a workplace where you areemployed or have access. Consider answers to the following questions.

    List any components of the peripherals that have been upgraded or enhanced.How has this improved the workflow or efficiency of the environment?

    What peripherals can be upgraded or enhanced? If you did upgrade or enhance theperipheral, will this improve the workflow and efficiency?

  • Maichew Polytechnic CollegeTraining, Teaching and Learning Materials Development

    Learning Guide Date: Dec 9,2013 Page 44 of 542st Revision Author: Haftamu Hailu MPC-ITD

    LO 5: Configure services to manage peripheralsINTRODUCTION Learning Guide # 3

    This learning guide is developed to provide you the necessary information regarding the following contentcoverage and topics

    Naming conventions Printer drivers Access and security

    This guide will also assist you to attain the learning outcome stated in the cover page.Specifically, upon completion of this Learning Guide, you will be able to

    Required software is installed to manage local and network-connected peripherals according tobusiness requirement software peripherals according to business requirement.

    Meaningful names are used for peripherals and control queues

    Security and access are configured to allow appropriate users to make use of peripherals.

    o Workstation for peripherals is configured to allow applications to work with peripherals.

  • Maichew Polytechnic CollegeTraining, Teaching and Learning Materials Development

    Learning Guide Date: Dec 9,2013 Page 45 of 542st Revision Author: Haftamu Hailu MPC-ITD

    Information sheet 1 Installing Printer, Scanner Drivers

    To work with a network operating system and be fully functional, hardware requires drivers, which aresoftware that works with the operating system.Drivers are supplied with the peripheral hardware on floppy disk or CD-ROM. Operating systems canalso have drivers for commonly used devices, but these quickly date. If you have mislaid the drivers, orhave upgraded to a new operating system that was not supported by the original drivers, it is usuallypossible to get a new set of drivers from the vendors website.Installation is normally straightforward and, especially with plug-and-play operating systems, fullyautomatic. Network settings may be a little more complicated, but are still easy to follow.For example, when printing from a workstation over the network to a printer, the users workstation willneed the printer drivers installed on their computer even though the printer is located elsewhere on thenetwork. Either the printer is directly connected to the network, or is connected to another computeracting as the printers host. The computer host shares the printer and also requires the printer drivers tobe installed. For some operating systems such as Windows 2000 and Windows XP, the drivers can beloaded onto the host computer. When the user prints a document for the first time, they find the sharedprinter and, as they connect to it, the print drivers will be automatically downloaded and installed on theusers workstation. The network printer will be added to its list of installed printers.Once the client drivers for the peripheral have been installed on the workstation, the user may need toaccess the peripheral through an application. For example, the user may want to print a documentcreated in a word processing application. In most cases, the printer will be automatically available fromthe word processing application.Some non-standard applications may have difficulty in accessing the peripheral and drivers, and in thiscase the driver should be obtained from the vendor. For applications that have been internally writteninside an organisation, special programming requirements may be needed to use peripherals such asprinters.Reflection activityLook around in an environment in which you have access to computers and peripheral equipment. Thiscould be in your own home, at a learning place such as TAFE, or in a workplace where you areemployed or have access. Consider answers to the following questions.

    What peripherals are connected to computers? What drivers have been installed for these peripherals where they are connected? Are these peripherals available to others on the network, and what drivers do they use? Are the drivers easy to access if you want access to the peripheral from your workstation?

  • Maichew Polytechnic CollegeTraining, Teaching and Learning Materials Development

    Learning Guide Date: Dec 9,2013 Page 46 of 542st Revision Author: Haftamu Hailu MPC-ITD

    Information sheet 2 Naming conventions

    All computers, hosts, devices and peripherals need to be easily recognised in a network system. Byusing a naming system for all hardware, software and services, users will easily find what they arelooking for. This reading outlines what needs to be taken into consideration when naming peripherals.As you install and configure a printer you should keep to the network standards of the organisation,which should include naming conventions for peripherals and other devices.Each organisation will have its own standards, but it is important that users can identify peripheralseasily. There have been cases of users waiting by one printer for their report while it is being printedthree floors away.Naming conventions usually reflect the function of a peripheral, and in the case of a large office orglobal enterprise, the location. For example, the following may be used for a peripheral name of 15characters:

    Table 1: Peripheral naming convention using 15 charactersCharacters 14 57 810 1115Attributesreflected

    City or town Type ofperipheral

    Workplacelocation

    Uniqueness of device,usually number sequence

    Reflection activityLook around in an environment to which you have access to computers and peripheral equipment. Thiscould be in your own home, at a learning place such as TAFE, or in a workplace where you areemployed or have access. Consider answers to the following questions.

    What are the names of the shared peripherals? What are the names of the workstations? Is there consistency in naming computer hardware? If there is, what is it? In viewing the name of the shared peripheral, is it easy to understand what it is and where it is

    located?

  • Maichew Polytechnic CollegeTraining, Teaching and Learning Materials Development

    Learning Guide Date: Dec 9,2013 Page 47 of 542st Revision Author: Haftamu Hailu MPC-ITD

    Information sheet 2 Access and security

    Making a peripheral available on the network does not necessarily mean that every single user shouldhave access. Drives may be shared and then permissions allocated to users or groups. All otherperipherals will normally provide some means of restricting access.Setting security access and permissions can help keep peripherals in peak condition. For example, ahigh-speed