Install peripherals to a network

Planning the placement of printers

Instruction and installation manuals

General requirements for peripherals

Connecting to the network

Physical network connections

Physical connections to a host computer

Wireless connections

Adding upgrades

Summary

Check your understanding

Planning the placement of printers

What should you consider when locating a peripheral? This reading looks at the occupational, health and safety requirements you should follow, from opening the box to placing the device, and the repercussions on users in the workplace.

The first computers needed a special environment and power supply to function. Today, most components function in a normal office environment. They don’t need special air conditioning or clean power supplies, although these will always allow them to work at their best. In the 1970s, mainframe computers were often placed behind locked doors and only a privileged few allowed access. Even today, because of security concerns, you may find some network devices are stored in a restricted area.

Instruction and installation manuals

When purchasing a new peripheral, you need to read the instruction manual before unpacking it; the manual will usually display a diagram and describe how you should unpack it without damaging components. Any components that might shift during transit are often protected by a polystyrene shield or cardboard and are taped down. Sometimes this cover protection can be hidden underneath or be quite small and not easily seen. For some peripherals it may be necessary to wear protective clothing, such as gloves when opening monitor boxes so if fingers accidentally touch the screen, no finger marks are left. Pressure by fingertips on LDC monitors, for instance, can damage the screen.

The instruction manual will detail how to unpack the peripheral and check all components first. If there is any damage to any component or any are missing, then this is the time to contact the vendor for a replacement.

General requirements for peripherals

There are many different types of peripherals and each has its own operational requirements. These will normally be fully documented in an installation manual, which should be carefully read before you plan the location. The following points then need to be considered:

  • the space available and minimum area required for the device
  • power supply requirements
  • ease of access for users (including, for instance, the space around a printer)
  • ease of access for installation and maintenance
  • access to the closest LAN point
  • physical security of the device (such as number key on the door or a locked door)
  • sturdy, level surface
  • well-ventilated room
  • no exposure to direct sunlight or chemicals, including ammonia-based cleaning solutions
  • stable environment with no abrupt temperature or humidity changes.

Other occupational health and safety issues to be considered when deciding on where to place peripherals can include:

  • the noise level of the peripheral and if it affects users
  • floor loading, for extremely heavy devices
  • cables kept away from walking areas.

Placing printers in a particular location

Various peripherals, according to the equipment and the consumables they use, can require specific conditions. For example, printers often jam if they are over-used and become too hot, or the paper is too dry. Some specific requirements to consider when placing printers include:

  • a relative humidity level from 20% – 80%
  • a steady room temperature of 10° – 32.5° C.

Reflection activity

Look around in an environment to which you have access to computers and peripheral equipment. This could be in your own home, at a learning place, such as TAFE, or in a workplace where you are employed or have access. Consider answers to the following questions.

  • Are the peripherals located in the best place to address user needs?
  • Are occupational, health and safety issues addressed for the user?
  • Is the peripheral placed where it can be easily maintained and kept in peak condition?

Connecting to the network

Now we’ll look at connecting peripherals either to a host computer or directly on the network, and via wireless connection. We’ll also consider the performance levels of the different connection types.

Some peripherals can only connect by a network cable and protocols. Others may only connect to a computer or other host device such as a print server. Yet others will allow you a choice of connection methods. For example, network attached storage (NAS) devices will connect to the network cable. Scanners will normally require connection to a computer, and printers will usually give you a choice.

In most cases, peripherals attached to a host computer on a network slow the performance of the computer when the peripheral is being activated over the network. In a stand-alone environment, there may be no other choice. But in a network environment, the host computer that connects the peripheral to the network should not be operated heavily as a workstation.

Peripherals such as speakers are only connected to the local host computer and cannot be used over the network. Speakers use little resources but peripherals that heavily use resources should be turned off if other peripherals such as a printer are being used over the network.

Web cams used for individual staff attending interstate meetings require a good amount of bandwidth. They also use a lot of the computer’s processing power and should only be fixed to computers that are not used as a network resource for other peripherals.

Physical network connections

The most common network standard in use today is Ethernet. The IEEE (Institute of Electrical and Electronic Engineers) sets Ethernet standards for the physical devices and the protocols. It is a medium that consists of coaxial copper cable, twisted pair or fibre optic cable, on which electronic signals travel and to which computer devices are attached.

The Ethernet protocol sets the rules for constructing frames that are transferred around the network. Frames are short messages that hold information, and include the destination and source address of each computer.

Most organisational networks are now running at a speed of 100Mbps using CAT5 UTP (unshielded twisted pair) cables. However, a CAT6 cable can transfer data at 1000Mbps, and is used in some larger organisations. A new standard IEEE 802.3ak™-2004 will transfer data at 10Gbs.

A peripheral will normally connect directly to a hub or switch, or into a wall connection that is wired as part of the network.

Figure 1: Connecting with RJ-45 connection

Physical connections to a host computer

A peripheral can be connected to a host device such as a computer or print server. As mentioned above, if the peripheral is heavily used over the network, then the workstation’s performance is reduced. For example, if it is a printer, the user will find the computer runs more slowly as others print documents over the network. In cases where the peripheral is used constantly, it is best not to use the computer as a workstation.

As with connections directly to the network, Universal Serial Bus (USB) is becoming very popular. USB uses plug and play technology and reduces the configuration time, as it is usually not necessary to adjust configurations. There is no need to reboot the computer each time a new device is added.


Figure 2: Parallel cable /
Figure 3: Serial cable

Figure 4: USB /
Figure 5: Firewire

Figure 6: SCSI

Wireless connections

Wireless connection is becoming very popular in home and office technology. It eliminates the ‘spaghetti trap’, where cables entwine and it creates an uncluttered environment. However, wireless network communication can be slower, and insecure, leaving data more easily open to hackers.

Cordless peripherals are now available at affordable prices for most users. They include keyboards, mice, game pads, joysticks and pointing devices to interact with host devices. Host devices are not only computers but can be home appliances, game machines and televisions. The peripheral requires battery power to operate, and are more easily accessible to potential thieves.

Cordless peripherals are usually controlled by a short-range communication method such as the infrared standard IrDA (Infra-red Data Association) that sets the standards for both the physical devices and the protocols they use to communicate. IrDA requires line-of-sight access between devices for data transfer.

New developments in other short distance communication such as Bluetooth technology, which use radio frequency to communicate, have proved to be more efficient and faster than IrDA. IrDA and Bluetooth are not network technologies, but simply different methods of connecting.

LAN wireless communication requires a wireless router and a transmitter connected to each device that is connected to the network. These are becoming more economical. The main problem is their lack of security.

Wireless LANs use the standard 802.11. One type of wireless LAN can transfer data at 11Mbps and another at 54 Mbps. But if interference is detected or the radio signal is weak, the transfer rate is reduced.

Configuring a wireless network

There are two methods of configuring a wireless network:

1Infrastructure

2Ad Hoc.

In the Infrastructure mode, the wireless LAN connects to an access point that covers a fixed area using an antenna. The wireless access point converts the data into wired Ethernet data, acting as a bridge between the wired LAN and wireless clients. Access points connect to a wired Ethernet backbone and extend the wireless network coverage. For example, as a mobile user moves out of range of one access point, they move into the range of another.

Ad Hoc wireless networks are similar to a peer-to-peer workgroup where computers communicate with other computers, and there is no structure or fixed point. The computer devices need to be within range of each other and it is cheaper and easier to set up than the Infrastructure mode.

Reflection activity

Look around in an environment to which you have access to computers and peripheral equipment. This could be in your own home, at a learning place such as TAFE, or in a workplace where you are employed or have access. Consider answers to the following questions.

  • What peripherals are connected to computers, and is the computer a standalone device or part of a network?
  • What cables are used for connecting the device, or is wireless technology being used?
  • Are there other options to use another type of connection to improve efficiency?

Adding upgrades

Peripherals range from basic inexpensive models to more expensive models with extra options, high speeds and high quality output.

Some peripherals can help lift organisational efficiency by simply incorporating an extra device on the peripheral — a much cheaper option to buying a new peripheral.

Not all peripherals can be upgraded, but many can be expanded. For example, network attached storage devices can usually take additional disk drives to increase capacity. Scanners may be able to take a film or transparency holder so photographs can be scanned. Printers can have more memory or extra sheet handling features added.

Some upgrades may be incorporated at the time of purchase while others are added on after the user has had the device for some time.

Typical upgrades for the some larger printers include:

  • duplex units for two-sided printing
  • envelope feeders
  • more memory
  • extra input trays and output stackers
  • cabinets and stands.

Reflection activity

Look around in an environment to which you have access to computers and peripheral equipment. This could be in your own home, at a learning place such as TAFE, or in a workplace where you are employed or have access. Consider answers to the following questions.

  • List any components of the peripherals that have been upgraded or enhanced. How has this improved the workflow or efficiency of the environment?
  • What peripherals can be upgraded or enhanced? If you did upgrade or enhance the peripheral, will this improve the workflow and efficiency?

Summary

Peripherals are an important part of any personal computer or network system. Today, many peripherals have their own memory and processor systems and should be handled with care, following vendor guidelines. General occupational health and safety issues also need to be followed to ensure they are moved without being damaged, or without causing any harm to the person moving the equipment or other people.

There are now options for how you can connect peripherals — although wireless connection is increasingly popular, it has the disadvantage of being insecure.

Peripherals in any organisation need to be reviewed regularly to ensure that they provide the best service and quality. Technology is continually being improved, and in some cases it may be more efficient to replace a peripheral rather than have it upgraded.

Check your progress

Now you should try the Practice activities in this topic. If you have already tried them, to them again to see if you can improve your responses.

When you feel you are ready, try the ‘Check your understanding’ activity in the Preview section of this topic. This will help you decide if you are ready for assessment.

Reading: Install peripherals to a network1

2005