SlideShare una empresa de Scribd logo
1 de 8
INSTALLATION OF WIRELESS
NIC
By George Smith-Moore
WHAT WILL BE INCLUDED?
I will show the installation process relating to a wireless NIC, PCI card.Testing the hardware and
showing potential problems.
INSTALLATION
 Assuming you have already prepped the area for
installation, theWi-Fi PCI card can be installed.
 If you are upgrading, I have included these steps as
well.
 To start, lift the cache up on the PC case to allow the
removal and installation of PCI/PCIe cards. (other case
models may have a different type of attachment)
INSTALLATION
 After the cache is lifted, the NIC can be pulled out, it may be a little tight, but you
must life the old PCI card put of the slot.
INSTALLATION
 Using the same method for
removal (just opposite) , push the
wireless NIC into the slot.
 You will know when the NIC is
properly inserted, as it will not
wobble much, and it will feel
secure (as well as look secure).
 Attach any cables to the NIC (if
needed), and fasten down the clip
this will prevent card movement
completely.
TESTING FOR FUNCTIONALITY
 Before you can test the hardware piece, you must first install the latest drivers,
this is to ensure all of the known bugs are gone.
 So after the software has been installed (UNIT 3), the testing can commence.
 One test is via the Device Manager, this is done by looking under the tab network
adapters, if theTP-LINK adapter is shown (without an exclamation mark next to
the image), then it has installed correctly.
 Another test is to see the signal bar via
the task bar.
 I have done several other tests, but I have
not shown pictures of them. A description
of the test is all on the next slide.
TESTING FOR FUNCTIONALITY
Test Number Test Description Expected Result Actual Result
1
Testing to see if the device
appears in the device
manager.
It would appear as the device
and the driver is successfully
installed
It appeared in the device
manager.
2
Testing to see if light at the
back of the wireless NIC is on.
The light would appear on the
wireless NIC.
It did appear on the wireless
NIC.
3
Ping the machine. I expected the machine to be
able to ping successfully
The machine pinged once
CMD was opened and the
command was entered.
4
Checking the internet
connection.
I expected a good internet
signal from the router.
The connection was not as
good as I had expected, this
could be due to distance from
the router.
5
Going into CMD and typing in
ipconfig/all.
Lists of information about the
network, for instance the ip
addresses, the subnet mask,
and the default gateway.
The correct information
appeared when the command
was entered.
PROBLEMS?
 Possible problems that come with installing hardware are:
 ESD, this is done by either not wearing anti-static equipment. Or by not un-plugging the
computer and power cycling it.This would lead to damage of the hardware piece or to
other parts.
It can be avoided by using anti-static equipment, taking care of the system, opening on
a clean work surface, and by unplugging and power cycling.
 Fitting an PCI card in an PCIe bay, or the other way around would not work, and would
cause damage to the component if you tried to do so.
Solution= don’t do it, check the specs beforehand.
 Overheating is a serious killer for computers, make sure your computer is well-
ventilated and has plenty of fans.

Más contenido relacionado

La actualidad más candente

What is bridge mode
What is bridge modeWhat is bridge mode
What is bridge modeLisaRay43
 
How to safely configure your home wireless network
How to safely configure your home wireless networkHow to safely configure your home wireless network
How to safely configure your home wireless networkBarry Caplin
 
St24 c10 specification-www.ttbvs.com
St24 c10 specification-www.ttbvs.comSt24 c10 specification-www.ttbvs.com
St24 c10 specification-www.ttbvs.comTTBVS
 
WiFi Hotspot-Wireless Router
WiFi Hotspot-Wireless RouterWiFi Hotspot-Wireless Router
WiFi Hotspot-Wireless RouterWispot
 
How to program an encoder with ubifast
How to program an encoder with ubifastHow to program an encoder with ubifast
How to program an encoder with ubifastMitchell Dost
 

La actualidad más candente (6)

What is bridge mode
What is bridge modeWhat is bridge mode
What is bridge mode
 
How to safely configure your home wireless network
How to safely configure your home wireless networkHow to safely configure your home wireless network
How to safely configure your home wireless network
 
St24 c10 specification-www.ttbvs.com
St24 c10 specification-www.ttbvs.comSt24 c10 specification-www.ttbvs.com
St24 c10 specification-www.ttbvs.com
 
WiFi Hotspot-Wireless Router
WiFi Hotspot-Wireless RouterWiFi Hotspot-Wireless Router
WiFi Hotspot-Wireless Router
 
WiFi SoC ESP8266
WiFi SoC ESP8266WiFi SoC ESP8266
WiFi SoC ESP8266
 
How to program an encoder with ubifast
How to program an encoder with ubifastHow to program an encoder with ubifast
How to program an encoder with ubifast
 

Similar a Installation of a selected piece of hardware

Networking and cabling.docx
Networking and cabling.docxNetworking and cabling.docx
Networking and cabling.docxcrookshank_1786
 
Installation and Testing of Hardware
Installation and Testing of HardwareInstallation and Testing of Hardware
Installation and Testing of HardwareAjay Jassi
 
Testing for wireless nic, helpful guide.
Testing for wireless nic, helpful guide.Testing for wireless nic, helpful guide.
Testing for wireless nic, helpful guide.OriginalGSM
 
La3 computer networks and communications
La3   computer networks and communicationsLa3   computer networks and communications
La3 computer networks and communicationsAzmiah Mahmud
 
Learning area 3_-_computer_networks_and_communications (1)
Learning area 3_-_computer_networks_and_communications (1)Learning area 3_-_computer_networks_and_communications (1)
Learning area 3_-_computer_networks_and_communications (1)Saktis Kesavan
 
Learning area 3 computer networks and communications
Learning area 3   computer networks and communicationsLearning area 3   computer networks and communications
Learning area 3 computer networks and communicationsShuren Lew
 
Module networks
Module networksModule networks
Module networksAyuMohamad
 
Learning area 3_-_computer_networks_and_communications
Learning area 3_-_computer_networks_and_communicationsLearning area 3_-_computer_networks_and_communications
Learning area 3_-_computer_networks_and_communicationsSaktis Kesavan
 
Installation and configuration of Wireless NIC
Installation and configuration of Wireless NICInstallation and configuration of Wireless NIC
Installation and configuration of Wireless NICAjay Jassi
 
2.1.1.5 Packet Tracer - Create a Simple Network Using Packet Tracer (3).pdf
2.1.1.5 Packet Tracer - Create a Simple  Network Using Packet Tracer (3).pdf2.1.1.5 Packet Tracer - Create a Simple  Network Using Packet Tracer (3).pdf
2.1.1.5 Packet Tracer - Create a Simple Network Using Packet Tracer (3).pdfHaseebAli795005
 
Manual CPE QUICK INSTALL GUIDE
Manual CPE QUICK INSTALL GUIDEManual CPE QUICK INSTALL GUIDE
Manual CPE QUICK INSTALL GUIDEturcao667
 
IT Essentials (Version 7.0) - ITE Final Exam Answers
IT Essentials (Version 7.0) - ITE Final Exam AnswersIT Essentials (Version 7.0) - ITE Final Exam Answers
IT Essentials (Version 7.0) - ITE Final Exam AnswersITExamAnswers.net
 
computer architecture lab manual
computer architecture lab manualcomputer architecture lab manual
computer architecture lab manualNeelamani Samal
 
Hardware and software installation (m2)
Hardware and software installation (m2)Hardware and software installation (m2)
Hardware and software installation (m2)Drew7Williams
 

Similar a Installation of a selected piece of hardware (20)

Networking and cabling.docx
Networking and cabling.docxNetworking and cabling.docx
Networking and cabling.docx
 
Installation and Testing of Hardware
Installation and Testing of HardwareInstallation and Testing of Hardware
Installation and Testing of Hardware
 
Testing for wireless nic, helpful guide.
Testing for wireless nic, helpful guide.Testing for wireless nic, helpful guide.
Testing for wireless nic, helpful guide.
 
La3 computer networks and communications
La3   computer networks and communicationsLa3   computer networks and communications
La3 computer networks and communications
 
Learning area 3_-_computer_networks_and_communications (1)
Learning area 3_-_computer_networks_and_communications (1)Learning area 3_-_computer_networks_and_communications (1)
Learning area 3_-_computer_networks_and_communications (1)
 
Learning area 3 computer networks and communications
Learning area 3   computer networks and communicationsLearning area 3   computer networks and communications
Learning area 3 computer networks and communications
 
Module networks
Module networksModule networks
Module networks
 
Learning area 3_-_computer_networks_and_communications
Learning area 3_-_computer_networks_and_communicationsLearning area 3_-_computer_networks_and_communications
Learning area 3_-_computer_networks_and_communications
 
Installation and configuration of Wireless NIC
Installation and configuration of Wireless NICInstallation and configuration of Wireless NIC
Installation and configuration of Wireless NIC
 
Unit 111 D1
Unit 111 D1 Unit 111 D1
Unit 111 D1
 
Teste multikombrasil
Teste multikombrasilTeste multikombrasil
Teste multikombrasil
 
ITE7_Chp2.pptx
ITE7_Chp2.pptxITE7_Chp2.pptx
ITE7_Chp2.pptx
 
2.1.1.5 Packet Tracer - Create a Simple Network Using Packet Tracer (3).pdf
2.1.1.5 Packet Tracer - Create a Simple  Network Using Packet Tracer (3).pdf2.1.1.5 Packet Tracer - Create a Simple  Network Using Packet Tracer (3).pdf
2.1.1.5 Packet Tracer - Create a Simple Network Using Packet Tracer (3).pdf
 
Manual CPE QUICK INSTALL GUIDE
Manual CPE QUICK INSTALL GUIDEManual CPE QUICK INSTALL GUIDE
Manual CPE QUICK INSTALL GUIDE
 
IT Essentials (Version 7.0) - ITE Final Exam Answers
IT Essentials (Version 7.0) - ITE Final Exam AnswersIT Essentials (Version 7.0) - ITE Final Exam Answers
IT Essentials (Version 7.0) - ITE Final Exam Answers
 
Caramerakitkomputer.ppt
Caramerakitkomputer.pptCaramerakitkomputer.ppt
Caramerakitkomputer.ppt
 
Caramerakitkomputer
CaramerakitkomputerCaramerakitkomputer
Caramerakitkomputer
 
computer architecture lab manual
computer architecture lab manualcomputer architecture lab manual
computer architecture lab manual
 
Hardware and software installation (m2)
Hardware and software installation (m2)Hardware and software installation (m2)
Hardware and software installation (m2)
 
Ccna 1 9
Ccna 1  9Ccna 1  9
Ccna 1 9
 

Más de OriginalGSM

Más de OriginalGSM (20)

UNIT 2 P8
UNIT 2 P8UNIT 2 P8
UNIT 2 P8
 
UNTI 2 P7
UNTI 2 P7UNTI 2 P7
UNTI 2 P7
 
UNIT 2 P6
UNIT 2 P6UNIT 2 P6
UNIT 2 P6
 
UNIT 2 P6 part 2
UNIT 2 P6 part 2UNIT 2 P6 part 2
UNIT 2 P6 part 2
 
UNIT 2 P5
UNIT 2 P5UNIT 2 P5
UNIT 2 P5
 
UNIT 2 P5 part 2
UNIT 2 P5 part 2UNIT 2 P5 part 2
UNIT 2 P5 part 2
 
UNIT 2 P4 and m2
UNIT 2 P4 and m2UNIT 2 P4 and m2
UNIT 2 P4 and m2
 
UNIT 2 P3 and d1
UNIT 2 P3 and d1UNIT 2 P3 and d1
UNIT 2 P3 and d1
 
UNIT 2 P2
UNIT 2 P2UNIT 2 P2
UNIT 2 P2
 
UNIT 2 P1
UNIT 2 P1UNIT 2 P1
UNIT 2 P1
 
UNIT 2 M3 and d2 v2
UNIT 2 M3 and d2 v2UNIT 2 M3 and d2 v2
UNIT 2 M3 and d2 v2
 
UNIT 2 M1
UNIT 2 M1UNIT 2 M1
UNIT 2 M1
 
ICT BTEC UNIT 2 P4 and M2
ICT BTEC UNIT 2 P4 and M2ICT BTEC UNIT 2 P4 and M2
ICT BTEC UNIT 2 P4 and M2
 
ICT BTEC UNIT 2 P3 and D1
ICT BTEC UNIT 2 P3 and D1ICT BTEC UNIT 2 P3 and D1
ICT BTEC UNIT 2 P3 and D1
 
ICT BTEC UNIT 2 P2
ICT BTEC UNIT 2 P2ICT BTEC UNIT 2 P2
ICT BTEC UNIT 2 P2
 
ICT BTEC UNIT 2 P1
ICT BTEC UNIT 2 P1ICT BTEC UNIT 2 P1
ICT BTEC UNIT 2 P1
 
ICT BTEC UNIT 2 M1
ICT BTEC UNIT 2 M1ICT BTEC UNIT 2 M1
ICT BTEC UNIT 2 M1
 
Security plan
Security planSecurity plan
Security plan
 
Managing i.t security
Managing i.t securityManaging i.t security
Managing i.t security
 
Impact of i.t system breaches
Impact of i.t system breachesImpact of i.t system breaches
Impact of i.t system breaches
 

Último

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 

Último (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

Installation of a selected piece of hardware

  • 1. INSTALLATION OF WIRELESS NIC By George Smith-Moore
  • 2. WHAT WILL BE INCLUDED? I will show the installation process relating to a wireless NIC, PCI card.Testing the hardware and showing potential problems.
  • 3. INSTALLATION  Assuming you have already prepped the area for installation, theWi-Fi PCI card can be installed.  If you are upgrading, I have included these steps as well.  To start, lift the cache up on the PC case to allow the removal and installation of PCI/PCIe cards. (other case models may have a different type of attachment)
  • 4. INSTALLATION  After the cache is lifted, the NIC can be pulled out, it may be a little tight, but you must life the old PCI card put of the slot.
  • 5. INSTALLATION  Using the same method for removal (just opposite) , push the wireless NIC into the slot.  You will know when the NIC is properly inserted, as it will not wobble much, and it will feel secure (as well as look secure).  Attach any cables to the NIC (if needed), and fasten down the clip this will prevent card movement completely.
  • 6. TESTING FOR FUNCTIONALITY  Before you can test the hardware piece, you must first install the latest drivers, this is to ensure all of the known bugs are gone.  So after the software has been installed (UNIT 3), the testing can commence.  One test is via the Device Manager, this is done by looking under the tab network adapters, if theTP-LINK adapter is shown (without an exclamation mark next to the image), then it has installed correctly.  Another test is to see the signal bar via the task bar.  I have done several other tests, but I have not shown pictures of them. A description of the test is all on the next slide.
  • 7. TESTING FOR FUNCTIONALITY Test Number Test Description Expected Result Actual Result 1 Testing to see if the device appears in the device manager. It would appear as the device and the driver is successfully installed It appeared in the device manager. 2 Testing to see if light at the back of the wireless NIC is on. The light would appear on the wireless NIC. It did appear on the wireless NIC. 3 Ping the machine. I expected the machine to be able to ping successfully The machine pinged once CMD was opened and the command was entered. 4 Checking the internet connection. I expected a good internet signal from the router. The connection was not as good as I had expected, this could be due to distance from the router. 5 Going into CMD and typing in ipconfig/all. Lists of information about the network, for instance the ip addresses, the subnet mask, and the default gateway. The correct information appeared when the command was entered.
  • 8. PROBLEMS?  Possible problems that come with installing hardware are:  ESD, this is done by either not wearing anti-static equipment. Or by not un-plugging the computer and power cycling it.This would lead to damage of the hardware piece or to other parts. It can be avoided by using anti-static equipment, taking care of the system, opening on a clean work surface, and by unplugging and power cycling.  Fitting an PCI card in an PCIe bay, or the other way around would not work, and would cause damage to the component if you tried to do so. Solution= don’t do it, check the specs beforehand.  Overheating is a serious killer for computers, make sure your computer is well- ventilated and has plenty of fans.