Nothing Special   »   [go: up one dir, main page]

Install Peripherals To A Network

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 13

Install peripherals to a network

Reading: Install peripherals to a network 1


2005
Preview

Peripherals are devices physically connected to a computer or


network that require ‘driver’ software to run them and to be
configured to meet requirements of operating systems and
network protocols. Single user peripherals can include:
printers, scanners, speakers, external DVDs, CDs, game pads
and joysticks, graphics tablets and pens, modems, UPS
(uninterrupted power supply), removable hard disks and
webcams, while printers, network attached storage devices
(NAS), and LCD projectors are often accessed over networks.
In this Learning Pack you’ll connect network peripherals with
regard to occupational health and safety issues and later
upgrades and enhancements.

Learning outcomes

After completing this topic you will be able to:


 Plan the location of a peripheral to provide
appropriate services to users while considering
OH&S standards.
 Connect peripheral devices to a network, using a
vendor approved method and/or technology.
 Connect peripheral devices to computers in the
network using parallel, serial or other direct
connection methods.
 Add a peripheral, accessories and upgrades to a
printer such as more memory or high volume
paper trays.
 Test peripheral devices for correct operation.

Before you start

Before you start this topic you should have a general


understanding of networking technologies and protocols.

Check your understanding

Do you think you already have the skills and knowledge


covered in this topic? Try and do the following activities to
check your understanding.

Planning the installation of peripherals

When planning and connecting peripherals you need to


consider a number of points. For each peripheral named in the
left column of this table (.doc 39 KB) choose from the pool of
factors that should be considered when attaching the
peripheral. A factor may be used more than once.
Feedback

2 Reading: Install peripherals to a network


2005
Peripheral specifications

Using the list of peripherals given, match each one to one of


the specifications sets in this table. (.doc 39 KB). One
peripheral belongs to each of the four specifications.
Feedback

Quiz

Answer true or false.

True False  

A printer can be attached directly to the network using a parallel cable.

Feedback
Answer true or false.

True False  

A printer can be attached to a computer using a serial cable.

Feedback
Answer true or false.

True False  

A scanner can be attached directly to a network.

Feedback
Answer true or false.

True False  

USB connections eliminate the need for a variety of connections to be made availab

Feedback
Answer true or false.

True False  

Firewire is a standard for high-speed communications and data transfer. It was dev
connections on other computers.

Feedback
Answer true or false.

True False  

Many peripherals are attached to a host computer through the attachment on an a


main board (or motherboard) PCI (Peripheral Component Interface) slot.

Feedback
Answer true or false.

True False  

The size of the viewing area of a monitor is usually measured by height, and then b

Feedback

Reading: Install peripherals to a network 3


2005
Install peripherals to a network

Planning the placement of printers 2


Instruction and installation manuals 2
General requirements for peripherals 3

Connecting to the network 5


Physical network connections 5
Physical connections to a host computer 6
Wireless connections 7

Adding upgrades 9

Summary 10
Check your understanding 10

4 Reading: Install peripherals to a network


2005
Planning the placement of printers

What should you consider when locating a peripheral? This reading looks at
the occupational, health and safety requirements you should follow, from
opening the box to placing the device, and the repercussions on users in the
workplace.

The first computers needed a special environment and power supply to


function. Today, most components function in a normal office environment.
They don’t need special air conditioning or clean power supplies, although
these will always allow them to work at their best. In the 1970s, mainframe
computers were often placed behind locked doors and only a privileged few
allowed access. Even today, because of security concerns, you may find
some network devices are stored in a restricted area.

Instruction and installation manuals


When purchasing a new peripheral, you need to read the instruction manual
before unpacking it; the manual will usually display a diagram and describe
how you should unpack it without damaging components. Any components
that might shift during transit are often protected by a polystyrene shield or
cardboard and are taped down. Sometimes this cover protection can be
hidden underneath or be quite small and not easily seen. For some
peripherals it may be necessary to wear protective clothing, such as gloves
when opening monitor boxes so if fingers accidentally touch the screen, no
finger marks are left. Pressure by fingertips on LDC monitors, for instance,
can damage the screen.

The instruction manual will detail how to unpack the peripheral and check
all components first. If there is any damage to any component or any are
missing, then this is the time to contact the vendor for a replacement.

Reading: Install peripherals to a network 5


2005
General requirements for peripherals
There are many different types of peripherals and each has its own
operational requirements. These will normally be fully documented in an
installation manual, which should be carefully read before you plan the
location. The following points then need to be considered:
 the space available and minimum area required for the device
 power supply requirements
 ease of access for users (including, for instance, the space around a
printer)
 ease of access for installation and maintenance
 access to the closest LAN point
 physical security of the device (such as number key on the door or a
locked door)
 sturdy, level surface
 well-ventilated room
 no exposure to direct sunlight or chemicals, including ammonia-
based cleaning solutions
 stable environment with no abrupt temperature or humidity changes.

Other occupational health and safety issues to be considered when deciding


on where to place peripherals can include:
 the noise level of the peripheral and if it affects users
 floor loading, for extremely heavy devices
 cables kept away from walking areas.

Placing printers in a particular location


Various peripherals, according to the equipment and the consumables they
use, can require specific conditions. For example, printers often jam if they
are over-used and become too hot, or the paper is too dry. Some specific
requirements to consider when placing printers include:
 a relative humidity level from 20% – 80%
 a steady room temperature of 10° – 32.5° C.

6 Reading: Install peripherals to a network


2005
Reflection activity
Look around in an environment to which you have access to computers and
peripheral equipment. This could be in your own home, at a learning place,
such as TAFE, or in a workplace where you are employed or have access.
Consider answers to the following questions.
 Are the peripherals located in the best place to address user needs?
 Are occupational, health and safety issues addressed for the user?
 Is the peripheral placed where it can be easily maintained and kept in
peak condition?

Reading: Install peripherals to a network 7


2005
Connecting to the network

Now we’ll look at connecting peripherals either to a host computer or


directly on the network, and via wireless connection. We’ll also consider the
performance levels of the different connection types.

Some peripherals can only connect by a network cable and protocols. Others
may only connect to a computer or other host device such as a print server.
Yet others will allow you a choice of connection methods. For example,
network attached storage (NAS) devices will connect to the network cable.
Scanners will normally require connection to a computer, and printers will
usually give you a choice.

In most cases, peripherals attached to a host computer on a network slow the


performance of the computer when the peripheral is being activated over the
network. In a stand-alone environment, there may be no other choice. But in
a network environment, the host computer that connects the peripheral to
the network should not be operated heavily as a workstation.

Peripherals such as speakers are only connected to the local host computer
and cannot be used over the network. Speakers use little resources but
peripherals that heavily use resources should be turned off if other
peripherals such as a printer are being used over the network.

Web cams used for individual staff attending interstate meetings require a
good amount of bandwidth. They also use a lot of the computer’s processing
power and should only be fixed to computers that are not used as a network
resource for other peripherals.

Physical network connections


The most common network standard in use today is Ethernet. The IEEE
(Institute of Electrical and Electronic Engineers) sets Ethernet standards for
the physical devices and the protocols. It is a medium that consists of
coaxial copper cable, twisted pair or fibre optic cable, on which electronic
signals travel and to which computer devices are attached.

The Ethernet protocol sets the rules for constructing frames that are
transferred around the network. Frames are short messages that hold
information, and include the destination and source address of each
computer.

8 Reading: Install peripherals to a network


2005
Most organisational networks are now running at a speed of 100 Mbps using
CAT5 UTP (unshielded twisted pair) cables. However, a CAT6 cable can
transfer data at 1000Mbps, and is used in some larger organisations. A new
standard IEEE 802.3ak™-2004 will transfer data at 10 Gbs.

A peripheral will normally connect directly to a hub or switch, or into a wall


connection that is wired as part of the network.

Figure 1: Connecting with RJ-45 connection

Physical connections to a host


computer
A peripheral can be connected to a host device such as a computer or print
server. As mentioned above, if the peripheral is heavily used over the
network, then the workstation’s performance is reduced. For example, if it is
a printer, the user will find the computer runs more slowly as others print
documents over the network. In cases where the peripheral is used
constantly, it is best not to use the computer as a workstation.

As with connections directly to the network, Universal Serial Bus (USB) is


becoming very popular. USB uses plug and play technology and reduces the
configuration time, as it is usually not necessary to adjust configurations.
There is no need to reboot the computer each time a new device is added.

Figure 2: Parallel cable Figure 3: Serial cable

Reading: Install peripherals to a network 9


2005
Figure 4: USB Figure 5: Firewire

Figure 6: SCSI

Wireless connections
Wireless connection is becoming very popular in home and office
technology. It eliminates the ‘spaghetti trap’, where cables entwine and it
creates an uncluttered environment. However, wireless network
communication can be slower, and insecure, leaving data more easily open
to hackers.

Cordless peripherals are now available at affordable prices for most users.
They include keyboards, mice, game pads, joysticks and pointing devices to
interact with host devices. Host devices are not only computers but can be
home appliances, game machines and televisions. The peripheral requires
battery power to operate, and are more easily accessible to potential thieves.

Cordless peripherals are usually controlled by a short-range communication


method such as the infrared standard IrDA (Infra-red Data Association)
that sets the standards for both the physical devices and the protocols they
use to communicate. IrDA requires line-of-sight access between devices for
data transfer.

New developments in other short distance communication such as


Bluetooth technology, which use radio frequency to communicate, have
proved to be more efficient and faster than IrDA. IrDA and Bluetooth are
not network technologies, but simply different methods of connecting.

10 Reading: Install peripherals to a network


2005
LAN wireless communication requires a wireless router and a transmitter
connected to each device that is connected to the network. These are
becoming more economical. The main problem is their lack of security.

Wireless LANs use the standard 802.11. One type of wireless LAN can
transfer data at 11Mbps and another at 54 Mbps. But if interference is
detected or the radio signal is weak, the transfer rate is reduced.

Configuring a wireless network


There are two methods of configuring a wireless network:
1 Infrastructure
2 Ad Hoc.

In the Infrastructure mode, the wireless LAN connects to an access point


that covers a fixed area using an antenna. The wireless access point converts
the data into wired Ethernet data, acting as a bridge between the wired LAN
and wireless clients. Access points connect to a wired Ethernet backbone
and extend the wireless network coverage. For example, as a mobile user
moves out of range of one access point, they move into the range of another.

Ad Hoc wireless networks are similar to a peer-to-peer workgroup where


computers communicate with other computers, and there is no structure or
fixed point. The computer devices need to be within range of each other and
it is cheaper and easier to set up than the Infrastructure mode.

Reflection activity
Look around in an environment to which you have access to computers and
peripheral equipment. This could be in your own home, at a learning place
such as TAFE, or in a workplace where you are employed or have access.
Consider answers to the following questions.
 What peripherals are connected to computers, and is the computer a
standalone device or part of a network?
 What cables are used for connecting the device, or is wireless
technology being used?
 Are there other options to use another type of connection to improve
efficiency?

Reading: Install peripherals to a network 11


2005
Adding upgrades

Peripherals range from basic inexpensive models to more expensive models


with extra options, high speeds and high quality output.

Some peripherals can help lift organisational efficiency by simply


incorporating an extra device on the peripheral — a much cheaper option to
buying a new peripheral.

Not all peripherals can be upgraded, but many can be expanded. For
example, network attached storage devices can usually take additional disk
drives to increase capacity. Scanners may be able to take a film or
transparency holder so photographs can be scanned. Printers can have more
memory or extra sheet handling features added.

Some upgrades may be incorporated at the time of purchase while others are
added on after the user has had the device for some time.

Typical upgrades for the some larger printers include:


 duplex units for two-sided printing
 envelope feeders
 more memory
 extra input trays and output stackers
 cabinets and stands.

Reflection activity
Look around in an environment to which you have access to computers and
peripheral equipment. This could be in your own home, at a learning place
such as TAFE, or in a workplace where you are employed or have access.
Consider answers to the following questions.
 List any components of the peripherals that have been upgraded or
enhanced. How has this improved the workflow or efficiency of the
environment?
 What peripherals can be upgraded or enhanced? If you did upgrade
or enhance the peripheral, will this improve the workflow and
efficiency?

12 Reading: Install peripherals to a network


2005
Summary

Peripherals are an important part of any personal computer or network


system. Today, many peripherals have their own memory and processor
systems and should be handled with care, following vendor guidelines.
General occupational health and safety issues also need to be followed to
ensure they are moved without being damaged, or without causing any harm
to the person moving the equipment or other people.

There are now options for how you can connect peripherals — although
wireless connection is increasingly popular, it has the disadvantage of being
insecure.

Peripherals in any organisation need to be reviewed regularly to ensure that


they provide the best service and quality. Technology is continually being
improved, and in some cases it may be more efficient to replace a peripheral
rather than have it upgraded.

Check your progress


Now you should try the Practice activities in this topic. If you have already
tried them, to them again to see if you can improve your responses.

When you feel you are ready, try the ‘Check your understanding’ activity in
the Preview section of this topic. This will help you decide if you are ready
for assessment.

Reading: Install peripherals to a network 13


2005

You might also like