Friday, June 10, 2011

Tips and Tricks When The Computer Suddenly Not Working

You see!!! Some times our computer suddenly just not function, error, blue screen, hang, they just can load OS such a windows, linux or even Mac, they just can appear on the monitor. If you ever hear or probably thats happen to your computers, don't be panic, just read this tips from Inside The Computers belows.

Some times what makes that happen is because dirty. We are too lazy to clean our computers, so dust every where.

first, try to clean every elements inside the computers, such as Dimm (SDRam, DDram, RDRam) depend whats in your computer, soundcard (if not onboard), VGACard, and processor (becareful when you loose them) place them on save places. second try to brush them with alcohol (60-70%) using toothbrush (smooth). Third, let them dry. and then when you are sure they already dry, then you put them back again to their place. after that, you can try to turn on your computers. Mostly this is work if there is no physically broken.

Tuesday, June 7, 2011

CAN YOU FIX YOUR OWN HARD DRIVE? I CAN!

That's the question that my friend always ask to me, and I think it's time for me to show that I can fix my own hard drive too, of course I only fix a bad sector or the modules only, not physically such as a motor or the disc it self.
If we have a bad sector hard drive, we still can used it. how ? if we have software (freeware software) mhdd (you can download it at http://www.mhdd.com/).
1. we must boot from DOS (we can have it on cd win98 setup)
2. after we have C:> then we type mhdd (C:> mhhdd) and then press enter
3. after we allready inside mhdd we detect the hard drive first by pressing F2, than we check it by pressing F4. while checking we can see through where the broken drive or bad sector.
4. if we know where the position of bad sector is, we just type erase (still on mhhd) we just have to fill where we want to start to erasing then fill where we have to stop erasing.
5. after this step done, we go back check that drive by pressing F4 and then F4. If our hard drive not physically damage, I'm sure that hard drive allready fix it.

Note :
if we have any important's document on hard drive that we want to repair, we have to back up them first, because if doesn't they will lost for good. I think that's all for now from Inside The Computers, because I've been thinking how to go more further and further but I stuck in this place.

Thursday, June 2, 2011

Clean The Computers Frequently

Yesterday suddenly the PC on the office is Error, the PC wont display to the monitor and there is beep sound when I turn on the PC. What they worry about is not the PC but the data inside it. I do understand how much valuable the data for the office, for the factory. So, they call me to repair the PC at the office.

After I open the computer case and clean all the board and everything inside the PC case, including VGA Card, Sound Card, LAN Card using a brush, wait for few minutes and install all the hardware that I removed before properly to the board then I turn the PC on.

The result is, the PC is now cured, the PC is now display to the monitor again, in other words there is no problem with the PC now. So, what is the problem that make the PC wont display and have a beep sound? Sometimes we only use the computer without take care of it. We don't clean it frequently, we doesn't know if the dust is can make rust and do a damage to the PC. So, Inside The Computers will give you an advise, why don't we Clean The Computers Frequently from the dust.

Tuesday, May 31, 2011

Using Norton Ghost Symantec is more Efficient

Sometimes when I do have a job to installed more than two computers, I really need take much times to do it, so I looking for the solutions so I can do the job more efficient without has to wasting so many times. So I learn how to make an image by using Norton Ghost by Symantec and I can do the installation is more faster then before. Inside The Computers now only give an information about it, not to show how to do it, but later I will do it just for you.

I just create an image and installed the chipset and the drivers to the images and the rest of the process is I use the Norton Ghost is to cloning all inside that image to the other hard drive that I want to installed. Just add view driver and chipset, the result is exactly as the Windows installation.  

But not every computers we can do a cloning using Norton Ghost, because we don't have the chipset yet, but still when we install the windows using a normal way compare with do a cloning using Norton Ghost, I prefer do a cloning, because is more faster and save time a lot.

Monday, May 30, 2011

Activated The Firewall on your Windows

Sometimes we underestimated the Firewall function. Ah, I already install the anti virus, so why should I have to activated the firewall, it will make my computer will work more and slow it down. That kind of thinking is wrong, absolutely wrong, and Inside the Computers will try to explain carefully.

The Firewall is has a function to monitoring all the file which comes to your computer, also the data which comes from your computers to the other outside media such as flash drive, external hard drive, etc. and if there is any suspicious file in the computers, the firewall will told you immediately.

and to activated the firewall is very easy and simple. I know you all know how to activated the Firewall. at least if we have active firewall, the computers will give us the signal if there is any dangerous file in our computers.

Okay, probably I can do more posting tomorrow, because the limit of my internet bandwidth is zero, so I can do much with it, but I will return with the next post still with Inside The Computers.

Sunday, May 29, 2011

Why we need to protect our Computers?

Why we need to protect the computers? that's the question always questioning by my student. for some people maybe they computers is no need to protect, because they use the computer alone, nobody use the PC but themselves. But, how about if the computers is use by another person, or we can said the public computers, there must be any different kind of person who use the computers, some people understand how to use computers properly and some people don't (pure users).

If we meet this situation, I believe the computers really need to protect, but how? the effective way is we create few user log in and set it as limited access, so they can't change the setting of the computers without administrator permission. We can also password the PC, and if they are don't know the password, they can access the computer.

Probably this is only few solution from the thousand of solution if we want to protect the computers from physically damage, mostly the data damage. this is Inside The Computers who always give the best solution for our computers.

Friday, May 27, 2011

Update The Anti Virus!

For some people, they think when they already install the Anti Virus, any anti virus, they think the Computer (PC) already protected from the Virus. That's really big mistake if we think that way. Every Anti virus has the updater and we have to update the anti virus every period, once a month, two weeks a time, or twice a months, that's up to you, the important thing is to keep our computer clean we have to update the anti virus.

Inside The Computers often see the users think they PC is already protected because they already installed the anti virus, but they don't know if the anti virus is need to be update, and that's what make the PC is contaminated by the virus. once again Update the Anti Virus!

Thursday, May 26, 2011

Privation Setting, Password Protection is Another Preventing Action to keep the PC save

Another preventing action that we can do is with setting the privation and Password Protection, and Inside The Computers will continue this post deeper with How to make our PC save.
Privation Setting
Now your drive already change to NTFS, so there is so many security option available for your computer, mostly which connected to the sharing file. If your PC have more than one user, so you can control the access to the file and folder. For example, few users maybe has full control to an item, mean while the others read only. On the Windows XP Professional, you have to turn off Simple File Sharing before use it. On My Computer, click Tools, Folder Options and select Tab View. Under the Advanced Setting, scroll and remove the mark (√) on “Use simple file sharing (Recommended).

To arrange the permission, right click file or folder, select Properties and select Tab Security. We can see all the PC user there, together with an option that possibility to arrange a level access such as Full Control, Modify, Read and Write. If we use Windows XP Home Edition, this feature is not available. Reboot the PC to the Safe Mode and log in as administrator. From that mode you can access security setting.

Password Protection
Each users on your system has they own profile which contain they private information. For example, we know there is a cookies, favorite and the desktop setting. This profile is on the C:\Documents and Setting\USERNAME and can be access by everyone except if they made it private. Right click that folder, select Properties, select tab Sharing and give the (√) mark in the box “Make this folder private”. If the user has no password, so a prompt will shown and ask you to create it. From that moment, the user password will be need to access the folder. Password also can be use for compression folder with zip Windows XP. Double click to open the compression folder and click the file, add a password. Enter the password, than enter once again to confirm the password and click OK to finish it.

Wednesday, May 25, 2011

Keep PC (Computers) Save and Free from Virus

keep your computer save

Keep the computers and the data save, preventing is better than fixing and we will see how the preventing is need be done. Only Inside The Computers will always provide you the information about computers and all connected to it.

If there is something to your PC, hardware is easy to replace. Unfortunately, it’s not that simple to replace all the data and information inside your computer. Can you imagine all the document, MP3 files, bookmark sites that stores on your computers, those thing which money cannot buy. It’s only need a very short time to lose all the hard work you’ve done, so, this is the right time to pay attention on the privation and security on your computers.

The most dangerous threat is comes from the internet and we really need to focus on this problem. But we cannot forget the other problems, so we can keep our computer save.

Tuesday, May 24, 2011

Continue with How to Start Filtering and Learn Carefully

continue with Inside The Computers, still with How to Start Filtering and of course Learn Carefully. Inside the NAT table, you can modifying the source and destination address or port from packages which in or out. The benefit from this facility is to hide IP address or we can call with IP masquerading. The hidden of the IP address become another knowing shape is the basic security system. Not everyone can know the real IP address. NAT table has three chain which is PREROUTING, POSTROUTING, and OUTPUT.



The third table is Mangle which will make the packages marking one by one. The destination of that marking is the tables has they own characteristic, so the package can be proceed to the next step according to the policy.

Mangle table has the ability to use all the chain in IPTables such as INPUT, OUTPUT, PREROUTING, etc. by using this table, we can do a lot of thing such as doting routing changing as you want, or you give a special treatment to one of the package or more or we use to know as QoS, etc.

Learn Carefully
IPTables is hard and too complex to understand. You need times to learn it, and this article only introduce you not to master it. IPTables is the solution for sophisticated firewall but cheap. You do not need to buy an expensive peripherals for firewall if you want to use a simple connection. IPTables can do it for you.
What you need is to learn it more so you can use it. Learn the command and the syntax carefully, so if you already know IPTables, use it.

Monday, May 23, 2011

How to start filtering?

IPTables is divided the package traffic using three kinds of tables. Every table has few chains. The three important table is a Filter table, NAT table and Mangle table, and let us continue with more detail only at Inside the Computers.

Filter table is the table contains chain and rules which has function to do in or out package filtering. NAT table has function as a table at modified or doing in or out package translate peripherals. The modified is to change the addressing and communication ports inside the package, becoming a form known by the peripherals inside or outside. Examples is NAT/PAP dan IP masquerading.

The third table is mangle table which has function to do modified packaging data, but the function is more to the marking to the package. This modification happen at the field level from IP protocol such as type of service, etc.

Inside the filter table there is three chain which will service package filtering data, which is INPUT, OUTPUT and FORWARDING. Why we write it with capital letter, because that’s the way we write in the process of making of filter.

Chain INPUT is useful to do the filtering to data package. OUTPUT is chain which connect to all the out package. Chain FORWARD is the most effective, it will make our computers become a router. All this chain is doing all filtering data package which in to the machine but not for those machine itself, but it will through to the other peripherals. From those three chain we can make a filtering system as we need.

Sunday, May 22, 2011

Continue with How to Install IPTables on Linux

Continue with How to Install IPTables on Linux and still with Inside the Computers, we will continue this post until the rest of this post will end.


We need to install those modules if we use the facility. For example, we don’t need PCMCIA if we use a server to create this IPTables. You can see more information in the directory /usr/src/linux/Documentation/Changes in every your Linux machine.
After all the modules installed properly, do not forget to do the back up to our kernel before we do the modification on it. This step or level is very important because if we has a problem to a modified kernel, we won’t be loose the past kernel because we already back up it. The configuration on LILO or GRUB also we back up to, just in case if there is booting problem to a new kernel.
After all those step is done, we are ready to do the kernel compiling to activate the IPTables facility on the Net filter module. Make sure that we already in the directory /usr/src/linux, or wherever you put the kernel source. We also login as root to the computer that we want do the modification to the kernel. Follow all the instruction on README file on the directory our source kernel until you has the “Make” command.
You can also use the command “make config” or make menuconfig or make xconfig to entering the main menu from kernel arrangement. The safest way to use is make menuconfig or make xconfig, because it can make us to do the kernel modification faster. Because every PC or server is different, so what we need to see in the kernel modification is that we have to activated the network cards, SCSI peripherals, and other peripherals which connected to the network.
After entering inside the arrange menu, activated Net filter facilities and IPTables support by select Networking Options menu, then give * mark on the Network Packet Filtering Menu (Replaces Ipchains). There will be more options appear, then select IP option: Netfilter Configuration. After we go to the inside it, select the IP tables support option (required for filtering/masq/NAT).
Activated this facility by give this symbol ( * ) mark in this option. For other facility, if we are not sure we can make it function as modules only, not installed in to the active kernel. But when some time we want to use it, we don’t have to re-compile this kernel.
Now the arrangement is enough to activated the IPTables facilities. Save the kernel configuration and exit to the prompt page. Then use the make bzImage, make modules, make module install command. Once again, make sure the old kernel configuration is save and list on the scrip boot loader. Then we can reboot the computer and we get the new kernel.
The next step is installing IPTables program which you can download it on the internet. And the installation of this program is very easy and simple, then after we complete all those step, we can use IPTables facilities now.

Saturday, May 21, 2011

HOW TO INSTALL IPTABLES ON LINUX?

The questions how to install IPTables on Linux will explain here by Inside The Computers, and here we are with the explanations.
IPTables is easy to install in your Linux machine. There is two components that you have to pay attention in providing IPTables facility on your computer. First you have to see and know, are this facility ready or not in operating system you used. Or in other words, is there any kernel module to activate this facility? Kernel configuration is one of the important points that you have to check first.

To run this IPTables facility which is so sophisticated and complete, you need at least a linux kernel version 2.4.x or more. Because inside those kernels already been ready, and we just activated it. This kernel version is the absolute thing that we have to pay attention. If the version below 2.4.x, there is might be that IPTables can be run but that not recommended.

IPTables module in kernel, is part of framework Net filter in kernel 2.4.x. This module can give you the ability of filtering and manage from in or out IP packet. Don’t be fool by the abbreviations or acronym the Net filter with IPTables itself. So many of us assume that Net filter is the same with IPTables, but the fact is Net filter is a group of script and programming modules in the kernel level and forming a system. Later this system will do the task around the inside and out packet from and to the network. Those modules inside the Net filter can do so many things to that packet.

Drop it, change the direction, make them in the lineup, or just let them pass. All of those thing can be done by Net filter including the modules. One if that module is IPTables.

In the installation process and activate the IPTables facility, we need other supporting modules that also installed to our computer. Those modules has minimum limited version which can cooperate with IPTables. The supporting modules and minimum version which can activated the IPTables is;
•    GNU C 2.91.66
•    GNU Make 3.77
•    Binutils 2.9.1.0.25
•    Util-linux 2.10o
•    E2fsprogs 1.19
•    Reiserfsporgs 3.x.0b
•    Pcmcia-cs 3.1.21
•    PPP 2.4.0
•    Isdn4k-utils 3.1 pre1
we will continue this post tomorrow with the same topics but full with the pictures (The step of installation)

Friday, May 20, 2011

SOPHISTICATED IPTABLES FIREWALL ON LINUX

IPTables Firewall

Data Filtering traffic process using IPTables or other firewall need enough knowledge in the data communication process in TCP/IP protocol, Inside The Computers will told you a little information about IPTables Firewall on Linux.

IPtables is not a firewall which easy to understand and mastering. But when you already know what inside it, believe me, that IPTables will be very helpful to us to protect our computers and networking. Probably that’s the summary that we can see from the free sophisticated facility. You can’t mastering it only in 24 hours or 36 hours. You have to keep try and learn about what is the benefit and the advantage of this facility. And you also have to know a little about how to use TCP/IP protocol communication.

In this article now, we will discuss about the installation of IPTables and the process of the protection which will do by IPTables program.

Thursday, May 19, 2011

SELECT OR CHOOSE THE CORRECT ONE FOR YOUR FIBER OPTIC

There is so many kind of Fiber optic technology and Inside The Computers will suggest you how to Select the correct one for your fiber optic. Starting from cable technology, the ray propagation technology, and the other supporting technology, which make the users is free to select or choose the product. If we don’t need the cable with tight layers, what do we have to use it? The price is must be expensive with the product with minor protecting layers.

If we need the fiber technology which can give us much more bandwidth with very long distance, don’t select a wrong cable, because that will make you headache. Select the cable and fiber optic peripherals which provide single mode communication.

Beside that entire factor, there is so many other factors for us to see and to know before we buy and use the technology of fiber optic, because the investment of this fiber optic technology is not cheap.

Connector Types on Fiber Optic Technology

There is so many types of connector on Fiber Optic Technology, also the same with the cables. Now Inside The Computers will write about all of connector types, and here we go.
Connector Types
Connector is also as one important thing to make the communicating functionally. Connector also has a function to maintain the component inside the cables can be connected properly to transmitter or receiver without problems. The precisely of connector is very important and we have to really careful when we buy or choose the connector. If there is any minor mistake we made, believe me, you will have major problems. So, the types of connector is so many kind of types (varying), depend on the function.

FC
Use it for single cable mode with very high accuracy in connecting cable to transmitter or receiver. This connector is using thread system so the position can be arranged, so when we plug in to the peripherals, the accuracy will not change much.

SC
Use for single cable mode, can be loosened or tide. This connector not too expensive, simple and can be arrange manually the accuracy to the peripherals.

ST
The shape is more like bayonet, almost looks like BNC connector. Is often to use on single mode or multi mode cable. Very easy to use, plug or loosened.

BICONIC
One of the first connector when the fiber optic technology appear. And now not too many people using this biconic connector.

D4
This connector more likely FC, the different is only with the size. The different of that size is about 2 mm on the ferrule part.

SMA
This connector is the oldest type of ST. But after the ST type release and developed, this type of connector is no longer made.

Wednesday, May 18, 2011

The Cable Types for Fiber Optic Systems

The Cable Types
Fiber optic cable has many types. Now Inside The Computers will write only two cable design that generally or mostly used.

Loose Tube Cable
This kind of cable usually designed in modular from, which in one cable has 12 core fibers even can reach more than 200 cores. Every core has plastic different color layer, the function of that color is to mark the core inside so can easily recognize and arranged. Beside that function, this plastic layer also has another function which is as the protector for the core fiber. The unique thing on this cable is, there is a gel layer on every cable layers. This gel has function to prevent water inside to the core.


Inside the entire cable model, there is a buffer or supports right in the middle of that cable. The function of that buffer is to prevent the cable not broken when the cable is wounded. This buffer/supports could be as a plastic or metal, sometimes this cable also protected by layer which made from an iron on the outside before covering by rubber on the very outside. Usually this kind of cable fit for open area installation or even on duck which installed inside the ground.

Tight Buffered Cable
This type of cable doesn’t have the protection layers as much loose tube cable. Inside the design of this cable is supporting material such as iron, steel, etc. which is physically connected directly to fiber optic. In other words, not too many features of protector which will make the users easily to install it.
The design of this cable is mostly use as “jumper cable” which connected between outdoor cable with termination inside the building or directly to the users’ network. Beside it, this cable also often to use for indoor cabling such as connected between networks, connecting between building to the others, etc.

Fiber Optic Cable Construction

Not many people know what is and what are Fiber Optic Cable Construction, but now Inside The Computers will explain a little about it and I hope this will help.

fiber optic cable construction

Fiber optic cable made in many form and size, as happening on coaxial cable, the construction is made to support the application at any condition. Mostly the physically of the fiber optic cable almost the same with coaxial cable. There is so many cable with modification which will increase the power and reliability to that cable, but this components still present in every kind of cable.

The main component of this cable is the core. The material which forms the core is plastic or glass core which has refractive index level about 1.5. Outside the core, there is a layer called cradle. The function of this cradle can be mention as a layer to protect the core from the light. This layer also made from the optic materials same as the core, but the value of refractive index lower than core fiber.

The layer after a cradle is another protection layer which made from the plastics. This layer also called as buffer coating. Different with craddle, this layer has physically protection, because this layer made to protect the core from humidity and damaged.

On the all of that layer, there is another protection called jacket. This layer physically protect from the layers inside from the abrasion, shaking, contamination and more.

Tuesday, May 17, 2011

INSIDE THE FIBER OPTIC

Inside The Fiber Optic

Now Inside The Computers will discuss about Inside the Fiber Optic, and we will go inside the fiber optic technology.
Fiber optic media has more benefit and advantage in the performance and the reliability when transferring data. This media make data communicating easy and fast to do. So, this media become favorite media for many users to have the high quality communication. This media not only capable to do a communicate between building and building, block to block, city to city, but this media also already been trusted to connect between continent and continent, island to island, country to country, nation and nation in this world. Fiber optic also has been trusted for long time to become main communication media (backbone) from the internet all over the world. To connect the network in one country with another country or continent to other continent, fiber optic already participates for long time in the world of communication. That’s why this media become one of trusted media because the performance, quality, and reliability. And now we will see inside this media one by one, even not too detail but I think that will be enough to show how good this technology.

The Characteristics of Fiber Optic Communication
 Fiber optic communication technology has many type and characteristics. From this type and characteristics finally they made a lot of connector type, cable, and variation tools. All of this type and characteristics differences resulting the different way of work (performance). Fiber optic communication technology is divide become few type by two factor, which is structural factor and property factor from the transmission system. This two factor who make the quality different and also the different of price for the global line. Structural factor more focus on the physically media which is fiber optic. And property factor on transmission system more focus on the lights of data is treat in the media. The modifying from the two factors will make the fiber optic technology become more vary. Base on structure factor and property factor on transmission system, the fiber optic technology dividing become two categories, which is:

Single Mode Fiber Optic
If we seen from the factor of system transmission property, single mode is a data transmission system which is tangible of light of radiance, where the inside of it has one light index without bouncing and spread as long that landscape media. One light or radiance which doesn’t bounce inside that optic media make the fiber optic technology has a little problem. But the problems comes from the outside factor and only a physically problems. Single mode can be seen from the structural form which is constitute of fiber optic technology who work using the main (core) fiber with very small diameter, about 8 until 10 micrometer. With the size of fiber core which is very small, the light that can pass it is only one light mode which is the light with phase length about 1310 or 1550 nanometer. Single mode can carry data with bigger bandwidth than multi mode fiber optics, but this technology need light source with thin spectral and that mean is very expensive system. Single mode can carry data faster and 50 times more far then multi mode. But you also have to spend more money to use it.

Multi Mode Fiber Optic
Fit with the names, this technology has many advantage and also disadvantage which cause by amount of light signal inside of fiber optic media. The light inside must be more than one. If we see from the transmission system property factors, multi mode fiber optic is data transmission technology through an optic with using few light indexes inside of it. The light wills bouncing until that light reach to the destination.
The light signal in multi mode fiber optic technology can be produce until 100 light modes. If we seen from structural factor, multi mode technology is fiber optic technology which using bigger size of core compare with single mode. The size of multi mode cable generally is between 50 until 100 micrometer. Usually the NA size inside multi mode cable is between 0.20 until 0.29. With bigger size and higher NA, then fiber optic multi mode technology created.
The advantage of this bigger core and higher NA is, first, information ray will be more flexible to move inside the fiber optic cable. Because of that size, users are easily to connect core to core if we need to connect it. When connecting or we use to call splicing, the accuracy and precision between the cores we want to connect become uncritical thing for the data light.
Another advantage from this technology is making you possible to use LED as the light source, compare with single mode which have to use laser as the light source. What we have to know, LED is a cheap component so the equipment component as the light source also inexpensive. LED is not too complex in take care and using the LED, also has good reliability comparing with laser. So this technology has significant different from the price factor compare with single mode.
But, this technology also brings uncomfortable to the users. When the amount of this mode increase, the affect from dispersion aspect also increasing. Dispersion aspect (intermodal dispersion) is an affect where the lights mode with a lot of amount will arrived in the end of receiver with unsynchronized time. The times delay (different) is causing the light pulse becoming spread in acceptance. The influence is, the bandwidth result can’t increase, so the communication limited on the bandwidth. The producer of fiber optic cable is modifying the cable, so the maximum bandwidth can be reach.

Monday, May 16, 2011

Chip Packaging, DIP , SOJ , TSOP , CSP (Chip Scale Package) inside the RAM

Let us now more and more about the RAM (Memory) and now still with Inside The Computers we will continue what is Ram Component?

Memory Chip Types

CHIP PACKAGING
The type that often we use on the DDR memory module is TSOP (Thin Small Outline Package). On the RDRAM and DDR2 is using CSP (Chip Scale Package). Some of this chip memory module is using DIP (Dual In-Line Package) and SOJ (Small Outline J-Lead).

DIP (Dual In-Line Package)
This kind of chip memory used when the memory installed directly to motherboard PCB. DIP is the through-hole component category, which can install on the PCB through the holes which arrange for the pin.

SOJ (Small Outline J-Lead)
DRAM chip type SOJ. Called SOJ because the pin has form like the “J” letter. SOJ is surface-mount component, mean this component installed on the surface of PCB.

TSOP (Thin Small Outline Package)
It’s also surface-mount component.

CSP (Chip Scale Package)
If on the DIP, SOJ and TSOP use the feet/pin to connecting with the board, CSP didn’t use any pin. The connection is using BGA (Ball Grid Array) which place on the bottom of the component. This kind of DRAM chip is use by RDRAM (Rambus DRAM) and DDR.  

Expensive and sophisticated technology make the Fiber Optic communication media become the main options for the users who want good quality in communicate.

Sunday, May 15, 2011

What is the connection between RAM and Paging Files?

Sometimes we only know what is RAM, and if the computer is slow mean the less RAM, and that's not the right opinion I think, because we have to know What is the connection between RAM and Paging Files? and here Inside The Computer will continue the last post from Surfing the RAM.

On that analogy, the wide of that work table will affect the ability to handle or lift a task. If the table is too narrow or tight, probably we will need to repeat the process to bring the file from the locker to work on table. Or there is other alternative, which is heaping the file on the line then we doing the task.
windows task manager

Same with the PC, if the program or data we work on too big to loading on RAM, PC will use part of harddisk (hard drive) that already set to save the data which cannot be save on RAM. The special part on the harddisk which dedicated to that process we use to call Virtual Memory. Paging file or we use to know as swap file on Windows operating system is one of the example from virtual memory. If we access paging file often, that will be decrease the PC performance.

Beside the performance of the PC will decrease (slower), there is still other problem will shown, such as the hard drive is work too hard and keep working hard even we didn’t do a task, save data, or any process, that because the CPU need the data on paging file inside the hard drive.

This situation probably will not happen, when the PC loading is still in the low rate, RAM still can accommodating the data and the active instruction. But when the PC loading is full, and the data loading and the instruction getting more and more, the RAM or memory start to lose the loading place. And if this situation happening to your PC, that mean your PC need bigger RAM capacity.

KNOWING INSIDE THE RAM COMPONENT

Today we will Know inside the ram component with Inside the computers and I believe step by step we will know deeper and deeper.

Physically, PC component which call RAM is one of the small and simple component, compare with another PC component. If we see it, it’s only a piece of small PCB with some of black component with the contact point, so the memory cans interaction with the motherboard. Here it is the component!

PCB (Printed Circuit Board)
Mostly, PCB board has green color. On this PCB the memory chip component is installed. This PCB is has a few layer and on the outside layer has a circuits to transport the electricity and the data. So if we use as theory, much more the layer on the PCB so there is possibly the PCB has many circuits or track. This situation makes the memory module more stable and faster the performance. That’s why some of the memory product point on the number of layer on the PCB.

CONTACT POINT
It’s use to know with contact finger, edge connector or lead. When the memory module installed on the memory slot on the motherboard, this is the part who connecting the information between motherboard to and from memory. On the contact point which has hundreds of points, is dividing with specific line and we use to know as notch. The main function of notch is to prevent if we put or installed memory with the wrong direction. For the example, DDR module has notch distance about 73 mm from the front of the PCB, and DDR2 has notch distance at 71 mm from the front of PCB. For the SDRAM is much easier, we can easily know the different because SDRAM has 2 notch on the contact point.

DRAM (Dynamic Random Access Memory)
The black component installed on the PCB, this is what we call DRAM. We call it dynamic because they only keep the data on the short period and has to refresh with short period too.

Friday, May 13, 2011

General Definition inside RAM

after a day problem with the blogger, now Inside the Computers will continue, and now we will go to the General Definition inside RAM, including Speed, PC Rating and CAS Latency.
General Definitions on RAM
So many name and specific definition that we know on RAM, sometimes that make us confuse.   But no need to worry, I will explain the General Definitions here; at least after we read this articles, we can read the specification and the ability of the product of RAM.

Speed
Speed is become one of the important thing if we select a memory module. Faster the CPU, plus with the developed that use on dual core, makes RAM has to have ability faster to serving the CPU. There are a few important parameters who will affect the speed of a memory.
Megahertz (MHz)

This term use start with the SDRAM, the speed of memory (SDRAM) still on Megahertz (MHz), and still use even with the DDR2 period. The calculate base on time period which needed between clock cycle. Usually use time period nanosecond. For example, on the memory with actual clock speed 133 MHz will use 8 nanosecond (ns) for 1 clock cycle.

 Later the SDRAM present will replace with DDR (Double Data Rate). With the main development on the ability to send the data more in other word, double. DDR send the data twice in one clock cycle. The DDR2 also use the same method, which is the result of develops from DDR. With the main advantage is low temperature when they work. Also with the capacity of chi memory on DDR2 which increase drastically, it’s possibly that a one DDR2 has capacity until 2 Gb, even more, and DDR2 also have a progress on the speed compare with the previous DDR.

PC RATING
On the DDR module, is often that we seen on the memory written PC3200. For DDR2 module, PC2-3200, so where the number is comes? Use to know as PC RATING for DDR and DDR2 module. For the example, now a DDR module with clock speed 200 MHz, or for DDR Rating called DDR400, with bus width is 64-bit, so the ability of data transfer is 25,600 megabit per second (=400 MHz x 64-bit). With 1 byte = 8-bit, same with 3,200MBps (Megabyte per second). This throughput number is value of PC Rating. The placement of number 2 on DDR2 is just to make the different between DDR and DDR2.

CAS LATENCY
CAS = column address strobe or column address select. The meaning of that acronym is the same, which is the specific location from array data on DRAM module. CAS Latency or we use to know with CL, is amount of time which needed (clock cycle) during the delay between data request when send to memory controller for read process until the memory module is succeed produce the data output. If the CL specification on the RAM module is lower and with the same speed, that will be resulted faster memory.

Thursday, May 12, 2011

How Many Memory (RAM) Capacities that Ideal for our PC?

How Many Memory (RAM) Capacities that Ideal for our PC?
This is the hard question to answer. Too much variable which will affect the calculation of How Many Memory (RAM) capacities that ideal for our PC. And what is will affect it?  Probably some of the PC user has been through this situation; work on the PC system with less memory. Animated sand glass, sound like the harddisk (hard drive) is working hard, is one of the sign that the PC is less memory (RAM). and Inside The Computer now will share the knowledge of it, enjoy it.
what is the ideal memory?
Calculate the Needed of the PC Memory (RAM)
To know when we need to increase the PC Memory, this is little guidance that we can use to know the ideal memory we need. The application such as Word processing, spreadsheet, or Pdf reader will use the memory each about 20 MB. A browser application with the tab browser facility also will use the memory about 50 MB. And operating system, such as Windows XP Professional Edition will need memory about 100 MB. So, even the minimum system requirement from Windows XP only 128 MB, that only for the requirement of operating system. With the list of application that we already write above, may be will be wise if the system has at least 256 MB. But if the PC with the game application run, that’s will be more variety. But we suggest to all the Gamers including 3D Games, we recommend at least the memory installed is no less than 1 GB or more.

How about the Server Computer? That’s the good question.
Not much the PC users who care about how many RAM installed on the Server. But, this also will affect the performance of server to serving the client computers which joining on the network. So, we have to be sure the server is installed with enough memory capacity. Operating systems which using on the server also can be affect same like PC. Beside, the calculation of variable the needed of server memory will be different with PC.

Calculate the Needed of the Server Memory (RAM)
The main function of server is needed to be considering. Is the server as application, communication, remote access, e-mail, web, file, multimedia, database, or just print server? The requirement memory of server file, multimedia will be less than server database. For print server, we have to see the type of paper and estimate how many sheets that printer will print.

The Number of clients, who connected, is one of the important factors. We have to estimate the maximum connected clients. The number of CPU usage will be affect too. More CPU, that’s mean more instruction and data has to process. To optimize multiprocessor we need more RAM compared with the server only with single CPU.

The signs that the server is has insufficient memory, is different with PC. If there is any delayed process such as data saving, printing, etc. that could be because the server need more memory, in other word, the server has insufficient memory (RAM).

On the PC, the user is easily to monitor the usage of the memory. In the windows operating system we can open Task Manager. The same method also we can use to see the usage of memory on server. There is so many utility to watch the CPU, memory and hard drive usage. Watch the maximum point (peak) of memory usable. Disk utilization also can drastically increase, is one of the indication that the server is has to use the paging file on the hard drive (harddisk).

Wednesday, May 11, 2011

Surfing the secret of RAM (Random Access Memory)

Memory (RAM)
 
With the growth of computer technology, the operating system and supporting application, the requirement of the memory (RAM) on your PC (Computer) is also increased. Adding the memory or we use to know as RAM is one of the effective upgrade for our PC component to increase the PC performance. Also if we see from the expense that we have to spend, upgrading RAM is one of the best solutions for our PC. And here Inside The Computers will explain everything and lets Surfing The Secret of RAM.

But, there is also so many options if we want to buy a RAM. Because there is so many term of RAM that we don’t fully understand. To know how to upgrade or to know it better, please continue to read these articles more. Because this is the time to Surfing and expressing the secret of RAM.

What is the main Function of Memory (RAM) on PC?
What we call memory on PC, actually relate on RAM (Random Access Memory). A computer needs a Ram to save the data and instruction which needed to execute a command (task). Data or an instruction which available on RAM it’s enabling the processor or CPU (Central Processing Unit) to do quick access.
When CPU opened a program or application from hard drive such as a word processing, spreadsheet or game, it will loading to memory. This will enabling the application will work faster comparing if it has to access directly to hard drive which much slower.

Because the function of the hard drive only as storage data, not as a memory. With accessing data or application which available on RAM, that will make your PC faster to execute the task.
This simple analogy is to understand this thing, much easier if we take on the real situation every day. For example at the workplace, there is a work table and archive locker. Archive locker we can assume same as hard drive (hard disk), where in that locker we can find file and information that we need. When we start to work, all the information binding and file, we will make them out and we place it on the work table. Of course, we do that to make easy and faster our access to the information that we need. So, work table we can assume as RAM on PC.

With this simple analogy, I believe we can imagine the different of speed between memory and hard drive (harddisk).