Comptia A+

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

The 1s in a subnet mask say,

"On our network, this part of an IP address identifies our network,"

The 0s in a subnet mask say,

, "On our network, this part of an IP address identifies each host."

impact printers are still in use for 3 reasons

- ● They use continuous tractor feeds and fanfold paper (also called computer paper) rather than individual sheets of paper, making them useful for logging ongoing events or data. ● They can use carbon paper to print multiple copies at the same time. ● They are extremely durable, give little trouble, and seem to last forever.

direct thermal printers are often used as

-receipt printers that use rolls of thermal paper

in 192.168.1.168, the host is

.168

An example of a MAC address, written in hexadecimal or hex, is

00-0C-6E-4E-AB-A5

address prefixes for types of IPv6 addresses: Unassigned addresses

0::) (All zeroes)

address prefixes for types of IPv6 addresses: Loopback address

0::1, also written as ::1 (127 zeroes followed by 1)

if the printer installation fails or installs with errors

1. If you have problems, consider that Windows might be using the wrong or corrupted printer drivers. Try removing the printer and then installing it again. To remove a printer in the Windows 10 Settings app, select a printer, and click Remove device. (In Windows 11, click Remove.) To use Control Panel, right-click the printer in the Devices and Printers window, and click Remove device. Try to install the printer again. 2. If the problem is still not solved, completely remove the printer drivers by using the printui command. The Printer User Interface command, printui, is used by administrators to manage printers and printer drivers on remote computers. You can also use it to delete drivers on the local computer. Follow these steps: a. If the printer is listed in the Settings app or the Devices and Printers window, remove it. (Sometimes Windows automatically puts a printer there when it finds printer drivers are installed.) b. Before you can delete printer drivers, you must stop the print spooler service. Open the Services console, and use it to stop the Print Spooler (refer to Figure 10-45). To delete any print jobs left in the queue, open Explorer and delete all files in the C:\Windows\System32\spool\PRINTERS folder. c. You can now start the print spooler back up. Because the printer is no longer listed in the Settings app or the Devices and Printers window, starting the spooler will not tie up these drivers. d. Open an elevated command prompt window, which is a window used to enter commands that have administrator privileges. To open this window, type cmd in the Windows 10/11 search box, and then click Run as administrator. Respond to the UAC box. e. At the command prompt (see the left side of Figure 10-45), enter the command printui /s /t2. In the command line, the /s causes the Print Server Properties dialog box to open, and the /t2 causes the Drivers tab to be the selected tab f. The Print Server Properties dialog box opens, as shown in the middle of Figure 10-45. Select the printer and click Remove. In the Remove Driver And Package dialog box (see the right side of Figure 10-45), select Remove driver only, and click OK. It is not necessary to remove the driver package. (This driver package, also calle

To replace the fuser, follow these steps

1. Turn off and unplug the printer. Allow the printer to cool, and open the cover. 2. Pull the two blue fuser levers forward to unlock the fuser (see Figure 10-34).3. Lift the fuser out of the printer using the handle on the fuser, as shown in Figure 10-35.4. Unpack the new fuser, and place it in the printer. Push the two blue levers toward the back of the printer to lock the fuser in place. As a last step whenever you service the inside of this printer, always carefully clean the LED erase lamps on the inside of the top cover (see Figure 10-36). The printer maintenance kits you've just learned to use all include a wipe to clean these strips.

Replacing a toner cartridge

1. Turn off and unplug the printer. Press the cover release button on the upper-left corner of the printer, and open the printer cover. 2. Figure 10-29 shows the cover up. Notice the four erase lamps on the inside of the cover. Look inside the printer for the four toner cartridges and the fuser assembly labeled in Figure 10-30. Push or pull the blue toner cartridge release button forward to disconnect and release the cartridge from the image drum below it (see Figure 10-31). 3. Lift the cartridge out of the printer, lifting up on the right side first and then removing the left side (see Figure 10-32). Be careful not to spill loose toner. 4. Unpack the new cartridge. Gently shake it from side to side to loosen the toner. Remove the tape from underneath the cartridge, and place the cartridge in the printer by inserting the left side first and then the right side. Push the cartridge lever back into position to lock the cartridge in place. Close the printer cover. This printer has four image drums, one for each color. The drums are expected to last for about 15,000 pages. When you purchase a new drum, the kit comes with a new color toner cartridge. Follow these steps to replace the cartridge and image drum. In these steps, we are using the yellow drum and cartridge: 1. Turn off and unplug the printer. Wait about 30 minutes for it to cool down, then open the printer cover. The toner cartridge is connected to the image drum. Lift the drum together with the toner cartridge out of the printer (see Figure 10-33). Be sure to dispose of the drum and cartridge according to local regulations.. 2. Unpack the new image drum. Peel the tape off the drum and remove the plastic film around it. As you work, be careful to keep the drum upright so as not to spill the toner. Because the drum is sensitive to light, don't allow it to be exposed to bright light or direct sunlight. Don't expose it to normal room lighting for longer than five minutes. 3. Place the drum in the printer. Install the new toner cartridge in the printer. Close the printer cover. The fuser should last for about 45,000 pages.

Thunderbolt version 1

10 Gbps - DisplayPort - PCI Express version required: Version 2.0

10 Gbps is also known a s

10-gigabit ethernet

VGA/SVGA (Video Graphics Array)

15-pin, blue, known as DE15/DB15/HD15. usd for older monitors that display VGA, SVGA, and XGA reoslutions. signal quality degrades over shorter distances than with HDMI, DVI, and DisplayPort

Sometimes an IP address and subnet mask are written using a shorthand notation like

15.50.212.59/20, where the /20 means that the first 20 bits in the IP address identify the network. This notation is sometimes called slash notation or CIDR notation (pronounced "cider notation"), named after the CIDR (Classless Interdomain Routing) standards about subnetting

Thunderbolt version 2

20 Gbps - DisplayPort - PCI Express Version required: Version 2.0

address prefixes for types of IPv6 addresses: global address

2000::/3 (The first three bits are always 001)

The largest possible 8-bit number is 11111111, which is equal to 255 in decimal, so the largest possible IPv4 address in decimal is

255.255.255.255, which in binary is 11111111.11111111.11111111.11111111.

A subnet mask has

32 bits and is a string of 1s followed by a string of 0s—for example, 11111111.11111 111.11110000.00000000.

Most networks use

32-bit IP addresses, which are defined by IPv4 (Internet Protocol version 4)

Thunderbolt version 3

40 Gbps - USB Type-C - PCI Expression version required: Version 3.0

RG-6 cable can be run as far as

500 to 1000 feet. The maximum distance varies because several factors play into how far the data can travel before attenuation occurs—including the frequency used and the protocol used. Its speed also varies depending on what type of transmission is sent over it. A typical RG-6 cable has a minimum bandwidth of 1 GHz, which can loosely translate to 1 Gbps, but the data throughput will most likely be capped at some number below that. For example, cable Internet providers offer different tiered download speeds (50 or 100 Mbps and so on), and some fiber optic providers (who change the cable type from fiber optic to coaxial at the house or business) might cap it at anywhere between 100 Mbps and 500 Mbps. This all varies according to the provider and how many services are being transmitted over the same line.

lightning connector

8-pin connector that replaced the (now legacy) 30-pin dock predecessor. proprietary port built into apple devices.

two types of IP addresses

A 32-bit string, written as four decimal numbers called octets and separated by periods, such as 192.168.100.4 and a 128-bit string, written as eight hexadecimal numbers separated by colons, such as 2001:0000:B80:0000:0000:D3:9C5A:CC

Port 68

A DHCP client receives messages on

Port 67

A DHCP server listens at

Configure the DHCP Server in a SOHO network

A DHCP server on a SOHO router is usually configured for dynamic IP addressing by default. To verify and change the DHCP settings, do the following: 1. Go to the router firmware home page (router.asus.com, for example) and sign in with your router account username and password that you set up earlier. The main menu for the router appears. Figure 7-38 shows the main menu for the ASUS RT-AX55, but yours might look different. To configure the DHCP server, click LAN in the left pane. The LAN submenu tabs appear. the IP address of the router on the LAN is 192.168.1.1 and the subnet mask for the LAN is 255.255.255.0. Click the DHCP Server tab to see options for configuring the DHCP server. By default, DHCP is enabled and the scope of IP addresses that DHCP can lease to DHCP client devices is 192.168.1.2 through 192.168.1.254. Because the default gateway does not have a value, it is assumed the router itself is the gateway. After making changes on this page, click Apply to save your changes.

Ethernet speeds

A NIC supports wired ethernet transmissions or wireless wifi transmissions. for wired networks, the four speeds for ethernet are 10 Mbps, 100 Mbps (Fast Ethernet), 1 Gbps (Gigabit Ethernet), and 10 Gbps (10-gigabit Ethernet). Most network adapters sold today for local networks use Gigabit Ethernet and support the two slower speeds. To see the speeds a NIC supports, open its Properties dialog box in Device Manager. Select the Advanced tab. In the list of properties, select Speed & Duplex. You can then see available speeds in the Value drop-down list. If the adapter connects with slower network devices on the network, the adapter works at the slower speed. Select Auto Negotiation for Windows to use the best possible speed for a particular connection.

Laser process - exposing or writing (step 3)

A laser beam controlled by motors and a mirror scans across the drum until it completes the correct number of passes. The laser beam is turned on and off continually as it makes a single pass down the length of the drum, once for each raster line, so that dots are exposed only where toner should go to print the image. A raster line, or scan line, is the horizontal line of dots across the page or image. For example, for a 1200 dots-per-inch (dpi) printer, the beam makes 1200 passes for every inch of the drum circumference. This means that 1200 dots are exposed or not exposed along the drum for every inch of linear pass. The 1200 dots per inch down this single pass, combined with 1200 passes per inch of drum circumference, accomplish the resolution of 1200 X 1200 dots per square inch of many laser printers. For each exposed dot, the laser beam applies a charge of -100 V, which is significantly more positive than for the unexposed dots on the drum. The charge on this image area will be used in the developing stage to transmit toner to the drum surface.

Laser process- processing the image (step 1)

A laser printer processes and prints an entire page at one time. The page data comes to the printer encoded in a page description language (PDL). The firmware inside the printer processes the incoming data to produce a bitmap of the final page, which is stored in the printer's memory. One bitmap image is produced for monochrome images. For color images, one bitmap is produced for each of four colors. (The colors are blue, red, yellow, and black—better known as cyan, magenta, yellow, and black, and sometimes written as CMYK.)

A single interface might have more than one unicast address assigned to it at any given time

A link local address

OSI (Open Systems Interconnection) model

A more detailed model for network communication, which has seven layers of communication

Paper Size Mismatch Errors

A printer gives a paper size error or paper mismatch error when the size of the paper, envelope, or other media in the paper tray or feeder doesn't match the paper size chosen in the printer's settings for the current print job. This error message prevents wasting toner or ink. To resolve the paper size mismatch error, do the following: 1. Check the paper size setting in the printer Properties or Printing Preferences dialog box. Make sure the size selected is the same size as the paper or envelope loaded in the tray or feeder.2. Remove and reload the paper in the tray or feeder. When reseating the paper, adjust the paper width guides to gently touch the sides of the paper. Confirm the tray setting indicates the correct tray. 3. Reset the printer to clear any errors. Unplug the printer, wait at least a minute, and then reconnect the power cord. Turn on the printer and wait for it to fully power on. Print Comes out Sideways Some printers try to fill the page with the print by automatically rotating from portrait mode to landscape mode or vice versa. If the print comes out rotated but doesn't fill the page, then use the printer's Property dialog box to change the setting to the opposite orientation. Another problem could be that the margins are set too small for the printer capabilities, causing it to automatically rotate to try fit the content on the page. Adjust the margins to what the printer can handle or use a different printer. Wrong Print Colors For a printer that is printing the wrong colors, sometimes called the chroma display, do the following: 1. Check to see if the paper you are using is designed to print on only one side. You might need to flip the paper in the printer. 2. Try adjusting the print quality. These adjustments vary by printer. For one color laser printer, open the Printing Preferences dialog box, and click the Quality tab. You can try different selections on this tab. To manually adjust the color, check Manual Color Settings, and then click Color Settings. The Color Settings dialog box appears.3. For an inkjet printer, try cleaning the ink cartridges and calibrating the printer. One step in this process prints a self-test page. If the self-test page shows missing or wrong colors, the p

Laser process - cleaning (step 7)

A sweeping blade cleans the drum of any residual toner. The charge left on the drum is then neutralized. Some printers use erase lamps in the top cover of the printer for this purpose. The lamps use red light so they won't damage the photosensitive drum.

crossover cable

A twisted pair patch cable used to connect a computer directly to another computer, it is wired for 568B on one end and 568A on the other. Pin 1 on 568B crosses to pin 3 on 568A, and pin 2 crosses to pin 6. You can also use a crossover cable to connect one switch to another—although this is usually not necessary because most switches auto-sense the type of cable you plug into them.

Port 110 or port 143

After an email message arrives at the destination email server, it remains there until the recipient requests delivery. The recipient's email server uses one of two protocols to deliver the message

A host can

Always determine if an IP address is on its network

differences between a hub and a switch

An ethernet hub sends a message to every device except the device that sent the message. A hub is a simple pass-through device to connect nodes on a network, and a switch sends a message to the destination node based on its MAC address. A hub is just a passthrough and distribution point for every device connected to it, without regard for what kind of data is passing through and where the data might be going. Hubs are outdated technology, having been replaced by switches. Hubs support 10 mbps and 100 mbps ethernet speeds A switch is smarter and more efficient than a hub because it keeps a table of all the MAC addresses for devices connected to it. When the switch receives a message, it searches its MAC address table for the destination MAC address of the message and sends the message only to the interface for the device using this MAC address. At first, a switch does not know the MAC addresses of every device connected to it. It learns this information as it receives messages and records each source MAC address in its MAC address table. When it receives a message destined to a MAC address not in its table, the switch acts like a hub and sends the message to all devices except the one that sent it.

Calibrating a Printer

An inkjet printer might require calibration to align and/or clean the inkjet nozzles, which can solve a problem when colors appear streaked or out of alignment. To calibrate the printer, you might use the menu on the printer's control panel or use software that came bundled with the printer. How to access these tools differs from one printer to another. See the printer manual to learn how to perform the calibration. For some printers, a Services tab is added to the printer Properties window. Other printer installations might put utility programs in the Start menu. The first time you turn on a printer after installing ink cartridges, it's a good idea to calibrate the printer. If an inkjet printer still does not print after calibrating it, you can try to manually clean the cartridge nozzles. Check the printer manufacturer's website for directions. For most inkjet printers, you are directed to use clean, distilled water and cotton swabs to clean the face of the ink cartridge, being careful not to touch the nozzle plate. To prevent the inkjet nozzles from drying out, don't leave the ink cartridges out of their cradle for longer than 30 minutes. Here are some general directions: 1. Following the manufacturer's directions, remove the inkjet cartridges from the printer, and lay them on their sides on a paper towel. 2. Dip a cotton swab in distilled water (not tap water), and squeeze out any excess water. 3. Hold an ink cartridge so that the nozzle plate faces up, and use the swab to clean the area around the nozzle plate, as shown in Figure 10-25. Do not clean the plate itself.. 4. Hold the cartridge up to the light and make sure that no dust, dirt, ink, or cotton fibers are left around the face of the nozzle plate. Make sure the area is clean. 5. Clean all the ink cartridges the same way, and replace the cartridges in the printer. 6. Print a test page. If print quality is still poor, try calibrating the printer again. 7. If you still have problems, you need to replace the ink cartridges. Laser printers automatically calibrate themselves periodically. You can instruct a laser printer to calibrate at any time by using the controls on the front of the printer or the browser-based utility program that is included in th

Sharing a Printer on a Network

Any time a computer sends a print job to a printer through the network, whether that printer is a shared local printer or a network printer, print server functions play a role. However, the device that provides the print server can vary depending on how the printer is set up. Let's look at the available options: ● Integrated print server. Most printers today include network capability—you can connect them directly to a router or switch, and devices on the network can find and access the printer. In this case, the printer is providing its own integrated print server embedded in the firmware on the printer's hardware. Some integrated printers allow you to manage print protocols, start or stop jobs in the print queue, reorder jobs in the queue, cancel specific jobs coming from a particular computer on the network, monitor printer maintenance tasks, and set up your email address so the printer alerts you by email when it has a problem. ● Computer as a print server. When a computer shares its local printer with other computers on the network, the computer is considered to be a print server. If a network has several print servers, you might find it convenient as an IT support technician to use the Print Management console on your workstation to manage these print servers. Using Print Management, you can stop, start, and clear print jobs on any print server on the network and troubleshoot other printer problems from your workstation. Print Management is available under Windows 10 Administrative Tools or Windows 11 Windows Tools in the Control Panel. ● Other network hardware. Print server software might be embedded in other network devices, such as a router or firewall. Connect the printer to the network device, and use its configuration interface to manage the printer.

The most popular web server applications are

Apache and Nginx

TCP: Layer 4: Application Layer

Application-to-application communication is managed by the OS, using protocols specific to the application (HTTP, Telnet, FTP, etc). This layer of communication happens after the OSs have made a connection at the Transport layer

Example uses of UDP

Broadcasting, monitoring network traffic, completing simple file transfers (TFTP and PXE). and communicating between DHCP clients and servers

ADF (automatic document feeder) scanners

Can automatically process a stack of papers, cards, or enve- lopes, pulling each page individually into a roller system for scanning and then spitting it out into a separate tray.

To communicate on a network or the Internet, a host needs the IP address of a default gateway

Computers can communicate directly with each other on the same network. However, when a computer sends a message to a computer on a different network, it sends the message to its _____, which is connected to the local network and at least one other network. The gateway sends the message on its way to other networks.

Cable modems do what

Convert cable to ethernet transmissions used on a local network

STP (Shielded Twisted Pair)

Created because UTP is susceptible to EMI, a variant was developed. This includes metal shielding over each pair of wires, reducing external EMI and the possibility of unauthorized network access.

Port 445

Current versions of SMB and CIFS don't require NetBT and use port 445.

0.0.0.0

Currently unassigned IP address

DHCP uses UDP rather than TCP primarily because

DHCP clients and servers use broadcasting to communicate on a local network; UDP supports broadcast- ing, but TCP does not. TCP and UDP are responsible for delivering an application's message, and the IP protocol is responsible for finding the right destination host.

Port 53

DNS server

The process of associating a character-based name with an IP address is done via

DNS services

Dual-link connections are available for

DVI-D and DVI-I

Layer 1: Link layer involves

Device-to-device on the local network, managed by the firmware on NICs. Also called the Network interface layer or network access layer

HDMI Type-B

Double-video bandwidth; supports higher resolutions; also known as dual-link; uncommon

A device is needed to convert cable, DSL, or fiber optic trans- missions to

Ethernet transmissions used on a local network.

address prefixes for types of IPv6 addresses: unique local address

FC00::/7 (The first 7 bits are always 1111 110; today's local networks assign 1 for the 8th bit, so the prefix typically shows as FD00::/8)

address prefixes for types of IPv6 addresses: link local address

FE80::/64 (the first 64 bits are always 1111 1110 1000 0000 ...)

address prefixes for types of IPv6 addresses: multicast

FF00::/8 (The first 8 bits are always 1111 1111)

Two protocols that encrypt FTP transmissions are

FTPS (FTP Secure), which uses SSL encryption, and SFTP (SSH FTP), which uses SSH encryption

100 Mbps is also known as

Fast Ethernet

Some inkjet printers offer duplex printing. These printers are larger than normal inkjet printers because of the added space required for the duplexing assembly.

For duplex printing, be sure to use heavy paper (rated at 24-pound paper or higher) so the ink doesn't bleed through.

Installing and Configuring a SOHO Router

For routers that have external antennas, raise the antennas to vertical positions. Connect the network cable from the ISP modem or other device or wall jack to the WAN port on the router. Plug in and turn on the router. Indicator lights should indicate network activity on the WAN. To configure a router for the first time, always follow the directions of the manufacturer.

If you want your entire network to run at the fastest speed, make sure all your devices are rated for

Gigabit Ethernet.

1 Gbps is also known as

Gigabit ethernet

Port 80

HTTP (Hypertext Transfer Protocol) is used by a browser and web server for unsecured communication. You can see when a browser is using this protocol by looking for "http" at the beginning of a URL in the address bar

Port 443

HTTPS (HTTP secure) refers to the HTTP protocol working with a security protocol such as Secure Sockets Layer (SSL) or Transport Layer Security (TLS) to create a secured socket. (TLS is better than SSL.). HTTPS is used by web browsers and servers to secure the socket by encrypting the data before it is sent and then decrypting it on the receiving end before the data is processed. To know a secured protocol is being used, look for "https" in the URL

USB 2.0

High-speed - 480 Mbps

TCP: Layer 3: Transport Layer involves

Host-to-host communication, managed by the OS, primarily using TCP and UDP protocols

TCP: Layer 2: Internet layer involves

Host-to-host on the local network or network-to-network communication, managed by the OS and network devices

if a computer does not have a motherboard with a built-in RS-232 port (usually DE-9)

I can sitll use a PCIe add-on card. For laptops, i can use a USB-to-RS-232 converter.

Port 143

IMAP (Internet Mail Access Protocol). Using IMAP, the client application manages the email while it is still stored on the server.

TCP: Layer 2: Internet layer addressing contains

IP addresses

Public, Private, and Automatic Private IP Addresses

IP addresses available to the Internet are called public IP addresses. To conserve the number of public IP addresses, some blocks of IP addresses have been des- ignated as private IP addresses, which are not allowed on the Internet. Private IP addresses are used within a company's private network, and computers on this network can communicate with one another using these private addresses.

TCP: Step 5: Network transmission

IP at the Internet layer is responsible for making sure the message gets from one network to the next until it reaches its destination network (see Figure 7-5) and destination computer on that network. Whereas a MAC address at the hardware Link layer is only used to find a computer or other host on a local area network (LAN), an IP address can be used to find a computer on a local network, anywhere on the Internet (see Figure 7-6), or on an intranet.

because of a shortage of 32-bit IP addresses,

IPv6 was designed to use an IP address with 128 bits

the TCP/IP model

In this model, there are 4 layers of communication. the protocols used by hardware function at the Link layer, and protocols used by the OS are divided into three layers (Internet, Transport, and Application layers).

127.0.0.1

Indicates your own computer and is called the loopback address

Disadvantages of UTP

It can be run only 100 meters (328 feet) before signal attenuation—that is, weakening or degradation of signal—occurs. Its outer jacket is made of plastic, and it has no shielding, making it susceptible to electromagnetic interference (EMI) and vulnerable to unauthorized network access in the form of wiretapping. Because the UTP cable jacket is made of PVCs (plastics) that can be harmful to humans when they catch on fire, most municipalities require that plenum-rated cable be installed in any area that cannot be reached by a sprinkler system. A plenum is an enclosed space used for airflow. For example, if cables are run above a drop ceiling, building code requires that they be plenum rated. This means that the cable has a special Teflon coating or is a special low-smoke variant of twisted pair, reducing the amount of PVC chemicals that are released into the air in the event of a fire.

An example of a multifunction router is the Nighthawk AC1900 by NETGEAR

It has one Internet port (also called the WAN or wide-area-network port) to con- nect to the ISP by way of a modem or ONT and four ports for devices on the network. The USB port can be used to plug in a USB external hard drive for file sharing on the network. The router is also a wire- less access point with multiple antennas to increase speed and range. Computer, printers, smartphones and other devices can connect to this router using wired or wireless connections. This is because a SOHO router often serves different functions in a single device.

To communicate on a network or the Internet, a host needs the IP addresses of one or more DNS servers

It queries a _____ to find out the IP address of the des- tination host when it knows only the domain name of the host.

How does a computer or other network device know what part of an IP address identifies the network and what part identifies the host?

It relies on a subnet mask for this information

port 389

LDAP

One protocol a AAA server can use for communication is

LDAP (Lightweight Directory Access Protocol (LDAP)

Port 636

LDAPS is the secure version of LDAP

TCP/IP layers

Layer 1: Link Layer, Layer 2: Internet layer, Layer 3: transport layer, Layer 4: Application layer, Layer 5:

According to the TCP/IP model, networking communication must happen at four layers:

Link, Internet, Transport, and Application

Layer 1: Link layer addressing contains

MAC addresses

Printer Maintenance Kits

Manufacturers of high-end printers provide printer maintenance kits, which include specific printer components, step-by-step instructions for performing maintenance, tips for how often maintenance should be done, and information on any special tools or equipment you need to do maintenance. For example, the maintenance plan for the HP Color LaserJet 4600 printer says to replace the transfer roller assembly after printing 120,000 pages and to replace the fusing assembly after 150,000 pages. The plan also says the black ink cartridge should last for about 9000 pages and the color ink cartridge should last about 8000 pages. HP sells the image transfer kit, the image fuser kit, and the ink cartridges designed for this printer. To find out how many pages a printer has printed to determine if you need to do the maintenance, have the printer give you the page count since the last maintenance. You can tell the printer to display the information or print a status report by using buttons on the front of the printer (see Figure 10-26), or you can use utility software using a computer connected to the printer. See the printer documentation to know how to get this report. For network printers that offer a browser-based utility, enter the IP address of the printer in your browser, and use the utility to find the counters. (Figure 10-27 shows such a utility for an Oki Data network printer.). After you have performed the maintenance, be sure to reset the page count so it will be accurate when you need to do the next routine maintenance. Keep a written record of the maintenance and other service done. As examples of replacing printer consumables, let's look at how to replace a toner cartridge, image drum, and fuser for an Oki Data color laser printer. .

HDMI Type-D

Micro-HDMI; smallest connector; also used in poirtable devices.

HDMI Type-C

Mini-HDMI; usd in portable devices

network adapter features

NIC drivers, ethernet speeds, RJ-45 port and status indicator lights, wake-on LAN, and quality of service (QoS)

RS-232 (Recommended Standard 232)

Old tech, describes how DTEs (computers) and DCEs (dial-up modems) communicate using serial ports. communicates via serial cables that have either 9 wires (DE-9/DB9) or 25-wires (DB-25).

When purchasing an inkjet printer, look for the kind that uses two or four separate cartridges.

One cartridge is used for black ink. Three cartridges, one for each color, give better-quality color than one cartridge that holds all three colors. Some low-end inkjet printers use a single three-color cartridge and don't have a black ink cartridge. These printers must combine all colors of ink to produce a dull black. Having a separate cartridge for black ink means that it prints true black and, more important, does not use the more expensive colored ink for black print. To save money, you should be able to replace an empty cartridge without having to replace all cartridges.

Port 110

POP3 (Post Office Protocol, version 3). Using POP3, email is downloaded to the client computer, and unless the default setting is changed, the email is then deleted from the email server. The client requests email from a POP3 server

SNMP uses the following ports

Port 161 and Port 162

FTP uses the following ports

Port 20 and Port 21

A mail server uses the following ports and protocols

Port 25, and Port 110 or Port 143

DHCP uses the following ports

Port 67 and Port 68

A web server uses the following ports and protocols

Port 80 and Port 443

TCP: Layer 3: Transport Layer addressing contains

Port addresses

Printer Maintenance

Printers generally last for years if they are properly used and maintained. To get the most out of a printer, it's important to follow the manufacturer's directions when using the device and to perform the necessary routine maintenance. For example, the life of a printer can be shortened if you allow the printer to overheat, don't use approved paper, or don't perform maintenance when required.

There are two derivatives of RG-6

RG-6/U, which is double-shielded, and the more common RG-6/UQ, which is quadruple-shielded and is often referred to as "quad shield." It is a better option if you are running RG-6 in ceilings or near any electrical appliances

For an onboard NIC, you must also enable Wake-on-LAN in BIOS/UEFI setup.

Reboot the computer, enter BIOS/ UEFI setup, and look for the option on a power-management or advanced screen. For some systems, you enable power-on by the PCI-E bus because the NIC communicates via this bus. It is not recommended that you enable Wake-on-LAN for a wireless network adapter.

USB4 specification

Released in 2019 - 40 Gbps throughput - compatible with Thunderbolt 3

DisplayPort

Royalty-free interface similar to HDMI; designed to be replaced for HDMI and DVI; often has a locking tab; uses packet transmission similar to ethernet; mini verison developed by apple

The current release of the SMB protocol is

SMB 3; older versions include SMB 2 and a spin-off protocol called CIFS (Common Internet File System)

Port 25

SMTP server

Port 22

SSH (Secure Shell)

3 Types of storage drive/hard drive cables

Serial ATA (SATA), integrate ddrive electronics (IDE), small computer system interface (SCSI)

A common type of SCSI today is

Serial attached SCSI (SAS), which can transfer data as fast as 22.5 Gbpos (SAS Version 4); faster speeds are being developed

However, some companies create proprietary cables and connectors for their devices, based on the USB specifications.

Such devices cannot connect properly to Type A, Type B, and Mini- or Micro- connectors

USB 3.0

SuperSpeed - 5 Gbps

USB 3.1

SuperSpeed+ - 10 Gbps

USB 3.2 (USB-C)

SuperSpeed+ 10/20 Gbps

FTP client uses

TCP

FTP server uses

TCP

HTTP uses

TCP

HTTPS uses

TCP

IMAP email server uses

TCP

POP3 email server uses

TCP

SMTP email server uses

TCP

SSH server uses

TCP

Telnet server uses

TCP

the transport layer involves the protocols of

TCP or UDP

DNS server uses

TCP/UDP

LDAP uses

TCP/UDP

RDP uses

TCP/UDP

SMB and CIFS uses

TCP/UDP

SMB with NetBT uses

TCP/UDP

SSH is preferred over

Telnet

Port 23

Telnet server

Port 20

The FTP client receives data on port 20 from the FTP server

Port 21

The FTP server listens at port 21 for commands from an FTP client

A omdem stands between

The ISP and the local network to convert signals to Ethernet used on the LAN

the TCP/IP link layer is equivalent to

The OSI data link layer and physical layer

Port 161

The SNMP agent on the monitored device

Port 162

The SNMP server or manager

network communication that starts when a browser (an application) requests a webpage from a web server (another application)

The browser app passes the request to the OS, which passes the request to the network card, which passes the request on to the network. When the request reaches the network card on the server, the network card passes the request on to the OS, and then the OS passes it on to the web server application.

Laser process - developing (step 4)

The developing cylinder applies toner to the surface of the drum. The toner is charged between -200 V and -500 V, and it sticks to the developing cylinder because of a magnet inside it. A control blade prevents too much toner from sticking to the cylinder surface. As the cylinder rotates very close to the drum, the toner is attracted to the parts of the drum surface that have a -100 V charge, and it is repelled from the more negatively charged parts of the drum surface. The result is that toner sticks to the drum where the laser beam has hit, and it is repelled from the areas where the laser beam has not hit.

To communicate on a network or the Internet, a host needs its own IP address

The first part of an IP address identifies the network, and the last part identifies the host.

Laser process - fusing (step 6)

The fuser assembly uses heat and pressure to fuse the toner to the paper. Up to this point, the toner is merely sitting on the paper. The fusing rollers apply heat to the paper, which causes the toner to melt, and the rollers apply pressure to bond the melted toner into the paper. The temperature of the rollers is monitored by the printer. If the temperature exceeds an allowed maximum value (for example, 410°F), the printer shuts dow

Online Support for Printers

The printer manufacturer's website is an important resource when supporting printers. Often, you can find online documentation, warranty information, a knowledge base of common problems and solutions, updated device drivers, replacement parts available for order, and printer maintenance kits.

An inkjet printer uses a print head that moves across the paper, creating one line of the image with each pass.

The printer puts ink on the paper using a matrix of small dots. Different types of inkjet printers form their droplets of ink in different ways. Printer manufacturers use several technologies, one of which is the bubble-jet.

suppose the IP address of a computer is 201.18.20.160 and the subnet mask is 255.255.0.0, which is 11111111.11111111.00000000.00000000 in binary

The subnet mask tells Windows that the first 16 bits, or two octets (201.18), of the IP address is the network ID. Therefore, when Windows is deciding how to communicate with a computer that has an IP address of 201.18.20.208, it knows the computer is on its own network, but a computer with an IP address of 201.19.23.160 is on a different network.

TCP/IP (Transmission Control Protocol/ Internet Protocol)

The suite of protocols or rules that define network communication

Suppose an employee with a laptop often travels, and the work network uses static IP addressing, even though most public networks use dynamic IP addressing. How do you configure the employee's computer's network connection settings? For travel, you would configure the computer to use dynamic IP addressing in order to connect to public networks. However, using that config- uration means that when the computer attempts to con- nect to the corporate network, it won't be able to find a DHCP server. Recall that, in this situation, the computer generates an Automatic private IP address (APIPA) in the address range 169.254.x.y. However, you can assign a static IP address by using an alternate configuration.

To create an alternate configuration, first use the General tab of the TCP/IPv4 Properties dialog box to set the configuration for dynamic IP addressing. Then click the Alternate Configuration tab. Select User configured. Then enter a static IP address, subnet mask, default gateway, and DNS server addresses for the alternate configuration to be used on the company network. Click OK and close all dialog boxes. Now the computer will first attempt to gather network connec- tion settings from a DHCP server. If a DHCP server is not available on the network, the computer will instead use the static IP settings you just entered.

Configuring and Using a Shared Printer

To share an installed local or network printer with others on the network, follow these steps: 1. In the printer Properties dialog box, which you access through the Settings app or Control Panel, click the Sharing tab. Check Share this printer (see the middle box in Figure 10-17). 2. You can then change the share name of the printer. Notice in Figure 10-17 the option to control where print jobs are rendered. A print job can be prepared (rendered) on the remote computer (client computer) or this computer (print server). Your choice depends on which computer you think can best handle the computing burden. You can test several print jobs on remote computers with rendering at either location to see which method best uses computing resources on the network. 3. If you want to make drivers for the printer available to remote users who are using an operating system other than the OS on this computer, click Additional Drivers 4. The Additional Drivers box opens (see the right side of Figure 10-17). For 32-bit operating systems, select x86. For 64-bit operating systems, select x64. Click OK to close the box. You might be asked for the Windows setup DVD or other access to the installation files. 5. Click OK to close the Properties dialog box. A shared printer shows a two-friends icon under it or in the status bar in the Devices and Printers window. The printer is listed in the Network group in File Explorer on other network computers. For the ptgorinter share to be successful, the following requirements must be met: ● The computer sharing the printer and the computer using the shared printer must both be connected to the same network. ● The shared printer and the computer sharing it must be turned on. ● Both computers must allow file and printer sharing.

Ports 137 and 139.

To support legacy NetBIOS applications on a TCP/IP network, Windows offered NetBT (NetBIOS over TCP/IP). Earlier versions of SMB require NetBT to be enabled and use these ports

STP Cable is resistant to EMI

True

DHCP client uses

UDP

DHCP server uses

UDP

SNMP agent uses

UDP

SNMP manager uses

UDP

The most popular OSs for running a web server are

UNIX and Linux

255.255.255.255

Used for broadcast messages by TCP/IP background processes to communicate with all devices on a network at the same time or without needing specific recipient information

direct burial cable

Used when twisted pair cable (for example, Cat 5e or Cat 6) needs to be run outdoors, and it should be placed approximately 8 inches underground and at least 8 inches away from any buried power lines. This cable does not degrade when exposed to the elements because it is protected by an additional plastic or metal conduit.

Even with single-sided printing, inkjet printers tend to smudge on inexpensive paper, and they are slower than laser printers. If a printed page later becomes damp, the ink can run and get quite messy. The quality of the paper used with inkjet printers significantly affects the quality of printed output. You should use only paper that is designed for an inkjet printer, and you should use a high-grade paper to get the best results

Weight and brightness are the two primary ways of measuring paper quality. The rated weight of paper (for example, 20-32 pounds) determines the thickness of the paper. Brightness is measured on a scale of 92 to 100.

Choosing a Driver Core

When you install a printer, printer drivers are required that are compatible with the installed operating system. Be sure to use 32-bit drivers for a 32-bit OS and 64-bit drivers for a 64-bit OS. Windows has many printer drivers built in. The drivers might also come on a CD bundled with the printer or you can download them from the printer manufacturer's website. Using the drivers downloaded from the manufacturer's website ensures you have the most up-to-date version of the full drivers, with support for all of a printer's features. Some printer manufacturers give you a choice of drivers based on the PDL included. The most common PDLs are PCL and Postscript. Hewlett-Packard developed Printer Control Language (PCL), which is used by many different printer manufacturers and supported by many different OSs, providing you the flexibility to work in different environments. PCL depends on the drivers in the printer hardware for creating print data, which results in a higher print-processing speed compared to Postscript (described next). Consistency in printer outputs can vary between printers with PCL because hardware varies, which also means the final print quality depends on the quality of the printer. The alternative, Adobe's Postscript (PS), is also used by many different printer manufacturers but supported by fewer OSs compared to PCL because it is mostly focused for use with Macintosh devices. Postscript does not rely on the printer to create the print data; this creates consistency in print quality between different Postscript printers. In Postscript, graphics are more detailed and have larger file sizes. Postscript is favored by graphics-intense users, especially those who need to produce high-volume output. A designer can test their design with a sample on their printer and then outsource the volume print job to a print shop that uses Postscript to ensure consistent quality. When a printer offers a choice of drivers between PCL or Postscript, choose PCL for general applications and speed, and choose Postscript for graphic-intense applications printing. Exam Tip The A1 Core 1 exam might give you a scenario that requires you need to know which type of driver to choose—PCL or Postscript.

Installing a Printer/Mapping a printer

Windows has many preinstalled printer drivers that make printer installation particularly easy and straightforward. However, some manufacturers recommend that you install their drivers before connecting the printer to your computer or the network. This provides additional printer configuration and management tools that are not included in the Windows drivers. Follow these steps to install a wired or Wi-Fi network printer or Bluetooth printer using the Windows drivers, or follow more specific instructions from the printer's manufacturer: 1. Make sure the printer is connected to the network or the computer. In Windows, open the Settings app, click Devices, and then click Printers & scanners. Click Add a printer or scanner. (For Windows 11, in the Settings app, select Bluetooth & devices, Printers & scanners, and Add device.) Windows searches for available printers and lists them. 2. Select the printer, and click Add printer. Follow the on-screen instructions to add the printer. 3. If your printer isn't listed, open Devices and Printers in the Control Panel to add the printer. Click Add a printer, and then click The printer that I want isn't listed. Choose one of the following options: ● My printer is a little older searches for older printer drivers. ● Select a shared printer by name allows you to enter a network location for the printer. ● Add a printer using a TCP/IP address or hostname allows you to address the printer by IP address or host name. ● Add a Bluetooth, wireless or network discoverable printer searches again for printers connected through Bluetooth or the network. ● Add a local printer or network printer with manual settings gives you the option to make more granular changes to the printer's installation, use a setup CD or downloaded drivers provided by the manufacturer, or select an appropriate driver from a list of available Windows printer drivers. In the next box, choose the port where the printer is connected, and click Next. Then you can select the brand and printer model to use drivers provided by Windows (see the left side of Figure 10-14), or you can use drivers stored on CD or previously downloaded from the web by clicking Have Disk. The Install From Disk box appears. Click Browse to

NIC drivers

Windows has several embedded NIC drivers. After you install a NIC, you install its drivers. For best functionality and security, always use the latest drivers. Problems with the network adapter can sometimes be solved by using Device Manager to update the drivers or uninstall the drivers and then reinstall them.

Installing a Local or Network Printer

With some printers, you launch the installation program that came bundled on the setup CD or was downloaded from the printer manufacturer's website. With others, use the Windows Settings app or the Devices and Printers window in Control Panel to install a printer. These windows are also used to manage and uninstall printers

it's possible to refill an ink cartridge, and many companies will sell you the tools and ink you need as well as show you how to do it.

You can also purchase refilled cartridges at reduced prices. When you purchase ink cartridges, make sure you know if they are new or refilled. Also, for best results, don't refill a cartridge more than three times. Many manufacturers and retail shops will accept empty cartridges for recycling.

Every wired or wireless network adapter, also called a network interface card (NIC), has

a 48-bit (6-byte) identification number—called the MAC address, physical address, or network adapter address—hard-coded on the card by its manufacturer.

a link local address has

a 64-bit prefix followed by 64 bits to identify the host 64 bits - prefix - 1111 1110 1000 0000 0000 0000 ... 0000 FE80::/64 64 bits - interface ID

DE-9/DB-9 is

a 9-pin connector used for serial cable and RS-232 data transmissions

A device that requests an IP address and other information from a DHCP server is called

a DHCP client. It is said that the client is leasing an IP address

A DHCP server that serves up IPv6 addresses is often called

a DHCPv6 server

When a large IPv6 network is subnetted,

a DHCPv6 server assigns a node in a subnet a global address or unique local address that contains the correct subnet ID for the node's subnet.

A network adapter is identified by

a MAC address.

in dot matrix printers, the impact paper used by these printers come as

a box of fanfold paper or in rolls (used with receipt printers).

in dot-matrix printers, when the paper is nearing the end of the stack or roll

a color on the edge alerts you to replace the paper.

with thermal printers, you know its time to replace the paper roll when it shows

a color strip down one edge

A fully qualified domain name (FQDN) identifies

a computer and the network to which it belongs. An example is www.cengage.com. The host name is www (a web server), cengage is the domain name, and com is the top-level domain name of the Cengage network.

host

a computer that can be either the client or the server using client/server applications.

Proxy server

a computer that intercepts requests that a client, such as a browser, makes of another server, such as a web server

A socket

a connection between a browser and web server.

The way that a crossover cable's pins are wired is the basis for a loopback

a connection made to test the local computer or system (for example, an RJ45 loopback plug).

TCP is considered

a connection-oriented protocol

UDP is considered

a connectionless protocol or best-effort protocol because it does not guarantee delivery by first establishing a connection or by checking whether data is received. used where guaranteed delivery is not as important as fast transmission

For heavy business use, sometimes it's best to purchase

a dedicated machine for each purpose instead of bundling many functions into a single machine. If you need a scanner and a printer, purchase a good printer and a good scanner rather than a combo machine. Routine maintenance and troubleshooting are easier and less expensive on single-purpose machines, although the initial cost is higher.

The best-known impact printer is

a dot matrix printer

A printer that is able to print on both sides of the paper is called

a duplex printer or a double-sided printer.

Many laser printers and a few inkjet printers offer duplex printing. After the front of the paper is printed,

a duplexing assembly, which contains several rollers, turns the paper around and draws it back through the print process to print on the back of the paper. Alternatively, some high-end printers have two print engines so both sides of the paper are printed at the same time.

the fusing is done inside

a fuser cartridge, which also might be replaceable.

with displayport, non-dual-link versions have

a gap in the center of the pins, using 1/3 fewer pins total

A host name or computer name identifies

a host and can be used in place of its IP address on the local net- work. The name can have up to 63 characters, including letters, numbers, and special characters.

Multimode cables have

a larger core diameter than do single-mode cables.

A link is

a local area network (LAN) or wide area network (WAN).

in laser printers, the toner responds to a charge and moves from one surface to another if the second surface has

a more positive charge than the first.

integrated Drive Electronics (IDE)

a much older type of ocnnection that runs in parallel (8 bits at a time). uses a 40-pin ribbon cable for data and a 4-pin molex connector for power. not common

A domain name identifies

a network

A computer makes a wired or wireless connection to a local network by way of

a network adapter, which might be a network port embedded on the motherboard or a network interface card (NIC) installed in an expansion slot on the motherboard. In addition, the adapter might be an external device plugged into a USB port.

3D printers use

a plastic filament or a resin to build a 3D model of a digital image.

In networking, an application is identified by

a port address.

some thermal printer ribbons have

a print head cleaning stripe at the end, and it's a good idea to clean the head each time you replace the ribbon

a unique local address is

a private address assigned by a DHCPv6 server that can communicate across subnets within the private network. They're used by network administrators when subnetting a large network. A unique local address always begins with FC or FD and is usually assigned to an interface in addition to its self-assigned link local address. 48 bits - network id 16 bits - subnet id 64 bits - interface id

Syslog server

a protocol that gathers event information about various network devices, such as errors, failures, maintenance tasks, and users logging in or out. The messages about these events are sent to a central location called a syslog server, which collects the events into a database. Some syslog servers can generate alerts or notifications to inform network administrators of problems that might need attention.

If you are running a web server on the Internet, you will need

a public IP address for your router and either a static or reserved private IP address for the web server. For this situation, you can lease a public IP address from your ISP at an additional cost. You will also need to enable port forwarding to the server.

For small businesses and homes, the default gateway is

a router

On a small office or home network,

a router stands between the ISP network and the local network , and the router is the local network's gateway to the Internet.

in laser printers, the drum, mirror, blades, and rollers are as wide as

a sheet of paper

Trivial FTP (TFTP)

a small, simple app often used to transfer BIOS updates to firmware on routers and smartphones. It's also used to transfer a lean pre-execution environment (PXE) operating system from a server to BIOS/UEFI on a computer to boot the computer when it does not have a working OS. TFTP over UDP is preferred in these situations because the program is small enough to store on firmware, and it is simple to implement and use.

When a device first connects to a network, its IP address can have already been manually assigned; this type of IP address is called

a static IP address

laser process - transferring (step 5)

a strong electrical charge draws the toner off the drum onto the paper. This is the first step that takes place outside the cartridge and the first step that involves the paper. The soft, black transfer roller puts a positive charge on the paper to pull the toner from the drum onto the paper. Then the static charge eliminator weakens the charges on both the paper and the drum, so the paper does not stick to the drum. The stiffness of the paper and the small radius of the drum also help the paper move away from the drum and toward the fusing assembly. Very thin paper can wrap around the drum, which is why printer manuals usually instruct you to use only paper designated for laser printers.

IPv6 uses subnetting but doesn't need

a subnet mask because the subnet ID is part of the IPv6 address. The subnet ID is the 16 bits following the first 48 bits of the address.

NAT (Network Address Translation) is

a technique designed to conserve the number of public IP addresses needed by a network. A router stands between a private network and the Internet. It substitutes the private IP addresses used by computers on the private network with its own public IP address when these computers need access to the Internet.

The transferring is done using

a transfer belt that can be replaced on some printers

laser printer

a type of electro-photographic printer that can range from a small personal desktop model to a large network printer capable of handling and printing large volumes continuously.

a subnet mask serves as

a type of filter to decide whether a destination IP address is on the local network or a remote network.

An inkjet printer uses

a type of ink-dispersion printing and doesn't normally provide the high-quality resolution of laser printers.

each server running on a computer is addressed by

a unique port number

SNMP (Simple Network Management Protocol) server and agent

a versatile service and protocol used to monitor network traffic and manage network devices

Serial ATA (SATA)

a very common connection for internal drives (SATA) and external drives (eSATA). uses a 7-pin data connector and a 15-pin power connector

TCP: Step 2: Transport layer

adds information to the message to address the correct server application. Depending on the type of application, the protocol TCP (Transmission Control Protocol) or UDP (User Datagram Protocol) adds the port assigned to the server application (TCP uses port 80 for HTTP communication in our example). The message with Transport data added is then passed down to the Internet layer.

protocol data unit (PDU)

all messages on a TCP/IP network can be referred to as

Wake-on-LAN

allows it to wake up the computer when it receives certain communication on the network. To use the feature, it must be enabled on the NIC. Open the NIC's Properties dialog box in Device Manager, and click the Advanced tab. Make sure Wake on Magic Packet and Wake on pattern match are both enabled

When working on printers,

always keep in mind the following hazards: ● Dangerous electricity. A printer might still keep power even when it is turned off. To ensure that the printer has no power, unplug it. Even when a laser printer is unplugged, internal components might still hold a dangerous electrical charge for some time. ● Hot to touch. Some laser printer parts can get hot enough to burn you while in operation. Before you work inside a laser printer, turn it off, unplug it, and wait about 30 minutes for it to cool down. ● Laser beam. For your protection, the laser beam in a laser printer is always enclosed inside a protective case. Therefore, when servicing a laser printer, you should never have to look at the laser beam, which can damage your eyes. ● Static electricity. To protect sensitive memory modules and hard drives inside printers, be sure to use an ESD strap when installing them. You don't need to wear an ESD strap when exchanging consumables such as toner cartridges, fuser assembles, or image drums. ● Working inside high-voltage equipment when no one is around. Here's one more tip to stay safe, although we don't want it to frighten you: When you work inside high-voltage equipment such as a laser printer, don't do it when no one else is around. If you have an emergency, someone needs to be close by to help you. If you're working with laser printer toner cartridges and you get toner dust on your clothes or hands while exchanging the cartridge, don't use hot water to clean it up. Remember that heat sets the toner. Go outdoors, and use a can of compressed air to blow off the toner. Then use cold water to clean your hands and clothes. It's a good idea to wear a smock or apron when working on printers.

An ONT is usu- ally mounted on the outside of the building where fiber optic cable terminates, and the ONT connects to

an Ethernet cable that enters the building.

A fully qualified domain name must be associated with

an IP address before the computer can be found on the Internet.

A device on the network—and its network connection—are identified by

an IP address.

At the Internet layer, the OS identifies a network connection by

an IP address.

egardless of the transmission technol- ogy or converting device used, each provides

an RJ-45 Ethernet port for a SOHO router or computer to connect to.

When a TCP message reaches its destination,

an acknowledgment is sent back to the source. If the source TCP does not receive the acknowledgment, it resends the data or passes an error message back to the higher-level application protocol

At the Transport layer, a port address identifies

an application.

NetBIOS (Network Basic Input/Output System),

an older protocol used by Windows for network communication.

DVI-A

analog only connections

node

any computer, printer, smart thermostat, or other networked device that can be addressed on the network.

OSI layers

application, presentation, and session layers, transport layer, network layer, data link layer, and the physical layer

most applications that use a network

are client/server applications

small computer system interface (SCSI)

around since the 80s, at first was designed as a parallel technology that could run faster than IDE and other connection

FTP has been largely replaced by other technologies, such

as the BitTorrent and Streaming Sync protocols, for file transfers

An FQDN can be used to find a computer on the Internet if this name is

associated with an IP address kept by DNS servers in the DNS namespace.

Suppose the IP address of a computer is 19.200.60.6 and its subnet mask is 255.255.240.0. Is a computer with the IP address 19.200.51.100 on its network?

because the IP address 19.200.60.6 in binary is 00010011.11001000.00111100.00000110 and the subnet mask 255.255.240.0 in binary is 11111111.11111111.11110000.00000000, and there are 20 ones in the subnet mask therefore 20 bits identify the network, and the other IP address 19.200.51.100 in binary is 00010011.11001000.00110011.01100100 and the first 20 bits in my IP address match the first 20 bits in the other IP address, then the other IP address is on my network.

name resolution

begins when a DNS client, such as a laptop or workstation, makes a query to its DNS server. The server might turn to other DNS servers to find the IP address of a given domain name

Some networks use

both 32-bit addresses and 128-bit addresses, which are defined by IPv6 (Internet Protocol version 6).

3D printers use a plastic filament or a resin to

build a 3D model of a digital image

with thermal printers, its important to regularly clean the print head because

buildup can harden over time and permanently damage the head. follow the printer manufacturer's directions to clean the head.

The most common types of connections for SOHO networks

cable, fiber optic, and DSL.

Telnet server and protocol

can be used by an administrator or other user to control a com- puter remotely. Telnet is not considered secure because transmissions in Telnet are not encrypted.

a link local address/link local unicast address/local address

can be used for limited communication with neighboring nodes in the same link (the local network). These local addresses are similar to IPv4 APIPA addresses in that they are assigned to the computer by itself, as opposed to coming from a DHCPv6 server, and are not guaranteed to be unique on the network. Most link local addresses begin with FE80::/64. This prefix notation means the address begins with FE80 followed by enough zeroes to make 64 bits

To improve routing capabilities and speed of communication, IPv6 changed the way IP addresses are used to find computers on the Internet.

changed the terminology used to describe TCP/IP communica- tion. Here are a few terms used in the IPv6 standards: link, interface ID/interface identifer/neighbors, multicasting, anycasting, unicasting, a link local address, a unique local address, and a global address/global unicast address

Some NICs provide a Power Management tab in the Properties dialog box. To use the Power Management tab to enable Wake-on-LAN,

check Allow this device to wake the computer

in dot matrix printers, if the print head fails,

check on the cost of replacing the head versus the cost of buying a new printer

There's more you can do to configure a router to secure a local wired or wireless network. The setup screens for each router might be different.

click Create A New Network. On the screens that follow, you are given the chance to enter the optional username and password to the ISP, assign a new SSID and password to the wireless network update the router firmware, and assign a username and password to sign in to the router firmware

Computers on the same LAN can use MAC addresses to communicate, but

computers on different LANs use IP addresses to communicate over the internet

Suppose you are called on to help a small bookkeeping company with three employees set up its network in a single office space. You have purchased a SOHO router, switch, several patch cables, three laptops, a desktop computer, and network printer. The local telecommunications company has already installed the fiber optic cable to the office along with Ethernet cabling from the ONT unit outside the building to a wall jack in the office. Let's step through the process of setting up and configuring the local network.

configure the router, configure the DHCP server, resolve IP addresses, and connect the clients

TCP uses IP addresses to make a

connection between a sending and destination host, sends the data, checks whether the data is received, and resends it if it is not.

Before replacing expensive parts in a printer,

consider whether purchasing a new printer might be more cost-effective than repairing the old one.

fiber optic uses an optical network terminal (ONT) to do what

convert fiber optic trnsmissions to ethernet transmissions used on a local network

filament 3d printers are better able to

create hollow objects, and filament is less expensive than resin

A multicast address is used to

deliver messages to all nodes in a targeted, multicast group, such as when video is streaming from a server to multiple nodes on a network.

TCP guarantees

delivery which control communication on the network. it requests an acknwledgement

DVI-I

digital and analog connections

DVI-D

digital-only connections

two types of thermal printers

direct thermal printer, and a thermal transfer printer

A computer can be assigned a computer name, and a network can be assigned a

domain name.

DSL modems do what

dsl modems convert dsl to ethernet transmissions used on a local network

A server application might be installed on a computer as a stand-alone application or

embedded as firmware in other network devices such as a router.

For a small office/home office (SOHO) router, expect that NAT is

enabled by default

SSH server and Secure Shell (SSH) protocol

encrypt communications so hackers can't read the data if they intercept a transmission. This protocol is used in various situations for encryption, such as when remotely controlling a computer or when communicating with a web server. commonly used in Linux to pass sign-in information to a remote computer and control that computer over a network.

with printed thermal images , the printed image can

fade over time or if it interacts with another heat source or ultraviolet light

UDP provides

fast transmissions

single-mode and multimode fiber;

for the most part, single-mode fiber is used over longer distances, but both types are easily capable of supporting 1000 Mbps and 10 Gbps networks and can be run farther than twisted pair cable. Straight tip (ST) and subscriber connector (SC), shown in Figure 13.3, are a couple types of connectors used with fiber. Another connector is the Lucent Connector (LC), which looks quite similar to SC.

To communicate on a network or the Internet, a host needs a subnet mask

four decimal numbers separated by periods—for example, 255.255.255.0. When a computer wants to send a message to a destination computer, it uses its ___ to decide whether the destination computer is on its own network or another network.

A 32-bit IPv4 address is organized into

four groups of 8 bits each, which are presented as four decimal numbers separated by periods, such as 72.56.105.12. Each of the four numbers separated by periods is called an octet (for 8 bits) and can be any decimal value from 0 to 255, making a total of about 4.3 billion possible IPv4 addresses (256 3 256 3 256 3 256).

Messages with source and destination MAC addresses are called

frames

when working on thermal printers

ground yourself to protect the sensitive heating element against static electricity. don't touch the heating element with your fingers. might need to clean it with a lint-free cotton swab dabbed in isopropyl alcohol.

These devices still use RS-232 interfaces

handheld and mountable termnals, networking equipment, industrial machines, and analytical instruments

Mini- and Micro- USB connectors are often used for

handheld computers, smartphones, mice, digital cameras, portable music players, and cell phones.

USB 1.0 (1.5 Mbps) and 1.1 (12 Mbps)

have been deprecated. If you encounter an older computer that has only these ports, consider installing a USB adapter that adheres to a higher version of USB

what do thermal printers use to create an image?

heat

with 3d printers, the coil of filament, a thermoplastic strand, is fed into the 3d printer, which

heats the plastic and deposits thin layer upon layer onto the print bed to build a 3d object.

The SNMP server is called the manager, and a small application called an agent is installed on devices being managed by SNMP. The service can

help create logs for monitoring device and network performance, make some automatic changes to devices being monitored, and alert network technicians when a bottleneck or other performance issues are causing problems on the network

RJ-45 port and status indicator lights

hen you first discover you have a problem with a computer not connecting to a network, be sure to check the status indicator lights to verify you have connectivity and activity. If not, then the problem is related to hardware.

DVI (Digital Visual Interface)

high-quality connections used with LCD displays. carries uncompressed digital video; is partially compatible with HDMI

disadvantages of STP

higher cost of the product and installation and the fact that the shielding needs to be grounded to work effectively.

IP address

identifies a node and its network connection.

Port address

identifies an application

know these laser printer terms

imaging drum, fuser assembly, transfer belt, trans- fer roller, pickup roller, separate pads, and duplexing assembly.

Optical, or fiber optic, cable

is fast, and unlike copper-based cables, it is not subject to EMI. Because fiber optic cables transmit data by way of light instead of electricity, they can send signals much faster and farther than do copper wires. Optical cable can be more secure than copper-based cable as well. EMI doesn't even play into the equation because optical cables don't use electricity. Plus, fiber optic cables are more difficult to tap (splice) into than copper-based cables.

Single-mode,

is used for longer-distance runs, perhaps from one city to the next (as far as thousands of kilometers). At shorter distances, single-mode cable can go beyond 10 Gbps.

with thermal printers, some manufacturers suggest cleaning the head with

isopropyl alcohol wipes when cleaning a thermal printer head - remove any dust and debris that get down in the print head assembly

how do impact printers print

it has a print head that moves across the width of the paper, using pins to print a matrix of dots on the page. the pins shoot against a cloth ribbon, which hits the paper, depositing the ink. the ribbon provides both the ink for printing and the lubrication for the pinheads. The quality of the print on an impact printer is poor compared with other printer types.

TCP: Step 6: Destination

its NIC receives the message, strips off Ethernet or Wi-Fi information at the Link layer, and passes the message up to the Internet layer. The Internet layer strips off IP address information and passes the message up to the Transport layer. The Transport layer strips off TCP or UDP information and passes the message to the correct port and on to the Application layer. The Application layer passes the message to the web server application.

If a computer first connects to a network that is using dynamic IP addressing and is unable to lease an IP address from the DHCP server, it generates

its own Automatic Private IP Address (APIPA) in the address range 169.254.x.y

To communicate on a network or the Internet, a host needs this TCP/IP information

its own ip address, a subnet mask, the ip address of a default gateway, and the ip addresses of one or more DNS servers

The ISP is nor- mally responsible only for

its system up to and including the modem or ONT.

in dot matrix printers, overheating can damage a print head, so

keep it as cool as possible to make it last longer. keep the printer in a cool, well-ventilated area, and don't use it to print more than 50-75 pages without allowing the head to cool down

The Internet Assigned Numbers Authority (IANA at iana.org) is responsible for

keeping track of assigned IP addresses and has already released all of its available 32-bit IPv4 addresses. IPv6 addresses leased from IANA today are all 128-bit addresses.

The two most popular types of printers are

laser and inkjet. Other types of printers are impact printers (dot matrix), thermal printers, and 3D printers.

Three types of unicast addresses are

link local addresses, unique local addresses, and global addresses.

The network ID of the destination IP address is used to

locate the destination host's local network. After the message arrives at the local network, the host portion of the IP address is used to identify the one computer on the network that will receive the message.

RJ45 plugs

look a lot like the landline telephone plugs (known as RJ11 plugs). However, it is larger and contains eight wires, whereas the RJ11 plug holds only a maximum of six wires (and normally only uses four).

Print server

manages network printers and makes them available to computers throughout the network.

IEEE, a nonprofit organization, is responsible for

many Internet standards. Standards are proposed to the networking community in the form of an RFC (Request for Comment).

All the IP addresses assigned to a local network or subnet have

matching bits in the leftmost part of the IP address; these bits that identify the network are called the network ID

with IPv4 broadcasting, messages are sent to every node on a local network. However, IPv6 doesn't use broadcasting, thereby reducing network traffic. Instead, IPv6 uses

multicasting, anycasting, and unicasting

If the separation pad is worn,

multiple sheets of paper may be drawn into the printer. Sometimes you can clean a separation pad to prolong its life before it needs replacing.

Flatbed scanners

must be fed one page at a time, with each page being lined up on a glass surface.

hardware devices used to create local networks in homes and small businesses,

network adapters, switches, hubs, cable modems, and SOHO routers.

A network adapter is often called a

network interface card or NIC even when it's not really a card but rather a USB device or a device embedded on the motherboard. It might also be called a network controller or network adapter.

USB-C is used for

newer smartphones and other devices developed after 2017.

star bus topology means

nodes are connected to one or more centralized devices, which are connected to each other. The 3 centralized devices are called switches.

Neighbors

nodes on the same local network

Some IP addresses are reserved, so these numbers are approxima- tions. IP addresses that are reserved for special use by TCP/IP and should

not be assigned to a device on a network

impact printers print

only text that it receives as raw data

To enable QoS on a Windows computer's NIC,

open the network adapter Properties dialog box in Device Manager. On the Advanced tab, make sure Priority Enabled or Priority & VLAN Enabled is selected, as shown in Figure 7-26. If the option is not listed, the adapter does not support QoS.

messages with IP address header information added are called

packets

If the pickup roller is worn,

paper may misfeed into the printer. Sometimes you can clean a pickup roller to prolong its life before it needs replacing

DNS server

part of a client/server system that associates FQDNs such as www.cengage.com with IP addresses. called name resolution, and it begins when a DNS client, such as a laptop or workstation, makes a query to its DNS server. The server might turn to other DNS servers to find the IP address of a given domain name

Most inkjet printers today can print high-quality photos, especially when used with

photo-quality paper.

Laser printers work by

placing toner on an electrically charged rotating drum called the imaging drum, transferring the toner onto paper as the paper moves through the system, and then fusing the toner to the paper.

To meet fire code, use

plenum-rated cable above drop ceilings and anywhere else necessary.

To set up a modem,

plug in the TV coax cable and the Ether- net cable, and turn on the modem. the red Reset button, which you can use to reset a modem to its factory default settings.

SMB over UDP uses

ports 137 and 138

.SMB over TCP uses

ports 137 and 139

Dot matrix printers have the advantage of being able to

print multicopy documents

thermal transfer printers are used to

print receipts, barcode labels, clothing labels, or container labels

Type A and Type B usb connectors are commonly used for

printers and other larger devices

7 steps of the laser printing process

processing the image, charging or conditioning, exposing or writing, developing, transferring, fusing, cleaning

Coaxial cable

provides another way to transfer data over a network. This cable has a single conductor surrounded by insulating material, which is then surrounded by a copper screen and, finally, an outer plastic sheath. Some networking technologies still use this. for example, cable Internet connections use RG-6 coaxial cable (and possibly the older RG-59 cable). This cable screws on to the terminal of a cable modem using an F-connector (also called F-type connector). It is the same cable and connector used with cable TV set-top boxes (STBs) and DVRs.

Cleaning a Printer

regularly clean the printer. Some manufacturers suggest that a heavily used printer be cleaned weekly, and others suggest you clean it whenever you exchange the toner, ink cartridges, or ribbon. Clean the outside of the printer with a damp cloth. Don't use ammonia-based cleaners. Clean the inside of the printer with a dry cloth and remove dust, bits of paper, and stray toner. Picking up stray toner can be a problem. Don't try to blow it out with compressed air because you don't want the toner in the air. Also, don't use an antistatic vacuum cleaner. You can, however, use a specialized vacuum cleaner designed to pick up toner, called a toner vacuum. This type of vacuum does not allow the toner that it picks up to touch any conductive surface. Some printer manufacturers also suggest you use an extension magnet brush. The long-handled brush is made of nylon fibers that are charged with static electricity and easily attract the toner like a magnet. For a laser printer, wipe the rollers from side to side with a dry cloth to remove loose dirt and toner. Don't touch the soft, black roller (the transfer roller), or you might affect the print quality. You can find specific instructions for cleaning a printer on the printer manufacturer's website.

Thunderbolt version 4

released in 2020, 40 Gbps - Supports USB4

Port 3389

remote desktop (RDP) and remote assistance

For color laser printers, the writing process

repeats four times, one for each toner color of cyan, magenta, yellow, and black. Each color might require a separate image drum, although many color printers can use the same drum for all four colors. Then the paper passes to the fusing stage, where the fuser bonds all toner to the paper and aids in blending the four tones to form specific colors.

TCP: Step 3: Internet layer

responsible for getting the message to the destination computer or host on the local network, an intranet, or the Internet. An intranet is any private network that uses TCP/IP protocols. A large enterprise might support an intranet that is made up of several local net- works. The primary protocol used at the Internet layer is IP (Internet Protocol), which uses an IP address to identify each host. (Other Internet layer protocols include EIGRP, OSPF, BGP, and ICMP.) IP adds address information to the message and then passes it down to the Link layer.

o use Control Panel to print a test page in Windows

right-click the printer in the Devices and Printers window, and select Printer properties. On the General tab of the Properties dialog box, click Print Test Page.

A global address/global unicast address, can be

routed on the Internet. These addresses are similar to IPv4 public IP addresses. The first 48 bits of the address is the Global Routing Prefix. When an ISP assigns a global address to a customer, it's these 48 bits that are assigned. An organization that leases one Global Routing Prefix from its ISP can use it to generate many IPv6 global addresses. global address 48 bits - global routing prefix 16 bits - subnet id 64 bits - interface id

An anycast address is used by

routers and can identify multiple destinations; a message is delivered only to the closest destination.

Mbit/s an dGbit/s

same thing as Mbps and Gbps

Besides conserving public IP addresses, another advantage of NAT is

security; the router hides the entire private network behind this one address.

SMTP (Simple Mail Transfer Protocol) is used to

send an email message to its destination

A unicast address is used to

send messages to a single node on a network

Multimode cables are the more commonly used fiber opotic cable in

server rooms and when making network backbone connections between buildings in a campus. It transmits data approximately 600 meters.

Web server

serves up webpages to clients. Many corporations have their own web servers, which are available privately on the corporate network. Other web servers are public, accessible from any- where on the Internet

Windows uses the Server Message Block (SMB) protocol to

share files and printers on a network

all server room and wiring closet equipment—such as patch panels, punch blocks, and wiring racks

should be permanently grounded before use.

a thermal transfer printer uses a ribbon that contains Wax-based ink with thermal transfer printers, the heating element melts the ribbon (also called foil) onto

special thermal paper so it stays glued to the paper as the feed assembly moves it through the printer

File server/file share server

stores files and makes them available to other computers.

Broadcasting can cause a lot of network chatter, to reduce the chatter,

subnets are created to subdivide a netowrk into smaller networks so fewer devices receive and respond to broadcast messages

The proxy server

substitutes its own IP address for the request. It might also store, or cache, data that is used frequently by its clients.

HDMI Type-A

supports all HD modes; compatible with DVI-D connectors

Link local addresses are not allowed on

the Internet or allowed to travel outside private networks.

the TCP/IP application layer is equivalent to

the OSI model application, presentation, and session layers

the TCP/IP model internet layer is equivalent to

the OSI model network layer

The SMTP protocol is used to send email to a recipient's mail server, and

the POP3 or IMAP4 protocol is used by the client to receive email

The email server that takes care of sending email messages (using the SMTP protocol) is often referred to as

the SMTP server.

Cable modems and DSL modems usually sit beside

the SOHO router inside an office or data closet

the hardware and hardware protocols involve

the TCP/IP link layer and OSI data link layer and physical layer

Quality of Service (QoS)

the ability to control which applications' traffic have priority on the network. The feature must be enabled and configured on the router, enabled on the network adapters, and configured in Windows for every computer on the network that uses the high-priority applications.

Ports are usually assigned to a client or server app when

the app is first installed or configured later after the installation.

When TCP/IP receives a message to send to a destination computer, it first looks at

the beginning or left part of its own IP address that identifies the network (called the network ID) and compares it to the network ID of the destination IP address. the network ID of the host (192.168.1) matches the network ID of the destination (192.168.1); therefore, the two computers are on the same network. or, if the network ID (192.168.1) of the host does not match the network ID of the destination (9.125.18), the host sends the message to its default gateway, which sends the message to a different network.

TCP: Step 1: Application layer: When a browser client makes a request to a web server,

the browser passes the request to the OS. The OS formats the message using the appropriate application protocol (for example, HTTP, FTP, Telnet, DNS, and SSH). In our example, an HTTP message is created and passed down in the TCP/IP stack of protocols to the Transport layer.

whcih steps in the laser printing process use the printer components that undergo the most wear + some or all of these steps are done inside a removable cartridge that can be replaced as a single unit (older printers, all 4 steps are done inside one cartridge. newer, the steps are done inside the image drum cartridge).

the charging, exposing, developing, and cleaning steps

A fully qualified domain name (FQDN) includes

the computer name and the domain name.

By using multiple cartridges inside laser printers,

the cost of maintaining a printer is reduced. You can replace one cartridge without having to replace them all. The toner cartridge needs replacing the most often, followed by the image drum, the fuser cartridge, and the transfer assembly, in that order.

Configure an FTP server to use

the default port 21 or any port between 1 and 65535

DHCP server

the device can request an IP address from this server that assigns the address from a pool of addresses it maintains; this type of IP address is called a dynamic IP address

if I connect a displayport device to a mac with thunderbolt,

the device will work.

a tthunderbolt device can be connected to a mac with displayport,

the device won't work.

Laser process - charging and conditioning (step 2)

the drum is conditioned by a roller that places a high, uniform electrical charge of -600 V to -1000 V on the surface of the drum. The roller is called the primary charging roller or primary corona, and it is charged by a high-voltage power supply assembly. For some printers, a corona wire is used instead of the charging roller to charge the drum.

Laser printers produce

the highest quality, followed by inkjet printers.

The last 64 bits or four blocks of an IPv6 address identify

the interface and are called the interface ID or interface identifier. these bits uniquely identify an interface on the local network.

Part of the MAC address identi- fies

the manufacturer, who is responsible for making sure that no two network adapters have the same MAC address

the range of IP addresses assigned to a local network might be 192.168.80.1-100. The first three octets (192.168.80) identify

the network and the last octet (1 through 100) identifies each host. The last bits in each IP address that identify the host must be unique for each IP address on the network.

Every device on a network (for example, computers, printers, smart thermostats, refrigerators, and smartphones) connects to

the network by way of its NIC and its MAC address.

TCP: Step 4: Link layer

the physical network, including the hardware and its firmware for every device connected to the network. A computer's network interface card (NIC) is part of this physi- cal network. As you know, each NIC is able to communicate with other NICs on the local network using each NIC's MAC address. For a local network, the physical connection might be wireless (most likely using Wi-Fi) or wired (most likely using Ethernet). The NIC receives the message from IP, adds information for Ethernet or Wi-Fi transmission, and places the message on the network.

Other printer parts that might need replacing include

the pickup roller, which pushes a sheet of paper forward from the paper tray, and the separation pad (also called a separate pad), which keeps more than one sheet of paper from moving forward.

scrambled or garbled characters print on all or part of a page,

the problem may be caused by the document being printed, the application, connectivity between the computer and the printer, or the printer. Follow these steps to zero in on the problem: 1. First, cancel all print jobs in the print queue. Then try printing a different document from the same application. If the second document prints correctly, the problem is with the original document. 2. Try printing using a different application. If the problem is resolved, try repairing or reinstalling the application. 3. For a USB printer, the problem might be with a USB hub, port, or cable. Is the USB cable securely connected at both ends? If you are using a USB hub, remove the hub, connecting the printer directly to the computer. Try a different USB cable or USB port. 4. Recycle the printer by powering it down and back up or by pressing a Reset button. 5. Update the printer drivers. Go to the website of the printer manufacturer to find the latest drivers and follow the directions to install them. 6. If the problem is still not solved, the printer might need servicing. Does the printer need maintenance? Search the printer manufacturer's website for other solutions.

the LAN begins with

the router, which is also considered part of the ISP network. (A router stands between and is part of two or more networks.)

The speed of a network depends on

the speed of each device on the network and how well a router or switch manages that traffic. S

Destination IP address: 1100 0000 1010 1000 0010 1000 0001 1100 Subnet mask: 1111 1111 1111 1111 1111 1111 0000 0000 My IP address: 1100 0000 1010 1000 0010 1000 0001 0100

the subnet mask has 24 ones. Therefore, the computer compares the first 24 bits of the destination IP address to its own first 24 bits. If they match, it directs the message to the computer on its local network. If they don't match, it sends the message to its default gateway.

If the range of IP addresses varies in the last two octets,

the subnet mask is 255.255.0.0.

know that if your range of IP addresses varies only in the last octet,

the subnet mask is 255.255.255.0.

Usually, a subnet mask is displayed in decimal—for example

the subnet mask of 11111111.11111111.00000000.00000000 is 255.255.0.0 in decimal.

The developing cylinder is located inside

the toner cartridge.

Examples of domain names are the names that appear before the period in microsoft.com, cengage.com, and mycompany.com. The letters after the period are called

the top- level domain and tell you something about the domain.

if I see a displayport icon,

then it can be used with a monitor

if a thunderbolt icon is next to a mini displayport,

then it is meant to be used for data transfer to peripherals.

Inkjet printers are popular because

they are small and can print color inexpensively.

Multifunction SOHO Router Routers can range from small ones designed to manage a SOHO network that connects to an ISP (costing around $50 to $300) to

those that manage multiple networks and extensive traffic (costing several thousand dollars).

Thunderbolt is used for

transfers data at high rates to external storage devices or to displays (up to 6 devices can be daisy-chained, or wired together in a sequence).

QoS is sometimes imple- mented using VLAN technology

true

in dot matrix printers, occasionally you must replace the ribbon

true

When troubleshooting a modem,

try rebooting it first, and only use the reset button as a last resort.

Bubble-jet printers use

tubes of ink that have tiny resistors near the end of each tube. These resistors heat up and cause the ink to boil. Then a tiny air bubble of ionized ink (ink with an electrical charge) is ejected onto the paper. A typical bubble-jet print head has 64 or 128 tiny nozzles, all of which can fire a droplet simultaneously. (High-end printers can have as many as 3000 nozzles.) Plates carrying a magnetic charge direct the path of ink onto the paper to form shapes. Inkjet printers include one or more ink cartridges to hold the different colors of ink for the printer. A black cartridge is on the left, and the three color cartridges are cyan, yellow, and magenta. For this printer, a print head is built into each ink cartridge. A stepper motor moves the print head and ink cartridges across the paper using a carriage and belt to move the assembly and stabilizing bars to control the movement. A paper tray can hold a stack of paper, and a paper feeder on the back of the printer can hold a few sheets of paper. The sheets stand up in the feeder and are dispensed one at a time. Rollers pull a single sheet into the printer from the paper tray or paper feeder. A motor powers these rollers and times the sheet going through the printer in the increments needed to print the image. When the printer is not in use, the assemblage sits in the far-right position, which is called the home position or parked position. This position helps protect the ink in the cartridges from drying out.

To replace an inkjet cartridge,

turn on the printer and open the front cover. The printer releases the cartridges from their parked positions. You can then open the latch on top of the cartridge and remove it. Install the new cartridge as shown in the figure.

Email is a client/server application that involves

two mail servers, one to send the mail and another to deliver an email message to a client app

photos printed on an inkjet printer fade over time more than photos produced professionally. to make them last longer,

use high-quality photo paper (rated at high gloss or studio gloss) and use fade-resistant ink (such as Vivera ink by HP) then oprotect these photos from exposure to light,heat,humidity,and polluted air. to best protect photos made by an inkjet printer, keep them in a photo album rather than displayed and exposed to light

with thermal printers, to prolong the life of the print head

use the lowest heat setting for the heating element that still gives good printing results

Changing the router firmware login name and password is especially important if the router is a wireless router. Unless you have disabled or secured the wireless network, anyone within its range—even outside your building—can

use your wireless network. If someone guesses the default login in name and password to the router, they can change the password to hijack your router and access your wireless network, potentially using it for criminal activity.

Remote Desktop (RDP) and Remote Assistance

used by the Windows Remote Desktop and Remote Assistance utilities to connect to and control a remote computer.

HDMI Type-E

used in automobiles; has as locking tab

HDMI (High Definition Multimedia Interface)

used mainly for HD tv, carries video and audio signals.

Authentication, authorization, and accounting (AAA) server (pronounced triple-A server)

used to secure and control access to the net- work and its resources. Active Directory, which is a directory service included in Windows Server, is often used for these purposes on a Windows domain

FTP (File Transfer Protocol) server and the FTP protocol

used to transfer files between two computers on a network or the Internet. Web browsers can use the protocol, as can File Explorer in Windows. Third-party FTP client software are CuteFTP or FileZilla

An impact printer creates a printed page by

using some mechanism that touches or hits the paper, similar to a typewriter.

An example of using a proxy server is

when an ISP caches webpages to speed up requests for the same pages. After it caches a page and another browser requests the same content, the proxy server can provide the content that it has cached. In addition, a proxy server sometimes acts as a router to the Internet, a firewall to protect the network, a filter for email, and to restrict Internet access by employees to prevent them from violating company policies. When func- tioning in these ways to give easy access to the Internet, a proxy server is known as an Internet appliance.

what process was used by older fax machines?

when the older direct thermal printer burned dots onto specially coated paper called thermal paper, the process requires no ink and does not use a ribbon

a print bed on a 3d printer

where the filament is deposited to build the objects

Messages on a TCP/IP network might have different names depending on

which layer's protocols have added informa- tion to the message, either at the beginning of the message (called a header) or at the end (called a trailer)

Rather than using Windows tools to start a printer installation,

you can also start the installation using the setup program on the CD that came bundled with the printer or using the setup program downloaded from the printer manufacturer's website. Figure 10-16 shows one such window in the setup process for an HP printer. This method might provide more customized installation options.

A standard twisted pair patch cable

you would use to connect a computer to a switch or an RJ45 jack is wired for 568B on each end. That makes it a straight-through cable.

AAA servers perform the following tasks

● Authenticate users or computers to the network so they can access network resources and stores user or device credentials, such as user names and passwords. ■● Authorize what a user or computer can do after they have access, including the resources they can access and what they can do with these resources. ■● Account for what a user or computer did with the resources and the time they took. These logs can be useful when users and computers are billed for services they used.

To properly unbox a printer

● Remove the printer from the box, keeping it upright, and remove protective packing foam pieces. ● Place the printer on a flat, hard surface near an outlet. The printer needs room for air movement around it. ● Remove any protective tapes or film from the printer, including the control screen. ● Plug the power cord into the printer and the outlet. ● Press the power button on the printer, and allow it to turn on fully. ● Add paper to the paper tray. If needed, remove protective tape from ink cartridges. ● Configure settings for intended use.

IEEE recommends that the following IP addresses be used for private networks

●● 10.0.0.0 through 10.255.255.255 ●● 172.16.0.0 through 172.31.255.255 ●● 192.168.0.0 through 192.168.255.255

how IPv6 addresses are written and displayed

●● An IPv6 address has 128 bits that are written as eight blocks of hexadecimal numbers separated by colons, like this: 2001:0000:0B80:0000:0000:00D3:9C5A:00CC. ●● Each block is 16 bits. For example, the first block in the preceding address is 2001 in hex, which can be written as 0010 0000 0000 0001 in binary. ●● Leading zeroes in a four-character hex block can be eliminated. For example, the preceding IP address can be written as 2001:0000:B80:0000:0000:D3:9C5A:CC, where leading zeroes have been removed from three of the hex blocks. ●● If blocks contain all zeroes, they can be written as double colons (::). The preceding IP address can be writ- ten two ways: ■● 2001::B80:0000:0000:D3:9C5A:CC ■● 2001:0000:B80::D3:9C5A:CC To avoid confusion, only one set of double colons is used in an IPv6 address. In this example, the preferred method is the second one: 2001:0000:B80::D3:9C5A:CC because the address is written with the fewest zeroes.

A typical SOHO router usually combines these functions:

●● As a router, it stands between two networks—the ISP network and the local network—and routes traffic between the two networks. ●● As a switch, it manages several network ports that can be connected to wired devices on the local network or to a dedi- cated switch that provides even more ports for locally networked computers. Looking back at Figure 7-31, one LAN port connects to a switch, and another LAN port connects to a desktop computer. ●● As a DHCP server, it can provide IP addresses to computers and other devices on the local network. ●● As a wireless access point (WAP), it enables wireless devices to connect to the network. These wireless connections can be secured using wireless security features, which you learn about in the Core 2 module "Network Security and Troubleshooting." ●● As a firewall, it blocks unwanted traffic from the Internet and can restrict Internet access for local devices behind the firewall. Restrictions on local devices can apply to days of the week, time of day, keywords used, certain websites, and specific applications. ●● If an external storage device, such as a USB flash drive or external hard drive, connects to the router via the USB port, the router can be used to share files with network users.

For configuring most SOHO routers, you have some options:

●● For wireless connections. Download the router manufacturer's app to your smartphone or laptop. Then to connect to the router's wireless network, for a smartphone, open the Settings app, go the Wi-Fi setup and select the name of the router's wireless network, which is called the Service Set Identifier (SSID). It should be printed on the bottom of the router. Open the router app, which should step you through the router setup. ●● For wired connections. Use a network cable to connect a laptop or desktop computer to a LAN port on the router. Open a browser window. The browser should automatically connect to the webpage of the router (see Figure 7-35). If it does not connect, look in the router documentation for the URL of the router's webpage (for example, router.asus.com) or the IP address of the router (for example, 192.168.1.1.).

Regardless of how you connect to the SOHO router, the initial setup should:

●● Provide a username and password if needed to connect to your ISP ●● Assign a new SSID and password (security key) to the wireless network ●● Update the router firmware ●● Change the password for the router firmware ●● Configure the DHCP server embedded in the router firmware


संबंधित स्टडी सेट्स

PrepU Chapter 11 Critical Thinking

View Set

Injury Prevention and Management

View Set

Review Questions" and ch 8,9,10,11

View Set

Interpersonal Communications CH. 11

View Set

Managerial Accounting 2521 FINAL EXAM

View Set

Finance: Final (Chapter 5 Quizzes/Homework)

View Set

chapter two computer architecture part two

View Set

(-77-) Direct object pronouns (los pronombres-DOS): The correct use of me (me), te (you-object), nos (us) and los-a ustedes (you all)

View Set

11th Grade: The Gettysburg Address

View Set

Chapter 27 Multiple choice questions

View Set