Latoya Stoudmire
Forum Replies Created
-
AuthorPosts
-
Latoya StoudmireParticipant
Hello Trae,
I really like the description that you gave in your discussion. I felt it was very detailed seeing how it listed all of the standards with the dates times and reasons they were created. I was able to even learn a few things about different encryptions and a few versions of Wi-Fi standards that I overlooked. I also thought your encryption detail was very descriptive. Have you ever personally work with this type of software in a commercial setting?Latoya StoudmireParticipantThere are several different types of Wi-Fi standards. The first was introduced in 1997. In 1997 the IEEE (institute of electrical and electronic engineers) introduced IEEE 802.11. This standard speed was 2 Mbps. Shortly after the introduction of the IEEE 802.11 came the 802.11a the standard was used to assist with traffic interference with other devices on the frequency 2.4. 802.11a uses 5Ghz frequency. That same year 802.11b was developed but uses frequency 2.4Ghz. 802.11b is used in home settings and 802.11a is used in a commercial setting. In 2003 802.11g combined the features of 802.11a and 802.11b using frequency 2.4Ghz. 802.11n allowed for both 802.11a and 802.11b features to use frequencies 2.4Ghz and 5Ghz in 2009. In 2013 802.11ac standard operates on 5Ghz with a speed of 1.5 Gbps. 802.11n is the most commonly used standard in households today. The most advanced version is the 802.11ax this runs on Both 2.4Ghz and 5Ghz. This standard allows for 40% more traffic.
Asides from the Wi-Fi standards there are also Wi-Fi encryption standards. WEP, WPA, WPA2, and WPA3 are Wi-Fi security protocols that prevent unauthorized access and eavesdropping on wireless. WEP is Wired Equivalent Privacy, it was introduced in 1997 with the 802.11. A 64–128-bit encryption is used to keep information confidential. The WEP uses static keys for encryption. The WPA is also known as Wi-Fi Protected Access. This type of encryption uses packets and has a dynamic key. WPA uses 128-bit encryptions and TKIP (Temporal Key Integrity Protocol) to ensure the data is encrypted. WPA2 and WPA3 are each updated and improved versions of WPA. The most current and secure version is WPA3 which uses a 256-bit encryption.
Šlekytė, I., & Šlekytė, I. (2024, September 22). WEP, WPA, WPA2, and WPA3: Main differences | NordVPN. NordVPN. https://nordvpn.com/blog/wep-vs-wpa-vs-wpa2-vs-wpa3/
GeeksforGeeks. (2021, March 17). WiFi standards explained. GeeksforGeeks. https://www.geeksforgeeks.org/wi-fi-standards-explained/
Latoya StoudmireParticipantHello Jessica,
I like how detailed your discussion was in regards to the ways the RJ45 is used. I also like how you gave a detailed description of how the RJ 45 looks. I think its important to know how each connector looks especially the connectors most commonly used. I do have a question though. Is the HDMI considered a cable or a connector? I thought it was a cable but it seems as though I might be wrong.
Latoya StoudmireParticipantHello Branden,
I think network trouble shooting is often overlooked. I agree a lot of issues with printers can originate with network connections. As you said in your statement I notice this most with wireless printers. I believe most common issue with printers are jams. I also like how you gave multiple ways to troubleshoot the issue including hardware and software options.
Latoya StoudmireParticipantHello Jason,
This was very informative seeing how did not personally know that running multiple apps can cause your mobile device to overheat. Nor did I know that phones can overheat from too much sun exposure. I did however notice that when running multiple apps on my phone that it kills the battery a lot faster but I didn’t know that blue-tooth connections can also drain batteries. I also was unaware that Overcharging a battery can effect your battery life
Latoya StoudmireParticipantThere are several different ways to trouble shoot printers. The trouble shooting method used will always depend on the type of printer and the issue the printer is having. There are some common trouble shooting methods that are used for printers. An issue that most printers face is ink streaks. To trouble shoot this issue some practical options are to check the ink cartridge to ensure it is not too full or not full enough, ensure that the printer head is not clogged, and you have properly removed all protective shields from the ink cartridge.
A simple trouble shooting method often overlooked is changing the paper in the printer. If a printer is loaded with the incorrect type of paper required for the printer, it can cause the printer to malfunction. In some cases, the paper causes the printer to jam. To correct a printer with the wrong paper, you can find the correct paper size. If the printer did jam due to the incorrect paper, you will first need to remove the jammed sheet of paper. Removing the paper tray, locating the jammed sheet of paper, and removing it for the printer will typically clear the jam. In some cases, after removing the jam the printer will require a restart.
Latoya StoudmireParticipantThe most common type of cable connector is the RJ 45, This is also referred to as registered jack 45. The RJ 45 is primarily used to connect a device to a network. The RJ 45 connector is typically used with twisted pair cables, it has 8 pins of contact. This allows for four twisted wire pairs. Cables Cat5, Cat5e, Cat6, Cat6a, Cat7, and Cat7a cables use the same RJ45 connectors. Despite the RJ 45 having 8 pins and 8 wire contacts it also has a tab feature that helps secure the wires in place. (Smoot, 2022)
BNC connector is also called a Boayonet neill-concelman. This connector is used with coaxial cables. This is used in radio frequency. BNC connectors are also used heavily in video applications. The BNC connector provides a secure connection with high quality. Although the BNC connector is a valuable connector in securing high quality data in video surveillance the RJ 45 connector is used more commonly. (imops@saffronedge.com, 2024)
imops@saffronedge.com. (2024, July 5). Types of Cables and Connectors in Computer Networks. Network Drops. https://networkdrops.com/blog/different-types-of-cables-and-connectors-in-computer-network/
Smoot, J. (2022, June 2). RJ45 Connectors – What You Need to Know. Digi-Key Electronics. https://www.digikey.com/en/articles/rj45-connectors-what-you-need-to-know
Latoya StoudmireParticipantThere are several diverse types of mobile devices. Each mobile device must rectify any trouble shooting issues differently. Some mobile devices are laptops, cell phones, smart watches and more. When trouble shooting a device like a cell phone it is important to first identify the issue with, the device. If the device is having an issue connecting to a network, to trouble shoot the issue first check the device network setting. Ensure that the device is connecting to a network that is available. You also want to ensure the network credentials are correct when trying to access an internet connection.
Laptops are a mobile device that can use some of the same techniques for trouble shooting as a PC. Laptops and PC’s have some of the same hardware components such as a motherboard a Ram and other components. Similar to trouble shooting a PC, when trouble shooting a laptop, it is important to first identify the problem. When trouble shooting one of the first steps to take is checking the power source check. You do this by checking all the cables and battery connectivity are established. Another trouble shooting method is to ensure the laptop is running at its most current version. CPU overheating sometimes can be an issue for the laptop. To trouble shoot the CPU you can clean the CPU fan and heatsink with compressed air. (Knotts, 2024) There a numerous ways to trouble shoot a mobile device but each depends on the type of device and its issues
Latoya StoudmireParticipantWhen trouble shooting display devices you must consider if the device issue is with the hardware or software. Software and Hardware must be rectified differently. There are many potential software issues. Some software issues consist of trouble with overheating, flickering images, and artifacts. Hardware Issues can consist of multiple issues like loose cables, expansion cards not properly placed, or no power source.
When trouble shooting display hardware device issues the first step is to always check the power source. A power source such as a cable not being plugged in or an faulty outlet could be an issue that causes problems with display. Another issue is that a particular expansion card could not be compatible with the device. If an expansion card is not compatible with a PC PCI slot, then the PC could experience display issues. To trouble shoot this ensure that the expansion card is compatible with the PCI.
Issues a PC could experience with software display are flickering images. To trouble shoot a flickering image you should update your graphics drivers to ensure it is performing at its latest version. Another trouble shooting technique would be to try ending programs that could be affecting your graphics card.
Latoya StoudmireParticipantThere are many distinct types of input and output devices. Some of the input devices include Barcode readers, NFC readers, microphone, and a digitizer. All are important and play key roles in a computer’s ability to receive information. Some of the output devices are displays, printers and speakers. The output devices are also essential seeing how they allow the device to sed communication to the user.
An NFC, also known as near field communication reader, is an output device that is extremely popular with merchants and business owners. An NFC allows customers to make purchases with contactless payments. With NFC a customer can use their phone or card that has a magnetic chip and make payments to merchants. This is done by using Radio Frequency Identification. “RFID has been used in places for decades for things like scanning items in grocery stores and luggage on baggage claims and tagging cattle.” (Square, 2024).
Popular output devices are monitors, speakers, and printers. Each of these devices allows communication between the user and the device. This communication ranges from visual graphics that appear on the screen to the speakers used for audio calls or listening to music.
Latoya StoudmireParticipantPhysical storage is sometimes referred to as local storage. Physical storage includes hard disk drives, solid-state drives, and USB flash drives. Each of the physical storage drives plays a different role in storing data.
The hard disk drive works by allowing an arm to move rapidly on the disk reading and writing data in small sections called sectors. The sectors are then combined to create larger files. I hard drive can hold a range of information spanning from 500 GB to 10 TB.
Solid state drives also known as SSD can replace traditional HDD drives. One of the largest differences between HDD and SDD is that SDD is faster. SDD can load applications and save data at a fraction of the time it takes HDD. Instead of an arm SSD uses a flash controller to read, write and store data.
Another physical storage is USB Flash drives. Flash drives like SSD use a flash connector to read data yet, USB Flash drives are portable. The drive is plugged into the PC and a notification informs the user of the device. Once the user can access the device, they can then save new information or pull up stored information on the disk.
Latoya StoudmireParticipantThere is a wide array of expansion options. The options vary from memory, graphics, and networking. Expansion options are imperative to the functionality of the device, Expansions cards can be used to bring new capabilities to a device that will not be possible without the expansion capability.
A popular expansion card is a graphic card. The graphic card is also referred to as the video card or the graphics processing unit (GPU). The GPU is used to enhance the video experience. “It accelerates the graphics processing capabilities of your computer, enabling you to enjoy smooth and high-quality visuals in games, videos, and other graphic-intensive applications. The graphics card works with the central processing unit (CPU) to process and output visual data.” (What Is a Graphics Card? And Why Do I Need One? | Lenovo US, 2023). The GPU would be the most ideal for a gamer or someone needing high quality graphics.
Network cards are another popular expansion. Network cards are also known as network interface cards (NIC). The NIC assists with networking communication at higher speeds. Majority of PC’s include a NIC.The NIC can be viewed as the intermediary between a computer and a data network.
Latoya StoudmireParticipantHello Jason
I followed a lot of the same steps as yourself. I like that you started from the easiest thing to correct and branched out from there. The use of an ESD strap is often times overlooked but very useful in preventing a person from being electrocuted. I have never used the multimeter method but I have used the paper clip method. which do you find more effective?Latoya StoudmireParticipantHello Jessica great response. You have a great way of simplifying information. I think you did a great job explaining the motherboard features especially the bios and uefi. After reading your discussion I went back and researched the bios more.
Latoya StoudmireParticipantHello Jason I like how you used real life instances to better explain the troubleshooting process. I agree that both business and customers can face issues requiring them to trouble shoot. Each party may take different measures to resolve the issue but as you said all steps should be documented to prevent future issues.
-
AuthorPosts